Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
5.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_c11fc434b2ae51c730bfcbd95eaf71498a857ba_7522e4b5_0fb7ab75-edfc-41bf-a9b9-14de17a46d00\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_c11fc434b2ae51c730bfcbd95eaf71498a857ba_7522e4b5_42576753-4178-4839-8eac-13ee23643e2c\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_f48ee1d79ba125ec73679e59d0b16d42546ec4d_7522e4b5_256b9362-2db3-403a-a4b5-8296c3b6906c\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_f48ee1d79ba125ec73679e59d0b16d42546ec4d_7522e4b5_8974e0c5-0254-4f14-aaad-496eda389701\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1D36.tmp.dmp
|
Mini DuMP crash report, 14 streams, Thu Oct 3 01:33:59 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1E6F.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1E8F.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8904.tmp.dmp
|
Mini DuMP crash report, 14 streams, Thu Oct 3 01:33:22 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8A9B.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8D0D.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF422.tmp.dmp
|
Mini DuMP crash report, 14 streams, Thu Oct 3 01:33:49 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF5AA.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF637.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF6E1.tmp.dmp
|
Mini DuMP crash report, 14 streams, Thu Oct 3 01:33:50 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF934.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF954.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Desktop\rundll32.txt
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 9 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\5.dll"
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\5.dll,TMethodImplementationIntercept
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\5.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\5.dll,__dbk_fcall_wrapper
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\5.dll,azo06olt3gs7uifwf18b8
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\5.dll",TMethodImplementationIntercept
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\5.dll",__dbk_fcall_wrapper
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\5.dll",azo06olt3gs7uifwf18b8
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\5.dll",dbkFCallWrapperAddr
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\5.dll",#1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7432 -s 704
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7972 -s 712
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 8004 -s 696
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7396 -s 696
|
There are 5 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://pastebin.com/raw/hQqNRrQt
|
104.20.3.235
|
||
https://pastebin.com/raw/ZELZp1Yr
|
104.20.3.235
|
||
https://pastebin.com/raw/ZELZp1YrHu
|
unknown
|
||
https://setember2024inf2.is-a-nurse.com:5002/02
|
unknown
|
||
https://pastebin.com/_
|
unknown
|
||
http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf
|
unknown
|
||
https://pastebin.com/raw/hQqNRrQtHu
|
unknown
|
||
https://pastebin.com/raw/ZELZp1YrI%
|
unknown
|
||
http://tools.ietf.org/html/rfc1321
|
unknown
|
||
http://www.schneier.com/paper-blowfish-fse.htmlS
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://pastebin.com/5
|
unknown
|
||
http://csrc.nist.gov/publications/drafts/800-67-rev1/SP-800-67-rev1-2_July-2011.pdfS
|
unknown
|
||
https://pastebin.com/raw/ZELZp1YrQu
|
unknown
|
||
https://setember2024inf2.is-a-nurse.com:50K5
|
unknown
|
||
http://www.indyproject.org/
|
unknown
|
||
https://pastebin.com/raw/ZELZp1Yrrt
|
unknown
|
||
https://setember2024inf2.is-a-nurse.com:50
|
unknown
|
||
http://tools.ietf.org/html/rfc4648S
|
unknown
|
||
https://pastebin.com/5_
|
unknown
|
||
https://pastebin.com//
|
unknown
|
||
http://www.itl.nist.gov/fipspubs/fip180-1.htm
|
unknown
|
||
https://pastebin.com/5$
|
unknown
|
||
http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdfS
|
unknown
|
||
https://pastebin.com/5e
|
unknown
|
||
https://pastebin.com/i
|
unknown
|
||
http://www.movable-type.co.uk/scripts/xxtea.pdfS
|
unknown
|
||
http://www.schneier.com/paper-twofish-paper.pdfS
|
unknown
|
||
https://pastebin.com/raw/ZELZp1YrEM$-
|
unknown
|
||
http://csrc.nist.gov/publications/drafts/fips180-4/Draft-FIPS180-4_Feb2011.pdfU
|
unknown
|
||
https://pastebin.com/X
|
unknown
|
||
https://pastebin.com/V
|
unknown
|
||
http://www.componentace.com
|
unknown
|
||
https://pastebin.com/
|
unknown
|
||
https://pastebin.com/raw/ZELZp1Yrl
|
unknown
|
||
https://pastebin.com/raw/hQqNRrQt:u
|
unknown
|
||
https://pastebin.com/raw/ZELZp1YrILE_X
|
unknown
|
||
https://pastebin.com/raw/hQqNRrQt40
|
unknown
|
||
http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdfS
|
unknown
|
||
https://pastebin.com/L
|
unknown
|
||
http://www.ietf.org/rfc/rfc3447.txtS
|
unknown
|
||
https://pastebin.com/I
|
unknown
|
There are 32 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
setember2024inf2.is-a-nurse.com
|
208.109.246.134
|
||
pastebin.com
|
104.20.3.235
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.20.3.235
|
pastebin.com
|
United States
|
||
208.109.246.134
|
setember2024inf2.is-a-nurse.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProgramId
|
||
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
FileId
|
||
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LowerCaseLongPath
|
||
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LongPathHash
|
||
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Name
|
||
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
OriginalFileName
|
||
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Publisher
|
||
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Version
|
||
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinFileVersion
|
||
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinaryType
|
||
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProductName
|
||
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProductVersion
|
||
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LinkDate
|
||
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinProductVersion
|
||
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
AppxPackageFullName
|
||
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Size
|
||
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Language
|
||
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
IsOsComponent
|
||
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018400CF081ADAB
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018400CF081ADAB
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
There are 18 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
66DB000
|
direct allocation
|
page read and write
|
||
6490000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
4801000
|
unkown
|
page execute read
|
||
3240000
|
trusted library allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6824000
|
direct allocation
|
page read and write
|
||
6324000
|
direct allocation
|
page read and write
|
||
6997000
|
heap
|
page read and write
|
||
646B000
|
direct allocation
|
page read and write
|
||
3E32000
|
heap
|
page read and write
|
||
4CE8000
|
unkown
|
page read and write
|
||
6908000
|
heap
|
page read and write
|
||
6487000
|
direct allocation
|
page read and write
|
||
6671000
|
heap
|
page read and write
|
||
2BE4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
5DB8000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
4EA8000
|
unkown
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
6979000
|
heap
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
6807000
|
direct allocation
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
||
5D3F000
|
direct allocation
|
page read and write
|
||
4D24000
|
unkown
|
page execute read
|
||
2EA4000
|
heap
|
page read and write
|
||
2BE4000
|
heap
|
page read and write
|
||
6671000
|
heap
|
page read and write
|
||
5DD4000
|
direct allocation
|
page read and write
|
||
657F000
|
stack
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
5093000
|
unkown
|
page execute read
|
||
5DC6000
|
direct allocation
|
page read and write
|
||
66FF000
|
stack
|
page read and write
|
||
4823000
|
unkown
|
page write copy
|
||
30B4000
|
heap
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
4EE1000
|
unkown
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
||
6570000
|
heap
|
page read and write
|
||
692E000
|
heap
|
page read and write
|
||
482A000
|
unkown
|
page write copy
|
||
31C4000
|
heap
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
2F80000
|
direct allocation
|
page execute and read and write
|
||
676D000
|
direct allocation
|
page read and write
|
||
64A1000
|
heap
|
page read and write
|
||
5D2B000
|
direct allocation
|
page read and write
|
||
692E000
|
heap
|
page read and write
|
||
4DFB000
|
unkown
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
645E000
|
stack
|
page read and write
|
||
4E90000
|
unkown
|
page read and write
|
||
6791000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6370000
|
trusted library allocation
|
page read and write
|
||
307C000
|
stack
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
4E4E000
|
unkown
|
page read and write
|
||
68B8000
|
direct allocation
|
page read and write
|
||
639B000
|
direct allocation
|
page read and write
|
||
643D000
|
direct allocation
|
page read and write
|
||
65E1000
|
heap
|
page read and write
|
||
6671000
|
heap
|
page read and write
|
||
4CCB000
|
unkown
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6171000
|
heap
|
page read and write
|
||
2EE4000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
5AE0000
|
unkown
|
page execute read
|
||
31C0000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
2BE4000
|
heap
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
4CDC000
|
unkown
|
page write copy
|
||
68F0000
|
heap
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
||
481F000
|
unkown
|
page write copy
|
||
93A000
|
heap
|
page read and write
|
||
2EE4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
||
6A10000
|
remote allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6560000
|
heap
|
page read and write
|
||
699B000
|
heap
|
page read and write
|
||
6561000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
||
6918000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
4EE4000
|
unkown
|
page execute read
|
||
6993000
|
heap
|
page read and write
|
||
6851000
|
direct allocation
|
page read and write
|
||
324E000
|
stack
|
page read and write
|
||
67EB000
|
direct allocation
|
page read and write
|
||
2BE4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
2ABA000
|
heap
|
page read and write
|
||
639A000
|
direct allocation
|
page read and write
|
||
5CE3000
|
direct allocation
|
page read and write
|
||
3E30000
|
heap
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
8EF000
|
unkown
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
699B000
|
heap
|
page read and write
|
||
2EE4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
675F000
|
stack
|
page read and write
|
||
62A1000
|
heap
|
page read and write
|
||
335A000
|
heap
|
page read and write
|
||
697A000
|
heap
|
page read and write
|
||
62A1000
|
heap
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
683D000
|
direct allocation
|
page read and write
|
||
65D0000
|
heap
|
page read and write
|
||
4BD0000
|
unkown
|
page readonly
|
||
2EA4000
|
heap
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
2EA4000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
690C000
|
heap
|
page read and write
|
||
6561000
|
heap
|
page read and write
|
||
65E1000
|
heap
|
page read and write
|
||
2EA4000
|
heap
|
page read and write
|
||
661B000
|
direct allocation
|
page read and write
|
||
2EA4000
|
heap
|
page read and write
|
||
5D92000
|
direct allocation
|
page read and write
|
||
2AD1000
|
heap
|
page read and write
|
||
2EA4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6982000
|
heap
|
page read and write
|
||
6171000
|
heap
|
page read and write
|
||
6630000
|
direct allocation
|
page read and write
|
||
65E1000
|
heap
|
page read and write
|
||
670D000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6741000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
4931000
|
unkown
|
page execute read
|
||
50C5000
|
unkown
|
page execute read
|
||
68F5000
|
heap
|
page read and write
|
||
4E00000
|
unkown
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6798000
|
direct allocation
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
64A1000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
||
6622000
|
direct allocation
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
309C000
|
stack
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
68AA000
|
direct allocation
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
651A000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6376000
|
direct allocation
|
page read and write
|
||
690C000
|
heap
|
page read and write
|
||
2EA4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
6171000
|
heap
|
page read and write
|
||
5CC0000
|
direct allocation
|
page read and write
|
||
BC6E000
|
stack
|
page read and write
|
||
6561000
|
heap
|
page read and write
|
||
62A1000
|
heap
|
page read and write
|
||
7E7000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6660000
|
heap
|
page read and write
|
||
685A000
|
direct allocation
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
||
50AB000
|
unkown
|
page read and write
|
||
4EB3000
|
unkown
|
page readonly
|
||
627E000
|
stack
|
page read and write
|
||
6672000
|
direct allocation
|
page read and write
|
||
6842000
|
direct allocation
|
page read and write
|
||
5DDC000
|
direct allocation
|
page read and write
|
||
633B000
|
direct allocation
|
page read and write
|
||
4E54000
|
unkown
|
page execute read
|
||
2EA4000
|
heap
|
page read and write
|
||
6985000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
692E000
|
heap
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
50BE000
|
unkown
|
page write copy
|
||
4E51000
|
unkown
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
3240000
|
direct allocation
|
page execute and read and write
|
||
6810000
|
direct allocation
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
6504000
|
direct allocation
|
page read and write
|
||
4EAD000
|
unkown
|
page read and write
|
||
2EA4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6650000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
481A000
|
unkown
|
page write copy
|
||
3204000
|
heap
|
page read and write
|
||
64A0000
|
unkown
|
page readonly
|
||
2961000
|
heap
|
page read and write
|
||
6AD0000
|
heap
|
page read and write
|
||
6654000
|
direct allocation
|
page read and write
|
||
686D000
|
stack
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
2EE4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
5D5F000
|
direct allocation
|
page read and write
|
||
4351000
|
unkown
|
page execute read
|
||
675F000
|
direct allocation
|
page read and write
|
||
4DFA000
|
unkown
|
page write copy
|
||
2961000
|
heap
|
page read and write
|
||
6480000
|
direct allocation
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
62A1000
|
heap
|
page read and write
|
||
4CC3000
|
unkown
|
page execute read
|
||
2961000
|
heap
|
page read and write
|
||
2DDE000
|
stack
|
page read and write
|
||
3350000
|
heap
|
page read and write
|
||
64EF000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6802000
|
direct allocation
|
page read and write
|
||
6748000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2EE4000
|
heap
|
page read and write
|
||
509B000
|
unkown
|
page read and write
|
||
687F000
|
direct allocation
|
page read and write
|
||
2B6E000
|
heap
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
2E5B000
|
stack
|
page read and write
|
||
6461000
|
direct allocation
|
page read and write
|
||
6921000
|
heap
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
684B000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
2BE4000
|
heap
|
page read and write
|
||
698F000
|
heap
|
page read and write
|
||
32C0000
|
trusted library allocation
|
page read and write
|
||
2E10000
|
heap
|
page read and write
|
||
4CDE000
|
unkown
|
page read and write
|
||
63E4000
|
direct allocation
|
page read and write
|
||
6561000
|
heap
|
page read and write
|
||
6671000
|
heap
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
6906000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
64A1000
|
heap
|
page read and write
|
||
6844000
|
direct allocation
|
page read and write
|
||
66D1000
|
direct allocation
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
6979000
|
heap
|
page read and write
|
||
4EE0000
|
unkown
|
page write copy
|
||
62F2000
|
direct allocation
|
page read and write
|
||
2EA4000
|
heap
|
page read and write
|
||
5D74000
|
direct allocation
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2EE4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6334000
|
direct allocation
|
page read and write
|
||
483D000
|
unkown
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
936000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
2BE4000
|
heap
|
page read and write
|
||
6800000
|
direct allocation
|
page read and write
|
||
6436000
|
direct allocation
|
page read and write
|
||
2EE4000
|
heap
|
page read and write
|
||
2B8A000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
6444000
|
direct allocation
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
64A1000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
69AD000
|
heap
|
page read and write
|
||
682E000
|
stack
|
page read and write
|
||
2BE4000
|
heap
|
page read and write
|
||
2BE4000
|
heap
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
6906000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
6570000
|
heap
|
page read and write
|
||
663E000
|
stack
|
page read and write
|
||
69BD000
|
heap
|
page read and write
|
||
4E9A000
|
unkown
|
page write copy
|
||
630F000
|
direct allocation
|
page read and write
|
||
6171000
|
heap
|
page read and write
|
||
583F000
|
unkown
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
68A8000
|
direct allocation
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
3210000
|
heap
|
page read and write
|
||
2F9A000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6906000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
4E8B000
|
unkown
|
page read and write
|
||
6672000
|
heap
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
2E7C000
|
stack
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
7A0000
|
trusted library allocation
|
page read and write
|
||
2AEA000
|
heap
|
page read and write
|
||
525F000
|
unkown
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6521000
|
direct allocation
|
page read and write
|
||
30F1000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
692E000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
4D1E000
|
unkown
|
page read and write
|
||
6916000
|
heap
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
||
6671000
|
heap
|
page read and write
|
||
4CED000
|
unkown
|
page read and write
|
||
5D8B000
|
direct allocation
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
||
65E1000
|
heap
|
page read and write
|
||
65E0000
|
heap
|
page read and write
|
||
30F1000
|
heap
|
page read and write
|
||
50B8000
|
unkown
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
3220000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
2EE4000
|
heap
|
page read and write
|
||
691E000
|
heap
|
page read and write
|
||
3220000
|
heap
|
page read and write
|
||
6411000
|
direct allocation
|
page read and write
|
||
333A000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
4E25000
|
unkown
|
page execute read
|
||
2961000
|
heap
|
page read and write
|
||
682D000
|
direct allocation
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
50F4000
|
unkown
|
page execute read
|
||
49C1000
|
unkown
|
page execute read
|
||
5DE3000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2EA4000
|
heap
|
page read and write
|
||
BDE000
|
stack
|
page read and write
|
||
6991000
|
heap
|
page read and write
|
||
5D6D000
|
direct allocation
|
page read and write
|
||
64C2000
|
direct allocation
|
page read and write
|
||
681F000
|
direct allocation
|
page read and write
|
||
5DA8000
|
direct allocation
|
page read and write
|
||
4DFF000
|
unkown
|
page write copy
|
||
3E31000
|
heap
|
page read and write
|
||
4350000
|
unkown
|
page readonly
|
||
63C0000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2B54000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
4843000
|
unkown
|
page readonly
|
||
C1E000
|
stack
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6688000
|
direct allocation
|
page read and write
|
||
2BE4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6997000
|
heap
|
page read and write
|
||
4D20000
|
unkown
|
page write copy
|
||
2BE4000
|
heap
|
page read and write
|
||
2EE4000
|
heap
|
page read and write
|
||
63ED000
|
direct allocation
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
5710000
|
unkown
|
page execute read
|
||
3204000
|
heap
|
page read and write
|
||
482C000
|
unkown
|
page write copy
|
||
2EA4000
|
heap
|
page read and write
|
||
62EB000
|
direct allocation
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
671F000
|
stack
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6732000
|
direct allocation
|
page read and write
|
||
2BE4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
83B000
|
stack
|
page read and write
|
||
30F1000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
5D84000
|
direct allocation
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
65E1000
|
heap
|
page read and write
|
||
6368000
|
direct allocation
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
||
3270000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
6921000
|
heap
|
page read and write
|
||
62A0000
|
heap
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
4870000
|
unkown
|
page write copy
|
||
2961000
|
heap
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
6671000
|
heap
|
page read and write
|
||
2B5B000
|
stack
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2BE4000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
64A1000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
6834000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
4871000
|
unkown
|
page read and write
|
||
2EA4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
5D7D000
|
direct allocation
|
page read and write
|
||
4E9B000
|
unkown
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
2BE4000
|
heap
|
page read and write
|
||
6758000
|
direct allocation
|
page read and write
|
||
2B39000
|
heap
|
page read and write
|
||
482E000
|
unkown
|
page read and write
|
||
6A10000
|
remote allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2BE4000
|
heap
|
page read and write
|
||
4E04000
|
unkown
|
page read and write
|
||
2BE4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6342000
|
direct allocation
|
page read and write
|
||
31B0000
|
heap
|
page read and write
|
||
65E1000
|
heap
|
page read and write
|
||
6980000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
637000
|
stack
|
page read and write
|
||
6A10000
|
remote allocation
|
page read and write
|
||
29B0000
|
direct allocation
|
page execute and read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
6995000
|
heap
|
page read and write
|
||
6714000
|
direct allocation
|
page read and write
|
||
689A000
|
direct allocation
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
50AC000
|
unkown
|
page write copy
|
||
5D3B000
|
direct allocation
|
page read and write
|
||
6990000
|
heap
|
page read and write
|
||
66BF000
|
stack
|
page read and write
|
||
49C0000
|
unkown
|
page readonly
|
||
2EA4000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
67AF000
|
stack
|
page read and write
|
||
63F4000
|
direct allocation
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
62A1000
|
heap
|
page read and write
|
||
6402000
|
direct allocation
|
page read and write
|
||
6817000
|
direct allocation
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
649D000
|
direct allocation
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
62A1000
|
heap
|
page read and write
|
||
2EA4000
|
heap
|
page read and write
|
||
69E0000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6351000
|
direct allocation
|
page read and write
|
||
6300000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
66C3000
|
direct allocation
|
page read and write
|
||
2EE4000
|
heap
|
page read and write
|
||
692E000
|
heap
|
page read and write
|
||
2C7F000
|
stack
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
4CDB000
|
unkown
|
page read and write
|
||
2BE4000
|
heap
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
5CC7000
|
direct allocation
|
page read and write
|
||
2EE4000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
5D17000
|
direct allocation
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
482B000
|
unkown
|
page read and write
|
||
667F000
|
stack
|
page read and write
|
||
6561000
|
heap
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
||
6671000
|
heap
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
64AE000
|
stack
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
62A1000
|
heap
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
4E0A000
|
unkown
|
page write copy
|
||
65A0000
|
trusted library allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6370000
|
heap
|
page read and write
|
||
A48E000
|
stack
|
page read and write
|
||
303B000
|
stack
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
4E18000
|
unkown
|
page read and write
|
||
6562000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
328A000
|
heap
|
page read and write
|
||
4845000
|
unkown
|
page execute read
|
||
2CC4000
|
heap
|
page read and write
|
||
69AD000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
2EE4000
|
heap
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
4E83000
|
unkown
|
page execute read
|
||
6921000
|
heap
|
page read and write
|
||
2EA4000
|
heap
|
page read and write
|
||
2DFA000
|
heap
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
4D21000
|
unkown
|
page read and write
|
||
3240000
|
trusted library allocation
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
2BE4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2FFA000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
64A1000
|
heap
|
page read and write
|
||
6171000
|
heap
|
page read and write
|
||
2BE4000
|
heap
|
page read and write
|
||
65E1000
|
heap
|
page read and write
|
||
2BE4000
|
heap
|
page read and write
|
||
65E1000
|
heap
|
page read and write
|
||
63CF000
|
direct allocation
|
page read and write
|
||
68D0000
|
heap
|
page read and write
|
||
631D000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
4E8A000
|
unkown
|
page write copy
|
||
4EAE000
|
unkown
|
page write copy
|
||
2EA4000
|
heap
|
page read and write
|
||
6698000
|
direct allocation
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
7DB000
|
heap
|
page read and write
|
||
6681000
|
direct allocation
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
48E0000
|
heap
|
page read and write
|
||
30F1000
|
heap
|
page read and write
|
||
2EE4000
|
heap
|
page read and write
|
||
A44D000
|
stack
|
page read and write
|
||
4E50000
|
unkown
|
page write copy
|
||
3204000
|
heap
|
page read and write
|
||
665D000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6852000
|
direct allocation
|
page read and write
|
||
3D8000
|
stack
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
65E1000
|
heap
|
page read and write
|
||
2BE4000
|
heap
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6916000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6918000
|
heap
|
page read and write
|
||
2B28000
|
heap
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
570F000
|
unkown
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
30F1000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
66D0000
|
heap
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
6982000
|
heap
|
page read and write
|
||
4E9E000
|
unkown
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
64A1000
|
heap
|
page read and write
|
||
6418000
|
direct allocation
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
||
328F000
|
stack
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
6921000
|
heap
|
page read and write
|
||
2B1C000
|
heap
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6918000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
5DF1000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
690C000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
63DD000
|
direct allocation
|
page read and write
|
||
66E2000
|
direct allocation
|
page read and write
|
||
2EE4000
|
heap
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
6886000
|
direct allocation
|
page read and write
|
||
63DE000
|
stack
|
page read and write
|
||
669F000
|
direct allocation
|
page read and write
|
||
481B000
|
unkown
|
page read and write
|
||
4824000
|
unkown
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
692C000
|
heap
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
67F2000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
67DB000
|
direct allocation
|
page read and write
|
||
3011000
|
heap
|
page read and write
|
||
4813000
|
unkown
|
page execute read
|
||
64B4000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
637D000
|
direct allocation
|
page read and write
|
||
651F000
|
stack
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
2B30000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
5D50000
|
direct allocation
|
page read and write
|
||
4930000
|
unkown
|
page readonly
|
||
2961000
|
heap
|
page read and write
|
||
5D10000
|
direct allocation
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
8D0000
|
trusted library allocation
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
6766000
|
direct allocation
|
page read and write
|
||
6171000
|
heap
|
page read and write
|
||
6561000
|
heap
|
page read and write
|
||
65E1000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2A70000
|
heap
|
page read and write
|
||
6561000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
64FD000
|
direct allocation
|
page read and write
|
||
6884000
|
direct allocation
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
6987000
|
heap
|
page read and write
|
||
4E8F000
|
unkown
|
page write copy
|
||
30F1000
|
heap
|
page read and write
|
||
2B13000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
455F000
|
stack
|
page read and write
|
||
650C000
|
direct allocation
|
page read and write
|
||
64D1000
|
direct allocation
|
page read and write
|
||
6561000
|
heap
|
page read and write
|
||
2EE4000
|
heap
|
page read and write
|
||
87C000
|
stack
|
page read and write
|
||
64D8000
|
direct allocation
|
page read and write
|
||
3010000
|
heap
|
page read and write
|
||
509A000
|
unkown
|
page write copy
|
||
5D57000
|
direct allocation
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
5CE1000
|
direct allocation
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
6290000
|
unkown
|
page readonly
|
||
63B2000
|
direct allocation
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
B76E000
|
stack
|
page read and write
|
||
62A1000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
6834000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
4E93000
|
unkown
|
page write copy
|
||
664D000
|
direct allocation
|
page read and write
|
||
6986000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6774000
|
direct allocation
|
page read and write
|
||
2EE4000
|
heap
|
page read and write
|
||
2BE4000
|
heap
|
page read and write
|
||
673A000
|
direct allocation
|
page read and write
|
||
3330000
|
heap
|
page read and write
|
||
66BE000
|
stack
|
page read and write
|
||
5260000
|
unkown
|
page execute read
|
||
BC2D000
|
stack
|
page read and write
|
||
4BD1000
|
unkown
|
page execute read
|
||
692E000
|
heap
|
page read and write
|
||
4CF3000
|
unkown
|
page readonly
|
||
94B000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2E3B000
|
stack
|
page read and write
|
||
4EB2000
|
unkown
|
page read and write
|
||
68BD000
|
stack
|
page read and write
|
||
671D000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
692E000
|
heap
|
page read and write
|
||
30F1000
|
heap
|
page read and write
|
||
67ED000
|
stack
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
6921000
|
heap
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
2BE4000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
6428000
|
direct allocation
|
page read and write
|
||
678A000
|
direct allocation
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
4820000
|
unkown
|
page read and write
|
||
692E000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
64A1000
|
heap
|
page read and write
|
||
68A1000
|
direct allocation
|
page read and write
|
||
4E89000
|
unkown
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6820000
|
heap
|
page read and write
|
||
6916000
|
heap
|
page read and write
|
||
2EE4000
|
heap
|
page read and write
|
||
2CFB000
|
stack
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
4E1D000
|
unkown
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2A80000
|
heap
|
page read and write
|
||
2EE4000
|
heap
|
page read and write
|
||
50EE000
|
unkown
|
page read and write
|
||
6893000
|
direct allocation
|
page read and write
|
||
50F1000
|
unkown
|
page read and write
|
||
6999000
|
heap
|
page read and write
|
||
697B000
|
heap
|
page read and write
|
||
64A4000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
698E000
|
heap
|
page read and write
|
||
331E000
|
stack
|
page read and write
|
||
2FB000
|
stack
|
page read and write
|
||
636F000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2EE4000
|
heap
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2960000
|
trusted library allocation
|
page read and write
|
||
688C000
|
direct allocation
|
page read and write
|
||
648F000
|
direct allocation
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
58D0000
|
unkown
|
page execute read
|
||
2FB1000
|
heap
|
page read and write
|
||
486E000
|
unkown
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
2FFA000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
50A3000
|
unkown
|
page write copy
|
||
65CE000
|
stack
|
page read and write
|
||
6171000
|
heap
|
page read and write
|
||
640A000
|
direct allocation
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
4E9C000
|
unkown
|
page write copy
|
||
7E4000
|
heap
|
page read and write
|
||
7D4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
5CD6000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
4DF3000
|
unkown
|
page execute read
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
5CD3000
|
direct allocation
|
page read and write
|
||
4E94000
|
unkown
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
2BE4000
|
heap
|
page read and write
|
||
6520000
|
trusted library allocation
|
page read and write
|
||
2B0B000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6307000
|
direct allocation
|
page read and write
|
||
6384000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2EA4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2EE4000
|
heap
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2AFA000
|
heap
|
page read and write
|
||
4838000
|
unkown
|
page read and write
|
||
2EA4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
660B000
|
direct allocation
|
page read and write
|
||
7F5000
|
heap
|
page read and write
|
||
4920000
|
heap
|
page read and write
|
||
8AE000
|
stack
|
page read and write
|
||
62DB000
|
direct allocation
|
page read and write
|
||
64E8000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
677C000
|
direct allocation
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
4819000
|
unkown
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6A70000
|
heap
|
page read and write
|
||
58CF000
|
unkown
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
4CF5000
|
unkown
|
page execute read
|
||
2BE4000
|
heap
|
page read and write
|
||
2BE4000
|
heap
|
page read and write
|
||
66AD000
|
direct allocation
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
66F0000
|
direct allocation
|
page read and write
|
||
2E12000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
50C2000
|
unkown
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
3120000
|
direct allocation
|
page execute and read and write
|
||
684A000
|
direct allocation
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
||
64AD000
|
direct allocation
|
page read and write
|
||
4E22000
|
unkown
|
page read and write
|
||
6991000
|
heap
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
65E1000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6878000
|
direct allocation
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
656F000
|
stack
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
30F1000
|
heap
|
page read and write
|
||
68B1000
|
direct allocation
|
page read and write
|
||
5DCD000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2EA4000
|
heap
|
page read and write
|
||
50AE000
|
unkown
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
4900000
|
direct allocation
|
page execute and read and write
|
||
68A3000
|
direct allocation
|
page read and write
|
||
5DA1000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
683B000
|
direct allocation
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
64A0000
|
heap
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
2BE4000
|
heap
|
page read and write
|
||
2EE4000
|
heap
|
page read and write
|
||
64F0000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
688D000
|
direct allocation
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2EA4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
667A000
|
direct allocation
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
50AA000
|
unkown
|
page write copy
|
||
6561000
|
heap
|
page read and write
|
||
644C000
|
direct allocation
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
6171000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
5099000
|
unkown
|
page read and write
|
||
5D9A000
|
direct allocation
|
page read and write
|
||
6671000
|
heap
|
page read and write
|
||
2D3C000
|
stack
|
page read and write
|
||
4800000
|
unkown
|
page readonly
|
||
2961000
|
heap
|
page read and write
|
||
69BE000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
66D8000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
66F7000
|
direct allocation
|
page read and write
|
||
6921000
|
heap
|
page read and write
|
||
6868000
|
direct allocation
|
page read and write
|
||
6916000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
697F000
|
heap
|
page read and write
|
||
6770000
|
heap
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
6993000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6671000
|
heap
|
page read and write
|
||
4842000
|
unkown
|
page read and write
|
||
6861000
|
direct allocation
|
page read and write
|
||
6671000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
638C000
|
direct allocation
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
2EE4000
|
heap
|
page read and write
|
||
666B000
|
direct allocation
|
page read and write
|
||
6724000
|
direct allocation
|
page read and write
|
||
4E23000
|
unkown
|
page readonly
|
||
30D0000
|
trusted library allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
4CD3000
|
unkown
|
page write copy
|
||
3204000
|
heap
|
page read and write
|
||
4EDE000
|
unkown
|
page read and write
|
||
6513000
|
direct allocation
|
page read and write
|
||
671F000
|
stack
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
64EF000
|
stack
|
page read and write
|
||
5D09000
|
direct allocation
|
page read and write
|
||
63A8000
|
direct allocation
|
page read and write
|
||
63A1000
|
direct allocation
|
page read and write
|
||
634A000
|
direct allocation
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
66CA000
|
direct allocation
|
page read and write
|
||
2B41000
|
heap
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
690C000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
687D000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6921000
|
heap
|
page read and write
|
||
6671000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
632D000
|
direct allocation
|
page read and write
|
||
2EE4000
|
heap
|
page read and write
|
||
64CA000
|
direct allocation
|
page read and write
|
||
6868000
|
direct allocation
|
page read and write
|
||
810000
|
direct allocation
|
page execute and read and write
|
||
2961000
|
heap
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
64DE000
|
stack
|
page read and write
|
||
4E03000
|
unkown
|
page write copy
|
||
6995000
|
heap
|
page read and write
|
||
6876000
|
direct allocation
|
page read and write
|
||
7C0000
|
direct allocation
|
page execute and read and write
|
||
2E9C000
|
stack
|
page read and write
|
||
6671000
|
heap
|
page read and write
|
||
60D0000
|
unkown
|
page readonly
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
93B000
|
direct allocation
|
page read and write
|
||
50C3000
|
unkown
|
page readonly
|
||
30B0000
|
heap
|
page read and write
|
||
4CDA000
|
unkown
|
page write copy
|
||
6978000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
4CEE000
|
unkown
|
page write copy
|
||
4E0B000
|
unkown
|
page read and write
|
||
50F0000
|
unkown
|
page write copy
|
||
31C4000
|
heap
|
page read and write
|
||
66A6000
|
direct allocation
|
page read and write
|
||
5DBF000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6921000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
63C7000
|
direct allocation
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
2B2A000
|
heap
|
page read and write
|
||
4940000
|
direct allocation
|
page execute and read and write
|
||
3204000
|
heap
|
page read and write
|
||
2B19000
|
heap
|
page read and write
|
||
6171000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
4010000
|
heap
|
page read and write
|
||
689C000
|
direct allocation
|
page read and write
|
||
2EE4000
|
heap
|
page read and write
|
||
63E0000
|
heap
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
320F000
|
stack
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
||
5DEA000
|
direct allocation
|
page read and write
|
||
6358000
|
direct allocation
|
page read and write
|
||
62A1000
|
heap
|
page read and write
|
||
30F1000
|
heap
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
62A1000
|
heap
|
page read and write
|
||
4CD4000
|
unkown
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
5DF8000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
64A1000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
50A4000
|
unkown
|
page read and write
|
||
4CD0000
|
unkown
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
64A1000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
642F000
|
direct allocation
|
page read and write
|
||
6528000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
5D21000
|
direct allocation
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
5CEA000
|
direct allocation
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
2EA4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
645A000
|
direct allocation
|
page read and write
|
||
2EA4000
|
heap
|
page read and write
|
||
2B9C000
|
stack
|
page read and write
|
||
64A2000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
64BB000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
698C000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
4E0E000
|
unkown
|
page read and write
|
||
6393000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6670000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
A3CE000
|
stack
|
page read and write
|
||
2BE4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
64F6000
|
direct allocation
|
page read and write
|
||
4874000
|
unkown
|
page execute read
|
||
3204000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
497E000
|
stack
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2BE4000
|
heap
|
page read and write
|
||
4CC9000
|
unkown
|
page read and write
|
||
6200000
|
unkown
|
page readonly
|
||
6A4000
|
heap
|
page read and write
|
||
3290000
|
direct allocation
|
page execute and read and write
|
||
C30000
|
heap
|
page read and write
|
||
6453000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
4EB5000
|
unkown
|
page execute read
|
||
30B4000
|
heap
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
5C20000
|
unkown
|
page readonly
|
||
6170000
|
heap
|
page read and write
|
||
B72D000
|
stack
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
509F000
|
unkown
|
page write copy
|
||
6858000
|
direct allocation
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
6410000
|
heap
|
page read and write
|
||
66CB000
|
direct allocation
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
50BD000
|
unkown
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
3FC000
|
stack
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
30F1000
|
heap
|
page read and write
|
||
6908000
|
heap
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
A40F000
|
stack
|
page read and write
|
||
686F000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6908000
|
heap
|
page read and write
|
||
4CCA000
|
unkown
|
page write copy
|
||
4E0C000
|
unkown
|
page write copy
|
||
2961000
|
heap
|
page read and write
|
||
7DF000
|
heap
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
30F1000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
682D000
|
direct allocation
|
page read and write
|
||
2EE4000
|
heap
|
page read and write
|
||
2EE4000
|
heap
|
page read and write
|
||
2EA4000
|
heap
|
page read and write
|
||
5ADF000
|
unkown
|
page read and write
|
||
2EA4000
|
heap
|
page read and write
|
||
5D01000
|
direct allocation
|
page read and write
|
||
2EE4000
|
heap
|
page read and write
|
||
2EA4000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
64A1000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
4CCF000
|
unkown
|
page write copy
|
||
4E1E000
|
unkown
|
page write copy
|
||
6561000
|
heap
|
page read and write
|
||
6999000
|
heap
|
page read and write
|
||
6637000
|
direct allocation
|
page read and write
|
||
6561000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
681D000
|
direct allocation
|
page read and write
|
||
445F000
|
stack
|
page read and write
|
||
6664000
|
direct allocation
|
page read and write
|
||
62A1000
|
heap
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
6671000
|
heap
|
page read and write
|
||
698F000
|
heap
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
||
7ED000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
6894000
|
direct allocation
|
page read and write
|
||
63AB000
|
direct allocation
|
page read and write
|
||
5840000
|
unkown
|
page execute read
|
||
69BD000
|
heap
|
page read and write
|
||
66B4000
|
direct allocation
|
page read and write
|
||
6171000
|
heap
|
page read and write
|
||
672B000
|
direct allocation
|
page read and write
|
||
66F0000
|
heap
|
page read and write
|
||
4DF9000
|
unkown
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
64EF000
|
stack
|
page read and write
|
||
63FB000
|
direct allocation
|
page read and write
|
||
6561000
|
heap
|
page read and write
|
||
645B000
|
direct allocation
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
2AB0000
|
heap
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
483E000
|
unkown
|
page write copy
|
||
4CF2000
|
unkown
|
page read and write
|
||
66BC000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
6468000
|
direct allocation
|
page read and write
|
||
2EE4000
|
heap
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
67FB000
|
direct allocation
|
page read and write
|
||
67EB000
|
direct allocation
|
page read and write
|
||
64A1000
|
heap
|
page read and write
|
||
6493000
|
direct allocation
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
6171000
|
heap
|
page read and write
|
||
6472000
|
direct allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
||
305B000
|
stack
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
691F000
|
heap
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
||
676E000
|
stack
|
page read and write
|
||
6783000
|
direct allocation
|
page read and write
|
||
2EA4000
|
heap
|
page read and write
|
||
2EA4000
|
heap
|
page read and write
|
||
64A1000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
48B0000
|
trusted library allocation
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6561000
|
heap
|
page read and write
|
||
50A0000
|
unkown
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
There are 1241 hidden memdumps, click here to show them.