Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
aeyh21MAtA.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\ast.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\astclient.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\astrct.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\aw_sas32.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\hatls.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\is-0HK0N.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\is-16KCC.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\is-5765H.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\is-5FFPK.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\is-60GLH.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\is-AAPRN.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\is-BG0DN.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\is-E6DJ2.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\is-GPS00.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\is-JCRD8.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\is-S3CIC.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\is-SNDPS.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\is-TBGHD.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\is-VO31B.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\libcrypto-1_1.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\libcryptoMD.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\libcurl.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\libeay32.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\libjpeg-turbo-win.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\libssl-1_1.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\opus.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\quartz.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\template\AstCrp.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\template\ast.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\template\astclient.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\template\astrct.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\template\aw_sas32.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\template\hatls.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\template\libcrypto-1_1.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\template\libcryptoMD.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\template\libcurl.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\template\libeay32.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\template\libjpeg-turbo-win.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\template\libssl-1_1.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\template\opus.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\template\quartz.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-3UH24.tmp\_isetup\_iscrypt.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-3UH24.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-3UH24.tmp\_isetup\_shfoldr.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-KMJLJ.tmp\_isetup\_iscrypt.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-KMJLJ.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-KMJLJ.tmp\_isetup\_shfoldr.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-MK5MR.tmp\aeyh21MAtA.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-PD76Q.tmp\aeyh21MAtA.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\57mskh.cfg (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\9vsl3c.bat (copy)
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\AstCrp.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\config.ini (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\exn5epb.bmp (copy)
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 186x272, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\is-9LAME.tmp
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\is-HUL9G.tmp
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 186x272, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\is-INPP5.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\is-MU1HO.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\is-VL2GA.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u7i3kw\msvcr120.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\template\57mskh.cfg
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\template\9vsl3c.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\template\config.ini
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\template\exn5epb.bmp
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 186x272, components
3
|
dropped
|
||
C:\Users\user\AppData\Roaming\template\msvcr120.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
There are 56 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\aeyh21MAtA.exe
|
"C:\Users\user\Desktop\aeyh21MAtA.exe"
|
||
C:\Users\user\Desktop\aeyh21MAtA.exe
|
"C:\Users\user\Desktop\aeyh21MAtA.exe" /verysilent /password=lzueuxc
|
||
C:\Users\user\AppData\Roaming\template\ast.exe
|
"C:\Users\user\AppData\Roaming\template\ast.exe"
|
||
C:\Users\user\AppData\Roaming\template\ast.exe
|
"C:\Users\user\AppData\Roaming\template\ast.exe"
|
||
C:\Users\user\AppData\Roaming\template\ast.exe
|
"C:\Users\user\AppData\Roaming\template\ast.exe"
|
||
C:\Users\user\AppData\Local\Temp\is-MK5MR.tmp\aeyh21MAtA.tmp
|
"C:\Users\user\AppData\Local\Temp\is-MK5MR.tmp\aeyh21MAtA.tmp" /SL5="$20454,6701859,404480,C:\Users\user\Desktop\aeyh21MAtA.exe"
|
||
C:\Users\user\AppData\Local\Temp\is-PD76Q.tmp\aeyh21MAtA.tmp
|
"C:\Users\user\AppData\Local\Temp\is-PD76Q.tmp\aeyh21MAtA.tmp" /SL5="$20464,6701859,404480,C:\Users\user\Desktop\aeyh21MAtA.exe"
/verysilent /password=lzueuxc
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\u7i3kw\9vsl3c.bat""
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\xcopy.exe
|
xcopy /Y /I /S "C:\Users\user\AppData\Local\Temp\u7i3kw\*" "C:\Users\user\AppData\Roaming\template\"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://id.xn--80akicokc0aablc.xn--p1ai:443/ING=Defaui
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/Nhttp://www.borland.com/namespaces/Types
|
unknown
|
||
http://www.borland.com/namespaces/Typesui
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:443mUbx
|
unknown
|
||
http://www.borland.com/namespaces/Typesw_sas3Y
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:443g
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:443f
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:443i
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:443h
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:443k
|
unknown
|
||
http://crl.sectigo.com/COMODOTimeStampingCA_2.crl0r
|
unknown
|
||
http://www.indyproject.org/
|
unknown
|
||
http://www.kngstr.com/?PreDefines.ishAbout
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:44335i:443y
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:44335......
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:443JV
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:443U
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:44335/
|
unknown
|
||
https://curl.haxx.se/docs/http-cookies.html#
|
unknown
|
||
https://datatracker.ietf.org/ipr/1526/
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:44335-
|
unknown
|
||
http://www.borland.com/namespaces/Typeste
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:44
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:44396
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1aiCY
|
unknown
|
||
https://curl.haxx.se/docs/copyright.htmlD
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:443K
|
unknown
|
||
http://crl.globalsign.
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:443/Log
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:443/
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:443.
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:443CBOs
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:4439
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:4438
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai443...
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:443rV
|
unknown
|
||
http://www.innosetup.com/
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:443iVfy
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:443uV
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:443ts
|
unknown
|
||
https://id.xn--80ak
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1aiv
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:443$
|
unknown
|
||
https://id.xn--80akico
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:443l~
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:443uin
|
unknown
|
||
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
|
unknown
|
||
http://www.borland.com/namespaces/Typesw
|
unknown
|
||
http://ocsp2.globalsign.
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/ZZY
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:44335
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:443...43
|
unknown
|
||
http://www.kngstr.com/?PreDefines.ish
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:443/AstClnog
|
unknown
|
||
https://id.xn--80akicokc0ar
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:443:V
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1aiIZ
|
unknown
|
||
https://datatracker.ietf.org/ipr/1524/
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1aid003
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:44335/templatep
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1aij
|
unknown
|
||
http://crypto-st.art/update.php
|
unknown
|
||
http://www.borland.com/namespaces/Typesnu
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1aii
|
unknown
|
||
http://www.openssl.org/)
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:443VV
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://www.openssl.org/V
|
unknown
|
||
https://id.xn--80akicokc0aa
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/r
|
unknown
|
||
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:443AUB
|
unknown
|
||
https://curl.haxx.se/docs/http-cookies.html
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:443-0
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:443vU
|
unknown
|
||
http://www.borland.com/namespaces/Types
|
unknown
|
||
http://www.borland.com/namespaces/Typesh
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:44335/api/exec
|
unknown
|
||
https://sectigo.com/CPS0B
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1aihY
|
unknown
|
||
https://curl.haxx.se/V
|
unknown
|
||
https://datatracker.ietf.org/ipr/1914/
|
unknown
|
||
https://sectigo.com/CPS0C
|
unknown
|
||
https://sectigo.com/CPS0D
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:443
|
unknown
|
||
https://id.xn--80akicokc0aablc.
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:443...
|
unknown
|
||
http://www.borland.com/namespaces/Typese
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai1
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:443NUGx
|
unknown
|
||
http://crt.sectigo.com/COMODOTimeStampingCA_2.crt0#
|
unknown
|
||
http://www.sqlite.org/copyright.html.
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai00
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:44359
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:44302
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:44300
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
https://www.openssl.org/docs/faq.html
|
unknown
|
||
https://id.xn--80akicokc0aablc.xn--p1ai:443/api/exec
|
212.193.169.65
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
id.xn--80akicokc0aablc.xn--p1ai
|
212.193.169.65
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
212.193.169.65
|
id.xn--80akicokc0aablc.xn--p1ai
|
Russian Federation
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
|
Security.FixPass
|
||
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
|
Main.Autorun
|
||
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
|
Main.CloseButtonOperation
|
||
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
|
Main.CheckUpdates
|
||
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
|
Security.UseLocalSecuritySettings
|
||
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
|
Security.DynPassKind
|
||
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
|
Security.PassLifetime
|
||
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
|
Security.CanWinAuth
|
||
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
|
Security.AccessKind
|
||
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
|
Security.CanWinLoginAnotherUser
|
||
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
|
Security.UNCONTROLLED_ACCESS
|
||
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
|
Security.CanWinLoginNotAdmin
|
||
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
|
Security.DenyRemoteSettingsControl
|
||
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
|
Security.DenyLockControls
|
||
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
|
Log.ServerStoreTechLog
|
||
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
|
Main.AWAYMODE_REQUIRED
|
||
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
|
Main.LogsLifetime
|
||
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
|
Main.LogsForMail2Support
|
||
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
|
ProxySettings.UseKind
|
||
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
|
ProxySettings.StoreUserAndPassw
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
|
ast
|
||
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
|
Values.HDD
|
||
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
|
IEProxyAttributes.Server
|
||
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
|
IEProxyAttributes.Port
|
||
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
|
IEProxyAttributes.ProxyBypass
|
There are 23 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
401000
|
unkown
|
page execute read
|
||
5DDE000
|
heap
|
page read and write
|
||
5DA5000
|
heap
|
page read and write
|
||
22D0000
|
direct allocation
|
page read and write
|
||
32E9000
|
direct allocation
|
page read and write
|
||
555000
|
unkown
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
E28000
|
heap
|
page read and write
|
||
3191000
|
heap
|
page read and write
|
||
3141000
|
heap
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
5D67000
|
heap
|
page read and write
|
||
717000
|
heap
|
page read and write
|
||
E0D000
|
heap
|
page read and write
|
||
8D9000
|
unkown
|
page read and write
|
||
D20000
|
direct allocation
|
page read and write
|
||
315B000
|
heap
|
page read and write
|
||
E1A000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
5DD5000
|
heap
|
page read and write
|
||
635E000
|
stack
|
page read and write
|
||
5D6E000
|
heap
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
7B40000
|
heap
|
page read and write
|
||
BF0000
|
trusted library allocation
|
page read and write
|
||
736000
|
unkown
|
page execute read
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
302D000
|
direct allocation
|
page read and write
|
||
3330000
|
direct allocation
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
5FA0000
|
trusted library allocation
|
page read and write
|
||
5D34000
|
heap
|
page read and write
|
||
5DB5000
|
heap
|
page read and write
|
||
2488000
|
direct allocation
|
page read and write
|
||
5D9B000
|
heap
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
213F000
|
direct allocation
|
page read and write
|
||
36D6000
|
direct allocation
|
page read and write
|
||
32A7000
|
direct allocation
|
page read and write
|
||
7B50000
|
heap
|
page read and write
|
||
3164000
|
heap
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
5D5D000
|
heap
|
page read and write
|
||
6C2C9000
|
unkown
|
page execute read
|
||
3089000
|
heap
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
3185000
|
heap
|
page read and write
|
||
5DAD000
|
heap
|
page read and write
|
||
369E000
|
direct allocation
|
page read and write
|
||
7BAA000
|
heap
|
page read and write
|
||
23AA000
|
direct allocation
|
page read and write
|
||
3168000
|
heap
|
page read and write
|
||
2E21000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
5DBD000
|
heap
|
page read and write
|
||
5DD6000
|
heap
|
page read and write
|
||
5D72000
|
heap
|
page read and write
|
||
3141000
|
heap
|
page read and write
|
||
21FA000
|
direct allocation
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
3199000
|
heap
|
page read and write
|
||
8CA000
|
unkown
|
page read and write
|
||
36CE000
|
direct allocation
|
page read and write
|
||
DFF000
|
heap
|
page read and write
|
||
3034000
|
direct allocation
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
5DAC000
|
heap
|
page read and write
|
||
3356000
|
direct allocation
|
page read and write
|
||
22F9000
|
heap
|
page read and write
|
||
322F000
|
stack
|
page read and write
|
||
6CC0000
|
trusted library allocation
|
page read and write
|
||
6900000
|
trusted library allocation
|
page read and write
|
||
5FD0000
|
trusted library allocation
|
page read and write
|
||
5F73000
|
trusted library allocation
|
page read and write
|
||
6C450000
|
unkown
|
page execute read
|
||
3168000
|
heap
|
page read and write
|
||
5DB9000
|
heap
|
page read and write
|
||
32B9000
|
direct allocation
|
page read and write
|
||
937000
|
unkown
|
page read and write
|
||
5B91000
|
heap
|
page read and write
|
||
5D87000
|
heap
|
page read and write
|
||
6C19E000
|
unkown
|
page readonly
|
||
3188000
|
heap
|
page read and write
|
||
414F000
|
stack
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
5F64000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
5D92000
|
heap
|
page read and write
|
||
2240000
|
direct allocation
|
page execute and read and write
|
||
63E0000
|
trusted library allocation
|
page read and write
|
||
7B96000
|
heap
|
page read and write
|
||
3141000
|
heap
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
63C000
|
heap
|
page read and write
|
||
7006000
|
unkown
|
page read and write
|
||
3345000
|
direct allocation
|
page read and write
|
||
5D6E000
|
heap
|
page read and write
|
||
3626000
|
direct allocation
|
page read and write
|
||
3183000
|
heap
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
5D7D000
|
heap
|
page read and write
|
||
233C000
|
direct allocation
|
page read and write
|
||
315B000
|
heap
|
page read and write
|
||
7B68000
|
heap
|
page read and write
|
||
3250000
|
direct allocation
|
page read and write
|
||
391F000
|
stack
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
334B000
|
direct allocation
|
page read and write
|
||
5EE000
|
stack
|
page read and write
|
||
5DB2000
|
heap
|
page read and write
|
||
73E000
|
stack
|
page read and write
|
||
5DC2000
|
heap
|
page read and write
|
||
2E4E000
|
stack
|
page read and write
|
||
5D31000
|
heap
|
page read and write
|
||
5D4B000
|
heap
|
page read and write
|
||
5DC4000
|
heap
|
page read and write
|
||
5DAE000
|
heap
|
page read and write
|
||
6A00000
|
trusted library allocation
|
page read and write
|
||
6010000
|
trusted library allocation
|
page read and write
|
||
7B51000
|
heap
|
page read and write
|
||
5D96000
|
heap
|
page read and write
|
||
6A00000
|
trusted library allocation
|
page read and write
|
||
318C000
|
heap
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
5DA9000
|
heap
|
page read and write
|
||
2FDC000
|
direct allocation
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
337D000
|
direct allocation
|
page read and write
|
||
7B24000
|
heap
|
page read and write
|
||
36F8000
|
direct allocation
|
page read and write
|
||
44CE000
|
direct allocation
|
page read and write
|
||
21BB000
|
direct allocation
|
page read and write
|
||
5D77000
|
heap
|
page read and write
|
||
5DB2000
|
heap
|
page read and write
|
||
2D0D000
|
stack
|
page read and write
|
||
2FF6000
|
heap
|
page read and write
|
||
3282000
|
heap
|
page read and write
|
||
8D0000
|
unkown
|
page read and write
|
||
2E21000
|
heap
|
page read and write
|
||
5DCD000
|
heap
|
page read and write
|
||
7D20000
|
trusted library allocation
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
5D6E000
|
heap
|
page read and write
|
||
7FCA0000
|
direct allocation
|
page read and write
|
||
DFF000
|
heap
|
page read and write
|
||
4410000
|
direct allocation
|
page read and write
|
||
5D72000
|
heap
|
page read and write
|
||
3141000
|
heap
|
page read and write
|
||
32E2000
|
direct allocation
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
705000
|
heap
|
page read and write
|
||
5DAF000
|
heap
|
page read and write
|
||
238C000
|
direct allocation
|
page read and write
|
||
21E0000
|
direct allocation
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
315B000
|
heap
|
page read and write
|
||
2EB5000
|
direct allocation
|
page read and write
|
||
635000
|
heap
|
page read and write
|
||
3727000
|
direct allocation
|
page read and write
|
||
5D63000
|
heap
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
5D56000
|
heap
|
page read and write
|
||
36BA000
|
direct allocation
|
page read and write
|
||
6C1AF000
|
unkown
|
page readonly
|
||
2FC1000
|
heap
|
page read and write
|
||
E0D000
|
heap
|
page read and write
|
||
3176000
|
heap
|
page read and write
|
||
5D8C000
|
heap
|
page read and write
|
||
48A6000
|
direct allocation
|
page read and write
|
||
6A40000
|
trusted library allocation
|
page read and write
|
||
6030000
|
trusted library allocation
|
page read and write
|
||
3450000
|
heap
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
5DBD000
|
heap
|
page read and write
|
||
367E000
|
stack
|
page read and write
|
||
36B8000
|
direct allocation
|
page read and write
|
||
5D93000
|
heap
|
page read and write
|
||
2EDC000
|
direct allocation
|
page read and write
|
||
7B21000
|
heap
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
5D5A000
|
heap
|
page read and write
|
||
315B000
|
heap
|
page read and write
|
||
5DA5000
|
heap
|
page read and write
|
||
5DDD000
|
heap
|
page read and write
|
||
63E0000
|
trusted library allocation
|
page read and write
|
||
48AC000
|
direct allocation
|
page read and write
|
||
36A8000
|
direct allocation
|
page read and write
|
||
DFC000
|
heap
|
page read and write
|
||
6DBF000
|
stack
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
6BBD2000
|
unkown
|
page readonly
|
||
453E000
|
direct allocation
|
page read and write
|
||
5DCE000
|
heap
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
63E0000
|
trusted library allocation
|
page read and write
|
||
5DDD000
|
heap
|
page read and write
|
||
5D34000
|
heap
|
page read and write
|
||
21DD000
|
direct allocation
|
page read and write
|
||
5D31000
|
heap
|
page read and write
|
||
6B63000
|
trusted library allocation
|
page read and write
|
||
240D000
|
direct allocation
|
page read and write
|
||
2376000
|
direct allocation
|
page read and write
|
||
21AC000
|
direct allocation
|
page read and write
|
||
D2E000
|
stack
|
page read and write
|
||
36B2000
|
direct allocation
|
page read and write
|
||
5DD8000
|
heap
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
5DBE000
|
heap
|
page read and write
|
||
93000
|
stack
|
page read and write
|
||
2368000
|
direct allocation
|
page read and write
|
||
3159000
|
heap
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
2204000
|
direct allocation
|
page read and write
|
||
5D5D000
|
heap
|
page read and write
|
||
5DD2000
|
heap
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
5DB1000
|
heap
|
page read and write
|
||
3530000
|
heap
|
page read and write
|
||
239A000
|
direct allocation
|
page read and write
|
||
5DDC000
|
heap
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
2195000
|
direct allocation
|
page read and write
|
||
3723000
|
direct allocation
|
page read and write
|
||
5DDD000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
3178000
|
heap
|
page read and write
|
||
5F71000
|
trusted library allocation
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
3183000
|
heap
|
page read and write
|
||
7B39000
|
heap
|
page read and write
|
||
5DCC000
|
heap
|
page read and write
|
||
4412000
|
direct allocation
|
page read and write
|
||
3164000
|
heap
|
page read and write
|
||
5D96000
|
heap
|
page read and write
|
||
211F000
|
direct allocation
|
page read and write
|
||
65FF000
|
stack
|
page read and write
|
||
5D8D000
|
heap
|
page read and write
|
||
36D8000
|
direct allocation
|
page read and write
|
||
7B41000
|
heap
|
page read and write
|
||
315B000
|
heap
|
page read and write
|
||
63E0000
|
trusted library allocation
|
page read and write
|
||
242B000
|
direct allocation
|
page read and write
|
||
7B60000
|
heap
|
page read and write
|
||
317B000
|
heap
|
page read and write
|
||
3731000
|
direct allocation
|
page read and write
|
||
3168000
|
heap
|
page read and write
|
||
2370000
|
direct allocation
|
page read and write
|
||
2EBD000
|
direct allocation
|
page read and write
|
||
3725000
|
direct allocation
|
page read and write
|
||
116C000
|
stack
|
page read and write
|
||
5DC6000
|
heap
|
page read and write
|
||
EF0000
|
trusted library allocation
|
page read and write
|
||
5D7A000
|
heap
|
page read and write
|
||
639C000
|
stack
|
page read and write
|
||
48B2000
|
direct allocation
|
page read and write
|
||
36F0000
|
direct allocation
|
page read and write
|
||
61EA1000
|
unkown
|
page readonly
|
||
5DD6000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
2E0F000
|
stack
|
page read and write
|
||
3C30000
|
trusted library allocation
|
page read and write
|
||
3198000
|
heap
|
page read and write
|
||
36DC000
|
direct allocation
|
page read and write
|
||
9A8000
|
unkown
|
page readonly
|
||
2E21000
|
heap
|
page read and write
|
||
3B60000
|
heap
|
page read and write
|
||
5D6E000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
5F73000
|
trusted library allocation
|
page read and write
|
||
36AA000
|
direct allocation
|
page read and write
|
||
36B0000
|
direct allocation
|
page read and write
|
||
2EF9000
|
direct allocation
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
216A000
|
direct allocation
|
page read and write
|
||
36F9000
|
direct allocation
|
page read and write
|
||
450E000
|
direct allocation
|
page read and write
|
||
5DB0000
|
heap
|
page read and write
|
||
7B51000
|
heap
|
page read and write
|
||
36C4000
|
direct allocation
|
page read and write
|
||
23B2000
|
direct allocation
|
page read and write
|
||
48AE000
|
direct allocation
|
page read and write
|
||
3148000
|
heap
|
page read and write
|
||
927000
|
unkown
|
page read and write
|
||
44D0000
|
direct allocation
|
page read and write
|
||
5DC0000
|
heap
|
page read and write
|
||
2160000
|
direct allocation
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
5D7F000
|
heap
|
page read and write
|
||
DFC000
|
heap
|
page read and write
|
||
5D96000
|
heap
|
page read and write
|
||
318C000
|
heap
|
page read and write
|
||
315B000
|
heap
|
page read and write
|
||
60A000
|
heap
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
5D6E000
|
heap
|
page read and write
|
||
8D3000
|
unkown
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
3191000
|
heap
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
36CA000
|
direct allocation
|
page read and write
|
||
44E8000
|
direct allocation
|
page read and write
|
||
5DCA000
|
heap
|
page read and write
|
||
6CC0000
|
trusted library allocation
|
page read and write
|
||
3176000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3089000
|
heap
|
page read and write
|
||
5D83000
|
heap
|
page read and write
|
||
6C1DA000
|
unkown
|
page read and write
|
||
5D96000
|
heap
|
page read and write
|
||
5D8D000
|
heap
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
5D6E000
|
heap
|
page read and write
|
||
65A000
|
heap
|
page read and write
|
||
3246000
|
heap
|
page read and write
|
||
E1C000
|
heap
|
page read and write
|
||
6BBCB000
|
unkown
|
page read and write
|
||
7B8E000
|
heap
|
page read and write
|
||
5DC9000
|
heap
|
page read and write
|
||
3196000
|
heap
|
page read and write
|
||
23E2000
|
direct allocation
|
page read and write
|
||
3141000
|
heap
|
page read and write
|
||
CAE000
|
stack
|
page read and write
|
||
2208000
|
direct allocation
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
2F24000
|
direct allocation
|
page read and write
|
||
E6C000
|
stack
|
page read and write
|
||
3755000
|
direct allocation
|
page read and write
|
||
A6E000
|
stack
|
page read and write
|
||
4406000
|
direct allocation
|
page read and write
|
||
7B38000
|
heap
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
5DD3000
|
heap
|
page read and write
|
||
3198000
|
heap
|
page read and write
|
||
315B000
|
heap
|
page read and write
|
||
7006000
|
unkown
|
page read and write
|
||
7B49000
|
heap
|
page read and write
|
||
8C3000
|
unkown
|
page read and write
|
||
381E000
|
stack
|
page read and write
|
||
7FE3B000
|
direct allocation
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
6A00000
|
trusted library allocation
|
page read and write
|
||
5D7A000
|
heap
|
page read and write
|
||
6CF14000
|
unkown
|
page write copy
|
||
7B28000
|
heap
|
page read and write
|
||
213C000
|
direct allocation
|
page read and write
|
||
44DC000
|
direct allocation
|
page read and write
|
||
3078000
|
heap
|
page read and write
|
||
315B000
|
heap
|
page read and write
|
||
44D2000
|
direct allocation
|
page read and write
|
||
5D34000
|
heap
|
page read and write
|
||
6CCA1000
|
unkown
|
page execute read
|
||
36BE000
|
direct allocation
|
page read and write
|
||
3164000
|
heap
|
page read and write
|
||
300C000
|
direct allocation
|
page read and write
|
||
462000
|
unkown
|
page readonly
|
||
32C5000
|
direct allocation
|
page read and write
|
||
5D6C000
|
heap
|
page read and write
|
||
6C4CC000
|
unkown
|
page readonly
|
||
5DC1000
|
heap
|
page read and write
|
||
36D2000
|
direct allocation
|
page read and write
|
||
417000
|
unkown
|
page read and write
|
||
3180000
|
heap
|
page read and write
|
||
44E6000
|
direct allocation
|
page read and write
|
||
5DB9000
|
heap
|
page read and write
|
||
31AF000
|
stack
|
page read and write
|
||
6C175000
|
unkown
|
page readonly
|
||
D38000
|
heap
|
page read and write
|
||
61E9B000
|
unkown
|
page readonly
|
||
2FBE000
|
direct allocation
|
page read and write
|
||
5DCD000
|
heap
|
page read and write
|
||
CEE000
|
stack
|
page read and write
|
||
2FFC000
|
direct allocation
|
page read and write
|
||
6403000
|
trusted library allocation
|
page read and write
|
||
2143000
|
direct allocation
|
page read and write
|
||
5D7A000
|
heap
|
page read and write
|
||
8CB000
|
unkown
|
page read and write
|
||
5D6E000
|
heap
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
5DD6000
|
heap
|
page read and write
|
||
23E3000
|
direct allocation
|
page read and write
|
||
7B2D000
|
heap
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
2E21000
|
heap
|
page read and write
|
||
5DD4000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
315B000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
6CCB9000
|
unkown
|
page readonly
|
||
32B6000
|
direct allocation
|
page read and write
|
||
3060000
|
trusted library allocation
|
page read and write
|
||
DFC000
|
heap
|
page read and write
|
||
31F0000
|
direct allocation
|
page read and write
|
||
5D71000
|
heap
|
page read and write
|
||
E1D000
|
heap
|
page read and write
|
||
2EAE000
|
direct allocation
|
page read and write
|
||
41D000
|
unkown
|
page read and write
|
||
5DBE000
|
heap
|
page read and write
|
||
6430000
|
remote allocation
|
page read and write
|
||
3051000
|
direct allocation
|
page read and write
|
||
5D8B000
|
heap
|
page read and write
|
||
5D6E000
|
heap
|
page read and write
|
||
4431000
|
direct allocation
|
page read and write
|
||
3168000
|
heap
|
page read and write
|
||
2201000
|
direct allocation
|
page read and write
|
||
2E21000
|
heap
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
2473000
|
direct allocation
|
page read and write
|
||
D8C000
|
heap
|
page read and write
|
||
5DA5000
|
heap
|
page read and write
|
||
2E21000
|
heap
|
page read and write
|
||
3176000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
5DDC000
|
heap
|
page read and write
|
||
6D0000
|
direct allocation
|
page execute and read and write
|
||
5DB2000
|
heap
|
page read and write
|
||
2175000
|
direct allocation
|
page read and write
|
||
31EE000
|
stack
|
page read and write
|
||
2402000
|
direct allocation
|
page read and write
|
||
3120000
|
heap
|
page read and write
|
||
3168000
|
heap
|
page read and write
|
||
5F73000
|
trusted library allocation
|
page read and write
|
||
7B26000
|
heap
|
page read and write
|
||
3168000
|
heap
|
page read and write
|
||
5ACF000
|
heap
|
page read and write
|
||
5CE0000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
44DA000
|
direct allocation
|
page read and write
|
||
6B7DB000
|
unkown
|
page readonly
|
||
DA1000
|
heap
|
page read and write
|
||
2414000
|
direct allocation
|
page read and write
|
||
3186000
|
heap
|
page read and write
|
||
5D6C000
|
heap
|
page read and write
|
||
2E21000
|
heap
|
page read and write
|
||
2FEC000
|
direct allocation
|
page read and write
|
||
6BDCC000
|
unkown
|
page readonly
|
||
351F000
|
stack
|
page read and write
|
||
392F000
|
stack
|
page read and write
|
||
66FD000
|
stack
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
5DAD000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
3671000
|
direct allocation
|
page read and write
|
||
6CE91000
|
unkown
|
page execute read
|
||
320B000
|
direct allocation
|
page read and write
|
||
61E8B000
|
unkown
|
page readonly
|
||
3216000
|
direct allocation
|
page read and write
|
||
3D70000
|
direct allocation
|
page execute and read and write
|
||
3168000
|
heap
|
page read and write
|
||
303C000
|
direct allocation
|
page read and write
|
||
41C000
|
unkown
|
page read and write
|
||
5D7A000
|
heap
|
page read and write
|
||
2377000
|
direct allocation
|
page read and write
|
||
36DC000
|
direct allocation
|
page read and write
|
||
3064000
|
direct allocation
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
5D87000
|
heap
|
page read and write
|
||
5D4D000
|
heap
|
page read and write
|
||
2E21000
|
heap
|
page read and write
|
||
32A1000
|
direct allocation
|
page read and write
|
||
5D97000
|
heap
|
page read and write
|
||
3168000
|
heap
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
36BC000
|
direct allocation
|
page read and write
|
||
795000
|
heap
|
page read and write
|
||
6A40000
|
trusted library allocation
|
page read and write
|
||
5D96000
|
heap
|
page read and write
|
||
5D85000
|
heap
|
page read and write
|
||
23CE000
|
direct allocation
|
page read and write
|
||
DFE000
|
heap
|
page read and write
|
||
7B68000
|
heap
|
page read and write
|
||
D7D000
|
heap
|
page read and write
|
||
5D78000
|
heap
|
page read and write
|
||
8C3000
|
unkown
|
page read and write
|
||
5D68000
|
heap
|
page read and write
|
||
2500000
|
heap
|
page read and write
|
||
5DDB000
|
heap
|
page read and write
|
||
5D5D000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
5DC5000
|
heap
|
page read and write
|
||
44C8000
|
direct allocation
|
page read and write
|
||
2F50000
|
trusted library allocation
|
page read and write
|
||
5DDC000
|
heap
|
page read and write
|
||
3382000
|
direct allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
7B4A000
|
heap
|
page read and write
|
||
5DBD000
|
heap
|
page read and write
|
||
3168000
|
heap
|
page read and write
|
||
2FB3000
|
heap
|
page read and write
|
||
E1E000
|
heap
|
page read and write
|
||
32B5000
|
heap
|
page read and write
|
||
306E000
|
stack
|
page read and write
|
||
301F000
|
direct allocation
|
page read and write
|
||
5D65000
|
heap
|
page read and write
|
||
3185000
|
heap
|
page read and write
|
||
3C30000
|
direct allocation
|
page execute and read and write
|
||
337B000
|
direct allocation
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
6B61000
|
trusted library allocation
|
page read and write
|
||
37A1000
|
direct allocation
|
page read and write
|
||
6050000
|
trusted library allocation
|
page read and write
|
||
5CE9000
|
heap
|
page read and write
|
||
382F000
|
stack
|
page read and write
|
||
36AE000
|
direct allocation
|
page read and write
|
||
5F72000
|
trusted library allocation
|
page read and write
|
||
4453000
|
direct allocation
|
page read and write
|
||
5DCA000
|
heap
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
5DAD000
|
heap
|
page read and write
|
||
5DAD000
|
heap
|
page read and write
|
||
7005000
|
unkown
|
page execute read
|
||
3198000
|
heap
|
page read and write
|
||
5DB9000
|
heap
|
page read and write
|
||
25D0000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
61E9D000
|
unkown
|
page read and write
|
||
372B000
|
direct allocation
|
page read and write
|
||
2FF3000
|
direct allocation
|
page read and write
|
||
5D83000
|
heap
|
page read and write
|
||
32BE000
|
heap
|
page read and write
|
||
3168000
|
heap
|
page read and write
|
||
6BE3D000
|
unkown
|
page readonly
|
||
5D7A000
|
heap
|
page read and write
|
||
417000
|
unkown
|
page write copy
|
||
5DD5000
|
heap
|
page read and write
|
||
3296000
|
heap
|
page read and write
|
||
7B60000
|
heap
|
page read and write
|
||
315B000
|
heap
|
page read and write
|
||
5F90000
|
trusted library allocation
|
page read and write
|
||
7B48000
|
heap
|
page read and write
|
||
8DE000
|
unkown
|
page read and write
|
||
3C30000
|
direct allocation
|
page execute and read and write
|
||
231F000
|
direct allocation
|
page read and write
|
||
77E000
|
stack
|
page read and write
|
||
7B60000
|
heap
|
page read and write
|
||
D6E000
|
heap
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
DFC000
|
heap
|
page read and write
|
||
7B75000
|
heap
|
page read and write
|
||
369A000
|
direct allocation
|
page read and write
|
||
5F73000
|
trusted library allocation
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
5D75000
|
heap
|
page read and write
|
||
6032000
|
trusted library allocation
|
page read and write
|
||
5DCA000
|
heap
|
page read and write
|
||
36E0000
|
direct allocation
|
page read and write
|
||
6BC4A000
|
unkown
|
page execute read
|
||
3189000
|
heap
|
page read and write
|
||
6BE40000
|
unkown
|
page readonly
|
||
CFE000
|
stack
|
page read and write
|
||
5D76000
|
heap
|
page read and write
|
||
2F00000
|
direct allocation
|
page read and write
|
||
8BF000
|
unkown
|
page read and write
|
||
5D68000
|
heap
|
page read and write
|
||
3168000
|
heap
|
page read and write
|
||
323B000
|
direct allocation
|
page read and write
|
||
2369000
|
direct allocation
|
page read and write
|
||
417000
|
unkown
|
page read and write
|
||
5D8D000
|
heap
|
page read and write
|
||
6980000
|
trusted library allocation
|
page read and write
|
||
2E21000
|
heap
|
page read and write
|
||
5F90000
|
trusted library allocation
|
page read and write
|
||
5D5D000
|
heap
|
page read and write
|
||
3185000
|
heap
|
page read and write
|
||
7B32000
|
heap
|
page read and write
|
||
7B41000
|
heap
|
page read and write
|
||
C45000
|
heap
|
page read and write
|
||
23AB000
|
direct allocation
|
page read and write
|
||
3341000
|
direct allocation
|
page read and write
|
||
318C000
|
heap
|
page read and write
|
||
937000
|
unkown
|
page read and write
|
||
5D99000
|
heap
|
page read and write
|
||
BF0000
|
trusted library allocation
|
page read and write
|
||
7B38000
|
heap
|
page read and write
|
||
5DBD000
|
heap
|
page read and write
|
||
DFF000
|
heap
|
page read and write
|
||
6DE3000
|
trusted library allocation
|
page read and write
|
||
72C000
|
heap
|
page read and write
|
||
6C040000
|
unkown
|
page readonly
|
||
7B4D000
|
heap
|
page read and write
|
||
5D5E000
|
heap
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
3359000
|
direct allocation
|
page read and write
|
||
3249000
|
heap
|
page read and write
|
||
60E000
|
stack
|
page read and write
|
||
3195000
|
heap
|
page read and write
|
||
5D6E000
|
heap
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
5D7A000
|
heap
|
page read and write
|
||
7B55000
|
heap
|
page read and write
|
||
2E0F000
|
stack
|
page read and write
|
||
E18000
|
heap
|
page read and write
|
||
E1B000
|
heap
|
page read and write
|
||
3183000
|
heap
|
page read and write
|
||
6E00000
|
trusted library allocation
|
page read and write
|
||
3164000
|
heap
|
page read and write
|
||
5D7A000
|
heap
|
page read and write
|
||
6C1D8000
|
unkown
|
page write copy
|
||
23A4000
|
direct allocation
|
page read and write
|
||
6A40000
|
trusted library allocation
|
page read and write
|
||
6A00000
|
trusted library allocation
|
page read and write
|
||
3176000
|
heap
|
page read and write
|
||
5ACF000
|
heap
|
page read and write
|
||
3393000
|
direct allocation
|
page read and write
|
||
5D4D000
|
heap
|
page read and write
|
||
5DAD000
|
heap
|
page read and write
|
||
63E0000
|
trusted library allocation
|
page read and write
|
||
9AF000
|
stack
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
5D6E000
|
heap
|
page read and write
|
||
365B000
|
direct allocation
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
5DAE000
|
heap
|
page read and write
|
||
2FCD000
|
direct allocation
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
37C8000
|
direct allocation
|
page read and write
|
||
4414000
|
direct allocation
|
page read and write
|
||
2F16000
|
direct allocation
|
page read and write
|
||
10BF000
|
stack
|
page read and write
|
||
315B000
|
heap
|
page read and write
|
||
6CF19000
|
unkown
|
page readonly
|
||
21B8000
|
direct allocation
|
page read and write
|
||
3164000
|
heap
|
page read and write
|
||
7B30000
|
heap
|
page read and write
|
||
5DB7000
|
heap
|
page read and write
|
||
6900000
|
trusted library allocation
|
page read and write
|
||
5D6E000
|
heap
|
page read and write
|
||
5DB5000
|
heap
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
5DAD000
|
heap
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
21D8000
|
direct allocation
|
page read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
3141000
|
heap
|
page read and write
|
||
318C000
|
heap
|
page read and write
|
||
2393000
|
direct allocation
|
page read and write
|
||
558000
|
unkown
|
page write copy
|
||
2E21000
|
heap
|
page read and write
|
||
7B70000
|
heap
|
page read and write
|
||
7B77000
|
heap
|
page read and write
|
||
5DC4000
|
heap
|
page read and write
|
||
7B20000
|
heap
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
2E3D000
|
stack
|
page read and write
|
||
6A00000
|
trusted library allocation
|
page read and write
|
||
36EE000
|
direct allocation
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
DF6000
|
heap
|
page read and write
|
||
5D7A000
|
heap
|
page read and write
|
||
3141000
|
heap
|
page read and write
|
||
32AD000
|
heap
|
page read and write
|
||
726000
|
heap
|
page read and write
|
||
5DAD000
|
heap
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
5D6A000
|
heap
|
page read and write
|
||
2126000
|
direct allocation
|
page read and write
|
||
3141000
|
heap
|
page read and write
|
||
246C000
|
direct allocation
|
page read and write
|
||
2213000
|
direct allocation
|
page read and write
|
||
30A9000
|
heap
|
page read and write
|
||
3297000
|
direct allocation
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
5D72000
|
heap
|
page read and write
|
||
7B3A000
|
heap
|
page read and write
|
||
5D99000
|
heap
|
page read and write
|
||
5D4D000
|
heap
|
page read and write
|
||
2120000
|
direct allocation
|
page read and write
|
||
36DA000
|
direct allocation
|
page read and write
|
||
5AD0000
|
heap
|
page read and write
|
||
3141000
|
heap
|
page read and write
|
||
3188000
|
heap
|
page read and write
|
||
5D96000
|
heap
|
page read and write
|
||
3164000
|
heap
|
page read and write
|
||
2385000
|
direct allocation
|
page read and write
|
||
5DA0000
|
heap
|
page read and write
|
||
7B70000
|
heap
|
page read and write
|
||
317E000
|
heap
|
page read and write
|
||
5F73000
|
trusted library allocation
|
page read and write
|
||
4418000
|
direct allocation
|
page read and write
|
||
2F2C000
|
direct allocation
|
page read and write
|
||
3189000
|
heap
|
page read and write
|
||
32A5000
|
direct allocation
|
page read and write
|
||
2FFB000
|
direct allocation
|
page read and write
|
||
36DE000
|
direct allocation
|
page read and write
|
||
5DDD000
|
heap
|
page read and write
|
||
AAE000
|
stack
|
page read and write
|
||
21F3000
|
direct allocation
|
page read and write
|
||
6CC90000
|
unkown
|
page read and write
|
||
5D94000
|
heap
|
page read and write
|
||
7B58000
|
heap
|
page read and write
|
||
5DB4000
|
heap
|
page read and write
|
||
3269000
|
heap
|
page read and write
|
||
6CCC7000
|
unkown
|
page read and write
|
||
DF6000
|
heap
|
page read and write
|
||
5DDB000
|
heap
|
page read and write
|
||
E0D000
|
heap
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
6B771000
|
unkown
|
page execute read
|
||
6CC93000
|
unkown
|
page readonly
|
||
BD4000
|
heap
|
page read and write
|
||
5D45000
|
heap
|
page read and write
|
||
7B6C000
|
heap
|
page read and write
|
||
2F50000
|
direct allocation
|
page read and write
|
||
61E8A000
|
unkown
|
page read and write
|
||
23A2000
|
direct allocation
|
page read and write
|
||
61E01000
|
unkown
|
page execute read
|
||
E0D000
|
heap
|
page read and write
|
||
7B3B000
|
heap
|
page read and write
|
||
5D6E000
|
heap
|
page read and write
|
||
61E89000
|
unkown
|
page write copy
|
||
5D6E000
|
heap
|
page read and write
|
||
5DA1000
|
heap
|
page read and write
|
||
324D000
|
heap
|
page read and write
|
||
3176000
|
heap
|
page read and write
|
||
3168000
|
heap
|
page read and write
|
||
2E7A000
|
stack
|
page read and write
|
||
3178000
|
heap
|
page read and write
|
||
2350000
|
direct allocation
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
DFF000
|
heap
|
page read and write
|
||
3189000
|
heap
|
page read and write
|
||
2E21000
|
heap
|
page read and write
|
||
2138000
|
direct allocation
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
2E21000
|
heap
|
page read and write
|
||
5D83000
|
heap
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
446E000
|
direct allocation
|
page read and write
|
||
8C8000
|
unkown
|
page read and write
|
||
5D75000
|
heap
|
page read and write
|
||
6BB51000
|
unkown
|
page execute read
|
||
4514000
|
direct allocation
|
page read and write
|
||
21C2000
|
direct allocation
|
page read and write
|
||
E0D000
|
heap
|
page read and write
|
||
5D7E000
|
heap
|
page read and write
|
||
8C3000
|
unkown
|
page read and write
|
||
2E21000
|
heap
|
page read and write
|
||
4400000
|
direct allocation
|
page read and write
|
||
44C4000
|
direct allocation
|
page read and write
|
||
2E21000
|
heap
|
page read and write
|
||
4404000
|
direct allocation
|
page read and write
|
||
2481000
|
direct allocation
|
page read and write
|
||
5DD2000
|
heap
|
page read and write
|
||
5DD5000
|
heap
|
page read and write
|
||
5FD0000
|
trusted library allocation
|
page read and write
|
||
3141000
|
heap
|
page read and write
|
||
8FF000
|
stack
|
page read and write
|
||
44E0000
|
direct allocation
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
5F8000
|
heap
|
page read and write
|
||
5D72000
|
heap
|
page read and write
|
||
7B5A000
|
heap
|
page read and write
|
||
5AD0000
|
heap
|
page read and write
|
||
3141000
|
heap
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
5D98000
|
heap
|
page read and write
|
||
3337000
|
direct allocation
|
page read and write
|
||
63E0000
|
trusted library allocation
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
2E21000
|
heap
|
page read and write
|
||
92A000
|
unkown
|
page read and write
|
||
7B40000
|
heap
|
page read and write
|
||
5DC2000
|
heap
|
page read and write
|
||
2345000
|
heap
|
page read and write
|
||
5DD5000
|
heap
|
page read and write
|
||
219E000
|
direct allocation
|
page read and write
|
||
63E0000
|
trusted library allocation
|
page read and write
|
||
7B28000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
6FF000
|
heap
|
page read and write
|
||
7B49000
|
heap
|
page read and write
|
||
23B9000
|
direct allocation
|
page read and write
|
||
5DAE000
|
heap
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
E0D000
|
heap
|
page read and write
|
||
3089000
|
heap
|
page read and write
|
||
2E21000
|
heap
|
page read and write
|
||
5D75000
|
heap
|
page read and write
|
||
7BC000
|
heap
|
page read and write
|
||
608000
|
heap
|
page read and write
|
||
7B3D000
|
heap
|
page read and write
|
||
55E000
|
unkown
|
page readonly
|
||
3176000
|
heap
|
page read and write
|
||
317B000
|
heap
|
page read and write
|
||
3141000
|
heap
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
E2E000
|
heap
|
page read and write
|
||
5DDB000
|
heap
|
page read and write
|
||
23F4000
|
direct allocation
|
page read and write
|
||
E0D000
|
heap
|
page read and write
|
||
54D000
|
unkown
|
page read and write
|
||
36F6000
|
direct allocation
|
page read and write
|
||
551000
|
unkown
|
page read and write
|
||
5D4B000
|
heap
|
page read and write
|
||
3168000
|
heap
|
page read and write
|
||
25D3000
|
heap
|
page read and write
|
||
3140000
|
heap
|
page read and write
|
||
67E000
|
stack
|
page read and write
|
||
6C462000
|
unkown
|
page readonly
|
||
5DCA000
|
heap
|
page read and write
|
||
3FFE000
|
stack
|
page read and write
|
||
5D7A000
|
heap
|
page read and write
|
||
5DA9000
|
heap
|
page read and write
|
||
36FE000
|
direct allocation
|
page read and write
|
||
380E000
|
stack
|
page read and write
|
||
215C000
|
direct allocation
|
page read and write
|
||
315A000
|
heap
|
page read and write
|
||
5DAD000
|
heap
|
page read and write
|
||
DF6000
|
heap
|
page read and write
|
||
6010000
|
trusted library allocation
|
page read and write
|
||
5D7F000
|
heap
|
page read and write
|
||
102C000
|
stack
|
page read and write
|
||
5D4B000
|
heap
|
page read and write
|
||
2163000
|
direct allocation
|
page read and write
|
||
318D000
|
heap
|
page read and write
|
||
30C9000
|
heap
|
page read and write
|
||
5D45000
|
heap
|
page read and write
|
||
7B38000
|
heap
|
page read and write
|
||
7B56000
|
heap
|
page read and write
|
||
3183000
|
heap
|
page read and write
|
||
5DBD000
|
heap
|
page read and write
|
||
6CC80000
|
unkown
|
page readonly
|
||
5DAD000
|
heap
|
page read and write
|
||
937000
|
unkown
|
page read and write
|
||
36EB000
|
direct allocation
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
2415000
|
direct allocation
|
page read and write
|
||
36F2000
|
direct allocation
|
page read and write
|
||
5D31000
|
heap
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
6BC45000
|
unkown
|
page execute read
|
||
7FE000
|
stack
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
5DAE000
|
heap
|
page read and write
|
||
8E2000
|
unkown
|
page read and write
|
||
7B71000
|
heap
|
page read and write
|
||
70E000
|
heap
|
page read and write
|
||
6C1D7000
|
unkown
|
page read and write
|
||
6B63000
|
trusted library allocation
|
page read and write
|
||
3696000
|
direct allocation
|
page read and write
|
||
440C000
|
direct allocation
|
page read and write
|
||
36EE000
|
stack
|
page read and write
|
||
8EF000
|
stack
|
page read and write
|
||
5DAD000
|
heap
|
page read and write
|
||
6C4C3000
|
unkown
|
page read and write
|
||
6BBE0000
|
unkown
|
page readonly
|
||
3141000
|
heap
|
page read and write
|
||
2E10000
|
direct allocation
|
page read and write
|
||
7B80000
|
heap
|
page read and write
|
||
43FE000
|
stack
|
page read and write
|
||
49E0000
|
trusted library allocation
|
page read and write
|
||
D7E000
|
heap
|
page read and write
|
||
6E00000
|
trusted library allocation
|
page read and write
|
||
5D64000
|
heap
|
page read and write
|
||
60CD000
|
stack
|
page read and write
|
||
5DD4000
|
heap
|
page read and write
|
||
3176000
|
heap
|
page read and write
|
||
5D72000
|
heap
|
page read and write
|
||
23DB000
|
direct allocation
|
page read and write
|
||
E1B000
|
heap
|
page read and write
|
||
5DD1000
|
heap
|
page read and write
|
||
5D5D000
|
heap
|
page read and write
|
||
6C18E000
|
unkown
|
page readonly
|
||
390F000
|
stack
|
page read and write
|
||
5D6E000
|
heap
|
page read and write
|
||
5DB6000
|
heap
|
page read and write
|
||
72B000
|
heap
|
page read and write
|
||
5A1000
|
unkown
|
page readonly
|
||
3196000
|
heap
|
page read and write
|
||
6020000
|
trusted library allocation
|
page read and write
|
||
3689000
|
direct allocation
|
page read and write
|
||
5DAF000
|
heap
|
page read and write
|
||
3792000
|
direct allocation
|
page read and write
|
||
7B49000
|
heap
|
page read and write
|
||
5D96000
|
heap
|
page read and write
|
||
317E000
|
heap
|
page read and write
|
||
3271000
|
heap
|
page read and write
|
||
5D4D000
|
heap
|
page read and write
|
||
44E2000
|
direct allocation
|
page read and write
|
||
5DAD000
|
heap
|
page read and write
|
||
21EC000
|
direct allocation
|
page read and write
|
||
5D7A000
|
heap
|
page read and write
|
||
5DBE000
|
heap
|
page read and write
|
||
3151000
|
heap
|
page read and write
|
||
77D000
|
heap
|
page read and write
|
||
8D0000
|
unkown
|
page read and write
|
||
22D0000
|
direct allocation
|
page read and write
|
||
28E0000
|
heap
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
7001000
|
unkown
|
page execute and read and write
|
||
2230000
|
heap
|
page read and write
|
||
E28000
|
heap
|
page read and write
|
||
3198000
|
heap
|
page read and write
|
||
5CE8000
|
heap
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
21A8000
|
direct allocation
|
page read and write
|
||
2171000
|
direct allocation
|
page read and write
|
||
5D92000
|
heap
|
page read and write
|
||
3252000
|
heap
|
page read and write
|
||
3188000
|
heap
|
page read and write
|
||
5CF4000
|
heap
|
page read and write
|
||
5AB000
|
unkown
|
page readonly
|
||
5D9A000
|
heap
|
page read and write
|
||
5D6B000
|
heap
|
page read and write
|
||
2167000
|
direct allocation
|
page read and write
|
||
3700000
|
direct allocation
|
page read and write
|
||
6BE37000
|
unkown
|
page read and write
|
||
2221000
|
direct allocation
|
page read and write
|
||
5D31000
|
heap
|
page read and write
|
||
315B000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
241C000
|
direct allocation
|
page read and write
|
||
6430000
|
remote allocation
|
page read and write
|
||
DFC000
|
heap
|
page read and write
|
||
5D89000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
6B63000
|
trusted library allocation
|
page read and write
|
||
3183000
|
heap
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
5D6E000
|
heap
|
page read and write
|
||
5D4D000
|
heap
|
page read and write
|
||
5D9E000
|
heap
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
63DD000
|
stack
|
page read and write
|
||
6BBFE000
|
unkown
|
page execute read
|
||
2352000
|
direct allocation
|
page read and write
|
||
3198000
|
heap
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
5D88000
|
heap
|
page read and write
|
||
63E0000
|
trusted library allocation
|
page read and write
|
||
7B28000
|
heap
|
page read and write
|
||
3178000
|
heap
|
page read and write
|
||
48A4000
|
direct allocation
|
page read and write
|
||
5DC5000
|
heap
|
page read and write
|
||
341E000
|
stack
|
page read and write
|
||
37B9000
|
direct allocation
|
page read and write
|
||
5D5D000
|
heap
|
page read and write
|
||
6C4C7000
|
unkown
|
page readonly
|
||
36E6000
|
direct allocation
|
page read and write
|
||
3141000
|
heap
|
page read and write
|
||
3168000
|
heap
|
page read and write
|
||
5DC1000
|
heap
|
page read and write
|
||
214D000
|
direct allocation
|
page read and write
|
||
DC7000
|
heap
|
page read and write
|
||
5DAD000
|
heap
|
page read and write
|
||
8BB000
|
unkown
|
page read and write
|
||
5F72000
|
trusted library allocation
|
page read and write
|
||
3694000
|
direct allocation
|
page read and write
|
||
E03000
|
heap
|
page read and write
|
||
5D68000
|
heap
|
page read and write
|
||
2456000
|
direct allocation
|
page read and write
|
||
3189000
|
heap
|
page read and write
|
||
5DB9000
|
heap
|
page read and write
|
||
711000
|
heap
|
page read and write
|
||
7B2F000
|
heap
|
page read and write
|
||
5D6E000
|
heap
|
page read and write
|
||
23D5000
|
direct allocation
|
page read and write
|
||
5CE9000
|
heap
|
page read and write
|
||
36EA000
|
direct allocation
|
page read and write
|
||
6BC2F000
|
unkown
|
page execute read
|
||
23CC000
|
direct allocation
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
237E000
|
direct allocation
|
page read and write
|
||
5DA5000
|
heap
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
3702000
|
direct allocation
|
page read and write
|
||
2D0E000
|
stack
|
page read and write
|
||
5ACF000
|
heap
|
page read and write
|
||
3389000
|
direct allocation
|
page read and write
|
||
DFE000
|
heap
|
page read and write
|
||
218E000
|
direct allocation
|
page read and write
|
||
3234000
|
direct allocation
|
page read and write
|
||
36A0000
|
direct allocation
|
page read and write
|
||
8D3000
|
unkown
|
page read and write
|
||
2E21000
|
heap
|
page read and write
|
||
6CC0000
|
trusted library allocation
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
7002000
|
unkown
|
page execute and read and write
|
||
3164000
|
heap
|
page read and write
|
||
5DBE000
|
heap
|
page read and write
|
||
48AA000
|
direct allocation
|
page read and write
|
||
3164000
|
heap
|
page read and write
|
||
8E2000
|
unkown
|
page read and write
|
||
7B64000
|
heap
|
page read and write
|
||
5DBF000
|
heap
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
5DA9000
|
heap
|
page read and write
|
||
6923000
|
trusted library allocation
|
page read and write
|
||
7B78000
|
heap
|
page read and write
|
||
242A000
|
direct allocation
|
page read and write
|
||
21E4000
|
direct allocation
|
page read and write
|
||
315B000
|
heap
|
page read and write
|
||
E24000
|
heap
|
page read and write
|
||
3728000
|
direct allocation
|
page read and write
|
||
5DB1000
|
heap
|
page read and write
|
||
3721000
|
direct allocation
|
page read and write
|
||
3290000
|
direct allocation
|
page read and write
|
||
5DAE000
|
heap
|
page read and write
|
||
7B84000
|
heap
|
page read and write
|
||
5DDC000
|
heap
|
page read and write
|
||
2228000
|
direct allocation
|
page read and write
|
||
36E4000
|
direct allocation
|
page read and write
|
||
5D98000
|
heap
|
page read and write
|
||
63E0000
|
trusted library allocation
|
page read and write
|
||
3168000
|
heap
|
page read and write
|
||
2310000
|
direct allocation
|
page read and write
|
||
5D9F000
|
heap
|
page read and write
|
||
21EF000
|
direct allocation
|
page read and write
|
||
44CA000
|
direct allocation
|
page read and write
|
||
377C000
|
direct allocation
|
page read and write
|
||
3195000
|
heap
|
page read and write
|
||
2E21000
|
heap
|
page read and write
|
||
3164000
|
heap
|
page read and write
|
||
2423000
|
direct allocation
|
page read and write
|
||
E03000
|
heap
|
page read and write
|
||
318C000
|
heap
|
page read and write
|
||
5DAD000
|
heap
|
page read and write
|
||
3194000
|
heap
|
page read and write
|
||
6C1DE000
|
unkown
|
page read and write
|
||
8E2000
|
unkown
|
page read and write
|
||
3249000
|
direct allocation
|
page read and write
|
||
6CF16000
|
unkown
|
page read and write
|
||
365F000
|
stack
|
page read and write
|
||
63E0000
|
trusted library allocation
|
page read and write
|
||
2F41000
|
direct allocation
|
page read and write
|
||
2E21000
|
heap
|
page read and write
|
||
2439000
|
direct allocation
|
page read and write
|
||
6B63000
|
trusted library allocation
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
5DBC000
|
heap
|
page read and write
|
||
318C000
|
heap
|
page read and write
|
||
7BA0000
|
heap
|
page read and write
|
||
3168000
|
heap
|
page read and write
|
||
620E000
|
stack
|
page read and write
|
||
5DB9000
|
heap
|
page read and write
|
||
7B86000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
7B4A000
|
heap
|
page read and write
|
||
5CF8000
|
heap
|
page read and write
|
||
33D0000
|
heap
|
page read and write
|
||
2393000
|
direct allocation
|
page read and write
|
||
6BDF2000
|
unkown
|
page readonly
|
||
3048000
|
direct allocation
|
page read and write
|
||
5D9E000
|
heap
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
5D83000
|
heap
|
page read and write
|
||
5DC1000
|
heap
|
page read and write
|
||
5DDC000
|
heap
|
page read and write
|
||
DC8000
|
heap
|
page read and write
|
||
5D87000
|
heap
|
page read and write
|
||
6A00000
|
trusted library allocation
|
page read and write
|
||
315B000
|
heap
|
page read and write
|
||
5DDA000
|
heap
|
page read and write
|
||
29A5000
|
heap
|
page read and write
|
||
5D69000
|
heap
|
page read and write
|
||
5D52000
|
heap
|
page read and write
|
||
5AD0000
|
heap
|
page read and write
|
||
315B000
|
heap
|
page read and write
|
||
713000
|
heap
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
3183000
|
heap
|
page read and write
|
||
317E000
|
heap
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
5F72000
|
trusted library allocation
|
page read and write
|
||
36B6000
|
direct allocation
|
page read and write
|
||
7B2C000
|
heap
|
page read and write
|
||
5DC8000
|
heap
|
page read and write
|
||
4436000
|
direct allocation
|
page read and write
|
||
36E8000
|
direct allocation
|
page read and write
|
||
23FB000
|
direct allocation
|
page read and write
|
||
302E000
|
stack
|
page read and write
|
||
3141000
|
heap
|
page read and write
|
||
3196000
|
heap
|
page read and write
|
||
7FE00000
|
direct allocation
|
page read and write
|
||
630F000
|
stack
|
page read and write
|
||
5F73000
|
trusted library allocation
|
page read and write
|
||
3374000
|
direct allocation
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
54D000
|
unkown
|
page read and write
|
||
2100000
|
direct allocation
|
page read and write
|
||
77D000
|
heap
|
page read and write
|
||
3176000
|
heap
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
5D9F000
|
heap
|
page read and write
|
||
464C000
|
stack
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
5DC4000
|
heap
|
page read and write
|
||
3194000
|
heap
|
page read and write
|
||
6900000
|
trusted library allocation
|
page read and write
|
||
5D6E000
|
heap
|
page read and write
|
||
6BB50000
|
unkown
|
page readonly
|
||
5DCB000
|
heap
|
page read and write
|
||
36A2000
|
direct allocation
|
page read and write
|
||
2FC2000
|
heap
|
page read and write
|
||
3678000
|
direct allocation
|
page read and write
|
||
5D34000
|
heap
|
page read and write
|
||
3A6D000
|
stack
|
page read and write
|
||
923000
|
unkown
|
page read and write
|
||
5DDB000
|
heap
|
page read and write
|
||
5D8D000
|
heap
|
page read and write
|
||
6430000
|
remote allocation
|
page read and write
|
||
3365000
|
direct allocation
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
5D0A000
|
heap
|
page read and write
|
||
3191000
|
heap
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
3669000
|
direct allocation
|
page read and write
|
||
7B21000
|
heap
|
page read and write
|
||
103F000
|
stack
|
page read and write
|
||
3168000
|
heap
|
page read and write
|
||
5D87000
|
heap
|
page read and write
|
||
322C000
|
direct allocation
|
page read and write
|
||
316E000
|
heap
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
5F90000
|
trusted library allocation
|
page read and write
|
||
5D7B000
|
heap
|
page read and write
|
||
2F08000
|
direct allocation
|
page read and write
|
||
551000
|
unkown
|
page read and write
|
||
5DBD000
|
heap
|
page read and write
|
||
33AA000
|
direct allocation
|
page read and write
|
||
E19000
|
heap
|
page read and write
|
||
36AC000
|
direct allocation
|
page read and write
|
||
44D6000
|
direct allocation
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
DFC000
|
heap
|
page read and write
|
||
5AD0000
|
heap
|
page read and write
|
||
5DCA000
|
heap
|
page read and write
|
||
36D0000
|
direct allocation
|
page read and write
|
||
5F64000
|
trusted library allocation
|
page read and write
|
||
5D96000
|
heap
|
page read and write
|
||
2431000
|
direct allocation
|
page read and write
|
||
5DAE000
|
heap
|
page read and write
|
||
3198000
|
heap
|
page read and write
|
||
6B7F4000
|
unkown
|
page readonly
|
||
5DB6000
|
heap
|
page read and write
|
||
2905000
|
heap
|
page read and write
|
||
29A0000
|
heap
|
page read and write
|
||
30C9000
|
heap
|
page read and write
|
||
22F0000
|
heap
|
page read and write
|
||
3180000
|
heap
|
page read and write
|
||
6BBCC000
|
unkown
|
page readonly
|
||
2E20000
|
trusted library allocation
|
page read and write
|
||
738000
|
heap
|
page read and write
|
||
339A000
|
direct allocation
|
page read and write
|
||
6BDA7000
|
unkown
|
page readonly
|
||
440A000
|
direct allocation
|
page read and write
|
||
B8B000
|
unkown
|
page readonly
|
||
3164000
|
heap
|
page read and write
|
||
5DBD000
|
heap
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
371D000
|
direct allocation
|
page read and write
|
||
3164000
|
heap
|
page read and write
|
||
72F000
|
heap
|
page read and write
|
||
5D72000
|
heap
|
page read and write
|
||
2335000
|
direct allocation
|
page read and write
|
||
3164000
|
heap
|
page read and write
|
||
371B000
|
direct allocation
|
page read and write
|
||
347E000
|
stack
|
page read and write
|
||
3141000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
7B6A000
|
heap
|
page read and write
|
||
2361000
|
direct allocation
|
page read and write
|
||
5DDD000
|
heap
|
page read and write
|
||
5DBE000
|
heap
|
page read and write
|
||
21F6000
|
direct allocation
|
page read and write
|
||
34E0000
|
heap
|
page read and write
|
||
6DE1000
|
trusted library allocation
|
page read and write
|
||
317E000
|
heap
|
page read and write
|
||
2135000
|
direct allocation
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
6C2B7000
|
unkown
|
page execute read
|
||
3141000
|
heap
|
page read and write
|
||
3168000
|
heap
|
page read and write
|
||
445E000
|
direct allocation
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
2553000
|
direct allocation
|
page read and write
|
||
4408000
|
direct allocation
|
page read and write
|
||
5D8A000
|
heap
|
page read and write
|
||
245D000
|
direct allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
3002000
|
direct allocation
|
page read and write
|
||
3018000
|
direct allocation
|
page read and write
|
||
6050000
|
trusted library allocation
|
page read and write
|
||
8C8000
|
unkown
|
page read and write
|
||
36E2000
|
direct allocation
|
page read and write
|
||
5D5D000
|
heap
|
page read and write
|
||
5F73000
|
trusted library allocation
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
3089000
|
heap
|
page read and write
|
||
244F000
|
direct allocation
|
page read and write
|
||
212D000
|
direct allocation
|
page read and write
|
||
3343000
|
direct allocation
|
page read and write
|
||
6B770000
|
unkown
|
page readonly
|
||
5D7A000
|
heap
|
page read and write
|
||
317E000
|
heap
|
page read and write
|
||
7B40000
|
heap
|
page read and write
|
||
7B60000
|
heap
|
page read and write
|
||
44D4000
|
direct allocation
|
page read and write
|
||
2E21000
|
heap
|
page read and write
|
||
3183000
|
heap
|
page read and write
|
||
3783000
|
direct allocation
|
page read and write
|
||
315B000
|
heap
|
page read and write
|
||
5D72000
|
heap
|
page read and write
|
||
220C000
|
direct allocation
|
page read and write
|
||
5D6E000
|
heap
|
page read and write
|
||
5F6F000
|
trusted library allocation
|
page read and write
|
||
3164000
|
heap
|
page read and write
|
||
32A9000
|
direct allocation
|
page read and write
|
||
2E21000
|
heap
|
page read and write
|
||
44CC000
|
direct allocation
|
page read and write
|
||
5D6E000
|
heap
|
page read and write
|
||
23D4000
|
direct allocation
|
page read and write
|
||
5CF6000
|
heap
|
page read and write
|
||
5DC5000
|
heap
|
page read and write
|
||
5DC9000
|
heap
|
page read and write
|
||
3009000
|
direct allocation
|
page read and write
|
||
3189000
|
heap
|
page read and write
|
||
D48000
|
heap
|
page read and write
|
||
5DB5000
|
heap
|
page read and write
|
||
6C1F0000
|
unkown
|
page readonly
|
||
3209000
|
direct allocation
|
page read and write
|
||
5DCC000
|
heap
|
page read and write
|
||
7B5C000
|
heap
|
page read and write
|
||
DF6000
|
heap
|
page read and write
|
||
5D98000
|
heap
|
page read and write
|
||
5DD1000
|
heap
|
page read and write
|
||
5DBD000
|
heap
|
page read and write
|
||
DF3000
|
heap
|
page read and write
|
||
3056000
|
direct allocation
|
page read and write
|
||
304F000
|
direct allocation
|
page read and write
|
||
465000
|
unkown
|
page readonly
|
||
5ACD000
|
heap
|
page read and write
|
||
E21000
|
heap
|
page read and write
|
||
5D4B000
|
heap
|
page read and write
|
||
3141000
|
heap
|
page read and write
|
||
32AB000
|
direct allocation
|
page read and write
|
||
5D5E000
|
heap
|
page read and write
|
||
3164000
|
heap
|
page read and write
|
||
44C6000
|
direct allocation
|
page read and write
|
||
6DDB000
|
trusted library allocation
|
page read and write
|
||
E2E000
|
heap
|
page read and write
|
||
4416000
|
direct allocation
|
page read and write
|
||
5D67000
|
heap
|
page read and write
|
||
5DB4000
|
heap
|
page read and write
|
||
2E21000
|
heap
|
page read and write
|
||
5DDC000
|
heap
|
page read and write
|
||
5DBD000
|
heap
|
page read and write
|
||
3719000
|
direct allocation
|
page read and write
|
||
3704000
|
direct allocation
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
2151000
|
direct allocation
|
page read and write
|
||
36FA000
|
direct allocation
|
page read and write
|
||
2110000
|
direct allocation
|
page read and write
|
||
7B41000
|
heap
|
page read and write
|
||
5CE4000
|
heap
|
page read and write
|
||
926000
|
unkown
|
page read and write
|
||
36C6000
|
direct allocation
|
page read and write
|
||
5D6C000
|
heap
|
page read and write
|
||
5DA7000
|
heap
|
page read and write
|
||
3141000
|
heap
|
page read and write
|
||
5DB9000
|
heap
|
page read and write
|
||
6CCC9000
|
unkown
|
page readonly
|
||
BD4000
|
heap
|
page read and write
|
||
30C9000
|
heap
|
page read and write
|
||
3040000
|
direct allocation
|
page read and write
|
||
5D6B000
|
heap
|
page read and write
|
||
421000
|
unkown
|
page readonly
|
||
2E21000
|
heap
|
page read and write
|
||
3168000
|
heap
|
page read and write
|
||
2349000
|
heap
|
page read and write
|
||
302B000
|
direct allocation
|
page read and write
|
||
23FF000
|
direct allocation
|
page read and write
|
||
2146000
|
direct allocation
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
36A4000
|
direct allocation
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
DFC000
|
heap
|
page read and write
|
||
21C0000
|
direct allocation
|
page read and write
|
||
3141000
|
heap
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
5DA5000
|
heap
|
page read and write
|
||
3225000
|
direct allocation
|
page read and write
|
||
30C9000
|
heap
|
page read and write
|
||
63E0000
|
trusted library allocation
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
474F000
|
stack
|
page read and write
|
||
63E0000
|
trusted library allocation
|
page read and write
|
||
451B000
|
direct allocation
|
page read and write
|
||
247A000
|
direct allocation
|
page read and write
|
||
374B000
|
direct allocation
|
page read and write
|
||
5D90000
|
heap
|
page read and write
|
||
5D6E000
|
heap
|
page read and write
|
||
99000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
5D6E000
|
heap
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
DF2000
|
heap
|
page read and write
|
||
32CC000
|
direct allocation
|
page read and write
|
||
318C000
|
heap
|
page read and write
|
||
7B58000
|
heap
|
page read and write
|
||
18D000
|
stack
|
page read and write
|
||
7B70000
|
heap
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
3C30000
|
trusted library allocation
|
page read and write
|
||
5D6E000
|
heap
|
page read and write
|
||
5D7A000
|
heap
|
page read and write
|
||
218C000
|
direct allocation
|
page read and write
|
||
44F6000
|
direct allocation
|
page read and write
|
||
3183000
|
heap
|
page read and write
|
||
2159000
|
direct allocation
|
page read and write
|
||
729000
|
heap
|
page read and write
|
||
7B78000
|
heap
|
page read and write
|
||
21A5000
|
direct allocation
|
page read and write
|
||
5DDD000
|
heap
|
page read and write
|
||
6C041000
|
unkown
|
page execute read
|
||
37A8000
|
direct allocation
|
page read and write
|
||
5DA5000
|
heap
|
page read and write
|
||
5DCF000
|
heap
|
page read and write
|
||
4B40000
|
heap
|
page read and write
|
||
3347000
|
direct allocation
|
page read and write
|
||
30C9000
|
heap
|
page read and write
|
||
239C000
|
direct allocation
|
page read and write
|
||
8BB000
|
unkown
|
page read and write
|
||
6CC81000
|
unkown
|
page execute read
|
||
3010000
|
direct allocation
|
page read and write
|
||
36B4000
|
direct allocation
|
page read and write
|
||
5DB0000
|
heap
|
page read and write
|
||
5D72000
|
heap
|
page read and write
|
||
2EEB000
|
direct allocation
|
page read and write
|
||
5D9E000
|
heap
|
page read and write
|
||
217E000
|
direct allocation
|
page read and write
|
||
5D83000
|
heap
|
page read and write
|
||
5D62000
|
heap
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
E25000
|
heap
|
page read and write
|
||
5DC3000
|
heap
|
page read and write
|
||
3141000
|
heap
|
page read and write
|
||
5D76000
|
heap
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
30A7000
|
heap
|
page read and write
|
||
5D60000
|
heap
|
page read and write
|
||
325D000
|
heap
|
page read and write
|
||
7B24000
|
heap
|
page read and write
|
||
5DA3000
|
heap
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
3194000
|
heap
|
page read and write
|
||
3272000
|
heap
|
page read and write
|
||
5DD3000
|
heap
|
page read and write
|
||
5D77000
|
heap
|
page read and write
|
||
5D4C000
|
heap
|
page read and write
|
||
701000
|
heap
|
page read and write
|
||
23EC000
|
direct allocation
|
page read and write
|
||
3183000
|
heap
|
page read and write
|
||
42FC000
|
stack
|
page read and write
|
||
304A000
|
direct allocation
|
page read and write
|
||
2180000
|
direct allocation
|
page read and write
|
||
5DC5000
|
heap
|
page read and write
|
||
5DA1000
|
heap
|
page read and write
|
||
3698000
|
direct allocation
|
page read and write
|
||
3141000
|
heap
|
page read and write
|
||
3141000
|
heap
|
page read and write
|
||
6BBED000
|
unkown
|
page execute read
|
||
942000
|
unkown
|
page readonly
|
||
2E21000
|
heap
|
page read and write
|
||
7B70000
|
heap
|
page read and write
|
||
44C2000
|
direct allocation
|
page read and write
|
||
301C000
|
direct allocation
|
page read and write
|
||
3175000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
44DE000
|
direct allocation
|
page read and write
|
||
6A00000
|
trusted library allocation
|
page read and write
|
||
36C0000
|
direct allocation
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
7B5F000
|
heap
|
page read and write
|
||
3198000
|
heap
|
page read and write
|
||
36FC000
|
direct allocation
|
page read and write
|
||
5DCF000
|
heap
|
page read and write
|
||
5D6B000
|
heap
|
page read and write
|
||
5DD3000
|
heap
|
page read and write
|
||
5F71000
|
trusted library allocation
|
page read and write
|
||
2E21000
|
heap
|
page read and write
|
||
336C000
|
direct allocation
|
page read and write
|
||
36CC000
|
direct allocation
|
page read and write
|
||
6010000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
2F0F000
|
direct allocation
|
page read and write
|
||
404E000
|
stack
|
page read and write
|
||
3189000
|
heap
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
3141000
|
heap
|
page read and write
|
||
E2E000
|
heap
|
page read and write
|
||
5DBD000
|
heap
|
page read and write
|
||
6CEF3000
|
unkown
|
page readonly
|
||
3180000
|
heap
|
page read and write
|
||
46A000
|
unkown
|
page readonly
|
||
3775000
|
direct allocation
|
page read and write
|
||
5DBB000
|
heap
|
page read and write
|
||
2438000
|
direct allocation
|
page read and write
|
||
2A50000
|
trusted library allocation
|
page read and write
|
||
2E56000
|
heap
|
page read and write
|
||
FBE000
|
stack
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
36B6000
|
direct allocation
|
page read and write
|
||
315B000
|
heap
|
page read and write
|
||
E19000
|
heap
|
page read and write
|
||
5DB2000
|
heap
|
page read and write
|
||
216E000
|
direct allocation
|
page read and write
|
||
2F1D000
|
direct allocation
|
page read and write
|
||
5DDB000
|
heap
|
page read and write
|
||
3D70000
|
trusted library allocation
|
page read and write
|
||
6C1E0000
|
unkown
|
page readonly
|
||
2E10000
|
direct allocation
|
page read and write
|
||
2EE3000
|
direct allocation
|
page read and write
|
||
3191000
|
heap
|
page read and write
|
||
2FC5000
|
direct allocation
|
page read and write
|
||
67F5000
|
stack
|
page read and write
|
||
3176000
|
heap
|
page read and write
|
||
240D000
|
direct allocation
|
page read and write
|
||
6BBC8000
|
unkown
|
page write copy
|
||
7B91000
|
heap
|
page read and write
|
||
2549000
|
direct allocation
|
page read and write
|
||
5D69000
|
heap
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
5DC5000
|
heap
|
page read and write
|
||
44B9000
|
direct allocation
|
page read and write
|
||
3164000
|
heap
|
page read and write
|
||
7008000
|
unkown
|
page readonly
|
||
E19000
|
heap
|
page read and write
|
||
2406000
|
direct allocation
|
page read and write
|
||
3090000
|
trusted library allocation
|
page read and write
|
||
3168000
|
heap
|
page read and write
|
||
5D72000
|
heap
|
page read and write
|
||
7B54000
|
heap
|
page read and write
|
||
3183000
|
heap
|
page read and write
|
||
6BBE000
|
stack
|
page read and write
|
||
6FB000
|
heap
|
page read and write
|
||
5D7A000
|
heap
|
page read and write
|
||
5DD3000
|
heap
|
page read and write
|
||
5D61000
|
heap
|
page read and write
|
||
7FDDB000
|
direct allocation
|
page read and write
|
||
37EF000
|
stack
|
page read and write
|
||
33B9000
|
direct allocation
|
page read and write
|
||
3168000
|
heap
|
page read and write
|
||
5DBE000
|
heap
|
page read and write
|
||
2464000
|
direct allocation
|
page read and write
|
||
3185000
|
heap
|
page read and write
|
||
30B7000
|
heap
|
page read and write
|
||
44E4000
|
direct allocation
|
page read and write
|
||
E0A000
|
heap
|
page read and write
|
||
21CF000
|
direct allocation
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
2385000
|
direct allocation
|
page read and write
|
||
5D84000
|
heap
|
page read and write
|
||
2F20000
|
direct allocation
|
page read and write
|
||
3198000
|
heap
|
page read and write
|
||
6403000
|
trusted library allocation
|
page read and write
|
||
7B2F000
|
heap
|
page read and write
|
||
36C2000
|
direct allocation
|
page read and write
|
||
7000000
|
unkown
|
page readonly
|
||
394E000
|
stack
|
page read and write
|
||
315B000
|
heap
|
page read and write
|
||
36A6000
|
direct allocation
|
page read and write
|
||
3184000
|
heap
|
page read and write
|
||
7B5A000
|
heap
|
page read and write
|
||
32A2000
|
heap
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
23C0000
|
direct allocation
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
3198000
|
heap
|
page read and write
|
||
3168000
|
heap
|
page read and write
|
||
442F000
|
direct allocation
|
page read and write
|
||
5D96000
|
heap
|
page read and write
|
||
5DAD000
|
heap
|
page read and write
|
||
E16000
|
heap
|
page read and write
|
||
5F72000
|
trusted library allocation
|
page read and write
|
||
6900000
|
trusted library allocation
|
page read and write
|
||
3168000
|
heap
|
page read and write
|
||
6CCA0000
|
unkown
|
page readonly
|
||
7BF000
|
stack
|
page read and write
|
||
21B4000
|
direct allocation
|
page read and write
|
||
5D64000
|
heap
|
page read and write
|
||
7B38000
|
heap
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
5DD1000
|
heap
|
page read and write
|
||
318C000
|
heap
|
page read and write
|
||
3089000
|
heap
|
page read and write
|
||
6800000
|
heap
|
page read and write
|
||
7B35000
|
heap
|
page read and write
|
||
318C000
|
heap
|
page read and write
|
||
7FE35000
|
direct allocation
|
page read and write
|
||
3133000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
3662000
|
direct allocation
|
page read and write
|
||
5DC6000
|
heap
|
page read and write
|
||
64D000
|
heap
|
page read and write
|
||
2E21000
|
heap
|
page read and write
|
||
63E0000
|
trusted library allocation
|
page read and write
|
||
317E000
|
heap
|
page read and write
|
||
E0D000
|
heap
|
page read and write
|
||
7BB2000
|
heap
|
page read and write
|
||
7B74000
|
heap
|
page read and write
|
||
728000
|
heap
|
page read and write
|
||
E0D000
|
heap
|
page read and write
|
||
66A000
|
heap
|
page read and write
|
||
5DBF000
|
heap
|
page read and write
|
||
5D7B000
|
heap
|
page read and write
|
||
63E0000
|
trusted library allocation
|
page read and write
|
||
106D000
|
stack
|
page read and write
|
||
392F000
|
stack
|
page read and write
|
||
3219000
|
direct allocation
|
page read and write
|
||
6C4C1000
|
unkown
|
page write copy
|
||
3690000
|
direct allocation
|
page read and write
|
||
7B39000
|
heap
|
page read and write
|
||
5DC5000
|
heap
|
page read and write
|
||
3692000
|
direct allocation
|
page read and write
|
||
6980000
|
trusted library allocation
|
page read and write
|
||
364C000
|
direct allocation
|
page read and write
|
||
5D6E000
|
heap
|
page read and write
|
||
E28000
|
heap
|
page read and write
|
||
5D65000
|
heap
|
page read and write
|
||
5D96000
|
heap
|
page read and write
|
||
2300000
|
direct allocation
|
page read and write
|
||
3164000
|
heap
|
page read and write
|
||
31F7000
|
direct allocation
|
page read and write
|
||
5DA1000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
6C2CF000
|
unkown
|
page execute read
|
||
7C6000
|
heap
|
page read and write
|
||
36DE000
|
stack
|
page read and write
|
||
5DD2000
|
heap
|
page read and write
|
||
317E000
|
heap
|
page read and write
|
||
5D6E000
|
heap
|
page read and write
|
||
E09000
|
heap
|
page read and write
|
||
3768000
|
direct allocation
|
page read and write
|
||
5DD9000
|
heap
|
page read and write
|
||
7B4A000
|
heap
|
page read and write
|
||
5DD1000
|
heap
|
page read and write
|
||
5DC7000
|
heap
|
page read and write
|
||
6BBE1000
|
unkown
|
page execute read
|
||
3164000
|
heap
|
page read and write
|
||
440E000
|
direct allocation
|
page read and write
|
||
5D5E000
|
heap
|
page read and write
|
||
23C5000
|
direct allocation
|
page read and write
|
||
3032000
|
direct allocation
|
page read and write
|
||
3168000
|
heap
|
page read and write
|
||
3193000
|
heap
|
page read and write
|
||
8BB000
|
unkown
|
page write copy
|
||
2432000
|
direct allocation
|
page read and write
|
||
3A4D000
|
stack
|
page read and write
|
||
C2C000
|
stack
|
page read and write
|
||
F3F000
|
stack
|
page read and write
|
||
355E000
|
stack
|
page read and write
|
||
396C000
|
stack
|
page read and write
|
||
9C90000
|
heap
|
page read and write
|
||
33C9000
|
direct allocation
|
page read and write
|
||
3653000
|
direct allocation
|
page read and write
|
||
5DC3000
|
heap
|
page read and write
|
||
8CA000
|
unkown
|
page read and write
|
||
5D65000
|
heap
|
page read and write
|
||
2185000
|
direct allocation
|
page read and write
|
||
3070000
|
heap
|
page read and write
|
||
318C000
|
heap
|
page read and write
|
||
5F66000
|
trusted library allocation
|
page read and write
|
||
317B000
|
heap
|
page read and write
|
||
6C4C0000
|
unkown
|
page read and write
|
||
5DDC000
|
heap
|
page read and write
|
||
5D31000
|
heap
|
page read and write
|
||
315B000
|
heap
|
page read and write
|
||
54D000
|
unkown
|
page write copy
|
||
5D60000
|
heap
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
36AE000
|
stack
|
page read and write
|
||
3708000
|
direct allocation
|
page read and write
|
||
77D000
|
heap
|
page read and write
|
||
318A000
|
heap
|
page read and write
|
||
9BC000
|
unkown
|
page readonly
|
||
35AE000
|
stack
|
page read and write
|
||
3089000
|
heap
|
page read and write
|
||
6B7F1000
|
unkown
|
page read and write
|
||
95000
|
stack
|
page read and write
|
||
21AF000
|
direct allocation
|
page read and write
|
||
2E21000
|
heap
|
page read and write
|
||
61E00000
|
unkown
|
page readonly
|
||
710A000
|
direct allocation
|
page read and write
|
||
7FE3F000
|
direct allocation
|
page read and write
|
||
5DBD000
|
heap
|
page read and write
|
||
369C000
|
direct allocation
|
page read and write
|
||
E03000
|
heap
|
page read and write
|
||
5DB2000
|
heap
|
page read and write
|
||
5DD6000
|
heap
|
page read and write
|
||
3183000
|
heap
|
page read and write
|
||
61EA0000
|
unkown
|
page write copy
|
||
7B38000
|
heap
|
page read and write
|
||
604C000
|
stack
|
page read and write
|
||
726000
|
heap
|
page read and write
|
||
36C6000
|
direct allocation
|
page read and write
|
||
DF2000
|
heap
|
page read and write
|
||
3273000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
7B74000
|
heap
|
page read and write
|
||
33AA000
|
direct allocation
|
page read and write
|
||
235A000
|
direct allocation
|
page read and write
|
||
7007000
|
unkown
|
page write copy
|
||
5D8D000
|
heap
|
page read and write
|
||
5FB0000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7B68000
|
heap
|
page read and write
|
||
5DBE000
|
heap
|
page read and write
|
||
5DCD000
|
heap
|
page read and write
|
||
7006000
|
unkown
|
page read and write
|
||
3194000
|
heap
|
page read and write
|
||
36F2000
|
direct allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
219B000
|
direct allocation
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
5DCA000
|
heap
|
page read and write
|
||
36D4000
|
direct allocation
|
page read and write
|
||
6BE10000
|
unkown
|
page readonly
|
||
36E3000
|
direct allocation
|
page read and write
|
||
7004000
|
unkown
|
page execute and write copy
|
||
3089000
|
heap
|
page read and write
|
||
93A000
|
unkown
|
page read and write
|
||
3729000
|
direct allocation
|
page read and write
|
||
5D18000
|
heap
|
page read and write
|
||
3089000
|
heap
|
page read and write
|
||
7BC000
|
heap
|
page read and write
|
||
3089000
|
heap
|
page read and write
|
||
5DA3000
|
heap
|
page read and write
|
||
70B000
|
heap
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
5DC7000
|
heap
|
page read and write
|
||
6802000
|
heap
|
page read and write
|
||
2343000
|
direct allocation
|
page read and write
|
||
5D64000
|
heap
|
page read and write
|
||
59C0000
|
direct allocation
|
page read and write
|
||
3183000
|
heap
|
page read and write
|
||
6921000
|
trusted library allocation
|
page read and write
|
||
32D4000
|
direct allocation
|
page read and write
|
||
8BF000
|
unkown
|
page read and write
|
||
5D67000
|
heap
|
page read and write
|
||
2E21000
|
heap
|
page read and write
|
||
5DB0000
|
heap
|
page read and write
|
||
5DB3000
|
heap
|
page read and write
|
||
E1E000
|
heap
|
page read and write
|
||
555000
|
unkown
|
page read and write
|
||
6050000
|
trusted library allocation
|
page read and write
|
||
3164000
|
heap
|
page read and write
|
||
48A2000
|
direct allocation
|
page read and write
|
||
5D87000
|
heap
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
DF6000
|
heap
|
page read and write
|
||
5A90000
|
heap
|
page read and write
|
||
41E000
|
unkown
|
page write copy
|
||
32DB000
|
direct allocation
|
page read and write
|
||
214A000
|
direct allocation
|
page read and write
|
||
71E000
|
heap
|
page read and write
|
||
3185000
|
heap
|
page read and write
|
||
5DD0000
|
heap
|
page read and write
|
||
7B41000
|
heap
|
page read and write
|
||
318C000
|
heap
|
page read and write
|
||
3349000
|
direct allocation
|
page read and write
|
||
5DBD000
|
heap
|
page read and write
|
||
7BA0000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page readonly
|
||
23DB000
|
direct allocation
|
page read and write
|
||
3023000
|
direct allocation
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
69FD000
|
stack
|
page read and write
|
||
3250000
|
direct allocation
|
page read and write
|
||
5D90000
|
heap
|
page read and write
|
||
5D68000
|
heap
|
page read and write
|
||
6900000
|
trusted library allocation
|
page read and write
|
||
E19000
|
heap
|
page read and write
|
||
7B50000
|
heap
|
page read and write
|
||
5CE1000
|
heap
|
page read and write
|
||
7B21000
|
heap
|
page read and write
|
||
2F50000
|
direct allocation
|
page execute and read and write
|
||
3141000
|
heap
|
page read and write
|
||
3168000
|
heap
|
page read and write
|
||
5DAC000
|
heap
|
page read and write
|
||
2A60000
|
trusted library allocation
|
page read and write
|
||
3198000
|
heap
|
page read and write
|
||
3026000
|
direct allocation
|
page read and write
|
||
939000
|
unkown
|
page write copy
|
||
3636000
|
direct allocation
|
page read and write
|
||
5F90000
|
trusted library allocation
|
page read and write
|
||
7B3D000
|
heap
|
page read and write
|
||
8BB000
|
unkown
|
page read and write
|
||
BC3000
|
trusted library allocation
|
page read and write
|
||
61E8A000
|
unkown
|
page read and write
|
||
8D7000
|
unkown
|
page read and write
|
||
3186000
|
heap
|
page read and write
|
||
23B1000
|
direct allocation
|
page read and write
|
||
5D9D000
|
heap
|
page read and write
|
||
7B43000
|
heap
|
page read and write
|
||
5D34000
|
heap
|
page read and write
|
||
EAD000
|
stack
|
page read and write
|
||
44BB000
|
direct allocation
|
page read and write
|
||
2187000
|
direct allocation
|
page read and write
|
||
5DAD000
|
heap
|
page read and write
|
||
2179000
|
direct allocation
|
page read and write
|
||
2FF5000
|
direct allocation
|
page read and write
|
||
736000
|
heap
|
page read and write
|
||
8DE000
|
unkown
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
371F000
|
direct allocation
|
page read and write
|
||
8DE000
|
unkown
|
page read and write
|
||
3141000
|
heap
|
page read and write
|
||
7B2B000
|
heap
|
page read and write
|
||
5D9A000
|
heap
|
page read and write
|
||
3194000
|
heap
|
page read and write
|
||
5D67000
|
heap
|
page read and write
|
||
3185000
|
heap
|
page read and write
|
||
2E21000
|
heap
|
page read and write
|
||
61E8A000
|
unkown
|
page read and write
|
||
357C000
|
stack
|
page read and write
|
||
5D94000
|
heap
|
page read and write
|
||
5DCA000
|
heap
|
page read and write
|
||
5A91000
|
heap
|
page read and write
|
||
315B000
|
heap
|
page read and write
|
||
318C000
|
heap
|
page read and write
|
||
2EF2000
|
direct allocation
|
page read and write
|
||
5DA5000
|
heap
|
page read and write
|
||
5D7A000
|
heap
|
page read and write
|
||
221A000
|
direct allocation
|
page read and write
|
||
5DC7000
|
heap
|
page read and write
|
||
3090000
|
direct allocation
|
page execute and read and write
|
||
241C000
|
direct allocation
|
page read and write
|
||
236F000
|
direct allocation
|
page read and write
|
||
5DAE000
|
heap
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
6914000
|
trusted library allocation
|
page read and write
|
||
3070000
|
direct allocation
|
page execute and read and write
|
||
3183000
|
heap
|
page read and write
|
||
5D7F000
|
heap
|
page read and write
|
||
6BBB1000
|
unkown
|
page readonly
|
||
21CF000
|
direct allocation
|
page read and write
|
||
5DD0000
|
heap
|
page read and write
|
||
3141000
|
heap
|
page read and write
|
||
23BD000
|
direct allocation
|
page read and write
|
||
2155000
|
direct allocation
|
page read and write
|
||
6CC91000
|
unkown
|
page readonly
|
||
7C60000
|
trusted library allocation
|
page read and write
|
||
37DF000
|
stack
|
page read and write
|
||
E2E000
|
heap
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
4516000
|
direct allocation
|
page read and write
|
||
5D63000
|
heap
|
page read and write
|
||
93A000
|
unkown
|
page read and write
|
||
2340000
|
heap
|
page read and write
|
||
7FD90000
|
direct allocation
|
page read and write
|
||
5DCC000
|
heap
|
page read and write
|
||
3185000
|
heap
|
page read and write
|
||
3164000
|
heap
|
page read and write
|
||
34BE000
|
stack
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
637000
|
heap
|
page read and write
|
||
452D000
|
direct allocation
|
page read and write
|
||
315B000
|
heap
|
page read and write
|
||
923000
|
unkown
|
page read and write
|
||
6DD2000
|
trusted library allocation
|
page read and write
|
||
77D000
|
heap
|
page read and write
|
||
5DAE000
|
heap
|
page read and write
|
||
5D95000
|
heap
|
page read and write
|
||
7B42000
|
heap
|
page read and write
|
||
C11000
|
trusted library allocation
|
page read and write
|
||
717000
|
heap
|
page read and write
|
||
6EBF000
|
stack
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
21FD000
|
direct allocation
|
page read and write
|
||
3141000
|
heap
|
page read and write
|
||
E26000
|
heap
|
page read and write
|
||
5D96000
|
heap
|
page read and write
|
||
3141000
|
heap
|
page read and write
|
||
23C7000
|
direct allocation
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
3196000
|
heap
|
page read and write
|
||
305D000
|
direct allocation
|
page read and write
|
||
3701000
|
direct allocation
|
page read and write
|
||
96F000
|
stack
|
page read and write
|
||
3189000
|
heap
|
page read and write
|
||
3719000
|
direct allocation
|
page read and write
|
||
2F3A000
|
direct allocation
|
page read and write
|
||
714000
|
heap
|
page read and write
|
||
3151000
|
heap
|
page read and write
|
||
2118000
|
direct allocation
|
page read and write
|
||
E03000
|
heap
|
page read and write
|
||
36C8000
|
direct allocation
|
page read and write
|
||
234A000
|
direct allocation
|
page read and write
|
||
382E000
|
stack
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
6CF12000
|
unkown
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
5DDC000
|
heap
|
page read and write
|
||
3389000
|
direct allocation
|
page read and write
|
||
5CEC000
|
heap
|
page read and write
|
||
2543000
|
heap
|
page read and write
|
||
3194000
|
heap
|
page read and write
|
||
67FF000
|
stack
|
page read and write
|
||
5DBD000
|
heap
|
page read and write
|
||
254F000
|
direct allocation
|
page read and write
|
||
5DC5000
|
heap
|
page read and write
|
||
E28000
|
heap
|
page read and write
|
||
6030000
|
trusted library allocation
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
22C0000
|
heap
|
page read and write
|
||
2F4F000
|
stack
|
page read and write
|
||
E28000
|
heap
|
page read and write
|
||
61CD000
|
stack
|
page read and write
|
||
6A00000
|
trusted library allocation
|
page read and write
|
||
5DAD000
|
heap
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
63E0000
|
trusted library allocation
|
page read and write
|
||
E1E000
|
heap
|
page read and write
|
||
5DD4000
|
heap
|
page read and write
|
||
7B60000
|
heap
|
page read and write
|
||
44D8000
|
direct allocation
|
page read and write
|
||
30AD000
|
heap
|
page read and write
|
||
5DAE000
|
heap
|
page read and write
|
||
3141000
|
heap
|
page read and write
|
||
3698000
|
direct allocation
|
page read and write
|
||
23E9000
|
direct allocation
|
page read and write
|
||
3194000
|
heap
|
page read and write
|
||
307B000
|
heap
|
page read and write
|
||
2E21000
|
heap
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
3191000
|
heap
|
page read and write
|
||
5D7F000
|
heap
|
page read and write
|
||
641F000
|
stack
|
page read and write
|
||
372D000
|
direct allocation
|
page read and write
|
||
5D96000
|
heap
|
page read and write
|
||
DF7000
|
heap
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
6BC7E000
|
unkown
|
page execute read
|
||
36F4000
|
direct allocation
|
page read and write
|
||
5F66000
|
trusted library allocation
|
page read and write
|
||
2E30000
|
heap
|
page read and write
|
||
3168000
|
heap
|
page read and write
|
||
3183000
|
heap
|
page read and write
|
||
5DD1000
|
heap
|
page read and write
|
||
5D72000
|
heap
|
page read and write
|
||
5B90000
|
heap
|
page read and write
|
||
2540000
|
heap
|
page read and write
|
||
3159000
|
heap
|
page read and write
|
||
2326000
|
direct allocation
|
page read and write
|
||
71B000
|
heap
|
page read and write
|
||
3141000
|
heap
|
page read and write
|
||
21D6000
|
direct allocation
|
page read and write
|
||
63E0000
|
trusted library allocation
|
page read and write
|
||
22F5000
|
heap
|
page read and write
|
||
7B28000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
5D65000
|
heap
|
page read and write
|
||
3141000
|
heap
|
page read and write
|
||
5DDC000
|
heap
|
page read and write
|
||
6BC40000
|
unkown
|
page execute read
|
||
3242000
|
direct allocation
|
page read and write
|
||
36EC000
|
direct allocation
|
page read and write
|
||
5F73000
|
trusted library allocation
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
6CE90000
|
unkown
|
page readonly
|
||
3176000
|
heap
|
page read and write
|
||
3183000
|
heap
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
5D88000
|
heap
|
page read and write
|
||
608D000
|
stack
|
page read and write
|
||
5DA7000
|
heap
|
page read and write
|
||
4505000
|
direct allocation
|
page read and write
|
||
32C1000
|
heap
|
page read and write
|
||
3194000
|
heap
|
page read and write
|
||
5DD3000
|
heap
|
page read and write
|
||
2360000
|
direct allocation
|
page read and write
|
||
5DC5000
|
heap
|
page read and write
|
||
3168000
|
heap
|
page read and write
|
||
736000
|
heap
|
page read and write
|
||
3242000
|
heap
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
3EFD000
|
stack
|
page read and write
|
||
378B000
|
direct allocation
|
page read and write
|
||
2E22000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6401000
|
trusted library allocation
|
page read and write
|
||
3164000
|
heap
|
page read and write
|
||
7B2A000
|
heap
|
page read and write
|
||
6CBF000
|
stack
|
page read and write
|
||
372F000
|
direct allocation
|
page read and write
|
||
731000
|
heap
|
page read and write
|
||
7B49000
|
heap
|
page read and write
|
There are 1888 hidden memdumps, click here to show them.