Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Win64.Evo-gen.8568.15352.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\71434D56-1548-ED3D-AEE6-C75AECD93BF0\Browsers\Cookies.txt
|
ASCII text, with very long lines (522), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\71434D56-1548-ED3D-AEE6-C75AECD93BF0\Browsers\Firefox\History.txt
|
Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\71434D56-1548-ED3D-AEE6-C75AECD93BF0\network_info.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\71434D56-1548-ED3D-AEE6-C75AECD93BF0\process_info.txt
|
ASCII text, with CRLF, CR line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\71434D56-1548-ED3D-AEE6-C75AECD93BF0\system_info.txt
|
Algol 68 source, ASCII text, with CRLF, CR line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\KZWFNRXYKI.pdf
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\UMMBDNEQBN.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\UMMBDNEQBN.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\VLZDGUKUTZ.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\VLZDGUKUTZ.pdf
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\VCRUNTIME140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\_asyncio.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\_bz2.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\_cffi_backend.cp311-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\_ctypes.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\_decimal.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\_hashlib.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\_lzma.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\_multiprocessing.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\_overlapped.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\_queue.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\_socket.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\_sqlite3.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\_ssl.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\_uuid.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\aiohttp\_helpers.cp311-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\aiohttp\_http_parser.cp311-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\aiohttp\_http_writer.cp311-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\aiohttp\_websocket.cp311-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\cryptography\hazmat\bindings\_rust.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\frozenlist\_frozenlist.cp311-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\libcrypto-1_1.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\libffi-8.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\libssl-1_1.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\multidict\_multidict.cp311-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\pyexpat.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\python3.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\python311.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\select.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\sqlite3.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\unicodedata.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\yarl\_quoting_c.cp311-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\VCRUNTIME140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\_asyncio.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\_bz2.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\_cffi_backend.cp311-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\_ctypes.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\_decimal.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\_hashlib.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\_lzma.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\_multiprocessing.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\_overlapped.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\_queue.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\_socket.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\_sqlite3.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\_ssl.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\_uuid.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\aiohttp\_helpers.cp311-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\aiohttp\_http_parser.cp311-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\aiohttp\_http_writer.cp311-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\aiohttp\_websocket.cp311-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\cryptography\hazmat\bindings\_rust.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\frozenlist\_frozenlist.cp311-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\libcrypto-1_1.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\libffi-8.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\libssl-1_1.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\multidict\_multidict.cp311-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\pyexpat.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\python3.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\python311.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\select.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\sqlite3.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\unicodedata.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\yarl\_quoting_c.cp311-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x0c7c8d00, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\67f46lun
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\71434D56-1548-ED3D-AEE6-C75AECD93BF0.zip
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\71434D56-1548-ED3D-AEE6-C75AECD93BF0\Browsers\Historys.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\AutofillData.db
|
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie
0x24, schema 4, UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Cookies.db
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8,
version-valid-for 11
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\DownloadData.db
|
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4,
UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\HistoryData.db
|
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4,
UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Logins.db
|
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie
0xe, schema 4, UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela.zip
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\BPMLNOBVSB.jpg
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\FENIVHOIKN.mp3
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\HTAGVDFUIE.mp3
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\HTAGVDFUIE.pdf
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\HTAGVDFUIE.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\KATAXZVCPS.png
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\KZWFNRXYKI.jpg
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\KZWFNRXYKI.mp3
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\LTKMYBSEYZ.jpg
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\LTKMYBSEYZ.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\NIKHQAIQAU.png
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\NWTVCDUMOB.pdf
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\ONBQCLYSPU.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\ONBQCLYSPU.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\UMMBDNEQBN.jpg
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\UOOJJOZIRH.mp3
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\WKXEWIOTXI.png
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\WUTJSCBCFX.png
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\XZXHAVGRAG.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\BPMLNOBVSB.jpg
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\FENIVHOIKN.mp3
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\HTAGVDFUIE.mp3
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\HTAGVDFUIE.pdf
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\HTAGVDFUIE.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\KATAXZVCPS.png
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\KZWFNRXYKI.jpg
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\KZWFNRXYKI.mp3
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\KZWFNRXYKI.pdf
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\LTKMYBSEYZ.jpg
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\LTKMYBSEYZ.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\NIKHQAIQAU.png
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\NWTVCDUMOB.pdf
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\ONBQCLYSPU.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\ONBQCLYSPU.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\UMMBDNEQBN.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\UMMBDNEQBN.jpg
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\UMMBDNEQBN.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\UOOJJOZIRH.mp3
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\VLZDGUKUTZ.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\VLZDGUKUTZ.pdf
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\WKXEWIOTXI.png
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\WUTJSCBCFX.png
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\XZXHAVGRAG.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\BPMLNOBVSB.jpg
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\FENIVHOIKN.mp3
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\HTAGVDFUIE.mp3
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\HTAGVDFUIE.pdf
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\HTAGVDFUIE.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\KATAXZVCPS.png
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\KZWFNRXYKI.jpg
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\KZWFNRXYKI.mp3
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\KZWFNRXYKI.pdf
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\LTKMYBSEYZ.jpg
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\LTKMYBSEYZ.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\NIKHQAIQAU.png
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\NWTVCDUMOB.pdf
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\ONBQCLYSPU.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\ONBQCLYSPU.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\UMMBDNEQBN.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\UMMBDNEQBN.jpg
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\UMMBDNEQBN.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\UOOJJOZIRH.mp3
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\VLZDGUKUTZ.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\VLZDGUKUTZ.pdf
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\WKXEWIOTXI.png
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\WUTJSCBCFX.png
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\XZXHAVGRAG.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\ONBQCLYSPU\HTAGVDFUIE.pdf
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\ONBQCLYSPU\KZWFNRXYKI.mp3
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\ONBQCLYSPU\LTKMYBSEYZ.jpg
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\ONBQCLYSPU\ONBQCLYSPU.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\ONBQCLYSPU\UMMBDNEQBN.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\ONBQCLYSPU\WUTJSCBCFX.png
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\UMMBDNEQBN\BPMLNOBVSB.jpg
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\UMMBDNEQBN\KZWFNRXYKI.pdf
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\UMMBDNEQBN\LTKMYBSEYZ.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\UMMBDNEQBN\UMMBDNEQBN.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\UMMBDNEQBN\UOOJJOZIRH.mp3
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\UMMBDNEQBN\WKXEWIOTXI.png
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\VLZDGUKUTZ\FENIVHOIKN.mp3
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\VLZDGUKUTZ\HTAGVDFUIE.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\VLZDGUKUTZ\KZWFNRXYKI.jpg
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\VLZDGUKUTZ\NIKHQAIQAU.png
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\VLZDGUKUTZ\NWTVCDUMOB.pdf
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\VLZDGUKUTZ\VLZDGUKUTZ.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\XZXHAVGRAG\HTAGVDFUIE.mp3
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\XZXHAVGRAG\KATAXZVCPS.png
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\XZXHAVGRAG\ONBQCLYSPU.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\XZXHAVGRAG\UMMBDNEQBN.jpg
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\XZXHAVGRAG\VLZDGUKUTZ.pdf
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\XZXHAVGRAG\XZXHAVGRAG.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Web.db
|
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie
0x24, schema 4, UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\attrs-23.2.0.dist-info\INSTALLER
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\attrs-23.2.0.dist-info\METADATA
|
HTML document, Unicode text, UTF-8 text, with very long lines (367)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\attrs-23.2.0.dist-info\RECORD
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\attrs-23.2.0.dist-info\WHEEL
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\attrs-23.2.0.dist-info\licenses\LICENSE
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\base_library.zip
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\cryptography-42.0.5.dist-info\INSTALLER
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\cryptography-42.0.5.dist-info\LICENSE
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\cryptography-42.0.5.dist-info\LICENSE.APACHE
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\cryptography-42.0.5.dist-info\LICENSE.BSD
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\cryptography-42.0.5.dist-info\METADATA
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\cryptography-42.0.5.dist-info\RECORD
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\cryptography-42.0.5.dist-info\WHEEL
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI67602\cryptography-42.0.5.dist-info\top_level.txt
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\attrs-23.2.0.dist-info\INSTALLER
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\attrs-23.2.0.dist-info\METADATA
|
HTML document, Unicode text, UTF-8 text, with very long lines (367)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\attrs-23.2.0.dist-info\RECORD
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\attrs-23.2.0.dist-info\WHEEL
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\attrs-23.2.0.dist-info\licenses\LICENSE
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\base_library.zip
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\cryptography-42.0.5.dist-info\INSTALLER
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\cryptography-42.0.5.dist-info\LICENSE
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\cryptography-42.0.5.dist-info\LICENSE.APACHE
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\cryptography-42.0.5.dist-info\LICENSE.BSD
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\cryptography-42.0.5.dist-info\METADATA
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\cryptography-42.0.5.dist-info\RECORD
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\cryptography-42.0.5.dist-info\WHEEL
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI80682\cryptography-42.0.5.dist-info\top_level.txt
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ds3s4c53.5hn.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_exjrwd5i.bcl.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
|
data
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
There are 204 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.8568.15352.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.8568.15352.exe"
|
||
C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.8568.15352.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.8568.15352.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "ver"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic computersystem get Manufacturer"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "gdb --version"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tasklist"
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic path win32_VideoController get name
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic computersystem get Manufacturer
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic path Win32_ComputerSystem get Manufacturer"
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic path Win32_ComputerSystem get Manufacturer
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tasklist"
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic csproduct get uuid
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe""
|
||
C:\Windows\System32\attrib.exe
|
attrib +h +s "C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Exela Update
Service" /t REG_SZ /d "C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe" /f"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t
start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling the program to fix this problem',
0, 'System Error', 0+16);close()""
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tasklist"
|
||
C:\Windows\System32\mshta.exe
|
mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll
is missing from your computer. Try reinstalling the program to fix this problem', 0, 'System Error', 0+16);close()"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard"
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /c chcp
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /c chcp
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host
Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername
& echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup &
echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator
User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist####
& tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts &
echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service
Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show
config"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "netsh wlan show profiles"
|
||
C:\Windows\System32\systeminfo.exe
|
systeminfo
|
||
C:\Windows\System32\netsh.exe
|
netsh wlan show profiles
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic logicaldisk get caption,description,providername
|
||
C:\Windows\System32\net.exe
|
net user
|
||
C:\Windows\System32\net1.exe
|
C:\Windows\system32\net1 user
|
||
C:\Windows\System32\net.exe
|
net localgroup
|
||
C:\Windows\System32\net1.exe
|
C:\Windows\system32\net1 localgroup
|
||
C:\Windows\System32\net.exe
|
net localgroup administrators
|
||
C:\Windows\System32\net1.exe
|
C:\Windows\system32\net1 localgroup administrators
|
||
C:\Windows\System32\net.exe
|
net user guest
|
||
C:\Windows\System32\net1.exe
|
C:\Windows\system32\net1 user guest
|
||
C:\Windows\System32\net.exe
|
net user administrator
|
||
C:\Windows\System32\net1.exe
|
C:\Windows\system32\net1 user administrator
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic startup get caption,command
|
||
C:\Windows\System32\ipconfig.exe
|
ipconfig /all
|
||
C:\Windows\System32\ARP.EXE
|
arp -a
|
||
C:\Windows\System32\NETSTAT.EXE
|
netstat -ano
|
||
C:\Windows\System32\netsh.exe
|
netsh firewall show state
|
||
C:\Windows\System32\netsh.exe
|
netsh firewall show config
|
||
C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe
|
"C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\reg.exe
|
reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Exela Update Service" /t REG_SZ /d "C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe"
/f
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FO LIST
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe Get-Clipboard
|
||
C:\Windows\System32\chcp.com
|
chcp
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\HOSTNAME.EXE
|
hostname
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\query.exe
|
query user
|
||
C:\Windows\System32\quser.exe
|
"C:\Windows\system32\quser.exe"
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /svc
|
||
C:\Windows\System32\ROUTE.EXE
|
route print
|
||
C:\Windows\System32\sc.exe
|
sc query type= service state= all
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 73 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.attrs.org/en/stable/why.html#data-classes).
|
unknown
|
||
https://docs.python.org/3/library/ssl.html#ssl.OP_NO_COMPRESSION
|
unknown
|
||
https://account.riotgames.com/api/account/v1/user
|
unknown
|
||
https://accounts.reddit.com/api/access_token
|
unknown
|
||
https://api.steampowered.com/ISteamUser/GetPlayerSummaries/v0002/?key=440D7F4D810EF9298D25EDDF37C1F9
|
unknown
|
||
https://github.com/pyca/cryptography/issues/8996
|
unknown
|
||
https://gofile.io/d/mn2lNW)
|
unknown
|
||
https://github.com/python-attrs/attrs/issues/251
|
unknown
|
||
https://tiktok.com/
|
unknown
|
||
https://github.com/aio-libs/aiohttp/discussions/6044
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV2.C:
|
unknown
|
||
https://t.me/ExelaStealerP5
|
unknown
|
||
http://python.org
|
unknown
|
||
https://discord.com/api/webhooks/1232453561850531851/OBetju49bFsNbzWeG3Y_1O_or46pmBaTOUd7HjjHcO5X_BaLZ2C-YJ8xGzkF6VbqbsY0
|
162.159.128.233
|
||
http://python.org:80
|
unknown
|
||
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
|
unknown
|
||
https://github.com/sponsors/hynek
|
unknown
|
||
https://github.com/pyca/cryptography/actions?query=workflow%3ACI
|
unknown
|
||
https://oauth.reddit.com/api/v1/me
|
unknown
|
||
https://i.hizliresim.com/6t31tw2.jpgp
|
unknown
|
||
https://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
https://www.attrs.org/en/23.2.0/_static/sponsors/FilePreviews.svg
|
unknown
|
||
https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64
|
unknown
|
||
https://g.live.com/odclientsettings/Prod.C:
|
unknown
|
||
https://github.com/python-attrs/attrs/issues/1200)
|
unknown
|
||
https://raw.githubusercontent.com/python-attrs/attrs/main/docs/_static/attrs_logo.svg
|
unknown
|
||
https://www.attrs.org/en/stable/init.html#hooking-yourself-into-initialization)
|
unknown
|
||
https://github.com/python-attrs/attrs)
|
unknown
|
||
https://www.attrs.org/)
|
unknown
|
||
https://twitter.com
|
unknown
|
||
https://twitter.com/home
|
unknown
|
||
https://gql.twitch.tv/gql:
|
unknown
|
||
http://docs.python.org/3/library/subprocess#subprocess.Popen.kill
|
unknown
|
||
https://github.com/quicaxd/Exela-V2.0/Exela-V2.00
|
unknown
|
||
https://github.com/python-attrs/attrs/issues/136
|
unknown
|
||
https://www.tiktok.com/passport/web/account/info/?aid=1459&app_language=de-DE&app_name=tiktok_web&ba
|
unknown
|
||
https://i.hizliresim.com/8po0puy.jfif
|
unknown
|
||
https://peps.python.org/pep-0205/
|
unknown
|
||
http://docs.python.org/3/library/subprocess#subprocess.Popen.returncode
|
unknown
|
||
https://webcast.tiktok.com/webcast/wallet_api/diamond_buy/permission/?aid=1988&app_language=de-DE&ap
|
unknown
|
||
https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
|
unknown
|
||
http://json.org
|
unknown
|
||
https://zopeinterface.readthedocs.io/en/latest/
|
unknown
|
||
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
|
unknown
|
||
https://t.me/Exela
|
unknown
|
||
https://github.com/quicaxd/Exela-V2.00D
|
unknown
|
||
https://raw.githubusercontent.com/justforExela/injection/main/injection.js
|
unknown
|
||
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
|
unknown
|
||
https://discord.com/api/v8/users/
|
unknown
|
||
https://i.hizliresim.com/qxnzimj.jpg
|
unknown
|
||
https://www.apache.org/licenses/
|
unknown
|
||
https://www.attrs.org/en/latest/names.html)
|
unknown
|
||
https://www.twitch.tv/
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://github.com/pyca/cryptography/workflows/CI/badge.svg?branch=main
|
unknown
|
||
https://cryptography.io/en/latest/faq/#why-can-t-i-import-my-pem-file
|
unknown
|
||
https://open.spotify.com/user/
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://filepreviews.io/
|
unknown
|
||
https://store8.gofile.io/uploadFile
|
206.168.191.31
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://cryptography.io/en/latest/installation/
|
unknown
|
||
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
|
unknown
|
||
https://github.com/python-attrs/attrs/issues/1165)
|
unknown
|
||
https://tidelift.com/subscription/pkg/pypi-attrs?utm_source=pypi-attrs&utm_medium=referral&utm_campa
|
unknown
|
||
https://www.attrs.org/en/stable/changelog.html
|
unknown
|
||
https://cryptography.io/en/latest/security/
|
unknown
|
||
https://github.com/python-attrs/attrs/issues/1141)
|
unknown
|
||
https://i.hizliresim.com/6t31tw2.jpg
|
unknown
|
||
https://thumbnails.roblox.com/v1/users/avatar?userIds=
|
unknown
|
||
https://www.variomedia.de/
|
unknown
|
||
https://bugs.python.org/issue37179
|
unknown
|
||
https://twitter.com/i/api/1.1/account/update_profile.jsonP
|
unknown
|
||
https://raw.githubusercontent.com/justforExela/injection/main/injection.js0A
|
unknown
|
||
https://www.reddit.com/user/0
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
https://www.reddit.com/user/
|
unknown
|
||
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
|
unknown
|
||
https://github.com/pyca/cryptography/issues
|
unknown
|
||
https://readthedocs.org/projects/cryptography/badge/?version=latest
|
unknown
|
||
https://t.me/ExelaStealer
|
unknown
|
||
https://www.attrs.org/
|
unknown
|
||
https://www.twitch.tv/P?
|
unknown
|
||
https://discord.com/api/webhooks/1232453561850531851/OBetju49bFsNbzWeG3Y_1O_or46pmBaTOUd7HjjHcO5X_Ba
|
unknown
|
||
https://github.com/python-attrs/attrs/issues/1158)
|
unknown
|
||
https://mahler:8092/site-updates.py
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
|
unknown
|
||
https://github.com/python-attrs/attrs/issues/1203)
|
unknown
|
||
https://www.attrs.org/en/23.2.0/_static/sponsors/Tidelift.svg
|
unknown
|
||
https://cdn.discordapp.com/avatars/0
|
unknown
|
||
https://github.com/pyca/cryptography
|
unknown
|
||
https://www.python.org/download/releases/2.3/mro/.
|
unknown
|
||
https://cryptography.io/
|
unknown
|
||
https://docs.python.org/3/library/asyncio-eventloop.html
|
unknown
|
||
http://ip-api.com/json
|
208.95.112.1
|
||
http://python.org/
|
unknown
|
||
https://www.attrs.org/en/latest/glossary.html#term-dunder-methods)).
|
unknown
|
||
https://github.com/pyca/cryptography/
|
unknown
|
||
https://gofile.io/d/mn2lNW)P
|
unknown
|
||
https://github.com/python-attrs/attrs
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
store8.gofile.io
|
206.168.191.31
|
||
discord.com
|
162.159.128.233
|
||
ip-api.com
|
208.95.112.1
|
||
api.gofile.io
|
51.38.43.18
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
||
162.159.137.232
|
unknown
|
United States
|
||
162.159.128.233
|
discord.com
|
United States
|
||
206.168.191.31
|
store8.gofile.io
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
51.38.43.18
|
api.gofile.io
|
France
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Exela Update Service
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
|
@%SystemRoot%\system32\mlang.dll,-4387
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
|
@%SystemRoot%\system32\mlang.dll,-4407
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RFC1156Agent\CurrentVersion\Parameters
|
TrapPollTimeMilliSecs
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2DCD0DF6000
|
heap
|
page read and write
|
||
2DCD07D8000
|
direct allocation
|
page read and write
|
||
2DCD1A20000
|
direct allocation
|
page read and write
|
||
2DCD14C1000
|
heap
|
page read and write
|
||
2DCD0DB4000
|
heap
|
page read and write
|
||
2DCD1B20000
|
direct allocation
|
page read and write
|
||
2DCD0E25000
|
heap
|
page read and write
|
||
2DCCD074000
|
heap
|
page read and write
|
||
2938E3EA000
|
heap
|
page read and write
|
||
2DCCFFF0000
|
heap
|
page read and write
|
||
1829E40F000
|
heap
|
page read and write
|
||
2DCD0E58000
|
heap
|
page read and write
|
||
1DA60300000
|
heap
|
page read and write
|
||
1DC9FBB4000
|
heap
|
page read and write
|
||
2173D2A5000
|
heap
|
page read and write
|
||
16B17F90000
|
heap
|
page read and write
|
||
2DCD0FA4000
|
heap
|
page read and write
|
||
21F3FC14000
|
heap
|
page read and write
|
||
2DCCD09F000
|
heap
|
page read and write
|
||
2DCCF63B000
|
heap
|
page read and write
|
||
64A1C7E000
|
unkown
|
page readonly
|
||
299F740A000
|
heap
|
page read and write
|
||
2DCCFF67000
|
heap
|
page read and write
|
||
2DAEC720000
|
heap
|
page read and write
|
||
1B1377C8000
|
heap
|
page read and write
|
||
1829E410000
|
heap
|
page read and write
|
||
1FEF0DD3000
|
heap
|
page read and write
|
||
1BDF3070000
|
heap
|
page read and write
|
||
2DCCFD00000
|
direct allocation
|
page read and write
|
||
2442C4FF000
|
heap
|
page read and write
|
||
7FF72AAAF000
|
unkown
|
page write copy
|
||
23B784A3000
|
heap
|
page read and write
|
||
1FC7580F000
|
heap
|
page read and write
|
||
21F3FC1A000
|
heap
|
page read and write
|
||
1AF30BA8000
|
heap
|
page read and write
|
||
9202EFF000
|
unkown
|
page read and write
|
||
2DCD2BF0000
|
direct allocation
|
page read and write
|
||
2DCCF019000
|
heap
|
page read and write
|
||
2DCCD0E5000
|
heap
|
page read and write
|
||
2DCCED75000
|
heap
|
page read and write
|
||
15601558000
|
heap
|
page read and write
|
||
60E97DD000
|
stack
|
page read and write
|
||
1B777CEF000
|
heap
|
page read and write
|
||
15601553000
|
heap
|
page read and write
|
||
21F3FC84000
|
heap
|
page read and write
|
||
2DCCED69000
|
heap
|
page read and write
|
||
2DCCF01F000
|
heap
|
page read and write
|
||
AF776FE000
|
stack
|
page read and write
|
||
1BDCB6C0000
|
heap
|
page read and write
|
||
2442C4E2000
|
heap
|
page read and write
|
||
5B7B7E000
|
stack
|
page read and write
|
||
21F3FC11000
|
heap
|
page read and write
|
||
21A18F77000
|
heap
|
page read and write
|
||
1DC9DE40000
|
heap
|
page read and write
|
||
64A167E000
|
unkown
|
page readonly
|
||
21E30520000
|
heap
|
page read and write
|
||
2DCCEFC4000
|
heap
|
page read and write
|
||
2DAEC771000
|
heap
|
page read and write
|
||
2DCCF6FF000
|
heap
|
page read and write
|
||
2442C04B000
|
heap
|
page read and write
|
||
2DCCF087000
|
heap
|
page read and write
|
||
1B777C4C000
|
heap
|
page read and write
|
||
1DC9DB94000
|
heap
|
page read and write
|
||
FFFEF9F000
|
stack
|
page read and write
|
||
7FFDFA701000
|
unkown
|
page execute and read and write
|
||
1B1377EB000
|
heap
|
page read and write
|
||
1DA602E7000
|
heap
|
page read and write
|
||
1560156C000
|
heap
|
page read and write
|
||
2173D2FE000
|
heap
|
page read and write
|
||
2938E3DA000
|
heap
|
page read and write
|
||
B3A81BB000
|
stack
|
page read and write
|
||
2DCD05D8000
|
heap
|
page read and write
|
||
23B784B0000
|
heap
|
page read and write
|
||
7FF6E3AA1000
|
unkown
|
page read and write
|
||
2C6FCFF000
|
unkown
|
page read and write
|
||
23B784A6000
|
heap
|
page read and write
|
||
1829E5E2000
|
heap
|
page read and write
|
||
23B784B4000
|
heap
|
page read and write
|
||
2DAEC75B000
|
heap
|
page read and write
|
||
2DCCF5CC000
|
heap
|
page read and write
|
||
2DCCF695000
|
heap
|
page read and write
|
||
1FEF141E000
|
heap
|
page read and write
|
||
2DCCD0AA000
|
heap
|
page read and write
|
||
2283C430000
|
heap
|
page read and write
|
||
2DCD1F4E000
|
heap
|
page read and write
|
||
2DCD0355000
|
heap
|
page read and write
|
||
23B784B0000
|
heap
|
page read and write
|
||
20950E38000
|
heap
|
page read and write
|
||
2DCCED7F000
|
heap
|
page read and write
|
||
2283C450000
|
heap
|
page read and write
|
||
2442C4E5000
|
heap
|
page read and write
|
||
2DCCED20000
|
heap
|
page read and write
|
||
2DCCD0A3000
|
heap
|
page read and write
|
||
1829E5E7000
|
heap
|
page read and write
|
||
162B2580000
|
heap
|
page read and write
|
||
21F3FC76000
|
heap
|
page read and write
|
||
1BA66418000
|
heap
|
page read and write
|
||
21F3FC83000
|
heap
|
page read and write
|
||
2DCCED5B000
|
heap
|
page read and write
|
||
1B77262B000
|
heap
|
page read and write
|
||
1DA602E5000
|
heap
|
page read and write
|
||
2173D30D000
|
heap
|
page read and write
|
||
1829E509000
|
heap
|
page read and write
|
||
2DCD0428000
|
heap
|
page read and write
|
||
21F3FD0F000
|
trusted library allocation
|
page read and write
|
||
2DCCD093000
|
heap
|
page read and write
|
||
1DA62362000
|
heap
|
page read and write
|
||
19ABCFC0000
|
heap
|
page read and write
|
||
2DCD1F4E000
|
heap
|
page read and write
|
||
2DCD0BDA000
|
heap
|
page read and write
|
||
1FEF0F5A000
|
heap
|
page read and write
|
||
A3523BE000
|
stack
|
page read and write
|
||
182A029D000
|
heap
|
page read and write
|
||
2DCD0006000
|
heap
|
page read and write
|
||
2442DDB5000
|
heap
|
page read and write
|
||
2DCCF0BB000
|
heap
|
page read and write
|
||
157C0420000
|
heap
|
page read and write
|
||
1DA60AF1000
|
heap
|
page read and write
|
||
162B23F1000
|
heap
|
page read and write
|
||
2DCD1A04000
|
heap
|
page read and write
|
||
2DCD12DC000
|
heap
|
page read and write
|
||
20950E54000
|
heap
|
page read and write
|
||
1DC9E19E000
|
heap
|
page read and write
|
||
1FC75816000
|
heap
|
page read and write
|
||
21F3FC84000
|
heap
|
page read and write
|
||
64A0B7E000
|
stack
|
page read and write
|
||
15601561000
|
heap
|
page read and write
|
||
1C83E7E000
|
stack
|
page read and write
|
||
12B42FE000
|
stack
|
page read and write
|
||
2173D2BD000
|
heap
|
page read and write
|
||
2DCCF0DB000
|
heap
|
page read and write
|
||
157C00F0000
|
heap
|
page read and write
|
||
2173D2C6000
|
heap
|
page read and write
|
||
16B17F99000
|
heap
|
page read and write
|
||
1FEF2D94000
|
heap
|
page read and write
|
||
1FC75802000
|
heap
|
page read and write
|
||
7FF72AA9C000
|
unkown
|
page readonly
|
||
2442BE65000
|
heap
|
page read and write
|
||
2DCD0512000
|
heap
|
page read and write
|
||
21A18F7F000
|
heap
|
page read and write
|
||
1FEF1416000
|
heap
|
page read and write
|
||
1DF9C4F5000
|
heap
|
page read and write
|
||
2DCD1758000
|
heap
|
page read and write
|
||
2DCCD0DC000
|
heap
|
page read and write
|
||
21E305F0000
|
heap
|
page read and write
|
||
2DCD1216000
|
heap
|
page read and write
|
||
2173D2F5000
|
heap
|
page read and write
|
||
2DCCF65E000
|
heap
|
page read and write
|
||
156014D4000
|
heap
|
page read and write
|
||
1DA62374000
|
heap
|
page read and write
|
||
2DCD1976000
|
heap
|
page read and write
|
||
2DCD2007000
|
heap
|
page read and write
|
||
2DCD0311000
|
heap
|
page read and write
|
||
2DCD12E7000
|
heap
|
page read and write
|
||
2DCCED1E000
|
heap
|
page read and write
|
||
1FEF0E01000
|
heap
|
page read and write
|
||
2DCD1F6D000
|
heap
|
page read and write
|
||
21E307A0000
|
heap
|
page read and write
|
||
2DCD062A000
|
heap
|
page read and write
|
||
1B777A90000
|
trusted library allocation
|
page read and write
|
||
2938E42C000
|
heap
|
page read and write
|
||
2938E3A9000
|
heap
|
page read and write
|
||
20431870000
|
heap
|
page read and write
|
||
2DCD1F88000
|
heap
|
page read and write
|
||
1DF79C20000
|
heap
|
page read and write
|
||
7FF72AAB3000
|
unkown
|
page readonly
|
||
2442BE54000
|
heap
|
page read and write
|
||
21F3FC18000
|
heap
|
page read and write
|
||
2DCCEF5F000
|
heap
|
page read and write
|
||
2DCD0376000
|
heap
|
page read and write
|
||
731A5DF000
|
stack
|
page read and write
|
||
1FC75802000
|
heap
|
page read and write
|
||
1829E4EC000
|
heap
|
page read and write
|
||
23B784A4000
|
heap
|
page read and write
|
||
21F3FC11000
|
heap
|
page read and write
|
||
2DCCF02C000
|
heap
|
page read and write
|
||
2DCCF041000
|
heap
|
page read and write
|
||
1B777C8A000
|
heap
|
page read and write
|
||
2173D2FE000
|
heap
|
page read and write
|
||
2DCCF0B4000
|
heap
|
page read and write
|
||
20453930000
|
heap
|
page read and write
|
||
23B784B3000
|
heap
|
page read and write
|
||
21F3FE19000
|
heap
|
page read and write
|
||
2DCD19A6000
|
heap
|
page read and write
|
||
2DCD18ED000
|
heap
|
page read and write
|
||
A3527FF000
|
stack
|
page read and write
|
||
2442BE41000
|
heap
|
page read and write
|
||
23B784A6000
|
heap
|
page read and write
|
||
2442BE58000
|
heap
|
page read and write
|
||
2173D2A5000
|
heap
|
page read and write
|
||
2DCCED76000
|
heap
|
page read and write
|
||
2DCCFF59000
|
heap
|
page read and write
|
||
21F3FE00000
|
heap
|
page read and write
|
||
27A92FD0000
|
heap
|
page read and write
|
||
162B23F5000
|
heap
|
page read and write
|
||
2DAEC75B000
|
heap
|
page read and write
|
||
2442DDBF000
|
heap
|
page read and write
|
||
162B23FA000
|
heap
|
page read and write
|
||
2DCCF02E000
|
heap
|
page read and write
|
||
23B784AB000
|
heap
|
page read and write
|
||
1FEF0DF0000
|
heap
|
page read and write
|
||
2106B3B1000
|
heap
|
page read and write
|
||
2DCD0BCA000
|
heap
|
page read and write
|
||
2442DDC5000
|
heap
|
page read and write
|
||
2DCD19A6000
|
heap
|
page read and write
|
||
64A037E000
|
unkown
|
page readonly
|
||
21F3FCF5000
|
trusted library allocation
|
page read and write
|
||
2DCD03CC000
|
heap
|
page read and write
|
||
2DCD184C000
|
heap
|
page read and write
|
||
169C36D1000
|
heap
|
page read and write
|
||
2DCCD09E000
|
heap
|
page read and write
|
||
24A660E0000
|
heap
|
page read and write
|
||
1829E4FB000
|
heap
|
page read and write
|
||
1A01BC59000
|
heap
|
page read and write
|
||
AF7767D000
|
stack
|
page read and write
|
||
2173D239000
|
heap
|
page read and write
|
||
A0EF1FE000
|
unkown
|
page read and write
|
||
22832F51000
|
heap
|
page read and write
|
||
21F3FC6A000
|
heap
|
page read and write
|
||
1FEF0DEE000
|
heap
|
page read and write
|
||
1E397500000
|
heap
|
page read and write
|
||
2DCCF5D8000
|
heap
|
page read and write
|
||
2442BE90000
|
heap
|
page read and write
|
||
23B784AD000
|
heap
|
page read and write
|
||
2DCD0379000
|
heap
|
page read and write
|
||
2173D390000
|
heap
|
page read and write
|
||
2173D30E000
|
heap
|
page read and write
|
||
2DCCF063000
|
heap
|
page read and write
|
||
1FEF0D10000
|
heap
|
page read and write
|
||
1DA62360000
|
heap
|
page read and write
|
||
20950E8B000
|
heap
|
page read and write
|
||
1B7739A1000
|
trusted library allocation
|
page read and write
|
||
2DCD0005000
|
heap
|
page read and write
|
||
21451330000
|
heap
|
page read and write
|
||
2DCD0CA0000
|
heap
|
page read and write
|
||
1829E509000
|
heap
|
page read and write
|
||
2DCCEF33000
|
heap
|
page read and write
|
||
2442C504000
|
heap
|
page read and write
|
||
1FC75806000
|
heap
|
page read and write
|
||
2DCCD0BE000
|
heap
|
page read and write
|
||
2173D2D1000
|
heap
|
page read and write
|
||
2DCD1FFF000
|
heap
|
page read and write
|
||
1829E4F8000
|
heap
|
page read and write
|
||
2DCCEFA8000
|
heap
|
page read and write
|
||
2DCD03E2000
|
heap
|
page read and write
|
||
1DA62374000
|
heap
|
page read and write
|
||
1DA60AE9000
|
heap
|
page read and write
|
||
9202B8C000
|
stack
|
page read and write
|
||
2DCD19A7000
|
heap
|
page read and write
|
||
21F3FC69000
|
heap
|
page read and write
|
||
2DCCFF64000
|
heap
|
page read and write
|
||
2173D2B3000
|
heap
|
page read and write
|
||
1DC9FBAE000
|
heap
|
page read and write
|
||
2DCCF0CA000
|
heap
|
page read and write
|
||
2C14D658000
|
heap
|
page read and write
|
||
1FEF0F54000
|
heap
|
page read and write
|
||
2DCD1038000
|
heap
|
page read and write
|
||
2DCCED94000
|
heap
|
page read and write
|
||
1829E50C000
|
heap
|
page read and write
|
||
1B773440000
|
trusted library section
|
page readonly
|
||
2DCD0950000
|
direct allocation
|
page read and write
|
||
23B784B4000
|
heap
|
page read and write
|
||
1FC75816000
|
heap
|
page read and write
|
||
156015A7000
|
heap
|
page read and write
|
||
15601B27000
|
heap
|
page read and write
|
||
1829E403000
|
heap
|
page read and write
|
||
2173D39C000
|
heap
|
page read and write
|
||
2442C51B000
|
heap
|
page read and write
|
||
2DCD11D4000
|
heap
|
page read and write
|
||
2938E340000
|
heap
|
page read and write
|
||
1FC75808000
|
heap
|
page read and write
|
||
1AF30B90000
|
heap
|
page read and write
|
||
2DCD18BD000
|
heap
|
page read and write
|
||
1E397600000
|
heap
|
page read and write
|
||
1FEF0F70000
|
heap
|
page read and write
|
||
1F24BD40000
|
heap
|
page read and write
|
||
21E305F0000
|
heap
|
page read and write
|
||
2DCD0750000
|
direct allocation
|
page read and write
|
||
2442BE5C000
|
heap
|
page read and write
|
||
1DC9DB98000
|
heap
|
page read and write
|
||
23B784B4000
|
heap
|
page read and write
|
||
299F7421000
|
heap
|
page read and write
|
||
1DC9E2BA000
|
heap
|
page read and write
|
||
20AA8600000
|
heap
|
page read and write
|
||
20AA85C0000
|
heap
|
page read and write
|
||
1829E4EF000
|
heap
|
page read and write
|
||
DD812FF000
|
unkown
|
page read and write
|
||
1DC9E1AB000
|
heap
|
page read and write
|
||
2DCCEDA2000
|
heap
|
page read and write
|
||
2DAEC746000
|
heap
|
page read and write
|
||
21F3FE19000
|
heap
|
page read and write
|
||
1FEF142E000
|
heap
|
page read and write
|
||
7FF72AA9C000
|
unkown
|
page readonly
|
||
1FC75808000
|
heap
|
page read and write
|
||
26749310000
|
heap
|
page read and write
|
||
2938E2A0000
|
heap
|
page read and write
|
||
1FC7580D000
|
heap
|
page read and write
|
||
1FC75808000
|
heap
|
page read and write
|
||
21F3FE19000
|
heap
|
page read and write
|
||
2DCD137F000
|
heap
|
page read and write
|
||
1FEF1414000
|
heap
|
page read and write
|
||
2DCD1D21000
|
heap
|
page read and write
|
||
4B55D7E000
|
stack
|
page read and write
|
||
2DCD2043000
|
heap
|
page read and write
|
||
1B777AB6000
|
trusted library allocation
|
page read and write
|
||
21E30550000
|
heap
|
page read and write
|
||
2DCCF0FC000
|
heap
|
page read and write
|
||
1DC9E1C5000
|
heap
|
page read and write
|
||
1FC75815000
|
heap
|
page read and write
|
||
15601522000
|
heap
|
page read and write
|
||
1DA60AD0000
|
heap
|
page read and write
|
||
2442C4FC000
|
heap
|
page read and write
|
||
2DCD1F66000
|
heap
|
page read and write
|
||
21F3FC66000
|
heap
|
page read and write
|
||
1560169B000
|
heap
|
page read and write
|
||
2DCD1D1F000
|
heap
|
page read and write
|
||
2DCD07B8000
|
direct allocation
|
page read and write
|
||
1DA60AF9000
|
heap
|
page read and write
|
||
2DCD0C5E000
|
heap
|
page read and write
|
||
2DCD1D1F000
|
heap
|
page read and write
|
||
1BA663B0000
|
heap
|
page read and write
|
||
2DCCED10000
|
heap
|
page read and write
|
||
2DCD0308000
|
heap
|
page read and write
|
||
35C2ED7000
|
stack
|
page read and write
|
||
2173D2E9000
|
heap
|
page read and write
|
||
23B783B0000
|
heap
|
page read and write
|
||
2442BE66000
|
heap
|
page read and write
|
||
2173EB40000
|
heap
|
page read and write
|
||
2DCD000C000
|
heap
|
page read and write
|
||
2DCCF040000
|
heap
|
page read and write
|
||
15601B49000
|
heap
|
page read and write
|
||
1FC75802000
|
heap
|
page read and write
|
||
85FB1FF000
|
stack
|
page read and write
|
||
1DF9C210000
|
heap
|
page read and write
|
||
2442C52A000
|
heap
|
page read and write
|
||
15601440000
|
heap
|
page read and write
|
||
2DCCF6A4000
|
heap
|
page read and write
|
||
1DA60540000
|
heap
|
page read and write
|
||
B6285DE000
|
stack
|
page read and write
|
||
1FC7580B000
|
heap
|
page read and write
|
||
2442BE6D000
|
heap
|
page read and write
|
||
162B23C6000
|
heap
|
page read and write
|
||
2938EA50000
|
heap
|
page read and write
|
||
1DA60AC8000
|
heap
|
page read and write
|
||
15601B4B000
|
heap
|
page read and write
|
||
1DA602F3000
|
heap
|
page read and write
|
||
12B3F8E000
|
stack
|
page read and write
|
||
2173D30A000
|
heap
|
page read and write
|
||
1560151C000
|
heap
|
page read and write
|
||
2DCCF003000
|
heap
|
page read and write
|
||
2DCD10CC000
|
heap
|
page read and write
|
||
7FF72AAB3000
|
unkown
|
page readonly
|
||
2DCD18ED000
|
heap
|
page read and write
|
||
1DC9DB84000
|
heap
|
page read and write
|
||
231B2A50000
|
heap
|
page read and write
|
||
1FEF141E000
|
heap
|
page read and write
|
||
64A0E7E000
|
unkown
|
page readonly
|
||
2DCCD0BC000
|
heap
|
page read and write
|
||
1FC75806000
|
heap
|
page read and write
|
||
1B773001000
|
trusted library allocation
|
page read and write
|
||
2106B360000
|
heap
|
page read and write
|
||
23B784A3000
|
heap
|
page read and write
|
||
26749270000
|
heap
|
page read and write
|
||
1FEF1429000
|
heap
|
page read and write
|
||
1FEF2D8E000
|
heap
|
page read and write
|
||
21A18F87000
|
heap
|
page read and write
|
||
2DCCED12000
|
heap
|
page read and write
|
||
162B24A0000
|
heap
|
page read and write
|
||
24A660F0000
|
heap
|
page read and write
|
||
2887F177000
|
heap
|
page read and write
|
||
20431920000
|
heap
|
page read and write
|
||
1B772580000
|
heap
|
page read and write
|
||
2DCD1CA6000
|
heap
|
page read and write
|
||
2DCD2114000
|
heap
|
page read and write
|
||
156014D0000
|
heap
|
page read and write
|
||
2442BE54000
|
heap
|
page read and write
|
||
21A18F8C000
|
heap
|
page read and write
|
||
1FC75815000
|
heap
|
page read and write
|
||
27A92DD0000
|
heap
|
page read and write
|
||
1FC75815000
|
heap
|
page read and write
|
||
64A0C7E000
|
unkown
|
page readonly
|
||
2173D2BD000
|
heap
|
page read and write
|
||
2DCD1CE7000
|
heap
|
page read and write
|
||
2C6FDFF000
|
stack
|
page read and write
|
||
216B3C00000
|
heap
|
page read and write
|
||
1FC757A0000
|
heap
|
page readonly
|
||
21F3FC0C000
|
heap
|
page read and write
|
||
2173EC5E000
|
heap
|
page read and write
|
||
1829E510000
|
heap
|
page read and write
|
||
2283C520000
|
heap
|
page read and write
|
||
A966DE4000
|
stack
|
page read and write
|
||
162B23B7000
|
heap
|
page read and write
|
||
1DA60ADE000
|
heap
|
page read and write
|
||
266A34E000
|
stack
|
page read and write
|
||
1560155B000
|
heap
|
page read and write
|
||
1DC9DE00000
|
heap
|
page read and write
|
||
2DCD184C000
|
heap
|
page read and write
|
||
1FEF0F57000
|
heap
|
page read and write
|
||
23B784A3000
|
heap
|
page read and write
|
||
5A2EADC000
|
stack
|
page read and write
|
||
1DA62366000
|
heap
|
page read and write
|
||
2442BE9E000
|
heap
|
page read and write
|
||
2DCD030D000
|
heap
|
page read and write
|
||
2442C510000
|
heap
|
page read and write
|
||
1FEF0DED000
|
heap
|
page read and write
|
||
2173D2FA000
|
heap
|
page read and write
|
||
162B23EE000
|
heap
|
page read and write
|
||
2DCCEF10000
|
heap
|
page read and write
|
||
2DCCF52C000
|
heap
|
page read and write
|
||
21F3FE15000
|
heap
|
page read and write
|
||
59AA4FF000
|
stack
|
page read and write
|
||
2173EB5E000
|
heap
|
page read and write
|
||
20950E7D000
|
heap
|
page read and write
|
||
F0937FF000
|
stack
|
page read and write
|
||
1829E350000
|
heap
|
page read and write
|
||
156014E0000
|
heap
|
page read and write
|
||
1829E401000
|
heap
|
page read and write
|
||
27A92DC0000
|
heap
|
page read and write
|
||
21F3FC11000
|
heap
|
page read and write
|
||
2DCCFFF4000
|
heap
|
page read and write
|
||
2DCCCFA0000
|
heap
|
page read and write
|
||
20950E90000
|
heap
|
page read and write
|
||
2DCCF46B000
|
heap
|
page read and write
|
||
1DA60630000
|
heap
|
page read and write
|
||
23B784A6000
|
heap
|
page read and write
|
||
1829E41E000
|
heap
|
page read and write
|
||
228331B0000
|
heap
|
page read and write
|
||
2DCD000B000
|
heap
|
page read and write
|
||
2DAEC776000
|
heap
|
page read and write
|
||
21F3FC5E000
|
heap
|
page read and write
|
||
1829E50A000
|
heap
|
page read and write
|
||
2DCCF09F000
|
heap
|
page read and write
|
||
22694262000
|
heap
|
page read and write
|
||
2DCCEF2E000
|
heap
|
page read and write
|
||
E52C36D000
|
stack
|
page read and write
|
||
B6285E4000
|
stack
|
page read and write
|
||
22832F30000
|
heap
|
page read and write
|
||
2DCD108A000
|
heap
|
page read and write
|
||
1FEF2D8E000
|
heap
|
page read and write
|
||
2442BE58000
|
heap
|
page read and write
|
||
2938EA80000
|
heap
|
page read and write
|
||
23B783C0000
|
heap
|
page readonly
|
||
2DCCEF21000
|
heap
|
page read and write
|
||
2DCCF721000
|
heap
|
page read and write
|
||
1FEF0F75000
|
heap
|
page read and write
|
||
1DC9FBAD000
|
heap
|
page read and write
|
||
1DA60635000
|
heap
|
page read and write
|
||
A966DD5000
|
stack
|
page read and write
|
||
15601B2C000
|
heap
|
page read and write
|
||
23B784AB000
|
heap
|
page read and write
|
||
2DCCEFD0000
|
heap
|
page read and write
|
||
1829E3F0000
|
heap
|
page read and write
|
||
2DCD1C21000
|
heap
|
page read and write
|
||
64A1379000
|
stack
|
page read and write
|
||
2DCCF57B000
|
heap
|
page read and write
|
||
1FEF0DB8000
|
heap
|
page read and write
|
||
1DA60240000
|
heap
|
page read and write
|
||
1FEF0D92000
|
heap
|
page read and write
|
||
1DA602B0000
|
heap
|
page read and write
|
||
A5E29FE000
|
stack
|
page read and write
|
||
3995AFC000
|
stack
|
page read and write
|
||
2DCCED1A000
|
heap
|
page read and write
|
||
2173D2FA000
|
heap
|
page read and write
|
||
2442BFE0000
|
heap
|
page read and write
|
||
1DA60280000
|
trusted library allocation
|
page read and write
|
||
1DC9DB9D000
|
heap
|
page read and write
|
||
2938EA60000
|
heap
|
page read and write
|
||
2DCCEFF8000
|
heap
|
page read and write
|
||
1FC75808000
|
heap
|
page read and write
|
||
1FEF0DF0000
|
heap
|
page read and write
|
||
2442C4EA000
|
heap
|
page read and write
|
||
2DCCF540000
|
heap
|
page read and write
|
||
1DC9DB47000
|
heap
|
page read and write
|
||
1FEF2D70000
|
heap
|
page read and write
|
||
156014E5000
|
heap
|
page read and write
|
||
2173D236000
|
heap
|
page read and write
|
||
2173D28E000
|
heap
|
page read and write
|
||
1B772600000
|
heap
|
page read and write
|
||
1FC75790000
|
heap
|
page read and write
|
||
2DCCD09C000
|
heap
|
page read and write
|
||
2DCCFE68000
|
heap
|
page read and write
|
||
2DCD1934000
|
heap
|
page read and write
|
||
2DAEC680000
|
heap
|
page read and write
|
||
2DCD000F000
|
heap
|
page read and write
|
||
2DCCF597000
|
heap
|
page read and write
|
||
2DCD1F66000
|
heap
|
page read and write
|
||
23B78400000
|
heap
|
page read and write
|
||
1DC9E1A3000
|
heap
|
page read and write
|
||
21A19105000
|
heap
|
page read and write
|
||
1E397620000
|
heap
|
page read and write
|
||
21A18F72000
|
heap
|
page read and write
|
||
2442C4F7000
|
heap
|
page read and write
|
||
2DCCF57A000
|
heap
|
page read and write
|
||
2DCCFF33000
|
heap
|
page read and write
|
||
2DCCFFFB000
|
heap
|
page read and write
|
||
8EF1C7F000
|
stack
|
page read and write
|
||
22694246000
|
heap
|
page read and write
|
||
15601564000
|
heap
|
page read and write
|
||
2DCD0005000
|
heap
|
page read and write
|
||
2413AD00000
|
heap
|
page read and write
|
||
2DCD0E54000
|
heap
|
page read and write
|
||
15F0C652000
|
heap
|
page read and write
|
||
7FF72AA70000
|
unkown
|
page readonly
|
||
2DCCEF54000
|
heap
|
page read and write
|
||
2DCCF03B000
|
heap
|
page read and write
|
||
2442BEA3000
|
heap
|
page read and write
|
||
1F24BE40000
|
heap
|
page read and write
|
||
2442DDB1000
|
heap
|
page read and write
|
||
1B777B51000
|
trusted library allocation
|
page read and write
|
||
2DCCF730000
|
direct allocation
|
page read and write
|
||
2173D2FE000
|
heap
|
page read and write
|
||
2442BE17000
|
heap
|
page read and write
|
||
2DCCEF69000
|
heap
|
page read and write
|
||
1B773340000
|
trusted library allocation
|
page read and write
|
||
2DCCFDA0000
|
direct allocation
|
page read and write
|
||
2DCCED09000
|
heap
|
page read and write
|
||
1B137640000
|
heap
|
page read and write
|
||
1DA60304000
|
heap
|
page read and write
|
||
2413AAB7000
|
heap
|
page read and write
|
||
1829E4FB000
|
heap
|
page read and write
|
||
1A01BC60000
|
heap
|
page read and write
|
||
15601B53000
|
heap
|
page read and write
|
||
21F3FC9E000
|
heap
|
page read and write
|
||
1DC9DE4B000
|
heap
|
page read and write
|
||
2173D30A000
|
heap
|
page read and write
|
||
14CF55A6000
|
heap
|
page read and write
|
||
2DCCED15000
|
heap
|
page read and write
|
||
2DCCEF7E000
|
heap
|
page read and write
|
||
3CBB6FF000
|
stack
|
page read and write
|
||
A966FDF000
|
stack
|
page read and write
|
||
1829E41A000
|
heap
|
page read and write
|
||
1DC9DB39000
|
heap
|
page read and write
|
||
1DA602E5000
|
heap
|
page read and write
|
||
1DA6236D000
|
heap
|
page read and write
|
||
20950E77000
|
heap
|
page read and write
|
||
2DCD2047000
|
heap
|
page read and write
|
||
1DC9E2B5000
|
heap
|
page read and write
|
||
2DCCEDD2000
|
heap
|
page read and write
|
||
1FEF2D85000
|
heap
|
page read and write
|
||
204318C5000
|
heap
|
page read and write
|
||
2DCCEF9D000
|
heap
|
page read and write
|
||
1829E390000
|
trusted library allocation
|
page read and write
|
||
216B3C90000
|
heap
|
page read and write
|
||
2413A9D0000
|
heap
|
page read and write
|
||
2DAEC776000
|
heap
|
page read and write
|
||
21A18F81000
|
heap
|
page read and write
|
||
1FC7580F000
|
heap
|
page read and write
|
||
2DAEC650000
|
heap
|
page read and write
|
||
A9FE47F000
|
stack
|
page read and write
|
||
1DC9E197000
|
heap
|
page read and write
|
||
1DA6236D000
|
heap
|
page read and write
|
||
2173EC54000
|
heap
|
page read and write
|
||
1DA6054A000
|
heap
|
page read and write
|
||
22694249000
|
heap
|
page read and write
|
||
20453610000
|
heap
|
page read and write
|
||
1AF60A70000
|
heap
|
page read and write
|
||
1FEF0DD6000
|
heap
|
page read and write
|
||
2DCCFE56000
|
heap
|
page read and write
|
||
20431770000
|
heap
|
page read and write
|
||
20453530000
|
heap
|
page read and write
|
||
21F3FC8E000
|
heap
|
page read and write
|
||
23B79F10000
|
heap
|
page read and write
|
||
2DCCF083000
|
heap
|
page read and write
|
||
7FF6E3A60000
|
unkown
|
page readonly
|
||
24A66430000
|
heap
|
page read and write
|
||
2173D26F000
|
heap
|
page read and write
|
||
2DCD1E8E000
|
heap
|
page read and write
|
||
2442BE65000
|
heap
|
page read and write
|
||
2938E6F0000
|
heap
|
page read and write
|
||
162B23F3000
|
heap
|
page read and write
|
||
20950E52000
|
heap
|
page read and write
|
||
1FC7580B000
|
heap
|
page read and write
|
||
2442BE6A000
|
heap
|
page read and write
|
||
2DCCD07E000
|
heap
|
page read and write
|
||
2DCCF07C000
|
heap
|
page read and write
|
||
59AA2FC000
|
stack
|
page read and write
|
||
2938E40A000
|
heap
|
page read and write
|
||
2DCD203F000
|
heap
|
page read and write
|
||
162B23A8000
|
heap
|
page read and write
|
||
1FC75802000
|
heap
|
page read and write
|
||
1DA60AC7000
|
heap
|
page read and write
|
||
14CF5570000
|
heap
|
page read and write
|
||
2173D2B4000
|
heap
|
page read and write
|
||
2173D2FE000
|
heap
|
page read and write
|
||
19ABD290000
|
heap
|
page read and write
|
||
731A55F000
|
stack
|
page read and write
|
||
1DC9E1BA000
|
heap
|
page read and write
|
||
1B777BA0000
|
trusted library allocation
|
page read and write
|
||
2DCCF596000
|
heap
|
page read and write
|
||
2DCD1F80000
|
heap
|
page read and write
|
||
2DCD204F000
|
heap
|
page read and write
|
||
2DCD0D4B000
|
heap
|
page read and write
|
||
2938E3CA000
|
heap
|
page read and write
|
||
23B784A6000
|
heap
|
page read and write
|
||
21A18F62000
|
heap
|
page read and write
|
||
B53C57E000
|
stack
|
page read and write
|
||
156015C0000
|
heap
|
page read and write
|
||
15601B59000
|
heap
|
page read and write
|
||
1B777C3F000
|
heap
|
page read and write
|
||
2173EB59000
|
heap
|
page read and write
|
||
1B777AEE000
|
trusted library allocation
|
page read and write
|
||
23B784B3000
|
heap
|
page read and write
|
||
169C38A0000
|
heap
|
page read and write
|
||
1FEF0DF7000
|
heap
|
page read and write
|
||
2DCD1F7E000
|
heap
|
page read and write
|
||
2DCCEFD9000
|
heap
|
page read and write
|
||
216B3C35000
|
heap
|
page read and write
|
||
6A706FF000
|
unkown
|
page read and write
|
||
1829E4B0000
|
trusted library allocation
|
page read and write
|
||
1DC9FBA4000
|
heap
|
page read and write
|
||
2DCCED13000
|
heap
|
page read and write
|
||
1CCFB9F0000
|
heap
|
page read and write
|
||
231B2940000
|
heap
|
page read and write
|
||
1BA66420000
|
heap
|
page read and write
|
||
22694160000
|
heap
|
page read and write
|
||
7A8A9FF000
|
stack
|
page read and write
|
||
2283C4A5000
|
heap
|
page read and write
|
||
2DCCF6FF000
|
heap
|
page read and write
|
||
204318C0000
|
heap
|
page read and write
|
||
1FEF0DED000
|
heap
|
page read and write
|
||
1829E3E6000
|
heap
|
page read and write
|
||
2173D2BD000
|
heap
|
page read and write
|
||
1DC9DB92000
|
heap
|
page read and write
|
||
1AF60BD5000
|
heap
|
page read and write
|
||
2DCCED19000
|
heap
|
page read and write
|
||
1FEF0D89000
|
heap
|
page read and write
|
||
1DC9E2BA000
|
heap
|
page read and write
|
||
1FEF0D30000
|
trusted library allocation
|
page read and write
|
||
60177FE000
|
stack
|
page read and write
|
||
14CF54C0000
|
heap
|
page read and write
|
||
1F24C0B0000
|
heap
|
page read and write
|
||
2DCCF717000
|
heap
|
page read and write
|
||
21F3FC13000
|
heap
|
page read and write
|
||
21F3FC84000
|
heap
|
page read and write
|
||
2173D27F000
|
heap
|
page read and write
|
||
21F3FC66000
|
heap
|
page read and write
|
||
2DCD0DF4000
|
heap
|
page read and write
|
||
2442BE99000
|
heap
|
page read and write
|
||
1FC75808000
|
heap
|
page read and write
|
||
22694080000
|
heap
|
page read and write
|
||
B53C47B000
|
stack
|
page read and write
|
||
2DCD19B3000
|
heap
|
page read and write
|
||
2173D2AE000
|
heap
|
page read and write
|
||
1829E3E7000
|
heap
|
page read and write
|
||
1FEF0DBF000
|
heap
|
page read and write
|
||
2DCCD0D4000
|
heap
|
page read and write
|
||
2938E430000
|
heap
|
page read and write
|
||
2106B3B1000
|
heap
|
page read and write
|
||
1FC77150000
|
heap
|
page read and write
|
||
1829E5EB000
|
heap
|
page read and write
|
||
2DCD1A15000
|
heap
|
page read and write
|
||
21F3FBF8000
|
heap
|
page read and write
|
||
1BDF3290000
|
heap
|
page read and write
|
||
2173D28D000
|
heap
|
page read and write
|
||
2173D2E0000
|
heap
|
page read and write
|
||
162B23EE000
|
heap
|
page read and write
|
||
21F44522000
|
trusted library allocation
|
page read and write
|
||
1B777BC0000
|
trusted library allocation
|
page read and write
|
||
1829E5E5000
|
heap
|
page read and write
|
||
A35277F000
|
stack
|
page read and write
|
||
1DA60AE8000
|
heap
|
page read and write
|
||
1B7779D0000
|
trusted library allocation
|
page read and write
|
||
2DCCF659000
|
heap
|
page read and write
|
||
2173D2C6000
|
heap
|
page read and write
|
||
1DA6054B000
|
heap
|
page read and write
|
||
2DCCEF56000
|
heap
|
page read and write
|
||
2DCCD080000
|
heap
|
page read and write
|
||
2DCD1F60000
|
heap
|
page read and write
|
||
2442BE9B000
|
heap
|
page read and write
|
||
23B784A8000
|
heap
|
page read and write
|
||
2DCD0097000
|
heap
|
page read and write
|
||
2DCCF070000
|
heap
|
page read and write
|
||
A5E28FC000
|
stack
|
page read and write
|
||
1B777AC4000
|
trusted library allocation
|
page read and write
|
||
204536B0000
|
heap
|
page read and write
|
||
2DCD011C000
|
heap
|
page read and write
|
||
156014D8000
|
heap
|
page read and write
|
||
6EE3AFC000
|
stack
|
page read and write
|
||
1B1377EB000
|
heap
|
page read and write
|
||
1829E403000
|
heap
|
page read and write
|
||
162B2610000
|
heap
|
page read and write
|
||
1B77268F000
|
heap
|
page read and write
|
||
2173D2FC000
|
heap
|
page read and write
|
||
2DCD1934000
|
heap
|
page read and write
|
||
2DCD030F000
|
heap
|
page read and write
|
||
2938E3A8000
|
heap
|
page read and write
|
||
1DA60302000
|
heap
|
page read and write
|
||
216B3C90000
|
heap
|
page read and write
|
||
1DA60ADE000
|
heap
|
page read and write
|
||
1DA602E5000
|
heap
|
page read and write
|
||
2DCD1E96000
|
heap
|
page read and write
|
||
2DCD1329000
|
heap
|
page read and write
|
||
1A01BAA0000
|
heap
|
page read and write
|
||
1DC9DBA7000
|
heap
|
page read and write
|
||
D041EFE000
|
stack
|
page read and write
|
||
2DCCEF53000
|
heap
|
page read and write
|
||
24A66435000
|
heap
|
page read and write
|
||
2DCCECFE000
|
heap
|
page read and write
|
||
1DC9FBB4000
|
heap
|
page read and write
|
||
2173EC5D000
|
heap
|
page read and write
|
||
2106B665000
|
heap
|
page read and write
|
||
2173D302000
|
heap
|
page read and write
|
||
2DCCFF58000
|
heap
|
page read and write
|
||
2DAEC660000
|
heap
|
page read and write
|
||
2DCCF6E6000
|
heap
|
page read and write
|
||
2DCD1F66000
|
heap
|
page read and write
|
||
1B7726A1000
|
heap
|
page read and write
|
||
2442BE17000
|
heap
|
page read and write
|
||
2DCD1E73000
|
heap
|
page read and write
|
||
2DCCED50000
|
heap
|
page read and write
|
||
2DAEC77C000
|
heap
|
page read and write
|
||
1DA60ADE000
|
heap
|
page read and write
|
||
1DA62470000
|
heap
|
page read and write
|
||
1DA60323000
|
heap
|
page read and write
|
||
2DCCEF3B000
|
heap
|
page read and write
|
||
2938E6F9000
|
heap
|
page read and write
|
||
1DA60AD1000
|
heap
|
page read and write
|
||
650439C000
|
stack
|
page read and write
|
||
2DCD1CE7000
|
heap
|
page read and write
|
||
2DCD1934000
|
heap
|
page read and write
|
||
2442BE33000
|
heap
|
page read and write
|
||
2DCCEF51000
|
heap
|
page read and write
|
||
182A029D000
|
heap
|
page read and write
|
||
2DCCF053000
|
heap
|
page read and write
|
||
2DCCED27000
|
heap
|
page read and write
|
||
1B777BB0000
|
trusted library allocation
|
page read and write
|
||
2DCCED0E000
|
heap
|
page read and write
|
||
16B17F40000
|
heap
|
page read and write
|
||
1B777B03000
|
trusted library allocation
|
page read and write
|
||
A9BABBB000
|
stack
|
page read and write
|
||
2DCCD081000
|
heap
|
page read and write
|
||
1DF79FA5000
|
heap
|
page read and write
|
||
1DA60544000
|
heap
|
page read and write
|
||
1F24BE5F000
|
heap
|
page read and write
|
||
23B784A6000
|
heap
|
page read and write
|
||
1FEF0DE4000
|
heap
|
page read and write
|
||
2DCCED97000
|
heap
|
page read and write
|
||
1DA60AF4000
|
heap
|
page read and write
|
||
2DCD0B9A000
|
heap
|
page read and write
|
||
7FF72AAB3000
|
unkown
|
page readonly
|
||
2938E3D9000
|
heap
|
page read and write
|
||
2DCD2CFB000
|
heap
|
page read and write
|
||
2DCD175C000
|
heap
|
page read and write
|
||
2DCD0E51000
|
heap
|
page read and write
|
||
1FEF0F5E000
|
heap
|
page read and write
|
||
3CBB4FB000
|
stack
|
page read and write
|
||
2DCCEF2D000
|
heap
|
page read and write
|
||
2DCD184C000
|
heap
|
page read and write
|
||
21F3FC9F000
|
heap
|
page read and write
|
||
2DCCEDC8000
|
heap
|
page read and write
|
||
2DCCF07C000
|
heap
|
page read and write
|
||
2DCD0BDA000
|
heap
|
page read and write
|
||
2DCD15CC000
|
heap
|
page read and write
|
||
16B17F20000
|
heap
|
page read and write
|
||
2DCCFE65000
|
heap
|
page read and write
|
||
2DCD1F70000
|
heap
|
page read and write
|
||
216B3C7D000
|
heap
|
page read and write
|
||
21F3FE08000
|
heap
|
page read and write
|
||
6EE3BFF000
|
unkown
|
page read and write
|
||
E6F5DE000
|
stack
|
page read and write
|
||
1FEF0D30000
|
trusted library allocation
|
page read and write
|
||
2DCD1F66000
|
heap
|
page read and write
|
||
1B779000000
|
heap
|
page read and write
|
||
A9FE13B000
|
stack
|
page read and write
|
||
2DCD200D000
|
heap
|
page read and write
|
||
1DC9DB8A000
|
heap
|
page read and write
|
||
2DCCF085000
|
heap
|
page read and write
|
||
2DCD0379000
|
heap
|
page read and write
|
||
162B23FA000
|
heap
|
page read and write
|
||
2442DDC5000
|
heap
|
page read and write
|
||
2173EC54000
|
heap
|
page read and write
|
||
21F3FD70000
|
heap
|
page readonly
|
||
1FC7580F000
|
heap
|
page read and write
|
||
23B784AB000
|
heap
|
page read and write
|
||
216B3C90000
|
heap
|
page read and write
|
||
1FEF0DC6000
|
heap
|
page read and write
|
||
2106B3B1000
|
heap
|
page read and write
|
||
2DCCEF3A000
|
heap
|
page read and write
|
||
2DCCFF23000
|
heap
|
page read and write
|
||
19ABCFD5000
|
heap
|
page read and write
|
||
1DF79D82000
|
heap
|
page read and write
|
||
2DCCED51000
|
heap
|
page read and write
|
||
15601B33000
|
heap
|
page read and write
|
||
1DA60ACC000
|
heap
|
page read and write
|
||
1FEF0DE6000
|
heap
|
page read and write
|
||
2173D302000
|
heap
|
page read and write
|
||
1DA62376000
|
heap
|
page read and write
|
||
156014C0000
|
heap
|
page read and write
|
||
2DCCD0AA000
|
heap
|
page read and write
|
||
156033CE000
|
heap
|
page read and write
|
||
2DCCF683000
|
heap
|
page read and write
|
||
1DA602F2000
|
heap
|
page read and write
|
||
2DCCF682000
|
heap
|
page read and write
|
||
2DCCED2A000
|
heap
|
page read and write
|
||
169C36B0000
|
heap
|
page read and write
|
||
23B784A6000
|
heap
|
page read and write
|
||
2DAEC728000
|
heap
|
page read and write
|
||
2DCD13C0000
|
heap
|
page read and write
|
||
1F836B2F000
|
heap
|
page read and write
|
||
2442BE6D000
|
heap
|
page read and write
|
||
2DCD18EE000
|
heap
|
page read and write
|
||
1B777A68000
|
trusted library allocation
|
page read and write
|
||
1B777C53000
|
heap
|
page read and write
|
||
156014C0000
|
heap
|
page read and write
|
||
15601563000
|
heap
|
page read and write
|
||
156015A4000
|
heap
|
page read and write
|
||
26749250000
|
heap
|
page read and write
|
||
1829E5EA000
|
heap
|
page read and write
|
||
2DAEC773000
|
heap
|
page read and write
|
||
2DCCEDA0000
|
heap
|
page read and write
|
||
2442C045000
|
heap
|
page read and write
|
||
21F3FD50000
|
trusted library allocation
|
page execute
|
||
2DCD022C000
|
heap
|
page read and write
|
||
21451210000
|
heap
|
page read and write
|
||
2DCCEF6D000
|
heap
|
page read and write
|
||
2DCCEF68000
|
heap
|
page read and write
|
||
156033C6000
|
heap
|
page read and write
|
||
2DCD0378000
|
heap
|
page read and write
|
||
2442C4EB000
|
heap
|
page read and write
|
||
21A18F58000
|
heap
|
page read and write
|
||
156014EA000
|
heap
|
page read and write
|
||
15601556000
|
heap
|
page read and write
|
||
64A077E000
|
unkown
|
page readonly
|
||
2DCCED69000
|
heap
|
page read and write
|
||
299F7230000
|
heap
|
page read and write
|
||
1DC9FBA3000
|
heap
|
page read and write
|
||
1B7739D0000
|
trusted library allocation
|
page read and write
|
||
2DCD1A04000
|
heap
|
page read and write
|
||
2442DDBF000
|
heap
|
page read and write
|
||
1A01BD40000
|
heap
|
page read and write
|
||
2DCCEF3A000
|
heap
|
page read and write
|
||
1829E3E5000
|
heap
|
page read and write
|
||
1DF9C2D0000
|
heap
|
page read and write
|
||
15601480000
|
heap
|
page read and write
|
||
2173D370000
|
heap
|
page read and write
|
||
601787F000
|
stack
|
page read and write
|
||
2DCCFF58000
|
heap
|
page read and write
|
||
7FF72AAAF000
|
unkown
|
page read and write
|
||
2173D2B8000
|
heap
|
page read and write
|
||
2938EA90000
|
heap
|
page read and write
|
||
21F3FC6B000
|
heap
|
page read and write
|
||
2DCCF01F000
|
heap
|
page read and write
|
||
2442C508000
|
heap
|
page read and write
|
||
2DCD000F000
|
heap
|
page read and write
|
||
2938E399000
|
heap
|
page read and write
|
||
23B784A6000
|
heap
|
page read and write
|
||
A35267D000
|
stack
|
page read and write
|
||
2173D27F000
|
heap
|
page read and write
|
||
27A92DB0000
|
heap
|
page read and write
|
||
2442BE00000
|
heap
|
page read and write
|
||
1B772E15000
|
heap
|
page read and write
|
||
1DC9E1A1000
|
heap
|
page read and write
|
||
2DAEC771000
|
heap
|
page read and write
|
||
2DCD0AD4000
|
heap
|
page read and write
|
||
1BDF307B000
|
heap
|
page read and write
|
||
8DD38FF000
|
stack
|
page read and write
|
||
1B772F13000
|
heap
|
page read and write
|
||
21A18F62000
|
heap
|
page read and write
|
||
2DCCF0FC000
|
heap
|
page read and write
|
||
F0933DB000
|
stack
|
page read and write
|
||
2DCCF726000
|
heap
|
page read and write
|
||
2DCCF46C000
|
heap
|
page read and write
|
||
15601695000
|
heap
|
page read and write
|
||
1DA602C7000
|
heap
|
page read and write
|
||
1DC9FBAE000
|
heap
|
page read and write
|
||
2DCCF6A4000
|
heap
|
page read and write
|
||
23B784AB000
|
heap
|
page read and write
|
||
BB8EDED000
|
stack
|
page read and write
|
||
1FEF1429000
|
heap
|
page read and write
|
||
1FC75803000
|
heap
|
page read and write
|
||
2442BE63000
|
heap
|
page read and write
|
||
21F3FE0B000
|
heap
|
page read and write
|
||
20950E64000
|
heap
|
page read and write
|
||
2DCD0305000
|
heap
|
page read and write
|
||
2DCD1329000
|
heap
|
page read and write
|
||
2173D255000
|
heap
|
page read and write
|
||
14CF54E0000
|
heap
|
page read and write
|
||
21A18F88000
|
heap
|
page read and write
|
||
266A2CD000
|
stack
|
page read and write
|
||
2173D2E9000
|
heap
|
page read and write
|
||
21A18F30000
|
heap
|
page read and write
|
||
21A18F7D000
|
heap
|
page read and write
|
||
281E7690000
|
heap
|
page read and write
|
||
2DCCF5DD000
|
heap
|
page read and write
|
||
1B772673000
|
heap
|
page read and write
|
||
1B777AA0000
|
trusted library allocation
|
page read and write
|
||
FFFF37F000
|
stack
|
page read and write
|
||
1DA6031B000
|
heap
|
page read and write
|
||
2DCD1F60000
|
heap
|
page read and write
|
||
2173D302000
|
heap
|
page read and write
|
||
27A92FF0000
|
heap
|
page read and write
|
||
2DCD203F000
|
heap
|
page read and write
|
||
2DCCD0AA000
|
heap
|
page read and write
|
||
20AA867B000
|
heap
|
page read and write
|
||
81FD67F000
|
stack
|
page read and write
|
||
21A18F5D000
|
heap
|
page read and write
|
||
7FF6E3A8C000
|
unkown
|
page readonly
|
||
6A7031C000
|
stack
|
page read and write
|
||
1A01BC59000
|
heap
|
page read and write
|
||
1C839D8000
|
stack
|
page read and write
|
||
1829E515000
|
heap
|
page read and write
|
||
2DCCED2F000
|
heap
|
page read and write
|
||
1829E406000
|
heap
|
page read and write
|
||
2DCD203F000
|
heap
|
page read and write
|
||
226941F0000
|
heap
|
page read and write
|
||
1B777CC7000
|
heap
|
page read and write
|
||
1560156B000
|
heap
|
page read and write
|
||
2DCD062A000
|
heap
|
page read and write
|
||
2938E510000
|
heap
|
page read and write
|
||
2173D276000
|
heap
|
page read and write
|
||
2DCCED97000
|
heap
|
page read and write
|
||
2173D30A000
|
heap
|
page read and write
|
||
2442C523000
|
heap
|
page read and write
|
||
2DCD062A000
|
heap
|
page read and write
|
||
15601B2C000
|
heap
|
page read and write
|
||
1DA602E5000
|
heap
|
page read and write
|
||
2DCD0311000
|
heap
|
page read and write
|
||
2DCCEF40000
|
heap
|
page read and write
|
||
2DCCF579000
|
heap
|
page read and write
|
||
2DCCED15000
|
heap
|
page read and write
|
||
2DCCFF23000
|
heap
|
page read and write
|
||
47C3BFE000
|
stack
|
page read and write
|
||
1DA60300000
|
heap
|
page read and write
|
||
2DCCF085000
|
heap
|
page read and write
|
||
1DC9FBA0000
|
heap
|
page read and write
|
||
1B777B54000
|
trusted library allocation
|
page read and write
|
||
1A5F0FB5000
|
heap
|
page read and write
|
||
2173D2AE000
|
heap
|
page read and write
|
||
2DCCFFC6000
|
heap
|
page read and write
|
||
1BA66410000
|
heap
|
page read and write
|
||
1DA60260000
|
heap
|
page read and write
|
||
1DC9DBAE000
|
heap
|
page read and write
|
||
162B23EF000
|
heap
|
page read and write
|
||
2DAEC75B000
|
heap
|
page read and write
|
||
2DCD0302000
|
heap
|
page read and write
|
||
182A0294000
|
heap
|
page read and write
|
||
1AF30B00000
|
heap
|
page read and write
|
||
1FEF2D94000
|
heap
|
page read and write
|
||
A9BAEFF000
|
unkown
|
page read and write
|
||
2DCCF044000
|
heap
|
page read and write
|
||
1DA60AE8000
|
heap
|
page read and write
|
||
2442BE9C000
|
heap
|
page read and write
|
||
3995CFF000
|
stack
|
page read and write
|
||
14CF55A6000
|
heap
|
page read and write
|
||
2DCCED19000
|
heap
|
page read and write
|
||
2DCCD08D000
|
heap
|
page read and write
|
||
2DCCFF58000
|
heap
|
page read and write
|
||
2DCD18DC000
|
heap
|
page read and write
|
||
64A08FE000
|
stack
|
page read and write
|
||
15601553000
|
heap
|
page read and write
|
||
2DCCEE10000
|
direct allocation
|
page read and write
|
||
2442BE9D000
|
heap
|
page read and write
|
||
162B23A0000
|
heap
|
page read and write
|
||
2DCD16F6000
|
heap
|
page read and write
|
||
1829E50F000
|
heap
|
page read and write
|
||
1FEF140C000
|
heap
|
page read and write
|
||
35C2FDE000
|
stack
|
page read and write
|
||
2DCCF72A000
|
heap
|
page read and write
|
||
228331C0000
|
heap
|
page read and write
|
||
281E7790000
|
heap
|
page read and write
|
||
64A09FE000
|
stack
|
page read and write
|
||
15601B20000
|
heap
|
page read and write
|
||
23B784AB000
|
heap
|
page read and write
|
||
2DCD1548000
|
heap
|
page read and write
|
||
169C3880000
|
heap
|
page read and write
|
||
4AFA27F000
|
stack
|
page read and write
|
||
20950E62000
|
heap
|
page read and write
|
||
14CF5578000
|
heap
|
page read and write
|
||
2DCD1692000
|
heap
|
page read and write
|
||
2442C522000
|
heap
|
page read and write
|
||
2173D2F8000
|
heap
|
page read and write
|
||
1FC75808000
|
heap
|
page read and write
|
||
1FC75816000
|
heap
|
page read and write
|
||
2442BE60000
|
heap
|
page read and write
|
||
7FF6E3A60000
|
unkown
|
page readonly
|
||
1DA6063B000
|
heap
|
page read and write
|
||
1DA60304000
|
heap
|
page read and write
|
||
2DCCED9E000
|
heap
|
page read and write
|
||
21F3FC6A000
|
heap
|
page read and write
|
||
2938E42B000
|
heap
|
page read and write
|
||
2DCCEDCE000
|
heap
|
page read and write
|
||
1560154A000
|
heap
|
page read and write
|
||
1FEF1410000
|
heap
|
page read and write
|
||
2106B390000
|
heap
|
page read and write
|
||
2283C52B000
|
heap
|
page read and write
|
||
2DCCEF66000
|
heap
|
page read and write
|
||
2173D2D7000
|
heap
|
page read and write
|
||
15601556000
|
heap
|
page read and write
|
||
2DCD1E73000
|
heap
|
page read and write
|
||
15601556000
|
heap
|
page read and write
|
||
1A5F0FB0000
|
heap
|
page read and write
|
||
2DAEC746000
|
heap
|
page read and write
|
||
1829E509000
|
heap
|
page read and write
|
||
2DCCED90000
|
heap
|
page read and write
|
||
14CF55BC000
|
heap
|
page read and write
|
||
1829E429000
|
heap
|
page read and write
|
||
2DCD0CE3000
|
heap
|
page read and write
|
||
2DCD1F6D000
|
heap
|
page read and write
|
||
1FC7580D000
|
heap
|
page read and write
|
||
2173D2C7000
|
heap
|
page read and write
|
||
157C0425000
|
heap
|
page read and write
|
||
1BDF33A0000
|
heap
|
page read and write
|
||
2DCCF052000
|
heap
|
page read and write
|
||
156033C2000
|
heap
|
page read and write
|
||
2173D27F000
|
heap
|
page read and write
|
||
1B137797000
|
heap
|
page read and write
|
||
2DCD1F46000
|
heap
|
page read and write
|
||
2DCCFF69000
|
heap
|
page read and write
|
||
B3A85FF000
|
stack
|
page read and write
|
||
23B784A3000
|
heap
|
page read and write
|
||
15F0C652000
|
heap
|
page read and write
|
||
2442C501000
|
heap
|
page read and write
|
||
2442BE34000
|
heap
|
page read and write
|
||
7FF6E3A8C000
|
unkown
|
page readonly
|
||
2DCCF0C2000
|
heap
|
page read and write
|
||
1FC75808000
|
heap
|
page read and write
|
||
60E9AFE000
|
stack
|
page read and write
|
||
2DCCF10E000
|
heap
|
page read and write
|
||
2442BE57000
|
heap
|
page read and write
|
||
21F3FC13000
|
heap
|
page read and write
|
||
A0EF0FC000
|
stack
|
page read and write
|
||
23B784A3000
|
heap
|
page read and write
|
||
1FEF141E000
|
heap
|
page read and write
|
||
1B777CF4000
|
heap
|
page read and write
|
||
7FF72AA70000
|
unkown
|
page readonly
|
||
1DC9E1C2000
|
heap
|
page read and write
|
||
1B777BB0000
|
trusted library allocation
|
page read and write
|
||
1FEF0DF5000
|
heap
|
page read and write
|
||
2173D2FA000
|
heap
|
page read and write
|
||
1829E5E4000
|
heap
|
page read and write
|
||
2DCD1F6F000
|
heap
|
page read and write
|
||
21A18F73000
|
heap
|
page read and write
|
||
2DCCD080000
|
heap
|
page read and write
|
||
2442BE58000
|
heap
|
page read and write
|
||
2DCD1047000
|
heap
|
page read and write
|
||
2DCD1A15000
|
heap
|
page read and write
|
||
2DCCF46B000
|
heap
|
page read and write
|
||
156015AA000
|
heap
|
page read and write
|
||
2173D2CC000
|
heap
|
page read and write
|
||
1FEF0DD3000
|
heap
|
page read and write
|
||
157C0160000
|
heap
|
page read and write
|
||
2DCD1E4C000
|
heap
|
page read and write
|
||
182A03B0000
|
heap
|
page read and write
|
||
21F3FCF8000
|
trusted library allocation
|
page read and write
|
||
2DCCEF3B000
|
heap
|
page read and write
|
||
2DAEC77C000
|
heap
|
page read and write
|
||
1AF60890000
|
heap
|
page read and write
|
||
2442C4EE000
|
heap
|
page read and write
|
||
21F3FC6D000
|
heap
|
page read and write
|
||
1DA60230000
|
heap
|
page read and write
|
||
23B784B3000
|
heap
|
page read and write
|
||
2DCCFED4000
|
heap
|
page read and write
|
||
2DCCCE80000
|
heap
|
page read and write
|
||
2173D2E0000
|
heap
|
page read and write
|
||
21F3FC4B000
|
heap
|
page read and write
|
||
15601561000
|
heap
|
page read and write
|
||
20950E77000
|
heap
|
page read and write
|
||
1FEF0DFA000
|
heap
|
page read and write
|
||
1DC9DD20000
|
trusted library allocation
|
page read and write
|
||
2173D2FC000
|
heap
|
page read and write
|
||
1FC7580A000
|
heap
|
page read and write
|
||
14CF54B0000
|
heap
|
page read and write
|
||
1B772E02000
|
heap
|
page read and write
|
||
2DCD019E000
|
heap
|
page read and write
|
||
2DCD0EDE000
|
heap
|
page read and write
|
||
1B772640000
|
heap
|
page read and write
|
||
2DCD160E000
|
heap
|
page read and write
|
||
2442BE99000
|
heap
|
page read and write
|
||
64A0EFE000
|
stack
|
page read and write
|
||
1DA60304000
|
heap
|
page read and write
|
||
156014B6000
|
heap
|
page read and write
|
||
15601542000
|
heap
|
page read and write
|
||
1FC7580D000
|
heap
|
page read and write
|
||
2173D2A5000
|
heap
|
page read and write
|
||
1DA60480000
|
heap
|
page read and write
|
||
12B437F000
|
stack
|
page read and write
|
||
2442C4E7000
|
heap
|
page read and write
|
||
1FC757FE000
|
heap
|
page read and write
|
||
2442DDBE000
|
heap
|
page read and write
|
||
231B2D25000
|
heap
|
page read and write
|
||
1DC9E1B9000
|
heap
|
page read and write
|
||
1FC75809000
|
heap
|
page read and write
|
||
20453630000
|
heap
|
page read and write
|
||
2DCCF10A000
|
heap
|
page read and write
|
||
2DCD1038000
|
heap
|
page read and write
|
||
1FEF1409000
|
heap
|
page read and write
|
||
15601360000
|
heap
|
page read and write
|
||
60176FF000
|
stack
|
page read and write
|
||
2173EB57000
|
heap
|
page read and write
|
||
2DCCF101000
|
heap
|
page read and write
|
||
35C327E000
|
stack
|
page read and write
|
||
2DCD07AC000
|
direct allocation
|
page read and write
|
||
2DCD1C62000
|
heap
|
page read and write
|
||
1DF79E60000
|
heap
|
page read and write
|
||
1DA6030A000
|
heap
|
page read and write
|
||
2173D258000
|
heap
|
page read and write
|
||
1FC75808000
|
heap
|
page read and write
|
||
7FF72AA71000
|
unkown
|
page execute read
|
||
1B777A78000
|
trusted library allocation
|
page read and write
|
||
2DCCED28000
|
heap
|
page read and write
|
||
2DCCF04F000
|
heap
|
page read and write
|
||
2173D0D0000
|
heap
|
page read and write
|
||
1DC9DD40000
|
heap
|
page read and write
|
||
2DCD02FF000
|
heap
|
page read and write
|
||
2DCCF46F000
|
heap
|
page read and write
|
||
2DCCFFEE000
|
heap
|
page read and write
|
||
2106B3B1000
|
heap
|
page read and write
|
||
1FEF0DD9000
|
heap
|
page read and write
|
||
1B1377BB000
|
heap
|
page read and write
|
||
2DAEC74C000
|
heap
|
page read and write
|
||
20950E80000
|
heap
|
page read and write
|
||
2DCD0005000
|
heap
|
page read and write
|
||
2DCD1F66000
|
heap
|
page read and write
|
||
162B23EE000
|
heap
|
page read and write
|
||
1829E419000
|
heap
|
page read and write
|
||
1DA60547000
|
heap
|
page read and write
|
||
1829E4FB000
|
heap
|
page read and write
|
||
2DCD1E73000
|
heap
|
page read and write
|
||
2442DDB0000
|
heap
|
page read and write
|
||
1FEF0DF0000
|
heap
|
page read and write
|
||
2C14D650000
|
heap
|
page read and write
|
||
2DCCED97000
|
heap
|
page read and write
|
||
1829E5EA000
|
heap
|
page read and write
|
||
1FEF0DD3000
|
heap
|
page read and write
|
||
1DA6030B000
|
heap
|
page read and write
|
||
1DA60323000
|
heap
|
page read and write
|
||
1B777B90000
|
trusted library allocation
|
page read and write
|
||
3E4D57E000
|
stack
|
page read and write
|
||
2DCD2043000
|
heap
|
page read and write
|
||
2173EC5E000
|
heap
|
page read and write
|
||
2DCCEF88000
|
heap
|
page read and write
|
||
182A02A3000
|
heap
|
page read and write
|
||
1B1377DC000
|
heap
|
page read and write
|
||
65046FF000
|
unkown
|
page read and write
|
||
2DCCCFF0000
|
heap
|
page read and write
|
||
2DCCEF35000
|
heap
|
page read and write
|
||
2DCD13C0000
|
heap
|
page read and write
|
||
1DC9DB88000
|
heap
|
page read and write
|
||
299F75F0000
|
heap
|
page read and write
|
||
1FEF0F50000
|
heap
|
page read and write
|
||
2DCCD0AA000
|
heap
|
page read and write
|
||
2173D236000
|
heap
|
page read and write
|
||
15601B3F000
|
heap
|
page read and write
|
||
64A097E000
|
unkown
|
page readonly
|
||
21F3FC6B000
|
heap
|
page read and write
|
||
47C40FF000
|
stack
|
page read and write
|
||
1FC7580F000
|
heap
|
page read and write
|
||
1FC75815000
|
heap
|
page read and write
|
||
2DCCF52D000
|
heap
|
page read and write
|
||
15601B3F000
|
heap
|
page read and write
|
||
2442C4F0000
|
heap
|
page read and write
|
||
2DCCF6FF000
|
heap
|
page read and write
|
||
1FEF0DDF000
|
heap
|
page read and write
|
||
20431934000
|
heap
|
page read and write
|
||
1DA60AF1000
|
heap
|
page read and write
|
||
2DCD137B000
|
heap
|
page read and write
|
||
2DCD1F7E000
|
heap
|
page read and write
|
||
216B3BE0000
|
heap
|
page read and write
|
||
1DC9E1C9000
|
heap
|
page read and write
|
||
2173D2F6000
|
heap
|
page read and write
|
||
20AA85F0000
|
heap
|
page read and write
|
||
1DF79D20000
|
heap
|
page read and write
|
||
2442C510000
|
heap
|
page read and write
|
||
21451048000
|
heap
|
page read and write
|
||
2DCD03E7000
|
heap
|
page read and write
|
||
2DCCF09A000
|
heap
|
page read and write
|
||
2DCCFF58000
|
heap
|
page read and write
|
||
1B773490000
|
trusted library section
|
page readonly
|
||
1FC75802000
|
heap
|
page read and write
|
||
20453935000
|
heap
|
page read and write
|
||
21F3FD05000
|
trusted library allocation
|
page read and write
|
||
1FEF0D97000
|
heap
|
page read and write
|
||
2173D2A5000
|
heap
|
page read and write
|
||
15601B3F000
|
heap
|
page read and write
|
||
2DCCE890000
|
direct allocation
|
page read and write
|
||
2DCCD0AC000
|
heap
|
page read and write
|
||
2DCCED65000
|
heap
|
page read and write
|
||
1AF30E10000
|
heap
|
page read and write
|
||
1FEF0DD1000
|
heap
|
page read and write
|
||
1FEF0DBF000
|
heap
|
page read and write
|
||
1AF30E00000
|
heap
|
page read and write
|
||
2DCCED13000
|
heap
|
page read and write
|
||
2283C4A0000
|
heap
|
page read and write
|
||
2173D30A000
|
heap
|
page read and write
|
||
2DCCEAE0000
|
direct allocation
|
page read and write
|
||
1FEF0D30000
|
trusted library allocation
|
page read and write
|
||
21F3FC6D000
|
heap
|
page read and write
|
||
2DCCED46000
|
heap
|
page read and write
|
||
2DCD16E4000
|
heap
|
page read and write
|
||
1BDCB7A0000
|
heap
|
page read and write
|
||
1829E423000
|
heap
|
page read and write
|
||
1BA66390000
|
heap
|
page read and write
|
||
21F3FC84000
|
heap
|
page read and write
|
||
2442C040000
|
heap
|
page read and write
|
||
2173EB44000
|
heap
|
page read and write
|
||
1829E5E0000
|
heap
|
page read and write
|
||
A9BAFFF000
|
stack
|
page read and write
|
||
21F3FC17000
|
heap
|
page read and write
|
||
2DCD129B000
|
heap
|
page read and write
|
||
23B7849F000
|
heap
|
page read and write
|
||
2442BE79000
|
heap
|
page read and write
|
||
2173D300000
|
heap
|
page read and write
|
||
1DC9DB88000
|
heap
|
page read and write
|
||
64A0FFE000
|
stack
|
page read and write
|
||
DF41CFE000
|
stack
|
page read and write
|
||
182A029D000
|
heap
|
page read and write
|
||
21A18F80000
|
heap
|
page read and write
|
||
1B773450000
|
trusted library section
|
page readonly
|
||
2173D27F000
|
heap
|
page read and write
|
||
2DCCF5FA000
|
heap
|
page read and write
|
||
1829E4FB000
|
heap
|
page read and write
|
||
2442BE6D000
|
heap
|
page read and write
|
||
2DCCED97000
|
heap
|
page read and write
|
||
2DCCF695000
|
heap
|
page read and write
|
||
2DCCD0B6000
|
heap
|
page read and write
|
||
2442C528000
|
heap
|
page read and write
|
||
2DCD1D69000
|
heap
|
page read and write
|
||
F0936FF000
|
stack
|
page read and write
|
||
1560156D000
|
heap
|
page read and write
|
||
21F3FE0A000
|
heap
|
page read and write
|
||
1B7725B0000
|
trusted library allocation
|
page read and write
|
||
2173D276000
|
heap
|
page read and write
|
||
2DCD02B0000
|
heap
|
page read and write
|
||
21F3FBF4000
|
heap
|
page read and write
|
||
1A01BBA0000
|
heap
|
page read and write
|
||
2DCD1E98000
|
heap
|
page read and write
|
||
23B784A3000
|
heap
|
page read and write
|
||
156033C0000
|
heap
|
page read and write
|
||
2DCCF030000
|
heap
|
page read and write
|
||
156014D4000
|
heap
|
page read and write
|
||
2DCCED74000
|
heap
|
page read and write
|
||
20950E77000
|
heap
|
page read and write
|
||
1E397700000
|
heap
|
page read and write
|
||
21F3FE14000
|
heap
|
page read and write
|
||
20AA8840000
|
heap
|
page read and write
|
||
2DCD160E000
|
heap
|
page read and write
|
||
2DCCF542000
|
heap
|
page read and write
|
||
2DCCF331000
|
heap
|
page read and write
|
||
2283C350000
|
heap
|
page read and write
|
||
21F3FC66000
|
heap
|
page read and write
|
||
2DCCF608000
|
heap
|
page read and write
|
||
2DCCD07C000
|
heap
|
page read and write
|
||
1FC75802000
|
heap
|
page read and write
|
||
DF419EE000
|
stack
|
page read and write
|
||
2DCD199A000
|
heap
|
page read and write
|
||
1FEF1413000
|
heap
|
page read and write
|
||
2DAEC747000
|
heap
|
page read and write
|
||
2173D2E9000
|
heap
|
page read and write
|
||
1FC7580B000
|
heap
|
page read and write
|
||
1DC9E1B9000
|
heap
|
page read and write
|
||
2DCCEF52000
|
heap
|
page read and write
|
||
2DCD13C0000
|
heap
|
page read and write
|
||
1FEF140F000
|
heap
|
page read and write
|
||
2173D2B1000
|
heap
|
page read and write
|
||
2DCD1D1F000
|
heap
|
page read and write
|
||
21A18F6A000
|
heap
|
page read and write
|
||
2DCCFEF3000
|
heap
|
page read and write
|
||
2DCCF6A4000
|
heap
|
page read and write
|
||
1DA60AC0000
|
heap
|
page read and write
|
||
2442BE5D000
|
heap
|
page read and write
|
||
2442DF20000
|
heap
|
page read and write
|
||
64A127E000
|
unkown
|
page readonly
|
||
21F3FE13000
|
heap
|
page read and write
|
||
2DCCEFAA000
|
heap
|
page read and write
|
||
2DCD129B000
|
heap
|
page read and write
|
||
27A92E30000
|
heap
|
page read and write
|
||
2DCD18ED000
|
heap
|
page read and write
|
||
2173D2D7000
|
heap
|
page read and write
|
||
A3526FF000
|
stack
|
page read and write
|
||
23B784AD000
|
heap
|
page read and write
|
||
2DCCEF8F000
|
heap
|
page read and write
|
||
20431929000
|
heap
|
page read and write
|
||
2DCD16F4000
|
heap
|
page read and write
|
||
14CF55BC000
|
heap
|
page read and write
|
||
2DCD19A6000
|
heap
|
page read and write
|
||
1829E406000
|
heap
|
page read and write
|
||
1FC75815000
|
heap
|
page read and write
|
||
20950E81000
|
heap
|
page read and write
|
||
27A92E0A000
|
heap
|
page read and write
|
||
A966DDA000
|
stack
|
page read and write
|
||
156014D4000
|
heap
|
page read and write
|
||
D041DFF000
|
unkown
|
page read and write
|
||
1FC75808000
|
heap
|
page read and write
|
||
1FEF0DE1000
|
heap
|
page read and write
|
||
2DCD1D69000
|
heap
|
page read and write
|
||
1FC75808000
|
heap
|
page read and write
|
||
23B784B3000
|
heap
|
page read and write
|
||
2442C51C000
|
heap
|
page read and write
|
||
15601B4C000
|
heap
|
page read and write
|
||
2DCCF6ED000
|
heap
|
page read and write
|
||
2173D210000
|
heap
|
page read and write
|
||
22694240000
|
heap
|
page read and write
|
||
1AF30B10000
|
heap
|
page read and write
|
||
21F3FC6F000
|
heap
|
page read and write
|
||
2173D300000
|
heap
|
page read and write
|
||
162B2615000
|
heap
|
page read and write
|
||
64A107E000
|
unkown
|
page readonly
|
||
1DA60304000
|
heap
|
page read and write
|
||
2173D2EE000
|
heap
|
page read and write
|
||
2DCCED97000
|
heap
|
page read and write
|
||
2DCD1D21000
|
heap
|
page read and write
|
||
1DC9DB96000
|
heap
|
page read and write
|
||
1FC757B0000
|
heap
|
page read and write
|
||
2DCCF53F000
|
heap
|
page read and write
|
||
157C00D0000
|
heap
|
page read and write
|
||
47C3FFE000
|
stack
|
page read and write
|
||
2DCCED5F000
|
heap
|
page read and write
|
||
23B784B3000
|
heap
|
page read and write
|
||
21F3FC4B000
|
heap
|
page read and write
|
||
7FF6E3A9F000
|
unkown
|
page write copy
|
||
2DCD2115000
|
heap
|
page read and write
|
||
22832F4A000
|
heap
|
page read and write
|
||
2DCD1934000
|
heap
|
page read and write
|
||
E2FABD9000
|
stack
|
page read and write
|
||
2DCD1DF7000
|
heap
|
page read and write
|
||
23B784A3000
|
heap
|
page read and write
|
||
21F3FE15000
|
heap
|
page read and write
|
||
2DCD0E49000
|
heap
|
page read and write
|
||
1FC75816000
|
heap
|
page read and write
|
||
1DC9DE4D000
|
heap
|
page read and write
|
||
E2FB3AE000
|
stack
|
page read and write
|
||
1B777A50000
|
trusted library allocation
|
page read and write
|
||
2173D2B2000
|
heap
|
page read and write
|
||
2DCCED6B000
|
heap
|
page read and write
|
||
2DCCEFED000
|
heap
|
page read and write
|
||
2DCD1FB0000
|
heap
|
page read and write
|
||
23B784A6000
|
heap
|
page read and write
|
||
2DCD1F60000
|
heap
|
page read and write
|
||
1F836B10000
|
heap
|
page read and write
|
||
F09377F000
|
stack
|
page read and write
|
||
2DCCEFA7000
|
heap
|
page read and write
|
||
1FEF0DC3000
|
heap
|
page read and write
|
||
2DCD0096000
|
heap
|
page read and write
|
||
1DC9E19F000
|
heap
|
page read and write
|
||
20950E00000
|
heap
|
page read and write
|
||
64A0CFE000
|
stack
|
page read and write
|
||
2106B560000
|
heap
|
page read and write
|
||
156014D4000
|
heap
|
page read and write
|
||
2DCD1F6D000
|
heap
|
page read and write
|
||
281E780F000
|
heap
|
page read and write
|
||
2DCD203F000
|
heap
|
page read and write
|
||
1AF608A9000
|
heap
|
page read and write
|
||
1A01BC60000
|
heap
|
page read and write
|
||
1DC9DAF0000
|
heap
|
page read and write
|
||
21F3FC66000
|
heap
|
page read and write
|
||
16B17E20000
|
heap
|
page read and write
|
||
1A01BEC5000
|
heap
|
page read and write
|
||
2DCCEF68000
|
heap
|
page read and write
|
||
2DCCECE5000
|
heap
|
page read and write
|
||
2DCCED44000
|
heap
|
page read and write
|
||
1DA602C2000
|
heap
|
page read and write
|
||
1DA60AE8000
|
heap
|
page read and write
|
||
2173D2FC000
|
heap
|
page read and write
|
||
1DA60327000
|
heap
|
page read and write
|
||
2DCD03E3000
|
heap
|
page read and write
|
||
21A18F37000
|
heap
|
page read and write
|
||
1FC7580D000
|
heap
|
page read and write
|
||
1DC9DB47000
|
heap
|
page read and write
|
||
21F3FC84000
|
heap
|
page read and write
|
||
2DCCED5F000
|
heap
|
page read and write
|
||
1DA60309000
|
heap
|
page read and write
|
||
1B772694000
|
heap
|
page read and write
|
||
1B7726FF000
|
heap
|
page read and write
|
||
1FEF0F5A000
|
heap
|
page read and write
|
||
1AF60A90000
|
heap
|
page read and write
|
||
2DCD061B000
|
heap
|
page read and write
|
||
15601B57000
|
heap
|
page read and write
|
||
2442C4E0000
|
heap
|
page read and write
|
||
2173D23E000
|
heap
|
page read and write
|
||
1F836B19000
|
heap
|
page read and write
|
||
B3A84FF000
|
unkown
|
page read and write
|
||
2DCCE918000
|
direct allocation
|
page read and write
|
||
1BDF3270000
|
heap
|
page read and write
|
||
2173D30E000
|
heap
|
page read and write
|
||
2442C4EA000
|
heap
|
page read and write
|
||
1DC9DB70000
|
heap
|
page read and write
|
||
20950D50000
|
heap
|
page read and write
|
||
1FC75808000
|
heap
|
page read and write
|
||
216B3C90000
|
heap
|
page read and write
|
||
1829E4F4000
|
heap
|
page read and write
|
||
1FC7580B000
|
heap
|
page read and write
|
||
1DC9FBB6000
|
heap
|
page read and write
|
||
2442BE54000
|
heap
|
page read and write
|
||
21F3FE13000
|
heap
|
page read and write
|
||
2173D2A6000
|
heap
|
page read and write
|
||
2DCCED1E000
|
heap
|
page read and write
|
||
7FF72AA70000
|
unkown
|
page readonly
|
||
2DCCF72E000
|
heap
|
page read and write
|
||
1FC75808000
|
heap
|
page read and write
|
||
21A18EA0000
|
heap
|
page read and write
|
||
21F3FC10000
|
heap
|
page read and write
|
||
23B784A3000
|
heap
|
page read and write
|
||
2442BE99000
|
heap
|
page read and write
|
||
2DCCF707000
|
heap
|
page read and write
|
||
A966DDE000
|
stack
|
page read and write
|
||
2938E376000
|
heap
|
page read and write
|
||
2DCD0850000
|
direct allocation
|
page read and write
|
||
2DCD204F000
|
heap
|
page read and write
|
||
14CF55CC000
|
heap
|
page read and write
|
||
2DCCF039000
|
heap
|
page read and write
|
||
162B23EE000
|
heap
|
page read and write
|
||
B6285E0000
|
stack
|
page read and write
|
||
1829E519000
|
heap
|
page read and write
|
||
2DCD2D00000
|
direct allocation
|
page read and write
|
||
2DCD1F4E000
|
heap
|
page read and write
|
||
1DC9DB96000
|
heap
|
page read and write
|
||
2442BD90000
|
heap
|
page read and write
|
||
21F3F1D5000
|
trusted library allocation
|
page read and write
|
||
23B784B3000
|
heap
|
page read and write
|
||
2DCD1150000
|
heap
|
page read and write
|
||
2442BFD0000
|
trusted library allocation
|
page read and write
|
||
2DCCFFEC000
|
heap
|
page read and write
|
||
15F0C730000
|
heap
|
page read and write
|
||
2DCCEF69000
|
heap
|
page read and write
|
||
1FC757FE000
|
heap
|
page read and write
|
||
2173D2EA000
|
heap
|
page read and write
|
||
2DCD0F20000
|
heap
|
page read and write
|
||
2DCCF075000
|
heap
|
page read and write
|
||
21F3FE19000
|
heap
|
page read and write
|
||
B53C5FF000
|
stack
|
page read and write
|
||
2DCD000C000
|
heap
|
page read and write
|
||
156014E3000
|
heap
|
page read and write
|
||
1B77267D000
|
heap
|
page read and write
|
||
1DA60313000
|
heap
|
page read and write
|
||
1829E5EE000
|
heap
|
page read and write
|
||
64A157A000
|
stack
|
page read and write
|
||
21F3FC12000
|
heap
|
page read and write
|
||
1B777A6E000
|
trusted library allocation
|
page read and write
|
||
2442BE90000
|
heap
|
page read and write
|
||
15601690000
|
heap
|
page read and write
|
||
156014EA000
|
heap
|
page read and write
|
||
23B784B4000
|
heap
|
page read and write
|
||
1B777CF9000
|
heap
|
page read and write
|
||
2DCD02FF000
|
heap
|
page read and write
|
||
2106B340000
|
heap
|
page read and write
|
||
2DCCED0A000
|
heap
|
page read and write
|
||
1829E5E3000
|
heap
|
page read and write
|
||
157C0170000
|
heap
|
page read and write
|
||
2442BDE0000
|
trusted library allocation
|
page read and write
|
||
23B784A3000
|
heap
|
page read and write
|
||
1560169D000
|
heap
|
page read and write
|
||
1FC75815000
|
heap
|
page read and write
|
||
2DCD18DC000
|
heap
|
page read and write
|
||
2DCCFF23000
|
heap
|
page read and write
|
||
1BDCB930000
|
heap
|
page read and write
|
||
D041CFC000
|
stack
|
page read and write
|
||
1DC9FBA2000
|
heap
|
page read and write
|
||
1B777AF1000
|
trusted library allocation
|
page read and write
|
||
2DCD0E5A000
|
heap
|
page read and write
|
||
16B17F00000
|
heap
|
page read and write
|
||
2DCCD0AC000
|
heap
|
page read and write
|
||
21F3FE08000
|
heap
|
page read and write
|
||
1FEF0DD3000
|
heap
|
page read and write
|
||
156015A0000
|
heap
|
page read and write
|
||
15601553000
|
heap
|
page read and write
|
||
1E3976F0000
|
heap
|
page read and write
|
||
2DCD1F66000
|
heap
|
page read and write
|
||
1DA60300000
|
heap
|
page read and write
|
||
23B784A7000
|
heap
|
page read and write
|
||
2173D27F000
|
heap
|
page read and write
|
||
2DCD1E98000
|
heap
|
page read and write
|
||
2DCCD07F000
|
heap
|
page read and write
|
||
AF7777F000
|
stack
|
page read and write
|
||
1DA6031A000
|
heap
|
page read and write
|
||
2173D302000
|
heap
|
page read and write
|
||
2173D250000
|
heap
|
page read and write
|
||
21F3FC6F000
|
heap
|
page read and write
|
||
2938E361000
|
heap
|
page read and write
|
||
2DCCD0A8000
|
heap
|
page read and write
|
||
1829E640000
|
heap
|
page read and write
|
||
2DCD00D9000
|
heap
|
page read and write
|
||
2DCD16E4000
|
heap
|
page read and write
|
||
2442BE47000
|
heap
|
page read and write
|
||
BCF23FF000
|
unkown
|
page read and write
|
||
1DA60AF1000
|
heap
|
page read and write
|
||
7FF72AAB3000
|
unkown
|
page readonly
|
||
2DCCF723000
|
heap
|
page read and write
|
||
1B7725C0000
|
trusted library section
|
page read and write
|
||
281E7770000
|
heap
|
page read and write
|
||
23B784A6000
|
heap
|
page read and write
|
||
15601B49000
|
heap
|
page read and write
|
||
2442C4E3000
|
heap
|
page read and write
|
||
1DC9FBA1000
|
heap
|
page read and write
|
||
1FC75808000
|
heap
|
page read and write
|
||
14CF559C000
|
heap
|
page read and write
|
||
15601B34000
|
heap
|
page read and write
|
||
1FC75808000
|
heap
|
page read and write
|
||
2DCCF0E0000
|
heap
|
page read and write
|
||
1DC9DB99000
|
heap
|
page read and write
|
||
1B777A60000
|
trusted library allocation
|
page read and write
|
||
1DA6236D000
|
heap
|
page read and write
|
||
299F7600000
|
heap
|
page read and write
|
||
2DAEC771000
|
heap
|
page read and write
|
||
2DCD17BE000
|
heap
|
page read and write
|
||
2DCD02F2000
|
heap
|
page read and write
|
||
1DC9DB65000
|
heap
|
page read and write
|
||
1829E419000
|
heap
|
page read and write
|
||
21F3FBF7000
|
heap
|
page read and write
|
||
BB8F0FF000
|
unkown
|
page read and write
|
||
2DCD0B58000
|
heap
|
page read and write
|
||
1A5F0BA0000
|
heap
|
page read and write
|
||
1829E401000
|
heap
|
page read and write
|
||
1DA60280000
|
trusted library allocation
|
page read and write
|
||
2DCCED20000
|
heap
|
page read and write
|
||
1DC9E2B2000
|
heap
|
page read and write
|
||
2442C4EE000
|
heap
|
page read and write
|
||
1DA6032F000
|
heap
|
page read and write
|
||
1DC9DB70000
|
heap
|
page read and write
|
||
1B777C60000
|
heap
|
page read and write
|
||
7FFDFAD92000
|
unkown
|
page execute and read and write
|
||
1DA60AD4000
|
heap
|
page read and write
|
||
2DCCF6FF000
|
heap
|
page read and write
|
||
169C3660000
|
heap
|
page read and write
|
||
1FEF1400000
|
heap
|
page read and write
|
||
2DCD1D1C000
|
heap
|
page read and write
|
||
2DCCEFAC000
|
heap
|
page read and write
|
||
2DCCED68000
|
heap
|
page read and write
|
||
2173D2FC000
|
heap
|
page read and write
|
||
2938E3A8000
|
heap
|
page read and write
|
||
21451050000
|
heap
|
page read and write
|
||
2DCCFF23000
|
heap
|
page read and write
|
||
2DCD1F88000
|
heap
|
page read and write
|
||
2DCD203F000
|
heap
|
page read and write
|
||
2173EB61000
|
heap
|
page read and write
|
||
2DCD000B000
|
heap
|
page read and write
|
||
1DA60AF1000
|
heap
|
page read and write
|
||
2DCCEDBA000
|
heap
|
page read and write
|
||
156014E4000
|
heap
|
page read and write
|
||
2DCD137B000
|
heap
|
page read and write
|
||
22694180000
|
heap
|
page read and write
|
||
2938E398000
|
heap
|
page read and write
|
||
2173D303000
|
heap
|
page read and write
|
||
27A92E20000
|
heap
|
page read and write
|
||
21F3FE19000
|
heap
|
page read and write
|
||
14CF5597000
|
heap
|
page read and write
|
||
2DCCEDBE000
|
heap
|
page read and write
|
||
21F3FC02000
|
heap
|
page read and write
|
||
2DCCF60B000
|
heap
|
page read and write
|
||
1DC9DD00000
|
heap
|
page read and write
|
||
2DCCFF59000
|
heap
|
page read and write
|
||
21F3FC6F000
|
heap
|
page read and write
|
||
2C14D620000
|
heap
|
page read and write
|
||
2DCD000B000
|
heap
|
page read and write
|
||
2DCD1A04000
|
heap
|
page read and write
|
||
2173D2B9000
|
heap
|
page read and write
|
||
1829E3F0000
|
heap
|
page read and write
|
||
1829E401000
|
heap
|
page read and write
|
||
64A057E000
|
unkown
|
page readonly
|
||
B6285DA000
|
stack
|
page read and write
|
||
2DCCFF62000
|
heap
|
page read and write
|
||
1FC7580D000
|
heap
|
page read and write
|
||
2DCCEF66000
|
heap
|
page read and write
|
||
1DC9DB97000
|
heap
|
page read and write
|
||
1DC9E190000
|
heap
|
page read and write
|
||
2DCCD0A8000
|
heap
|
page read and write
|
||
64A017E000
|
unkown
|
page readonly
|
||
1DA60AED000
|
heap
|
page read and write
|
||
1DF79D00000
|
heap
|
page read and write
|
||
22832F51000
|
heap
|
page read and write
|
||
2DCCF608000
|
heap
|
page read and write
|
||
23B78480000
|
heap
|
page read and write
|
||
2DCD1DAA000
|
heap
|
page read and write
|
||
1DC9DB74000
|
heap
|
page read and write
|
||
2DCCEF6B000
|
heap
|
page read and write
|
||
1DC9DBA6000
|
heap
|
page read and write
|
||
1B137790000
|
heap
|
page read and write
|
||
1829E5EA000
|
heap
|
page read and write
|
||
14CF559C000
|
heap
|
page read and write
|
||
1BDCB838000
|
heap
|
page read and write
|
||
35C2F5E000
|
stack
|
page read and write
|
||
1FEF0C10000
|
heap
|
page read and write
|
||
1829E419000
|
heap
|
page read and write
|
||
2DCD03CC000
|
heap
|
page read and write
|
||
2938E374000
|
heap
|
page read and write
|
||
64A027B000
|
stack
|
page read and write
|
||
2DCD1402000
|
heap
|
page read and write
|
||
1B137A45000
|
heap
|
page read and write
|
||
2DCCEFA7000
|
heap
|
page read and write
|
||
1829E370000
|
heap
|
page read and write
|
||
21F3FE06000
|
heap
|
page read and write
|
||
2DAEC76B000
|
heap
|
page read and write
|
||
7FF72AA9C000
|
unkown
|
page readonly
|
||
1FEF0D80000
|
heap
|
page read and write
|
||
2C6F9AC000
|
stack
|
page read and write
|
||
1FEF1429000
|
heap
|
page read and write
|
||
2442BE39000
|
heap
|
page read and write
|
||
15F0C5E0000
|
heap
|
page read and write
|
||
7FF72AAAF000
|
unkown
|
page write copy
|
||
2DCD2040000
|
heap
|
page read and write
|
||
14CF55C0000
|
heap
|
page read and write
|
||
FD1017E000
|
stack
|
page read and write
|
||
2DCCFF58000
|
heap
|
page read and write
|
||
1FC75802000
|
heap
|
page read and write
|
||
2DCCFF67000
|
heap
|
page read and write
|
||
2DCCF728000
|
heap
|
page read and write
|
||
2938EA40000
|
heap
|
page read and write
|
||
2938E41A000
|
heap
|
page read and write
|
||
2106B660000
|
heap
|
page read and write
|
||
2DCD1E4C000
|
heap
|
page read and write
|
||
2DCCED97000
|
heap
|
page read and write
|
||
156033D4000
|
heap
|
page read and write
|
||
4B55DFF000
|
stack
|
page read and write
|
||
E2FADDE000
|
stack
|
page read and write
|
||
2DCCEF1D000
|
heap
|
page read and write
|
||
2173D2A5000
|
heap
|
page read and write
|
||
1829E3C7000
|
heap
|
page read and write
|
||
1DA60545000
|
heap
|
page read and write
|
||
2DCD037B000
|
heap
|
page read and write
|
||
1B772F1A000
|
heap
|
page read and write
|
||
2DCD180A000
|
heap
|
page read and write
|
||
B6287DF000
|
stack
|
page read and write
|
||
266A3CF000
|
stack
|
page read and write
|
||
2DCD1F60000
|
heap
|
page read and write
|
||
1B777A80000
|
trusted library allocation
|
page read and write
|
||
2DCD1F60000
|
heap
|
page read and write
|
||
299F7400000
|
heap
|
page read and write
|
||
15F0C652000
|
heap
|
page read and write
|
||
2DCD2007000
|
heap
|
page read and write
|
||
1DF79D82000
|
heap
|
page read and write
|
||
1B777B67000
|
trusted library allocation
|
page read and write
|
||
1B777B7A000
|
trusted library allocation
|
page read and write
|
||
1B772628000
|
heap
|
page read and write
|
||
2DCCEF56000
|
heap
|
page read and write
|
||
22833100000
|
heap
|
page read and write
|
||
2442BE79000
|
heap
|
page read and write
|
||
23B784B0000
|
heap
|
page read and write
|
||
1DA60316000
|
heap
|
page read and write
|
||
2173D261000
|
heap
|
page read and write
|
||
21F3FC5E000
|
heap
|
page read and write
|
||
2DCCED97000
|
heap
|
page read and write
|
||
156014E0000
|
heap
|
page read and write
|
||
1829E416000
|
heap
|
page read and write
|
||
2DAEC758000
|
heap
|
page read and write
|
||
E52C3EE000
|
stack
|
page read and write
|
||
2DCCF608000
|
heap
|
page read and write
|
||
1DC9E198000
|
heap
|
page read and write
|
||
739155D000
|
stack
|
page read and write
|
||
2DCCCFD5000
|
heap
|
page read and write
|
||
2DCD137B000
|
heap
|
page read and write
|
||
1FEF0DDA000
|
heap
|
page read and write
|
||
2DCD1DF7000
|
heap
|
page read and write
|
||
23B78488000
|
heap
|
page read and write
|
||
2173D2BD000
|
heap
|
page read and write
|
||
1DC9E2B7000
|
heap
|
page read and write
|
||
1FEF0DF7000
|
heap
|
page read and write
|
||
15601497000
|
heap
|
page read and write
|
||
2442BE09000
|
heap
|
page read and write
|
||
2DCD18F3000
|
heap
|
page read and write
|
||
1829E42E000
|
heap
|
page read and write
|
||
1FEF140C000
|
heap
|
page read and write
|
||
2DCD18DC000
|
heap
|
page read and write
|
||
162B23F6000
|
heap
|
page read and write
|
||
2DCCF709000
|
heap
|
page read and write
|
||
1DC9DB9E000
|
heap
|
page read and write
|
||
1DC9DB85000
|
heap
|
page read and write
|
||
15601B34000
|
heap
|
page read and write
|
||
2DCCF085000
|
heap
|
page read and write
|
||
2413AAB0000
|
heap
|
page read and write
|
||
60173E8000
|
stack
|
page read and write
|
||
2DCCF030000
|
heap
|
page read and write
|
||
1DC9DE45000
|
heap
|
page read and write
|
||
1AF30B30000
|
heap
|
page read and write
|
||
2DCD1F45000
|
heap
|
page read and write
|
||
2173D2AE000
|
heap
|
page read and write
|
||
1829E3E6000
|
heap
|
page read and write
|
||
1FEF2D83000
|
heap
|
page read and write
|
||
649FD77000
|
stack
|
page read and write
|
||
2938E6F5000
|
heap
|
page read and write
|
||
1DC9DB30000
|
heap
|
page read and write
|
||
21F3FE19000
|
heap
|
page read and write
|
||
1BDCB805000
|
heap
|
page read and write
|
||
24A66180000
|
heap
|
page read and write
|
||
1829E4FB000
|
heap
|
page read and write
|
||
1FEF0DF7000
|
heap
|
page read and write
|
||
2DCCED17000
|
heap
|
page read and write
|
||
14CF5596000
|
heap
|
page read and write
|
||
1B777E00000
|
remote allocation
|
page read and write
|
||
1DC9DB68000
|
heap
|
page read and write
|
||
1DC9DB9C000
|
heap
|
page read and write
|
||
1829E509000
|
heap
|
page read and write
|
||
1DA60320000
|
heap
|
page read and write
|
||
2DCD0379000
|
heap
|
page read and write
|
||
2442C4F9000
|
heap
|
page read and write
|
||
1B1377C9000
|
heap
|
page read and write
|
||
2173D2CD000
|
heap
|
page read and write
|
||
1829E5E7000
|
heap
|
page read and write
|
||
216B3C90000
|
heap
|
page read and write
|
||
2674931A000
|
heap
|
page read and write
|
||
1FEF0F5B000
|
heap
|
page read and write
|
||
2DCCF692000
|
heap
|
page read and write
|
||
28C82FF000
|
stack
|
page read and write
|
||
21A18F62000
|
heap
|
page read and write
|
||
2DCD1CE7000
|
heap
|
page read and write
|
||
1B777B40000
|
trusted library allocation
|
page read and write
|
||
2DCCF5E5000
|
heap
|
page read and write
|
||
2DCD2043000
|
heap
|
page read and write
|
||
2442C4FC000
|
heap
|
page read and write
|
||
1AF30BB1000
|
heap
|
page read and write
|
||
2DCCFE80000
|
heap
|
page read and write
|
||
1FEF2D95000
|
heap
|
page read and write
|
||
2442BE32000
|
heap
|
page read and write
|
||
2DCCF01C000
|
heap
|
page read and write
|
||
23B784A6000
|
heap
|
page read and write
|
||
21A18F92000
|
heap
|
page read and write
|
||
3E4D5FF000
|
stack
|
page read and write
|
||
23B784A6000
|
heap
|
page read and write
|
||
156033D4000
|
heap
|
page read and write
|
||
1DA6054A000
|
heap
|
page read and write
|
||
2442BE58000
|
heap
|
page read and write
|
||
2DCCED65000
|
heap
|
page read and write
|
||
2DCD19AC000
|
heap
|
page read and write
|
||
2173D25F000
|
heap
|
page read and write
|
||
1B777AA4000
|
trusted library allocation
|
page read and write
|
||
162B23CC000
|
heap
|
page read and write
|
||
2442C4FE000
|
heap
|
page read and write
|
||
1FEF0DD6000
|
heap
|
page read and write
|
||
22832F00000
|
heap
|
page read and write
|
||
2269424F000
|
heap
|
page read and write
|
||
23B784A7000
|
heap
|
page read and write
|
||
2DCCF004000
|
heap
|
page read and write
|
||
1FEF0DE2000
|
heap
|
page read and write
|
||
2173D2E9000
|
heap
|
page read and write
|
||
2DCCEFC8000
|
heap
|
page read and write
|
||
2DCCEFB0000
|
heap
|
page read and write
|
||
1DA60AD4000
|
heap
|
page read and write
|
||
2DCD18EF000
|
heap
|
page read and write
|
||
216B3C7B000
|
heap
|
page read and write
|
||
2DCD0DF4000
|
heap
|
page read and write
|
||
2DCD1E4C000
|
heap
|
page read and write
|
||
64A007E000
|
stack
|
page read and write
|
||
2413ABD0000
|
heap
|
page read and write
|
||
2DCCF5DC000
|
heap
|
page read and write
|
||
BCF22FC000
|
stack
|
page read and write
|
||
1DA60312000
|
heap
|
page read and write
|
||
2DCD03DF000
|
heap
|
page read and write
|
||
2DCD0A51000
|
heap
|
page read and write
|
||
DD80FDC000
|
stack
|
page read and write
|
||
2173D2F8000
|
heap
|
page read and write
|
||
2DCCED40000
|
heap
|
page read and write
|
||
231B2A20000
|
heap
|
page read and write
|
||
2DCCED2B000
|
heap
|
page read and write
|
||
1FC75802000
|
heap
|
page read and write
|
||
2442BE6C000
|
heap
|
page read and write
|
||
1F24BC60000
|
heap
|
page read and write
|
||
2DCD137B000
|
heap
|
page read and write
|
||
1FC75808000
|
heap
|
page read and write
|
||
2442BE35000
|
heap
|
page read and write
|
||
2442BE46000
|
heap
|
page read and write
|
||
2442BE64000
|
heap
|
page read and write
|
||
2DCD18ED000
|
heap
|
page read and write
|
||
2DCCD0DA000
|
heap
|
page read and write
|
||
21F3FE13000
|
heap
|
page read and write
|
||
15601497000
|
heap
|
page read and write
|
||
1DF79D6A000
|
heap
|
page read and write
|
||
5A2EB5E000
|
stack
|
page read and write
|
||
2DCD179E000
|
heap
|
page read and write
|
||
1FEF0CF0000
|
heap
|
page read and write
|
||
156015AB000
|
heap
|
page read and write
|
||
156014DC000
|
heap
|
page read and write
|
||
21F3FC14000
|
heap
|
page read and write
|
||
2DCCFEF3000
|
heap
|
page read and write
|
||
2442BDC0000
|
heap
|
page read and write
|
||
1829E408000
|
heap
|
page read and write
|
||
1DC9E1C9000
|
heap
|
page read and write
|
||
2DCD0627000
|
heap
|
page read and write
|
||
2DCCEFAB000
|
heap
|
page read and write
|
||
1DA60AE8000
|
heap
|
page read and write
|
||
2442BE33000
|
heap
|
page read and write
|
||
1DC9E1A4000
|
heap
|
page read and write
|
||
FD100FE000
|
stack
|
page read and write
|
||
156033CE000
|
heap
|
page read and write
|
||
157C0169000
|
heap
|
page read and write
|
||
1829E5EE000
|
heap
|
page read and write
|
||
2DCCFEF4000
|
heap
|
page read and write
|
||
1FEF142C000
|
heap
|
page read and write
|
||
23B784A6000
|
heap
|
page read and write
|
||
1B777ACC000
|
trusted library allocation
|
page read and write
|
||
2DCCD00E000
|
heap
|
page read and write
|
||
2DCD0098000
|
heap
|
page read and write
|
||
2DCCED1C000
|
heap
|
page read and write
|
||
2DCD1A15000
|
heap
|
page read and write
|
||
2DCCFEB7000
|
heap
|
page read and write
|
||
15601503000
|
heap
|
page read and write
|
||
1DC9DB9A000
|
heap
|
page read and write
|
||
23B784AD000
|
heap
|
page read and write
|
||
2DCCEFC9000
|
heap
|
page read and write
|
||
2DCD1F80000
|
heap
|
page read and write
|
||
1829E403000
|
heap
|
page read and write
|
||
2DCCF06E000
|
heap
|
page read and write
|
||
156014D4000
|
heap
|
page read and write
|
||
169C3670000
|
heap
|
page read and write
|
||
1829E509000
|
heap
|
page read and write
|
||
7FF72AA70000
|
unkown
|
page readonly
|
||
1FEF0E01000
|
heap
|
page read and write
|
||
2DCCF093000
|
heap
|
page read and write
|
||
21A18F7D000
|
heap
|
page read and write
|
||
2173D2BD000
|
heap
|
page read and write
|
||
7FF72AA71000
|
unkown
|
page execute read
|
||
1829E509000
|
heap
|
page read and write
|
||
7FFDFA700000
|
unkown
|
page readonly
|
||
2DCD1DF7000
|
heap
|
page read and write
|
||
182A0296000
|
heap
|
page read and write
|
||
1A01BC60000
|
heap
|
page read and write
|
||
21F3FC76000
|
heap
|
page read and write
|
||
2173D300000
|
heap
|
page read and write
|
||
2DCD0B16000
|
heap
|
page read and write
|
||
2442C502000
|
heap
|
page read and write
|
||
2DCD0005000
|
heap
|
page read and write
|
||
7FF72AAAF000
|
unkown
|
page read and write
|
||
1FC75808000
|
heap
|
page read and write
|
||
2173D250000
|
heap
|
page read and write
|
||
2DAEC771000
|
heap
|
page read and write
|
||
2106B3B1000
|
heap
|
page read and write
|
||
1DF79D82000
|
heap
|
page read and write
|
||
1829E3B0000
|
heap
|
page read and write
|
||
2DCD0596000
|
heap
|
page read and write
|
||
20431850000
|
heap
|
page read and write
|
||
2DCD19F4000
|
heap
|
page read and write
|
||
64A047B000
|
stack
|
page read and write
|
||
2DCD1370000
|
heap
|
page read and write
|
||
2442C51A000
|
heap
|
page read and write
|
||
204536B8000
|
heap
|
page read and write
|
||
2DCCF718000
|
heap
|
page read and write
|
||
2DCCF5FC000
|
heap
|
page read and write
|
||
1DC9DB96000
|
heap
|
page read and write
|
||
2DCCED54000
|
heap
|
page read and write
|
||
21F3FC84000
|
heap
|
page read and write
|
||
1DC9DE4E000
|
heap
|
page read and write
|
||
1BA66650000
|
heap
|
page read and write
|
||
156014DA000
|
heap
|
page read and write
|
||
156014D9000
|
heap
|
page read and write
|
||
2DCD0005000
|
heap
|
page read and write
|
||
1829E421000
|
heap
|
page read and write
|
||
2DCD1215000
|
heap
|
page read and write
|
||
1FEF0DF0000
|
heap
|
page read and write
|
||
2442BE41000
|
heap
|
page read and write
|
||
2DCD1F4E000
|
heap
|
page read and write
|
||
1DA60ADE000
|
heap
|
page read and write
|
||
64A07FE000
|
stack
|
page read and write
|
||
2442DDC5000
|
heap
|
page read and write
|
||
182A0290000
|
heap
|
page read and write
|
||
20950E52000
|
heap
|
page read and write
|
||
64A0DFE000
|
stack
|
page read and write
|
||
1FEF0DD6000
|
heap
|
page read and write
|
||
7A8A58D000
|
stack
|
page read and write
|
||
1829E645000
|
heap
|
page read and write
|
||
2DCCEFE8000
|
heap
|
page read and write
|
||
1DC9E2BA000
|
heap
|
page read and write
|
||
1FC75805000
|
heap
|
page read and write
|
||
2442BE90000
|
heap
|
page read and write
|
||
2887F435000
|
heap
|
page read and write
|
||
1DC9DB89000
|
heap
|
page read and write
|
||
2DCD1D27000
|
heap
|
page read and write
|
||
2DCD1329000
|
heap
|
page read and write
|
||
1829E416000
|
heap
|
page read and write
|
||
15601B3F000
|
heap
|
page read and write
|
||
2442BDE0000
|
trusted library allocation
|
page read and write
|
||
1B7724A0000
|
heap
|
page read and write
|
||
2173D340000
|
trusted library allocation
|
page read and write
|
||
2DCCEDD2000
|
heap
|
page read and write
|
||
2DCD0097000
|
heap
|
page read and write
|
||
1FEF0F57000
|
heap
|
page read and write
|
||
1DA60304000
|
heap
|
page read and write
|
||
1DA60AD0000
|
heap
|
page read and write
|
||
23B784B4000
|
heap
|
page read and write
|
||
21F3FC83000
|
heap
|
page read and write
|
||
2DCD1038000
|
heap
|
page read and write
|
||
2DCCD08F000
|
heap
|
page read and write
|
||
1FEF0D30000
|
trusted library allocation
|
page read and write
|
||
1C83CFF000
|
stack
|
page read and write
|
||
20AA85F5000
|
heap
|
page read and write
|
||
15601580000
|
trusted library allocation
|
page read and write
|
||
1B777B48000
|
trusted library allocation
|
page read and write
|
||
2173D262000
|
heap
|
page read and write
|
||
2DCD000C000
|
heap
|
page read and write
|
||
20950E59000
|
heap
|
page read and write
|
||
1829E4B0000
|
trusted library allocation
|
page read and write
|
||
1AF30B9A000
|
heap
|
page read and write
|
||
2173D2B2000
|
heap
|
page read and write
|
||
2DCD0E02000
|
heap
|
page read and write
|
||
156015AA000
|
heap
|
page read and write
|
||
2DCCFAC0000
|
direct allocation
|
page read and write
|
||
2DCD1CE7000
|
heap
|
page read and write
|
||
1DC9E1A5000
|
heap
|
page read and write
|
||
2DCCF990000
|
direct allocation
|
page read and write
|
||
64A0D7E000
|
unkown
|
page readonly
|
||
2DCCF0BE000
|
heap
|
page read and write
|
||
2DCD18BD000
|
heap
|
page read and write
|
||
2DCD0379000
|
heap
|
page read and write
|
||
2938E290000
|
heap
|
page read and write
|
||
B53C6FE000
|
stack
|
page read and write
|
||
1FEF0DD6000
|
heap
|
page read and write
|
||
2DCD1D1F000
|
heap
|
page read and write
|
||
2DCD1692000
|
heap
|
page read and write
|
||
1A5F0C27000
|
heap
|
page read and write
|
||
2DCCD0AC000
|
heap
|
page read and write
|
||
21F3FC1B000
|
heap
|
page read and write
|
||
2DCCEF8B000
|
heap
|
page read and write
|
||
1DA60AD7000
|
heap
|
page read and write
|
||
21F3FC4B000
|
heap
|
page read and write
|
||
1829E418000
|
heap
|
page read and write
|
||
2173D2F5000
|
heap
|
page read and write
|
||
2173D2FA000
|
heap
|
page read and write
|
||
2173EC5D000
|
heap
|
page read and write
|
||
B6289CF000
|
stack
|
page read and write
|
||
23B784A7000
|
heap
|
page read and write
|
||
2DCD13C0000
|
heap
|
page read and write
|
||
4B55CFB000
|
stack
|
page read and write
|
||
1DF9C4F0000
|
heap
|
page read and write
|
||
1B772F00000
|
heap
|
page read and write
|
||
23B784A6000
|
heap
|
page read and write
|
||
1DC9E2BE000
|
heap
|
page read and write
|
||
2938E376000
|
heap
|
page read and write
|
||
15601558000
|
heap
|
page read and write
|
||
2887F110000
|
heap
|
page read and write
|
||
1DC9E1AB000
|
heap
|
page read and write
|
||
2DCD11D4000
|
heap
|
page read and write
|
||
1F24BE47000
|
heap
|
page read and write
|
||
2DCCD0B8000
|
heap
|
page read and write
|
||
15601B4D000
|
heap
|
page read and write
|
||
156033D4000
|
heap
|
page read and write
|
||
22694340000
|
heap
|
page read and write
|
||
E52C67F000
|
stack
|
page read and write
|
||
1B772F02000
|
heap
|
page read and write
|
||
2DCD0E9C000
|
heap
|
page read and write
|
||
2DCCED75000
|
heap
|
page read and write
|
||
2DCD0DF5000
|
heap
|
page read and write
|
||
1DC9FBA6000
|
heap
|
page read and write
|
||
2173D2EB000
|
heap
|
page read and write
|
||
2DCD1E73000
|
heap
|
page read and write
|
||
21A18EC0000
|
heap
|
page read and write
|
||
21F3F3F0000
|
trusted library allocation
|
page read and write
|
||
3E4D67E000
|
stack
|
page read and write
|
||
1A5F0BC0000
|
heap
|
page read and write
|
||
23B784A3000
|
heap
|
page read and write
|
||
2DCCED34000
|
heap
|
page read and write
|
||
73919FF000
|
stack
|
page read and write
|
||
2DCD1F7E000
|
heap
|
page read and write
|
||
2442C4EA000
|
heap
|
page read and write
|
||
2DCD2CF0000
|
direct allocation
|
page read and write
|
||
21A18F57000
|
heap
|
page read and write
|
||
19ABCF40000
|
heap
|
page read and write
|
||
21F3FE15000
|
heap
|
page read and write
|
||
1FEF0DD6000
|
heap
|
page read and write
|
||
21F3F100000
|
heap
|
page read and write
|
||
21451040000
|
heap
|
page read and write
|
||
1DA602C7000
|
heap
|
page read and write
|
||
15601B49000
|
heap
|
page read and write
|
||
1B1377DC000
|
heap
|
page read and write
|
||
1829E3E9000
|
heap
|
page read and write
|
||
1FC7580D000
|
heap
|
page read and write
|
||
2DCD1650000
|
heap
|
page read and write
|
||
1B777B1A000
|
trusted library allocation
|
page read and write
|
||
23B784A4000
|
heap
|
page read and write
|
||
156033CE000
|
heap
|
page read and write
|
||
1B772480000
|
heap
|
page read and write
|
||
1B777B22000
|
trusted library allocation
|
page read and write
|
||
2DCCF102000
|
heap
|
page read and write
|
||
2DCCFE30000
|
heap
|
page read and write
|
||
1B777D02000
|
heap
|
page read and write
|
||
2DCD0313000
|
heap
|
page read and write
|
||
2938E3B9000
|
heap
|
page read and write
|
||
2DCCF609000
|
heap
|
page read and write
|
||
1B777E00000
|
remote allocation
|
page read and write
|
||
2DCD0E58000
|
heap
|
page read and write
|
||
1829E423000
|
heap
|
page read and write
|
||
21E30970000
|
heap
|
page read and write
|
||
2442C506000
|
heap
|
page read and write
|
||
A9FE1BD000
|
stack
|
page read and write
|
||
156014B5000
|
heap
|
page read and write
|
||
1FEF1429000
|
heap
|
page read and write
|
||
2DCCD080000
|
heap
|
page read and write
|
||
156014C3000
|
heap
|
page read and write
|
||
1FEF1417000
|
heap
|
page read and write
|
||
162B23F6000
|
heap
|
page read and write
|
||
1DC9FBAE000
|
heap
|
page read and write
|
||
2DCD18ED000
|
heap
|
page read and write
|
||
1DC9DB98000
|
heap
|
page read and write
|
||
2DCCFE6A000
|
heap
|
page read and write
|
||
1FEF0DE1000
|
heap
|
page read and write
|
||
2DCD0B58000
|
heap
|
page read and write
|
||
14CF58E5000
|
heap
|
page read and write
|
||
162B23FA000
|
heap
|
page read and write
|
||
156033C1000
|
heap
|
page read and write
|
||
14CF55BD000
|
heap
|
page read and write
|
||
1DC9DB8E000
|
heap
|
page read and write
|
||
2173EB61000
|
heap
|
page read and write
|
||
2938E387000
|
heap
|
page read and write
|
||
2442C507000
|
heap
|
page read and write
|
||
21F3FC9E000
|
heap
|
page read and write
|
||
F09387F000
|
stack
|
page read and write
|
||
2DCD1507000
|
heap
|
page read and write
|
||
2DCD062A000
|
heap
|
page read and write
|
||
2442DDB7000
|
heap
|
page read and write
|
||
2173D330000
|
trusted library allocation
|
page read and write
|
||
15601B49000
|
heap
|
page read and write
|
||
1829E4EC000
|
heap
|
page read and write
|
||
21F3FE13000
|
heap
|
page read and write
|
||
1829E4F1000
|
heap
|
page read and write
|
||
1B777B5F000
|
trusted library allocation
|
page read and write
|
||
1B137740000
|
heap
|
page read and write
|
||
1829E4E0000
|
heap
|
page read and write
|
||
21A18F78000
|
heap
|
page read and write
|
||
2DCCED0F000
|
heap
|
page read and write
|
||
2DCD2114000
|
heap
|
page read and write
|
||
1DC9DB60000
|
heap
|
page read and write
|
||
156033CD000
|
heap
|
page read and write
|
||
64A147E000
|
unkown
|
page readonly
|
||
21F3FC5E000
|
heap
|
page read and write
|
||
2442DDBF000
|
heap
|
page read and write
|
||
2DCCED94000
|
heap
|
page read and write
|
||
2DCD1F50000
|
heap
|
page read and write
|
||
2DCD125A000
|
heap
|
page read and write
|
||
2413AD05000
|
heap
|
page read and write
|
||
F38A8FF000
|
stack
|
page read and write
|
||
7A8A97E000
|
stack
|
page read and write
|
||
7FF6E3A61000
|
unkown
|
page execute read
|
||
2442C51A000
|
heap
|
page read and write
|
||
2DCCEF8C000
|
heap
|
page read and write
|
||
156014DA000
|
heap
|
page read and write
|
||
2DCCF041000
|
heap
|
page read and write
|
||
2DCCED2C000
|
heap
|
page read and write
|
||
1B772613000
|
heap
|
page read and write
|
||
2DCD062A000
|
heap
|
page read and write
|
||
2DCD0E9C000
|
heap
|
page read and write
|
||
2DCCEFA2000
|
heap
|
page read and write
|
||
2442C4E4000
|
heap
|
page read and write
|
||
47C3CFE000
|
stack
|
page read and write
|
||
2938E2C0000
|
heap
|
page read and write
|
||
2DCD0355000
|
heap
|
page read and write
|
||
14CF55CC000
|
heap
|
page read and write
|
||
2DCCF085000
|
heap
|
page read and write
|
||
1FEF2D87000
|
heap
|
page read and write
|
||
15601553000
|
heap
|
page read and write
|
||
1B773470000
|
trusted library section
|
page readonly
|
||
1DC9DB20000
|
trusted library allocation
|
page read and write
|
||
2442C4E7000
|
heap
|
page read and write
|
||
2173D2B9000
|
heap
|
page read and write
|
||
21F3FC76000
|
heap
|
page read and write
|
||
2DCCF063000
|
heap
|
page read and write
|
||
2DCCEF19000
|
heap
|
page read and write
|
||
2DCCF695000
|
heap
|
page read and write
|
||
169C3675000
|
heap
|
page read and write
|
||
21A18DC0000
|
heap
|
page read and write
|
||
1DF9C130000
|
heap
|
page read and write
|
||
1DC9DBA3000
|
heap
|
page read and write
|
||
2173D2C6000
|
heap
|
page read and write
|
||
21F3FC6A000
|
heap
|
page read and write
|
||
2173D1D0000
|
heap
|
page read and write
|
||
E2FAFCD000
|
stack
|
page read and write
|
||
1AF60BD0000
|
heap
|
page read and write
|
||
2442BE80000
|
heap
|
page read and write
|
||
1B772713000
|
heap
|
page read and write
|
||
4AF9EDB000
|
stack
|
page read and write
|
||
14CF58E0000
|
heap
|
page read and write
|
||
15F0C63A000
|
heap
|
page read and write
|
||
2DCCF52C000
|
heap
|
page read and write
|
||
2DCCF870000
|
direct allocation
|
page read and write
|
||
2DCD19F4000
|
heap
|
page read and write
|
||
20AA8670000
|
heap
|
page read and write
|
||
2442C523000
|
heap
|
page read and write
|
||
1DA60543000
|
heap
|
page read and write
|
||
1DA602B9000
|
heap
|
page read and write
|
||
2DCD199A000
|
heap
|
page read and write
|
||
1FEF1430000
|
heap
|
page read and write
|
||
1B777ACF000
|
trusted library allocation
|
page read and write
|
||
2442DDB3000
|
heap
|
page read and write
|
||
1829E401000
|
heap
|
page read and write
|
||
1FEF141E000
|
heap
|
page read and write
|
||
1DC9E2B7000
|
heap
|
page read and write
|
||
19ABCFC8000
|
heap
|
page read and write
|
||
FFFEF1B000
|
stack
|
page read and write
|
||
1FC75802000
|
heap
|
page read and write
|
||
2938E387000
|
heap
|
page read and write
|
||
1829E3C7000
|
heap
|
page read and write
|
||
1FC757E0000
|
heap
|
page read and write
|
||
2DCD2CF0000
|
direct allocation
|
page read and write
|
||
1829E42E000
|
heap
|
page read and write
|
||
2DCD129B000
|
heap
|
page read and write
|
||
2DCD079C000
|
direct allocation
|
page read and write
|
||
2DCCF0FF000
|
heap
|
page read and write
|
||
2173D2F6000
|
heap
|
page read and write
|
||
1FEF2D8E000
|
heap
|
page read and write
|
||
2173D2EB000
|
heap
|
page read and write
|
||
2173D30A000
|
heap
|
page read and write
|
||
1829E403000
|
heap
|
page read and write
|
||
19ABCFE5000
|
heap
|
page read and write
|
||
1829E416000
|
heap
|
page read and write
|
||
1B772E00000
|
heap
|
page read and write
|
||
2DCCEF4D000
|
heap
|
page read and write
|
||
2938E3B9000
|
heap
|
page read and write
|
||
85FB0FF000
|
unkown
|
page read and write
|
||
20950E7B000
|
heap
|
page read and write
|
||
22832F51000
|
heap
|
page read and write
|
||
2DCD0A93000
|
heap
|
page read and write
|
||
2DCD12E5000
|
heap
|
page read and write
|
||
2DCCF5F8000
|
heap
|
page read and write
|
||
2442BE5C000
|
heap
|
page read and write
|
||
21A18F57000
|
heap
|
page read and write
|
||
2442BE54000
|
heap
|
page read and write
|
||
15601B49000
|
heap
|
page read and write
|
||
1FEF0F52000
|
heap
|
page read and write
|
||
2DCD1F70000
|
heap
|
page read and write
|
||
1DC9DB62000
|
heap
|
page read and write
|
||
23B784A9000
|
heap
|
page read and write
|
||
14CF55A8000
|
heap
|
page read and write
|
||
23B784A3000
|
heap
|
page read and write
|
||
2DCD16F4000
|
heap
|
page read and write
|
||
21F3FC10000
|
heap
|
page read and write
|
||
21A18F62000
|
heap
|
page read and write
|
||
2DCCED20000
|
heap
|
page read and write
|
||
1AF30BB1000
|
heap
|
page read and write
|
||
1AF608A0000
|
heap
|
page read and write
|
||
2DCCF706000
|
heap
|
page read and write
|
||
21E305D0000
|
heap
|
page read and write
|
||
1DC9FBB4000
|
heap
|
page read and write
|
||
E6F87E000
|
stack
|
page read and write
|
||
14CF55BC000
|
heap
|
page read and write
|
||
1B777B45000
|
trusted library allocation
|
page read and write
|
||
1829E390000
|
trusted library allocation
|
page read and write
|
||
156014E2000
|
heap
|
page read and write
|
||
4B5617F000
|
stack
|
page read and write
|
||
2DCD200D000
|
heap
|
page read and write
|
||
2106B330000
|
heap
|
page read and write
|
||
2DAEC757000
|
heap
|
page read and write
|
||
2DCCF67C000
|
heap
|
page read and write
|
||
A352338000
|
stack
|
page read and write
|
||
1DF9C2D8000
|
heap
|
page read and write
|
||
21A19100000
|
heap
|
page read and write
|
||
21F40250000
|
heap
|
page read and write
|
||
2173D276000
|
heap
|
page read and write
|
||
1B777AD2000
|
trusted library allocation
|
page read and write
|
||
1FC77180000
|
heap
|
page read and write
|
||
1829E512000
|
heap
|
page read and write
|
||
2DCD000B000
|
heap
|
page read and write
|
||
15601B28000
|
heap
|
page read and write
|
||
2173EC54000
|
heap
|
page read and write
|
||
1B777C1E000
|
heap
|
page read and write
|
||
14CF55C4000
|
heap
|
page read and write
|
||
2413ABB0000
|
heap
|
page read and write
|
||
2442BE74000
|
heap
|
page read and write
|
||
1FC75815000
|
heap
|
page read and write
|
||
1560169E000
|
heap
|
page read and write
|
||
2DCD2D00000
|
direct allocation
|
page read and write
|
||
2DCD1CA5000
|
heap
|
page read and write
|
||
1829E3C2000
|
heap
|
page read and write
|
||
2DCD1A15000
|
heap
|
page read and write
|
||
2DCD0C1C000
|
heap
|
page read and write
|
||
1FC75808000
|
heap
|
page read and write
|
||
2DCCFFF0000
|
heap
|
page read and write
|
||
2DCD0303000
|
heap
|
page read and write
|
||
21F3FE13000
|
heap
|
page read and write
|
||
2DCCED36000
|
heap
|
page read and write
|
||
21F3FE19000
|
heap
|
page read and write
|
||
15601B56000
|
heap
|
page read and write
|
||
2DCCEDBB000
|
heap
|
page read and write
|
||
2DCD0CE2000
|
heap
|
page read and write
|
||
1DF79D82000
|
heap
|
page read and write
|
||
23B784B3000
|
heap
|
page read and write
|
||
2DCCED75000
|
heap
|
page read and write
|
||
2DCD187B000
|
heap
|
page read and write
|
||
1DA60480000
|
trusted library allocation
|
page read and write
|
||
2DCD01A5000
|
heap
|
page read and write
|
||
1FC7580B000
|
heap
|
page read and write
|
||
21A18F7D000
|
heap
|
page read and write
|
||
1DC9DB42000
|
heap
|
page read and write
|
||
2DCD18ED000
|
heap
|
page read and write
|
||
156014FC000
|
heap
|
page read and write
|
||
2DCD0512000
|
heap
|
page read and write
|
||
2DCCF02C000
|
heap
|
page read and write
|
||
2442BE65000
|
heap
|
page read and write
|
||
23B784A9000
|
heap
|
page read and write
|
||
14CF55A6000
|
heap
|
page read and write
|
||
162B25A0000
|
heap
|
page read and write
|
||
27A92E00000
|
heap
|
page read and write
|
||
20950C70000
|
heap
|
page read and write
|
||
2DCCF5B8000
|
heap
|
page read and write
|
||
2DCCF71D000
|
heap
|
page read and write
|
||
1FEF0DB6000
|
heap
|
page read and write
|
||
21F3FC76000
|
heap
|
page read and write
|
||
2DCCEF90000
|
heap
|
page read and write
|
||
2DCCFF23000
|
heap
|
page read and write
|
||
2DCD01EA000
|
heap
|
page read and write
|
||
2938E3C9000
|
heap
|
page read and write
|
||
21F3F1F0000
|
heap
|
page read and write
|
||
601777F000
|
stack
|
page read and write
|
||
2DCD0FA4000
|
heap
|
page read and write
|
||
649FE7E000
|
unkown
|
page readonly
|
||
2DCCEFC3000
|
heap
|
page read and write
|
||
1829E64B000
|
heap
|
page read and write
|
||
1B777C8C000
|
heap
|
page read and write
|
||
1FC7580F000
|
heap
|
page read and write
|
||
2DAEC76B000
|
heap
|
page read and write
|
||
24A66187000
|
heap
|
page read and write
|
||
2DCCEF81000
|
heap
|
page read and write
|
||
2DCD1E8E000
|
heap
|
page read and write
|
||
2DCD022C000
|
heap
|
page read and write
|
||
81FD31B000
|
stack
|
page read and write
|
||
20AA8691000
|
heap
|
page read and write
|
||
1FEF0D97000
|
heap
|
page read and write
|
||
1DC9E1A7000
|
heap
|
page read and write
|
||
156014B5000
|
heap
|
page read and write
|
||
2DCD07D4000
|
direct allocation
|
page read and write
|
||
3E4D1C7000
|
stack
|
page read and write
|
||
2DCCED09000
|
heap
|
page read and write
|
||
15601B2F000
|
heap
|
page read and write
|
||
1829E3B9000
|
heap
|
page read and write
|
||
21F3FC0B000
|
heap
|
page read and write
|
||
B53C67F000
|
stack
|
page read and write
|
||
1FEF2D82000
|
heap
|
page read and write
|
||
2DCD204F000
|
heap
|
page read and write
|
||
1DC9E19C000
|
heap
|
page read and write
|
||
2DCD0A92000
|
heap
|
page read and write
|
||
2DCD1F6D000
|
heap
|
page read and write
|
||
1C83C7E000
|
stack
|
page read and write
|
||
2DCCEFDA000
|
heap
|
page read and write
|
||
2106B39A000
|
heap
|
page read and write
|
||
1DC9DBA9000
|
heap
|
page read and write
|
||
1829E406000
|
heap
|
page read and write
|
||
2DCCED9A000
|
heap
|
page read and write
|
||
1B777AAD000
|
trusted library allocation
|
page read and write
|
||
1FEF0DD3000
|
heap
|
page read and write
|
||
21F3FE0D000
|
heap
|
page read and write
|
||
F38A87C000
|
stack
|
page read and write
|
||
156014DF000
|
heap
|
page read and write
|
||
1FC75808000
|
heap
|
page read and write
|
||
2DCD158A000
|
heap
|
page read and write
|
||
2DCD1A04000
|
heap
|
page read and write
|
||
1A01BC60000
|
heap
|
page read and write
|
||
1DF79D60000
|
heap
|
page read and write
|
||
2DCD0305000
|
heap
|
page read and write
|
||
7FF72AA71000
|
unkown
|
page execute read
|
||
2DCD1F56000
|
heap
|
page read and write
|
||
2DCD02B0000
|
heap
|
page read and write
|
||
2DCD1218000
|
heap
|
page read and write
|
||
2DCCFFE7000
|
heap
|
page read and write
|
||
2DCCF110000
|
direct allocation
|
page read and write
|
||
2DCD1E4C000
|
heap
|
page read and write
|
||
73918FF000
|
unkown
|
page read and write
|
||
1DC9E1B9000
|
heap
|
page read and write
|
||
15601580000
|
trusted library allocation
|
page read and write
|
||
1B773460000
|
trusted library section
|
page readonly
|
||
DD813FF000
|
stack
|
page read and write
|
||
156014DC000
|
heap
|
page read and write
|
||
21451335000
|
heap
|
page read and write
|
||
2DAEC77C000
|
heap
|
page read and write
|
||
1BDF3170000
|
heap
|
page read and write
|
||
2283C527000
|
heap
|
page read and write
|
||
1FEF0DBF000
|
heap
|
page read and write
|
||
1DA6031B000
|
heap
|
page read and write
|
||
363E97E000
|
stack
|
page read and write
|
||
2DCCF0DA000
|
heap
|
page read and write
|
||
1CCFB760000
|
heap
|
page read and write
|
||
156015A3000
|
heap
|
page read and write
|
||
2442BE60000
|
heap
|
page read and write
|
||
2DCCED6B000
|
heap
|
page read and write
|
||
2DCCD09B000
|
heap
|
page read and write
|
||
2DCD1A15000
|
heap
|
page read and write
|
||
2DCD1F60000
|
heap
|
page read and write
|
||
1FEF0F5A000
|
heap
|
page read and write
|
||
15601580000
|
trusted library allocation
|
page read and write
|
||
231B2B50000
|
heap
|
page read and write
|
||
156014D1000
|
heap
|
page read and write
|
||
2173D396000
|
heap
|
page read and write
|
||
1DC9E1AB000
|
heap
|
page read and write
|
||
2DCD2047000
|
heap
|
page read and write
|
||
1829E4F4000
|
heap
|
page read and write
|
||
2DCD1F6D000
|
heap
|
page read and write
|
||
1FEF1432000
|
heap
|
page read and write
|
||
1DC9E2B4000
|
heap
|
page read and write
|
||
2DCD13C0000
|
heap
|
page read and write
|
||
22832F51000
|
heap
|
page read and write
|
||
1DF79D82000
|
heap
|
page read and write
|
||
2DCD204F000
|
heap
|
page read and write
|
||
2DCD19AE000
|
heap
|
page read and write
|
||
2938EA70000
|
heap
|
page read and write
|
||
22832F3B000
|
heap
|
page read and write
|
||
12B3F0E000
|
stack
|
page read and write
|
||
21F3FE0F000
|
heap
|
page read and write
|
||
1FC75808000
|
heap
|
page read and write
|
||
228331B5000
|
heap
|
page read and write
|
||
7FF72AAB1000
|
unkown
|
page read and write
|
||
1FEF1429000
|
heap
|
page read and write
|
||
216B3C70000
|
heap
|
page read and write
|
||
1FC7580D000
|
heap
|
page read and write
|
||
1FEF2D81000
|
heap
|
page read and write
|
||
2442C510000
|
heap
|
page read and write
|
||
2DCCF0F6000
|
heap
|
page read and write
|
||
FFFF27F000
|
stack
|
page read and write
|
||
1DA60316000
|
heap
|
page read and write
|
||
731A4DC000
|
stack
|
page read and write
|
||
DF418ED000
|
stack
|
page read and write
|
||
2DCD1044000
|
heap
|
page read and write
|
||
2442BE7F000
|
heap
|
page read and write
|
||
26749595000
|
heap
|
page read and write
|
||
3E4D4FF000
|
stack
|
page read and write
|
||
2DCCED67000
|
heap
|
page read and write
|
||
2DCCEF90000
|
heap
|
page read and write
|
||
2DCCFF67000
|
heap
|
page read and write
|
||
2DCD137B000
|
heap
|
page read and write
|
||
1F836CF0000
|
heap
|
page read and write
|
||
2173D2AE000
|
heap
|
page read and write
|
||
1E397521000
|
heap
|
page read and write
|
||
1DC9DB88000
|
heap
|
page read and write
|
||
2173D2D2000
|
heap
|
page read and write
|
||
1DA60480000
|
trusted library allocation
|
page read and write
|
||
23B784A3000
|
heap
|
page read and write
|
||
23B784A6000
|
heap
|
page read and write
|
||
1DA60307000
|
heap
|
page read and write
|
||
21E305DA000
|
heap
|
page read and write
|
||
21A18F84000
|
heap
|
page read and write
|
||
1BDCB850000
|
heap
|
page read and write
|
||
21F3FE05000
|
heap
|
page read and write
|
||
2DCD1F7E000
|
heap
|
page read and write
|
||
23B784AB000
|
heap
|
page read and write
|
||
1FC7580D000
|
heap
|
page read and write
|
||
2DCCED18000
|
heap
|
page read and write
|
||
6A707FF000
|
stack
|
page read and write
|
||
15601B49000
|
heap
|
page read and write
|
||
2DCCF46B000
|
heap
|
page read and write
|
||
2DCD0E58000
|
heap
|
page read and write
|
||
2442BE5C000
|
heap
|
page read and write
|
||
182A0291000
|
heap
|
page read and write
|
||
2938E3E9000
|
heap
|
page read and write
|
||
2442C51A000
|
heap
|
page read and write
|
||
1DC9DBAE000
|
heap
|
page read and write
|
||
1B777CC0000
|
heap
|
page read and write
|
||
2DCD1934000
|
heap
|
page read and write
|
||
2DCCED68000
|
heap
|
page read and write
|
||
1DC9DB66000
|
heap
|
page read and write
|
||
2173D2E0000
|
heap
|
page read and write
|
||
21F3F1F4000
|
heap
|
page read and write
|
||
2DCCFF2E000
|
heap
|
page read and write
|
||
2DCCED97000
|
heap
|
page read and write
|
||
21F3FC68000
|
heap
|
page read and write
|
||
1B777B30000
|
trusted library allocation
|
page read and write
|
||
1DC9E1A8000
|
heap
|
page read and write
|
||
2DCCED15000
|
heap
|
page read and write
|
||
1829E411000
|
heap
|
page read and write
|
||
2DCCFEB4000
|
heap
|
page read and write
|
||
21F3FC84000
|
heap
|
page read and write
|
||
A5E297E000
|
stack
|
page read and write
|
||
1DA60305000
|
heap
|
page read and write
|
||
2DCD0DFE000
|
heap
|
page read and write
|
||
2DCCED92000
|
heap
|
page read and write
|
||
2887F0F0000
|
heap
|
page read and write
|
||
1FEF0DC3000
|
heap
|
page read and write
|
||
15601564000
|
heap
|
page read and write
|
||
21A18F5D000
|
heap
|
page read and write
|
||
2442BE54000
|
heap
|
page read and write
|
||
1CCFB74A000
|
heap
|
page read and write
|
||
2DCD17C9000
|
heap
|
page read and write
|
||
2C14D820000
|
heap
|
page read and write
|
||
2DCD1C20000
|
heap
|
page read and write
|
||
15601529000
|
heap
|
page read and write
|
||
1DA6054E000
|
heap
|
page read and write
|
||
1BA66655000
|
heap
|
page read and write
|
||
22832F10000
|
heap
|
page read and write
|
||
2DCCFFF2000
|
heap
|
page read and write
|
||
281E77F0000
|
heap
|
page read and write
|
||
1FEF141E000
|
heap
|
page read and write
|
||
47C444F000
|
stack
|
page read and write
|
||
2DCD103F000
|
heap
|
page read and write
|
||
2DCCF023000
|
heap
|
page read and write
|
||
363E87D000
|
stack
|
page read and write
|
||
2DCCD0B1000
|
heap
|
page read and write
|
||
1829E3F0000
|
heap
|
page read and write
|
||
1B777B00000
|
trusted library allocation
|
page read and write
|
||
35C32FF000
|
stack
|
page read and write
|
||
6EE3CFF000
|
stack
|
page read and write
|
||
2DCD1D21000
|
heap
|
page read and write
|
||
15601542000
|
heap
|
page read and write
|
||
1DA602E7000
|
heap
|
page read and write
|
||
21A18F7D000
|
heap
|
page read and write
|
||
28C7FBD000
|
stack
|
page read and write
|
||
1CCFB840000
|
heap
|
page read and write
|
||
2DCCED36000
|
heap
|
page read and write
|
||
2DCCEDE0000
|
unkown
|
page readonly
|
||
2DCD0FE6000
|
heap
|
page read and write
|
||
2DCCFEB3000
|
heap
|
page read and write
|
||
4AFA2FE000
|
stack
|
page read and write
|
||
2DCCF083000
|
heap
|
page read and write
|
||
1B777C0E000
|
heap
|
page read and write
|
||
2DCD1A04000
|
heap
|
page read and write
|
||
1DA60323000
|
heap
|
page read and write
|
||
2DCD02F2000
|
heap
|
page read and write
|
||
23B784A6000
|
heap
|
page read and write
|
||
2DCD0CA0000
|
heap
|
page read and write
|
||
64A087E000
|
unkown
|
page readonly
|
||
2DCCED66000
|
heap
|
page read and write
|
||
2DCCD0A5000
|
heap
|
page read and write
|
||
2442BDA0000
|
heap
|
page read and write
|
||
2DCD1F4E000
|
heap
|
page read and write
|
||
FD1007C000
|
stack
|
page read and write
|
||
1F836DA5000
|
heap
|
page read and write
|
||
15601B3F000
|
heap
|
page read and write
|
||
1CCFB758000
|
heap
|
page read and write
|
||
2DCD1D21000
|
heap
|
page read and write
|
||
156014B5000
|
heap
|
page read and write
|
||
2DCD0513000
|
heap
|
page read and write
|
||
1829E517000
|
heap
|
page read and write
|
||
2442BE57000
|
heap
|
page read and write
|
||
1DA6236D000
|
heap
|
page read and write
|
||
2DCD1259000
|
heap
|
page read and write
|
||
15F0C649000
|
heap
|
page read and write
|
||
162B23DB000
|
heap
|
page read and write
|
||
2DCCD0B8000
|
heap
|
page read and write
|
||
156014B8000
|
heap
|
page read and write
|
||
4B5607E000
|
stack
|
page read and write
|
||
2173D2B4000
|
heap
|
page read and write
|
||
23B784A9000
|
heap
|
page read and write
|
||
2DCCE990000
|
direct allocation
|
page read and write
|
||
1DF9C230000
|
heap
|
page read and write
|
||
2DCCEF89000
|
heap
|
page read and write
|
||
156033C3000
|
heap
|
page read and write
|
||
24A6618B000
|
heap
|
page read and write
|
||
2173D30E000
|
heap
|
page read and write
|
||
1B1377B5000
|
heap
|
page read and write
|
||
2173D2A7000
|
heap
|
page read and write
|
||
1DA60AEB000
|
heap
|
page read and write
|
||
1560150C000
|
heap
|
page read and write
|
||
1FC75802000
|
heap
|
page read and write
|
||
1DC9E1B9000
|
heap
|
page read and write
|
||
15F0C652000
|
heap
|
page read and write
|
||
19ABCF60000
|
heap
|
page read and write
|
||
2DCCED81000
|
heap
|
page read and write
|
||
2173D276000
|
heap
|
page read and write
|
||
1829E270000
|
heap
|
page read and write
|
||
1829E4E8000
|
heap
|
page read and write
|
||
2DCD1F4E000
|
heap
|
page read and write
|
||
15601514000
|
heap
|
page read and write
|
||
2DCD2047000
|
heap
|
page read and write
|
||
1DC9DB00000
|
heap
|
page read and write
|
||
23D347E000
|
stack
|
page read and write
|
||
1829E4E7000
|
heap
|
page read and write
|
||
1B777E00000
|
remote allocation
|
page read and write
|
||
21A18F92000
|
heap
|
page read and write
|
||
60E9A7E000
|
stack
|
page read and write
|
||
1FC75808000
|
heap
|
page read and write
|
||
2938E398000
|
heap
|
page read and write
|
||
2C14DA05000
|
heap
|
page read and write
|
||
2DCCED2B000
|
heap
|
page read and write
|
||
2DCD18DC000
|
heap
|
page read and write
|
||
BCF24FF000
|
stack
|
page read and write
|
||
1A01BC60000
|
heap
|
page read and write
|
||
182A029D000
|
heap
|
page read and write
|
||
7FF72AA9C000
|
unkown
|
page readonly
|
||
7A8A507000
|
stack
|
page read and write
|
||
1FC75816000
|
heap
|
page read and write
|
||
65047FF000
|
stack
|
page read and write
|
||
2DCD03DC000
|
heap
|
page read and write
|
||
162B23FA000
|
heap
|
page read and write
|
||
2DCCF608000
|
heap
|
page read and write
|
||
2DCD000C000
|
heap
|
page read and write
|
||
14CF55AA000
|
heap
|
page read and write
|
||
15601555000
|
heap
|
page read and write
|
||
1CCFB610000
|
heap
|
page read and write
|
||
19ABD295000
|
heap
|
page read and write
|
||
23B784A2000
|
heap
|
page read and write
|
||
2DCCED2B000
|
heap
|
page read and write
|
||
1B777A60000
|
trusted library allocation
|
page read and write
|
||
1A5F0B90000
|
heap
|
page read and write
|
||
2442BE36000
|
heap
|
page read and write
|
||
14CF55C3000
|
heap
|
page read and write
|
||
1F836D10000
|
heap
|
page read and write
|
||
2DCD0355000
|
heap
|
page read and write
|
||
1F836DA0000
|
heap
|
page read and write
|
||
26749170000
|
heap
|
page read and write
|
||
15601580000
|
trusted library allocation
|
page read and write
|
||
2DCD03DC000
|
heap
|
page read and write
|
||
2DCD10CC000
|
heap
|
page read and write
|
||
1FC75808000
|
heap
|
page read and write
|
||
23B784B0000
|
heap
|
page read and write
|
||
2DCD1DF7000
|
heap
|
page read and write
|
||
2DCD1192000
|
heap
|
page read and write
|
||
7A8A8FE000
|
stack
|
page read and write
|
||
231B2A58000
|
heap
|
page read and write
|
||
2DCCED97000
|
heap
|
page read and write
|
||
7FF6E3AA3000
|
unkown
|
page readonly
|
||
1CCFB757000
|
heap
|
page read and write
|
||
F38A97F000
|
stack
|
page read and write
|
||
1829E514000
|
heap
|
page read and write
|
||
1B777C59000
|
heap
|
page read and write
|
||
1BDF3250000
|
heap
|
page read and write
|
||
85FAD9C000
|
stack
|
page read and write
|
||
2938E389000
|
heap
|
page read and write
|
||
1CCFB6F0000
|
heap
|
page read and write
|
||
2173D2C9000
|
heap
|
page read and write
|
||
1B777B5C000
|
trusted library allocation
|
page read and write
|
||
2442BE37000
|
heap
|
page read and write
|
||
2173D2F8000
|
heap
|
page read and write
|
||
2DCD1D18000
|
heap
|
page read and write
|
||
2938E42D000
|
heap
|
page read and write
|
||
2E1171C000
|
stack
|
page read and write
|
||
1DC9E1BC000
|
heap
|
page read and write
|
||
2DCD0E54000
|
heap
|
page read and write
|
||
2DCCEDC0000
|
heap
|
page read and write
|
||
1B137A40000
|
heap
|
page read and write
|
||
21F3FC17000
|
heap
|
page read and write
|
||
1C83D7F000
|
stack
|
page read and write
|
||
1DA6054E000
|
heap
|
page read and write
|
||
1FEF1407000
|
heap
|
page read and write
|
||
2DCCEFCC000
|
heap
|
page read and write
|
||
2DCCEF8F000
|
heap
|
page read and write
|
||
2DCD12E8000
|
heap
|
page read and write
|
||
1E39750B000
|
heap
|
page read and write
|
||
2442BE41000
|
heap
|
page read and write
|
||
1DC9DB93000
|
heap
|
page read and write
|
||
2442BFD0000
|
trusted library allocation
|
page read and write
|
||
2887F170000
|
heap
|
page read and write
|
||
2DCD011B000
|
heap
|
page read and write
|
||
169C36BB000
|
heap
|
page read and write
|
||
2DCCF72E000
|
heap
|
page read and write
|
||
21A18F87000
|
heap
|
page read and write
|
||
2DCD0554000
|
heap
|
page read and write
|
||
23B784A6000
|
heap
|
page read and write
|
||
1DA60ADE000
|
heap
|
page read and write
|
||
23D34FF000
|
stack
|
page read and write
|
||
2DCD1D1F000
|
heap
|
page read and write
|
||
2DCCEF98000
|
heap
|
page read and write
|
||
2DCCFEC3000
|
heap
|
page read and write
|
||
2DCD019E000
|
heap
|
page read and write
|
||
1DC9DB73000
|
heap
|
page read and write
|
||
2442BE99000
|
heap
|
page read and write
|
||
2DCCEF2E000
|
heap
|
page read and write
|
||
2DCD175C000
|
heap
|
page read and write
|
||
1DC9E1C4000
|
heap
|
page read and write
|
||
64A067B000
|
stack
|
page read and write
|
||
2173D1B0000
|
heap
|
page read and write
|
||
1FEF0DFD000
|
heap
|
page read and write
|
||
1DC9DB8E000
|
heap
|
page read and write
|
||
1FEF2D80000
|
heap
|
page read and write
|
||
8EF191C000
|
stack
|
page read and write
|
||
1FC75808000
|
heap
|
page read and write
|
||
A7408FB000
|
stack
|
page read and write
|
||
15601558000
|
heap
|
page read and write
|
||
1829E4F3000
|
heap
|
page read and write
|
||
2173D270000
|
heap
|
page read and write
|
||
216B3B00000
|
heap
|
page read and write
|
||
23B784A6000
|
heap
|
page read and write
|
||
1E397410000
|
heap
|
page read and write
|
||
2DCCFEC3000
|
heap
|
page read and write
|
||
1829E413000
|
heap
|
page read and write
|
||
E6F55C000
|
stack
|
page read and write
|
||
1BDCB830000
|
heap
|
page read and write
|
||
1829E4C0000
|
heap
|
page read and write
|
||
2DCCFFFF000
|
heap
|
page read and write
|
||
2DCCCF70000
|
heap
|
page read and write
|
||
21F3FC02000
|
heap
|
page read and write
|
||
5B7AFE000
|
stack
|
page read and write
|
||
21F3FBF0000
|
heap
|
page read and write
|
||
2DCD1038000
|
heap
|
page read and write
|
||
21F3FCF0000
|
trusted library allocation
|
page read and write
|
||
2DCD0640000
|
direct allocation
|
page read and write
|
||
162B23FA000
|
heap
|
page read and write
|
||
2DCCED94000
|
heap
|
page read and write
|
||
2DCCED50000
|
heap
|
page read and write
|
||
1FEF0DFB000
|
heap
|
page read and write
|
||
2DCCECE0000
|
heap
|
page read and write
|
||
1FC7580B000
|
heap
|
page read and write
|
||
1FEF0F53000
|
heap
|
page read and write
|
||
1FC75808000
|
heap
|
page read and write
|
||
A7409FF000
|
unkown
|
page read and write
|
||
64A1BFE000
|
stack
|
page read and write
|
||
7FF6E3A61000
|
unkown
|
page execute read
|
||
1DC9E1AB000
|
heap
|
page read and write
|
||
1A01BC4A000
|
heap
|
page read and write
|
||
2DCCFF5A000
|
heap
|
page read and write
|
||
2DCCF330000
|
heap
|
page read and write
|
||
1FC75802000
|
heap
|
page read and write
|
||
2DAEC775000
|
heap
|
page read and write
|
||
156015AE000
|
heap
|
page read and write
|
||
2DCCED2B000
|
heap
|
page read and write
|
||
1DC9DB9F000
|
heap
|
page read and write
|
||
2DCD17BF000
|
heap
|
page read and write
|
||
1829E406000
|
heap
|
page read and write
|
||
15F0C652000
|
heap
|
page read and write
|
||
23B784B4000
|
heap
|
page read and write
|
||
1DF79FA0000
|
heap
|
page read and write
|
||
2DCD1F7E000
|
heap
|
page read and write
|
||
2DCD0A50000
|
heap
|
page read and write
|
||
21451020000
|
heap
|
page read and write
|
||
1F24BD60000
|
heap
|
page read and write
|
||
2DCD1F7E000
|
heap
|
page read and write
|
||
1B7779E0000
|
trusted library allocation
|
page read and write
|
||
15F0C750000
|
heap
|
page read and write
|
||
2DCD0C1C000
|
heap
|
page read and write
|
||
12B3E8B000
|
stack
|
page read and write
|
||
1FC7580D000
|
heap
|
page read and write
|
||
21E30530000
|
heap
|
page read and write
|
||
2442BE6A000
|
heap
|
page read and write
|
||
28C827E000
|
stack
|
page read and write
|
||
2DCCCF60000
|
heap
|
page readonly
|
||
1FC7580B000
|
heap
|
page read and write
|
||
2DAEC76B000
|
heap
|
page read and write
|
||
1DC9DB64000
|
heap
|
page read and write
|
||
2DCCCFD0000
|
heap
|
page read and write
|
||
2DCCF6F0000
|
heap
|
page read and write
|
||
162B23D9000
|
heap
|
page read and write
|
||
23B784A6000
|
heap
|
page read and write
|
||
2DCCED25000
|
heap
|
page read and write
|
||
1FEF0DE0000
|
heap
|
page read and write
|
||
2DCD000E000
|
heap
|
page read and write
|
||
1B137720000
|
heap
|
page read and write
|
||
1FEF0F55000
|
heap
|
page read and write
|
||
2DCCD0C4000
|
heap
|
page read and write
|
||
1DC9E1C2000
|
heap
|
page read and write
|
||
2DCCF6E5000
|
heap
|
page read and write
|
||
1AF30BB1000
|
heap
|
page read and write
|
||
2173D2F8000
|
heap
|
page read and write
|
||
1A01BEC0000
|
heap
|
page read and write
|
||
2DCD137B000
|
heap
|
page read and write
|
||
2173D26F000
|
heap
|
page read and write
|
||
2DCD203F000
|
heap
|
page read and write
|
||
14CF55CD000
|
heap
|
page read and write
|
||
21451230000
|
heap
|
page read and write
|
||
1DC9DD20000
|
trusted library allocation
|
page read and write
|
||
1FC75812000
|
heap
|
page read and write
|
||
23B784A6000
|
heap
|
page read and write
|
||
281E77F7000
|
heap
|
page read and write
|
||
2DCCFF3F000
|
heap
|
page read and write
|
||
2DCD19F5000
|
heap
|
page read and write
|
||
2DCCFF4E000
|
heap
|
page read and write
|
||
1DC9E2BB000
|
heap
|
page read and write
|
||
2DCD0428000
|
heap
|
page read and write
|
||
21F3F1D3000
|
trusted library allocation
|
page read and write
|
||
1DA60AE8000
|
heap
|
page read and write
|
||
156014C4000
|
heap
|
page read and write
|
||
1BA66380000
|
heap
|
page read and write
|
||
12B427E000
|
stack
|
page read and write
|
||
1DC9DB20000
|
trusted library allocation
|
page read and write
|
||
156014C0000
|
heap
|
page read and write
|
||
2DCCF01B000
|
heap
|
page read and write
|
||
64A0A7E000
|
unkown
|
page readonly
|
||
21F3FE07000
|
heap
|
page read and write
|
||
2DCCF0B6000
|
heap
|
page read and write
|
||
1829E4FB000
|
heap
|
page read and write
|
||
1FEF0DEC000
|
heap
|
page read and write
|
||
2938E430000
|
heap
|
page read and write
|
||
2DCD061A000
|
heap
|
page read and write
|
||
2938E34B000
|
heap
|
page read and write
|
||
1FC75809000
|
heap
|
page read and write
|
||
2DCCD090000
|
heap
|
page read and write
|
||
2DCCFE70000
|
heap
|
page read and write
|
||
14CF5596000
|
heap
|
page read and write
|
||
2DCCEF3A000
|
heap
|
page read and write
|
||
2DCCED97000
|
heap
|
page read and write
|
||
156014C4000
|
heap
|
page read and write
|
||
2DCD1F60000
|
heap
|
page read and write
|
||
23B784A6000
|
heap
|
page read and write
|
||
1B1377ED000
|
heap
|
page read and write
|
||
21F3FE10000
|
heap
|
page read and write
|
||
2DCCEDC0000
|
heap
|
page read and write
|
||
601767F000
|
stack
|
page read and write
|
||
2887F010000
|
heap
|
page read and write
|
||
1DA60326000
|
heap
|
page read and write
|
||
2DCD1DB5000
|
heap
|
page read and write
|
||
21A18F7D000
|
heap
|
page read and write
|
||
216B3D70000
|
heap
|
page read and write
|
||
1FEF1417000
|
heap
|
page read and write
|
||
1DC9DB96000
|
heap
|
page read and write
|
||
2173D26F000
|
heap
|
page read and write
|
||
15601B31000
|
heap
|
page read and write
|
||
1DC9DB93000
|
heap
|
page read and write
|
||
2DCD1E8E000
|
heap
|
page read and write
|
||
23B784AB000
|
heap
|
page read and write
|
||
23B784B3000
|
heap
|
page read and write
|
||
1DA60542000
|
heap
|
page read and write
|
||
2DCCEFCE000
|
heap
|
page read and write
|
||
9202FFF000
|
stack
|
page read and write
|
||
1DC9E2B0000
|
heap
|
page read and write
|
||
1B77269F000
|
heap
|
page read and write
|
||
2DCD1150000
|
heap
|
page read and write
|
||
2DCCFF59000
|
heap
|
page read and write
|
||
7FF6E3AA3000
|
unkown
|
page readonly
|
||
14CF55BF000
|
heap
|
page read and write
|
||
2DCD1F4E000
|
heap
|
page read and write
|
||
2DCCEF7E000
|
heap
|
page read and write
|
||
2DCD07A8000
|
direct allocation
|
page read and write
|
||
2DCCF0C5000
|
heap
|
page read and write
|
||
649F7AB000
|
stack
|
page read and write
|
||
216B3C90000
|
heap
|
page read and write
|
||
23B784A6000
|
heap
|
page read and write
|
||
59AA3FF000
|
unkown
|
page read and write
|
||
1B772F1A000
|
heap
|
page read and write
|
||
1DA62364000
|
heap
|
page read and write
|
||
8EF199F000
|
stack
|
page read and write
|
||
2DCCF40B000
|
heap
|
page read and write
|
||
64A117E000
|
stack
|
page read and write
|
||
2DCD16F4000
|
heap
|
page read and write
|
||
1CCFB710000
|
heap
|
page read and write
|
||
2173D30A000
|
heap
|
page read and write
|
||
81FD39E000
|
stack
|
page read and write
|
||
24A66110000
|
heap
|
page read and write
|
||
2DCD110E000
|
heap
|
page read and write
|
||
1B777CE9000
|
heap
|
page read and write
|
||
2DCD1FFF000
|
heap
|
page read and write
|
||
23B784AB000
|
heap
|
page read and write
|
||
2DCCEF2E000
|
heap
|
page read and write
|
||
2DCCD091000
|
heap
|
page read and write
|
||
20950E05000
|
heap
|
page read and write
|
||
2C14DA00000
|
heap
|
page read and write
|
||
2DCD1506000
|
heap
|
page read and write
|
||
2173EC50000
|
heap
|
page read and write
|
||
2DCD1046000
|
heap
|
page read and write
|
||
23B784A6000
|
heap
|
page read and write
|
||
21F3FC84000
|
heap
|
page read and write
|
||
2DCD1F66000
|
heap
|
page read and write
|
||
2DCCED36000
|
heap
|
page read and write
|
||
1DA62361000
|
heap
|
page read and write
|
||
2DCD0DF4000
|
heap
|
page read and write
|
||
1B777D03000
|
heap
|
page read and write
|
||
8DD35CC000
|
stack
|
page read and write
|
||
2C14D610000
|
heap
|
page read and write
|
||
A9673BF000
|
stack
|
page read and write
|
||
FFFF2FF000
|
stack
|
page read and write
|
||
26749590000
|
heap
|
page read and write
|
||
3995BFE000
|
unkown
|
page read and write
|
||
2DAEC6C5000
|
heap
|
page read and write
|
||
2DAEC76B000
|
heap
|
page read and write
|
||
2DCCF0BF000
|
heap
|
page read and write
|
||
1A5F0C20000
|
heap
|
page read and write
|
||
1DA602E9000
|
heap
|
page read and write
|
||
2DCD1FF0000
|
heap
|
page read and write
|
||
1560154A000
|
heap
|
page read and write
|
||
1FC757E8000
|
heap
|
page read and write
|
||
15601B56000
|
heap
|
page read and write
|
||
2DCD180A000
|
heap
|
page read and write
|
||
4AF9F5E000
|
stack
|
page read and write
|
||
1B772702000
|
heap
|
page read and write
|
||
2173D30B000
|
heap
|
page read and write
|
||
2DCCEF11000
|
heap
|
page read and write
|
||
1B777A75000
|
trusted library allocation
|
page read and write
|
||
156015A7000
|
heap
|
page read and write
|
||
1829E406000
|
heap
|
page read and write
|
||
1B777A90000
|
trusted library allocation
|
page read and write
|
||
2DCD1976000
|
heap
|
page read and write
|
||
1A01BB80000
|
heap
|
page read and write
|
||
2173D2E1000
|
heap
|
page read and write
|
||
23B784A6000
|
heap
|
page read and write
|
||
156015AE000
|
heap
|
page read and write
|
||
21F3FC66000
|
heap
|
page read and write
|
||
1DA60ACE000
|
heap
|
page read and write
|
||
1DC9E2BE000
|
heap
|
page read and write
|
||
1FC75815000
|
heap
|
page read and write
|
||
156015AA000
|
heap
|
page read and write
|
||
5A2EBDF000
|
stack
|
page read and write
|
||
23B784A6000
|
heap
|
page read and write
|
||
2DCCFF49000
|
heap
|
page read and write
|
||
21F3FC9F000
|
heap
|
page read and write
|
||
1DA60ACC000
|
heap
|
page read and write
|
||
2DCD0305000
|
heap
|
page read and write
|
||
2DCD18BE000
|
heap
|
page read and write
|
||
1FC75816000
|
heap
|
page read and write
|
||
B6285D5000
|
stack
|
page read and write
|
||
1829E407000
|
heap
|
page read and write
|
||
21F3F1DE000
|
trusted library allocation
|
page read and write
|
||
2DCD12E3000
|
heap
|
page read and write
|
||
2DCD137B000
|
heap
|
page read and write
|
||
3CBB5FF000
|
unkown
|
page read and write
|
||
2DCD1259000
|
heap
|
page read and write
|
||
21A18F49000
|
heap
|
page read and write
|
||
1DA60300000
|
heap
|
page read and write
|
||
1B777C00000
|
heap
|
page read and write
|
||
2DCCFF50000
|
heap
|
page read and write
|
||
2173D2AE000
|
heap
|
page read and write
|
||
2DCCF608000
|
heap
|
page read and write
|
||
1FEF0DC7000
|
heap
|
page read and write
|
||
2DCD108B000
|
heap
|
page read and write
|
||
156033C4000
|
heap
|
page read and write
|
||
15601566000
|
heap
|
page read and write
|
||
156034C0000
|
heap
|
page read and write
|
||
20950E77000
|
heap
|
page read and write
|
||
156014B4000
|
heap
|
page read and write
|
||
2DCCED68000
|
heap
|
page read and write
|
||
15601492000
|
heap
|
page read and write
|
||
1C83DFF000
|
stack
|
page read and write
|
||
1AF30BA9000
|
heap
|
page read and write
|
||
15601553000
|
heap
|
page read and write
|
||
1FEF0D60000
|
heap
|
page read and write
|
||
1CCFB740000
|
heap
|
page read and write
|
||
23B784A9000
|
heap
|
page read and write
|
||
2DCCED78000
|
heap
|
page read and write
|
||
1B777A61000
|
trusted library allocation
|
page read and write
|
||
21F3FE19000
|
heap
|
page read and write
|
||
2DCD0F62000
|
heap
|
page read and write
|
||
2DCD1462000
|
heap
|
page read and write
|
||
2DCCED14000
|
heap
|
page read and write
|
||
2DCCF0C9000
|
heap
|
page read and write
|
||
1DC9DB70000
|
heap
|
page read and write
|
||
2DCCD0DC000
|
heap
|
page read and write
|
||
2442DDC5000
|
heap
|
page read and write
|
||
2DCCF026000
|
heap
|
page read and write
|
||
47C3AF7000
|
stack
|
page read and write
|
||
1DC9DB9E000
|
heap
|
page read and write
|
||
1FEF0DF1000
|
heap
|
page read and write
|
||
A740AFF000
|
stack
|
page read and write
|
||
2DCCEF81000
|
heap
|
page read and write
|
||
281E7A95000
|
heap
|
page read and write
|
||
35C337E000
|
stack
|
page read and write
|
||
1DA6032A000
|
heap
|
page read and write
|
||
2442DDBF000
|
heap
|
page read and write
|
||
23B784A3000
|
heap
|
page read and write
|
||
1DC9E1AB000
|
heap
|
page read and write
|
||
15F0C500000
|
heap
|
page read and write
|
||
2173D2BD000
|
heap
|
page read and write
|
||
21A18F69000
|
heap
|
page read and write
|
||
2DCD16F4000
|
heap
|
page read and write
|
||
2DCCF5E7000
|
heap
|
page read and write
|
||
15F0C630000
|
heap
|
page read and write
|
||
182A0292000
|
heap
|
page read and write
|
||
7FF6E3A9F000
|
unkown
|
page read and write
|
||
21F3FC5E000
|
heap
|
page read and write
|
||
2DCCEFB3000
|
heap
|
page read and write
|
||
2DCCEF6E000
|
heap
|
page read and write
|
||
21F3FC6B000
|
heap
|
page read and write
|
||
2DCD2043000
|
heap
|
page read and write
|
||
1FC75802000
|
heap
|
page read and write
|
||
1DC9DB74000
|
heap
|
page read and write
|
||
2DCCEFA7000
|
heap
|
page read and write
|
||
4AF9FDF000
|
stack
|
page read and write
|
||
2938E3BA000
|
heap
|
page read and write
|
||
2DCCEFA9000
|
heap
|
page read and write
|
||
2DCCF0D9000
|
heap
|
page read and write
|
||
14CF55BC000
|
heap
|
page read and write
|
||
4B560FF000
|
stack
|
page read and write
|
||
1B777A40000
|
trusted library allocation
|
page read and write
|
||
169C3680000
|
heap
|
page read and write
|
||
20950E80000
|
heap
|
page read and write
|
||
231B2D20000
|
heap
|
page read and write
|
||
21F3F1D9000
|
trusted library allocation
|
page read and write
|
||
2173D2CE000
|
heap
|
page read and write
|
||
4AFA37F000
|
stack
|
page read and write
|
||
21F3FC16000
|
heap
|
page read and write
|
||
2DCCF030000
|
heap
|
page read and write
|
||
2DCCF075000
|
heap
|
page read and write
|
||
2DCD1F6D000
|
heap
|
page read and write
|
||
1FC75808000
|
heap
|
page read and write
|
||
2173D2AE000
|
heap
|
page read and write
|
||
1B77267A000
|
heap
|
page read and write
|
||
1FC75812000
|
heap
|
page read and write
|
||
2DCCEFF9000
|
heap
|
page read and write
|
||
2DCCED29000
|
heap
|
page read and write
|
||
2DCCEFA8000
|
heap
|
page read and write
|
||
2DCCF002000
|
heap
|
page read and write
|
||
1B777C2B000
|
heap
|
page read and write
|
||
15601B3F000
|
heap
|
page read and write
|
||
2DCCFF31000
|
heap
|
page read and write
|
||
2442C506000
|
heap
|
page read and write
|
||
21F3FC4B000
|
heap
|
page read and write
|
||
1829E50F000
|
heap
|
page read and write
|
||
2E1179F000
|
stack
|
page read and write
|
||
1B772678000
|
heap
|
page read and write
|
||
2DCD026E000
|
heap
|
page read and write
|
||
2DCCFF44000
|
heap
|
page read and write
|
||
2DCD1D21000
|
heap
|
page read and write
|
||
2DCCED6B000
|
heap
|
page read and write
|
||
20950E30000
|
heap
|
page read and write
|
||
2DCD18ED000
|
heap
|
page read and write
|
||
22832F51000
|
heap
|
page read and write
|
||
2442C509000
|
heap
|
page read and write
|
||
1BDCB7C0000
|
heap
|
page read and write
|
||
2442BE95000
|
heap
|
page read and write
|
||
15601B52000
|
heap
|
page read and write
|
||
20950E59000
|
heap
|
page read and write
|
||
23B784A3000
|
heap
|
page read and write
|
||
15F0C610000
|
heap
|
page read and write
|
||
1DA602E5000
|
heap
|
page read and write
|
||
23B784A6000
|
heap
|
page read and write
|
||
2DCCEF54000
|
heap
|
page read and write
|
||
2DCCEF1E000
|
heap
|
page read and write
|
||
2442DDC5000
|
heap
|
page read and write
|
||
23B784A3000
|
heap
|
page read and write
|
||
21F3FC66000
|
heap
|
page read and write
|
||
2DCCD0C4000
|
heap
|
page read and write
|
||
B53C4FE000
|
stack
|
page read and write
|
||
21F3FC67000
|
heap
|
page read and write
|
||
1CCFB760000
|
heap
|
page read and write
|
||
2DCD03DC000
|
heap
|
page read and write
|
||
20950E77000
|
heap
|
page read and write
|
||
2442C525000
|
heap
|
page read and write
|
||
1F24C0B5000
|
heap
|
page read and write
|
||
2DCCED2B000
|
heap
|
page read and write
|
||
2DCD1A15000
|
heap
|
page read and write
|
||
2DCCED67000
|
heap
|
page read and write
|
||
2DCD0AD4000
|
heap
|
page read and write
|
||
2173D2A5000
|
heap
|
page read and write
|
||
1A01BC40000
|
heap
|
page read and write
|
||
2DCCED9E000
|
heap
|
page read and write
|
||
1DC9E2B3000
|
heap
|
page read and write
|
||
2DCCD0B2000
|
heap
|
page read and write
|
||
1DA6032F000
|
heap
|
page read and write
|
||
2887F430000
|
heap
|
page read and write
|
||
2DCCF578000
|
heap
|
page read and write
|
||
299F7330000
|
heap
|
page read and write
|
||
F09367F000
|
stack
|
page read and write
|
||
14CF55C2000
|
heap
|
page read and write
|
||
5B7A7C000
|
stack
|
page read and write
|
||
216B3C30000
|
heap
|
page read and write
|
||
1FEF2D8E000
|
heap
|
page read and write
|
||
2DCCD0D5000
|
heap
|
page read and write
|
||
47C41FE000
|
stack
|
page read and write
|
||
1B773480000
|
trusted library section
|
page readonly
|
||
12B43FF000
|
stack
|
page read and write
|
||
A0EF2FE000
|
stack
|
page read and write
|
||
1FC75809000
|
heap
|
page read and write
|
||
2DCCF210000
|
direct allocation
|
page read and write
|
||
1FEF0DC3000
|
heap
|
page read and write
|
||
1BDCB800000
|
heap
|
page read and write
|
||
2DCD1D21000
|
heap
|
page read and write
|
||
15601460000
|
heap
|
page read and write
|
||
2442BE58000
|
heap
|
page read and write
|
||
2DCD179E000
|
heap
|
page read and write
|
||
2DCCEF78000
|
heap
|
page read and write
|
||
2173D277000
|
heap
|
page read and write
|
||
64A0F7E000
|
unkown
|
page readonly
|
||
2DCD18DC000
|
heap
|
page read and write
|
||
7A8A87E000
|
stack
|
page read and write
|
||
2442BE60000
|
heap
|
page read and write
|
||
1B773580000
|
trusted library allocation
|
page read and write
|
||
2DCD1DB3000
|
heap
|
page read and write
|
||
22832F51000
|
heap
|
page read and write
|
||
1829E3E6000
|
heap
|
page read and write
|
||
2DCCFEC3000
|
heap
|
page read and write
|
||
1DA6031C000
|
heap
|
page read and write
|
||
20950D70000
|
heap
|
page read and write
|
||
19ABCF30000
|
heap
|
page read and write
|
||
1FEF0F5E000
|
heap
|
page read and write
|
||
14CF55CC000
|
heap
|
page read and write
|
||
1FEF0F7A000
|
heap
|
page read and write
|
||
2442BE12000
|
heap
|
page read and write
|
||
2DCD0BDA000
|
heap
|
page read and write
|
||
156015A5000
|
heap
|
page read and write
|
||
2173D300000
|
heap
|
page read and write
|
||
156014E3000
|
heap
|
page read and write
|
||
1DA6054A000
|
heap
|
page read and write
|
||
7FF72AA71000
|
unkown
|
page execute read
|
||
1B777B30000
|
trusted library allocation
|
page read and write
|
||
2DCCF054000
|
heap
|
page read and write
|
||
1FEF0DD6000
|
heap
|
page read and write
|
||
1DC9E1B9000
|
heap
|
page read and write
|
||
156015A2000
|
heap
|
page read and write
|
||
3E4D47F000
|
stack
|
page read and write
|
||
1A01BC60000
|
heap
|
page read and write
|
||
2938E3F9000
|
heap
|
page read and write
|
||
2DCCEF4E000
|
heap
|
page read and write
|
||
1B1377DC000
|
heap
|
page read and write
|
||
20AA85B0000
|
heap
|
page read and write
|
||
23B7849E000
|
heap
|
page read and write
|
||
1DC9E1A2000
|
heap
|
page read and write
|
||
2DCD1A04000
|
heap
|
page read and write
|
||
2DAEC6C0000
|
heap
|
page read and write
|
||
281E7A90000
|
heap
|
page read and write
|
||
2DCD18BD000
|
heap
|
page read and write
|
||
15F0C615000
|
heap
|
page read and write
|
||
23B783D0000
|
heap
|
page read and write
|
||
2DCCFF59000
|
heap
|
page read and write
|
||
363E8FF000
|
stack
|
page read and write
|
||
2DCCFE54000
|
heap
|
page read and write
|
||
BB8F1FF000
|
stack
|
page read and write
|
||
2DCCF075000
|
heap
|
page read and write
|
||
2DCD1F6D000
|
heap
|
page read and write
|
||
2DCCFEC3000
|
heap
|
page read and write
|
||
1829E519000
|
heap
|
page read and write
|
||
2DCCECF3000
|
heap
|
page read and write
|
||
23B784A9000
|
heap
|
page read and write
|
||
2DCCFBE0000
|
direct allocation
|
page read and write
|
||
299F7310000
|
heap
|
page read and write
|
||
2DCCF003000
|
heap
|
page read and write
|
||
2DCD137B000
|
heap
|
page read and write
|
||
8DD387E000
|
stack
|
page read and write
|
||
2DCCF01E000
|
heap
|
page read and write
|
||
2DAEC77C000
|
heap
|
page read and write
|
||
23D31CD000
|
stack
|
page read and write
|
||
21F3FC0B000
|
heap
|
page read and write
|
||
2DCCEF44000
|
heap
|
page read and write
|
||
2173D2D1000
|
heap
|
page read and write
|
||
2DCD17C7000
|
heap
|
page read and write
|
||
1FEF1414000
|
heap
|
page read and write
|
||
157BFFF0000
|
heap
|
page read and write
|
||
1829E403000
|
heap
|
page read and write
|
||
2173D276000
|
heap
|
page read and write
|
||
1CCFB760000
|
heap
|
page read and write
|
||
1DA60547000
|
heap
|
page read and write
|
||
7FF72AAB1000
|
unkown
|
page read and write
|
||
1F836C10000
|
heap
|
page read and write
|
||
2442DDB4000
|
heap
|
page read and write
|
||
2DCD0E58000
|
heap
|
page read and write
|
||
2DCD18CD000
|
heap
|
page read and write
|
||
FFFF3FE000
|
stack
|
page read and write
|
||
1FC75808000
|
heap
|
page read and write
|
There are 2981 hidden memdumps, click here to show them.