Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Pilne zamowienie nr5363582 UTECH Maszyny i Urzadzenia Techniczne Jaroslaw Koenig sp. k..exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\nsgFEE3.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsgFEE3.tmp\nsExec.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pacifisterne\Automatcafeer\Nedrustningspolitikken\Dilemmaers146\Glasgaibleanir\Nodebilledet\Microsoft.Practices.Composite.UnityExtensions.dll
|
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Pacifisterne\Automatcafeer\Nedrustningspolitikken\Dilemmaers146\Glasgaibleanir\Nodebilledet\Reinspired.Aut
|
ASCII text, with very long lines (50244), with no line terminators
|
dropped
|
||
C:\Users\user\Pacifisterne\Automatcafeer\Seacross.Him
|
data
|
dropped
|
||
C:\Users\user\Pacifisterne\Automatcafeer\Syntaksgenkendelsernes\Temposkifterne\default.css
|
Unicode text, UTF-8 text
|
dropped
|
||
C:\Users\user\Pacifisterne\Automatcafeer\Syntaksgenkendelsernes\Temposkifterne\network-cellular-signal-none-symbolic.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Users\user\Pacifisterne\Automatcafeer\Tubulating\application-x-executable.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Pilne zamowienie nr5363582 UTECH Maszyny i Urzadzenia Techniczne Jaroslaw Koenig sp. k..exe
|
C:\Users\user\Desktop\Pilne zamowienie nr5363582 UTECH Maszyny i Urzadzenia Techniczne Jaroslaw Koenig sp. k..exe
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x0E^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x19^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x05^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x0E^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x07^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x78^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x79^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x71^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x71^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x08^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x39^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x2E^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x2A^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x3F^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x2E^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x0D^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x22^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x27^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x2E^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x0A^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x63^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x26^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x6B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x39^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x7F^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x6B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x67^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x6B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x22^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x6B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x7B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x33^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x73^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x7B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x7B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x7B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x7B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x7B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x7B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x7B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x67^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x6B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x22^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x6B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x7B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x67^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x6B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x3B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x6B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x7B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x67^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x6B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x22^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x6B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x7F^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x67^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x6B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x22^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x6B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x7B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x33^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x73^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x7B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x67^75"
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 119 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://creativecommons.org/licenses/by-sa/4.0/
|
unknown
|
||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
http://mozilla.org/MPL/2.0/.
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Territorialkravets
|
Tantaliferous
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
613000
|
heap
|
page read and write
|
||
23F53494000
|
heap
|
page read and write
|
||
24CC8B13000
|
heap
|
page read and write
|
||
1AC43CB000
|
stack
|
page read and write
|
||
23F544D3000
|
heap
|
page read and write
|
||
1194A084000
|
heap
|
page read and write
|
||
409000
|
unkown
|
page write copy
|
||
23F53D7E000
|
heap
|
page read and write
|
||
23F53D71000
|
heap
|
page read and write
|
||
23F5349E000
|
heap
|
page read and write
|
||
F9FD67E000
|
stack
|
page read and write
|
||
23F53D86000
|
heap
|
page read and write
|
||
21FF1402000
|
heap
|
page read and write
|
||
23F53D78000
|
heap
|
page read and write
|
||
23F53D60000
|
heap
|
page read and write
|
||
23F53D84000
|
heap
|
page read and write
|
||
F86867E000
|
stack
|
page read and write
|
||
23F53D57000
|
heap
|
page read and write
|
||
21FF136F000
|
heap
|
page read and write
|
||
23F544CF000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
23F53D60000
|
heap
|
page read and write
|
||
23F53429000
|
heap
|
page read and write
|
||
23F53D4B000
|
heap
|
page read and write
|
||
23F53D82000
|
heap
|
page read and write
|
||
23F53D74000
|
heap
|
page read and write
|
||
2898000
|
heap
|
page read and write
|
||
23F53D6B000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
23F53D5E000
|
heap
|
page read and write
|
||
6B18000
|
direct allocation
|
page execute and read and write
|
||
23F53D8A000
|
heap
|
page read and write
|
||
22345013000
|
heap
|
page read and write
|
||
23F53D82000
|
heap
|
page read and write
|
||
308E9FC000
|
stack
|
page read and write
|
||
23F53D7B000
|
heap
|
page read and write
|
||
23F54502000
|
heap
|
page read and write
|
||
1AC46FE000
|
stack
|
page read and write
|
||
133D967E000
|
heap
|
page read and write
|
||
23F53498000
|
heap
|
page read and write
|
||
24CC8B00000
|
heap
|
page read and write
|
||
23F53D74000
|
heap
|
page read and write
|
||
23F53D77000
|
heap
|
page read and write
|
||
376D000
|
stack
|
page read and write
|
||
1194A05E000
|
heap
|
page read and write
|
||
625000
|
heap
|
page read and write
|
||
B071B7E000
|
stack
|
page read and write
|
||
23F54469000
|
heap
|
page read and write
|
||
A01587B000
|
stack
|
page read and write
|
||
19272C60000
|
heap
|
page read and write
|
||
23F54602000
|
heap
|
page read and write
|
||
23F53D7E000
|
heap
|
page read and write
|
||
2383C630000
|
heap
|
page read and write
|
||
133D968D000
|
heap
|
page read and write
|
||
23F53D86000
|
heap
|
page read and write
|
||
23F544EC000
|
heap
|
page read and write
|
||
2383C83E000
|
heap
|
page read and write
|
||
19272E40000
|
heap
|
page read and write
|
||
23F544D3000
|
heap
|
page read and write
|
||
22344F60000
|
trusted library allocation
|
page read and write
|
||
B07157E000
|
stack
|
page read and write
|
||
23F534B7000
|
heap
|
page read and write
|
||
23F53D29000
|
heap
|
page read and write
|
||
23F53D86000
|
heap
|
page read and write
|
||
23F5354E000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
A0153FF000
|
stack
|
page read and write
|
||
23F53B50000
|
remote allocation
|
page read and write
|
||
23F53D5A000
|
heap
|
page read and write
|
||
24CC8A65000
|
heap
|
page read and write
|
||
F867C7F000
|
stack
|
page read and write
|
||
23F53D86000
|
heap
|
page read and write
|
||
24CC8A13000
|
heap
|
page read and write
|
||
23F53D79000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
23F54515000
|
heap
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
23F544C2000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
23F53B70000
|
remote allocation
|
page read and write
|
||
23F53DA5000
|
heap
|
page read and write
|
||
23F53D5E000
|
heap
|
page read and write
|
||
A01577B000
|
stack
|
page read and write
|
||
23F54453000
|
heap
|
page read and write
|
||
23F54535000
|
heap
|
page read and write
|
||
133D963C000
|
heap
|
page read and write
|
||
1194A02D000
|
heap
|
page read and write
|
||
23F544DE000
|
heap
|
page read and write
|
||
9382AFB000
|
stack
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
5FD000
|
heap
|
page read and write
|
||
23F544A9000
|
heap
|
page read and write
|
||
23F53D6A000
|
heap
|
page read and write
|
||
23F5445C000
|
heap
|
page read and write
|
||
133D9570000
|
heap
|
page read and write
|
||
24EFE652000
|
heap
|
page read and write
|
||
133D9629000
|
heap
|
page read and write
|
||
2383CDC0000
|
remote allocation
|
page read and write
|
||
21FF0A43000
|
heap
|
page read and write
|
||
281069C0000
|
trusted library allocation
|
page read and write
|
||
23F544EB000
|
heap
|
page read and write
|
||
23F544D3000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
23F54502000
|
heap
|
page read and write
|
||
23F53DA2000
|
heap
|
page read and write
|
||
27E62502000
|
heap
|
page read and write
|
||
23F53D76000
|
heap
|
page read and write
|
||
19273602000
|
trusted library allocation
|
page read and write
|
||
1194A047000
|
heap
|
page read and write
|
||
19272E68000
|
heap
|
page read and write
|
||
F9FDAFD000
|
stack
|
page read and write
|
||
23F53D13000
|
heap
|
page read and write
|
||
24EFE718000
|
heap
|
page read and write
|
||
23F53D60000
|
heap
|
page read and write
|
||
1194A05E000
|
heap
|
page read and write
|
||
23F53D85000
|
heap
|
page read and write
|
||
23F53D5F000
|
heap
|
page read and write
|
||
28106A77000
|
heap
|
page read and write
|
||
22B0000
|
heap
|
page read and write
|
||
194E2D13000
|
heap
|
page read and write
|
||
23F53D0E000
|
heap
|
page read and write
|
||
F86857D000
|
stack
|
page read and write
|
||
429000
|
unkown
|
page read and write
|
||
24F00200000
|
trusted library allocation
|
page read and write
|
||
23F544A3000
|
heap
|
page read and write
|
||
28106A5F000
|
heap
|
page read and write
|
||
23F53D82000
|
heap
|
page read and write
|
||
23F53D0E000
|
heap
|
page read and write
|
||
23F54411000
|
heap
|
page read and write
|
||
24EFE5A0000
|
trusted library allocation
|
page read and write
|
||
23F53D6D000
|
heap
|
page read and write
|
||
6118000
|
direct allocation
|
page execute and read and write
|
||
23F544DE000
|
heap
|
page read and write
|
||
421000
|
unkown
|
page read and write
|
||
23F53DA3000
|
heap
|
page read and write
|
||
19272E79000
|
heap
|
page read and write
|
||
23F53D79000
|
heap
|
page read and write
|
||
23F544B0000
|
heap
|
page read and write
|
||
1194A045000
|
heap
|
page read and write
|
||
23F53D66000
|
heap
|
page read and write
|
||
23F53D80000
|
heap
|
page read and write
|
||
133D9500000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
23F5352C000
|
heap
|
page read and write
|
||
23F53D76000
|
heap
|
page read and write
|
||
23F53D75000
|
heap
|
page read and write
|
||
23F544E3000
|
heap
|
page read and write
|
||
8A6327C000
|
stack
|
page read and write
|
||
23F53D74000
|
heap
|
page read and write
|
||
23F53D8A000
|
heap
|
page read and write
|
||
23F53D82000
|
heap
|
page read and write
|
||
B070DAB000
|
stack
|
page read and write
|
||
23F544B8000
|
heap
|
page read and write
|
||
24EFE63E000
|
heap
|
page read and write
|
||
194E2C41000
|
heap
|
page read and write
|
||
23F54488000
|
heap
|
page read and write
|
||
23F54512000
|
heap
|
page read and write
|
||
28106A82000
|
heap
|
page read and write
|
||
23F53D68000
|
heap
|
page read and write
|
||
B0977E000
|
stack
|
page read and write
|
||
23F53D52000
|
heap
|
page read and write
|
||
F867BFB000
|
stack
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
23F53D74000
|
heap
|
page read and write
|
||
23F53D61000
|
heap
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
23F544AE000
|
heap
|
page read and write
|
||
22FE000
|
stack
|
page read and write
|
||
B07167D000
|
stack
|
page read and write
|
||
28106A77000
|
heap
|
page read and write
|
||
21FF1413000
|
heap
|
page read and write
|
||
B07197F000
|
stack
|
page read and write
|
||
23F53D72000
|
heap
|
page read and write
|
||
28106A5A000
|
heap
|
page read and write
|
||
23F53D58000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
21FF0A13000
|
heap
|
page read and write
|
||
24CC8A3C000
|
heap
|
page read and write
|
||
23F544B6000
|
heap
|
page read and write
|
||
23F53502000
|
heap
|
page read and write
|
||
23F544D8000
|
heap
|
page read and write
|
||
23F53D85000
|
heap
|
page read and write
|
||
1194A06A000
|
heap
|
page read and write
|
||
11949FD0000
|
trusted library allocation
|
page read and write
|
||
21FF13BC000
|
heap
|
page read and write
|
||
23F534EA000
|
heap
|
page read and write
|
||
21FF0A4C000
|
heap
|
page read and write
|
||
194E2CCE000
|
heap
|
page read and write
|
||
60F000
|
heap
|
page read and write
|
||
23F53D62000
|
heap
|
page read and write
|
||
23F544B3000
|
heap
|
page read and write
|
||
23F53D62000
|
heap
|
page read and write
|
||
23F53D4B000
|
heap
|
page read and write
|
||
21FF1427000
|
heap
|
page read and write
|
||
23F544B0000
|
heap
|
page read and write
|
||
21FF0820000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
24EFE5F0000
|
remote allocation
|
page read and write
|
||
21FF1343000
|
heap
|
page read and write
|
||
60F000
|
heap
|
page read and write
|
||
23F53D84000
|
heap
|
page read and write
|
||
9382F7F000
|
stack
|
page read and write
|
||
23F54512000
|
heap
|
page read and write
|
||
23F53D65000
|
heap
|
page read and write
|
||
1194A04E000
|
heap
|
page read and write
|
||
24EFE602000
|
heap
|
page read and write
|
||
23F53D4B000
|
heap
|
page read and write
|
||
27E62402000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
24EFE5F0000
|
remote allocation
|
page read and write
|
||
23F544DE000
|
heap
|
page read and write
|
||
23F53D5D000
|
heap
|
page read and write
|
||
23F53D61000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
23F54604000
|
heap
|
page read and write
|
||
609000
|
heap
|
page read and write
|
||
133D9600000
|
heap
|
page read and write
|
||
28106930000
|
heap
|
page read and write
|
||
24CC8960000
|
trusted library allocation
|
page read and write
|
||
23F53D9D000
|
heap
|
page read and write
|
||
23F54502000
|
heap
|
page read and write
|
||
23F53D57000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
23F54620000
|
heap
|
page read and write
|
||
28106A13000
|
heap
|
page read and write
|
||
23F53483000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
22345802000
|
trusted library allocation
|
page read and write
|
||
1194A04B000
|
heap
|
page read and write
|
||
23F53D0E000
|
heap
|
page read and write
|
||
23F53D29000
|
heap
|
page read and write
|
||
23F544D7000
|
heap
|
page read and write
|
||
23F53D69000
|
heap
|
page read and write
|
||
23F53D5E000
|
heap
|
page read and write
|
||
2383C5D0000
|
heap
|
page read and write
|
||
21FF0830000
|
heap
|
page read and write
|
||
23F53D7E000
|
heap
|
page read and write
|
||
60F000
|
heap
|
page read and write
|
||
609000
|
heap
|
page read and write
|
||
23F53D84000
|
heap
|
page read and write
|
||
23F54462000
|
heap
|
page read and write
|
||
9382E7A000
|
stack
|
page read and write
|
||
23F53D68000
|
heap
|
page read and write
|
||
194E2C6D000
|
heap
|
page read and write
|
||
23F53D62000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
23F53D8B000
|
heap
|
page read and write
|
||
23F53D5E000
|
heap
|
page read and write
|
||
23F5354D000
|
heap
|
page read and write
|
||
23F53D5F000
|
heap
|
page read and write
|
||
23F544D3000
|
heap
|
page read and write
|
||
23F53D86000
|
heap
|
page read and write
|
||
F867D7C000
|
stack
|
page read and write
|
||
23F544F4000
|
heap
|
page read and write
|
||
613000
|
heap
|
page read and write
|
||
22345075000
|
heap
|
page read and write
|
||
23F53D84000
|
heap
|
page read and write
|
||
23F54524000
|
heap
|
page read and write
|
||
21FF1322000
|
heap
|
page read and write
|
||
5FD000
|
heap
|
page read and write
|
||
E23CB7A000
|
stack
|
page read and write
|
||
21FF0A76000
|
heap
|
page read and write
|
||
B0937E000
|
stack
|
page read and write
|
||
23F5354E000
|
heap
|
page read and write
|
||
23F53D84000
|
heap
|
page read and write
|
||
23F5352C000
|
heap
|
page read and write
|
||
23F5461A000
|
heap
|
page read and write
|
||
23F533B0000
|
trusted library allocation
|
page read and write
|
||
24EFE62A000
|
heap
|
page read and write
|
||
23F5440F000
|
heap
|
page read and write
|
||
23F53D53000
|
heap
|
page read and write
|
||
23F53D6E000
|
heap
|
page read and write
|
||
23F544D9000
|
heap
|
page read and write
|
||
2234506C000
|
heap
|
page read and write
|
||
23F53D61000
|
heap
|
page read and write
|
||
8A6337C000
|
stack
|
page read and write
|
||
23F53D5E000
|
heap
|
page read and write
|
||
23F5352A000
|
heap
|
page read and write
|
||
631000
|
heap
|
page read and write
|
||
21FF0A8B000
|
heap
|
page read and write
|
||
11949E60000
|
heap
|
page read and write
|
||
194E2C29000
|
heap
|
page read and write
|
||
1AC4C7D000
|
stack
|
page read and write
|
||
23F5451B000
|
heap
|
page read and write
|
||
289B000
|
heap
|
page read and write
|
||
21FF1322000
|
heap
|
page read and write
|
||
23F544B0000
|
heap
|
page read and write
|
||
23F544C0000
|
heap
|
page read and write
|
||
23F53D0E000
|
heap
|
page read and write
|
||
194E3500000
|
heap
|
page read and write
|
||
21FF0A90000
|
heap
|
page read and write
|
||
23F53D6D000
|
heap
|
page read and write
|
||
23F54464000
|
heap
|
page read and write
|
||
23F544B3000
|
heap
|
page read and write
|
||
23F54484000
|
heap
|
page read and write
|
||
23F53D85000
|
heap
|
page read and write
|
||
2383C802000
|
heap
|
page read and write
|
||
4D18000
|
direct allocation
|
page execute and read and write
|
||
23F5461B000
|
heap
|
page read and write
|
||
23F53D62000
|
heap
|
page read and write
|
||
23F544D3000
|
heap
|
page read and write
|
||
21FF0BE5000
|
heap
|
page read and write
|
||
23F544DB000
|
heap
|
page read and write
|
||
23F53D85000
|
heap
|
page read and write
|
||
2897000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
23F53D52000
|
heap
|
page read and write
|
||
23F53D69000
|
heap
|
page read and write
|
||
23F544D9000
|
heap
|
page read and write
|
||
28106A29000
|
heap
|
page read and write
|
||
23F544BE000
|
heap
|
page read and write
|
||
23F53D8B000
|
heap
|
page read and write
|
||
23F53D69000
|
heap
|
page read and write
|
||
23F53502000
|
heap
|
page read and write
|
||
21FF1354000
|
heap
|
page read and write
|
||
21FF0A00000
|
heap
|
page read and write
|
||
23F53D84000
|
heap
|
page read and write
|
||
23F544C1000
|
heap
|
page read and write
|
||
1194A07A000
|
heap
|
page read and write
|
||
23F53D78000
|
heap
|
page read and write
|
||
23F53D74000
|
heap
|
page read and write
|
||
23F544D4000
|
heap
|
page read and write
|
||
23F53D87000
|
heap
|
page read and write
|
||
23F53D6D000
|
heap
|
page read and write
|
||
5FD000
|
heap
|
page read and write
|
||
23F53D86000
|
heap
|
page read and write
|
||
23F53D79000
|
heap
|
page read and write
|
||
23F53D8A000
|
heap
|
page read and write
|
||
23F54615000
|
heap
|
page read and write
|
||
23F53D84000
|
heap
|
page read and write
|
||
23F53D68000
|
heap
|
page read and write
|
||
23F53400000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2383CE02000
|
trusted library allocation
|
page read and write
|
||
23F53D76000
|
heap
|
page read and write
|
||
23F53D68000
|
heap
|
page read and write
|
||
23F53D52000
|
heap
|
page read and write
|
||
23F53D76000
|
heap
|
page read and write
|
||
28106A00000
|
heap
|
page read and write
|
||
23F53D86000
|
heap
|
page read and write
|
||
23F53D60000
|
heap
|
page read and write
|
||
21FF13C6000
|
heap
|
page read and write
|
||
22345054000
|
heap
|
page read and write
|
||
8A62F7F000
|
stack
|
page read and write
|
||
2897000
|
heap
|
page read and write
|
||
21FF0A6F000
|
heap
|
page read and write
|
||
23F53D0F000
|
heap
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
23F53D74000
|
heap
|
page read and write
|
||
27E62400000
|
heap
|
page read and write
|
||
C85297E000
|
stack
|
page read and write
|
||
23F53320000
|
heap
|
page read and write
|
||
23F53D5E000
|
heap
|
page read and write
|
||
23F54462000
|
heap
|
page read and write
|
||
4F6000
|
heap
|
page read and write
|
||
23F53DA5000
|
heap
|
page read and write
|
||
24CC8A65000
|
heap
|
page read and write
|
||
4B40000
|
direct allocation
|
page execute and read and write
|
||
23F53D29000
|
heap
|
page read and write
|
||
613000
|
heap
|
page read and write
|
||
1194A049000
|
heap
|
page read and write
|
||
23F53D87000
|
heap
|
page read and write
|
||
23F53D68000
|
heap
|
page read and write
|
||
23F53D82000
|
heap
|
page read and write
|
||
24CC8A4F000
|
heap
|
page read and write
|
||
133D9652000
|
heap
|
page read and write
|
||
24F00002000
|
trusted library allocation
|
page read and write
|
||
23F53D68000
|
heap
|
page read and write
|
||
23F53D7E000
|
heap
|
page read and write
|
||
22345113000
|
heap
|
page read and write
|
||
5FD000
|
heap
|
page read and write
|
||
609000
|
heap
|
page read and write
|
||
23F53D86000
|
heap
|
page read and write
|
||
194E2C13000
|
heap
|
page read and write
|
||
609000
|
heap
|
page read and write
|
||
23F53D76000
|
heap
|
page read and write
|
||
23F53D77000
|
heap
|
page read and write
|
||
23F53D80000
|
heap
|
page read and write
|
||
23F5447C000
|
heap
|
page read and write
|
||
23F54484000
|
heap
|
page read and write
|
||
23F54400000
|
heap
|
page read and write
|
||
23F53D74000
|
heap
|
page read and write
|
||
23F53D9C000
|
heap
|
page read and write
|
||
24CC8B08000
|
heap
|
page read and write
|
||
B071C7F000
|
stack
|
page read and write
|
||
23F53D69000
|
heap
|
page read and write
|
||
23F53D66000
|
heap
|
page read and write
|
||
23F54502000
|
heap
|
page read and write
|
||
23F53D82000
|
heap
|
page read and write
|
||
23F53D75000
|
heap
|
page read and write
|
||
C852BFE000
|
stack
|
page read and write
|
||
23F544DE000
|
heap
|
page read and write
|
||
23F544F2000
|
heap
|
page read and write
|
||
5FD000
|
heap
|
page read and write
|
||
23F54512000
|
heap
|
page read and write
|
||
1194A07E000
|
heap
|
page read and write
|
||
23F53D88000
|
heap
|
page read and write
|
||
228E000
|
stack
|
page read and write
|
||
28106990000
|
heap
|
page read and write
|
||
23F53D80000
|
heap
|
page read and write
|
||
23F53D8D000
|
heap
|
page read and write
|
||
23F53380000
|
heap
|
page read and write
|
||
A015AFF000
|
stack
|
page read and write
|
||
23F53D62000
|
heap
|
page read and write
|
||
21FF0B13000
|
heap
|
page read and write
|
||
308E27B000
|
stack
|
page read and write
|
||
2383C85F000
|
heap
|
page read and write
|
||
23F53D2A000
|
heap
|
page read and write
|
||
23F53D74000
|
heap
|
page read and write
|
||
23F53D29000
|
heap
|
page read and write
|
||
1194A03A000
|
heap
|
page read and write
|
||
23F534CC000
|
heap
|
page read and write
|
||
23F53D60000
|
heap
|
page read and write
|
||
23F53D76000
|
heap
|
page read and write
|
||
23F53D79000
|
heap
|
page read and write
|
||
60F000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
23F53D5F000
|
heap
|
page read and write
|
||
27E6242E000
|
heap
|
page read and write
|
||
23F53D63000
|
heap
|
page read and write
|
||
613000
|
heap
|
page read and write
|
||
23F544D1000
|
heap
|
page read and write
|
||
21FF1302000
|
heap
|
page read and write
|
||
23F53D7F000
|
heap
|
page read and write
|
||
23F53D60000
|
heap
|
page read and write
|
||
23F53D78000
|
heap
|
page read and write
|
||
F9FD38B000
|
stack
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
23F54502000
|
heap
|
page read and write
|
||
23F53491000
|
heap
|
page read and write
|
||
24EFE64B000
|
heap
|
page read and write
|
||
194E2C83000
|
heap
|
page read and write
|
||
23F534D0000
|
heap
|
page read and write
|
||
23F544B3000
|
heap
|
page read and write
|
||
23F53D6E000
|
heap
|
page read and write
|
||
407000
|
unkown
|
page readonly
|
||
308EAFF000
|
stack
|
page read and write
|
||
23F53D2A000
|
heap
|
page read and write
|
||
F9FD8FB000
|
stack
|
page read and write
|
||
23F53D69000
|
heap
|
page read and write
|
||
19272F13000
|
heap
|
page read and write
|
||
2330000
|
heap
|
page read and write
|
||
194E3402000
|
heap
|
page read and write
|
||
194E2B10000
|
heap
|
page read and write
|
||
23F544C9000
|
heap
|
page read and write
|
||
23F53D68000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
194E2B80000
|
heap
|
page read and write
|
||
1194A067000
|
heap
|
page read and write
|
||
23F53D6D000
|
heap
|
page read and write
|
||
23F53538000
|
heap
|
page read and write
|
||
23F53D72000
|
heap
|
page read and write
|
||
43E000
|
unkown
|
page readonly
|
||
23F53D8B000
|
heap
|
page read and write
|
||
23F54614000
|
heap
|
page read and write
|
||
23F53D6A000
|
heap
|
page read and write
|
||
133D9670000
|
heap
|
page read and write
|
||
23F544B8000
|
heap
|
page read and write
|
||
23F53488000
|
heap
|
page read and write
|
||
23F53D6A000
|
heap
|
page read and write
|
||
23F53D68000
|
heap
|
page read and write
|
||
23F53413000
|
heap
|
page read and write
|
||
23F53D4B000
|
heap
|
page read and write
|
||
277F000
|
stack
|
page read and write
|
||
308E6FE000
|
stack
|
page read and write
|
||
194E3512000
|
heap
|
page read and write
|
||
23F53D7E000
|
heap
|
page read and write
|
||
24CC8A00000
|
heap
|
page read and write
|
||
23F53D6F000
|
heap
|
page read and write
|
||
27E629A0000
|
trusted library allocation
|
page read and write
|
||
23F54621000
|
heap
|
page read and write
|
||
613000
|
heap
|
page read and write
|
||
23F544D8000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
23F53D7E000
|
heap
|
page read and write
|
||
23F53D85000
|
heap
|
page read and write
|
||
23F53D84000
|
heap
|
page read and write
|
||
23F5460B000
|
heap
|
page read and write
|
||
23F53D4B000
|
heap
|
page read and write
|
||
23F53D79000
|
heap
|
page read and write
|
||
23F53D82000
|
heap
|
page read and write
|
||
613000
|
heap
|
page read and write
|
||
24EFE440000
|
heap
|
page read and write
|
||
23F5356F000
|
heap
|
page read and write
|
||
480000
|
unkown
|
page readonly
|
||
27E6243C000
|
heap
|
page read and write
|
||
23F544A9000
|
heap
|
page read and write
|
||
23F53D68000
|
heap
|
page read and write
|
||
27E621E0000
|
heap
|
page read and write
|
||
23F53D57000
|
heap
|
page read and write
|
||
1194A802000
|
trusted library allocation
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
||
23F53493000
|
heap
|
page read and write
|
||
23F53D84000
|
heap
|
page read and write
|
||
24EFE700000
|
heap
|
page read and write
|
||
23F53DBF000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
23F54496000
|
heap
|
page read and write
|
||
23F54464000
|
heap
|
page read and write
|
||
133D9700000
|
heap
|
page read and write
|
||
23F53D84000
|
heap
|
page read and write
|
||
23F544B3000
|
heap
|
page read and write
|
||
23F5446E000
|
heap
|
page read and write
|
||
C852B7D000
|
stack
|
page read and write
|
||
23F53D74000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
1194A013000
|
heap
|
page read and write
|
||
23F534AA000
|
heap
|
page read and write
|
||
C852DFD000
|
stack
|
page read and write
|
||
23F544B3000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
23F53D73000
|
heap
|
page read and write
|
||
23F5441B000
|
heap
|
page read and write
|
||
8A6347E000
|
stack
|
page read and write
|
||
23F544D9000
|
heap
|
page read and write
|
||
C85267B000
|
stack
|
page read and write
|
||
1AC47FC000
|
stack
|
page read and write
|
||
23F53D57000
|
heap
|
page read and write
|
||
24EFE64D000
|
heap
|
page read and write
|
||
23F53D84000
|
heap
|
page read and write
|
||
23F53D84000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
E23CA79000
|
stack
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
23F544C5000
|
heap
|
page read and write
|
||
23F53D60000
|
heap
|
page read and write
|
||
23F5460A000
|
heap
|
page read and write
|
||
23F53D71000
|
heap
|
page read and write
|
||
23F53D60000
|
heap
|
page read and write
|
||
23F53D86000
|
heap
|
page read and write
|
||
23F544CA000
|
heap
|
page read and write
|
||
23F53D76000
|
heap
|
page read and write
|
||
23F53D7C000
|
heap
|
page read and write
|
||
23F53D68000
|
heap
|
page read and write
|
||
23F544FA000
|
heap
|
page read and write
|
||
27E62A02000
|
trusted library allocation
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
C852A7E000
|
stack
|
page read and write
|
||
28106A61000
|
heap
|
page read and write
|
||
23F544A9000
|
heap
|
page read and write
|
||
23F544BA000
|
heap
|
page read and write
|
||
23F53D6E000
|
heap
|
page read and write
|
||
23F53D88000
|
heap
|
page read and write
|
||
23F5352C000
|
heap
|
page read and write
|
||
194E2BB0000
|
trusted library allocation
|
page read and write
|
||
23F53D85000
|
heap
|
page read and write
|
||
23F54510000
|
heap
|
page read and write
|
||
23F53D6A000
|
heap
|
page read and write
|
||
23F544D4000
|
heap
|
page read and write
|
||
133D9708000
|
heap
|
page read and write
|
||
23F544C1000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
194E2CBD000
|
heap
|
page read and write
|
||
308E47B000
|
stack
|
page read and write
|
||
23F544E2000
|
heap
|
page read and write
|
||
23F54469000
|
heap
|
page read and write
|
||
23F53D52000
|
heap
|
page read and write
|
||
23F53D84000
|
heap
|
page read and write
|
||
23F54512000
|
heap
|
page read and write
|
||
23F53D69000
|
heap
|
page read and write
|
||
1194A040000
|
heap
|
page read and write
|
||
23F53D8D000
|
heap
|
page read and write
|
||
23F53D75000
|
heap
|
page read and write
|
||
23F53D2A000
|
heap
|
page read and write
|
||
23F544C3000
|
heap
|
page read and write
|
||
23F54461000
|
heap
|
page read and write
|
||
24EFE64C000
|
heap
|
page read and write
|
||
23F53D2E000
|
heap
|
page read and write
|
||
23F53DB5000
|
heap
|
page read and write
|
||
23F53D77000
|
heap
|
page read and write
|
||
23F53D66000
|
heap
|
page read and write
|
||
23F53D29000
|
heap
|
page read and write
|
||
23F53D6D000
|
heap
|
page read and write
|
||
23F53DA5000
|
heap
|
page read and write
|
||
23F53D5F000
|
heap
|
page read and write
|
||
23F53D5D000
|
heap
|
page read and write
|
||
23F53D8A000
|
heap
|
page read and write
|
||
23F534D5000
|
heap
|
page read and write
|
||
28106A51000
|
heap
|
page read and write
|
||
23F53D82000
|
heap
|
page read and write
|
||
23F53D75000
|
heap
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
||
23F53D69000
|
heap
|
page read and write
|
||
43E000
|
unkown
|
page readonly
|
||
F86817A000
|
stack
|
page read and write
|
||
1194A030000
|
heap
|
page read and write
|
||
23F53D2A000
|
heap
|
page read and write
|
||
B07147F000
|
stack
|
page read and write
|
||
609000
|
heap
|
page read and write
|
||
22345077000
|
heap
|
page read and write
|
||
23F53D86000
|
heap
|
page read and write
|
||
23F544B0000
|
heap
|
page read and write
|
||
23F544A4000
|
heap
|
page read and write
|
||
23F53D7E000
|
heap
|
page read and write
|
||
23F5356F000
|
heap
|
page read and write
|
||
1194A05E000
|
heap
|
page read and write
|
||
23F53D62000
|
heap
|
page read and write
|
||
2892000
|
heap
|
page read and write
|
||
23F53D82000
|
heap
|
page read and write
|
||
28106B00000
|
heap
|
page read and write
|
||
23F53D74000
|
heap
|
page read and write
|
||
2383C834000
|
heap
|
page read and write
|
||
23F53D62000
|
heap
|
page read and write
|
||
2234503C000
|
heap
|
page read and write
|
||
23F54600000
|
heap
|
page read and write
|
||
23F53D82000
|
heap
|
page read and write
|
||
23F53D74000
|
heap
|
page read and write
|
||
1AC4D7F000
|
stack
|
page read and write
|
||
23F53D66000
|
heap
|
page read and write
|
||
23F5461F000
|
heap
|
page read and write
|
||
23F53D10000
|
heap
|
page read and write
|
||
23F5446A000
|
heap
|
page read and write
|
||
23F53D80000
|
heap
|
page read and write
|
||
23F53D53000
|
heap
|
page read and write
|
||
23F534BD000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
B071A7F000
|
stack
|
page read and write
|
||
23F53D61000
|
heap
|
page read and write
|
||
23F53D4C000
|
heap
|
page read and write
|
||
23F5354D000
|
heap
|
page read and write
|
||
1194A07B000
|
heap
|
page read and write
|
||
23F53D7F000
|
heap
|
page read and write
|
||
B092FB000
|
stack
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
23F53D82000
|
heap
|
page read and write
|
||
308ECFF000
|
stack
|
page read and write
|
||
C852E7E000
|
stack
|
page read and write
|
||
5FD000
|
heap
|
page read and write
|
||
A015BFD000
|
stack
|
page read and write
|
||
23F53D75000
|
heap
|
page read and write
|
||
23F53D5E000
|
heap
|
page read and write
|
||
23F53D77000
|
heap
|
page read and write
|
||
23F53D86000
|
heap
|
page read and write
|
||
23F53D60000
|
heap
|
page read and write
|
||
23F53D69000
|
heap
|
page read and write
|
||
24EFE5C0000
|
trusted library allocation
|
page read and write
|
||
613000
|
heap
|
page read and write
|
||
21FF0BB9000
|
heap
|
page read and write
|
||
1194A02E000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
23F53D80000
|
heap
|
page read and write
|
||
23F53D2A000
|
heap
|
page read and write
|
||
10005000
|
unkown
|
page readonly
|
||
1AC467F000
|
stack
|
page read and write
|
||
23F544CD000
|
heap
|
page read and write
|
||
23F544FE000
|
heap
|
page read and write
|
||
23F54502000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
23F53D5F000
|
heap
|
page read and write
|
||
23F53D5E000
|
heap
|
page read and write
|
||
21FF0A3C000
|
heap
|
page read and write
|
||
23F53D9D000
|
heap
|
page read and write
|
||
21FF0A65000
|
heap
|
page read and write
|
||
308E87D000
|
stack
|
page read and write
|
||
11949ED0000
|
heap
|
page read and write
|
||
23F53D68000
|
heap
|
page read and write
|
||
27E621F0000
|
heap
|
page read and write
|
||
23F54609000
|
heap
|
page read and write
|
||
133D9E02000
|
trusted library allocation
|
page read and write
|
||
23F53D2E000
|
heap
|
page read and write
|
||
480000
|
unkown
|
page readonly
|
||
23F53513000
|
heap
|
page read and write
|
||
B07177D000
|
stack
|
page read and write
|
||
27E62441000
|
heap
|
page read and write
|
||
23F54538000
|
heap
|
page read and write
|
||
23F5354D000
|
heap
|
page read and write
|
||
23F5352D000
|
heap
|
page read and write
|
||
23F5352C000
|
heap
|
page read and write
|
||
C8528FE000
|
stack
|
page read and write
|
||
4EC507B000
|
stack
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
23F53D57000
|
heap
|
page read and write
|
||
8A6299B000
|
stack
|
page read and write
|
||
386C000
|
stack
|
page read and write
|
||
23F544B3000
|
heap
|
page read and write
|
||
28106B08000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
1AC487E000
|
stack
|
page read and write
|
||
23F544B0000
|
heap
|
page read and write
|
||
23F53D6D000
|
heap
|
page read and write
|
||
F9FD9F7000
|
stack
|
page read and write
|
||
23F544DE000
|
heap
|
page read and write
|
||
22345002000
|
heap
|
page read and write
|
||
23F53D2C000
|
heap
|
page read and write
|
||
23F53D82000
|
heap
|
page read and write
|
||
23F544B0000
|
heap
|
page read and write
|
||
23F53D86000
|
heap
|
page read and write
|
||
19272CC0000
|
heap
|
page read and write
|
||
23F53D80000
|
heap
|
page read and write
|
||
23F53D9B000
|
heap
|
page read and write
|
||
1194A06B000
|
heap
|
page read and write
|
||
23F53D2A000
|
heap
|
page read and write
|
||
21FF13B0000
|
heap
|
page read and write
|
||
23F53DA0000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
23F53D85000
|
heap
|
page read and write
|
||
23F53DA5000
|
heap
|
page read and write
|
||
1194A039000
|
heap
|
page read and write
|
||
23F53D80000
|
heap
|
page read and write
|
||
23F53B50000
|
remote allocation
|
page read and write
|
||
133D964B000
|
heap
|
page read and write
|
||
23F53D6D000
|
heap
|
page read and write
|
||
9382CFB000
|
stack
|
page read and write
|
||
23F53D8F000
|
heap
|
page read and write
|
||
23F53D75000
|
heap
|
page read and write
|
||
23F54512000
|
heap
|
page read and write
|
||
194E2C00000
|
heap
|
page read and write
|
||
23F544AA000
|
heap
|
page read and write
|
||
23F53D0E000
|
heap
|
page read and write
|
||
23F544AE000
|
heap
|
page read and write
|
||
194E353A000
|
heap
|
page read and write
|
||
23F544D7000
|
heap
|
page read and write
|
||
21FF1430000
|
heap
|
page read and write
|
||
23F53D7E000
|
heap
|
page read and write
|
||
23F53D82000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2383C800000
|
heap
|
page read and write
|
||
23F5446A000
|
heap
|
page read and write
|
||
23F53D76000
|
heap
|
page read and write
|
||
23F53D72000
|
heap
|
page read and write
|
||
24CC88C0000
|
heap
|
page read and write
|
||
23F53D77000
|
heap
|
page read and write
|
||
632000
|
heap
|
page read and write
|
||
24EFFFA0000
|
trusted library allocation
|
page read and write
|
||
23F53D85000
|
heap
|
page read and write
|
||
23F544CD000
|
heap
|
page read and write
|
||
A015977000
|
stack
|
page read and write
|
||
23F53D77000
|
heap
|
page read and write
|
||
2383CDC0000
|
remote allocation
|
page read and write
|
||
21FF0A21000
|
heap
|
page read and write
|
||
287F000
|
stack
|
page read and write
|
||
1194A056000
|
heap
|
page read and write
|
||
23F544EA000
|
heap
|
page read and write
|
||
23F544DC000
|
heap
|
page read and write
|
||
2383C902000
|
heap
|
page read and write
|
||
23F53D74000
|
heap
|
page read and write
|
||
23F5461D000
|
heap
|
page read and write
|
||
8A6317F000
|
stack
|
page read and write
|
||
609000
|
heap
|
page read and write
|
||
A0159FF000
|
stack
|
page read and write
|
||
E23CC7E000
|
stack
|
page read and write
|
||
23F53D6E000
|
heap
|
page read and write
|
||
23F54464000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
19272F02000
|
heap
|
page read and write
|
||
23F53D82000
|
heap
|
page read and write
|
||
23F544E3000
|
heap
|
page read and write
|
||
19272F00000
|
heap
|
page read and write
|
||
23F53D5F000
|
heap
|
page read and write
|
||
23F5354D000
|
heap
|
page read and write
|
||
23F53D69000
|
heap
|
page read and write
|
||
27E62447000
|
heap
|
page read and write
|
||
23F53D7A000
|
heap
|
page read and write
|
||
23F53D86000
|
heap
|
page read and write
|
||
93826AB000
|
stack
|
page read and write
|
||
23F5460D000
|
heap
|
page read and write
|
||
1194A000000
|
heap
|
page read and write
|
||
23F5352C000
|
heap
|
page read and write
|
||
23F53D92000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
1194A042000
|
heap
|
page read and write
|
||
23F53D6E000
|
heap
|
page read and write
|
||
23F534DB000
|
heap
|
page read and write
|
||
23F544B0000
|
heap
|
page read and write
|
||
2220000
|
heap
|
page read and write
|
||
23F53D85000
|
heap
|
page read and write
|
||
22345000000
|
heap
|
page read and write
|
||
23F53D95000
|
heap
|
page read and write
|
||
23F53D32000
|
heap
|
page read and write
|
||
23F53D57000
|
heap
|
page read and write
|
||
F8677BB000
|
stack
|
page read and write
|
||
19272E64000
|
heap
|
page read and write
|
||
23F53D5E000
|
heap
|
page read and write
|
||
23F53D8A000
|
heap
|
page read and write
|
||
23F54498000
|
heap
|
page read and write
|
||
23F53D63000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
23F53D6D000
|
heap
|
page read and write
|
||
F9FD6FE000
|
stack
|
page read and write
|
||
23F53D74000
|
heap
|
page read and write
|
||
9382BFF000
|
stack
|
page read and write
|
||
23F53D6A000
|
heap
|
page read and write
|
||
23F53D68000
|
heap
|
page read and write
|
||
23F53D8B000
|
heap
|
page read and write
|
||
23F53D68000
|
heap
|
page read and write
|
||
23F53D4B000
|
heap
|
page read and write
|
||
613000
|
heap
|
page read and write
|
||
23F54462000
|
heap
|
page read and write
|
||
194E2CCC000
|
heap
|
page read and write
|
||
23F53D5F000
|
heap
|
page read and write
|
||
8A6307F000
|
stack
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
22344E60000
|
heap
|
page read and write
|
||
5FD000
|
heap
|
page read and write
|
||
23F53D70000
|
heap
|
page read and write
|
||
22344E00000
|
heap
|
page read and write
|
||
23F53D7C000
|
heap
|
page read and write
|
||
24CC8A8A000
|
heap
|
page read and write
|
||
19272C50000
|
heap
|
page read and write
|
||
B0711FB000
|
stack
|
page read and write
|
||
23F54512000
|
heap
|
page read and write
|
||
F9FDBFE000
|
stack
|
page read and write
|
||
21FF0A53000
|
heap
|
page read and write
|
||
22344DF0000
|
heap
|
page read and write
|
||
19272E13000
|
heap
|
page read and write
|
||
23F53D74000
|
heap
|
page read and write
|
||
24CC8A29000
|
heap
|
page read and write
|
||
23F544D7000
|
heap
|
page read and write
|
||
23F53D5B000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
F867F7A000
|
stack
|
page read and write
|
||
23F544A9000
|
heap
|
page read and write
|
||
23F544D4000
|
heap
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
23F53D7D000
|
heap
|
page read and write
|
||
23F5345F000
|
heap
|
page read and write
|
||
21FF0A85000
|
heap
|
page read and write
|
||
1194A102000
|
heap
|
page read and write
|
||
23F544D3000
|
heap
|
page read and write
|
||
28106920000
|
heap
|
page read and write
|
||
21FF1394000
|
heap
|
page read and write
|
||
21FF1400000
|
heap
|
page read and write
|
||
609000
|
heap
|
page read and write
|
||
23F54469000
|
heap
|
page read and write
|
||
23F53D5F000
|
heap
|
page read and write
|
||
23F53D99000
|
heap
|
page read and write
|
||
635000
|
heap
|
page read and write
|
||
23F53D71000
|
heap
|
page read and write
|
||
43B000
|
unkown
|
page read and write
|
||
B07187F000
|
stack
|
page read and write
|
||
23F544C3000
|
heap
|
page read and write
|
||
23F53D74000
|
heap
|
page read and write
|
||
23F53D63000
|
heap
|
page read and write
|
||
1194A060000
|
heap
|
page read and write
|
||
60F000
|
heap
|
page read and write
|
||
23F544AB000
|
heap
|
page read and write
|
||
1194A03D000
|
heap
|
page read and write
|
||
23F53D85000
|
heap
|
page read and write
|
||
23F544C0000
|
heap
|
page read and write
|
||
5FD000
|
heap
|
page read and write
|
||
21FF0A74000
|
heap
|
page read and write
|
||
23F54602000
|
heap
|
page read and write
|
||
23F53D2A000
|
heap
|
page read and write
|
||
23F53D5D000
|
heap
|
page read and write
|
||
23F53D61000
|
heap
|
page read and write
|
||
27E62450000
|
heap
|
page read and write
|
||
24CC8A80000
|
heap
|
page read and write
|
||
8A62DFC000
|
stack
|
page read and write
|
||
23F53D69000
|
heap
|
page read and write
|
||
23F5446A000
|
heap
|
page read and write
|
||
23F5347A000
|
heap
|
page read and write
|
||
23F544D9000
|
heap
|
page read and write
|
||
24CC8930000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
23F53D88000
|
heap
|
page read and write
|
||
23F5447E000
|
heap
|
page read and write
|
||
5D8000
|
heap
|
page read and write
|
||
23F544F7000
|
heap
|
page read and write
|
||
23F5446C000
|
heap
|
page read and write
|
||
2240000
|
heap
|
page read and write
|
||
1194A04F000
|
heap
|
page read and write
|
||
F867E7A000
|
stack
|
page read and write
|
||
23F53D74000
|
heap
|
page read and write
|
||
23F544AA000
|
heap
|
page read and write
|
||
23F53D61000
|
heap
|
page read and write
|
||
2383C829000
|
heap
|
page read and write
|
||
23F53310000
|
heap
|
page read and write
|
||
23F53D84000
|
heap
|
page read and write
|
||
23F53D6D000
|
heap
|
page read and write
|
||
23F53D51000
|
heap
|
page read and write
|
||
23F53DA0000
|
heap
|
page read and write
|
||
A01567E000
|
stack
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
21FF09B0000
|
trusted library allocation
|
page read and write
|
||
23F53D68000
|
heap
|
page read and write
|
||
19272E02000
|
heap
|
page read and write
|
||
23F53D85000
|
heap
|
page read and write
|
||
4EC527E000
|
stack
|
page read and write
|
||
23F53D77000
|
heap
|
page read and write
|
||
24CC8A55000
|
heap
|
page read and write
|
||
23F53D80000
|
heap
|
page read and write
|
||
23F53D60000
|
heap
|
page read and write
|
||
60F000
|
heap
|
page read and write
|
||
23F54468000
|
heap
|
page read and write
|
||
1194A046000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
23F53D84000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
11949E70000
|
heap
|
page read and write
|
||
21FF0A91000
|
heap
|
page read and write
|
||
23F53D6A000
|
heap
|
page read and write
|
||
23F53D5D000
|
heap
|
page read and write
|
||
23F544B8000
|
heap
|
page read and write
|
||
60F000
|
heap
|
page read and write
|
||
23F54462000
|
heap
|
page read and write
|
||
23F5351A000
|
heap
|
page read and write
|
||
23F5448A000
|
heap
|
page read and write
|
||
23F54623000
|
heap
|
page read and write
|
||
24CC88D0000
|
heap
|
page read and write
|
||
23F54512000
|
heap
|
page read and write
|
||
F86827E000
|
stack
|
page read and write
|
||
23F53D63000
|
heap
|
page read and write
|
||
23F53D60000
|
heap
|
page read and write
|
||
21FF0A58000
|
heap
|
page read and write
|
||
23F53D30000
|
heap
|
page read and write
|
||
23F53D7C000
|
heap
|
page read and write
|
||
938317F000
|
stack
|
page read and write
|
||
23F53D68000
|
heap
|
page read and write
|
||
23F53D29000
|
heap
|
page read and write
|
||
23F53D75000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
21FF1423000
|
heap
|
page read and write
|
||
609000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
24EFE672000
|
heap
|
page read and write
|
||
23F54615000
|
heap
|
page read and write
|
||
1AC4B7F000
|
stack
|
page read and write
|
||
23F53D84000
|
heap
|
page read and write
|
||
23F5352A000
|
heap
|
page read and write
|
||
133D9510000
|
heap
|
page read and write
|
||
23F53D7F000
|
heap
|
page read and write
|
||
23F53D57000
|
heap
|
page read and write
|
||
23F53D76000
|
heap
|
page read and write
|
||
23F53517000
|
heap
|
page read and write
|
||
23F53D7F000
|
heap
|
page read and write
|
||
23F53D2E000
|
heap
|
page read and write
|
||
24EFE667000
|
heap
|
page read and write
|
||
23F53D5D000
|
heap
|
page read and write
|
||
2383C813000
|
heap
|
page read and write
|
||
23F53D7E000
|
heap
|
page read and write
|
||
23F53D2A000
|
heap
|
page read and write
|
||
24EFE702000
|
heap
|
page read and write
|
||
1194A065000
|
heap
|
page read and write
|
||
99000
|
stack
|
page read and write
|
||
27E62456000
|
heap
|
page read and write
|
||
1194A050000
|
heap
|
page read and write
|
||
23F53D5F000
|
heap
|
page read and write
|
||
21FF0A29000
|
heap
|
page read and write
|
||
23F544DC000
|
heap
|
page read and write
|
||
21FF0990000
|
trusted library allocation
|
page read and write
|
||
23F544CD000
|
heap
|
page read and write
|
||
B0987E000
|
stack
|
page read and write
|
||
23F53D74000
|
heap
|
page read and write
|
||
23F5352C000
|
heap
|
page read and write
|
||
21FF1300000
|
heap
|
page read and write
|
||
23F544C3000
|
heap
|
page read and write
|
||
133D9613000
|
heap
|
page read and write
|
||
23F54468000
|
heap
|
page read and write
|
||
23F53D75000
|
heap
|
page read and write
|
||
133D964C000
|
heap
|
page read and write
|
||
23F53481000
|
heap
|
page read and write
|
||
24EFE4A0000
|
heap
|
page read and write
|
||
27E62240000
|
heap
|
page read and write
|
||
E23C97E000
|
stack
|
page read and write
|
||
23F53C02000
|
heap
|
page read and write
|
||
23F54480000
|
heap
|
page read and write
|
||
60F000
|
heap
|
page read and write
|
||
23F53D74000
|
heap
|
page read and write
|
||
28106A67000
|
heap
|
page read and write
|
||
93830FF000
|
stack
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
10003000
|
unkown
|
page readonly
|
||
23F544EB000
|
heap
|
page read and write
|
||
23F544DE000
|
heap
|
page read and write
|
||
23F544DC000
|
heap
|
page read and write
|
||
23F53D80000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
23F534C8000
|
heap
|
page read and write
|
||
23F53D00000
|
heap
|
page read and write
|
||
23F53C15000
|
heap
|
page read and write
|
||
27E62429000
|
heap
|
page read and write
|
||
23F53D62000
|
heap
|
page read and write
|
||
23F544AA000
|
heap
|
page read and write
|
||
23F53D8F000
|
heap
|
page read and write
|
||
23F53D86000
|
heap
|
page read and write
|
||
28A1000
|
heap
|
page read and write
|
||
23F53D7E000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
308E77C000
|
stack
|
page read and write
|
||
23F53D95000
|
heap
|
page read and write
|
||
23F53D6B000
|
heap
|
page read and write
|
||
23F53D71000
|
heap
|
page read and write
|
||
23F53D80000
|
heap
|
page read and write
|
||
23F53D4B000
|
heap
|
page read and write
|
||
B0997E000
|
stack
|
page read and write
|
||
23F53D7E000
|
heap
|
page read and write
|
||
23F53D84000
|
heap
|
page read and write
|
||
F86807A000
|
stack
|
page read and write
|
||
194E2C86000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
23F544E8000
|
heap
|
page read and write
|
||
23F53D6E000
|
heap
|
page read and write
|
||
22345029000
|
heap
|
page read and write
|
||
23F53D77000
|
heap
|
page read and write
|
||
23F53D77000
|
heap
|
page read and write
|
||
23F5348A000
|
heap
|
page read and write
|
||
19272E28000
|
heap
|
page read and write
|
||
407000
|
unkown
|
page readonly
|
||
23F53D62000
|
heap
|
page read and write
|
||
23F53D79000
|
heap
|
page read and write
|
||
308E5FE000
|
stack
|
page read and write
|
||
23F53DA5000
|
heap
|
page read and write
|
||
19272DC0000
|
trusted library allocation
|
page read and write
|
||
23F53D86000
|
heap
|
page read and write
|
||
23F53D64000
|
heap
|
page read and write
|
||
1194A062000
|
heap
|
page read and write
|
||
24EFE430000
|
heap
|
page read and write
|
||
1194A06D000
|
heap
|
page read and write
|
||
21FF0890000
|
heap
|
page read and write
|
||
23F5352C000
|
heap
|
page read and write
|
||
1194A029000
|
heap
|
page read and write
|
||
23F53D29000
|
heap
|
page read and write
|
||
23F544DF000
|
heap
|
page read and write
|
||
23F53D63000
|
heap
|
page read and write
|
||
133D964F000
|
heap
|
page read and write
|
||
23F53D97000
|
heap
|
page read and write
|
||
23F53D82000
|
heap
|
page read and write
|
||
23F54510000
|
heap
|
page read and write
|
||
23F54459000
|
heap
|
page read and write
|
||
613000
|
heap
|
page read and write
|
||
23F53D2C000
|
heap
|
page read and write
|
||
308E8FB000
|
stack
|
page read and write
|
||
23F53D86000
|
heap
|
page read and write
|
||
24EFE613000
|
heap
|
page read and write
|
||
23F53D7E000
|
heap
|
page read and write
|
||
23F5352A000
|
heap
|
page read and write
|
||
B093FE000
|
stack
|
page read and write
|
||
23F53D0E000
|
heap
|
page read and write
|
||
133D964D000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
28106A78000
|
heap
|
page read and write
|
||
23F5343D000
|
heap
|
page read and write
|
||
23F53D32000
|
heap
|
page read and write
|
||
23F53D5F000
|
heap
|
page read and write
|
||
194E2CE0000
|
heap
|
page read and write
|
||
23F544DC000
|
heap
|
page read and write
|
||
23F544A3000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
23F53D68000
|
heap
|
page read and write
|
||
23F5349F000
|
heap
|
page read and write
|
||
23F544DE000
|
heap
|
page read and write
|
||
23F53D86000
|
heap
|
page read and write
|
||
23F53D62000
|
heap
|
page read and write
|
||
23F53D80000
|
heap
|
page read and write
|
||
23F54462000
|
heap
|
page read and write
|
||
23F53D63000
|
heap
|
page read and write
|
||
2234505A000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
23F53D5F000
|
heap
|
page read and write
|
||
23F54491000
|
heap
|
page read and write
|
||
194E2D02000
|
heap
|
page read and write
|
||
1194A077000
|
heap
|
page read and write
|
||
23F53D74000
|
heap
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
23F53D37000
|
heap
|
page read and write
|
||
1194A063000
|
heap
|
page read and write
|
||
23F53D65000
|
heap
|
page read and write
|
||
23F53D68000
|
heap
|
page read and write
|
||
23F544C4000
|
heap
|
page read and write
|
||
24EFE600000
|
heap
|
page read and write
|
||
23F544D1000
|
heap
|
page read and write
|
||
23F53D53000
|
heap
|
page read and write
|
||
23F53D60000
|
heap
|
page read and write
|
||
21FF1202000
|
heap
|
page read and write
|
||
23F54462000
|
heap
|
page read and write
|
||
24EFE5F0000
|
remote allocation
|
page read and write
|
||
23F53D84000
|
heap
|
page read and write
|
||
23F53D6B000
|
heap
|
page read and write
|
||
609000
|
heap
|
page read and write
|
||
22B4000
|
heap
|
page read and write
|
||
23F53C00000
|
heap
|
page read and write
|
||
23F5447D000
|
heap
|
page read and write
|
||
27E62413000
|
heap
|
page read and write
|
||
23F544C8000
|
heap
|
page read and write
|
||
23F53D29000
|
heap
|
page read and write
|
||
23F53D64000
|
heap
|
page read and write
|
||
409000
|
unkown
|
page read and write
|
||
23F5460C000
|
heap
|
page read and write
|
||
23F544DA000
|
heap
|
page read and write
|
||
5718000
|
direct allocation
|
page execute and read and write
|
||
23F53D74000
|
heap
|
page read and write
|
||
4EC4F7B000
|
stack
|
page read and write
|
||
23F53D80000
|
heap
|
page read and write
|
||
24CC9202000
|
trusted library allocation
|
page read and write
|
||
938307E000
|
stack
|
page read and write
|
||
2383CDC0000
|
remote allocation
|
page read and write
|
||
194E2CE2000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
23F544EA000
|
heap
|
page read and write
|
||
23F53D69000
|
heap
|
page read and write
|
||
24EFE65C000
|
heap
|
page read and write
|
||
23F53D5D000
|
heap
|
page read and write
|
||
2383CD90000
|
trusted library allocation
|
page read and write
|
||
22345102000
|
heap
|
page read and write
|
||
133D9713000
|
heap
|
page read and write
|
||
23F53D77000
|
heap
|
page read and write
|
||
23F53D52000
|
heap
|
page read and write
|
||
23F54462000
|
heap
|
page read and write
|
||
23F53D7F000
|
heap
|
page read and write
|
||
308EBFD000
|
stack
|
page read and write
|
||
60F000
|
heap
|
page read and write
|
||
23F53D7E000
|
heap
|
page read and write
|
||
133D9702000
|
heap
|
page read and write
|
||
23F5352C000
|
heap
|
page read and write
|
||
23F53D07000
|
heap
|
page read and write
|
||
23F53481000
|
heap
|
page read and write
|
||
133D968A000
|
heap
|
page read and write
|
||
23F53D82000
|
heap
|
page read and write
|
||
23F53D71000
|
heap
|
page read and write
|
||
23F53D69000
|
heap
|
page read and write
|
||
28106A3C000
|
heap
|
page read and write
|
||
23F54464000
|
heap
|
page read and write
|
||
28106B13000
|
heap
|
page read and write
|
||
133D9650000
|
heap
|
page read and write
|
||
27E6244A000
|
heap
|
page read and write
|
||
23F53DB3000
|
heap
|
page read and write
|
||
23F53D09000
|
heap
|
page read and write
|
||
B07137D000
|
stack
|
page read and write
|
||
23F54618000
|
heap
|
page read and write
|
||
23F544CA000
|
heap
|
page read and write
|
||
24EFE713000
|
heap
|
page read and write
|
||
2336000
|
heap
|
page read and write
|
||
23F534FC000
|
heap
|
page read and write
|
||
23F53D69000
|
heap
|
page read and write
|
||
A01537C000
|
stack
|
page read and write
|
||
23F5352C000
|
heap
|
page read and write
|
||
23F53D68000
|
heap
|
page read and write
|
||
E23C52C000
|
stack
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
19272E00000
|
heap
|
page read and write
|
||
23F54489000
|
heap
|
page read and write
|
||
4EC517F000
|
stack
|
page read and write
|
||
133D95A0000
|
trusted library allocation
|
page read and write
|
||
B09A7E000
|
stack
|
page read and write
|
||
23F53D4C000
|
heap
|
page read and write
|
||
24CC8A6C000
|
heap
|
page read and write
|
||
23F53538000
|
heap
|
page read and write
|
||
23F53D71000
|
heap
|
page read and write
|
||
2383C5C0000
|
heap
|
page read and write
|
||
23F53D74000
|
heap
|
page read and write
|
||
A015CFE000
|
stack
|
page read and write
|
||
9382D79000
|
stack
|
page read and write
|
||
23F53D5E000
|
heap
|
page read and write
|
||
23F53D58000
|
heap
|
page read and write
|
||
23F53B50000
|
remote allocation
|
page read and write
|
||
C852CFD000
|
stack
|
page read and write
|
||
23F53D86000
|
heap
|
page read and write
|
||
19272E59000
|
heap
|
page read and write
|
||
23F5446E000
|
heap
|
page read and write
|
||
24EFE65D000
|
heap
|
page read and write
|
||
23F53D5C000
|
heap
|
page read and write
|
||
23F5446A000
|
heap
|
page read and write
|
||
F86847D000
|
stack
|
page read and write
|
||
28107202000
|
trusted library allocation
|
page read and write
|
||
23F53D74000
|
heap
|
page read and write
|
||
23F53D51000
|
heap
|
page read and write
|
||
23F53D7E000
|
heap
|
page read and write
|
||
23F53D68000
|
heap
|
page read and write
|
||
21FF0B8E000
|
heap
|
page read and write
|
||
23F53D74000
|
heap
|
page read and write
|
||
23F544A5000
|
heap
|
page read and write
|
||
23F54604000
|
heap
|
page read and write
|
||
23F53D6B000
|
heap
|
page read and write
|
||
24EFE65B000
|
heap
|
page read and write
|
||
133D9602000
|
heap
|
page read and write
|
||
23F53D7D000
|
heap
|
page read and write
|
||
194E2B20000
|
heap
|
page read and write
|
||
23F53DA3000
|
heap
|
page read and write
|
||
23F53D61000
|
heap
|
page read and write
|
||
23F544CD000
|
heap
|
page read and write
|
||
23F53D95000
|
heap
|
page read and write
|
||
23F53D6B000
|
heap
|
page read and write
|
||
1AC497B000
|
stack
|
page read and write
|
||
23F544BD000
|
heap
|
page read and write
|
||
23F53D31000
|
heap
|
page read and write
|
||
24CC8B02000
|
heap
|
page read and write
|
||
4EC4C7B000
|
stack
|
page read and write
|
||
23F54502000
|
heap
|
page read and write
|
||
28106B02000
|
heap
|
page read and write
|
||
23F53D2C000
|
heap
|
page read and write
|
||
1AC4A77000
|
stack
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
F9FDCFE000
|
stack
|
page read and write
|
||
23F53D79000
|
heap
|
page read and write
|
||
23F53D6D000
|
heap
|
page read and write
|
There are 1176 hidden memdumps, click here to show them.