Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
OceanicTools.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\foekseyrkkzyooxy\qflwedtkihuzyxlg.exe
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\foekseyrkkzyooxy\qflwedtkihuzyxlg.exe:a.dll
|
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2ydgkqm4.hvm.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_esdjv2hf.usj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ewsbthld.xe1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k43eqanp.ixk.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ok5tzepb.rs5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pt45fufj.tj4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rhmebzhd.nwh.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tbogp5v5.2nq.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
\Device\Null
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 3 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\OceanicTools.exe
|
"C:\Users\user\Desktop\OceanicTools.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" "-Command" "$cmd = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('QWRkLU1wUHJlZmVyZW5jZSAtRXhjbHVzaW9uUGF0aCAiQzpcVXNlcnNcYWxmb25zXGZvZWtzZXlya2t6eW9veHki'));
Invoke-Expression $cmd"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" "-Command" "$cmd = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('QWRkLU1wUHJlZmVyZW5jZSAtRXhjbHVzaW9uUGF0aCAiQzpcVXNlcnNcYWxmb25zXGZvZWtzZXlya2t6eW9veHlccWZsd2VkdGtpaHV6eXhsZy5leGUi'));
Invoke-Expression $cmd"
|
||
C:\Users\user\foekseyrkkzyooxy\qflwedtkihuzyxlg.exe
|
"C:\Users\user\foekseyrkkzyooxy\qflwedtkihuzyxlg.exe"
|
||
C:\Users\user\foekseyrkkzyooxy\qflwedtkihuzyxlg.exe
|
"C:\Users\user\foekseyrkkzyooxy\qflwedtkihuzyxlg.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\foekseyrkkzyooxy\qflwedtkihuzyxlg.exe"
|
||
C:\Windows\System32\PING.EXE
|
ping 1.1.1.1 -n 1 -w 3000
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\reg.exe
|
"reg" "query" "SYSTEM\CurrentControlSet\Services\Disk\Enum"
|
||
C:\Windows\System32\wbem\WMIC.exe
|
"wmic" "computersystem" "get" "manufacturer"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://ns.adobe.c.0/tif
|
unknown
|
||
http://ns.adobe.hotosh
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
http://ns.adoraw-sei
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://ns.adobe.c.0/ti
|
unknown
|
||
http://ns.photo/
|
unknown
|
||
http://ns.a.0/sTy
|
unknown
|
||
http://ns.adobe.hotoshi
|
unknown
|
||
http://185.208.158.47/phantomtoolsv2.exe
|
185.208.158.47
|
||
http://www.micom/pkiops/Docs/ry.htm0
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
http://crl.micro/pki/crl/productCerAut_2010-06-2
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://api.ipify.org/8v
|
unknown
|
||
http://ns.photo/i
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://crl.micft.cMicRosof
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://api.ipify.org/
|
104.26.13.205
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://ns.adoraw-se
|
unknown
|
||
http://ns.a.0/sTyi
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://www.micom/pki/certs/Miut_2010-06-23.cr
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://https:///&?=-_.~:
|
unknown
|
||
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
|
unknown
|
||
http://crl.micro
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
http://185.208.158.47/phantomtoolsv2.exeAnalNosorog256X-Secret-Phrase
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://www.haskell.org/ghc/reportabug
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
https://support.mozilla.org
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
There are 44 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
api.ipify.org
|
104.26.13.205
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
79.137.202.152
|
unknown
|
Russian Federation
|
||
104.26.13.205
|
api.ipify.org
|
United States
|
||
185.208.158.47
|
unknown
|
Switzerland
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1FB10D28000
|
heap
|
page read and write
|
||
26F6D7F8000
|
heap
|
page read and write
|
||
1FB159F8000
|
heap
|
page read and write
|
||
7FF6350D1000
|
unkown
|
page execute read
|
||
1FB13175000
|
heap
|
page read and write
|
||
1FB10DC8000
|
heap
|
page read and write
|
||
1FB139B2000
|
heap
|
page read and write
|
||
1FB1662F000
|
heap
|
page read and write
|
||
220FAB00000
|
trusted library allocation
|
page read and write
|
||
1FB12AE0000
|
remote allocation
|
page read and write
|
||
1FB165C1000
|
heap
|
page read and write
|
||
1FB13A19000
|
heap
|
page read and write
|
||
1FB10DCE000
|
heap
|
page read and write
|
||
220FA0D0000
|
heap
|
page readonly
|
||
1FB1655F000
|
heap
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
1FB165FA000
|
heap
|
page read and write
|
||
1FB139B0000
|
heap
|
page read and write
|
||
861B3F6000
|
stack
|
page read and write
|
||
1FB12C90000
|
heap
|
page read and write
|
||
1FB133B2000
|
heap
|
page read and write
|
||
1FB10DCE000
|
heap
|
page read and write
|
||
1FB16606000
|
heap
|
page read and write
|
||
1FB131DD000
|
heap
|
page read and write
|
||
227C6430000
|
trusted library allocation
|
page read and write
|
||
1FB150FC000
|
heap
|
page read and write
|
||
1FB13CA7000
|
heap
|
page read and write
|
||
1FB139B2000
|
heap
|
page read and write
|
||
1FB13880000
|
heap
|
page read and write
|
||
26F6D2A2000
|
heap
|
page read and write
|
||
2B85D220000
|
heap
|
page read and write
|
||
26F6D7F8000
|
heap
|
page read and write
|
||
220F8A30000
|
heap
|
page read and write
|
||
1FB10D20000
|
heap
|
page read and write
|
||
1FB12DFA000
|
heap
|
page read and write
|
||
7FF6351DD000
|
unkown
|
page write copy
|
||
220815CD000
|
trusted library allocation
|
page read and write
|
||
1FB12D77000
|
heap
|
page read and write
|
||
B46C38D000
|
stack
|
page read and write
|
||
1FB13CDC000
|
heap
|
page read and write
|
||
1FB159C1000
|
heap
|
page read and write
|
||
1AA4C6C6000
|
trusted library allocation
|
page read and write
|
||
7FF6351E1000
|
unkown
|
page readonly
|
||
1FB13CFD000
|
heap
|
page read and write
|
||
1FB13A2D000
|
heap
|
page read and write
|
||
1FB12DAE000
|
heap
|
page read and write
|
||
1FB139E6000
|
heap
|
page read and write
|
||
1FB1331A000
|
heap
|
page read and write
|
||
1FB12DFA000
|
heap
|
page read and write
|
||
1FB12D79000
|
heap
|
page read and write
|
||
26F6F172000
|
heap
|
page read and write
|
||
1FB12C9E000
|
heap
|
page read and write
|
||
1FB16566000
|
heap
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page read and write
|
||
1D3FE9C0000
|
heap
|
page read and write
|
||
1FB10DF3000
|
heap
|
page read and write
|
||
1FB1526D000
|
heap
|
page read and write
|
||
1FB1657B000
|
heap
|
page read and write
|
||
7FF848E0B000
|
trusted library allocation
|
page read and write
|
||
1FB131BA000
|
heap
|
page read and write
|
||
220FA160000
|
trusted library allocation
|
page read and write
|
||
1FB148F1000
|
heap
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
1FB154B5000
|
heap
|
page read and write
|
||
1FB139AA000
|
heap
|
page read and write
|
||
7FF635370000
|
unkown
|
page write copy
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
DB356FE000
|
stack
|
page read and write
|
||
220FA7A0000
|
heap
|
page read and write
|
||
1FB12C05000
|
heap
|
page read and write
|
||
1FB13249000
|
heap
|
page read and write
|
||
227C6626000
|
heap
|
page read and write
|
||
220FA6FC000
|
heap
|
page read and write
|
||
22081108000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
1FB15CC4000
|
heap
|
page read and write
|
||
26F6D2BC000
|
heap
|
page read and write
|
||
1FB16948000
|
heap
|
page read and write
|
||
1FB139C3000
|
heap
|
page read and write
|
||
1FB152F9000
|
heap
|
page read and write
|
||
1FB12C71000
|
heap
|
page read and write
|
||
1AA63A0A000
|
heap
|
page read and write
|
||
1FB1654B000
|
heap
|
page read and write
|
||
1AA63A16000
|
heap
|
page read and write
|
||
861C2CD000
|
stack
|
page read and write
|
||
1FB10DC1000
|
heap
|
page read and write
|
||
1FB13FF5000
|
heap
|
page read and write
|
||
1FB139D2000
|
heap
|
page read and write
|
||
1FB1532B000
|
heap
|
page read and write
|
||
7FF849184000
|
trusted library allocation
|
page read and write
|
||
1FB12E3F000
|
heap
|
page read and write
|
||
1FB12B18000
|
heap
|
page read and write
|
||
DB34E93000
|
stack
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
220FA245000
|
heap
|
page read and write
|
||
7FF849192000
|
trusted library allocation
|
page read and write
|
||
1FB12BBF000
|
heap
|
page read and write
|
||
1FB13D78000
|
heap
|
page read and write
|
||
2209006D000
|
trusted library allocation
|
page read and write
|
||
1FB153CB000
|
heap
|
page read and write
|
||
26F6D2B1000
|
heap
|
page read and write
|
||
7FF7C92E5000
|
unkown
|
page readonly
|
||
1FB1307B000
|
heap
|
page read and write
|
||
C1D819D000
|
stack
|
page read and write
|
||
1FB16973000
|
heap
|
page read and write
|
||
22080FEA000
|
trusted library allocation
|
page read and write
|
||
7FF7C91B4000
|
unkown
|
page write copy
|
||
1FB1681D000
|
heap
|
page read and write
|
||
1FB153D5000
|
heap
|
page read and write
|
||
1AA4B4F0000
|
heap
|
page execute and read and write
|
||
1FB165FF000
|
heap
|
page read and write
|
||
1FB10D10000
|
heap
|
page read and write
|
||
1FB13C92000
|
heap
|
page read and write
|
||
1D3FE750000
|
heap
|
page read and write
|
||
1FB13998000
|
heap
|
page read and write
|
||
1FB10DCE000
|
heap
|
page read and write
|
||
1FB10D96000
|
heap
|
page read and write
|
||
1FB12CA9000
|
heap
|
page read and write
|
||
26F6D2AA000
|
heap
|
page read and write
|
||
1FB133ED000
|
heap
|
page read and write
|
||
1FB143FD000
|
heap
|
page read and write
|
||
26F6F184000
|
heap
|
page read and write
|
||
1FB13CF2000
|
heap
|
page read and write
|
||
26F6D207000
|
heap
|
page read and write
|
||
1FB152BB000
|
heap
|
page read and write
|
||
22080512000
|
trusted library allocation
|
page read and write
|
||
1FB12D65000
|
heap
|
page read and write
|
||
1FB1688F000
|
heap
|
page read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
1AA6372B000
|
heap
|
page read and write
|
||
1FB139DC000
|
heap
|
page read and write
|
||
1FB149E4000
|
heap
|
page read and write
|
||
1FB1336B000
|
heap
|
page read and write
|
||
1FB139C3000
|
heap
|
page read and write
|
||
26F6D7D8000
|
heap
|
page read and write
|
||
1AA4B4F7000
|
heap
|
page execute and read and write
|
||
1FB139A4000
|
heap
|
page read and write
|
||
1FB1699D000
|
heap
|
page read and write
|
||
1FB139EF000
|
heap
|
page read and write
|
||
1AA4AF90000
|
heap
|
page read and write
|
||
1FB159EA000
|
heap
|
page read and write
|
||
1FB139CD000
|
heap
|
page read and write
|
||
1FB168AB000
|
heap
|
page read and write
|
||
26F6D290000
|
heap
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
1FB16623000
|
heap
|
page read and write
|
||
1FB139EA000
|
heap
|
page read and write
|
||
220FAA15000
|
heap
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
DB352F9000
|
stack
|
page read and write
|
||
1FB15393000
|
heap
|
page read and write
|
||
1FB13988000
|
heap
|
page read and write
|
||
7FF849273000
|
trusted library allocation
|
page read and write
|
||
1FB139C9000
|
heap
|
page read and write
|
||
1FB13D09000
|
heap
|
page read and write
|
||
1AA4C72C000
|
trusted library allocation
|
page read and write
|
||
1FB15A8A000
|
heap
|
page read and write
|
||
1FB1670F000
|
heap
|
page read and write
|
||
2B85D22D000
|
heap
|
page read and write
|
||
1FB139E2000
|
heap
|
page read and write
|
||
1FB139CF000
|
heap
|
page read and write
|
||
1FB153AB000
|
heap
|
page read and write
|
||
1FB166C8000
|
heap
|
page read and write
|
||
861C247000
|
stack
|
page read and write
|
||
1FB15228000
|
heap
|
page read and write
|
||
26F6D120000
|
trusted library allocation
|
page read and write
|
||
26F6D480000
|
heap
|
page read and write
|
||
1FB139F3000
|
heap
|
page read and write
|
||
1FB12D70000
|
heap
|
page read and write
|
||
1FB13695000
|
heap
|
page read and write
|
||
7EF4BBF6F000
|
direct allocation
|
page read and write
|
||
1FB168F3000
|
heap
|
page read and write
|
||
8652DFB000
|
stack
|
page read and write
|
||
1FB13433000
|
heap
|
page read and write
|
||
26F6D48E000
|
heap
|
page read and write
|
||
1FB13D90000
|
heap
|
page read and write
|
||
227C6330000
|
heap
|
page read and write
|
||
861C14E000
|
stack
|
page read and write
|
||
7FF6351DF000
|
unkown
|
page write copy
|
||
DB3527F000
|
stack
|
page read and write
|
||
1FB10DCE000
|
heap
|
page read and write
|
||
1FB13994000
|
heap
|
page read and write
|
||
7FF848EA6000
|
trusted library allocation
|
page read and write
|
||
1FB1400E000
|
heap
|
page read and write
|
||
1FB13988000
|
heap
|
page read and write
|
||
1FB139FC000
|
heap
|
page read and write
|
||
1AA4CBCA000
|
trusted library allocation
|
page read and write
|
||
2208007F000
|
trusted library allocation
|
page read and write
|
||
1FB131F4000
|
heap
|
page read and write
|
||
1FB13C4E000
|
heap
|
page read and write
|
||
1FB1703A000
|
heap
|
page read and write
|
||
1FB1689D000
|
heap
|
page read and write
|
||
26F6D801000
|
heap
|
page read and write
|
||
1FB12CB6000
|
heap
|
page read and write
|
||
1FB12DEF000
|
heap
|
page read and write
|
||
1FB139CD000
|
heap
|
page read and write
|
||
140000000
|
remote allocation
|
page execute and read and write
|
||
26F6D2BC000
|
heap
|
page read and write
|
||
1FB12D65000
|
heap
|
page read and write
|
||
7FF635374000
|
unkown
|
page readonly
|
||
1FB12BF7000
|
heap
|
page read and write
|
||
1FB13252000
|
heap
|
page read and write
|
||
22080001000
|
trusted library allocation
|
page read and write
|
||
1FB10DC8000
|
heap
|
page read and write
|
||
1FB12D1A000
|
heap
|
page read and write
|
||
1FB13787000
|
heap
|
page read and write
|
||
26F6D7D0000
|
heap
|
page read and write
|
||
1FB13401000
|
heap
|
page read and write
|
||
1FB12D10000
|
heap
|
page read and write
|
||
1FB139FC000
|
heap
|
page read and write
|
||
1FB1538B000
|
heap
|
page read and write
|
||
1FB13333000
|
heap
|
page read and write
|
||
220FA110000
|
trusted library allocation
|
page read and write
|
||
1FB10DCE000
|
heap
|
page read and write
|
||
22090021000
|
trusted library allocation
|
page read and write
|
||
1FB12C74000
|
heap
|
page read and write
|
||
1FB16981000
|
heap
|
page read and write
|
||
1FB13E1C000
|
heap
|
page read and write
|
||
1FB13D67000
|
heap
|
page read and write
|
||
1FB1343B000
|
heap
|
page read and write
|
||
1FB12DE4000
|
heap
|
page read and write
|
||
26F6F186000
|
heap
|
page read and write
|
||
1FB152EA000
|
heap
|
page read and write
|
||
1FB12C9A000
|
heap
|
page read and write
|
||
1FB13E14000
|
heap
|
page read and write
|
||
1FB10E1A000
|
heap
|
page read and write
|
||
1FB143C4000
|
heap
|
page read and write
|
||
1FB131D9000
|
heap
|
page read and write
|
||
861B279000
|
stack
|
page read and write
|
||
7FF848FA1000
|
trusted library allocation
|
page read and write
|
||
1FB1321D000
|
heap
|
page read and write
|
||
1FB10E15000
|
heap
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
7FF849163000
|
trusted library allocation
|
page read and write
|
||
26F6D226000
|
heap
|
page read and write
|
||
1FB12C71000
|
heap
|
page read and write
|
||
1FB139BB000
|
heap
|
page read and write
|
||
1FB10DF3000
|
heap
|
page read and write
|
||
2B85D228000
|
heap
|
page read and write
|
||
1FB13984000
|
heap
|
page read and write
|
||
1FB15AC4000
|
heap
|
page read and write
|
||
1FB139A2000
|
heap
|
page read and write
|
||
1AA636E0000
|
heap
|
page read and write
|
||
1FB15D0E000
|
heap
|
page read and write
|
||
1FB15B19000
|
heap
|
page read and write
|
||
1FB10DC5000
|
heap
|
page read and write
|
||
1FB13A6D000
|
heap
|
page read and write
|
||
1FB10DC8000
|
heap
|
page read and write
|
||
26F6F184000
|
heap
|
page read and write
|
||
1FB12C9A000
|
heap
|
page read and write
|
||
7FF84924A000
|
trusted library allocation
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
1FB10DCE000
|
heap
|
page read and write
|
||
1FB12D76000
|
heap
|
page read and write
|
||
1FB13414000
|
heap
|
page read and write
|
||
1FB15A5C000
|
heap
|
page read and write
|
||
1FB1335B000
|
heap
|
page read and write
|
||
1FB14282000
|
heap
|
page read and write
|
||
1FB13E5E000
|
heap
|
page read and write
|
||
1FB10E19000
|
heap
|
page read and write
|
||
1FB12E0B000
|
heap
|
page read and write
|
||
22080FE8000
|
trusted library allocation
|
page read and write
|
||
1FB12DCC000
|
heap
|
page read and write
|
||
1FB139A2000
|
heap
|
page read and write
|
||
C2591FF000
|
stack
|
page read and write
|
||
26F6D2B4000
|
heap
|
page read and write
|
||
C1D8FFD000
|
stack
|
page read and write
|
||
1FB13FEE000
|
heap
|
page read and write
|
||
1FB13CDE000
|
heap
|
page read and write
|
||
1AA4CD39000
|
trusted library allocation
|
page read and write
|
||
1FB139B2000
|
heap
|
page read and write
|
||
26F6F170000
|
heap
|
page read and write
|
||
1FB13375000
|
heap
|
page read and write
|
||
861B67A000
|
stack
|
page read and write
|
||
1FB14096000
|
heap
|
page read and write
|
||
1AA4C6C8000
|
trusted library allocation
|
page read and write
|
||
1FB139BB000
|
heap
|
page read and write
|
||
1FB139C3000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
1FB1396B000
|
heap
|
page read and write
|
||
7FF848DF4000
|
trusted library allocation
|
page read and write
|
||
1FB13C5E000
|
heap
|
page read and write
|
||
1FB15B6E000
|
heap
|
page read and write
|
||
1FB13A2D000
|
heap
|
page read and write
|
||
1FB1369A000
|
heap
|
page read and write
|
||
1FB12D65000
|
heap
|
page read and write
|
||
1AA63B6E000
|
heap
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
1FB12C00000
|
heap
|
page read and write
|
||
1FB13BBE000
|
heap
|
page read and write
|
||
1FB10DF3000
|
heap
|
page read and write
|
||
DB353F7000
|
stack
|
page read and write
|
||
1FB10DF3000
|
heap
|
page read and write
|
||
22080E2E000
|
trusted library allocation
|
page read and write
|
||
1FB139D4000
|
heap
|
page read and write
|
||
1FB12C90000
|
heap
|
page read and write
|
||
1FB12C9B000
|
heap
|
page read and write
|
||
1AA4963E000
|
heap
|
page read and write
|
||
7FF848EA6000
|
trusted library allocation
|
page read and write
|
||
1AA63A78000
|
heap
|
page read and write
|
||
1FB12CB0000
|
heap
|
page read and write
|
||
1FB133C5000
|
heap
|
page read and write
|
||
22090031000
|
trusted library allocation
|
page read and write
|
||
1FB139A4000
|
heap
|
page read and write
|
||
1AA63809000
|
heap
|
page read and write
|
||
1FB12B48000
|
heap
|
page read and write
|
||
220F8792000
|
heap
|
page read and write
|
||
22081CCE000
|
trusted library allocation
|
page read and write
|
||
1FB12C82000
|
heap
|
page read and write
|
||
1FB131EB000
|
heap
|
page read and write
|
||
1FB139C3000
|
heap
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
7FF848FD4000
|
trusted library allocation
|
page read and write
|
||
1FB15A76000
|
heap
|
page read and write
|
||
1FB152CB000
|
heap
|
page read and write
|
||
1FB12E00000
|
heap
|
page read and write
|
||
1FB12D10000
|
heap
|
page read and write
|
||
1FB1444C000
|
heap
|
page read and write
|
||
1FB13233000
|
heap
|
page read and write
|
||
1FB166E4000
|
heap
|
page read and write
|
||
1FB159E4000
|
heap
|
page read and write
|
||
7FF848FD4000
|
trusted library allocation
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
7EF4BDD6F000
|
direct allocation
|
page read and write
|
||
1FB13BC8000
|
heap
|
page read and write
|
||
1FB13C66000
|
heap
|
page read and write
|
||
7FF635370000
|
unkown
|
page write copy
|
||
DB362CC000
|
stack
|
page read and write
|
||
1FB13BD2000
|
heap
|
page read and write
|
||
1FB13AAC000
|
heap
|
page read and write
|
||
1FB12AE0000
|
remote allocation
|
page read and write
|
||
1FB10DF3000
|
heap
|
page read and write
|
||
1FB13FD6000
|
heap
|
page read and write
|
||
1FB16601000
|
heap
|
page read and write
|
||
1AA4B6E1000
|
trusted library allocation
|
page read and write
|
||
7FF849189000
|
trusted library allocation
|
page read and write
|
||
7EF4BAA00000
|
direct allocation
|
page read and write
|
||
1FB10E1B000
|
heap
|
page read and write
|
||
1FB12C71000
|
heap
|
page read and write
|
||
1FB139A4000
|
heap
|
page read and write
|
||
1FB139DA000
|
heap
|
page read and write
|
||
1FB139C3000
|
heap
|
page read and write
|
||
1FB12CB0000
|
heap
|
page read and write
|
||
1FB139C3000
|
heap
|
page read and write
|
||
861B6FE000
|
stack
|
page read and write
|
||
1AA5B9C7000
|
trusted library allocation
|
page read and write
|
||
1FB1434C000
|
heap
|
page read and write
|
||
1FB139A4000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
1FB13A19000
|
heap
|
page read and write
|
||
1FB13A2E000
|
heap
|
page read and write
|
||
1FB139FC000
|
heap
|
page read and write
|
||
1FB134F3000
|
heap
|
page read and write
|
||
1FB139AA000
|
heap
|
page read and write
|
||
1FB10FD0000
|
heap
|
page read and write
|
||
1FB13BB2000
|
heap
|
page read and write
|
||
1FB15A3B000
|
heap
|
page read and write
|
||
1FB13A2D000
|
heap
|
page read and write
|
||
DB3577E000
|
stack
|
page read and write
|
||
1FB139B6000
|
heap
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
1FB143A5000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
1FB152A2000
|
heap
|
page read and write
|
||
1FB139D3000
|
heap
|
page read and write
|
||
1FB1527E000
|
heap
|
page read and write
|
||
220FAA2A000
|
heap
|
page read and write
|
||
86531FF000
|
stack
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
1FB168E4000
|
heap
|
page read and write
|
||
26F6D7FE000
|
heap
|
page read and write
|
||
1AA63AB0000
|
heap
|
page read and write
|
||
26F6D232000
|
heap
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
1FB139B2000
|
heap
|
page read and write
|
||
26F6D22A000
|
heap
|
page read and write
|
||
1FB13A19000
|
heap
|
page read and write
|
||
26F6D2B1000
|
heap
|
page read and write
|
||
C25927F000
|
stack
|
page read and write
|
||
1FB16603000
|
heap
|
page read and write
|
||
1FB12DED000
|
heap
|
page read and write
|
||
1FB139AA000
|
heap
|
page read and write
|
||
1FB15304000
|
heap
|
page read and write
|
||
1FB13B90000
|
heap
|
page read and write
|
||
1FB13A19000
|
heap
|
page read and write
|
||
DB3624F000
|
stack
|
page read and write
|
||
1FB12D10000
|
heap
|
page read and write
|
||
26F6D7F8000
|
heap
|
page read and write
|
||
220FA9EB000
|
heap
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
22081388000
|
trusted library allocation
|
page read and write
|
||
1FB139FC000
|
heap
|
page read and write
|
||
26F6D2B0000
|
heap
|
page read and write
|
||
1FB13D32000
|
heap
|
page read and write
|
||
1AA4AFD0000
|
trusted library allocation
|
page read and write
|
||
1FB15283000
|
heap
|
page read and write
|
||
1FB139A4000
|
heap
|
page read and write
|
||
1FB13D52000
|
heap
|
page read and write
|
||
1FB13694000
|
heap
|
page read and write
|
||
220FA150000
|
heap
|
page read and write
|
||
1FB12E67000
|
heap
|
page read and write
|
||
1FB15380000
|
heap
|
page read and write
|
||
1FB131BB000
|
heap
|
page read and write
|
||
1AA63B58000
|
heap
|
page read and write
|
||
1FB139EF000
|
heap
|
page read and write
|
||
1FB12DF1000
|
heap
|
page read and write
|
||
1FB139BB000
|
heap
|
page read and write
|
||
1FB13C9D000
|
heap
|
page read and write
|
||
7FF7C8721000
|
unkown
|
page execute read
|
||
1AA4D3AF000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
1FB13D46000
|
heap
|
page read and write
|
||
220F8A35000
|
heap
|
page read and write
|
||
1FB139D2000
|
heap
|
page read and write
|
||
1FB10DCE000
|
heap
|
page read and write
|
||
1FB143DD000
|
heap
|
page read and write
|
||
220FA9D7000
|
heap
|
page read and write
|
||
26F6D48D000
|
heap
|
page read and write
|
||
1FB139CD000
|
heap
|
page read and write
|
||
7FF849195000
|
trusted library allocation
|
page read and write
|
||
1FB13981000
|
heap
|
page read and write
|
||
1FB15A7E000
|
heap
|
page read and write
|
||
1FB1599D000
|
heap
|
page read and write
|
||
1FB13D7C000
|
heap
|
page read and write
|
||
1FB12DEF000
|
heap
|
page read and write
|
||
1AA4CA02000
|
trusted library allocation
|
page read and write
|
||
7FF849229000
|
trusted library allocation
|
page read and write
|
||
1AA4AFF0000
|
trusted library allocation
|
page read and write
|
||
7FF7C91B0000
|
unkown
|
page write copy
|
||
1FB166D6000
|
heap
|
page read and write
|
||
7FF7C91B6000
|
unkown
|
page write copy
|
||
1FB12C90000
|
heap
|
page read and write
|
||
26F6D2BD000
|
heap
|
page read and write
|
||
1FB1399A000
|
heap
|
page read and write
|
||
26F6D7ED000
|
heap
|
page read and write
|
||
26F6D120000
|
trusted library allocation
|
page read and write
|
||
1FB1523C000
|
heap
|
page read and write
|
||
1AA495D0000
|
heap
|
page read and write
|
||
1FB15A9D000
|
heap
|
page read and write
|
||
7FF849163000
|
trusted library allocation
|
page read and write
|
||
26F6D19A000
|
heap
|
page read and write
|
||
1FB13263000
|
heap
|
page read and write
|
||
1FB139DC000
|
heap
|
page read and write
|
||
1FB15AAE000
|
heap
|
page read and write
|
||
1FB13367000
|
heap
|
page read and write
|
||
220FAA7C000
|
heap
|
page read and write
|
||
1FB1447D000
|
heap
|
page read and write
|
||
26F6D252000
|
heap
|
page read and write
|
||
1FB13680000
|
heap
|
page read and write
|
||
220F8797000
|
heap
|
page read and write
|
||
7FF848EAC000
|
trusted library allocation
|
page execute and read and write
|
||
1FB168BA000
|
heap
|
page read and write
|
||
861ADFE000
|
stack
|
page read and write
|
||
1FB12DF4000
|
heap
|
page read and write
|
||
1FB139E4000
|
heap
|
page read and write
|
||
1FB15276000
|
heap
|
page read and write
|
||
1FB10E19000
|
heap
|
page read and write
|
||
1FB10E1B000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
26F6D1D0000
|
heap
|
page read and write
|
||
1FB139CD000
|
heap
|
page read and write
|
||
DB3644D000
|
stack
|
page read and write
|
||
220FA955000
|
heap
|
page read and write
|
||
1FB12E20000
|
heap
|
page read and write
|
||
1FB13E13000
|
heap
|
page read and write
|
||
1FB139DA000
|
heap
|
page read and write
|
||
1FB13282000
|
heap
|
page read and write
|
||
1FB10E1B000
|
heap
|
page read and write
|
||
1FB139DA000
|
heap
|
page read and write
|
||
26F6D7E3000
|
heap
|
page read and write
|
||
1FB16598000
|
heap
|
page read and write
|
||
1FB13A04000
|
heap
|
page read and write
|
||
1FB12E02000
|
heap
|
page read and write
|
||
7FF848FA1000
|
trusted library allocation
|
page read and write
|
||
1FB12CA2000
|
heap
|
page read and write
|
||
1FB1399B000
|
heap
|
page read and write
|
||
1FB152B5000
|
heap
|
page read and write
|
||
22081355000
|
trusted library allocation
|
page read and write
|
||
1FB1428C000
|
heap
|
page read and write
|
||
1FB15ACE000
|
heap
|
page read and write
|
||
220F8705000
|
heap
|
page read and write
|
||
22080DB9000
|
trusted library allocation
|
page read and write
|
||
1FB13386000
|
heap
|
page read and write
|
||
220F8799000
|
heap
|
page read and write
|
||
26F6D252000
|
heap
|
page read and write
|
||
1FB139E3000
|
heap
|
page read and write
|
||
1FB139A4000
|
heap
|
page read and write
|
||
1FB10EF0000
|
heap
|
page read and write
|
||
7FF6350D1000
|
unkown
|
page execute read
|
||
1FB13A19000
|
heap
|
page read and write
|
||
1FB13CB2000
|
heap
|
page read and write
|
||
2B85D1A0000
|
heap
|
page read and write
|
||
1FB10DF3000
|
heap
|
page read and write
|
||
1FB12DE6000
|
heap
|
page read and write
|
||
1FB165BF000
|
heap
|
page read and write
|
||
1FB1548B000
|
heap
|
page read and write
|
||
1FB10DF3000
|
heap
|
page read and write
|
||
1FB139D2000
|
heap
|
page read and write
|
||
1FB12D1A000
|
heap
|
page read and write
|
||
26F6D7E1000
|
heap
|
page read and write
|
||
1FB15A64000
|
heap
|
page read and write
|
||
1FB139A5000
|
heap
|
page read and write
|
||
26F6D207000
|
heap
|
page read and write
|
||
1FB13268000
|
heap
|
page read and write
|
||
1FB16756000
|
heap
|
page read and write
|
||
1FB12E08000
|
heap
|
page read and write
|
||
1FB139F9000
|
heap
|
page read and write
|
||
1FB13B8F000
|
heap
|
page read and write
|
||
1FB1396C000
|
heap
|
page read and write
|
||
1D3FE870000
|
heap
|
page read and write
|
||
1FB13349000
|
heap
|
page read and write
|
||
DB34F9E000
|
stack
|
page read and write
|
||
1FB169BA000
|
heap
|
page read and write
|
||
DB34FDE000
|
stack
|
page read and write
|
||
1FB14ADA000
|
heap
|
page read and write
|
||
1FB13CF8000
|
heap
|
page read and write
|
||
1FB139AA000
|
heap
|
page read and write
|
||
220815F4000
|
trusted library allocation
|
page read and write
|
||
1FB12CE0000
|
heap
|
page read and write
|
||
1FB12DAE000
|
heap
|
page read and write
|
||
7EF4BA000000
|
direct allocation
|
page read and write
|
||
1FB13D5E000
|
heap
|
page read and write
|
||
1FB1678E000
|
heap
|
page read and write
|
||
1FB1338E000
|
heap
|
page read and write
|
||
1FB139A4000
|
heap
|
page read and write
|
||
7EF4BC96F000
|
direct allocation
|
page read and write
|
||
1FB12D1A000
|
heap
|
page read and write
|
||
F71BCFE000
|
unkown
|
page read and write
|
||
26F6D2A9000
|
heap
|
page read and write
|
||
7EF4BE76F000
|
direct allocation
|
page read and write
|
||
861B379000
|
stack
|
page read and write
|
||
1FB139EB000
|
heap
|
page read and write
|
||
1FB13C67000
|
heap
|
page read and write
|
||
1FB13DBE000
|
heap
|
page read and write
|
||
1FB139C0000
|
heap
|
page read and write
|
||
26F6D19E000
|
heap
|
page read and write
|
||
1FB139BB000
|
heap
|
page read and write
|
||
1FB10DCE000
|
heap
|
page read and write
|
||
1FB1307A000
|
heap
|
page read and write
|
||
1FB161CE000
|
heap
|
page read and write
|
||
1FB169AB000
|
heap
|
page read and write
|
||
26F6D2B2000
|
heap
|
page read and write
|
||
1FB13A2E000
|
heap
|
page read and write
|
||
1FB152F6000
|
heap
|
page read and write
|
||
7FF635374000
|
unkown
|
page readonly
|
||
1FB12CB0000
|
heap
|
page read and write
|
||
1FB10DF3000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
26F6D19E000
|
heap
|
page read and write
|
||
26F6F17D000
|
heap
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
220FA766000
|
heap
|
page read and write
|
||
1FB139CD000
|
heap
|
page read and write
|
||
1AA6377F000
|
heap
|
page read and write
|
||
1FB1318B000
|
heap
|
page read and write
|
||
1FB139A4000
|
heap
|
page read and write
|
||
26F6D207000
|
heap
|
page read and write
|
||
7FF6351E1000
|
unkown
|
page readonly
|
||
1FB10DCE000
|
heap
|
page read and write
|
||
220FA8E0000
|
heap
|
page read and write
|
||
1FB139DA000
|
heap
|
page read and write
|
||
F71BDFF000
|
stack
|
page read and write
|
||
1FB166B9000
|
heap
|
page read and write
|
||
1FB12B10000
|
heap
|
page read and write
|
||
1FB133E4000
|
heap
|
page read and write
|
||
1FB12E1F000
|
heap
|
page read and write
|
||
7FF848FD8000
|
trusted library allocation
|
page read and write
|
||
1FB1655D000
|
heap
|
page read and write
|
||
1FB139BB000
|
heap
|
page read and write
|
||
1FB12CBA000
|
heap
|
page read and write
|
||
1FB13681000
|
heap
|
page read and write
|
||
1FB1396B000
|
heap
|
page read and write
|
||
1FB13409000
|
heap
|
page read and write
|
||
1FB159FE000
|
heap
|
page read and write
|
||
1FB152D4000
|
heap
|
page read and write
|
||
26F6D25B000
|
heap
|
page read and write
|
||
1FB12C8E000
|
heap
|
page read and write
|
||
1FB154A0000
|
heap
|
page read and write
|
||
26F6D2A2000
|
heap
|
page read and write
|
||
1AA4965E000
|
heap
|
page read and write
|
||
1FB139A0000
|
heap
|
page read and write
|
||
26F6D2BA000
|
heap
|
page read and write
|
||
C1D8EFE000
|
stack
|
page read and write
|
||
26F6D805000
|
heap
|
page read and write
|
||
1FB12BF0000
|
heap
|
page read and write
|
||
1FB13354000
|
heap
|
page read and write
|
||
1FB139CD000
|
heap
|
page read and write
|
||
1FB153A0000
|
heap
|
page read and write
|
||
7FF7C91BD000
|
unkown
|
page write copy
|
||
1FB12E26000
|
heap
|
page read and write
|
||
1FB13D5A000
|
heap
|
page read and write
|
||
1FB13DC8000
|
heap
|
page read and write
|
||
1FB148F0000
|
heap
|
page read and write
|
||
1FB131CF000
|
heap
|
page read and write
|
||
C1D94FC000
|
stack
|
page read and write
|
||
1FB131C8000
|
heap
|
page read and write
|
||
1AA4964A000
|
heap
|
page read and write
|
||
1FB139C3000
|
heap
|
page read and write
|
||
220FA727000
|
heap
|
page read and write
|
||
1FB13C35000
|
heap
|
page read and write
|
||
1FB167BA000
|
heap
|
page read and write
|
||
26F6D7D7000
|
heap
|
page read and write
|
||
1FB159F4000
|
heap
|
page read and write
|
||
22081CD2000
|
trusted library allocation
|
page read and write
|
||
1FB139AA000
|
heap
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page read and write
|
||
1FB12CFF000
|
heap
|
page read and write
|
||
220FA960000
|
heap
|
page read and write
|
||
1FB10DC8000
|
heap
|
page read and write
|
||
1FB13B9D000
|
heap
|
page read and write
|
||
1FB12E04000
|
heap
|
page read and write
|
||
1FB13A92000
|
heap
|
page read and write
|
||
26F6D7DC000
|
heap
|
page read and write
|
||
1FB139CD000
|
heap
|
page read and write
|
||
1FB13329000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
1AA4CA35000
|
trusted library allocation
|
page read and write
|
||
26F6D2B1000
|
heap
|
page read and write
|
||
1FB12C79000
|
heap
|
page read and write
|
||
1FB131D6000
|
heap
|
page read and write
|
||
1FB13429000
|
heap
|
page read and write
|
||
1FB13D35000
|
heap
|
page read and write
|
||
1AA49646000
|
heap
|
page read and write
|
||
7DF4EB510000
|
trusted library allocation
|
page execute and read and write
|
||
1FB1658B000
|
heap
|
page read and write
|
||
26F6D7ED000
|
heap
|
page read and write
|
||
2208116C000
|
trusted library allocation
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
1FB16654000
|
heap
|
page read and write
|
||
1FB10E1B000
|
heap
|
page read and write
|
||
1FB13A45000
|
heap
|
page read and write
|
||
7EF4B9600000
|
direct allocation
|
page read and write
|
||
1FB1529F000
|
heap
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
1FB16592000
|
heap
|
page read and write
|
||
1FB12CF8000
|
heap
|
page read and write
|
||
1FB16628000
|
heap
|
page read and write
|
||
1FB13D6B000
|
heap
|
page read and write
|
||
1AA4C7BB000
|
trusted library allocation
|
page read and write
|
||
1AA5B9DA000
|
trusted library allocation
|
page read and write
|
||
1FB168C8000
|
heap
|
page read and write
|
||
1FB139A2000
|
heap
|
page read and write
|
||
1FB13D4E000
|
heap
|
page read and write
|
||
1AA5B9E4000
|
trusted library allocation
|
page read and write
|
||
1FB139B2000
|
heap
|
page read and write
|
||
1FB13981000
|
heap
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
1FB1442C000
|
heap
|
page read and write
|
||
7FF7C9286000
|
unkown
|
page write copy
|
||
B46C67F000
|
stack
|
page read and write
|
||
7DF4EB500000
|
trusted library allocation
|
page execute and read and write
|
||
1FB13220000
|
heap
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
1FB139EA000
|
heap
|
page read and write
|
||
1FB15A17000
|
heap
|
page read and write
|
||
1FB1340D000
|
heap
|
page read and write
|
||
26F6D2B5000
|
heap
|
page read and write
|
||
1FB13D72000
|
heap
|
page read and write
|
||
1FB10DC7000
|
heap
|
page read and write
|
||
1FB153F5000
|
heap
|
page read and write
|
||
26F6D1EC000
|
heap
|
page read and write
|
||
1FB15C4E000
|
heap
|
page read and write
|
||
22081B42000
|
trusted library allocation
|
page read and write
|
||
1FB13DA8000
|
heap
|
page read and write
|
||
1FB131A6000
|
heap
|
page read and write
|
||
1AA63800000
|
heap
|
page read and write
|
||
220810DC000
|
trusted library allocation
|
page read and write
|
||
7FF848FD2000
|
trusted library allocation
|
page read and write
|
||
1FB132B3000
|
heap
|
page read and write
|
||
1FB12D70000
|
heap
|
page read and write
|
||
1FB12C71000
|
heap
|
page read and write
|
||
7FF848E4C000
|
trusted library allocation
|
page execute and read and write
|
||
1FB131C7000
|
heap
|
page read and write
|
||
7FF6350D0000
|
unkown
|
page readonly
|
||
1FB149E4000
|
heap
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
1FB13D84000
|
heap
|
page read and write
|
||
1FB139B2000
|
heap
|
page read and write
|
||
1FB13201000
|
heap
|
page read and write
|
||
1FB131C2000
|
heap
|
page read and write
|
||
1FB12DE4000
|
heap
|
page read and write
|
||
7FF6351DF000
|
unkown
|
page write copy
|
||
26F6D26B000
|
heap
|
page read and write
|
||
1FB139D4000
|
heap
|
page read and write
|
||
1FB14465000
|
heap
|
page read and write
|
||
1FB139BB000
|
heap
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
220F879C000
|
heap
|
page read and write
|
||
1FB1341E000
|
heap
|
page read and write
|
||
1FB10DC1000
|
heap
|
page read and write
|
||
1FB165F8000
|
heap
|
page read and write
|
||
26F6F17D000
|
heap
|
page read and write
|
||
1FB13AA1000
|
heap
|
page read and write
|
||
1FB139D4000
|
heap
|
page read and write
|
||
26F6D23F000
|
heap
|
page read and write
|
||
26F6D207000
|
heap
|
page read and write
|
||
1FB14257000
|
heap
|
page read and write
|
||
1FB12E35000
|
heap
|
page read and write
|
||
1AA4D224000
|
trusted library allocation
|
page read and write
|
||
26F6D7FE000
|
heap
|
page read and write
|
||
1FB10DC8000
|
heap
|
page read and write
|
||
26F6D48B000
|
heap
|
page read and write
|
||
1FB16856000
|
heap
|
page read and write
|
||
1FB13BE6000
|
heap
|
page read and write
|
||
220FAB80000
|
heap
|
page read and write
|
||
1FB13E24000
|
heap
|
page read and write
|
||
1FB15A83000
|
heap
|
page read and write
|
||
1FB13AB2000
|
heap
|
page read and write
|
||
2714B835000
|
heap
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
1FB1661C000
|
heap
|
page read and write
|
||
1FB13D11000
|
heap
|
page read and write
|
||
1FB12DB6000
|
heap
|
page read and write
|
||
1FB16626000
|
heap
|
page read and write
|
||
2B85D1C0000
|
heap
|
page read and write
|
||
2B85D320000
|
heap
|
page read and write
|
||
1FB13A2D000
|
heap
|
page read and write
|
||
1D3FE9C5000
|
heap
|
page read and write
|
||
1FB12CCF000
|
heap
|
page read and write
|
||
1FB12D1A000
|
heap
|
page read and write
|
||
1FB152FD000
|
heap
|
page read and write
|
||
26F6D7E8000
|
heap
|
page read and write
|
||
1FB13A2D000
|
heap
|
page read and write
|
||
1FB12D1A000
|
heap
|
page read and write
|
||
7FF848DF2000
|
trusted library allocation
|
page read and write
|
||
1FB15A38000
|
heap
|
page read and write
|
||
1FB13690000
|
heap
|
page read and write
|
||
2714B82D000
|
heap
|
page read and write
|
||
1FB131DA000
|
heap
|
page read and write
|
||
1FB139BD000
|
heap
|
page read and write
|
||
1FB1673A000
|
heap
|
page read and write
|
||
1FB1426C000
|
heap
|
page read and write
|
||
1FB132FE000
|
heap
|
page read and write
|
||
1FB14475000
|
heap
|
page read and write
|
||
1FB12D79000
|
heap
|
page read and write
|
||
7FF848FD2000
|
trusted library allocation
|
page read and write
|
||
1FB15A4C000
|
heap
|
page read and write
|
||
220902FB000
|
trusted library allocation
|
page read and write
|
||
1AA49642000
|
heap
|
page read and write
|
||
7FF849184000
|
trusted library allocation
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
C258DF8000
|
stack
|
page read and write
|
||
220F86D3000
|
heap
|
page read and write
|
||
1FB139F9000
|
heap
|
page read and write
|
||
1FB139A0000
|
heap
|
page read and write
|
||
1FB12E08000
|
heap
|
page read and write
|
||
1AA63AE0000
|
heap
|
page read and write
|
||
1AA4C30F000
|
trusted library allocation
|
page read and write
|
||
1FB13BAD000
|
heap
|
page read and write
|
||
1FB1660C000
|
heap
|
page read and write
|
||
1FB13373000
|
heap
|
page read and write
|
||
2208125D000
|
trusted library allocation
|
page read and write
|
||
1FB15495000
|
heap
|
page read and write
|
||
22081323000
|
trusted library allocation
|
page read and write
|
||
1FB14361000
|
heap
|
page read and write
|
||
26F6D150000
|
heap
|
page read and write
|
||
1FB133C3000
|
heap
|
page read and write
|
||
227C6516000
|
heap
|
page read and write
|
||
7FF849146000
|
trusted library allocation
|
page read and write
|
||
1FB1691D000
|
heap
|
page read and write
|
||
1FB13359000
|
heap
|
page read and write
|
||
1FB15B24000
|
heap
|
page read and write
|
||
1FB167C8000
|
heap
|
page read and write
|
||
B46C6FF000
|
stack
|
page read and write
|
||
1FB139B2000
|
heap
|
page read and write
|
||
1FB12DDD000
|
heap
|
page read and write
|
||
1FB139A2000
|
heap
|
page read and write
|
||
1AA63B1E000
|
heap
|
page read and write
|
||
220F871D000
|
heap
|
page read and write
|
||
1FB13BA6000
|
heap
|
page read and write
|
||
26F6D230000
|
heap
|
page read and write
|
||
1AA4C32D000
|
trusted library allocation
|
page read and write
|
||
1FB15C03000
|
heap
|
page read and write
|
||
1FB131C3000
|
heap
|
page read and write
|
||
26F6D197000
|
heap
|
page read and write
|
||
1FB167AB000
|
heap
|
page read and write
|
||
1FB14006000
|
heap
|
page read and write
|
||
1FB13961000
|
heap
|
page read and write
|
||
1FB139D6000
|
heap
|
page read and write
|
||
1AA4B512000
|
heap
|
page read and write
|
||
1FB1436C000
|
heap
|
page read and write
|
||
1FB1683A000
|
heap
|
page read and write
|
||
1FB12DF1000
|
heap
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
1FB134A9000
|
heap
|
page read and write
|
||
1FB13BA8000
|
heap
|
page read and write
|
||
1FB13A35000
|
heap
|
page read and write
|
||
1FB15B39000
|
heap
|
page read and write
|
||
26F6D7DF000
|
heap
|
page read and write
|
||
1FB12D71000
|
heap
|
page read and write
|
||
1FB16964000
|
heap
|
page read and write
|
||
1FB12D70000
|
heap
|
page read and write
|
||
1AA63A9A000
|
heap
|
page read and write
|
||
26F6D299000
|
heap
|
page read and write
|
||
1FB10DF3000
|
heap
|
page read and write
|
||
7FF848EAC000
|
trusted library allocation
|
page execute and read and write
|
||
861B479000
|
stack
|
page read and write
|
||
220F8743000
|
heap
|
page read and write
|
||
1FB13A2D000
|
heap
|
page read and write
|
||
1FB12C9A000
|
heap
|
page read and write
|
||
1FB12BE0000
|
heap
|
page read and write
|
||
2714B80D000
|
heap
|
page read and write
|
||
1FB13314000
|
heap
|
page read and write
|
||
1AA4D2EA000
|
trusted library allocation
|
page read and write
|
||
2B85D244000
|
heap
|
page read and write
|
||
7FF6351DD000
|
unkown
|
page write copy
|
||
1AA63A52000
|
heap
|
page read and write
|
||
1FB139C3000
|
heap
|
page read and write
|
||
1FB16556000
|
heap
|
page read and write
|
||
7FF635370000
|
unkown
|
page read and write
|
||
C25917F000
|
stack
|
page read and write
|
||
1FB13239000
|
heap
|
page read and write
|
||
7FF7C919F000
|
unkown
|
page write copy
|
||
1FB1325B000
|
heap
|
page read and write
|
||
1FB16596000
|
heap
|
page read and write
|
||
220FA0C0000
|
trusted library allocation
|
page read and write
|
||
22080227000
|
trusted library allocation
|
page read and write
|
||
1FB167F2000
|
heap
|
page read and write
|
||
1FB10DCE000
|
heap
|
page read and write
|
||
1FB10DCE000
|
heap
|
page read and write
|
||
26F6D7FB000
|
heap
|
page read and write
|
||
1FB10DC8000
|
heap
|
page read and write
|
||
1FB139D2000
|
heap
|
page read and write
|
||
227C6798000
|
heap
|
page read and write
|
||
DB354F7000
|
stack
|
page read and write
|
||
1FB15249000
|
heap
|
page read and write
|
||
26F6D270000
|
heap
|
page read and write
|
||
1FB13D00000
|
heap
|
page read and write
|
||
1FB139D9000
|
heap
|
page read and write
|
||
1FB159A5000
|
heap
|
page read and write
|
||
26F6D234000
|
heap
|
page read and write
|
||
1FB13CD7000
|
heap
|
page read and write
|
||
1FB12D10000
|
heap
|
page read and write
|
||
1FB159F0000
|
heap
|
page read and write
|
||
1FB12C70000
|
heap
|
page read and write
|
||
DB3587B000
|
stack
|
page read and write
|
||
1AA49970000
|
heap
|
page read and write
|
||
1FB13A33000
|
heap
|
page read and write
|
||
DB3634E000
|
stack
|
page read and write
|
||
1AA4D3B3000
|
trusted library allocation
|
page read and write
|
||
220FA9EF000
|
heap
|
page read and write
|
||
1FB13171000
|
heap
|
page read and write
|
||
1FB13A9A000
|
heap
|
page read and write
|
||
1AA4D269000
|
trusted library allocation
|
page read and write
|
||
1FB12D70000
|
heap
|
page read and write
|
||
1FB10DCE000
|
heap
|
page read and write
|
||
1FB165F6000
|
heap
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
1FB15A92000
|
heap
|
page read and write
|
||
1FB16864000
|
heap
|
page read and write
|
||
1FB10DCE000
|
heap
|
page read and write
|
||
1FB12E0C000
|
heap
|
page read and write
|
||
1FB16801000
|
heap
|
page read and write
|
||
1FB139A4000
|
heap
|
page read and write
|
||
7FF848FD8000
|
trusted library allocation
|
page read and write
|
||
1FB15251000
|
heap
|
page read and write
|
||
C1D86FE000
|
stack
|
page read and write
|
||
1FB163ED000
|
heap
|
page read and write
|
||
26F6D230000
|
heap
|
page read and write
|
||
227C6430000
|
trusted library allocation
|
page read and write
|
||
1FB139E3000
|
heap
|
page read and write
|
||
1FB10DC2000
|
heap
|
page read and write
|
||
1AA63748000
|
heap
|
page read and write
|
||
1FB13981000
|
heap
|
page read and write
|
||
C1D8CFF000
|
stack
|
page read and write
|
||
1FB1336F000
|
heap
|
page read and write
|
||
1AA63B74000
|
heap
|
page read and write
|
||
1FB12C90000
|
heap
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
1FB12BE8000
|
heap
|
page read and write
|
||
26F6D207000
|
heap
|
page read and write
|
||
1FB154AB000
|
heap
|
page read and write
|
||
1FB10DF3000
|
heap
|
page read and write
|
||
1FB1392A000
|
heap
|
page read and write
|
||
1FB16588000
|
heap
|
page read and write
|
||
1FB13D16000
|
heap
|
page read and write
|
||
1FB15204000
|
heap
|
page read and write
|
||
1FB139EF000
|
heap
|
page read and write
|
||
227C6510000
|
heap
|
page read and write
|
||
861B07E000
|
stack
|
page read and write
|
||
220FAA57000
|
heap
|
page read and write
|
||
7FF635370000
|
unkown
|
page write copy
|
||
1FB10DCE000
|
heap
|
page read and write
|
||
1FB139CD000
|
heap
|
page read and write
|
||
2B85D0C0000
|
heap
|
page read and write
|
||
1FB139A0000
|
heap
|
page read and write
|
||
1FB12E30000
|
heap
|
page read and write
|
||
1FB1398F000
|
heap
|
page read and write
|
||
C1D85F7000
|
stack
|
page read and write
|
||
1FB13241000
|
heap
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
26F6D278000
|
heap
|
page read and write
|
||
1FB12C8F000
|
heap
|
page read and write
|
||
1FB139BB000
|
heap
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
1FB139BB000
|
heap
|
page read and write
|
||
1FB131DE000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
1FB139AA000
|
heap
|
page read and write
|
||
1FB139F9000
|
heap
|
page read and write
|
||
1AA63B6B000
|
heap
|
page read and write
|
||
1FB14514000
|
heap
|
page read and write
|
||
26F6D290000
|
heap
|
page read and write
|
||
2714B818000
|
heap
|
page read and write
|
||
220F86A0000
|
heap
|
page read and write
|
||
1FB13A2D000
|
heap
|
page read and write
|
||
1FB10DAB000
|
heap
|
page read and write
|
||
1FB139E2000
|
heap
|
page read and write
|
||
220814E8000
|
trusted library allocation
|
page read and write
|
||
1FB1446D000
|
heap
|
page read and write
|
||
1FB139E9000
|
heap
|
page read and write
|
||
1FB1392A000
|
heap
|
page read and write
|
||
1FB139C9000
|
heap
|
page read and write
|
||
C1D91FA000
|
stack
|
page read and write
|
||
7FF6350D1000
|
unkown
|
page execute read
|
||
26F6D7ED000
|
heap
|
page read and write
|
||
1FB139BB000
|
heap
|
page read and write
|
||
1FB139E3000
|
heap
|
page read and write
|
||
26F6D1D7000
|
heap
|
page read and write
|
||
1FB152C7000
|
heap
|
page read and write
|
||
1FB15A6D000
|
heap
|
page read and write
|
||
1FB15B64000
|
heap
|
page read and write
|
||
1FB16572000
|
heap
|
page read and write
|
||
1FB15A54000
|
heap
|
page read and write
|
||
1FB12C76000
|
heap
|
page read and write
|
||
1FB10DF3000
|
heap
|
page read and write
|
||
1FB13993000
|
heap
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
1FB13D70000
|
heap
|
page read and write
|
||
861B1FE000
|
stack
|
page read and write
|
||
2208140E000
|
trusted library allocation
|
page read and write
|
||
1FB12D1A000
|
heap
|
page read and write
|
||
1FB13D84000
|
heap
|
page read and write
|
||
1FB13ADA000
|
heap
|
page read and write
|
||
7FF8491C0000
|
trusted library allocation
|
page read and write
|
||
7FF848E0B000
|
trusted library allocation
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
1FB15335000
|
heap
|
page read and write
|
||
1FB142B7000
|
heap
|
page read and write
|
||
26F6D7FE000
|
heap
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
7FF7C7D21000
|
unkown
|
page execute read
|
||
7FF7C7D20000
|
unkown
|
page readonly
|
||
1FB10DC8000
|
heap
|
page read and write
|
||
DB35678000
|
stack
|
page read and write
|
||
1FB139F3000
|
heap
|
page read and write
|
||
1FB10DC1000
|
heap
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
1FB13445000
|
heap
|
page read and write
|
||
2B85D425000
|
heap
|
page read and write
|
||
1FB10DF3000
|
heap
|
page read and write
|
||
220FAA72000
|
heap
|
page read and write
|
||
1FB12DC7000
|
heap
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
26F6F160000
|
heap
|
page read and write
|
||
7DF405570000
|
trusted library allocation
|
page execute and read and write
|
||
7FF6351E1000
|
unkown
|
page readonly
|
||
22081224000
|
trusted library allocation
|
page read and write
|
||
220F8680000
|
heap
|
page read and write
|
||
1FB13B94000
|
heap
|
page read and write
|
||
1FB12C88000
|
heap
|
page read and write
|
||
1FB13A1D000
|
heap
|
page read and write
|
||
1FB1520C000
|
heap
|
page read and write
|
||
1FB13413000
|
heap
|
page read and write
|
||
26F6D299000
|
heap
|
page read and write
|
||
1FB139E2000
|
heap
|
page read and write
|
||
1FB15575000
|
heap
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
220FA8F0000
|
heap
|
page read and write
|
||
7FF848F92000
|
trusted library allocation
|
page read and write
|
||
1FB12CE8000
|
heap
|
page read and write
|
||
1FB16552000
|
heap
|
page read and write
|
||
1FB10E1A000
|
heap
|
page read and write
|
||
1FB13995000
|
heap
|
page read and write
|
||
220FA921000
|
heap
|
page read and write
|
||
1FB12E47000
|
heap
|
page read and write
|
||
227C6430000
|
trusted library allocation
|
page read and write
|
||
220FA8A0000
|
heap
|
page execute and read and write
|
||
7FF848FAA000
|
trusted library allocation
|
page read and write
|
||
1FB12DFD000
|
heap
|
page read and write
|
||
1FB12CB0000
|
heap
|
page read and write
|
||
1FB14484000
|
heap
|
page read and write
|
||
1FB13FDC000
|
heap
|
page read and write
|
||
1FB13CCF000
|
heap
|
page read and write
|
||
1FB1520A000
|
heap
|
page read and write
|
||
1FB153B5000
|
heap
|
page read and write
|
||
1FB16631000
|
heap
|
page read and write
|
||
1FB12D70000
|
heap
|
page read and write
|
||
1FB16594000
|
heap
|
page read and write
|
||
1FB139D2000
|
heap
|
page read and write
|
||
1AA63B04000
|
heap
|
page read and write
|
||
220F86C0000
|
heap
|
page read and write
|
||
1FB13D48000
|
heap
|
page read and write
|
||
1FB1399B000
|
heap
|
page read and write
|
||
1FB13881000
|
heap
|
page read and write
|
||
1FB13D7D000
|
heap
|
page read and write
|
||
1FB15A8F000
|
heap
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
1FB12B10000
|
trusted library allocation
|
page read and write
|
||
1FB139AA000
|
heap
|
page read and write
|
||
861C1CC000
|
stack
|
page read and write
|
||
1FB13A2D000
|
heap
|
page read and write
|
||
1FB14321000
|
heap
|
page read and write
|
||
1FB15A06000
|
heap
|
page read and write
|
||
1FB14357000
|
heap
|
page read and write
|
||
1FB131C9000
|
heap
|
page read and write
|
||
C1D92FF000
|
stack
|
page read and write
|
||
7FF7C9175000
|
unkown
|
page write copy
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
7FF7C8EC9000
|
unkown
|
page readonly
|
||
1FB13182000
|
heap
|
page read and write
|
||
1FB13995000
|
heap
|
page read and write
|
||
220FA92E000
|
heap
|
page read and write
|
||
1FB13D4C000
|
heap
|
page read and write
|
||
26F6D7ED000
|
heap
|
page read and write
|
||
26F6D2A2000
|
heap
|
page read and write
|
||
7FF849198000
|
trusted library allocation
|
page read and write
|
||
1AA5B701000
|
trusted library allocation
|
page read and write
|
||
1FB16586000
|
heap
|
page read and write
|
||
1FB12D65000
|
heap
|
page read and write
|
||
26F6D7F8000
|
heap
|
page read and write
|
||
1FB139AA000
|
heap
|
page read and write
|
||
1FB13CEE000
|
heap
|
page read and write
|
||
1FB142AC000
|
heap
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page read and write
|
||
1FB152B3000
|
heap
|
page read and write
|
||
1FB13D9E000
|
heap
|
page read and write
|
||
227C6410000
|
heap
|
page read and write
|
||
1FB12D3E000
|
heap
|
page read and write
|
||
26F6D2B1000
|
heap
|
page read and write
|
||
2B85D420000
|
heap
|
page read and write
|
||
1FB139AA000
|
heap
|
page read and write
|
||
1FB12EE7000
|
heap
|
page read and write
|
||
1FB1658F000
|
heap
|
page read and write
|
||
1FB12E1F000
|
heap
|
page read and write
|
||
1AA5B9D6000
|
trusted library allocation
|
page read and write
|
||
220F8749000
|
heap
|
page read and write
|
||
1FB10DF3000
|
heap
|
page read and write
|
||
1FB12C90000
|
heap
|
page read and write
|
||
1FB15B44000
|
heap
|
page read and write
|
||
1AA63A25000
|
heap
|
page read and write
|
||
1FB148F1000
|
heap
|
page read and write
|
||
1FB13E1E000
|
heap
|
page read and write
|
||
7FF6350D1000
|
unkown
|
page execute read
|
||
1FB13980000
|
heap
|
page read and write
|
||
7FF84919A000
|
trusted library allocation
|
page read and write
|
||
26F6D2B4000
|
heap
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
1FB13A19000
|
heap
|
page read and write
|
||
22090001000
|
trusted library allocation
|
page read and write
|
||
1FB13690000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
1FB13967000
|
heap
|
page read and write
|
||
1FB139BB000
|
heap
|
page read and write
|
||
26F6D262000
|
heap
|
page read and write
|
||
26F6D195000
|
heap
|
page read and write
|
||
1FB16701000
|
heap
|
page read and write
|
||
1FB13A82000
|
heap
|
page read and write
|
||
220FA240000
|
heap
|
page read and write
|
||
1FB12B50000
|
heap
|
page read and write
|
||
1FB13E68000
|
heap
|
page read and write
|
||
1FB1337D000
|
heap
|
page read and write
|
||
1FB1396A000
|
heap
|
page read and write
|
||
7FF848E4C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF6350D0000
|
unkown
|
page readonly
|
||
C25907D000
|
stack
|
page read and write
|
||
1FB16748000
|
heap
|
page read and write
|
||
1FB1660F000
|
heap
|
page read and write
|
||
1FB12DF4000
|
heap
|
page read and write
|
||
1FB13E3E000
|
heap
|
page read and write
|
||
1FB13425000
|
heap
|
page read and write
|
||
26F6D2A7000
|
heap
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
1FB133FA000
|
heap
|
page read and write
|
||
1FB12C9A000
|
heap
|
page read and write
|
||
1FB16848000
|
heap
|
page read and write
|
||
1FB12DD8000
|
heap
|
page read and write
|
||
1FB139EE000
|
heap
|
page read and write
|
||
7EF4BAB6F000
|
direct allocation
|
page read and write
|
||
1FB1320C000
|
heap
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
1FB1656B000
|
heap
|
page read and write
|
||
1FB16611000
|
heap
|
page read and write
|
||
26F6D120000
|
trusted library allocation
|
page read and write
|
||
1FB169C8000
|
heap
|
page read and write
|
||
1FB1662A000
|
heap
|
page read and write
|
||
26F6D2A4000
|
heap
|
page read and write
|
||
1FB12C87000
|
heap
|
page read and write
|
||
1FB139BB000
|
heap
|
page read and write
|
||
1AA637B2000
|
heap
|
page read and write
|
||
1FB13245000
|
heap
|
page read and write
|
||
1FB13293000
|
heap
|
page read and write
|
||
1FB140A6000
|
heap
|
page read and write
|
||
1FB13962000
|
heap
|
page read and write
|
||
1FB1398E000
|
heap
|
page read and write
|
||
1FB15895000
|
heap
|
page read and write
|
||
1FB159E2000
|
heap
|
page read and write
|
||
7FF84919C000
|
trusted library allocation
|
page read and write
|
||
DB357FF000
|
stack
|
page read and write
|
||
1FB139B2000
|
heap
|
page read and write
|
||
1FB13183000
|
heap
|
page read and write
|
||
220902F6000
|
trusted library allocation
|
page read and write
|
||
26F6D23A000
|
heap
|
page read and write
|
||
1FB131E4000
|
heap
|
page read and write
|
||
7FF6350D0000
|
unkown
|
page readonly
|
||
1FB139C3000
|
heap
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
1AA5B711000
|
trusted library allocation
|
page read and write
|
||
DB355FB000
|
stack
|
page read and write
|
||
1FB10DF3000
|
heap
|
page read and write
|
||
1AA5B9DC000
|
trusted library allocation
|
page read and write
|
||
1AA4CCD6000
|
trusted library allocation
|
page read and write
|
||
1FB10F10000
|
heap
|
page read and write
|
||
7FF848FAA000
|
trusted library allocation
|
page read and write
|
||
1AA63827000
|
heap
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page execute and read and write
|
||
1FB133CB000
|
heap
|
page read and write
|
||
1FB139CD000
|
heap
|
page read and write
|
||
1FB13361000
|
heap
|
page read and write
|
||
26F6D232000
|
heap
|
page read and write
|
||
1FB12DD3000
|
heap
|
page read and write
|
||
1FB13A5D000
|
heap
|
page read and write
|
||
C1D85ED000
|
stack
|
page read and write
|
||
1FB139BB000
|
heap
|
page read and write
|
||
1FB13B88000
|
heap
|
page read and write
|
||
1FB1680F000
|
heap
|
page read and write
|
||
1FB13A43000
|
heap
|
page read and write
|
||
1FB139AA000
|
heap
|
page read and write
|
||
26F6D1EC000
|
heap
|
page read and write
|
||
1FB12C90000
|
heap
|
page read and write
|
||
1FB12CB1000
|
heap
|
page read and write
|
||
1FB139E0000
|
heap
|
page read and write
|
||
1FB12D65000
|
heap
|
page read and write
|
||
1FB1661F000
|
heap
|
page read and write
|
||
1FB12D70000
|
heap
|
page read and write
|
||
1FB13ABA000
|
heap
|
page read and write
|
||
26F6D7E8000
|
heap
|
page read and write
|
||
1FB15A60000
|
heap
|
page read and write
|
||
1AA4B0B0000
|
heap
|
page read and write
|
||
1AA4B040000
|
trusted library allocation
|
page read and write
|
||
1FB13C9F000
|
heap
|
page read and write
|
||
1FB15B2C000
|
heap
|
page read and write
|
||
1AA4CD98000
|
trusted library allocation
|
page read and write
|
||
1FB13A19000
|
heap
|
page read and write
|
||
1FB12D65000
|
heap
|
page read and write
|
||
220FA1F0000
|
heap
|
page execute and read and write
|
||
1FB12E2F000
|
heap
|
page read and write
|
||
1FB13981000
|
heap
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
1FB15C39000
|
heap
|
page read and write
|
||
1FB139DA000
|
heap
|
page read and write
|
||
26F6D7DC000
|
heap
|
page read and write
|
||
1FB1331C000
|
heap
|
page read and write
|
||
1FB15B8E000
|
heap
|
page read and write
|
||
1FB159A3000
|
heap
|
page read and write
|
||
1FB139CF000
|
heap
|
page read and write
|
||
1FB10DCE000
|
heap
|
page read and write
|
||
1FB12E26000
|
heap
|
page read and write
|
||
1FB12C71000
|
heap
|
page read and write
|
||
26F6D223000
|
heap
|
page read and write
|
||
1FB10DC8000
|
heap
|
page read and write
|
||
1FB139FC000
|
heap
|
page read and write
|
||
1FB1662C000
|
heap
|
page read and write
|
||
1FB13409000
|
heap
|
page read and write
|
||
1FB1654D000
|
heap
|
page read and write
|
||
1FB13968000
|
heap
|
page read and write
|
||
7FF84927A000
|
trusted library allocation
|
page read and write
|
||
1FB10E07000
|
heap
|
page read and write
|
||
861C34E000
|
stack
|
page read and write
|
||
1FB16956000
|
heap
|
page read and write
|
||
1FB13CEA000
|
heap
|
page read and write
|
||
26F6D225000
|
heap
|
page read and write
|
||
1AA637B8000
|
heap
|
page read and write
|
||
1FB13995000
|
heap
|
page read and write
|
||
1FB139C3000
|
heap
|
page read and write
|
||
1FB15C2E000
|
heap
|
page read and write
|
||
1FB166AB000
|
heap
|
page read and write
|
||
1FB139D2000
|
heap
|
page read and write
|
||
26F6D22E000
|
heap
|
page read and write
|
||
26F6D262000
|
heap
|
page read and write
|
||
1FB13BFD000
|
heap
|
page read and write
|
||
1FB13D89000
|
heap
|
page read and write
|
||
1FB16558000
|
heap
|
page read and write
|
||
1FB15B4E000
|
heap
|
page read and write
|
||
227C6785000
|
heap
|
page read and write
|
||
DB35579000
|
stack
|
page read and write
|
||
1FB1552B000
|
heap
|
page read and write
|
||
2208104C000
|
trusted library allocation
|
page read and write
|
||
1AA4B767000
|
trusted library allocation
|
page read and write
|
||
1AA4C7E7000
|
trusted library allocation
|
page read and write
|
||
1FB12DEF000
|
heap
|
page read and write
|
||
1FB131A7000
|
heap
|
page read and write
|
||
1FB12DAD000
|
heap
|
page read and write
|
||
1FB12DDB000
|
heap
|
page read and write
|
||
7FF8491C0000
|
trusted library allocation
|
page read and write
|
||
220F8745000
|
heap
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page read and write
|
||
7EF4BFB6F000
|
direct allocation
|
page read and write
|
||
220FA177000
|
heap
|
page execute and read and write
|
||
1FB152E5000
|
heap
|
page read and write
|
||
861B77B000
|
stack
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page execute and read and write
|
||
1FB139D3000
|
heap
|
page read and write
|
||
1FB1396B000
|
heap
|
page read and write
|
||
1AA639E0000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
1D3FE758000
|
heap
|
page read and write
|
||
26F6D19B000
|
heap
|
page read and write
|
||
26F6D19A000
|
heap
|
page read and write
|
||
1FB12B30000
|
heap
|
page read and write
|
||
1FB139D4000
|
heap
|
page read and write
|
||
1FB12D18000
|
heap
|
page read and write
|
||
1FB13289000
|
heap
|
page read and write
|
||
1FB12B10000
|
trusted library allocation
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
1FB15244000
|
heap
|
page read and write
|
||
220FA170000
|
heap
|
page execute and read and write
|
||
1FB139A0000
|
heap
|
page read and write
|
||
1AA639F0000
|
heap
|
page read and write
|
||
22090304000
|
trusted library allocation
|
page read and write
|
||
DB3654E000
|
stack
|
page read and write
|
||
1FB1660A000
|
heap
|
page read and write
|
||
1FB12E87000
|
heap
|
page read and write
|
||
1AA49608000
|
heap
|
page read and write
|
||
1FB15A1C000
|
heap
|
page read and write
|
||
26F6D2BA000
|
heap
|
page read and write
|
||
1FB10E1A000
|
heap
|
page read and write
|
||
1FB16613000
|
heap
|
page read and write
|
||
1AA4C758000
|
trusted library allocation
|
page read and write
|
||
1FB13CBB000
|
heap
|
page read and write
|
||
1FB16582000
|
heap
|
page read and write
|
||
1FB14342000
|
heap
|
page read and write
|
||
7FF7C8F07000
|
unkown
|
page write copy
|
||
1FB13E93000
|
heap
|
page read and write
|
||
1FB10E1B000
|
heap
|
page read and write
|
||
1FB1672B000
|
heap
|
page read and write
|
||
1FB139F5000
|
heap
|
page read and write
|
||
26F6D194000
|
heap
|
page read and write
|
||
1FB16901000
|
heap
|
page read and write
|
||
1FB165FC000
|
heap
|
page read and write
|
||
1FB12C80000
|
heap
|
page read and write
|
||
1FB10DF3000
|
heap
|
page read and write
|
||
1FB10E1B000
|
heap
|
page read and write
|
||
7FF7C92B6000
|
unkown
|
page write copy
|
||
1FB152F1000
|
heap
|
page read and write
|
||
1FB12E00000
|
heap
|
page read and write
|
||
1FB133D3000
|
heap
|
page read and write
|
||
1FB16618000
|
heap
|
page read and write
|
||
7EF4BF16F000
|
direct allocation
|
page read and write
|
||
1FB10DC8000
|
heap
|
page read and write
|
||
1FB13A2E000
|
heap
|
page read and write
|
||
22080C3F000
|
trusted library allocation
|
page read and write
|
||
7DF405590000
|
trusted library allocation
|
page execute and read and write
|
||
1FB139E2000
|
heap
|
page read and write
|
||
1FB12C77000
|
heap
|
page read and write
|
||
1FB139D2000
|
heap
|
page read and write
|
||
1FB143D5000
|
heap
|
page read and write
|
||
7EF4BD36F000
|
direct allocation
|
page read and write
|
||
1FB10E15000
|
heap
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
26F6D192000
|
heap
|
page read and write
|
||
1FB131F5000
|
heap
|
page read and write
|
||
1FB12D76000
|
heap
|
page read and write
|
||
1FB131D0000
|
heap
|
page read and write
|
||
1FB13B8E000
|
heap
|
page read and write
|
||
1FB12C72000
|
heap
|
page read and write
|
||
1AA63B4E000
|
heap
|
page read and write
|
||
7FF6351DF000
|
unkown
|
page write copy
|
||
1FB13A07000
|
heap
|
page read and write
|
||
1AA4B0B5000
|
heap
|
page read and write
|
||
F71B92C000
|
stack
|
page read and write
|
||
1FB16772000
|
heap
|
page read and write
|
||
1FB1396C000
|
heap
|
page read and write
|
||
861B4F8000
|
stack
|
page read and write
|
||
1FB139E4000
|
heap
|
page read and write
|
||
1FB139A2000
|
heap
|
page read and write
|
||
1FB1671D000
|
heap
|
page read and write
|
||
1FB12E0B000
|
heap
|
page read and write
|
||
220812F2000
|
trusted library allocation
|
page read and write
|
||
1FB16608000
|
heap
|
page read and write
|
||
1FB13DA4000
|
heap
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
26F6D193000
|
heap
|
page read and write
|
||
1FB13C97000
|
heap
|
page read and write
|
||
1FB12C72000
|
heap
|
page read and write
|
||
1FB10E19000
|
heap
|
page read and write
|
||
7FF635371000
|
unkown
|
page write copy
|
||
220FA060000
|
heap
|
page read and write
|
||
1FB140AE000
|
heap
|
page read and write
|
||
1FB12E26000
|
heap
|
page read and write
|
||
7DF405580000
|
trusted library allocation
|
page execute and read and write
|
||
1FB10DCE000
|
heap
|
page read and write
|
||
1FB16651000
|
heap
|
page read and write
|
||
861B179000
|
stack
|
page read and write
|
||
1FB139A4000
|
heap
|
page read and write
|
||
26F6D7F9000
|
heap
|
page read and write
|
||
1FB131CA000
|
heap
|
page read and write
|
||
1AA4CAEE000
|
trusted library allocation
|
page read and write
|
||
1FB13E0C000
|
heap
|
page read and write
|
||
1FB15AA4000
|
heap
|
page read and write
|
||
1FB143BD000
|
heap
|
page read and write
|
||
1FB13E88000
|
heap
|
page read and write
|
||
1FB139B2000
|
heap
|
page read and write
|
||
1FB10DCE000
|
heap
|
page read and write
|
||
1AA4B906000
|
trusted library allocation
|
page read and write
|
||
1FB1334C000
|
heap
|
page read and write
|
||
1AA4B000000
|
heap
|
page readonly
|
||
1FB1690F000
|
heap
|
page read and write
|
||
1AA49600000
|
heap
|
page read and write
|
||
22081B87000
|
trusted library allocation
|
page read and write
|
||
26F6D25B000
|
heap
|
page read and write
|
||
1FB13A35000
|
heap
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
7FF7C919B000
|
unkown
|
page write copy
|
||
1FB10DC1000
|
heap
|
page read and write
|
||
1FB12F2D000
|
heap
|
page read and write
|
||
26F6D7F8000
|
heap
|
page read and write
|
||
1FB16562000
|
heap
|
page read and write
|
||
1AA4C177000
|
trusted library allocation
|
page read and write
|
||
1FB13A88000
|
heap
|
page read and write
|
||
26F6F174000
|
heap
|
page read and write
|
||
1FB16781000
|
heap
|
page read and write
|
||
227C6430000
|
trusted library allocation
|
page read and write
|
||
1FB1546A000
|
heap
|
page read and write
|
||
1AA4B6D0000
|
heap
|
page execute and read and write
|
||
1FB139CD000
|
heap
|
page read and write
|
||
1FB14145000
|
heap
|
page read and write
|
||
1FB15400000
|
heap
|
page read and write
|
||
26F6D7E0000
|
heap
|
page read and write
|
||
26F6D0E0000
|
heap
|
page read and write
|
||
1FB13E48000
|
heap
|
page read and write
|
||
26F6D808000
|
heap
|
page read and write
|
||
26F6D100000
|
heap
|
page read and write
|
||
1FB139AA000
|
heap
|
page read and write
|
||
1FB133DB000
|
heap
|
page read and write
|
||
1FB13981000
|
heap
|
page read and write
|
||
1FB139D6000
|
heap
|
page read and write
|
||
861B57E000
|
stack
|
page read and write
|
||
220F8701000
|
heap
|
page read and write
|
||
1FB13406000
|
heap
|
page read and write
|
||
1FB139D2000
|
heap
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
1FB139C3000
|
heap
|
page read and write
|
||
DB363C9000
|
stack
|
page read and write
|
||
26F6D1E3000
|
heap
|
page read and write
|
||
220FA9DE000
|
heap
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
DB3547D000
|
stack
|
page read and write
|
||
1FB10DF3000
|
heap
|
page read and write
|
||
1FB1424A000
|
heap
|
page read and write
|
||
1FB12D78000
|
heap
|
page read and write
|
||
22081B8C000
|
trusted library allocation
|
page read and write
|
||
22080F3A000
|
trusted library allocation
|
page read and write
|
||
1FB12C9A000
|
heap
|
page read and write
|
||
1FB1679D000
|
heap
|
page read and write
|
||
1FB16554000
|
heap
|
page read and write
|
||
1FB16761000
|
heap
|
page read and write
|
||
1FB1530B000
|
heap
|
page read and write
|
||
1FB13A6D000
|
heap
|
page read and write
|
||
1FB12AE0000
|
remote allocation
|
page read and write
|
||
227C6780000
|
heap
|
page read and write
|
||
1FB148F1000
|
heap
|
page read and write
|
||
1FB1399C000
|
heap
|
page read and write
|
||
1FB13393000
|
heap
|
page read and write
|
||
1FB139FC000
|
heap
|
page read and write
|
||
26F6D2A2000
|
heap
|
page read and write
|
||
1FB13231000
|
heap
|
page read and write
|
||
1AA49975000
|
heap
|
page read and write
|
||
1FB12DAE000
|
heap
|
page read and write
|
||
1FB13309000
|
heap
|
page read and write
|
||
1FB13D8C000
|
heap
|
page read and write
|
||
1FB1658D000
|
heap
|
page read and write
|
||
1AA4D26E000
|
trusted library allocation
|
page read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
1FB13998000
|
heap
|
page read and write
|
||
1FB12BD8000
|
heap
|
page read and write
|
||
1FB13D56000
|
heap
|
page read and write
|
||
1FB139D2000
|
heap
|
page read and write
|
||
26F6D23A000
|
heap
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
1AA4C4A3000
|
trusted library allocation
|
page read and write
|
||
C1D8AFE000
|
stack
|
page read and write
|
||
1FB139A2000
|
heap
|
page read and write
|
||
1AA4C9D2000
|
trusted library allocation
|
page read and write
|
||
1FB12E30000
|
heap
|
page read and write
|
||
220811A7000
|
trusted library allocation
|
page read and write
|
||
1FB16574000
|
heap
|
page read and write
|
||
1FB132A9000
|
heap
|
page read and write
|
||
26F6D7E4000
|
heap
|
page read and write
|
||
1D3FE660000
|
heap
|
page read and write
|
||
1FB12B1E000
|
heap
|
page read and write
|
||
1FB13A2D000
|
heap
|
page read and write
|
||
1FB13188000
|
heap
|
page read and write
|
||
1AA5B74D000
|
trusted library allocation
|
page read and write
|
||
1FB10DB5000
|
heap
|
page read and write
|
||
22081C08000
|
trusted library allocation
|
page read and write
|
||
1AA4B500000
|
heap
|
page read and write
|
||
1FB12DD2000
|
heap
|
page read and write
|
||
1FB12E2F000
|
heap
|
page read and write
|
||
1FB131E3000
|
heap
|
page read and write
|
||
1FB12D10000
|
heap
|
page read and write
|
||
26F6D24A000
|
heap
|
page read and write
|
||
861B5FF000
|
stack
|
page read and write
|
||
1FB10E07000
|
heap
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
1FB10DF3000
|
heap
|
page read and write
|
||
1FB1327B000
|
heap
|
page read and write
|
||
1AA4C902000
|
trusted library allocation
|
page read and write
|
||
1FB168D6000
|
heap
|
page read and write
|
||
1FB10DF3000
|
heap
|
page read and write
|
||
1FB15C44000
|
heap
|
page read and write
|
||
1FB1399A000
|
heap
|
page read and write
|
||
26F6D235000
|
heap
|
page read and write
|
||
22081B67000
|
trusted library allocation
|
page read and write
|
||
1FB13BC6000
|
heap
|
page read and write
|
||
1FB169D6000
|
heap
|
page read and write
|
||
227C651C000
|
heap
|
page read and write
|
||
1FB12CC8000
|
heap
|
page read and write
|
||
1FB1655B000
|
heap
|
page read and write
|
||
1FB139AA000
|
heap
|
page read and write
|
||
26F6D20A000
|
heap
|
page read and write
|
||
1FB139E3000
|
heap
|
page read and write
|
||
1FB12E5F000
|
heap
|
page read and write
|
||
26F6D7F8000
|
heap
|
page read and write
|
||
1FB13C9D000
|
heap
|
page read and write
|
||
1FB12D05000
|
heap
|
page read and write
|
||
220FAA4B000
|
heap
|
page read and write
|
||
7FF6351E1000
|
unkown
|
page readonly
|
||
1FB12C96000
|
heap
|
page read and write
|
||
1AA63B69000
|
heap
|
page read and write
|
||
7FF635374000
|
unkown
|
page readonly
|
||
1FB16568000
|
heap
|
page read and write
|
||
1FB1525B000
|
heap
|
page read and write
|
||
1FB139CD000
|
heap
|
page read and write
|
||
1FB13A2D000
|
heap
|
page read and write
|
||
1FB16584000
|
heap
|
page read and write
|
||
220FA0A0000
|
trusted library allocation
|
page read and write
|
||
26F6D24A000
|
heap
|
page read and write
|
||
1FB139D2000
|
heap
|
page read and write
|
||
1FB13189000
|
heap
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
1FB139C3000
|
heap
|
page read and write
|
||
1FB12DAE000
|
heap
|
page read and write
|
||
7FF7C9171000
|
unkown
|
page readonly
|
||
1FB13C6D000
|
heap
|
page read and write
|
||
1FB139A4000
|
heap
|
page read and write
|
||
1FB10DF3000
|
heap
|
page read and write
|
||
7FF849189000
|
trusted library allocation
|
page read and write
|
||
1AA49686000
|
heap
|
page read and write
|
||
220FA594000
|
heap
|
page read and write
|
||
1FB131EC000
|
heap
|
page read and write
|
||
8652FFE000
|
stack
|
page read and write
|
||
1AA4B640000
|
heap
|
page execute and read and write
|
||
1FB12E4F000
|
heap
|
page read and write
|
||
1FB10DC2000
|
heap
|
page read and write
|
||
227C6798000
|
heap
|
page read and write
|
||
26F6D000000
|
heap
|
page read and write
|
||
1FB139E2000
|
heap
|
page read and write
|
||
1FB139D2000
|
heap
|
page read and write
|
||
1FB10DCB000
|
heap
|
page read and write
|
||
22080A96000
|
trusted library allocation
|
page read and write
|
||
1FB10DF3000
|
heap
|
page read and write
|
||
1FB12C71000
|
heap
|
page read and write
|
||
26F6D22A000
|
heap
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
1FB12E02000
|
heap
|
page read and write
|
||
1FB16578000
|
heap
|
page read and write
|
||
1FB16873000
|
heap
|
page read and write
|
||
1D3FE850000
|
heap
|
page read and write
|
||
1FB10DCE000
|
heap
|
page read and write
|
||
1FB12C8F000
|
heap
|
page read and write
|
||
1FB139AA000
|
heap
|
page read and write
|
||
1AA4BBF2000
|
trusted library allocation
|
page read and write
|
||
1FB13995000
|
heap
|
page read and write
|
||
1FB13338000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
1FB10DC8000
|
heap
|
page read and write
|
||
861B0FE000
|
stack
|
page read and write
|
||
1FB131D5000
|
heap
|
page read and write
|
||
1FB12E1F000
|
heap
|
page read and write
|
||
1FB133E8000
|
heap
|
page read and write
|
||
1FB15A4E000
|
heap
|
page read and write
|
||
1FB14262000
|
heap
|
page read and write
|
||
26F6D19A000
|
heap
|
page read and write
|
||
1FB1656F000
|
heap
|
page read and write
|
||
1FB10DCE000
|
heap
|
page read and write
|
||
1FB1692B000
|
heap
|
page read and write
|
||
1FB13A65000
|
heap
|
page read and write
|
||
1FB133AF000
|
heap
|
page read and write
|
||
1AA49612000
|
heap
|
page read and write
|
||
1FB13A2D000
|
heap
|
page read and write
|
||
1FB139AA000
|
heap
|
page read and write
|
||
1FB12C60000
|
heap
|
page read and write
|
||
1FB1402E000
|
heap
|
page read and write
|
||
1FB12DDF000
|
heap
|
page read and write
|
||
220F8670000
|
heap
|
page read and write
|
||
1FB13277000
|
heap
|
page read and write
|
||
1FB139FC000
|
heap
|
page read and write
|
||
1FB15B99000
|
heap
|
page read and write
|
||
1FB139EF000
|
heap
|
page read and write
|
||
1AA63B00000
|
heap
|
page read and write
|
||
1FB12C9A000
|
heap
|
page read and write
|
||
26F6D1E7000
|
heap
|
page read and write
|
||
7EF4BB56F000
|
direct allocation
|
page read and write
|
||
1FB139F9000
|
heap
|
page read and write
|
||
220FAA6D000
|
heap
|
page read and write
|
||
1FB152DD000
|
heap
|
page read and write
|
||
1FB13A19000
|
heap
|
page read and write
|
||
C1D88FF000
|
stack
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
1FB14242000
|
heap
|
page read and write
|
||
1FB140B5000
|
heap
|
page read and write
|
||
1FB13A3D000
|
heap
|
page read and write
|
||
26F6D120000
|
trusted library allocation
|
page read and write
|
||
26F6D233000
|
heap
|
page read and write
|
||
7FF84919C000
|
trusted library allocation
|
page read and write
|
||
1FB12D70000
|
heap
|
page read and write
|
||
1FB139C3000
|
heap
|
page read and write
|
||
1FB139B2000
|
heap
|
page read and write
|
||
26F6D7ED000
|
heap
|
page read and write
|
||
22081078000
|
trusted library allocation
|
page read and write
|
||
1FB12DEA000
|
heap
|
page read and write
|
||
1AA4C84B000
|
trusted library allocation
|
page read and write
|
||
1FB12DF1000
|
heap
|
page read and write
|
||
1FB10DC8000
|
heap
|
page read and write
|
||
26F6D208000
|
heap
|
page read and write
|
||
1FB13C56000
|
heap
|
page read and write
|
||
1FB16616000
|
heap
|
page read and write
|
||
1FB16636000
|
heap
|
page read and write
|
||
1FB13D64000
|
heap
|
page read and write
|
||
26F6D485000
|
heap
|
page read and write
|
||
1FB13353000
|
heap
|
page read and write
|
||
26F6D7E4000
|
heap
|
page read and write
|
||
1FB12CA2000
|
heap
|
page read and write
|
||
26F6D190000
|
heap
|
page read and write
|
||
1FB13A19000
|
heap
|
page read and write
|
||
1FB139A2000
|
heap
|
page read and write
|
||
1FB1524B000
|
heap
|
page read and write
|
||
1AA4CCB0000
|
trusted library allocation
|
page read and write
|
||
1FB10DC6000
|
heap
|
page read and write
|
||
26F6D222000
|
heap
|
page read and write
|
||
1FB13274000
|
heap
|
page read and write
|
||
1FB1396C000
|
heap
|
page read and write
|
||
1FB13A19000
|
heap
|
page read and write
|
||
1FB12ED7000
|
heap
|
page read and write
|
||
1FB1525F000
|
heap
|
page read and write
|
||
26F6D22A000
|
heap
|
page read and write
|
||
26F6D1EC000
|
heap
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
1FB13CE4000
|
heap
|
page read and write
|
||
1FB12CEE000
|
heap
|
page read and write
|
||
1FB13986000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
1FB139A4000
|
heap
|
page read and write
|
||
1FB13A2E000
|
heap
|
page read and write
|
||
1FB10DCB000
|
heap
|
page read and write
|
||
1FB12DAE000
|
heap
|
page read and write
|
||
861B2FE000
|
stack
|
page read and write
|
||
1FB13D97000
|
heap
|
page read and write
|
||
1AA4B690000
|
trusted library allocation
|
page read and write
|
||
1FB139F9000
|
heap
|
page read and write
|
||
1AA495B0000
|
heap
|
page read and write
|
||
220FA739000
|
heap
|
page read and write
|
||
1FB1657D000
|
heap
|
page read and write
|
||
7FF848DF4000
|
trusted library allocation
|
page read and write
|
||
1FB1654F000
|
heap
|
page read and write
|
||
1FB1396C000
|
heap
|
page read and write
|
||
1FB139B2000
|
heap
|
page read and write
|
||
1FB15C24000
|
heap
|
page read and write
|
||
1FB1407D000
|
heap
|
page read and write
|
||
227C6430000
|
heap
|
page read and write
|
||
DB34F1E000
|
stack
|
page read and write
|
||
220FA931000
|
heap
|
page read and write
|
||
26F6D2A2000
|
heap
|
page read and write
|
||
1FB139DA000
|
heap
|
page read and write
|
||
1FB13E26000
|
heap
|
page read and write
|
||
220FA6A0000
|
heap
|
page read and write
|
||
1FB13E33000
|
heap
|
page read and write
|
||
1FB139BB000
|
heap
|
page read and write
|
||
26F6D7ED000
|
heap
|
page read and write
|
||
DB364CC000
|
stack
|
page read and write
|
||
1FB1661A000
|
heap
|
page read and write
|
||
861ADBE000
|
stack
|
page read and write
|
||
1FB12DBF000
|
heap
|
page read and write
|
||
1FB131FC000
|
heap
|
page read and write
|
||
1FB16656000
|
heap
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
1FB12DDD000
|
heap
|
page read and write
|
||
1FB139F9000
|
heap
|
page read and write
|
||
1FB12CC0000
|
heap
|
page read and write
|
||
1FB12B37000
|
heap
|
page read and write
|
||
1FB13EBB000
|
heap
|
page read and write
|
||
1FB139FC000
|
heap
|
page read and write
|
||
1FB13A19000
|
heap
|
page read and write
|
||
1FB1331E000
|
heap
|
page read and write
|
||
220F86FD000
|
heap
|
page read and write
|
||
1FB12DAD000
|
heap
|
page read and write
|
||
1FB139F9000
|
heap
|
page read and write
|
||
1FB1318A000
|
heap
|
page read and write
|
||
220FA9E7000
|
heap
|
page read and write
|
||
1FB13C88000
|
heap
|
page read and write
|
||
1FB12E2F000
|
heap
|
page read and write
|
||
1AA4B080000
|
trusted library allocation
|
page read and write
|
||
26F6D2B3000
|
heap
|
page read and write
|
||
1FB10DC1000
|
heap
|
page read and write
|
||
1FB139A0000
|
heap
|
page read and write
|
||
7FF635374000
|
unkown
|
page readonly
|
||
1FB139FC000
|
heap
|
page read and write
|
||
1FB12CB0000
|
heap
|
page read and write
|
||
1FB15A0F000
|
heap
|
page read and write
|
||
1FB169E4000
|
heap
|
page read and write
|
||
1FB139FC000
|
heap
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
1FB1341B000
|
heap
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
1FB12B70000
|
heap
|
page read and write
|
||
1FB139B2000
|
heap
|
page read and write
|
||
C2590FE000
|
stack
|
page read and write
|
||
1FB13E2B000
|
heap
|
page read and write
|
||
1FB159D5000
|
heap
|
page read and write
|
||
7FF7C91C3000
|
unkown
|
page write copy
|
||
1FB139D4000
|
heap
|
page read and write
|
||
1FB1326F000
|
heap
|
page read and write
|
||
26F6D1E7000
|
heap
|
page read and write
|
||
220FA7C0000
|
heap
|
page read and write
|
||
220F8709000
|
heap
|
page read and write
|
||
1FB166F3000
|
heap
|
page read and write
|
||
1FB15315000
|
heap
|
page read and write
|
||
1FB1698F000
|
heap
|
page read and write
|
||
1FB13DF3000
|
heap
|
page read and write
|
||
1FB15A96000
|
heap
|
page read and write
|
||
1FB13A2D000
|
heap
|
page read and write
|
||
1AA63AFD000
|
heap
|
page read and write
|
||
1FB167D6000
|
heap
|
page read and write
|
||
220816B5000
|
trusted library allocation
|
page read and write
|
||
1FB15257000
|
heap
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
7FF6350D0000
|
unkown
|
page readonly
|
||
7FF6351DD000
|
unkown
|
page read and write
|
||
220902E7000
|
trusted library allocation
|
page read and write
|
||
DB3537F000
|
stack
|
page read and write
|
||
26F6F171000
|
heap
|
page read and write
|
||
1FB133F5000
|
heap
|
page read and write
|
||
26F6F17D000
|
heap
|
page read and write
|
||
1FB1399A000
|
heap
|
page read and write
|
||
1FB139D4000
|
heap
|
page read and write
|
||
26F6D2A2000
|
heap
|
page read and write
|
||
1FB1656D000
|
heap
|
page read and write
|
||
1FB133D7000
|
heap
|
page read and write
|
||
26F6F184000
|
heap
|
page read and write
|
||
1FB139C3000
|
heap
|
page read and write
|
||
1AA5B6E1000
|
trusted library allocation
|
page read and write
|
||
22080C4B000
|
trusted library allocation
|
page read and write
|
||
1FB139B2000
|
heap
|
page read and write
|
||
1FB1409E000
|
heap
|
page read and write
|
||
C1D90FE000
|
stack
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
1FB139F9000
|
heap
|
page read and write
|
||
1FB10D8D000
|
heap
|
page read and write
|
||
1FB16564000
|
heap
|
page read and write
|
||
1FB10FD5000
|
heap
|
page read and write
|
||
1AA495A0000
|
heap
|
page read and write
|
||
1FB10DC8000
|
heap
|
page read and write
|
||
1FB12DF1000
|
heap
|
page read and write
|
||
26F6D26B000
|
heap
|
page read and write
|
||
220FAA74000
|
heap
|
page read and write
|
||
1FB1693A000
|
heap
|
page read and write
|
||
7FF849198000
|
trusted library allocation
|
page read and write
|
||
2714B811000
|
heap
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
7FF849146000
|
trusted library allocation
|
page read and write
|
||
1FB139FC000
|
heap
|
page read and write
|
||
861AD33000
|
stack
|
page read and write
|
||
26F6D7FF000
|
heap
|
page read and write
|
||
1FB10DCE000
|
heap
|
page read and write
|
||
1FB12D11000
|
heap
|
page read and write
|
||
1FB13BF2000
|
heap
|
page read and write
|
||
1FB167E4000
|
heap
|
page read and write
|
||
1AA4C31D000
|
trusted library allocation
|
page read and write
|
||
1FB12DEA000
|
heap
|
page read and write
|
||
1FB1682B000
|
heap
|
page read and write
|
||
1FB12DFD000
|
heap
|
page read and write
|
||
1FB159DD000
|
heap
|
page read and write
|
||
1FB16880000
|
heap
|
page read and write
|
||
1FB16576000
|
heap
|
page read and write
|
||
1FB12D10000
|
heap
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
1FB12CB1000
|
heap
|
page read and write
|
||
7FF6351DD000
|
unkown
|
page write copy
|
||
26F6D197000
|
heap
|
page read and write
|
||
220FA990000
|
heap
|
page read and write
|
||
1AA63B42000
|
heap
|
page read and write
|
||
1FB12D36000
|
heap
|
page read and write
|
||
1FB15265000
|
heap
|
page read and write
|
||
1FB143AB000
|
heap
|
page read and write
|
||
1FB139A4000
|
heap
|
page read and write
|
||
1FB139C3000
|
heap
|
page read and write
|
||
1FB13311000
|
heap
|
page read and write
|
||
1FB16633000
|
heap
|
page read and write
|
||
1FB139E2000
|
heap
|
page read and write
|
||
1AA4D249000
|
trusted library allocation
|
page read and write
|
||
1FB12DED000
|
heap
|
page read and write
|
||
1FB12C8A000
|
heap
|
page read and write
|
||
1FB13988000
|
heap
|
page read and write
|
||
1FB13A4D000
|
heap
|
page read and write
|
||
1FB152C3000
|
heap
|
page read and write
|
||
1FB1337E000
|
heap
|
page read and write
|
There are 1701 hidden memdumps, click here to show them.