Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
download.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\4695b114-5fda-44a1-9773-d08fbc742b2c.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\6b4c8ad6-ab1e-43d7-940d-bb24915bdfc6.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\7333e8b7-4117-465f-a68f-102206554fe9.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-674511B3-68C.pma
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\099b4b2e-5b45-415e-94ee-a8c0ce68ab5a.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\17fa4106-fb1a-411e-a14d-46326b9b234c.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\19a951a7-6991-468b-ab8c-9a7a4e8a6bd8.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\51402cbd-73b6-42ac-bc58-835c728aa1e4.tmp
|
MS Windows icon resource - 8 icons, 16x16, 32 bits/pixel, 20x20, 32 bits/pixel
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\6441994c-4645-4008-9baf-33cffbaf3730.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\6b9b5939-ea0c-465a-b14d-27bb246cde6c.tmp
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\7841789f-b65c-4521-a27f-f11ffa9f01d1.tmp
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\850cb293-d11f-4ba2-882d-31f35fba9ae3.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Cookies
|
SQLite 3.x database, last written using SQLite version 3036000, file counter 11, database pages 7, 1st free page 5, free pages
2, cookie 0x9, schema 4, UTF-8, version-valid-for 11
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico (copy)
|
MS Windows icon resource - 8 icons, 16x16, 32 bits/pixel, 20x20, 32 bits/pixel
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
|
SQLite 3.x database, last written using SQLite version 3036000, file counter 5, database pages 35, cookie 0x1e, schema 4,
UTF-8, version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History Provider Cache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RFdd11ee.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RFdd1317.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RFdd11fe.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RFdd1308.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sessions\Session_13377053363756224
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sessions\Tabs_13377053363765091
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\js\index
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\js\index-dir\temp-index
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\js\index-dir\the-real-index
(copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\wasm\index
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\wasm\index-dir\temp-index
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\wasm\index-dir\the-real-index
(copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\index
|
FoxPro FPT, blocks size 512, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\CURRENT
(copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network Persistent
State (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\CURRENT
(copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\a15f679b-8cd7-4525-b2df-8f1410f83577.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Visited Links
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data
|
SQLite 3.x database, last written using SQLite version 3036000, page size 2048, file counter 8, database pages 59, cookie
0x52, schema 4, UTF-8, version-valid-for 8
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\b9e1f674-ecd2-4d85-9b42-f4693899a383.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db
|
SQLite 3.x database, last written using SQLite version 3035005, writer version 2, read version 2, file counter 8, database
pages 11, cookie 0x7, schema 4, UTF-8, version-valid-for 8
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-wal
|
SQLite Write-Ahead Log, version 3007000
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\GPUCache\data_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RFdd128b.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RFdd12aa.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RFdd1308.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\edge_shutdown_ms.txt
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ef497808-2de1-48ff-ad04-2baa39b9b9a0.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\086819ab-60d6-4f1c-b52f-3fa82cd4fb55.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\300eb076-182c-45e6-af4f-6c6dcc419a4d.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\BrowserMetrics\BrowserMetrics-674511B1-1500.pma
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\Crashpad\settings.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\GrShaderCache\GPUCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\GrShaderCache\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\GrShaderCache\GPUCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\GrShaderCache\GPUCache\data_3
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\GrShaderCache\GPUCache\index
|
FoxPro FPT, blocks size 512, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\Last Version
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\Local State (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\Local State~RFdd0f9d.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\ShaderCache\GPUCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\ShaderCache\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\ShaderCache\GPUCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\ShaderCache\GPUCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\ShaderCache\GPUCache\index
|
FoxPro FPT, blocks size 512, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\SmartScreen\local\cache
|
COM executable for DOS
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\SmartScreen\local\download_cache
|
COM executable for DOS
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\SmartScreen\local\warnStateCache
|
data
|
dropped
|
There are 94 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\download.exe
|
"C:\Users\user\Desktop\download.exe"
|
||
C:\Windows\SysWOW64\svchost.exe
|
"C:\Windows\System32\svchost.exe"
|
||
C:\Windows\System32\fontdrvhost.exe
|
"C:\Windows\System32\fontdrvhost.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
--user-data-dir="C:\Users\user\AppData\Local\Temp\chrDCBF.tmp" --explicitly-allowed-ports=8000 --disable-gpu --new-window
"http://127.0.0.1:8000/f4698726/75fae57d"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --field-trial-handle=2488,i,6324837096866850942,9732983909897042519,262144 --variations-seed-version
--mojo-platform-channel-handle=2612 /prefetch:3
|
||
C:\Program Files\Windows Media Player\wmlaunch.exe
|
"C:\Program Files\Windows Media Player\wmlaunch.exe"
|
||
C:\Windows\System32\dllhost.exe
|
"C:\Windows\system32\dllhost.exe"
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\94.0.992.31\elevation_service.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\94.0.992.31\elevation_service.exe"
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 5152 -s 592
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
--user-data-dir="C:\Users\user\AppData\Local\Temp\chrE53C.tmp" --explicitly-allowed-ports=8000 --disable-gpu --new-window
"http://127.0.0.1:8000/f4698726/6e5a1ad9"
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--field-trial-handle=2092,15793817240475235178,5851487067123892181,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332
/prefetch:3
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --explicitly-allowed-ports=8000 --disable-gpu --new-window
--flag-switches-begin --flag-switches-end --do-not-de-elevate http://127.0.0.1:8000/f4698726/6e5a1ad9
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--field-trial-handle=2068,15667601441087912000,15476632491186070827,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2592
/prefetch:3
|
There are 4 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://uk.search.yahoo.com/favicon.icohttps://uk.search.yahoo.com/search
|
unknown
|
||
https://secure.eicar.org/eicar.co
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://www.google.com/chrome/?&brand=CHWL&utm_campaign=en&utm_source=en-et-na-us-chrome-bubble&utm_
|
unknown
|
||
http://anglebug.com/4995
|
unknown
|
||
https://dl.packetstormsecurity.net/Crackers/bios/BIOS320.EXE
|
unknown
|
||
https://permanently-removed.invalid/v1/events
|
unknown
|
||
https://blog.google/products/chrome/google-chrome-safe-browsing-real-time/
|
unknown
|
||
https://shop.advanceautoparts.com/web/OrderItemDisplay
|
unknown
|
||
http://anglebug.com/42262161
|
unknown
|
||
https://anglebug.com/42265794
|
unknown
|
||
http://anglebug.com/42263010
|
unknown
|
||
https://anglebug.com/42265792
|
unknown
|
||
http://anglebug.com/42262286
|
unknown
|
||
http://anglebug.com/42262166
|
unknown
|
||
http://anglebug.com/42262287
|
unknown
|
||
http://dns-tunnel-check.googlezip.net/connect
|
unknown
|
||
https://www.zappos.com/cart
|
unknown
|
||
http://127.0.0.1:8000/f4698726/6e5a1ad9User
|
unknown
|
||
https://www.guitarcenter.com/cart
|
unknown
|
||
http://127.0.0.1:8000/f4698726/6e5a1ad9P
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://www.altardstate.com/cart/
|
unknown
|
||
https://www.adorama.com/als.mvc/cartview
|
unknown
|
||
https://anglebug.com/42265782
|
unknown
|
||
https://www.bestbuy.com/cart
|
unknown
|
||
http://anglebug.com/42266652
|
unknown
|
||
https://discord.com
|
unknown
|
||
https://www.williams-sonoma.com/shoppingcart/
|
unknown
|
||
http://127.0.0.1:8000/f4698726/6e5a1ad9/
|
unknown
|
||
https://secure.eicar.org/eicar.com.txtXka
|
unknown
|
||
http://127.0.0.1:8000/f4698726/75fae57d
|
unknown
|
||
http://anglebug.com/42263031
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://www.ae.com/us/en/cart
|
unknown
|
||
https://www.llbean.com/webapp/wcs/stores/servlet/LLBShoppingCartDisplay
|
unknown
|
||
https://95.182.97.106:5980/363881569c00eea8aaf3/pmgoamua.jpbdqkernelbasentdllkernel32GetProcessMitig
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://anglebug.com/42266666
|
unknown
|
||
https://cart.ebay.com/
|
unknown
|
||
http://anglebug.com/42263158
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
https://www.gamestop.com/cart/
|
unknown
|
||
https://www.boostmobile.com/cart.html
|
unknown
|
||
https://www.samsclub.com/cart
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
https://www.overstock.com/cart
|
unknown
|
||
https://permanently-removed.invalid/embedded/setup/chrome/usermenu
|
unknown
|
||
https://www.bloomingdales.com/my-bag
|
unknown
|
||
https://gemini.google.com/app?q=
|
unknown
|
||
http://anglebug.com/345244067
|
unknown
|
||
http://anglebug.com/42263049
|
unknown
|
||
http://anglebug.com/40644663
|
unknown
|
||
https://secure.newegg.com/shop/cart
|
unknown
|
||
https://secure.eicar.org/eicar.com.txt
|
unknown
|
||
http://anglebug.com/42262249
|
unknown
|
||
http://anglebug.com/42264669
|
unknown
|
||
http://anglebug.com/42265516
|
unknown
|
||
https://gemini.google.com/app?q=searchTerms
|
unknown
|
||
https://www.jcrew.com/checkout/cart
|
unknown
|
||
https://uk.search.yahoo.com/search
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://anglebug.com/42265636
|
unknown
|
||
https://anglebug.com/42265637
|
unknown
|
||
https://www.officedepot.com/cart/shoppingCart.do
|
unknown
|
||
https://issuetracker.google.com/347601787
|
unknown
|
||
https://anglebug.com/42266842
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
https://www.weightwatchers.com/us/shop/checkout/cart
|
unknown
|
||
http://anglebug.com/42266842
|
unknown
|
||
http://anglebug.com/42264422
|
unknown
|
||
http://anglebug.com/42266725
|
unknown
|
||
http://anglebug.com/42262247
|
unknown
|
||
http://anglebug.com/42265878
|
unknown
|
||
http://anglebug.com/42266602
|
unknown
|
||
http://anglebug.com/42265407
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
|
unknown
|
||
https://issuetracker.google.com/309028728
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
http://anglebug.com/42263580
|
unknown
|
||
https://www.eicar.org/download-anti-malware-testfile/Xka
|
unknown
|
||
https://www.talbots.com/cart
|
unknown
|
||
https://unitedstates4.ss.wd.microsoft.us
|
unknown
|
||
http://anglebug.com/42262258
|
unknown
|
||
http://anglebug.com/42265647
|
unknown
|
||
https://unitedstates2.ss.wd.microsoft.us
|
unknown
|
||
http://anglebug.com/42266976
|
unknown
|
||
https://unitedstates1.ss.wd.microsoft.us
|
unknown
|
||
http://anglebug.com/42263239
|
unknown
|
||
http://anglebug.com/2514
|
unknown
|
||
http://anglebug.com/3965
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
time.cloudflare.com
|
162.159.200.1
|
||
ntp.nict.jp
|
133.243.238.243
|
||
gbg1.ntp.netnod.se
|
194.58.203.20
|
||
ntp.time.nl
|
94.198.159.10
|
||
ntp.time.in.ua
|
62.149.0.30
|
||
ntp1.hetzner.de
|
213.239.239.164
|
||
gbg1.ntp.se
|
unknown
|
||
time.windows.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
95.182.97.106
|
unknown
|
Russian Federation
|
||
162.159.200.1
|
time.cloudflare.com
|
United States
|
||
94.198.159.10
|
ntp.time.nl
|
Netherlands
|
||
213.239.239.164
|
ntp1.hetzner.de
|
Germany
|
||
194.58.203.20
|
gbg1.ntp.netnod.se
|
Sweden
|
||
62.149.0.30
|
ntp.time.in.ua
|
Ukraine
|
||
133.243.238.243
|
ntp.nict.jp
|
Japan
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\SibCode
|
sn3
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
|
metricsid
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
|
metricsid_installdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
edge.services.last_account_id
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
edge.services.last_username
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dgiklkfkllikcanfonkcabmbdfmgleag
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
fikbjbembnmfhppjfnmfkahdhfohhjmg
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
iglcjdemknebjbklcgkfaebgojjphkec
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ihmafllikibpmigkcoadcmckbfhibefp
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jdiccldimpdaibmpdkjnbmckianbfold
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kmendfapggjehodndflmmgagdbamhnfd
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
mhjfbmdgcfjbbpaeojofohoefgiehjai
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ncbjelpjchkpbikbpkcchkhkblodoama
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nkeimhogjdpnpccoofpliimaahmaaome
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dgiklkfkllikcanfonkcabmbdfmgleag
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
fikbjbembnmfhppjfnmfkahdhfohhjmg
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
iglcjdemknebjbklcgkfaebgojjphkec
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ihmafllikibpmigkcoadcmckbfhibefp
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jdiccldimpdaibmpdkjnbmckianbfold
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kmendfapggjehodndflmmgagdbamhnfd
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
mhjfbmdgcfjbbpaeojofohoefgiehjai
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ncbjelpjchkpbikbpkcchkhkblodoama
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nkeimhogjdpnpccoofpliimaahmaaome
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
pinned_tabs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
media.cdm.origin_data
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
software_reporter.reporting
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
media.storage_id_salt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
edge.services.account_id
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
software_reporter.prompt_seed
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_homepage
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
edge.services.last_username
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
default_search_provider_data.template_url_data
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
safebrowsing.incidents_sent
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
pinned_tabs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
search_provider_overrides
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
session.startup_urls
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
session.restore_on_startup
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
edge.services.last_account_id
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
software_reporter.prompt_version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_startup_urls
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
settings_reset_prompt.prompt_wave
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
homepage
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
homepage_is_newtabpage
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_default_search
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
browser.show_home_button
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
GlobalAssocChangedCounter
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
|
lastrun
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
There are 49 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
32C0000
|
direct allocation
|
page execute and read and write
|
||
E20000
|
direct allocation
|
page execute and read and write
|
||
6D0000
|
direct allocation
|
page read and write
|
||
2DF0000
|
direct allocation
|
page read and write
|
||
2DF128E0000
|
heap
|
page read and write
|
||
48DC008C8000
|
trusted library allocation
|
page read and write
|
||
48DC0106C000
|
trusted library allocation
|
page read and write
|
||
2DF128C8000
|
heap
|
page read and write
|
||
48DC0006C000
|
trusted library allocation
|
page read and write
|
||
1818000DC000
|
trusted library allocation
|
page read and write
|
||
48DC002F3000
|
trusted library allocation
|
page read and write
|
||
48DC00E98000
|
trusted library allocation
|
page read and write
|
||
2DF128CC000
|
heap
|
page read and write
|
||
2DF126BA000
|
heap
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
50C00047C000
|
trusted library allocation
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
5900000
|
heap
|
page read and write
|
||
CA433ED000
|
stack
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
48D80003C000
|
trusted library allocation
|
page read and write
|
||
2DF12634000
|
heap
|
page read and write
|
||
18A546E7000
|
heap
|
page read and write
|
||
18A5296A000
|
unkown
|
page read and write
|
||
818000B8000
|
direct allocation
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
7A00003C000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
2DF10610000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF106AD000
|
heap
|
page read and write
|
||
2DF12624000
|
heap
|
page read and write
|
||
73D40001C000
|
direct allocation
|
page read and write
|
||
2DF128AE000
|
heap
|
page read and write
|
||
2DF105F0000
|
heap
|
page read and write
|
||
2DF128A5000
|
heap
|
page read and write
|
||
2DF128B9000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF106D6000
|
heap
|
page read and write
|
||
48DC0003D000
|
trusted library allocation
|
page read and write
|
||
48D800150000
|
trusted library allocation
|
page read and write
|
||
2DF12654000
|
heap
|
page read and write
|
||
2DF12080000
|
heap
|
page read and write
|
||
2DF12655000
|
heap
|
page read and write
|
||
2DF10615000
|
heap
|
page read and write
|
||
2DF125AC000
|
heap
|
page read and write
|
||
48DC00014000
|
trusted library allocation
|
page read and write
|
||
216E00058000
|
direct allocation
|
page read and write
|
||
1CFEBD39000
|
heap
|
page read and write
|
||
48DC00C04000
|
trusted library allocation
|
page read and write
|
||
1CFF2173000
|
heap
|
page read and write
|
||
1CFF1EF0000
|
trusted library section
|
page read and write
|
||
7DDE00041000
|
trusted library allocation
|
page read and write
|
||
79497FE000
|
stack
|
page read and write
|
||
E68607C000
|
stack
|
page read and write
|
||
2DF105D5000
|
heap
|
page read and write
|
||
2DF10612000
|
heap
|
page read and write
|
||
2164ECF2000
|
heap
|
page read and write
|
||
48D800068000
|
trusted library allocation
|
page read and write
|
||
2DF12675000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
2DF12638000
|
heap
|
page read and write
|
||
2DF10629000
|
heap
|
page read and write
|
||
2DF12670000
|
heap
|
page read and write
|
||
48DC01001000
|
trusted library allocation
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
2DF12648000
|
heap
|
page read and write
|
||
2DF106C5000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2DF10694000
|
heap
|
page read and write
|
||
48DC001F0000
|
trusted library allocation
|
page read and write
|
||
2DF128C5000
|
heap
|
page read and write
|
||
48DC007B4000
|
trusted library allocation
|
page read and write
|
||
2DF128AE000
|
heap
|
page read and write
|
||
50C00041C000
|
trusted library allocation
|
page read and write
|
||
1CFEBD2F000
|
heap
|
page read and write
|
||
2DF128A5000
|
heap
|
page read and write
|
||
1CFF19C0000
|
unkown
|
page readonly
|
||
B24000
|
heap
|
page read and write
|
||
48DC00428000
|
trusted library allocation
|
page read and write
|
||
2DF12695000
|
heap
|
page read and write
|
||
2DF106DC000
|
heap
|
page read and write
|
||
48DC00790000
|
trusted library allocation
|
page read and write
|
||
7957FFF000
|
trusted library allocation
|
page read and write
|
||
2DF12670000
|
heap
|
page read and write
|
||
18A54BC1000
|
heap
|
page read and write
|
||
7DF40F851000
|
unkown
|
page readonly
|
||
48DC00804000
|
trusted library allocation
|
page read and write
|
||
21650A13000
|
heap
|
page read and write
|
||
1AFE8630000
|
remote allocation
|
page execute and read and write
|
||
48DC00784000
|
trusted library allocation
|
page read and write
|
||
CA58BFB000
|
stack
|
page read and write
|
||
2DF10629000
|
heap
|
page read and write
|
||
2DF106D1000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF12664000
|
heap
|
page read and write
|
||
2DF106C1000
|
heap
|
page read and write
|
||
48DC00234000
|
trusted library allocation
|
page read and write
|
||
50C000454000
|
trusted library allocation
|
page read and write
|
||
2DF106C5000
|
heap
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
2C3C000
|
stack
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
18A528B0000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF128A5000
|
heap
|
page read and write
|
||
2DF12670000
|
heap
|
page read and write
|
||
795CFFF000
|
stack
|
page read and write
|
||
2DF12662000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
2DF12634000
|
heap
|
page read and write
|
||
48DC007E4000
|
trusted library allocation
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF106A0000
|
heap
|
page read and write
|
||
795D7FE000
|
stack
|
page read and write
|
||
2DF106F0000
|
trusted library allocation
|
page read and write
|
||
48DC00338000
|
trusted library allocation
|
page read and write
|
||
2DF128DD000
|
heap
|
page read and write
|
||
2DF12615000
|
heap
|
page read and write
|
||
1CFEBD24000
|
heap
|
page read and write
|
||
79567FF000
|
trusted library allocation
|
page read and write
|
||
73D40003C000
|
direct allocation
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF106C1000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
48DC00344000
|
trusted library allocation
|
page read and write
|
||
2DF1062A000
|
heap
|
page read and write
|
||
2DF12895000
|
heap
|
page read and write
|
||
2DF12638000
|
heap
|
page read and write
|
||
2DF1266D000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2DF12685000
|
heap
|
page read and write
|
||
2DF12180000
|
heap
|
page read and write
|
||
2DF12093000
|
heap
|
page read and write
|
||
2DF12083000
|
heap
|
page read and write
|
||
2DF106DD000
|
heap
|
page read and write
|
||
48DC00E6C000
|
trusted library allocation
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
48DC0048C000
|
trusted library allocation
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
2DF12675000
|
heap
|
page read and write
|
||
2DF1263C000
|
heap
|
page read and write
|
||
2FAE000
|
heap
|
page read and write
|
||
1CFF15AA000
|
heap
|
page read and write
|
||
2DF128C9000
|
heap
|
page read and write
|
||
2DF106D2000
|
heap
|
page read and write
|
||
54AC000
|
stack
|
page read and write
|
||
48DC004DC000
|
trusted library allocation
|
page read and write
|
||
2DF128B5000
|
heap
|
page read and write
|
||
313D000
|
heap
|
page read and write
|
||
2DF1267D000
|
heap
|
page read and write
|
||
48DC00224000
|
trusted library allocation
|
page read and write
|
||
2DF105F9000
|
heap
|
page read and write
|
||
2DF106AF000
|
heap
|
page read and write
|
||
216E0007C000
|
direct allocation
|
page read and write
|
||
2DF12654000
|
heap
|
page read and write
|
||
21650B4C000
|
heap
|
page read and write
|
||
1CFF19C5000
|
unkown
|
page readonly
|
||
7949FFE000
|
stack
|
page read and write
|
||
48DC00B84000
|
trusted library allocation
|
page read and write
|
||
18A54BFE000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
1CFEB1E3000
|
heap
|
page read and write
|
||
2DF12634000
|
heap
|
page read and write
|
||
2DF128E2000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
1818000B0000
|
trusted library allocation
|
page read and write
|
||
48DC0023C000
|
trusted library allocation
|
page read and write
|
||
2DF106D6000
|
heap
|
page read and write
|
||
2DF128CC000
|
heap
|
page read and write
|
||
2DF12624000
|
heap
|
page read and write
|
||
2DF126C1000
|
heap
|
page read and write
|
||
7A0000B4000
|
trusted library allocation
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
48DC00727000
|
trusted library allocation
|
page read and write
|
||
48D8000F4000
|
trusted library allocation
|
page read and write
|
||
48DC00D70000
|
trusted library allocation
|
page read and write
|
||
48DC00C01000
|
trusted library allocation
|
page read and write
|
||
18A54689000
|
heap
|
page read and write
|
||
216E00054000
|
direct allocation
|
page read and write
|
||
2DF106D5000
|
heap
|
page read and write
|
||
7DDE00108000
|
trusted library allocation
|
page read and write
|
||
1CFEC2B8000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF126CD000
|
heap
|
page read and write
|
||
18A54680000
|
heap
|
page read and write
|
||
2DF128B6000
|
heap
|
page read and write
|
||
1AFE89CF000
|
heap
|
page read and write
|
||
2DF105F0000
|
heap
|
page read and write
|
||
181800034000
|
trusted library allocation
|
page read and write
|
||
2DF12695000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
50C000110000
|
trusted library allocation
|
page read and write
|
||
2DF128C6000
|
heap
|
page read and write
|
||
48DC00330000
|
trusted library allocation
|
page read and write
|
||
48DC01210000
|
trusted library allocation
|
page read and write
|
||
2DF125AE000
|
heap
|
page read and write
|
||
53EF000
|
stack
|
page read and write
|
||
18A5468F000
|
heap
|
page read and write
|
||
2DF12664000
|
heap
|
page read and write
|
||
2164EC85000
|
heap
|
page read and write
|
||
2DF12670000
|
heap
|
page read and write
|
||
48DC00238000
|
trusted library allocation
|
page read and write
|
||
2DF128B5000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2DF128B4000
|
heap
|
page read and write
|
||
2DF128DD000
|
heap
|
page read and write
|
||
48DC00678000
|
trusted library allocation
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF12664000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
48DC00480000
|
trusted library allocation
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
7A00007C000
|
trusted library allocation
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
48D800224000
|
trusted library allocation
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
216509A0000
|
trusted library section
|
page readonly
|
||
1E605420000
|
heap
|
page read and write
|
||
48DC00504000
|
trusted library allocation
|
page read and write
|
||
1AFE8850000
|
heap
|
page read and write
|
||
CA493FC000
|
stack
|
page read and write
|
||
E685FFC000
|
stack
|
page read and write
|
||
2DF12664000
|
heap
|
page read and write
|
||
50C000080000
|
trusted library allocation
|
page read and write
|
||
2DF103F7000
|
heap
|
page read and write
|
||
8180000D000
|
direct allocation
|
page read and write
|
||
2DF105D7000
|
heap
|
page read and write
|
||
48DC000A0000
|
trusted library allocation
|
page read and write
|
||
73D4000E8000
|
direct allocation
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
546F000
|
stack
|
page read and write
|
||
5270000
|
unkown
|
page read and write
|
||
5539000
|
unkown
|
page read and write
|
||
73D4000D8000
|
direct allocation
|
page read and write
|
||
2DF106D2000
|
heap
|
page read and write
|
||
33435FC000
|
stack
|
page read and write
|
||
48DC003F4000
|
trusted library allocation
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
21650B00000
|
heap
|
page read and write
|
||
2DF125BA000
|
heap
|
page read and write
|
||
2DF128D8000
|
heap
|
page read and write
|
||
2DF12618000
|
heap
|
page read and write
|
||
50C000224000
|
trusted library allocation
|
page read and write
|
||
2DF12654000
|
heap
|
page read and write
|
||
2DF128C6000
|
heap
|
page read and write
|
||
2DF12634000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
2DF1263C000
|
heap
|
page read and write
|
||
2DF106B3000
|
heap
|
page read and write
|
||
7DDE0003C000
|
trusted library allocation
|
page read and write
|
||
2DF106DC000
|
heap
|
page read and write
|
||
2DF106AD000
|
heap
|
page read and write
|
||
CA4EBFE000
|
stack
|
page read and write
|
||
2DF128C5000
|
heap
|
page read and write
|
||
36E0000
|
direct allocation
|
page read and write
|
||
2DF10270000
|
unkown
|
page execute and read and write
|
||
53C0000
|
unkown
|
page read and write
|
||
25AD122D000
|
heap
|
page read and write
|
||
2DF10260000
|
heap
|
page read and write
|
||
2DF108ED000
|
heap
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF128D4000
|
heap
|
page read and write
|
||
CA46BFD000
|
stack
|
page read and write
|
||
1CFEB1C0000
|
trusted library section
|
page readonly
|
||
48DC004F4000
|
trusted library allocation
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF106CA000
|
heap
|
page read and write
|
||
48DC003BD000
|
trusted library allocation
|
page read and write
|
||
2DF12624000
|
heap
|
page read and write
|
||
2DF12655000
|
heap
|
page read and write
|
||
48DC0089C000
|
trusted library allocation
|
page read and write
|
||
CA4BBFF000
|
stack
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF128C4000
|
heap
|
page read and write
|
||
1E605110000
|
heap
|
page read and write
|
||
2DF12760000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
1AFE89DE000
|
heap
|
page read and write
|
||
2164ED02000
|
heap
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
2DF126C1000
|
heap
|
page read and write
|
||
2DF12662000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
50C0004C4000
|
trusted library allocation
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
2DF12624000
|
heap
|
page read and write
|
||
2DF106D4000
|
heap
|
page read and write
|
||
50C000454000
|
trusted library allocation
|
page read and write
|
||
7DDE000E4000
|
trusted library allocation
|
page read and write
|
||
73D40004C000
|
direct allocation
|
page read and write
|
||
2164ECE1000
|
heap
|
page read and write
|
||
2DF12675000
|
heap
|
page read and write
|
||
B24000
|
heap
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
48DC00E30000
|
trusted library allocation
|
page read and write
|
||
18A54670000
|
heap
|
page read and write
|
||
2DF1263C000
|
heap
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
2DF12654000
|
heap
|
page read and write
|
||
2DF12869000
|
heap
|
page read and write
|
||
1CFE8658000
|
heap
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
2DF12624000
|
heap
|
page read and write
|
||
21650B02000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
48DC001BC000
|
trusted library allocation
|
page read and write
|
||
CA4CBFA000
|
stack
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2DF12664000
|
heap
|
page read and write
|
||
50C0001B8000
|
trusted library allocation
|
page read and write
|
||
48DC0108C000
|
trusted library allocation
|
page read and write
|
||
50C0004A5000
|
trusted library allocation
|
page read and write
|
||
F99B8FD000
|
stack
|
page read and write
|
||
1AFE8840000
|
heap
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
2DF106DB000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF1267D000
|
heap
|
page read and write
|
||
8180000F000
|
direct allocation
|
page read and write
|
||
2DF128B2000
|
heap
|
page read and write
|
||
2DF128DD000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
553D000
|
unkown
|
page read and write
|
||
CA473FA000
|
stack
|
page read and write
|
||
2DF1067D000
|
heap
|
page read and write
|
||
2DF106C1000
|
heap
|
page read and write
|
||
2DF105EA000
|
heap
|
page read and write
|
||
2DF1264C000
|
heap
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
2DF128DD000
|
heap
|
page read and write
|
||
794A7FB000
|
stack
|
page read and write
|
||
2DF10449000
|
heap
|
page read and write
|
||
1E605152000
|
heap
|
page read and write
|
||
7A000098000
|
trusted library allocation
|
page read and write
|
||
48DC00880000
|
trusted library allocation
|
page read and write
|
||
48DC00434000
|
trusted library allocation
|
page read and write
|
||
2DF106CC000
|
heap
|
page read and write
|
||
48DC00168000
|
trusted library allocation
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
818000AC000
|
direct allocation
|
page read and write
|
||
18A52B90000
|
heap
|
page read and write
|
||
2DF128DD000
|
heap
|
page read and write
|
||
1CFEBD37000
|
heap
|
page read and write
|
||
48DC01244000
|
trusted library allocation
|
page read and write
|
||
2DF12654000
|
heap
|
page read and write
|
||
18A52CDC000
|
unkown
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
2DF10445000
|
heap
|
page read and write
|
||
1CFEBD32000
|
heap
|
page read and write
|
||
2DF12654000
|
heap
|
page read and write
|
||
CA56BFB000
|
stack
|
page read and write
|
||
2DF12871000
|
heap
|
page read and write
|
||
2DF10612000
|
heap
|
page read and write
|
||
2DF128C5000
|
heap
|
page read and write
|
||
48DC00FAC000
|
trusted library allocation
|
page read and write
|
||
5310000
|
unkown
|
page read and write
|
||
81800044000
|
direct allocation
|
page read and write
|
||
2DF128B5000
|
heap
|
page read and write
|
||
73D400040000
|
direct allocation
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF1060A000
|
heap
|
page read and write
|
||
2DF106CA000
|
heap
|
page read and write
|
||
2DF128B3000
|
heap
|
page read and write
|
||
50C000060000
|
trusted library allocation
|
page read and write
|
||
701000
|
unkown
|
page execute read
|
||
2DF128AE000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
2DF12638000
|
heap
|
page read and write
|
||
1CFEBD37000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
1CFF2170000
|
heap
|
page read and write
|
||
48DC011C8000
|
trusted library allocation
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
795B7FE000
|
stack
|
page read and write
|
||
2DF106CA000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
48DC01201000
|
trusted library allocation
|
page read and write
|
||
2DF10613000
|
heap
|
page read and write
|
||
18A546E7000
|
heap
|
page read and write
|
||
48D800140000
|
trusted library allocation
|
page read and write
|
||
319F000
|
heap
|
page read and write
|
||
2C70000
|
unkown
|
page execute and read and write
|
||
2DF126C5000
|
heap
|
page read and write
|
||
1CFE864B000
|
heap
|
page read and write
|
||
33CD000
|
unkown
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
2DF128DD000
|
heap
|
page read and write
|
||
7DDE0004C000
|
trusted library allocation
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
2DF1060A000
|
heap
|
page read and write
|
||
2DF106DE000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
21650920000
|
trusted library allocation
|
page read and write
|
||
18180005C000
|
trusted library allocation
|
page read and write
|
||
81800064000
|
direct allocation
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
2DF128C6000
|
heap
|
page read and write
|
||
1CFEC300000
|
heap
|
page read and write
|
||
2DF1266D000
|
heap
|
page read and write
|
||
2DF106A2000
|
heap
|
page read and write
|
||
2164EC4B000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
1CFEBD30000
|
heap
|
page read and write
|
||
CA573FE000
|
stack
|
page read and write
|
||
2DF106DE000
|
heap
|
page read and write
|
||
2DF10610000
|
heap
|
page read and write
|
||
2DF1061E000
|
heap
|
page read and write
|
||
216E0003C000
|
direct allocation
|
page read and write
|
||
48DC00F14000
|
trusted library allocation
|
page read and write
|
||
48DC003B0000
|
trusted library allocation
|
page read and write
|
||
2DF12670000
|
heap
|
page read and write
|
||
216E00098000
|
direct allocation
|
page read and write
|
||
2DF10690000
|
heap
|
page read and write
|
||
48DC00E01000
|
trusted library allocation
|
page read and write
|
||
50C00020C000
|
trusted library allocation
|
page read and write
|
||
7DF4C6861000
|
unkown
|
page execute read
|
||
2F6F000
|
heap
|
page read and write
|
||
79507FE000
|
stack
|
page read and write
|
||
7DDE0000C000
|
trusted library allocation
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF10610000
|
heap
|
page read and write
|
||
2DF12685000
|
heap
|
page read and write
|
||
CA483FE000
|
stack
|
page read and write
|
||
7DDE00060000
|
trusted library allocation
|
page read and write
|
||
181800064000
|
trusted library allocation
|
page read and write
|
||
2DF12761000
|
heap
|
page read and write
|
||
7DDE00104000
|
trusted library allocation
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
18A52C90000
|
trusted library allocation
|
page read and write
|
||
8E56FFD000
|
unkown
|
page read and write
|
||
2DF1061E000
|
heap
|
page read and write
|
||
2DF1267D000
|
heap
|
page read and write
|
||
48DC01108000
|
trusted library allocation
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF12654000
|
heap
|
page read and write
|
||
2164ED58000
|
heap
|
page read and write
|
||
2DF126CD000
|
heap
|
page read and write
|
||
2DF1061B000
|
heap
|
page read and write
|
||
48DC011D8000
|
trusted library allocation
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
53E0000
|
unkown
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
50C000098000
|
trusted library allocation
|
page read and write
|
||
48D8000D8000
|
trusted library allocation
|
page read and write
|
||
48D8000E0000
|
trusted library allocation
|
page read and write
|
||
2DF128C7000
|
heap
|
page read and write
|
||
2DF128C6000
|
heap
|
page read and write
|
||
1E605119000
|
heap
|
page read and write
|
||
48D800058000
|
trusted library allocation
|
page read and write
|
||
2DF1269D000
|
heap
|
page read and write
|
||
B24000
|
heap
|
page read and write
|
||
2DF128A8000
|
heap
|
page read and write
|
||
2DF106B5000
|
heap
|
page read and write
|
||
2DF10624000
|
heap
|
page read and write
|
||
2DF1262E000
|
heap
|
page read and write
|
||
CA463FF000
|
stack
|
page read and write
|
||
1CFEAD50000
|
unkown
|
page read and write
|
||
1818000D0000
|
trusted library allocation
|
page read and write
|
||
CA533FF000
|
stack
|
page read and write
|
||
48D800100000
|
trusted library allocation
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF125AE000
|
heap
|
page read and write
|
||
CA53BFC000
|
stack
|
page read and write
|
||
48DC00664000
|
trusted library allocation
|
page read and write
|
||
48DC005A0000
|
trusted library allocation
|
page read and write
|
||
33C9000
|
unkown
|
page read and write
|
||
2DF1266D000
|
heap
|
page read and write
|
||
2DF1263B000
|
heap
|
page read and write
|
||
2DF1264C000
|
heap
|
page read and write
|
||
48DC00CD4000
|
trusted library allocation
|
page read and write
|
||
2DF12634000
|
heap
|
page read and write
|
||
CA49BFD000
|
stack
|
page read and write
|
||
48DC00330000
|
trusted library allocation
|
page read and write
|
||
2DF128B5000
|
heap
|
page read and write
|
||
50C00048C000
|
trusted library allocation
|
page read and write
|
||
778000
|
unkown
|
page write copy
|
||
3132000
|
heap
|
page read and write
|
||
2DF128B5000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
3100000
|
unkown
|
page read and write
|
||
2DF128B2000
|
heap
|
page read and write
|
||
2DF105E1000
|
heap
|
page read and write
|
||
2DF128AE000
|
heap
|
page read and write
|
||
48DC00B08000
|
trusted library allocation
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
7DDE00098000
|
trusted library allocation
|
page read and write
|
||
48DC003C1000
|
trusted library allocation
|
page read and write
|
||
2DF106D6000
|
heap
|
page read and write
|
||
2DF125AC000
|
heap
|
page read and write
|
||
81800078000
|
direct allocation
|
page read and write
|
||
2DF12655000
|
heap
|
page read and write
|
||
2DF1264B000
|
heap
|
page read and write
|
||
2DF106AF000
|
heap
|
page read and write
|
||
48DC00F04000
|
trusted library allocation
|
page read and write
|
||
48DC001B0000
|
trusted library allocation
|
page read and write
|
||
1E604E90000
|
heap
|
page read and write
|
||
216E0004C000
|
direct allocation
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
1818000B0000
|
trusted library allocation
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF10604000
|
heap
|
page read and write
|
||
48DC00858000
|
trusted library allocation
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
CA453FE000
|
stack
|
page read and write
|
||
2DF12636000
|
heap
|
page read and write
|
||
2DF128A5000
|
heap
|
page read and write
|
||
2164ED5E000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
48DC001C4000
|
trusted library allocation
|
page read and write
|
||
C33000
|
heap
|
page read and write
|
||
2DF10698000
|
heap
|
page read and write
|
||
794CFFC000
|
stack
|
page read and write
|
||
2DF12695000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF106A2000
|
heap
|
page read and write
|
||
2DF1267E000
|
heap
|
page read and write
|
||
2DF106D1000
|
heap
|
page read and write
|
||
2DF126B5000
|
heap
|
page read and write
|
||
48DC0021C000
|
trusted library allocation
|
page read and write
|
||
1CFEC273000
|
heap
|
page read and write
|
||
2DF126B4000
|
heap
|
page read and write
|
||
2DF106CF000
|
heap
|
page read and write
|
||
2DF1266D000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF10624000
|
heap
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
2DF12634000
|
heap
|
page read and write
|
||
48DC00C24000
|
trusted library allocation
|
page read and write
|
||
2DF106A2000
|
heap
|
page read and write
|
||
CA51BFC000
|
stack
|
page read and write
|
||
48DC00095000
|
trusted library allocation
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
48DC00458000
|
trusted library allocation
|
page read and write
|
||
1CFF2187000
|
unclassified section
|
page read and write
|
||
2DF1068D000
|
heap
|
page read and write
|
||
73D400001000
|
direct allocation
|
page read and write
|
||
2DF128B5000
|
heap
|
page read and write
|
||
48DC00468000
|
trusted library allocation
|
page read and write
|
||
307F000
|
heap
|
page read and write
|
||
2DF12685000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
2DF12655000
|
heap
|
page read and write
|
||
2DF128AE000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
48DC0013C000
|
trusted library allocation
|
page read and write
|
||
2DF104F0000
|
heap
|
page read and write
|
||
2DF106BD000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
48DC0022C000
|
trusted library allocation
|
page read and write
|
||
2DF106D5000
|
heap
|
page read and write
|
||
48DC01228000
|
trusted library allocation
|
page read and write
|
||
50C0000B4000
|
trusted library allocation
|
page read and write
|
||
2DF12190000
|
trusted library allocation
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
2DF12879000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF128B3000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF1289F000
|
heap
|
page read and write
|
||
48DC00574000
|
trusted library allocation
|
page read and write
|
||
1CFEBD2C000
|
heap
|
page read and write
|
||
2DF12655000
|
heap
|
page read and write
|
||
25AD1200000
|
heap
|
page read and write
|
||
48DC00940000
|
trusted library allocation
|
page read and write
|
||
2DF12655000
|
heap
|
page read and write
|
||
1AFE884E000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
2DF12685000
|
heap
|
page read and write
|
||
7A000054000
|
trusted library allocation
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
1E607087000
|
unkown
|
page read and write
|
||
2DF106DE000
|
heap
|
page read and write
|
||
2DF128C6000
|
heap
|
page read and write
|
||
48DC00210000
|
trusted library allocation
|
page read and write
|
||
2DF10627000
|
heap
|
page read and write
|
||
7955FFF000
|
trusted library allocation
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
1CFE8825000
|
heap
|
page read and write
|
||
48DC001B6000
|
trusted library allocation
|
page read and write
|
||
2DF128A5000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
69D000
|
stack
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF12670000
|
heap
|
page read and write
|
||
1E605426000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
2DF125B9000
|
heap
|
page read and write
|
||
2DF128D8000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
48DC00334000
|
trusted library allocation
|
page read and write
|
||
2DF125B9000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF1267D000
|
heap
|
page read and write
|
||
48D80023C000
|
trusted library allocation
|
page read and write
|
||
2DF128B5000
|
heap
|
page read and write
|
||
181800060000
|
trusted library allocation
|
page read and write
|
||
2DF10627000
|
heap
|
page read and write
|
||
1CFE8630000
|
heap
|
page readonly
|
||
48DC00875000
|
trusted library allocation
|
page read and write
|
||
216E000CC000
|
direct allocation
|
page read and write
|
||
1CFE86D2000
|
heap
|
page read and write
|
||
48DC01134000
|
trusted library allocation
|
page read and write
|
||
2DF1263E000
|
heap
|
page read and write
|
||
2DF128AE000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
1AFE8950000
|
heap
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
5393000
|
unkown
|
page read and write
|
||
2DF106D2000
|
heap
|
page read and write
|
||
2DF10627000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
795AFFE000
|
stack
|
page read and write
|
||
2DF128DA000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
D75000
|
heap
|
page read and write
|
||
2DF128B9000
|
heap
|
page read and write
|
||
2DF106CA000
|
heap
|
page read and write
|
||
1CFE84C0000
|
heap
|
page read and write
|
||
48DC005B0000
|
trusted library allocation
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF125BA000
|
heap
|
page read and write
|
||
48DC00458000
|
trusted library allocation
|
page read and write
|
||
48D800090000
|
trusted library allocation
|
page read and write
|
||
18A5469E000
|
heap
|
page read and write
|
||
50C0000FC000
|
trusted library allocation
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
2DF126AD000
|
heap
|
page read and write
|
||
2DF12615000
|
heap
|
page read and write
|
||
1CFF157A000
|
heap
|
page read and write
|
||
2DF106C1000
|
heap
|
page read and write
|
||
2DF12624000
|
heap
|
page read and write
|
||
2DF105DA000
|
heap
|
page read and write
|
||
7DDE000D4000
|
trusted library allocation
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF128C7000
|
heap
|
page read and write
|
||
2DF128B6000
|
heap
|
page read and write
|
||
2DF1266D000
|
heap
|
page read and write
|
||
31A0000
|
unkown
|
page read and write
|
||
2DF1266D000
|
heap
|
page read and write
|
||
CA433F2000
|
stack
|
page read and write
|
||
2DF105F0000
|
heap
|
page read and write
|
||
2DF1263C000
|
heap
|
page read and write
|
||
542E000
|
stack
|
page read and write
|
||
2DF10629000
|
heap
|
page read and write
|
||
18A52C90000
|
unkown
|
page read and write
|
||
48DC00E58000
|
trusted library allocation
|
page read and write
|
||
18A546E8000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
48DC01004000
|
trusted library allocation
|
page read and write
|
||
1CFE8640000
|
heap
|
page read and write
|
||
5270000
|
unclassified section
|
page readonly
|
||
3142000
|
heap
|
page read and write
|
||
18A5469F000
|
heap
|
page read and write
|
||
2164EA80000
|
heap
|
page read and write
|
||
48DC00088000
|
trusted library allocation
|
page read and write
|
||
48D80013D000
|
trusted library allocation
|
page read and write
|
||
1E607270000
|
unkown
|
page read and write
|
||
2DF10698000
|
heap
|
page read and write
|
||
21650B20000
|
heap
|
page read and write
|
||
2DF128C6000
|
heap
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
2DF105D7000
|
heap
|
page read and write
|
||
2DF12664000
|
heap
|
page read and write
|
||
1CFF1770000
|
unkown
|
page readonly
|
||
3132000
|
heap
|
page read and write
|
||
181800090000
|
trusted library allocation
|
page read and write
|
||
2164EC26000
|
heap
|
page read and write
|
||
1CFF1550000
|
heap
|
page read and write
|
||
73D40008C000
|
direct allocation
|
page read and write
|
||
2DF12560000
|
heap
|
page read and write
|
||
25AD122F000
|
heap
|
page read and write
|
||
2DF1266D000
|
heap
|
page read and write
|
||
2DF128B6000
|
heap
|
page read and write
|
||
1CFF1780000
|
trusted library section
|
page read and write
|
||
2DF12670000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2164EC89000
|
heap
|
page read and write
|
||
48DC002F0000
|
trusted library allocation
|
page read and write
|
||
3112000
|
heap
|
page read and write
|
||
8E58FFF000
|
stack
|
page read and write
|
||
48DC009D0000
|
trusted library allocation
|
page read and write
|
||
1818000E8000
|
trusted library allocation
|
page read and write
|
||
48D800004000
|
trusted library allocation
|
page read and write
|
||
50C000120000
|
trusted library allocation
|
page read and write
|
||
2164EC99000
|
heap
|
page read and write
|
||
2DF128B6000
|
heap
|
page read and write
|
||
2DF1266D000
|
heap
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
48DC0121C000
|
trusted library allocation
|
page read and write
|
||
2164ECCC000
|
heap
|
page read and write
|
||
48DC0019C000
|
trusted library allocation
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
2DF106DE000
|
heap
|
page read and write
|
||
18A52C90000
|
trusted library allocation
|
page read and write
|
||
E685C7E000
|
stack
|
page read and write
|
||
739000
|
unkown
|
page execute and read and write
|
||
181800084000
|
trusted library allocation
|
page read and write
|
||
2DF1267E000
|
heap
|
page read and write
|
||
2DF1263A000
|
heap
|
page read and write
|
||
2DF128D4000
|
heap
|
page read and write
|
||
2DF1285D000
|
heap
|
page read and write
|
||
2DF128AE000
|
heap
|
page read and write
|
||
2DF105F4000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF128C5000
|
heap
|
page read and write
|
||
300F000
|
heap
|
page read and write
|
||
2DF1062E000
|
heap
|
page read and write
|
||
48DC00EDC000
|
trusted library allocation
|
page read and write
|
||
2DF12685000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF12655000
|
heap
|
page read and write
|
||
2DF10562000
|
heap
|
page read and write
|
||
2DF12685000
|
heap
|
page read and write
|
||
2DF128A7000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF105D9000
|
heap
|
page read and write
|
||
1CFEBD3D000
|
heap
|
page read and write
|
||
48DC003E4000
|
trusted library allocation
|
page read and write
|
||
2DF10609000
|
heap
|
page read and write
|
||
50C000448000
|
trusted library allocation
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
7A000001000
|
trusted library allocation
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
1CFF1557000
|
heap
|
page read and write
|
||
2DF10560000
|
heap
|
page read and write
|
||
2DF128E0000
|
heap
|
page read and write
|
||
F99B9FF000
|
stack
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
48DC00FD8000
|
trusted library allocation
|
page read and write
|
||
2DF12644000
|
heap
|
page read and write
|
||
2DF1263C000
|
heap
|
page read and write
|
||
2DF10698000
|
heap
|
page read and write
|
||
7944FFE000
|
unkown
|
page read and write
|
||
2DF10612000
|
heap
|
page read and write
|
||
2DF12625000
|
heap
|
page read and write
|
||
48DC002B0000
|
trusted library allocation
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
29FB000
|
stack
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
2DF1240E000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
48DC00904000
|
trusted library allocation
|
page read and write
|
||
48DC00BC4000
|
trusted library allocation
|
page read and write
|
||
2DF128E0000
|
heap
|
page read and write
|
||
32C0000
|
direct allocation
|
page read and write
|
||
48D800201000
|
trusted library allocation
|
page read and write
|
||
50C000494000
|
trusted library allocation
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
2DF106B0000
|
heap
|
page read and write
|
||
2DF10436000
|
heap
|
page read and write
|
||
48DC00914000
|
trusted library allocation
|
page read and write
|
||
2DF12615000
|
heap
|
page read and write
|
||
3068000
|
heap
|
page read and write
|
||
50C000401000
|
trusted library allocation
|
page read and write
|
||
2DF10615000
|
heap
|
page read and write
|
||
2DF106B3000
|
heap
|
page read and write
|
||
50C000430000
|
trusted library allocation
|
page read and write
|
||
2DF10680000
|
heap
|
page read and write
|
||
2DF128D4000
|
heap
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
2DF12654000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
794EFFC000
|
stack
|
page read and write
|
||
48DC011B4000
|
trusted library allocation
|
page read and write
|
||
48DC001B1000
|
trusted library allocation
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
48DC010F4000
|
trusted library allocation
|
page read and write
|
||
2DF12642000
|
heap
|
page read and write
|
||
2DF105F0000
|
heap
|
page read and write
|
||
216E00088000
|
direct allocation
|
page read and write
|
||
2DF12685000
|
heap
|
page read and write
|
||
2DF1263C000
|
heap
|
page read and write
|
||
2DF12624000
|
heap
|
page read and write
|
||
2DF106AA000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
1CFE86A4000
|
heap
|
page read and write
|
||
48DC0075C000
|
trusted library allocation
|
page read and write
|
||
2DF126A4000
|
heap
|
page read and write
|
||
18A5297D000
|
unkown
|
page read and write
|
||
2DF106C2000
|
heap
|
page read and write
|
||
48DC00294000
|
trusted library allocation
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
48DC002B0000
|
trusted library allocation
|
page read and write
|
||
2DF1269D000
|
heap
|
page read and write
|
||
50C00049C000
|
trusted library allocation
|
page read and write
|
||
216E000C0000
|
direct allocation
|
page read and write
|
||
1AFE884A000
|
heap
|
page read and write
|
||
2DF106AD000
|
heap
|
page read and write
|
||
1CFF19D0000
|
unkown
|
page readonly
|
||
2DF1289D000
|
heap
|
page read and write
|
||
50C000018000
|
trusted library allocation
|
page read and write
|
||
2DF10612000
|
heap
|
page read and write
|
||
2DF10625000
|
heap
|
page read and write
|
||
48DC0038C000
|
trusted library allocation
|
page read and write
|
||
48DC00220000
|
trusted library allocation
|
page read and write
|
||
5270000
|
unkown
|
page read and write
|
||
48D8000EC000
|
trusted library allocation
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
7DDE0002C000
|
trusted library allocation
|
page read and write
|
||
2DF128A0000
|
heap
|
page read and write
|
||
CA48BF9000
|
stack
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF12695000
|
heap
|
page read and write
|
||
48DC00590000
|
trusted library allocation
|
page read and write
|
||
2DF1061E000
|
heap
|
page read and write
|
||
48DC00704000
|
trusted library allocation
|
page read and write
|
||
48DC001EC000
|
trusted library allocation
|
page read and write
|
||
25AD1202000
|
heap
|
page read and write
|
||
2DF128A0000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
818000D4000
|
direct allocation
|
page read and write
|
||
2DF1062C000
|
heap
|
page read and write
|
||
2DF126AD000
|
heap
|
page read and write
|
||
2DF106C4000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
F99BAFE000
|
stack
|
page read and write
|
||
2DF12654000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2DF12634000
|
heap
|
page read and write
|
||
18180004C000
|
trusted library allocation
|
page read and write
|
||
1E607100000
|
unkown
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF128C1000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF1262C000
|
heap
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
377F000
|
stack
|
page read and write
|
||
2DF106CA000
|
heap
|
page read and write
|
||
D9E000
|
heap
|
page read and write
|
||
48DC00D34000
|
trusted library allocation
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
E685F7B000
|
stack
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
32A0000
|
unkown
|
page read and write
|
||
CA45BFF000
|
stack
|
page read and write
|
||
2DF12897000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
1AFE885A000
|
heap
|
page read and write
|
||
E685E7B000
|
stack
|
page read and write
|
||
7DDE000F0000
|
trusted library allocation
|
page read and write
|
||
18A52CA0000
|
direct allocation
|
page execute and read and write
|
||
3474000
|
unkown
|
page read and write
|
||
2DF126B5000
|
heap
|
page read and write
|
||
50C000518000
|
trusted library allocation
|
page read and write
|
||
8E567FC000
|
stack
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2DF12670000
|
heap
|
page read and write
|
||
2DF106C2000
|
heap
|
page read and write
|
||
2DF12655000
|
heap
|
page read and write
|
||
319F000
|
heap
|
page read and write
|
||
2DF105D7000
|
heap
|
page read and write
|
||
2DF128B2000
|
heap
|
page read and write
|
||
2DF12634000
|
heap
|
page read and write
|
||
48D800084000
|
trusted library allocation
|
page read and write
|
||
216508E0000
|
heap
|
page read and write
|
||
2DF106B3000
|
heap
|
page read and write
|
||
48DC00BBC000
|
trusted library allocation
|
page read and write
|
||
48DC00FBC000
|
trusted library allocation
|
page read and write
|
||
2DF10601000
|
heap
|
page read and write
|
||
CA52BFE000
|
stack
|
page read and write
|
||
48DC003A0000
|
trusted library allocation
|
page read and write
|
||
2DF12674000
|
heap
|
page read and write
|
||
216E0013C000
|
direct allocation
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
323F000
|
stack
|
page read and write
|
||
2DF128B2000
|
heap
|
page read and write
|
||
55E4000
|
unkown
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
1E605042000
|
system
|
page execute and read and write
|
||
3142000
|
heap
|
page read and write
|
||
1818000A0000
|
trusted library allocation
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF12624000
|
heap
|
page read and write
|
||
48D800110000
|
trusted library allocation
|
page read and write
|
||
CA4ABFE000
|
stack
|
page read and write
|
||
7A0000B8000
|
trusted library allocation
|
page read and write
|
||
7DF40F751000
|
unkown
|
page execute read
|
||
6E0000
|
direct allocation
|
page read and write
|
||
2DF128AD000
|
heap
|
page read and write
|
||
48DC00A04000
|
trusted library allocation
|
page read and write
|
||
48DC010E8000
|
trusted library allocation
|
page read and write
|
||
48DC00E04000
|
trusted library allocation
|
page read and write
|
||
48DC00801000
|
trusted library allocation
|
page read and write
|
||
2DF1262B000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF12664000
|
heap
|
page read and write
|
||
2DF12654000
|
heap
|
page read and write
|
||
2DF128D8000
|
heap
|
page read and write
|
||
2DF1262E000
|
heap
|
page read and write
|
||
2DF128A0000
|
heap
|
page read and write
|
||
48DC00FCC000
|
trusted library allocation
|
page read and write
|
||
7DDE00064000
|
trusted library allocation
|
page read and write
|
||
48DC00504000
|
trusted library allocation
|
page read and write
|
||
2DF1060A000
|
heap
|
page read and write
|
||
48D800148000
|
trusted library allocation
|
page read and write
|
||
CA563FD000
|
stack
|
page read and write
|
||
2DF12654000
|
heap
|
page read and write
|
||
2DF10690000
|
heap
|
page read and write
|
||
2DF12654000
|
heap
|
page read and write
|
||
2DF1266D000
|
heap
|
page read and write
|
||
48DC002E5000
|
trusted library allocation
|
page read and write
|
||
B24000
|
heap
|
page read and write
|
||
2DF128C5000
|
heap
|
page read and write
|
||
2DF103FE000
|
heap
|
page read and write
|
||
5550000
|
direct allocation
|
page read and write
|
||
2DF1263C000
|
heap
|
page read and write
|
||
2164ECFF000
|
heap
|
page read and write
|
||
18A54C3F000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
E685CFB000
|
stack
|
page read and write
|
||
48D800218000
|
trusted library allocation
|
page read and write
|
||
48DC004CC000
|
trusted library allocation
|
page read and write
|
||
2DF12665000
|
heap
|
page read and write
|
||
48DC01124000
|
trusted library allocation
|
page read and write
|
||
18A5471E000
|
heap
|
page read and write
|
||
48D800094000
|
trusted library allocation
|
page read and write
|
||
81800038000
|
direct allocation
|
page read and write
|
||
81800098000
|
direct allocation
|
page read and write
|
||
7DDE000B4000
|
trusted library allocation
|
page read and write
|
||
2DF10683000
|
heap
|
page read and write
|
||
2DF12636000
|
heap
|
page read and write
|
||
794D7FD000
|
stack
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF128C5000
|
heap
|
page read and write
|
||
2DF128B5000
|
heap
|
page read and write
|
||
CA43BFE000
|
unkown
|
page read and write
|
||
48DC00514000
|
trusted library allocation
|
page read and write
|
||
2DF12670000
|
heap
|
page read and write
|
||
2164EC62000
|
heap
|
page read and write
|
||
2DF1263C000
|
heap
|
page read and write
|
||
2DF10680000
|
heap
|
page read and write
|
||
1AFE85D0000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
1E606F10000
|
unkown
|
page read and write
|
||
181800058000
|
trusted library allocation
|
page read and write
|
||
1AFE89ED000
|
heap
|
page read and write
|
||
2DF126AD000
|
heap
|
page read and write
|
||
18A52CA0000
|
direct allocation
|
page execute and read and write
|
||
2DF106DD000
|
heap
|
page read and write
|
||
48DC00300000
|
trusted library allocation
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF12654000
|
heap
|
page read and write
|
||
73D40000C000
|
direct allocation
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF12615000
|
heap
|
page read and write
|
||
2DF126B5000
|
heap
|
page read and write
|
||
2DF105E8000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF1285E000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF12664000
|
heap
|
page read and write
|
||
48DC0004C000
|
trusted library allocation
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
2DF128A5000
|
heap
|
page read and write
|
||
25AD10A0000
|
heap
|
page read and write
|
||
73D400090000
|
direct allocation
|
page read and write
|
||
48DC0014C000
|
trusted library allocation
|
page read and write
|
||
B24000
|
heap
|
page read and write
|
||
18A52921000
|
unkown
|
page execute read
|
||
48DC00F78000
|
trusted library allocation
|
page read and write
|
||
2DF1266D000
|
heap
|
page read and write
|
||
48DC00410000
|
trusted library allocation
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
2DF12636000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
48DC0012C000
|
trusted library allocation
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
48DC00370000
|
trusted library allocation
|
page read and write
|
||
2DF1263C000
|
heap
|
page read and write
|
||
2DF1267D000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
7A000018000
|
trusted library allocation
|
page read and write
|
||
CA4DBFE000
|
stack
|
page read and write
|
||
2DF128A3000
|
heap
|
page read and write
|
||
48DC0084C000
|
trusted library allocation
|
page read and write
|
||
CA47BFC000
|
stack
|
page read and write
|
||
48DC00604000
|
trusted library allocation
|
page read and write
|
||
48DC00958000
|
trusted library allocation
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
D2D000
|
heap
|
page read and write
|
||
2DF1266D000
|
heap
|
page read and write
|
||
2DF12080000
|
trusted library allocation
|
page read and write
|
||
2DF12654000
|
heap
|
page read and write
|
||
2DF1269D000
|
heap
|
page read and write
|
||
2DF106CF000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
307E000
|
heap
|
page read and write
|
||
2DF106DE000
|
heap
|
page read and write
|
||
2DF1266D000
|
heap
|
page read and write
|
||
2DF128DD000
|
heap
|
page read and write
|
||
216E000AC000
|
direct allocation
|
page read and write
|
||
1AFE89CF000
|
heap
|
page read and write
|
||
48DC00201000
|
trusted library allocation
|
page read and write
|
||
216E00100000
|
direct allocation
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
CA4FBFF000
|
stack
|
page read and write
|
||
E6860FE000
|
stack
|
page read and write
|
||
77C000
|
unkown
|
page readonly
|
||
32F0000
|
unkown
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
3100000
|
unkown
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
CA5ABFF000
|
stack
|
page read and write
|
||
3153000
|
heap
|
page read and write
|
||
2DF128A5000
|
heap
|
page read and write
|
||
7DDE0011C000
|
trusted library allocation
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
48DC0049C000
|
trusted library allocation
|
page read and write
|
||
2DF1286D000
|
heap
|
page read and write
|
||
18A54C3F000
|
heap
|
page read and write
|
||
2DF10697000
|
heap
|
page read and write
|
||
48DC00EC0000
|
trusted library allocation
|
page read and write
|
||
2DF1263C000
|
heap
|
page read and write
|
||
2DF126B3000
|
heap
|
page read and write
|
||
2DF1263C000
|
heap
|
page read and write
|
||
7DF4C685A000
|
unkown
|
page read and write
|
||
2DF126A4000
|
heap
|
page read and write
|
||
2DF12685000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
818000E4000
|
direct allocation
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF12634000
|
heap
|
page read and write
|
||
2DF128B2000
|
heap
|
page read and write
|
||
48D80002C000
|
trusted library allocation
|
page read and write
|
||
2DF12664000
|
heap
|
page read and write
|
||
794E7FE000
|
stack
|
page read and write
|
||
216E0001C000
|
direct allocation
|
page read and write
|
||
2DF12685000
|
heap
|
page read and write
|
||
2DF12624000
|
heap
|
page read and write
|
||
2DF106D5000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
7DF4C6856000
|
unkown
|
page read and write
|
||
7A0000A4000
|
trusted library allocation
|
page read and write
|
||
2DF10625000
|
heap
|
page read and write
|
||
2DF1263C000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2164ECC0000
|
heap
|
page read and write
|
||
2DF12879000
|
heap
|
page read and write
|
||
7A000088000
|
trusted library allocation
|
page read and write
|
||
2DF12654000
|
heap
|
page read and write
|
||
2DF126AD000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
2DF1062E000
|
heap
|
page read and write
|
||
18A54AC0000
|
heap
|
page read and write
|
||
50C000130000
|
trusted library allocation
|
page read and write
|
||
48DC008F0000
|
trusted library allocation
|
page read and write
|
||
48DC00B2C000
|
trusted library allocation
|
page read and write
|
||
2DF10617000
|
heap
|
page read and write
|
||
CA503FA000
|
stack
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
48D800114000
|
trusted library allocation
|
page read and write
|
||
E68590E000
|
stack
|
page read and write
|
||
2DF1269D000
|
heap
|
page read and write
|
||
2DF106B1000
|
heap
|
page read and write
|
||
2DF128DD000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
79547FF000
|
trusted library allocation
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
81800054000
|
direct allocation
|
page read and write
|
||
2DF128AD000
|
heap
|
page read and write
|
||
216E00040000
|
direct allocation
|
page read and write
|
||
2DF1267D000
|
heap
|
page read and write
|
||
1CFEFC94000
|
trusted library allocation
|
page read and write
|
||
2DF12615000
|
heap
|
page read and write
|
||
1AFE87E0000
|
heap
|
page readonly
|
||
2DF12665000
|
heap
|
page read and write
|
||
2DF12654000
|
heap
|
page read and write
|
||
181800048000
|
trusted library allocation
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
3100000
|
unkown
|
page read and write
|
||
CA583FE000
|
stack
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
1CFEBD2F000
|
heap
|
page read and write
|
||
2DF106CE000
|
heap
|
page read and write
|
||
2DF1061B000
|
heap
|
page read and write
|
||
2DF128DD000
|
heap
|
page read and write
|
||
2DF106B3000
|
heap
|
page read and write
|
||
48DC00928000
|
trusted library allocation
|
page read and write
|
||
48DC001E8000
|
trusted library allocation
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF1263C000
|
heap
|
page read and write
|
||
48DC0018C000
|
trusted library allocation
|
page read and write
|
||
48DC0041C000
|
trusted library allocation
|
page read and write
|
||
2DF128C5000
|
heap
|
page read and write
|
||
48DC00208000
|
trusted library allocation
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
73D40007C000
|
direct allocation
|
page read and write
|
||
CA523FB000
|
stack
|
page read and write
|
||
2DF128B2000
|
heap
|
page read and write
|
||
2DF128D4000
|
heap
|
page read and write
|
||
48DC0124C000
|
trusted library allocation
|
page read and write
|
||
2DF106DC000
|
heap
|
page read and write
|
||
373E000
|
stack
|
page read and write
|
||
1CFEBD38000
|
heap
|
page read and write
|
||
2DF1267D000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2DF12670000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF106D6000
|
heap
|
page read and write
|
||
2DF10612000
|
heap
|
page read and write
|
||
48D800108000
|
trusted library allocation
|
page read and write
|
||
2DF12670000
|
heap
|
page read and write
|
||
2DF103D0000
|
unclassified section
|
page readonly
|
||
1AFE89DA000
|
heap
|
page read and write
|
||
2DF12638000
|
heap
|
page read and write
|
||
48DC00BD0000
|
trusted library allocation
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
50C000498000
|
trusted library allocation
|
page read and write
|
||
216E00078000
|
direct allocation
|
page read and write
|
||
2DF12654000
|
heap
|
page read and write
|
||
48DC009D8000
|
trusted library allocation
|
page read and write
|
||
48DC001F8000
|
trusted library allocation
|
page read and write
|
||
25AD1040000
|
heap
|
page readonly
|
||
48DC00214000
|
trusted library allocation
|
page read and write
|
||
2DF128E2000
|
heap
|
page read and write
|
||
2DF10451000
|
heap
|
page read and write
|
||
79587FF000
|
trusted library allocation
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
50C0001D0000
|
trusted library allocation
|
page read and write
|
||
2DF105E0000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
1CFF20F7000
|
unclassified section
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
5601000
|
heap
|
page read and write
|
||
73D40006C000
|
direct allocation
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
81800028000
|
direct allocation
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
48DC00974000
|
trusted library allocation
|
page read and write
|
||
2F6E000
|
heap
|
page read and write
|
||
2DF12616000
|
heap
|
page read and write
|
||
2DF12625000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
749000
|
unkown
|
page readonly
|
||
2DF10625000
|
heap
|
page read and write
|
||
1CFE86B5000
|
heap
|
page read and write
|
||
50C00017C000
|
trusted library allocation
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
CA5A3FF000
|
stack
|
page read and write
|
||
50C0001C4000
|
trusted library allocation
|
page read and write
|
||
48DC00C88000
|
trusted library allocation
|
page read and write
|
||
D9E000
|
heap
|
page read and write
|
||
2DF106C1000
|
heap
|
page read and write
|
||
E68599F000
|
stack
|
page read and write
|
||
795BFFC000
|
stack
|
page read and write
|
||
2DF126B4000
|
heap
|
page read and write
|
||
21650B54000
|
heap
|
page read and write
|
||
7953FFF000
|
trusted library allocation
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
1CFEBF70000
|
heap
|
page read and write
|
||
2DF12561000
|
heap
|
page read and write
|
||
48D800048000
|
trusted library allocation
|
page read and write
|
||
1CFE8687000
|
heap
|
page read and write
|
||
2164EC78000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
48D800208000
|
trusted library allocation
|
page read and write
|
||
48D80014C000
|
trusted library allocation
|
page read and write
|
||
21650B3B000
|
heap
|
page read and write
|
||
2DF128DD000
|
heap
|
page read and write
|
||
1CFE8712000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
50C0000E9000
|
trusted library allocation
|
page read and write
|
||
2DF106AA000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
1CFEE390000
|
trusted library allocation
|
page read and write
|
||
CA513FC000
|
stack
|
page read and write
|
||
1CFEC29D000
|
heap
|
page read and write
|
||
2DF128B2000
|
heap
|
page read and write
|
||
2DF12648000
|
heap
|
page read and write
|
||
1AFE89E9000
|
heap
|
page read and write
|
||
2DF106AD000
|
heap
|
page read and write
|
||
2DF1267D000
|
heap
|
page read and write
|
||
2DF10698000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
1CFF1999000
|
unkown
|
page readonly
|
||
79537FE000
|
stack
|
page read and write
|
||
48D8000F4000
|
trusted library allocation
|
page read and write
|
||
2DF106D6000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
48DC003F4000
|
trusted library allocation
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
1CFF0270000
|
trusted library section
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
7A000050000
|
trusted library allocation
|
page read and write
|
||
2DF12615000
|
heap
|
page read and write
|
||
7DDE00100000
|
trusted library allocation
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2DF106AD000
|
heap
|
page read and write
|
||
2DF106AD000
|
heap
|
page read and write
|
||
48D800108000
|
trusted library allocation
|
page read and write
|
||
2DF12655000
|
heap
|
page read and write
|
||
2DF1263C000
|
heap
|
page read and write
|
||
1CFEC291000
|
heap
|
page read and write
|
||
2DF128DD000
|
heap
|
page read and write
|
||
C7E000
|
stack
|
page read and write
|
||
2DF12634000
|
heap
|
page read and write
|
||
2DF128B9000
|
heap
|
page read and write
|
||
7948FFE000
|
stack
|
page read and write
|
||
21650B2B000
|
heap
|
page read and write
|
||
2DF126B4000
|
heap
|
page read and write
|
||
2DF12654000
|
heap
|
page read and write
|
||
2DF1067E000
|
heap
|
page read and write
|
||
1818000AC000
|
trusted library allocation
|
page read and write
|
||
2DF1267D000
|
heap
|
page read and write
|
||
2DF12664000
|
heap
|
page read and write
|
||
216531E0000
|
trusted library allocation
|
page read and write
|
||
48DC00180000
|
trusted library allocation
|
page read and write
|
||
48DC003D8000
|
trusted library allocation
|
page read and write
|
||
48DC00CEC000
|
trusted library allocation
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
1CFE870C000
|
heap
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
2DF128E2000
|
heap
|
page read and write
|
||
3220000
|
unkown
|
page read and write
|
||
48DC00574000
|
trusted library allocation
|
page read and write
|
||
48DC00D48000
|
trusted library allocation
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
2DF12655000
|
heap
|
page read and write
|
||
2DF128B2000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF12878000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
50C00018C000
|
trusted library allocation
|
page read and write
|
||
31A1000
|
heap
|
page read and write
|
||
2DF106C1000
|
heap
|
page read and write
|
||
700000
|
unkown
|
page readonly
|
||
3142000
|
heap
|
page read and write
|
||
2DF125B4000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF1266D000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2DF12634000
|
heap
|
page read and write
|
||
2DF1061E000
|
heap
|
page read and write
|
||
2DF128CF000
|
heap
|
page read and write
|
||
7A0000C0000
|
trusted library allocation
|
page read and write
|
||
48DC01284000
|
trusted library allocation
|
page read and write
|
||
2DF106D8000
|
heap
|
page read and write
|
||
2DF10626000
|
heap
|
page read and write
|
||
216E000F8000
|
direct allocation
|
page read and write
|
||
2DF126C5000
|
heap
|
page read and write
|
||
2DF12685000
|
heap
|
page read and write
|
||
2DF106CA000
|
heap
|
page read and write
|
||
48DC00B48000
|
trusted library allocation
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF12869000
|
heap
|
page read and write
|
||
21651790000
|
unkown
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
CA57BFD000
|
stack
|
page read and write
|
||
48DC00240000
|
trusted library allocation
|
page read and write
|
||
1E60503E000
|
system
|
page execute and read and write
|
||
2DF106D2000
|
heap
|
page read and write
|
||
2DF1269D000
|
heap
|
page read and write
|
||
2DF128DD000
|
heap
|
page read and write
|
||
1E605100000
|
heap
|
page readonly
|
||
1CFF19D5000
|
unkown
|
page readonly
|
||
3142000
|
heap
|
page read and write
|
||
48DC002E0000
|
trusted library allocation
|
page read and write
|
||
2DF126B4000
|
heap
|
page read and write
|
||
CA54BFF000
|
stack
|
page read and write
|
||
1CFE8740000
|
heap
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
2DF106AD000
|
heap
|
page read and write
|
||
2DF12615000
|
heap
|
page read and write
|
||
216531E0000
|
trusted library allocation
|
page read and write
|
||
5320000
|
unkown
|
page read and write
|
||
794C7FD000
|
stack
|
page read and write
|
||
73D4000B0000
|
direct allocation
|
page read and write
|
||
2DF12664000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF12656000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
5701000
|
heap
|
page read and write
|
||
2DF1061E000
|
heap
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
2DF12640000
|
heap
|
page read and write
|
||
5390000
|
unkown
|
page read and write
|
||
1CFF2800000
|
trusted library section
|
page read and write
|
||
2DF10629000
|
heap
|
page read and write
|
||
2DF128B3000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2DF10698000
|
heap
|
page read and write
|
||
2DF128A0000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
2DF106DA000
|
heap
|
page read and write
|
||
2DF106D1000
|
heap
|
page read and write
|
||
48DC00664000
|
trusted library allocation
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
2DF12624000
|
heap
|
page read and write
|
||
2DF128B3000
|
heap
|
page read and write
|
||
7DF40F892000
|
unkown
|
page read and write
|
||
53F0000
|
unkown
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2DF128AE000
|
heap
|
page read and write
|
||
2DF106E0000
|
trusted library allocation
|
page read and write
|
||
50C00046A000
|
trusted library allocation
|
page read and write
|
||
73D4000AC000
|
direct allocation
|
page read and write
|
||
2DF106D1000
|
heap
|
page read and write
|
||
2DF106CA000
|
heap
|
page read and write
|
||
2DF106AF000
|
heap
|
page read and write
|
||
1CFEFCB2000
|
trusted library allocation
|
page read and write
|
||
5A00000
|
heap
|
page read and write
|
||
1CFE87B0000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
50C000438000
|
trusted library allocation
|
page read and write
|
||
2DF12655000
|
heap
|
page read and write
|
||
2DF12624000
|
heap
|
page read and write
|
||
2DF10627000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
48D8000C4000
|
trusted library allocation
|
page read and write
|
||
7945FFD000
|
stack
|
page read and write
|
||
2DF1061E000
|
heap
|
page read and write
|
||
B24000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
48DC00A74000
|
trusted library allocation
|
page read and write
|
||
34FC000
|
unkown
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2DF12670000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF12642000
|
heap
|
page read and write
|
||
79597FB000
|
unkown
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
2DF126B4000
|
heap
|
page read and write
|
||
2DF12654000
|
heap
|
page read and write
|
||
2DF1061F000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
2DF1264C000
|
heap
|
page read and write
|
||
48DC0070C000
|
trusted library allocation
|
page read and write
|
||
48DC0079C000
|
trusted library allocation
|
page read and write
|
||
2DF106A3000
|
heap
|
page read and write
|
||
181800018000
|
trusted library allocation
|
page read and write
|
||
2DF106C1000
|
heap
|
page read and write
|
||
2DF128A5000
|
heap
|
page read and write
|
||
79527FE000
|
stack
|
page read and write
|
||
2DF128B6000
|
heap
|
page read and write
|
||
2DF12695000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
2DF105EA000
|
heap
|
page read and write
|
||
2DF10607000
|
heap
|
page read and write
|
||
52EE000
|
stack
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
2DF1060F000
|
heap
|
page read and write
|
||
18A52980000
|
unkown
|
page execute and read and write
|
||
2DF1062C000
|
heap
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
2DF12695000
|
heap
|
page read and write
|
||
CA4A3FE000
|
stack
|
page read and write
|
||
2DF1264B000
|
heap
|
page read and write
|
||
2DF106AD000
|
heap
|
page read and write
|
||
2DF12615000
|
heap
|
page read and write
|
||
2DF128A5000
|
heap
|
page read and write
|
||
CBE000
|
stack
|
page read and write
|
||
2DF1062B000
|
heap
|
page read and write
|
||
48D800070000
|
trusted library allocation
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF106B5000
|
heap
|
page read and write
|
||
50C000140000
|
trusted library allocation
|
page read and write
|
||
2DF10455000
|
heap
|
page read and write
|
||
1CFEB1E0000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
5520000
|
heap
|
page read and write
|
||
48D800018000
|
trusted library allocation
|
page read and write
|
||
2DF105F1000
|
heap
|
page read and write
|
||
2DF126A5000
|
heap
|
page read and write
|
||
2DF128B1000
|
heap
|
page read and write
|
||
2DF12656000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
79557FF000
|
trusted library allocation
|
page read and write
|
||
18A52920000
|
unkown
|
page read and write
|
||
1E605080000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
18A529CA000
|
heap
|
page read and write
|
||
2DF1267D000
|
heap
|
page read and write
|
||
CA553FD000
|
stack
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
48D800074000
|
trusted library allocation
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
50C000450000
|
trusted library allocation
|
page read and write
|
||
2DF1267D000
|
heap
|
page read and write
|
||
50C0000EC000
|
trusted library allocation
|
page read and write
|
||
48DC003F8000
|
trusted library allocation
|
page read and write
|
||
2DF1264C000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF128C5000
|
heap
|
page read and write
|
||
7A00006C000
|
trusted library allocation
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
2DF12634000
|
heap
|
page read and write
|
||
21650B0F000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
31A1000
|
heap
|
page read and write
|
||
48DC002B4000
|
trusted library allocation
|
page read and write
|
||
18180002C000
|
trusted library allocation
|
page read and write
|
||
2DF12624000
|
heap
|
page read and write
|
||
48DC00158000
|
trusted library allocation
|
page read and write
|
||
48DC009E0000
|
trusted library allocation
|
page read and write
|
||
48D800034000
|
trusted library allocation
|
page read and write
|
||
2DF1267D000
|
heap
|
page read and write
|
||
2DF106B3000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF125AA000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF1263E000
|
heap
|
page read and write
|
||
3320000
|
unkown
|
page read and write
|
||
7DF4C6860000
|
unkown
|
page read and write
|
||
50C00040C000
|
trusted library allocation
|
page read and write
|
||
7DF4C6864000
|
unkown
|
page read and write
|
||
2DF12648000
|
heap
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
D29000
|
heap
|
page read and write
|
||
48DC00004000
|
trusted library allocation
|
page read and write
|
||
48DC00038000
|
trusted library allocation
|
page read and write
|
||
48DC00601000
|
trusted library allocation
|
page read and write
|
||
48DC000B1000
|
trusted library allocation
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
1CFF27D7000
|
unclassified section
|
page read and write
|
||
7954FFF000
|
trusted library allocation
|
page read and write
|
||
2DF1062E000
|
heap
|
page read and write
|
||
181800001000
|
trusted library allocation
|
page read and write
|
||
2DF12654000
|
heap
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
50C00004C000
|
trusted library allocation
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
48DC0041C000
|
trusted library allocation
|
page read and write
|
||
D75000
|
heap
|
page read and write
|
||
36734FC000
|
stack
|
page read and write
|
||
2DF1061E000
|
heap
|
page read and write
|
||
48DC00730000
|
trusted library allocation
|
page read and write
|
||
216E00105000
|
direct allocation
|
page read and write
|
||
2DF1264B000
|
heap
|
page read and write
|
||
181800090000
|
trusted library allocation
|
page read and write
|
||
2DF12664000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
1CFEC2CA000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
50C00010C000
|
trusted library allocation
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF1267D000
|
heap
|
page read and write
|
||
2DF12895000
|
heap
|
page read and write
|
||
D76000
|
heap
|
page read and write
|
||
73D400058000
|
direct allocation
|
page read and write
|
||
7956FFF000
|
trusted library allocation
|
page read and write
|
||
48DC00218000
|
trusted library allocation
|
page read and write
|
||
2DF106D8000
|
heap
|
page read and write
|
||
48DC010D8000
|
trusted library allocation
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF10615000
|
heap
|
page read and write
|
||
7A0000B4000
|
trusted library allocation
|
page read and write
|
||
2DF128B5000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF12624000
|
heap
|
page read and write
|
||
181800004000
|
trusted library allocation
|
page read and write
|
||
2DF106C2000
|
heap
|
page read and write
|
||
1AFE89D8000
|
heap
|
page read and write
|
||
5460000
|
unkown
|
page read and write
|
||
77A000
|
unkown
|
page read and write
|
||
2DF128B5000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
1CFF1CF0000
|
trusted library section
|
page read and write
|
||
7A0000A4000
|
trusted library allocation
|
page read and write
|
||
2DF1264C000
|
heap
|
page read and write
|
||
48DC00C3C000
|
trusted library allocation
|
page read and write
|
||
2DF10610000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
50C000480000
|
trusted library allocation
|
page read and write
|
||
2DF10617000
|
heap
|
page read and write
|
||
B24000
|
heap
|
page read and write
|
||
48DC011C0000
|
trusted library allocation
|
page read and write
|
||
7A000064000
|
trusted library allocation
|
page read and write
|
||
E685DFB000
|
stack
|
page read and write
|
||
181800074000
|
trusted library allocation
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
2DF128C5000
|
heap
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
2DF12655000
|
heap
|
page read and write
|
||
B24000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
48DC00C9C000
|
trusted library allocation
|
page read and write
|
||
2DF128B5000
|
heap
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
1CFEC31B000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
2DF12761000
|
heap
|
page read and write
|
||
2DF106CE000
|
heap
|
page read and write
|
||
2DF128A5000
|
heap
|
page read and write
|
||
2DF128DD000
|
heap
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
2DF106C1000
|
heap
|
page read and write
|
||
48DC01204000
|
trusted library allocation
|
page read and write
|
||
2DF12654000
|
heap
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
5280000
|
unclassified section
|
page readonly
|
||
48DC00B14000
|
trusted library allocation
|
page read and write
|
||
2DF128DD000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
7DF4C6866000
|
unkown
|
page read and write
|
||
48DC003C8000
|
trusted library allocation
|
page read and write
|
||
48DC00410000
|
trusted library allocation
|
page read and write
|
||
D9E000
|
heap
|
page read and write
|
||
48DC00DCC000
|
trusted library allocation
|
page read and write
|
||
131F000
|
stack
|
page read and write
|
||
2DF128AF000
|
heap
|
page read and write
|
||
73D4000C4000
|
direct allocation
|
page read and write
|
||
CA4E3FE000
|
stack
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2164ECE8000
|
heap
|
page read and write
|
||
2DF12634000
|
heap
|
page read and write
|
||
2DF106A3000
|
heap
|
page read and write
|
||
CA4F3FE000
|
stack
|
page read and write
|
||
2164EC11000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF1056A000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2164EC00000
|
heap
|
page read and write
|
||
21650B49000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
1AFE8750000
|
heap
|
page read and write
|
||
2E02000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF128C5000
|
heap
|
page read and write
|
||
2DF106AD000
|
heap
|
page read and write
|
||
7959FFC000
|
stack
|
page read and write
|
||
1CFF2340000
|
trusted library section
|
page read and write
|
||
2DF12615000
|
heap
|
page read and write
|
||
48DC00230000
|
trusted library allocation
|
page read and write
|
||
81800018000
|
direct allocation
|
page read and write
|
||
2DF106CA000
|
heap
|
page read and write
|
||
18A52D40000
|
heap
|
page read and write
|
||
3191000
|
unkown
|
page read and write
|
||
48DC0005C000
|
trusted library allocation
|
page read and write
|
||
48DC00404000
|
trusted library allocation
|
page read and write
|
||
2DF103A0000
|
heap
|
page readonly
|
||
48DC0101C000
|
trusted library allocation
|
page read and write
|
||
7DDE00078000
|
trusted library allocation
|
page read and write
|
||
2DF10624000
|
heap
|
page read and write
|
||
2DF1267D000
|
heap
|
page read and write
|
||
48DC004F4000
|
trusted library allocation
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
48DC003C8000
|
trusted library allocation
|
page read and write
|
||
2DF128DA000
|
heap
|
page read and write
|
||
21650B43000
|
heap
|
page read and write
|
||
795C7FE000
|
stack
|
page read and write
|
||
794B7FE000
|
stack
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF128C5000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
48DC00204000
|
trusted library allocation
|
page read and write
|
||
77C000
|
unkown
|
page readonly
|
||
1CFF1CD0000
|
unkown
|
page readonly
|
||
2DF12865000
|
heap
|
page read and write
|
||
2DF10627000
|
heap
|
page read and write
|
||
2DF1061F000
|
heap
|
page read and write
|
||
1CFEC278000
|
heap
|
page read and write
|
||
2DF1062C000
|
heap
|
page read and write
|
||
2DF106CA000
|
heap
|
page read and write
|
||
48DC00228000
|
trusted library allocation
|
page read and write
|
||
7DDE000A4000
|
trusted library allocation
|
page read and write
|
||
48DC00C90000
|
trusted library allocation
|
page read and write
|
||
50C00003C000
|
trusted library allocation
|
page read and write
|
||
2164ECFB000
|
heap
|
page read and write
|
||
2DF1060A000
|
heap
|
page read and write
|
||
2DF128D6000
|
heap
|
page read and write
|
||
2DF128B3000
|
heap
|
page read and write
|
||
2DF12615000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
48DC01178000
|
trusted library allocation
|
page read and write
|
||
50C00046C000
|
trusted library allocation
|
page read and write
|
||
48D8000E9000
|
trusted library allocation
|
page read and write
|
||
2DF128B2000
|
heap
|
page read and write
|
||
2164EB90000
|
heap
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
73D400068000
|
direct allocation
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
2DF12615000
|
heap
|
page read and write
|
||
E685EFB000
|
stack
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2DF1067D000
|
heap
|
page read and write
|
||
2DF12648000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2DF12685000
|
heap
|
page read and write
|
||
2DF128B2000
|
heap
|
page read and write
|
||
2DF126DD000
|
heap
|
page read and write
|
||
2DF12685000
|
heap
|
page read and write
|
||
2DF1269D000
|
heap
|
page read and write
|
||
36C0000
|
heap
|
page read and write
|
||
334314C000
|
stack
|
page read and write
|
||
2DF12624000
|
heap
|
page read and write
|
||
2DF106A3000
|
heap
|
page read and write
|
||
7A0000B4000
|
trusted library allocation
|
page read and write
|
||
1CFF1837000
|
unclassified section
|
page read and write
|
||
2DF128C5000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF1285E000
|
heap
|
page read and write
|
||
CA4D3FE000
|
stack
|
page read and write
|
||
81800068000
|
direct allocation
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
50C0000D4000
|
trusted library allocation
|
page read and write
|
||
48DC000CC000
|
trusted library allocation
|
page read and write
|
||
2DF105DE000
|
heap
|
page read and write
|
||
2DF1060A000
|
heap
|
page read and write
|
||
8E577FF000
|
stack
|
page read and write
|
||
1CFF01A0000
|
trusted library section
|
page read and write
|
||
2164EA10000
|
heap
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
2DF106C3000
|
heap
|
page read and write
|
||
21653197000
|
unclassified section
|
page read and write
|
||
7958FFF000
|
trusted library allocation
|
page read and write
|
||
2DF128D8000
|
heap
|
page read and write
|
||
48DC00330000
|
trusted library allocation
|
page read and write
|
||
566C000
|
unkown
|
page read and write
|
||
2DF12670000
|
heap
|
page read and write
|
||
54EC000
|
stack
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF12648000
|
heap
|
page read and write
|
||
1CFE866B000
|
heap
|
page read and write
|
||
2DF10624000
|
heap
|
page read and write
|
||
48D800001000
|
trusted library allocation
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF10624000
|
heap
|
page read and write
|
||
1CFEC27E000
|
heap
|
page read and write
|
||
1CFEBD10000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
2DF12654000
|
heap
|
page read and write
|
||
48DC000DC000
|
trusted library allocation
|
page read and write
|
||
1818000AD000
|
trusted library allocation
|
page read and write
|
||
48D800114000
|
trusted library allocation
|
page read and write
|
||
7DDE00044000
|
trusted library allocation
|
page read and write
|
||
2DF12615000
|
heap
|
page read and write
|
||
50C00002C000
|
trusted library allocation
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
2DF10625000
|
heap
|
page read and write
|
||
2DF128DA000
|
heap
|
page read and write
|
||
2DF12625000
|
heap
|
page read and write
|
||
2DF106B3000
|
heap
|
page read and write
|
||
25AD1213000
|
heap
|
page read and write
|
||
2DF128B4000
|
heap
|
page read and write
|
||
48DC01274000
|
trusted library allocation
|
page read and write
|
||
2DF1064D000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
48DC003A0000
|
trusted library allocation
|
page read and write
|
||
2DF106C5000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
48DC00D5C000
|
trusted library allocation
|
page read and write
|
||
2DF128DA000
|
heap
|
page read and write
|
||
48DC001AC000
|
trusted library allocation
|
page read and write
|
||
48DC00AE0000
|
trusted library allocation
|
page read and write
|
||
50C0004B4000
|
trusted library allocation
|
page read and write
|
||
2DF12624000
|
heap
|
page read and write
|
||
18A545C0000
|
heap
|
page read and write
|
||
48DC002C0000
|
trusted library allocation
|
page read and write
|
||
2DF1062C000
|
heap
|
page read and write
|
||
2DF1061F000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
48DC00814000
|
trusted library allocation
|
page read and write
|
||
48DC00100000
|
trusted library allocation
|
page read and write
|
||
2DF12685000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
B0E000
|
stack
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
2DF12615000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
48DC008B8000
|
trusted library allocation
|
page read and write
|
||
2DF12685000
|
heap
|
page read and write
|
||
48DC000F0000
|
trusted library allocation
|
page read and write
|
||
48DC00888000
|
trusted library allocation
|
page read and write
|
||
50C000470000
|
trusted library allocation
|
page read and write
|
||
B24000
|
heap
|
page read and write
|
||
2DF10604000
|
heap
|
page read and write
|
||
2DF1061E000
|
heap
|
page read and write
|
||
2DF12662000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
25AD11A0000
|
heap
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF12655000
|
heap
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
7DDE000C0000
|
trusted library allocation
|
page read and write
|
||
79447F6000
|
stack
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
2164ECBA000
|
heap
|
page read and write
|
||
50C000218000
|
trusted library allocation
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2DF12664000
|
heap
|
page read and write
|
||
2164EA20000
|
heap
|
page readonly
|
||
2DF106C1000
|
heap
|
page read and write
|
||
2DF1060A000
|
heap
|
page read and write
|
||
2164ECF6000
|
heap
|
page read and write
|
||
2DF12086000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
7DF4C6851000
|
unkown
|
page execute read
|
||
2DF103F0000
|
heap
|
page read and write
|
||
7946FFE000
|
stack
|
page read and write
|
||
8E587FE000
|
stack
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
48DC008E0000
|
trusted library allocation
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
216E00068000
|
direct allocation
|
page read and write
|
||
81800040000
|
direct allocation
|
page read and write
|
||
2DF12664000
|
heap
|
page read and write
|
||
1CFE86D6000
|
heap
|
page read and write
|
||
7951FFE000
|
stack
|
page read and write
|
||
48DC00B68000
|
trusted library allocation
|
page read and write
|
||
2DF12674000
|
heap
|
page read and write
|
||
2DF105E1000
|
heap
|
page read and write
|
||
7DF40F853000
|
unkown
|
page read and write
|
||
2DF126A6000
|
heap
|
page read and write
|
||
50C00016C000
|
trusted library allocation
|
page read and write
|
||
79467FE000
|
stack
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
2DF12634000
|
heap
|
page read and write
|
||
48DC00EB0000
|
trusted library allocation
|
page read and write
|
||
48D800248000
|
trusted library allocation
|
page read and write
|
||
48DC00110000
|
trusted library allocation
|
page read and write
|
||
1CFEBD2C000
|
heap
|
page read and write
|
||
2DF12655000
|
heap
|
page read and write
|
||
1CFF21B0000
|
heap
|
page read and write
|
||
2DF128B2000
|
heap
|
page read and write
|
||
2DF126BA000
|
heap
|
page read and write
|
||
7DDE00001000
|
trusted library allocation
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
1CFE86C4000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF1069F000
|
heap
|
page read and write
|
||
3223000
|
unkown
|
page read and write
|
||
2DF12616000
|
heap
|
page read and write
|
||
794FFFE000
|
stack
|
page read and write
|
||
2DF105DB000
|
heap
|
page read and write
|
||
2DF106B0000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
21653192000
|
unclassified section
|
page read and write
|
||
2DF128AD000
|
heap
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
F99B4FD000
|
stack
|
page read and write
|
||
2DF128B6000
|
heap
|
page read and write
|
||
2DF12665000
|
heap
|
page read and write
|
||
2DF12634000
|
heap
|
page read and write
|
||
2DF12624000
|
heap
|
page read and write
|
||
31A1000
|
heap
|
page read and write
|
||
48DC0068C000
|
trusted library allocation
|
page read and write
|
||
2DF128A0000
|
heap
|
page read and write
|
||
2DF1061E000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
1CFF1981000
|
unkown
|
page readonly
|
||
2DF128A5000
|
heap
|
page read and write
|
||
48DC00704000
|
trusted library allocation
|
page read and write
|
||
2DF128CC000
|
heap
|
page read and write
|
||
2DF106CA000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
73D4000C0000
|
direct allocation
|
page read and write
|
||
48DC010B4000
|
trusted library allocation
|
page read and write
|
||
48DC00024000
|
trusted library allocation
|
page read and write
|
||
1CFF1997000
|
unkown
|
page readonly
|
||
3142000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
3001000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2DF1264C000
|
heap
|
page read and write
|
||
2DF10722000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF12664000
|
heap
|
page read and write
|
||
2DF128A5000
|
heap
|
page read and write
|
||
2DF1263C000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF126B5000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF106C1000
|
heap
|
page read and write
|
||
7DDE00088000
|
trusted library allocation
|
page read and write
|
||
81800084000
|
direct allocation
|
page read and write
|
||
2DF105E9000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
1CFEBD2C000
|
heap
|
page read and write
|
||
48DC00CF8000
|
trusted library allocation
|
page read and write
|
||
48DC00E42000
|
trusted library allocation
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
79457FF000
|
stack
|
page read and write
|
||
2DF128B5000
|
heap
|
page read and write
|
||
48DC00584000
|
trusted library allocation
|
page read and write
|
||
2DF1263E000
|
heap
|
page read and write
|
||
2DF12664000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
48DC00A28000
|
trusted library allocation
|
page read and write
|
||
794AFFE000
|
stack
|
page read and write
|
||
48D80020C000
|
trusted library allocation
|
page read and write
|
||
18A546A7000
|
heap
|
page read and write
|
||
1CFEBD30000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
2DF12871000
|
heap
|
page read and write
|
||
55D0000
|
unkown
|
page read and write
|
||
216E0000C000
|
direct allocation
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
81800001000
|
direct allocation
|
page read and write
|
||
48DC0102C000
|
trusted library allocation
|
page read and write
|
||
79487FE000
|
stack
|
page read and write
|
||
2DF1286D000
|
heap
|
page read and write
|
||
E685D7B000
|
stack
|
page read and write
|
||
48DC01014000
|
trusted library allocation
|
page read and write
|
||
2DF128A5000
|
heap
|
page read and write
|
||
31B0000
|
unkown
|
page read and write
|
||
2DF1060A000
|
heap
|
page read and write
|
||
50C000054000
|
trusted library allocation
|
page read and write
|
||
216E0008C000
|
direct allocation
|
page read and write
|
||
3012000
|
heap
|
page read and write
|
||
2DF105D0000
|
heap
|
page read and write
|
||
2DF12665000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
48DC007D9000
|
trusted library allocation
|
page read and write
|
||
25AD11F0000
|
unclassified section
|
page readonly
|
||
2DF106B0000
|
heap
|
page read and write
|
||
48DC004ED000
|
trusted library allocation
|
page read and write
|
||
2DF12685000
|
heap
|
page read and write
|
||
2DF105F2000
|
heap
|
page read and write
|
||
32BE000
|
stack
|
page read and write
|
||
310C000
|
heap
|
page read and write
|
||
48DC004E8000
|
trusted library allocation
|
page read and write
|
||
216E0002C000
|
direct allocation
|
page read and write
|
||
1CFEC2C2000
|
heap
|
page read and write
|
||
319F000
|
heap
|
page read and write
|
||
1CFEC2AC000
|
heap
|
page read and write
|
||
2DF12634000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF10604000
|
heap
|
page read and write
|
||
5590000
|
heap
|
page read and write
|
||
48DC00001000
|
trusted library allocation
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
50C000201000
|
trusted library allocation
|
page read and write
|
||
2DF106AD000
|
heap
|
page read and write
|
||
18A529C0000
|
heap
|
page read and write
|
||
7DDE00070000
|
trusted library allocation
|
page read and write
|
||
2DF106CA000
|
heap
|
page read and write
|
||
1E6052E0000
|
heap
|
page read and write
|
||
48DC01144000
|
trusted library allocation
|
page read and write
|
||
3270000
|
unkown
|
page read and write
|
||
48DC01098000
|
trusted library allocation
|
page read and write
|
||
1CFEBD3E000
|
heap
|
page read and write
|
||
48DC0020C000
|
trusted library allocation
|
page read and write
|
||
7A000008000
|
trusted library allocation
|
page read and write
|
||
48D8000B0000
|
trusted library allocation
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
2DF106B5000
|
heap
|
page read and write
|
||
1818000AC000
|
trusted library allocation
|
page read and write
|
||
48DC004DC000
|
trusted library allocation
|
page read and write
|
||
2DF1263C000
|
heap
|
page read and write
|
||
7DDE00054000
|
trusted library allocation
|
page read and write
|
||
48DC004CC000
|
trusted library allocation
|
page read and write
|
||
48DC005A0000
|
trusted library allocation
|
page read and write
|
||
2DF106CA000
|
heap
|
page read and write
|
||
48DC009C3000
|
trusted library allocation
|
page read and write
|
||
5490000
|
unkown
|
page read and write
|
||
25AD1030000
|
heap
|
page read and write
|
||
18A52C00000
|
heap
|
page read and write
|
||
2DF12624000
|
heap
|
page read and write
|
||
48DC0044C000
|
trusted library allocation
|
page read and write
|
||
2DF102C0000
|
unkown
|
page execute and read and write
|
||
2164EC2D000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
48DC01258000
|
trusted library allocation
|
page read and write
|
||
2DF12664000
|
heap
|
page read and write
|
||
48DC00A01000
|
trusted library allocation
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
48DC00980000
|
trusted library allocation
|
page read and write
|
||
48DC01260000
|
trusted library allocation
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
18180003C000
|
trusted library allocation
|
page read and write
|
||
2DF1067C000
|
heap
|
page read and write
|
||
2DF128E0000
|
heap
|
page read and write
|
||
50C00045C000
|
trusted library allocation
|
page read and write
|
||
2DF128C5000
|
heap
|
page read and write
|
||
50C0000A4000
|
trusted library allocation
|
page read and write
|
||
48D8000A4000
|
trusted library allocation
|
page read and write
|
||
2DF125AF000
|
heap
|
page read and write
|
||
2DF1266D000
|
heap
|
page read and write
|
||
73D40009C000
|
direct allocation
|
page read and write
|
||
1CFEBD22000
|
heap
|
page read and write
|
||
2DF1267D000
|
heap
|
page read and write
|
||
48D800124000
|
trusted library allocation
|
page read and write
|
||
48DC00E7C000
|
trusted library allocation
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
E68591C000
|
stack
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
48DC001F4000
|
trusted library allocation
|
page read and write
|
||
25AD123C000
|
heap
|
page read and write
|
||
1CFE8672000
|
heap
|
page read and write
|
||
2DF106D8000
|
heap
|
page read and write
|
||
2DF1263C000
|
heap
|
page read and write
|
||
2DF12230000
|
heap
|
page read and write
|
||
48D800100000
|
trusted library allocation
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
5270000
|
unkown
|
page read and write
|
||
1CFEC28D000
|
heap
|
page read and write
|
||
2DF105E9000
|
heap
|
page read and write
|
||
7FFAF9740000
|
direct allocation
|
page execute and read and write
|
||
2DF128AE000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
48DC00F78000
|
trusted library allocation
|
page read and write
|
||
48D800152000
|
trusted library allocation
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
794F7FC000
|
stack
|
page read and write
|
||
2DF125B3000
|
heap
|
page read and write
|
||
48DC0011C000
|
trusted library allocation
|
page read and write
|
||
700000
|
unkown
|
page readonly
|
||
18A54681000
|
heap
|
page read and write
|
||
48D800094000
|
trusted library allocation
|
page read and write
|
||
48DC00204000
|
trusted library allocation
|
page read and write
|
||
2DF1266D000
|
heap
|
page read and write
|
||
2DF128BE000
|
heap
|
page read and write
|
||
2DF12635000
|
heap
|
page read and write
|
||
2DF12664000
|
heap
|
page read and write
|
||
D36000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
5F00000
|
heap
|
page read and write
|
||
2DF105E9000
|
heap
|
page read and write
|
||
48DC00D10000
|
trusted library allocation
|
page read and write
|
||
2DF126B3000
|
heap
|
page read and write
|
||
749000
|
unkown
|
page readonly
|
||
818000D4000
|
direct allocation
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
48DC008AC000
|
trusted library allocation
|
page read and write
|
||
2DF126B4000
|
heap
|
page read and write
|
||
2DF12624000
|
heap
|
page read and write
|
||
3001000
|
heap
|
page read and write
|
||
1AFE8671000
|
remote allocation
|
page execute and read and write
|
||
2DF106BD000
|
heap
|
page read and write
|
||
2DF12624000
|
heap
|
page read and write
|
||
50C000194000
|
trusted library allocation
|
page read and write
|
||
1CFF156D000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
2DF128C5000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2DF12654000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
5C00000
|
heap
|
page read and write
|
||
216E000DC000
|
direct allocation
|
page read and write
|
||
2DF106C5000
|
heap
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
48DC01160000
|
trusted library allocation
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
1E604F00000
|
system
|
page execute and read and write
|
||
2DF12615000
|
heap
|
page read and write
|
||
1CFF1567000
|
heap
|
page read and write
|
||
305D000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
2DF12642000
|
heap
|
page read and write
|
||
F99BBFA000
|
stack
|
page read and write
|
||
2DF125B9000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF12634000
|
heap
|
page read and write
|
||
7950FFE000
|
stack
|
page read and write
|
||
50C000044000
|
trusted library allocation
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
5A00000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
2DF128C6000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
5301000
|
unkown
|
page read and write
|
||
2DF12654000
|
heap
|
page read and write
|
||
48DC005B0000
|
trusted library allocation
|
page read and write
|
||
7FFAF9740000
|
direct allocation
|
page execute and read and write
|
||
3280000
|
unkown
|
page read and write
|
||
1CFEBD27000
|
heap
|
page read and write
|
||
2DF106CA000
|
heap
|
page read and write
|
||
2DF1266D000
|
heap
|
page read and write
|
||
2DF12634000
|
heap
|
page read and write
|
||
59C000
|
stack
|
page read and write
|
||
18A54BC0000
|
heap
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
2DF106AD000
|
heap
|
page read and write
|
||
2164ED13000
|
heap
|
page read and write
|
||
2DF128DD000
|
heap
|
page read and write
|
||
2DF106C1000
|
heap
|
page read and write
|
||
2DF1062F000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2DF105EA000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
3100000
|
unkown
|
page read and write
|
||
2DF106D1000
|
heap
|
page read and write
|
||
48DC00A5C000
|
trusted library allocation
|
page read and write
|
||
2DF106C1000
|
heap
|
page read and write
|
||
2DF106DA000
|
heap
|
page read and write
|
||
7959FFE000
|
stack
|
page read and write
|
||
48DC00DA4000
|
trusted library allocation
|
page read and write
|
||
2DF125B4000
|
heap
|
page read and write
|
||
2DF12634000
|
heap
|
page read and write
|
||
2DF128D8000
|
heap
|
page read and write
|
||
2DF10610000
|
heap
|
page read and write
|
||
50C0004C0000
|
trusted library allocation
|
page read and write
|
||
48DC01080000
|
trusted library allocation
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2DF128AE000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
18A52CCF000
|
unkown
|
page read and write
|
||
48DC00018000
|
trusted library allocation
|
page read and write
|
||
2DF106B3000
|
heap
|
page read and write
|
||
2DF10629000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF12655000
|
heap
|
page read and write
|
||
2DF106AD000
|
heap
|
page read and write
|
||
2DF12614000
|
heap
|
page read and write
|
||
7A000068000
|
trusted library allocation
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
CA55BFB000
|
stack
|
page read and write
|
||
2DF128A5000
|
heap
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF128CC000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
18A5469E000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
2DF10613000
|
heap
|
page read and write
|
||
2DF10629000
|
heap
|
page read and write
|
||
2DF12665000
|
heap
|
page read and write
|
||
48DC010C4000
|
trusted library allocation
|
page read and write
|
||
48DC01058000
|
trusted library allocation
|
page read and write
|
||
2DF10697000
|
heap
|
page read and write
|
||
18A529C7000
|
heap
|
page read and write
|
||
7A00002C000
|
trusted library allocation
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
79517FF000
|
stack
|
page read and write
|
||
2DF128A0000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
2DF1288D000
|
heap
|
page read and write
|
||
50C000128000
|
trusted library allocation
|
page read and write
|
||
1818000C0000
|
trusted library allocation
|
page read and write
|
||
48DC00354000
|
trusted library allocation
|
page read and write
|
||
2DF12885000
|
heap
|
page read and write
|
||
7A000004000
|
trusted library allocation
|
page read and write
|
||
8180002C000
|
direct allocation
|
page read and write
|
||
1CFE86E5000
|
heap
|
page read and write
|
||
2DF12664000
|
heap
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
18A52C80000
|
heap
|
page readonly
|
||
2DF12665000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
50C000001000
|
trusted library allocation
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
2DF106AD000
|
heap
|
page read and write
|
||
2DF128B2000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
48D800130000
|
trusted library allocation
|
page read and write
|
||
48DC00718000
|
trusted library allocation
|
page read and write
|
||
1AFE89C7000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2DF12654000
|
heap
|
page read and write
|
||
216E00001000
|
direct allocation
|
page read and write
|
||
1CFE86AE000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
319F000
|
heap
|
page read and write
|
||
7A0000A4000
|
trusted library allocation
|
page read and write
|
||
2DF128B5000
|
heap
|
page read and write
|
||
2DF12642000
|
heap
|
page read and write
|
||
7A000044000
|
trusted library allocation
|
page read and write
|
||
2DF12670000
|
heap
|
page read and write
|
||
8E57FFE000
|
stack
|
page read and write
|
||
2DF106E0000
|
unkown
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
25AD1241000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
818000F7000
|
direct allocation
|
page read and write
|
||
2DF106AD000
|
heap
|
page read and write
|
||
48DC00364000
|
trusted library allocation
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
81800074000
|
direct allocation
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
CA543FD000
|
stack
|
page read and write
|
||
81800114000
|
direct allocation
|
page read and write
|
||
2DF12624000
|
heap
|
page read and write
|
||
7DDE00018000
|
trusted library allocation
|
page read and write
|
||
334357D000
|
stack
|
page read and write
|
||
2DF10612000
|
heap
|
page read and write
|
||
48DC00FE4000
|
trusted library allocation
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
18A52CC0000
|
unkown
|
page read and write
|
||
2DF128A5000
|
heap
|
page read and write
|
||
2DF1267D000
|
heap
|
page read and write
|
||
7A000060000
|
trusted library allocation
|
page read and write
|
||
818000DC000
|
direct allocation
|
page read and write
|
||
48DC00777000
|
trusted library allocation
|
page read and write
|
||
1E607284000
|
unkown
|
page read and write
|
||
2DF128B5000
|
heap
|
page read and write
|
||
2DF12615000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
18A52D47000
|
heap
|
page read and write
|
||
794BFFD000
|
stack
|
page read and write
|
||
1CFE86B1000
|
heap
|
page read and write
|
||
1818000AC000
|
trusted library allocation
|
page read and write
|
||
2DF10438000
|
heap
|
page read and write
|
||
2DF12654000
|
heap
|
page read and write
|
||
2DF1266D000
|
heap
|
page read and write
|
||
2DF12655000
|
heap
|
page read and write
|
||
48DC00480000
|
trusted library allocation
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
1CFE8B70000
|
trusted library allocation
|
page read and write
|
||
1CFE8B80000
|
trusted library allocation
|
page read and write
|
||
CA44BFE000
|
stack
|
page read and write
|
||
48DC01288000
|
trusted library allocation
|
page read and write
|
||
2DF106A2000
|
heap
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
50C00045C000
|
trusted library allocation
|
page read and write
|
||
5270000
|
unkown
|
page read and write
|
||
2DF12561000
|
heap
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
CA593FE000
|
stack
|
page read and write
|
||
2DF126A5000
|
heap
|
page read and write
|
||
2DF128CE000
|
heap
|
page read and write
|
||
2DF12634000
|
heap
|
page read and write
|
||
48D8000F0000
|
trusted library allocation
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF12655000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
48DC001B8000
|
trusted library allocation
|
page read and write
|
||
1CFEC2A4000
|
heap
|
page read and write
|
||
2DF126B5000
|
heap
|
page read and write
|
||
2DF1045E000
|
heap
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
48DC00CC4000
|
trusted library allocation
|
page read and write
|
||
2DF128B5000
|
heap
|
page read and write
|
||
79477FE000
|
stack
|
page read and write
|
||
50C000208000
|
trusted library allocation
|
page read and write
|
||
2DF128CA000
|
heap
|
page read and write
|
||
778000
|
unkown
|
page write copy
|
||
3132000
|
heap
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
50C0004A8000
|
trusted library allocation
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
7952FFE000
|
stack
|
page read and write
|
||
1CFEBD21000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF106CF000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2DF128B5000
|
heap
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
216E0009C000
|
direct allocation
|
page read and write
|
||
2DF12655000
|
heap
|
page read and write
|
||
CA59BFB000
|
stack
|
page read and write
|
||
2DF10440000
|
heap
|
page read and write
|
||
1AFE8846000
|
heap
|
page read and write
|
||
CA443FE000
|
stack
|
page read and write
|
||
21650A02000
|
heap
|
page read and write
|
||
181800090000
|
trusted library allocation
|
page read and write
|
||
1AFE89D8000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
141F000
|
stack
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
48DC00401000
|
trusted library allocation
|
page read and write
|
||
2DF128B7000
|
heap
|
page read and write
|
||
48DC00310000
|
trusted library allocation
|
page read and write
|
||
1CFEBD00000
|
heap
|
page read and write
|
||
53E7000
|
unkown
|
page read and write
|
||
2DF1264C000
|
heap
|
page read and write
|
||
CA4B3FE000
|
stack
|
page read and write
|
||
1AFE89C0000
|
heap
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
48DC0048C000
|
trusted library allocation
|
page read and write
|
||
48D800204000
|
trusted library allocation
|
page read and write
|
||
50C00000C000
|
trusted library allocation
|
page read and write
|
||
81800088000
|
direct allocation
|
page read and write
|
||
48DC005C0000
|
trusted library allocation
|
page read and write
|
||
25AD1302000
|
heap
|
page read and write
|
||
1E60514A000
|
heap
|
page read and write
|
||
7DF4C6850000
|
unkown
|
page read and write
|
||
50C0001A0000
|
trusted library allocation
|
page read and write
|
||
2DF128AD000
|
heap
|
page read and write
|
||
5410000
|
unkown
|
page read and write
|
||
701000
|
unkown
|
page execute read
|
||
48DC001D0000
|
trusted library allocation
|
page read and write
|
||
2DF128E2000
|
heap
|
page read and write
|
||
2DF106D6000
|
heap
|
page read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
2DF105F0000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
1CFEC286000
|
heap
|
page read and write
|
||
1CFF1970000
|
unkown
|
page readonly
|
||
2DF128BD000
|
heap
|
page read and write
|
||
21650B1B000
|
heap
|
page read and write
|
||
3277000
|
unkown
|
page read and write
|
||
2DF128B5000
|
heap
|
page read and write
|
||
1CFE8820000
|
heap
|
page read and write
|
||
2DF103C0000
|
unclassified section
|
page readonly
|
||
3142000
|
heap
|
page read and write
|
||
CA50BFD000
|
stack
|
page read and write
|
||
2DF12655000
|
heap
|
page read and write
|
||
2DF128CD000
|
heap
|
page read and write
|
||
48DC00751000
|
trusted library allocation
|
page read and write
|
||
2DF10683000
|
heap
|
page read and write
|
||
1818000A0000
|
trusted library allocation
|
page read and write
|
||
48D8000F4000
|
trusted library allocation
|
page read and write
|
||
2DF12655000
|
heap
|
page read and write
|
||
25AD11E0000
|
unclassified section
|
page readonly
|
||
48DC00590000
|
trusted library allocation
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
794DFFD000
|
stack
|
page read and write
|
||
18A546E7000
|
heap
|
page read and write
|
||
1CFEC240000
|
heap
|
page read and write
|
||
C2E000
|
stack
|
page read and write
|
||
48DC00244000
|
trusted library allocation
|
page read and write
|
||
2DF128B6000
|
heap
|
page read and write
|
||
2DF106B0000
|
heap
|
page read and write
|
||
73D40002C000
|
direct allocation
|
page read and write
|
||
1CFEC2B6000
|
heap
|
page read and write
|
||
2164EC13000
|
heap
|
page read and write
|
||
2DF1267E000
|
heap
|
page read and write
|
||
2DF12865000
|
heap
|
page read and write
|
||
48DC0073C000
|
trusted library allocation
|
page read and write
|
||
2DF1045E000
|
heap
|
page read and write
|
||
2DF106CE000
|
heap
|
page read and write
|
||
2DF12634000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
7DF40F750000
|
unkown
|
page read and write
|
||
2DF12670000
|
heap
|
page read and write
|
||
2DF128D5000
|
heap
|
page read and write
|
||
2DF1062C000
|
heap
|
page read and write
|
||
50C000204000
|
trusted library allocation
|
page read and write
|
||
2DF128A5000
|
heap
|
page read and write
|
||
2DF128B5000
|
heap
|
page read and write
|
||
18A546A7000
|
heap
|
page read and write
|
||
48DC004E8000
|
trusted library allocation
|
page read and write
|
||
739000
|
unkown
|
page execute and read and write
|
||
2DF128BD000
|
heap
|
page read and write
|
||
2DF12648000
|
heap
|
page read and write
|
||
1CFF19B0000
|
unkown
|
page readonly
|
||
CA4C3FD000
|
stack
|
page read and write
|
||
2DF1263C000
|
heap
|
page read and write
|
||
2DF12247000
|
heap
|
page read and write
|
||
81800108000
|
direct allocation
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
1CFEC294000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
2DF126AD000
|
heap
|
page read and write
|
||
2DF12695000
|
heap
|
page read and write
|
||
50C000458000
|
trusted library allocation
|
page read and write
|
||
2DF1264C000
|
heap
|
page read and write
|
||
2DF128E5000
|
heap
|
page read and write
|
||
2DF12623000
|
heap
|
page read and write
|
||
7947FFE000
|
stack
|
page read and write
|
||
2DF1285D000
|
heap
|
page read and write
|
||
48DC00E4C000
|
trusted library allocation
|
page read and write
|
||
81800008000
|
direct allocation
|
page read and write
|
||
2DF1061F000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
79577FF000
|
trusted library allocation
|
page read and write
|
||
2DF12634000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
1818000AC000
|
trusted library allocation
|
page read and write
|
There are 2320 hidden memdumps, click here to show them.