Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\1000015002\b74664dd7e.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\acentric[1].exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\crypted[1].exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\gold[1].exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\newbundle2[1].exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\2[1].exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\Blenar[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\random[2].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\stealc_default2[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\2[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\66ed86be077bb_12[1].exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\needmoney[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\LummaC222222[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\penis[1].exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\splwow64[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000002001\3ec4738210.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000002001\gold.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000019101\6dbb7bdf47.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000020001\610cd559ac.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000284001\acentric.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000285001\2.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000287001\splwow64.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000290001\crypted.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000308001\4d72d15151.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000314001\LummaC222222.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000318001\66ed86be077bb_12.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000321001\2.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000322001\newbundle2.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000340001\Blenar.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_b74664dd7e.exe_cf7a3cd6c9b1a122416f4df9f48741532183e75_30c7fb27_dd540fbb-80bb-426d-bdec-35c8bb8a7d98\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_3ec4738210.exe_dba66ca2d98846d9bd340a97d0db27b1eea2da_0679789e_d94d0ac4-b190-456c-bcd1-a2bb75eab446\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_3ec4738210.exe_dba66ca2d98846d9bd340a97d0db27b1eea2da_0679789e_ebebe12a-f956-424e-ae8e-9651352ccfe5\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4E9C.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Sep 24 15:34:15 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4FA6.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4FD6.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAF3F.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Sep 24 15:33:35 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB0C7.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB0F6.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD1C6.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Sep 24 15:34:49 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD2C1.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD2F1.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\Public\Desktop\Google Chrome.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working
directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Thu Oct 5 06:54:40 2023,
atime=Wed Sep 27 08:36:54 2023, length=3242272, window=hide
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\gold.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Tmp1F00.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Tmp1F11.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
|
data
|
dropped
|
||
C:\Windows\Tasks\axplong.job
|
data
|
dropped
|
||
C:\Windows\Tasks\skotes.job
|
data
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 48 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
"C:\Users\user~1\AppData\Local\Temp\abc3bc1985\skotes.exe"
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
C:\Users\user~1\AppData\Local\Temp\abc3bc1985\skotes.exe
|
||
C:\Users\user\AppData\Local\Temp\1000002001\3ec4738210.exe
|
"C:\Users\user~1\AppData\Local\Temp\1000002001\3ec4738210.exe"
|
||
C:\Users\user\1000015002\b74664dd7e.exe
|
"C:\Users\user\1000015002\b74664dd7e.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000002001\3ec4738210.exe
|
"C:\Users\user~1\AppData\Local\Temp\1000002001\3ec4738210.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000019101\6dbb7bdf47.exe
|
"C:\Users\user~1\AppData\Local\Temp\1000019101\6dbb7bdf47.exe"
|
||
C:\Users\user\1000015002\b74664dd7e.exe
|
"C:\Users\user\1000015002\b74664dd7e.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000020001\610cd559ac.exe
|
"C:\Users\user~1\AppData\Local\Temp\1000020001\610cd559ac.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000002001\3ec4738210.exe
|
"C:\Users\user~1\AppData\Local\Temp\1000002001\3ec4738210.exe"
|
||
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
|
"C:\Users\user~1\AppData\Local\Temp\44111dbc49\axplong.exe"
|
||
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
|
C:\Users\user~1\AppData\Local\Temp\44111dbc49\axplong.exe
|
||
C:\Users\user\1000015002\b74664dd7e.exe
|
"C:\Users\user\1000015002\b74664dd7e.exe"
|
||
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
|
C:\Users\user~1\AppData\Local\Temp\44111dbc49\axplong.exe
|
||
C:\Users\user\AppData\Local\Temp\1000002001\gold.exe
|
"C:\Users\user~1\AppData\Local\Temp\1000002001\gold.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
|
C:\Users\user~1\AppData\Local\Temp\44111dbc49\axplong.exe
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7672 -s 1512
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 1500
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7812 -s 1512
|
There are 11 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://147.45.44.104/malesa/66ed86be077bb_12.exe01
|
unknown
|
||
http://185.215.113.37/X
|
unknown
|
||
http://185.215.113.37/O
|
unknown
|
||
http://185.215.113.37/
|
185.215.113.37
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
|
unknown
|
||
http://tempuri.org/Entity/Id23ResponseD
|
unknown
|
||
http://185.215.113.117/inc/needmoney.exeYk
|
unknown
|
||
http://tempuri.org/Entity/Id12Response
|
unknown
|
||
http://tempuri.org/
|
unknown
|
||
http://tempuri.org/Entity/Id2Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
|
unknown
|
||
http://tempuri.org/Entity/Id21Response
|
unknown
|
||
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
|
unknown
|
||
http://185.215.113.37/H
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
|
unknown
|
||
http://tempuri.org/Entity/Id6ResponseD
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
|
unknown
|
||
https://www.leopardi.nl/frm/_vti_cnf/Blenar.exey
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpk
|
unknown
|
||
http://103.130.147.211/Files/2.exe
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
|
unknown
|
||
http://tempuri.org/Entity/Id13ResponseD
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
|
unknown
|
||
http://185.215.113.117/inc/gold.exe
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat
|
unknown
|
||
http://tempuri.org/Entity/Id15Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
|
unknown
|
||
http://185.215.113.37/ata
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
|
unknown
|
||
https://api.ip.sb/ip
|
unknown
|
||
https://www.leopardi.nl/frm/_vti_cnf/Blenar.exe
|
46.19.218.204
|
||
http://tempuri.org/Entity/Id1ResponseD
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
|
unknown
|
||
http://185.215.113.100/steam/random.exe
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.php020001
|
unknown
|
||
http://tempuri.org/Entity/Id24Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
|
unknown
|
||
http://tempuri.org/Entity/Id21ResponseD
|
unknown
|
||
http://185.215.113.16/dobre/splwow64.exe
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing
|
unknown
|
||
https://www.leopardi.nl/frm/_vti_cnf/Blenar.exeC
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
|
unknown
|
||
http://194.116.215.195/12dsvc.exe
|
unknown
|
||
http://tempuri.org/Entity/Id10ResponseD
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
|
unknown
|
||
http://tempuri.org/Entity/Id5Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
|
unknown
|
||
http://tempuri.org/Entity/Id15ResponseD
|
unknown
|
||
http://tempuri.org/Entity/Id10Response
|
unknown
|
||
http://185.215.113.16/inc/2.exe
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
|
unknown
|
||
http://tempuri.org/Entity/Id8Response
|
unknown
|
||
http://185.215.113.43/15.113.43/fae1daa8e9eb4e4f9b5846d934f48b15eaa495c49##R
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpR
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpO
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
|
unknown
|
||
http://tempuri.org/D
|
unknown
|
||
http://185.215.113.26/Nework.exe
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/06/addressingex
|
unknown
|
||
http://185.215.113.37I
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
|
unknown
|
||
http://185.215.113.16/Jo89Ku7d/index.php1K
|
unknown
|
||
http://185.215.113.37/tSwf
|
unknown
|
||
http://103.130.147.211/Files/2.exeR
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpWindows
|
unknown
|
||
http://tempuri.org/Entity/Id13Response
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
|
unknown
|
||
http://tempuri.org/Entity/Id12ResponseD
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
|
unknown
|
||
http://185.215.113.37m
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
|
unknown
|
||
http://185.215.113.16/inc/penis.exe
|
unknown
|
||
http://tempuri.org/Entity/Id7ResponseD
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpoft
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.leopardi.nl
|
46.19.218.204
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.43
|
unknown
|
Portugal
|
||
185.215.113.37
|
unknown
|
Portugal
|
||
103.130.147.211
|
unknown
|
Turkey
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
95.179.250.45
|
unknown
|
Netherlands
|
||
194.116.215.195
|
unknown
|
unknown
|
||
185.215.113.100
|
unknown
|
Portugal
|
||
185.215.113.26
|
unknown
|
Portugal
|
||
46.19.218.204
|
www.leopardi.nl
|
Netherlands
|
||
147.45.44.104
|
unknown
|
Russian Federation
|
||
185.215.113.117
|
unknown
|
Portugal
|
||
185.215.113.103
|
unknown
|
Portugal
|
There are 2 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
3ec4738210.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
b74664dd7e.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
splwow64.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
4d72d15151.exe
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
|
Blob
|
||
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
|
ProgramId
|
||
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
|
FileId
|
||
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
|
LowerCaseLongPath
|
||
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
|
LongPathHash
|
||
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
|
Name
|
||
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
|
OriginalFileName
|
||
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
|
Publisher
|
||
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
|
Version
|
||
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
|
BinFileVersion
|
||
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
|
BinaryType
|
||
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
|
ProductName
|
||
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
|
ProductVersion
|
||
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
|
LinkDate
|
||
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
|
BinProductVersion
|
||
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
|
AppxPackageFullName
|
||
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
|
Size
|
||
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
|
Language
|
||
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
|
ProgramId
|
||
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
|
FileId
|
||
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
|
LowerCaseLongPath
|
||
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
|
LongPathHash
|
||
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
|
Name
|
||
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
|
OriginalFileName
|
||
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
|
Publisher
|
||
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
|
Version
|
||
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
|
BinFileVersion
|
||
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
|
BinaryType
|
||
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
|
ProductName
|
||
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
|
ProductVersion
|
||
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
|
LinkDate
|
||
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
|
BinProductVersion
|
||
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
|
AppxPackageFullName
|
||
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
|
Size
|
||
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
|
Language
|
||
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018C00E70D16E40
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
There are 43 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
DA1000
|
unkown
|
page execute and read and write
|
||
DB1000
|
unkown
|
page execute and read and write
|
||
4950000
|
direct allocation
|
page read and write
|
||
4EE0000
|
direct allocation
|
page read and write
|
||
4AB0000
|
direct allocation
|
page read and write
|
||
5DA000
|
unkown
|
page execute and read and write
|
||
541000
|
unkown
|
page execute and read and write
|
||
201000
|
unkown
|
page execute and read and write
|
||
D88000
|
heap
|
page read and write
|
||
201000
|
unkown
|
page execute and read and write
|
||
3775000
|
trusted library allocation
|
page read and write
|
||
201000
|
unkown
|
page execute and read and write
|
||
6F1000
|
unkown
|
page execute and read and write
|
||
F1B000
|
heap
|
page read and write
|
||
6F1000
|
unkown
|
page execute and read and write
|
||
6F1000
|
unkown
|
page execute and read and write
|
||
52E0000
|
direct allocation
|
page read and write
|
||
5450000
|
direct allocation
|
page read and write
|
||
E1000
|
unkown
|
page execute and read and write
|
||
4E50000
|
direct allocation
|
page read and write
|
||
4F00000
|
direct allocation
|
page read and write
|
||
12EC000
|
heap
|
page read and write
|
||
4C60000
|
direct allocation
|
page read and write
|
||
29A000
|
unkown
|
page execute and read and write
|
||
541000
|
unkown
|
page execute and read and write
|
||
F7C000
|
heap
|
page read and write
|
||
29A000
|
unkown
|
page execute and read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
3274000
|
trusted library allocation
|
page read and write
|
||
541000
|
unkown
|
page execute and read and write
|
||
4F80000
|
direct allocation
|
page read and write
|
||
4A70000
|
direct allocation
|
page read and write
|
||
4BE0000
|
direct allocation
|
page read and write
|
||
6F1000
|
unkown
|
page execute and read and write
|
||
122B000
|
heap
|
page read and write
|
||
5320000
|
direct allocation
|
page read and write
|
||
DB1000
|
unkown
|
page execute and read and write
|
||
FAB000
|
heap
|
page read and write
|
||
4D00000
|
direct allocation
|
page read and write
|
||
4E60000
|
direct allocation
|
page read and write
|
||
489F000
|
stack
|
page read and write
|
||
12CA000
|
heap
|
page read and write
|
||
5160000
|
direct allocation
|
page execute and read and write
|
||
945E000
|
stack
|
page read and write
|
||
DF1000
|
unkown
|
page execute read
|
||
4861000
|
heap
|
page read and write
|
||
4E70000
|
direct allocation
|
page read and write
|
||
4F41000
|
direct allocation
|
page read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
DA0000
|
unkown
|
page readonly
|
||
1084000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
4E20000
|
direct allocation
|
page read and write
|
||
288000
|
unkown
|
page execute and read and write
|
||
667E000
|
heap
|
page read and write
|
||
71C0000
|
trusted library allocation
|
page execute and read and write
|
||
1CCAE000
|
stack
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
384F000
|
trusted library allocation
|
page read and write
|
||
4E30000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
15C000
|
stack
|
page read and write
|
||
38BF000
|
stack
|
page read and write
|
||
5602000
|
trusted library allocation
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
1D28E000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
1710000
|
direct allocation
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
EDB000
|
stack
|
page read and write
|
||
1463000
|
heap
|
page read and write
|
||
4850000
|
direct allocation
|
page read and write
|
||
5660000
|
direct allocation
|
page execute and read and write
|
||
418F000
|
stack
|
page read and write
|
||
391F000
|
stack
|
page read and write
|
||
74E000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
3F2E000
|
stack
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
35DF000
|
stack
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
12DF000
|
stack
|
page read and write
|
||
2870000
|
direct allocation
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
DD2000
|
heap
|
page read and write
|
||
54A0000
|
direct allocation
|
page execute and read and write
|
||
36F5000
|
trusted library allocation
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
4E81000
|
heap
|
page read and write
|
||
444E000
|
stack
|
page read and write
|
||
4FC1000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
2E37000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
4DB0000
|
direct allocation
|
page execute and read and write
|
||
498E000
|
stack
|
page read and write
|
||
6EAE000
|
trusted library allocation
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
422F000
|
stack
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
382F000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
5540000
|
direct allocation
|
page execute and read and write
|
||
2BAF000
|
stack
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
F5E000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
E54000
|
heap
|
page read and write
|
||
9FD000
|
unkown
|
page execute and read and write
|
||
45F1000
|
heap
|
page read and write
|
||
3F8F000
|
stack
|
page read and write
|
||
17AE000
|
stack
|
page read and write
|
||
1D00D000
|
stack
|
page read and write
|
||
3D4F000
|
stack
|
page read and write
|
||
4F80000
|
direct allocation
|
page read and write
|
||
6370000
|
heap
|
page read and write
|
||
1020000
|
direct allocation
|
page read and write
|
||
698C000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
2D6E000
|
stack
|
page read and write
|
||
4A30000
|
trusted library allocation
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
380A000
|
trusted library allocation
|
page read and write
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
486E000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
4775000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
411F000
|
stack
|
page read and write
|
||
5130000
|
direct allocation
|
page execute and read and write
|
||
E74000
|
heap
|
page read and write
|
||
4850000
|
direct allocation
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
4E20000
|
direct allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
1278000
|
unkown
|
page execute and read and write
|
||
4910000
|
heap
|
page read and write
|
||
2AF0000
|
direct allocation
|
page read and write
|
||
FDA000
|
heap
|
page read and write
|
||
34AE000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
14E5000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
39AE000
|
stack
|
page read and write
|
||
4C1B000
|
stack
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
49B0000
|
heap
|
page read and write
|
||
3C2E000
|
stack
|
page read and write
|
||
3C4E000
|
stack
|
page read and write
|
||
39DE000
|
stack
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
F20000
|
direct allocation
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
2870000
|
direct allocation
|
page read and write
|
||
49B1000
|
direct allocation
|
page read and write
|
||
6EAB000
|
trusted library allocation
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
F20000
|
direct allocation
|
page read and write
|
||
201000
|
unkown
|
page execute and write copy
|
||
47E1000
|
heap
|
page read and write
|
||
28A0000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
4AC0000
|
direct allocation
|
page execute and read and write
|
||
55C0000
|
direct allocation
|
page execute and read and write
|
||
A3C000
|
unkown
|
page execute and write copy
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
4E31000
|
heap
|
page read and write
|
||
661F000
|
stack
|
page read and write
|
||
320F000
|
stack
|
page read and write
|
||
3B8E000
|
stack
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
5910000
|
trusted library allocation
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
4650000
|
heap
|
page read and write
|
||
720000
|
direct allocation
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
2F77000
|
heap
|
page read and write
|
||
4E20000
|
direct allocation
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
1D3B2000
|
heap
|
page read and write
|
||
720000
|
direct allocation
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
2AF0000
|
direct allocation
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
4BEF000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
2BD000
|
unkown
|
page execute and read and write
|
||
3B7E000
|
stack
|
page read and write
|
||
2D3C000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
7000000
|
trusted library allocation
|
page execute and read and write
|
||
E54000
|
heap
|
page read and write
|
||
67BE000
|
stack
|
page read and write
|
||
3E8F000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
42BF000
|
stack
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
F20000
|
direct allocation
|
page read and write
|
||
2B5C000
|
stack
|
page read and write
|
||
2F6F000
|
stack
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
2D1E000
|
stack
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
467F000
|
stack
|
page read and write
|
||
F98000
|
unkown
|
page execute and read and write
|
||
39AF000
|
stack
|
page read and write
|
||
1CDBF000
|
stack
|
page read and write
|
||
3D2F000
|
stack
|
page read and write
|
||
1CDFF000
|
stack
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
E0B000
|
unkown
|
page execute and read and write
|
||
DA1000
|
unkown
|
page execute and write copy
|
||
4861000
|
heap
|
page read and write
|
||
3F3E000
|
stack
|
page read and write
|
||
4E9E000
|
stack
|
page read and write
|
||
4A30000
|
direct allocation
|
page read and write
|
||
81E000
|
heap
|
page read and write
|
||
4FE0000
|
direct allocation
|
page execute and read and write
|
||
6F1000
|
unkown
|
page execute and write copy
|
||
DF1000
|
unkown
|
page execute read
|
||
4861000
|
heap
|
page read and write
|
||
1D1EE000
|
stack
|
page read and write
|
||
2870000
|
direct allocation
|
page read and write
|
||
324E000
|
stack
|
page read and write
|
||
421E000
|
stack
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
C4D000
|
trusted library allocation
|
page read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
135E000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
49AE000
|
stack
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
49EE000
|
stack
|
page read and write
|
||
4FA000
|
stack
|
page read and write
|
||
4B79000
|
stack
|
page read and write
|
||
F20000
|
direct allocation
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
3805000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
4FD0000
|
direct allocation
|
page execute and read and write
|
||
1084000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
429E000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
200000
|
unkown
|
page read and write
|
||
4FF0000
|
heap
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
1D5C4000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
1D4CD000
|
stack
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
322F000
|
stack
|
page read and write
|
||
E8B000
|
heap
|
page read and write
|
||
4A70000
|
direct allocation
|
page read and write
|
||
372F000
|
stack
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
93C000
|
stack
|
page read and write
|
||
395E000
|
stack
|
page read and write
|
||
341E000
|
stack
|
page read and write
|
||
35AE000
|
stack
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
5A7C000
|
stack
|
page read and write
|
||
641F000
|
stack
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
148E000
|
heap
|
page read and write
|
||
5060000
|
direct allocation
|
page execute and read and write
|
||
4DD0000
|
direct allocation
|
page execute and read and write
|
||
4A50000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
432F000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
1D04D000
|
stack
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
5050000
|
direct allocation
|
page execute and read and write
|
||
13C6000
|
trusted library allocation
|
page execute and read and write
|
||
4861000
|
heap
|
page read and write
|
||
4E60000
|
direct allocation
|
page read and write
|
||
3D2F000
|
stack
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
5040000
|
direct allocation
|
page execute and read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
372E000
|
stack
|
page read and write
|
||
3DF000
|
unkown
|
page execute and read and write
|
||
1CDEE000
|
stack
|
page read and write
|
||
1D0EE000
|
stack
|
page read and write
|
||
142F000
|
stack
|
page read and write
|
||
B94000
|
unkown
|
page execute and read and write
|
||
D54000
|
heap
|
page read and write
|
||
14F3000
|
heap
|
page read and write
|
||
3BEF000
|
stack
|
page read and write
|
||
5680000
|
direct allocation
|
page execute and read and write
|
||
E74000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
E3C000
|
stack
|
page read and write
|
||
482F000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
4E81000
|
heap
|
page read and write
|
||
346F000
|
stack
|
page read and write
|
||
36CF000
|
stack
|
page read and write
|
||
44EF000
|
stack
|
page read and write
|
||
392F000
|
stack
|
page read and write
|
||
1CEEF000
|
stack
|
page read and write
|
||
A3C000
|
unkown
|
page execute and write copy
|
||
1D3B0000
|
heap
|
page read and write
|
||
1494000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
6E20000
|
trusted library allocation
|
page execute and read and write
|
||
E54000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
10C2000
|
unkown
|
page execute and write copy
|
||
8D7000
|
unkown
|
page execute and read and write
|
||
5CAD000
|
stack
|
page read and write
|
||
44D0000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
3ACF000
|
stack
|
page read and write
|
||
14EF000
|
heap
|
page read and write
|
||
164E000
|
stack
|
page read and write
|
||
E5C000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
123C000
|
stack
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
6318000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
4F30000
|
heap
|
page read and write
|
||
422F000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
9FE000
|
unkown
|
page execute and write copy
|
||
E54000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
5900000
|
heap
|
page read and write
|
||
5090000
|
direct allocation
|
page execute and read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4C00000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
335F000
|
stack
|
page read and write
|
||
29F0000
|
direct allocation
|
page execute and read and write
|
||
4850000
|
direct allocation
|
page read and write
|
||
121F000
|
stack
|
page read and write
|
||
2C2E000
|
stack
|
page read and write
|
||
4760000
|
heap
|
page read and write
|
||
307F000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
2D9F000
|
stack
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
10D1000
|
unkown
|
page execute and write copy
|
||
322E000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
298E000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
3BEE000
|
stack
|
page read and write
|
||
6EB0000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
6CE000
|
stack
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
3D6F000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
3740000
|
trusted library allocation
|
page read and write
|
||
F3E000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
1CB7F000
|
stack
|
page read and write
|
||
438E000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
E1B000
|
unkown
|
page execute and read and write
|
||
4E31000
|
heap
|
page read and write
|
||
4D9F000
|
stack
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
3714000
|
trusted library allocation
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
472F000
|
stack
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
32FE000
|
trusted library allocation
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
6FC000
|
unkown
|
page execute and read and write
|
||
49E1000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
14B000
|
unkown
|
page execute and read and write
|
||
E54000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
137B000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
468F000
|
stack
|
page read and write
|
||
795F000
|
heap
|
page read and write
|
||
2870000
|
direct allocation
|
page read and write
|
||
4A7E000
|
stack
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
4E40000
|
direct allocation
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
317F000
|
stack
|
page read and write
|
||
50B0000
|
direct allocation
|
page execute and read and write
|
||
DB4000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
F20000
|
direct allocation
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
4E40000
|
direct allocation
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
6ED5000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
426E000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
6FF0000
|
trusted library allocation
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
1020000
|
direct allocation
|
page read and write
|
||
436F000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
6215000
|
heap
|
page read and write
|
||
4FC1000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
4F00000
|
direct allocation
|
page execute and read and write
|
||
461F000
|
stack
|
page read and write
|
||
3B2F000
|
stack
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
44EE000
|
stack
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
4A8F000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
4E50000
|
direct allocation
|
page execute and read and write
|
||
3E1F000
|
stack
|
page read and write
|
||
365E000
|
trusted library allocation
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
3CDE000
|
stack
|
page read and write
|
||
759000
|
unkown
|
page read and write
|
||
B94000
|
unkown
|
page execute and read and write
|
||
4E31000
|
heap
|
page read and write
|
||
12FF000
|
stack
|
page read and write
|
||
367E000
|
trusted library allocation
|
page read and write
|
||
E87000
|
heap
|
page read and write
|
||
65DC000
|
stack
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
897000
|
unkown
|
page execute and write copy
|
||
4BEF000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
9E5000
|
unkown
|
page execute and read and write
|
||
14EB000
|
heap
|
page read and write
|
||
EE0000
|
direct allocation
|
page read and write
|
||
3824000
|
trusted library allocation
|
page read and write
|
||
DCD000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
9EF000
|
unkown
|
page execute and read and write
|
||
4E70000
|
direct allocation
|
page read and write
|
||
5640000
|
direct allocation
|
page execute and read and write
|
||
C94000
|
heap
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
F8E000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
D80000
|
direct allocation
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
34AF000
|
stack
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
43CE000
|
stack
|
page read and write
|
||
385F000
|
stack
|
page read and write
|
||
367E000
|
stack
|
page read and write
|
||
54C0000
|
direct allocation
|
page execute and read and write
|
||
44D1000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
1CC6F000
|
stack
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
4E90000
|
direct allocation
|
page execute and read and write
|
||
1107000
|
heap
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
F75000
|
heap
|
page read and write
|
||
7260000
|
trusted library allocation
|
page execute and read and write
|
||
325E000
|
stack
|
page read and write
|
||
4D61000
|
direct allocation
|
page read and write
|
||
5500000
|
direct allocation
|
page execute and read and write
|
||
4861000
|
heap
|
page read and write
|
||
2C1E000
|
stack
|
page read and write
|
||
107E000
|
stack
|
page read and write
|
||
4A90000
|
direct allocation
|
page execute and read and write
|
||
F00000
|
direct allocation
|
page read and write
|
||
EE0000
|
direct allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
472F000
|
stack
|
page read and write
|
||
7F5000
|
heap
|
page read and write
|
||
44A000
|
unkown
|
page execute and read and write
|
||
45F1000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
BFB000
|
trusted library allocation
|
page execute and read and write
|
||
5060000
|
direct allocation
|
page execute and read and write
|
||
644000
|
heap
|
page read and write
|
||
457E000
|
stack
|
page read and write
|
||
452E000
|
stack
|
page read and write
|
||
6AB0000
|
trusted library allocation
|
page read and write
|
||
3520000
|
trusted library allocation
|
page read and write
|
||
3C9F000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
4E70000
|
direct allocation
|
page execute and read and write
|
||
FF4000
|
heap
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
5520000
|
direct allocation
|
page execute and read and write
|
||
2ADF000
|
stack
|
page read and write
|
||
6E5C000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
4A70000
|
heap
|
page read and write
|
||
201000
|
unkown
|
page execute and write copy
|
||
1D34D000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
E8C000
|
unkown
|
page readonly
|
||
13A0000
|
trusted library allocation
|
page read and write
|
||
3ED000
|
unkown
|
page execute and write copy
|
||
9EF000
|
unkown
|
page execute and read and write
|
||
56FE000
|
stack
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
50CF000
|
stack
|
page read and write
|
||
541000
|
unkown
|
page execute and write copy
|
||
DB0000
|
unkown
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
366E000
|
stack
|
page read and write
|
||
E9D000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
386E000
|
stack
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
358F000
|
stack
|
page read and write
|
||
96E000
|
stack
|
page read and write
|
||
48FF000
|
stack
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
100E000
|
stack
|
page read and write
|
||
6FD000
|
unkown
|
page execute and write copy
|
||
54D0000
|
direct allocation
|
page execute and read and write
|
||
725E000
|
stack
|
page read and write
|
||
C9E000
|
stack
|
page read and write
|
||
375D000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
5070000
|
direct allocation
|
page execute and read and write
|
||
7937000
|
heap
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
5020000
|
direct allocation
|
page execute and read and write
|
||
4861000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
1400000
|
trusted library allocation
|
page execute and read and write
|
||
396F000
|
stack
|
page read and write
|
||
3B6E000
|
stack
|
page read and write
|
||
54B1000
|
direct allocation
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
455F000
|
stack
|
page read and write
|
||
1710000
|
direct allocation
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
4E70000
|
direct allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
170E000
|
stack
|
page read and write
|
||
1CA7E000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
380F000
|
stack
|
page read and write
|
||
1374000
|
heap
|
page read and write
|
||
143D000
|
heap
|
page read and write
|
||
288000
|
unkown
|
page execute and read and write
|
||
384E000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
2870000
|
direct allocation
|
page read and write
|
||
68E000
|
stack
|
page read and write
|
||
3F9E000
|
stack
|
page read and write
|
||
4C9C000
|
stack
|
page read and write
|
||
2870000
|
direct allocation
|
page read and write
|
||
4ED0000
|
direct allocation
|
page read and write
|
||
456E000
|
stack
|
page read and write
|
||
385F000
|
stack
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
41EF000
|
stack
|
page read and write
|
||
200000
|
unkown
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
1085000
|
heap
|
page read and write
|
||
30EE000
|
stack
|
page read and write
|
||
535E000
|
stack
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
1CC6F000
|
stack
|
page read and write
|
||
440F000
|
stack
|
page read and write
|
||
1CE8F000
|
stack
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
13FF000
|
stack
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
1D307000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
44CE000
|
stack
|
page read and write
|
||
7E6000
|
heap
|
page read and write
|
||
7D21000
|
heap
|
page read and write
|
||
3721000
|
trusted library allocation
|
page read and write
|
||
1CD2E000
|
stack
|
page read and write
|
||
3ADF000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
A3C000
|
unkown
|
page execute and read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
107F000
|
unkown
|
page execute and read and write
|
||
DB1000
|
unkown
|
page execute and write copy
|
||
49E1000
|
heap
|
page read and write
|
||
382E000
|
trusted library allocation
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
3F0F000
|
stack
|
page read and write
|
||
150000
|
unkown
|
page execute and read and write
|
||
5050000
|
direct allocation
|
page execute and read and write
|
||
394F000
|
stack
|
page read and write
|
||
4011000
|
trusted library allocation
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
F5A000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
1CB6E000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
E19000
|
unkown
|
page write copy
|
||
43AE000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
3F1F000
|
stack
|
page read and write
|
||
417F000
|
stack
|
page read and write
|
||
398F000
|
stack
|
page read and write
|
||
5D8E000
|
stack
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
5430000
|
direct allocation
|
page execute and read and write
|
||
451E000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
6E5E000
|
trusted library allocation
|
page read and write
|
||
465E000
|
stack
|
page read and write
|
||
1CCFE000
|
stack
|
page read and write
|
||
2870000
|
direct allocation
|
page read and write
|
||
4E70000
|
direct allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
3747000
|
trusted library allocation
|
page read and write
|
||
7D28000
|
heap
|
page read and write
|
||
1D202000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
386E000
|
stack
|
page read and write
|
||
35EE000
|
stack
|
page read and write
|
||
1D04D000
|
stack
|
page read and write
|
||
1D790000
|
trusted library allocation
|
page read and write
|
||
1020000
|
direct allocation
|
page read and write
|
||
6D48000
|
trusted library allocation
|
page read and write
|
||
E7A000
|
heap
|
page read and write
|
||
E96000
|
heap
|
page read and write
|
||
37EF000
|
stack
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
5625000
|
trusted library allocation
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
5310000
|
direct allocation
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
363F000
|
stack
|
page read and write
|
||
2AF0000
|
direct allocation
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
43EF000
|
stack
|
page read and write
|
||
6360000
|
heap
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
4E20000
|
direct allocation
|
page read and write
|
||
49AF000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
2D30000
|
direct allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
EE0000
|
direct allocation
|
page read and write
|
||
6E52000
|
trusted library allocation
|
page read and write
|
||
D8E000
|
stack
|
page read and write
|
||
2D9F000
|
stack
|
page read and write
|
||
439F000
|
stack
|
page read and write
|
||
F20000
|
direct allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
9650000
|
heap
|
page read and write
|
||
118F000
|
stack
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
3CCE000
|
stack
|
page read and write
|
||
10BB000
|
unkown
|
page execute and read and write
|
||
4761000
|
heap
|
page read and write
|
||
1CCEF000
|
stack
|
page read and write
|
||
69D0000
|
trusted library allocation
|
page execute and read and write
|
||
30EF000
|
stack
|
page read and write
|
||
3EDE000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
633A000
|
heap
|
page read and write
|
||
3499000
|
trusted library allocation
|
page read and write
|
||
50E0000
|
direct allocation
|
page execute and read and write
|
||
52D0000
|
direct allocation
|
page read and write
|
||
35AF000
|
stack
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
78A000
|
unkown
|
page execute and read and write
|
||
5E8000
|
unkown
|
page execute and read and write
|
||
4861000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
1CF4D000
|
stack
|
page read and write
|
||
412E000
|
stack
|
page read and write
|
||
2C9B000
|
stack
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
EC0000
|
unkown
|
page write copy
|
||
1D1C4000
|
heap
|
page read and write
|
||
1D02E000
|
stack
|
page read and write
|
||
31AE000
|
trusted library allocation
|
page read and write
|
||
2DEF000
|
stack
|
page read and write
|
||
1CF4D000
|
stack
|
page read and write
|
||
4E20000
|
direct allocation
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
F97000
|
stack
|
page read and write
|
||
49AF000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
3FDF000
|
stack
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
446F000
|
stack
|
page read and write
|
||
1D38E000
|
stack
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4DFF000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
54E0000
|
direct allocation
|
page execute and read and write
|
||
FFE000
|
heap
|
page read and write
|
||
54E0000
|
direct allocation
|
page execute and read and write
|
||
50A0000
|
direct allocation
|
page execute and read and write
|
||
1CF0D000
|
stack
|
page read and write
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
1CE2E000
|
stack
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
32BE000
|
stack
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
F1E000
|
stack
|
page read and write
|
||
2F6F000
|
stack
|
page read and write
|
||
3EAF000
|
stack
|
page read and write
|
||
371F000
|
stack
|
page read and write
|
||
4870000
|
heap
|
page read and write
|
||
439F000
|
stack
|
page read and write
|
||
353E000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
1CFCF000
|
stack
|
page read and write
|
||
45E000
|
unkown
|
page execute and read and write
|
||
2EE7000
|
heap
|
page read and write
|
||
A3C000
|
stack
|
page read and write
|
||
1200000
|
direct allocation
|
page read and write
|
||
2EAF000
|
stack
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
5790000
|
heap
|
page read and write
|
||
164F000
|
heap
|
page read and write
|
||
1D24F000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
9C3000
|
trusted library allocation
|
page execute and read and write
|
||
4A71000
|
heap
|
page read and write
|
||
401E000
|
stack
|
page read and write
|
||
391E000
|
stack
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
42EB000
|
trusted library allocation
|
page read and write
|
||
10D2000
|
unkown
|
page execute and write copy
|
||
720000
|
direct allocation
|
page read and write
|
||
4A3F000
|
stack
|
page read and write
|
||
EE0000
|
direct allocation
|
page read and write
|
||
807000
|
heap
|
page read and write
|
||
3F6F000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
3DEE000
|
stack
|
page read and write
|
||
34AE000
|
stack
|
page read and write
|
||
3D0F000
|
stack
|
page read and write
|
||
56B2000
|
trusted library allocation
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
4FF0000
|
direct allocation
|
page execute and read and write
|
||
5E8000
|
unkown
|
page execute and read and write
|
||
752000
|
unkown
|
page execute and read and write
|
||
FA8000
|
unkown
|
page execute and read and write
|
||
809000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
3ACE000
|
stack
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
3673000
|
trusted library allocation
|
page read and write
|
||
4E88000
|
stack
|
page read and write
|
||
424E000
|
stack
|
page read and write
|
||
2CDE000
|
stack
|
page read and write
|
||
331C000
|
trusted library allocation
|
page read and write
|
||
426E000
|
stack
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
3FEF000
|
stack
|
page read and write
|
||
6ED000
|
unkown
|
page execute and read and write
|
||
4A71000
|
heap
|
page read and write
|
||
79E000
|
unkown
|
page execute and read and write
|
||
6F1000
|
unkown
|
page execute and write copy
|
||
322E000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
EB2000
|
unkown
|
page readonly
|
||
4A71000
|
heap
|
page read and write
|
||
4E80000
|
heap
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
34EF000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
3A5E000
|
stack
|
page read and write
|
||
114F000
|
stack
|
page read and write
|
||
4D3E000
|
stack
|
page read and write
|
||
336E000
|
stack
|
page read and write
|
||
5170000
|
direct allocation
|
page execute and read and write
|
||
4A4F000
|
stack
|
page read and write
|
||
5450000
|
direct allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
1200000
|
direct allocation
|
page read and write
|
||
1CB2F000
|
stack
|
page read and write
|
||
359F000
|
stack
|
page read and write
|
||
4BF0000
|
direct allocation
|
page execute and read and write
|
||
55E0000
|
direct allocation
|
page execute and read and write
|
||
4E31000
|
heap
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
54A0000
|
direct allocation
|
page execute and read and write
|
||
93E000
|
stack
|
page read and write
|
||
13BE000
|
stack
|
page read and write
|
||
75B000
|
unkown
|
page execute and read and write
|
||
49E1000
|
heap
|
page read and write
|
||
55EE000
|
trusted library allocation
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
6D70000
|
trusted library allocation
|
page read and write
|
||
4FD0000
|
direct allocation
|
page execute and read and write
|
||
2AF0000
|
direct allocation
|
page read and write
|
||
493E000
|
stack
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
5610000
|
direct allocation
|
page execute and read and write
|
||
1020000
|
direct allocation
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
EE0000
|
direct allocation
|
page read and write
|
||
419F000
|
stack
|
page read and write
|
||
370F000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
720000
|
direct allocation
|
page read and write
|
||
3AAF000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
3527000
|
trusted library allocation
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
410E000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
329F000
|
stack
|
page read and write
|
||
3D5F000
|
stack
|
page read and write
|
||
A2D000
|
unkown
|
page execute and read and write
|
||
4631000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
2AF0000
|
direct allocation
|
page read and write
|
||
10B3000
|
unkown
|
page execute and read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
17F0000
|
heap
|
page read and write
|
||
4BF0000
|
trusted library allocation
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
4B10000
|
direct allocation
|
page execute and read and write
|
||
644000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
2F6C000
|
stack
|
page read and write
|
||
174F000
|
stack
|
page read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
5070000
|
direct allocation
|
page execute and read and write
|
||
EE0000
|
direct allocation
|
page read and write
|
||
6E79000
|
trusted library allocation
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
560B000
|
stack
|
page read and write
|
||
55E0000
|
direct allocation
|
page execute and read and write
|
||
4ED0000
|
direct allocation
|
page execute and read and write
|
||
37D9000
|
trusted library allocation
|
page read and write
|
||
35EF000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
3FAF000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
1623000
|
heap
|
page read and write
|
||
4E00000
|
direct allocation
|
page execute and read and write
|
||
6E00000
|
trusted library allocation
|
page execute and read and write
|
||
9F0000
|
heap
|
page read and write
|
||
4A9F000
|
stack
|
page read and write
|
||
797F000
|
heap
|
page read and write
|
||
55E0000
|
direct allocation
|
page execute and read and write
|
||
1D24C000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
B94000
|
unkown
|
page execute and read and write
|
||
2D2F000
|
stack
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
D7B000
|
heap
|
page read and write
|
||
294E000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
75B000
|
unkown
|
page execute and read and write
|
||
4761000
|
heap
|
page read and write
|
||
475F000
|
stack
|
page read and write
|
||
5C6D000
|
stack
|
page read and write
|
||
4A30000
|
direct allocation
|
page read and write
|
||
51FE000
|
stack
|
page read and write
|
||
3C6E000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
4DEF000
|
stack
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
1200000
|
direct allocation
|
page read and write
|
||
452F000
|
stack
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
300E000
|
stack
|
page read and write
|
||
2A07000
|
heap
|
page read and write
|
||
436F000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
34EE000
|
stack
|
page read and write
|
||
315F000
|
stack
|
page read and write
|
||
4D1F000
|
stack
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
1D650000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
5920000
|
trusted library allocation
|
page execute and read and write
|
||
44D1000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
2C9F000
|
stack
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
1200000
|
direct allocation
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
10BB000
|
unkown
|
page execute and read and write
|
||
2D0F000
|
stack
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
720000
|
direct allocation
|
page read and write
|
||
1C93E000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
3A8F000
|
stack
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
E82000
|
heap
|
page read and write
|
||
5080000
|
direct allocation
|
page execute and read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
4FC0000
|
direct allocation
|
page execute and read and write
|
||
1D4AE000
|
stack
|
page read and write
|
||
46DE000
|
stack
|
page read and write
|
||
2772000
|
trusted library allocation
|
page execute and read and write
|
||
2CFF000
|
stack
|
page read and write
|
||
619E000
|
stack
|
page read and write
|
||
4A70000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
453F000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4E70000
|
direct allocation
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
6E10000
|
trusted library allocation
|
page execute and read and write
|
||
351F000
|
stack
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
49DF000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
79C5000
|
heap
|
page read and write
|
||
377F000
|
stack
|
page read and write
|
||
5DAC000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
3A3000
|
unkown
|
page execute and read and write
|
||
1084000
|
heap
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
4E60000
|
direct allocation
|
page execute and read and write
|
||
308F000
|
stack
|
page read and write
|
||
5E6B000
|
stack
|
page read and write
|
||
44EE000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
4610000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
1B0000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
4E70000
|
direct allocation
|
page read and write
|
||
364C000
|
trusted library allocation
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
1D18D000
|
stack
|
page read and write
|
||
1C8EE000
|
stack
|
page read and write
|
||
752000
|
unkown
|
page execute and read and write
|
||
C94000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
A23000
|
unkown
|
page execute and read and write
|
||
EDC000
|
stack
|
page read and write
|
||
3CEF000
|
stack
|
page read and write
|
||
44E0000
|
heap
|
page read and write
|
||
335F000
|
stack
|
page read and write
|
||
469F000
|
stack
|
page read and write
|
||
6360000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
6F0000
|
unkown
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
7C80000
|
heap
|
page read and write
|
||
34CE000
|
stack
|
page read and write
|
||
378F000
|
stack
|
page read and write
|
||
55F6000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
42AF000
|
stack
|
page read and write
|
||
3D2E000
|
stack
|
page read and write
|
||
3D8E000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
A3D000
|
unkown
|
page execute and write copy
|
||
6F0000
|
unkown
|
page readonly
|
||
7050000
|
trusted library allocation
|
page execute and read and write
|
||
1084000
|
heap
|
page read and write
|
||
30CF000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
3FCF000
|
stack
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
3637000
|
trusted library allocation
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
2BDE000
|
stack
|
page read and write
|
||
6900000
|
trusted library allocation
|
page read and write
|
||
1416000
|
heap
|
page read and write
|
||
3A9E000
|
stack
|
page read and write
|
||
1CCBE000
|
stack
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
49F0000
|
heap
|
page read and write
|
||
3DAF000
|
stack
|
page read and write
|
||
47F0000
|
heap
|
page read and write
|
||
9FD000
|
unkown
|
page execute and read and write
|
||
476E000
|
stack
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
935E000
|
stack
|
page read and write
|
||
4133000
|
trusted library allocation
|
page read and write
|
||
1710000
|
direct allocation
|
page read and write
|
||
132E000
|
stack
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
348E000
|
stack
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
3C5E000
|
stack
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
399F000
|
stack
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
336F000
|
stack
|
page read and write
|
||
54F0000
|
direct allocation
|
page execute and read and write
|
||
DB4000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
4FD0000
|
direct allocation
|
page execute and read and write
|
||
2C20000
|
heap
|
page read and write
|
||
50B0000
|
direct allocation
|
page execute and read and write
|
||
2BC7000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
4BE0000
|
direct allocation
|
page execute and read and write
|
||
67B5000
|
heap
|
page read and write
|
||
1710000
|
direct allocation
|
page read and write
|
||
442E000
|
stack
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
4D50000
|
direct allocation
|
page execute and read and write
|
||
3D6E000
|
stack
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
4BA0000
|
trusted library allocation
|
page read and write
|
||
A3C000
|
unkown
|
page execute and write copy
|
||
2C5F000
|
stack
|
page read and write
|
||
389E000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
50C0000
|
direct allocation
|
page execute and read and write
|
||
6920000
|
trusted library allocation
|
page read and write
|
||
4BAF000
|
stack
|
page read and write
|
||
449E000
|
stack
|
page read and write
|
||
2CCF000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
4F30000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
40EF000
|
stack
|
page read and write
|
||
285000
|
unkown
|
page execute and read and write
|
||
282C000
|
stack
|
page read and write
|
||
5381000
|
direct allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
39CE000
|
stack
|
page read and write
|
||
1D10F000
|
stack
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
4E81000
|
heap
|
page read and write
|
||
9FA000
|
heap
|
page read and write
|
||
47DF000
|
stack
|
page read and write
|
||
6EC8000
|
heap
|
page read and write
|
||
FA3000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
328F000
|
stack
|
page read and write
|
||
1328000
|
heap
|
page read and write
|
||
3FAE000
|
stack
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
3C1F000
|
stack
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
104A000
|
heap
|
page read and write
|
||
2AF0000
|
direct allocation
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
382F000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
2AF0000
|
direct allocation
|
page read and write
|
||
4FC1000
|
heap
|
page read and write
|
||
622000
|
unkown
|
page execute and read and write
|
||
54A0000
|
direct allocation
|
page execute and read and write
|
||
4631000
|
heap
|
page read and write
|
||
BD6000
|
unkown
|
page execute and read and write
|
||
13AD000
|
trusted library allocation
|
page execute and read and write
|
||
E8C000
|
unkown
|
page readonly
|
||
6EBF000
|
heap
|
page read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
45F1000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
1409000
|
heap
|
page read and write
|
||
31DF000
|
trusted library allocation
|
page read and write
|
||
7FF000
|
stack
|
page read and write
|
||
3FEE000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
6FD000
|
unkown
|
page execute and write copy
|
||
37AE000
|
trusted library allocation
|
page read and write
|
||
47AF000
|
stack
|
page read and write
|
||
2D30000
|
direct allocation
|
page read and write
|
||
3AEE000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
4E70000
|
direct allocation
|
page read and write
|
||
2FAF000
|
stack
|
page read and write
|
||
34AE000
|
stack
|
page read and write
|
||
46CE000
|
stack
|
page read and write
|
||
3E9F000
|
stack
|
page read and write
|
||
446000
|
remote allocation
|
page execute and read and write
|
||
F20000
|
direct allocation
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
4BBE000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
955E000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
316E000
|
stack
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
B3D000
|
stack
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
44D1000
|
heap
|
page read and write
|
||
3302000
|
trusted library allocation
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
80A000
|
heap
|
page read and write
|
||
338F000
|
stack
|
page read and write
|
||
1D08D000
|
stack
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
55E0000
|
direct allocation
|
page execute and read and write
|
||
F20000
|
direct allocation
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
FCE000
|
stack
|
page read and write
|
||
5100000
|
direct allocation
|
page execute and read and write
|
||
E54000
|
heap
|
page read and write
|
||
369E000
|
stack
|
page read and write
|
||
2E0F000
|
stack
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
2DAE000
|
stack
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
13D0000
|
trusted library allocation
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
11EE000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
30DF000
|
stack
|
page read and write
|
||
50D0000
|
direct allocation
|
page execute and read and write
|
||
4631000
|
heap
|
page read and write
|
||
3DBF000
|
stack
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
47BF000
|
stack
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
3D4E000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
9EF000
|
unkown
|
page execute and read and write
|
||
44D1000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
6D78000
|
trusted library allocation
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
5490000
|
direct allocation
|
page execute and read and write
|
||
A3C000
|
unkown
|
page execute and read and write
|
||
33BF000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
305E000
|
stack
|
page read and write
|
||
5A40000
|
trusted library allocation
|
page execute and read and write
|
||
599000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
1020000
|
direct allocation
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
4E81000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
484F000
|
stack
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
2D67000
|
heap
|
page read and write
|
||
2D97000
|
heap
|
page read and write
|
||
43DE000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
4C60000
|
direct allocation
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
406D000
|
stack
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
DB0000
|
unkown
|
page readonly
|
||
2E4F000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
4FB0000
|
direct allocation
|
page execute and read and write
|
||
E19000
|
unkown
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
38AE000
|
stack
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
593E000
|
stack
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
3FEE000
|
stack
|
page read and write
|
||
12CE000
|
heap
|
page read and write
|
||
95A0000
|
trusted library allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
C30000
|
trusted library allocation
|
page execute and read and write
|
||
5100000
|
direct allocation
|
page execute and read and write
|
||
4A90000
|
direct allocation
|
page execute and read and write
|
||
143B000
|
heap
|
page read and write
|
||
2C27000
|
heap
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
2C7000
|
unkown
|
page execute and read and write
|
||
541F000
|
stack
|
page read and write
|
||
3D9D000
|
stack
|
page read and write
|
||
2D30000
|
direct allocation
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
49C000
|
stack
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
466F000
|
stack
|
page read and write
|
||
80A000
|
heap
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
6E61000
|
trusted library allocation
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
9D4000
|
trusted library allocation
|
page read and write
|
||
416F000
|
stack
|
page read and write
|
||
6E3000
|
unkown
|
page execute and read and write
|
||
4861000
|
heap
|
page read and write
|
||
3FAF000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
CFE000
|
stack
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
4032000
|
trusted library allocation
|
page read and write
|
||
F20000
|
direct allocation
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
2D30000
|
direct allocation
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
314F000
|
stack
|
page read and write
|
||
7C70000
|
heap
|
page read and write
|
||
344F000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
431F000
|
stack
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
5E8000
|
unkown
|
page execute and read and write
|
||
48AE000
|
stack
|
page read and write
|
||
BEF000
|
stack
|
page read and write
|
||
F3B000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
127A000
|
unkown
|
page execute and write copy
|
||
4850000
|
direct allocation
|
page read and write
|
||
476E000
|
stack
|
page read and write
|
||
1D09E000
|
stack
|
page read and write
|
||
2E2F000
|
stack
|
page read and write
|
||
2D2F000
|
stack
|
page read and write
|
||
45EF000
|
stack
|
page read and write
|
||
EBC000
|
unkown
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
415E000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
59A000
|
unkown
|
page execute and read and write
|
||
9FE000
|
unkown
|
page execute and write copy
|
||
4E31000
|
heap
|
page read and write
|
||
4F00000
|
direct allocation
|
page read and write
|
||
45F0000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
54B0000
|
direct allocation
|
page execute and read and write
|
||
54B0000
|
direct allocation
|
page execute and read and write
|
||
2B2E000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
13FE000
|
stack
|
page read and write
|
||
E12000
|
unkown
|
page execute and read and write
|
||
E74000
|
heap
|
page read and write
|
||
4B00000
|
direct allocation
|
page execute and read and write
|
||
44D1000
|
heap
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
375E000
|
stack
|
page read and write
|
||
4DE0000
|
direct allocation
|
page execute and read and write
|
||
4A71000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
437000
|
remote allocation
|
page execute and read and write
|
||
4E31000
|
heap
|
page read and write
|
||
4A90000
|
direct allocation
|
page execute and read and write
|
||
DB4000
|
heap
|
page read and write
|
||
2B80000
|
direct allocation
|
page execute and read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
60EF000
|
stack
|
page read and write
|
||
5FD000
|
unkown
|
page execute and read and write
|
||
3DAE000
|
stack
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
4F3B000
|
stack
|
page read and write
|
||
1466000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
5DCE000
|
stack
|
page read and write
|
||
6D35000
|
trusted library allocation
|
page read and write
|
||
411F000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
14F1000
|
heap
|
page read and write
|
||
365F000
|
stack
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
37B7000
|
trusted library allocation
|
page read and write
|
||
9FF000
|
unkown
|
page execute and read and write
|
||
DB4000
|
heap
|
page read and write
|
||
3EFF000
|
stack
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
514C000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
EE0000
|
direct allocation
|
page read and write
|
||
50C0000
|
trusted library allocation
|
page read and write
|
||
1200000
|
direct allocation
|
page read and write
|
||
5060000
|
direct allocation
|
page execute and read and write
|
||
EFD000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
474E000
|
stack
|
page read and write
|
||
3EEE000
|
stack
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
42AE000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
54A0000
|
direct allocation
|
page execute and read and write
|
||
4A30000
|
direct allocation
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
426F000
|
stack
|
page read and write
|
||
3C2E000
|
stack
|
page read and write
|
||
1CFB0000
|
heap
|
page read and write
|
||
30CE000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
612E000
|
stack
|
page read and write
|
||
4BC0000
|
heap
|
page read and write
|
||
4AB0000
|
direct allocation
|
page execute and read and write
|
||
49E1000
|
heap
|
page read and write
|
||
382E000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
426E000
|
stack
|
page read and write
|
||
161B000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
4DC0000
|
direct allocation
|
page execute and read and write
|
||
126C000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
5310000
|
direct allocation
|
page read and write
|
||
6C1C000
|
stack
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
330F000
|
stack
|
page read and write
|
||
9B3000
|
unkown
|
page execute and read and write
|
||
4CF0000
|
direct allocation
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
D7C000
|
stack
|
page read and write
|
||
111E000
|
stack
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
349F000
|
stack
|
page read and write
|
||
5FD000
|
unkown
|
page execute and read and write
|
||
4F10000
|
direct allocation
|
page execute and read and write
|
||
43DE000
|
stack
|
page read and write
|
||
1CF8E000
|
stack
|
page read and write
|
||
2E8E000
|
stack
|
page read and write
|
||
9FD000
|
unkown
|
page execute and write copy
|
||
434F000
|
stack
|
page read and write
|
||
1D304000
|
heap
|
page read and write
|
||
286E000
|
stack
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
137F000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
1CEF0000
|
heap
|
page read and write
|
||
3A1F000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
2D50000
|
heap
|
page read and write
|
||
4E8E000
|
stack
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
3E9F000
|
stack
|
page read and write
|
||
1D30E000
|
stack
|
page read and write
|
||
79A9000
|
heap
|
page read and write
|
||
EE0000
|
direct allocation
|
page read and write
|
||
124F000
|
stack
|
page read and write
|
||
F86000
|
heap
|
page read and write
|
||
432000
|
remote allocation
|
page execute and read and write
|
||
7951000
|
heap
|
page read and write
|
||
49E0000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
FDC000
|
heap
|
page read and write
|
||
1494000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
2E4E000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
BDC000
|
stack
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
6910000
|
trusted library allocation
|
page read and write
|
||
360E000
|
stack
|
page read and write
|
||
38AF000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
35AF000
|
stack
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
17FE000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
495F000
|
stack
|
page read and write
|
||
5510000
|
direct allocation
|
page execute and read and write
|
||
4B00000
|
heap
|
page read and write
|
||
441F000
|
stack
|
page read and write
|
||
E9E000
|
stack
|
page read and write
|
||
4E81000
|
heap
|
page read and write
|
||
27EE000
|
stack
|
page read and write
|
||
32AE000
|
stack
|
page read and write
|
||
3E5E000
|
stack
|
page read and write
|
||
63F9000
|
heap
|
page read and write
|
||
15D0000
|
heap
|
page read and write
|
||
4BD0000
|
direct allocation
|
page execute and read and write
|
||
59EB000
|
trusted library allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
3518000
|
trusted library allocation
|
page read and write
|
||
285000
|
unkown
|
page execute and read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
143E000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
448F000
|
stack
|
page read and write
|
||
148B000
|
heap
|
page read and write
|
||
46AE000
|
stack
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
436E000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
4A00000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
29DE000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
428B000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
127E000
|
heap
|
page read and write
|
||
BD7000
|
unkown
|
page execute and write copy
|
||
44D1000
|
heap
|
page read and write
|
||
404F000
|
stack
|
page read and write
|
||
140E000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
3A3E000
|
stack
|
page read and write
|
||
17EE000
|
stack
|
page read and write
|
||
312F000
|
stack
|
page read and write
|
||
4A30000
|
direct allocation
|
page read and write
|
||
2B17000
|
heap
|
page read and write
|
||
6ED000
|
unkown
|
page execute and read and write
|
||
33DF000
|
stack
|
page read and write
|
||
5CF000
|
unkown
|
page execute and read and write
|
||
720000
|
direct allocation
|
page read and write
|
||
622000
|
unkown
|
page execute and read and write
|
||
45F1000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
4EE0000
|
direct allocation
|
page execute and read and write
|
||
4FEE000
|
stack
|
page read and write
|
||
120F000
|
stack
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
372E000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
486F000
|
stack
|
page read and write
|
||
1268000
|
unkown
|
page execute and read and write
|
||
5DE0000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
362E000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
588F000
|
stack
|
page read and write
|
||
30DF000
|
stack
|
page read and write
|
||
13C0000
|
trusted library allocation
|
page read and write
|
||
3ADF000
|
stack
|
page read and write
|
||
320E000
|
stack
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
389E000
|
stack
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
12BE000
|
stack
|
page read and write
|
||
35DF000
|
stack
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
30B6000
|
trusted library allocation
|
page read and write
|
||
3C0E000
|
stack
|
page read and write
|
||
2EF0000
|
trusted library allocation
|
page read and write
|
||
5500000
|
direct allocation
|
page execute and read and write
|
||
13B0000
|
trusted library allocation
|
page read and write
|
||
4AAB000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
68ED000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
3D5000
|
unkown
|
page execute and read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
55DB000
|
trusted library allocation
|
page read and write
|
||
1CF9F000
|
stack
|
page read and write
|
||
720000
|
direct allocation
|
page read and write
|
||
4C40000
|
direct allocation
|
page execute and read and write
|
||
4861000
|
heap
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
5180000
|
direct allocation
|
page execute and read and write
|
||
458E000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
688C000
|
stack
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
3771000
|
trusted library allocation
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page execute and read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
EE0000
|
direct allocation
|
page read and write
|
||
4FB0000
|
direct allocation
|
page execute and read and write
|
||
4ED0000
|
direct allocation
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
1D5AC000
|
stack
|
page read and write
|
||
37F9000
|
trusted library allocation
|
page read and write
|
||
371F000
|
stack
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
2773000
|
trusted library allocation
|
page read and write
|
||
3A2E000
|
stack
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
290F000
|
stack
|
page read and write
|
||
2E48000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
13F5000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
3FAF000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
4A30000
|
direct allocation
|
page read and write
|
||
3644000
|
trusted library allocation
|
page read and write
|
||
5140000
|
direct allocation
|
page execute and read and write
|
||
49E1000
|
heap
|
page read and write
|
||
5EED000
|
stack
|
page read and write
|
||
4E20000
|
direct allocation
|
page read and write
|
||
435E000
|
stack
|
page read and write
|
||
332F000
|
stack
|
page read and write
|
||
3C6F000
|
stack
|
page read and write
|
||
FB6000
|
heap
|
page read and write
|
||
4A40000
|
heap
|
page read and write
|
||
35EE000
|
stack
|
page read and write
|
||
34DE000
|
stack
|
page read and write
|
||
4876000
|
heap
|
page read and write
|
||
7959000
|
heap
|
page read and write
|
||
200000
|
unkown
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
5341000
|
direct allocation
|
page read and write
|
||
2B97000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
332F000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
6FE0000
|
trusted library allocation
|
page read and write
|
||
3769000
|
trusted library allocation
|
page read and write
|
||
4D5E000
|
stack
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
3812000
|
trusted library allocation
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
1489000
|
heap
|
page read and write
|
||
10D1000
|
unkown
|
page execute and read and write
|
||
4DEE000
|
stack
|
page read and write
|
||
9FE000
|
heap
|
page read and write
|
||
13D7000
|
trusted library allocation
|
page execute and read and write
|
||
4850000
|
direct allocation
|
page read and write
|
||
45CF000
|
stack
|
page read and write
|
||
4E10000
|
direct allocation
|
page execute and read and write
|
||
1710000
|
direct allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
6FC000
|
unkown
|
page execute and read and write
|
||
42DF000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
4761000
|
heap
|
page read and write
|
||
EE0000
|
direct allocation
|
page read and write
|
||
E82000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
7335D000
|
unkown
|
page read and write
|
||
8D7000
|
unkown
|
page execute and read and write
|
||
1449000
|
heap
|
page read and write
|
||
2D4E000
|
stack
|
page read and write
|
||
6D60000
|
trusted library allocation
|
page read and write
|
||
4A90000
|
direct allocation
|
page execute and read and write
|
||
2D0E000
|
stack
|
page read and write
|
||
5C8E000
|
stack
|
page read and write
|
||
52D0000
|
direct allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
611E000
|
stack
|
page read and write
|
||
4F7C000
|
stack
|
page read and write
|
||
2E9F000
|
stack
|
page read and write
|
||
3C5E000
|
stack
|
page read and write
|
||
63C9000
|
heap
|
page read and write
|
||
4E3F000
|
stack
|
page read and write
|
||
FCB000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
52BC000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
1020000
|
direct allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
78A000
|
unkown
|
page execute and read and write
|
||
D54000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
162C000
|
heap
|
page read and write
|
||
1D654000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
2AF0000
|
direct allocation
|
page read and write
|
||
9B3000
|
unkown
|
page execute and read and write
|
||
6200000
|
heap
|
page read and write
|
||
126E000
|
stack
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
1038000
|
heap
|
page read and write
|
||
6D32000
|
trusted library allocation
|
page read and write
|
||
37DE000
|
stack
|
page read and write
|
||
5CC0000
|
trusted library allocation
|
page read and write
|
||
721E000
|
stack
|
page read and write
|
||
3EE000
|
unkown
|
page execute and write copy
|
||
6EA5000
|
trusted library allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
3AAF000
|
stack
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
4861000
|
heap
|
page read and write
|
||
1AEF000
|
stack
|
page read and write
|
||
428E000
|
stack
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
42FE000
|
stack
|
page read and write
|
||
CDE000
|
stack
|
page read and write
|
||
6FC000
|
unkown
|
page execute and write copy
|
||
32DE000
|
stack
|
page read and write
|
||
30EF000
|
stack
|
page read and write
|
||
F20000
|
direct allocation
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
57FF000
|
stack
|
page read and write
|
||
412D000
|
stack
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
44D1000
|
heap
|
page read and write
|
||
40CF000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
CDE000
|
stack
|
page read and write
|
||
1D657000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
821000
|
heap
|
page read and write
|
||
1020000
|
direct allocation
|
page read and write
|
||
163D000
|
heap
|
page read and write
|
||
5490000
|
direct allocation
|
page execute and read and write
|
||
531B000
|
stack
|
page read and write
|
||
55FD000
|
trusted library allocation
|
page read and write
|
||
4E20000
|
direct allocation
|
page read and write
|
||
7FDA0000
|
trusted library allocation
|
page execute and read and write
|
||
3D6E000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
3BCF000
|
stack
|
page read and write
|
||
4FCC000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
4FC0000
|
heap
|
page read and write
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
BD7000
|
unkown
|
page execute and write copy
|
||
4B30000
|
direct allocation
|
page execute and read and write
|
||
EC4000
|
unkown
|
page readonly
|
||
3D2F000
|
stack
|
page read and write
|
||
4BF0000
|
direct allocation
|
page execute and read and write
|
||
4F9F000
|
stack
|
page read and write
|
||
4FC1000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
4800000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
170000
|
heap
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
33CF000
|
stack
|
page read and write
|
||
30EB000
|
trusted library allocation
|
page read and write
|
||
34DE000
|
stack
|
page read and write
|
||
7C6F000
|
stack
|
page read and write
|
||
E55000
|
heap
|
page read and write
|
||
1342000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
A23000
|
unkown
|
page execute and read and write
|
||
45F1000
|
heap
|
page read and write
|
||
1200000
|
direct allocation
|
page read and write
|
||
2771000
|
trusted library allocation
|
page read and write
|
||
386E000
|
stack
|
page read and write
|
||
439F000
|
trusted library allocation
|
page read and write
|
||
431E000
|
stack
|
page read and write
|
||
3E6E000
|
stack
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
2F00000
|
heap
|
page execute and read and write
|
||
45F1000
|
heap
|
page read and write
|
||
63E8000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
1200000
|
direct allocation
|
page read and write
|
||
4A2F000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
52BB000
|
stack
|
page read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
E09000
|
unkown
|
page read and write
|
||
4EA0000
|
direct allocation
|
page execute and read and write
|
||
44DF000
|
stack
|
page read and write
|
||
6E46000
|
trusted library allocation
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
14BA000
|
heap
|
page read and write
|
||
9B0000
|
trusted library allocation
|
page read and write
|
||
E75000
|
heap
|
page read and write
|
||
7C04000
|
heap
|
page read and write
|
||
103B000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
6F1000
|
unkown
|
page execute and write copy
|
||
402E000
|
stack
|
page read and write
|
||
4FDB000
|
stack
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
2B1000
|
unkown
|
page execute and read and write
|
||
549E000
|
stack
|
page read and write
|
||
38EE000
|
stack
|
page read and write
|
||
1710000
|
direct allocation
|
page read and write
|
||
EE0000
|
direct allocation
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
2F8F000
|
stack
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
348F000
|
stack
|
page read and write
|
||
6210000
|
heap
|
page read and write
|
||
2F9F000
|
stack
|
page read and write
|
||
4BE0000
|
heap
|
page read and write
|
||
4850000
|
direct allocation
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
635F000
|
stack
|
page read and write
|
||
752000
|
unkown
|
page execute and read and write
|
||
415E000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
7C2E000
|
stack
|
page read and write
|
||
67FD000
|
stack
|
page read and write
|
||
E87000
|
heap
|
page read and write
|
||
78A000
|
unkown
|
page execute and read and write
|
||
1820000
|
heap
|
page read and write
|
||
2EDF000
|
stack
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
4B40000
|
trusted library allocation
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
332F000
|
stack
|
page read and write
|
||
637C000
|
heap
|
page read and write
|
||
25A000
|
unkown
|
page execute and read and write
|
||
1084000
|
heap
|
page read and write
|
||
5D4E000
|
stack
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
896000
|
unkown
|
page execute and read and write
|
||
44A000
|
unkown
|
page execute and read and write
|
||
4F5000
|
stack
|
page read and write
|
||
3AAF000
|
stack
|
page read and write
|
||
631D000
|
stack
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
54C0000
|
direct allocation
|
page execute and read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
1D19F000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
39FF000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
720000
|
direct allocation
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
2C0F000
|
stack
|
page read and write
|
||
144B000
|
heap
|
page read and write
|
||
1D1AE000
|
stack
|
page read and write
|
||
41CE000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
403F000
|
stack
|
page read and write
|
||
1CDAF000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
720000
|
direct allocation
|
page read and write
|
||
37CE000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
2D4B000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
896000
|
unkown
|
page execute and read and write
|
||
472E000
|
stack
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
13BC000
|
stack
|
page read and write
|
||
3B3F000
|
stack
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
54A0000
|
direct allocation
|
page execute and read and write
|
||
D5A000
|
stack
|
page read and write
|
||
759000
|
unkown
|
page write copy
|
||
4761000
|
heap
|
page read and write
|
||
E0000
|
unkown
|
page readonly
|
||
29D0000
|
direct allocation
|
page execute and read and write
|
||
4861000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4FE0000
|
direct allocation
|
page execute and read and write
|
||
F20000
|
direct allocation
|
page read and write
|
||
4CF0000
|
direct allocation
|
page read and write
|
||
41BE000
|
stack
|
page read and write
|
||
622F000
|
stack
|
page read and write
|
||
2870000
|
direct allocation
|
page read and write
|
||
5150000
|
direct allocation
|
page execute and read and write
|
||
4D1F000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
6ABA000
|
trusted library allocation
|
page read and write
|
||
7CF000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
4A70000
|
direct allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
3F4E000
|
stack
|
page read and write
|
||
2AF0000
|
direct allocation
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
372E000
|
trusted library allocation
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
3B1E000
|
stack
|
page read and write
|
||
1D1C0000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
361E000
|
stack
|
page read and write
|
||
31EF000
|
stack
|
page read and write
|
||
1440000
|
trusted library allocation
|
page read and write
|
||
4880000
|
heap
|
page read and write
|
||
7C00000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
5A50000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
10C3000
|
unkown
|
page execute and read and write
|
||
1D3AF000
|
stack
|
page read and write
|
||
1659000
|
heap
|
page read and write
|
||
55F0000
|
direct allocation
|
page execute and read and write
|
||
1084000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
E0000
|
unkown
|
page read and write
|
||
6F0000
|
unkown
|
page readonly
|
||
2EE0000
|
trusted library allocation
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
47CF000
|
stack
|
page read and write
|
||
5A1E000
|
stack
|
page read and write
|
||
13FE000
|
stack
|
page read and write
|
||
A23000
|
unkown
|
page execute and read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
1710000
|
direct allocation
|
page read and write
|
||
475F000
|
stack
|
page read and write
|
||
5080000
|
direct allocation
|
page execute and read and write
|
||
759000
|
unkown
|
page write copy
|
||
4861000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
346F000
|
stack
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
10D1000
|
unkown
|
page execute and read and write
|
||
F90000
|
heap
|
page read and write
|
||
2DDE000
|
stack
|
page read and write
|
||
1D00E000
|
stack
|
page read and write
|
||
51A0000
|
direct allocation
|
page execute and read and write
|
||
584000
|
unkown
|
page execute and read and write
|
||
49E1000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
106F000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
73341000
|
unkown
|
page execute read
|
||
4761000
|
heap
|
page read and write
|
||
E19000
|
unkown
|
page read and write
|
||
37BE000
|
stack
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
7190000
|
trusted library allocation
|
page read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
CF5000
|
stack
|
page read and write
|
||
7FD000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
1278000
|
unkown
|
page execute and read and write
|
||
14A1000
|
heap
|
page read and write
|
||
9FF000
|
unkown
|
page execute and read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
5060000
|
direct allocation
|
page execute and read and write
|
||
3EAE000
|
stack
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
67B0000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
1D3CD000
|
stack
|
page read and write
|
||
4E20000
|
direct allocation
|
page read and write
|
||
5060000
|
direct allocation
|
page execute and read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
14F9000
|
heap
|
page read and write
|
||
1200000
|
direct allocation
|
page read and write
|
||
12EE000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
374E000
|
stack
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
401F000
|
trusted library allocation
|
page read and write
|
||
5080000
|
direct allocation
|
page execute and read and write
|
||
644000
|
heap
|
page read and write
|
||
3800000
|
trusted library allocation
|
page read and write
|
||
EC4000
|
unkown
|
page readonly
|
||
5440000
|
direct allocation
|
page execute and read and write
|
||
4D6E000
|
stack
|
page read and write
|
||
4E20000
|
trusted library allocation
|
page read and write
|
||
E5E000
|
stack
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
9B3000
|
unkown
|
page execute and read and write
|
||
4AD0000
|
direct allocation
|
page execute and read and write
|
||
F6E000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
4BBC000
|
stack
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
3EAE000
|
stack
|
page read and write
|
||
7EF000
|
stack
|
page read and write
|
||
43AF000
|
stack
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
479E000
|
stack
|
page read and write
|
||
5470000
|
direct allocation
|
page execute and read and write
|
||
73340000
|
unkown
|
page readonly
|
||
540000
|
unkown
|
page readonly
|
||
F40000
|
heap
|
page read and write
|
||
2AF0000
|
direct allocation
|
page read and write
|
||
4E9B000
|
stack
|
page read and write
|
||
5A6A000
|
heap
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
499E000
|
stack
|
page read and write
|
||
792000
|
heap
|
page read and write
|
||
409E000
|
stack
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
5B1F000
|
stack
|
page read and write
|
||
4AF0000
|
heap
|
page read and write
|
||
3DCF000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
42EE000
|
stack
|
page read and write
|
||
4F00000
|
direct allocation
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
1CA3F000
|
stack
|
page read and write
|
||
6F34000
|
trusted library allocation
|
page read and write
|
||
460E000
|
stack
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
4F80000
|
direct allocation
|
page read and write
|
||
5620000
|
trusted library allocation
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
55E0000
|
direct allocation
|
page execute and read and write
|
||
5050000
|
direct allocation
|
page execute and read and write
|
||
31EF000
|
stack
|
page read and write
|
||
583E000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
44AF000
|
stack
|
page read and write
|
||
6EC9000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
E9D000
|
heap
|
page read and write
|
||
8D7000
|
unkown
|
page execute and read and write
|
||
1710000
|
direct allocation
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
9B3000
|
unkown
|
page execute and read and write
|
||
E54000
|
heap
|
page read and write
|
||
1CBBE000
|
stack
|
page read and write
|
||
35CE000
|
stack
|
page read and write
|
||
451E000
|
stack
|
page read and write
|
||
42CF000
|
stack
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
6BF000
|
unkown
|
page execute and read and write
|
||
1084000
|
heap
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
2AF0000
|
direct allocation
|
page read and write
|
||
9FD000
|
unkown
|
page execute and read and write
|
||
48DE000
|
stack
|
page read and write
|
||
3E1E000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
443E000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4860000
|
heap
|
page read and write
|
||
25A000
|
unkown
|
page execute and read and write
|
||
71B0000
|
heap
|
page execute and read and write
|
||
145A000
|
heap
|
page read and write
|
||
5630000
|
direct allocation
|
page execute and read and write
|
||
E74000
|
heap
|
page read and write
|
||
71A0000
|
trusted library allocation
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
438F000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
4FA0000
|
direct allocation
|
page execute and read and write
|
||
9FD000
|
unkown
|
page execute and write copy
|
||
3ECE000
|
stack
|
page read and write
|
||
545F000
|
stack
|
page read and write
|
||
31CF000
|
stack
|
page read and write
|
||
6FC000
|
unkown
|
page execute and write copy
|
||
6FD0000
|
trusted library allocation
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
4AAF000
|
stack
|
page read and write
|
||
E21000
|
heap
|
page read and write
|
||
326F000
|
stack
|
page read and write
|
||
DBA000
|
heap
|
page read and write
|
||
54A0000
|
direct allocation
|
page execute and read and write
|
||
A2D000
|
unkown
|
page execute and read and write
|
||
14F3000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
5DE5000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
6368000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
36FE000
|
trusted library allocation
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
DF0000
|
unkown
|
page readonly
|
||
4861000
|
heap
|
page read and write
|
||
1D14E000
|
stack
|
page read and write
|
||
5060000
|
direct allocation
|
page execute and read and write
|
||
1084000
|
heap
|
page read and write
|
||
319E000
|
stack
|
page read and write
|
||
3DFE000
|
stack
|
page read and write
|
||
F65000
|
stack
|
page read and write
|
||
2AF0000
|
direct allocation
|
page read and write
|
||
2D30000
|
direct allocation
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
481F000
|
stack
|
page read and write
|
||
496F000
|
stack
|
page read and write
|
||
4FC0000
|
direct allocation
|
page execute and read and write
|
||
4A30000
|
direct allocation
|
page read and write
|
||
2EDF000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
79F4000
|
heap
|
page read and write
|
||
7940000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
1710000
|
direct allocation
|
page read and write
|
||
311C000
|
trusted library allocation
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
4850000
|
direct allocation
|
page read and write
|
||
1D350000
|
trusted library allocation
|
page read and write
|
||
5480000
|
direct allocation
|
page execute and read and write
|
||
352B000
|
trusted library allocation
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
46DF000
|
stack
|
page read and write
|
||
3D5F000
|
stack
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
E09000
|
unkown
|
page write copy
|
||
1507000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
3751000
|
trusted library allocation
|
page read and write
|
||
2C9E000
|
stack
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
136D000
|
stack
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
759000
|
unkown
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
45F1000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
1D3B4000
|
heap
|
page read and write
|
||
38CF000
|
stack
|
page read and write
|
||
336E000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
E96000
|
heap
|
page read and write
|
||
2870000
|
direct allocation
|
page read and write
|
||
2F8E000
|
stack
|
page read and write
|
||
DF0000
|
unkown
|
page readonly
|
||
1019000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
149000
|
unkown
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
F20000
|
direct allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
148A000
|
heap
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
13DB000
|
trusted library allocation
|
page execute and read and write
|
||
45F1000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
E7A000
|
heap
|
page read and write
|
||
C40000
|
trusted library allocation
|
page read and write
|
||
10C1000
|
unkown
|
page execute and write copy
|
||
14ED000
|
heap
|
page read and write
|
||
E1000
|
unkown
|
page execute and write copy
|
||
5090000
|
direct allocation
|
page execute and read and write
|
||
C94000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
2B9B000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
564E000
|
stack
|
page read and write
|
||
5DF0000
|
heap
|
page read and write
|
||
374C000
|
trusted library allocation
|
page read and write
|
||
176E000
|
stack
|
page read and write
|
||
4DF0000
|
direct allocation
|
page execute and read and write
|
||
480E000
|
stack
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
301F000
|
stack
|
page read and write
|
||
6D1C000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
2CEF000
|
stack
|
page read and write
|
||
720000
|
direct allocation
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
FDA000
|
heap
|
page read and write
|
||
50A0000
|
direct allocation
|
page execute and read and write
|
||
44D1000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
A3D000
|
unkown
|
page execute and write copy
|
||
EBC000
|
unkown
|
page write copy
|
||
43AE000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
317D000
|
trusted library allocation
|
page read and write
|
||
30EE000
|
stack
|
page read and write
|
||
6D4F000
|
trusted library allocation
|
page read and write
|
||
4850000
|
direct allocation
|
page read and write
|
||
58CE000
|
stack
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
1CBEE000
|
stack
|
page read and write
|
||
13A4000
|
trusted library allocation
|
page read and write
|
||
4A30000
|
direct allocation
|
page read and write
|
||
1516000
|
heap
|
page read and write
|
||
3CBE000
|
stack
|
page read and write
|
||
5530000
|
direct allocation
|
page execute and read and write
|
||
2B0F000
|
stack
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
504C000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
81E000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
2B8B000
|
stack
|
page read and write
|
||
17FA000
|
heap
|
page read and write
|
||
5F6D000
|
stack
|
page read and write
|
||
3EEF000
|
stack
|
page read and write
|
||
40AF000
|
stack
|
page read and write
|
||
4AF6000
|
heap
|
page read and write
|
||
6E75000
|
trusted library allocation
|
page read and write
|
||
F8E000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
5650000
|
direct allocation
|
page execute and read and write
|
||
E54000
|
heap
|
page read and write
|
||
7335F000
|
unkown
|
page readonly
|
||
9D0000
|
trusted library allocation
|
page read and write
|
||
9FF000
|
unkown
|
page execute and read and write
|
||
1200000
|
direct allocation
|
page read and write
|
||
DE7000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
3663000
|
trusted library allocation
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
FD2000
|
heap
|
page read and write
|
||
3011000
|
trusted library allocation
|
page read and write
|
||
4A81000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
3708000
|
trusted library allocation
|
page read and write
|
||
F3D000
|
stack
|
page read and write
|
||
36AF000
|
stack
|
page read and write
|
||
5650000
|
trusted library allocation
|
page read and write
|
||
399F000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
360C000
|
trusted library allocation
|
page read and write
|
||
DB1000
|
unkown
|
page execute and write copy
|
||
6E3000
|
unkown
|
page execute and read and write
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
4E31000
|
heap
|
page read and write
|
||
9FE000
|
unkown
|
page execute and write copy
|
||
4E70000
|
direct allocation
|
page read and write
|
||
346F000
|
stack
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
9AE000
|
stack
|
page read and write
|
||
29AF000
|
stack
|
page read and write
|
||
14EF000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
485E000
|
stack
|
page read and write
|
||
4AF0000
|
direct allocation
|
page execute and read and write
|
||
1030000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
3CDF000
|
stack
|
page read and write
|
||
541000
|
unkown
|
page execute and write copy
|
||
49E1000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
F8E000
|
stack
|
page read and write
|
||
2B70000
|
direct allocation
|
page execute and read and write
|
||
4850000
|
direct allocation
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
5930000
|
trusted library allocation
|
page read and write
|
||
6EB6000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
332E000
|
stack
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
4FE0000
|
direct allocation
|
page execute and read and write
|
||
7930000
|
heap
|
page read and write
|
||
61DE000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
1D302000
|
heap
|
page read and write
|
||
5030000
|
direct allocation
|
page execute and read and write
|
||
5000000
|
direct allocation
|
page execute and read and write
|
||
4BDF000
|
stack
|
page read and write
|
||
409F000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
3E8D000
|
stack
|
page read and write
|
||
3854000
|
trusted library allocation
|
page read and write
|
||
5793000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
9EF000
|
unkown
|
page execute and read and write
|
||
1084000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
19EF000
|
stack
|
page read and write
|
||
7E2C000
|
stack
|
page read and write
|
||
A1C000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
349F000
|
stack
|
page read and write
|
||
51B0000
|
direct allocation
|
page execute and read and write
|
||
7E6000
|
heap
|
page read and write
|
||
2E4F000
|
stack
|
page read and write
|
||
E19000
|
unkown
|
page write copy
|
||
E74000
|
heap
|
page read and write
|
||
3A0F000
|
stack
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
2EEE000
|
stack
|
page read and write
|
||
490F000
|
stack
|
page read and write
|
||
334F000
|
stack
|
page read and write
|
||
45EF000
|
stack
|
page read and write
|
||
78E000
|
heap
|
page read and write
|
||
2F6E000
|
stack
|
page read and write
|
||
3524000
|
trusted library allocation
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
396E000
|
stack
|
page read and write
|
||
5BDE000
|
stack
|
page read and write
|
||
37EE000
|
trusted library allocation
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
48EF000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
6AB5000
|
trusted library allocation
|
page read and write
|
||
1CB6E000
|
stack
|
page read and write
|
||
4F80000
|
trusted library allocation
|
page read and write
|
||
6E30000
|
trusted library allocation
|
page read and write
|
||
2E30000
|
heap
|
page read and write
|
||
5060000
|
direct allocation
|
page execute and read and write
|
||
4E31000
|
heap
|
page read and write
|
||
13C2000
|
trusted library allocation
|
page read and write
|
||
79D5000
|
heap
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
6F1000
|
unkown
|
page execute and write copy
|
||
A34000
|
heap
|
page read and write
|
||
36EF000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
471E000
|
stack
|
page read and write
|
||
578E000
|
stack
|
page read and write
|
||
462E000
|
stack
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
3EAE000
|
stack
|
page read and write
|
||
2D30000
|
direct allocation
|
page read and write
|
||
EB2000
|
unkown
|
page readonly
|
||
53E000
|
stack
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
4E70000
|
direct allocation
|
page read and write
|
||
4BE4000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
37CC000
|
trusted library allocation
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
1390000
|
trusted library allocation
|
page read and write
|
||
1305000
|
heap
|
page read and write
|
||
346E000
|
stack
|
page read and write
|
||
DCE000
|
heap
|
page read and write
|
||
511C000
|
stack
|
page read and write
|
||
E3C000
|
stack
|
page read and write
|
||
3615000
|
trusted library allocation
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
45EF000
|
stack
|
page read and write
|
||
3FEE000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4AA0000
|
direct allocation
|
page execute and read and write
|
||
4A71000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
34FF000
|
stack
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
396F000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
4FE000
|
stack
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
425F000
|
stack
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
3A6F000
|
stack
|
page read and write
|
||
40EF000
|
stack
|
page read and write
|
||
7D00000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
5ADD000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
445F000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
2E2F000
|
stack
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
7DAE000
|
stack
|
page read and write
|
||
4FE1000
|
direct allocation
|
page read and write
|
||
4D2F000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
1CCBE000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
1CECE000
|
stack
|
page read and write
|
||
327F000
|
stack
|
page read and write
|
||
54F0000
|
direct allocation
|
page execute and read and write
|
||
49E1000
|
heap
|
page read and write
|
||
1379000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
30EF000
|
stack
|
page read and write
|
||
3D9E000
|
stack
|
page read and write
|
||
312E000
|
stack
|
page read and write
|
||
1D300000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
2D2F000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
E73000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
2D30000
|
direct allocation
|
page read and write
|
||
9E5000
|
unkown
|
page execute and read and write
|
||
4E31000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
3E6F000
|
stack
|
page read and write
|
||
671E000
|
stack
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
33EE000
|
stack
|
page read and write
|
||
4A30000
|
direct allocation
|
page read and write
|
||
28A7000
|
heap
|
page read and write
|
||
4AEF000
|
stack
|
page read and write
|
||
5760000
|
trusted library allocation
|
page execute and read and write
|
||
D50000
|
heap
|
page read and write
|
||
F37000
|
heap
|
page read and write
|
||
5C5000
|
unkown
|
page execute and read and write
|
||
3BDE000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
50F0000
|
direct allocation
|
page execute and read and write
|
||
494E000
|
stack
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
416E000
|
stack
|
page read and write
|
||
37AE000
|
stack
|
page read and write
|
||
D0E000
|
stack
|
page read and write
|
||
1D5C0000
|
heap
|
page read and write
|
||
4E40000
|
direct allocation
|
page read and write
|
||
68FE000
|
stack
|
page read and write
|
||
352E000
|
stack
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
2FEF000
|
stack
|
page read and write
|
||
33FE000
|
stack
|
page read and write
|
||
201000
|
unkown
|
page execute and write copy
|
||
2D30000
|
heap
|
page read and write
|
||
1200000
|
direct allocation
|
page read and write
|
||
342F000
|
stack
|
page read and write
|
||
1200000
|
direct allocation
|
page read and write
|
||
2F4F000
|
stack
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
3C2D000
|
stack
|
page read and write
|
||
A2D000
|
unkown
|
page execute and read and write
|
||
BD6000
|
unkown
|
page execute and read and write
|
||
67B8000
|
heap
|
page read and write
|
||
4EF0000
|
direct allocation
|
page execute and read and write
|
||
E54000
|
heap
|
page read and write
|
||
3E4F000
|
stack
|
page read and write
|
||
420F000
|
stack
|
page read and write
|
||
4B20000
|
direct allocation
|
page execute and read and write
|
||
45E000
|
unkown
|
page execute and read and write
|
||
44D1000
|
heap
|
page read and write
|
||
4E70000
|
direct allocation
|
page read and write
|
||
7F5000
|
heap
|
page read and write
|
||
59CF000
|
stack
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
1405000
|
heap
|
page read and write
|
||
46BE000
|
stack
|
page read and write
|
||
1D0AE000
|
stack
|
page read and write
|
||
4FC1000
|
heap
|
page read and write
|
||
3EDE000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
6F40000
|
heap
|
page read and write
|
||
1D2EF000
|
stack
|
page read and write
|
||
4D20000
|
direct allocation
|
page execute and read and write
|
||
DA0000
|
unkown
|
page read and write
|
||
771000
|
heap
|
page read and write
|
||
462F000
|
stack
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
10AB000
|
unkown
|
page execute and read and write
|
||
1D62F000
|
stack
|
page read and write
|
||
4E70000
|
direct allocation
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
110E000
|
stack
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
39AE000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
D3F000
|
stack
|
page read and write
|
||
9FD000
|
unkown
|
page execute and read and write
|
||
5190000
|
direct allocation
|
page execute and read and write
|
||
422F000
|
stack
|
page read and write
|
||
314C000
|
trusted library allocation
|
page read and write
|
||
459E000
|
stack
|
page read and write
|
||
3B4F000
|
stack
|
page read and write
|
||
1CE9E000
|
stack
|
page read and write
|
||
1CF2E000
|
stack
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
FBD000
|
heap
|
page read and write
|
||
69B0000
|
trusted library allocation
|
page execute and read and write
|
||
A3C000
|
unkown
|
page execute and read and write
|
||
4761000
|
heap
|
page read and write
|
||
30AF000
|
stack
|
page read and write
|
||
126A000
|
unkown
|
page execute and write copy
|
||
644000
|
heap
|
page read and write
|
||
262000
|
unkown
|
page execute and read and write
|
||
2AF0000
|
direct allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
6BF000
|
unkown
|
page execute and read and write
|
||
44AF000
|
stack
|
page read and write
|
||
142000
|
unkown
|
page execute and read and write
|
||
31EF000
|
stack
|
page read and write
|
||
1AB000
|
stack
|
page read and write
|
||
2E9F000
|
stack
|
page read and write
|
||
4850000
|
direct allocation
|
page read and write
|
||
43EE000
|
stack
|
page read and write
|
||
E02000
|
unkown
|
page execute and read and write
|
||
69EE000
|
stack
|
page read and write
|
||
1C9EF000
|
stack
|
page read and write
|
||
55E0000
|
direct allocation
|
page execute and read and write
|
||
1084000
|
heap
|
page read and write
|
||
56B0000
|
trusted library allocation
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
35CF000
|
stack
|
page read and write
|
||
E1B000
|
unkown
|
page execute and read and write
|
||
1D08C000
|
stack
|
page read and write
|
||
6E41000
|
trusted library allocation
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
412F000
|
stack
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
5040000
|
direct allocation
|
page execute and read and write
|
||
13BD000
|
trusted library allocation
|
page execute and read and write
|
||
13EF000
|
stack
|
page read and write
|
||
4C50000
|
direct allocation
|
page execute and read and write
|
||
165B000
|
heap
|
page read and write
|
||
44AF000
|
stack
|
page read and write
|
||
41DE000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
928000
|
unkown
|
page execute and read and write
|
||
1084000
|
heap
|
page read and write
|
||
376F000
|
stack
|
page read and write
|
||
4E20000
|
direct allocation
|
page read and write
|
||
99F000
|
stack
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
59CE000
|
stack
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
127A000
|
unkown
|
page execute and write copy
|
||
6D55000
|
trusted library allocation
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
6F0000
|
unkown
|
page readonly
|
||
4A71000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
2F9F000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
7F5000
|
heap
|
page read and write
|
||
6908000
|
trusted library allocation
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
4BC0000
|
direct allocation
|
page execute and read and write
|
||
45F1000
|
heap
|
page read and write
|
||
32EF000
|
stack
|
page read and write
|
||
4C1E000
|
stack
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
3B1E000
|
stack
|
page read and write
|
||
4850000
|
direct allocation
|
page read and write
|
||
381E000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
BD7000
|
unkown
|
page execute and write copy
|
||
401D000
|
stack
|
page read and write
|
||
6DFD000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
6F0000
|
unkown
|
page read and write
|
||
3CAE000
|
stack
|
page read and write
|
||
4ED0000
|
direct allocation
|
page read and write
|
||
2B4F000
|
stack
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
DB0000
|
unkown
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
31EF000
|
stack
|
page read and write
|
||
959E000
|
stack
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
EE0000
|
direct allocation
|
page read and write
|
||
462E000
|
stack
|
page read and write
|
||
3241000
|
trusted library allocation
|
page read and write
|
||
3BEF000
|
stack
|
page read and write
|
||
486F000
|
stack
|
page read and write
|
||
4A90000
|
direct allocation
|
page execute and read and write
|
||
4780000
|
heap
|
page read and write
|
||
2FE7000
|
heap
|
page read and write
|
||
4AE0000
|
direct allocation
|
page execute and read and write
|
||
3668000
|
trusted library allocation
|
page read and write
|
||
9C4000
|
trusted library allocation
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
1710000
|
direct allocation
|
page read and write
|
||
3858000
|
trusted library allocation
|
page read and write
|
||
108F000
|
unkown
|
page execute and read and write
|
||
1084000
|
heap
|
page read and write
|
||
9E5000
|
unkown
|
page execute and read and write
|
||
636E000
|
heap
|
page read and write
|
||
4DE0000
|
direct allocation
|
page execute and read and write
|
||
E74000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
3C0E000
|
stack
|
page read and write
|
||
44AD000
|
stack
|
page read and write
|
||
459F000
|
stack
|
page read and write
|
||
4C20000
|
trusted library allocation
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
3DDF000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
3BAF000
|
stack
|
page read and write
|
||
7DEE000
|
stack
|
page read and write
|
||
5480000
|
direct allocation
|
page execute and read and write
|
||
402F000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
5670000
|
direct allocation
|
page execute and read and write
|
||
4E20000
|
direct allocation
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
574E000
|
stack
|
page read and write
|
||
2D30000
|
direct allocation
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
4FF4000
|
heap
|
page read and write
|
||
3B0000
|
unkown
|
page readonly
|
||
1459000
|
heap
|
page read and write
|
||
1312000
|
heap
|
page read and write
|
||
2C5F000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
388E000
|
stack
|
page read and write
|
||
4E20000
|
direct allocation
|
page read and write
|
||
27AF000
|
stack
|
page read and write
|
||
4E20000
|
direct allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
3FDE000
|
stack
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
CF5000
|
stack
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
DFF000
|
stack
|
page read and write
|
||
DAF000
|
stack
|
page read and write
|
||
75B000
|
unkown
|
page execute and read and write
|
||
6670000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
FED000
|
heap
|
page read and write
|
||
F00000
|
direct allocation
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
4A30000
|
direct allocation
|
page read and write
|
||
1CDEE000
|
stack
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
3F5E000
|
stack
|
page read and write
|
||
3B2000
|
unkown
|
page readonly
|
||
4861000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
6D5B000
|
stack
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
362F000
|
stack
|
page read and write
|
||
44A000
|
unkown
|
page execute and read and write
|
||
425F000
|
stack
|
page read and write
|
||
786000
|
heap
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
1CBAF000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
454F000
|
stack
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
2BFE000
|
stack
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
4A90000
|
direct allocation
|
page execute and read and write
|
||
E54000
|
heap
|
page read and write
|
||
5680000
|
heap
|
page execute and read and write
|
||
554F000
|
stack
|
page read and write
|
||
5D4B000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
6D5F000
|
trusted library allocation
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
40EF000
|
stack
|
page read and write
|
||
79F000
|
heap
|
page read and write
|
||
35EE000
|
stack
|
page read and write
|
||
44CF000
|
stack
|
page read and write
|
||
A25000
|
heap
|
page read and write
|
||
4A30000
|
direct allocation
|
page read and write
|
||
2AEE000
|
stack
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
809000
|
heap
|
page read and write
|
||
79E000
|
unkown
|
page execute and read and write
|
||
13F0000
|
trusted library allocation
|
page read and write
|
||
503F000
|
stack
|
page read and write
|
||
4FA0000
|
heap
|
page read and write
|
||
4AB0000
|
trusted library allocation
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
896000
|
unkown
|
page execute and read and write
|
||
1CB2E000
|
stack
|
page read and write
|
||
3BEF000
|
stack
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
4AB0000
|
direct allocation
|
page read and write
|
||
3AEF000
|
stack
|
page read and write
|
||
45DE000
|
stack
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
10D5000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
5070000
|
direct allocation
|
page execute and read and write
|
||
45F1000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
5C8000
|
unkown
|
page execute and read and write
|
||
4631000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
47EE000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
5000000
|
direct allocation
|
page execute and read and write
|
||
EE0000
|
heap
|
page read and write
|
||
10C3000
|
unkown
|
page execute and read and write
|
||
361E000
|
stack
|
page read and write
|
||
2BEF000
|
stack
|
page read and write
|
||
1D52E000
|
stack
|
page read and write
|
||
995000
|
stack
|
page read and write
|
||
5470000
|
direct allocation
|
page execute and read and write
|
||
355E000
|
stack
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
6C2C000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
362A000
|
trusted library allocation
|
page read and write
|
||
3FCE000
|
stack
|
page read and write
|
||
2ED0000
|
remote allocation
|
page read and write
|
||
6F0000
|
unkown
|
page read and write
|
||
4D40000
|
direct allocation
|
page execute and read and write
|
||
4A71000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page execute and read and write
|
||
1084000
|
heap
|
page read and write
|
||
414E000
|
stack
|
page read and write
|
||
3845000
|
trusted library allocation
|
page read and write
|
||
3C8F000
|
stack
|
page read and write
|
||
3E6E000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
D80000
|
direct allocation
|
page read and write
|
||
5F1000
|
unkown
|
page execute and read and write
|
||
10C1000
|
unkown
|
page execute and read and write
|
||
9FD000
|
unkown
|
page execute and write copy
|
||
4E31000
|
heap
|
page read and write
|
||
797A000
|
heap
|
page read and write
|
||
5030000
|
direct allocation
|
page execute and read and write
|
||
1656000
|
heap
|
page read and write
|
||
1020000
|
direct allocation
|
page read and write
|
||
4ADE000
|
stack
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
759000
|
unkown
|
page read and write
|
||
E8F000
|
heap
|
page read and write
|
||
4F80000
|
direct allocation
|
page read and write
|
||
4B7F000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
74A000
|
heap
|
page read and write
|
||
390E000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
720000
|
direct allocation
|
page read and write
|
||
383C000
|
trusted library allocation
|
page read and write
|
||
269E000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
4C60000
|
direct allocation
|
page read and write
|
||
720000
|
direct allocation
|
page read and write
|
||
55D0000
|
direct allocation
|
page execute and read and write
|
||
4E31000
|
heap
|
page read and write
|
||
63D2000
|
heap
|
page read and write
|
||
2D30000
|
direct allocation
|
page read and write
|
||
752000
|
unkown
|
page execute and read and write
|
||
321F000
|
stack
|
page read and write
|
||
F35000
|
stack
|
page read and write
|
||
350F000
|
stack
|
page read and write
|
||
3AEE000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
E9A000
|
stack
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
597D000
|
stack
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
3C1F000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
759000
|
unkown
|
page write copy
|
||
1D204000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
3C2F000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
4E60000
|
direct allocation
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
43AB000
|
trusted library allocation
|
page read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
79E000
|
unkown
|
page execute and read and write
|
||
C94000
|
heap
|
page read and write
|
||
6680000
|
heap
|
page read and write
|
||
5B8E000
|
stack
|
page read and write
|
||
45AE000
|
stack
|
page read and write
|
||
410F000
|
stack
|
page read and write
|
||
4960000
|
trusted library allocation
|
page read and write
|
||
461F000
|
stack
|
page read and write
|
||
47FE000
|
stack
|
page read and write
|
||
1020000
|
direct allocation
|
page read and write
|
||
2AAF000
|
stack
|
page read and write
|
||
375E000
|
stack
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
369F000
|
stack
|
page read and write
|
||
6D2C000
|
stack
|
page read and write
|
||
10D1000
|
unkown
|
page execute and write copy
|
||
EE5000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
2F4F000
|
stack
|
page read and write
|
||
2E2000
|
unkown
|
page execute and read and write
|
||
1CA2E000
|
stack
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
4E46000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
D80000
|
direct allocation
|
page read and write
|
||
54A0000
|
direct allocation
|
page execute and read and write
|
||
137D000
|
stack
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
110E000
|
stack
|
page read and write
|
||
325E000
|
stack
|
page read and write
|
||
108F000
|
unkown
|
page execute and read and write
|
||
59E8000
|
trusted library allocation
|
page read and write
|
||
7946000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
1710000
|
direct allocation
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
6E77000
|
trusted library allocation
|
page read and write
|
||
4FD0000
|
direct allocation
|
page execute and read and write
|
||
47E1000
|
heap
|
page read and write
|
||
4AEE000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
1D10D000
|
stack
|
page read and write
|
||
2870000
|
direct allocation
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
55B0000
|
direct allocation
|
page execute and read and write
|
||
44D1000
|
heap
|
page read and write
|
||
CFE000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
759000
|
unkown
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
F5A000
|
heap
|
page read and write
|
||
4F1E000
|
stack
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
1D1B0000
|
heap
|
page read and write
|
||
5A2000
|
unkown
|
page execute and read and write
|
||
1084000
|
heap
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
2E6F000
|
stack
|
page read and write
|
||
3D6E000
|
stack
|
page read and write
|
||
F20000
|
direct allocation
|
page read and write
|
||
15F9000
|
heap
|
page read and write
|
||
132E000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
412E000
|
stack
|
page read and write
|
||
4E20000
|
direct allocation
|
page read and write
|
||
492E000
|
stack
|
page read and write
|
||
4C60000
|
direct allocation
|
page execute and read and write
|
||
4E31000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
400E000
|
stack
|
page read and write
|
||
41AE000
|
stack
|
page read and write
|
||
4E50000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
7FC000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
E86000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
1487000
|
heap
|
page read and write
|
||
1D2AE000
|
stack
|
page read and write
|
||
52D0000
|
direct allocation
|
page read and write
|
||
1CD8E000
|
stack
|
page read and write
|
||
3735000
|
trusted library allocation
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
544D000
|
stack
|
page read and write
|
||
1720000
|
heap
|
page read and write
|
||
1269000
|
heap
|
page read and write
|
||
2D30000
|
direct allocation
|
page read and write
|
||
50E0000
|
direct allocation
|
page execute and read and write
|
||
45F1000
|
heap
|
page read and write
|
||
336E000
|
stack
|
page read and write
|
||
3515000
|
trusted library allocation
|
page read and write
|
||
75B000
|
unkown
|
page execute and read and write
|
||
4861000
|
heap
|
page read and write
|
||
6AA0000
|
trusted library allocation
|
page read and write
|
||
1CE4D000
|
stack
|
page read and write
|
||
436F000
|
stack
|
page read and write
|
||
5CB0000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
445E000
|
stack
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
114E000
|
stack
|
page read and write
|
||
36DE000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
4E20000
|
direct allocation
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
5310000
|
direct allocation
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
2AAF000
|
stack
|
page read and write
|
||
370E000
|
stack
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
72FE000
|
stack
|
page read and write
|
||
2F1E000
|
stack
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
5D0E000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
424F000
|
stack
|
page read and write
|
||
7D01000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
368E000
|
stack
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
6FC000
|
unkown
|
page execute and write copy
|
||
1CDAE000
|
stack
|
page read and write
|
||
262000
|
unkown
|
page execute and read and write
|
||
32FA000
|
trusted library allocation
|
page read and write
|
||
1020000
|
direct allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
1516000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
170E000
|
stack
|
page read and write
|
||
4FD0000
|
direct allocation
|
page execute and read and write
|
||
9FD000
|
unkown
|
page execute and write copy
|
||
39EE000
|
stack
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
372E000
|
stack
|
page read and write
|
||
8D7000
|
unkown
|
page execute and read and write
|
||
960000
|
heap
|
page read and write
|
||
720000
|
direct allocation
|
page read and write
|
||
321F000
|
stack
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
3E2F000
|
stack
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
50FB000
|
stack
|
page read and write
|
||
44EE000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
6D4A000
|
trusted library allocation
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
F4C000
|
heap
|
page read and write
|
||
9EC000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
4AB0000
|
direct allocation
|
page read and write
|
||
37E7000
|
trusted library allocation
|
page read and write
|
||
2B6E000
|
stack
|
page read and write
|
||
4630000
|
heap
|
page read and write
|
||
4CEB000
|
stack
|
page read and write
|
||
2870000
|
direct allocation
|
page read and write
|
||
CDC000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
379F000
|
stack
|
page read and write
|
||
799F000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
6F0000
|
unkown
|
page readonly
|
||
47E0000
|
heap
|
page read and write
|
||
3B5F000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
4850000
|
direct allocation
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
1CEEF000
|
stack
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
71D0000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
1020000
|
direct allocation
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
36EF000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
5A61000
|
heap
|
page read and write
|
||
6F0000
|
unkown
|
page read and write
|
||
621F000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
E11000
|
heap
|
page read and write
|
||
14CF000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
E15000
|
heap
|
page read and write
|
||
354E000
|
stack
|
page read and write
|
||
928000
|
unkown
|
page execute and read and write
|
||
7B8000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
151A000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
2A4E000
|
stack
|
page read and write
|
||
925000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
6080000
|
heap
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
1710000
|
direct allocation
|
page read and write
|
||
334E000
|
stack
|
page read and write
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
376E000
|
stack
|
page read and write
|
||
1200000
|
direct allocation
|
page read and write
|
||
64DC000
|
stack
|
page read and write
|
||
4FD0000
|
direct allocation
|
page execute and read and write
|
||
302E000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
E9E000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
EE0000
|
direct allocation
|
page read and write
|
||
4E00000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
44DF000
|
stack
|
page read and write
|
||
2ED0000
|
remote allocation
|
page read and write
|
||
54CE000
|
stack
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
9FE000
|
unkown
|
page execute and write copy
|
||
4761000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
10D2000
|
unkown
|
page execute and write copy
|
||
1D200000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
55F1000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
2D47000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
4E70000
|
direct allocation
|
page read and write
|
||
3E6F000
|
stack
|
page read and write
|
||
2870000
|
direct allocation
|
page read and write
|
||
29CE000
|
stack
|
page read and write
|
||
36EE000
|
stack
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
133C000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
5620000
|
direct allocation
|
page execute and read and write
|
||
1084000
|
heap
|
page read and write
|
||
38FE000
|
stack
|
page read and write
|
||
430E000
|
stack
|
page read and write
|
||
1020000
|
direct allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4F8F000
|
stack
|
page read and write
|
||
4E70000
|
direct allocation
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
4E70000
|
direct allocation
|
page read and write
|
||
928000
|
unkown
|
page execute and read and write
|
||
1084000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
6D5A000
|
trusted library allocation
|
page read and write
|
||
1710000
|
direct allocation
|
page read and write
|
||
615E000
|
stack
|
page read and write
|
||
5450000
|
direct allocation
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
1544000
|
heap
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
6E3B000
|
trusted library allocation
|
page read and write
|
||
7060000
|
trusted library allocation
|
page execute and read and write
|
||
E74000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
7BF000
|
stack
|
page read and write
|
||
541000
|
unkown
|
page execute and write copy
|
||
E54000
|
heap
|
page read and write
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
79B9000
|
heap
|
page read and write
|
||
28F000
|
unkown
|
page execute and read and write
|
||
E54000
|
heap
|
page read and write
|
||
2740000
|
heap
|
page read and write
|
||
1297000
|
heap
|
page read and write
|
||
3A5F000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
1CF4D000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
14FB000
|
heap
|
page read and write
|
||
46EF000
|
stack
|
page read and write
|
||
29E0000
|
direct allocation
|
page execute and read and write
|
||
4A71000
|
heap
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
5600000
|
direct allocation
|
page execute and read and write
|
||
F6D000
|
heap
|
page read and write
|
||
4850000
|
direct allocation
|
page read and write
|
||
1D1EE000
|
stack
|
page read and write
|
||
3397000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
40DE000
|
stack
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
1020000
|
direct allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
2FEF000
|
stack
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
429E000
|
stack
|
page read and write
|
||
2C2E000
|
stack
|
page read and write
|
||
396F000
|
stack
|
page read and write
|
||
B94000
|
unkown
|
page execute and read and write
|
||
4850000
|
direct allocation
|
page read and write
|
||
1D14D000
|
stack
|
page read and write
|
||
1D20E000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
661E000
|
stack
|
page read and write
|
||
41DF000
|
stack
|
page read and write
|
||
5610000
|
trusted library allocation
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
4CFE000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
1696000
|
heap
|
page read and write
|
||
4E81000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
E8F000
|
heap
|
page read and write
|
||
13D2000
|
trusted library allocation
|
page read and write
|
||
37BF000
|
trusted library allocation
|
page read and write
|
||
3F5F000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
4FC1000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
1D450000
|
trusted library allocation
|
page read and write
|
||
6D64000
|
trusted library allocation
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
5FEF000
|
stack
|
page read and write
|
||
E9D000
|
heap
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
33AF000
|
stack
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
2870000
|
direct allocation
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
47E2000
|
heap
|
page read and write
|
||
6FC000
|
unkown
|
page execute and read and write
|
||
339E000
|
stack
|
page read and write
|
||
356F000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
598C000
|
stack
|
page read and write
|
||
384F000
|
stack
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
6E3000
|
unkown
|
page execute and read and write
|
||
349F000
|
stack
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
4C2E000
|
stack
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
FA8000
|
unkown
|
page execute and read and write
|
||
4EC0000
|
direct allocation
|
page execute and read and write
|
||
1CA2E000
|
stack
|
page read and write
|
||
2D30000
|
direct allocation
|
page read and write
|
||
408D000
|
stack
|
page read and write
|
||
1CE0E000
|
stack
|
page read and write
|
||
1020000
|
direct allocation
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
4861000
|
heap
|
page read and write
|
||
A3E000
|
stack
|
page read and write
|
||
559F000
|
stack
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
897000
|
unkown
|
page execute and write copy
|
||
4861000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
E0E000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
486E000
|
stack
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
2BEE000
|
stack
|
page read and write
|
||
351B000
|
trusted library allocation
|
page read and write
|
||
D4E000
|
stack
|
page read and write
|
||
73356000
|
unkown
|
page readonly
|
||
39EF000
|
stack
|
page read and write
|
||
405F000
|
stack
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
1200000
|
direct allocation
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
3657000
|
trusted library allocation
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
4861000
|
heap
|
page read and write
|
||
398E000
|
stack
|
page read and write
|
||
3B2E000
|
stack
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
4FD0000
|
direct allocation
|
page execute and read and write
|
||
644000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
56A0000
|
heap
|
page read and write
|
||
4FF0000
|
direct allocation
|
page execute and read and write
|
||
200000
|
unkown
|
page readonly
|
||
DA0000
|
direct allocation
|
page read and write
|
||
4F20000
|
direct allocation
|
page execute and read and write
|
||
3E0E000
|
stack
|
page read and write
|
||
720000
|
direct allocation
|
page read and write
|
||
4A30000
|
direct allocation
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
3B9F000
|
stack
|
page read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
5940000
|
heap
|
page read and write
|
||
39DE000
|
stack
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
9E5000
|
unkown
|
page execute and read and write
|
||
1519000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
109000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
6300000
|
heap
|
page read and write
|
||
6BF000
|
unkown
|
page execute and read and write
|
||
E54000
|
heap
|
page read and write
|
||
E6C000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
A3D000
|
unkown
|
page execute and write copy
|
||
35AF000
|
stack
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
4F9F000
|
stack
|
page read and write
|
||
30AF000
|
stack
|
page read and write
|
||
E12000
|
unkown
|
page execute and read and write
|
||
2870000
|
direct allocation
|
page read and write
|
||
4AEC000
|
stack
|
page read and write
|
||
4E6F000
|
stack
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
54D0000
|
direct allocation
|
page execute and read and write
|
||
4A30000
|
direct allocation
|
page read and write
|
||
565E000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
33AE000
|
stack
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
897000
|
unkown
|
page execute and write copy
|
||
6240000
|
heap
|
page read and write
|
||
2E2E000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
45D0000
|
trusted library allocation
|
page read and write
|
||
BD6000
|
unkown
|
page execute and read and write
|
||
E54000
|
heap
|
page read and write
|
||
38DF000
|
stack
|
page read and write
|
||
4CF0000
|
direct allocation
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
36EF000
|
stack
|
page read and write
|
||
3706000
|
trusted library allocation
|
page read and write
|
||
1315000
|
heap
|
page read and write
|
||
934000
|
heap
|
page read and write
|
||
4A30000
|
direct allocation
|
page read and write
|
||
361D000
|
trusted library allocation
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
465E000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
6ED000
|
unkown
|
page execute and read and write
|
||
4CBF000
|
stack
|
page read and write
|
||
304F000
|
stack
|
page read and write
|
||
1200000
|
direct allocation
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
66BE000
|
stack
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
3B0E000
|
stack
|
page read and write
|
||
3A4E000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
43AE000
|
stack
|
page read and write
|
||
382F000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
EE0000
|
direct allocation
|
page read and write
|
||
3594000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
50F0000
|
direct allocation
|
page execute and read and write
|
||
E74000
|
heap
|
page read and write
|
||
37B8000
|
trusted library allocation
|
page read and write
|
||
37DF000
|
stack
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
DB0000
|
unkown
|
page readonly
|
||
1084000
|
heap
|
page read and write
|
||
5F1000
|
unkown
|
page execute and read and write
|
||
4E31000
|
heap
|
page read and write
|
||
407E000
|
stack
|
page read and write
|
||
3D1E000
|
stack
|
page read and write
|
||
2AEF000
|
stack
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
3210000
|
trusted library allocation
|
page read and write
|
||
8840000
|
trusted library allocation
|
page read and write
|
||
2D30000
|
direct allocation
|
page read and write
|
||
3AEE000
|
stack
|
page read and write
|
||
DC9000
|
heap
|
page read and write
|
||
3ED000
|
unkown
|
page execute and read and write
|
||
1725000
|
heap
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
651F000
|
stack
|
page read and write
|
||
470F000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
4A30000
|
direct allocation
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
6D39000
|
trusted library allocation
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
F20000
|
direct allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
13D5000
|
trusted library allocation
|
page execute and read and write
|
||
386F000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
48AE000
|
stack
|
page read and write
|
||
1D44E000
|
stack
|
page read and write
|
||
149000
|
unkown
|
page write copy
|
||
2F2E000
|
stack
|
page read and write
|
||
364F000
|
stack
|
page read and write
|
||
4E5F000
|
stack
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
7DB000
|
stack
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
40EE000
|
stack
|
page read and write
|
||
161F000
|
stack
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
540000
|
unkown
|
page readonly
|
||
4E31000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
338E000
|
stack
|
page read and write
|
||
2D30000
|
direct allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
55CF000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
794B000
|
heap
|
page read and write
|
||
13A3000
|
trusted library allocation
|
page execute and read and write
|
||
C94000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
5060000
|
direct allocation
|
page execute and read and write
|
||
2D30000
|
direct allocation
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
5B6D000
|
stack
|
page read and write
|
||
3B9E000
|
stack
|
page read and write
|
||
39AE000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
975F000
|
stack
|
page read and write
|
||
45E000
|
unkown
|
page execute and read and write
|
||
45EE000
|
stack
|
page read and write
|
||
3390000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
4253000
|
trusted library allocation
|
page read and write
|
||
2AF0000
|
direct allocation
|
page read and write
|
||
6FD000
|
unkown
|
page execute and write copy
|
||
4AF1000
|
heap
|
page read and write
|
||
1710000
|
direct allocation
|
page read and write
|
||
C5B000
|
stack
|
page read and write
|
||
7180000
|
trusted library allocation
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
625E000
|
stack
|
page read and write
|
||
29EF000
|
stack
|
page read and write
|
||
6F5D000
|
trusted library allocation
|
page read and write
|
||
28F000
|
unkown
|
page execute and read and write
|
||
108E000
|
stack
|
page read and write
|
||
4645000
|
heap
|
page read and write
|
||
43FF000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
5450000
|
direct allocation
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
3C7F000
|
stack
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
3AAE000
|
stack
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
2ED0000
|
remote allocation
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
759000
|
unkown
|
page write copy
|
||
501F000
|
stack
|
page read and write
|
||
5683000
|
heap
|
page execute and read and write
|
There are 3609 hidden memdumps, click here to show them.