Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\rstxdhuj[1].exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NCK9WNDU\5[1].exe
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000342001\rstxdhuj.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000343001\5.exe
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Roaming\Ylrdnrwcx.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
modified
|
||
C:\Windows\Tasks\axplong.job
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
|
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
|
||
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
|
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
|
||
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
|
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
|
||
C:\Users\user\AppData\Local\Temp\1000342001\rstxdhuj.exe
|
"C:\Users\user\AppData\Local\Temp\1000342001\rstxdhuj.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 904
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.16/Jo89Ku7d/index.php(x8
|
unknown
|
||
http://185.215.113.16/Jo89Ku7d/index.phpnd
|
unknown
|
||
http://185.215.113.16/Jo89Ku7d/index.php
|
185.215.113.16
|
||
http://html4/loose.dtd
|
unknown
|
||
https://github.com/mgravell/protobuf-netJ
|
unknown
|
||
https://management.azure.commismatching
|
unknown
|
||
http://103.130.147.211/Files/5.exep
|
unknown
|
||
http://103.130.147.211/Files/5.exet
|
unknown
|
||
http://103.130.147.211/Files/5.exes
|
unknown
|
||
http://103.130.147.211/Files/5.exePV
|
unknown
|
||
http://103.130.147.211/Files/5.exej
|
unknown
|
||
http://.css
|
unknown
|
||
http://103.130.147.211/Files/5.exe07.EXER
|
unknown
|
||
http://103.130.147.211/Files/5.exed
|
unknown
|
||
http://103.130.147.211/Files/5.exeY
|
unknown
|
||
http://103.130.147.211/Files/5.exeV
|
unknown
|
||
https://login.chinacloudapi.cn/cannot
|
unknown
|
||
https://github.com/mgravell/protobuf-neti
|
unknown
|
||
http://103.130.147.211/Files/5.exe32.EXEu
|
unknown
|
||
http://103.130.147.211/Files/5.exeP
|
unknown
|
||
http://103.130.147.211/Files/5.exepf0
|
unknown
|
||
https://stackoverflow.com/q/11564914/23354;
|
unknown
|
||
http://dejavu.sourceforge.net/wiki/index.php/Licensehttp://dejavu.sourceforge.net/wiki/index.php/Lic
|
unknown
|
||
http://www.ascendercorp.com/typedesigners.html
|
unknown
|
||
http://scripts.sil.org/OFLhttp://scripts.sil.org/OFL
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://.jpg
|
unknown
|
||
http://dejavu.sourceforge.net
|
unknown
|
||
http://www.ascendercorp.com/http://www.ascendercorp.com/http://www.ascendercorp.com/typedesigners.ht
|
unknown
|
||
http://www.ascendercorp.com/
|
unknown
|
||
https://stackoverflow.com/q/14436606/23354
|
unknown
|
||
http://103.130.147.211/Files/5.exef5E
|
unknown
|
||
http://103.130.147.211/Files/5.exe2
|
unknown
|
||
https://github.com/mgravell/protobuf-net
|
unknown
|
||
http://103.130.147.211/ert
|
unknown
|
||
http://103.130.147.211/Local
|
unknown
|
||
http://185.215.113.16/inc/rstxdhuj.exe5867
|
unknown
|
||
https://github.com/uber-go/dig/issues/new
|
unknown
|
||
http://103.130.147.211/Files/5.exeZ0Y
|
unknown
|
||
http://103.130.147.211/Files/5.exef59e5d67ee87
|
unknown
|
||
http://dejavu.sourceforge.nethttp://dejavu.sourceforge.netFonts
|
unknown
|
||
https://management.chinacloudapi.cnmlkem768:
|
unknown
|
||
http://185.215.113.16/Jo89Ku7d/index.phpQ
|
unknown
|
||
http://103.130.147.211/Files/5.exef59
|
unknown
|
||
http://185.215.113.16/Jo89Ku7d/index.php00342001
|
unknown
|
||
http://185.215.113.16/Jo89Ku7d/index.phpRNAM
|
unknown
|
||
https://stackoverflow.com/q/2152978/23354
|
unknown
|
||
https://login.microsoftonline.com/crypto/rc4:
|
unknown
|
||
http://103.130.147.211/
|
unknown
|
||
http://185.215.113.16/inc/rstxdhuj.exe
|
unknown
|
||
http://103.130.147.211/Files/5.exe
|
unknown
|
||
http://103.130.147.211/c
|
unknown
|
||
http://scripts.sil.org/OFL
|
unknown
|
||
http://dejavu.sourceforge.net/wiki/index.php/License
|
unknown
|
||
http://103.130.147.211/Files/5.exep0g
|
unknown
|
There are 45 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
google.com
|
142.250.186.46
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
103.130.147.211
|
unknown
|
Turkey
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
142.250.186.46
|
google.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Ylrdnrwcx
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2591000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
direct allocation
|
page read and write
|
||
4E30000
|
direct allocation
|
page read and write
|
||
3611000
|
trusted library allocation
|
page read and write
|
||
201000
|
unkown
|
page execute and read and write
|
||
26E1000
|
trusted library allocation
|
page read and write
|
||
201000
|
unkown
|
page execute and read and write
|
||
861000
|
unkown
|
page execute and read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
5A30000
|
trusted library section
|
page read and write
|
||
4FC0000
|
direct allocation
|
page read and write
|
||
201000
|
unkown
|
page execute and read and write
|
||
49F0000
|
direct allocation
|
page read and write
|
||
5190000
|
direct allocation
|
page execute and read and write
|
||
BB0000
|
direct allocation
|
page read and write
|
||
543E000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
1595000
|
heap
|
page read and write
|
||
2963000
|
trusted library allocation
|
page read and write
|
||
2C6E000
|
trusted library allocation
|
page read and write
|
||
4FF0000
|
direct allocation
|
page execute and read and write
|
||
2783000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
F7E000
|
heap
|
page read and write
|
||
1003000
|
heap
|
page read and write
|
||
EF7000
|
stack
|
page read and write
|
||
2892000
|
trusted library allocation
|
page read and write
|
||
2C8D000
|
trusted library allocation
|
page read and write
|
||
2A93000
|
trusted library allocation
|
page read and write
|
||
298F000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
2CA4000
|
trusted library allocation
|
page read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
5E4000
|
heap
|
page read and write
|
||
269000
|
unkown
|
page write copy
|
||
4A90000
|
direct allocation
|
page read and write
|
||
3EA000
|
unkown
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4B70000
|
direct allocation
|
page execute and read and write
|
||
4B31000
|
heap
|
page read and write
|
||
12DE000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
34DE000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
40FE000
|
stack
|
page read and write
|
||
557000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D0000
|
unkown
|
page execute and read and write
|
||
285C000
|
trusted library allocation
|
page read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
286B000
|
trusted library allocation
|
page read and write
|
||
12BB000
|
trusted library allocation
|
page execute and read and write
|
||
2AC3000
|
trusted library allocation
|
page read and write
|
||
513000
|
unkown
|
page execute and read and write
|
||
2A2C000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
unkown
|
page execute and write copy
|
||
4BFE000
|
stack
|
page read and write
|
||
158C000
|
heap
|
page read and write
|
||
201000
|
unkown
|
page execute and write copy
|
||
690000
|
heap
|
page read and write
|
||
2843000
|
trusted library allocation
|
page read and write
|
||
B30000
|
unkown
|
page execute and read and write
|
||
3A6E000
|
stack
|
page read and write
|
||
23D0000
|
heap
|
page read and write
|
||
27F2000
|
trusted library allocation
|
page read and write
|
||
2BF0000
|
trusted library allocation
|
page read and write
|
||
41FF000
|
stack
|
page read and write
|
||
3C1F000
|
stack
|
page read and write
|
||
4B20000
|
direct allocation
|
page read and write
|
||
297E000
|
trusted library allocation
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
33FF000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4FC0000
|
direct allocation
|
page execute and read and write
|
||
38EF000
|
stack
|
page read and write
|
||
28D4000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
200000
|
unkown
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
2862000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
stack
|
page read and write
|
||
59B0000
|
trusted library allocation
|
page execute and read and write
|
||
2B3C000
|
trusted library allocation
|
page read and write
|
||
2CA2000
|
trusted library allocation
|
page read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
3DFF000
|
stack
|
page read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
4FE0000
|
direct allocation
|
page execute and read and write
|
||
1B4000
|
unkown
|
page readonly
|
||
465E000
|
stack
|
page read and write
|
||
BB0000
|
direct allocation
|
page read and write
|
||
2A89000
|
trusted library allocation
|
page read and write
|
||
4D31000
|
heap
|
page read and write
|
||
2A0B000
|
trusted library allocation
|
page read and write
|
||
4B3F000
|
stack
|
page read and write
|
||
2C91000
|
trusted library allocation
|
page read and write
|
||
2A26000
|
trusted library allocation
|
page read and write
|
||
4B20000
|
direct allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
2A09000
|
trusted library allocation
|
page read and write
|
||
4B20000
|
direct allocation
|
page read and write
|
||
2C7A000
|
trusted library allocation
|
page read and write
|
||
2B00000
|
trusted library allocation
|
page read and write
|
||
38FF000
|
stack
|
page read and write
|
||
2A3B000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
201000
|
unkown
|
page execute and write copy
|
||
55BE000
|
stack
|
page read and write
|
||
5370000
|
direct allocation
|
page execute and read and write
|
||
2A57000
|
trusted library allocation
|
page read and write
|
||
357F000
|
stack
|
page read and write
|
||
399F000
|
stack
|
page read and write
|
||
31FE000
|
stack
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
5960000
|
trusted library allocation
|
page read and write
|
||
4FC0000
|
direct allocation
|
page execute and read and write
|
||
585D000
|
stack
|
page read and write
|
||
4B60000
|
direct allocation
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
53C0000
|
direct allocation
|
page execute and read and write
|
||
5060000
|
direct allocation
|
page execute and read and write
|
||
893000
|
trusted library allocation
|
page execute and read and write
|
||
8B0000
|
trusted library allocation
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
3E9F000
|
stack
|
page read and write
|
||
4B20000
|
direct allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
2C78000
|
trusted library allocation
|
page read and write
|
||
2790000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
2C41000
|
trusted library allocation
|
page read and write
|
||
4E30000
|
direct allocation
|
page read and write
|
||
5020000
|
direct allocation
|
page execute and read and write
|
||
278B000
|
trusted library allocation
|
page read and write
|
||
FC3000
|
heap
|
page read and write
|
||
3F7E000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
2DF8000
|
trusted library allocation
|
page read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
2A5B000
|
trusted library allocation
|
page read and write
|
||
47FF000
|
stack
|
page read and write
|
||
2B47000
|
trusted library allocation
|
page read and write
|
||
31AE000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4FC0000
|
direct allocation
|
page read and write
|
||
2894000
|
trusted library allocation
|
page read and write
|
||
8CB000
|
unkown
|
page execute and read and write
|
||
357E000
|
stack
|
page read and write
|
||
35DF000
|
stack
|
page read and write
|
||
513000
|
unkown
|
page execute and write copy
|
||
114F000
|
heap
|
page read and write
|
||
5349000
|
stack
|
page read and write
|
||
3E3F000
|
stack
|
page read and write
|
||
3EA000
|
unkown
|
page execute and read and write
|
||
379A000
|
trusted library allocation
|
page read and write
|
||
6AD0000
|
heap
|
page read and write
|
||
483E000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
2877000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
2C09000
|
trusted library allocation
|
page read and write
|
||
2845000
|
trusted library allocation
|
page read and write
|
||
4B20000
|
direct allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
279E000
|
trusted library allocation
|
page read and write
|
||
26B000
|
unkown
|
page execute and read and write
|
||
347E000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5194000
|
heap
|
page read and write
|
||
11EA000
|
heap
|
page read and write
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
37F8000
|
trusted library allocation
|
page read and write
|
||
2B0A000
|
trusted library allocation
|
page read and write
|
||
101B000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
15AF000
|
heap
|
page read and write
|
||
2A2F000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
direct allocation
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
3599000
|
trusted library allocation
|
page read and write
|
||
29D7000
|
trusted library allocation
|
page read and write
|
||
1235000
|
heap
|
page read and write
|
||
4E30000
|
direct allocation
|
page read and write
|
||
269000
|
unkown
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
4A30000
|
heap
|
page execute and read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
245E000
|
stack
|
page read and write
|
||
2C20000
|
heap
|
page read and write
|
||
52FF000
|
stack
|
page read and write
|
||
F98000
|
heap
|
page read and write
|
||
2C1E000
|
trusted library allocation
|
page read and write
|
||
2AA8000
|
trusted library allocation
|
page read and write
|
||
4670000
|
trusted library allocation
|
page read and write
|
||
29FD000
|
trusted library allocation
|
page read and write
|
||
2944000
|
trusted library allocation
|
page read and write
|
||
2C39000
|
trusted library allocation
|
page read and write
|
||
468E000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5D5000
|
heap
|
page read and write
|
||
4E7E000
|
stack
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
297C000
|
trusted library allocation
|
page read and write
|
||
4CBF000
|
stack
|
page read and write
|
||
2B13000
|
trusted library allocation
|
page read and write
|
||
2A1E000
|
trusted library allocation
|
page read and write
|
||
2C10000
|
trusted library allocation
|
page execute and read and write
|
||
4571000
|
heap
|
page read and write
|
||
33EF000
|
stack
|
page read and write
|
||
5990000
|
trusted library allocation
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
8BA000
|
trusted library allocation
|
page execute and read and write
|
||
10C4000
|
heap
|
page read and write
|
||
86CC000
|
stack
|
page read and write
|
||
5340000
|
direct allocation
|
page execute and read and write
|
||
2965000
|
trusted library allocation
|
page read and write
|
||
14AB000
|
stack
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
2809000
|
trusted library allocation
|
page read and write
|
||
2B21000
|
trusted library allocation
|
page read and write
|
||
393F000
|
stack
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
870E000
|
stack
|
page read and write
|
||
1599000
|
heap
|
page read and write
|
||
2902000
|
trusted library allocation
|
page read and write
|
||
3A7F000
|
stack
|
page read and write
|
||
32EE000
|
stack
|
page read and write
|
||
2A28000
|
trusted library allocation
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
27A0000
|
trusted library allocation
|
page read and write
|
||
2B0E000
|
trusted library allocation
|
page read and write
|
||
514000
|
unkown
|
page execute and write copy
|
||
2C07000
|
trusted library allocation
|
page read and write
|
||
2AD0000
|
trusted library allocation
|
page read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
39DE000
|
stack
|
page read and write
|
||
1198000
|
heap
|
page read and write
|
||
2A45000
|
trusted library allocation
|
page read and write
|
||
15AD000
|
heap
|
page read and write
|
||
2B44000
|
trusted library allocation
|
page read and write
|
||
28D2000
|
trusted library allocation
|
page read and write
|
||
513000
|
unkown
|
page execute and write copy
|
||
4B31000
|
heap
|
page read and write
|
||
479E000
|
stack
|
page read and write
|
||
37AF000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
295F000
|
trusted library allocation
|
page read and write
|
||
3FDF000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
F8A000
|
heap
|
page read and write
|
||
443F000
|
stack
|
page read and write
|
||
146E000
|
stack
|
page read and write
|
||
3BAE000
|
stack
|
page read and write
|
||
158D000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5AD0000
|
trusted library allocation
|
page execute and read and write
|
||
5150000
|
direct allocation
|
page execute and read and write
|
||
2A2E000
|
stack
|
page read and write
|
||
2942000
|
trusted library allocation
|
page read and write
|
||
5A2E000
|
trusted library allocation
|
page read and write
|
||
2CC3000
|
trusted library allocation
|
page read and write
|
||
2AEF000
|
trusted library allocation
|
page read and write
|
||
3B1E000
|
stack
|
page read and write
|
||
129F000
|
stack
|
page read and write
|
||
F7E000
|
heap
|
page read and write
|
||
37EE000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
4A90000
|
trusted library allocation
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
4B20000
|
direct allocation
|
page read and write
|
||
2896000
|
trusted library allocation
|
page read and write
|
||
E8F000
|
stack
|
page read and write
|
||
536E000
|
stack
|
page read and write
|
||
27B3000
|
trusted library allocation
|
page read and write
|
||
2C95000
|
trusted library allocation
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
2882000
|
trusted library allocation
|
page read and write
|
||
4CFE000
|
stack
|
page read and write
|
||
3EA000
|
unkown
|
page execute and read and write
|
||
297A000
|
trusted library allocation
|
page read and write
|
||
89D000
|
trusted library allocation
|
page execute and read and write
|
||
3CFF000
|
stack
|
page read and write
|
||
3B7F000
|
stack
|
page read and write
|
||
2785000
|
trusted library allocation
|
page read and write
|
||
2BFF000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
direct allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
42EF000
|
stack
|
page read and write
|
||
4B1F000
|
stack
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
2D70000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
2C3D000
|
trusted library allocation
|
page read and write
|
||
F7A000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5380000
|
direct allocation
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
755000
|
heap
|
page read and write
|
||
4B20000
|
direct allocation
|
page read and write
|
||
2AC1000
|
trusted library allocation
|
page read and write
|
||
349F000
|
stack
|
page read and write
|
||
35BE000
|
stack
|
page read and write
|
||
500C000
|
stack
|
page read and write
|
||
2DE1000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
54A0000
|
heap
|
page read and write
|
||
281D000
|
trusted library allocation
|
page read and write
|
||
1599000
|
heap
|
page read and write
|
||
2C52000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
269000
|
unkown
|
page write copy
|
||
4B31000
|
heap
|
page read and write
|
||
2BEC000
|
trusted library allocation
|
page read and write
|
||
14CA000
|
heap
|
page read and write
|
||
5340000
|
direct allocation
|
page execute and read and write
|
||
299D000
|
trusted library allocation
|
page read and write
|
||
2B40000
|
trusted library allocation
|
page read and write
|
||
32AF000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
2948000
|
trusted library allocation
|
page read and write
|
||
53D0000
|
direct allocation
|
page execute and read and write
|
||
2DD0000
|
heap
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4FC0000
|
direct allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
28D6000
|
trusted library allocation
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
4D0000
|
unkown
|
page execute and read and write
|
||
6C0000
|
heap
|
page read and write
|
||
5190000
|
heap
|
page read and write
|
||
526E000
|
stack
|
page read and write
|
||
4FB0000
|
direct allocation
|
page execute and read and write
|
||
27CC000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
6B4000
|
unkown
|
page execute and write copy
|
||
4B20000
|
direct allocation
|
page read and write
|
||
4BC0000
|
direct allocation
|
page execute and read and write
|
||
53FE000
|
stack
|
page read and write
|
||
4F7E000
|
stack
|
page read and write
|
||
407F000
|
stack
|
page read and write
|
||
51B0000
|
direct allocation
|
page read and write
|
||
2D97000
|
heap
|
page read and write
|
||
2C2F000
|
trusted library allocation
|
page read and write
|
||
8B6000
|
trusted library allocation
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
2A55000
|
trusted library allocation
|
page read and write
|
||
F67000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
2860000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
2A2A000
|
trusted library allocation
|
page read and write
|
||
2AED000
|
trusted library allocation
|
page read and write
|
||
45FE000
|
stack
|
page read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
2D70000
|
heap
|
page read and write
|
||
4FD000
|
unkown
|
page execute and read and write
|
||
46FE000
|
stack
|
page read and write
|
||
30B7000
|
heap
|
page read and write
|
||
6605000
|
heap
|
page read and write
|
||
423E000
|
stack
|
page read and write
|
||
4E91000
|
direct allocation
|
page read and write
|
||
2B36000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
D12000
|
unkown
|
page execute and read and write
|
||
4990000
|
heap
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
3DEF000
|
stack
|
page read and write
|
||
367F000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
6600000
|
heap
|
page read and write
|
||
2932000
|
trusted library allocation
|
page read and write
|
||
31BF000
|
stack
|
page read and write
|
||
5310000
|
direct allocation
|
page execute and read and write
|
||
27EF000
|
trusted library allocation
|
page read and write
|
||
2D75000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4B50000
|
heap
|
page read and write
|
||
4EAE000
|
stack
|
page read and write
|
||
2B10000
|
trusted library allocation
|
page read and write
|
||
2C18000
|
trusted library allocation
|
page read and write
|
||
580F000
|
stack
|
page read and write
|
||
27E7000
|
trusted library allocation
|
page read and write
|
||
32BF000
|
stack
|
page read and write
|
||
894000
|
trusted library allocation
|
page read and write
|
||
15AF000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
861000
|
unkown
|
page execute and write copy
|
||
6606000
|
heap
|
page read and write
|
||
411F000
|
stack
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page execute and read and write
|
||
2A14000
|
trusted library allocation
|
page read and write
|
||
FFE000
|
stack
|
page read and write
|
||
4FD000
|
unkown
|
page execute and read and write
|
||
4FEE000
|
stack
|
page read and write
|
||
2A81000
|
trusted library allocation
|
page read and write
|
||
4BBF000
|
stack
|
page read and write
|
||
2EEF000
|
stack
|
page read and write
|
||
2C72000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
2C6F000
|
stack
|
page read and write
|
||
510F000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
3E3E000
|
stack
|
page read and write
|
||
3CBF000
|
stack
|
page read and write
|
||
26B000
|
unkown
|
page execute and read and write
|
||
5720000
|
heap
|
page execute and read and write
|
||
3A2F000
|
stack
|
page read and write
|
||
5AE000
|
heap
|
page read and write
|
||
860000
|
unkown
|
page readonly
|
||
10C4000
|
heap
|
page read and write
|
||
333E000
|
stack
|
page read and write
|
||
2AF8000
|
trusted library allocation
|
page read and write
|
||
6B2000
|
unkown
|
page execute and read and write
|
||
2CBD000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
3D9E000
|
stack
|
page read and write
|
||
27D2000
|
trusted library allocation
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4A51000
|
direct allocation
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
2C1C000
|
trusted library allocation
|
page read and write
|
||
1507000
|
heap
|
page read and write
|
||
8CB000
|
trusted library allocation
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
2C26000
|
trusted library allocation
|
page read and write
|
||
280F000
|
trusted library allocation
|
page read and write
|
||
2997000
|
trusted library allocation
|
page read and write
|
||
2A98000
|
trusted library allocation
|
page read and write
|
||
475F000
|
stack
|
page read and write
|
||
56EE000
|
stack
|
page read and write
|
||
283F000
|
trusted library allocation
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
2C93000
|
trusted library allocation
|
page read and write
|
||
29D5000
|
trusted library allocation
|
page read and write
|
||
46BF000
|
stack
|
page read and write
|
||
27BA000
|
trusted library allocation
|
page read and write
|
||
128D000
|
trusted library allocation
|
page execute and read and write
|
||
1586000
|
heap
|
page read and write
|
||
5140000
|
direct allocation
|
page execute and read and write
|
||
40BE000
|
stack
|
page read and write
|
||
287D000
|
trusted library allocation
|
page read and write
|
||
5340000
|
direct allocation
|
page execute and read and write
|
||
2BEE000
|
trusted library allocation
|
page read and write
|
||
2BDA000
|
trusted library allocation
|
page read and write
|
||
880000
|
trusted library allocation
|
page read and write
|
||
4B20000
|
direct allocation
|
page read and write
|
||
51FE000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
27B1000
|
trusted library allocation
|
page read and write
|
||
B8E000
|
stack
|
page read and write
|
||
393E000
|
stack
|
page read and write
|
||
4FC0000
|
direct allocation
|
page execute and read and write
|
||
2B23000
|
trusted library allocation
|
page read and write
|
||
5BB0000
|
heap
|
page read and write
|
||
3E2E000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
6DA6000
|
heap
|
page read and write
|
||
3D5F000
|
stack
|
page read and write
|
||
483F000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
29B4000
|
trusted library allocation
|
page read and write
|
||
2A8B000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
2C70000
|
trusted library allocation
|
page read and write
|
||
674E000
|
stack
|
page read and write
|
||
11D2000
|
heap
|
page read and write
|
||
288E000
|
trusted library allocation
|
page read and write
|
||
554C000
|
stack
|
page read and write
|
||
200000
|
unkown
|
page read and write
|
||
5150000
|
direct allocation
|
page execute and read and write
|
||
B73000
|
unkown
|
page execute and write copy
|
||
5040000
|
direct allocation
|
page execute and read and write
|
||
291B000
|
trusted library allocation
|
page read and write
|
||
1095000
|
heap
|
page read and write
|
||
28AD000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
30DF000
|
stack
|
page read and write
|
||
59C0000
|
trusted library allocation
|
page execute and read and write
|
||
4B50000
|
direct allocation
|
page execute and read and write
|
||
4B31000
|
heap
|
page read and write
|
||
B5E000
|
stack
|
page read and write
|
||
2A0D000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
306E000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
BB0000
|
direct allocation
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
353F000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
5B5D000
|
stack
|
page read and write
|
||
42FF000
|
stack
|
page read and write
|
||
406F000
|
stack
|
page read and write
|
||
2923000
|
trusted library allocation
|
page read and write
|
||
284B000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4A3E000
|
stack
|
page read and write
|
||
2C5D000
|
trusted library allocation
|
page read and write
|
||
2BE7000
|
trusted library allocation
|
page read and write
|
||
429E000
|
stack
|
page read and write
|
||
4B20000
|
direct allocation
|
page read and write
|
||
37F6000
|
trusted library allocation
|
page read and write
|
||
36AE000
|
stack
|
page read and write
|
||
1168000
|
heap
|
page read and write
|
||
5170000
|
direct allocation
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
54EB000
|
stack
|
page read and write
|
||
432E000
|
stack
|
page read and write
|
||
B74000
|
unkown
|
page execute and write copy
|
||
2925000
|
trusted library allocation
|
page read and write
|
||
493F000
|
stack
|
page read and write
|
||
28F3000
|
trusted library allocation
|
page read and write
|
||
2993000
|
trusted library allocation
|
page read and write
|
||
461F000
|
stack
|
page read and write
|
||
43DE000
|
stack
|
page read and write
|
||
595E000
|
stack
|
page read and write
|
||
2C0D000
|
trusted library allocation
|
page read and write
|
||
2898000
|
trusted library allocation
|
page read and write
|
||
4991000
|
heap
|
page read and write
|
||
2770000
|
trusted library allocation
|
page read and write
|
||
29B6000
|
trusted library allocation
|
page read and write
|
||
289A000
|
trusted library allocation
|
page read and write
|
||
F0B000
|
stack
|
page read and write
|
||
282C000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5021000
|
direct allocation
|
page read and write
|
||
28AB000
|
trusted library allocation
|
page read and write
|
||
2823000
|
trusted library allocation
|
page read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
27B5000
|
trusted library allocation
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
4DF9000
|
stack
|
page read and write
|
||
32FE000
|
stack
|
page read and write
|
||
45BE000
|
stack
|
page read and write
|
||
2AF1000
|
trusted library allocation
|
page read and write
|
||
335F000
|
stack
|
page read and write
|
||
2A59000
|
trusted library allocation
|
page read and write
|
||
5360000
|
direct allocation
|
page execute and read and write
|
||
325E000
|
stack
|
page read and write
|
||
14CE000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
2C4E000
|
trusted library allocation
|
page read and write
|
||
29AE000
|
trusted library allocation
|
page read and write
|
||
2B2F000
|
stack
|
page read and write
|
||
28FA000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
37FF000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
B5B000
|
stack
|
page read and write
|
||
4BB0000
|
direct allocation
|
page execute and read and write
|
||
291F000
|
trusted library allocation
|
page read and write
|
||
6D7A000
|
heap
|
page read and write
|
||
5AE0000
|
trusted library section
|
page read and write
|
||
392E000
|
stack
|
page read and write
|
||
C0000
|
unkown
|
page readonly
|
||
31BF000
|
stack
|
page read and write
|
||
29CB000
|
trusted library allocation
|
page read and write
|
||
433E000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
276C000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
8C5000
|
trusted library allocation
|
page execute and read and write
|
||
140E000
|
stack
|
page read and write
|
||
2868000
|
trusted library allocation
|
page read and write
|
||
2A20000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4570000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
28B3000
|
trusted library allocation
|
page read and write
|
||
5A15000
|
trusted library allocation
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
2A74000
|
trusted library allocation
|
page read and write
|
||
27C4000
|
trusted library allocation
|
page read and write
|
||
2A07000
|
trusted library allocation
|
page read and write
|
||
5390000
|
direct allocation
|
page execute and read and write
|
||
23D8000
|
heap
|
page read and write
|
||
316F000
|
stack
|
page read and write
|
||
572E000
|
stack
|
page read and write
|
||
2879000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4A20000
|
trusted library allocation
|
page read and write
|
||
52FB000
|
stack
|
page read and write
|
||
2B08000
|
trusted library allocation
|
page read and write
|
||
15AF000
|
heap
|
page read and write
|
||
12A6000
|
trusted library allocation
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
2B3A000
|
trusted library allocation
|
page read and write
|
||
433F000
|
stack
|
page read and write
|
||
276E000
|
trusted library allocation
|
page read and write
|
||
497F000
|
stack
|
page read and write
|
||
2ACA000
|
trusted library allocation
|
page read and write
|
||
5A9C000
|
stack
|
page read and write
|
||
513000
|
unkown
|
page execute and read and write
|
||
2AEB000
|
trusted library allocation
|
page read and write
|
||
2CA6000
|
trusted library allocation
|
page read and write
|
||
4B40000
|
heap
|
page read and write
|
||
4FC0000
|
direct allocation
|
page execute and read and write
|
||
5558000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
880E000
|
stack
|
page read and write
|
||
2B0C000
|
trusted library allocation
|
page read and write
|
||
8C9000
|
unkown
|
page read and write
|
||
3ABE000
|
stack
|
page read and write
|
||
2978000
|
trusted library allocation
|
page read and write
|
||
4D0000
|
unkown
|
page execute and read and write
|
||
4B31000
|
heap
|
page read and write
|
||
5340000
|
direct allocation
|
page execute and read and write
|
||
27E5000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
289D000
|
trusted library allocation
|
page read and write
|
||
2961000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
28E9000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
1270000
|
trusted library allocation
|
page read and write
|
||
8A0000
|
trusted library allocation
|
page read and write
|
||
3BBE000
|
stack
|
page read and write
|
||
294C000
|
trusted library allocation
|
page read and write
|
||
26E7000
|
heap
|
page read and write
|
||
4FC0000
|
direct allocation
|
page execute and read and write
|
||
4B90000
|
direct allocation
|
page execute and read and write
|
||
287F000
|
trusted library allocation
|
page read and write
|
||
2C50000
|
trusted library allocation
|
page read and write
|
||
29D1000
|
trusted library allocation
|
page read and write
|
||
BAC000
|
stack
|
page read and write
|
||
28ED000
|
trusted library allocation
|
page read and write
|
||
29B0000
|
trusted library allocation
|
page read and write
|
||
291D000
|
trusted library allocation
|
page read and write
|
||
3F3F000
|
stack
|
page read and write
|
||
6DAE000
|
heap
|
page read and write
|
||
2B6E000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
2A5D000
|
trusted library allocation
|
page read and write
|
||
3F6E000
|
stack
|
page read and write
|
||
3C5E000
|
stack
|
page read and write
|
||
12AA000
|
trusted library allocation
|
page execute and read and write
|
||
2D6E000
|
stack
|
page read and write
|
||
C2000
|
unkown
|
page readonly
|
||
4B31000
|
heap
|
page read and write
|
||
70F0000
|
heap
|
page read and write
|
||
2A70000
|
trusted library allocation
|
page read and write
|
||
2934000
|
trusted library allocation
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
8C7000
|
trusted library allocation
|
page execute and read and write
|
||
27B7000
|
trusted library allocation
|
page read and write
|
||
2C8F000
|
trusted library allocation
|
page read and write
|
||
512E000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
5AC0000
|
trusted library allocation
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
AFD000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
F58000
|
heap
|
page read and write
|
||
4BF0000
|
direct allocation
|
page execute and read and write
|
||
795000
|
heap
|
page read and write
|
||
5A2E000
|
stack
|
page read and write
|
||
59A0000
|
trusted library allocation
|
page read and write
|
||
28D9000
|
trusted library allocation
|
page read and write
|
||
29AC000
|
trusted library allocation
|
page read and write
|
||
2E9F000
|
stack
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
2B2A000
|
trusted library allocation
|
page read and write
|
||
2890000
|
trusted library allocation
|
page read and write
|
||
287B000
|
trusted library allocation
|
page read and write
|
||
558C000
|
heap
|
page read and write
|
||
3ADF000
|
stack
|
page read and write
|
||
4B3D000
|
stack
|
page read and write
|
||
4BBE000
|
stack
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
2A8F000
|
trusted library allocation
|
page read and write
|
||
2A22000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
2A3D000
|
trusted library allocation
|
page read and write
|
||
27A2000
|
trusted library allocation
|
page read and write
|
||
B73000
|
unkown
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
3591000
|
trusted library allocation
|
page read and write
|
||
5180000
|
direct allocation
|
page execute and read and write
|
||
294F000
|
trusted library allocation
|
page read and write
|
||
4D00000
|
heap
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
2ADC000
|
trusted library allocation
|
page read and write
|
||
2C40000
|
trusted library allocation
|
page read and write
|
||
27D5000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
288A000
|
trusted library allocation
|
page read and write
|
||
401E000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
2C46000
|
trusted library allocation
|
page read and write
|
||
27FE000
|
trusted library allocation
|
page read and write
|
||
2A51000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
41EE000
|
stack
|
page read and write
|
||
5830000
|
trusted library section
|
page read and write
|
||
40BF000
|
stack
|
page read and write
|
||
2AD4000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
5330000
|
direct allocation
|
page execute and read and write
|
||
F70000
|
heap
|
page read and write
|
||
2A3F000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5211000
|
direct allocation
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
74C000
|
stack
|
page read and write
|
||
2C37000
|
trusted library allocation
|
page read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
151F000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
1599000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
2936000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
36BF000
|
stack
|
page read and write
|
||
2A53000
|
trusted library allocation
|
page read and write
|
||
497E000
|
stack
|
page read and write
|
||
2AB3000
|
trusted library allocation
|
page read and write
|
||
52C0000
|
heap
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
44DF000
|
stack
|
page read and write
|
||
2480000
|
heap
|
page execute and read and write
|
||
4B31000
|
heap
|
page read and write
|
||
1163000
|
heap
|
page read and write
|
||
27FC000
|
trusted library allocation
|
page read and write
|
||
28EB000
|
trusted library allocation
|
page read and write
|
||
290A000
|
trusted library allocation
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
63C000
|
heap
|
page read and write
|
||
389E000
|
stack
|
page read and write
|
||
900000
|
trusted library allocation
|
page read and write
|
||
4D30000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
7100000
|
heap
|
page read and write
|
||
2982000
|
trusted library allocation
|
page read and write
|
||
2CA8000
|
trusted library allocation
|
page read and write
|
||
553F000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
49F0000
|
direct allocation
|
page read and write
|
||
29B8000
|
trusted library allocation
|
page read and write
|
||
1284000
|
trusted library allocation
|
page read and write
|
||
2866000
|
trusted library allocation
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
4991000
|
heap
|
page read and write
|
||
51E0000
|
direct allocation
|
page execute and read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
D14000
|
unkown
|
page execute and write copy
|
||
30A0000
|
direct allocation
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
2A6E000
|
trusted library allocation
|
page read and write
|
||
2AA6000
|
trusted library allocation
|
page read and write
|
||
262000
|
unkown
|
page execute and read and write
|
||
FEB000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
8C9000
|
unkown
|
page write copy
|
||
2CAE000
|
stack
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
6D70000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
487E000
|
stack
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
3DE1000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
2AD2000
|
trusted library allocation
|
page read and write
|
||
70FE000
|
heap
|
page read and write
|
||
2C6C000
|
trusted library allocation
|
page read and write
|
||
28EF000
|
trusted library allocation
|
page read and write
|
||
29F4000
|
trusted library allocation
|
page read and write
|
||
2A78000
|
trusted library allocation
|
page read and write
|
||
4FC0000
|
direct allocation
|
page execute and read and write
|
||
A1E000
|
stack
|
page read and write
|
||
5AA6000
|
trusted library allocation
|
page read and write
|
||
2C24000
|
trusted library allocation
|
page read and write
|
||
28BB000
|
trusted library allocation
|
page read and write
|
||
26B0000
|
heap
|
page read and write
|
||
442F000
|
stack
|
page read and write
|
||
2929000
|
trusted library allocation
|
page read and write
|
||
2C3B000
|
trusted library allocation
|
page read and write
|
||
8B2000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
direct allocation
|
page execute and read and write
|
||
276A000
|
trusted library allocation
|
page read and write
|
||
2781000
|
trusted library allocation
|
page read and write
|
||
5AA000
|
heap
|
page read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
68E000
|
heap
|
page read and write
|
||
352F000
|
stack
|
page read and write
|
||
2AAC000
|
trusted library allocation
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
4BE0000
|
direct allocation
|
page execute and read and write
|
||
2A0F000
|
trusted library allocation
|
page read and write
|
||
570E000
|
stack
|
page read and write
|
||
294A000
|
trusted library allocation
|
page read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
356E000
|
stack
|
page read and write
|
||
2BBE000
|
stack
|
page read and write
|
||
3B6F000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
514000
|
unkown
|
page execute and write copy
|
||
2AC7000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
direct allocation
|
page execute and read and write
|
||
2A43000
|
trusted library allocation
|
page read and write
|
||
46FF000
|
stack
|
page read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
302F000
|
stack
|
page read and write
|
||
10AE000
|
stack
|
page read and write
|
||
2C01000
|
trusted library allocation
|
page read and write
|
||
A4A000
|
unkown
|
page execute and read and write
|
||
2804000
|
trusted library allocation
|
page read and write
|
||
2C0D000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
6B4000
|
unkown
|
page execute and write copy
|
||
26B000
|
unkown
|
page execute and read and write
|
||
2338000
|
trusted library allocation
|
page read and write
|
||
28CE000
|
trusted library allocation
|
page read and write
|
||
2911000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5514000
|
heap
|
page read and write
|
||
4D20000
|
heap
|
page read and write
|
||
5980000
|
trusted library allocation
|
page read and write
|
||
262000
|
unkown
|
page execute and read and write
|
||
2CBF000
|
stack
|
page read and write
|
||
269000
|
unkown
|
page read and write
|
||
282A000
|
trusted library allocation
|
page read and write
|
||
514000
|
unkown
|
page execute and write copy
|
||
27D0000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
12D0000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
50EE000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5350000
|
direct allocation
|
page execute and read and write
|
||
3E7E000
|
stack
|
page read and write
|
||
2A4F000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
29DD000
|
trusted library allocation
|
page read and write
|
||
2AA2000
|
trusted library allocation
|
page read and write
|
||
74E000
|
stack
|
page read and write
|
||
14F6000
|
heap
|
page read and write
|
||
2ADA000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
2CBF000
|
trusted library allocation
|
page read and write
|
||
5340000
|
direct allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
27EB000
|
trusted library allocation
|
page read and write
|
||
B3E000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5920000
|
trusted library allocation
|
page read and write
|
||
473E000
|
stack
|
page read and write
|
||
1294000
|
trusted library allocation
|
page read and write
|
||
54D0000
|
heap
|
page read and write
|
||
5160000
|
direct allocation
|
page execute and read and write
|
||
2D9D000
|
heap
|
page read and write
|
||
2DFF000
|
stack
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
4A1E000
|
stack
|
page read and write
|
||
1591000
|
heap
|
page read and write
|
||
BB0000
|
direct allocation
|
page read and write
|
||
2C74000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
54E1000
|
heap
|
page read and write
|
||
F83000
|
heap
|
page read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
4F7F000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
12B7000
|
trusted library allocation
|
page execute and read and write
|
||
6C6C000
|
stack
|
page read and write
|
||
2A8D000
|
trusted library allocation
|
page read and write
|
||
4BA0000
|
direct allocation
|
page execute and read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
2A41000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
27CA000
|
trusted library allocation
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
451E000
|
stack
|
page read and write
|
||
522F000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
200000
|
unkown
|
page read and write
|
||
12FA000
|
stack
|
page read and write
|
||
2C20000
|
trusted library allocation
|
page read and write
|
||
53E0000
|
direct allocation
|
page execute and read and write
|
||
2C60000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
279C000
|
trusted library allocation
|
page read and write
|
||
26E0000
|
heap
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
51B0000
|
direct allocation
|
page read and write
|
||
860000
|
unkown
|
page read and write
|
||
2AAE000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
2A76000
|
trusted library allocation
|
page read and write
|
||
2A1C000
|
trusted library allocation
|
page read and write
|
||
51A0000
|
direct allocation
|
page execute and read and write
|
||
5572000
|
heap
|
page read and write
|
||
37FE000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
371F000
|
stack
|
page read and write
|
||
2817000
|
trusted library allocation
|
page read and write
|
||
4991000
|
heap
|
page read and write
|
||
117D000
|
heap
|
page read and write
|
||
2A7B000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
2C33000
|
trusted library allocation
|
page read and write
|
||
53AE000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5320000
|
direct allocation
|
page execute and read and write
|
||
3F7F000
|
stack
|
page read and write
|
||
4ABE000
|
stack
|
page read and write
|
||
4FD000
|
unkown
|
page execute and read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
305F000
|
stack
|
page read and write
|
||
1290000
|
trusted library allocation
|
page read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
397E000
|
stack
|
page read and write
|
||
3FBE000
|
stack
|
page read and write
|
||
1571000
|
heap
|
page read and write
|
||
32FF000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
BB0000
|
direct allocation
|
page read and write
|
||
3A3F000
|
stack
|
page read and write
|
||
2DAF000
|
stack
|
page read and write
|
||
5A20000
|
trusted library allocation
|
page read and write
|
||
2847000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
2980000
|
trusted library allocation
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5C5E000
|
stack
|
page read and write
|
||
27ED000
|
trusted library allocation
|
page read and write
|
||
684F000
|
stack
|
page read and write
|
||
2AA0000
|
trusted library allocation
|
page read and write
|
||
2A91000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
trusted library allocation
|
page read and write
|
||
4B20000
|
direct allocation
|
page read and write
|
||
2906000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
BB0000
|
direct allocation
|
page read and write
|
||
425F000
|
stack
|
page read and write
|
||
285A000
|
trusted library allocation
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
4A7F000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
69CE000
|
stack
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
29B2000
|
trusted library allocation
|
page read and write
|
||
40AE000
|
stack
|
page read and write
|
||
5B30000
|
trusted library section
|
page read and write
|
||
3EDE000
|
stack
|
page read and write
|
||
1586000
|
heap
|
page read and write
|
||
2A96000
|
trusted library allocation
|
page read and write
|
||
EFD000
|
stack
|
page read and write
|
||
201000
|
unkown
|
page execute and write copy
|
||
64C000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4980000
|
heap
|
page read and write
|
||
12A0000
|
trusted library allocation
|
page read and write
|
||
2806000
|
trusted library allocation
|
page read and write
|
||
29EF000
|
stack
|
page read and write
|
||
557E000
|
stack
|
page read and write
|
||
27E3000
|
trusted library allocation
|
page read and write
|
||
15B2000
|
heap
|
page read and write
|
||
2970000
|
trusted library allocation
|
page read and write
|
||
2CC1000
|
trusted library allocation
|
page read and write
|
||
2C31000
|
trusted library allocation
|
page read and write
|
||
1283000
|
trusted library allocation
|
page execute and read and write
|
||
112B000
|
heap
|
page read and write
|
||
5440000
|
remote allocation
|
page read and write
|
||
15A2000
|
heap
|
page read and write
|
||
2CBB000
|
trusted library allocation
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
5000000
|
direct allocation
|
page execute and read and write
|
||
6B2000
|
unkown
|
page execute and read and write
|
||
6B2000
|
unkown
|
page execute and read and write
|
||
4FD0000
|
direct allocation
|
page execute and read and write
|
||
26AE000
|
stack
|
page read and write
|
||
41BF000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
41AF000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
1027000
|
heap
|
page read and write
|
||
2D6C000
|
stack
|
page read and write
|
||
49D0000
|
trusted library allocation
|
page execute and read and write
|
||
14B0000
|
heap
|
page read and write
|
||
4B20000
|
direct allocation
|
page read and write
|
||
BCB000
|
heap
|
page read and write
|
||
543F000
|
stack
|
page read and write
|
||
29D9000
|
trusted library allocation
|
page read and write
|
||
1024000
|
heap
|
page read and write
|
||
28E7000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
29F0000
|
trusted library allocation
|
page read and write
|
||
29DB000
|
trusted library allocation
|
page read and write
|
||
44BE000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4FAC000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5340000
|
direct allocation
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
2F3F000
|
stack
|
page read and write
|
||
4991000
|
heap
|
page read and write
|
||
54B0000
|
heap
|
page read and write
|
||
5130000
|
direct allocation
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
48DE000
|
stack
|
page read and write
|
||
29A2000
|
trusted library allocation
|
page read and write
|
||
8C2000
|
unkown
|
page execute and read and write
|
||
4B31000
|
heap
|
page read and write
|
||
2802000
|
trusted library allocation
|
page read and write
|
||
53B0000
|
direct allocation
|
page execute and read and write
|
||
564F000
|
stack
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
8C2000
|
trusted library allocation
|
page read and write
|
||
383E000
|
stack
|
page read and write
|
||
5E00000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
2AD8000
|
trusted library allocation
|
page read and write
|
||
B5D000
|
unkown
|
page execute and read and write
|
||
11D7000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
BB0000
|
direct allocation
|
page read and write
|
||
437E000
|
stack
|
page read and write
|
||
29F8000
|
trusted library allocation
|
page read and write
|
||
2AD6000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
505000
|
unkown
|
page execute and read and write
|
||
2C35000
|
trusted library allocation
|
page read and write
|
||
505000
|
unkown
|
page execute and read and write
|
||
2904000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
592F000
|
stack
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
293E000
|
trusted library allocation
|
page read and write
|
||
2AC5000
|
trusted library allocation
|
page read and write
|
||
B1F000
|
stack
|
page read and write
|
||
27A7000
|
trusted library allocation
|
page read and write
|
||
2A24000
|
trusted library allocation
|
page read and write
|
||
447F000
|
stack
|
page read and write
|
||
2B04000
|
trusted library allocation
|
page read and write
|
||
2849000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
direct allocation
|
page read and write
|
||
1022000
|
heap
|
page read and write
|
||
51B0000
|
direct allocation
|
page read and write
|
||
547E000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
29EE000
|
trusted library allocation
|
page read and write
|
||
279A000
|
trusted library allocation
|
page read and write
|
||
10FD000
|
stack
|
page read and write
|
||
309E000
|
stack
|
page read and write
|
||
3BFE000
|
stack
|
page read and write
|
||
4FC0000
|
direct allocation
|
page read and write
|
||
3D3E000
|
stack
|
page read and write
|
||
343F000
|
stack
|
page read and write
|
||
439F000
|
stack
|
page read and write
|
||
4B20000
|
direct allocation
|
page read and write
|
||
366F000
|
stack
|
page read and write
|
||
266E000
|
stack
|
page read and write
|
||
29F2000
|
trusted library allocation
|
page read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
489F000
|
stack
|
page read and write
|
||
582E000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
2787000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
321F000
|
stack
|
page read and write
|
||
505000
|
unkown
|
page execute and read and write
|
||
27EF000
|
stack
|
page read and write
|
||
342E000
|
stack
|
page read and write
|
||
1598000
|
heap
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
28CC000
|
trusted library allocation
|
page read and write
|
||
2A60000
|
trusted library allocation
|
page read and write
|
||
415E000
|
stack
|
page read and write
|
||
36BE000
|
stack
|
page read and write
|
||
BB0000
|
direct allocation
|
page read and write
|
||
2BCE000
|
stack
|
page read and write
|
||
4E30000
|
direct allocation
|
page read and write
|
||
5150000
|
direct allocation
|
page execute and read and write
|
||
2ABD000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
BB0000
|
direct allocation
|
page read and write
|
||
BDC000
|
heap
|
page read and write
|
||
4B20000
|
direct allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
2460000
|
trusted library allocation
|
page read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
2AF3000
|
trusted library allocation
|
page read and write
|
||
4C30000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
49F0000
|
direct allocation
|
page read and write
|
||
45BF000
|
stack
|
page read and write
|
||
2841000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
2B3E000
|
trusted library allocation
|
page read and write
|
||
456F000
|
stack
|
page read and write
|
||
457F000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
285E000
|
trusted library allocation
|
page read and write
|
||
890000
|
trusted library allocation
|
page read and write
|
||
29EA000
|
trusted library allocation
|
page read and write
|
||
37BF000
|
stack
|
page read and write
|
||
29D3000
|
trusted library allocation
|
page read and write
|
||
27CE000
|
trusted library allocation
|
page read and write
|
||
299B000
|
trusted library allocation
|
page read and write
|
||
2AAA000
|
trusted library allocation
|
page read and write
|
||
6ACF000
|
stack
|
page read and write
|
||
29CF000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
direct allocation
|
page execute and read and write
|
||
447E000
|
stack
|
page read and write
|
||
8490000
|
heap
|
page read and write
|
||
3BBF000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
159D000
|
heap
|
page read and write
|
||
8F0000
|
trusted library allocation
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
3A7E000
|
stack
|
page read and write
|
||
B65000
|
unkown
|
page execute and read and write
|
||
4B31000
|
heap
|
page read and write
|
||
8AD000
|
trusted library allocation
|
page execute and read and write
|
||
4B31000
|
heap
|
page read and write
|
||
2DBE000
|
stack
|
page read and write
|
||
3CEE000
|
stack
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
55EE000
|
stack
|
page read and write
|
||
41FE000
|
stack
|
page read and write
|
||
59D0000
|
trusted library allocation
|
page execute and read and write
|
||
37D8000
|
trusted library allocation
|
page read and write
|
||
5050000
|
direct allocation
|
page execute and read and write
|
||
4B31000
|
heap
|
page read and write
|
||
2AA4000
|
trusted library allocation
|
page read and write
|
||
53A0000
|
direct allocation
|
page execute and read and write
|
||
5A0000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
361E000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
5150000
|
direct allocation
|
page execute and read and write
|
||
5150000
|
direct allocation
|
page execute and read and write
|
||
28BD000
|
trusted library allocation
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
2ABF000
|
trusted library allocation
|
page read and write
|
||
295D000
|
trusted library allocation
|
page read and write
|
||
599D000
|
stack
|
page read and write
|
||
2A72000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4F90000
|
direct allocation
|
page execute and read and write
|
||
4B31000
|
heap
|
page read and write
|
||
2917000
|
trusted library allocation
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
49DF000
|
stack
|
page read and write
|
||
2940000
|
trusted library allocation
|
page read and write
|
||
28AF000
|
trusted library allocation
|
page read and write
|
||
D1C000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
281B000
|
trusted library allocation
|
page read and write
|
||
27A4000
|
trusted library allocation
|
page read and write
|
||
4E20000
|
trusted library allocation
|
page read and write
|
||
513000
|
unkown
|
page execute and write copy
|
||
4D21000
|
heap
|
page read and write
|
||
698F000
|
stack
|
page read and write
|
||
4B30000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
85CC000
|
stack
|
page read and write
|
||
307F000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
15A2000
|
heap
|
page read and write
|
||
241C000
|
stack
|
page read and write
|
||
262000
|
unkown
|
page execute and read and write
|
||
5BA0000
|
trusted library allocation
|
page execute and read and write
|
||
2946000
|
trusted library allocation
|
page read and write
|
||
1586000
|
heap
|
page read and write
|
||
296C000
|
trusted library allocation
|
page read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
2995000
|
trusted library allocation
|
page read and write
|
||
7100000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
2B27000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
direct allocation
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
2927000
|
trusted library allocation
|
page read and write
|
||
2821000
|
trusted library allocation
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
2B06000
|
trusted library allocation
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
2B42000
|
trusted library allocation
|
page read and write
|
||
2CC7000
|
trusted library allocation
|
page read and write
|
||
5150000
|
direct allocation
|
page execute and read and write
|
||
269000
|
unkown
|
page write copy
|
||
5929000
|
trusted library allocation
|
page read and write
|
||
2AF5000
|
trusted library allocation
|
page read and write
|
||
2C22000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
51C0000
|
direct allocation
|
page execute and read and write
|
||
258E000
|
stack
|
page read and write
|
||
3CFE000
|
stack
|
page read and write
|
||
3F2F000
|
stack
|
page read and write
|
||
5531000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
446E000
|
stack
|
page read and write
|
||
BB0000
|
direct allocation
|
page read and write
|
||
2A12000
|
trusted library allocation
|
page read and write
|
||
159D000
|
heap
|
page read and write
|
||
4FAF000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
28B1000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
6D6C000
|
stack
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
5030000
|
direct allocation
|
page execute and read and write
|
||
5AA0000
|
trusted library allocation
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
27C8000
|
trusted library allocation
|
page read and write
|
||
13DF000
|
stack
|
page read and write
|
||
17BE000
|
stack
|
page read and write
|
||
27FA000
|
trusted library allocation
|
page read and write
|
||
4CFF000
|
stack
|
page read and write
|
||
2F9F000
|
stack
|
page read and write
|
||
2839000
|
trusted library allocation
|
page read and write
|
||
284D000
|
trusted library allocation
|
page read and write
|
||
28EF000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
28B9000
|
trusted library allocation
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
2798000
|
trusted library allocation
|
page read and write
|
||
2CFE000
|
stack
|
page read and write
|
||
16BF000
|
stack
|
page read and write
|
||
1571000
|
heap
|
page read and write
|
||
296A000
|
trusted library allocation
|
page read and write
|
||
375E000
|
stack
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
582E000
|
stack
|
page read and write
|
||
118E000
|
heap
|
page read and write
|
||
BB0000
|
direct allocation
|
page read and write
|
||
513000
|
unkown
|
page execute and read and write
|
||
29AA000
|
trusted library allocation
|
page read and write
|
||
281F000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
688E000
|
stack
|
page read and write
|
||
2789000
|
trusted library allocation
|
page read and write
|
||
56BF000
|
stack
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
2999000
|
trusted library allocation
|
page read and write
|
||
282E000
|
trusted library allocation
|
page read and write
|
||
FA5000
|
heap
|
page read and write
|
||
2C54000
|
trusted library allocation
|
page read and write
|
||
2A05000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
269000
|
unkown
|
page read and write
|
||
36FE000
|
stack
|
page read and write
|
||
5970000
|
trusted library allocation
|
page execute and read and write
|
||
2B2E000
|
trusted library allocation
|
page read and write
|
||
45C000
|
stack
|
page read and write
|
||
28D0000
|
trusted library allocation
|
page read and write
|
||
277D000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
385F000
|
stack
|
page read and write
|
||
4BD0000
|
direct allocation
|
page execute and read and write
|
||
3CAF000
|
stack
|
page read and write
|
||
29EC000
|
trusted library allocation
|
page read and write
|
||
4FA0000
|
direct allocation
|
page execute and read and write
|
There are 1309 hidden memdumps, click here to show them.