Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000332001\c0968d0b44.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000332001\da8dfab19c.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000333001\634af23a05.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000333001\7d57c960f4.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 3 00:27:15 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 3 00:27:14 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 3 00:27:14 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 3 00:27:14 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 3 00:27:14 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Windows\Tasks\skotes.job
|
data
|
dropped
|
||
Chrome Cache Entry: 93
|
ASCII text, with very long lines (553)
|
downloaded
|
||
Chrome Cache Entry: 94
|
ASCII text, with very long lines (533)
|
downloaded
|
||
Chrome Cache Entry: 95
|
ASCII text, with very long lines (5693)
|
downloaded
|
||
Chrome Cache Entry: 96
|
Web Open Font Format (Version 2), TrueType, length 52280, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 97
|
ASCII text, with very long lines (1052)
|
downloaded
|
||
Chrome Cache Entry: 98
|
ASCII text, with no line terminators
|
downloaded
|
There are 12 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
||
C:\Users\user\AppData\Local\Temp\1000332001\c0968d0b44.exe
|
"C:\Users\user\AppData\Local\Temp\1000332001\c0968d0b44.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM opera.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM brave.exe /T
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd"
--start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1912,i,10956692214313634026,6000861696528189421,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\1000333001\7d57c960f4.exe
|
"C:\Users\user\AppData\Local\Temp\1000333001\7d57c960f4.exe"
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000332001\c0968d0b44.exe
|
"C:\Users\user\AppData\Local\Temp\1000332001\c0968d0b44.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM opera.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM brave.exe /T
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd"
--start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=1948,i,592972262324258279,17265959936427429495,262144
/prefetch:8
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM opera.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM brave.exe /T
|
||
C:\Users\user\AppData\Local\Temp\1000333001\7d57c960f4.exe
|
"C:\Users\user\AppData\Local\Temp\1000333001\7d57c960f4.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd"
--start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2188 --field-trial-handle=2008,i,5070483553180137210,3664771771658724366,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\1000332001\c0968d0b44.exe
|
"C:\Users\user\AppData\Local\Temp\1000332001\c0968d0b44.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM opera.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM brave.exe /T
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd"
--start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2020 --field-trial-handle=1932,i,3992076036556009603,15202519978378107295,262144
/prefetch:8
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM opera.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM brave.exe /T
|
||
C:\Users\user\AppData\Local\Temp\1000333001\7d57c960f4.exe
|
"C:\Users\user\AppData\Local\Temp\1000333001\7d57c960f4.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd"
--start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2060 --field-trial-handle=2012,i,8412964653088469761,193010010935408969,262144
/prefetch:8
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 60 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37/on:
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpn
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.php
|
185.215.113.43
|
||
http://185.215.113.37/TW
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpm
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpp
|
unknown
|
||
http://185.215.113.37K
|
unknown
|
||
http://185.215.113.37/v
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpy
|
unknown
|
||
http://185.215.113.37/A=&
|
unknown
|
||
http://185.215.113.37/$=
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/N=_
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpM
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpL
|
unknown
|
||
http://185.215.113.37/lU
|
unknown
|
||
http://185.215.113.37/ws
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpA
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpD
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpJ
|
unknown
|
||
http://185.215.113.37/=
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php-=
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php8
|
unknown
|
||
http://185.215.113.37/C:
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php%
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.php%$l
|
unknown
|
||
http://185.215.113.43/fae1daa8882e8f8e6b1ca72dd534db057eb-1003xu_
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.php3001
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpncoded75
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpncoded
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpnu
|
unknown
|
||
http://185.215.113.103/steam/random.exe
|
185.215.113.103
|
||
http://185.215.113.103/well/random.exeencoded
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.php38c2817dba29a4b5b25dcf02
|
unknown
|
||
http://185.215.113.103/steam/random.exeYef
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpcoded
|
unknown
|
||
http://185.215.113.43/c00b58981f4a4e1a0ce7e9f0e5ebf5de043E6
|
unknown
|
||
http://185.215.113.103/well/random.exe
|
185.215.113.103
|
||
https://apis.google.com/js/api.js
|
unknown
|
||
https://play.google.com/log?format=json&hasfast=true&authuser=0
|
216.58.206.78
|
||
https://www.google.com/favicon.ico
|
216.58.212.132
|
||
https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.php6$
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phps
|
unknown
|
||
http://185.215.113.103/well/random.exe13
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpncodedS5
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.php8s
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpded
|
unknown
|
There are 40 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
youtube-ui.l.google.com
|
142.250.185.142
|
||
www3.l.google.com
|
216.58.206.78
|
||
play.google.com
|
216.58.206.78
|
||
www.google.com
|
142.250.186.132
|
||
youtube.com
|
142.250.186.174
|
||
accounts.youtube.com
|
unknown
|
||
www.youtube.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.43
|
unknown
|
Portugal
|
||
185.215.113.37
|
unknown
|
Portugal
|
||
192.168.2.5
|
unknown
|
unknown
|
||
142.250.186.174
|
youtube.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.250.185.142
|
youtube-ui.l.google.com
|
United States
|
||
142.250.186.132
|
www.google.com
|
United States
|
||
185.215.113.103
|
unknown
|
Portugal
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
c0968d0b44.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
7d57c960f4.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
da8dfab19c.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
634af23a05.exe
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4CB0000
|
direct allocation
|
page read and write
|
||
581000
|
unkown
|
page execute and read and write
|
||
11DB000
|
heap
|
page read and write
|
||
B11000
|
unkown
|
page execute and read and write
|
||
131E000
|
heap
|
page read and write
|
||
DB1000
|
unkown
|
page execute and read and write
|
||
4BC0000
|
direct allocation
|
page read and write
|
||
581000
|
unkown
|
page execute and read and write
|
||
4F40000
|
direct allocation
|
page read and write
|
||
54A0000
|
direct allocation
|
page read and write
|
||
B11000
|
unkown
|
page execute and read and write
|
||
17DB000
|
heap
|
page read and write
|
||
B11000
|
unkown
|
page execute and read and write
|
||
5030000
|
direct allocation
|
page read and write
|
||
4810000
|
direct allocation
|
page read and write
|
||
766000
|
heap
|
page read and write
|
||
2350000
|
trusted library allocation
|
page read and write
|
||
562E000
|
stack
|
page read and write
|
||
49A0000
|
direct allocation
|
page execute and read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
1423000
|
heap
|
page read and write
|
||
4360000
|
direct allocation
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
2B10000
|
direct allocation
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
7B0000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
11BE000
|
stack
|
page read and write
|
||
150E000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
12F0000
|
direct allocation
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
5180000
|
direct allocation
|
page execute and read and write
|
||
AE4000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
E19000
|
unkown
|
page write copy
|
||
436F000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
3CAF000
|
stack
|
page read and write
|
||
12EE000
|
stack
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
4E30000
|
direct allocation
|
page execute and read and write
|
||
5011000
|
heap
|
page read and write
|
||
1CECE000
|
stack
|
page read and write
|
||
4DA0000
|
direct allocation
|
page execute and read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
EF4000
|
unkown
|
page execute and read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
1425000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
35AF000
|
stack
|
page read and write
|
||
4811000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
75F000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
1D0FE000
|
stack
|
page read and write
|
||
2F3F000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
302F000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
23A0000
|
heap
|
page read and write
|
||
4BA0000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
FF7000
|
unkown
|
page execute and read and write
|
||
122D000
|
heap
|
page read and write
|
||
89E000
|
stack
|
page read and write
|
||
2CBF000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
75F000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
12F0000
|
direct allocation
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
AFC000
|
unkown
|
page readonly
|
||
55DF000
|
stack
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
A60000
|
unkown
|
page readonly
|
||
1D97D000
|
stack
|
page read and write
|
||
42CF000
|
stack
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
10AC000
|
unkown
|
page execute and read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
3634000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
12B4000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
E6A000
|
heap
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
2E3F000
|
stack
|
page read and write
|
||
2A50000
|
direct allocation
|
page read and write
|
||
12B7000
|
heap
|
page read and write
|
||
15E4000
|
heap
|
page read and write
|
||
12B2000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
160F000
|
stack
|
page read and write
|
||
4360000
|
direct allocation
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
895000
|
unkown
|
page execute and write copy
|
||
1298000
|
heap
|
page read and write
|
||
4B90000
|
direct allocation
|
page read and write
|
||
119D000
|
unkown
|
page execute and write copy
|
||
7B4000
|
heap
|
page read and write
|
||
6302000
|
heap
|
page read and write
|
||
58E000
|
stack
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
28FF000
|
stack
|
page read and write
|
||
1432000
|
heap
|
page read and write
|
||
13DE000
|
stack
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
1D66F000
|
stack
|
page read and write
|
||
1423000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
4E30000
|
direct allocation
|
page execute and read and write
|
||
580000
|
unkown
|
page read and write
|
||
31AE000
|
stack
|
page read and write
|
||
54DE000
|
stack
|
page read and write
|
||
E50000
|
direct allocation
|
page read and write
|
||
3D81000
|
heap
|
page read and write
|
||
EF4000
|
unkown
|
page execute and read and write
|
||
3D81000
|
heap
|
page read and write
|
||
595000
|
heap
|
page read and write
|
||
50E0000
|
direct allocation
|
page execute and read and write
|
||
D6E000
|
unkown
|
page execute and read and write
|
||
15D2000
|
heap
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
13A1000
|
heap
|
page read and write
|
||
11BF000
|
stack
|
page read and write
|
||
11DB000
|
stack
|
page read and write
|
||
7FEB000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
1A0E000
|
stack
|
page read and write
|
||
929000
|
stack
|
page read and write
|
||
3EE0000
|
heap
|
page read and write
|
||
784000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
895000
|
unkown
|
page execute and read and write
|
||
2A0E000
|
stack
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
3CFF000
|
stack
|
page read and write
|
||
1D9CF000
|
stack
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
4B90000
|
direct allocation
|
page read and write
|
||
2350000
|
trusted library allocation
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
766000
|
heap
|
page read and write
|
||
31BF000
|
stack
|
page read and write
|
||
4CA0000
|
direct allocation
|
page read and write
|
||
771000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
397F000
|
stack
|
page read and write
|
||
4B80000
|
heap
|
page read and write
|
||
11CF000
|
stack
|
page read and write
|
||
1D59E000
|
stack
|
page read and write
|
||
3B94000
|
heap
|
page read and write
|
||
51B0000
|
direct allocation
|
page execute and read and write
|
||
4741000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
9AE5000
|
heap
|
page read and write
|
||
12F0000
|
direct allocation
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
343F000
|
stack
|
page read and write
|
||
7FE000
|
stack
|
page read and write
|
||
516F000
|
stack
|
page read and write
|
||
306E000
|
stack
|
page read and write
|
||
4D70000
|
direct allocation
|
page execute and read and write
|
||
2E2E000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
71C000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
4C2F000
|
stack
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
5EB000
|
unkown
|
page execute and read and write
|
||
A30000
|
unkown
|
page execute and read and write
|
||
3590000
|
trusted library allocation
|
page read and write
|
||
2E7E000
|
stack
|
page read and write
|
||
4A4F000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
5620000
|
direct allocation
|
page execute and read and write
|
||
4371000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
72C000
|
stack
|
page read and write
|
||
766000
|
heap
|
page read and write
|
||
653C000
|
stack
|
page read and write
|
||
725000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
A60000
|
unkown
|
page readonly
|
||
580000
|
unkown
|
page readonly
|
||
BCD000
|
unkown
|
page execute and read and write
|
||
758000
|
heap
|
page read and write
|
||
2B10000
|
direct allocation
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
3D3F000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
781000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
BCD000
|
unkown
|
page execute and read and write
|
||
1430000
|
heap
|
page read and write
|
||
76C000
|
heap
|
page read and write
|
||
3ABF000
|
stack
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
580000
|
unkown
|
page readonly
|
||
EF4000
|
unkown
|
page execute and read and write
|
||
4B90000
|
direct allocation
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
3C8F000
|
stack
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
494F000
|
stack
|
page read and write
|
||
45EF000
|
stack
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
4D11000
|
direct allocation
|
page read and write
|
||
E50000
|
direct allocation
|
page read and write
|
||
1BEF000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4D3C000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
BDA000
|
stack
|
page read and write
|
||
3F2E000
|
stack
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
EC1000
|
heap
|
page read and write
|
||
6120000
|
heap
|
page read and write
|
||
51A0000
|
direct allocation
|
page execute and read and write
|
||
5011000
|
heap
|
page read and write
|
||
886000
|
unkown
|
page execute and read and write
|
||
895000
|
unkown
|
page execute and read and write
|
||
1514000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
E3E000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
2A7E000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
442F000
|
stack
|
page read and write
|
||
1D50D000
|
stack
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
11CE000
|
stack
|
page read and write
|
||
1D3CD000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
4810000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
1D69F000
|
stack
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
766000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
55D000
|
stack
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
4D80000
|
direct allocation
|
page execute and read and write
|
||
4371000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
BC1000
|
unkown
|
page execute and read and write
|
||
440F000
|
stack
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
B34000
|
unkown
|
page readonly
|
||
1D6A0000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
26BC000
|
stack
|
page read and write
|
||
5000000
|
direct allocation
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
4CEE000
|
stack
|
page read and write
|
||
559D000
|
stack
|
page read and write
|
||
4FEF000
|
stack
|
page read and write
|
||
B10000
|
unkown
|
page readonly
|
||
1514000
|
heap
|
page read and write
|
||
2B0F000
|
stack
|
page read and write
|
||
4B90000
|
direct allocation
|
page read and write
|
||
2F7F000
|
stack
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
328F000
|
stack
|
page read and write
|
||
530E000
|
stack
|
page read and write
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
13BE000
|
stack
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
AFE000
|
stack
|
page read and write
|
||
46AF000
|
stack
|
page read and write
|
||
4BC0000
|
heap
|
page read and write
|
||
3EE1000
|
heap
|
page read and write
|
||
4B90000
|
direct allocation
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
4A30000
|
direct allocation
|
page execute and read and write
|
||
2DFF000
|
stack
|
page read and write
|
||
A61000
|
unkown
|
page execute read
|
||
3BAE000
|
stack
|
page read and write
|
||
5000000
|
direct allocation
|
page read and write
|
||
B22000
|
unkown
|
page readonly
|
||
50B0000
|
direct allocation
|
page execute and read and write
|
||
5011000
|
heap
|
page read and write
|
||
80EC000
|
stack
|
page read and write
|
||
3BBF000
|
stack
|
page read and write
|
||
38AF000
|
stack
|
page read and write
|
||
357F000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
38CF000
|
stack
|
page read and write
|
||
4740000
|
heap
|
page read and write
|
||
3B90000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
2BBF000
|
stack
|
page read and write
|
||
372E000
|
stack
|
page read and write
|
||
4811000
|
heap
|
page read and write
|
||
46CE000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
1664000
|
heap
|
page read and write
|
||
12F0000
|
direct allocation
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
B22000
|
unkown
|
page readonly
|
||
BDE000
|
stack
|
page read and write
|
||
38EF000
|
stack
|
page read and write
|
||
5000000
|
direct allocation
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
40FE000
|
stack
|
page read and write
|
||
6FE000
|
heap
|
page read and write
|
||
357F000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
FA4000
|
unkown
|
page execute and read and write
|
||
1006000
|
unkown
|
page execute and write copy
|
||
4371000
|
heap
|
page read and write
|
||
5030000
|
direct allocation
|
page read and write
|
||
1428000
|
heap
|
page read and write
|
||
B3D000
|
stack
|
page read and write
|
||
386E000
|
stack
|
page read and write
|
||
12B7000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
2B10000
|
direct allocation
|
page read and write
|
||
4990000
|
direct allocation
|
page execute and read and write
|
||
333E000
|
stack
|
page read and write
|
||
54A0000
|
direct allocation
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
300F000
|
stack
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
B10000
|
unkown
|
page read and write
|
||
4B90000
|
direct allocation
|
page read and write
|
||
11FE000
|
stack
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
1CFCF000
|
stack
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
4A10000
|
direct allocation
|
page execute and read and write
|
||
383E000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4E70000
|
direct allocation
|
page execute and read and write
|
||
B10000
|
unkown
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
50F0000
|
direct allocation
|
page execute and read and write
|
||
7B4000
|
heap
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
45FF000
|
stack
|
page read and write
|
||
AFC000
|
unkown
|
page readonly
|
||
FEF000
|
unkown
|
page execute and read and write
|
||
10C5000
|
unkown
|
page execute and write copy
|
||
3EAE000
|
stack
|
page read and write
|
||
447F000
|
stack
|
page read and write
|
||
2B10000
|
direct allocation
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
5000000
|
direct allocation
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
F1C000
|
heap
|
page read and write
|
||
44AF000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
293E000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
43AE000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
2350000
|
trusted library allocation
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
1D3EF000
|
stack
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
3E2E000
|
stack
|
page read and write
|
||
545D000
|
stack
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
EAA000
|
heap
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
423E000
|
stack
|
page read and write
|
||
347F000
|
stack
|
page read and write
|
||
352F000
|
stack
|
page read and write
|
||
437F000
|
stack
|
page read and write
|
||
350F000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
59E0000
|
heap
|
page read and write
|
||
1428000
|
heap
|
page read and write
|
||
EEE000
|
heap
|
page read and write
|
||
5E9000
|
unkown
|
page write copy
|
||
444E000
|
stack
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
2ABC000
|
stack
|
page read and write
|
||
1005000
|
unkown
|
page execute and write copy
|
||
32EE000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
E50000
|
direct allocation
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
3D80000
|
heap
|
page read and write
|
||
368E000
|
stack
|
page read and write
|
||
71E000
|
heap
|
page read and write
|
||
4FF0000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
6304000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
643B000
|
stack
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
4360000
|
direct allocation
|
page read and write
|
||
2A70000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
ADC000
|
stack
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
5000000
|
direct allocation
|
page read and write
|
||
3B4F000
|
stack
|
page read and write
|
||
4E10000
|
direct allocation
|
page execute and read and write
|
||
580000
|
unkown
|
page readonly
|
||
27FE000
|
stack
|
page read and write
|
||
3CEE000
|
stack
|
page read and write
|
||
462E000
|
stack
|
page read and write
|
||
2350000
|
trusted library allocation
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
1D792000
|
heap
|
page read and write
|
||
4340000
|
heap
|
page read and write
|
||
6300000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
55F0000
|
direct allocation
|
page execute and read and write
|
||
B11000
|
unkown
|
page execute and write copy
|
||
1514000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
4990000
|
direct allocation
|
page execute and read and write
|
||
1D6EE000
|
stack
|
page read and write
|
||
392E000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
B11000
|
unkown
|
page execute and write copy
|
||
4BA1000
|
heap
|
page read and write
|
||
1B4F000
|
stack
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
B2C000
|
unkown
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
771000
|
heap
|
page read and write
|
||
119D000
|
unkown
|
page execute and write copy
|
||
4371000
|
heap
|
page read and write
|
||
12A8000
|
heap
|
page read and write
|
||
3EE1000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
2C8B000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
D5A000
|
unkown
|
page execute and read and write
|
||
657E000
|
stack
|
page read and write
|
||
473E000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
119C000
|
unkown
|
page execute and read and write
|
||
935000
|
stack
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
4CA0000
|
direct allocation
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
744000
|
heap
|
page read and write
|
||
1CF7F000
|
stack
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
12C2000
|
heap
|
page read and write
|
||
12F0000
|
direct allocation
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
4360000
|
direct allocation
|
page read and write
|
||
463E000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
307F000
|
stack
|
page read and write
|
||
12AE000
|
stack
|
page read and write
|
||
E3E000
|
stack
|
page read and write
|
||
1423000
|
heap
|
page read and write
|
||
2A50000
|
direct allocation
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
757000
|
heap
|
page read and write
|
||
44BE000
|
stack
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
49F0000
|
direct allocation
|
page execute and read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
49BE000
|
stack
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
757000
|
heap
|
page read and write
|
||
3BF1000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
D97000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
4D50000
|
direct allocation
|
page execute and read and write
|
||
1DAE000
|
stack
|
page read and write
|
||
418F000
|
stack
|
page read and write
|
||
12F0000
|
direct allocation
|
page read and write
|
||
B10000
|
unkown
|
page read and write
|
||
5600000
|
direct allocation
|
page execute and read and write
|
||
D6E000
|
unkown
|
page execute and read and write
|
||
757000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
61D0000
|
heap
|
page read and write
|
||
AFC000
|
unkown
|
page readonly
|
||
390E000
|
stack
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
17CF000
|
stack
|
page read and write
|
||
4990000
|
direct allocation
|
page execute and read and write
|
||
5000000
|
direct allocation
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
2A77000
|
heap
|
page read and write
|
||
75C000
|
heap
|
page read and write
|
||
4750000
|
heap
|
page read and write
|
||
37FF000
|
stack
|
page read and write
|
||
744000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
E50000
|
direct allocation
|
page read and write
|
||
4360000
|
direct allocation
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4B90000
|
direct allocation
|
page read and write
|
||
35FE000
|
stack
|
page read and write
|
||
51C0000
|
direct allocation
|
page execute and read and write
|
||
13DB000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
2F0C000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
B34000
|
unkown
|
page readonly
|
||
2CFE000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4CA0000
|
direct allocation
|
page read and write
|
||
810F000
|
heap
|
page read and write
|
||
15D9000
|
heap
|
page read and write
|
||
35EE000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
3D6E000
|
stack
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
2B10000
|
direct allocation
|
page read and write
|
||
2A3F000
|
stack
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
184C000
|
heap
|
page read and write
|
||
766000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
12F0000
|
direct allocation
|
page read and write
|
||
4BC0000
|
trusted library allocation
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
15E3000
|
heap
|
page read and write
|
||
31FE000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
40BF000
|
stack
|
page read and write
|
||
3F4E000
|
stack
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
3A7F000
|
stack
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
5000000
|
direct allocation
|
page read and write
|
||
487E000
|
stack
|
page read and write
|
||
11FE000
|
stack
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
383E000
|
stack
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
3A6E000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
3B8E000
|
stack
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
2ECF000
|
stack
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
581000
|
unkown
|
page execute and write copy
|
||
4360000
|
direct allocation
|
page read and write
|
||
15B8000
|
heap
|
page read and write
|
||
1D42E000
|
stack
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
356E000
|
stack
|
page read and write
|
||
75F000
|
heap
|
page read and write
|
||
61C0000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
2DAF000
|
stack
|
page read and write
|
||
D5A000
|
unkown
|
page execute and read and write
|
||
5011000
|
heap
|
page read and write
|
||
B34000
|
unkown
|
page readonly
|
||
2B20000
|
heap
|
page read and write
|
||
DDE000
|
stack
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
3AFE000
|
stack
|
page read and write
|
||
41EE000
|
stack
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
1CE8F000
|
stack
|
page read and write
|
||
112F000
|
stack
|
page read and write
|
||
5EBE000
|
stack
|
page read and write
|
||
D8F000
|
stack
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
4F1E000
|
stack
|
page read and write
|
||
4E00000
|
direct allocation
|
page execute and read and write
|
||
1D2BD000
|
stack
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
3630000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
7F0F000
|
stack
|
page read and write
|
||
B2C000
|
unkown
|
page read and write
|
||
119C000
|
unkown
|
page execute and read and write
|
||
744000
|
heap
|
page read and write
|
||
DB0000
|
unkown
|
page read and write
|
||
A45000
|
heap
|
page read and write
|
||
2B7F000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
E50000
|
direct allocation
|
page read and write
|
||
4800000
|
direct allocation
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
37CE000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
B10000
|
unkown
|
page readonly
|
||
1D370000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
47CF000
|
stack
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
2350000
|
trusted library allocation
|
page read and write
|
||
4E60000
|
direct allocation
|
page execute and read and write
|
||
4371000
|
heap
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
984000
|
heap
|
page read and write
|
||
50D0000
|
direct allocation
|
page execute and read and write
|
||
1428000
|
heap
|
page read and write
|
||
33EF000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
B22000
|
unkown
|
page readonly
|
||
327F000
|
stack
|
page read and write
|
||
4D20000
|
direct allocation
|
page execute and read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
896000
|
unkown
|
page execute and write copy
|
||
A60000
|
unkown
|
page readonly
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
12F0000
|
direct allocation
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
135E000
|
stack
|
page read and write
|
||
1005000
|
unkown
|
page execute and read and write
|
||
4371000
|
heap
|
page read and write
|
||
4B90000
|
direct allocation
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
397E000
|
stack
|
page read and write
|
||
40FF000
|
stack
|
page read and write
|
||
6F2000
|
heap
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
30BF000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
333F000
|
stack
|
page read and write
|
||
4360000
|
direct allocation
|
page read and write
|
||
BC1000
|
unkown
|
page execute and read and write
|
||
4371000
|
heap
|
page read and write
|
||
4360000
|
direct allocation
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
31FF000
|
stack
|
page read and write
|
||
5000000
|
direct allocation
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
3590000
|
trusted library allocation
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
3CCE000
|
stack
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
21AF000
|
stack
|
page read and write
|
||
2E77000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
3CFF000
|
stack
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
11EF000
|
stack
|
page read and write
|
||
EA4000
|
heap
|
page read and write
|
||
40EF000
|
stack
|
page read and write
|
||
4C21000
|
direct allocation
|
page read and write
|
||
3B6F000
|
stack
|
page read and write
|
||
5020000
|
heap
|
page read and write
|
||
540F000
|
stack
|
page read and write
|
||
3D7E000
|
stack
|
page read and write
|
||
4BFC000
|
stack
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
37EE000
|
stack
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
12B3000
|
heap
|
page read and write
|
||
3BBF000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
51B0000
|
direct allocation
|
page execute and read and write
|
||
3E7E000
|
stack
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
3EE1000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
497F000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4E30000
|
direct allocation
|
page execute and read and write
|
||
757000
|
heap
|
page read and write
|
||
4CA0000
|
trusted library allocation
|
page read and write
|
||
39AE000
|
stack
|
page read and write
|
||
3367000
|
heap
|
page read and write
|
||
5D7E000
|
stack
|
page read and write
|
||
49B0000
|
direct allocation
|
page execute and read and write
|
||
4B90000
|
direct allocation
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
393F000
|
stack
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
433F000
|
stack
|
page read and write
|
||
A2E000
|
stack
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
B22000
|
unkown
|
page readonly
|
||
FEF000
|
unkown
|
page execute and read and write
|
||
5011000
|
heap
|
page read and write
|
||
D5A000
|
unkown
|
page execute and read and write
|
||
1514000
|
heap
|
page read and write
|
||
427E000
|
stack
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
12A6000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
581000
|
unkown
|
page execute and write copy
|
||
E60000
|
heap
|
page read and write
|
||
1D25E000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
3D3E000
|
stack
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
346F000
|
stack
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
107D000
|
unkown
|
page execute and read and write
|
||
87C000
|
unkown
|
page execute and read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
B34000
|
unkown
|
page readonly
|
||
1D0BF000
|
stack
|
page read and write
|
||
3FEE000
|
stack
|
page read and write
|
||
5030000
|
heap
|
page read and write
|
||
5E9000
|
unkown
|
page write copy
|
||
AFC000
|
unkown
|
page readonly
|
||
9AE5000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
5000000
|
direct allocation
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
3BF0000
|
heap
|
page read and write
|
||
15F1000
|
heap
|
page read and write
|
||
DB0000
|
unkown
|
page readonly
|
||
7B4000
|
heap
|
page read and write
|
||
3DCF000
|
stack
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
FCB000
|
unkown
|
page execute and read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
36FE000
|
stack
|
page read and write
|
||
E50000
|
direct allocation
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
36FF000
|
stack
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
383F000
|
stack
|
page read and write
|
||
AFC000
|
unkown
|
page readonly
|
||
4811000
|
heap
|
page read and write
|
||
FCB000
|
unkown
|
page execute and read and write
|
||
AE4000
|
heap
|
page read and write
|
||
3E3F000
|
stack
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
10C6000
|
unkown
|
page execute and write copy
|
||
4BA1000
|
heap
|
page read and write
|
||
1431000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
895000
|
unkown
|
page execute and write copy
|
||
41AF000
|
stack
|
page read and write
|
||
426E000
|
stack
|
page read and write
|
||
4EDB000
|
stack
|
page read and write
|
||
4360000
|
direct allocation
|
page read and write
|
||
486F000
|
stack
|
page read and write
|
||
2C87000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
3F7F000
|
stack
|
page read and write
|
||
F53000
|
heap
|
page read and write
|
||
60FF000
|
stack
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
744000
|
heap
|
page read and write
|
||
15D5000
|
heap
|
page read and write
|
||
3EE1000
|
heap
|
page read and write
|
||
45FE000
|
stack
|
page read and write
|
||
83C000
|
stack
|
page read and write
|
||
771000
|
heap
|
page read and write
|
||
5E9000
|
unkown
|
page write copy
|
||
12A5000
|
heap
|
page read and write
|
||
12F0000
|
direct allocation
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
12F0000
|
direct allocation
|
page read and write
|
||
1D56E000
|
stack
|
page read and write
|
||
4EAF000
|
stack
|
page read and write
|
||
50CE000
|
stack
|
page read and write
|
||
15EB000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
1D93D000
|
stack
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
4811000
|
heap
|
page read and write
|
||
373E000
|
stack
|
page read and write
|
||
511F000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
1CA0000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
422F000
|
stack
|
page read and write
|
||
33E0000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
direct allocation
|
page execute and read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
2B10000
|
direct allocation
|
page read and write
|
||
3E7E000
|
stack
|
page read and write
|
||
3C2E000
|
stack
|
page read and write
|
||
15EB000
|
heap
|
page read and write
|
||
A9E000
|
stack
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
4360000
|
direct allocation
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
1D35F000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
119C000
|
unkown
|
page execute and read and write
|
||
FEF000
|
unkown
|
page execute and read and write
|
||
4DB0000
|
direct allocation
|
page execute and read and write
|
||
4B90000
|
direct allocation
|
page read and write
|
||
393F000
|
stack
|
page read and write
|
||
80F0000
|
heap
|
page read and write
|
||
76C000
|
heap
|
page read and write
|
||
B10000
|
unkown
|
page readonly
|
||
4AC1000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
757000
|
heap
|
page read and write
|
||
B34000
|
unkown
|
page readonly
|
||
1D4FE000
|
stack
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
4360000
|
direct allocation
|
page read and write
|
||
4E30000
|
direct allocation
|
page execute and read and write
|
||
E50000
|
direct allocation
|
page read and write
|
||
406F000
|
stack
|
page read and write
|
||
4AB0000
|
heap
|
page read and write
|
||
44BF000
|
stack
|
page read and write
|
||
5E2000
|
unkown
|
page execute and read and write
|
||
36AE000
|
stack
|
page read and write
|
||
E19000
|
unkown
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
FCB000
|
unkown
|
page execute and read and write
|
||
1514000
|
heap
|
page read and write
|
||
473F000
|
stack
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
4E30000
|
direct allocation
|
page execute and read and write
|
||
13E0000
|
heap
|
page read and write
|
||
1419000
|
heap
|
page read and write
|
||
4AE0000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
5D35000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
34A4000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
A61000
|
unkown
|
page execute read
|
||
2CAE000
|
stack
|
page read and write
|
||
4A20000
|
direct allocation
|
page execute and read and write
|
||
AE4000
|
heap
|
page read and write
|
||
B2C000
|
unkown
|
page write copy
|
||
4AC1000
|
heap
|
page read and write
|
||
1006000
|
unkown
|
page execute and write copy
|
||
314F000
|
stack
|
page read and write
|
||
895000
|
unkown
|
page execute and write copy
|
||
3EE1000
|
heap
|
page read and write
|
||
3ABE000
|
stack
|
page read and write
|
||
896000
|
unkown
|
page execute and write copy
|
||
51BE000
|
stack
|
page read and write
|
||
1D52E000
|
stack
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
15DC000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
37FF000
|
stack
|
page read and write
|
||
1D83D000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
555D000
|
stack
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
A30000
|
unkown
|
page execute and read and write
|
||
4B8F000
|
stack
|
page read and write
|
||
5D36000
|
heap
|
page read and write
|
||
1D795000
|
heap
|
page read and write
|
||
182D000
|
heap
|
page read and write
|
||
44EE000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
DB1000
|
unkown
|
page execute and write copy
|
||
5620000
|
direct allocation
|
page execute and read and write
|
||
46FF000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
3E6F000
|
stack
|
page read and write
|
||
12B8000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
138F000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
3BF1000
|
heap
|
page read and write
|
||
4360000
|
direct allocation
|
page read and write
|
||
50A0000
|
direct allocation
|
page execute and read and write
|
||
9EE000
|
stack
|
page read and write
|
||
366F000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
B22000
|
unkown
|
page readonly
|
||
2E70000
|
heap
|
page read and write
|
||
12A2000
|
heap
|
page read and write
|
||
51D0000
|
direct allocation
|
page execute and read and write
|
||
D6E000
|
unkown
|
page execute and read and write
|
||
41FF000
|
stack
|
page read and write
|
||
581000
|
unkown
|
page execute and write copy
|
||
1664000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
44FE000
|
stack
|
page read and write
|
||
413E000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
131A000
|
heap
|
page read and write
|
||
4D6F000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
4970000
|
direct allocation
|
page execute and read and write
|
||
5011000
|
heap
|
page read and write
|
||
437E000
|
stack
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
E50000
|
direct allocation
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
119D000
|
unkown
|
page execute and write copy
|
||
40FE000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
886000
|
unkown
|
page execute and read and write
|
||
5D30000
|
heap
|
page read and write
|
||
1006000
|
unkown
|
page execute and write copy
|
||
32AF000
|
stack
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
5C53000
|
heap
|
page read and write
|
||
F48000
|
heap
|
page read and write
|
||
1D6A2000
|
heap
|
page read and write
|
||
1CFBE000
|
stack
|
page read and write
|
||
5480000
|
heap
|
page read and write
|
||
347F000
|
stack
|
page read and write
|
||
378F000
|
stack
|
page read and write
|
||
3FBF000
|
stack
|
page read and write
|
||
2D3E000
|
stack
|
page read and write
|
||
433F000
|
stack
|
page read and write
|
||
42EF000
|
stack
|
page read and write
|
||
446E000
|
stack
|
page read and write
|
||
5FFE000
|
stack
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
12F0000
|
direct allocation
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
3E3F000
|
stack
|
page read and write
|
||
75F000
|
heap
|
page read and write
|
||
15D6000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
45BF000
|
stack
|
page read and write
|
||
3BEF000
|
stack
|
page read and write
|
||
1005000
|
unkown
|
page execute and read and write
|
||
1514000
|
heap
|
page read and write
|
||
1D7EF000
|
stack
|
page read and write
|
||
4BB0000
|
heap
|
page read and write
|
||
3590000
|
trusted library allocation
|
page read and write
|
||
A60000
|
unkown
|
page readonly
|
||
7B4000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
35BE000
|
stack
|
page read and write
|
||
4760000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
3FBE000
|
stack
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
4F7E000
|
stack
|
page read and write
|
||
484E000
|
stack
|
page read and write
|
||
F9E000
|
stack
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
2B10000
|
direct allocation
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
37AF000
|
stack
|
page read and write
|
||
A61000
|
unkown
|
page execute read
|
||
5011000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
3C3E000
|
stack
|
page read and write
|
||
4D40000
|
direct allocation
|
page execute and read and write
|
||
7B4000
|
heap
|
page read and write
|
||
E12000
|
unkown
|
page execute and read and write
|
||
4A00000
|
direct allocation
|
page execute and read and write
|
||
4B90000
|
direct allocation
|
page read and write
|
||
1CF0000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
5E9000
|
unkown
|
page read and write
|
||
36EF000
|
stack
|
page read and write
|
||
12B2000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
585D000
|
stack
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
4370000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
1260000
|
unkown
|
page execute and read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
E6B000
|
heap
|
page read and write
|
||
181A000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page write copy
|
||
1A10000
|
heap
|
page read and write
|
||
36BF000
|
stack
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
B2C000
|
unkown
|
page write copy
|
||
F16000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
408E000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
40BF000
|
stack
|
page read and write
|
||
AF5000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
53C000
|
stack
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
4AEF000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
B11000
|
unkown
|
page execute and write copy
|
||
5011000
|
heap
|
page read and write
|
||
69F000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4990000
|
direct allocation
|
page execute and read and write
|
||
13E4000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
48AE000
|
stack
|
page read and write
|
||
1D66E000
|
stack
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
35BE000
|
stack
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
347E000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
569E000
|
stack
|
page read and write
|
||
423F000
|
stack
|
page read and write
|
||
4800000
|
direct allocation
|
page read and write
|
||
432E000
|
stack
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
A61000
|
unkown
|
page execute read
|
||
4AC1000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
2F7F000
|
stack
|
page read and write
|
||
4F40000
|
direct allocation
|
page read and write
|
||
404F000
|
stack
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
4AC6000
|
heap
|
page read and write
|
||
490F000
|
stack
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
4990000
|
direct allocation
|
page execute and read and write
|
||
7B4000
|
heap
|
page read and write
|
||
84D000
|
unkown
|
page execute and read and write
|
||
15EB000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
5C53000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
15EB000
|
heap
|
page read and write
|
||
472F000
|
stack
|
page read and write
|
||
5000000
|
direct allocation
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
1D76F000
|
stack
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
54A0000
|
direct allocation
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
3BFF000
|
stack
|
page read and write
|
||
1D16E000
|
stack
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
3BFE000
|
stack
|
page read and write
|
||
1358000
|
heap
|
page read and write
|
||
5610000
|
direct allocation
|
page execute and read and write
|
||
293E000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
12BF000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
54D000
|
stack
|
page read and write
|
||
476E000
|
stack
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
47F0000
|
heap
|
page read and write
|
||
FF7000
|
unkown
|
page execute and read and write
|
||
5011000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
412E000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
1363000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
729000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
382F000
|
stack
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
AFC000
|
unkown
|
page readonly
|
||
E50000
|
direct allocation
|
page read and write
|
||
5110000
|
trusted library allocation
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
4990000
|
direct allocation
|
page execute and read and write
|
||
3AAF000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
580000
|
unkown
|
page readonly
|
||
4371000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
36FE000
|
stack
|
page read and write
|
||
3A0F000
|
stack
|
page read and write
|
||
1DA7C000
|
stack
|
page read and write
|
||
4385000
|
heap
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
E50000
|
direct allocation
|
page read and write
|
||
5000000
|
direct allocation
|
page read and write
|
||
A61000
|
unkown
|
page execute read
|
||
4CFF000
|
stack
|
page read and write
|
||
4470000
|
trusted library allocation
|
page read and write
|
||
5E7F000
|
stack
|
page read and write
|
||
13CE000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
4371000
|
heap
|
page read and write
|
||
2CFF000
|
stack
|
page read and write
|
||
122F000
|
stack
|
page read and write
|
||
5FBF000
|
stack
|
page read and write
|
||
2B6E000
|
stack
|
page read and write
|
||
1243000
|
heap
|
page read and write
|
||
153F000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
143C000
|
stack
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
4390000
|
heap
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
2B10000
|
direct allocation
|
page read and write
|
||
580000
|
unkown
|
page read and write
|
||
12F0000
|
direct allocation
|
page read and write
|
||
3ABE000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
774000
|
unkown
|
page execute and read and write
|
||
4741000
|
heap
|
page read and write
|
||
51E0000
|
direct allocation
|
page execute and read and write
|
||
2BFE000
|
stack
|
page read and write
|
||
49E0000
|
direct allocation
|
page execute and read and write
|
||
AE4000
|
heap
|
page read and write
|
||
FF7000
|
unkown
|
page execute and read and write
|
||
9F0000
|
heap
|
page read and write
|
||
B34000
|
unkown
|
page readonly
|
||
4F40000
|
direct allocation
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
423E000
|
stack
|
page read and write
|
||
71D000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
61D0000
|
heap
|
page read and write
|
||
2350000
|
trusted library allocation
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
3EE1000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
4DC0000
|
direct allocation
|
page execute and read and write
|
||
5011000
|
heap
|
page read and write
|
||
4EEE000
|
stack
|
page read and write
|
||
49EE000
|
stack
|
page read and write
|
||
3590000
|
trusted library allocation
|
page read and write
|
||
480E000
|
stack
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
50C0000
|
direct allocation
|
page execute and read and write
|
||
3A3F000
|
stack
|
page read and write
|
||
E50000
|
direct allocation
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
3F6E000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
87C000
|
unkown
|
page execute and read and write
|
||
1310000
|
heap
|
page read and write
|
||
1D8CE000
|
stack
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
331F000
|
stack
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
1431000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
5190000
|
direct allocation
|
page execute and read and write
|
||
1218000
|
heap
|
page read and write
|
||
A61000
|
unkown
|
page execute read
|
||
1664000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
3E0E000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
5630000
|
direct allocation
|
page execute and read and write
|
||
3D81000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
61CE000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
4E50000
|
direct allocation
|
page execute and read and write
|
||
984000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
B22000
|
unkown
|
page readonly
|
||
1288000
|
heap
|
page read and write
|
||
4910000
|
trusted library allocation
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
2E7B000
|
heap
|
page read and write
|
||
337F000
|
stack
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
12A5000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4BB5000
|
heap
|
page read and write
|
||
32FF000
|
stack
|
page read and write
|
||
1D10E000
|
stack
|
page read and write
|
||
771000
|
heap
|
page read and write
|
||
10B6000
|
unkown
|
page execute and read and write
|
||
5000000
|
direct allocation
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
3E7F000
|
stack
|
page read and write
|
||
E50000
|
direct allocation
|
page read and write
|
||
49AF000
|
stack
|
page read and write
|
||
11EF000
|
stack
|
page read and write
|
||
4811000
|
heap
|
page read and write
|
||
4ED0000
|
direct allocation
|
page execute and read and write
|
||
4371000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
17D0000
|
heap
|
page read and write
|
||
2B10000
|
direct allocation
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
15D8000
|
heap
|
page read and write
|
||
1431000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
4380000
|
heap
|
page read and write
|
||
1005000
|
unkown
|
page execute and read and write
|
||
3FFE000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
4871000
|
direct allocation
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
15B0000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
1005000
|
unkown
|
page execute and write copy
|
||
47EF000
|
stack
|
page read and write
|
||
771000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
3EE1000
|
heap
|
page read and write
|
||
2350000
|
trusted library allocation
|
page read and write
|
||
35BF000
|
stack
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
506E000
|
stack
|
page read and write
|
||
33E0000
|
trusted library allocation
|
page read and write
|
||
B2C000
|
unkown
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4960000
|
direct allocation
|
page execute and read and write
|
||
9A0000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4B2E000
|
stack
|
page read and write
|
||
4E30000
|
direct allocation
|
page execute and read and write
|
||
5011000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
15CF000
|
heap
|
page read and write
|
||
342E000
|
stack
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
581000
|
unkown
|
page execute and write copy
|
||
2B10000
|
direct allocation
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
41CD000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
396F000
|
stack
|
page read and write
|
||
BF2000
|
unkown
|
page execute and read and write
|
||
501F000
|
stack
|
page read and write
|
||
84D000
|
unkown
|
page execute and read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
4A8E000
|
stack
|
page read and write
|
||
2B10000
|
direct allocation
|
page read and write
|
||
4DAE000
|
stack
|
page read and write
|
||
4AC0000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
3A4E000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
45C000
|
stack
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
3D81000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
763000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
456F000
|
stack
|
page read and write
|
||
BF2000
|
unkown
|
page execute and read and write
|
||
4EC0000
|
direct allocation
|
page execute and read and write
|
||
5011000
|
heap
|
page read and write
|
||
A60000
|
unkown
|
page readonly
|
||
4AC1000
|
heap
|
page read and write
|
||
129F000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
1D3FE000
|
stack
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
EDC000
|
heap
|
page read and write
|
||
BF2000
|
unkown
|
page execute and read and write
|
||
1514000
|
heap
|
page read and write
|
||
15E2000
|
heap
|
page read and write
|
||
12F0000
|
direct allocation
|
page read and write
|
||
2C6F000
|
stack
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
61C1000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
15F0000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4DEF000
|
stack
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
3FBE000
|
stack
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
12B2000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
3D81000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
4980000
|
direct allocation
|
page execute and read and write
|
||
4371000
|
heap
|
page read and write
|
||
771000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4EA0000
|
direct allocation
|
page execute and read and write
|
||
135E000
|
heap
|
page read and write
|
||
1413000
|
heap
|
page read and write
|
||
34A0000
|
heap
|
page read and write
|
||
317F000
|
stack
|
page read and write
|
||
12AA000
|
heap
|
page read and write
|
||
6AA000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
15A0000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
36BF000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
34BE000
|
stack
|
page read and write
|
||
3D2F000
|
stack
|
page read and write
|
||
2A3F000
|
stack
|
page read and write
|
||
2350000
|
trusted library allocation
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page write copy
|
||
5EB000
|
unkown
|
page execute and read and write
|
||
3A2F000
|
stack
|
page read and write
|
||
4AB4000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
335C000
|
stack
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
3EE1000
|
heap
|
page read and write
|
||
141A000
|
heap
|
page read and write
|
||
16CE000
|
stack
|
page read and write
|
||
4DD0000
|
direct allocation
|
page execute and read and write
|
||
BC1000
|
unkown
|
page execute and read and write
|
||
4371000
|
heap
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
507F000
|
stack
|
page read and write
|
||
2A50000
|
direct allocation
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
4B90000
|
direct allocation
|
page read and write
|
||
B8E000
|
stack
|
page read and write
|
||
43BE000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
40AE000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
28FE000
|
stack
|
page read and write
|
||
4D90000
|
direct allocation
|
page execute and read and write
|
||
5000000
|
direct allocation
|
page read and write
|
||
1D4CD000
|
stack
|
page read and write
|
||
1660000
|
heap
|
page read and write
|
||
5010000
|
heap
|
page read and write
|
||
6EF000
|
heap
|
page read and write
|
||
3EBE000
|
stack
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
468F000
|
stack
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
494E000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
5E2000
|
unkown
|
page execute and read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4840000
|
trusted library allocation
|
page read and write
|
||
4800000
|
direct allocation
|
page read and write
|
||
3F7F000
|
stack
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
4AD0000
|
heap
|
page read and write
|
||
41FF000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
766000
|
heap
|
page read and write
|
||
190E000
|
stack
|
page read and write
|
||
B30000
|
unkown
|
page write copy
|
||
5000000
|
direct allocation
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
3D3E000
|
stack
|
page read and write
|
||
575D000
|
stack
|
page read and write
|
||
F18000
|
heap
|
page read and write
|
||
33CF000
|
stack
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
5030000
|
direct allocation
|
page read and write
|
||
1D3BC000
|
stack
|
page read and write
|
||
4E90000
|
direct allocation
|
page execute and read and write
|
||
5640000
|
direct allocation
|
page execute and read and write
|
||
A60000
|
unkown
|
page readonly
|
||
387E000
|
stack
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
E6E000
|
heap
|
page read and write
|
||
1005000
|
unkown
|
page execute and write copy
|
||
4371000
|
heap
|
page read and write
|
||
4D60000
|
direct allocation
|
page execute and read and write
|
||
4741000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
3EE1000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
3BFE000
|
stack
|
page read and write
|
||
E1B000
|
unkown
|
page execute and read and write
|
||
50C0000
|
direct allocation
|
page execute and read and write
|
||
13F0000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
3FAF000
|
stack
|
page read and write
|
||
4D10000
|
direct allocation
|
page execute and read and write
|
||
458E000
|
stack
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
2350000
|
trusted library allocation
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
781000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
15DA000
|
heap
|
page read and write
|
||
11DB000
|
stack
|
page read and write
|
||
6AE000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
354E000
|
stack
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
D8D000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
3F0F000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4ABF000
|
stack
|
page read and write
|
||
5E9000
|
unkown
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
45AE000
|
stack
|
page read and write
|
||
4B90000
|
direct allocation
|
page read and write
|
||
BCD000
|
unkown
|
page execute and read and write
|
||
7B4000
|
heap
|
page read and write
|
||
3BF1000
|
heap
|
page read and write
|
||
3AEE000
|
stack
|
page read and write
|
||
46EE000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
2B10000
|
direct allocation
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
C8E000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
12B2000
|
heap
|
page read and write
|
||
3DEF000
|
stack
|
page read and write
|
||
364F000
|
stack
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
2BBE000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
5E9000
|
unkown
|
page write copy
|
||
13FE000
|
stack
|
page read and write
|
||
4B90000
|
direct allocation
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
5650000
|
direct allocation
|
page execute and read and write
|
||
895000
|
unkown
|
page execute and write copy
|
||
1664000
|
heap
|
page read and write
|
||
2350000
|
trusted library allocation
|
page read and write
|
||
E50000
|
direct allocation
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
BE5000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
39BE000
|
stack
|
page read and write
|
||
2D8F000
|
stack
|
page read and write
|
||
2EEF000
|
stack
|
page read and write
|
||
34AE000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
321E000
|
stack
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
13EF000
|
stack
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
149F000
|
stack
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
766000
|
heap
|
page read and write
|
||
4360000
|
direct allocation
|
page read and write
|
||
10C5000
|
unkown
|
page execute and read and write
|
||
5011000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
307F000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
27BF000
|
stack
|
page read and write
|
||
3EE1000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
4747000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
430E000
|
stack
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
1580000
|
heap
|
page read and write
|
||
4C6E000
|
stack
|
page read and write
|
||
1D790000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
3EE1000
|
heap
|
page read and write
|
||
1535000
|
stack
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
4360000
|
direct allocation
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
2B10000
|
direct allocation
|
page read and write
|
||
1377000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
CDA000
|
stack
|
page read and write
|
||
1D00E000
|
stack
|
page read and write
|
||
E50000
|
direct allocation
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
49C0000
|
direct allocation
|
page execute and read and write
|
||
454F000
|
stack
|
page read and write
|
||
49D0000
|
direct allocation
|
page execute and read and write
|
||
4811000
|
heap
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
316F000
|
stack
|
page read and write
|
||
2B10000
|
direct allocation
|
page read and write
|
||
15EB000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
483F000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
1D26F000
|
stack
|
page read and write
|
||
1D1FF000
|
stack
|
page read and write
|
||
774000
|
unkown
|
page execute and read and write
|
||
1D60C000
|
stack
|
page read and write
|
||
B2C000
|
unkown
|
page write copy
|
||
1514000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
12F0000
|
direct allocation
|
page read and write
|
||
15D3000
|
heap
|
page read and write
|
||
397E000
|
stack
|
page read and write
|
||
3A7F000
|
stack
|
page read and write
|
||
13F8000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
5090000
|
direct allocation
|
page execute and read and write
|
||
336B000
|
heap
|
page read and write
|
There are 1744 hidden memdumps, click here to show them.