Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
RFQ 034-1008-AG.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\directory\name.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
|
data
|
modified
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER29D9.tmp.dmp
|
Mini DuMP crash report, 15 streams, Thu Oct 10 09:25:44 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2BAF.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2BFE.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3d5a3yj0.lxc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a3fozadp.pia.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bt3v3aoh.rmf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eonkvjer.1bo.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hay1ophj.ae3.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_inwqutlj.5j5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rwgar223.n3e.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sgzccz1u.3i0.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t0sa01dx.toc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_umq0hwqt.xoo.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_up5y2yeg.gim.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zdmwc1nk.pcg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\silvexes
|
data
|
modified
|
||
C:\Users\user\AppData\Roaming\RegSvcs.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 13 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\RFQ 034-1008-AG.exe
|
"C:\Users\user\Desktop\RFQ 034-1008-AG.exe"
|
||
C:\Users\user\AppData\Local\directory\name.exe
|
"C:\Users\user\Desktop\RFQ 034-1008-AG.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\RFQ 034-1008-AG.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe'
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'RegSvcs.exe'
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\RegSvcs.exe'
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
|
||
C:\Users\user\AppData\Local\directory\name.exe
|
"C:\Users\user\AppData\Local\directory\name.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\AppData\Local\directory\name.exe"
|
||
C:\Users\user\AppData\Roaming\RegSvcs.exe
|
"C:\Users\user\AppData\Roaming\RegSvcs.exe"
|
||
C:\Users\user\AppData\Roaming\RegSvcs.exe
|
"C:\Users\user\AppData\Roaming\RegSvcs.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5772 -s 2000
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
aarsallc.duckdns.org
|
|||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://crl.micro
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
http://crl.microsoft
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://go.microsoft.c
|
unknown
|
||
http://go.microsoft.c(
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
There are 7 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
aarsallc.duckdns.org
|
103.161.133.94
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
103.161.133.94
|
aarsallc.duckdns.org
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
RegSvcs
|
||
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
|
ProgramId
|
||
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
|
FileId
|
||
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
|
LowerCaseLongPath
|
||
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
|
LongPathHash
|
||
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
|
Name
|
||
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
|
OriginalFileName
|
||
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
|
Publisher
|
||
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
|
Version
|
||
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
|
BinFileVersion
|
||
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
|
BinaryType
|
||
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
|
ProductName
|
||
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
|
ProductVersion
|
||
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
|
LinkDate
|
||
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
|
BinProductVersion
|
||
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
|
AppxPackageFullName
|
||
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
|
Size
|
||
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
|
Language
|
||
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
|
IsOsComponent
|
||
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 13 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2941000
|
trusted library allocation
|
page read and write
|
||
4846000
|
trusted library allocation
|
page read and write
|
||
2E70000
|
direct allocation
|
page read and write
|
||
45E6000
|
trusted library allocation
|
page read and write
|
||
AA0000
|
direct allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
4C16000
|
trusted library allocation
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
BC2000
|
trusted library allocation
|
page read and write
|
||
8014000
|
heap
|
page read and write
|
||
1500000
|
trusted library allocation
|
page read and write
|
||
98E000
|
stack
|
page read and write
|
||
4230000
|
direct allocation
|
page read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
556F000
|
stack
|
page read and write
|
||
6CBB000
|
stack
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
6ECC000
|
heap
|
page read and write
|
||
135000
|
heap
|
page read and write
|
||
2F88000
|
heap
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
1206000
|
heap
|
page read and write
|
||
750F000
|
heap
|
page read and write
|
||
E3E000
|
stack
|
page read and write
|
||
74EF000
|
heap
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
4AC1000
|
trusted library allocation
|
page read and write
|
||
2EA0000
|
trusted library allocation
|
page execute and read and write
|
||
8A7D000
|
stack
|
page read and write
|
||
3074000
|
heap
|
page read and write
|
||
56C0000
|
trusted library allocation
|
page read and write
|
||
433D000
|
stack
|
page read and write
|
||
7180000
|
trusted library allocation
|
page read and write
|
||
5D1D000
|
stack
|
page read and write
|
||
7120000
|
trusted library allocation
|
page read and write
|
||
80E3000
|
trusted library allocation
|
page read and write
|
||
7190000
|
trusted library allocation
|
page read and write
|
||
7CE0000
|
trusted library allocation
|
page read and write
|
||
7460000
|
heap
|
page read and write
|
||
C9C000
|
stack
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
2CD0000
|
heap
|
page readonly
|
||
4FB2000
|
trusted library allocation
|
page read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
7C30000
|
trusted library allocation
|
page read and write
|
||
4579000
|
direct allocation
|
page read and write
|
||
88A0000
|
trusted library allocation
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
FD7000
|
heap
|
page read and write
|
||
498000
|
stack
|
page read and write
|
||
2E60000
|
heap
|
page read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
85EE000
|
stack
|
page read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
288FA761000
|
heap
|
page read and write
|
||
6F3E000
|
stack
|
page read and write
|
||
19E000
|
stack
|
page read and write
|
||
2BB8000
|
stack
|
page read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
801C000
|
heap
|
page read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
2C9F000
|
stack
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
124E000
|
stack
|
page read and write
|
||
A68000
|
heap
|
page read and write
|
||
8562000
|
trusted library allocation
|
page read and write
|
||
D3D000
|
heap
|
page read and write
|
||
2D2C000
|
heap
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
7D92000
|
heap
|
page read and write
|
||
1143000
|
heap
|
page read and write
|
||
82D0000
|
trusted library allocation
|
page read and write
|
||
3D55000
|
heap
|
page read and write
|
||
7523000
|
heap
|
page read and write
|
||
7480000
|
trusted library allocation
|
page read and write
|
||
3EC7000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
45DE000
|
stack
|
page read and write
|
||
4450000
|
direct allocation
|
page read and write
|
||
A74000
|
trusted library allocation
|
page read and write
|
||
6D42000
|
heap
|
page read and write
|
||
4E04000
|
trusted library allocation
|
page read and write
|
||
4420000
|
direct allocation
|
page read and write
|
||
884000
|
trusted library allocation
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
BCEE5FB000
|
stack
|
page read and write
|
||
807F000
|
heap
|
page read and write
|
||
132D000
|
trusted library allocation
|
page execute and read and write
|
||
4420000
|
direct allocation
|
page read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
6CF0000
|
heap
|
page execute and read and write
|
||
93E000
|
stack
|
page read and write
|
||
4975000
|
trusted library allocation
|
page execute and read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
A70000
|
trusted library allocation
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
13CE000
|
stack
|
page read and write
|
||
7F8E000
|
stack
|
page read and write
|
||
ADE000
|
stack
|
page read and write
|
||
4EBC000
|
trusted library allocation
|
page read and write
|
||
70FB000
|
stack
|
page read and write
|
||
11A0000
|
trusted library allocation
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
7FFB23B25000
|
unkown
|
page readonly
|
||
3BDB000
|
heap
|
page read and write
|
||
457D000
|
direct allocation
|
page read and write
|
||
2930000
|
heap
|
page execute and read and write
|
||
490000
|
unkown
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
A2C000
|
stack
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
7571000
|
heap
|
page read and write
|
||
8880000
|
trusted library allocation
|
page read and write
|
||
4940000
|
trusted library allocation
|
page read and write
|
||
7930000
|
heap
|
page read and write
|
||
53C000
|
stack
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
554E000
|
stack
|
page read and write
|
||
6E82000
|
heap
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
7E80000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
BCEE1FE000
|
stack
|
page read and write
|
||
17A0000
|
direct allocation
|
page read and write
|
||
7486000
|
heap
|
page read and write
|
||
2972000
|
trusted library allocation
|
page read and write
|
||
4579000
|
direct allocation
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
5719000
|
trusted library allocation
|
page read and write
|
||
C99000
|
heap
|
page read and write
|
||
F8B000
|
trusted library allocation
|
page execute and read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
70D0000
|
trusted library allocation
|
page read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
80C0000
|
heap
|
page read and write
|
||
82E0000
|
trusted library allocation
|
page read and write
|
||
86AE000
|
stack
|
page read and write
|
||
713E000
|
stack
|
page read and write
|
||
7C8E000
|
stack
|
page read and write
|
||
78C0000
|
trusted library allocation
|
page read and write
|
||
4549000
|
direct allocation
|
page read and write
|
||
73C86000
|
unkown
|
page readonly
|
||
4E40000
|
heap
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
14ED000
|
trusted library allocation
|
page execute and read and write
|
||
4E3E000
|
stack
|
page read and write
|
||
3E94000
|
heap
|
page read and write
|
||
496A000
|
trusted library allocation
|
page execute and read and write
|
||
7D4000
|
heap
|
page read and write
|
||
14DD000
|
trusted library allocation
|
page execute and read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
4579000
|
direct allocation
|
page read and write
|
||
2BE1000
|
trusted library allocation
|
page read and write
|
||
5C67000
|
trusted library allocation
|
page read and write
|
||
3EF7000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
6C4F000
|
stack
|
page read and write
|
||
120F000
|
stack
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
72DE000
|
stack
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
589F000
|
trusted library allocation
|
page read and write
|
||
7B90000
|
trusted library allocation
|
page read and write
|
||
3BFF000
|
stack
|
page read and write
|
||
3EE1000
|
trusted library allocation
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
7E33000
|
heap
|
page read and write
|
||
53CC000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
A20000
|
heap
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
C5B000
|
stack
|
page read and write
|
||
57D000
|
stack
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
4990000
|
trusted library allocation
|
page read and write
|
||
156E000
|
stack
|
page read and write
|
||
7280000
|
trusted library allocation
|
page read and write
|
||
771E000
|
stack
|
page read and write
|
||
7830000
|
trusted library allocation
|
page read and write
|
||
8230000
|
trusted library allocation
|
page execute and read and write
|
||
150B000
|
trusted library allocation
|
page execute and read and write
|
||
447E000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
584E000
|
stack
|
page read and write
|
||
6E30000
|
heap
|
page read and write
|
||
45EE000
|
direct allocation
|
page read and write
|
||
7FD30000
|
trusted library allocation
|
page execute and read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
4420000
|
direct allocation
|
page read and write
|
||
A94000
|
heap
|
page read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
4A3F000
|
stack
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
14D4000
|
trusted library allocation
|
page read and write
|
||
77E0000
|
trusted library allocation
|
page read and write
|
||
9EC000
|
stack
|
page read and write
|
||
2B90000
|
heap
|
page execute and read and write
|
||
3E31000
|
heap
|
page read and write
|
||
7C0E000
|
stack
|
page read and write
|
||
D22000
|
heap
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
6E6B000
|
heap
|
page read and write
|
||
6FAF000
|
stack
|
page read and write
|
||
494D000
|
trusted library allocation
|
page execute and read and write
|
||
3CB7000
|
heap
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
538E000
|
stack
|
page read and write
|
||
510A000
|
trusted library allocation
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
32FA000
|
heap
|
page read and write
|
||
49E0000
|
heap
|
page readonly
|
||
149F000
|
stack
|
page read and write
|
||
69DB000
|
stack
|
page read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
2CF8000
|
heap
|
page read and write
|
||
7DB8000
|
heap
|
page read and write
|
||
8B4000
|
stack
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
5C6A000
|
trusted library allocation
|
page read and write
|
||
B5A000
|
unkown
|
page readonly
|
||
2E90000
|
heap
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
65E000
|
stack
|
page read and write
|
||
1520000
|
trusted library allocation
|
page read and write
|
||
4280000
|
direct allocation
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
3D2F000
|
heap
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
2B7C000
|
stack
|
page read and write
|
||
82BE000
|
stack
|
page read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
7910000
|
heap
|
page read and write
|
||
1148000
|
heap
|
page read and write
|
||
89F000
|
stack
|
page read and write
|
||
BB6000
|
trusted library allocation
|
page execute and read and write
|
||
4280000
|
direct allocation
|
page read and write
|
||
80E7000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
74B5000
|
heap
|
page read and write
|
||
7E70000
|
trusted library allocation
|
page read and write
|
||
D26000
|
heap
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
2DDB000
|
trusted library allocation
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
2DFD000
|
trusted library allocation
|
page read and write
|
||
27FC000
|
stack
|
page read and write
|
||
6FE1000
|
heap
|
page read and write
|
||
46DE000
|
stack
|
page read and write
|
||
7FFB23B01000
|
unkown
|
page execute read
|
||
3E81000
|
heap
|
page read and write
|
||
1125000
|
heap
|
page read and write
|
||
73D0000
|
trusted library allocation
|
page read and write
|
||
6FEE000
|
stack
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
5897000
|
trusted library allocation
|
page read and write
|
||
C6A000
|
heap
|
page read and write
|
||
4615000
|
heap
|
page execute and read and write
|
||
A9A000
|
trusted library allocation
|
page execute and read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
1340000
|
trusted library allocation
|
page read and write
|
||
7130000
|
trusted library allocation
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
A4E000
|
stack
|
page read and write
|
||
6E7A000
|
heap
|
page read and write
|
||
4280000
|
direct allocation
|
page read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
43D3000
|
direct allocation
|
page read and write
|
||
4B91000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
7503000
|
heap
|
page read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
4E77000
|
trusted library allocation
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
6EE5000
|
heap
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
8700000
|
heap
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
77F0000
|
trusted library allocation
|
page execute and read and write
|
||
169F000
|
stack
|
page read and write
|
||
6ED0000
|
heap
|
page read and write
|
||
86F5000
|
heap
|
page read and write
|
||
C76000
|
heap
|
page read and write
|
||
FA8000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
750000
|
heap
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
45BE000
|
direct allocation
|
page read and write
|
||
4930000
|
trusted library allocation
|
page read and write
|
||
A30000
|
trusted library allocation
|
page execute and read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
42B0000
|
direct allocation
|
page read and write
|
||
7F70000
|
trusted library allocation
|
page read and write
|
||
8430000
|
trusted library allocation
|
page read and write
|
||
3070000
|
heap
|
page read and write
|
||
8024000
|
heap
|
page read and write
|
||
154C000
|
stack
|
page read and write
|
||
F53000
|
trusted library allocation
|
page execute and read and write
|
||
6E9A000
|
heap
|
page read and write
|
||
110000
|
heap
|
page read and write
|
||
49F0000
|
heap
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
4E43000
|
heap
|
page read and write
|
||
84EF000
|
stack
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
C2E000
|
stack
|
page read and write
|
||
7D54000
|
heap
|
page read and write
|
||
2F9E000
|
stack
|
page read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
4753000
|
trusted library allocation
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
43A3000
|
direct allocation
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
443E000
|
stack
|
page read and write
|
||
706E000
|
stack
|
page read and write
|
||
3DA0000
|
heap
|
page read and write
|
||
8570000
|
heap
|
page read and write
|
||
6EAB000
|
heap
|
page read and write
|
||
51D7000
|
trusted library allocation
|
page read and write
|
||
713D000
|
heap
|
page read and write
|
||
A0F000
|
stack
|
page read and write
|
||
3EC4000
|
heap
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
F54000
|
trusted library allocation
|
page read and write
|
||
809000
|
heap
|
page read and write
|
||
4A53000
|
trusted library allocation
|
page read and write
|
||
733E000
|
stack
|
page read and write
|
||
838E000
|
stack
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
5025000
|
trusted library allocation
|
page read and write
|
||
6EBE000
|
stack
|
page read and write
|
||
8604000
|
heap
|
page read and write
|
||
7150000
|
trusted library allocation
|
page read and write
|
||
7460000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
trusted library allocation
|
page read and write
|
||
45EE000
|
direct allocation
|
page read and write
|
||
7075000
|
heap
|
page execute and read and write
|
||
540E000
|
stack
|
page read and write
|
||
150000
|
heap
|
page read and write
|
||
155000
|
heap
|
page read and write
|
||
6C8E000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
11C0000
|
heap
|
page read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
B1C000
|
unkown
|
page read and write
|
||
AAE000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
802C000
|
heap
|
page read and write
|
||
4E9A000
|
trusted library allocation
|
page read and write
|
||
4B1A000
|
trusted library allocation
|
page read and write
|
||
576F000
|
stack
|
page read and write
|
||
6DE000
|
stack
|
page read and write
|
||
5491000
|
trusted library allocation
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
4091000
|
trusted library allocation
|
page read and write
|
||
9B4000
|
heap
|
page read and write
|
||
7E7B000
|
trusted library allocation
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
1DE000
|
stack
|
page read and write
|
||
8B4000
|
stack
|
page read and write
|
||
7820000
|
trusted library allocation
|
page read and write
|
||
4549000
|
direct allocation
|
page read and write
|
||
43D3000
|
direct allocation
|
page read and write
|
||
7F50000
|
trusted library allocation
|
page execute and read and write
|
||
7B70000
|
heap
|
page read and write
|
||
7F200000
|
trusted library allocation
|
page execute and read and write
|
||
8092000
|
heap
|
page read and write
|
||
7FD48000
|
trusted library allocation
|
page execute and read and write
|
||
2ED0000
|
heap
|
page execute and read and write
|
||
1507000
|
trusted library allocation
|
page execute and read and write
|
||
9F0000
|
heap
|
page read and write
|
||
6F1B000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
8550000
|
trusted library allocation
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
2E85000
|
heap
|
page read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
5995000
|
trusted library allocation
|
page read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
717E000
|
stack
|
page read and write
|
||
73C0000
|
trusted library allocation
|
page read and write
|
||
7DB6000
|
heap
|
page read and write
|
||
6E8F000
|
heap
|
page read and write
|
||
8C2E000
|
stack
|
page read and write
|
||
7110000
|
trusted library allocation
|
page read and write
|
||
7DA8000
|
heap
|
page read and write
|
||
870000
|
trusted library allocation
|
page read and write
|
||
71DC000
|
heap
|
page read and write
|
||
F7A000
|
trusted library allocation
|
page execute and read and write
|
||
44F1000
|
trusted library allocation
|
page read and write
|
||
71D1000
|
heap
|
page read and write
|
||
ABE000
|
heap
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
42B0000
|
direct allocation
|
page read and write
|
||
6EAE000
|
heap
|
page read and write
|
||
288FAA35000
|
heap
|
page read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
699E000
|
stack
|
page read and write
|
||
CB6000
|
heap
|
page read and write
|
||
5440000
|
heap
|
page execute and read and write
|
||
30AA000
|
heap
|
page read and write
|
||
4488000
|
trusted library allocation
|
page read and write
|
||
288FA6B0000
|
heap
|
page read and write
|
||
46E0000
|
heap
|
page execute and read and write
|
||
717B000
|
heap
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
43A3000
|
direct allocation
|
page read and write
|
||
8B2000
|
trusted library allocation
|
page read and write
|
||
843D000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
685B000
|
stack
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
43FE000
|
stack
|
page read and write
|
||
EF6000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
14E0000
|
trusted library allocation
|
page read and write
|
||
3D26000
|
heap
|
page read and write
|
||
100F000
|
heap
|
page read and write
|
||
596E000
|
trusted library allocation
|
page read and write
|
||
1114000
|
trusted library allocation
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
131F000
|
stack
|
page read and write
|
||
812E000
|
stack
|
page read and write
|
||
3941000
|
trusted library allocation
|
page read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
73BE000
|
stack
|
page read and write
|
||
723D000
|
stack
|
page read and write
|
||
74C6000
|
heap
|
page read and write
|
||
1185000
|
heap
|
page read and write
|
||
8018000
|
heap
|
page read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
3E30000
|
heap
|
page read and write
|
||
BCEDEFF000
|
stack
|
page read and write
|
||
3C2F000
|
stack
|
page read and write
|
||
BCEDBFF000
|
stack
|
page read and write
|
||
14E4000
|
trusted library allocation
|
page read and write
|
||
5A1F000
|
stack
|
page read and write
|
||
7860000
|
trusted library allocation
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
3EB0000
|
heap
|
page read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
3D2E000
|
heap
|
page read and write
|
||
2EA0000
|
trusted library allocation
|
page read and write
|
||
4420000
|
direct allocation
|
page read and write
|
||
4579000
|
direct allocation
|
page read and write
|
||
5964000
|
trusted library allocation
|
page read and write
|
||
860C000
|
heap
|
page read and write
|
||
5AC9000
|
trusted library allocation
|
page read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
589E000
|
stack
|
page read and write
|
||
30E5000
|
heap
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
80E1000
|
heap
|
page read and write
|
||
457D000
|
direct allocation
|
page read and write
|
||
4A01000
|
trusted library allocation
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
7100000
|
trusted library allocation
|
page read and write
|
||
288FA77F000
|
heap
|
page read and write
|
||
3D2E000
|
heap
|
page read and write
|
||
6A5A000
|
stack
|
page read and write
|
||
70B0000
|
trusted library allocation
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
564E000
|
stack
|
page read and write
|
||
45EE000
|
direct allocation
|
page read and write
|
||
1055000
|
heap
|
page read and write
|
||
8B4000
|
stack
|
page read and write
|
||
7F4E000
|
stack
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
89F000
|
stack
|
page read and write
|
||
507E000
|
stack
|
page read and write
|
||
58A7000
|
trusted library allocation
|
page read and write
|
||
84BD000
|
stack
|
page read and write
|
||
1AE000
|
stack
|
page read and write
|
||
4450000
|
direct allocation
|
page read and write
|
||
A95000
|
heap
|
page read and write
|
||
7FFB23B20000
|
unkown
|
page read and write
|
||
528E000
|
stack
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
4450000
|
direct allocation
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
7920000
|
trusted library allocation
|
page execute and read and write
|
||
6CFD000
|
stack
|
page read and write
|
||
C48000
|
heap
|
page read and write
|
||
32D0000
|
heap
|
page read and write
|
||
4943000
|
trusted library allocation
|
page execute and read and write
|
||
510000
|
heap
|
page read and write
|
||
45EE000
|
direct allocation
|
page read and write
|
||
71F0000
|
heap
|
page execute and read and write
|
||
3EF7000
|
heap
|
page read and write
|
||
1155000
|
heap
|
page read and write
|
||
454D000
|
direct allocation
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
A80000
|
direct allocation
|
page read and write
|
||
4CCE000
|
stack
|
page read and write
|
||
8590000
|
trusted library allocation
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
10DE000
|
stack
|
page read and write
|
||
160F000
|
stack
|
page read and write
|
||
17A0000
|
heap
|
page read and write
|
||
4E25000
|
trusted library allocation
|
page read and write
|
||
D28000
|
heap
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
735E000
|
stack
|
page read and write
|
||
1810000
|
heap
|
page read and write
|
||
3CF6000
|
heap
|
page read and write
|
||
CFD000
|
heap
|
page read and write
|
||
7CD0000
|
trusted library allocation
|
page read and write
|
||
8E0000
|
trusted library allocation
|
page read and write
|
||
76C0000
|
trusted library allocation
|
page read and write
|
||
1128000
|
heap
|
page read and write
|
||
6A6E000
|
stack
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
288FAA3E000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
787000
|
heap
|
page read and write
|
||
11F3000
|
heap
|
page read and write
|
||
4549000
|
direct allocation
|
page read and write
|
||
82C0000
|
trusted library allocation
|
page read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
718C000
|
heap
|
page read and write
|
||
7B80000
|
trusted library allocation
|
page execute and read and write
|
||
7850000
|
trusted library allocation
|
page read and write
|
||
BCEDFFE000
|
stack
|
page read and write
|
||
6B3B000
|
stack
|
page read and write
|
||
7153000
|
heap
|
page read and write
|
||
70E0000
|
trusted library allocation
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
B52000
|
unkown
|
page readonly
|
||
3E31000
|
heap
|
page read and write
|
||
7DCA000
|
heap
|
page read and write
|
||
5EE000
|
stack
|
page read and write
|
||
443D000
|
stack
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
8890000
|
trusted library allocation
|
page read and write
|
||
A8D000
|
trusted library allocation
|
page execute and read and write
|
||
4AB0000
|
heap
|
page execute and read and write
|
||
EF0000
|
heap
|
page read and write
|
||
4BCD000
|
trusted library allocation
|
page read and write
|
||
7FC0000
|
trusted library allocation
|
page read and write
|
||
9F5000
|
heap
|
page read and write
|
||
45EE000
|
direct allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
7C10000
|
heap
|
page read and write
|
||
5600000
|
heap
|
page execute and read and write
|
||
2D1B000
|
heap
|
page read and write
|
||
A3E000
|
stack
|
page read and write
|
||
69D000
|
stack
|
page read and write
|
||
BC7000
|
trusted library allocation
|
page execute and read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
D06000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
ADC000
|
heap
|
page read and write
|
||
7890000
|
trusted library allocation
|
page read and write
|
||
8631000
|
heap
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
3CD6000
|
heap
|
page read and write
|
||
6BBF000
|
stack
|
page read and write
|
||
F05000
|
heap
|
page read and write
|
||
7EF0000
|
heap
|
page read and write
|
||
3D6E000
|
heap
|
page read and write
|
||
3E80000
|
heap
|
page read and write
|
||
4BAA000
|
trusted library allocation
|
page read and write
|
||
575B000
|
trusted library allocation
|
page read and write
|
||
4450000
|
direct allocation
|
page read and write
|
||
779E000
|
stack
|
page read and write
|
||
8072000
|
heap
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
54AE000
|
stack
|
page read and write
|
||
7200000
|
trusted library allocation
|
page read and write
|
||
3C54000
|
heap
|
page read and write
|
||
749C000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
6A1D000
|
stack
|
page read and write
|
||
76BA000
|
trusted library allocation
|
page read and write
|
||
3EC7000
|
heap
|
page read and write
|
||
AA0000
|
trusted library allocation
|
page read and write
|
||
465D000
|
stack
|
page read and write
|
||
8A00000
|
trusted library allocation
|
page read and write
|
||
73F0000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
28FD000
|
stack
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
56D7000
|
trusted library allocation
|
page read and write
|
||
883E000
|
stack
|
page read and write
|
||
43A3000
|
direct allocation
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
7DD0000
|
heap
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
A83000
|
trusted library allocation
|
page execute and read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
7D64000
|
heap
|
page read and write
|
||
2A37000
|
trusted library allocation
|
page read and write
|
||
8028000
|
heap
|
page read and write
|
||
8BEC000
|
stack
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
7167000
|
heap
|
page read and write
|
||
307E000
|
stack
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
3CE6000
|
heap
|
page read and write
|
||
7070000
|
heap
|
page execute and read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
76AE000
|
stack
|
page read and write
|
||
7F69000
|
trusted library allocation
|
page read and write
|
||
73C8D000
|
unkown
|
page read and write
|
||
6EA4000
|
heap
|
page read and write
|
||
6BFD000
|
stack
|
page read and write
|
||
8600000
|
heap
|
page read and write
|
||
469C000
|
stack
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
3EF5000
|
heap
|
page read and write
|
||
27A0000
|
trusted library allocation
|
page read and write
|
||
827E000
|
stack
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
4935000
|
trusted library allocation
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
4530000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page execute and read and write
|
||
12AF000
|
stack
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
5970000
|
trusted library allocation
|
page read and write
|
||
6ECA000
|
heap
|
page read and write
|
||
8AA000
|
trusted library allocation
|
page execute and read and write
|
||
4A80000
|
trusted library allocation
|
page read and write
|
||
288FA7B4000
|
heap
|
page read and write
|
||
9AD000
|
stack
|
page read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
279E000
|
stack
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
7840000
|
trusted library allocation
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
51F3000
|
trusted library allocation
|
page read and write
|
||
1239000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
7FA90000
|
trusted library allocation
|
page execute and read and write
|
||
3E31000
|
heap
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
D31000
|
heap
|
page read and write
|
||
866E000
|
stack
|
page read and write
|
||
5AE9000
|
trusted library allocation
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
73C8D000
|
unkown
|
page read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
3D26000
|
heap
|
page read and write
|
||
3D9D000
|
heap
|
page read and write
|
||
4F4E000
|
stack
|
page read and write
|
||
76B7000
|
trusted library allocation
|
page read and write
|
||
4450000
|
direct allocation
|
page read and write
|
||
301F000
|
stack
|
page read and write
|
||
4A50000
|
heap
|
page read and write
|
||
2E8C000
|
stack
|
page read and write
|
||
6C3A000
|
stack
|
page read and write
|
||
73A0000
|
trusted library allocation
|
page read and write
|
||
4420000
|
direct allocation
|
page read and write
|
||
6EC0000
|
heap
|
page read and write
|
||
3C87000
|
heap
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
42B0000
|
direct allocation
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
7410000
|
trusted library allocation
|
page read and write
|
||
8620000
|
heap
|
page read and write
|
||
7FB0000
|
trusted library allocation
|
page read and write
|
||
45BE000
|
direct allocation
|
page read and write
|
||
3E44000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
3C3D000
|
heap
|
page read and write
|
||
8580000
|
trusted library allocation
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
71F000
|
stack
|
page read and write
|
||
A84000
|
trusted library allocation
|
page read and write
|
||
7CF2000
|
trusted library allocation
|
page read and write
|
||
7FFB23B22000
|
unkown
|
page readonly
|
||
948000
|
heap
|
page read and write
|
||
578E000
|
stack
|
page read and write
|
||
3D2E000
|
heap
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
73C8D000
|
unkown
|
page read and write
|
||
150000
|
heap
|
page read and write
|
||
71E3000
|
heap
|
page read and write
|
||
7170000
|
trusted library allocation
|
page read and write
|
||
FC9000
|
heap
|
page read and write
|
||
6F6E000
|
stack
|
page read and write
|
||
BCEDAFA000
|
stack
|
page read and write
|
||
44DC000
|
stack
|
page read and write
|
||
71FA000
|
stack
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
42C4000
|
direct allocation
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
51FE000
|
stack
|
page read and write
|
||
518A000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4BCB000
|
trusted library allocation
|
page read and write
|
||
C79000
|
heap
|
page read and write
|
||
43D3000
|
direct allocation
|
page read and write
|
||
3E40000
|
heap
|
page execute and read and write
|
||
68DE000
|
stack
|
page read and write
|
||
74E8000
|
heap
|
page read and write
|
||
7519000
|
heap
|
page read and write
|
||
887E000
|
stack
|
page read and write
|
||
52FE000
|
stack
|
page read and write
|
||
7DE7000
|
heap
|
page read and write
|
||
5886000
|
trusted library allocation
|
page read and write
|
||
454D000
|
direct allocation
|
page read and write
|
||
85B0000
|
trusted library allocation
|
page execute and read and write
|
||
7660000
|
trusted library allocation
|
page execute and read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
155000
|
heap
|
page read and write
|
||
726E000
|
stack
|
page read and write
|
||
7FA0000
|
trusted library allocation
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
11C0000
|
trusted library allocation
|
page read and write
|
||
870D000
|
heap
|
page read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
43A3000
|
direct allocation
|
page read and write
|
||
2E90000
|
trusted library allocation
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
5645000
|
trusted library allocation
|
page read and write
|
||
54D9000
|
trusted library allocation
|
page read and write
|
||
AA5000
|
trusted library allocation
|
page execute and read and write
|
||
3700000
|
heap
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
70F0000
|
heap
|
page read and write
|
||
6B7E000
|
stack
|
page read and write
|
||
EE0000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
BE0000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3D2F000
|
heap
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
1324000
|
trusted library allocation
|
page read and write
|
||
86FE000
|
heap
|
page read and write
|
||
6D00000
|
trusted library allocation
|
page read and write
|
||
4A57000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
42FE000
|
stack
|
page read and write
|
||
5C77000
|
trusted library allocation
|
page read and write
|
||
45BE000
|
direct allocation
|
page read and write
|
||
4A40000
|
trusted library allocation
|
page execute and read and write
|
||
3E81000
|
heap
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
451C000
|
stack
|
page read and write
|
||
8663000
|
heap
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
454D000
|
direct allocation
|
page read and write
|
||
45BE000
|
direct allocation
|
page read and write
|
||
4579000
|
direct allocation
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
56F1000
|
trusted library allocation
|
page read and write
|
||
288FC2F0000
|
heap
|
page read and write
|
||
3C00000
|
heap
|
page read and write
|
||
A80000
|
trusted library allocation
|
page read and write
|
||
7432000
|
trusted library allocation
|
page read and write
|
||
73C8F000
|
unkown
|
page readonly
|
||
43D3000
|
direct allocation
|
page read and write
|
||
91E000
|
stack
|
page read and write
|
||
5C56000
|
trusted library allocation
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
3CA1000
|
trusted library allocation
|
page read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
49F7000
|
trusted library allocation
|
page read and write
|
||
70AD000
|
stack
|
page read and write
|
||
502F000
|
trusted library allocation
|
page read and write
|
||
B50000
|
unkown
|
page readonly
|
||
5460000
|
heap
|
page execute and read and write
|
||
3E31000
|
heap
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
2E4E000
|
stack
|
page read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
6F87000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page execute and read and write
|
||
7B9D000
|
trusted library allocation
|
page read and write
|
||
4970000
|
trusted library allocation
|
page read and write
|
||
96D000
|
heap
|
page read and write
|
||
6A60000
|
heap
|
page read and write
|
||
A89000
|
trusted library allocation
|
page read and write
|
||
288FAA30000
|
heap
|
page read and write
|
||
6C0E000
|
stack
|
page read and write
|
||
1580000
|
heap
|
page read and write
|
||
86CC000
|
heap
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
6C7E000
|
stack
|
page read and write
|
||
150E000
|
stack
|
page read and write
|
||
3D6E000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
A47000
|
heap
|
page read and write
|
||
100D000
|
heap
|
page read and write
|
||
689E000
|
stack
|
page read and write
|
||
4420000
|
direct allocation
|
page read and write
|
||
45BE000
|
direct allocation
|
page read and write
|
||
88D000
|
trusted library allocation
|
page execute and read and write
|
||
3E81000
|
heap
|
page read and write
|
||
712E000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
454D000
|
direct allocation
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
2F77000
|
heap
|
page read and write
|
||
288FA750000
|
heap
|
page read and write
|
||
74F2000
|
heap
|
page read and write
|
||
7512000
|
heap
|
page read and write
|
||
4A7000
|
unkown
|
page read and write
|
||
998000
|
trusted library allocation
|
page read and write
|
||
42B0000
|
direct allocation
|
page read and write
|
||
7FFB23B16000
|
unkown
|
page readonly
|
||
3EB1000
|
heap
|
page read and write
|
||
4E15000
|
trusted library allocation
|
page read and write
|
||
7F2C8000
|
trusted library allocation
|
page execute and read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
3C6C000
|
heap
|
page read and write
|
||
6E60000
|
heap
|
page read and write
|
||
1380000
|
trusted library allocation
|
page read and write
|
||
4610000
|
heap
|
page execute and read and write
|
||
8230000
|
trusted library allocation
|
page execute and read and write
|
||
5A20000
|
trusted library allocation
|
page read and write
|
||
54B9000
|
trusted library allocation
|
page read and write
|
||
83CE000
|
stack
|
page read and write
|
||
C30000
|
trusted library allocation
|
page execute and read and write
|
||
AAA000
|
heap
|
page read and write
|
||
71BE000
|
stack
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
6E30000
|
heap
|
page read and write
|
||
123B000
|
heap
|
page read and write
|
||
42B0000
|
direct allocation
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
834D000
|
stack
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
7E29000
|
heap
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
54B7000
|
trusted library allocation
|
page read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3D9E000
|
heap
|
page read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
8606000
|
heap
|
page read and write
|
||
BBA000
|
trusted library allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page readonly
|
||
3E31000
|
heap
|
page read and write
|
||
7800000
|
trusted library allocation
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
111D000
|
trusted library allocation
|
page execute and read and write
|
||
2E20000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
70BD000
|
stack
|
page read and write
|
||
4440000
|
heap
|
page execute and read and write
|
||
70C0000
|
trusted library allocation
|
page execute and read and write
|
||
14CF000
|
stack
|
page read and write
|
||
454D000
|
direct allocation
|
page read and write
|
||
3E90000
|
heap
|
page execute and read and write
|
||
11AE000
|
stack
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
7549000
|
heap
|
page read and write
|
||
8625000
|
heap
|
page read and write
|
||
16A8000
|
heap
|
page read and write
|
||
6EFE000
|
stack
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
3CCC000
|
heap
|
page read and write
|
||
51F7000
|
trusted library allocation
|
page read and write
|
||
1113000
|
trusted library allocation
|
page execute and read and write
|
||
3CF8000
|
heap
|
page read and write
|
||
4480000
|
heap
|
page read and write
|
||
457D000
|
direct allocation
|
page read and write
|
||
BCEE2FE000
|
stack
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
437B000
|
stack
|
page read and write
|
||
6DEE000
|
stack
|
page read and write
|
||
45BE000
|
direct allocation
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
5638000
|
trusted library allocation
|
page read and write
|
||
14D3000
|
trusted library allocation
|
page execute and read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
7CCE000
|
stack
|
page read and write
|
||
7C40000
|
heap
|
page read and write
|
||
72FC000
|
stack
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
27B0000
|
heap
|
page read and write
|
||
6EB8000
|
heap
|
page read and write
|
||
748C000
|
heap
|
page read and write
|
||
4FAE000
|
stack
|
page read and write
|
||
6E97000
|
heap
|
page read and write
|
||
7D68000
|
heap
|
page read and write
|
||
AAE000
|
stack
|
page read and write
|
||
120E000
|
stack
|
page read and write
|
||
550B000
|
stack
|
page read and write
|
||
8212000
|
trusted library allocation
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
880000
|
trusted library allocation
|
page read and write
|
||
4944000
|
trusted library allocation
|
page read and write
|
||
2B65000
|
trusted library allocation
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
A70000
|
trusted library allocation
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
816E000
|
stack
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
4FE0000
|
heap
|
page execute and read and write
|
||
91E000
|
stack
|
page read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
46F1000
|
trusted library allocation
|
page read and write
|
||
E48000
|
trusted library allocation
|
page read and write
|
||
5C1C000
|
stack
|
page read and write
|
||
7FFB23B00000
|
unkown
|
page readonly
|
||
457D000
|
direct allocation
|
page read and write
|
||
853E000
|
stack
|
page read and write
|
||
827E000
|
stack
|
page read and write
|
||
73C70000
|
unkown
|
page readonly
|
||
56CB000
|
trusted library allocation
|
page read and write
|
||
16B6000
|
heap
|
page read and write
|
||
7472000
|
heap
|
page read and write
|
||
73C71000
|
unkown
|
page execute read
|
||
11B0000
|
trusted library allocation
|
page execute and read and write
|
||
2B60000
|
trusted library allocation
|
page read and write
|
||
78B0000
|
trusted library allocation
|
page read and write
|
||
862C000
|
stack
|
page read and write
|
||
3EC5000
|
heap
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
457D000
|
direct allocation
|
page read and write
|
||
8702000
|
heap
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
7164000
|
heap
|
page read and write
|
||
49DE000
|
stack
|
page read and write
|
||
727B000
|
stack
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
5670000
|
heap
|
page read and write
|
||
288FA6D0000
|
heap
|
page read and write
|
||
116D000
|
stack
|
page read and write
|
||
930000
|
heap
|
page readonly
|
||
3D2F000
|
heap
|
page read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
4A68000
|
trusted library allocation
|
page read and write
|
||
7E07000
|
heap
|
page read and write
|
||
5A40000
|
trusted library allocation
|
page read and write
|
||
6A70000
|
heap
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
5083000
|
trusted library allocation
|
page read and write
|
||
8713000
|
heap
|
page read and write
|
||
84F0000
|
heap
|
page read and write
|
||
7D50000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
4280000
|
direct allocation
|
page read and write
|
||
55EE000
|
stack
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
BCEE4FE000
|
stack
|
page read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
80D0000
|
trusted library allocation
|
page read and write
|
||
6EEC000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
7277000
|
trusted library allocation
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
4549000
|
direct allocation
|
page read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
4E02000
|
trusted library allocation
|
page read and write
|
||
890000
|
trusted library allocation
|
page read and write
|
||
862D000
|
heap
|
page read and write
|
||
5400000
|
trusted library allocation
|
page execute and read and write
|
||
BCEDCFF000
|
stack
|
page read and write
|
||
3038000
|
heap
|
page read and write
|
||
160000
|
heap
|
page read and write
|
||
4FD0000
|
heap
|
page read and write
|
||
7450000
|
trusted library allocation
|
page read and write
|
||
8470000
|
trusted library allocation
|
page execute and read and write
|
||
130000
|
heap
|
page read and write
|
||
43D3000
|
direct allocation
|
page read and write
|
||
6FBE000
|
stack
|
page read and write
|
||
14E000
|
stack
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
1320000
|
trusted library allocation
|
page read and write
|
||
7FAA8000
|
trusted library allocation
|
page execute and read and write
|
||
70F0000
|
trusted library allocation
|
page read and write
|
||
51D5000
|
trusted library allocation
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
4A7000
|
unkown
|
page read and write
|
||
8077000
|
heap
|
page read and write
|
||
843B000
|
trusted library allocation
|
page read and write
|
||
574E000
|
stack
|
page read and write
|
||
540C000
|
stack
|
page read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
80E0000
|
trusted library allocation
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
883000
|
trusted library allocation
|
page execute and read and write
|
||
568E000
|
stack
|
page read and write
|
||
51BE000
|
stack
|
page read and write
|
||
9CE000
|
stack
|
page read and write
|
||
8020000
|
heap
|
page read and write
|
||
4549000
|
direct allocation
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
6AFD000
|
stack
|
page read and write
|
||
11D8000
|
heap
|
page read and write
|
||
7880000
|
trusted library allocation
|
page read and write
|
||
F64000
|
trusted library allocation
|
page read and write
|
||
7F60000
|
trusted library allocation
|
page read and write
|
||
C5E000
|
heap
|
page read and write
|
||
3E77000
|
heap
|
page read and write
|
||
8BAE000
|
stack
|
page read and write
|
||
775E000
|
stack
|
page read and write
|
||
AA2000
|
trusted library allocation
|
page read and write
|
||
305A000
|
heap
|
page read and write
|
||
459E000
|
stack
|
page read and write
|
||
5649000
|
stack
|
page read and write
|
||
77A000
|
heap
|
page read and write
|
||
84AE000
|
stack
|
page read and write
|
||
2EE1000
|
trusted library allocation
|
page read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
7420000
|
heap
|
page execute and read and write
|
||
5F0000
|
heap
|
page read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
8635000
|
heap
|
page read and write
|
||
45EE000
|
direct allocation
|
page read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
5499000
|
trusted library allocation
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
95F000
|
stack
|
page read and write
|
||
4280000
|
direct allocation
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
43BE000
|
stack
|
page read and write
|
||
8010000
|
heap
|
page read and write
|
||
A73000
|
trusted library allocation
|
page execute and read and write
|
||
727A000
|
trusted library allocation
|
page read and write
|
||
5635000
|
trusted library allocation
|
page read and write
|
||
43A3000
|
direct allocation
|
page read and write
|
||
70F2000
|
trusted library allocation
|
page read and write
|
||
7F80000
|
trusted library allocation
|
page read and write
|
||
3E0E000
|
heap
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
5F6000
|
heap
|
page read and write
|
||
5300000
|
heap
|
page read and write
|
||
731E000
|
stack
|
page read and write
|
||
49D000
|
stack
|
page read and write
|
||
5624000
|
trusted library allocation
|
page read and write
|
||
7810000
|
trusted library allocation
|
page read and write
|
||
8B5000
|
trusted library allocation
|
page execute and read and write
|
||
109E000
|
stack
|
page read and write
|
||
830E000
|
stack
|
page read and write
|
||
8052000
|
heap
|
page read and write
|
||
1347000
|
trusted library allocation
|
page execute and read and write
|
||
72BE000
|
stack
|
page read and write
|
||
4D42000
|
trusted library allocation
|
page read and write
|
||
3DDF000
|
heap
|
page read and write
|
||
55AE000
|
stack
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
7D6C000
|
heap
|
page read and write
|
||
1370000
|
trusted library allocation
|
page execute and read and write
|
||
7E60000
|
trusted library allocation
|
page execute and read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
7176000
|
heap
|
page read and write
|
||
8440000
|
trusted library allocation
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
543E000
|
stack
|
page read and write
|
||
6E72000
|
heap
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
4960000
|
trusted library allocation
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
7D5C000
|
heap
|
page read and write
|
||
288FA6A0000
|
heap
|
page read and write
|
||
86D3000
|
heap
|
page read and write
|
||
7171000
|
heap
|
page read and write
|
||
3CBF000
|
heap
|
page read and write
|
||
F87000
|
trusted library allocation
|
page execute and read and write
|
||
4F63000
|
trusted library allocation
|
page read and write
|
||
7D58000
|
heap
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
59DD000
|
stack
|
page read and write
|
||
4950000
|
trusted library allocation
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
5D5C000
|
stack
|
page read and write
|
||
7E7D000
|
trusted library allocation
|
page read and write
|
||
53FE000
|
stack
|
page read and write
|
||
85A9000
|
stack
|
page read and write
|
||
129E000
|
stack
|
page read and write
|
||
119F000
|
stack
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
43D3000
|
direct allocation
|
page read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
6B3C000
|
stack
|
page read and write
|
||
7480000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
3D2F000
|
heap
|
page read and write
|
||
8A03000
|
trusted library allocation
|
page read and write
|
||
D9A000
|
stack
|
page read and write
|
||
7140000
|
trusted library allocation
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
702F000
|
stack
|
page read and write
|
||
7B9B000
|
trusted library allocation
|
page read and write
|
||
3E75000
|
heap
|
page read and write
|
||
3E41000
|
heap
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
73C8D000
|
unkown
|
page read and write
|
||
3BBF000
|
stack
|
page read and write
|
||
605E000
|
stack
|
page read and write
|
||
3C30000
|
heap
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
4537000
|
heap
|
page read and write
|
||
695A000
|
stack
|
page read and write
|
||
6ED8000
|
heap
|
page read and write
|
||
7E35000
|
heap
|
page read and write
|
||
2DB6000
|
trusted library allocation
|
page read and write
|
||
4520000
|
heap
|
page read and write
|
||
A80000
|
trusted library allocation
|
page read and write
|
||
1203000
|
heap
|
page read and write
|
||
7192000
|
trusted library allocation
|
page read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
D57000
|
stack
|
page read and write
|
||
56F9000
|
trusted library allocation
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
ABA000
|
heap
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
F76000
|
trusted library allocation
|
page execute and read and write
|
||
89F000
|
stack
|
page read and write
|
||
2E30000
|
heap
|
page read and write
|
||
4959000
|
trusted library allocation
|
page read and write
|
||
7E1D000
|
heap
|
page read and write
|
||
2E45000
|
heap
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
454D000
|
direct allocation
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
737F000
|
stack
|
page read and write
|
||
4C53000
|
trusted library allocation
|
page read and write
|
||
70D0000
|
heap
|
page read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
6FFE000
|
stack
|
page read and write
|
||
4E23000
|
trusted library allocation
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
589A000
|
trusted library allocation
|
page read and write
|
||
8F8000
|
stack
|
page read and write
|
||
6F8A000
|
trusted library allocation
|
page read and write
|
||
56CD000
|
trusted library allocation
|
page read and write
|
||
2DBC000
|
heap
|
page read and write
|
||
76B0000
|
trusted library allocation
|
page read and write
|
||
4BAC000
|
trusted library allocation
|
page read and write
|
||
6E2E000
|
stack
|
page read and write
|
||
7BA0000
|
trusted library allocation
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
74DB000
|
heap
|
page read and write
|
||
15A0000
|
heap
|
page read and write
|
||
5B2B000
|
trusted library allocation
|
page read and write
|
||
382E000
|
stack
|
page read and write
|
||
134B000
|
trusted library allocation
|
page execute and read and write
|
||
A50000
|
trusted library allocation
|
page read and write
|
||
1360000
|
trusted library allocation
|
page read and write
|
||
54F9000
|
trusted library allocation
|
page read and write
|
||
2CE0000
|
trusted library allocation
|
page execute and read and write
|
||
43A3000
|
direct allocation
|
page read and write
|
||
ECE000
|
stack
|
page read and write
|
||
4579000
|
direct allocation
|
page read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
37BE000
|
stack
|
page read and write
|
||
7270000
|
trusted library allocation
|
page read and write
|
||
8B6B000
|
stack
|
page read and write
|
||
3E77000
|
heap
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
7870000
|
trusted library allocation
|
page read and write
|
||
3EC1000
|
heap
|
page read and write
|
||
78A0000
|
trusted library allocation
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
4540000
|
trusted library allocation
|
page read and write
|
||
AE8000
|
heap
|
page read and write
|
||
128E000
|
stack
|
page read and write
|
||
554C000
|
stack
|
page read and write
|
||
EF9000
|
stack
|
page read and write
|
||
3CC8000
|
heap
|
page read and write
|
||
948000
|
heap
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
8440000
|
trusted library allocation
|
page read and write
|
||
50E8000
|
trusted library allocation
|
page read and write
|
||
BA3000
|
trusted library allocation
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
7100000
|
heap
|
page read and write
|
||
89F0000
|
trusted library allocation
|
page read and write
|
||
5E5A000
|
stack
|
page read and write
|
||
56E0000
|
heap
|
page read and write
|
||
8085000
|
heap
|
page read and write
|
||
4445000
|
heap
|
page execute and read and write
|
||
3BF2000
|
heap
|
page read and write
|
||
288FA787000
|
heap
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
82B9000
|
stack
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
544E000
|
stack
|
page read and write
|
||
2CA9000
|
trusted library allocation
|
page read and write
|
||
3D9D000
|
heap
|
page read and write
|
||
71E5000
|
heap
|
page read and write
|
||
11F8000
|
heap
|
page read and write
|
||
73FE000
|
stack
|
page read and write
|
||
899000
|
trusted library allocation
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
863D000
|
heap
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
616000
|
heap
|
page read and write
|
||
5AE1000
|
trusted library allocation
|
page read and write
|
||
2B5F000
|
stack
|
page read and write
|
||
16AF000
|
stack
|
page read and write
|
||
4280000
|
direct allocation
|
page read and write
|
||
4549000
|
direct allocation
|
page read and write
|
||
691E000
|
stack
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
7F2B0000
|
trusted library allocation
|
page execute and read and write
|
||
7F00000
|
heap
|
page read and write
|
||
77DD000
|
stack
|
page read and write
|
||
BEC000
|
stack
|
page read and write
|
||
5455000
|
trusted library allocation
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
73B0000
|
trusted library allocation
|
page execute and read and write
|
||
7220000
|
trusted library allocation
|
page execute and read and write
|
||
739D000
|
stack
|
page read and write
|
||
2F5D000
|
stack
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
3091000
|
trusted library allocation
|
page read and write
|
||
42B0000
|
direct allocation
|
page read and write
|
||
45C000
|
stack
|
page read and write
|
||
4491000
|
trusted library allocation
|
page read and write
|
||
4A7000
|
unkown
|
page read and write
|
||
570F000
|
stack
|
page read and write
|
||
7E21000
|
heap
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
53B000
|
stack
|
page read and write
|
||
3067000
|
heap
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
563D000
|
trusted library allocation
|
page read and write
|
||
8679000
|
heap
|
page read and write
|
||
566F000
|
stack
|
page read and write
|
||
6AFC000
|
stack
|
page read and write
|
||
5F5E000
|
stack
|
page read and write
|
||
12A0000
|
trusted library allocation
|
page read and write
|
||
7160000
|
trusted library allocation
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
3CFE000
|
heap
|
page read and write
|
||
2CA1000
|
trusted library allocation
|
page read and write
|
||
578000
|
stack
|
page read and write
|
||
4450000
|
direct allocation
|
page read and write
|
||
FC3000
|
heap
|
page read and write
|
||
BCB000
|
trusted library allocation
|
page execute and read and write
|
||
3080000
|
heap
|
page execute and read and write
|
||
BCEE3FE000
|
stack
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
8056000
|
heap
|
page read and write
|
||
1193000
|
heap
|
page read and write
|
||
1570000
|
trusted library allocation
|
page execute and read and write
|
||
AA0000
|
heap
|
page read and write
|
||
3E91000
|
heap
|
page read and write
|
||
A7D000
|
trusted library allocation
|
page execute and read and write
|
||
2BBD000
|
stack
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
8430000
|
trusted library allocation
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
6F79000
|
stack
|
page read and write
|
||
7470000
|
trusted library allocation
|
page read and write
|
||
3EC0000
|
heap
|
page execute and read and write
|
||
457D000
|
direct allocation
|
page read and write
|
||
36FE000
|
stack
|
page read and write
|
||
6CCF000
|
stack
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
8C6E000
|
stack
|
page read and write
|
||
7EED000
|
stack
|
page read and write
|
||
3BC0000
|
heap
|
page read and write
|
||
5C6E000
|
trusted library allocation
|
page read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
8443000
|
trusted library allocation
|
page read and write
|
||
2F50000
|
heap
|
page read and write
|
||
758000
|
heap
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
6D3B000
|
stack
|
page read and write
|
||
6F7E000
|
stack
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
8A30000
|
trusted library allocation
|
page execute and read and write
|
||
4972000
|
trusted library allocation
|
page read and write
|
There are 1305 hidden memdumps, click here to show them.