Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
z1Quotation.scr.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_z1Quotation.scr._0c583a83ca27c495721c8da0965d5fefb99bec_319e390f_6e567999-aeed-41e3-83e4-b4604fbf4901\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE267.tmp.dmp
|
Mini DuMP crash report, 14 streams, Mon Sep 30 10:09:20 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE343.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE373.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Intel\ShaderCache\55ef227cc1d1c888edc3af337e019091d8c0eafc546d066b0a6a76da081ea88f
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Intel\ShaderCache\57bf52f84f9bbfff2af5f5bd73dee023aeb97bd173672fd615cdf006f13c5099
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\D3DSCache\c6e1bc7b336e2cfe\6F75932F-7DFC-4FB0-B4B8-12DE1AC415DA_VEN_8086&DEV_3E98&SUBSYS_3E98&REV_2.idx
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\D3DSCache\c6e1bc7b336e2cfe\6F75932F-7DFC-4FB0-B4B8-12DE1AC415DA_VEN_8086&DEV_3E98&SUBSYS_3E98&REV_2.lock
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\D3DSCache\c6e1bc7b336e2cfe\6F75932F-7DFC-4FB0-B4B8-12DE1AC415DA_VEN_8086&DEV_3E98&SUBSYS_3E98&REV_2.val
|
Matlab v4 mat-file (little endian) (, numeric, rows 0, columns 16, imaginary
|
dropped
|
||
C:\Users\user\AppData\Local\D3DSCache\c6e1bc7b336e2cfe\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\D3DSCache\c6e1bc7b336e2cfe\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\D3DSCache\c6e1bc7b336e2cfe\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val
|
Matlab v4 mat-file (little endian) (, numeric, rows 0, columns 16, imaginary
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B0ZBZFKQ\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\azdzamjeqinayzgxunqjk
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhv73BF.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x96dfe6b7, page size 32768, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhvB84A.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x96dfe6b7, page size 32768, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhvF803.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x96dfe6b7, page size 32768, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\jcokhfyxinncnfcgtxknzv
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsi8284.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsi8284.tmp\nsExec.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsx8070.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\sysinfo.txt
|
ISO-8859 text, with very long lines (1240), with CRLF, LF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\xadmhfv
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Profilere55\Fodterapeut.Bew
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Profilere55\Jolines\spirographin.sur
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Profilere55\Jolines\talpatate.luk
|
DIY-Thermocam raw data (Lepton 2.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration:
offset 0.000000, slope 33554432.000000
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Profilere55\Overtakes.fly
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Profilere55\Perichord.str
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Profilere55\Septifragal.fla
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Profilere55\Sesquihydrated12.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Profilere55\Siskenernes.Mom105
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Profilere55\Terpe.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ol7uiqa8.default-release\places.sqlite-shm
|
data
|
dropped
|
There are 24 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\z1Quotation.scr.exe
|
"C:\Users\user\Desktop\z1Quotation.scr.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "250^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "244^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "227^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "255^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "244^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "253^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "130^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "131^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "139^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "139^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "242^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "195^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "212^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "208^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "197^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "212^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "247^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "216^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "221^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "212^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "240^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "153^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "220^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "145^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "195^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "133^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "145^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "157^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "145^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "216^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "145^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "129^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "201^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "137^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "129^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "129^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "129^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "129^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "129^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "129^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "129^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "157^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "145^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "216^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "145^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "129^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "157^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "145^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "193^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "145^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "129^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "157^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "145^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "216^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "145^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "133^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "157^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "145^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "216^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "145^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "129^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "201^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "137^177"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "129^177"
|
||
C:\Users\user\Desktop\z1Quotation.scr.exe
|
"C:\Users\user\Desktop\z1Quotation.scr.exe"
|
||
C:\Windows\SysWOW64\dxdiag.exe
|
"C:\Windows\System32\dxdiag.exe" /t C:\Users\user\AppData\Local\Temp\sysinfo.txt
|
||
C:\Users\user\Desktop\z1Quotation.scr.exe
|
C:\Users\user\Desktop\z1Quotation.scr.exe /stext "C:\Users\user\AppData\Local\Temp\jcokhfyxinncnfcgtxknzv"
|
||
C:\Users\user\Desktop\z1Quotation.scr.exe
|
C:\Users\user\Desktop\z1Quotation.scr.exe /stext "C:\Users\user\AppData\Local\Temp\hhsvynxt"
|
||
C:\Users\user\Desktop\z1Quotation.scr.exe
|
C:\Users\user\Desktop\z1Quotation.scr.exe /stext "C:\Users\user\AppData\Local\Temp\pqvxpoqshoxjfvzq"
|
||
C:\Users\user\Desktop\z1Quotation.scr.exe
|
C:\Users\user\Desktop\z1Quotation.scr.exe /sort "Visit Time" /stext "C:\Users\user\AppData\Local\Temp\azdzamjeqinayzgxunqjk"
|
||
C:\Users\user\Desktop\z1Quotation.scr.exe
|
C:\Users\user\Desktop\z1Quotation.scr.exe /stext "C:\Users\user\AppData\Local\Temp\xadmhfv"
|
||
C:\Users\user\Desktop\z1Quotation.scr.exe
|
C:\Users\user\Desktop\z1Quotation.scr.exe /stext "C:\Users\user\AppData\Local\Temp\xpsjxjoeplzrro"
|
||
C:\Users\user\Desktop\z1Quotation.scr.exe
|
C:\Users\user\Desktop\z1Quotation.scr.exe /stext "C:\Users\user\AppData\Local\Temp\gymlnlyltcmojzwgtmnvsm"
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\drivers\mstee.sys
|
|||
C:\Windows\System32\drivers\mskssrv.sys
|
|||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 1412 -s 2348
|
There are 131 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://telesavers.co.za/-4062-986e-6b0fce555694s
|
unknown
|
||
https://telesavers.co.za/FrKSUMZ203.binc
|
unknown
|
||
https://telesavers.co.za/)
|
unknown
|
||
https://telesavers.co.za/(
|
unknown
|
||
https://telesavers.co.za/Tt
|
unknown
|
||
https://telesavers.co.za/FrKSUMZ203.binrasadhlp.dll
|
unknown
|
||
https://telesavers.co.za/-4062-986e-6b0fce555694
|
unknown
|
||
https://telesavers.co.za/bo
|
unknown
|
||
https://telesavers.co.za/-4062-986e-6b0fce555694sDN
|
unknown
|
||
https://telesavers.co.za/FrKSUMZ203.binAppData
|
unknown
|
||
https://telesavers.co.za/FrKSUMZ203.binI
|
unknown
|
||
https://telesavers.co.za/telesavers.co.za5
|
unknown
|
||
https://telesavers.co.za/Jo
|
unknown
|
||
https://telesavers.co.za/
|
unknown
|
||
https://telesavers.co.za/telesavers.co.za
|
unknown
|
||
https://telesavers.co.za/FrKSUMZ203.bin
|
102.65.21.26
|
||
https://telesavers.co.za/Bo
|
unknown
|
||
http://geoplugin.net/json.gpB_
|
unknown
|
||
http://geoplugin.net/json.gpH_
|
unknown
|
||
http://ocsp.quovadisglobal.com0O
|
unknown
|
||
http://geoplugin.net/json.gpsg
|
unknown
|
||
http://geoplugin.net/json.gpo_
|
unknown
|
||
http://crl.quovadisglobal.com/qvicag4.crl0
|
unknown
|
||
http://www.imvu.com
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
http://trust.quovadisglobal.com/qvrca.crt0
|
unknown
|
||
http://pki.intel.com/crt/IntelCA7B.crt0
|
unknown
|
||
http://www.quovadisglobal.com/repository0
|
unknown
|
||
http://pki.intel.com/crl/IntelCA7B.crl0f
|
unknown
|
||
http://trust.quovadisglobal.com/qvicag4.crt0
|
unknown
|
||
http://geoplugin.net/json.gp
|
178.237.33.50
|
||
http://ocsp.quovadisglobal.com05
|
unknown
|
||
https://www.google.com
|
unknown
|
||
http://crl.quovadisglobal.com/qvrca.crl0
|
unknown
|
||
http://geoplugin.net/json.gpn.net/json.gp
|
unknown
|
||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
http://geoplugin.net/
|
unknown
|
||
http://geoplugin.net/json.gpM
|
unknown
|
||
http://www.quovadis.bm0
|
unknown
|
||
https://www.google.com/accounts/servicelogin
|
unknown
|
||
https://login.yahoo.com/config/login
|
unknown
|
||
http://www.nirsoft.net/
|
unknown
|
||
https://ocsp.quovadisoffshore.com0
|
unknown
|
||
http://geoplugin.net/json.gpV_0
|
unknown
|
||
http://OCSP.intel.com/0
|
unknown
|
||
http://www.ebuddy.com
|
unknown
|
There are 36 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
subddfg.lol
|
23.106.238.209
|
||
telesavers.co.za
|
102.65.21.26
|
||
geoplugin.net
|
178.237.33.50
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
23.106.238.209
|
subddfg.lol
|
United Kingdom
|
||
102.65.21.26
|
telesavers.co.za
|
South Africa
|
||
178.237.33.50
|
geoplugin.net
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Rmc-ZLUOGZ
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-ZLUOGZ
|
licence
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-ZLUOGZ
|
time
|
||
HKEY_CURRENT_USER\sheds\Uninstall\udfrdige\Psychoanalyzer90
|
boatheader
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1\CLSID
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CLSID
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CurVer
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ProgID
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\VersionIndependentProgID
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ForceRemove
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32
|
ThreadingModel
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
|
DxDiag In SystemInfo
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
|
DxDiag In DirectDraw
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
|
DxDiag In DirectSound
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
|
DxDiag In VideoCapture
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
|
DxDiag In Diagnostics
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
|
DxDiag In Media Foundation
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
|
DxDiag In USB Display
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
|
DxDiag In Holographic
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
|
DxDiag In DirectDraw
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
|
DxDiag In DirectDraw
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DirectDraw\MostRecentApplication
|
Name
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DirectDraw\MostRecentApplication
|
ID
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
|
DxDiag In SystemInfo
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
|
DxDiag In DirectSound
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
|
DxDiag In DirectSound
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MediaResources\DirectSound\Speaker Configuration
|
Speaker Configuration
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
|
DxDiag In DirectInput
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectInput\DXDIAG.EXEA39C632900036600
|
Name
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectInput\DXDIAG.EXEA39C632900036600
|
UsesMapper
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectInput\MostRecentApplication
|
Name
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectInput\MostRecentApplication
|
Id
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectInput\MostRecentApplication
|
Version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectInput\MostRecentApplication
|
MostRecentStart
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
|
DxDiag In DirectShow
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum
|
Version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\cvid
|
FriendlyName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\cvid
|
CLSID
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\cvid
|
FilterData
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\cvid
|
FccHandler
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\cvid
|
ClassManagerFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\i420
|
FriendlyName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\i420
|
CLSID
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\i420
|
FilterData
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\i420
|
FccHandler
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\i420
|
ClassManagerFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\iyuv
|
FriendlyName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\iyuv
|
CLSID
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\iyuv
|
FilterData
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\iyuv
|
FccHandler
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\iyuv
|
ClassManagerFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\mrle
|
FriendlyName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\mrle
|
CLSID
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\mrle
|
FilterData
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\mrle
|
FccHandler
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\mrle
|
ClassManagerFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\msvc
|
FriendlyName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\msvc
|
CLSID
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\msvc
|
FilterData
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\msvc
|
FccHandler
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\msvc
|
ClassManagerFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\uyvy
|
FriendlyName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\uyvy
|
FilterData
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\uyvy
|
FccHandler
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\uyvy
|
ClassManagerFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\yuy2
|
FriendlyName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\yuy2
|
CLSID
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\yuy2
|
FilterData
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\yuy2
|
FccHandler
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\yuy2
|
ClassManagerFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\yvu9
|
FriendlyName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\yvu9
|
CLSID
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\yvu9
|
FilterData
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\yvu9
|
FccHandler
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\yvu9
|
ClassManagerFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\yvyu
|
FriendlyName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\yvyu
|
CLSID
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\yvyu
|
FilterData
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\yvyu
|
FccHandler
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\yvyu
|
ClassManagerFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\x264
|
FriendlyName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\x264
|
FilterData
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\x264
|
FccHandler
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\x264
|
ClassManagerFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.imaadpcm
|
fdwSupport
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.imaadpcm
|
cFormatTags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.imaadpcm
|
aFormatTagCache
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.imaadpcm
|
cFilterTags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.msadpcm
|
fdwSupport
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.msadpcm
|
cFormatTags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.msadpcm
|
aFormatTagCache
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.msadpcm
|
cFilterTags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.msg711
|
fdwSupport
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.msg711
|
cFormatTags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.msg711
|
aFormatTagCache
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.msg711
|
cFilterTags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.msgsm610
|
fdwSupport
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.msgsm610
|
cFormatTags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.msgsm610
|
aFormatTagCache
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.msgsm610
|
cFilterTags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.l3acm
|
cFormatTags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.l3acm
|
aFormatTagCache
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\1PCM
|
FriendlyName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\1PCM
|
CLSID
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\1PCM
|
FilterData
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\1PCM
|
AcmId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\17IMA ADPCM
|
FriendlyName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\17IMA ADPCM
|
CLSID
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\17IMA ADPCM
|
FilterData
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\17IMA ADPCM
|
AcmId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\2Microsoft ADPCM
|
FriendlyName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\2Microsoft ADPCM
|
CLSID
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\2Microsoft ADPCM
|
FilterData
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\2Microsoft ADPCM
|
AcmId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\6CCITT A-Law
|
FriendlyName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\6CCITT A-Law
|
FilterData
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\6CCITT A-Law
|
AcmId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\7CCITT u-Law
|
FriendlyName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\7CCITT u-Law
|
FilterData
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\7CCITT u-Law
|
AcmId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\49GSM 6.10
|
FriendlyName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\49GSM 6.10
|
FilterData
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\49GSM 6.10
|
AcmId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\85MPEG Layer-3
|
FriendlyName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\85MPEG Layer-3
|
FilterData
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\85MPEG Layer-3
|
AcmId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Microsoft GS Wavetable Synth
|
FriendlyName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Microsoft GS Wavetable Synth
|
CLSID
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Microsoft GS Wavetable Synth
|
FilterData
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Microsoft GS Wavetable Synth
|
MidiOutId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Default MidiOut Device
|
FriendlyName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Default MidiOut Device
|
CLSID
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Default MidiOut Device
|
FilterData
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Default MidiOut Device
|
MidiOutId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\wave:{DD1CD538-0F7B-4472-BA12-59FE8F4DA23C}
|
FriendlyName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\wave:{DD1CD538-0F7B-4472-BA12-59FE8F4DA23C}
|
CLSID
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\wave:{DD1CD538-0F7B-4472-BA12-59FE8F4DA23C}
|
FilterData
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\wave:{DD1CD538-0F7B-4472-BA12-59FE8F4DA23C}
|
EndpointId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\wave:{DD1CD538-0F7B-4472-BA12-59FE8F4DA23C}
|
EndpointGuid
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\wave:{DD1CD538-0F7B-4472-BA12-59FE8F4DA23C}
|
WaveOutId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\wave:{DD1CD538-0F7B-4472-BA12-59FE8F4DA23C}
|
ClassManagerFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\wave:{97EBAA44-1707-43BD-A28C-E120218DAACF}
|
FriendlyName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\wave:{97EBAA44-1707-43BD-A28C-E120218DAACF}
|
CLSID
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\wave:{97EBAA44-1707-43BD-A28C-E120218DAACF}
|
FilterData
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\wave:{97EBAA44-1707-43BD-A28C-E120218DAACF}
|
EndpointId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\wave:{97EBAA44-1707-43BD-A28C-E120218DAACF}
|
EndpointGuid
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\wave:{97EBAA44-1707-43BD-A28C-E120218DAACF}
|
WaveOutId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default WaveOut Device
|
FriendlyName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default WaveOut Device
|
WaveOutId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\DirectSound:{DD1CD538-0F7B-4472-BA12-59FE8F4DA23C}
|
FriendlyName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\DirectSound:{DD1CD538-0F7B-4472-BA12-59FE8F4DA23C}
|
CLSID
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\DirectSound:{DD1CD538-0F7B-4472-BA12-59FE8F4DA23C}
|
FilterData
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\DirectSound:{DD1CD538-0F7B-4472-BA12-59FE8F4DA23C}
|
DSGuid
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\DirectSound:{97EBAA44-1707-43BD-A28C-E120218DAACF}
|
FriendlyName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\DirectSound:{97EBAA44-1707-43BD-A28C-E120218DAACF}
|
CLSID
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\DirectSound:{97EBAA44-1707-43BD-A28C-E120218DAACF}
|
FilterData
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\DirectSound:{97EBAA44-1707-43BD-A28C-E120218DAACF}
|
DSGuid
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default DirectSound Device
|
FriendlyName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default DirectSound Device
|
CLSID
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default DirectSound Device
|
FilterData
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default DirectSound Device
|
DSGuid
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
|
DxDiag In SystemInfo
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
|
DxDiag In SystemInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\CurVer
|
NULL
|
||
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
|
ProgramId
|
||
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
|
FileId
|
||
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
|
LowerCaseLongPath
|
||
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
|
LongPathHash
|
||
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
|
Name
|
||
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
|
OriginalFileName
|
||
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
|
Publisher
|
||
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
|
Version
|
||
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
|
BinFileVersion
|
||
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
|
BinaryType
|
||
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
|
ProductName
|
||
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
|
ProductVersion
|
||
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
|
LinkDate
|
||
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
|
BinProductVersion
|
||
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
|
AppxPackageFullName
|
||
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
|
Size
|
||
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
|
Language
|
||
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018C00E24D2A1F0
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
There are 182 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7431000
|
heap
|
page read and write
|
||
7431000
|
heap
|
page read and write
|
||
7431000
|
heap
|
page read and write
|
||
7431000
|
heap
|
page read and write
|
||
742E000
|
heap
|
page read and write
|
||
637000
|
heap
|
page read and write
|
||
6463000
|
direct allocation
|
page execute and read and write
|
||
685000
|
heap
|
page read and write
|
||
742C000
|
heap
|
page read and write
|
||
7431000
|
heap
|
page read and write
|
||
7431000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
698000
|
heap
|
page read and write
|
||
7422000
|
heap
|
page read and write
|
||
7431000
|
heap
|
page read and write
|
||
7431000
|
heap
|
page read and write
|
||
5381000
|
heap
|
page read and write
|
||
5383000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
AF3000
|
heap
|
page read and write
|
||
2371000
|
heap
|
page read and write
|
||
2B53000
|
heap
|
page read and write
|
||
73DF000
|
heap
|
page read and write
|
||
235C000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
2B2E000
|
heap
|
page read and write
|
||
612C000
|
heap
|
page read and write
|
||
74A1000
|
heap
|
page read and write
|
||
60E6000
|
heap
|
page read and write
|
||
60DE000
|
heap
|
page read and write
|
||
22DD000
|
heap
|
page read and write
|
||
2B8F000
|
heap
|
page read and write
|
||
7489000
|
heap
|
page read and write
|
||
7474000
|
heap
|
page read and write
|
||
2B2E000
|
heap
|
page read and write
|
||
29F6000
|
heap
|
page read and write
|
||
3030000
|
trusted library allocation
|
page read and write
|
||
60F6000
|
heap
|
page read and write
|
||
473000
|
system
|
page execute and read and write
|
||
6198000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
538F000
|
heap
|
page read and write
|
||
6282000
|
heap
|
page read and write
|
||
54A000
|
heap
|
page read and write
|
||
5462000
|
heap
|
page read and write
|
||
60FE000
|
heap
|
page read and write
|
||
73DD000
|
heap
|
page read and write
|
||
5390000
|
heap
|
page read and write
|
||
4FE000
|
stack
|
page read and write
|
||
66D000
|
heap
|
page read and write
|
||
74A1000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
2B80000
|
heap
|
page read and write
|
||
60D7000
|
heap
|
page read and write
|
||
611E000
|
heap
|
page read and write
|
||
2361000
|
heap
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
2F8C000
|
heap
|
page read and write
|
||
38BBB000
|
heap
|
page read and write
|
||
7415000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
6229000
|
heap
|
page read and write
|
||
230A000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
803000
|
heap
|
page read and write
|
||
2B08000
|
heap
|
page read and write
|
||
5452000
|
heap
|
page read and write
|
||
6221000
|
heap
|
page read and write
|
||
66F000
|
heap
|
page read and write
|
||
237D000
|
heap
|
page read and write
|
||
2AC6000
|
heap
|
page read and write
|
||
7431000
|
heap
|
page read and write
|
||
25AE000
|
stack
|
page read and write
|
||
29F7000
|
heap
|
page read and write
|
||
2C48000
|
heap
|
page read and write
|
||
6223000
|
heap
|
page read and write
|
||
5452000
|
heap
|
page read and write
|
||
4B6C000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
625A000
|
heap
|
page read and write
|
||
2B87000
|
heap
|
page read and write
|
||
6241000
|
heap
|
page read and write
|
||
627E000
|
heap
|
page read and write
|
||
6138000
|
heap
|
page read and write
|
||
742C000
|
heap
|
page read and write
|
||
4B69000
|
heap
|
page read and write
|
||
5457000
|
heap
|
page read and write
|
||
2B5C000
|
heap
|
page read and write
|
||
437000
|
unkown
|
page readonly
|
||
23B0000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
622B000
|
heap
|
page read and write
|
||
22BC000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
61E0000
|
heap
|
page read and write
|
||
2B2E000
|
heap
|
page read and write
|
||
60DB000
|
heap
|
page read and write
|
||
4830000
|
trusted library allocation
|
page read and write
|
||
60D4000
|
heap
|
page read and write
|
||
612E000
|
heap
|
page read and write
|
||
5391000
|
heap
|
page read and write
|
||
613D000
|
heap
|
page read and write
|
||
60A5000
|
heap
|
page read and write
|
||
53C6000
|
heap
|
page read and write
|
||
5455000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
2F8F000
|
heap
|
page read and write
|
||
32D0000
|
direct allocation
|
page read and write
|
||
4B5F000
|
heap
|
page read and write
|
||
5EE000
|
stack
|
page read and write
|
||
611F000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
2B2A000
|
heap
|
page read and write
|
||
7485000
|
heap
|
page read and write
|
||
61BC000
|
heap
|
page read and write
|
||
742C000
|
heap
|
page read and write
|
||
2931000
|
heap
|
page read and write
|
||
2B86000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
2377000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
C5C000
|
heap
|
page read and write
|
||
53CA000
|
heap
|
page read and write
|
||
2A31000
|
heap
|
page read and write
|
||
6115000
|
heap
|
page read and write
|
||
60D6000
|
heap
|
page read and write
|
||
B9E000
|
heap
|
page read and write
|
||
6FF11000
|
unkown
|
page execute read
|
||
6FF10000
|
unkown
|
page readonly
|
||
61E0000
|
heap
|
page read and write
|
||
22C1000
|
heap
|
page read and write
|
||
50B0000
|
trusted library allocation
|
page read and write
|
||
4B6D000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
6121000
|
heap
|
page read and write
|
||
2A5B000
|
heap
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
6167000
|
heap
|
page read and write
|
||
4830000
|
trusted library allocation
|
page read and write
|
||
60FE000
|
heap
|
page read and write
|
||
6125000
|
heap
|
page read and write
|
||
2C33000
|
heap
|
page read and write
|
||
6198000
|
heap
|
page read and write
|
||
2B43000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
287E000
|
stack
|
page read and write
|
||
2A8B000
|
heap
|
page read and write
|
||
4C33000
|
heap
|
page read and write
|
||
22D5000
|
heap
|
page read and write
|
||
2323000
|
heap
|
page read and write
|
||
2B47000
|
heap
|
page read and write
|
||
60D6000
|
heap
|
page read and write
|
||
2B1C000
|
heap
|
page read and write
|
||
61F3000
|
heap
|
page read and write
|
||
22DD000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
5403000
|
heap
|
page read and write
|
||
2369000
|
heap
|
page read and write
|
||
4B5B000
|
heap
|
page read and write
|
||
544D000
|
heap
|
page read and write
|
||
2B86000
|
heap
|
page read and write
|
||
22DD000
|
heap
|
page read and write
|
||
5468000
|
heap
|
page read and write
|
||
5462000
|
heap
|
page read and write
|
||
3053000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
437000
|
unkown
|
page readonly
|
||
22BC000
|
heap
|
page read and write
|
||
22DE000
|
heap
|
page read and write
|
||
2361000
|
heap
|
page read and write
|
||
2AC3000
|
heap
|
page read and write
|
||
7422000
|
heap
|
page read and write
|
||
524000
|
heap
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
60FA000
|
heap
|
page read and write
|
||
2450000
|
heap
|
page read and write
|
||
394BA000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
53C4000
|
heap
|
page read and write
|
||
2C47000
|
heap
|
page read and write
|
||
23D4000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
546E000
|
heap
|
page read and write
|
||
5465000
|
heap
|
page read and write
|
||
22B0000
|
heap
|
page read and write
|
||
304F000
|
heap
|
page read and write
|
||
4A8E000
|
stack
|
page read and write
|
||
2366000
|
heap
|
page read and write
|
||
4B56000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
A063000
|
direct allocation
|
page execute and read and write
|
||
38BB1000
|
heap
|
page read and write
|
||
4B6C000
|
heap
|
page read and write
|
||
4B73000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
22CD000
|
heap
|
page read and write
|
||
29FE000
|
stack
|
page read and write
|
||
5372000
|
heap
|
page read and write
|
||
61A3000
|
heap
|
page read and write
|
||
6266000
|
heap
|
page read and write
|
||
7488000
|
heap
|
page read and write
|
||
2B2E000
|
heap
|
page read and write
|
||
6269000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
6D436000
|
unkown
|
page readonly
|
||
7415000
|
heap
|
page read and write
|
||
2B47000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
61F4000
|
heap
|
page read and write
|
||
742C000
|
heap
|
page read and write
|
||
38CB5000
|
heap
|
page read and write
|
||
541D000
|
heap
|
page read and write
|
||
5467000
|
heap
|
page read and write
|
||
2B08000
|
heap
|
page read and write
|
||
6130000
|
heap
|
page read and write
|
||
541D000
|
heap
|
page read and write
|
||
53D6000
|
heap
|
page read and write
|
||
2B57000
|
heap
|
page read and write
|
||
6223000
|
heap
|
page read and write
|
||
4960000
|
trusted library allocation
|
page read and write
|
||
7483000
|
heap
|
page read and write
|
||
27C1000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
741B000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
525000
|
heap
|
page read and write
|
||
6221000
|
heap
|
page read and write
|
||
546B000
|
heap
|
page read and write
|
||
22CC000
|
heap
|
page read and write
|
||
A7F000
|
stack
|
page read and write
|
||
5447000
|
heap
|
page read and write
|
||
23A0000
|
trusted library allocation
|
page read and write
|
||
6221000
|
heap
|
page read and write
|
||
80D000
|
stack
|
page read and write
|
||
2AB3000
|
heap
|
page read and write
|
||
6127000
|
heap
|
page read and write
|
||
73DF000
|
heap
|
page read and write
|
||
61C8000
|
heap
|
page read and write
|
||
60D4000
|
heap
|
page read and write
|
||
6130000
|
heap
|
page read and write
|
||
543E000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
6148000
|
heap
|
page read and write
|
||
2C36000
|
heap
|
page read and write
|
||
5447000
|
heap
|
page read and write
|
||
6137000
|
heap
|
page read and write
|
||
5451000
|
heap
|
page read and write
|
||
3224000
|
heap
|
page read and write
|
||
22A0000
|
heap
|
page read and write
|
||
60A9000
|
heap
|
page read and write
|
||
38AB1000
|
heap
|
page read and write
|
||
5454000
|
heap
|
page read and write
|
||
742F000
|
heap
|
page read and write
|
||
6138000
|
heap
|
page read and write
|
||
2F0A000
|
heap
|
page read and write
|
||
50B0000
|
trusted library allocation
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
677000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
6114000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
5467000
|
heap
|
page read and write
|
||
4830000
|
trusted library allocation
|
page read and write
|
||
22C4000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
60DD000
|
heap
|
page read and write
|
||
23C9000
|
heap
|
page read and write
|
||
6131000
|
heap
|
page read and write
|
||
61D0000
|
heap
|
page read and write
|
||
2C40000
|
heap
|
page read and write
|
||
61D8000
|
heap
|
page read and write
|
||
60FF000
|
heap
|
page read and write
|
||
546E000
|
heap
|
page read and write
|
||
611E000
|
heap
|
page read and write
|
||
4BFF000
|
heap
|
page read and write
|
||
2358000
|
heap
|
page read and write
|
||
2AB2000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
65B000
|
heap
|
page read and write
|
||
4BE4000
|
heap
|
page read and write
|
||
60FA000
|
heap
|
page read and write
|
||
60F9000
|
heap
|
page read and write
|
||
6221000
|
heap
|
page read and write
|
||
38CB7000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
4B57000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2361000
|
heap
|
page read and write
|
||
22A0000
|
heap
|
page read and write
|
||
2B08000
|
heap
|
page read and write
|
||
4B51000
|
heap
|
page read and write
|
||
7200000
|
remote allocation
|
page read and write
|
||
4970000
|
heap
|
page read and write
|
||
2B3F000
|
heap
|
page read and write
|
||
5452000
|
heap
|
page read and write
|
||
6125000
|
heap
|
page read and write
|
||
5CA9000
|
heap
|
page read and write
|
||
60C7000
|
heap
|
page read and write
|
||
60FE000
|
heap
|
page read and write
|
||
73F7000
|
heap
|
page read and write
|
||
6198000
|
heap
|
page read and write
|
||
AD3000
|
heap
|
page read and write
|
||
544E000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
32B0000
|
direct allocation
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
60DB000
|
heap
|
page read and write
|
||
2361000
|
heap
|
page read and write
|
||
237E000
|
heap
|
page read and write
|
||
7489000
|
heap
|
page read and write
|
||
4C02000
|
heap
|
page read and write
|
||
2B4F000
|
heap
|
page read and write
|
||
22C8000
|
heap
|
page read and write
|
||
237C000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
5389000
|
heap
|
page read and write
|
||
28CE000
|
heap
|
page read and write
|
||
ADF000
|
heap
|
page read and write
|
||
2323000
|
heap
|
page read and write
|
||
53AB000
|
heap
|
page read and write
|
||
60E5000
|
heap
|
page read and write
|
||
508000
|
heap
|
page read and write
|
||
748E000
|
heap
|
page read and write
|
||
611F000
|
heap
|
page read and write
|
||
6269000
|
heap
|
page read and write
|
||
22A0000
|
heap
|
page read and write
|
||
60E9000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
2B53000
|
heap
|
page read and write
|
||
2F80000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
6227000
|
heap
|
page read and write
|
||
6231000
|
heap
|
page read and write
|
||
648000
|
heap
|
page read and write
|
||
4BFF000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
6137000
|
heap
|
page read and write
|
||
22D8000
|
heap
|
page read and write
|
||
22C4000
|
heap
|
page read and write
|
||
2C36000
|
heap
|
page read and write
|
||
7483000
|
heap
|
page read and write
|
||
53C6000
|
heap
|
page read and write
|
||
4BD2000
|
heap
|
page read and write
|
||
5453000
|
heap
|
page read and write
|
||
2B2E000
|
heap
|
page read and write
|
||
2B2E000
|
heap
|
page read and write
|
||
74A1000
|
heap
|
page read and write
|
||
4B6D000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
6172000
|
heap
|
page read and write
|
||
61A3000
|
heap
|
page read and write
|
||
28CB000
|
heap
|
page read and write
|
||
525000
|
heap
|
page read and write
|
||
2F80000
|
trusted library allocation
|
page read and write
|
||
447000
|
unkown
|
page readonly
|
||
2AB7000
|
heap
|
page read and write
|
||
22C5000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
6139000
|
heap
|
page read and write
|
||
616C000
|
heap
|
page read and write
|
||
6100000
|
heap
|
page read and write
|
||
6223000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
22CC000
|
heap
|
page read and write
|
||
5390000
|
heap
|
page read and write
|
||
6115000
|
heap
|
page read and write
|
||
53C7000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
60EC000
|
heap
|
page read and write
|
||
5AE000
|
stack
|
page read and write
|
||
22BC000
|
heap
|
page read and write
|
||
2ACD000
|
heap
|
page read and write
|
||
61D6000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
39269000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
22C1000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
60EC000
|
heap
|
page read and write
|
||
8C63000
|
direct allocation
|
page execute and read and write
|
||
237C000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
22C9000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
28C2000
|
heap
|
page read and write
|
||
5454000
|
heap
|
page read and write
|
||
2A30000
|
heap
|
page read and write
|
||
2362000
|
heap
|
page read and write
|
||
4830000
|
heap
|
page read and write
|
||
4C5A000
|
heap
|
page read and write
|
||
546A000
|
heap
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
5455000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
22B0000
|
heap
|
page read and write
|
||
610B000
|
heap
|
page read and write
|
||
61E7000
|
heap
|
page read and write
|
||
2B82000
|
heap
|
page read and write
|
||
5383000
|
heap
|
page read and write
|
||
350000
|
heap
|
page read and write
|
||
237D000
|
heap
|
page read and write
|
||
4B74000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
6242000
|
heap
|
page read and write
|
||
6198000
|
heap
|
page read and write
|
||
2A7B000
|
heap
|
page read and write
|
||
22DD000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
671000
|
heap
|
page read and write
|
||
612E000
|
heap
|
page read and write
|
||
2B89000
|
heap
|
page read and write
|
||
2BB8000
|
heap
|
page read and write
|
||
2B86000
|
heap
|
page read and write
|
||
61EB000
|
heap
|
page read and write
|
||
2260000
|
heap
|
page read and write
|
||
2B2E000
|
heap
|
page read and write
|
||
2B1E000
|
heap
|
page read and write
|
||
60DF000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
2470000
|
heap
|
page read and write
|
||
2ABA000
|
heap
|
page read and write
|
||
622D000
|
heap
|
page read and write
|
||
53C6000
|
heap
|
page read and write
|
||
2B11000
|
heap
|
page read and write
|
||
74A1000
|
heap
|
page read and write
|
||
5CA5000
|
heap
|
page read and write
|
||
61E5000
|
heap
|
page read and write
|
||
6137000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
22D5000
|
heap
|
page read and write
|
||
741B000
|
heap
|
page read and write
|
||
524000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
5457000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
2B97000
|
heap
|
page read and write
|
||
AFC000
|
heap
|
page read and write
|
||
321D000
|
heap
|
page read and write
|
||
538000
|
heap
|
page read and write
|
||
22C7000
|
heap
|
page read and write
|
||
2C40000
|
heap
|
page read and write
|
||
61F3000
|
heap
|
page read and write
|
||
6241000
|
heap
|
page read and write
|
||
6362000
|
heap
|
page read and write
|
||
4C4B000
|
heap
|
page read and write
|
||
B2C0000
|
trusted library allocation
|
page read and write
|
||
2B53000
|
heap
|
page read and write
|
||
27C1000
|
heap
|
page read and write
|
||
53E000
|
stack
|
page read and write
|
||
197000
|
stack
|
page read and write
|
||
61F2000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
2AC6000
|
heap
|
page read and write
|
||
61E0000
|
heap
|
page read and write
|
||
60D6000
|
heap
|
page read and write
|
||
6225000
|
heap
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
C5C000
|
heap
|
page read and write
|
||
23D4000
|
heap
|
page read and write
|
||
4F9D000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
6121000
|
heap
|
page read and write
|
||
2C48000
|
heap
|
page read and write
|
||
627E000
|
heap
|
page read and write
|
||
22D1000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
6081000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
7489000
|
heap
|
page read and write
|
||
2378000
|
heap
|
page read and write
|
||
53EA000
|
heap
|
page read and write
|
||
2B2A000
|
heap
|
page read and write
|
||
2334000
|
heap
|
page read and write
|
||
4C2B000
|
heap
|
page read and write
|
||
61CD000
|
heap
|
page read and write
|
||
7483000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
53D4000
|
heap
|
page read and write
|
||
6225000
|
heap
|
page read and write
|
||
22D1000
|
heap
|
page read and write
|
||
2B1C000
|
heap
|
page read and write
|
||
2B4F000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
61A4000
|
heap
|
page read and write
|
||
235C000
|
heap
|
page read and write
|
||
5455000
|
heap
|
page read and write
|
||
5452000
|
heap
|
page read and write
|
||
495000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
2935000
|
heap
|
page read and write
|
||
2B53000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
2B86000
|
heap
|
page read and write
|
||
742C000
|
heap
|
page read and write
|
||
61A3000
|
heap
|
page read and write
|
||
546A000
|
heap
|
page read and write
|
||
237D000
|
heap
|
page read and write
|
||
6127000
|
heap
|
page read and write
|
||
4B56000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
61E0000
|
heap
|
page read and write
|
||
612C000
|
heap
|
page read and write
|
||
617B000
|
heap
|
page read and write
|
||
28EE000
|
heap
|
page read and write
|
||
437000
|
unkown
|
page readonly
|
||
A85000
|
heap
|
page read and write
|
||
4B5B000
|
heap
|
page read and write
|
||
23AA000
|
heap
|
page read and write
|
||
53A6000
|
heap
|
page read and write
|
||
22BF000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
621B000
|
heap
|
page read and write
|
||
60C4000
|
heap
|
page read and write
|
||
2B53000
|
heap
|
page read and write
|
||
2B1C000
|
heap
|
page read and write
|
||
2AC3000
|
heap
|
page read and write
|
||
2B2A000
|
heap
|
page read and write
|
||
6229000
|
heap
|
page read and write
|
||
60FE000
|
heap
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
459000
|
system
|
page execute and read and write
|
||
2317000
|
heap
|
page read and write
|
||
2377000
|
heap
|
page read and write
|
||
53E7000
|
heap
|
page read and write
|
||
3F7000
|
stack
|
page read and write
|
||
612A000
|
heap
|
page read and write
|
||
ADE000
|
heap
|
page read and write
|
||
7200000
|
remote allocation
|
page read and write
|
||
61F3000
|
heap
|
page read and write
|
||
2A79000
|
heap
|
page read and write
|
||
60E6000
|
heap
|
page read and write
|
||
61E2000
|
heap
|
page read and write
|
||
22D1000
|
heap
|
page read and write
|
||
2369000
|
heap
|
page read and write
|
||
60C5000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
490000
|
heap
|
page read and write
|
||
5C9C000
|
heap
|
page read and write
|
||
4830000
|
trusted library allocation
|
page read and write
|
||
60D7000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
622D000
|
heap
|
page read and write
|
||
2323000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
53F6000
|
heap
|
page read and write
|
||
61F3000
|
heap
|
page read and write
|
||
437000
|
unkown
|
page readonly
|
||
6153000
|
heap
|
page read and write
|
||
22E8000
|
heap
|
page read and write
|
||
60C6000
|
heap
|
page read and write
|
||
622B000
|
heap
|
page read and write
|
||
2B59000
|
heap
|
page read and write
|
||
2C36000
|
heap
|
page read and write
|
||
2ACC000
|
heap
|
page read and write
|
||
611D000
|
heap
|
page read and write
|
||
2B49000
|
heap
|
page read and write
|
||
74A1000
|
heap
|
page read and write
|
||
50B0000
|
trusted library allocation
|
page read and write
|
||
2C4A000
|
heap
|
page read and write
|
||
6137000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
2303000
|
heap
|
page read and write
|
||
5C99000
|
heap
|
page read and write
|
||
6131000
|
heap
|
page read and write
|
||
4830000
|
trusted library allocation
|
page read and write
|
||
5434000
|
heap
|
page read and write
|
||
612C000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
2B2A000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
6221000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
2B53000
|
heap
|
page read and write
|
||
60CE000
|
heap
|
page read and write
|
||
622F000
|
heap
|
page read and write
|
||
2B53000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
60F6000
|
heap
|
page read and write
|
||
544D000
|
heap
|
page read and write
|
||
2B2E000
|
heap
|
page read and write
|
||
2361000
|
heap
|
page read and write
|
||
2F00000
|
trusted library allocation
|
page read and write
|
||
2B9B000
|
heap
|
page read and write
|
||
38BBB000
|
heap
|
page read and write
|
||
5447000
|
heap
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
53E8000
|
heap
|
page read and write
|
||
4B5F000
|
heap
|
page read and write
|
||
5457000
|
heap
|
page read and write
|
||
60DB000
|
heap
|
page read and write
|
||
525000
|
heap
|
page read and write
|
||
4C5E000
|
heap
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
2B0B000
|
heap
|
page read and write
|
||
73DF000
|
heap
|
page read and write
|
||
4B7E000
|
heap
|
page read and write
|
||
2369000
|
heap
|
page read and write
|
||
5072000
|
heap
|
page read and write
|
||
22BB000
|
heap
|
page read and write
|
||
4B56000
|
heap
|
page read and write
|
||
5468000
|
heap
|
page read and write
|
||
2F8B000
|
heap
|
page read and write
|
||
546A000
|
heap
|
page read and write
|
||
2B11000
|
heap
|
page read and write
|
||
524000
|
heap
|
page read and write
|
||
2323000
|
heap
|
page read and write
|
||
447000
|
unkown
|
page readonly
|
||
524000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
4840000
|
heap
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
61B1000
|
heap
|
page read and write
|
||
C8E000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
6115000
|
heap
|
page read and write
|
||
60DE000
|
heap
|
page read and write
|
||
7483000
|
heap
|
page read and write
|
||
546E000
|
heap
|
page read and write
|
||
2FA8000
|
heap
|
page read and write
|
||
2A5B000
|
heap
|
page read and write
|
||
236D000
|
heap
|
page read and write
|
||
2B2E000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
5A63000
|
direct allocation
|
page execute and read and write
|
||
6C8000
|
heap
|
page read and write
|
||
3030000
|
trusted library allocation
|
page read and write
|
||
546A000
|
heap
|
page read and write
|
||
5455000
|
heap
|
page read and write
|
||
2C37000
|
heap
|
page read and write
|
||
635000
|
heap
|
page read and write
|
||
18F000
|
stack
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
61CD000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
6227000
|
heap
|
page read and write
|
||
4430000
|
heap
|
page read and write
|
||
61F3000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
2F96000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
60FE000
|
heap
|
page read and write
|
||
61E0000
|
heap
|
page read and write
|
||
74A1000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
2B2E000
|
heap
|
page read and write
|
||
2EC0000
|
heap
|
page read and write
|
||
74A1000
|
heap
|
page read and write
|
||
74A1000
|
heap
|
page read and write
|
||
6FF2F000
|
unkown
|
page readonly
|
||
2F00000
|
trusted library allocation
|
page read and write
|
||
622F000
|
heap
|
page read and write
|
||
2B2E000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
60DB000
|
heap
|
page read and write
|
||
22DE000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2CA2000
|
heap
|
page read and write
|
||
2B9B000
|
heap
|
page read and write
|
||
7422000
|
heap
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
611F000
|
heap
|
page read and write
|
||
4FCD000
|
stack
|
page read and write
|
||
609B000
|
heap
|
page read and write
|
||
7488000
|
heap
|
page read and write
|
||
60E6000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
61D0000
|
heap
|
page read and write
|
||
6131000
|
heap
|
page read and write
|
||
4C4B000
|
heap
|
page read and write
|
||
2364000
|
heap
|
page read and write
|
||
2B42000
|
heap
|
page read and write
|
||
22D1000
|
heap
|
page read and write
|
||
627A000
|
heap
|
page read and write
|
||
6137000
|
heap
|
page read and write
|
||
622B000
|
heap
|
page read and write
|
||
611E000
|
heap
|
page read and write
|
||
4C5C000
|
heap
|
page read and write
|
||
5CA7000
|
heap
|
page read and write
|
||
6138000
|
heap
|
page read and write
|
||
4B8E000
|
heap
|
page read and write
|
||
4BF2000
|
heap
|
page read and write
|
||
53F6000
|
heap
|
page read and write
|
||
60D7000
|
heap
|
page read and write
|
||
2A9D000
|
heap
|
page read and write
|
||
2B8A000
|
heap
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
C86000
|
heap
|
page read and write
|
||
60FD000
|
heap
|
page read and write
|
||
2C63000
|
heap
|
page read and write
|
||
2B53000
|
heap
|
page read and write
|
||
6130000
|
heap
|
page read and write
|
||
4C5C000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
525000
|
heap
|
page read and write
|
||
60C2000
|
heap
|
page read and write
|
||
541E000
|
heap
|
page read and write
|
||
235C000
|
heap
|
page read and write
|
||
22C8000
|
heap
|
page read and write
|
||
61E0000
|
heap
|
page read and write
|
||
60E000
|
stack
|
page read and write
|
||
22D1000
|
heap
|
page read and write
|
||
5447000
|
heap
|
page read and write
|
||
2859000
|
heap
|
page read and write
|
||
6127000
|
heap
|
page read and write
|
||
5447000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
2B2E000
|
heap
|
page read and write
|
||
5063000
|
direct allocation
|
page execute and read and write
|
||
32C0000
|
direct allocation
|
page read and write
|
||
5459000
|
heap
|
page read and write
|
||
543E000
|
heap
|
page read and write
|
||
7422000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
4BF2000
|
heap
|
page read and write
|
||
2365000
|
heap
|
page read and write
|
||
95E000
|
stack
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
53D4000
|
heap
|
page read and write
|
||
5CA5000
|
heap
|
page read and write
|
||
447000
|
unkown
|
page readonly
|
||
4831000
|
heap
|
page read and write
|
||
5467000
|
heap
|
page read and write
|
||
2A31000
|
heap
|
page read and write
|
||
6101000
|
heap
|
page read and write
|
||
7415000
|
heap
|
page read and write
|
||
2C36000
|
heap
|
page read and write
|
||
4B56000
|
heap
|
page read and write
|
||
60FD000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
2881000
|
heap
|
page read and write
|
||
524000
|
heap
|
page read and write
|
||
674000
|
heap
|
page read and write
|
||
2F80000
|
trusted library allocation
|
page read and write
|
||
60EC000
|
heap
|
page read and write
|
||
22BC000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
613D000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
60D6000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
6113000
|
heap
|
page read and write
|
||
447000
|
unkown
|
page readonly
|
||
538C000
|
heap
|
page read and write
|
||
291E000
|
heap
|
page read and write
|
||
7488000
|
heap
|
page read and write
|
||
2BC4000
|
heap
|
page read and write
|
||
6221000
|
heap
|
page read and write
|
||
235C000
|
heap
|
page read and write
|
||
2B2A000
|
heap
|
page read and write
|
||
4B75000
|
heap
|
page read and write
|
||
61F7000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
237D000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
4C33000
|
heap
|
page read and write
|
||
2A5A000
|
heap
|
page read and write
|
||
2366000
|
heap
|
page read and write
|
||
741B000
|
heap
|
page read and write
|
||
2FA1000
|
heap
|
page read and write
|
||
2B1C000
|
heap
|
page read and write
|
||
3C2C000
|
stack
|
page read and write
|
||
2B2E000
|
heap
|
page read and write
|
||
7483000
|
heap
|
page read and write
|
||
2B86000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
524000
|
heap
|
page read and write
|
||
22DD000
|
heap
|
page read and write
|
||
6185000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
60E6000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
2791000
|
heap
|
page read and write
|
||
2369000
|
heap
|
page read and write
|
||
4C02000
|
heap
|
page read and write
|
||
60C2000
|
heap
|
page read and write
|
||
627B000
|
heap
|
page read and write
|
||
2B0D000
|
heap
|
page read and write
|
||
5AE000
|
stack
|
page read and write
|
||
4C63000
|
heap
|
page read and write
|
||
4C10000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2ACD000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
473000
|
system
|
page execute and read and write
|
||
6D434000
|
unkown
|
page readonly
|
||
7415000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
22DD000
|
heap
|
page read and write
|
||
4B7C000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
54F000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
6266000
|
heap
|
page read and write
|
||
2371000
|
heap
|
page read and write
|
||
540D000
|
heap
|
page read and write
|
||
4B5B000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
612C000
|
heap
|
page read and write
|
||
447000
|
unkown
|
page readonly
|
||
22C8000
|
heap
|
page read and write
|
||
4BE4000
|
heap
|
page read and write
|
||
4E90000
|
direct allocation
|
page execute and read and write
|
||
401000
|
unkown
|
page execute read
|
||
612E000
|
heap
|
page read and write
|
||
60C3000
|
heap
|
page read and write
|
||
5452000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
61EB000
|
heap
|
page read and write
|
||
61CD000
|
heap
|
page read and write
|
||
4B5B000
|
heap
|
page read and write
|
||
742C000
|
heap
|
page read and write
|
||
61F3000
|
heap
|
page read and write
|
||
6121000
|
heap
|
page read and write
|
||
525000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2B59000
|
heap
|
page read and write
|
||
A4F000
|
stack
|
page read and write
|
||
4BD2000
|
heap
|
page read and write
|
||
4979000
|
heap
|
page read and write
|
||
741B000
|
heap
|
page read and write
|
||
2886000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
4B7C000
|
heap
|
page read and write
|
||
2B2E000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
60D6000
|
heap
|
page read and write
|
||
4F96000
|
heap
|
page read and write
|
||
4A1E000
|
stack
|
page read and write
|
||
5467000
|
heap
|
page read and write
|
||
6080000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
5381000
|
heap
|
page read and write
|
||
622B000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
2B9B000
|
heap
|
page read and write
|
||
22DC000
|
heap
|
page read and write
|
||
612C000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
2443000
|
heap
|
page read and write
|
||
23D4000
|
heap
|
page read and write
|
||
2ACD000
|
heap
|
page read and write
|
||
4B75000
|
heap
|
page read and write
|
||
6130000
|
heap
|
page read and write
|
||
4830000
|
trusted library allocation
|
page read and write
|
||
6137000
|
heap
|
page read and write
|
||
6229000
|
heap
|
page read and write
|
||
2371000
|
heap
|
page read and write
|
||
5C96000
|
heap
|
page read and write
|
||
546E000
|
heap
|
page read and write
|
||
60EE000
|
heap
|
page read and write
|
||
4C39000
|
heap
|
page read and write
|
||
2B56000
|
heap
|
page read and write
|
||
2F80000
|
trusted library allocation
|
page read and write
|
||
6227000
|
heap
|
page read and write
|
||
3280000
|
direct allocation
|
page read and write
|
||
84F000
|
stack
|
page read and write
|
||
2366000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
5467000
|
heap
|
page read and write
|
||
7477000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
2AC5000
|
heap
|
page read and write
|
||
611E000
|
heap
|
page read and write
|
||
74A1000
|
heap
|
page read and write
|
||
60FE000
|
heap
|
page read and write
|
||
437000
|
unkown
|
page readonly
|
||
429000
|
unkown
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
7485000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
610C000
|
heap
|
page read and write
|
||
22C3000
|
heap
|
page read and write
|
||
2270000
|
heap
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
2C39000
|
heap
|
page read and write
|
||
4C22000
|
heap
|
page read and write
|
||
447000
|
unkown
|
page readonly
|
||
5447000
|
heap
|
page read and write
|
||
22FE000
|
heap
|
page read and write
|
||
97E000
|
stack
|
page read and write
|
||
2C38000
|
heap
|
page read and write
|
||
22CF000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
2AEF000
|
heap
|
page read and write
|
||
456000
|
system
|
page execute and read and write
|
||
2C31000
|
heap
|
page read and write
|
||
2323000
|
heap
|
page read and write
|
||
612A000
|
heap
|
page read and write
|
||
7488000
|
heap
|
page read and write
|
||
447000
|
unkown
|
page readonly
|
||
4B7C000
|
heap
|
page read and write
|
||
2370000
|
trusted library allocation
|
page read and write
|
||
6121000
|
heap
|
page read and write
|
||
50E3000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
4B0E000
|
stack
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
60D1000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
524000
|
heap
|
page read and write
|
||
2323000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
613B000
|
heap
|
page read and write
|
||
237D000
|
heap
|
page read and write
|
||
C30000
|
trusted library allocation
|
page read and write
|
||
6198000
|
heap
|
page read and write
|
||
539E000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
4C07000
|
heap
|
page read and write
|
||
32E0000
|
direct allocation
|
page read and write
|
||
5402000
|
heap
|
page read and write
|
||
22EA000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2378000
|
heap
|
page read and write
|
||
2AB2000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
6F1000
|
heap
|
page read and write
|
||
3B2C000
|
stack
|
page read and write
|
||
613E000
|
heap
|
page read and write
|
||
23D4000
|
heap
|
page read and write
|
||
22BF000
|
heap
|
page read and write
|
||
6198000
|
heap
|
page read and write
|
||
6227000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
2334000
|
heap
|
page read and write
|
||
5CE000
|
stack
|
page read and write
|
||
7483000
|
heap
|
page read and write
|
||
22BC000
|
heap
|
page read and write
|
||
6241000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
2B2E000
|
heap
|
page read and write
|
||
61F3000
|
heap
|
page read and write
|
||
53ED000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
22D8000
|
heap
|
page read and write
|
||
2BB8000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
4B6D000
|
heap
|
page read and write
|
||
22A0000
|
heap
|
page read and write
|
||
60C7000
|
heap
|
page read and write
|
||
94E000
|
stack
|
page read and write
|
||
4B7E000
|
heap
|
page read and write
|
||
2AC6000
|
heap
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
22D1000
|
heap
|
page read and write
|
||
2371000
|
heap
|
page read and write
|
||
ACF000
|
stack
|
page read and write
|
||
4830000
|
trusted library allocation
|
page read and write
|
||
7435000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
23A3000
|
heap
|
page read and write
|
||
2980000
|
heap
|
page read and write
|
||
2AC1000
|
heap
|
page read and write
|
||
6238000
|
heap
|
page read and write
|
||
2375000
|
heap
|
page read and write
|
||
B8C000
|
heap
|
page read and write
|
||
9663000
|
direct allocation
|
page execute and read and write
|
||
610F000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
6129000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
2B9B000
|
heap
|
page read and write
|
||
61E2000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
5451000
|
heap
|
page read and write
|
||
7435000
|
heap
|
page read and write
|
||
8263000
|
direct allocation
|
page execute and read and write
|
||
60F9000
|
heap
|
page read and write
|
||
622F000
|
heap
|
page read and write
|
||
22DC000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
612C000
|
heap
|
page read and write
|
||
90F000
|
stack
|
page read and write
|
||
238E000
|
heap
|
page read and write
|
||
541D000
|
heap
|
page read and write
|
||
28C0000
|
trusted library allocation
|
page read and write
|
||
2F80000
|
trusted library allocation
|
page read and write
|
||
2F80000
|
trusted library allocation
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
22A0000
|
heap
|
page read and write
|
||
611E000
|
heap
|
page read and write
|
||
426000
|
unkown
|
page read and write
|
||
53EF000
|
heap
|
page read and write
|
||
60D7000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
2A56000
|
heap
|
page read and write
|
||
61E2000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
237E000
|
heap
|
page read and write
|
||
38BBB000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
73F7000
|
heap
|
page read and write
|
||
60FF000
|
heap
|
page read and write
|
||
73F7000
|
heap
|
page read and write
|
||
4C93000
|
heap
|
page read and write
|
||
60A6000
|
heap
|
page read and write
|
||
2AB4000
|
heap
|
page read and write
|
||
60FD000
|
heap
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
45C000
|
system
|
page execute and read and write
|
||
2440000
|
heap
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
2B97000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
6248000
|
heap
|
page read and write
|
||
6115000
|
heap
|
page read and write
|
||
73DD000
|
heap
|
page read and write
|
||
2369000
|
heap
|
page read and write
|
||
4B82000
|
heap
|
page read and write
|
||
2B82000
|
heap
|
page read and write
|
||
6271000
|
heap
|
page read and write
|
||
22C8000
|
heap
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
2FBA000
|
heap
|
page read and write
|
||
60D6000
|
heap
|
page read and write
|
||
622D000
|
heap
|
page read and write
|
||
6137000
|
heap
|
page read and write
|
||
2B2E000
|
heap
|
page read and write
|
||
60AE000
|
heap
|
page read and write
|
||
2881000
|
heap
|
page read and write
|
||
91F000
|
stack
|
page read and write
|
||
613C000
|
heap
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
7200000
|
remote allocation
|
page read and write
|
||
22BD000
|
heap
|
page read and write
|
||
544D000
|
heap
|
page read and write
|
||
60FE000
|
heap
|
page read and write
|
||
61E2000
|
heap
|
page read and write
|
||
612A000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
6121000
|
heap
|
page read and write
|
||
5447000
|
heap
|
page read and write
|
||
5373000
|
heap
|
page read and write
|
||
728000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
60EC000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
6137000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
7415000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
610A000
|
heap
|
page read and write
|
||
6115000
|
heap
|
page read and write
|
||
22BC000
|
heap
|
page read and write
|
||
2AB4000
|
heap
|
page read and write
|
||
22BC000
|
heap
|
page read and write
|
||
272F000
|
stack
|
page read and write
|
||
506E000
|
heap
|
page read and write
|
||
6137000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
60AF000
|
heap
|
page read and write
|
||
2B86000
|
heap
|
page read and write
|
||
60E6000
|
heap
|
page read and write
|
||
4C1F000
|
heap
|
page read and write
|
||
50B0000
|
trusted library allocation
|
page read and write
|
||
60E5000
|
heap
|
page read and write
|
||
4C07000
|
heap
|
page read and write
|
||
ABF000
|
stack
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
2981000
|
heap
|
page read and write
|
||
545F000
|
heap
|
page read and write
|
||
53E7000
|
heap
|
page read and write
|
||
60F9000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
447000
|
unkown
|
page readonly
|
||
2323000
|
heap
|
page read and write
|
||
2C97000
|
heap
|
page read and write
|
||
612C000
|
heap
|
page read and write
|
||
73DF000
|
heap
|
page read and write
|
||
4B73000
|
heap
|
page read and write
|
||
748F000
|
heap
|
page read and write
|
||
2C6F000
|
heap
|
page read and write
|
||
236C000
|
heap
|
page read and write
|
||
612E000
|
heap
|
page read and write
|
||
60E6000
|
heap
|
page read and write
|
||
2F87000
|
heap
|
page read and write
|
||
60FD000
|
heap
|
page read and write
|
||
A4F000
|
stack
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
4C10000
|
heap
|
page read and write
|
||
A5F000
|
stack
|
page read and write
|
||
AD1000
|
heap
|
page read and write
|
||
23AB000
|
heap
|
page read and write
|
||
4B50000
|
heap
|
page read and write
|
||
6124000
|
heap
|
page read and write
|
||
4C10000
|
heap
|
page read and write
|
||
22CD000
|
heap
|
page read and write
|
||
555000
|
heap
|
page read and write
|
||
4830000
|
trusted library allocation
|
page read and write
|
||
60E5000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
60F0000
|
heap
|
page read and write
|
||
2B98000
|
heap
|
page read and write
|
||
2B88000
|
heap
|
page read and write
|
||
612C000
|
heap
|
page read and write
|
||
61E0000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
6131000
|
heap
|
page read and write
|
||
6241000
|
heap
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
2A8B000
|
heap
|
page read and write
|
||
2881000
|
heap
|
page read and write
|
||
6175000
|
heap
|
page read and write
|
||
60E6000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
2B57000
|
heap
|
page read and write
|
||
5455000
|
heap
|
page read and write
|
||
2F04000
|
heap
|
page read and write
|
||
2381000
|
heap
|
page read and write
|
||
4C07000
|
heap
|
page read and write
|
||
AD9000
|
heap
|
page read and write
|
||
5CA5000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
231E000
|
heap
|
page read and write
|
||
612E000
|
heap
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
7488000
|
heap
|
page read and write
|
||
22BC000
|
heap
|
page read and write
|
||
53F5000
|
heap
|
page read and write
|
||
612A000
|
heap
|
page read and write
|
||
53F5000
|
heap
|
page read and write
|
||
61B0000
|
heap
|
page read and write
|
||
61E0000
|
heap
|
page read and write
|
||
60E6000
|
heap
|
page read and write
|
||
2B0D000
|
heap
|
page read and write
|
||
22C8000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
6121000
|
heap
|
page read and write
|
||
74A1000
|
heap
|
page read and write
|
||
2F00000
|
trusted library allocation
|
page read and write
|
||
5454000
|
heap
|
page read and write
|
||
5447000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
5455000
|
heap
|
page read and write
|
||
22C1000
|
heap
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
22BF000
|
heap
|
page read and write
|
||
740B000
|
heap
|
page read and write
|
||
2A9D000
|
heap
|
page read and write
|
||
544F000
|
heap
|
page read and write
|
||
61F3000
|
heap
|
page read and write
|
||
49E000
|
stack
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
612C000
|
heap
|
page read and write
|
||
22C8000
|
heap
|
page read and write
|
||
2B2A000
|
heap
|
page read and write
|
||
7AE000
|
stack
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
4B6C000
|
heap
|
page read and write
|
||
611F000
|
heap
|
page read and write
|
||
5467000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
4C5A000
|
heap
|
page read and write
|
||
179000
|
stack
|
page read and write
|
||
60E6000
|
heap
|
page read and write
|
||
22DD000
|
heap
|
page read and write
|
||
22DE000
|
heap
|
page read and write
|
||
3030000
|
trusted library allocation
|
page read and write
|
||
2B2A000
|
heap
|
page read and write
|
||
2500000
|
heap
|
page read and write
|
||
546E000
|
heap
|
page read and write
|
||
4830000
|
trusted library allocation
|
page read and write
|
||
6271000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
60BD000
|
heap
|
page read and write
|
||
94E000
|
stack
|
page read and write
|
||
60F6000
|
heap
|
page read and write
|
||
546E000
|
heap
|
page read and write
|
||
60EE000
|
heap
|
page read and write
|
||
6229000
|
heap
|
page read and write
|
||
2B53000
|
heap
|
page read and write
|
||
283E000
|
stack
|
page read and write
|
||
38AC0000
|
heap
|
page read and write
|
||
2369000
|
heap
|
page read and write
|
||
5F14000
|
heap
|
page read and write
|
||
2B2E000
|
heap
|
page read and write
|
||
611F000
|
heap
|
page read and write
|
||
6115000
|
heap
|
page read and write
|
||
748F000
|
heap
|
page read and write
|
||
60A2000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
60E6000
|
heap
|
page read and write
|
||
4BD2000
|
heap
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
53C6000
|
heap
|
page read and write
|
||
23AF000
|
heap
|
page read and write
|
||
5457000
|
heap
|
page read and write
|
||
539A000
|
heap
|
page read and write
|
||
4B82000
|
heap
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
5C92000
|
heap
|
page read and write
|
||
2B97000
|
heap
|
page read and write
|
||
69E000
|
heap
|
page read and write
|
||
22DD000
|
heap
|
page read and write
|
||
53CA000
|
heap
|
page read and write
|
||
2A9D000
|
heap
|
page read and write
|
||
622F000
|
heap
|
page read and write
|
||
613C000
|
heap
|
page read and write
|
||
2350000
|
heap
|
page read and write
|
||
61A3000
|
heap
|
page read and write
|
||
6225000
|
heap
|
page read and write
|
||
60BF000
|
heap
|
page read and write
|
||
6269000
|
heap
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
60D7000
|
heap
|
page read and write
|
||
6FD000
|
stack
|
page read and write
|
||
611E000
|
heap
|
page read and write
|
||
6130000
|
heap
|
page read and write
|
||
22C9000
|
heap
|
page read and write
|
||
73F7000
|
heap
|
page read and write
|
||
22DD000
|
heap
|
page read and write
|
||
611E000
|
heap
|
page read and write
|
||
2C35000
|
heap
|
page read and write
|
||
742C000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
237D000
|
heap
|
page read and write
|
||
2C35000
|
heap
|
page read and write
|
||
22F8000
|
heap
|
page read and write
|
||
627A000
|
heap
|
page read and write
|
||
28CF000
|
heap
|
page read and write
|
||
610B000
|
heap
|
page read and write
|
||
6127000
|
heap
|
page read and write
|
||
60FD000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
237E000
|
heap
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
61A3000
|
heap
|
page read and write
|
||
7488000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
2377000
|
heap
|
page read and write
|
||
4B5B000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
38280000
|
heap
|
page read and write
|
||
60EC000
|
heap
|
page read and write
|
||
2B11000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
22D1000
|
heap
|
page read and write
|
||
2290000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
6241000
|
heap
|
page read and write
|
||
7489000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
6223000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
2A9D000
|
heap
|
page read and write
|
||
6271000
|
heap
|
page read and write
|
||
60FE000
|
heap
|
page read and write
|
||
61E7000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
6129000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
613B000
|
heap
|
page read and write
|
||
2AC6000
|
heap
|
page read and write
|
||
22D3000
|
heap
|
page read and write
|
||
2B2E000
|
heap
|
page read and write
|
||
2C47000
|
heap
|
page read and write
|
||
4830000
|
trusted library allocation
|
page read and write
|
||
73DF000
|
heap
|
page read and write
|
||
2323000
|
heap
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
53B2000
|
heap
|
page read and write
|
||
5C94000
|
heap
|
page read and write
|
||
61E2000
|
heap
|
page read and write
|
||
2364000
|
heap
|
page read and write
|
||
61F3000
|
heap
|
page read and write
|
||
60E9000
|
heap
|
page read and write
|
||
5FC6000
|
heap
|
page read and write
|
||
22C5000
|
heap
|
page read and write
|
||
7483000
|
heap
|
page read and write
|
||
60F7000
|
heap
|
page read and write
|
||
7422000
|
heap
|
page read and write
|
||
612D000
|
heap
|
page read and write
|
||
741B000
|
heap
|
page read and write
|
||
60FD000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
2B49000
|
heap
|
page read and write
|
||
2B4F000
|
heap
|
page read and write
|
||
6227000
|
heap
|
page read and write
|
||
6269000
|
heap
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
61F3000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
38AC0000
|
heap
|
page read and write
|
||
6174000
|
heap
|
page read and write
|
||
524000
|
heap
|
page read and write
|
||
6125000
|
heap
|
page read and write
|
||
22EE000
|
heap
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
622F000
|
heap
|
page read and write
|
||
2375000
|
heap
|
page read and write
|
||
4830000
|
trusted library allocation
|
page read and write
|
||
4B5C000
|
heap
|
page read and write
|
||
6131000
|
heap
|
page read and write
|
||
22BC000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
2B08000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
60E3000
|
heap
|
page read and write
|
||
60FE000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
4BE000
|
stack
|
page read and write
|
||
22C7000
|
heap
|
page read and write
|
||
5457000
|
heap
|
page read and write
|
||
60E9000
|
heap
|
page read and write
|
||
5447000
|
heap
|
page read and write
|
||
60D6000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
6115000
|
heap
|
page read and write
|
||
61E7000
|
heap
|
page read and write
|
||
2B98000
|
heap
|
page read and write
|
||
2334000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
60E6000
|
heap
|
page read and write
|
||
748E000
|
heap
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
611E000
|
heap
|
page read and write
|
||
2B08000
|
heap
|
page read and write
|
||
2B11000
|
heap
|
page read and write
|
||
2B9B000
|
heap
|
page read and write
|
||
3030000
|
trusted library allocation
|
page read and write
|
||
17C000
|
stack
|
page read and write
|
||
5455000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
27C6000
|
heap
|
page read and write
|
||
237D000
|
heap
|
page read and write
|
||
7415000
|
heap
|
page read and write
|
||
6229000
|
heap
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
2B57000
|
heap
|
page read and write
|
||
64C5000
|
heap
|
page read and write
|
||
22A0000
|
heap
|
page read and write
|
||
2371000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2AB3000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
6115000
|
heap
|
page read and write
|
||
61F3000
|
heap
|
page read and write
|
||
2B97000
|
heap
|
page read and write
|
||
6E63000
|
direct allocation
|
page execute and read and write
|
||
5CAC000
|
heap
|
page read and write
|
||
61EA000
|
heap
|
page read and write
|
||
5454000
|
heap
|
page read and write
|
||
5D9C000
|
heap
|
page read and write
|
||
5C91000
|
heap
|
page read and write
|
||
37822000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
2B0D000
|
heap
|
page read and write
|
||
60D6000
|
heap
|
page read and write
|
||
627E000
|
heap
|
page read and write
|
||
2364000
|
heap
|
page read and write
|
||
73DF000
|
heap
|
page read and write
|
||
6271000
|
heap
|
page read and write
|
||
2370000
|
trusted library allocation
|
page read and write
|
||
2334000
|
heap
|
page read and write
|
||
546A000
|
heap
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
38BB1000
|
heap
|
page read and write
|
||
4BD2000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
37822000
|
heap
|
page read and write
|
||
2AB4000
|
heap
|
page read and write
|
||
22C5000
|
heap
|
page read and write
|
||
4B8A000
|
heap
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
237E000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
60AB000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
60F9000
|
heap
|
page read and write
|
||
6121000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
2B2B000
|
heap
|
page read and write
|
||
612C000
|
heap
|
page read and write
|
||
3270000
|
direct allocation
|
page read and write
|
||
17C000
|
stack
|
page read and write
|
||
5434000
|
heap
|
page read and write
|
||
60F4000
|
heap
|
page read and write
|
||
2B1C000
|
heap
|
page read and write
|
||
610B000
|
heap
|
page read and write
|
||
4B5F000
|
heap
|
page read and write
|
||
6129000
|
heap
|
page read and write
|
||
6229000
|
heap
|
page read and write
|
||
3030000
|
trusted library allocation
|
page read and write
|
||
5CA8000
|
heap
|
page read and write
|
||
4C1F000
|
heap
|
page read and write
|
||
2981000
|
heap
|
page read and write
|
||
6198000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
60EE000
|
heap
|
page read and write
|
||
525000
|
heap
|
page read and write
|
||
4B6D000
|
heap
|
page read and write
|
||
53BF000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
60C5000
|
heap
|
page read and write
|
||
611E000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
612A000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
2340000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
6211000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2BF2000
|
heap
|
page read and write
|
||
610B000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2B2E000
|
heap
|
page read and write
|
||
673000
|
heap
|
page read and write
|
||
22BC000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
5455000
|
heap
|
page read and write
|
||
5449000
|
heap
|
page read and write
|
||
193000
|
stack
|
page read and write
|
||
5C94000
|
heap
|
page read and write
|
||
612E000
|
heap
|
page read and write
|
||
53AA000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
60D6000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
6137000
|
heap
|
page read and write
|
||
66E000
|
stack
|
page read and write
|
||
22C1000
|
heap
|
page read and write
|
||
2ACD000
|
heap
|
page read and write
|
||
2B8A000
|
heap
|
page read and write
|
||
4B6C000
|
heap
|
page read and write
|
||
53F6000
|
heap
|
page read and write
|
||
60D4000
|
heap
|
page read and write
|
||
22FE000
|
heap
|
page read and write
|
||
610B000
|
heap
|
page read and write
|
||
22BC000
|
heap
|
page read and write
|
||
5457000
|
heap
|
page read and write
|
||
B8C000
|
heap
|
page read and write
|
||
546E000
|
heap
|
page read and write
|
||
4B5B000
|
heap
|
page read and write
|
||
22E1000
|
heap
|
page read and write
|
||
61CD000
|
heap
|
page read and write
|
||
4B8E000
|
heap
|
page read and write
|
||
18F000
|
stack
|
page read and write
|
||
6111000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
22C9000
|
heap
|
page read and write
|
||
612C000
|
heap
|
page read and write
|
||
612C000
|
heap
|
page read and write
|
||
748F000
|
heap
|
page read and write
|
||
22C7000
|
heap
|
page read and write
|
||
6175000
|
heap
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
60D6000
|
heap
|
page read and write
|
||
6109000
|
heap
|
page read and write
|
||
2931000
|
heap
|
page read and write
|
||
60F6000
|
heap
|
page read and write
|
||
612C000
|
heap
|
page read and write
|
||
2C36000
|
heap
|
page read and write
|
||
539F000
|
heap
|
page read and write
|
||
612A000
|
heap
|
page read and write
|
||
6115000
|
heap
|
page read and write
|
||
6227000
|
heap
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
4BE4000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
612C000
|
heap
|
page read and write
|
||
4830000
|
trusted library allocation
|
page read and write
|
||
2A68000
|
heap
|
page read and write
|
||
9BE000
|
stack
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
B96000
|
heap
|
page read and write
|
||
2F03000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
564000
|
heap
|
page read and write
|
||
ADE000
|
heap
|
page read and write
|
||
4BF2000
|
heap
|
page read and write
|
||
2B08000
|
heap
|
page read and write
|
||
244D000
|
heap
|
page read and write
|
||
60D7000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
2371000
|
heap
|
page read and write
|
||
61C6000
|
heap
|
page read and write
|
||
2350000
|
heap
|
page read and write
|
||
60F6000
|
heap
|
page read and write
|
||
ADD000
|
heap
|
page read and write
|
||
2731000
|
heap
|
page read and write
|
||
4ACF000
|
stack
|
page read and write
|
||
50B0000
|
trusted library allocation
|
page read and write
|
||
546E000
|
heap
|
page read and write
|
||
613C000
|
heap
|
page read and write
|
||
394A5000
|
heap
|
page read and write
|
||
60D4000
|
heap
|
page read and write
|
||
73FC000
|
heap
|
page read and write
|
||
61E0000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
53A6000
|
heap
|
page read and write
|
||
38BBB000
|
heap
|
page read and write
|
||
177000
|
stack
|
page read and write
|
||
2B2E000
|
heap
|
page read and write
|
||
61E2000
|
heap
|
page read and write
|
||
22C3000
|
heap
|
page read and write
|
||
5C9D000
|
heap
|
page read and write
|
||
C13000
|
heap
|
page read and write
|
||
2B38000
|
heap
|
page read and write
|
||
2B89000
|
heap
|
page read and write
|
||
6112000
|
heap
|
page read and write
|
||
4B64000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
A2F000
|
stack
|
page read and write
|
||
2ACD000
|
heap
|
page read and write
|
||
53F5000
|
heap
|
page read and write
|
||
22C5000
|
heap
|
page read and write
|
||
3290000
|
direct allocation
|
page read and write
|
||
22D1000
|
heap
|
page read and write
|
||
5EE000
|
stack
|
page read and write
|
||
5CA0000
|
heap
|
page read and write
|
||
6130000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
43BF000
|
stack
|
page read and write
|
||
22BC000
|
heap
|
page read and write
|
||
4B82000
|
heap
|
page read and write
|
||
22D5000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
60EC000
|
heap
|
page read and write
|
||
5370000
|
heap
|
page read and write
|
||
4C5E000
|
heap
|
page read and write
|
||
622D000
|
heap
|
page read and write
|
||
60D7000
|
heap
|
page read and write
|
||
53A3000
|
heap
|
page read and write
|
||
53A6000
|
heap
|
page read and write
|
||
5455000
|
heap
|
page read and write
|
||
60C6000
|
heap
|
page read and write
|
||
60C0000
|
heap
|
page read and write
|
||
6109000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
2B86000
|
heap
|
page read and write
|
||
611E000
|
heap
|
page read and write
|
||
6201000
|
heap
|
page read and write
|
||
544F000
|
heap
|
page read and write
|
||
2C4B000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
60AB000
|
heap
|
page read and write
|
||
60F2000
|
heap
|
page read and write
|
||
60F9000
|
heap
|
page read and write
|
||
7422000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
4B7C000
|
heap
|
page read and write
|
||
7483000
|
heap
|
page read and write
|
||
53BF000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
5447000
|
heap
|
page read and write
|
||
2B97000
|
heap
|
page read and write
|
||
17C000
|
stack
|
page read and write
|
||
6D430000
|
unkown
|
page readonly
|
||
5455000
|
heap
|
page read and write
|
||
76D000
|
stack
|
page read and write
|
||
5C96000
|
heap
|
page read and write
|
||
27A9000
|
heap
|
page read and write
|
||
4F93000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
635000
|
heap
|
page read and write
|
||
612C000
|
heap
|
page read and write
|
||
61F3000
|
heap
|
page read and write
|
||
3A30000
|
heap
|
page read and write
|
||
68B000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
60DE000
|
heap
|
page read and write
|
||
748F000
|
heap
|
page read and write
|
||
3250000
|
direct allocation
|
page read and write
|
||
6121000
|
heap
|
page read and write
|
||
53E7000
|
heap
|
page read and write
|
||
73F7000
|
heap
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
C8E000
|
heap
|
page read and write
|
||
60F9000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
4F54000
|
heap
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
22CF000
|
heap
|
page read and write
|
||
6100000
|
heap
|
page read and write
|
||
625A000
|
heap
|
page read and write
|
||
2F00000
|
trusted library allocation
|
page read and write
|
||
4830000
|
trusted library allocation
|
page read and write
|
||
22C1000
|
heap
|
page read and write
|
||
22DD000
|
heap
|
page read and write
|
||
5451000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
2B36000
|
heap
|
page read and write
|
||
612C000
|
heap
|
page read and write
|
||
41B000
|
system
|
page execute and read and write
|
||
2930000
|
heap
|
page read and write
|
||
83E000
|
stack
|
page read and write
|
||
2323000
|
heap
|
page read and write
|
||
53D6000
|
heap
|
page read and write
|
||
C1E000
|
heap
|
page read and write
|
||
2B39000
|
heap
|
page read and write
|
||
5455000
|
heap
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
2C41000
|
heap
|
page read and write
|
||
610B000
|
heap
|
page read and write
|
||
6266000
|
heap
|
page read and write
|
||
4B56000
|
heap
|
page read and write
|
||
22A4000
|
heap
|
page read and write
|
||
2F09000
|
heap
|
page read and write
|
||
5E5D000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
2ACE000
|
heap
|
page read and write
|
||
5459000
|
heap
|
page read and write
|
||
4B56000
|
heap
|
page read and write
|
||
22C3000
|
heap
|
page read and write
|
||
38AB1000
|
heap
|
page read and write
|
||
4C07000
|
heap
|
page read and write
|
||
27C1000
|
heap
|
page read and write
|
||
C1D000
|
heap
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
53C4000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
524000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
2F00000
|
trusted library allocation
|
page read and write
|
||
4F90000
|
trusted library allocation
|
page read and write
|
||
22DD000
|
heap
|
page read and write
|
||
6167000
|
heap
|
page read and write
|
||
2B2A000
|
heap
|
page read and write
|
||
61F3000
|
heap
|
page read and write
|
||
61F2000
|
heap
|
page read and write
|
||
22D1000
|
heap
|
page read and write
|
||
22BF000
|
heap
|
page read and write
|
||
4830000
|
trusted library allocation
|
page read and write
|
||
22C9000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
38BB1000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
2B2A000
|
heap
|
page read and write
|
||
2361000
|
heap
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
2B82000
|
heap
|
page read and write
|
||
437000
|
unkown
|
page readonly
|
||
6153000
|
heap
|
page read and write
|
||
435000
|
unkown
|
page read and write
|
||
6185000
|
heap
|
page read and write
|
||
544B000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
616C000
|
heap
|
page read and write
|
||
61E2000
|
heap
|
page read and write
|
||
2367000
|
heap
|
page read and write
|
||
61B0000
|
heap
|
page read and write
|
||
5CA5000
|
heap
|
page read and write
|
||
4BF2000
|
heap
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
60FE000
|
heap
|
page read and write
|
||
625A000
|
heap
|
page read and write
|
||
2C41000
|
heap
|
page read and write
|
||
612C000
|
heap
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
22C1000
|
heap
|
page read and write
|
||
2BEC000
|
heap
|
page read and write
|
||
6E4000
|
heap
|
page read and write
|
||
38AC0000
|
heap
|
page read and write
|
||
53D6000
|
heap
|
page read and write
|
||
4B7E000
|
heap
|
page read and write
|
||
3030000
|
trusted library allocation
|
page read and write
|
||
22C7000
|
heap
|
page read and write
|
||
658000
|
heap
|
page read and write
|
||
6112000
|
heap
|
page read and write
|
||
23D2000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
6241000
|
heap
|
page read and write
|
||
2C36000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
500E000
|
stack
|
page read and write
|
||
622B000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
537B000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
6130000
|
heap
|
page read and write
|
||
5467000
|
heap
|
page read and write
|
||
73F7000
|
heap
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
613F000
|
heap
|
page read and write
|
||
5451000
|
heap
|
page read and write
|
||
2323000
|
heap
|
page read and write
|
||
93F000
|
stack
|
page read and write
|
||
611E000
|
heap
|
page read and write
|
||
60FE000
|
heap
|
page read and write
|
||
22D5000
|
heap
|
page read and write
|
||
7D8000
|
heap
|
page read and write
|
||
7488000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
524000
|
heap
|
page read and write
|
||
22C4000
|
heap
|
page read and write
|
||
60D4000
|
heap
|
page read and write
|
||
60E000
|
stack
|
page read and write
|
||
58E000
|
stack
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
4B56000
|
heap
|
page read and write
|
||
742C000
|
heap
|
page read and write
|
||
C1D000
|
heap
|
page read and write
|
||
38CB9000
|
heap
|
page read and write
|
||
5447000
|
heap
|
page read and write
|
||
4BFF000
|
heap
|
page read and write
|
||
22C7000
|
heap
|
page read and write
|
||
2442000
|
heap
|
page read and write
|
||
6137000
|
heap
|
page read and write
|
||
2375000
|
heap
|
page read and write
|
||
53B1000
|
heap
|
page read and write
|
||
44B0000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
2AC6000
|
heap
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
564000
|
heap
|
page read and write
|
||
612A000
|
heap
|
page read and write
|
||
53F5000
|
heap
|
page read and write
|
||
2B53000
|
heap
|
page read and write
|
||
7415000
|
heap
|
page read and write
|
||
4830000
|
trusted library allocation
|
page read and write
|
||
4B8E000
|
heap
|
page read and write
|
||
2B4A000
|
heap
|
page read and write
|
||
2931000
|
heap
|
page read and write
|
||
790000
|
trusted library allocation
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
60EE000
|
heap
|
page read and write
|
||
7483000
|
heap
|
page read and write
|
||
5447000
|
heap
|
page read and write
|
||
7489000
|
heap
|
page read and write
|
||
22C7000
|
heap
|
page read and write
|
||
447000
|
unkown
|
page readonly
|
||
4B6E000
|
heap
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
2361000
|
heap
|
page read and write
|
||
7485000
|
heap
|
page read and write
|
||
7487000
|
heap
|
page read and write
|
||
6137000
|
heap
|
page read and write
|
||
2AC6000
|
heap
|
page read and write
|
||
60F9000
|
heap
|
page read and write
|
||
4C02000
|
heap
|
page read and write
|
||
2290000
|
heap
|
page read and write
|
||
5457000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
613C000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
38AB1000
|
heap
|
page read and write
|
||
610B000
|
heap
|
page read and write
|
||
546A000
|
heap
|
page read and write
|
||
2281000
|
heap
|
page read and write
|
||
66F000
|
heap
|
page read and write
|
||
61E0000
|
heap
|
page read and write
|
||
6137000
|
heap
|
page read and write
|
||
613C000
|
heap
|
page read and write
|
||
2B9D000
|
heap
|
page read and write
|
||
8BF000
|
stack
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
49D0000
|
trusted library allocation
|
page read and write
|
||
29DC000
|
heap
|
page read and write
|
||
5452000
|
heap
|
page read and write
|
||
60EC000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
2B87000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
2F00000
|
trusted library allocation
|
page read and write
|
||
237D000
|
heap
|
page read and write
|
||
3BB000
|
stack
|
page read and write
|
||
7489000
|
heap
|
page read and write
|
||
5387000
|
heap
|
page read and write
|
||
4B5C000
|
heap
|
page read and write
|
||
627A000
|
heap
|
page read and write
|
||
2AD7000
|
heap
|
page read and write
|
||
612A000
|
heap
|
page read and write
|
||
2C47000
|
heap
|
page read and write
|
||
613C000
|
heap
|
page read and write
|
||
61F3000
|
heap
|
page read and write
|
||
73FF000
|
heap
|
page read and write
|
||
22DC000
|
heap
|
page read and write
|
||
22D1000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
60F9000
|
heap
|
page read and write
|
||
2730000
|
heap
|
page read and write
|
||
2AB3000
|
heap
|
page read and write
|
||
61B0000
|
heap
|
page read and write
|
||
61F3000
|
heap
|
page read and write
|
||
2C47000
|
heap
|
page read and write
|
||
61CF000
|
heap
|
page read and write
|
||
5455000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
2B2E000
|
heap
|
page read and write
|
||
22BC000
|
heap
|
page read and write
|
||
622B000
|
heap
|
page read and write
|
||
5390000
|
heap
|
page read and write
|
||
6100000
|
heap
|
page read and write
|
||
627A000
|
heap
|
page read and write
|
||
2B86000
|
heap
|
page read and write
|
||
5410000
|
heap
|
page read and write
|
||
6225000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
5457000
|
heap
|
page read and write
|
||
38AC0000
|
heap
|
page read and write
|
||
60B7000
|
heap
|
page read and write
|
||
7488000
|
heap
|
page read and write
|
||
61E0000
|
heap
|
page read and write
|
||
6225000
|
heap
|
page read and write
|
||
61F3000
|
heap
|
page read and write
|
||
7474000
|
heap
|
page read and write
|
||
22D1000
|
heap
|
page read and write
|
||
5419000
|
heap
|
page read and write
|
||
2323000
|
heap
|
page read and write
|
||
5459000
|
heap
|
page read and write
|
||
22D1000
|
heap
|
page read and write
|
||
6127000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
2B2E000
|
heap
|
page read and write
|
||
7485000
|
heap
|
page read and write
|
||
610C000
|
heap
|
page read and write
|
||
53CA000
|
heap
|
page read and write
|
||
7487000
|
heap
|
page read and write
|
||
748E000
|
heap
|
page read and write
|
||
2B8A000
|
heap
|
page read and write
|
||
61E0000
|
heap
|
page read and write
|
||
60D6000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
6121000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
609A000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
24C0000
|
heap
|
page read and write
|
||
2B53000
|
heap
|
page read and write
|
||
23A3000
|
heap
|
page read and write
|
||
60A5000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
61E5000
|
heap
|
page read and write
|
||
238A000
|
heap
|
page read and write
|
||
5455000
|
heap
|
page read and write
|
||
2A3F000
|
stack
|
page read and write
|
||
2B2E000
|
heap
|
page read and write
|
||
5385000
|
heap
|
page read and write
|
||
2B2E000
|
heap
|
page read and write
|
||
2731000
|
heap
|
page read and write
|
||
537D000
|
heap
|
page read and write
|
||
2B0D000
|
heap
|
page read and write
|
||
4B5B000
|
heap
|
page read and write
|
||
262E000
|
stack
|
page read and write
|
||
53D4000
|
heap
|
page read and write
|
||
546E000
|
heap
|
page read and write
|
||
6115000
|
heap
|
page read and write
|
||
237D000
|
heap
|
page read and write
|
||
2361000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
612C000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
2290000
|
heap
|
page read and write
|
||
612C000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
37822000
|
heap
|
page read and write
|
||
22BC000
|
heap
|
page read and write
|
||
53C4000
|
heap
|
page read and write
|
||
2B87000
|
heap
|
page read and write
|
||
6231000
|
heap
|
page read and write
|
||
4C65000
|
heap
|
page read and write
|
||
613C000
|
heap
|
page read and write
|
||
53E8000
|
heap
|
page read and write
|
||
22C1000
|
heap
|
page read and write
|
||
2C40000
|
heap
|
page read and write
|
||
3215000
|
heap
|
page read and write
|
||
6417000
|
heap
|
page read and write
|
||
748E000
|
heap
|
page read and write
|
||
437000
|
unkown
|
page readonly
|
||
2B2E000
|
heap
|
page read and write
|
||
4C1F000
|
heap
|
page read and write
|
||
2C3A000
|
heap
|
page read and write
|
||
53B2000
|
heap
|
page read and write
|
||
612C000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
74A1000
|
heap
|
page read and write
|
||
73DF000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
2790000
|
heap
|
page read and write
|
||
23D3000
|
heap
|
page read and write
|
||
2375000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
752000
|
heap
|
page read and write
|
||
2B97000
|
heap
|
page read and write
|
||
41B000
|
system
|
page execute and read and write
|
||
544D000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
2C39000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
2B09000
|
heap
|
page read and write
|
||
2A9B000
|
heap
|
page read and write
|
||
28C3000
|
heap
|
page read and write
|
||
28C1000
|
heap
|
page read and write
|
||
2C41000
|
heap
|
page read and write
|
||
2B2E000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
4F9C000
|
heap
|
page read and write
|
||
73E0000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
4C2E000
|
heap
|
page read and write
|
||
4B75000
|
heap
|
page read and write
|
||
22C1000
|
heap
|
page read and write
|
||
2B1C000
|
heap
|
page read and write
|
||
28CE000
|
heap
|
page read and write
|
||
73F7000
|
heap
|
page read and write
|
||
2364000
|
heap
|
page read and write
|
||
60A5000
|
heap
|
page read and write
|
||
2B2A000
|
heap
|
page read and write
|
||
23AE000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
4F8E000
|
stack
|
page read and write
|
||
22D1000
|
heap
|
page read and write
|
||
4830000
|
trusted library allocation
|
page read and write
|
||
53F5000
|
heap
|
page read and write
|
||
612C000
|
heap
|
page read and write
|
||
B83000
|
heap
|
page read and write
|
||
5467000
|
heap
|
page read and write
|
||
60BC000
|
heap
|
page read and write
|
||
5404000
|
heap
|
page read and write
|
||
37A94000
|
heap
|
page read and write
|
||
4830000
|
trusted library allocation
|
page read and write
|
||
4B7E000
|
heap
|
page read and write
|
||
2B0D000
|
heap
|
page read and write
|
||
60FD000
|
heap
|
page read and write
|
||
22F1000
|
heap
|
page read and write
|
||
C8E000
|
heap
|
page read and write
|
||
2371000
|
heap
|
page read and write
|
||
2370000
|
trusted library allocation
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
6D431000
|
unkown
|
page execute read
|
||
291E000
|
heap
|
page read and write
|
||
2C36000
|
heap
|
page read and write
|
||
459000
|
system
|
page execute and read and write
|
||
740F000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
60FA000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
6130000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
2B1C000
|
heap
|
page read and write
|
||
394B1000
|
heap
|
page read and write
|
||
7474000
|
heap
|
page read and write
|
||
235F000
|
heap
|
page read and write
|
||
4C65000
|
heap
|
page read and write
|
||
193000
|
stack
|
page read and write
|
||
7476000
|
heap
|
page read and write
|
||
4B6D000
|
heap
|
page read and write
|
||
39CAD000
|
heap
|
page read and write
|
||
2AB3000
|
heap
|
page read and write
|
||
612E000
|
heap
|
page read and write
|
||
622F000
|
heap
|
page read and write
|
||
61AC000
|
heap
|
page read and write
|
||
612E000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
38283000
|
heap
|
page read and write
|
||
53F5000
|
heap
|
page read and write
|
||
50B0000
|
trusted library allocation
|
page read and write
|
||
447000
|
unkown
|
page readonly
|
||
9C000
|
stack
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
5468000
|
heap
|
page read and write
|
||
612C000
|
heap
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
22DD000
|
heap
|
page read and write
|
||
6167000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
7489000
|
heap
|
page read and write
|
||
4B6C000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
3240000
|
direct allocation
|
page read and write
|
||
4B5B000
|
heap
|
page read and write
|
||
622D000
|
heap
|
page read and write
|
||
22BC000
|
heap
|
page read and write
|
||
7415000
|
heap
|
page read and write
|
||
22E0000
|
heap
|
page read and write
|
||
6100000
|
heap
|
page read and write
|
||
6115000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
610B000
|
heap
|
page read and write
|
||
22CC000
|
heap
|
page read and write
|
||
2975000
|
heap
|
page read and write
|
||
22C1000
|
heap
|
page read and write
|
||
7428000
|
heap
|
page read and write
|
||
2B2B000
|
heap
|
page read and write
|
||
612A000
|
heap
|
page read and write
|
||
525000
|
heap
|
page read and write
|
||
2B3B000
|
heap
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
60D6000
|
heap
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
6241000
|
heap
|
page read and write
|
||
7400000
|
heap
|
page read and write
|
||
546A000
|
heap
|
page read and write
|
||
AD0000
|
trusted library allocation
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
22DD000
|
heap
|
page read and write
|
||
2332000
|
heap
|
page read and write
|
||
61F3000
|
heap
|
page read and write
|
||
32F0000
|
direct allocation
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
625A000
|
heap
|
page read and write
|
||
2B08000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
22C8000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
5462000
|
heap
|
page read and write
|
||
6137000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
61E0000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
612C000
|
heap
|
page read and write
|
||
524000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
235C000
|
heap
|
page read and write
|
||
5455000
|
heap
|
page read and write
|
||
2B97000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
7474000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
6225000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
2C35000
|
heap
|
page read and write
|
||
61F3000
|
heap
|
page read and write
|
||
60EC000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
433E000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
624000
|
heap
|
page read and write
|
||
C86000
|
heap
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
2B2E000
|
heap
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
6269000
|
heap
|
page read and write
|
||
2B53000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
6241000
|
heap
|
page read and write
|
||
4B6C000
|
heap
|
page read and write
|
||
546C000
|
heap
|
page read and write
|
||
60A2000
|
heap
|
page read and write
|
||
60F9000
|
heap
|
page read and write
|
||
4BE4000
|
heap
|
page read and write
|
||
4B5C000
|
heap
|
page read and write
|
||
4C63000
|
heap
|
page read and write
|
||
53D6000
|
heap
|
page read and write
|
||
60C5000
|
heap
|
page read and write
|
||
22C7000
|
heap
|
page read and write
|
||
4B8A000
|
heap
|
page read and write
|
||
2C37000
|
heap
|
page read and write
|
||
38BB1000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
610B000
|
heap
|
page read and write
|
||
546A000
|
heap
|
page read and write
|
||
22DD000
|
heap
|
page read and write
|
||
60D1000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
61F3000
|
heap
|
page read and write
|
||
2B30000
|
heap
|
page read and write
|
||
37A93000
|
heap
|
page read and write
|
||
2C32000
|
heap
|
page read and write
|
||
6FF26000
|
unkown
|
page readonly
|
||
2B50000
|
heap
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
61F2000
|
heap
|
page read and write
|
||
53A6000
|
heap
|
page read and write
|
||
2B4A000
|
heap
|
page read and write
|
||
2B0D000
|
heap
|
page read and write
|
||
5C93000
|
heap
|
page read and write
|
||
2C4A000
|
heap
|
page read and write
|
||
2A3F000
|
heap
|
page read and write
|
||
61F3000
|
heap
|
page read and write
|
||
6115000
|
heap
|
page read and write
|
||
6123000
|
heap
|
page read and write
|
||
2B4D000
|
heap
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
437000
|
unkown
|
page readonly
|
||
6174000
|
heap
|
page read and write
|
||
6269000
|
heap
|
page read and write
|
||
53D4000
|
heap
|
page read and write
|
||
236D000
|
heap
|
page read and write
|
||
2B1D000
|
heap
|
page read and write
|
||
22C4000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
2371000
|
heap
|
page read and write
|
||
2C37000
|
heap
|
page read and write
|
||
2371000
|
heap
|
page read and write
|
||
546E000
|
heap
|
page read and write
|
||
37822000
|
heap
|
page read and write
|
||
22C8000
|
heap
|
page read and write
|
||
2C35000
|
heap
|
page read and write
|
||
6137000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
2981000
|
heap
|
page read and write
|
||
6115000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
4830000
|
trusted library allocation
|
page read and write
|
||
38281000
|
heap
|
page read and write
|
||
6223000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
2323000
|
heap
|
page read and write
|
||
2ACE000
|
heap
|
page read and write
|
||
2323000
|
heap
|
page read and write
|
||
22CC000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
60D1000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
28C0000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
4B51000
|
heap
|
page read and write
|
||
612E000
|
heap
|
page read and write
|
||
6100000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
ADD000
|
heap
|
page read and write
|
||
60E9000
|
heap
|
page read and write
|
||
4C58000
|
heap
|
page read and write
|
||
61CD000
|
heap
|
page read and write
|
||
4B76000
|
heap
|
page read and write
|
||
22DD000
|
heap
|
page read and write
|
||
2BEC000
|
heap
|
page read and write
|
||
2A8C000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
5458000
|
heap
|
page read and write
|
||
B9E000
|
heap
|
page read and write
|
||
22DE000
|
heap
|
page read and write
|
||
22C7000
|
heap
|
page read and write
|
||
61B0000
|
heap
|
page read and write
|
||
5070000
|
heap
|
page read and write
|
||
60F9000
|
heap
|
page read and write
|
||
3260000
|
direct allocation
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
60FA000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2C48000
|
heap
|
page read and write
|
||
609B000
|
heap
|
page read and write
|
||
AD5000
|
heap
|
page read and write
|
||
2329000
|
heap
|
page read and write
|
||
2C40000
|
heap
|
page read and write
|
||
60EE000
|
heap
|
page read and write
|
||
7863000
|
direct allocation
|
page execute and read and write
|
||
2371000
|
heap
|
page read and write
|
||
2B53000
|
heap
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
6269000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
6137000
|
heap
|
page read and write
|
||
28C2000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
6130000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
22D8000
|
heap
|
page read and write
|
||
6249000
|
heap
|
page read and write
|
||
2B2A000
|
heap
|
page read and write
|
||
2B2E000
|
heap
|
page read and write
|
||
6167000
|
heap
|
page read and write
|
||
5452000
|
heap
|
page read and write
|
||
61BC000
|
heap
|
page read and write
|
||
6115000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
627E000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
5467000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
22BC000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
613A000
|
heap
|
page read and write
|
||
6137000
|
heap
|
page read and write
|
||
61F3000
|
heap
|
page read and write
|
||
2362000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
53AA000
|
heap
|
page read and write
|
||
2B2E000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
22C8000
|
heap
|
page read and write
|
||
73F7000
|
heap
|
page read and write
|
||
4C1F000
|
heap
|
page read and write
|
||
6100000
|
heap
|
page read and write
|
||
543E000
|
heap
|
page read and write
|
||
53CA000
|
heap
|
page read and write
|
||
6121000
|
heap
|
page read and write
|
||
6174000
|
heap
|
page read and write
|
||
23AB000
|
heap
|
page read and write
|
||
2375000
|
heap
|
page read and write
|
||
437E000
|
stack
|
page read and write
|
||
2361000
|
heap
|
page read and write
|
||
53F5000
|
heap
|
page read and write
|
||
53F3000
|
heap
|
page read and write
|
||
53B2000
|
heap
|
page read and write
|
||
2730000
|
heap
|
page read and write
|
||
57E000
|
stack
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
5CAB000
|
heap
|
page read and write
|
||
5398000
|
heap
|
page read and write
|
||
2B2A000
|
heap
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
61E2000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
60F9000
|
heap
|
page read and write
|
||
23AA000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
546A000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
612E000
|
heap
|
page read and write
|
||
2B59000
|
heap
|
page read and write
|
||
22C9000
|
heap
|
page read and write
|
||
2A5D000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
236D000
|
heap
|
page read and write
|
||
53BF000
|
heap
|
page read and write
|
||
524000
|
heap
|
page read and write
|
||
AFC000
|
heap
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
524000
|
heap
|
page read and write
|
||
60FD000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
5457000
|
heap
|
page read and write
|
||
38A75000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
61D0000
|
heap
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
6225000
|
heap
|
page read and write
|
||
61E2000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2333000
|
heap
|
page read and write
|
||
546B000
|
heap
|
page read and write
|
||
22D5000
|
heap
|
page read and write
|
||
61D0000
|
heap
|
page read and write
|
||
22C9000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
38280000
|
heap
|
page read and write
|
||
6133000
|
heap
|
page read and write
|
||
4830000
|
trusted library allocation
|
page read and write
|
||
6137000
|
heap
|
page read and write
|
||
6115000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
2B9B000
|
heap
|
page read and write
|
||
2A50000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
B9D000
|
heap
|
page read and write
|
||
22C9000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
6153000
|
heap
|
page read and write
|
||
61C6000
|
heap
|
page read and write
|
||
4C10000
|
heap
|
page read and write
|
||
2B0D000
|
heap
|
page read and write
|
||
2B2B000
|
heap
|
page read and write
|
||
237D000
|
heap
|
page read and write
|
||
60EC000
|
heap
|
page read and write
|
||
2C35000
|
heap
|
page read and write
|
||
611F000
|
heap
|
page read and write
|
||
60D4000
|
heap
|
page read and write
|
||
2366000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
5457000
|
heap
|
page read and write
|
||
612C000
|
heap
|
page read and write
|
||
61A4000
|
heap
|
page read and write
|
||
2B08000
|
heap
|
page read and write
|
||
611F000
|
heap
|
page read and write
|
||
2371000
|
heap
|
page read and write
|
||
4B4F000
|
stack
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
790000
|
heap
|
page read and write
|
||
741B000
|
heap
|
page read and write
|
||
5CA3000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
4C39000
|
heap
|
page read and write
|
||
612E000
|
heap
|
page read and write
|
||
4B56000
|
heap
|
page read and write
|
||
61A3000
|
heap
|
page read and write
|
||
2791000
|
heap
|
page read and write
|
||
237D000
|
heap
|
page read and write
|
||
38AB1000
|
heap
|
page read and write
|
||
2323000
|
heap
|
page read and write
|
||
53E7000
|
heap
|
page read and write
|
||
72F000
|
stack
|
page read and write
|
||
4C4C000
|
heap
|
page read and write
|
||
6131000
|
heap
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
6167000
|
heap
|
page read and write
|
||
60EE000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
45C000
|
system
|
page execute and read and write
|
||
60E9000
|
heap
|
page read and write
|
||
74A1000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
2323000
|
heap
|
page read and write
|
||
4440000
|
heap
|
page read and write
|
||
61A3000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
2C4B000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
53BF000
|
heap
|
page read and write
|
||
4DE000
|
stack
|
page read and write
|
||
524000
|
heap
|
page read and write
|
||
2340000
|
heap
|
page read and write
|
||
2445000
|
heap
|
page read and write
|
||
4B8A000
|
heap
|
page read and write
|
||
2B9B000
|
heap
|
page read and write
|
||
546A000
|
heap
|
page read and write
|
||
622D000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
6223000
|
heap
|
page read and write
|
||
32A0000
|
direct allocation
|
page read and write
|
||
22BF000
|
heap
|
page read and write
|
||
524000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
22D0000
|
heap
|
page read and write
|
||
6131000
|
heap
|
page read and write
|
||
2362000
|
heap
|
page read and write
|
||
2C4B000
|
heap
|
page read and write
|
||
742C000
|
heap
|
page read and write
|
||
5383000
|
heap
|
page read and write
|
||
2B53000
|
heap
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
2B8A000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
237D000
|
heap
|
page read and write
|
||
22C1000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
544C000
|
heap
|
page read and write
|
||
5CA5000
|
heap
|
page read and write
|
||
60F7000
|
heap
|
page read and write
|
||
456000
|
system
|
page execute and read and write
|
||
5CA5000
|
heap
|
page read and write
|
||
C5C000
|
heap
|
page read and write
|
||
6157000
|
heap
|
page read and write
|
||
5372000
|
heap
|
page read and write
|
||
524000
|
heap
|
page read and write
|
||
60E6000
|
heap
|
page read and write
|
||
2361000
|
heap
|
page read and write
|
||
4C02000
|
heap
|
page read and write
|
||
60F6000
|
heap
|
page read and write
|
||
22CD000
|
heap
|
page read and write
|
||
610A000
|
heap
|
page read and write
|
||
2C48000
|
heap
|
page read and write
|
||
611F000
|
heap
|
page read and write
|
||
525000
|
heap
|
page read and write
|
||
9CD000
|
stack
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
22C7000
|
heap
|
page read and write
|
||
6133000
|
heap
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
6121000
|
heap
|
page read and write
|
||
4BFF000
|
heap
|
page read and write
|
||
230A000
|
heap
|
page read and write
|
||
B9E000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
2364000
|
heap
|
page read and write
|
||
53C6000
|
heap
|
page read and write
|
||
544F000
|
heap
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
22CF000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
2B1C000
|
heap
|
page read and write
|
||
ADA000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
22E4000
|
heap
|
page read and write
|
||
25EF000
|
stack
|
page read and write
|
||
60F7000
|
heap
|
page read and write
|
||
2378000
|
heap
|
page read and write
|
||
437000
|
unkown
|
page readonly
|
||
740F000
|
heap
|
page read and write
|
||
53C6000
|
heap
|
page read and write
|
||
2C63000
|
heap
|
page read and write
|
||
7485000
|
heap
|
page read and write
|
||
2AC1000
|
heap
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
2F89000
|
heap
|
page read and write
|
||
60F9000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
4B5D000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
7474000
|
heap
|
page read and write
|
||
237D000
|
heap
|
page read and write
|
||
5455000
|
heap
|
page read and write
|
||
545E000
|
heap
|
page read and write
|
||
22C8000
|
heap
|
page read and write
|
||
2AC4000
|
heap
|
page read and write
|
||
37A98000
|
heap
|
page read and write
|
||
22D5000
|
heap
|
page read and write
|
||
5452000
|
heap
|
page read and write
|
||
236C000
|
heap
|
page read and write
|
||
4C58000
|
heap
|
page read and write
|
||
541D000
|
heap
|
page read and write
|
||
612D000
|
heap
|
page read and write
|
||
525000
|
heap
|
page read and write
|
||
4B5B000
|
heap
|
page read and write
|
||
612C000
|
heap
|
page read and write
|
||
437000
|
unkown
|
page readonly
|
||
2C48000
|
heap
|
page read and write
|
||
4C67000
|
heap
|
page read and write
|
||
6129000
|
heap
|
page read and write
|
||
4B74000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
5455000
|
heap
|
page read and write
|
||
6234000
|
heap
|
page read and write
|
||
612C000
|
heap
|
page read and write
|
||
2A31000
|
heap
|
page read and write
|
||
2C63000
|
heap
|
page read and write
|
||
22C5000
|
heap
|
page read and write
|
||
177000
|
stack
|
page read and write
|
||
53F5000
|
heap
|
page read and write
|
||
6130000
|
heap
|
page read and write
|
||
6FF2D000
|
unkown
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
6182000
|
heap
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
2C48000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
2B2E000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
5C90000
|
heap
|
page read and write
|
||
546D000
|
heap
|
page read and write
|
||
5452000
|
heap
|
page read and write
|
||
2B21000
|
heap
|
page read and write
|
||
5467000
|
heap
|
page read and write
|
||
611E000
|
heap
|
page read and write
|
There are 2473 hidden memdumps, click here to show them.