Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
IM3OLcx7li.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\IM3OLcx7li.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Bootstrapper.exe
|
PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\FluxusV1.2
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\XClient.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
\Device\ConDrv
|
ISO-8859 text, with CRLF, LF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Bootstrapper.exe_f8ecbb689c8f1a18ba1322c93213c0dd24b0ed4d_47e6ae6e_a7aaad88-62f4-4fc9-8dc2-7a2a9a462b64\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBD56.tmp.dmp
|
Mini DuMP crash report, 16 streams, Thu Oct 31 18:46:14 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBF2C.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBF6B.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FluxusV1.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Oct 31 17:46:08
2024, mtime=Thu Oct 31 17:46:08 2024, atime=Thu Oct 31 17:46:08 2024, length=75264, window=hide
|
dropped
|
||
C:\Users\user\Desktop\DISCORD
|
JSON data
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 4 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\IM3OLcx7li.exe
|
"C:\Users\user\Desktop\IM3OLcx7li.exe"
|
||
C:\Users\user\AppData\Roaming\XClient.exe
|
"C:\Users\user\AppData\Roaming\XClient.exe"
|
||
C:\Users\user\AppData\Roaming\Bootstrapper.exe
|
"C:\Users\user\AppData\Roaming\Bootstrapper.exe"
|
||
C:\Windows\System32\cmd.exe
|
"cmd" /c ipconfig /all
|
||
C:\Windows\System32\ipconfig.exe
|
ipconfig /all
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "FluxusV1" /tr "C:\Users\user\AppData\Roaming\FluxusV1.2"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\OpenWith.exe
|
C:\Windows\system32\OpenWith.exe "C:\Users\user\AppData\Roaming\FluxusV1.2"
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 7616 -s 2192
|
||
C:\Windows\System32\OpenWith.exe
|
C:\Windows\system32\OpenWith.exe -Embedding
|
||
C:\Windows\System32\OpenWith.exe
|
C:\Windows\system32\OpenWith.exe -Embedding
|
||
C:\Windows\System32\OpenWith.exe
|
C:\Windows\system32\OpenWith.exe "C:\Users\user\AppData\Roaming\FluxusV1.2"
|
||
C:\Windows\System32\OpenWith.exe
|
C:\Windows\system32\OpenWith.exe "C:\Users\user\AppData\Roaming\FluxusV1.2"
|
||
C:\Windows\System32\OpenWith.exe
|
C:\Windows\system32\OpenWith.exe "C:\Users\user\AppData\Roaming\FluxusV1.2"
|
||
C:\Windows\System32\OpenWith.exe
|
C:\Windows\system32\OpenWith.exe "C:\Users\user\AppData\Roaming\FluxusV1.2"
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
nohicsq.localto.net
|
|||
http://127.0.0.1:6463
|
unknown
|
||
http://127.0.0.1:64632E
|
unknown
|
||
http://www.nodejs.org
|
unknown
|
||
https://discord.com
|
unknown
|
||
https://096e98d9.solaraweb-alj.pages.dev/download/static/files/Bootstrapper.exe
|
unknown
|
||
https://ncs.roblox.com/upload
|
unknown
|
||
https://www.nodejs.org
|
unknown
|
||
https://getsolara.dev/asset/discord.json
|
172.67.203.125
|
||
http://upx.sf.net
|
unknown
|
||
https://gist.githubusercontent.com/typeshi12/072784a0d3a602ed441a435d04c943b6/raw
|
unknown
|
||
http://james.newtonking.com/projects/json
|
unknown
|
||
https://096e98d9.solaraweb-alj.pages.dev/download/static/files/Solara.Dir.zip
|
unknown
|
||
http://edge-term4-fra4.roblox.com
|
unknown
|
||
http://getsolara.dev
|
unknown
|
||
https://discord.com;http://127.0.0.1:6463/rpc?v=11
|
unknown
|
||
https://clientsettings.roblox.com/v2/client-version/WindowsPlayer/channel/live
|
128.116.44.4
|
||
https://aka.ms/vs/17/release/vc_redist.x64.exe
|
unknown
|
||
https://getsolara.dev
|
unknown
|
||
https://getsolara.dev/api/endpoint.json
|
172.67.203.125
|
||
https://www.newtonsoft.com/jsonschema
|
unknown
|
||
https://www.nodejs.org/dist/v18.16.0/node-v18.16.0-x64.msi
|
104.20.22.46
|
||
https://www.nuget.org/packages/Newtonsoft.Json.Bson
|
unknown
|
||
https://gist.githubusercontent.com/typeshi12/29ef3a44a19235b08aaf229631c024d8/raw
|
unknown
|
||
http://127.0.0.1:6463/rpc?v=1
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://clientsettings.roblox.com
|
unknown
|
||
https://nodejs.org/dist/v18.16.0/node-v18.16.0-x64.msi
|
unknown
|
||
https://pastebin.com/raw/pjseRvyK
|
unknown
|
||
https://clientsettings.roblox.com
|
unknown
|
||
https://gist.githubusercontent.com/typeshi12/072784a0d3a602ed441a435d04c943b6/rawChttps://pastebin.c
|
unknown
|
There are 21 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
nohicsq.localto.net
|
185.141.35.22
|
||
edge-term4-fra4.roblox.com
|
128.116.44.4
|
||
getsolara.dev
|
172.67.203.125
|
||
www.nodejs.org
|
104.20.22.46
|
||
clientsettings.roblox.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.141.35.22
|
nohicsq.localto.net
|
Turkey
|
||
172.67.203.125
|
getsolara.dev
|
United States
|
||
128.116.44.4
|
edge-term4-fra4.roblox.com
|
United States
|
||
104.20.22.46
|
www.nodejs.org
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
FluxusV1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Mozilla Firefox\firefox.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Mozilla Firefox\firefox.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Internet Explorer\iexplore.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Internet Explorer\iexplore.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\mspaint.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\mspaint.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\NOTEPAD.EXE.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\NOTEPAD.EXE.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.ApplicationCompany
|
||
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
|
ProgramId
|
||
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
|
FileId
|
||
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
|
LowerCaseLongPath
|
||
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
|
LongPathHash
|
||
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
|
Name
|
||
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
|
OriginalFileName
|
||
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
|
Publisher
|
||
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
|
Version
|
||
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
|
BinFileVersion
|
||
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
|
BinaryType
|
||
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
|
ProductName
|
||
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
|
ProductVersion
|
||
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
|
LinkDate
|
||
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
|
BinProductVersion
|
||
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
|
AppxPackageFullName
|
||
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
|
Size
|
||
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
|
Language
|
||
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
|
Usn
|
There are 43 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3091000
|
trusted library allocation
|
page read and write
|
||
452000
|
unkown
|
page readonly
|
||
1904B2AC000
|
heap
|
page read and write
|
||
20923D4D000
|
heap
|
page read and write
|
||
2B41BFF000
|
unkown
|
page read and write
|
||
2144FA64000
|
heap
|
page read and write
|
||
19357F21000
|
heap
|
page read and write
|
||
1904B3C8000
|
heap
|
page read and write
|
||
25E30498000
|
heap
|
page read and write
|
||
1935607B000
|
heap
|
page read and write
|
||
25E302C0000
|
heap
|
page read and write
|
||
3B13BFB000
|
stack
|
page read and write
|
||
19357F17000
|
heap
|
page read and write
|
||
25E302DC000
|
heap
|
page read and write
|
||
2D38BBEF000
|
heap
|
page read and write
|
||
19357F1C000
|
heap
|
page read and write
|
||
20925E99000
|
heap
|
page read and write
|
||
2144DAB4000
|
heap
|
page read and write
|
||
2D38BC01000
|
heap
|
page read and write
|
||
207CD64F000
|
heap
|
page read and write
|
||
20923D93000
|
heap
|
page read and write
|
||
1C121A94000
|
heap
|
page read and write
|
||
25E302F4000
|
heap
|
page read and write
|
||
1904B3BD000
|
heap
|
page read and write
|
||
1904B284000
|
heap
|
page read and write
|
||
20925CCB000
|
heap
|
page read and write
|
||
207CD7C3000
|
heap
|
page read and write
|
||
207CB84D000
|
heap
|
page read and write
|
||
2144FBDD000
|
heap
|
page read and write
|
||
1904B284000
|
heap
|
page read and write
|
||
2D38BAE3000
|
heap
|
page read and write
|
||
E12927B000
|
stack
|
page read and write
|
||
25E3046A000
|
heap
|
page read and write
|
||
207CD759000
|
heap
|
page read and write
|
||
1904AC90000
|
heap
|
page read and write
|
||
19357F20000
|
heap
|
page read and write
|
||
2144DAC6000
|
heap
|
page read and write
|
||
2D389AC2000
|
heap
|
page read and write
|
||
1904B28F000
|
heap
|
page read and write
|
||
20925DC2000
|
heap
|
page read and write
|
||
1935793A000
|
heap
|
page read and write
|
||
19357F26000
|
heap
|
page read and write
|
||
25E2FE60000
|
heap
|
page read and write
|
||
2144DB0E000
|
heap
|
page read and write
|
||
1904B414000
|
heap
|
page read and write
|
||
19358079000
|
heap
|
page read and write
|
||
2D38BC6C000
|
heap
|
page read and write
|
||
2144FB3A000
|
heap
|
page read and write
|
||
2D389AE0000
|
heap
|
page read and write
|
||
207CD817000
|
heap
|
page read and write
|
||
19358033000
|
heap
|
page read and write
|
||
7FFB4B140000
|
trusted library allocation
|
page execute and read and write
|
||
2D38BAF0000
|
heap
|
page read and write
|
||
1C121B70000
|
heap
|
page read and write
|
||
2144FA7C000
|
heap
|
page read and write
|
||
25E2FE7E000
|
heap
|
page read and write
|
||
26C241B2000
|
unkown
|
page readonly
|
||
7FFB4B0C0000
|
trusted library allocation
|
page read and write
|
||
20925CD6000
|
heap
|
page read and write
|
||
25E3045D000
|
heap
|
page read and write
|
||
20925CBF000
|
heap
|
page read and write
|
||
193560A7000
|
heap
|
page read and write
|
||
2144FB54000
|
heap
|
page read and write
|
||
BA11CF2000
|
stack
|
page read and write
|
||
20925CC7000
|
heap
|
page read and write
|
||
2144FBE0000
|
heap
|
page read and write
|
||
19049303000
|
heap
|
page read and write
|
||
207CD64C000
|
heap
|
page read and write
|
||
25E2E3A5000
|
heap
|
page read and write
|
||
2D38BBC2000
|
heap
|
page read and write
|
||
2D38B420000
|
heap
|
page read and write
|
||
193560A6000
|
heap
|
page read and write
|
||
26C2442D000
|
heap
|
page read and write
|
||
2D389B08000
|
heap
|
page read and write
|
||
193580DE000
|
heap
|
page read and write
|
||
26C26259000
|
trusted library allocation
|
page read and write
|
||
1695000
|
heap
|
page read and write
|
||
193560DD000
|
heap
|
page read and write
|
||
7FFB4AF34000
|
trusted library allocation
|
page read and write
|
||
1904DAF7000
|
heap
|
page read and write
|
||
1904B3B8000
|
heap
|
page read and write
|
||
207CD807000
|
heap
|
page read and write
|
||
1904B29B000
|
heap
|
page read and write
|
||
2D38BAE2000
|
heap
|
page read and write
|
||
2D38BC23000
|
heap
|
page read and write
|
||
2144FA72000
|
heap
|
page read and write
|
||
2D38BAEB000
|
heap
|
page read and write
|
||
1935A982000
|
heap
|
page read and write
|
||
1B150000
|
heap
|
page read and write
|
||
20925DBC000
|
heap
|
page read and write
|
||
1904B383000
|
heap
|
page read and write
|
||
1904B260000
|
heap
|
page read and write
|
||
25E303EE000
|
heap
|
page read and write
|
||
2144FA89000
|
heap
|
page read and write
|
||
2D38BADC000
|
heap
|
page read and write
|
||
7FFB4AF40000
|
trusted library allocation
|
page read and write
|
||
20923D2D000
|
heap
|
page read and write
|
||
7FFB4AF23000
|
trusted library allocation
|
page execute and read and write
|
||
2D389B1A000
|
heap
|
page read and write
|
||
1690000
|
heap
|
page read and write
|
||
207CD15D000
|
heap
|
page read and write
|
||
207CB87E000
|
heap
|
page read and write
|
||
25E3043D000
|
heap
|
page read and write
|
||
19356087000
|
heap
|
page read and write
|
||
2144FB52000
|
heap
|
page read and write
|
||
2144FBE0000
|
heap
|
page read and write
|
||
207CD64F000
|
heap
|
page read and write
|
||
1904B28D000
|
heap
|
page read and write
|
||
20925DBE000
|
heap
|
page read and write
|
||
19356089000
|
heap
|
page read and write
|
||
25E30493000
|
heap
|
page read and write
|
||
2144FC29000
|
heap
|
page read and write
|
||
2144FC2B000
|
heap
|
page read and write
|
||
1BBE4000
|
stack
|
page read and write
|
||
1904B276000
|
heap
|
page read and write
|
||
207CD7A8000
|
heap
|
page read and write
|
||
207CD791000
|
heap
|
page read and write
|
||
26C261BA000
|
trusted library allocation
|
page read and write
|
||
25E302EF000
|
heap
|
page read and write
|
||
2D38BAE2000
|
heap
|
page read and write
|
||
207CD660000
|
heap
|
page read and write
|
||
19357F1C000
|
heap
|
page read and write
|
||
1904B2AD000
|
heap
|
page read and write
|
||
2144FB84000
|
heap
|
page read and write
|
||
20925E86000
|
heap
|
page read and write
|
||
207CB600000
|
heap
|
page read and write
|
||
2D38BBBF000
|
heap
|
page read and write
|
||
1904B286000
|
heap
|
page read and write
|
||
19358089000
|
heap
|
page read and write
|
||
207CD7FA000
|
heap
|
page read and write
|
||
25E302EA000
|
heap
|
page read and write
|
||
20925DAA000
|
heap
|
page read and write
|
||
1904ACAE000
|
heap
|
page read and write
|
||
193560E7000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
2144DABD000
|
heap
|
page read and write
|
||
25E3046A000
|
heap
|
page read and write
|
||
D55000
|
heap
|
page read and write
|
||
1904B40F000
|
heap
|
page read and write
|
||
E1291FF000
|
stack
|
page read and write
|
||
5A4267E000
|
stack
|
page read and write
|
||
21452300000
|
heap
|
page read and write
|
||
25E2E396000
|
heap
|
page read and write
|
||
2D389AEA000
|
heap
|
page read and write
|
||
207CD64B000
|
heap
|
page read and write
|
||
207CD807000
|
heap
|
page read and write
|
||
25E3047A000
|
heap
|
page read and write
|
||
DD4000
|
stack
|
page read and write
|
||
2144DACE000
|
heap
|
page read and write
|
||
207CB83A000
|
heap
|
page read and write
|
||
7FFB4B000000
|
trusted library allocation
|
page execute and read and write
|
||
26C3E970000
|
heap
|
page read and write
|
||
1904B29F000
|
heap
|
page read and write
|
||
207CD655000
|
heap
|
page read and write
|
||
20925CCB000
|
heap
|
page read and write
|
||
193560ED000
|
heap
|
page read and write
|
||
2144FA72000
|
heap
|
page read and write
|
||
19358066000
|
heap
|
page read and write
|
||
2144FB52000
|
heap
|
page read and write
|
||
19358011000
|
heap
|
page read and write
|
||
2D38BC98000
|
heap
|
page read and write
|
||
7FFB4AF60000
|
trusted library allocation
|
page read and write
|
||
1904B431000
|
heap
|
page read and write
|
||
19357F31000
|
heap
|
page read and write
|
||
2D389B27000
|
heap
|
page read and write
|
||
25E2FE7A000
|
heap
|
page read and write
|
||
1904B40F000
|
heap
|
page read and write
|
||
13091000
|
trusted library allocation
|
page read and write
|
||
2D38BC88000
|
heap
|
page read and write
|
||
1904B284000
|
heap
|
page read and write
|
||
207CD749000
|
heap
|
page read and write
|
||
2D38BC6C000
|
heap
|
page read and write
|
||
1935606C000
|
heap
|
page read and write
|
||
25E303C2000
|
heap
|
page read and write
|
||
2D38BAF0000
|
heap
|
page read and write
|
||
2144DA10000
|
heap
|
page read and write
|
||
2D38BAD7000
|
heap
|
page read and write
|
||
1904B2A9000
|
heap
|
page read and write
|
||
207CD639000
|
heap
|
page read and write
|
||
2144DACE000
|
heap
|
page read and write
|
||
19356072000
|
heap
|
page read and write
|
||
25E2E399000
|
heap
|
page read and write
|
||
25E30493000
|
heap
|
page read and write
|
||
2D389B07000
|
heap
|
page read and write
|
||
1C121CB0000
|
heap
|
page read and write
|
||
2D389C40000
|
heap
|
page read and write
|
||
C5B89FC000
|
stack
|
page read and write
|
||
214522FA000
|
heap
|
page read and write
|
||
1904B389000
|
heap
|
page read and write
|
||
19357EF0000
|
heap
|
page read and write
|
||
19049338000
|
heap
|
page read and write
|
||
2144D950000
|
heap
|
page read and write
|
||
1B742000
|
heap
|
page read and write
|
||
1904B387000
|
heap
|
page read and write
|
||
2144FA5E000
|
heap
|
page read and write
|
||
20925CD5000
|
heap
|
page read and write
|
||
19356064000
|
heap
|
page read and write
|
||
7FFB4AFFC000
|
trusted library allocation
|
page execute and read and write
|
||
19357F20000
|
heap
|
page read and write
|
||
1904B3B1000
|
heap
|
page read and write
|
||
1904DAD1000
|
heap
|
page read and write
|
||
2144DAAB000
|
heap
|
page read and write
|
||
6705F7E000
|
stack
|
page read and write
|
||
193560EE000
|
heap
|
page read and write
|
||
BA119AE000
|
stack
|
page read and write
|
||
2144DAAA000
|
heap
|
page read and write
|
||
193560A0000
|
heap
|
page read and write
|
||
2D38BAD4000
|
heap
|
page read and write
|
||
19356069000
|
heap
|
page read and write
|
||
1935609B000
|
heap
|
page read and write
|
||
193560B5000
|
heap
|
page read and write
|
||
207CD810000
|
heap
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
19357F3A000
|
heap
|
page read and write
|
||
19049302000
|
heap
|
page read and write
|
||
20923D90000
|
heap
|
page read and write
|
||
20925DDC000
|
heap
|
page read and write
|
||
2144FA5E000
|
heap
|
page read and write
|
||
207CD7A3000
|
heap
|
page read and write
|
||
7FFB4B190000
|
trusted library allocation
|
page read and write
|
||
25E30444000
|
heap
|
page read and write
|
||
26C26165000
|
trusted library allocation
|
page read and write
|
||
207CB7F6000
|
heap
|
page read and write
|
||
21454192000
|
trusted library allocation
|
page read and write
|
||
2144FA5B000
|
heap
|
page read and write
|
||
25E2E384000
|
heap
|
page read and write
|
||
2D389AF6000
|
heap
|
page read and write
|
||
C5B887E000
|
stack
|
page read and write
|
||
26C260D0000
|
heap
|
page execute and read and write
|
||
2D389B01000
|
heap
|
page read and write
|
||
20925DCF000
|
heap
|
page read and write
|
||
207CD659000
|
heap
|
page read and write
|
||
2D38BAEB000
|
heap
|
page read and write
|
||
25E2E38A000
|
heap
|
page read and write
|
||
3B13AFD000
|
stack
|
page read and write
|
||
207CD155000
|
heap
|
page read and write
|
||
1904B287000
|
heap
|
page read and write
|
||
2D38B55E000
|
heap
|
page read and write
|
||
2D389B14000
|
heap
|
page read and write
|
||
BA121FE000
|
stack
|
page read and write
|
||
20925CCC000
|
heap
|
page read and write
|
||
1904B40F000
|
heap
|
page read and write
|
||
19049332000
|
heap
|
page read and write
|
||
19357F16000
|
heap
|
page read and write
|
||
25E302DC000
|
heap
|
page read and write
|
||
25E2E3C7000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
25E302DC000
|
heap
|
page read and write
|
||
D98D77F000
|
stack
|
page read and write
|
||
207CB87E000
|
heap
|
page read and write
|
||
1195000
|
heap
|
page read and write
|
||
25E2E387000
|
heap
|
page read and write
|
||
25E30490000
|
heap
|
page read and write
|
||
1904B29C000
|
heap
|
page read and write
|
||
20928720000
|
heap
|
page read and write
|
||
BA128FE000
|
stack
|
page read and write
|
||
20925DC4000
|
heap
|
page read and write
|
||
7FFB4AF30000
|
trusted library allocation
|
page read and write
|
||
7FFB4B110000
|
trusted library allocation
|
page read and write
|
||
5A422D8000
|
stack
|
page read and write
|
||
2D38BAD0000
|
heap
|
page read and write
|
||
25E302EA000
|
heap
|
page read and write
|
||
2D38E530000
|
trusted library allocation
|
page read and write
|
||
25E2E290000
|
heap
|
page read and write
|
||
1904DAC0000
|
heap
|
page read and write
|
||
2144FA5E000
|
heap
|
page read and write
|
||
1B773000
|
heap
|
page read and write
|
||
25E302D6000
|
heap
|
page read and write
|
||
2144FA47000
|
heap
|
page read and write
|
||
20925DA0000
|
heap
|
page read and write
|
||
2D38BAF5000
|
heap
|
page read and write
|
||
25E302D7000
|
heap
|
page read and write
|
||
19356064000
|
heap
|
page read and write
|
||
1904B2AC000
|
heap
|
page read and write
|
||
26C24690000
|
heap
|
page read and write
|
||
2144FB7C000
|
heap
|
page read and write
|
||
25E302F4000
|
heap
|
page read and write
|
||
207CD7C4000
|
heap
|
page read and write
|
||
20928737000
|
heap
|
page read and write
|
||
1904B389000
|
heap
|
page read and write
|
||
7FFB4B0D4000
|
trusted library allocation
|
page read and write
|
||
207CD7C3000
|
heap
|
page read and write
|
||
193580A4000
|
heap
|
page read and write
|
||
25E303EA000
|
heap
|
page read and write
|
||
207CB841000
|
heap
|
page read and write
|
||
25E2E38C000
|
heap
|
page read and write
|
||
2D38BBE5000
|
heap
|
page read and write
|
||
2144FC24000
|
heap
|
page read and write
|
||
25E30490000
|
heap
|
page read and write
|
||
670627D000
|
stack
|
page read and write
|
||
20923DAB000
|
heap
|
page read and write
|
||
2D38BBBF000
|
heap
|
page read and write
|
||
20923D4A000
|
heap
|
page read and write
|
||
1904B3B1000
|
heap
|
page read and write
|
||
2144DA65000
|
heap
|
page read and write
|
||
25E302E6000
|
heap
|
page read and write
|
||
20925750000
|
heap
|
page read and write
|
||
2D389B2A000
|
heap
|
page read and write
|
||
19357F34000
|
heap
|
page read and write
|
||
20925CCF000
|
heap
|
page read and write
|
||
25E303CB000
|
heap
|
page read and write
|
||
25E2E3C7000
|
heap
|
page read and write
|
||
2D38BBDC000
|
heap
|
page read and write
|
||
1904B3C6000
|
heap
|
page read and write
|
||
25E302C9000
|
heap
|
page read and write
|
||
2144FBC7000
|
heap
|
page read and write
|
||
7FFB4B0D7000
|
trusted library allocation
|
page read and write
|
||
2144FB3A000
|
heap
|
page read and write
|
||
1935AC40000
|
heap
|
page read and write
|
||
19356028000
|
heap
|
page read and write
|
||
207CB80E000
|
heap
|
page read and write
|
||
25E303C7000
|
heap
|
page read and write
|
||
2D38BAF0000
|
heap
|
page read and write
|
||
2D38BAC0000
|
heap
|
page read and write
|
||
193580A0000
|
heap
|
page read and write
|
||
20928735000
|
heap
|
page read and write
|
||
207CB720000
|
heap
|
page read and write
|
||
2144FA48000
|
heap
|
page read and write
|
||
E12947B000
|
stack
|
page read and write
|
||
207CB876000
|
heap
|
page read and write
|
||
26C261B6000
|
trusted library allocation
|
page read and write
|
||
193560A8000
|
heap
|
page read and write
|
||
2D38BC06000
|
heap
|
page read and write
|
||
20923CE8000
|
heap
|
page read and write
|
||
207CB837000
|
heap
|
page read and write
|
||
20923D3B000
|
heap
|
page read and write
|
||
19357F11000
|
heap
|
page read and write
|
||
19357F1C000
|
heap
|
page read and write
|
||
207CD7C8000
|
heap
|
page read and write
|
||
25E30466000
|
heap
|
page read and write
|
||
207CB848000
|
heap
|
page read and write
|
||
2144FA72000
|
heap
|
page read and write
|
||
2144D940000
|
heap
|
page read and write
|
||
2144DAA6000
|
heap
|
page read and write
|
||
7FFB4B0E2000
|
trusted library allocation
|
page read and write
|
||
19356070000
|
heap
|
page read and write
|
||
1904B296000
|
heap
|
page read and write
|
||
2D38BB03000
|
heap
|
page read and write
|
||
2144DAC6000
|
heap
|
page read and write
|
||
19358099000
|
heap
|
page read and write
|
||
7FFB4AF64000
|
trusted library allocation
|
page read and write
|
||
1904B29B000
|
heap
|
page read and write
|
||
2D38BC9B000
|
heap
|
page read and write
|
||
25E302D5000
|
heap
|
page read and write
|
||
1C1219F0000
|
heap
|
page read and write
|
||
19357F2F000
|
heap
|
page read and write
|
||
19357935000
|
heap
|
page read and write
|
||
19357F34000
|
heap
|
page read and write
|
||
5A1000
|
stack
|
page read and write
|
||
21452301000
|
heap
|
page read and write
|
||
1904DB0B000
|
heap
|
page read and write
|
||
25E2E400000
|
heap
|
page read and write
|
||
CA3000
|
trusted library allocation
|
page read and write
|
||
2144DAE9000
|
heap
|
page read and write
|
||
1935A97B000
|
heap
|
page read and write
|
||
20925CDE000
|
heap
|
page read and write
|
||
207CD7C6000
|
heap
|
page read and write
|
||
26C2617D000
|
trusted library allocation
|
page read and write
|
||
2144DACD000
|
heap
|
page read and write
|
||
20925E86000
|
heap
|
page read and write
|
||
20925E28000
|
heap
|
page read and write
|
||
25E2E40C000
|
heap
|
page read and write
|
||
20923D4F000
|
heap
|
page read and write
|
||
2D38BBF3000
|
heap
|
page read and write
|
||
207CD7D5000
|
heap
|
page read and write
|
||
207CB805000
|
heap
|
page read and write
|
||
19049356000
|
heap
|
page read and write
|
||
1B3AF000
|
stack
|
page read and write
|
||
207CD664000
|
heap
|
page read and write
|
||
193560E5000
|
heap
|
page read and write
|
||
1904B296000
|
heap
|
page read and write
|
||
2144FA30000
|
heap
|
page read and write
|
||
207CD7D5000
|
heap
|
page read and write
|
||
207CB863000
|
heap
|
page read and write
|
||
207D00BC000
|
heap
|
page read and write
|
||
9DB000
|
heap
|
page read and write
|
||
207CB83A000
|
heap
|
page read and write
|
||
25E302CC000
|
heap
|
page read and write
|
||
2D38BC6C000
|
heap
|
page read and write
|
||
2144FA76000
|
heap
|
page read and write
|
||
1904B414000
|
heap
|
page read and write
|
||
207CD630000
|
heap
|
page read and write
|
||
2D38BC41000
|
heap
|
page read and write
|
||
20925CD9000
|
heap
|
page read and write
|
||
E128CC7000
|
stack
|
page read and write
|
||
C5B88FE000
|
stack
|
page read and write
|
||
19357F2F000
|
heap
|
page read and write
|
||
7FFB4AF3D000
|
trusted library allocation
|
page execute and read and write
|
||
450000
|
unkown
|
page readonly
|
||
20928744000
|
heap
|
page read and write
|
||
1904B27A000
|
heap
|
page read and write
|
||
207CD7A8000
|
heap
|
page read and write
|
||
2D38BAF0000
|
heap
|
page read and write
|
||
2144FC24000
|
heap
|
page read and write
|
||
1904931D000
|
heap
|
page read and write
|
||
2144FA64000
|
heap
|
page read and write
|
||
19049210000
|
heap
|
page read and write
|
||
2144FA76000
|
heap
|
page read and write
|
||
2144DACE000
|
heap
|
page read and write
|
||
26C247A0000
|
heap
|
page read and write
|
||
2144FB54000
|
heap
|
page read and write
|
||
25E2E393000
|
heap
|
page read and write
|
||
E6B6478000
|
stack
|
page read and write
|
||
214522DF000
|
heap
|
page read and write
|
||
20925CC5000
|
heap
|
page read and write
|
||
2144DABF000
|
heap
|
page read and write
|
||
25E303E1000
|
heap
|
page read and write
|
||
19358077000
|
heap
|
page read and write
|
||
A48000
|
heap
|
page read and write
|
||
19049319000
|
heap
|
page read and write
|
||
25E302D1000
|
heap
|
page read and write
|
||
207CD7A8000
|
heap
|
page read and write
|
||
2144FC13000
|
heap
|
page read and write
|
||
25E2E3A4000
|
heap
|
page read and write
|
||
2D389B0B000
|
heap
|
page read and write
|
||
2D38BBF3000
|
heap
|
page read and write
|
||
207CD738000
|
heap
|
page read and write
|
||
2144DA83000
|
heap
|
page read and write
|
||
25E3046A000
|
heap
|
page read and write
|
||
19356045000
|
heap
|
page read and write
|
||
25E2E384000
|
heap
|
page read and write
|
||
207CB82B000
|
heap
|
page read and write
|
||
19357F16000
|
heap
|
page read and write
|
||
1BF4F000
|
stack
|
page read and write
|
||
2D38BAD9000
|
heap
|
page read and write
|
||
7FFB4AF9C000
|
trusted library allocation
|
page execute and read and write
|
||
2144DAA5000
|
heap
|
page read and write
|
||
20925E86000
|
heap
|
page read and write
|
||
26C24695000
|
heap
|
page read and write
|
||
2D38BBE5000
|
heap
|
page read and write
|
||
193580C6000
|
heap
|
page read and write
|
||
20925CB1000
|
heap
|
page read and write
|
||
25E303BA000
|
heap
|
page read and write
|
||
25E302DC000
|
heap
|
page read and write
|
||
19357F22000
|
heap
|
page read and write
|
||
2144FA7C000
|
heap
|
page read and write
|
||
3B13E7B000
|
stack
|
page read and write
|
||
193560A1000
|
heap
|
page read and write
|
||
20925E86000
|
heap
|
page read and write
|
||
19357F34000
|
heap
|
page read and write
|
||
1904B27D000
|
heap
|
page read and write
|
||
1904B2AC000
|
heap
|
page read and write
|
||
26C3E952000
|
heap
|
page read and write
|
||
19357F17000
|
heap
|
page read and write
|
||
2D38BAD0000
|
heap
|
page read and write
|
||
207CD64F000
|
heap
|
page read and write
|
||
2144FA4B000
|
heap
|
page read and write
|
||
25E302F4000
|
heap
|
page read and write
|
||
2D38BAF4000
|
heap
|
page read and write
|
||
5A42AFE000
|
stack
|
page read and write
|
||
20925DF7000
|
heap
|
page read and write
|
||
207CD754000
|
heap
|
page read and write
|
||
3B13DFD000
|
stack
|
page read and write
|
||
20925CBA000
|
heap
|
page read and write
|
||
2D38BAF4000
|
heap
|
page read and write
|
||
20925CD1000
|
heap
|
page read and write
|
||
19358099000
|
heap
|
page read and write
|
||
20925CD5000
|
heap
|
page read and write
|
||
207CB7F6000
|
heap
|
page read and write
|
||
2144DAA2000
|
heap
|
page read and write
|
||
2144FA44000
|
heap
|
page read and write
|
||
2D38B550000
|
heap
|
page read and write
|
||
19357F26000
|
heap
|
page read and write
|
||
20923D36000
|
heap
|
page read and write
|
||
2144FA44000
|
heap
|
page read and write
|
||
25E304A7000
|
heap
|
page read and write
|
||
7FFB4AF4A000
|
trusted library allocation
|
page read and write
|
||
25E302E0000
|
heap
|
page read and write
|
||
19357F20000
|
heap
|
page read and write
|
||
20925CD9000
|
heap
|
page read and write
|
||
1935A970000
|
heap
|
page read and write
|
||
2B41AFC000
|
stack
|
page read and write
|
||
20925E91000
|
heap
|
page read and write
|
||
2D38BAF4000
|
heap
|
page read and write
|
||
207CD749000
|
heap
|
page read and write
|
||
19358089000
|
heap
|
page read and write
|
||
20923D60000
|
heap
|
page read and write
|
||
214525E0000
|
trusted library allocation
|
page read and write
|
||
1935793D000
|
heap
|
page read and write
|
||
26C260F3000
|
trusted library allocation
|
page read and write
|
||
26C26170000
|
trusted library allocation
|
page read and write
|
||
207CD159000
|
heap
|
page read and write
|
||
19357F12000
|
heap
|
page read and write
|
||
2144FBD4000
|
heap
|
page read and write
|
||
E6B65FF000
|
stack
|
page read and write
|
||
1C121A70000
|
heap
|
page read and write
|
||
97C000
|
heap
|
page read and write
|
||
27977F70000
|
heap
|
page read and write
|
||
20925E91000
|
heap
|
page read and write
|
||
1904B2A0000
|
heap
|
page read and write
|
||
20925E28000
|
heap
|
page read and write
|
||
2144FBC7000
|
heap
|
page read and write
|
||
1B61D000
|
stack
|
page read and write
|
||
25E2E3AF000
|
heap
|
page read and write
|
||
190492D4000
|
heap
|
page read and write
|
||
2144FC24000
|
heap
|
page read and write
|
||
1935A97E000
|
heap
|
page read and write
|
||
193580CA000
|
heap
|
page read and write
|
||
20925E82000
|
heap
|
page read and write
|
||
20925CBE000
|
heap
|
page read and write
|
||
25E303B6000
|
heap
|
page read and write
|
||
20925E86000
|
heap
|
page read and write
|
||
20925DC6000
|
heap
|
page read and write
|
||
2D389B13000
|
heap
|
page read and write
|
||
193580CA000
|
heap
|
page read and write
|
||
20923D13000
|
heap
|
page read and write
|
||
2D38BBB0000
|
heap
|
page read and write
|
||
1904B2A8000
|
heap
|
page read and write
|
||
19049310000
|
heap
|
page read and write
|
||
1904B276000
|
heap
|
page read and write
|
||
11435E8000
|
stack
|
page read and write
|
||
19357939000
|
heap
|
page read and write
|
||
2D38BBE9000
|
heap
|
page read and write
|
||
BA11DFE000
|
stack
|
page read and write
|
||
2D389AFA000
|
heap
|
page read and write
|
||
2D389B0B000
|
heap
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
2D38BAE3000
|
heap
|
page read and write
|
||
207CD7D5000
|
heap
|
page read and write
|
||
190492B1000
|
heap
|
page read and write
|
||
207CB7FC000
|
heap
|
page read and write
|
||
25E302D6000
|
heap
|
page read and write
|
||
207CD656000
|
heap
|
page read and write
|
||
19358099000
|
heap
|
page read and write
|
||
BB0000
|
unkown
|
page readonly
|
||
19357F20000
|
heap
|
page read and write
|
||
2D38BAD7000
|
heap
|
page read and write
|
||
26C243A0000
|
trusted library allocation
|
page read and write
|
||
20925CD2000
|
heap
|
page read and write
|
||
25E2FE75000
|
heap
|
page read and write
|
||
1904B2AD000
|
heap
|
page read and write
|
||
193580A4000
|
heap
|
page read and write
|
||
7FFB4B130000
|
trusted library allocation
|
page read and write
|
||
20925DD7000
|
heap
|
page read and write
|
||
2144FBC2000
|
heap
|
page read and write
|
||
1904B3B1000
|
heap
|
page read and write
|
||
20925CDB000
|
heap
|
page read and write
|
||
1BC40000
|
heap
|
page read and write
|
||
207CB834000
|
heap
|
page read and write
|
||
2144FA4B000
|
heap
|
page read and write
|
||
20925E9C000
|
heap
|
page read and write
|
||
1904B29B000
|
heap
|
page read and write
|
||
20925CCB000
|
heap
|
page read and write
|
||
26C2627F000
|
trusted library allocation
|
page read and write
|
||
25E2E384000
|
heap
|
page read and write
|
||
6705AC8000
|
stack
|
page read and write
|
||
207CD645000
|
heap
|
page read and write
|
||
E6B677B000
|
stack
|
page read and write
|
||
26C3E968000
|
heap
|
page read and write
|
||
2144DAD2000
|
heap
|
page read and write
|
||
207CD642000
|
heap
|
page read and write
|
||
207CB80D000
|
heap
|
page read and write
|
||
976000
|
heap
|
page read and write
|
||
2D38BAE6000
|
heap
|
page read and write
|
||
26C2621A000
|
trusted library allocation
|
page read and write
|
||
193560EE000
|
heap
|
page read and write
|
||
1904B3B1000
|
heap
|
page read and write
|
||
193580CA000
|
heap
|
page read and write
|
||
207CB80D000
|
heap
|
page read and write
|
||
2144FA69000
|
heap
|
page read and write
|
||
1219000
|
heap
|
page read and write
|
||
2D38BAC6000
|
heap
|
page read and write
|
||
2D38BBE5000
|
heap
|
page read and write
|
||
207CB87E000
|
heap
|
page read and write
|
||
25E3045D000
|
heap
|
page read and write
|
||
1904DAFF000
|
heap
|
page read and write
|
||
1904DAFF000
|
heap
|
page read and write
|
||
2D389B1E000
|
heap
|
page read and write
|
||
26C243CC000
|
heap
|
page read and write
|
||
2D38BBC3000
|
heap
|
page read and write
|
||
25E32D55000
|
heap
|
page read and write
|
||
207CD763000
|
heap
|
page read and write
|
||
25E303CD000
|
heap
|
page read and write
|
||
25E302E6000
|
heap
|
page read and write
|
||
2D38BBDE000
|
heap
|
page read and write
|
||
2144DAED000
|
heap
|
page read and write
|
||
19357F12000
|
heap
|
page read and write
|
||
20923D4D000
|
heap
|
page read and write
|
||
207CB83A000
|
heap
|
page read and write
|
||
25E302D6000
|
heap
|
page read and write
|
||
2D38BC30000
|
heap
|
page read and write
|
||
25E302E2000
|
heap
|
page read and write
|
||
1904B399000
|
heap
|
page read and write
|
||
5A426FE000
|
stack
|
page read and write
|
||
2D38BBB6000
|
heap
|
page read and write
|
||
20925DDB000
|
heap
|
page read and write
|
||
1904B36B000
|
heap
|
page read and write
|
||
214522D9000
|
heap
|
page read and write
|
||
19357F2F000
|
heap
|
page read and write
|
||
7FFB4AF32000
|
trusted library allocation
|
page read and write
|
||
1904ACA5000
|
heap
|
page read and write
|
||
207CD050000
|
heap
|
page read and write
|
||
A6B000
|
heap
|
page read and write
|
||
2D38BBCE000
|
heap
|
page read and write
|
||
1904ACA0000
|
heap
|
page read and write
|
||
25E302CD000
|
heap
|
page read and write
|
||
1904B296000
|
heap
|
page read and write
|
||
19356064000
|
heap
|
page read and write
|
||
7FFB4AF43000
|
trusted library allocation
|
page read and write
|
||
207CD7E6000
|
heap
|
page read and write
|
||
19357F01000
|
heap
|
page read and write
|
||
20925DB2000
|
heap
|
page read and write
|
||
1904B393000
|
heap
|
page read and write
|
||
207CB87E000
|
heap
|
page read and write
|
||
20925CC8000
|
heap
|
page read and write
|
||
25E302EB000
|
heap
|
page read and write
|
||
2D390610000
|
heap
|
page readonly
|
||
19358079000
|
heap
|
page read and write
|
||
25E302E0000
|
heap
|
page read and write
|
||
19358099000
|
heap
|
page read and write
|
||
190492FF000
|
heap
|
page read and write
|
||
1904B411000
|
heap
|
page read and write
|
||
11CD000
|
heap
|
page read and write
|
||
2D38BAC0000
|
heap
|
page read and write
|
||
7FFB4B150000
|
trusted library allocation
|
page read and write
|
||
207CB7F9000
|
heap
|
page read and write
|
||
25E302EF000
|
heap
|
page read and write
|
||
26C263BD000
|
trusted library allocation
|
page read and write
|
||
25E302E0000
|
heap
|
page read and write
|
||
21454630000
|
heap
|
page readonly
|
||
2144D990000
|
heap
|
page read and write
|
||
20925CD5000
|
heap
|
page read and write
|
||
2144FA6E000
|
heap
|
page read and write
|
||
1935609E000
|
heap
|
page read and write
|
||
1B1A3000
|
heap
|
page read and write
|
||
1904B284000
|
heap
|
page read and write
|
||
19357FFD000
|
heap
|
page read and write
|
||
26C261F7000
|
trusted library allocation
|
page read and write
|
||
5A4235E000
|
stack
|
page read and write
|
||
25E302C0000
|
heap
|
page read and write
|
||
5A427FB000
|
stack
|
page read and write
|
||
19357F31000
|
heap
|
page read and write
|
||
BA123FE000
|
stack
|
page read and write
|
||
19358067000
|
heap
|
page read and write
|
||
2D38BAF4000
|
heap
|
page read and write
|
||
20923D28000
|
heap
|
page read and write
|
||
1935607F000
|
heap
|
page read and write
|
||
1C121A7B000
|
heap
|
page read and write
|
||
2D38BAB0000
|
heap
|
page read and write
|
||
25E2E3C7000
|
heap
|
page read and write
|
||
2144FB54000
|
heap
|
page read and write
|
||
1935608B000
|
heap
|
page read and write
|
||
2D38BAF5000
|
heap
|
page read and write
|
||
19049301000
|
heap
|
page read and write
|
||
2092583D000
|
heap
|
page read and write
|
||
19357F1C000
|
heap
|
page read and write
|
||
20925CCF000
|
heap
|
page read and write
|
||
E6B69FB000
|
stack
|
page read and write
|
||
2D38DD00000
|
trusted library allocation
|
page read and write
|
||
19358005000
|
heap
|
page read and write
|
||
2144FB3C000
|
heap
|
page read and write
|
||
2D38BAF4000
|
heap
|
page read and write
|
||
20925E4B000
|
heap
|
page read and write
|
||
2144FB73000
|
heap
|
page read and write
|
||
BA1196E000
|
stack
|
page read and write
|
||
2D38BC06000
|
heap
|
page read and write
|
||
1904B2A7000
|
heap
|
page read and write
|
||
2092583E000
|
heap
|
page read and write
|
||
19357F16000
|
heap
|
page read and write
|
||
20925DC8000
|
heap
|
page read and write
|
||
2144FA59000
|
heap
|
page read and write
|
||
2144FA83000
|
heap
|
page read and write
|
||
2144FA72000
|
heap
|
page read and write
|
||
1904B29B000
|
heap
|
page read and write
|
||
7FFB4AFE0000
|
trusted library allocation
|
page read and write
|
||
207CD7C3000
|
heap
|
page read and write
|
||
2D389AE4000
|
heap
|
page read and write
|
||
2144FA6E000
|
heap
|
page read and write
|
||
25E32F90000
|
heap
|
page read and write
|
||
20925E32000
|
heap
|
page read and write
|
||
2D38BAD8000
|
heap
|
page read and write
|
||
1C13B000
|
stack
|
page read and write
|
||
2D38BAD4000
|
heap
|
page read and write
|
||
1904B393000
|
heap
|
page read and write
|
||
26C36101000
|
trusted library allocation
|
page read and write
|
||
7FFB4AFE0000
|
trusted library allocation
|
page execute and read and write
|
||
2144FA8C000
|
heap
|
page read and write
|
||
26C24590000
|
trusted library allocation
|
page read and write
|
||
25E303B0000
|
heap
|
page read and write
|
||
26C24402000
|
heap
|
page read and write
|
||
2D38BCAE000
|
heap
|
page read and write
|
||
2D38BADC000
|
heap
|
page read and write
|
||
19356085000
|
heap
|
page read and write
|
||
207CB844000
|
heap
|
page read and write
|
||
20928738000
|
heap
|
page read and write
|
||
2D38BB00000
|
heap
|
page read and write
|
||
20925CBA000
|
heap
|
page read and write
|
||
2144FA64000
|
heap
|
page read and write
|
||
214522C9000
|
heap
|
page read and write
|
||
20925CD9000
|
heap
|
page read and write
|
||
1143AFB000
|
stack
|
page read and write
|
||
2144F660000
|
trusted library allocation
|
page read and write
|
||
19049317000
|
heap
|
page read and write
|
||
25E302DC000
|
heap
|
page read and write
|
||
214522C0000
|
heap
|
page read and write
|
||
2144FA64000
|
heap
|
page read and write
|
||
25E302EF000
|
heap
|
page read and write
|
||
3B13B7B000
|
stack
|
page read and write
|
||
19357F15000
|
heap
|
page read and write
|
||
25E30466000
|
heap
|
page read and write
|
||
2D38BC6A000
|
heap
|
page read and write
|
||
20923D79000
|
heap
|
page read and write
|
||
20928724000
|
heap
|
page read and write
|
||
25E2E2A0000
|
heap
|
page read and write
|
||
25E303E1000
|
heap
|
page read and write
|
||
1904B434000
|
heap
|
page read and write
|
||
2D38BB00000
|
heap
|
page read and write
|
||
207CD7A8000
|
heap
|
page read and write
|
||
1935608E000
|
heap
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
7FFB4B120000
|
trusted library allocation
|
page read and write
|
||
25E30476000
|
heap
|
page read and write
|
||
25E30493000
|
heap
|
page read and write
|
||
26C2617B000
|
trusted library allocation
|
page read and write
|
||
1BF0C000
|
stack
|
page read and write
|
||
1904B431000
|
heap
|
page read and write
|
||
20923D70000
|
heap
|
page read and write
|
||
26EE000
|
stack
|
page read and write
|
||
19356067000
|
heap
|
page read and write
|
||
2144FBD8000
|
heap
|
page read and write
|
||
1904B28A000
|
heap
|
page read and write
|
||
207CB7FF000
|
heap
|
page read and write
|
||
26C245E0000
|
heap
|
page read and write
|
||
1904B380000
|
heap
|
page read and write
|
||
25E303EF000
|
heap
|
page read and write
|
||
207CD72A000
|
heap
|
page read and write
|
||
E6B6AFE000
|
stack
|
page read and write
|
||
1904DADA000
|
heap
|
page read and write
|
||
1BD00000
|
heap
|
page read and write
|
||
2144DB0E000
|
heap
|
page read and write
|
||
1904933B000
|
heap
|
page read and write
|
||
193560EB000
|
heap
|
page read and write
|
||
2D3903D0000
|
heap
|
page read and write
|
||
207CB805000
|
heap
|
page read and write
|
||
25E3043D000
|
heap
|
page read and write
|
||
19358008000
|
heap
|
page read and write
|
||
190492F4000
|
heap
|
page read and write
|
||
19356072000
|
heap
|
page read and write
|
||
1904B296000
|
heap
|
page read and write
|
||
2D38BAD9000
|
heap
|
page read and write
|
||
1935608B000
|
heap
|
page read and write
|
||
207CD78D000
|
heap
|
page read and write
|
||
7FFB4AF5D000
|
trusted library allocation
|
page execute and read and write
|
||
26C245A3000
|
trusted library allocation
|
page read and write
|
||
19358089000
|
heap
|
page read and write
|
||
207CD65A000
|
heap
|
page read and write
|
||
25E30493000
|
heap
|
page read and write
|
||
2D38BBE5000
|
heap
|
page read and write
|
||
26C243EC000
|
heap
|
page read and write
|
||
1904B435000
|
heap
|
page read and write
|
||
2D38BAC6000
|
heap
|
page read and write
|
||
20928721000
|
heap
|
page read and write
|
||
1904B2B3000
|
heap
|
page read and write
|
||
20925CC5000
|
heap
|
page read and write
|
||
25E30402000
|
heap
|
page read and write
|
||
1904B28D000
|
heap
|
page read and write
|
||
25E302F4000
|
heap
|
page read and write
|
||
207CD7D5000
|
heap
|
page read and write
|
||
19049313000
|
heap
|
page read and write
|
||
20925DDB000
|
heap
|
page read and write
|
||
207CD645000
|
heap
|
page read and write
|
||
20925CD5000
|
heap
|
page read and write
|
||
20925CDE000
|
heap
|
page read and write
|
||
20925CB0000
|
heap
|
page read and write
|
||
2D389AF8000
|
heap
|
page read and write
|
||
19356069000
|
heap
|
page read and write
|
||
20927EF0000
|
trusted library allocation
|
page read and write
|
||
207CD630000
|
heap
|
page read and write
|
||
207CB811000
|
heap
|
page read and write
|
||
5A4277C000
|
stack
|
page read and write
|
||
193579E0000
|
heap
|
page read and write
|
||
207CD63A000
|
heap
|
page read and write
|
||
25E32D30000
|
heap
|
page read and write
|
||
3B13877000
|
stack
|
page read and write
|
||
25E302E6000
|
heap
|
page read and write
|
||
1BC3E000
|
stack
|
page read and write
|
||
2700000
|
heap
|
page execute and read and write
|
||
1935801F000
|
heap
|
page read and write
|
||
19358089000
|
heap
|
page read and write
|
||
20923D61000
|
heap
|
page read and write
|
||
2144DACA000
|
heap
|
page read and write
|
||
2144FA5E000
|
heap
|
page read and write
|
||
25E3047A000
|
heap
|
page read and write
|
||
2144DB03000
|
heap
|
page read and write
|
||
25E302E0000
|
heap
|
page read and write
|
||
20923DAA000
|
heap
|
page read and write
|
||
2D38BBC6000
|
heap
|
page read and write
|
||
214522E6000
|
heap
|
page read and write
|
||
20925DB4000
|
heap
|
page read and write
|
||
1904B3F0000
|
heap
|
page read and write
|
||
207CB828000
|
heap
|
page read and write
|
||
19049316000
|
heap
|
page read and write
|
||
2144FB73000
|
heap
|
page read and write
|
||
1935793E000
|
heap
|
page read and write
|
||
7FFB4AF50000
|
trusted library allocation
|
page read and write
|
||
26C24350000
|
heap
|
page read and write
|
||
25E302C1000
|
heap
|
page read and write
|
||
25E30498000
|
heap
|
page read and write
|
||
20923DAD000
|
heap
|
page read and write
|
||
207CD7A3000
|
heap
|
page read and write
|
||
1904DAD4000
|
heap
|
page read and write
|
||
20925CC7000
|
heap
|
page read and write
|
||
25E30435000
|
heap
|
page read and write
|
||
2D389B4E000
|
heap
|
page read and write
|
||
20925CDA000
|
heap
|
page read and write
|
||
7FFB4B100000
|
trusted library allocation
|
page execute and read and write
|
||
207CD64B000
|
heap
|
page read and write
|
||
20925CCB000
|
heap
|
page read and write
|
||
1904B2BE000
|
heap
|
page read and write
|
||
19357F2A000
|
heap
|
page read and write
|
||
1935A985000
|
heap
|
page read and write
|
||
26C261CF000
|
trusted library allocation
|
page read and write
|
||
19049313000
|
heap
|
page read and write
|
||
E6B6B7F000
|
stack
|
page read and write
|
||
20925E28000
|
heap
|
page read and write
|
||
2D38BBD3000
|
heap
|
page read and write
|
||
2144DB06000
|
heap
|
page read and write
|
||
20925CD5000
|
heap
|
page read and write
|
||
19356094000
|
heap
|
page read and write
|
||
25E30444000
|
heap
|
page read and write
|
||
26C2442B000
|
heap
|
page read and write
|
||
2D38BAC0000
|
heap
|
page read and write
|
||
2D38BADC000
|
heap
|
page read and write
|
||
1904B292000
|
heap
|
page read and write
|
||
207CB7E4000
|
heap
|
page read and write
|
||
2D38BAC4000
|
heap
|
page read and write
|
||
20925CCF000
|
heap
|
page read and write
|
||
2144FB58000
|
heap
|
page read and write
|
||
25E303C9000
|
heap
|
page read and write
|
||
1904B2BB000
|
heap
|
page read and write
|
||
1935806E000
|
heap
|
page read and write
|
||
2D38BC84000
|
heap
|
page read and write
|
||
1904DAD0000
|
heap
|
page read and write
|
||
20923D59000
|
heap
|
page read and write
|
||
1904B29B000
|
heap
|
page read and write
|
||
1904DAFE000
|
heap
|
page read and write
|
||
1904B441000
|
heap
|
page read and write
|
||
E6B657E000
|
stack
|
page read and write
|
||
19357890000
|
heap
|
page read and write
|
||
26C260F0000
|
trusted library allocation
|
page read and write
|
||
1935800A000
|
heap
|
page read and write
|
||
20923CB0000
|
heap
|
page read and write
|
||
1904B393000
|
heap
|
page read and write
|
||
1904930A000
|
heap
|
page read and write
|
||
7FFB4AF53000
|
trusted library allocation
|
page read and write
|
||
1904B292000
|
heap
|
page read and write
|
||
1904B2A8000
|
heap
|
page read and write
|
||
19357F09000
|
heap
|
page read and write
|
||
2144FA72000
|
heap
|
page read and write
|
||
1904B399000
|
heap
|
page read and write
|
||
2144DAB9000
|
heap
|
page read and write
|
||
19357F00000
|
heap
|
page read and write
|
||
207CB7E2000
|
heap
|
page read and write
|
||
2D38BAF0000
|
heap
|
page read and write
|
||
27978046000
|
heap
|
page read and write
|
||
1904B29B000
|
heap
|
page read and write
|
||
25E3043D000
|
heap
|
page read and write
|
||
2144DA91000
|
heap
|
page read and write
|
||
2D38BAE6000
|
heap
|
page read and write
|
||
BA125FD000
|
stack
|
page read and write
|
||
1904B297000
|
heap
|
page read and write
|
||
7FFB4B050000
|
trusted library allocation
|
page execute and read and write
|
||
26C26255000
|
trusted library allocation
|
page read and write
|
||
1904B389000
|
heap
|
page read and write
|
||
2144DB03000
|
heap
|
page read and write
|
||
2D38BAFB000
|
heap
|
page read and write
|
||
1904B40F000
|
heap
|
page read and write
|
||
25E2E3AC000
|
heap
|
page read and write
|
||
19049302000
|
heap
|
page read and write
|
||
20925E81000
|
heap
|
page read and write
|
||
193560AC000
|
heap
|
page read and write
|
||
1904B292000
|
heap
|
page read and write
|
||
207CD655000
|
heap
|
page read and write
|
||
2D38E5B0000
|
heap
|
page read and write
|
||
120F000
|
heap
|
page read and write
|
||
CA0000
|
trusted library allocation
|
page read and write
|
||
1C121910000
|
heap
|
page read and write
|
||
6705EFC000
|
stack
|
page read and write
|
||
214522F0000
|
heap
|
page read and write
|
||
20925E91000
|
heap
|
page read and write
|
||
25E30490000
|
heap
|
page read and write
|
||
1904DFA0000
|
heap
|
page read and write
|
||
2797804A000
|
heap
|
page read and write
|
||
19049353000
|
heap
|
page read and write
|
||
193560A1000
|
heap
|
page read and write
|
||
25E302E6000
|
heap
|
page read and write
|
||
1BAFD000
|
stack
|
page read and write
|
||
20923D28000
|
heap
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
11439FE000
|
stack
|
page read and write
|
||
1904B2A6000
|
heap
|
page read and write
|
||
2144FA64000
|
heap
|
page read and write
|
||
20923D5E000
|
heap
|
page read and write
|
||
2D38BAC8000
|
heap
|
page read and write
|
||
3B139FF000
|
stack
|
page read and write
|
||
20923D2D000
|
heap
|
page read and write
|
||
207CB804000
|
heap
|
page read and write
|
||
BA11FFE000
|
stack
|
page read and write
|
||
190492F8000
|
heap
|
page read and write
|
||
19049313000
|
heap
|
page read and write
|
||
20925CD9000
|
heap
|
page read and write
|
||
20925DCF000
|
heap
|
page read and write
|
||
1904ACAD000
|
heap
|
page read and write
|
||
207CD645000
|
heap
|
page read and write
|
||
7FFB4B0E0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B160000
|
trusted library allocation
|
page read and write
|
||
207CB7F6000
|
heap
|
page read and write
|
||
2D38BC41000
|
heap
|
page read and write
|
||
214522FA000
|
heap
|
page read and write
|
||
C70000
|
trusted library allocation
|
page read and write
|
||
1BF3E000
|
stack
|
page read and write
|
||
2D38BC31000
|
heap
|
page read and write
|
||
20925DF4000
|
heap
|
page read and write
|
||
19357F20000
|
heap
|
page read and write
|
||
2144FA64000
|
heap
|
page read and write
|
||
7FFB4AF32000
|
trusted library allocation
|
page read and write
|
||
2D38BBE5000
|
heap
|
page read and write
|
||
19357F26000
|
heap
|
page read and write
|
||
20925835000
|
heap
|
page read and write
|
||
25E302E0000
|
heap
|
page read and write
|
||
25E2E3BD000
|
heap
|
page read and write
|
||
20925CE4000
|
heap
|
page read and write
|
||
19355FF0000
|
heap
|
page read and write
|
||
2144FA40000
|
heap
|
page read and write
|
||
E1290FC000
|
stack
|
page read and write
|
||
2D38BAF5000
|
heap
|
page read and write
|
||
19049337000
|
heap
|
page read and write
|
||
2144FA69000
|
heap
|
page read and write
|
||
2D38BAEB000
|
heap
|
page read and write
|
||
2144DAC1000
|
heap
|
page read and write
|
||
1904ACAE000
|
heap
|
page read and write
|
||
207CD65E000
|
heap
|
page read and write
|
||
20925CE4000
|
heap
|
page read and write
|
||
7FFB4AF6D000
|
trusted library allocation
|
page execute and read and write
|
||
2144FBC7000
|
heap
|
page read and write
|
||
2144FA6F000
|
heap
|
page read and write
|
||
207CD65E000
|
heap
|
page read and write
|
||
1904B2AE000
|
heap
|
page read and write
|
||
7FFB4B006000
|
trusted library allocation
|
page execute and read and write
|
||
2D38BBDC000
|
heap
|
page read and write
|
||
2144DACA000
|
heap
|
page read and write
|
||
2144FA69000
|
heap
|
page read and write
|
||
25E3045D000
|
heap
|
page read and write
|
||
2D38BBBF000
|
heap
|
page read and write
|
||
25E2E39D000
|
heap
|
page read and write
|
||
2144DAAB000
|
heap
|
page read and write
|
||
126B000
|
heap
|
page read and write
|
||
25E2E2E0000
|
heap
|
page read and write
|
||
1A740000
|
trusted library allocation
|
page read and write
|
||
1904B29B000
|
heap
|
page read and write
|
||
207CD659000
|
heap
|
page read and write
|
||
1904B297000
|
heap
|
page read and write
|
||
19357F00000
|
heap
|
page read and write
|
||
BB0000
|
unkown
|
page readonly
|
||
20923D43000
|
heap
|
page read and write
|
||
2144DAC5000
|
heap
|
page read and write
|
||
207CD64F000
|
heap
|
page read and write
|
||
E6B64FE000
|
stack
|
page read and write
|
||
20925CC5000
|
heap
|
page read and write
|
||
2D389B02000
|
heap
|
page read and write
|
||
1904B298000
|
heap
|
page read and write
|
||
1904ABD0000
|
heap
|
page read and write
|
||
26C260E1000
|
trusted library allocation
|
page read and write
|
||
193560C4000
|
heap
|
page read and write
|
||
207CB85F000
|
heap
|
page read and write
|
||
1B6B0000
|
heap
|
page read and write
|
||
20925CE0000
|
heap
|
page read and write
|
||
207CD659000
|
heap
|
page read and write
|
||
2144FBD4000
|
heap
|
page read and write
|
||
2D389B11000
|
heap
|
page read and write
|
||
26C241B0000
|
unkown
|
page readonly
|
||
20923D15000
|
heap
|
page read and write
|
||
2D389AF7000
|
heap
|
page read and write
|
||
25E2E3C8000
|
heap
|
page read and write
|
||
1B78E000
|
heap
|
page read and write
|
||
1C18A000
|
stack
|
page read and write
|
||
2144FC24000
|
heap
|
page read and write
|
||
2144DAC2000
|
heap
|
page read and write
|
||
67063FE000
|
stack
|
page read and write
|
||
7FFB4B154000
|
trusted library allocation
|
page read and write
|
||
207CD63E000
|
heap
|
page read and write
|
||
2144DAAC000
|
heap
|
page read and write
|
||
25E302D2000
|
heap
|
page read and write
|
||
25E302EA000
|
heap
|
page read and write
|
||
1904B297000
|
heap
|
page read and write
|
||
27977F80000
|
heap
|
page read and write
|
||
2D38BACD000
|
heap
|
page read and write
|
||
19357F34000
|
heap
|
page read and write
|
||
19356081000
|
heap
|
page read and write
|
||
19358011000
|
heap
|
page read and write
|
||
7FFB4AF4D000
|
trusted library allocation
|
page execute and read and write
|
||
207CB829000
|
heap
|
page read and write
|
||
207CB7FC000
|
heap
|
page read and write
|
||
1904B3B1000
|
heap
|
page read and write
|
||
1904B393000
|
heap
|
page read and write
|
||
25E2E400000
|
heap
|
page read and write
|
||
1904B3F2000
|
heap
|
page read and write
|
||
207D00AF000
|
heap
|
page read and write
|
||
27977FA0000
|
heap
|
page read and write
|
||
1904B28D000
|
heap
|
page read and write
|
||
193560D0000
|
heap
|
page read and write
|
||
19358078000
|
heap
|
page read and write
|
||
25E3045D000
|
heap
|
page read and write
|
||
1904B393000
|
heap
|
page read and write
|
||
1904B399000
|
heap
|
page read and write
|
||
25E2E395000
|
heap
|
page read and write
|
||
25E3043D000
|
heap
|
page read and write
|
||
1904DB05000
|
heap
|
page read and write
|
||
25E302D5000
|
heap
|
page read and write
|
||
25E302D8000
|
heap
|
page read and write
|
||
2144FB47000
|
heap
|
page read and write
|
||
207CD64F000
|
heap
|
page read and write
|
||
20925E91000
|
heap
|
page read and write
|
||
25E30444000
|
heap
|
page read and write
|
||
19049220000
|
heap
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
25E2E310000
|
heap
|
page read and write
|
||
5A429FB000
|
stack
|
page read and write
|
||
2144DA88000
|
heap
|
page read and write
|
||
1904B270000
|
heap
|
page read and write
|
||
2D38BAF0000
|
heap
|
page read and write
|
||
2D389AF9000
|
heap
|
page read and write
|
||
2D38BAEB000
|
heap
|
page read and write
|
||
207CD63C000
|
heap
|
page read and write
|
||
E6B667C000
|
stack
|
page read and write
|
||
2144FA69000
|
heap
|
page read and write
|
||
450000
|
unkown
|
page readonly
|
||
2144DAA2000
|
heap
|
page read and write
|
||
25E2E401000
|
heap
|
page read and write
|
||
1904B3B8000
|
heap
|
page read and write
|
||
1904DAD4000
|
heap
|
page read and write
|
||
2144FC24000
|
heap
|
page read and write
|
||
1904B3D0000
|
heap
|
page read and write
|
||
2D38BC9D000
|
heap
|
page read and write
|
||
19356089000
|
heap
|
page read and write
|
||
25E2E3BC000
|
heap
|
page read and write
|
||
2144FA64000
|
heap
|
page read and write
|
||
20925E32000
|
heap
|
page read and write
|
||
1935801B000
|
heap
|
page read and write
|
||
1904DAE0000
|
heap
|
page read and write
|
||
20925DC8000
|
heap
|
page read and write
|
||
25E303DD000
|
heap
|
page read and write
|
||
20923D5E000
|
heap
|
page read and write
|
||
25E30422000
|
heap
|
page read and write
|
||
2144FA6E000
|
heap
|
page read and write
|
||
21452660000
|
heap
|
page read and write
|
||
207CD72F000
|
heap
|
page read and write
|
||
7FFB4B0D0000
|
trusted library allocation
|
page read and write
|
||
C5B85A8000
|
stack
|
page read and write
|
||
25E302EA000
|
heap
|
page read and write
|
||
20923D76000
|
heap
|
page read and write
|
||
1904B2A8000
|
heap
|
page read and write
|
||
19049314000
|
heap
|
page read and write
|
||
214522F2000
|
heap
|
page read and write
|
||
25E2E3C0000
|
heap
|
page read and write
|
||
20925CCF000
|
heap
|
page read and write
|
||
25E302E0000
|
heap
|
page read and write
|
||
207CD7A3000
|
heap
|
page read and write
|
||
2144FA52000
|
heap
|
page read and write
|
||
207CB805000
|
heap
|
page read and write
|
||
2D38BAEB000
|
heap
|
page read and write
|
||
25E30466000
|
heap
|
page read and write
|
||
25E302D0000
|
heap
|
page read and write
|
||
1904930D000
|
heap
|
page read and write
|
||
25E302FA000
|
heap
|
page read and write
|
||
2D38BC42000
|
heap
|
page read and write
|
||
12718000
|
trusted library allocation
|
page read and write
|
||
19358077000
|
heap
|
page read and write
|
||
25E2E393000
|
heap
|
page read and write
|
||
20925DC6000
|
heap
|
page read and write
|
||
207CD645000
|
heap
|
page read and write
|
||
1904DAE7000
|
heap
|
page read and write
|
||
7FFB4B060000
|
trusted library allocation
|
page execute and read and write
|
||
193560AC000
|
heap
|
page read and write
|
||
193560ED000
|
heap
|
page read and write
|
||
207D00A0000
|
heap
|
page read and write
|
||
2D38BAF0000
|
heap
|
page read and write
|
||
25E2E3EA000
|
heap
|
page read and write
|
||
2144F51D000
|
heap
|
page read and write
|
||
20923D80000
|
heap
|
page read and write
|
||
2D38BAF1000
|
heap
|
page read and write
|
||
25E302EA000
|
heap
|
page read and write
|
||
1C23E000
|
stack
|
page read and write
|
||
20923D4F000
|
heap
|
page read and write
|
||
19356072000
|
heap
|
page read and write
|
||
25E302F4000
|
heap
|
page read and write
|
||
2144DAAB000
|
heap
|
page read and write
|
||
20925CD9000
|
heap
|
page read and write
|
||
1935800A000
|
heap
|
page read and write
|
||
1904B278000
|
heap
|
page read and write
|
||
20928A00000
|
heap
|
page read and write
|
||
25E30435000
|
heap
|
page read and write
|
||
1904DAE0000
|
heap
|
page read and write
|
||
2144FBE0000
|
heap
|
page read and write
|
||
207CD807000
|
heap
|
page read and write
|
||
2D38BBD8000
|
heap
|
page read and write
|
||
207CD64B000
|
heap
|
page read and write
|
||
207CD66A000
|
heap
|
page read and write
|
||
2D38BAF4000
|
heap
|
page read and write
|
||
2144FA43000
|
heap
|
page read and write
|
||
207CB837000
|
heap
|
page read and write
|
||
19355FB0000
|
heap
|
page read and write
|
||
1904B2A2000
|
heap
|
page read and write
|
||
27978365000
|
heap
|
page read and write
|
||
25E30493000
|
heap
|
page read and write
|
||
1904B2B3000
|
heap
|
page read and write
|
||
20923DAE000
|
heap
|
page read and write
|
||
25E2E3C9000
|
heap
|
page read and write
|
||
BA120FD000
|
stack
|
page read and write
|
||
25E302D2000
|
heap
|
page read and write
|
||
2D389B60000
|
heap
|
page read and write
|
||
207CD659000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
26C24330000
|
heap
|
page read and write
|
||
3B138FF000
|
stack
|
page read and write
|
||
207CD813000
|
heap
|
page read and write
|
||
2D38BAE2000
|
heap
|
page read and write
|
||
20925E4A000
|
heap
|
page read and write
|
||
D98D6FE000
|
unkown
|
page read and write
|
||
193580A4000
|
heap
|
page read and write
|
||
7FFB4AF33000
|
trusted library allocation
|
page execute and read and write
|
||
1904DAFF000
|
heap
|
page read and write
|
||
1143CFC000
|
stack
|
page read and write
|
||
19357F0F000
|
heap
|
page read and write
|
||
25E30490000
|
heap
|
page read and write
|
||
25E2E394000
|
heap
|
page read and write
|
||
2D38BC6C000
|
heap
|
page read and write
|
||
25E30490000
|
heap
|
page read and write
|
||
19049320000
|
heap
|
page read and write
|
||
2144FA60000
|
heap
|
page read and write
|
||
207CB812000
|
heap
|
page read and write
|
||
1C08C000
|
stack
|
page read and write
|
||
207CB826000
|
heap
|
page read and write
|
||
193560A0000
|
heap
|
page read and write
|
||
1935A98D000
|
heap
|
page read and write
|
||
2711000
|
trusted library allocation
|
page read and write
|
||
2144DABB000
|
heap
|
page read and write
|
||
20923D28000
|
heap
|
page read and write
|
||
190492D4000
|
heap
|
page read and write
|
||
214522F1000
|
heap
|
page read and write
|
||
26C261B2000
|
trusted library allocation
|
page read and write
|
||
214522FA000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
25E30498000
|
heap
|
page read and write
|
||
207CD642000
|
heap
|
page read and write
|
||
20925CB9000
|
heap
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
25E2E3AA000
|
heap
|
page read and write
|
||
2144FB84000
|
heap
|
page read and write
|
||
3B1397E000
|
stack
|
page read and write
|
||
25E3046A000
|
heap
|
page read and write
|
||
20925CC5000
|
heap
|
page read and write
|
||
20925CD9000
|
heap
|
page read and write
|
||
2144FB52000
|
heap
|
page read and write
|
||
207CD7AF000
|
heap
|
page read and write
|
||
19356077000
|
heap
|
page read and write
|
||
20923D6C000
|
heap
|
page read and write
|
||
20925CD6000
|
heap
|
page read and write
|
||
20925CEA000
|
heap
|
page read and write
|
||
2144FA72000
|
heap
|
page read and write
|
||
19049311000
|
heap
|
page read and write
|
||
2D38BB03000
|
heap
|
page read and write
|
||
20923D2B000
|
heap
|
page read and write
|
||
E128D4E000
|
stack
|
page read and write
|
||
25E32D45000
|
heap
|
page read and write
|
||
7FFB4AFF0000
|
trusted library allocation
|
page execute and read and write
|
||
7DF4F9D51000
|
trusted library allocation
|
page execute read
|
||
2D38BAF4000
|
heap
|
page read and write
|
||
207CD659000
|
heap
|
page read and write
|
||
2D38BAE6000
|
heap
|
page read and write
|
||
2D38BCA1000
|
heap
|
page read and write
|
||
207CD807000
|
heap
|
page read and write
|
||
2D38BAF0000
|
heap
|
page read and write
|
||
20923D75000
|
heap
|
page read and write
|
||
193560BB000
|
heap
|
page read and write
|
||
207CD65E000
|
heap
|
page read and write
|
||
207CD64C000
|
heap
|
page read and write
|
||
1904B410000
|
heap
|
page read and write
|
||
207CB6E0000
|
heap
|
page read and write
|
||
1904B29B000
|
heap
|
page read and write
|
||
207CD645000
|
heap
|
page read and write
|
||
2144FA83000
|
heap
|
page read and write
|
||
9B2000
|
heap
|
page read and write
|
||
2144F51E000
|
heap
|
page read and write
|
||
1BF8F000
|
stack
|
page read and write
|
||
2144DAA5000
|
heap
|
page read and write
|
||
207CB818000
|
heap
|
page read and write
|
||
15A0000
|
trusted library allocation
|
page read and write
|
||
207CD73E000
|
heap
|
page read and write
|
||
26C26195000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
25E302E0000
|
heap
|
page read and write
|
||
2D38BBD6000
|
heap
|
page read and write
|
||
2144FA6A000
|
heap
|
page read and write
|
||
207CD7A3000
|
heap
|
page read and write
|
||
2D38BBD6000
|
heap
|
page read and write
|
||
25E2E400000
|
heap
|
page read and write
|
||
2144FA40000
|
heap
|
page read and write
|
||
2D38BC6C000
|
heap
|
page read and write
|
||
2D38BC22000
|
heap
|
page read and write
|
||
1904D4B0000
|
trusted library allocation
|
page read and write
|
||
19357F2A000
|
heap
|
page read and write
|
||
1904B2B4000
|
heap
|
page read and write
|
||
25E32D48000
|
heap
|
page read and write
|
||
207CD7A8000
|
heap
|
page read and write
|
||
C5B8DFE000
|
stack
|
page read and write
|
||
25E30425000
|
heap
|
page read and write
|
||
193580DD000
|
heap
|
page read and write
|
||
1904B2A2000
|
heap
|
page read and write
|
||
2D38BAC6000
|
heap
|
page read and write
|
||
25E302CA000
|
heap
|
page read and write
|
||
1904B277000
|
heap
|
page read and write
|
||
193580CA000
|
heap
|
page read and write
|
||
2D38BAEB000
|
heap
|
page read and write
|
||
207D00AC000
|
heap
|
page read and write
|
||
19357F2A000
|
heap
|
page read and write
|
||
207CB84F000
|
heap
|
page read and write
|
||
27978360000
|
heap
|
page read and write
|
||
2D389AE4000
|
heap
|
page read and write
|
||
1904B270000
|
heap
|
page read and write
|
||
67061FF000
|
stack
|
page read and write
|
||
1904B274000
|
heap
|
page read and write
|
||
19357F34000
|
heap
|
page read and write
|
||
25E2E3A9000
|
heap
|
page read and write
|
||
7FFB4AF34000
|
trusted library allocation
|
page read and write
|
||
26C24730000
|
heap
|
page execute and read and write
|
||
2D38BC41000
|
heap
|
page read and write
|
||
2144FA44000
|
heap
|
page read and write
|
||
1904B389000
|
heap
|
page read and write
|
||
2144FB7C000
|
heap
|
page read and write
|
||
2D38BAEC000
|
heap
|
page read and write
|
||
2D38B555000
|
heap
|
page read and write
|
||
207CD64F000
|
heap
|
page read and write
|
||
207CD7AF000
|
heap
|
page read and write
|
||
25E303D4000
|
heap
|
page read and write
|
||
2D38BBDE000
|
heap
|
page read and write
|
||
26C24310000
|
heap
|
page read and write
|
||
2144DB0E000
|
heap
|
page read and write
|
||
26C3E91A000
|
heap
|
page read and write
|
||
25E2E3C3000
|
heap
|
page read and write
|
||
1904B2A2000
|
heap
|
page read and write
|
||
2D38BCAE000
|
heap
|
page read and write
|
||
214522DA000
|
heap
|
page read and write
|
||
2144FA8B000
|
heap
|
page read and write
|
||
26C3E8E0000
|
heap
|
page read and write
|
||
6705E7E000
|
stack
|
page read and write
|
||
2D38BC41000
|
heap
|
page read and write
|
||
207CD664000
|
heap
|
page read and write
|
||
1904B297000
|
heap
|
page read and write
|
||
1904B2A4000
|
heap
|
page read and write
|
||
C5B8CFB000
|
stack
|
page read and write
|
||
25E2E3C1000
|
heap
|
page read and write
|
||
20923D5E000
|
heap
|
page read and write
|
||
20923D7C000
|
heap
|
page read and write
|
||
1904934E000
|
heap
|
page read and write
|
||
7FFB4AF8C000
|
trusted library allocation
|
page execute and read and write
|
||
207D02F0000
|
heap
|
page read and write
|
||
26C360E1000
|
trusted library allocation
|
page read and write
|
||
26C243C0000
|
heap
|
page read and write
|
||
2144DAC9000
|
heap
|
page read and write
|
||
207CD645000
|
heap
|
page read and write
|
||
20923D71000
|
heap
|
page read and write
|
||
E6B66FE000
|
stack
|
page read and write
|
||
7FFB4AF44000
|
trusted library allocation
|
page read and write
|
||
BA126FD000
|
stack
|
page read and write
|
||
2D389B10000
|
heap
|
page read and write
|
||
1904B287000
|
heap
|
page read and write
|
||
7FFB4B026000
|
trusted library allocation
|
page execute and read and write
|
||
BA11EFF000
|
stack
|
page read and write
|
||
1904ACAB000
|
heap
|
page read and write
|
||
2144FA64000
|
heap
|
page read and write
|
||
1AC9D000
|
stack
|
page read and write
|
||
2D38BAE6000
|
heap
|
page read and write
|
||
25E303E1000
|
heap
|
page read and write
|
||
207CD72B000
|
heap
|
page read and write
|
||
207CB835000
|
heap
|
page read and write
|
||
2D38BBDA000
|
heap
|
page read and write
|
||
193580C7000
|
heap
|
page read and write
|
||
7FFB4AFF6000
|
trusted library allocation
|
page read and write
|
||
207CD15E000
|
heap
|
page read and write
|
||
207CD655000
|
heap
|
page read and write
|
||
2144FA7C000
|
heap
|
page read and write
|
||
2144FA6E000
|
heap
|
page read and write
|
||
2D38BAF5000
|
heap
|
page read and write
|
||
2D389AF7000
|
heap
|
page read and write
|
||
7DF475A21000
|
trusted library allocation
|
page execute read
|
||
214522D0000
|
heap
|
page read and write
|
||
1935801F000
|
heap
|
page read and write
|
||
1904B443000
|
heap
|
page read and write
|
||
20925CD9000
|
heap
|
page read and write
|
||
25E30435000
|
heap
|
page read and write
|
||
19358000000
|
heap
|
page read and write
|
||
1B9E5000
|
stack
|
page read and write
|
||
2144DB03000
|
heap
|
page read and write
|
||
20923D43000
|
heap
|
page read and write
|
||
19357F2A000
|
heap
|
page read and write
|
||
1B728000
|
heap
|
page read and write
|
||
2D38BBDC000
|
heap
|
page read and write
|
||
20925CC5000
|
heap
|
page read and write
|
||
20925E91000
|
heap
|
page read and write
|
||
2144DAC5000
|
heap
|
page read and write
|
||
1904B2B3000
|
heap
|
page read and write
|
||
26C261A7000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF7C000
|
trusted library allocation
|
page execute and read and write
|
||
19049319000
|
heap
|
page read and write
|
||
C5B8AFB000
|
stack
|
page read and write
|
||
193580E2000
|
heap
|
page read and write
|
||
2D38BBD3000
|
heap
|
page read and write
|
||
1935801F000
|
heap
|
page read and write
|
||
20925E86000
|
heap
|
page read and write
|
||
25E2E3F6000
|
heap
|
page read and write
|
||
1904B27B000
|
heap
|
page read and write
|
||
20925E32000
|
heap
|
page read and write
|
||
2144FA76000
|
heap
|
page read and write
|
||
19357F2A000
|
heap
|
page read and write
|
||
20925E49000
|
heap
|
page read and write
|
||
2D389B1C000
|
heap
|
page read and write
|
||
19358011000
|
heap
|
page read and write
|
||
1904B2A2000
|
heap
|
page read and write
|
||
2D38BB00000
|
heap
|
page read and write
|
||
7FFB4AF4D000
|
trusted library allocation
|
page execute and read and write
|
||
207CD659000
|
heap
|
page read and write
|
||
26C24400000
|
heap
|
page read and write
|
||
1904B3CF000
|
heap
|
page read and write
|
||
11438FE000
|
stack
|
page read and write
|
||
1904B399000
|
heap
|
page read and write
|
||
1904B2A7000
|
heap
|
page read and write
|
||
2144FB73000
|
heap
|
page read and write
|
||
25E30479000
|
heap
|
page read and write
|
||
7FFB4AFF0000
|
trusted library allocation
|
page read and write
|
||
2144FA6E000
|
heap
|
page read and write
|
||
1904ACAA000
|
heap
|
page read and write
|
||
207CD73A000
|
heap
|
page read and write
|
||
25E3048B000
|
heap
|
page read and write
|
||
A2E000
|
heap
|
page read and write
|
||
7FFB4AF5B000
|
trusted library allocation
|
page execute and read and write
|
||
2092583A000
|
heap
|
page read and write
|
||
2D389B3E000
|
heap
|
page read and write
|
||
1904DAFA000
|
heap
|
page read and write
|
||
159E000
|
stack
|
page read and write
|
||
7FFB4AF24000
|
trusted library allocation
|
page read and write
|
||
20925CCF000
|
heap
|
page read and write
|
||
193560DC000
|
heap
|
page read and write
|
||
7FFB4AF54000
|
trusted library allocation
|
page read and write
|
||
2144FA5E000
|
heap
|
page read and write
|
||
1904B2A7000
|
heap
|
page read and write
|
||
7FFB4AFDC000
|
trusted library allocation
|
page execute and read and write
|
||
19357F15000
|
heap
|
page read and write
|
||
26C2618A000
|
trusted library allocation
|
page read and write
|
||
2D38BAFB000
|
heap
|
page read and write
|
||
2144DABE000
|
heap
|
page read and write
|
||
7FFB4AF40000
|
trusted library allocation
|
page read and write
|
||
25E30444000
|
heap
|
page read and write
|
||
2144DA91000
|
heap
|
page read and write
|
||
19049312000
|
heap
|
page read and write
|
||
20925839000
|
heap
|
page read and write
|
||
11CF000
|
heap
|
page read and write
|
||
25E2E3A1000
|
heap
|
page read and write
|
||
207CD656000
|
heap
|
page read and write
|
||
2144FA73000
|
heap
|
page read and write
|
||
207CD631000
|
heap
|
page read and write
|
||
D98D679000
|
stack
|
page read and write
|
||
1904B286000
|
heap
|
page read and write
|
||
207CD720000
|
heap
|
page read and write
|
||
E6B697C000
|
stack
|
page read and write
|
||
2D38B55E000
|
heap
|
page read and write
|
||
19049338000
|
heap
|
page read and write
|
||
25E304A8000
|
heap
|
page read and write
|
||
2D38BCAE000
|
heap
|
page read and write
|
||
1904B2B2000
|
heap
|
page read and write
|
||
1935806E000
|
heap
|
page read and write
|
||
207CD792000
|
heap
|
page read and write
|
||
20923D05000
|
heap
|
page read and write
|
||
1904B380000
|
heap
|
page read and write
|
||
2D38BBF3000
|
heap
|
page read and write
|
||
207CD65B000
|
heap
|
page read and write
|
||
207CD652000
|
heap
|
page read and write
|
||
25E3048C000
|
heap
|
page read and write
|
||
207CD7D5000
|
heap
|
page read and write
|
||
2D38BCA3000
|
heap
|
page read and write
|
||
1904B29B000
|
heap
|
page read and write
|
||
25E30493000
|
heap
|
page read and write
|
||
E12917E000
|
stack
|
page read and write
|
||
19357F2A000
|
heap
|
page read and write
|
||
25E302D7000
|
heap
|
page read and write
|
||
2D38BAF5000
|
heap
|
page read and write
|
||
2D38BC06000
|
heap
|
page read and write
|
||
2D389AED000
|
heap
|
page read and write
|
||
207CB826000
|
heap
|
page read and write
|
||
207D00B4000
|
heap
|
page read and write
|
||
20925CDA000
|
heap
|
page read and write
|
||
2144FB84000
|
heap
|
page read and write
|
||
7FFB4AF43000
|
trusted library allocation
|
page execute and read and write
|
||
26C2626F000
|
trusted library allocation
|
page read and write
|
||
2144FA7C000
|
heap
|
page read and write
|
||
2D389B02000
|
heap
|
page read and write
|
||
207CB7D8000
|
heap
|
page read and write
|
||
214522EE000
|
heap
|
page read and write
|
||
193560A8000
|
heap
|
page read and write
|
||
2144F6E0000
|
heap
|
page read and write
|
||
2144DA83000
|
heap
|
page read and write
|
||
7FFB4AF5D000
|
trusted library allocation
|
page execute and read and write
|
||
1020000
|
heap
|
page read and write
|
||
2D38BAF4000
|
heap
|
page read and write
|
||
1904B2B1000
|
heap
|
page read and write
|
||
2D38BC6A000
|
heap
|
page read and write
|
||
1BC48000
|
heap
|
page read and write
|
||
20925E4B000
|
heap
|
page read and write
|
||
20925E91000
|
heap
|
page read and write
|
||
C90000
|
unkown
|
page readonly
|
||
207CB83E000
|
heap
|
page read and write
|
||
26C360ED000
|
trusted library allocation
|
page read and write
|
||
1904B378000
|
heap
|
page read and write
|
||
25E32D49000
|
heap
|
page read and write
|
||
2144FC13000
|
heap
|
page read and write
|
||
207CD63A000
|
heap
|
page read and write
|
||
25E2FE7D000
|
heap
|
page read and write
|
||
2D38BAE6000
|
heap
|
page read and write
|
||
2144FA7F000
|
heap
|
page read and write
|
||
2D38B55D000
|
heap
|
page read and write
|
||
1904B441000
|
heap
|
page read and write
|
||
207CD7E9000
|
heap
|
page read and write
|
||
7FFB4B170000
|
trusted library allocation
|
page read and write
|
||
2144F510000
|
heap
|
page read and write
|
||
25E2E40D000
|
heap
|
page read and write
|
||
25E2FE79000
|
heap
|
page read and write
|
||
BA127FF000
|
stack
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
1904B3BD000
|
heap
|
page read and write
|
||
7FFB4B0F0000
|
trusted library allocation
|
page read and write
|
||
2D389A8F000
|
heap
|
page read and write
|
||
25E2E3AD000
|
heap
|
page read and write
|
||
20925CDE000
|
heap
|
page read and write
|
||
1904B2A2000
|
heap
|
page read and write
|
||
25E302E0000
|
heap
|
page read and write
|
||
207CD7A3000
|
heap
|
page read and write
|
||
207CD7AF000
|
heap
|
page read and write
|
||
193560A8000
|
heap
|
page read and write
|
||
1904B385000
|
heap
|
page read and write
|
||
1935806E000
|
heap
|
page read and write
|
||
7FFB4B016000
|
trusted library allocation
|
page execute and read and write
|
||
BA12AFD000
|
stack
|
page read and write
|
||
19357F20000
|
heap
|
page read and write
|
||
25E2E3DB000
|
heap
|
page read and write
|
||
1935609C000
|
heap
|
page read and write
|
||
2D38BC98000
|
heap
|
page read and write
|
||
20925E49000
|
heap
|
page read and write
|
||
19049338000
|
heap
|
page read and write
|
||
5A423DE000
|
stack
|
page read and write
|
||
25E303D4000
|
heap
|
page read and write
|
||
2D38BACA000
|
heap
|
page read and write
|
||
1C121A10000
|
heap
|
page read and write
|
||
2144FB4B000
|
heap
|
page read and write
|
||
25E30435000
|
heap
|
page read and write
|
||
1904B393000
|
heap
|
page read and write
|
||
20925DD0000
|
heap
|
page read and write
|
||
1904B2AC000
|
heap
|
page read and write
|
||
207D00AF000
|
heap
|
page read and write
|
||
25E302D5000
|
heap
|
page read and write
|
||
2D389B4E000
|
heap
|
page read and write
|
||
25E302EF000
|
heap
|
page read and write
|
||
1935A140000
|
trusted library allocation
|
page read and write
|
||
2144FA7C000
|
heap
|
page read and write
|
||
1904B399000
|
heap
|
page read and write
|
||
20923D5E000
|
heap
|
page read and write
|
||
207CD807000
|
heap
|
page read and write
|
||
1143A7C000
|
stack
|
page read and write
|
||
2D38BAD5000
|
heap
|
page read and write
|
||
207CD740000
|
heap
|
page read and write
|
||
207CD736000
|
heap
|
page read and write
|
||
1BC4F000
|
heap
|
page read and write
|
||
207CD651000
|
heap
|
page read and write
|
||
25E302CF000
|
heap
|
page read and write
|
||
2144FB40000
|
heap
|
page read and write
|
||
25E302E6000
|
heap
|
page read and write
|
||
2D389AEA000
|
heap
|
page read and write
|
||
1935608E000
|
heap
|
page read and write
|
||
2D38BC96000
|
heap
|
page read and write
|
||
20925DE7000
|
heap
|
page read and write
|
||
207CB806000
|
heap
|
page read and write
|
||
25E302B0000
|
heap
|
page read and write
|
||
2144FA79000
|
heap
|
page read and write
|
||
25E30498000
|
heap
|
page read and write
|
||
20925CE4000
|
heap
|
page read and write
|
||
2D389B3A000
|
heap
|
page read and write
|
||
2144FA72000
|
heap
|
page read and write
|
||
1620000
|
heap
|
page execute and read and write
|
||
2144FB30000
|
heap
|
page read and write
|
||
2D38BAEB000
|
heap
|
page read and write
|
||
1904B3B1000
|
heap
|
page read and write
|
||
2144FA51000
|
heap
|
page read and write
|
||
2D389AF9000
|
heap
|
page read and write
|
||
19356083000
|
heap
|
page read and write
|
||
25E302EA000
|
heap
|
page read and write
|
||
1904B27E000
|
heap
|
page read and write
|
||
207CD758000
|
heap
|
page read and write
|
||
20925CD5000
|
heap
|
page read and write
|
||
2144FA5B000
|
heap
|
page read and write
|
||
207CD648000
|
heap
|
page read and write
|
||
2144FB49000
|
heap
|
page read and write
|
||
2D38BAEB000
|
heap
|
page read and write
|
||
214522FA000
|
heap
|
page read and write
|
||
12711000
|
trusted library allocation
|
page read and write
|
||
25E30473000
|
heap
|
page read and write
|
||
25E0000
|
heap
|
page read and write
|
||
2D38BAE6000
|
heap
|
page read and write
|
||
15C0000
|
trusted library allocation
|
page read and write
|
||
25E30498000
|
heap
|
page read and write
|
||
20925CC2000
|
heap
|
page read and write
|
||
1904B27F000
|
heap
|
page read and write
|
||
1904B431000
|
heap
|
page read and write
|
||
1935801F000
|
heap
|
page read and write
|
||
7FFB4AFEC000
|
trusted library allocation
|
page execute and read and write
|
||
25E30444000
|
heap
|
page read and write
|
||
207CD659000
|
heap
|
page read and write
|
||
BA122FE000
|
stack
|
page read and write
|
||
20925DC0000
|
heap
|
page read and write
|
||
20923C90000
|
heap
|
page read and write
|
||
2D38BC3A000
|
heap
|
page read and write
|
||
1B1A0000
|
heap
|
page read and write
|
||
2144FA66000
|
heap
|
page read and write
|
||
1BB30000
|
heap
|
page read and write
|
||
19049305000
|
heap
|
page read and write
|
||
1935A97C000
|
heap
|
page read and write
|
||
2144FB4D000
|
heap
|
page read and write
|
||
13098000
|
trusted library allocation
|
page read and write
|
||
1904B360000
|
heap
|
page read and write
|
||
20925DB8000
|
heap
|
page read and write
|
||
2D38BAE6000
|
heap
|
page read and write
|
||
207CD65A000
|
heap
|
page read and write
|
||
207CD7AF000
|
heap
|
page read and write
|
||
7FFB4B100000
|
trusted library allocation
|
page execute and read and write
|
||
207CB87E000
|
heap
|
page read and write
|
||
965000
|
heap
|
page read and write
|
||
2144DAC1000
|
heap
|
page read and write
|
||
7FFB4AF2D000
|
trusted library allocation
|
page execute and read and write
|
||
1904B399000
|
heap
|
page read and write
|
||
2D38BAF4000
|
heap
|
page read and write
|
||
207CD7C8000
|
heap
|
page read and write
|
||
2144FA69000
|
heap
|
page read and write
|
||
67062FB000
|
stack
|
page read and write
|
||
193580CA000
|
heap
|
page read and write
|
||
1904B2B3000
|
heap
|
page read and write
|
||
2144FA76000
|
heap
|
page read and write
|
||
19357FFA000
|
heap
|
page read and write
|
||
2D38BC02000
|
heap
|
page read and write
|
||
19357F0A000
|
heap
|
page read and write
|
||
25E2E3B0000
|
heap
|
page read and write
|
||
2D389B1F000
|
heap
|
page read and write
|
||
2144DA88000
|
heap
|
page read and write
|
||
207CD64B000
|
heap
|
page read and write
|
||
1935607B000
|
heap
|
page read and write
|
||
2D38BAD4000
|
heap
|
page read and write
|
||
2D389A50000
|
heap
|
page read and write
|
||
20923D35000
|
heap
|
page read and write
|
||
1904B414000
|
heap
|
page read and write
|
||
1904B414000
|
heap
|
page read and write
|
||
19358099000
|
heap
|
page read and write
|
||
1BE3E000
|
stack
|
page read and write
|
||
7FFB4AF30000
|
trusted library allocation
|
page read and write
|
||
19357F26000
|
heap
|
page read and write
|
||
207CD655000
|
heap
|
page read and write
|
||
2D389AFB000
|
heap
|
page read and write
|
||
2144DAAA000
|
heap
|
page read and write
|
||
20925CC2000
|
heap
|
page read and write
|
||
2D38BAF0000
|
heap
|
page read and write
|
||
20925E32000
|
heap
|
page read and write
|
||
26C247A5000
|
heap
|
page read and write
|
||
193560E9000
|
heap
|
page read and write
|
||
1904B3F6000
|
heap
|
page read and write
|
||
1904DADA000
|
heap
|
page read and write
|
||
20923D97000
|
heap
|
page read and write
|
||
207CD150000
|
heap
|
page read and write
|
||
2D38BAE6000
|
heap
|
page read and write
|
||
2D38BAC7000
|
heap
|
page read and write
|
||
2D38BBDA000
|
heap
|
page read and write
|
||
2144FBBF000
|
heap
|
page read and write
|
||
2D38BBDE000
|
heap
|
page read and write
|
||
20923D5D000
|
heap
|
page read and write
|
||
2D389B10000
|
heap
|
page read and write
|
||
20925E6B000
|
heap
|
page read and write
|
||
20925CDE000
|
heap
|
page read and write
|
||
2D389AEE000
|
heap
|
page read and write
|
||
19049333000
|
heap
|
page read and write
|
||
25E302EA000
|
heap
|
page read and write
|
||
2D38BAEB000
|
heap
|
page read and write
|
||
2D38BACB000
|
heap
|
page read and write
|
||
2D38BAFB000
|
heap
|
page read and write
|
||
207CD64B000
|
heap
|
page read and write
|
||
2144FB4D000
|
heap
|
page read and write
|
||
2D389B07000
|
heap
|
page read and write
|
||
20925CE4000
|
heap
|
page read and write
|
||
20925E68000
|
heap
|
page read and write
|
||
2144FA7C000
|
heap
|
page read and write
|
||
1904B284000
|
heap
|
page read and write
|
||
139E000
|
stack
|
page read and write
|
||
2144FA4A000
|
heap
|
page read and write
|
||
20925CC7000
|
heap
|
page read and write
|
||
25E2FE70000
|
heap
|
page read and write
|
||
2144FA5F000
|
heap
|
page read and write
|
||
20923D28000
|
heap
|
page read and write
|
||
190492F9000
|
heap
|
page read and write
|
||
E12907E000
|
stack
|
page read and write
|
||
20923D34000
|
heap
|
page read and write
|
||
149E000
|
stack
|
page read and write
|
||
19049356000
|
heap
|
page read and write
|
||
207CD758000
|
heap
|
page read and write
|
||
207CD666000
|
heap
|
page read and write
|
||
19358077000
|
heap
|
page read and write
|
||
1904B270000
|
heap
|
page read and write
|
||
7FFB4B0F0000
|
trusted library allocation
|
page execute and read and write
|
||
25E302F4000
|
heap
|
page read and write
|
||
12721000
|
trusted library allocation
|
page read and write
|
||
193560AB000
|
heap
|
page read and write
|
||
25E302FA000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
207CD78E000
|
heap
|
page read and write
|
||
25E303EB000
|
heap
|
page read and write
|
||
26C2625D000
|
trusted library allocation
|
page read and write
|
||
2144FBD4000
|
heap
|
page read and write
|
||
2144DA83000
|
heap
|
page read and write
|
||
193560C1000
|
heap
|
page read and write
|
||
2D389AE4000
|
heap
|
page read and write
|
||
7FFB4AF50000
|
trusted library allocation
|
page read and write
|
||
2144DAF4000
|
heap
|
page read and write
|
||
1143D7B000
|
stack
|
page read and write
|
||
20925CBC000
|
heap
|
page read and write
|
||
25E30435000
|
heap
|
page read and write
|
||
1904DAFF000
|
heap
|
page read and write
|
||
1904B387000
|
heap
|
page read and write
|
||
19358089000
|
heap
|
page read and write
|
||
2144DAB2000
|
heap
|
page read and write
|
||
1904B280000
|
heap
|
page read and write
|
||
207CB808000
|
heap
|
page read and write
|
||
20925E28000
|
heap
|
page read and write
|
||
207CD7FB000
|
heap
|
page read and write
|
||
1C28C000
|
stack
|
page read and write
|
||
2D38BBF4000
|
heap
|
page read and write
|
||
20923D4E000
|
heap
|
page read and write
|
||
2144FC13000
|
heap
|
page read and write
|
||
1143E7E000
|
stack
|
page read and write
|
||
25E30466000
|
heap
|
page read and write
|
||
2144FBC7000
|
heap
|
page read and write
|
||
25E2E39A000
|
heap
|
page read and write
|
||
2D389AEA000
|
heap
|
page read and write
|
||
1904B293000
|
heap
|
page read and write
|
||
1904B40F000
|
heap
|
page read and write
|
||
20925E49000
|
heap
|
page read and write
|
||
2D38BADC000
|
heap
|
page read and write
|
||
207CD647000
|
heap
|
page read and write
|
||
7FFB4B0E6000
|
trusted library allocation
|
page read and write
|
||
7FFB4B040000
|
trusted library allocation
|
page execute and read and write
|
||
2144FB58000
|
heap
|
page read and write
|
||
2D38BADF000
|
heap
|
page read and write
|
||
19357F2A000
|
heap
|
page read and write
|
||
207CD647000
|
heap
|
page read and write
|
||
20923D8B000
|
heap
|
page read and write
|
||
2D38BBF3000
|
heap
|
page read and write
|
||
1904B40F000
|
heap
|
page read and write
|
||
1904B380000
|
heap
|
page read and write
|
||
11D7000
|
heap
|
page read and write
|
||
19357F10000
|
heap
|
page read and write
|
||
1904B374000
|
heap
|
page read and write
|
||
2D38BC8E000
|
heap
|
page read and write
|
||
2D38BADC000
|
heap
|
page read and write
|
||
2144DB05000
|
heap
|
page read and write
|
||
207CB780000
|
heap
|
page read and write
|
||
25E2E391000
|
heap
|
page read and write
|
||
25E302F4000
|
heap
|
page read and write
|
||
207CD655000
|
heap
|
page read and write
|
||
2D38B55E000
|
heap
|
page read and write
|
||
20925DC0000
|
heap
|
page read and write
|
||
7FFB4AF3D000
|
trusted library allocation
|
page execute and read and write
|
||
2D38BAE2000
|
heap
|
page read and write
|
||
1904B2BE000
|
heap
|
page read and write
|
||
190492FF000
|
heap
|
page read and write
|
||
19357930000
|
heap
|
page read and write
|
||
E128DCE000
|
stack
|
page read and write
|
||
C5B897E000
|
stack
|
page read and write
|
||
2D389B45000
|
heap
|
page read and write
|
||
19049260000
|
heap
|
page read and write
|
||
2144FA72000
|
heap
|
page read and write
|
||
25E3045D000
|
heap
|
page read and write
|
||
7FFB4AFE6000
|
trusted library allocation
|
page read and write
|
||
2144FBD4000
|
heap
|
page read and write
|
||
25E302EA000
|
heap
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
20923D50000
|
heap
|
page read and write
|
||
1904931A000
|
heap
|
page read and write
|
||
19358020000
|
heap
|
page read and write
|
||
2144FC13000
|
heap
|
page read and write
|
||
26C261DF000
|
trusted library allocation
|
page read and write
|
||
20925DBC000
|
heap
|
page read and write
|
||
26C245A0000
|
trusted library allocation
|
page read and write
|
||
207CD73C000
|
heap
|
page read and write
|
||
2D38BC86000
|
heap
|
page read and write
|
||
C5B8A7E000
|
stack
|
page read and write
|
||
3B13A7E000
|
stack
|
page read and write
|
||
19355ED0000
|
heap
|
page read and write
|
||
2144F515000
|
heap
|
page read and write
|
||
19358036000
|
heap
|
page read and write
|
||
25E302D6000
|
heap
|
page read and write
|
||
2144DB0E000
|
heap
|
page read and write
|
||
20925CC5000
|
heap
|
page read and write
|
||
1904B40F000
|
heap
|
page read and write
|
||
2D389AEF000
|
heap
|
page read and write
|
||
2144FA5E000
|
heap
|
page read and write
|
||
2D38BC6A000
|
heap
|
page read and write
|
||
193580A4000
|
heap
|
page read and write
|
||
25E32500000
|
trusted library allocation
|
page read and write
|
||
1904B3F5000
|
heap
|
page read and write
|
||
114397F000
|
stack
|
page read and write
|
||
2144DAA0000
|
heap
|
page read and write
|
||
25E32D48000
|
heap
|
page read and write
|
||
2D38BBD4000
|
heap
|
page read and write
|
||
20925CB0000
|
heap
|
page read and write
|
||
2D38BAD5000
|
heap
|
page read and write
|
||
1C03F000
|
stack
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
25E2E364000
|
heap
|
page read and write
|
||
207CD15A000
|
heap
|
page read and write
|
||
26C2621D000
|
trusted library allocation
|
page read and write
|
||
1935607C000
|
heap
|
page read and write
|
||
25E30490000
|
heap
|
page read and write
|
||
2144FA72000
|
heap
|
page read and write
|
||
20925640000
|
heap
|
page read and write
|
||
25E302E0000
|
heap
|
page read and write
|
||
25E2E3A0000
|
heap
|
page read and write
|
||
2144FA7C000
|
heap
|
page read and write
|
||
20923C80000
|
heap
|
page read and write
|
||
2144DA86000
|
heap
|
page read and write
|
||
20923D46000
|
heap
|
page read and write
|
||
20925CDE000
|
heap
|
page read and write
|
||
1904B361000
|
heap
|
page read and write
|
||
1904B2B9000
|
heap
|
page read and write
|
||
25E3047C000
|
heap
|
page read and write
|
||
207CD7C3000
|
heap
|
page read and write
|
||
1904B3BD000
|
heap
|
page read and write
|
||
190492FF000
|
heap
|
page read and write
|
||
1904B292000
|
heap
|
page read and write
|
||
207CB844000
|
heap
|
page read and write
|
||
B6E000
|
stack
|
page read and write
|
||
2144FA83000
|
heap
|
page read and write
|
||
20925CE6000
|
heap
|
page read and write
|
||
2D38BACF000
|
heap
|
page read and write
|
||
BA124FE000
|
stack
|
page read and write
|
||
207CD749000
|
heap
|
page read and write
|
||
20923D70000
|
heap
|
page read and write
|
||
6705B4E000
|
stack
|
page read and write
|
||
19357F2B000
|
heap
|
page read and write
|
||
1904B28D000
|
heap
|
page read and write
|
||
2D38BC6A000
|
heap
|
page read and write
|
||
25E302EA000
|
heap
|
page read and write
|
||
25E3043D000
|
heap
|
page read and write
|
||
2D38BAFD000
|
heap
|
page read and write
|
||
2D38BAE2000
|
heap
|
page read and write
|
||
2D38BB00000
|
heap
|
page read and write
|
||
26C3E918000
|
heap
|
page read and write
|
||
1904B29B000
|
heap
|
page read and write
|
||
26C24300000
|
heap
|
page read and write
|
||
2144FA6F000
|
heap
|
page read and write
|
||
2D38BBF3000
|
heap
|
page read and write
|
||
308E000
|
stack
|
page read and write
|
||
193560EB000
|
heap
|
page read and write
|
||
11A6000
|
heap
|
page read and write
|
||
20925DC4000
|
heap
|
page read and write
|
||
26C263BA000
|
trusted library allocation
|
page read and write
|
||
13093000
|
trusted library allocation
|
page read and write
|
||
2144FA61000
|
heap
|
page read and write
|
||
A23000
|
heap
|
page read and write
|
||
207CD7AF000
|
heap
|
page read and write
|
||
20925DD0000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
1904B443000
|
heap
|
page read and write
|
||
2144FA6E000
|
heap
|
page read and write
|
||
20923D47000
|
heap
|
page read and write
|
||
19357F2A000
|
heap
|
page read and write
|
||
1904B3BD000
|
heap
|
page read and write
|
||
25E30498000
|
heap
|
page read and write
|
||
25E30466000
|
heap
|
page read and write
|
||
2144DB05000
|
heap
|
page read and write
|
||
2D38BC6A000
|
heap
|
page read and write
|
||
207CD647000
|
heap
|
page read and write
|
||
20925CCF000
|
heap
|
page read and write
|
||
6705FFB000
|
stack
|
page read and write
|
||
25E2E404000
|
heap
|
page read and write
|
||
2144DA90000
|
heap
|
page read and write
|
||
20925DC2000
|
heap
|
page read and write
|
||
1904FD12000
|
trusted library allocation
|
page read and write
|
||
207CD664000
|
heap
|
page read and write
|
||
2D38BBCE000
|
heap
|
page read and write
|
||
1904B28D000
|
heap
|
page read and write
|
||
20925CA0000
|
heap
|
page read and write
|
||
25E3047D000
|
heap
|
page read and write
|
||
1C290000
|
heap
|
page read and write
|
||
20923D61000
|
heap
|
page read and write
|
||
207CD742000
|
heap
|
page read and write
|
||
2D38BBD8000
|
heap
|
page read and write
|
||
BA129FE000
|
stack
|
page read and write
|
||
2144FA6E000
|
heap
|
page read and write
|
||
1BAEA000
|
stack
|
page read and write
|
||
6705BCE000
|
stack
|
page read and write
|
||
2144FA57000
|
heap
|
page read and write
|
||
190492F8000
|
heap
|
page read and write
|
||
1904B3B8000
|
heap
|
page read and write
|
||
207CB845000
|
heap
|
page read and write
|
||
1B784000
|
heap
|
page read and write
|
||
1904B2AD000
|
heap
|
page read and write
|
||
25E303D4000
|
heap
|
page read and write
|
||
2F20000
|
heap
|
page execute and read and write
|
||
25E303FF000
|
heap
|
page read and write
|
||
7FFB4B180000
|
trusted library allocation
|
page execute and read and write
|
||
C6E000
|
stack
|
page read and write
|
||
25E2E400000
|
heap
|
page read and write
|
||
1904B431000
|
heap
|
page read and write
|
||
1904DAF8000
|
heap
|
page read and write
|
||
25E2E38A000
|
heap
|
page read and write
|
||
7FF4358B0000
|
trusted library allocation
|
page execute and read and write
|
||
20925830000
|
heap
|
page read and write
|
||
193580A4000
|
heap
|
page read and write
|
||
20925DE6000
|
heap
|
page read and write
|
||
2D38BAF4000
|
heap
|
page read and write
|
||
207CD655000
|
heap
|
page read and write
|
||
2144FBD9000
|
heap
|
page read and write
|
||
207CF870000
|
trusted library allocation
|
page read and write
|
||
207CD63F000
|
heap
|
page read and write
|
||
2144DAFB000
|
heap
|
page read and write
|
||
27978040000
|
heap
|
page read and write
|
||
2D389B23000
|
heap
|
page read and write
|
||
2144DA8A000
|
heap
|
page read and write
|
||
19357F16000
|
heap
|
page read and write
|
||
207CD65E000
|
heap
|
page read and write
|
||
BB2000
|
unkown
|
page readonly
|
||
2144FB58000
|
heap
|
page read and write
|
||
207CD764000
|
heap
|
page read and write
|
||
25E3046A000
|
heap
|
page read and write
|
||
1904B28D000
|
heap
|
page read and write
|
||
25E303C5000
|
heap
|
page read and write
|
||
2D389AEA000
|
heap
|
page read and write
|
||
19357FF0000
|
heap
|
page read and write
|
||
2D38B4E0000
|
heap
|
page read and write
|
||
2B41CFF000
|
stack
|
page read and write
|
||
2144DA9E000
|
heap
|
page read and write
|
||
2144FC13000
|
heap
|
page read and write
|
||
114387D000
|
stack
|
page read and write
|
||
207CD7C3000
|
heap
|
page read and write
|
||
7FFB4AFD0000
|
trusted library allocation
|
page read and write
|
||
193580CA000
|
heap
|
page read and write
|
||
1904B276000
|
heap
|
page read and write
|
||
11E2000
|
heap
|
page read and write
|
||
1B140000
|
heap
|
page execute and read and write
|
||
207CD620000
|
heap
|
page read and write
|
||
1904ACAE000
|
heap
|
page read and write
|
||
190492B0000
|
heap
|
page read and write
|
There are 1844 hidden memdumps, click here to show them.