Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\bYrIyAT.a3x
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-09MIB.tmp\file.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-NDTIL.tmp\_isetup\_isdecmp.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-NDTIL.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-OR928.tmp\file.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\NVFTVRDLL64.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\NvFrapsOpenVR.man (copy)
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\_isetup\_isdecmp.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\ddETWExternal.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\ddETWExternal.xml (copy)
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (399), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\htcvive_install.bat (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\is-5MQFH.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\is-7G1NI.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\is-8JII1.tmp
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\is-E0D1D.tmp
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\is-EUGF2.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\is-ML8HU.tmp
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\is-TP03U.tmp
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (399), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\nvfvsdksvc_x64.exe (copy)
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\nvinstall.cmd (copy)
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\hangbird\Updater.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\hangbird\caliculus.csv (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\hangbird\caliculus.zip (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\hangbird\is-7LJOT.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\hangbird\is-8EU3L.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\hangbird\is-JBS10.tmp
|
data
|
dropped
|
||
\Device\Null
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 19 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c ping -n 5 127.0.0.1 >nul && updater.exe C:\ProgramData\\bYrIyAT.a3x && del C:\ProgramData\\bYrIyAT.a3x
|
||
C:\Windows\SysWOW64\PING.EXE
|
ping -n 5 127.0.0.1
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
||
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\is-09MIB.tmp\file.tmp
|
"C:\Users\user\AppData\Local\Temp\is-09MIB.tmp\file.tmp" /SL5="$40476,2820349,845824,C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe" /VERYSILENT
|
||
C:\Users\user\AppData\Local\Temp\is-OR928.tmp\file.tmp
|
"C:\Users\user\AppData\Local\Temp\is-OR928.tmp\file.tmp" /SL5="$2047E,2820349,845824,C:\Users\user\Desktop\file.exe" /VERYSILENT
|
||
C:\Windows\System32\cmd.exe
|
"cmd.exe" /C tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH | find /I "wrsa.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH
|
||
C:\Windows\System32\find.exe
|
find /I "wrsa.exe"
|
||
C:\Windows\System32\cmd.exe
|
"cmd.exe" /C tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH | find /I "opssvc.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH
|
||
C:\Windows\System32\find.exe
|
find /I "opssvc.exe"
|
||
C:\Windows\System32\cmd.exe
|
"cmd.exe" /C tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH | find /I "avastui.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH
|
||
C:\Windows\System32\find.exe
|
find /I "avastui.exe"
|
||
C:\Windows\System32\cmd.exe
|
"cmd.exe" /C tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH | find /I "avgui.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH
|
||
C:\Windows\System32\find.exe
|
find /I "avgui.exe"
|
||
C:\Windows\System32\cmd.exe
|
"cmd.exe" /C tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH | find /I "nswscsvc.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH
|
||
C:\Windows\System32\find.exe
|
find /I "nswscsvc.exe"
|
||
C:\Windows\System32\cmd.exe
|
"cmd.exe" /C tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH | find /I "sophoshealth.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH
|
||
C:\Windows\System32\find.exe
|
find /I "sophoshealth.exe"
|
||
C:\Users\user\AppData\Local\hangbird\Updater.exe
|
"C:\Users\user\AppData\Local\hangbird\\Updater.exe" "C:\Users\user\AppData\Local\hangbird\\caliculus.csv"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Users\user\AppData\Local\hangbird\Updater.exe
|
updater.exe C:\ProgramData\\bYrIyAT.a3x
|
There are 24 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
contemteny.site
|
|||
opposezmny.site
|
|||
servicedny.site
|
|||
goalyfeastz.site
|
|||
authorisev.site
|
|||
faulteyotk.site
|
|||
https://authorisev.site/api
|
104.21.85.194
|
||
seallysl.site
|
|||
dilemmadu.site
|
|||
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
|
unknown
|
||
http://repository.certum.pl/ctsca2021.cer0A
|
unknown
|
||
http://vovsoft.com/blog/how-to-activate-using-license-key/openU
|
unknown
|
||
http://crl.certum.pl/ctsca2021.crl0o
|
unknown
|
||
http://repository.certum.pl/cscasha2.cer0
|
unknown
|
||
https://authorisev.site/2U
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://ocsp.entrust.net03
|
unknown
|
||
http://ocsp.entrust.net02
|
unknown
|
||
https://authorisev.site:443/api
|
unknown
|
||
http://cscasha2.ocsp-ce
|
unknown
|
||
http://ccsca2021.crl.certum.pl/ccsca2021.crl0s
|
unknown
|
||
http://www.indyproject.org/
|
unknown
|
||
https://www.autoitscript.com/autoit3/
|
unknown
|
||
http://repository.certum.pl/ccsca2021.cer0
|
unknown
|
||
http://vovsoft.com/
|
unknown
|
||
http://subca.ocsp-certum.com05
|
unknown
|
||
https://www.remobjects.com/ps
|
unknown
|
||
http://subca.ocsp-certum.com02
|
unknown
|
||
http://subca.ocsp-certum.com01
|
unknown
|
||
https://www.innosetup.com/
|
unknown
|
||
https://sectigo.com/CPS0D
|
unknown
|
||
http://crl.certum.pl/ctnca2.crl0l
|
unknown
|
||
http://repository.certum.pl/ctnca2.cer09
|
unknown
|
||
https://jrsoftware.org0
|
unknown
|
||
https://jrsoftware.org/
|
unknown
|
||
http://ccsca2021.ocsp-certum.com05
|
unknown
|
||
http://crl.entrust.net/ts1ca.crl0
|
unknown
|
||
http://www.certum.pl/CPS0
|
unknown
|
||
http://repository.certum.pl/ctnca.cer09
|
unknown
|
||
http://vovsoft.com
|
unknown
|
||
http://crl.certum.pl/ctnca.crl0k
|
unknown
|
||
http://www.entrust.net/rpa03
|
unknown
|
||
https://vovsoft.com/translation/
|
unknown
|
||
http://aia.entrust.net/ts1-chain256.cer01
|
unknown
|
||
http://www.autoitscript.com/autoit3/X
|
unknown
|
||
http://vovsoft.com/help/
|
unknown
|
||
http://vovsoft.comopenU
|
unknown
|
||
https://www.certum.pl/CPS0
|
unknown
|
||
http://vovsoft.comopenS
|
unknown
|
||
http://crl.certum.pl/cscasha2.crl0q
|
unknown
|
||
http://cscasha2.ocsp-certum.com04
|
unknown
|
||
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
|
unknown
|
||
https://vovsoft.com/blog/credits-and-acknowledgements/open
|
unknown
|
||
https://authorisev.site//
|
unknown
|
||
https://authorisev.site/0
|
unknown
|
||
https://authorisev.site/mOW
|
unknown
|
||
http://vovsoft.com/blog/how-to-uninstall-vovsoft-software/openU
|
unknown
|
||
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
|
unknown
|
||
https://authorisev.site/
|
unknown
|
||
https://vovsoft.com/translation/openU
|
unknown
|
||
http://repository.certum
|
unknown
|
||
http://ocsp.us
|
unknown
|
||
http://crl.entrust.net/2048ca.crl0
|
unknown
|
||
https://authorisev.site/pi
|
unknown
|
||
https://www.entrust.net/rpa0
|
unknown
|
||
http://vovsoft.com/openU
|
unknown
|
There are 56 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
authorisev.site
|
104.21.85.194
|
||
s-part-0017.t-0009.t-msedge.net
|
13.107.246.45
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
127.0.0.1
|
unknown
|
unknown
|
||
104.21.85.194
|
authorisev.site
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3D3C000
|
direct allocation
|
page read and write
|
||
BBD000
|
unkown
|
page readonly
|
||
7CC000
|
stack
|
page read and write
|
||
2C3DB7F000
|
stack
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
C1F000
|
stack
|
page read and write
|
||
F8B31CF000
|
stack
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
BD4D47E000
|
stack
|
page read and write
|
||
7FB6A000
|
direct allocation
|
page read and write
|
||
25AC000
|
direct allocation
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
25C1000
|
direct allocation
|
page read and write
|
||
113E000
|
unkown
|
page read and write
|
||
3657000
|
heap
|
page read and write
|
||
BE1000
|
unkown
|
page readonly
|
||
FCF000
|
heap
|
page read and write
|
||
2BE3000
|
direct allocation
|
page read and write
|
||
BF1000
|
unkown
|
page write copy
|
||
BED000
|
unkown
|
page write copy
|
||
2C09000
|
direct allocation
|
page read and write
|
||
36ED000
|
direct allocation
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
29D000
|
unkown
|
page execute read
|
||
A40000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
2C86000
|
direct allocation
|
page read and write
|
||
2BCEA7E000
|
stack
|
page read and write
|
||
25C8000
|
direct allocation
|
page read and write
|
||
347E000
|
heap
|
page read and write
|
||
E60B7EC000
|
stack
|
page read and write
|
||
2BCD000
|
direct allocation
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
2DCA000
|
direct allocation
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
D97000
|
heap
|
page read and write
|
||
347E000
|
heap
|
page read and write
|
||
2C5B000
|
direct allocation
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
2D5E000
|
direct allocation
|
page read and write
|
||
FAE000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
3B5E000
|
direct allocation
|
page read and write
|
||
408C000
|
direct allocation
|
page read and write
|
||
37E1000
|
heap
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
146B000
|
heap
|
page read and write
|
||
24D57260000
|
heap
|
page read and write
|
||
355C000
|
heap
|
page read and write
|
||
961000
|
heap
|
page read and write
|
||
104C000
|
heap
|
page read and write
|
||
4045CFF000
|
stack
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
B21000
|
unkown
|
page execute read
|
||
13EC000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
36E1000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
25A4000
|
direct allocation
|
page read and write
|
||
3581000
|
heap
|
page read and write
|
||
1465000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
932A7E000
|
stack
|
page read and write
|
||
179C6320000
|
heap
|
page read and write
|
||
104C000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
37A1000
|
heap
|
page read and write
|
||
259D000
|
direct allocation
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
93297E000
|
stack
|
page read and write
|
||
3CA627E000
|
stack
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
1478000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
FCF000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
2544000
|
direct allocation
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
2BF29F9B000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
FAE000
|
heap
|
page read and write
|
||
357E000
|
heap
|
page read and write
|
||
11EA276A000
|
heap
|
page read and write
|
||
9FA000
|
heap
|
page read and write
|
||
FD2000
|
heap
|
page read and write
|
||
173DB185000
|
heap
|
page read and write
|
||
419E000
|
stack
|
page read and write
|
||
20737015000
|
heap
|
page read and write
|
||
355C000
|
heap
|
page read and write
|
||
3581000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
D43000
|
heap
|
page read and write
|
||
3AC8000
|
direct allocation
|
page read and write
|
||
358E000
|
stack
|
page read and write
|
||
1049000
|
unkown
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
285E2D08000
|
heap
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
104F000
|
heap
|
page read and write
|
||
104C000
|
heap
|
page read and write
|
||
20737190000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
FD2000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
355C000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
3430000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
38E6000
|
trusted library allocation
|
page read and write
|
||
36E1000
|
heap
|
page read and write
|
||
2CA3000
|
direct allocation
|
page read and write
|
||
173DAEFB000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
2C62000
|
direct allocation
|
page read and write
|
||
1FF1E9BB000
|
heap
|
page read and write
|
||
1049000
|
unkown
|
page read and write
|
||
2D14000
|
direct allocation
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
2BCEB7E000
|
stack
|
page read and write
|
||
37EA000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
2519000
|
direct allocation
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
2D23000
|
direct allocation
|
page read and write
|
||
21154447000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
2D82000
|
direct allocation
|
page read and write
|
||
3DC4000
|
direct allocation
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
299F000
|
direct allocation
|
page read and write
|
||
355C000
|
heap
|
page read and write
|
||
2BEA000
|
direct allocation
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
357E000
|
heap
|
page read and write
|
||
2D2A000
|
direct allocation
|
page read and write
|
||
2BD4000
|
direct allocation
|
page read and write
|
||
24B2000
|
direct allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
355C000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
3706000
|
direct allocation
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
2EFD000
|
stack
|
page read and write
|
||
355D000
|
heap
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
104C000
|
heap
|
page read and write
|
||
B975FE000
|
stack
|
page read and write
|
||
2596000
|
direct allocation
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
3581000
|
heap
|
page read and write
|
||
285E2D18000
|
heap
|
page read and write
|
||
2CFF000
|
direct allocation
|
page read and write
|
||
357E000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
28E2000
|
direct allocation
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
9328FE000
|
stack
|
page read and write
|
||
E164F7E000
|
stack
|
page read and write
|
||
3581000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
347E000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
4008000
|
direct allocation
|
page read and write
|
||
1DA085AD000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
367A000
|
heap
|
page read and write
|
||
2588000
|
direct allocation
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
364E000
|
stack
|
page read and write
|
||
1FF1E9CD000
|
heap
|
page read and write
|
||
E60BA7F000
|
stack
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
3657000
|
heap
|
page read and write
|
||
11EA2769000
|
heap
|
page read and write
|
||
2B9D000
|
direct allocation
|
page read and write
|
||
2DBC000
|
direct allocation
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
13ED000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
2972000
|
direct allocation
|
page read and write
|
||
1DA085AD000
|
heap
|
page read and write
|
||
932AFE000
|
stack
|
page read and write
|
||
1DA0858B000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
2D0000
|
unkown
|
page read and write
|
||
285E2C80000
|
heap
|
page read and write
|
||
24A5000
|
direct allocation
|
page read and write
|
||
35FB000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
3657000
|
heap
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
20737195000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
114D000
|
unkown
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
2EBD000
|
stack
|
page read and write
|
||
FD2000
|
heap
|
page read and write
|
||
347E000
|
heap
|
page read and write
|
||
297B000
|
direct allocation
|
page read and write
|
||
20964EF0000
|
heap
|
page read and write
|
||
2C1B000
|
direct allocation
|
page read and write
|
||
355D000
|
heap
|
page read and write
|
||
1145000
|
unkown
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
357E000
|
heap
|
page read and write
|
||
24D56FA0000
|
heap
|
page read and write
|
||
28CA000
|
direct allocation
|
page read and write
|
||
3581000
|
heap
|
page read and write
|
||
36E1000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
355D000
|
heap
|
page read and write
|
||
293F000
|
direct allocation
|
page read and write
|
||
347E000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
357E000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
2520000
|
direct allocation
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
3B40000
|
direct allocation
|
page read and write
|
||
252B000
|
direct allocation
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
B9767E000
|
stack
|
page read and write
|
||
2DD000
|
unkown
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
285E2D2D000
|
heap
|
page read and write
|
||
20964E50000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
2BCEAFE000
|
stack
|
page read and write
|
||
3920000
|
heap
|
page read and write
|
||
1E710D00000
|
heap
|
page read and write
|
||
2BCE79E000
|
stack
|
page read and write
|
||
36E1000
|
heap
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
295E000
|
direct allocation
|
page read and write
|
||
11EA2755000
|
heap
|
page read and write
|
||
B20000
|
unkown
|
page readonly
|
||
1410000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
347E000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
2860000
|
heap
|
page read and write
|
||
1130000
|
unkown
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
2E4000
|
unkown
|
page write copy
|
||
1410000
|
heap
|
page read and write
|
||
3581000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
B974FF000
|
stack
|
page read and write
|
||
8DE000
|
stack
|
page read and write
|
||
93A000
|
heap
|
page read and write
|
||
37E1000
|
heap
|
page read and write
|
||
104C000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
3B70000
|
direct allocation
|
page read and write
|
||
347E000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
1238000
|
heap
|
page read and write
|
||
337E000
|
direct allocation
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
173DAEFB000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
2989000
|
direct allocation
|
page read and write
|
||
347E000
|
heap
|
page read and write
|
||
355C000
|
heap
|
page read and write
|
||
367A000
|
heap
|
page read and write
|
||
11EA2560000
|
heap
|
page read and write
|
||
24C0000
|
direct allocation
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
355C000
|
heap
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
104C000
|
heap
|
page read and write
|
||
21154440000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
38E8000
|
trusted library allocation
|
page read and write
|
||
1DA085AB000
|
heap
|
page read and write
|
||
355D000
|
heap
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
28F7000
|
direct allocation
|
page read and write
|
||
3933000
|
trusted library allocation
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
||
357E000
|
heap
|
page read and write
|
||
1E710B30000
|
heap
|
page read and write
|
||
3581000
|
heap
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
3656000
|
heap
|
page read and write
|
||
2BF29F97000
|
heap
|
page read and write
|
||
355C000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
BD4D27B000
|
stack
|
page read and write
|
||
1F4E000
|
stack
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
3D44000
|
direct allocation
|
page read and write
|
||
294F000
|
direct allocation
|
page read and write
|
||
1389000
|
heap
|
page read and write
|
||
37E3000
|
heap
|
page read and write
|
||
137A000
|
heap
|
page read and write
|
||
35D9000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
275F000
|
stack
|
page read and write
|
||
2C9C000
|
direct allocation
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
1438000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
2982000
|
direct allocation
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
95A000
|
heap
|
page read and write
|
||
FD2000
|
heap
|
page read and write
|
||
2DC3000
|
direct allocation
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
11EA2761000
|
heap
|
page read and write
|
||
2BF4000
|
direct allocation
|
page read and write
|
||
21000
|
unkown
|
page execute read
|
||
972000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
14C6000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
2BCE71E000
|
stack
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
357E000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
21154540000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
35FE000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
B20000
|
unkown
|
page readonly
|
||
21154610000
|
heap
|
page read and write
|
||
28FF000
|
direct allocation
|
page read and write
|
||
285E2D2D000
|
heap
|
page read and write
|
||
357E000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
39E0000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
104C000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
24F3000
|
direct allocation
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
24FA000
|
direct allocation
|
page read and write
|
||
28F0000
|
direct allocation
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
3657000
|
heap
|
page read and write
|
||
3704000
|
heap
|
page read and write
|
||
4120000
|
direct allocation
|
page read and write
|
||
2D56000
|
direct allocation
|
page read and write
|
||
104F000
|
heap
|
page read and write
|
||
1B4E000
|
stack
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
11EA2640000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
179C6470000
|
heap
|
page read and write
|
||
40E0000
|
direct allocation
|
page read and write
|
||
357E000
|
heap
|
page read and write
|
||
173DAEE5000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
124D000
|
heap
|
page read and write
|
||
285E2D31000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
BE1000
|
unkown
|
page readonly
|
||
345D000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
378E000
|
stack
|
page read and write
|
||
3704000
|
heap
|
page read and write
|
||
BF5000
|
unkown
|
page readonly
|
||
104C000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
1FF1E9DE000
|
heap
|
page read and write
|
||
F4E000
|
stack
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
2B80000
|
direct allocation
|
page read and write
|
||
2073703C000
|
heap
|
page read and write
|
||
29BC000
|
direct allocation
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
20965245000
|
heap
|
page read and write
|
||
37E6000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
12CF000
|
heap
|
page read and write
|
||
347E000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
2D7B000
|
direct allocation
|
page read and write
|
||
BD4D3FF000
|
stack
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
104C000
|
heap
|
page read and write
|
||
367A000
|
heap
|
page read and write
|
||
357E000
|
heap
|
page read and write
|
||
347E000
|
heap
|
page read and write
|
||
258F000
|
direct allocation
|
page read and write
|
||
2CAA000
|
direct allocation
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
963000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
FAE000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
35CE000
|
stack
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
3581000
|
heap
|
page read and write
|
||
54FF000
|
stack
|
page read and write
|
||
FAE000
|
heap
|
page read and write
|
||
37E0000
|
heap
|
page read and write
|
||
2073703C000
|
heap
|
page read and write
|
||
357E000
|
heap
|
page read and write
|
||
FD2000
|
heap
|
page read and write
|
||
36E1000
|
heap
|
page read and write
|
||
12DE000
|
heap
|
page read and write
|
||
FD2000
|
heap
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
296B000
|
direct allocation
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
3CA5FFE000
|
stack
|
page read and write
|
||
FA0000
|
unkown
|
page readonly
|
||
1DA0858B000
|
heap
|
page read and write
|
||
1DA08595000
|
heap
|
page read and write
|
||
BB5000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
347E000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
18DF000
|
stack
|
page read and write
|
||
B976FF000
|
stack
|
page read and write
|
||
2998000
|
direct allocation
|
page read and write
|
||
4020000
|
direct allocation
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
1271000
|
heap
|
page read and write
|
||
1FF1E9DF000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
285E2D2D000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
14B6000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
29A6000
|
direct allocation
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
104F000
|
heap
|
page read and write
|
||
36E1000
|
heap
|
page read and write
|
||
3B20000
|
direct allocation
|
page read and write
|
||
FA1000
|
unkown
|
page execute read
|
||
BED000
|
unkown
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
374F000
|
stack
|
page read and write
|
||
95A000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
29D1000
|
direct allocation
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
11EA2660000
|
heap
|
page read and write
|
||
1088000
|
heap
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
2C1E000
|
direct allocation
|
page read and write
|
||
13ED000
|
heap
|
page read and write
|
||
179C622B000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
2507000
|
direct allocation
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
355D000
|
heap
|
page read and write
|
||
173DAEEA000
|
heap
|
page read and write
|
||
F8E192C000
|
stack
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
3CA62FF000
|
stack
|
page read and write
|
||
96A000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
20737029000
|
heap
|
page read and write
|
||
4045D7F000
|
stack
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
2C94000
|
direct allocation
|
page read and write
|
||
1FF1E9B6000
|
heap
|
page read and write
|
||
FAE000
|
heap
|
page read and write
|
||
CE9000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
1FF1EAA0000
|
heap
|
page read and write
|
||
3D98000
|
direct allocation
|
page read and write
|
||
13BF000
|
heap
|
page read and write
|
||
1049000
|
unkown
|
page write copy
|
||
355D000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
3581000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
E164B2E000
|
stack
|
page read and write
|
||
3704000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
3657000
|
heap
|
page read and write
|
||
32A0000
|
heap
|
page read and write
|
||
347E000
|
heap
|
page read and write
|
||
13B9000
|
heap
|
page read and write
|
||
D61000
|
heap
|
page read and write
|
||
355D000
|
heap
|
page read and write
|
||
357E000
|
heap
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
FCF000
|
heap
|
page read and write
|
||
429F000
|
stack
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
2C10000
|
direct allocation
|
page read and write
|
||
B79000
|
heap
|
page read and write
|
||
367A000
|
heap
|
page read and write
|
||
6CB000
|
stack
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
FAE000
|
heap
|
page read and write
|
||
35DA000
|
heap
|
page read and write
|
||
11EA2771000
|
heap
|
page read and write
|
||
1E710DE5000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
DBD0E7C000
|
stack
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
B9747B000
|
stack
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page execute and read and write
|
||
E60000
|
heap
|
page read and write
|
||
FAE000
|
heap
|
page read and write
|
||
3657000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
357E000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
179C6220000
|
heap
|
page read and write
|
||
2BF2A190000
|
heap
|
page read and write
|
||
B21000
|
unkown
|
page execute read
|
||
140D000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
BF1000
|
unkown
|
page write copy
|
||
33E1000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
E91000
|
unkown
|
page execute read
|
||
980000
|
heap
|
page read and write
|
||
104F000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
20736EC0000
|
heap
|
page read and write
|
||
2C2D000
|
direct allocation
|
page read and write
|
||
2C01000
|
direct allocation
|
page read and write
|
||
173DADE0000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
14BC000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
1E710B10000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
2536000
|
direct allocation
|
page read and write
|
||
2DAD000
|
direct allocation
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
3581000
|
heap
|
page read and write
|
||
FCF000
|
heap
|
page read and write
|
||
1FF1E9C8000
|
heap
|
page read and write
|
||
3657000
|
heap
|
page read and write
|
||
36E1000
|
heap
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
104C000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
347E000
|
heap
|
page read and write
|
||
95E000
|
heap
|
page read and write
|
||
20964EF7000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
1580000
|
heap
|
page read and write
|
||
20964E70000
|
heap
|
page read and write
|
||
11EA2771000
|
heap
|
page read and write
|
||
2D4F000
|
direct allocation
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
11EA2771000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
367A000
|
heap
|
page read and write
|
||
2BF2A170000
|
heap
|
page read and write
|
||
985000
|
heap
|
page read and write
|
||
11EA277F000
|
heap
|
page read and write
|
||
38DE000
|
stack
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
DAE000
|
heap
|
page read and write
|
||
2500000
|
direct allocation
|
page read and write
|
||
2C3DAFF000
|
stack
|
page read and write
|
||
1FF1E960000
|
heap
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
1DA08597000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
2BF29F90000
|
heap
|
page read and write
|
||
13FE000
|
stack
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
2DD8000
|
direct allocation
|
page read and write
|
||
1DA08585000
|
heap
|
page read and write
|
||
2C3DA7C000
|
stack
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
357E000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
2C34000
|
direct allocation
|
page read and write
|
||
2D06000
|
direct allocation
|
page read and write
|
||
3657000
|
heap
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
928000
|
heap
|
page read and write
|
||
3704000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
1DA08595000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
6DA000
|
stack
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
14EC000
|
heap
|
page read and write
|
||
173DAEFB000
|
heap
|
page read and write
|
||
355D000
|
heap
|
page read and write
|
||
347E000
|
heap
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
3260000
|
direct allocation
|
page read and write
|
||
1150000
|
unkown
|
page write copy
|
||
1410000
|
heap
|
page read and write
|
||
2956000
|
direct allocation
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
95F000
|
heap
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
B9B000
|
stack
|
page read and write
|
||
D48000
|
heap
|
page read and write
|
||
2F8E000
|
stack
|
page read and write
|
||
37EC000
|
heap
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
FCF000
|
heap
|
page read and write
|
||
2572000
|
direct allocation
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
355D000
|
heap
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
2C69000
|
direct allocation
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
961000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
BD4D4FE000
|
stack
|
page read and write
|
||
D87000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
11EA277F000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
400C000
|
direct allocation
|
page read and write
|
||
355D000
|
heap
|
page read and write
|
||
367A000
|
heap
|
page read and write
|
||
FCF000
|
heap
|
page read and write
|
||
38E0000
|
trusted library allocation
|
page read and write
|
||
173DACE0000
|
heap
|
page read and write
|
||
285E2CA0000
|
heap
|
page read and write
|
||
24D56EA0000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
EEB000
|
stack
|
page read and write
|
||
89E000
|
stack
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
24D56F80000
|
heap
|
page read and write
|
||
347E000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
2D3F000
|
direct allocation
|
page read and write
|
||
29D8000
|
direct allocation
|
page read and write
|
||
21154560000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
104F000
|
heap
|
page read and write
|
||
2C4B000
|
direct allocation
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
3B30000
|
direct allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
1120000
|
unkown
|
page read and write
|
||
11EA277F000
|
heap
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
3704000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
36E1000
|
heap
|
page read and write
|
||
7F850000
|
direct allocation
|
page read and write
|
||
1FF1E880000
|
heap
|
page read and write
|
||
36E4000
|
direct allocation
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
FCF000
|
stack
|
page read and write
|
||
36E1000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
1DA08599000
|
heap
|
page read and write
|
||
173DAEEA000
|
heap
|
page read and write
|
||
12FE000
|
heap
|
page read and write
|
||
20737028000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
1114000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
3CA63FE000
|
stack
|
page read and write
|
||
1DA085AD000
|
heap
|
page read and write
|
||
265E000
|
stack
|
page read and write
|
||
285E2D09000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
1057000
|
unkown
|
page readonly
|
||
1410000
|
heap
|
page read and write
|
||
347E000
|
heap
|
page read and write
|
||
13ED000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
3B30000
|
direct allocation
|
page read and write
|
||
E164BAE000
|
stack
|
page read and write
|
||
1410000
|
heap
|
page execute and read and write
|
||
140D000
|
heap
|
page read and write
|
||
357E000
|
heap
|
page read and write
|
||
1FF1E990000
|
heap
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
285E2D34000
|
heap
|
page read and write
|
||
1FF1E9DE000
|
heap
|
page read and write
|
||
13E1000
|
heap
|
page read and write
|
||
F8B314C000
|
stack
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
285E2D0D000
|
heap
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
355D000
|
heap
|
page read and write
|
||
2D5000
|
unkown
|
page read and write
|
||
173DAEB0000
|
heap
|
page read and write
|
||
21154615000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
415E000
|
stack
|
page read and write
|
||
1465000
|
heap
|
page read and write
|
||
24D57010000
|
heap
|
page read and write
|
||
3DC4000
|
direct allocation
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
1FF1E9DE000
|
heap
|
page read and write
|
||
1396000
|
heap
|
page read and write
|
||
1157000
|
unkown
|
page readonly
|
||
1421000
|
heap
|
page read and write
|
||
36B2000
|
direct allocation
|
page read and write
|
||
357E000
|
heap
|
page read and write
|
||
FCF000
|
heap
|
page read and write
|
||
43DC000
|
stack
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
1DA085AD000
|
heap
|
page read and write
|
||
36E1000
|
heap
|
page read and write
|
||
FD2000
|
heap
|
page read and write
|
||
347E000
|
heap
|
page read and write
|
||
7F86B000
|
direct allocation
|
page read and write
|
||
1FF1E9B5000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
B20000
|
unkown
|
page readonly
|
||
1410000
|
heap
|
page read and write
|
||
36E1000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
3330000
|
trusted library allocation
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
173DAEE7000
|
heap
|
page read and write
|
||
FAE000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
3581000
|
heap
|
page read and write
|
||
FEA000
|
stack
|
page read and write
|
||
2D47000
|
direct allocation
|
page read and write
|
||
290D000
|
direct allocation
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
36D9000
|
direct allocation
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
355D000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
E90000
|
unkown
|
page readonly
|
||
347E000
|
heap
|
page read and write
|
||
104C000
|
heap
|
page read and write
|
||
1FF1E9E0000
|
heap
|
page read and write
|
||
13E1000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
347E000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
285E2D2D000
|
heap
|
page read and write
|
||
37E1000
|
heap
|
page read and write
|
||
357E000
|
heap
|
page read and write
|
||
2115444B000
|
heap
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
3913000
|
trusted library allocation
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
2C7F000
|
direct allocation
|
page read and write
|
||
347E000
|
heap
|
page read and write
|
||
104F000
|
heap
|
page read and write
|
||
978000
|
heap
|
page read and write
|
||
355C000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
3581000
|
heap
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
FAE000
|
heap
|
page read and write
|
||
3581000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
11EA2935000
|
heap
|
page read and write
|
||
104F000
|
heap
|
page read and write
|
||
B9757F000
|
stack
|
page read and write
|
||
357E000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
37E0000
|
heap
|
page read and write
|
||
2CF0000
|
direct allocation
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
355C000
|
heap
|
page read and write
|
||
405C000
|
direct allocation
|
page read and write
|
||
28E9000
|
direct allocation
|
page read and write
|
||
1478000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
104C000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
1427000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
1DA084F0000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
FAE000
|
heap
|
page read and write
|
||
F8E000
|
stack
|
page read and write
|
||
2D9F000
|
direct allocation
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
DBD0EFF000
|
stack
|
page read and write
|
||
13DE000
|
stack
|
page read and write
|
||
3657000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
37A0000
|
heap
|
page read and write
|
||
37E1000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
355D000
|
heap
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
157F000
|
stack
|
page read and write
|
||
B3A000
|
stack
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
1055000
|
unkown
|
page write copy
|
||
140D000
|
heap
|
page read and write
|
||
3581000
|
heap
|
page read and write
|
||
355D000
|
heap
|
page read and write
|
||
3CA637E000
|
stack
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
36E1000
|
heap
|
page read and write
|
||
29B4000
|
direct allocation
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
3DB9000
|
direct allocation
|
page read and write
|
||
104C000
|
unkown
|
page read and write
|
||
25B3000
|
direct allocation
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
104F000
|
heap
|
page read and write
|
||
104F000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
EFC000
|
stack
|
page read and write
|
||
E60BAFF000
|
stack
|
page read and write
|
||
24EB000
|
direct allocation
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
2490000
|
direct allocation
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
3657000
|
heap
|
page read and write
|
||
972000
|
heap
|
page read and write
|
||
291B000
|
direct allocation
|
page read and write
|
||
FED000
|
stack
|
page read and write
|
||
F8E1C7F000
|
stack
|
page read and write
|
||
2D31000
|
direct allocation
|
page read and write
|
||
1052000
|
unkown
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
113E000
|
unkown
|
page write copy
|
||
24D5701B000
|
heap
|
page read and write
|
||
14C2000
|
heap
|
page read and write
|
||
104F000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
6EC000
|
stack
|
page read and write
|
||
12EA000
|
heap
|
page read and write
|
||
14B6000
|
heap
|
page read and write
|
||
226000
|
unkown
|
page execute read
|
||
104F000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
357E000
|
heap
|
page read and write
|
||
11EA2930000
|
heap
|
page read and write
|
||
1DA087B5000
|
heap
|
page read and write
|
||
35DF000
|
stack
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
1FF1E9CD000
|
heap
|
page read and write
|
||
979000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
4201000
|
direct allocation
|
page read and write
|
||
459000
|
remote allocation
|
page execute and read and write
|
||
29C3000
|
direct allocation
|
page read and write
|
||
3A45000
|
direct allocation
|
page read and write
|
||
2DD1000
|
direct allocation
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
37ED000
|
heap
|
page read and write
|
||
7DE000
|
stack
|
page read and write
|
||
36BD000
|
direct allocation
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
24E4000
|
direct allocation
|
page read and write
|
||
11EA2730000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
3A42000
|
direct allocation
|
page read and write
|
||
2DA6000
|
direct allocation
|
page read and write
|
||
E164E7F000
|
stack
|
page read and write
|
||
255B000
|
direct allocation
|
page read and write
|
||
2990000
|
direct allocation
|
page read and write
|
||
1472000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
37E6000
|
heap
|
page read and write
|
||
3657000
|
heap
|
page read and write
|
||
3B40000
|
direct allocation
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
1140000
|
unkown
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
2CB000
|
unkown
|
page execute read
|
||
1410000
|
heap
|
page read and write
|
||
173DADC0000
|
heap
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
1DA085AE000
|
heap
|
page read and write
|
||
3581000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
125E000
|
heap
|
page read and write
|
||
20736FA0000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
2906000
|
direct allocation
|
page read and write
|
||
37D0000
|
heap
|
page read and write
|
||
24A1000
|
direct allocation
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
971000
|
heap
|
page read and write
|
||
BB9000
|
heap
|
page read and write
|
||
E70000
|
direct allocation
|
page execute and read and write
|
||
1410000
|
heap
|
page read and write
|
||
3B4B000
|
direct allocation
|
page read and write
|
||
11EA275B000
|
heap
|
page read and write
|
||
2073703C000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
13ED000
|
heap
|
page read and write
|
||
3657000
|
heap
|
page read and write
|
||
12F2000
|
heap
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
2CB8000
|
direct allocation
|
page read and write
|
||
BE1000
|
unkown
|
page readonly
|
||
3260000
|
direct allocation
|
page read and write
|
||
1FF1E9B5000
|
heap
|
page read and write
|
||
FCF000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
21154350000
|
heap
|
page read and write
|
||
100F000
|
stack
|
page read and write
|
||
24A3000
|
direct allocation
|
page read and write
|
||
3581000
|
heap
|
page read and write
|
||
F8E19AF000
|
stack
|
page read and write
|
||
12F7000
|
heap
|
page read and write
|
||
179C6110000
|
heap
|
page read and write
|
||
FD2000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
285E2D08000
|
heap
|
page read and write
|
||
FAE000
|
heap
|
page read and write
|
||
104F000
|
heap
|
page read and write
|
||
11EA2761000
|
heap
|
page read and write
|
||
43A6000
|
direct allocation
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
FAE000
|
heap
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
956000
|
heap
|
page read and write
|
||
143B000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
BED000
|
unkown
|
page write copy
|
||
12DA000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
355D000
|
heap
|
page read and write
|
||
F8B347F000
|
stack
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
253D000
|
direct allocation
|
page read and write
|
||
2CE9000
|
direct allocation
|
page read and write
|
||
104F000
|
heap
|
page read and write
|
||
3581000
|
heap
|
page read and write
|
||
4045C7C000
|
stack
|
page read and write
|
||
357E000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
367A000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
DAC000
|
heap
|
page read and write
|
||
24D57265000
|
heap
|
page read and write
|
||
14BC000
|
heap
|
page read and write
|
||
BD4D2FE000
|
stack
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
347E000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
3D18000
|
direct allocation
|
page read and write
|
||
13EB000
|
heap
|
page execute and read and write
|
||
1DA08585000
|
heap
|
page read and write
|
||
1E710DE0000
|
heap
|
page read and write
|
||
FAE000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
2511000
|
direct allocation
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
3657000
|
heap
|
page read and write
|
||
2BF2A090000
|
heap
|
page read and write
|
||
9FA000
|
heap
|
page read and write
|
||
3581000
|
heap
|
page read and write
|
||
1FF1EAB0000
|
heap
|
page read and write
|
||
2BC6000
|
direct allocation
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
20736FF8000
|
heap
|
page read and write
|
||
4137000
|
direct allocation
|
page read and write
|
||
355C000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
173DAEDB000
|
heap
|
page read and write
|
||
104C000
|
heap
|
page read and write
|
||
179C6227000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
104F000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
3B50000
|
heap
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
E164EFE000
|
stack
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
3C6F000
|
stack
|
page read and write
|
||
400C000
|
direct allocation
|
page read and write
|
||
14C2000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
1FF1E9A7000
|
heap
|
page read and write
|
||
2CE000
|
unkown
|
page read and write
|
||
963000
|
heap
|
page read and write
|
||
1E710B37000
|
heap
|
page read and write
|
||
2947000
|
direct allocation
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
BD4D37E000
|
stack
|
page read and write
|
||
355C000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
952000
|
heap
|
page read and write
|
||
42DC000
|
stack
|
page read and write
|
||
104C000
|
heap
|
page read and write
|
||
3581000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
28DA000
|
direct allocation
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
1DA08568000
|
heap
|
page read and write
|
||
9FA000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
2BBF000
|
direct allocation
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
147E000
|
stack
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
2D65000
|
direct allocation
|
page read and write
|
||
355C000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
3E6000
|
stack
|
page read and write
|
||
1100000
|
unkown
|
page read and write
|
||
37E1000
|
heap
|
page read and write
|
||
A38000
|
stack
|
page read and write
|
||
3B54000
|
direct allocation
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
CE5000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
2923000
|
direct allocation
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
D7E000
|
heap
|
page read and write
|
||
20736FF0000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
355C000
|
heap
|
page read and write
|
||
357E000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
B21000
|
unkown
|
page execute read
|
||
347E000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
FAE000
|
heap
|
page read and write
|
||
347E000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
36E1000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
405E000
|
stack
|
page read and write
|
||
B1E000
|
stack
|
page read and write
|
||
2D89000
|
direct allocation
|
page read and write
|
||
2931000
|
direct allocation
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
1DA085B0000
|
heap
|
page read and write
|
||
2C26000
|
direct allocation
|
page read and write
|
||
2DB4000
|
direct allocation
|
page read and write
|
||
2CE2000
|
direct allocation
|
page read and write
|
||
1FF1E997000
|
heap
|
page read and write
|
||
427C000
|
direct allocation
|
page read and write
|
||
DAE000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
2BF2A2C0000
|
heap
|
page read and write
|
||
12DF000
|
stack
|
page read and write
|
||
42C0000
|
direct allocation
|
page read and write
|
||
25BA000
|
direct allocation
|
page read and write
|
||
11EA2738000
|
heap
|
page read and write
|
||
11B7000
|
unkown
|
page readonly
|
||
1410000
|
heap
|
page read and write
|
||
2D38000
|
direct allocation
|
page read and write
|
||
2BC0000
|
trusted library allocation
|
page read and write
|
||
2073701B000
|
heap
|
page read and write
|
||
2938000
|
direct allocation
|
page read and write
|
||
94D000
|
heap
|
page read and write
|
||
29CA000
|
direct allocation
|
page read and write
|
||
1E710B3B000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
355D000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
1FF1E9C7000
|
heap
|
page read and write
|
||
347E000
|
heap
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
355C000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
3657000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
173DB180000
|
heap
|
page read and write
|
||
BBD000
|
unkown
|
page readonly
|
||
3053000
|
heap
|
page read and write
|
||
C53000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
DBD0F7F000
|
stack
|
page read and write
|
||
93287B000
|
stack
|
page read and write
|
||
2C44000
|
direct allocation
|
page read and write
|
||
1FF1EAA5000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
3AA4000
|
direct allocation
|
page read and write
|
||
43AA000
|
direct allocation
|
page read and write
|
||
2914000
|
direct allocation
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
3581000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
40E0000
|
direct allocation
|
page read and write
|
||
1DA08410000
|
heap
|
page read and write
|
||
285E2CE0000
|
heap
|
page read and write
|
||
3CA5F7B000
|
stack
|
page read and write
|
||
1052000
|
unkown
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
24AD000
|
direct allocation
|
page read and write
|
||
D5F000
|
stack
|
page read and write
|
||
173DAED5000
|
heap
|
page read and write
|
||
3704000
|
heap
|
page read and write
|
||
173DAEB8000
|
heap
|
page read and write
|
||
13E9000
|
heap
|
page read and write
|
||
3A20000
|
direct allocation
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
FAE000
|
heap
|
page read and write
|
||
319D000
|
stack
|
page read and write
|
||
1381000
|
heap
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
B5E000
|
stack
|
page read and write
|
||
38ED000
|
trusted library allocation
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
367A000
|
heap
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
20965240000
|
heap
|
page read and write
|
||
347E000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
347E000
|
heap
|
page read and write
|
||
3D2D000
|
stack
|
page read and write
|
||
2BA2000
|
direct allocation
|
page read and write
|
||
963000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
2BB8000
|
direct allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
297D000
|
direct allocation
|
page read and write
|
||
347E000
|
heap
|
page read and write
|
||
972000
|
heap
|
page read and write
|
||
179C61F0000
|
heap
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
17DE000
|
stack
|
page read and write
|
||
2D1B000
|
direct allocation
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
24DD000
|
direct allocation
|
page read and write
|
||
2D98000
|
direct allocation
|
page read and write
|
||
252E000
|
direct allocation
|
page read and write
|
||
FAE000
|
heap
|
page read and write
|
||
BF5000
|
unkown
|
page readonly
|
||
D1E000
|
stack
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
1FF1E9DE000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
3657000
|
heap
|
page read and write
|
||
2B90000
|
direct allocation
|
page read and write
|
||
1DA08510000
|
heap
|
page read and write
|
||
2564000
|
direct allocation
|
page read and write
|
||
2BB0000
|
direct allocation
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
D9F000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
2CF7000
|
direct allocation
|
page read and write
|
||
36FD000
|
direct allocation
|
page read and write
|
||
2C8D000
|
direct allocation
|
page read and write
|
||
2D0000
|
unkown
|
page write copy
|
||
36E1000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
24CF000
|
direct allocation
|
page read and write
|
||
2554000
|
direct allocation
|
page read and write
|
||
20964EFB000
|
heap
|
page read and write
|
||
44D0000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
1E710B00000
|
heap
|
page read and write
|
||
FCF000
|
heap
|
page read and write
|
||
401E000
|
stack
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
1DA08595000
|
heap
|
page read and write
|
||
FFF000
|
stack
|
page read and write
|
||
3704000
|
heap
|
page read and write
|
||
130B000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
2C3D000
|
direct allocation
|
page read and write
|
||
355C000
|
heap
|
page read and write
|
||
2E7000
|
unkown
|
page readonly
|
||
13EC000
|
heap
|
page read and write
|
||
2CCA000
|
direct allocation
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
104C000
|
heap
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
173DAEEA000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
2BCE69B000
|
stack
|
page read and write
|
||
1FF1E9CD000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
357E000
|
heap
|
page read and write
|
||
9FA000
|
heap
|
page read and write
|
||
285E2CE9000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
24D6000
|
direct allocation
|
page read and write
|
||
BBD000
|
unkown
|
page readonly
|
||
140D000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
DCE000
|
heap
|
page read and write
|
||
285E2CA5000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
2D90000
|
direct allocation
|
page read and write
|
||
35FB000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
1FF1E9BB000
|
heap
|
page read and write
|
||
4020000
|
direct allocation
|
page read and write
|
||
2C70000
|
direct allocation
|
page read and write
|
||
285E2D19000
|
heap
|
page read and write
|
||
1DA08586000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
1059000
|
unkown
|
page readonly
|
||
2D5000
|
unkown
|
page write copy
|
||
104F000
|
unkown
|
page read and write
|
||
104F000
|
heap
|
page read and write
|
||
36E1000
|
heap
|
page read and write
|
||
B68000
|
heap
|
page read and write
|
||
BF5000
|
unkown
|
page readonly
|
||
345D000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
946000
|
heap
|
page read and write
|
||
2CE000
|
unkown
|
page write copy
|
||
33E1000
|
heap
|
page read and write
|
||
14FE000
|
stack
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
292A000
|
direct allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
FAE000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
2D0D000
|
direct allocation
|
page read and write
|
||
347E000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
96B000
|
heap
|
page read and write
|
||
13BC000
|
heap
|
page read and write
|
||
3E6D000
|
direct allocation
|
page read and write
|
||
FDF000
|
stack
|
page read and write
|
||
2C78000
|
direct allocation
|
page read and write
|
||
CDE000
|
stack
|
page read and write
|
||
2BDB000
|
direct allocation
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
2504000
|
direct allocation
|
page read and write
|
||
3704000
|
heap
|
page read and write
|
||
1155000
|
unkown
|
page readonly
|
||
256B000
|
direct allocation
|
page read and write
|
||
20964E40000
|
heap
|
page read and write
|
||
3C000
|
unkown
|
page execute read
|
||
13EC000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
3581000
|
heap
|
page read and write
|
||
2BF2A2C5000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
9329FF000
|
stack
|
page read and write
|
||
29AD000
|
direct allocation
|
page read and write
|
||
3E77000
|
direct allocation
|
page read and write
|
||
104F000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
179C6475000
|
heap
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
3581000
|
heap
|
page read and write
|
||
347E000
|
heap
|
page read and write
|
||
309D000
|
stack
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
1DA08560000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
1357000
|
heap
|
page read and write
|
||
DAE000
|
heap
|
page read and write
|
||
4120000
|
direct allocation
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
104F000
|
heap
|
page read and write
|
||
104C000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
DAE000
|
heap
|
page read and write
|
||
35FE000
|
heap
|
page read and write
|
||
93D000
|
heap
|
page read and write
|
||
20736FC0000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
1DA087B0000
|
heap
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
357E000
|
heap
|
page read and write
|
||
3581000
|
heap
|
page read and write
|
||
9FA000
|
heap
|
page read and write
|
||
285E2B80000
|
heap
|
page read and write
|
||
3657000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
2C54000
|
direct allocation
|
page read and write
|
||
1417000
|
heap
|
page read and write
|
||
1471000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
24D57018000
|
heap
|
page read and write
|
||
104B000
|
unkown
|
page read and write
|
||
2CB1000
|
direct allocation
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
3DB6000
|
direct allocation
|
page read and write
|
||
24C8000
|
direct allocation
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
FD2000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
E164AAB000
|
stack
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
104C000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
285E2C60000
|
heap
|
page read and write
|
There are 1462 hidden memdumps, click here to show them.