Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_c53b2fc9a1ffa4aae2b84b74286e467c848ba0_440dec59_054230ad\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_c53b2fc9a1ffa4aae2b84b74286e467c848ba0_440dec59_06fdd724\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_c53b2fc9a1ffa4aae2b84b74286e467c848ba0_440dec59_0831a7e6\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_c53b2fc9a1ffa4aae2b84b74286e467c848ba0_440dec59_0ba59066\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_c53b2fc9a1ffa4aae2b84b74286e467c848ba0_440dec59_10519f99\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_c53b2fc9a1ffa4aae2b84b74286e467c848ba0_440dec59_1209c12b\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_c53b2fc9a1ffa4aae2b84b74286e467c848ba0_440dec59_121597e8\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_c53b2fc9a1ffa4aae2b84b74286e467c848ba0_440dec59_1745ca23\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_c53b2fc9a1ffa4aae2b84b74286e467c848ba0_440dec59_17858673\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_e5c8e0fd69b3d1364c1ea6934df3966ffe947bd_440dec59_140eaddc\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\G62TDH9B\soft[1]
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\gVbgwXdNtgMn\Bunifu_UI_v1.5.3.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\gVbgwXdNtgMn\Cleaner.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_05057d34\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_0789c3c3\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_0fa97499\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_0fb9b83a\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_14062c50\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_1431a86b\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_17918727\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_17c5cdc5\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_17e1912a\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_83ec7e94952b3dcbb61bd30e98682b9f65d64_440dec59_0e4aaad7\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4PB7FJMT\soft[1]
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\dll[1]
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\6clvSx8en71SUl1hUuzQ6n56lWM0\Bunifu_UI_v1.5.3.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\6clvSx8en71SUl1hUuzQ6n56lWM0\Cleaner.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2CC5.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:42:39 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2FB4.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3052.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8385.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:41:55 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER857A.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8618.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8D78.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:41:58 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8F6D.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER900A.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER94FA.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:42:00 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER96EF.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER978C.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9C6C.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:42:02 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9EA0.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9F2D.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA536.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:42:04 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA72B.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA78A.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA939.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:43:11 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERACE3.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAD52.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB6DA.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:42:10 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC060.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC0CF.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC5CE.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:42:12 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC8FC.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC989.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD2AF.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:42:16 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD5FC.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD699.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3Y2ADQKS\dll[1]
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3Y2ADQKS\library[1].htm
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3Y2ADQKS\ping[1].htm
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9QTQHWWN\fuckingdllENCR[1].dll
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9QTQHWWN\ping[1].htm
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\G62TDH9B\library[1].htm
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OTUW0Q90\ping[1].htm
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\Desktop\Cleaner.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Icon
number=0, Archive, ctime=Mon Oct 3 23:42:37 2022, mtime=Mon Oct 3 23:42:37 2022, atime=Mon Oct 3 23:42:37 2022, length=3947920,
window=hide
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER276E.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:30:19 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2A00.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2ACC.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER70B1.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:32 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER72A6.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7334.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER790E.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:35 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7B03.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7BA0.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8245.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:37 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER84A8.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8545.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8C48.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:40 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8E7B.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8F09.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER957F.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:43 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9D7F.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA4CC.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:30:52 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA550.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA77D.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA849.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB28D.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:50 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB608.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB6A5.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBE54.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:53 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC1DF.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC26D.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC980.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:55 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCC01.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCC9E.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4PB7FJMT\library[1].htm
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\fuckingdllENCR[1].dll
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\ping[1].htm
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NUEPGTR9\ping[1].htm
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\library[1].htm
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\ping[1].htm
|
very short file (no magic)
|
dropped
|
There are 92 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
C:\Users\user\Desktop\file.exe
|
||
C:\Users\user\AppData\Local\Temp\gVbgwXdNtgMn\Cleaner.exe
|
"C:\Users\user\AppData\Local\Temp\gVbgwXdNtgMn\Cleaner.exe"
|
||
C:\Users\user\AppData\Local\Temp\6clvSx8en71SUl1hUuzQ6n56lWM0\Cleaner.exe
|
"C:\Users\user\AppData\Local\Temp\6clvSx8en71SUl1hUuzQ6n56lWM0\Cleaner.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6136 -s 532
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6136 -s 700
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6136 -s 700
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6136 -s 720
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6136 -s 776
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6136 -s 868
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6136 -s 880
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6136 -s 976
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6136 -s 1268
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\user\AppData\Local\Temp\gVbgwXdNtgMn\Cleaner.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6136 -s 1556
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c taskkill /im "file.exe" /f & erase "C:\Users\user\Desktop\file.exe" & exit
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /im "file.exe" /f
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 528
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 700
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 724
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 760
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 768
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 848
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 840
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 1032
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 1292
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\user\AppData\Local\Temp\6clvSx8en71SUl1hUuzQ6n56lWM0\Cleaner.exe
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 1552
|
There are 19 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://208.67.104.97/powfhxhxcjzx/ping.php?sub=NOSUB&stream=start&substream=mixinte
|
208.67.104.97
|
||
http://208.67.104.97/powfhxhxcjzx/ping.php?sub=NOSUB&stream=mixtwo&substream=mixinte
|
208.67.104.97
|
||
http://208.67.104.97/powfhxhxcjzx/ping.php?sub=NOSUB&stream=start&substream=mixinteIN
|
unknown
|
||
http://85.31.46.167/software.php
|
85.31.46.167
|
||
http://208.67.104.97/powfhxhxcjzx/ping.php?sub=NOSUB&stream=start&subst
|
unknown
|
||
http://171.22.30.106/library.php
|
171.22.30.106
|
||
http://www.fontbureau.com/designersG
|
unknown
|
||
http://www.fontbureau.com/designers/?
|
unknown
|
||
http://www.founder.com.cn/cn/bThe
|
unknown
|
||
http://ctldl.windowsup
|
unknown
|
||
http://www.fontbureau.com/designers?
|
unknown
|
||
http://www.fontbureau.comitu8
|
unknown
|
||
https://take.rdrct-now.online/go/ZWKA?p78705p298845p1174
|
unknown
|
||
http://www.tiro.com
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
http://www.goodfont.co.kr
|
unknown
|
||
http://www.carterandcone.com
|
unknown
|
||
http://www.fontbureau.com/designersiva
|
unknown
|
||
http://www.sakkal.comx
|
unknown
|
||
http://www.carterandcone.com.
|
unknown
|
||
http://www.sajatypeworks.com
|
unknown
|
||
http://www.typography.netD
|
unknown
|
||
http://www.founder.com.cn/cn/cThe
|
unknown
|
||
http://www.sajatypeworks.comb.
|
unknown
|
||
http://www.galapagosdesign.com/staff/dennis.htm
|
unknown
|
||
http://fontfabrik.com
|
unknown
|
||
http://www.fontbureau.com.
|
unknown
|
||
http://www.jiyu-kobo.co.jp/.
|
unknown
|
||
http://www.galapagosdesign.com/DPlease
|
unknown
|
||
http://www.fonts.com
|
unknown
|
||
http://www.sandoll.co.kr
|
unknown
|
||
http://www.urwpp.deDPlease
|
unknown
|
||
http://www.urwpp.de
|
unknown
|
||
http://www.zhongyicts.com.cn
|
unknown
|
||
http://107.182.129.235/storage/ping.php
|
107.182.129.235
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.sakkal.com
|
unknown
|
||
http://www.typography.net.
|
unknown
|
||
http://www.fontbureau.comF.
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://www.fontbureau.com
|
unknown
|
||
http://www.fontbureau.comH
|
unknown
|
||
http://www.zhongyicts.com.cno.X
|
unknown
|
||
http://www.fontbureau.comvaRegular
|
unknown
|
||
http://107.182.129.235/storage/extension.php
|
107.182.129.235
|
||
http://www.jiyu-kobo.co.jp/H
|
unknown
|
||
http://www.ccleaner.comqhttps://take.rdrct-now.online/go/ZWKA?p78705p298845p1174
|
unknown
|
||
http://www.jiyu-kobo.co.jp/jp/
|
unknown
|
||
https://iplogger.org
|
unknown
|
||
https://iplogger.orgx
|
unknown
|
||
http://www.carterandcone.coml
|
unknown
|
||
http://www.sandoll.co.kralRegular
|
unknown
|
||
http://www.fontbureau.com/designers/cabarga.htmlN
|
unknown
|
||
http://www.jiyu-kobo.co.jp/F.
|
unknown
|
||
http://www.typography.netTTF.
|
unknown
|
||
http://iplogger.org
|
unknown
|
||
http://www.founder.com.cn/cn
|
unknown
|
||
http://www.jiyu-kobo.co.jp/x
|
unknown
|
||
http://www.fontbureau.com/designers/frere-jones.html
|
unknown
|
||
http://www.fontbureau.com/designers/cabarga.html
|
unknown
|
||
http://www.founder.com.cn/cn8
|
unknown
|
||
https://g-cleanit.hk
|
unknown
|
||
http://www.jiyu-kobo.co.jp/
|
unknown
|
||
http://www.typography.netF.
|
unknown
|
||
http://www.zhongyicts.com.cno.
|
unknown
|
||
http://www.fontbureau.com/designers8
|
unknown
|
||
http://www.fontbureau.com/designers/cabarga.htmlll.
|
unknown
|
||
https://iplogger.org/1Pz8p7
|
148.251.234.83
|
||
http://www.fontbureau.com/designers/
|
unknown
|
||
http://www.jiyu-kobo.co.jp/ho
|
unknown
|
||
http://www.sajatypeworks.com-
|
unknown
|
||
http://www.sajatypeworks.como2
|
unknown
|
||
http://www.founder.com.cn/cn/cn
|
unknown
|
||
http://www.jiyu-kobo.co.jp/jp/ho
|
unknown
|
||
http://www.jiyu-kobo.co.jp/Y0ho
|
unknown
|
||
http://www.jiyu-kobo.co.jp/.T
|
unknown
|
||
http://www.zhongyicts.com.cn.TTF
|
unknown
|
||
http://www.fontbureau.com(
|
unknown
|
||
http://www.typography.net
|
unknown
|
||
http://www.sajatypeworks.comtr
|
unknown
|
||
http://www.fontbureau.com/designersp
|
unknown
|
||
http://www.fontbureau.com/designerso
|
unknown
|
||
http://www.jiyu-kobo.co.jp/.TTC
|
unknown
|
||
http://www.fontbureau.comH_
|
unknown
|
||
http://www.sakkal.comI
|
unknown
|
||
http://www.tiro.comq
|
unknown
|
||
http://www.jiyu-kobo.co.jp/F
|
unknown
|
||
http://www.sajatypeworks.comd:
|
unknown
|
||
http://www.founder.com.cn/cn/
|
unknown
|
||
http://www.typography.netad
|
unknown
|
||
http://www.sajatypeworks.comcom
|
unknown
|
||
http://www.monotype.9
|
unknown
|
There are 82 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
iplogger.org
|
148.251.234.83
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.67.104.97
|
unknown
|
United States
|
||
85.31.46.167
|
unknown
|
Germany
|
||
148.251.234.83
|
iplogger.org
|
Germany
|
||
107.182.129.235
|
unknown
|
Reserved
|
||
171.22.30.106
|
unknown
|
Germany
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
|
ProgramId
|
||
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
|
FileId
|
||
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
|
LowerCaseLongPath
|
||
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
|
LongPathHash
|
||
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
|
Name
|
||
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
|
Publisher
|
||
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
|
Version
|
||
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
|
BinFileVersion
|
||
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
|
BinaryType
|
||
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
|
ProductName
|
||
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
|
ProductVersion
|
||
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
|
LinkDate
|
||
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
|
BinProductVersion
|
||
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
|
Size
|
||
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
|
Language
|
||
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
|
IsPeFile
|
||
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
|
IsOsComponent
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
ProgramId
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
FileId
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
LowerCaseLongPath
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
LongPathHash
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
Name
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
Publisher
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
Version
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
BinFileVersion
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
BinaryType
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
ProductName
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
ProductVersion
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
LinkDate
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
BinProductVersion
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
Size
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
Language
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
IsPeFile
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
IsOsComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHivePermissionsCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHiveOwnerCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\Software\GCleaner\Trial
|
Count
|
||
HKEY_CURRENT_USER\Software\GCleaner\License
|
License
|
||
HKEY_CURRENT_USER\Software\GCleaner\Install
|
Postcheck
|
There are 44 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
21D0000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
21D0000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
21D0000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
21D0000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
21D0000
|
direct allocation
|
page execute and read and write
|
||
21D0000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
21D0000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
21D0000
|
direct allocation
|
page execute and read and write
|
||
21D0000
|
direct allocation
|
page execute and read and write
|
||
21D0000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
2210000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
21D0000
|
direct allocation
|
page execute and read and write
|
||
21D0000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
21D0000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
21D0000
|
direct allocation
|
page execute and read and write
|
||
21D0000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
21D0000
|
direct allocation
|
page execute and read and write
|
||
22E6B036000
|
heap
|
page read and write
|
||
38C0000
|
trusted library allocation
|
page read and write
|
||
22E6B062000
|
heap
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
22E6AEE0000
|
heap
|
page read and write
|
||
21F3C229000
|
heap
|
page read and write
|
||
5DE000
|
heap
|
page read and write
|
||
22E6B063000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
22E6B068000
|
heap
|
page read and write
|
||
21F3C269000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
6DE000
|
stack
|
page read and write
|
||
6DE000
|
stack
|
page read and write
|
||
22E6B260000
|
trusted library allocation
|
page read and write
|
||
22E6FA0F000
|
heap
|
page read and write
|
||
22E6FA57000
|
heap
|
page read and write
|
||
2EF6000
|
heap
|
page read and write
|
||
19510B90000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B026000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E68CF1000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6FAB3000
|
heap
|
page read and write
|
||
7FFCA0B80000
|
trusted library allocation
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6F31D000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B06F000
|
heap
|
page read and write
|
||
7C28CFE000
|
stack
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
22E6C253000
|
heap
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
22E6B070000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
19510C00000
|
heap
|
page read and write
|
||
22E6B030000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
1CE5E865000
|
heap
|
page read and write
|
||
22E6B5B5000
|
trusted library allocation
|
page read and write
|
||
22E6B07A000
|
heap
|
page read and write
|
||
37C9000
|
trusted library allocation
|
page read and write
|
||
21F3C313000
|
heap
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22BD000
|
stack
|
page read and write
|
||
3920000
|
trusted library allocation
|
page read and write
|
||
7FFCA0CA0000
|
trusted library allocation
|
page read and write
|
||
3733000
|
trusted library allocation
|
page read and write
|
||
24F0000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
246D000
|
stack
|
page read and write
|
||
22E68B8A000
|
heap
|
page read and write
|
||
22E6B5C0000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
||
22E6B03F000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
22E6B030000
|
heap
|
page read and write
|
||
22E6F670000
|
trusted library allocation
|
page read and write
|
||
19511800000
|
heap
|
page read and write
|
||
22E6B037000
|
heap
|
page read and write
|
||
275F56E000
|
stack
|
page read and write
|
||
22E6F633000
|
trusted library allocation
|
page read and write
|
||
22E6B025000
|
heap
|
page read and write
|
||
242E000
|
stack
|
page read and write
|
||
22E6C276000
|
heap
|
page read and write
|
||
22E6B069000
|
heap
|
page read and write
|
||
2975EE43000
|
heap
|
page read and write
|
||
22E6B03F000
|
heap
|
page read and write
|
||
8EF000
|
stack
|
page read and write
|
||
22E6B1F0000
|
trusted library allocation
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
19511754000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6F688000
|
trusted library allocation
|
page read and write
|
||
22E6B330000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6F321000
|
heap
|
page read and write
|
||
22E6B2A0000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
2E9517E000
|
stack
|
page read and write
|
||
22E6AE90000
|
unkown
|
page readonly
|
||
2FA0000
|
unkown
|
page readonly
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B063000
|
heap
|
page read and write
|
||
246D000
|
stack
|
page read and write
|
||
1CE5E85A000
|
heap
|
page read and write
|
||
22E6B03E000
|
heap
|
page read and write
|
||
22E6B3C0000
|
trusted library allocation
|
page read and write
|
||
222FC05D000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
22E6D130000
|
heap
|
page read and write
|
||
22E6B052000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3B66000
|
trusted library allocation
|
page read and write
|
||
19511602000
|
heap
|
page read and write
|
||
22E6B053000
|
heap
|
page read and write
|
||
22E6B03E000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6AEE1000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
24F0000
|
heap
|
page read and write
|
||
6DE000
|
stack
|
page read and write
|
||
22E6FA48000
|
heap
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
222FC058000
|
heap
|
page read and write
|
||
2C7D000
|
stack
|
page read and write
|
||
2320000
|
heap
|
page read and write
|
||
22E6B04A000
|
heap
|
page read and write
|
||
22E6B03B000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B069000
|
heap
|
page read and write
|
||
22E6B026000
|
heap
|
page read and write
|
||
22E6B066000
|
heap
|
page read and write
|
||
2ECE000
|
stack
|
page read and write
|
||
19511700000
|
heap
|
page read and write
|
||
2751A66A000
|
heap
|
page read and write
|
||
22E6B090000
|
trusted library allocation
|
page read and write
|
||
22E6B040000
|
trusted library allocation
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
663000
|
heap
|
page read and write
|
||
663000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
1CE5E861000
|
heap
|
page read and write
|
||
5B8000
|
heap
|
page execute and read and write
|
||
AFEB8FC000
|
stack
|
page read and write
|
||
22E6A6B0000
|
trusted library allocation
|
page read and write
|
||
22E6FA39000
|
heap
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
19510C73000
|
heap
|
page read and write
|
||
22E6B03B000
|
heap
|
page read and write
|
||
19510C89000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
22E6B042000
|
heap
|
page read and write
|
||
22E6AFF0000
|
trusted library allocation
|
page read and write
|
||
22E68BB9000
|
heap
|
page read and write
|
||
22E6CC5D000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
22E6CFEB000
|
trusted library allocation
|
page read and write
|
||
22E68D00000
|
trusted library allocation
|
page read and write
|
||
22E6A664000
|
trusted library allocation
|
page read and write
|
||
22E6B039000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
6DE000
|
stack
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B030000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
22E6C891000
|
trusted library allocation
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
3A28000
|
trusted library allocation
|
page read and write
|
||
5B8000
|
heap
|
page execute and read and write
|
||
22E6FA1E000
|
heap
|
page read and write
|
||
22E6C287000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
22E6C890000
|
trusted library allocation
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
22E6CC60000
|
trusted library allocation
|
page read and write
|
||
386E000
|
trusted library allocation
|
page read and write
|
||
222FC013000
|
heap
|
page read and write
|
||
22E6CC51000
|
trusted library allocation
|
page read and write
|
||
22E6B06C000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6C8C0000
|
trusted library allocation
|
page read and write
|
||
22E6B06B000
|
heap
|
page read and write
|
||
22E6B020000
|
heap
|
page read and write
|
||
22E6CC80000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6D0FC000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
2A2E000
|
unkown
|
page read and write
|
||
22E68D20000
|
heap
|
page read and write
|
||
22E0042A000
|
trusted library allocation
|
page read and write
|
||
22E6B06C000
|
heap
|
page read and write
|
||
22E6B025000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
3735000
|
trusted library allocation
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6C2B4000
|
heap
|
page read and write
|
||
22E6C970000
|
trusted library allocation
|
page read and write
|
||
22E6B075000
|
heap
|
page read and write
|
||
7C28AFF000
|
stack
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6C8C0000
|
trusted library allocation
|
page read and write
|
||
22E6C8D0000
|
trusted library allocation
|
page read and write
|
||
222FC062000
|
heap
|
page read and write
|
||
1CE5E84F000
|
heap
|
page read and write
|
||
22E6B062000
|
heap
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
22E68BB6000
|
heap
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
22E6B063000
|
heap
|
page read and write
|
||
22E6C990000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
2EF6000
|
heap
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
22E6CEF0000
|
trusted library allocation
|
page read and write
|
||
22E6B062000
|
heap
|
page read and write
|
||
22E6B063000
|
heap
|
page read and write
|
||
2EF6000
|
heap
|
page read and write
|
||
8EF000
|
stack
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B670000
|
trusted library allocation
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
22E6C21C000
|
heap
|
page read and write
|
||
7FFCA0B90000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6C8C0000
|
trusted library allocation
|
page read and write
|
||
22E6CFF6000
|
trusted library allocation
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
22E6CC51000
|
trusted library allocation
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
90F6AFF000
|
stack
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B03B000
|
heap
|
page read and write
|
||
22E6B03B000
|
heap
|
page read and write
|
||
25C0000
|
unkown
|
page readonly
|
||
1CE5E800000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22BD000
|
stack
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22BD000
|
stack
|
page read and write
|
||
22E6CC82000
|
trusted library allocation
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B070000
|
heap
|
page read and write
|
||
22E6C980000
|
trusted library allocation
|
page read and write
|
||
222FC100000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
A2C000
|
stack
|
page read and write
|
||
2E9547C000
|
stack
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B03B000
|
heap
|
page read and write
|
||
5AA000
|
heap
|
page read and write
|
||
22E6FE50000
|
trusted library allocation
|
page read and write
|
||
2250000
|
remote allocation
|
page read and write
|
||
22E6F62C000
|
trusted library allocation
|
page read and write
|
||
22E6B061000
|
heap
|
page read and write
|
||
22E6B04A000
|
heap
|
page read and write
|
||
22E6B160000
|
trusted library allocation
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
1CE5E760000
|
heap
|
page read and write
|
||
22E6FA4A000
|
heap
|
page read and write
|
||
22E6A700000
|
trusted library allocation
|
page read and write
|
||
22E6B6AC000
|
trusted library allocation
|
page read and write
|
||
22E6CC80000
|
trusted library allocation
|
page read and write
|
||
242E000
|
stack
|
page read and write
|
||
22E6A6C0000
|
trusted library allocation
|
page read and write
|
||
6DE000
|
stack
|
page read and write
|
||
22E6B061000
|
heap
|
page read and write
|
||
27EC3113000
|
heap
|
page read and write
|
||
24BD000
|
stack
|
page read and write
|
||
5AA000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
5B8000
|
heap
|
page execute and read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B03F000
|
heap
|
page read and write
|
||
22E6C8D0000
|
trusted library allocation
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
5DE000
|
heap
|
page read and write
|
||
22E6B030000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
22E6B06B000
|
heap
|
page read and write
|
||
22E6C971000
|
trusted library allocation
|
page read and write
|
||
1CE5E833000
|
heap
|
page read and write
|
||
5AA000
|
heap
|
page read and write
|
||
2ECE000
|
stack
|
page read and write
|
||
22E6B038000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6CC90000
|
trusted library allocation
|
page read and write
|
||
22E6B06F000
|
heap
|
page read and write
|
||
22E6A6F0000
|
trusted library allocation
|
page read and write
|
||
22E00001000
|
trusted library allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
22E6B069000
|
heap
|
page read and write
|
||
22E10011000
|
trusted library allocation
|
page read and write
|
||
22E6B037000
|
heap
|
page read and write
|
||
29A40002000
|
heap
|
page read and write
|
||
8EF000
|
stack
|
page read and write
|
||
27EC3088000
|
heap
|
page read and write
|
||
22E6A6E0000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
373F000
|
trusted library allocation
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6AFA1000
|
heap
|
page read and write
|
||
22E6B02B000
|
heap
|
page read and write
|
||
22E6B06F000
|
heap
|
page read and write
|
||
2751A510000
|
heap
|
page read and write
|
||
21F3C274000
|
heap
|
page read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6FA28000
|
heap
|
page read and write
|
||
222FC03D000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
24F0000
|
heap
|
page read and write
|
||
22E6B03F000
|
heap
|
page read and write
|
||
22E6B04A000
|
heap
|
page read and write
|
||
29A407F0000
|
remote allocation
|
page read and write
|
||
1CE5E6F0000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
293E000
|
stack
|
page read and write
|
||
22E6B280000
|
trusted library allocation
|
page read and write
|
||
663000
|
heap
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
22E6B03B000
|
heap
|
page read and write
|
||
22E6EC56000
|
trusted library allocation
|
page read and write
|
||
22E6B070000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
22E6B061000
|
heap
|
page read and write
|
||
242E000
|
stack
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
2FA0000
|
unkown
|
page readonly
|
||
5A0000
|
heap
|
page read and write
|
||
22E6B02F000
|
heap
|
page read and write
|
||
22E6F65E000
|
trusted library allocation
|
page read and write
|
||
1CE5E86C000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
90F6F7F000
|
stack
|
page read and write
|
||
22E6C890000
|
trusted library allocation
|
page read and write
|
||
22E6B060000
|
heap
|
page read and write
|
||
19511823000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
AFEB9FE000
|
stack
|
page read and write
|
||
22E6B063000
|
heap
|
page read and write
|
||
34F0000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B03E000
|
heap
|
page read and write
|
||
5AA000
|
heap
|
page read and write
|
||
22E6B060000
|
heap
|
page read and write
|
||
22E6B02D000
|
heap
|
page read and write
|
||
242E000
|
stack
|
page read and write
|
||
2320000
|
heap
|
page read and write
|
||
22E6B02A000
|
heap
|
page read and write
|
||
22E68CD0000
|
trusted library allocation
|
page read and write
|
||
19510DE5000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
8EF000
|
stack
|
page read and write
|
||
22E6C1EA000
|
heap
|
page read and write
|
||
5AA000
|
heap
|
page read and write
|
||
22E6B069000
|
heap
|
page read and write
|
||
222FC000000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
27EC3000000
|
heap
|
page read and write
|
||
8CBE4FB000
|
stack
|
page read and write
|
||
22E6B500000
|
trusted library allocation
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
21F3C213000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
1CE5E858000
|
heap
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
90F6C79000
|
stack
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
222FD9F0000
|
remote allocation
|
page read and write
|
||
19510C52000
|
heap
|
page read and write
|
||
7C289FF000
|
stack
|
page read and write
|
||
22E6B25D000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6AEE3000
|
heap
|
page read and write
|
||
22E6C295000
|
heap
|
page read and write
|
||
22E6B03F000
|
heap
|
page read and write
|
||
22E6A6A0000
|
trusted library allocation
|
page read and write
|
||
2751A602000
|
heap
|
page read and write
|
||
AD125FC000
|
stack
|
page read and write
|
||
68C000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
22E6B06D000
|
heap
|
page read and write
|
||
2751A600000
|
heap
|
page read and write
|
||
22E6B05E000
|
heap
|
page read and write
|
||
22E6B1A0000
|
trusted library allocation
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
27EC2F90000
|
trusted library allocation
|
page read and write
|
||
ACA25FA000
|
stack
|
page read and write
|
||
373C000
|
trusted library allocation
|
page read and write
|
||
19510D8E000
|
heap
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
22E6B037000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
22E6B042000
|
heap
|
page read and write
|
||
22E6B032000
|
heap
|
page read and write
|
||
222FBFE0000
|
trusted library allocation
|
page read and write
|
||
22E6B03F000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
2320000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6AFAD000
|
heap
|
page read and write
|
||
22E6B03F000
|
heap
|
page read and write
|
||
3331000
|
trusted library allocation
|
page read and write
|
||
22E6F620000
|
trusted library allocation
|
page read and write
|
||
22E6B4F0000
|
trusted library allocation
|
page read and write
|
||
1CE5E864000
|
heap
|
page read and write
|
||
2DCD000
|
stack
|
page read and write
|
||
22E0040E000
|
trusted library allocation
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B070000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
A2C000
|
stack
|
page read and write
|
||
24F0000
|
heap
|
page read and write
|
||
27EC30BA000
|
heap
|
page read and write
|
||
293E000
|
stack
|
page read and write
|
||
5AA000
|
heap
|
page read and write
|
||
90F707F000
|
stack
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
195117C6000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
31EF000
|
trusted library allocation
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
22E6C8F0000
|
trusted library allocation
|
page read and write
|
||
663000
|
heap
|
page read and write
|
||
22E6B03C000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B02F000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
590000
|
unkown
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
242E000
|
stack
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22BD000
|
stack
|
page read and write
|
||
7C283FB000
|
stack
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
24C0000
|
heap
|
page read and write
|
||
22E6B041000
|
heap
|
page read and write
|
||
22E6B061000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6C1C0000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
7FFCA0BA0000
|
trusted library allocation
|
page read and write
|
||
22E6F9C3000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
5DE000
|
heap
|
page read and write
|
||
19511813000
|
heap
|
page read and write
|
||
22E68862000
|
unkown
|
page readonly
|
||
22E6B05B000
|
heap
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
34F6000
|
heap
|
page read and write
|
||
22E6B069000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B28A000
|
trusted library allocation
|
page read and write
|
||
22E6B037000
|
heap
|
page read and write
|
||
22E6B630000
|
trusted library allocation
|
page read and write
|
||
22E6F944000
|
trusted library allocation
|
page read and write
|
||
22E6B02E000
|
heap
|
page read and write
|
||
24BD000
|
stack
|
page read and write
|
||
22E6B02F000
|
heap
|
page read and write
|
||
25E0000
|
unkown
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
19510C6D000
|
heap
|
page read and write
|
||
22E6B690000
|
trusted library allocation
|
page read and write
|
||
22E6B150000
|
trusted library allocation
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
22E6FCA1000
|
trusted library allocation
|
page read and write
|
||
22E68D50000
|
trusted library allocation
|
page read and write
|
||
22E6B120000
|
trusted library allocation
|
page read and write
|
||
246D000
|
stack
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
22E689C0000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
5B8000
|
heap
|
page execute and read and write
|
||
53FF0FD000
|
stack
|
page read and write
|
||
68C000
|
heap
|
page read and write
|
||
3361000
|
trusted library allocation
|
page read and write
|
||
22E6B06B000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
2C3F000
|
stack
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B061000
|
heap
|
page read and write
|
||
22E6CE00000
|
trusted library allocation
|
page read and write
|
||
8EF000
|
stack
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
242E000
|
stack
|
page read and write
|
||
22E68CC0000
|
heap
|
page execute and read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6F9D2000
|
heap
|
page read and write
|
||
22E6C2A2000
|
heap
|
page read and write
|
||
22E6C9A0000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B03E000
|
heap
|
page read and write
|
||
22E6B030000
|
heap
|
page read and write
|
||
22E6A6F0000
|
trusted library allocation
|
page read and write
|
||
22E6B11F000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
5DE000
|
heap
|
page read and write
|
||
22E00438000
|
trusted library allocation
|
page read and write
|
||
22E6B560000
|
trusted library allocation
|
page read and write
|
||
22FD000
|
stack
|
page read and write
|
||
7FFCA0D40000
|
trusted library allocation
|
page read and write
|
||
2250000
|
remote allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
6DE000
|
stack
|
page read and write
|
||
24F0000
|
heap
|
page read and write
|
||
22E6AF99000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
37F8000
|
trusted library allocation
|
page read and write
|
||
22E68AD0000
|
heap
|
page read and write
|
||
22E6B570000
|
trusted library allocation
|
page read and write
|
||
22E6B060000
|
heap
|
page read and write
|
||
ACA208B000
|
stack
|
page read and write
|
||
19510C43000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
30C0000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B063000
|
heap
|
page read and write
|
||
19511722000
|
heap
|
page read and write
|
||
22E6F62F000
|
trusted library allocation
|
page read and write
|
||
22E6B03D000
|
heap
|
page read and write
|
||
22E6B02C000
|
heap
|
page read and write
|
||
22E6B070000
|
heap
|
page read and write
|
||
22E6AF8B000
|
heap
|
page read and write
|
||
22E6B03F000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B137000
|
heap
|
page read and write
|
||
22E6B082000
|
trusted library allocation
|
page read and write
|
||
22E6D139000
|
heap
|
page read and write
|
||
22E6CC60000
|
trusted library allocation
|
page read and write
|
||
A2C000
|
stack
|
page read and write
|
||
715000
|
heap
|
page read and write
|
||
22E6B030000
|
heap
|
page read and write
|
||
2975EE3B000
|
heap
|
page read and write
|
||
222FC058000
|
heap
|
page read and write
|
||
A2C000
|
stack
|
page read and write
|
||
5B8000
|
heap
|
page execute and read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E68B10000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6B06D000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6C28C000
|
heap
|
page read and write
|
||
22E6B063000
|
heap
|
page read and write
|
||
22E6B010000
|
trusted library allocation
|
page read and write
|
||
22E6F665000
|
trusted library allocation
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
222FD9B0000
|
trusted library allocation
|
page read and write
|
||
222FC02A000
|
heap
|
page read and write
|
||
19510B20000
|
heap
|
page read and write
|
||
1CE5E790000
|
trusted library allocation
|
page read and write
|
||
22E6B02F000
|
heap
|
page read and write
|
||
22E6B246000
|
trusted library allocation
|
page read and write
|
||
29A40000000
|
heap
|
page read and write
|
||
22E6AEEA000
|
heap
|
page read and write
|
||
22E6B073000
|
heap
|
page read and write
|
||
22E6C2A7000
|
heap
|
page read and write
|
||
22E6F946000
|
trusted library allocation
|
page read and write
|
||
22E6B1C0000
|
trusted library allocation
|
page read and write
|
||
22E6C970000
|
trusted library allocation
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B03F000
|
heap
|
page read and write
|
||
22E6B025000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6E959000
|
trusted library allocation
|
page read and write
|
||
22E6B02E000
|
heap
|
page read and write
|
||
25D0000
|
unkown
|
page readonly
|
||
2751A4B0000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
22E6B6A0000
|
trusted library allocation
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
29A3FEB0000
|
heap
|
page read and write
|
||
19510C76000
|
heap
|
page read and write
|
||
22E6FA65000
|
heap
|
page read and write
|
||
22E6CC50000
|
trusted library allocation
|
page read and write
|
||
2E94AAB000
|
stack
|
page read and write
|
||
22E6D0F1000
|
heap
|
page read and write
|
||
7FFCA0B92000
|
trusted library allocation
|
page read and write
|
||
22E6B03A000
|
heap
|
page read and write
|
||
2F90000
|
unkown
|
page readonly
|
||
22E6FA13000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
293E000
|
stack
|
page read and write
|
||
22E6CC50000
|
trusted library allocation
|
page read and write
|
||
2F8D000
|
stack
|
page read and write
|
||
22E6F9ED000
|
heap
|
page read and write
|
||
22E6AE92000
|
unkown
|
page readonly
|
||
3B95000
|
trusted library allocation
|
page read and write
|
||
3844000
|
trusted library allocation
|
page read and write
|
||
22E6B06B000
|
heap
|
page read and write
|
||
22E6F681000
|
trusted library allocation
|
page read and write
|
||
2320000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
27EC3912000
|
heap
|
page read and write
|
||
663000
|
heap
|
page read and write
|
||
22E68A50000
|
heap
|
page read and write
|
||
22E6B06D000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22FD000
|
stack
|
page read and write
|
||
22E6B069000
|
heap
|
page read and write
|
||
22E6C8A0000
|
trusted library allocation
|
page read and write
|
||
22E6FE40000
|
trusted library allocation
|
page read and write
|
||
22E6C1D7000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B06D000
|
heap
|
page read and write
|
||
25D0000
|
unkown
|
page readonly
|
||
22E6CC50000
|
trusted library allocation
|
page read and write
|
||
22E6A6F9000
|
trusted library allocation
|
page read and write
|
||
22E6B036000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
25C0000
|
unkown
|
page readonly
|
||
2C7D000
|
stack
|
page read and write
|
||
24BF000
|
stack
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B02B000
|
heap
|
page read and write
|
||
22E6B05F000
|
heap
|
page read and write
|
||
22E6B05E000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6C890000
|
trusted library allocation
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6E550000
|
trusted library allocation
|
page read and write
|
||
2C7D000
|
stack
|
page read and write
|
||
22E6B039000
|
heap
|
page read and write
|
||
2975EF02000
|
heap
|
page read and write
|
||
22E6B042000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B03B000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
6DE000
|
stack
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
22E6FA5A000
|
heap
|
page read and write
|
||
3350000
|
trusted library allocation
|
page read and write
|
||
22E6B063000
|
heap
|
page read and write
|
||
22E6B06F000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
AD122FE000
|
stack
|
page read and write
|
||
22E6B061000
|
heap
|
page read and write
|
||
3737000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
1CE5F202000
|
trusted library allocation
|
page read and write
|
||
7FFCA0C66000
|
trusted library allocation
|
page execute and read and write
|
||
22E6A700000
|
trusted library section
|
page readonly
|
||
22E6B03F000
|
heap
|
page read and write
|
||
22E68BB6000
|
heap
|
page read and write
|
||
22E6A710000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
22E6B061000
|
heap
|
page read and write
|
||
22BD000
|
stack
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
22E6B026000
|
heap
|
page read and write
|
||
5B8000
|
heap
|
page execute and read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
7FFCA0BAD000
|
trusted library allocation
|
page execute and read and write
|
||
5AA000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B06A000
|
heap
|
page read and write
|
||
22E6B03B000
|
heap
|
page read and write
|
||
22E6B06B000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
22E6B06A000
|
heap
|
page read and write
|
||
22E6B3D0000
|
trusted library allocation
|
page read and write
|
||
22E6B069000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
22E6A650000
|
trusted library allocation
|
page read and write
|
||
24F0000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22FD000
|
stack
|
page read and write
|
||
5AA000
|
heap
|
page read and write
|
||
22E6B2B8000
|
trusted library allocation
|
page read and write
|
||
390E000
|
trusted library allocation
|
page read and write
|
||
22E6B061000
|
heap
|
page read and write
|
||
21F3C200000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
90F6FFF000
|
stack
|
page read and write
|
||
663000
|
heap
|
page read and write
|
||
22E6B4B0000
|
trusted library allocation
|
page read and write
|
||
2DCD000
|
stack
|
page read and write
|
||
22E6D2F0000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6B06D000
|
heap
|
page read and write
|
||
3AF9000
|
trusted library allocation
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6F2B8000
|
trusted library allocation
|
page read and write
|
||
22E6A700000
|
trusted library allocation
|
page read and write
|
||
3010000
|
remote allocation
|
page read and write
|
||
22E6AF66000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
293E000
|
stack
|
page read and write
|
||
387B000
|
trusted library allocation
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
22E6B062000
|
heap
|
page read and write
|
||
1CE5E827000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
AFEBBFF000
|
stack
|
page read and write
|
||
22E6B036000
|
heap
|
page read and write
|
||
222FC002000
|
heap
|
page read and write
|
||
22E6B075000
|
heap
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
22E6B03A000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6D0F1000
|
heap
|
page read and write
|
||
22E6B07C000
|
heap
|
page read and write
|
||
22E6B060000
|
heap
|
page read and write
|
||
22E6B062000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
22E6B038000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
90F6D7A000
|
stack
|
page read and write
|
||
2F90000
|
unkown
|
page readonly
|
||
5AA000
|
heap
|
page read and write
|
||
22E6B041000
|
heap
|
page read and write
|
||
22E6B640000
|
trusted library allocation
|
page read and write
|
||
1951176F000
|
heap
|
page read and write
|
||
22E6B310000
|
trusted library allocation
|
page read and write
|
||
246D000
|
stack
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
AD1247D000
|
stack
|
page read and write
|
||
22E6B320000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
242E000
|
stack
|
page read and write
|
||
22E6B03E000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B400000
|
trusted library allocation
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
24C0000
|
remote allocation
|
page read and write
|
||
22E68BAA000
|
heap
|
page read and write
|
||
1CE5E849000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B069000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
A2C000
|
stack
|
page read and write
|
||
242E000
|
stack
|
page read and write
|
||
22E6FA0C000
|
heap
|
page read and write
|
||
22E6B075000
|
heap
|
page read and write
|
||
29A407F0000
|
remote allocation
|
page read and write
|
||
90F697A000
|
stack
|
page read and write
|
||
22E6FE30000
|
trusted library allocation
|
page read and write
|
||
27EC306D000
|
heap
|
page read and write
|
||
22E6B025000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
222FC118000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B069000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6F51F000
|
trusted library allocation
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E68B82000
|
heap
|
page read and write
|
||
7C284FD000
|
stack
|
page read and write
|
||
3943000
|
trusted library allocation
|
page read and write
|
||
22E6B4D0000
|
trusted library allocation
|
page read and write
|
||
22E6B061000
|
heap
|
page read and write
|
||
22E6CC80000
|
trusted library allocation
|
page read and write
|
||
22E6B067000
|
heap
|
page read and write
|
||
22E6B075000
|
heap
|
page read and write
|
||
22E6D161000
|
heap
|
page read and write
|
||
390F000
|
trusted library allocation
|
page read and write
|
||
7FFCA0D50000
|
trusted library allocation
|
page execute and read and write
|
||
8EF000
|
stack
|
page read and write
|
||
22E6FA8B000
|
heap
|
page read and write
|
||
22E6B06F000
|
heap
|
page read and write
|
||
6DE000
|
stack
|
page read and write
|
||
275F4EC000
|
stack
|
page read and write
|
||
AFEAF1B000
|
stack
|
page read and write
|
||
22E6B052000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B460000
|
trusted library allocation
|
page read and write
|
||
22E6B530000
|
trusted library allocation
|
page read and write
|
||
22E6B660000
|
trusted library allocation
|
page read and write
|
||
373E000
|
trusted library allocation
|
page read and write
|
||
22E6B030000
|
trusted library allocation
|
page read and write
|
||
22E6F199000
|
trusted library allocation
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6C8C0000
|
trusted library allocation
|
page read and write
|
||
22E6B06F000
|
heap
|
page read and write
|
||
2751A65A000
|
heap
|
page read and write
|
||
715000
|
heap
|
page read and write
|
||
275FC7F000
|
stack
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
22E6B069000
|
heap
|
page read and write
|
||
22E6B06B000
|
heap
|
page read and write
|
||
326A000
|
heap
|
page read and write
|
||
7C285FD000
|
stack
|
page read and write
|
||
22E6AF22000
|
heap
|
page read and write
|
||
22E6C970000
|
trusted library allocation
|
page read and write
|
||
7FF4A40D0000
|
trusted library allocation
|
page execute and read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B520000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B02A000
|
heap
|
page read and write
|
||
22E6D07B000
|
trusted library allocation
|
page read and write
|
||
19511743000
|
heap
|
page read and write
|
||
3946000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B03B000
|
heap
|
page read and write
|
||
53FEAFF000
|
stack
|
page read and write
|
||
22E6B062000
|
heap
|
page read and write
|
||
22E6B042000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B069000
|
heap
|
page read and write
|
||
7FFCA0D60000
|
trusted library allocation
|
page execute and read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
22E6F920000
|
trusted library allocation
|
page read and write
|
||
21F3C060000
|
heap
|
page read and write
|
||
22E6B06B000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
22E6B068000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
2B3F000
|
stack
|
page read and write
|
||
29A40020000
|
heap
|
page read and write
|
||
25BD000
|
stack
|
page read and write
|
||
22E6B110000
|
heap
|
page read and write
|
||
3734000
|
trusted library allocation
|
page read and write
|
||
22E6D155000
|
heap
|
page read and write
|
||
22E6A6DA000
|
trusted library allocation
|
page read and write
|
||
27EC30C3000
|
heap
|
page read and write
|
||
22E6B270000
|
trusted library allocation
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
22E6A660000
|
trusted library allocation
|
page read and write
|
||
22E6B069000
|
heap
|
page read and write
|
||
19510C8C000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
2E1E000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
1CE5E842000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
22E6B03B000
|
heap
|
page read and write
|
||
2C1F000
|
unkown
|
page read and write
|
||
22E6B300000
|
trusted library allocation
|
page read and write
|
||
22E6C2AB000
|
heap
|
page read and write
|
||
22E6B036000
|
heap
|
page read and write
|
||
22E6B04A000
|
heap
|
page read and write
|
||
22E6CC50000
|
trusted library allocation
|
page read and write
|
||
22E6B06C000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
222FDC00000
|
trusted library allocation
|
page read and write
|
||
5DE000
|
heap
|
page read and write
|
||
8EF000
|
stack
|
page read and write
|
||
A2C000
|
stack
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
24BD000
|
stack
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6F991000
|
heap
|
page read and write
|
||
22E6B600000
|
trusted library allocation
|
page read and write
|
||
22E6D15F000
|
heap
|
page read and write
|
||
3A4E000
|
trusted library allocation
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6F66C000
|
trusted library allocation
|
page read and write
|
||
24BD000
|
stack
|
page read and write
|
||
6DE000
|
stack
|
page read and write
|
||
22E6F64C000
|
trusted library allocation
|
page read and write
|
||
2751ADB0000
|
trusted library allocation
|
page read and write
|
||
22E6B010000
|
heap
|
page read and write
|
||
22E6B240000
|
trusted library allocation
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B06D000
|
heap
|
page read and write
|
||
8CBDFBC000
|
stack
|
page read and write
|
||
AD120FE000
|
stack
|
page read and write
|
||
22E6B026000
|
heap
|
page read and write
|
||
5B8000
|
heap
|
page execute and read and write
|
||
22E6EAEA000
|
trusted library allocation
|
page read and write
|
||
2320000
|
heap
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6FCAF000
|
trusted library allocation
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
3732000
|
trusted library allocation
|
page read and write
|
||
22E6B06F000
|
heap
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
22E6C8E0000
|
trusted library allocation
|
page read and write
|
||
22E6B05C000
|
heap
|
page read and write
|
||
22E6B360000
|
trusted library allocation
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
22E6A6E5000
|
trusted library allocation
|
page read and write
|
||
22E6AFF0000
|
trusted library allocation
|
page read and write
|
||
90F656B000
|
stack
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
7FFCA0B83000
|
trusted library allocation
|
page execute and read and write
|
||
22E6B03B000
|
heap
|
page read and write
|
||
2F90000
|
unkown
|
page readonly
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B0E0000
|
trusted library allocation
|
page read and write
|
||
22E6C910000
|
trusted library allocation
|
page read and write
|
||
22E6B04A000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
22E6B026000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
22E6B037000
|
heap
|
page read and write
|
||
22E6B06C000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
2B3F000
|
stack
|
page read and write
|
||
22E6B05F000
|
heap
|
page read and write
|
||
22E6B062000
|
heap
|
page read and write
|
||
22E6C970000
|
trusted library allocation
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
28FD000
|
stack
|
page read and write
|
||
24BF000
|
stack
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
22E6B070000
|
trusted library allocation
|
page read and write
|
||
2975EE52000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B02C000
|
heap
|
page read and write
|
||
2751A613000
|
heap
|
page read and write
|
||
22E6C8A0000
|
trusted library allocation
|
page read and write
|
||
222FC102000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B03E000
|
heap
|
page read and write
|
||
24C0000
|
heap
|
page read and write
|
||
22E6B02A000
|
heap
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6F922000
|
trusted library allocation
|
page read and write
|
||
22E6AF6E000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
68C000
|
heap
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
||
22E6B03E000
|
heap
|
page read and write
|
||
22FD000
|
stack
|
page read and write
|
||
7C287FD000
|
stack
|
page read and write
|
||
A2C000
|
stack
|
page read and write
|
||
22E6B03B000
|
heap
|
page read and write
|
||
2751AE02000
|
trusted library allocation
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
24F0000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B03F000
|
heap
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
2320000
|
heap
|
page read and write
|
||
1CE5E876000
|
heap
|
page read and write
|
||
22E6B027000
|
heap
|
page read and write
|
||
8EF000
|
stack
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
1CE5E85B000
|
heap
|
page read and write
|
||
1CE5E860000
|
heap
|
page read and write
|
||
715000
|
heap
|
page read and write
|
||
22E6B06D000
|
heap
|
page read and write
|
||
27EC3029000
|
heap
|
page read and write
|
||
2C7D000
|
stack
|
page read and write
|
||
22E68D10000
|
trusted library allocation
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
2FB0000
|
unkown
|
page read and write
|
||
195117B0000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B2E0000
|
trusted library allocation
|
page read and write
|
||
ACA26FE000
|
stack
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
242E000
|
stack
|
page read and write
|
||
22E6B03E000
|
heap
|
page read and write
|
||
22E6B02E000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
25D0000
|
unkown
|
page readonly
|
||
3820000
|
trusted library allocation
|
page read and write
|
||
22E6B06A000
|
heap
|
page read and write
|
||
22E6CC50000
|
trusted library allocation
|
page read and write
|
||
7C288FF000
|
stack
|
page read and write
|
||
22E6C291000
|
heap
|
page read and write
|
||
8EF000
|
stack
|
page read and write
|
||
22E6C950000
|
trusted library allocation
|
page read and write
|
||
22E6B03C000
|
heap
|
page read and write
|
||
2D90000
|
remote allocation
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6AF8D000
|
heap
|
page read and write
|
||
22E6B250000
|
trusted library allocation
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
||
22E6B620000
|
trusted library allocation
|
page read and write
|
||
22E6B06B000
|
heap
|
page read and write
|
||
22E6B2B0000
|
trusted library allocation
|
page read and write
|
||
22E6B06B000
|
heap
|
page read and write
|
||
22E6FAA9000
|
heap
|
page read and write
|
||
22E6B067000
|
heap
|
page read and write
|
||
22BD000
|
stack
|
page read and write
|
||
22E6FBB3000
|
trusted library allocation
|
page read and write
|
||
22E68D40000
|
heap
|
page execute and read and write
|
||
22E6F293000
|
heap
|
page read and write
|
||
22E6C890000
|
trusted library allocation
|
page read and write
|
||
27EC3900000
|
heap
|
page read and write
|
||
22E6B062000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6F9BA000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E68D50000
|
trusted library allocation
|
page read and write
|
||
22E6A6B0000
|
trusted library allocation
|
page read and write
|
||
2320000
|
heap
|
page read and write
|
||
22E6E8A3000
|
trusted library allocation
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
1CE5E875000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B062000
|
heap
|
page read and write
|
||
22E6B06B000
|
heap
|
page read and write
|
||
38E2000
|
trusted library allocation
|
page read and write
|
||
53FEBFE000
|
stack
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
22E6B05B000
|
heap
|
page read and write
|
||
24F0000
|
heap
|
page read and write
|
||
22E6C2C0000
|
trusted library allocation
|
page read and write
|
||
2975F602000
|
trusted library allocation
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
22E6B061000
|
heap
|
page read and write
|
||
2F0D000
|
stack
|
page read and write
|
||
22E6A6D0000
|
trusted library allocation
|
page read and write
|
||
22E6D105000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6C890000
|
trusted library allocation
|
page read and write
|
||
3939000
|
trusted library allocation
|
page read and write
|
||
22E6B130000
|
heap
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
90F6BFB000
|
stack
|
page read and write
|
||
22E6B052000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
2ECE000
|
stack
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
5B8000
|
heap
|
page execute and read and write
|
||
A2C000
|
stack
|
page read and write
|
||
22E6B05E000
|
heap
|
page read and write
|
||
22E6B06A000
|
heap
|
page read and write
|
||
22E6B03B000
|
heap
|
page read and write
|
||
19510B30000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
90F6E7E000
|
stack
|
page read and write
|
||
22E6B03E000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
24F0000
|
heap
|
page read and write
|
||
22E6F9FA000
|
heap
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B062000
|
heap
|
page read and write
|
||
19510BC0000
|
trusted library allocation
|
page read and write
|
||
22E6B061000
|
heap
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
22E6B026000
|
heap
|
page read and write
|
||
293E000
|
stack
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
3736000
|
trusted library allocation
|
page read and write
|
||
22E6B450000
|
trusted library allocation
|
page read and write
|
||
22E6F637000
|
trusted library allocation
|
page read and write
|
||
22E6B06D000
|
heap
|
page read and write
|
||
22E6B036000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
2975EE2F000
|
heap
|
page read and write
|
||
2DCD000
|
stack
|
page read and write
|
||
22E6FC03000
|
trusted library allocation
|
page read and write
|
||
22E6B03B000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
246D000
|
stack
|
page read and write
|
||
22E6C22F000
|
heap
|
page read and write
|
||
ACA27FF000
|
stack
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
24BD000
|
stack
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
34F2000
|
heap
|
page read and write
|
||
19510C90000
|
heap
|
page read and write
|
||
2EF6000
|
heap
|
page read and write
|
||
22E6B550000
|
trusted library allocation
|
page read and write
|
||
22E6C979000
|
trusted library allocation
|
page read and write
|
||
22E6B03F000
|
heap
|
page read and write
|
||
19511702000
|
heap
|
page read and write
|
||
715000
|
heap
|
page read and write
|
||
222FBE50000
|
heap
|
page read and write
|
||
392E000
|
trusted library allocation
|
page read and write
|
||
22E6B037000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6FA07000
|
heap
|
page read and write
|
||
22E6B027000
|
heap
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
22E6B04A000
|
heap
|
page read and write
|
||
1CE5E83E000
|
heap
|
page read and write
|
||
22E6F645000
|
trusted library allocation
|
page read and write
|
||
373D000
|
trusted library allocation
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B370000
|
trusted library allocation
|
page read and write
|
||
22E6C970000
|
trusted library allocation
|
page read and write
|
||
373D000
|
trusted library allocation
|
page read and write
|
||
22E6F988000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
22E6B03F000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6CC89000
|
trusted library allocation
|
page read and write
|
||
22E6B04A000
|
heap
|
page read and write
|
||
22E6B062000
|
heap
|
page read and write
|
||
22E6B063000
|
heap
|
page read and write
|
||
3A9B000
|
trusted library allocation
|
page read and write
|
||
22BD000
|
stack
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B030000
|
heap
|
page read and write
|
||
19510C91000
|
heap
|
page read and write
|
||
8EF000
|
stack
|
page read and write
|
||
19510C65000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6CC90000
|
trusted library allocation
|
page read and write
|
||
22E68D73000
|
heap
|
page read and write
|
||
5DE000
|
heap
|
page read and write
|
||
22E6B031000
|
heap
|
page read and write
|
||
5DE000
|
heap
|
page read and write
|
||
2320000
|
heap
|
page read and write
|
||
2DF1000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
39BC000
|
trusted library allocation
|
page read and write
|
||
24C0000
|
remote allocation
|
page read and write
|
||
22E6F325000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6AF98000
|
heap
|
page read and write
|
||
22E6B073000
|
heap
|
page read and write
|
||
22E6B069000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
22E6B03F000
|
heap
|
page read and write
|
||
22E6B06D000
|
heap
|
page read and write
|
||
22E6F684000
|
trusted library allocation
|
page read and write
|
||
2320000
|
heap
|
page read and write
|
||
22E6B03A000
|
heap
|
page read and write
|
||
222FD9F0000
|
remote allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
222FC057000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
22E6B068000
|
heap
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
2CEA000
|
heap
|
page read and write
|
||
22E6B03C000
|
heap
|
page read and write
|
||
3010000
|
remote allocation
|
page read and write
|
||
22E6A6D0000
|
trusted library allocation
|
page read and write
|
||
22E1000D000
|
trusted library allocation
|
page read and write
|
||
3951000
|
trusted library allocation
|
page read and write
|
||
246D000
|
stack
|
page read and write
|
||
22E6B061000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B063000
|
heap
|
page read and write
|
||
22BD000
|
stack
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E68CD4000
|
trusted library allocation
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
373D000
|
trusted library allocation
|
page read and write
|
||
22E6B025000
|
heap
|
page read and write
|
||
246D000
|
stack
|
page read and write
|
||
22E6B1B0000
|
trusted library allocation
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
A2C000
|
stack
|
page read and write
|
||
1CE5E85D000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
2320000
|
heap
|
page read and write
|
||
22FD000
|
stack
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B5A0000
|
trusted library allocation
|
page read and write
|
||
22E6B03B000
|
heap
|
page read and write
|
||
2975EBB0000
|
heap
|
page read and write
|
||
22E6B06B000
|
heap
|
page read and write
|
||
22E6A65D000
|
trusted library allocation
|
page read and write
|
||
22E6B2F0000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
A2C000
|
stack
|
page read and write
|
||
22E6B03B000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6A640000
|
trusted library allocation
|
page read and write
|
||
22FD000
|
stack
|
page read and write
|
||
22E6B06F000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B040000
|
trusted library allocation
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B03C000
|
heap
|
page read and write
|
||
22E6B430000
|
trusted library allocation
|
page read and write
|
||
6DE000
|
stack
|
page read and write
|
||
22E6B053000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
22E68BB0000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
3946000
|
trusted library allocation
|
page read and write
|
||
22E68D50000
|
trusted library allocation
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
29A407F0000
|
remote allocation
|
page read and write
|
||
22E6B03F000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
2320000
|
heap
|
page read and write
|
||
8CBE7FE000
|
stack
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
7FFCA0BAB000
|
trusted library allocation
|
page execute and read and write
|
||
7C28BFF000
|
stack
|
page read and write
|
||
22E6B053000
|
heap
|
page read and write
|
||
22E6B4C0000
|
trusted library allocation
|
page read and write
|
||
22E6B332000
|
trusted library allocation
|
page read and write
|
||
22E6F67A000
|
trusted library allocation
|
page read and write
|
||
22E6F980000
|
heap
|
page read and write
|
||
22E6C940000
|
trusted library allocation
|
page read and write
|
||
8EF000
|
stack
|
page read and write
|
||
22E6B070000
|
heap
|
page read and write
|
||
222FC048000
|
heap
|
page read and write
|
||
19510C3C000
|
heap
|
page read and write
|
||
22E689B2000
|
unkown
|
page readonly
|
||
5A0000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
53FF1FE000
|
stack
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6A690000
|
trusted library allocation
|
page read and write
|
||
22E6B0D0000
|
trusted library allocation
|
page read and write
|
||
19510C13000
|
heap
|
page read and write
|
||
2975EE02000
|
heap
|
page read and write
|
||
22E6B02A000
|
heap
|
page read and write
|
||
22E6AFE0000
|
trusted library section
|
page read and write
|
||
22E6B03B000
|
heap
|
page read and write
|
||
22E6CF39000
|
trusted library allocation
|
page read and write
|
||
22E6FBE2000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B04A000
|
heap
|
page read and write
|
||
1CE5E859000
|
heap
|
page read and write
|
||
5AA000
|
heap
|
page read and write
|
||
1CE5E902000
|
heap
|
page read and write
|
||
2E9567E000
|
stack
|
page read and write
|
||
293E000
|
stack
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6F997000
|
heap
|
page read and write
|
||
5AA000
|
heap
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
2320000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6FA30000
|
heap
|
page read and write
|
||
22E6AF93000
|
heap
|
page read and write
|
||
22E6B069000
|
heap
|
page read and write
|
||
22E68AB5000
|
heap
|
page read and write
|
||
3827000
|
trusted library allocation
|
page read and write
|
||
663000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
24F0000
|
trusted library allocation
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6A650000
|
trusted library allocation
|
page read and write
|
||
22E6C241000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
246D000
|
stack
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
||
22E6B042000
|
heap
|
page read and write
|
||
22E6B420000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B440000
|
trusted library allocation
|
page read and write
|
||
1CE5E700000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
A2C000
|
stack
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
24F0000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6AF3C000
|
heap
|
page read and write
|
||
5DE000
|
heap
|
page read and write
|
||
3907000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
2751A713000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
53FE8FE000
|
stack
|
page read and write
|
||
22E6B026000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
22E6B06A000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6C8B0000
|
trusted library allocation
|
page read and write
|
||
3733000
|
trusted library allocation
|
page read and write
|
||
22E6B025000
|
heap
|
page read and write
|
||
22E6CC70000
|
trusted library allocation
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
8CBE5FB000
|
stack
|
page read and write
|
||
22E6B5E0000
|
trusted library allocation
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
6DE000
|
stack
|
page read and write
|
||
222FD9F0000
|
remote allocation
|
page read and write
|
||
22E6B060000
|
heap
|
page read and write
|
||
7FFCA0C30000
|
trusted library allocation
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
22E6B06A000
|
heap
|
page read and write
|
||
5DE000
|
heap
|
page read and write
|
||
22E6B17D000
|
trusted library allocation
|
page read and write
|
||
2C7D000
|
stack
|
page read and write
|
||
246F000
|
stack
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6CC80000
|
trusted library allocation
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
1CE5E862000
|
heap
|
page read and write
|
||
22E6FC0B000
|
trusted library allocation
|
page read and write
|
||
3A0F000
|
trusted library allocation
|
page read and write
|
||
22E6B052000
|
heap
|
page read and write
|
||
22E68860000
|
unkown
|
page readonly
|
||
715000
|
heap
|
page read and write
|
||
22E6B03E000
|
heap
|
page read and write
|
||
22E6B042000
|
heap
|
page read and write
|
||
22E6B05F000
|
heap
|
page read and write
|
||
22E6B03D000
|
heap
|
page read and write
|
||
1CE5E87B000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B069000
|
heap
|
page read and write
|
||
6DE000
|
stack
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E0000
|
remote allocation
|
page read and write
|
||
AFEB67C000
|
stack
|
page read and write
|
||
22E6B3A0000
|
trusted library allocation
|
page read and write
|
||
22E6B062000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
293E000
|
stack
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B050000
|
trusted library allocation
|
page read and write
|
||
2E9557E000
|
stack
|
page read and write
|
||
1CE5E845000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
3269000
|
heap
|
page read and write
|
||
22E6C894000
|
trusted library allocation
|
page read and write
|
||
22E6B03A000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B060000
|
heap
|
page read and write
|
||
22E6B031000
|
heap
|
page read and write
|
||
19511827000
|
heap
|
page read and write
|
||
24C0000
|
remote allocation
|
page read and write
|
||
22E6FE31000
|
trusted library allocation
|
page read and write
|
||
22E6F9A3000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6CC80000
|
trusted library allocation
|
page read and write
|
||
22E68CF0000
|
trusted library allocation
|
page read and write
|
||
22E6B3B0000
|
trusted library allocation
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
68C000
|
heap
|
page read and write
|
||
22E6B03D000
|
heap
|
page read and write
|
||
24C0000
|
remote allocation
|
page read and write
|
||
22E6F39C000
|
trusted library allocation
|
page read and write
|
||
22E6C8B0000
|
trusted library allocation
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
22E6B061000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B03B000
|
heap
|
page read and write
|
||
22E6B06C000
|
heap
|
page read and write
|
||
22E68B39000
|
heap
|
page read and write
|
||
24C0000
|
heap
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
22E68B0C000
|
heap
|
page read and write
|
||
715000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
22E6A6E2000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6AF89000
|
heap
|
page read and write
|
||
22E6B063000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6C8C0000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
663000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B06D000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6FAA1000
|
heap
|
page read and write
|
||
242E000
|
stack
|
page read and write
|
||
22E6B02C000
|
heap
|
page read and write
|
||
22E6B061000
|
heap
|
page read and write
|
||
22E6B060000
|
trusted library allocation
|
page read and write
|
||
68C000
|
heap
|
page read and write
|
||
22E6A640000
|
trusted library allocation
|
page read and write
|
||
22E6D2F0000
|
trusted library allocation
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
6DE000
|
stack
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B020000
|
trusted library allocation
|
page read and write
|
||
7FFCA0B9D000
|
trusted library allocation
|
page execute and read and write
|
||
242E000
|
stack
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
293E000
|
stack
|
page read and write
|
||
22E6B06A000
|
heap
|
page read and write
|
||
22E68860000
|
unkown
|
page readonly
|
||
2FB0000
|
unkown
|
page read and write
|
||
22E6B130000
|
trusted library allocation
|
page read and write
|
||
22E68A70000
|
heap
|
page read and write
|
||
2975EBC0000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
6DE000
|
stack
|
page read and write
|
||
22E6C970000
|
trusted library allocation
|
page read and write
|
||
24BF000
|
stack
|
page read and write
|
||
663000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
2975EE13000
|
heap
|
page read and write
|
||
22E6D16A000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
3269000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E68D50000
|
trusted library allocation
|
page read and write
|
||
22E6EF20000
|
trusted library allocation
|
page read and write
|
||
22E6AEE1000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
22BD000
|
stack
|
page read and write
|
||
22E6C27F000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B062000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
1CE5E885000
|
heap
|
page read and write
|
||
385E000
|
trusted library allocation
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B2C0000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
22E6B06D000
|
heap
|
page read and write
|
||
22E6B06B000
|
heap
|
page read and write
|
||
22E6F63A000
|
trusted library allocation
|
page read and write
|
||
22E6B06C000
|
heap
|
page read and write
|
||
22BD000
|
stack
|
page read and write
|
||
22E6B03F000
|
heap
|
page read and write
|
||
5B8000
|
heap
|
page execute and read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6AF46000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B03F000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
A2C000
|
stack
|
page read and write
|
||
22E6AF7D000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
22E6B140000
|
trusted library allocation
|
page read and write
|
||
663000
|
heap
|
page read and write
|
||
22E6B053000
|
heap
|
page read and write
|
||
22E6B04A000
|
heap
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
22E6B470000
|
trusted library allocation
|
page read and write
|
||
40D000
|
unkown
|
page execute read
|
||
22E6B063000
|
heap
|
page read and write
|
||
22E68AB0000
|
heap
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
21F3C256000
|
heap
|
page read and write
|
||
222FC089000
|
heap
|
page read and write
|
||
27EC3102000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B220000
|
trusted library allocation
|
page read and write
|
||
5AA000
|
heap
|
page read and write
|
||
22E6CC80000
|
trusted library allocation
|
page read and write
|
||
22E6B063000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E68CE0000
|
trusted library allocation
|
page read and write
|
||
22E68BAC000
|
heap
|
page read and write
|
||
195117BE000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
21F3C302000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
22E6AFF4000
|
trusted library allocation
|
page read and write
|
||
21F3C240000
|
heap
|
page read and write
|
||
24BF000
|
stack
|
page read and write
|
||
22E6B410000
|
trusted library allocation
|
page read and write
|
||
22E00418000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B072000
|
heap
|
page read and write
|
||
22E6B010000
|
trusted library allocation
|
page read and write
|
||
3730000
|
trusted library allocation
|
page read and write
|
||
22E6B025000
|
heap
|
page read and write
|
||
3737000
|
trusted library allocation
|
page read and write
|
||
2C7D000
|
stack
|
page read and write
|
||
22E6B027000
|
heap
|
page read and write
|
||
53FE9FD000
|
stack
|
page read and write
|
||
24C0000
|
heap
|
page read and write
|
||
34F6000
|
heap
|
page read and write
|
||
2975EC10000
|
heap
|
page read and write
|
||
22E6C920000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
3DA7000
|
trusted library allocation
|
page read and write
|
||
22E6B000000
|
trusted library allocation
|
page read and write
|
||
22E6A670000
|
trusted library allocation
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
27EC2E20000
|
heap
|
page read and write
|
||
AFEB7FB000
|
stack
|
page read and write
|
||
1CE5E83C000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B02E000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6F9D4000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E68AC0000
|
trusted library allocation
|
page read and write
|
||
22E6CC50000
|
trusted library allocation
|
page read and write
|
||
22E6B03D000
|
heap
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
21F3C070000
|
heap
|
page read and write
|
||
7FFCA0B84000
|
trusted library allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
1CE5E86E000
|
heap
|
page read and write
|
||
22E6B030000
|
heap
|
page read and write
|
||
22E6AEEC000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6F677000
|
trusted library allocation
|
page read and write
|
||
22E6CC50000
|
trusted library allocation
|
page read and write
|
||
22E6B05C000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B069000
|
heap
|
page read and write
|
||
22E6FE30000
|
trusted library allocation
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
21F3CA02000
|
trusted library allocation
|
page read and write
|
||
21F3C300000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
2751A702000
|
heap
|
page read and write
|
||
2E94EFE000
|
stack
|
page read and write
|
||
388F000
|
trusted library allocation
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B480000
|
trusted library allocation
|
page read and write
|
||
53FF2FF000
|
stack
|
page read and write
|
||
22E6B052000
|
heap
|
page read and write
|
||
19510DB9000
|
heap
|
page read and write
|
||
22E6B061000
|
heap
|
page read and write
|
||
22E6FA88000
|
heap
|
page read and write
|
||
22E6B02D000
|
heap
|
page read and write
|
||
2FB0000
|
unkown
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B06B000
|
heap
|
page read and write
|
||
22E6A660000
|
trusted library allocation
|
page read and write
|
||
22E6C211000
|
heap
|
page read and write
|
||
22E6B063000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B042000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6AF86000
|
heap
|
page read and write
|
||
22E6B041000
|
heap
|
page read and write
|
||
1CE5E829000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B036000
|
heap
|
page read and write
|
||
2E9507F000
|
stack
|
page read and write
|
||
38AE000
|
trusted library allocation
|
page read and write
|
||
373E000
|
trusted library allocation
|
page read and write
|
||
22E6B027000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
293E000
|
stack
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B03B000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
22E6B036000
|
heap
|
page read and write
|
||
22E6B032000
|
heap
|
page read and write
|
||
22E6F5F3000
|
trusted library allocation
|
page read and write
|
||
22E6B038000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
AD1237E000
|
stack
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
22E6B2D0000
|
trusted library allocation
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
22E6B03B000
|
heap
|
page read and write
|
||
3D78000
|
trusted library allocation
|
page read and write
|
||
22E6CC50000
|
trusted library allocation
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6C960000
|
trusted library allocation
|
page read and write
|
||
24BD000
|
stack
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
24C0000
|
remote allocation
|
page read and write
|
||
22E6B1E0000
|
trusted library allocation
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
29A3FF20000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6AF36000
|
heap
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
22E68BBD000
|
heap
|
page read and write
|
||
22E6B063000
|
heap
|
page read and write
|
||
242E000
|
stack
|
page read and write
|
||
19510BE0000
|
trusted library allocation
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6B03E000
|
heap
|
page read and write
|
||
275F97E000
|
stack
|
page read and write
|
||
22E6F9A0000
|
heap
|
page read and write
|
||
22E6B027000
|
heap
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
22E6B069000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
22E6B062000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B3F0000
|
trusted library allocation
|
page read and write
|
||
242E000
|
stack
|
page read and write
|
||
5B8000
|
heap
|
page execute and read and write
|
||
7FFCA0B8D000
|
trusted library allocation
|
page execute and read and write
|
||
22E6B064000
|
heap
|
page read and write
|
||
22E6B03E000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B06B000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
22E6B030000
|
heap
|
page read and write
|
||
22E6F9E8000
|
heap
|
page read and write
|
||
AD1207F000
|
stack
|
page read and write
|
||
222FC113000
|
heap
|
page read and write
|
||
8EF000
|
stack
|
page read and write
|
||
22E6B037000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
275FA7E000
|
stack
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
29A40029000
|
heap
|
page read and write
|
||
22E6CC82000
|
trusted library allocation
|
page read and write
|
||
22E6B000000
|
trusted library allocation
|
page read and write
|
||
7FFCA0BDC000
|
trusted library allocation
|
page execute and read and write
|
||
AFEBAFF000
|
stack
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
43F000
|
unkown
|
page execute and read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
22E6B042000
|
heap
|
page read and write
|
||
22E6D153000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
3732000
|
trusted library allocation
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
22FD000
|
stack
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
663000
|
heap
|
page read and write
|
||
22E6B5F0000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
22E6A6A0000
|
trusted library allocation
|
page read and write
|
||
2E9527F000
|
stack
|
page read and write
|
||
29A407C0000
|
trusted library allocation
|
page read and write
|
||
22E6F194000
|
heap
|
page read and write
|
||
22E6B037000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B04A000
|
heap
|
page read and write
|
||
22E6F662000
|
trusted library allocation
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B069000
|
heap
|
page read and write
|
||
22E6B03B000
|
heap
|
page read and write
|
||
7FFCA0D30000
|
trusted library allocation
|
page read and write
|
||
22E6B020000
|
trusted library allocation
|
page read and write
|
||
22E6AF02000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
27EC3013000
|
heap
|
page read and write
|
||
5B8000
|
heap
|
page execute and read and write
|
||
7FFCA0C3C000
|
trusted library allocation
|
page execute and read and write
|
||
5AA000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B052000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
27EC2E30000
|
heap
|
page read and write
|
||
22E6B080000
|
trusted library allocation
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
22E6B03F000
|
heap
|
page read and write
|
||
22E6C8B0000
|
trusted library allocation
|
page read and write
|
||
22E6B07A000
|
heap
|
page read and write
|
||
22E6B650000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B075000
|
heap
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
22E6B069000
|
heap
|
page read and write
|
||
5AA000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
22E68D85000
|
heap
|
page read and write
|
||
53FEDFC000
|
stack
|
page read and write
|
||
22E6C25C000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
22E6B039000
|
heap
|
page read and write
|
||
293E000
|
stack
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
27EC303E000
|
heap
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
2F0D000
|
stack
|
page read and write
|
||
21F3C1D0000
|
trusted library allocation
|
page read and write
|
||
2751A675000
|
heap
|
page read and write
|
||
22E6B03E000
|
heap
|
page read and write
|
||
22E6B080000
|
trusted library allocation
|
page read and write
|
||
27EC2E90000
|
heap
|
page read and write
|
||
2ED0000
|
remote allocation
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6B05C000
|
heap
|
page read and write
|
||
22E6B037000
|
heap
|
page read and write
|
||
663000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B03F000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6CE10000
|
trusted library allocation
|
page read and write
|
||
22E6C892000
|
trusted library allocation
|
page read and write
|
||
22E6B03B000
|
heap
|
page read and write
|
||
22E68A30000
|
heap
|
page read and write
|
||
19511830000
|
heap
|
page read and write
|
||
3258000
|
heap
|
page read and write
|
||
22E6B027000
|
heap
|
page read and write
|
||
3735000
|
trusted library allocation
|
page read and write
|
||
3938000
|
trusted library allocation
|
page read and write
|
||
22E6B04A000
|
heap
|
page read and write
|
||
246D000
|
stack
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
22E6B06A000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
2FA0000
|
unkown
|
page readonly
|
||
22E6D0F0000
|
heap
|
page read and write
|
||
22E6B06A000
|
heap
|
page read and write
|
||
22E6FA86000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
22E6AF52000
|
heap
|
page read and write
|
||
22E6B062000
|
heap
|
page read and write
|
||
22E6B064000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
22E6B06B000
|
heap
|
page read and write
|
||
7FFCA0C36000
|
trusted library allocation
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
2975EE3E000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
22E6B062000
|
heap
|
page read and write
|
||
24BD000
|
stack
|
page read and write
|
||
222FC047000
|
heap
|
page read and write
|
||
25E0000
|
unkown
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B067000
|
trusted library allocation
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
22E6B061000
|
heap
|
page read and write
|
||
22FD000
|
stack
|
page read and write
|
||
22E6B042000
|
heap
|
page read and write
|
||
3B47000
|
trusted library allocation
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
5B8000
|
heap
|
page execute and read and write
|
||
22E6B03E000
|
heap
|
page read and write
|
||
19510D13000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6C238000
|
heap
|
page read and write
|
||
5DE000
|
heap
|
page read and write
|
||
22E68ADD000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6F6C1000
|
trusted library allocation
|
page read and write
|
||
22E6B590000
|
trusted library allocation
|
page read and write
|
||
22E6B060000
|
heap
|
page read and write
|
||
22E6B037000
|
heap
|
page read and write
|
||
22E6B610000
|
trusted library allocation
|
page read and write
|
||
22E6F995000
|
heap
|
page read and write
|
||
29A40054000
|
heap
|
page read and write
|
||
22E6B03F000
|
heap
|
page read and write
|
||
22E6F985000
|
heap
|
page read and write
|
||
22E6C930000
|
trusted library allocation
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B037000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6CC90000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
1CE5E87E000
|
heap
|
page read and write
|
||
2DCD000
|
stack
|
page read and write
|
||
25C0000
|
unkown
|
page readonly
|
||
22E6C900000
|
trusted library allocation
|
page read and write
|
||
22E6CC92000
|
trusted library allocation
|
page read and write
|
||
22E6B063000
|
heap
|
page read and write
|
||
22E6CC51000
|
trusted library allocation
|
page read and write
|
||
22E6B062000
|
heap
|
page read and write
|
||
293E000
|
stack
|
page read and write
|
||
22E68D70000
|
heap
|
page read and write
|
||
22E6F673000
|
trusted library allocation
|
page read and write
|
||
22E6B026000
|
heap
|
page read and write
|
||
2D90000
|
remote allocation
|
page read and write
|
||
22BD000
|
stack
|
page read and write
|
||
22E68BAE000
|
heap
|
page read and write
|
||
22E6B03B000
|
heap
|
page read and write
|
||
3B2B000
|
trusted library allocation
|
page read and write
|
||
1CE5E846000
|
heap
|
page read and write
|
||
242E000
|
stack
|
page read and write
|
||
410000
|
unkown
|
page write copy
|
||
22E6B063000
|
heap
|
page read and write
|
||
5DE000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
242E000
|
stack
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6F669000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E68BA7000
|
heap
|
page read and write
|
||
3739000
|
trusted library allocation
|
page read and write
|
||
2975ED10000
|
trusted library allocation
|
page read and write
|
||
2320000
|
heap
|
page read and write
|
||
29A40102000
|
heap
|
page read and write
|
||
22E6B03C000
|
heap
|
page read and write
|
||
22E6B03C000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
29A3FEC0000
|
heap
|
page read and write
|
||
22E6FE60000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B200000
|
trusted library allocation
|
page read and write
|
||
22E6AFE0000
|
trusted library allocation
|
page read and write
|
||
22E6CC90000
|
trusted library allocation
|
page read and write
|
||
2751A63D000
|
heap
|
page read and write
|
||
275F5EE000
|
stack
|
page read and write
|
||
22E6FA2D000
|
heap
|
page read and write
|
||
22E68D50000
|
trusted library allocation
|
page read and write
|
||
22E6C8F0000
|
trusted library allocation
|
page read and write
|
||
3735000
|
trusted library allocation
|
page read and write
|
||
22E6B510000
|
trusted library allocation
|
page read and write
|
||
8EF000
|
stack
|
page read and write
|
||
3B72000
|
trusted library allocation
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
2751A629000
|
heap
|
page read and write
|
||
22BD000
|
stack
|
page read and write
|
||
AFEB77D000
|
stack
|
page read and write
|
||
22E6FAAB000
|
heap
|
page read and write
|
||
22E6C8C0000
|
trusted library allocation
|
page read and write
|
||
22BD000
|
stack
|
page read and write
|
||
22E6B06D000
|
heap
|
page read and write
|
||
A2C000
|
stack
|
page read and write
|
||
22E6B030000
|
heap
|
page read and write
|
||
22E6B290000
|
trusted library allocation
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
22E6F9F4000
|
heap
|
page read and write
|
||
22E6B03C000
|
heap
|
page read and write
|
||
22E6B063000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6B069000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
24F0000
|
heap
|
page read and write
|
||
5B8000
|
heap
|
page execute and read and write
|
||
293E000
|
stack
|
page read and write
|
||
22E6B026000
|
heap
|
page read and write
|
||
22E6C8A0000
|
trusted library allocation
|
page read and write
|
||
22E68D20000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6CC80000
|
trusted library allocation
|
page read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
19511794000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
38E8000
|
trusted library allocation
|
page read and write
|
||
37F1000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
1CE5E878000
|
heap
|
page read and write
|
||
22E6AECE000
|
unkown
|
page readonly
|
||
22E6B027000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E10001000
|
trusted library allocation
|
page read and write
|
||
27EC3802000
|
heap
|
page read and write
|
||
22E6B069000
|
heap
|
page read and write
|
||
22E6B06D000
|
heap
|
page read and write
|
||
22E6B06B000
|
heap
|
page read and write
|
||
8EF000
|
stack
|
page read and write
|
||
24F0000
|
heap
|
page read and write
|
||
22E6B027000
|
heap
|
page read and write
|
||
22E6C8E0000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
6DE000
|
stack
|
page read and write
|
||
22E6B075000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
38B5000
|
trusted library allocation
|
page read and write
|
||
22FD000
|
stack
|
page read and write
|
||
22E6B060000
|
trusted library allocation
|
page read and write
|
||
22E6B3E0000
|
trusted library allocation
|
page read and write
|
||
22E6B062000
|
heap
|
page read and write
|
||
5AA000
|
heap
|
page read and write
|
||
1CE5E843000
|
heap
|
page read and write
|
||
3D6A000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
24F0000
|
heap
|
page read and write
|
||
22E6B025000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B037000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B036000
|
heap
|
page read and write
|
||
22E6B6B0000
|
trusted library allocation
|
page read and write
|
||
22E6B061000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B075000
|
heap
|
page read and write
|
||
22E68BBE000
|
heap
|
page read and write
|
||
22E6B03F000
|
heap
|
page read and write
|
||
5DE000
|
heap
|
page read and write
|
||
22E6C2E2000
|
trusted library allocation
|
page read and write
|
||
22E6B073000
|
heap
|
page read and write
|
||
53FEFFE000
|
stack
|
page read and write
|
||
22E6D133000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
37DB000
|
trusted library allocation
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
8CBE6FB000
|
stack
|
page read and write
|
||
22E6A6C0000
|
trusted library allocation
|
page read and write
|
||
22E6B03E000
|
heap
|
page read and write
|
||
1CE5E86B000
|
heap
|
page read and write
|
||
22E6B06F000
|
heap
|
page read and write
|
||
19510C55000
|
heap
|
page read and write
|
||
8EF000
|
stack
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
34F6000
|
heap
|
page read and write
|
||
22E6B052000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
22E6B070000
|
heap
|
page read and write
|
||
24C0000
|
remote allocation
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B036000
|
heap
|
page read and write
|
||
22E6B02A000
|
heap
|
page read and write
|
||
8EF000
|
stack
|
page read and write
|
||
22E6A640000
|
trusted library allocation
|
page read and write
|
||
22E0043C000
|
trusted library allocation
|
page read and write
|
||
2E9537C000
|
stack
|
page read and write
|
||
3361000
|
trusted library allocation
|
page read and write
|
||
22BD000
|
stack
|
page read and write
|
||
1CE5E847000
|
heap
|
page read and write
|
||
22E6A670000
|
trusted library allocation
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
25E0000
|
unkown
|
page read and write
|
||
22E6B06A000
|
heap
|
page read and write
|
||
222FBE60000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
300E000
|
stack
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6F930000
|
trusted library allocation
|
page read and write
|
||
22E68BB0000
|
heap
|
page read and write
|
||
6DE000
|
stack
|
page read and write
|
||
22E6B026000
|
heap
|
page read and write
|
||
22E6B037000
|
heap
|
page read and write
|
||
22E6B580000
|
trusted library allocation
|
page read and write
|
||
22E6F9E2000
|
heap
|
page read and write
|
||
2EF2000
|
heap
|
page read and write
|
||
22E6B063000
|
heap
|
page read and write
|
||
321F000
|
unkown
|
page read and write
|
||
246F000
|
stack
|
page read and write
|
||
22E6F625000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6F63E000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6C24A000
|
heap
|
page read and write
|
||
A2C000
|
stack
|
page read and write
|
||
5DE000
|
heap
|
page read and write
|
||
2ED0000
|
remote allocation
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
2C3E000
|
stack
|
page read and write
|
||
2751A4A0000
|
heap
|
page read and write
|
||
22E6B03B000
|
heap
|
page read and write
|
||
22E68D80000
|
heap
|
page read and write
|
||
22E6F67E000
|
trusted library allocation
|
page read and write
|
||
311E000
|
unkown
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B4E0000
|
trusted library allocation
|
page read and write
|
||
22E6B03C000
|
heap
|
page read and write
|
||
7C27F8C000
|
stack
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
222FBEC0000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
1CE5E841000
|
heap
|
page read and write
|
||
7FFCA0BA4000
|
trusted library allocation
|
page read and write
|
||
24BD000
|
stack
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
AFEB5FE000
|
stack
|
page read and write
|
||
22E6B380000
|
trusted library allocation
|
page read and write
|
||
22E6AFE0000
|
trusted library allocation
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6C900000
|
trusted library allocation
|
page read and write
|
||
19511722000
|
heap
|
page read and write
|
||
29A40013000
|
heap
|
page read and write
|
||
22E6B062000
|
heap
|
page read and write
|
||
22E6E7E6000
|
trusted library allocation
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
2320000
|
heap
|
page read and write
|
||
22E6C2B0000
|
heap
|
page read and write
|
||
22E6B071000
|
heap
|
page read and write
|
||
2320000
|
heap
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
7FFCA0CB0000
|
trusted library allocation
|
page execute and read and write
|
||
22E6B680000
|
trusted library allocation
|
page read and write
|
||
22E6CC80000
|
trusted library allocation
|
page read and write
|
||
2320000
|
heap
|
page read and write
|
||
24C0000
|
heap
|
page read and write
|
||
22E6C1ED000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
21F3C0D0000
|
heap
|
page read and write
|
||
22E6CC80000
|
trusted library allocation
|
page read and write
|
||
22E6B025000
|
heap
|
page read and write
|
||
22E6CC80000
|
trusted library allocation
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6B0B0000
|
trusted library allocation
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
293E000
|
stack
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
5AA000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B037000
|
heap
|
page read and write
|
||
22E6B390000
|
trusted library allocation
|
page read and write
|
||
22E6B070000
|
heap
|
page read and write
|
||
242E000
|
stack
|
page read and write
|
||
22E6B043000
|
heap
|
page read and write
|
||
2A30000
|
trusted library allocation
|
page read and write
|
||
22E6C977000
|
trusted library allocation
|
page read and write
|
||
663000
|
heap
|
page read and write
|
||
3895000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6FA9C000
|
heap
|
page read and write
|
||
22E6B0F0000
|
trusted library allocation
|
page read and write
|
||
22E6B063000
|
heap
|
page read and write
|
||
22E6B03B000
|
heap
|
page read and write
|
||
22E6B041000
|
heap
|
page read and write
|
||
22E6B063000
|
heap
|
page read and write
|
||
3D99000
|
trusted library allocation
|
page read and write
|
||
22E6C8D0000
|
trusted library allocation
|
page read and write
|
||
22E6B052000
|
heap
|
page read and write
|
||
22E6B036000
|
heap
|
page read and write
|
||
300E000
|
stack
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B063000
|
heap
|
page read and write
|
||
AD121FE000
|
stack
|
page read and write
|
||
22E6AEED000
|
heap
|
page read and write
|
||
389A000
|
trusted library allocation
|
page read and write
|
||
22E68D50000
|
trusted library allocation
|
page read and write
|
||
246D000
|
stack
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B210000
|
trusted library allocation
|
page read and write
|
||
22E6B069000
|
heap
|
page read and write
|
||
3732000
|
trusted library allocation
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
22E6B02E000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
1CE5E813000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B1D0000
|
trusted library allocation
|
page read and write
|
||
22E6B5D0000
|
trusted library allocation
|
page read and write
|
||
22E6B03A000
|
heap
|
page read and write
|
||
663000
|
heap
|
page read and write
|
||
22E6B030000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
A2C000
|
stack
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
22E6B07C000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6CC50000
|
trusted library allocation
|
page read and write
|
||
22E6ED13000
|
trusted library allocation
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
22E6B061000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
293E000
|
stack
|
page read and write
|
||
22E6B061000
|
heap
|
page read and write
|
||
22E6CC80000
|
trusted library allocation
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
AFEB4FE000
|
stack
|
page read and write
|
||
22E6B070000
|
trusted library allocation
|
page read and write
|
||
22E6B026000
|
heap
|
page read and write
|
||
22E6B4A0000
|
trusted library allocation
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
22E6B03F000
|
heap
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
||
29A40040000
|
heap
|
page read and write
|
||
22E6F657000
|
trusted library allocation
|
page read and write
|
||
1CE5E869000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
1CE5E87C000
|
heap
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
9D000
|
stack
|
page read and write
|
||
22E6B069000
|
heap
|
page read and write
|
||
22E0000
|
remote allocation
|
page read and write
|
||
22E6B063000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
22E6F190000
|
heap
|
page read and write
|
||
275FB7E000
|
stack
|
page read and write
|
||
22E6B062000
|
heap
|
page read and write
|
||
53FEEFE000
|
stack
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
19511802000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6A6E0000
|
trusted library allocation
|
page read and write
|
||
22E6FA03000
|
heap
|
page read and write
|
||
22E6B034000
|
heap
|
page read and write
|
||
22E6AFA3000
|
heap
|
page read and write
|
||
22E6B030000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6CC80000
|
trusted library allocation
|
page read and write
|
||
7FFCA0C40000
|
trusted library allocation
|
page execute and read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
22E6CC50000
|
trusted library allocation
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
5DE000
|
heap
|
page read and write
|
||
53FE395000
|
stack
|
page read and write
|
||
22E6CC80000
|
trusted library allocation
|
page read and write
|
||
22E6B03C000
|
heap
|
page read and write
|
||
22E6B490000
|
trusted library allocation
|
page read and write
|
||
22E6B061000
|
heap
|
page read and write
|
||
22E6B035000
|
trusted library allocation
|
page read and write
|
||
22E6CC82000
|
trusted library allocation
|
page read and write
|
||
2ECE000
|
stack
|
page read and write
|
||
22E6F9AD000
|
heap
|
page read and write
|
||
2DF1000
|
trusted library allocation
|
page read and write
|
||
22E6CC80000
|
trusted library allocation
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22FD000
|
stack
|
page read and write
|
||
22E6FA76000
|
heap
|
page read and write
|
||
222FDA02000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6D2F0000
|
trusted library allocation
|
page read and write
|
||
222FBFC0000
|
trusted library allocation
|
page read and write
|
||
A2C000
|
stack
|
page read and write
|
||
22E6B190000
|
trusted library allocation
|
page read and write
|
||
22E68CB0000
|
trusted library allocation
|
page read and write
|
||
22E6B0A0000
|
trusted library allocation
|
page read and write
|
||
22E6B340000
|
trusted library allocation
|
page read and write
|
||
22E6A650000
|
trusted library allocation
|
page read and write
|
||
AFEB37C000
|
stack
|
page read and write
|
||
22E68D50000
|
trusted library allocation
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6CC51000
|
trusted library allocation
|
page read and write
|
||
22E6B03C000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
||
21F3C279000
|
heap
|
page read and write
|
||
22E6D137000
|
heap
|
page read and write
|
||
27EC30CB000
|
heap
|
page read and write
|
||
22E6B0C0000
|
trusted library allocation
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6CC53000
|
trusted library allocation
|
page read and write
|
||
22E6C26B000
|
heap
|
page read and write
|
||
22FD000
|
stack
|
page read and write
|
||
24F0000
|
trusted library allocation
|
page read and write
|
||
22E6C9B0000
|
trusted library allocation
|
page read and write
|
||
5B8000
|
heap
|
page execute and read and write
|
||
22E6B06B000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6F61A000
|
trusted library allocation
|
page read and write
|
||
3736000
|
trusted library allocation
|
page read and write
|
||
22E6A680000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
5B8000
|
heap
|
page execute and read and write
|
||
2550000
|
heap
|
page read and write
|
||
22E6C890000
|
trusted library allocation
|
page read and write
|
||
5DE000
|
heap
|
page read and write
|
||
22E6F650000
|
trusted library allocation
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6FA5C000
|
heap
|
page read and write
|
||
29A40802000
|
trusted library allocation
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
68C000
|
heap
|
page read and write
|
||
AD11BEB000
|
stack
|
page read and write
|
||
2975EE00000
|
heap
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
21F3C202000
|
heap
|
page read and write
|
||
22E6B039000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
19510C29000
|
heap
|
page read and write
|
||
1CE5E863000
|
heap
|
page read and write
|
||
22E6B037000
|
heap
|
page read and write
|
||
22E6B036000
|
heap
|
page read and write
|
||
22E6B040000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
5B8000
|
heap
|
page execute and read and write
|
||
22E6A640000
|
trusted library allocation
|
page read and write
|
||
22E6B026000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
2E8D000
|
stack
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
24C0000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
22E6B06D000
|
heap
|
page read and write
|
||
24F0000
|
heap
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
2975EE29000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
222FC048000
|
heap
|
page read and write
|
||
22E6B05D000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
22E6B05B000
|
heap
|
page read and write
|
||
7FFCA0CA2000
|
trusted library allocation
|
page read and write
|
||
22E6D2F0000
|
trusted library allocation
|
page read and write
|
||
22E6B036000
|
heap
|
page read and write
|
||
22E6B05B000
|
heap
|
page read and write
|
||
22E6FE40000
|
trusted library allocation
|
page read and write
|
||
22E6B050000
|
trusted library allocation
|
page read and write
|
||
1CE5E866000
|
heap
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6B038000
|
heap
|
page read and write
|
||
22E6B540000
|
trusted library allocation
|
page read and write
|
||
22E6B350000
|
trusted library allocation
|
page read and write
|
||
3B64000
|
trusted library allocation
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
22E6CC80000
|
trusted library allocation
|
page read and write
|
||
22FD000
|
stack
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
22E6D2F0000
|
trusted library allocation
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
||
22E6C8E0000
|
trusted library allocation
|
page read and write
|
||
22E6B180000
|
trusted library allocation
|
page read and write
|
||
3939000
|
trusted library allocation
|
page read and write
|
||
22E6B100000
|
trusted library allocation
|
page read and write
|
||
22E6A690000
|
trusted library allocation
|
page read and write
|
||
22E6F628000
|
trusted library allocation
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
22E6B068000
|
heap
|
page read and write
|
||
2DE0000
|
trusted library allocation
|
page read and write
|
||
5DE000
|
heap
|
page read and write
|
There are 2367 hidden memdumps, click here to show them.