Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
C:\ProgramData\netsupport\client\AudioCapture.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\netsupport\client\HTCTL32.DLL
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\netsupport\client\PCICHEK.DLL
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\netsupport\client\PCICL32.DLL
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\netsupport\client\TCCTL32.DLL
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\netsupport\client\client32.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\netsupport\client\pcicapi.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\netsupport\client\remcmdstub.exe
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\netsupport\client\NSM.LIC
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\netsupport\client\client32.ini
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\netsupport\client\msvcr100.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\netsupport\client\nskbfltr.inf
|
Windows setup INFormation
|
dropped
|
||
C:\ProgramData\netsupport\client\nsm_vpro.ini
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\netsupport\netsupport.zip
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\AC\Temp\APPX.a7eg2nv0h_5ll4mprtt9uojee.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\AC\Temp\APPX.f8j4vx3e8n8wro9sxg8skwvnf.tmp
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (454), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\AC\Temp\APPX.h150xbbh9hh9t9qrahcglr31d.tmp
|
XML 1.0 document, ASCII text, with very long lines (4464), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\AC\Temp\APPX.u5y27yz6k3vi25fmvsudde2mb.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\LocalCache\WSJ_4.12.77.0_x64__v3spfewvfazpe{10030ca7-2d34-4b5d-ab65-42a8a50302a9}_temp.pri
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\TempState\AILog.txt
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2titzhsh.ebb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5zlartyx.40b.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eqal40cl.edj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m31idy4h.1ht.psm1
|
ASCII text, with no line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ms0ixla1.se3.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rgypohhb.dpt.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_seo2ul3m.o2p.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sftmmkzi.o3i.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tvbunhku.xav.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uucymg4t.spa.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vllnbf0w.dix.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vnws2chb.ict.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x4zihq54.op0.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z5nayqjc.ruq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 13:58:17 2024, atime=Mon Oct 2 20:46:57
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 13:58:17 2024, atime=Mon Oct 2 20:46:57
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:54:41 2023, atime=Mon Oct 2 20:46:57
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 13:58:17 2024, atime=Mon Oct 2 20:46:57
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 13:58:17 2024, atime=Mon Oct 2 20:46:57
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 13:58:17 2024, atime=Mon Oct 2 20:46:57
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\Downloads\9ca62580-b258-4627-882b-7b61e4af3c6e.tmp
|
Zip archive data, at least v4.5 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\Downloads\Unconfirmed 423205.crdownload
|
Zip archive data, at least v4.5 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\Downloads\Unconfirmed 427628.crdownload (copy)
|
Zip archive data, at least v4.5 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\Downloads\WSJ (1).msix (copy)
|
Zip archive data, at least v4.5 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\Downloads\e741087a-defc-4dd8-a5ef-58ca00c61c80.tmp
|
Zip archive data, at least v4.5 to extract, compression method=deflate
|
dropped
|
||
Chrome Cache Entry: 134
|
MS Windows icon resource - 4 icons, 64x64, 8 bits/pixel, 48x48, 8 bits/pixel
|
dropped
|
||
Chrome Cache Entry: 135
|
JPEG image data, baseline, precision 8, 287x191, components 3
|
downloaded
|
||
Chrome Cache Entry: 136
|
MS Windows icon resource - 4 icons, 64x64, 8 bits/pixel, 48x48, 8 bits/pixel
|
downloaded
|
||
Chrome Cache Entry: 137
|
JPEG image data, baseline, precision 8, 110x62, components 3
|
downloaded
|
||
Chrome Cache Entry: 138
|
PNG image data, 110 x 62, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 139
|
JPEG image data, baseline, precision 8, 220x220, components 3
|
dropped
|
||
Chrome Cache Entry: 140
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 141
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 142
|
JPEG image data, baseline, precision 8, 220x220, components 3
|
downloaded
|
||
Chrome Cache Entry: 143
|
ASCII text, with CRLF line terminators
|
downloaded
|
||
Chrome Cache Entry: 144
|
PNG image data, 220 x 220, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 145
|
Web Open Font Format (Version 2), TrueType, length 47552, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 146
|
HTML document, Unicode text, UTF-8 text, with very long lines (486)
|
downloaded
|
||
Chrome Cache Entry: 147
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 148
|
JPEG image data, baseline, precision 8, 110x62, components 3
|
dropped
|
||
Chrome Cache Entry: 149
|
Web Open Font Format (Version 2), TrueType, length 48832, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 150
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 151
|
PNG image data, 287 x 192, 8-bit/color RGB, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 152
|
Web Open Font Format (Version 2), TrueType, length 66893, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 153
|
Web Open Font Format (Version 2), TrueType, length 47072, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 154
|
JPEG image data, baseline, precision 8, 110x62, components 3
|
dropped
|
||
Chrome Cache Entry: 155
|
Web Open Font Format (Version 2), TrueType, length 47236, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 156
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 157
|
PNG image data, 110 x 62, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 158
|
JPEG image data, baseline, precision 8, 607x341, components 3
|
downloaded
|
||
Chrome Cache Entry: 159
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 160
|
ASCII text, with very long lines (10136)
|
dropped
|
||
Chrome Cache Entry: 161
|
Web Open Font Format (Version 2), TrueType, length 26844, version 0.0
|
downloaded
|
||
Chrome Cache Entry: 162
|
JPEG image data, baseline, precision 8, 607x341, components 3
|
dropped
|
||
Chrome Cache Entry: 163
|
ISO Media, AVIF Image
|
downloaded
|
||
Chrome Cache Entry: 164
|
Web Open Font Format (Version 2), TrueType, length 25736, version 0.0
|
downloaded
|
||
Chrome Cache Entry: 165
|
ISO Media, AVIF Image
|
dropped
|
||
Chrome Cache Entry: 166
|
Web Open Font Format (Version 2), TrueType, length 65365, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 167
|
Web Open Font Format (Version 2), TrueType, length 25824, version 0.0
|
downloaded
|
||
Chrome Cache Entry: 168
|
PNG image data, 1200 x 630, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 169
|
Unicode text, UTF-8 text, with very long lines (1425), with CRLF line terminators
|
downloaded
|
||
Chrome Cache Entry: 170
|
GIF image data, version 89a, 76 x 76
|
dropped
|
||
Chrome Cache Entry: 171
|
JPEG image data, baseline, precision 8, 287x191, components 3
|
dropped
|
||
Chrome Cache Entry: 172
|
Web Open Font Format (Version 2), TrueType, length 46896, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 173
|
ISO Media, AVIF Image
|
downloaded
|
||
Chrome Cache Entry: 174
|
Zip archive data, at least v4.5 to extract, compression method=deflate
|
downloaded
|
||
Chrome Cache Entry: 175
|
JPEG image data, baseline, precision 8, 110x62, components 3
|
downloaded
|
||
Chrome Cache Entry: 176
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 177
|
Web Open Font Format (Version 2), TrueType, length 63957, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 178
|
ISO Media, AVIF Image
|
dropped
|
||
Chrome Cache Entry: 179
|
PNG image data, 220 x 220, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 180
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 181
|
Web Open Font Format (Version 2), TrueType, length 47636, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 182
|
PNG image data, 287 x 192, 8-bit/color RGB, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 183
|
GIF image data, version 89a, 76 x 76
|
downloaded
|
||
Chrome Cache Entry: 184
|
PNG image data, 1200 x 630, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 185
|
Web Open Font Format (Version 2), TrueType, length 47100, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 186
|
ASCII text, with very long lines (10136)
|
downloaded
|
||
Chrome Cache Entry: 187
|
SVG Scalable Vector Graphics image
|
downloaded
|
There are 92 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://wsj.pm/
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=2012,i,2892533121597599651,11552435548397906284,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\WindowsApps\WSJ_4.12.77.0_x64__v3spfewvfazpe\PsfLauncher64.exe
|
"C:\Program Files\WindowsApps\WSJ_4.12.77.0_x64__v3spfewvfazpe\PsfLauncher64.exe"
|
||
C:\Program Files\WindowsApps\WSJ_4.12.77.0_x64__v3spfewvfazpe\VFS\ProgramFilesX64\PsfRunDll64.exe
|
"PsfRunDll64.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Powershell.exe -ExecutionPolicy RemoteSigned -file "C:\Program Files\WindowsApps\WSJ_4.12.77.0_x64__v3spfewvfazpe\StartingScriptWrapper.ps1"
"Powershell.exe -ExecutionPolicy RemoteSigned -file '.\tOUKLPvSz.ps1'"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy RemoteSigned -file .\tOUKLPvSz.ps1
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://www.wsj.com/
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=404 --field-trial-handle=1996,i,16757572502617297566,4553058767684910018,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\ProgramData\netsupport\client\client32.exe
|
"C:\ProgramData\netsupport\client\client32.exe"
|
||
C:\Program Files\WindowsApps\WSJ_4.12.77.0_x64__v3spfewvfazpe\PsfLauncher64.exe
|
"C:\Program Files\WindowsApps\WSJ_4.12.77.0_x64__v3spfewvfazpe\PsfLauncher64.exe"
|
||
C:\Program Files\WindowsApps\WSJ_4.12.77.0_x64__v3spfewvfazpe\VFS\ProgramFilesX64\PsfRunDll64.exe
|
"PsfRunDll64.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Powershell.exe -ExecutionPolicy RemoteSigned -file "C:\Program Files\WindowsApps\WSJ_4.12.77.0_x64__v3spfewvfazpe\StartingScriptWrapper.ps1"
"Powershell.exe -ExecutionPolicy RemoteSigned -file '.\tOUKLPvSz.ps1'"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy RemoteSigned -file .\tOUKLPvSz.ps1
|
||
C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.21.2771.0_x64__8wekyb3d8bbwe\AppInstaller.exe
|
"C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.21.2771.0_x64__8wekyb3d8bbwe\AppInstaller.exe" -ServerName:App.AppX9rwyqtrq9gw3wnmrap9a412nsc7145qh.mca
|
||
C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.21.2771.0_x64__8wekyb3d8bbwe\AppInstallerFullTrustAppServiceClient.exe
|
"C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.21.2771.0_x64__8wekyb3d8bbwe\AppInstallerFullTrustAppServiceClient.exe"
/InvokerPRAID: App GroupPolicy
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\rundll32.exe
|
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6}
-Embedding
|
||
C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.21.2771.0_x64__8wekyb3d8bbwe\AppInstaller.exe
|
"C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.21.2771.0_x64__8wekyb3d8bbwe\AppInstaller.exe" -ServerName:App.AppX9rwyqtrq9gw3wnmrap9a412nsc7145qh.mca
|
||
C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.21.2771.0_x64__8wekyb3d8bbwe\AppInstallerFullTrustAppServiceClient.exe
|
"C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.21.2771.0_x64__8wekyb3d8bbwe\AppInstallerFullTrustAppServiceClient.exe"
/InvokerPRAID: App GroupPolicy
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 12 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://wsj.pm
|
|||
https://cdn37.space/974afa0a-d334-48ec-a0d4-4cc14efa730c-1d3d044a-e654-41e3-ad32-38a2934393e4?aklshdjahsjdh=25&ajhsdjhasjhd=nsd&iud=90dab6f9-11b1-408a-af36-86b217e34b87
|
86.104.72.157
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0
|
unknown
|
||
http://%s/testpage.htmwininet.dll
|
unknown
|
||
http://www.certplus.com/CRL/class3.crl0
|
unknown
|
||
http://geo.netsupportsoftware.com/location/loca.asp
|
104.26.0.231
|
||
http://ocsp.suscerte.gob.ve0
|
unknown
|
||
https://cdn40.click/9e4e27b7-bcfb-4298-bf8f-2cf4a6bdb3bf-9b6b40d6-3f8e-4755-9063-562658ebdb95
|
23.133.88.190
|
||
https://cdn40.click/files/WSJ.msix
|
23.133.88.190
|
||
http://crl.dhimyotis.com/certignarootca.crl0
|
unknown
|
||
http://sertifikati.ca.posta.rs/crl/PostaCARoot.crl0
|
unknown
|
||
http://www.chambersign.org1
|
unknown
|
||
https://www.wsj.com/
|
unknown
|
||
http://%s/testpage.htm
|
unknown
|
||
http://geo.netsupportsoftware.com/location/loca.aspuest-Out-NoScope
|
unknown
|
||
http://repository.swisssign.com/0
|
unknown
|
||
http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz0
|
unknown
|
||
http://ca.disig.sk/ca/crl/ca_disig.crl0
|
unknown
|
||
https://android.notify.windows.com/iOS80
|
unknown
|
||
http://www.suscerte.gob.ve/dpc0
|
unknown
|
||
http://www.disig.sk/ca/crl/ca_disig.crl0
|
unknown
|
||
https://wsj.pm/fonts/woffs/exchange/Exchange-BookItalic.woff2
|
103.113.70.37
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://wsj.pm/fonts/woffs/retina/RetinaNarr-Medium.woff2
|
103.113.70.37
|
||
https://wsj.pm/img/wsj-logo-big-black.e653dfca.svg
|
103.113.70.37
|
||
https://wsj.pm/img/google-play.4699f3c2.svg
|
103.113.70.37
|
||
https://wns.windows.com/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://pki.registradores.org/normativa/index.htm0
|
unknown
|
||
http://policy.camerfirma.com0
|
unknown
|
||
http://www.anf.es/es/address-direccion.html
|
unknown
|
||
https://www.anf.es/address/)1(0&
|
unknown
|
||
https://cdn40.click/974afa0a-d334-48ec-a0d4-4cc14efa730c-1d3d044a-e654-41e3-ad32-38a2934393e4?aklshdjahsjdh=25&ajhsdjhasjhd=nsp&ahsdjkasjkdh=ab012ac2-5a34-4ac8-897c-4e2ce3936e3c
|
23.133.88.190
|
||
http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?
|
unknown
|
||
http://crl.ssc.lt/root-b/cacrl.crl0
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://www.certicamara.com/dpc/0Z
|
unknown
|
||
http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G
|
unknown
|
||
https://wwww.certigna.fr/autorites/0m
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://www.anf.es/AC/ANFServerCA.crl0
|
unknown
|
||
http://127.0.0.1
|
unknown
|
||
http://www.globaltrust.info0
|
unknown
|
||
http://www.symauth.com/cps0(
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://wsj.pm/fonts/woffs/escrow/Escrow+Display+Condensed+Italic.woff2
|
103.113.70.37
|
||
http://ac.economia.gob.mx/last.crl0G
|
unknown
|
||
https://wsj.pm/img/im-948848.jpeg
|
103.113.70.37
|
||
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
|
unknown
|
||
http://www.symauth.com/rpa00
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
|
unknown
|
||
http://crl.oces.trust2408.com/oces.crl0
|
unknown
|
||
http://certs.oaticerts.com/repository/OATICA2.crl
|
unknown
|
||
http://certs.oati.net/repository/OATICA2.crt0
|
unknown
|
||
http://www.accv.es00
|
unknown
|
||
http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0
|
unknown
|
||
https://wsj.pm/fonts/woffs/retina/Retina-Light.woff2
|
103.113.70.37
|
||
http://crl2.postsignum.cz/crl/psrootqca4.crl01
|
unknown
|
||
http://web.ncdc.gov.sa/crl/nrcaparta1.crl
|
unknown
|
||
http://www.datev.de/zertifikat-policy-int0
|
unknown
|
||
https://wsj.pm/fonts/woffs/retina/RetinaNarr-Bold.woff2
|
103.113.70.37
|
||
http://www.acabogacia.org0
|
unknown
|
||
https://cdn40.click/73689d8a-25b4-41cf-b693-05591ed804a7-7433f7b1-9997-477b-aadc-5a6e8d233c61?fmtKxAm=Windows%20Defender&ancOgcW=GPedA&BjxYYHPLrzLmCYuBVxOLtmKj=Microsoft+Windows+10+Pro&aEoLMFrJkYQED=25&sbhadkcjUpbj=d99844e1-4599-410e-aa0d-b504c5ca3ddf&File=wsj&jAWWnA=w&zbzPFbbhcIkxLubqNgOzVPy=90dab6f9-11b1-408a-af36-86b217e34b87
|
23.133.88.190
|
||
http://www.firmaprofesional.com/cps0
|
unknown
|
||
https://aka.ms/pscore6
|
unknown
|
||
https://cdn40.click/bb9c1a14-4e3d-40ab-bcc8-0b84e78255b0-4bed9ff2-0f4e-48fb-92ed-1065fcd85e01
|
unknown
|
||
http://crl.securetrust.com/SGCA.crl0
|
unknown
|
||
http://www.agesic.gub.uy/acrn/acrn.crl0)
|
unknown
|
||
http://pesterbdd.com/images/Pester.png8
|
unknown
|
||
https://wsj.pm/fonts/woffs/retina/Retina-Book.woff2
|
103.113.70.37
|
||
http://www.rcsc.lt/repository0
|
unknown
|
||
https://wsj.pm/style.css
|
103.113.70.37
|
||
https://web.certicamara.com/marco-legal0Z
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
http://www.quovadisglobal.com/cps0
|
unknown
|
||
http://www.correo.com.uy/correocert/cps.pdf0
|
unknown
|
||
http://www.netsupportschool.com/tutor-assistant.asp11(
|
unknown
|
||
https://wsj.pm/fonts/woffs/escrow/Escrow+Display+Condensed+Roman.woff2
|
103.113.70.37
|
||
http://certs.oaticerts.com/repository/OATICA2.crt08
|
unknown
|
||
http://cps.chambersign.org/cps/chambersignroot.html0
|
unknown
|
||
http://www.anf.es/AC/RC/ocsp0c
|
unknown
|
||
http://www.pci.co.uk/support
|
unknown
|
||
http://www.oaticerts.com/repository.
|
unknown
|
||
http://www.ancert.com/cps0
|
unknown
|
||
http://ocsp.accv.es0
|
unknown
|
||
https://www.wsj.com/x
|
unknown
|
||
http://acraiz.icpbrasil.gov.br/LCRacraizv2.crl0
|
unknown
|
||
http://www.echoworx.com/ca/root2/cps.pdf0
|
unknown
|
||
https://wsj.pm/img/im-949675.png
|
103.113.70.37
|
||
http://ca.mtin.es/mtin/crl/MTINAutoridadRaiz03
|
unknown
|
||
http://www.datev.de/zertifikat-policy-std0
|
unknown
|
||
https://www.wsj.com/vice
|
unknown
|
||
https://wsj.pm/fonts/woffs/retina/RetinaNarr-Light.woff2
|
103.113.70.37
|
||
http://acraiz.icpbrasil.gov.br/LCRacraizv1.crl0
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelp(
|
unknown
|
||
http://www.informatik.admin.ch/PKI/links/CPS_2_16_756_1_17_3_1_0.pdf0
|
unknown
|
||
http://crl.defence.gov.au/pki0
|
unknown
|
||
http://www.agesic.gub.uy/acrn/cps_acrn.pdf0
|
unknown
|
||
http://fedir.comsign.co.il/crl/ComSignAdvancedSecurityCA.crl0
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
cdn37.space
|
86.104.72.157
|
||
geo.netsupportsoftware.com
|
104.26.0.231
|
||
cdn40.click
|
23.133.88.190
|
||
api.ipify.org
|
104.26.12.205
|
||
www.google.com
|
108.177.122.106
|
||
wsj.pm
|
103.113.70.37
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
86.104.72.157
|
cdn37.space
|
Romania
|
||
192.168.2.17
|
unknown
|
unknown
|
||
5.8.63.140
|
unknown
|
Russian Federation
|
||
104.26.12.205
|
api.ipify.org
|
United States
|
||
185.174.102.62
|
unknown
|
Ukraine
|
||
108.177.122.106
|
www.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
103.113.70.37
|
wsj.pm
|
India
|
||
104.26.13.205
|
unknown
|
United States
|
||
23.133.88.190
|
cdn40.click
|
Reserved
|
||
104.26.0.231
|
geo.netsupportsoftware.com
|
United States
|
There are 1 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\WC\Siloedbdbb71-2b33-bfb5-9570-d8542522e897user_sid\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
196D5A39000
|
heap
|
page read and write
|
||
23162DD7000
|
trusted library allocation
|
page read and write
|
||
2A99FB9E000
|
heap
|
page read and write
|
||
2A99FC59000
|
heap
|
page read and write
|
||
8AF000
|
heap
|
page read and write
|
||
31BE000
|
stack
|
page read and write
|
||
2B2F34AC000
|
heap
|
page read and write
|
||
2A99FD95000
|
heap
|
page read and write
|
||
2B5AB23C000
|
heap
|
page read and write
|
||
7FF9BB670000
|
trusted library allocation
|
page read and write
|
||
7FF9BB690000
|
trusted library allocation
|
page execute and read and write
|
||
2A99FC7D000
|
heap
|
page read and write
|
||
1D2C5F02000
|
heap
|
page read and write
|
||
196D5F5E000
|
heap
|
page read and write
|
||
231619C3000
|
trusted library allocation
|
page read and write
|
||
7FF9BB270000
|
trusted library allocation
|
page read and write
|
||
1E1353B0000
|
heap
|
page execute and read and write
|
||
7FF9BB3E0000
|
trusted library allocation
|
page read and write
|
||
2A99FDC9000
|
heap
|
page read and write
|
||
196D5B61000
|
heap
|
page read and write
|
||
196D5B82000
|
heap
|
page read and write
|
||
3CA6937000
|
stack
|
page read and write
|
||
196D5F77000
|
heap
|
page read and write
|
||
196D59DA000
|
heap
|
page read and write
|
||
196D5A3D000
|
heap
|
page read and write
|
||
2A997D48000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
E27857A000
|
stack
|
page read and write
|
||
5A9C000
|
heap
|
page read and write
|
||
186BAE02000
|
heap
|
page read and write
|
||
7FF9BB5F0000
|
trusted library allocation
|
page read and write
|
||
2A99FCD1000
|
heap
|
page read and write
|
||
196D5BC9000
|
heap
|
page read and write
|
||
196D5AB2000
|
heap
|
page read and write
|
||
2B5AB200000
|
heap
|
page read and write
|
||
7FF9BB8D0000
|
trusted library allocation
|
page read and write
|
||
3CA657E000
|
stack
|
page read and write
|
||
2A997C33000
|
heap
|
page read and write
|
||
196D59B5000
|
heap
|
page read and write
|
||
23162F77000
|
trusted library allocation
|
page read and write
|
||
2B28091B000
|
trusted library allocation
|
page read and write
|
||
2316355E000
|
trusted library allocation
|
page read and write
|
||
2A99FD26000
|
heap
|
page read and write
|
||
196D593E000
|
heap
|
page read and write
|
||
7FF9BAFC0000
|
trusted library allocation
|
page read and write
|
||
2A99FC75000
|
heap
|
page read and write
|
||
FD62FF3000
|
stack
|
page read and write
|
||
7FF9BB550000
|
trusted library allocation
|
page read and write
|
||
8D4000
|
heap
|
page read and write
|
||
196D5BAA000
|
heap
|
page read and write
|
||
196D5834000
|
heap
|
page read and write
|
||
2B280877000
|
trusted library allocation
|
page read and write
|
||
2678AA2E000
|
heap
|
page read and write
|
||
196D5CA1000
|
heap
|
page read and write
|
||
196D5AD4000
|
heap
|
page read and write
|
||
2A99FD97000
|
heap
|
page read and write
|
||
2315F23D000
|
heap
|
page read and write
|
||
2B2F5D02000
|
heap
|
page read and write
|
||
196D5373000
|
heap
|
page read and write
|
||
7FF9BB160000
|
trusted library allocation
|
page read and write
|
||
7FF9BB0B5000
|
trusted library allocation
|
page read and write
|
||
5A96000
|
heap
|
page read and write
|
||
7FF9BB390000
|
trusted library allocation
|
page read and write
|
||
196D5D04000
|
heap
|
page read and write
|
||
196D5AF1000
|
heap
|
page read and write
|
||
FD61CFA000
|
stack
|
page read and write
|
||
1E11DC32000
|
trusted library allocation
|
page read and write
|
||
2A99FE6F000
|
heap
|
page read and write
|
||
196D5BD1000
|
heap
|
page read and write
|
||
231711D0000
|
trusted library allocation
|
page read and write
|
||
2A99FBC0000
|
heap
|
page read and write
|
||
1E11CDE0000
|
heap
|
page execute and read and write
|
||
5A23000
|
heap
|
page read and write
|
||
196D5B3B000
|
heap
|
page read and write
|
||
7FF9BB751000
|
trusted library allocation
|
page read and write
|
||
5AA9000
|
heap
|
page read and write
|
||
2B2809C3000
|
trusted library allocation
|
page read and write
|
||
1E11E1A5000
|
trusted library allocation
|
page read and write
|
||
196D6294000
|
heap
|
page read and write
|
||
1E11B498000
|
heap
|
page read and write
|
||
2A99FF16000
|
heap
|
page read and write
|
||
196D51EE000
|
heap
|
page read and write
|
||
186BAE13000
|
heap
|
page read and write
|
||
2B280A9F000
|
trusted library allocation
|
page read and write
|
||
904000
|
heap
|
page read and write
|
||
7FF9BB520000
|
trusted library allocation
|
page read and write
|
||
177F3C13000
|
heap
|
page read and write
|
||
7FF9BB620000
|
trusted library allocation
|
page read and write
|
||
2A99FF3E000
|
heap
|
page read and write
|
||
196D5A27000
|
heap
|
page read and write
|
||
7FF9BB0C0000
|
trusted library allocation
|
page read and write
|
||
2A99FE2C000
|
heap
|
page read and write
|
||
5AA0000
|
heap
|
page read and write
|
||
7FF9BAE23000
|
trusted library allocation
|
page execute and read and write
|
||
196D5983000
|
heap
|
page read and write
|
||
1E11B413000
|
heap
|
page read and write
|
||
196CDB62000
|
heap
|
page read and write
|
||
196D5A04000
|
heap
|
page read and write
|
||
7FF9BB730000
|
trusted library allocation
|
page read and write
|
||
196D513D000
|
heap
|
page read and write
|
||
2A997CD9000
|
heap
|
page read and write
|
||
B9700FA000
|
stack
|
page read and write
|
||
8BF000
|
heap
|
page read and write
|
||
196D5ABA000
|
heap
|
page read and write
|
||
196D5D34000
|
heap
|
page read and write
|
||
196D5B9C000
|
heap
|
page read and write
|
||
23179160000
|
trusted library allocation
|
page read and write
|
||
23162F35000
|
trusted library allocation
|
page read and write
|
||
3CA64FE000
|
stack
|
page read and write
|
||
196D5A59000
|
heap
|
page read and write
|
||
2A9A0010000
|
heap
|
page read and write
|
||
7FF9BAFEB000
|
trusted library allocation
|
page read and write
|
||
75186FF000
|
stack
|
page read and write
|
||
196D53F5000
|
heap
|
page read and write
|
||
1C75FA2C000
|
heap
|
page read and write
|
||
177F3BE0000
|
heap
|
page read and write
|
||
FD62DFC000
|
stack
|
page read and write
|
||
2A9A0010000
|
heap
|
page read and write
|
||
8FB000
|
heap
|
page read and write
|
||
196CD800000
|
heap
|
page read and write
|
||
196D59C8000
|
heap
|
page read and write
|
||
23171460000
|
trusted library allocation
|
page read and write
|
||
2727000
|
heap
|
page read and write
|
||
7FF9BB4C0000
|
trusted library allocation
|
page read and write
|
||
196D5B88000
|
heap
|
page read and write
|
||
2A99A36E000
|
heap
|
page read and write
|
||
2A99FB3A000
|
heap
|
page read and write
|
||
2A997CC2000
|
heap
|
page read and write
|
||
196D5D7F000
|
heap
|
page read and write
|
||
2316306B000
|
trusted library allocation
|
page read and write
|
||
196D531E000
|
heap
|
page read and write
|
||
2A99FB50000
|
heap
|
page read and write
|
||
196D5A0D000
|
heap
|
page read and write
|
||
196CDA13000
|
heap
|
page read and write
|
||
186BAE28000
|
heap
|
page read and write
|
||
196D59E9000
|
heap
|
page read and write
|
||
196D5CFD000
|
heap
|
page read and write
|
||
196D5A76000
|
heap
|
page read and write
|
||
231616DB000
|
trusted library allocation
|
page read and write
|
||
2B2F5E8E000
|
heap
|
page read and write
|
||
196D5F9B000
|
heap
|
page read and write
|
||
2A99FF83000
|
heap
|
page read and write
|
||
2A997DFA000
|
heap
|
page read and write
|
||
2A99FD06000
|
heap
|
page read and write
|
||
196D5A34000
|
heap
|
page read and write
|
||
196D5FCD000
|
heap
|
page read and write
|
||
196D5B95000
|
heap
|
page read and write
|
||
196D5349000
|
heap
|
page read and write
|
||
FD625FE000
|
stack
|
page read and write
|
||
196D5BA3000
|
heap
|
page read and write
|
||
7FF9BBA53000
|
trusted library allocation
|
page read and write
|
||
2A99FBC8000
|
heap
|
page read and write
|
||
2A99FE1B000
|
heap
|
page read and write
|
||
1E1355F5000
|
heap
|
page read and write
|
||
2A997DCA000
|
heap
|
page read and write
|
||
7FF9BB8F0000
|
trusted library allocation
|
page read and write
|
||
196D5CA7000
|
heap
|
page read and write
|
||
196D5F70000
|
heap
|
page read and write
|
||
196D5942000
|
heap
|
page read and write
|
||
7FF9BB090000
|
trusted library allocation
|
page read and write
|
||
196D0002000
|
heap
|
page read and write
|
||
74675000
|
unkown
|
page readonly
|
||
1E0000
|
heap
|
page read and write
|
||
2A99FD82000
|
heap
|
page read and write
|
||
2A99A3DC000
|
heap
|
page read and write
|
||
196D5B2C000
|
heap
|
page read and write
|
||
2A99A1B0000
|
heap
|
page read and write
|
||
2316352D000
|
trusted library allocation
|
page read and write
|
||
7FF9BBA90000
|
trusted library allocation
|
page read and write
|
||
2560000
|
heap
|
page read and write
|
||
7FF9BB680000
|
trusted library allocation
|
page read and write
|
||
2A99FF34000
|
heap
|
page read and write
|
||
32FC000
|
stack
|
page read and write
|
||
7FF9BB380000
|
trusted library allocation
|
page read and write
|
||
6C1B2000
|
unkown
|
page readonly
|
||
2A99FED2000
|
heap
|
page read and write
|
||
2B2F32C0000
|
heap
|
page read and write
|
||
177F3C8C000
|
heap
|
page read and write
|
||
7FF9BB150000
|
trusted library allocation
|
page read and write
|
||
2A99FCB6000
|
heap
|
page read and write
|
||
196D5B8C000
|
heap
|
page read and write
|
||
1C75FB02000
|
heap
|
page read and write
|
||
7FF9BAEDC000
|
trusted library allocation
|
page execute and read and write
|
||
2A99FDFC000
|
heap
|
page read and write
|
||
E2789FF000
|
stack
|
page read and write
|
||
3CA65FA000
|
stack
|
page read and write
|
||
2678A9A0000
|
trusted library allocation
|
page read and write
|
||
196D5BD5000
|
heap
|
page read and write
|
||
5ACB000
|
heap
|
page read and write
|
||
FDFFDFD000
|
stack
|
page read and write
|
||
5A4F000
|
heap
|
page read and write
|
||
196D5D3E000
|
heap
|
page read and write
|
||
196D5AA6000
|
heap
|
page read and write
|
||
196D01B6000
|
heap
|
page read and write
|
||
196D580D000
|
heap
|
page read and write
|
||
2678CA83000
|
trusted library allocation
|
page read and write
|
||
196D5A7B000
|
heap
|
page read and write
|
||
7FF6C3696000
|
unkown
|
page read and write
|
||
B9703FE000
|
stack
|
page read and write
|
||
196D5A88000
|
heap
|
page read and write
|
||
2B281BC6000
|
trusted library allocation
|
page read and write
|
||
81E000
|
heap
|
page read and write
|
||
7FF9BB370000
|
trusted library allocation
|
page read and write
|
||
196D5967000
|
heap
|
page read and write
|
||
E27813E000
|
stack
|
page read and write
|
||
1E11B43B000
|
heap
|
page read and write
|
||
1E135561000
|
heap
|
page read and write
|
||
2A99FF52000
|
heap
|
page read and write
|
||
2B2F343A000
|
heap
|
page read and write
|
||
8D4000
|
heap
|
page read and write
|
||
196D5B7C000
|
heap
|
page read and write
|
||
1E135503000
|
heap
|
page read and write
|
||
2A99FF5B000
|
heap
|
page read and write
|
||
2B281B39000
|
trusted library allocation
|
page read and write
|
||
23163088000
|
trusted library allocation
|
page read and write
|
||
196D5CD8000
|
heap
|
page read and write
|
||
2B280420000
|
trusted library allocation
|
page read and write
|
||
2A99FB4C000
|
heap
|
page read and write
|
||
5A9C000
|
heap
|
page read and write
|
||
196D5FBD000
|
heap
|
page read and write
|
||
196D5B88000
|
heap
|
page read and write
|
||
231793ED000
|
heap
|
page read and write
|
||
2A99FDB9000
|
heap
|
page read and write
|
||
2A99FD64000
|
heap
|
page read and write
|
||
FD62EFC000
|
stack
|
page read and write
|
||
5A62000
|
heap
|
page read and write
|
||
2A9A0023000
|
heap
|
page read and write
|
||
2A99FBEE000
|
heap
|
page read and write
|
||
112AD000
|
unkown
|
page readonly
|
||
196D5B77000
|
heap
|
page read and write
|
||
7FF9BB0D3000
|
trusted library allocation
|
page read and write
|
||
177E6DC0000
|
heap
|
page read and write
|
||
5AA7000
|
heap
|
page read and write
|
||
7FF9BB640000
|
trusted library allocation
|
page read and write
|
||
196D51F1000
|
heap
|
page read and write
|
||
196D5AC5000
|
heap
|
page read and write
|
||
23162FB2000
|
trusted library allocation
|
page read and write
|
||
2B2F4E02000
|
heap
|
page read and write
|
||
196D5318000
|
heap
|
page read and write
|
||
3CA6E7D000
|
stack
|
page read and write
|
||
196D5803000
|
heap
|
page read and write
|
||
196D5D19000
|
heap
|
page read and write
|
||
7FF695D5E000
|
unkown
|
page readonly
|
||
196D5A68000
|
heap
|
page read and write
|
||
196D5C5D000
|
heap
|
page read and write
|
||
2A99FB9B000
|
heap
|
page read and write
|
||
196D5CB3000
|
heap
|
page read and write
|
||
196D5802000
|
heap
|
page read and write
|
||
2A99FD6C000
|
heap
|
page read and write
|
||
5AC1000
|
heap
|
page read and write
|
||
196D5AB6000
|
heap
|
page read and write
|
||
196D5B54000
|
heap
|
page read and write
|
||
196D5CD0000
|
heap
|
page read and write
|
||
7FF9BB8F0000
|
trusted library allocation
|
page read and write
|
||
2B2F5524000
|
heap
|
page read and write
|
||
196D5A70000
|
heap
|
page read and write
|
||
7FF9BAE2D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF9BB810000
|
trusted library allocation
|
page read and write
|
||
2A99FC36000
|
heap
|
page read and write
|
||
2316307C000
|
trusted library allocation
|
page read and write
|
||
7FF9BAF50000
|
trusted library allocation
|
page execute and read and write
|
||
2A99FBC6000
|
heap
|
page read and write
|
||
231791F0000
|
trusted library allocation
|
page read and write
|
||
2B280523000
|
trusted library allocation
|
page read and write
|
||
2A99FB39000
|
heap
|
page read and write
|
||
1E135A44000
|
heap
|
page read and write
|
||
6C1B3000
|
unkown
|
page read and write
|
||
901000
|
heap
|
page read and write
|
||
537F000
|
stack
|
page read and write
|
||
7FFA1C52D000
|
unkown
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
196D5B71000
|
heap
|
page read and write
|
||
7FF9BB91C000
|
trusted library allocation
|
page read and write
|
||
23163382000
|
trusted library allocation
|
page read and write
|
||
196D45A0000
|
heap
|
page readonly
|
||
2A99FBB2000
|
heap
|
page read and write
|
||
177F5680000
|
heap
|
page read and write
|
||
231633B9000
|
trusted library allocation
|
page read and write
|
||
23163119000
|
trusted library allocation
|
page read and write
|
||
D65B76D000
|
stack
|
page read and write
|
||
3CA6CFE000
|
stack
|
page read and write
|
||
23163405000
|
trusted library allocation
|
page read and write
|
||
196D620A000
|
heap
|
page read and write
|
||
37EF3FC000
|
stack
|
page read and write
|
||
7FF9BB470000
|
trusted library allocation
|
page read and write
|
||
196D5364000
|
heap
|
page read and write
|
||
7FF9BBB70000
|
trusted library allocation
|
page read and write
|
||
196D5A49000
|
heap
|
page read and write
|
||
5A89000
|
heap
|
page read and write
|
||
23162EE7000
|
trusted library allocation
|
page read and write
|
||
2A99FCD7000
|
heap
|
page read and write
|
||
FD630FF000
|
stack
|
page read and write
|
||
196D5C97000
|
heap
|
page read and write
|
||
196D59C4000
|
heap
|
page read and write
|
||
2A99F358000
|
heap
|
page read and write
|
||
2B280A74000
|
trusted library allocation
|
page read and write
|
||
2B5AB244000
|
heap
|
page read and write
|
||
196D5A9C000
|
heap
|
page read and write
|
||
23162F04000
|
trusted library allocation
|
page read and write
|
||
196D5800000
|
heap
|
page read and write
|
||
2A99FE13000
|
heap
|
page read and write
|
||
196D5CAE000
|
heap
|
page read and write
|
||
196D5E0B000
|
heap
|
page read and write
|
||
7FF9BB2F0000
|
trusted library allocation
|
page read and write
|
||
2A99FA0D000
|
heap
|
page read and write
|
||
7FF9BAFC0000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
7FF9BBAB0000
|
trusted library allocation
|
page read and write
|
||
2B2F32F0000
|
heap
|
page read and write
|
||
7FF9BAEC6000
|
trusted library allocation
|
page read and write
|
||
271A000
|
heap
|
page read and write
|
||
196D5822000
|
heap
|
page read and write
|
||
196D5A6C000
|
heap
|
page read and write
|
||
196D51EF000
|
heap
|
page read and write
|
||
196D5A90000
|
heap
|
page read and write
|
||
196D5AAA000
|
heap
|
page read and write
|
||
7FF9BBB80000
|
trusted library allocation
|
page execute and read and write
|
||
2B28093C000
|
trusted library allocation
|
page read and write
|
||
196D5F57000
|
heap
|
page read and write
|
||
196D5AD7000
|
heap
|
page read and write
|
||
196D5346000
|
heap
|
page read and write
|
||
7FF9BB4D0000
|
trusted library allocation
|
page read and write
|
||
2A99FB0F000
|
heap
|
page read and write
|
||
196D501D000
|
heap
|
page read and write
|
||
23163530000
|
trusted library allocation
|
page read and write
|
||
7FF9BAEF6000
|
trusted library allocation
|
page execute and read and write
|
||
196D5B7E000
|
heap
|
page read and write
|
||
2A99FBC2000
|
heap
|
page read and write
|
||
7FF9BBB10000
|
trusted library allocation
|
page read and write
|
||
196D620A000
|
heap
|
page read and write
|
||
7FF9BBAB0000
|
trusted library allocation
|
page execute and read and write
|
||
751837F000
|
stack
|
page read and write
|
||
196D5B2A000
|
heap
|
page read and write
|
||
196D5AF6000
|
heap
|
page read and write
|
||
196D5B84000
|
heap
|
page read and write
|
||
2A99FC02000
|
heap
|
page read and write
|
||
196D5A79000
|
heap
|
page read and write
|
||
FD62BFC000
|
stack
|
page read and write
|
||
7FF9BB170000
|
trusted library allocation
|
page read and write
|
||
7FF9BB540000
|
trusted library allocation
|
page read and write
|
||
196D5A61000
|
heap
|
page read and write
|
||
2A99FB03000
|
heap
|
page read and write
|
||
196D5C41000
|
heap
|
page read and write
|
||
7FF9BB050000
|
trusted library allocation
|
page read and write
|
||
7FF9BB754000
|
trusted library allocation
|
page read and write
|
||
7FF9BB130000
|
trusted library allocation
|
page read and write
|
||
196D5A0C000
|
heap
|
page read and write
|
||
2678C402000
|
heap
|
page read and write
|
||
7FF9BB380000
|
trusted library allocation
|
page read and write
|
||
2A99FF86000
|
heap
|
page read and write
|
||
7FF9BB5F0000
|
trusted library allocation
|
page read and write
|
||
196D5C5F000
|
heap
|
page read and write
|
||
2A99FBE9000
|
heap
|
page read and write
|
||
7FF9BB360000
|
trusted library allocation
|
page read and write
|
||
7FF6C367E000
|
unkown
|
page readonly
|
||
1E11B442000
|
heap
|
page read and write
|
||
7FF9BAE20000
|
trusted library allocation
|
page read and write
|
||
2A99F402000
|
heap
|
page read and write
|
||
196CDAB4000
|
heap
|
page read and write
|
||
2A997D7B000
|
heap
|
page read and write
|
||
231634AB000
|
trusted library allocation
|
page read and write
|
||
7FF9BB160000
|
trusted library allocation
|
page read and write
|
||
2A99FCF6000
|
heap
|
page read and write
|
||
196D5DAA000
|
heap
|
page read and write
|
||
43970FE000
|
stack
|
page read and write
|
||
2316333B000
|
trusted library allocation
|
page read and write
|
||
2A99FB9E000
|
heap
|
page read and write
|
||
1C75F9B0000
|
heap
|
page read and write
|
||
196D597C000
|
heap
|
page read and write
|
||
E2784FE000
|
stack
|
page read and write
|
||
2A99FF1C000
|
heap
|
page read and write
|
||
196D5AA6000
|
heap
|
page read and write
|
||
2A99FE89000
|
heap
|
page read and write
|
||
7FF9BB0F0000
|
trusted library allocation
|
page read and write
|
||
74670000
|
unkown
|
page readonly
|
||
2A99FBD5000
|
heap
|
page read and write
|
||
2A99FB7C000
|
heap
|
page read and write
|
||
196D5C44000
|
heap
|
page read and write
|
||
7FF9BB760000
|
trusted library allocation
|
page read and write
|
||
196D5953000
|
heap
|
page read and write
|
||
1E11B502000
|
heap
|
page read and write
|
||
2A99FCF1000
|
heap
|
page read and write
|
||
196D59EA000
|
heap
|
page read and write
|
||
7FF9BB140000
|
trusted library allocation
|
page read and write
|
||
2A99FC5D000
|
heap
|
page read and write
|
||
FD620FB000
|
stack
|
page read and write
|
||
196D5B78000
|
heap
|
page read and write
|
||
196CDA00000
|
heap
|
page read and write
|
||
25AE000
|
stack
|
page read and write
|
||
5A3F000
|
heap
|
page read and write
|
||
2A99FF8D000
|
heap
|
page read and write
|
||
196D5D73000
|
heap
|
page read and write
|
||
2678A9B0000
|
heap
|
page read and write
|
||
43979FC000
|
stack
|
page read and write
|
||
4397BFC000
|
stack
|
page read and write
|
||
7FF9BB991000
|
trusted library allocation
|
page read and write
|
||
2A99F5EF000
|
heap
|
page read and write
|
||
2A99FC70000
|
heap
|
page read and write
|
||
7FF9BB4A0000
|
trusted library allocation
|
page read and write
|
||
196D5ADF000
|
heap
|
page read and write
|
||
196D5C73000
|
heap
|
page read and write
|
||
196D5987000
|
heap
|
page read and write
|
||
231799E3000
|
heap
|
page read and write
|
||
2A99FFD9000
|
heap
|
page read and write
|
||
2A997DC6000
|
heap
|
page read and write
|
||
196D5D7D000
|
heap
|
page read and write
|
||
7FF9BB990000
|
trusted library allocation
|
page read and write
|
||
196D5D57000
|
heap
|
page read and write
|
||
2A99FEFB000
|
heap
|
page read and write
|
||
2601000
|
heap
|
page read and write
|
||
196D5AB6000
|
heap
|
page read and write
|
||
59E000
|
stack
|
page read and write
|
||
196D5C83000
|
heap
|
page read and write
|
||
2A99FF06000
|
heap
|
page read and write
|
||
7FF9BBD20000
|
trusted library allocation
|
page read and write
|
||
196D62A5000
|
heap
|
page read and write
|
||
2A99FB78000
|
heap
|
page read and write
|
||
2B281B15000
|
trusted library allocation
|
page read and write
|
||
1D2C5DC0000
|
remote allocation
|
page read and write
|
||
2797D21A000
|
heap
|
page read and write
|
||
23179800000
|
heap
|
page read and write
|
||
7FF9BB7E0000
|
trusted library allocation
|
page read and write
|
||
2A997CE6000
|
heap
|
page read and write
|
||
23161D6B000
|
trusted library allocation
|
page read and write
|
||
2B280514000
|
trusted library allocation
|
page read and write
|
||
5A12000
|
heap
|
page read and write
|
||
2678AAFA000
|
heap
|
page read and write
|
||
7FF9BB120000
|
trusted library allocation
|
page read and write
|
||
2A99FF11000
|
heap
|
page read and write
|
||
2317985F000
|
heap
|
page read and write
|
||
196D5B41000
|
heap
|
page read and write
|
||
2A99FB49000
|
heap
|
page read and write
|
||
2316310E000
|
trusted library allocation
|
page read and write
|
||
1E135B02000
|
heap
|
page read and write
|
||
7FF9BB070000
|
trusted library allocation
|
page read and write
|
||
2A99FCE5000
|
heap
|
page read and write
|
||
196D5BB2000
|
heap
|
page read and write
|
||
7FF9BB6E0000
|
trusted library allocation
|
page read and write
|
||
FDFFCFE000
|
stack
|
page read and write
|
||
196D5D3C000
|
heap
|
page read and write
|
||
1C75FAB4000
|
heap
|
page read and write
|
||
196D5D3C000
|
heap
|
page read and write
|
||
196D5B74000
|
heap
|
page read and write
|
||
1E11CDA0000
|
trusted library allocation
|
page read and write
|
||
2797D302000
|
heap
|
page read and write
|
||
2678C601000
|
trusted library allocation
|
page read and write
|
||
196D5AE8000
|
heap
|
page read and write
|
||
2A99F234000
|
heap
|
page read and write
|
||
23160D13000
|
heap
|
page read and write
|
||
2A9A000D000
|
heap
|
page read and write
|
||
2A99FD10000
|
heap
|
page read and write
|
||
196D5A75000
|
heap
|
page read and write
|
||
E2786FC000
|
stack
|
page read and write
|
||
196D5A8A000
|
heap
|
page read and write
|
||
3CA6173000
|
stack
|
page read and write
|
||
196D5B00000
|
heap
|
page read and write
|
||
7FF695D40000
|
unkown
|
page readonly
|
||
2A99FF87000
|
heap
|
page read and write
|
||
2985FF000
|
stack
|
page read and write
|
||
196D5A02000
|
heap
|
page read and write
|
||
23163307000
|
trusted library allocation
|
page read and write
|
||
196D59D8000
|
heap
|
page read and write
|
||
2678AA13000
|
heap
|
page read and write
|
||
23162D69000
|
trusted library allocation
|
page read and write
|
||
231630FC000
|
trusted library allocation
|
page read and write
|
||
196D5AD1000
|
heap
|
page read and write
|
||
7FFA1B10B000
|
unkown
|
page read and write
|
||
2A997DF6000
|
heap
|
page read and write
|
||
2A99FC37000
|
heap
|
page read and write
|
||
1E1355D0000
|
heap
|
page read and write
|
||
196D5D2C000
|
heap
|
page read and write
|
||
23162447000
|
trusted library allocation
|
page read and write
|
||
2A99FD8D000
|
heap
|
page read and write
|
||
196D5D2C000
|
heap
|
page read and write
|
||
751877E000
|
stack
|
page read and write
|
||
1E11E8B1000
|
trusted library allocation
|
page read and write
|
||
2A99FB3E000
|
heap
|
page read and write
|
||
2A99FF02000
|
heap
|
page read and write
|
||
7FF9BB91D000
|
trusted library allocation
|
page read and write
|
||
8AD000
|
heap
|
page read and write
|
||
856000
|
heap
|
page read and write
|
||
2B5AB213000
|
heap
|
page read and write
|
||
196D5A7F000
|
heap
|
page read and write
|
||
196D5DE5000
|
heap
|
page read and write
|
||
196D5C3F000
|
heap
|
page read and write
|
||
196D5971000
|
heap
|
page read and write
|
||
196D5BF9000
|
heap
|
page read and write
|
||
2A99FBB3000
|
heap
|
page read and write
|
||
7FF9BB110000
|
trusted library allocation
|
page read and write
|
||
7FF9BB080000
|
trusted library allocation
|
page read and write
|
||
196CDAA8000
|
heap
|
page read and write
|
||
7FF9BB630000
|
trusted library allocation
|
page read and write
|
||
7FF9BB760000
|
trusted library allocation
|
page read and write
|
||
1C75FA43000
|
heap
|
page read and write
|
||
1E12D001000
|
trusted library allocation
|
page read and write
|
||
2678A850000
|
heap
|
page read and write
|
||
2A997D5F000
|
heap
|
page read and write
|
||
196D5AE5000
|
heap
|
page read and write
|
||
196CDA99000
|
heap
|
page read and write
|
||
E278776000
|
stack
|
page read and write
|
||
231633D6000
|
trusted library allocation
|
page read and write
|
||
2A99FBCA000
|
heap
|
page read and write
|
||
2A99FFC0000
|
heap
|
page read and write
|
||
196D5330000
|
heap
|
page read and write
|
||
6C1A4000
|
unkown
|
page read and write
|
||
196D5B82000
|
heap
|
page read and write
|
||
196D5D8C000
|
heap
|
page read and write
|
||
2B2F5500000
|
heap
|
page read and write
|
||
7FF9BAED0000
|
trusted library allocation
|
page read and write
|
||
231611AB000
|
trusted library allocation
|
page read and write
|
||
3CA6BFE000
|
stack
|
page read and write
|
||
196D5CD5000
|
heap
|
page read and write
|
||
2678A960000
|
trusted library section
|
page read and write
|
||
196D5D05000
|
heap
|
page read and write
|
||
7DF4223D1000
|
trusted library allocation
|
page execute read
|
||
196D59B7000
|
heap
|
page read and write
|
||
196D59D2000
|
heap
|
page read and write
|
||
7FF9BB120000
|
trusted library allocation
|
page read and write
|
||
1E135590000
|
heap
|
page read and write
|
||
2315F0D0000
|
heap
|
page read and write
|
||
2A99FE16000
|
heap
|
page read and write
|
||
8DC000
|
heap
|
page read and write
|
||
23163423000
|
trusted library allocation
|
page read and write
|
||
2A99FDC5000
|
heap
|
page read and write
|
||
196D5824000
|
heap
|
page read and write
|
||
5A17000
|
heap
|
page read and write
|
||
196D5DE0000
|
heap
|
page read and write
|
||
196D5D24000
|
heap
|
page read and write
|
||
196D5989000
|
heap
|
page read and write
|
||
2A99FD45000
|
heap
|
page read and write
|
||
7FF9BB340000
|
trusted library allocation
|
page read and write
|
||
527E000
|
stack
|
page read and write
|
||
23160BB0000
|
trusted library section
|
page read and write
|
||
196D59AE000
|
heap
|
page read and write
|
||
2315F0F0000
|
heap
|
page read and write
|
||
196CDBEC000
|
heap
|
page read and write
|
||
2A99FB52000
|
heap
|
page read and write
|
||
196D5B8E000
|
heap
|
page read and write
|
||
2A99FEF6000
|
heap
|
page read and write
|
||
E2788F6000
|
stack
|
page read and write
|
||
5A00000
|
heap
|
page read and write
|
||
2A99FB8A000
|
heap
|
page read and write
|
||
23179E0E000
|
heap
|
page read and write
|
||
2B280565000
|
trusted library allocation
|
page read and write
|
||
7FF9BB970000
|
trusted library allocation
|
page read and write
|
||
D65C13E000
|
stack
|
page read and write
|
||
7FF9BB450000
|
trusted library allocation
|
page read and write
|
||
7FF9BB730000
|
trusted library allocation
|
page read and write
|
||
2A99FCF9000
|
heap
|
page read and write
|
||
7FF9BB342000
|
trusted library allocation
|
page read and write
|
||
2A99FF28000
|
heap
|
page read and write
|
||
7FF683640000
|
direct allocation
|
page execute read
|
||
196D5961000
|
heap
|
page read and write
|
||
7FF9BB250000
|
trusted library allocation
|
page read and write
|
||
2316317A000
|
trusted library allocation
|
page read and write
|
||
2A99FC6D000
|
heap
|
page read and write
|
||
23163235000
|
trusted library allocation
|
page read and write
|
||
5A6F000
|
heap
|
page read and write
|
||
7FF9BB6F0000
|
trusted library allocation
|
page read and write
|
||
196D5C25000
|
heap
|
page read and write
|
||
23179202000
|
heap
|
page execute and read and write
|
||
37EF0FE000
|
stack
|
page read and write
|
||
2678AB02000
|
heap
|
page read and write
|
||
2A99FD60000
|
heap
|
page read and write
|
||
23179300000
|
heap
|
page read and write
|
||
2A99FFE5000
|
heap
|
page read and write
|
||
7FF9BAF06000
|
trusted library allocation
|
page execute and read and write
|
||
196D59F3000
|
heap
|
page read and write
|
||
7FF9BAF30000
|
trusted library allocation
|
page execute and read and write
|
||
196D5AEF000
|
heap
|
page read and write
|
||
6BEF9000
|
unkown
|
page write copy
|
||
7FF9BB743000
|
trusted library allocation
|
page read and write
|
||
2678AA41000
|
heap
|
page read and write
|
||
196D5957000
|
heap
|
page read and write
|
||
51B0000
|
unclassified section
|
page read and write
|
||
7FF9BB980000
|
trusted library allocation
|
page read and write
|
||
7FF9BB0C5000
|
trusted library allocation
|
page read and write
|
||
2A99FCDB000
|
heap
|
page read and write
|
||
196D5B82000
|
heap
|
page read and write
|
||
2A99FB96000
|
heap
|
page read and write
|
||
196D5C11000
|
heap
|
page read and write
|
||
196D5BB4000
|
heap
|
page read and write
|
||
7FF9BBAC0000
|
trusted library allocation
|
page read and write
|
||
196D5BFC000
|
heap
|
page read and write
|
||
2B280854000
|
trusted library allocation
|
page read and write
|
||
196D5B63000
|
heap
|
page read and write
|
||
2B2F3420000
|
heap
|
page read and write
|
||
7FF6C3696000
|
unkown
|
page read and write
|
||
196CDAA6000
|
heap
|
page read and write
|
||
2A99FEF2000
|
heap
|
page read and write
|
||
196D5F68000
|
heap
|
page read and write
|
||
196D582D000
|
heap
|
page read and write
|
||
5AA0000
|
heap
|
page read and write
|
||
196D5D51000
|
heap
|
page read and write
|
||
196D5AC3000
|
heap
|
page read and write
|
||
2A99FCF4000
|
heap
|
page read and write
|
||
2A99FCC9000
|
heap
|
page read and write
|
||
7FF9BB960000
|
trusted library allocation
|
page read and write
|
||
196D5AFB000
|
heap
|
page read and write
|
||
2A99FB4A000
|
heap
|
page read and write
|
||
5ABB000
|
heap
|
page read and write
|
||
196D5F2A000
|
heap
|
page read and write
|
||
7FF9BB347000
|
trusted library allocation
|
page read and write
|
||
2B290078000
|
trusted library allocation
|
page read and write
|
||
7FF9BB93A000
|
trusted library allocation
|
page read and write
|
||
2A99FE0F000
|
heap
|
page read and write
|
||
1E135A49000
|
heap
|
page read and write
|
||
196CDAB7000
|
heap
|
page read and write
|
||
196D5C51000
|
heap
|
page read and write
|
||
1E135A02000
|
heap
|
page read and write
|
||
196D596B000
|
heap
|
page read and write
|
||
196D507D000
|
heap
|
page read and write
|
||
196D5939000
|
heap
|
page read and write
|
||
2B2F5C63000
|
heap
|
page read and write
|
||
196D5D9F000
|
heap
|
page read and write
|
||
7FF9BB950000
|
trusted library allocation
|
page read and write
|
||
196D5B7C000
|
heap
|
page read and write
|
||
196D5C30000
|
heap
|
page read and write
|
||
8FD000
|
heap
|
page read and write
|
||
23179E4C000
|
heap
|
page read and write
|
||
23163240000
|
trusted library allocation
|
page read and write
|
||
196D01E3000
|
heap
|
page read and write
|
||
2B2F3424000
|
heap
|
page read and write
|
||
196D5986000
|
heap
|
page read and write
|
||
2797D202000
|
heap
|
page read and write
|
||
7FF9BBA50000
|
trusted library allocation
|
page read and write
|
||
2678C502000
|
heap
|
page read and write
|
||
D65B7EE000
|
stack
|
page read and write
|
||
2A99FD04000
|
heap
|
page read and write
|
||
196D5D2F000
|
heap
|
page read and write
|
||
196D593D000
|
heap
|
page read and write
|
||
1E11EC87000
|
trusted library allocation
|
page read and write
|
||
2316339C000
|
trusted library allocation
|
page read and write
|
||
2A997D35000
|
heap
|
page read and write
|
||
2A99FBA0000
|
heap
|
page read and write
|
||
2B2F4DF0000
|
heap
|
page read and write
|
||
196D5E02000
|
heap
|
page read and write
|
||
196D5B06000
|
heap
|
page read and write
|
||
2A99FB89000
|
heap
|
page read and write
|
||
2A99FD6C000
|
heap
|
page read and write
|
||
7FFA1C518000
|
unkown
|
page readonly
|
||
B9704FB000
|
stack
|
page read and write
|
||
307E000
|
stack
|
page read and write
|
||
1E135A36000
|
heap
|
page read and write
|
||
196D5B16000
|
heap
|
page read and write
|
||
E278A7F000
|
stack
|
page read and write
|
||
2A99FFD0000
|
heap
|
page read and write
|
||
2317984F000
|
heap
|
page read and write
|
||
2A99FF00000
|
heap
|
page read and write
|
||
2B2F5CD2000
|
heap
|
page read and write
|
||
2A99FC76000
|
heap
|
page read and write
|
||
23160C02000
|
heap
|
page read and write
|
||
2A997DDA000
|
heap
|
page read and write
|
||
2B280A83000
|
trusted library allocation
|
page read and write
|
||
196D59C2000
|
heap
|
page read and write
|
||
7FF9BB500000
|
trusted library allocation
|
page read and write
|
||
196D5B7C000
|
heap
|
page read and write
|
||
196D51DE000
|
heap
|
page read and write
|
||
196D595B000
|
heap
|
page read and write
|
||
2A99FBD3000
|
heap
|
page read and write
|
||
111EB000
|
unkown
|
page read and write
|
||
196D5967000
|
heap
|
page read and write
|
||
196D5B8A000
|
heap
|
page read and write
|
||
196D5C1B000
|
heap
|
page read and write
|
||
2A99FE56000
|
heap
|
page read and write
|
||
196D5B97000
|
heap
|
page read and write
|
||
7FF9BB2D0000
|
trusted library allocation
|
page read and write
|
||
7FF9BB940000
|
trusted library allocation
|
page read and write
|
||
23161AFA000
|
trusted library allocation
|
page read and write
|
||
4396FF8000
|
stack
|
page read and write
|
||
5A9D000
|
heap
|
page read and write
|
||
2B2F342F000
|
heap
|
page read and write
|
||
2B280560000
|
trusted library allocation
|
page read and write
|
||
7DF4223C1000
|
trusted library allocation
|
page execute read
|
||
7FF9BB600000
|
trusted library allocation
|
page read and write
|
||
2A997C6F000
|
heap
|
page read and write
|
||
2A99FD82000
|
heap
|
page read and write
|
||
7FF9BB2B0000
|
trusted library allocation
|
page read and write
|
||
2A99FBEB000
|
heap
|
page read and write
|
||
874000
|
heap
|
page read and write
|
||
2B2805CC000
|
trusted library allocation
|
page read and write
|
||
3CA647E000
|
stack
|
page read and write
|
||
7FF9BB310000
|
trusted library allocation
|
page read and write
|
||
4397DFF000
|
stack
|
page read and write
|
||
7FF9BB8D0000
|
trusted library allocation
|
page read and write
|
||
2315F200000
|
heap
|
page read and write
|
||
7FF9BB740000
|
trusted library allocation
|
page read and write
|
||
2A99FDDF000
|
heap
|
page read and write
|
||
4397AFC000
|
stack
|
page read and write
|
||
2A99FF62000
|
heap
|
page read and write
|
||
24B0000
|
heap
|
page read and write
|
||
7FF9BB0F0000
|
trusted library allocation
|
page read and write
|
||
2315F2EE000
|
heap
|
page read and write
|
||
196D5A9F000
|
heap
|
page read and write
|
||
7FFA1C51E000
|
unkown
|
page readonly
|
||
196D5F3B000
|
heap
|
page read and write
|
||
2A99FDDA000
|
heap
|
page read and write
|
||
231791E0000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
7FF9BAE30000
|
trusted library allocation
|
page read and write
|
||
196D5352000
|
heap
|
page read and write
|
||
2A997D62000
|
heap
|
page read and write
|
||
2A99FC3E000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2B2F5CA0000
|
heap
|
page read and write
|
||
2B2F3502000
|
heap
|
page read and write
|
||
6C1A9000
|
unkown
|
page readonly
|
||
2B28067B000
|
trusted library allocation
|
page read and write
|
||
196D5AD3000
|
heap
|
page read and write
|
||
2A99FE51000
|
heap
|
page read and write
|
||
196D5AFD000
|
heap
|
page read and write
|
||
7FF9BB130000
|
trusted library allocation
|
page read and write
|
||
196D5E10000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
196D5A7D000
|
heap
|
page read and write
|
||
2A99FCDF000
|
heap
|
page read and write
|
||
196D5AE9000
|
heap
|
page read and write
|
||
7FF9BB5C0000
|
trusted library allocation
|
page read and write
|
||
4397CF3000
|
stack
|
page read and write
|
||
2A99FCB3000
|
heap
|
page read and write
|
||
5A48000
|
heap
|
page read and write
|
||
196D5B7B000
|
heap
|
page read and write
|
||
196D5D59000
|
heap
|
page read and write
|
||
23163533000
|
trusted library allocation
|
page read and write
|
||
7FF9BB4A0000
|
trusted library allocation
|
page read and write
|
||
2A99FE06000
|
heap
|
page read and write
|
||
177F3C00000
|
heap
|
page read and write
|
||
2678A830000
|
heap
|
page read and write
|
||
2A99FB9C000
|
heap
|
page read and write
|
||
2A99FCCF000
|
heap
|
page read and write
|
||
23179354000
|
heap
|
page read and write
|
||
196D598C000
|
heap
|
page read and write
|
||
2A99FCA8000
|
heap
|
page read and write
|
||
1D2C7880000
|
heap
|
page read and write
|
||
7FF9BAE20000
|
trusted library allocation
|
page read and write
|
||
23163353000
|
trusted library allocation
|
page read and write
|
||
7FF9BB510000
|
trusted library allocation
|
page read and write
|
||
75183FF000
|
stack
|
page read and write
|
||
196D592D000
|
heap
|
page read and write
|
||
23161BC6000
|
trusted library allocation
|
page read and write
|
||
2A99FB30000
|
heap
|
page read and write
|
||
2A99FCB5000
|
heap
|
page read and write
|
||
5A9E000
|
heap
|
page read and write
|
||
7FF9BB692000
|
trusted library allocation
|
page read and write
|
||
7FF9BBB50000
|
trusted library allocation
|
page read and write
|
||
196D5DE5000
|
heap
|
page read and write
|
||
196D5BFE000
|
heap
|
page read and write
|
||
7FF9BB240000
|
trusted library allocation
|
page read and write
|
||
196D5FEC000
|
heap
|
page read and write
|
||
7FF9BAF40000
|
trusted library allocation
|
page execute and read and write
|
||
317F000
|
stack
|
page read and write
|
||
2316318C000
|
trusted library allocation
|
page read and write
|
||
23163433000
|
trusted library allocation
|
page read and write
|
||
2A99FB92000
|
heap
|
page read and write
|
||
196D597E000
|
heap
|
page read and write
|
||
231613CA000
|
trusted library allocation
|
page read and write
|
||
196D5CE8000
|
heap
|
page read and write
|
||
196D5B58000
|
heap
|
page read and write
|
||
196D5D30000
|
heap
|
page read and write
|
||
196D57C0000
|
heap
|
page read and write
|
||
5A4C000
|
heap
|
page read and write
|
||
196D5AC5000
|
heap
|
page read and write
|
||
231798DC000
|
heap
|
page read and write
|
||
177F3C07000
|
heap
|
page read and write
|
||
2A99FA0D000
|
heap
|
page read and write
|
||
196D5E0A000
|
heap
|
page read and write
|
||
2B290021000
|
trusted library allocation
|
page read and write
|
||
D65C03E000
|
stack
|
page read and write
|
||
7FF9BBDC0000
|
trusted library allocation
|
page read and write
|
||
2B2F53D0000
|
heap
|
page execute and read and write
|
||
196D59B0000
|
heap
|
page read and write
|
||
196D5990000
|
heap
|
page read and write
|
||
2A997DCE000
|
heap
|
page read and write
|
||
23171175000
|
trusted library allocation
|
page read and write
|
||
5AAD000
|
heap
|
page read and write
|
||
23162518000
|
trusted library allocation
|
page read and write
|
||
2B280A39000
|
trusted library allocation
|
page read and write
|
||
7FF9BB220000
|
trusted library allocation
|
page read and write
|
||
2316355A000
|
trusted library allocation
|
page read and write
|
||
1E11B447000
|
heap
|
page read and write
|
||
7FF9BAE40000
|
trusted library allocation
|
page read and write
|
||
1E11E8DD000
|
trusted library allocation
|
page read and write
|
||
2A99FBFD000
|
heap
|
page read and write
|
||
2678A9E0000
|
heap
|
page execute and read and write
|
||
196D594A000
|
heap
|
page read and write
|
||
2B01000
|
heap
|
page read and write
|
||
7FF9BB100000
|
trusted library allocation
|
page execute and read and write
|
||
2A99FED0000
|
heap
|
page read and write
|
||
2A99FCAA000
|
heap
|
page read and write
|
||
2A99FC59000
|
heap
|
page read and write
|
||
901000
|
heap
|
page read and write
|
||
196D5ADC000
|
heap
|
page read and write
|
||
196D5D4D000
|
heap
|
page read and write
|
||
2B2F5E74000
|
heap
|
page read and write
|
||
196D5D38000
|
heap
|
page read and write
|
||
2A99FBC0000
|
heap
|
page read and write
|
||
196D5930000
|
heap
|
page read and write
|
||
251D000
|
stack
|
page read and write
|
||
7FF9BB4F0000
|
trusted library allocation
|
page read and write
|
||
901000
|
heap
|
page read and write
|
||
196D5B32000
|
heap
|
page read and write
|
||
23163273000
|
trusted library allocation
|
page read and write
|
||
196D5AAA000
|
heap
|
page read and write
|
||
7FFA1C515000
|
unkown
|
page readonly
|
||
2B2805AE000
|
trusted library allocation
|
page read and write
|
||
7FF9BB6C0000
|
trusted library allocation
|
page execute and read and write
|
||
196D5D39000
|
heap
|
page read and write
|
||
7FF9BB530000
|
trusted library allocation
|
page read and write
|
||
7FF9BB8BD000
|
trusted library allocation
|
page read and write
|
||
2A99FB83000
|
heap
|
page read and write
|
||
196D5D13000
|
heap
|
page read and write
|
||
7FF9BB344000
|
trusted library allocation
|
page read and write
|
||
196D5E00000
|
heap
|
page read and write
|
||
23162CBB000
|
trusted library allocation
|
page read and write
|
||
2A99FCBA000
|
heap
|
page read and write
|
||
2A99FCE9000
|
heap
|
page read and write
|
||
E27958F000
|
stack
|
page read and write
|
||
23179E00000
|
heap
|
page read and write
|
||
2A99F211000
|
heap
|
page read and write
|
||
2A99FDB9000
|
heap
|
page read and write
|
||
3CA6D7E000
|
stack
|
page read and write
|
||
2A99F543000
|
heap
|
page read and write
|
||
2B2F343C000
|
heap
|
page read and write
|
||
7FF9BB490000
|
trusted library allocation
|
page read and write
|
||
196D5C32000
|
heap
|
page read and write
|
||
2A9A0004000
|
heap
|
page read and write
|
||
196D5B7C000
|
heap
|
page read and write
|
||
196D51BF000
|
heap
|
page read and write
|
||
2A99FBD0000
|
heap
|
page read and write
|
||
3CA683E000
|
stack
|
page read and write
|
||
2A99FB30000
|
heap
|
page read and write
|
||
7FF9BB110000
|
trusted library allocation
|
page execute and read and write
|
||
196D5D68000
|
heap
|
page read and write
|
||
2A99FBA1000
|
heap
|
page read and write
|
||
2316309F000
|
trusted library allocation
|
page read and write
|
||
2A99FE39000
|
heap
|
page read and write
|
||
60DA0FA000
|
stack
|
page read and write
|
||
2A99F970000
|
heap
|
page read and write
|
||
5A81000
|
heap
|
page read and write
|
||
177F3C5D000
|
heap
|
page read and write
|
||
196D59DD000
|
heap
|
page read and write
|
||
231798B6000
|
heap
|
page read and write
|
||
7FF9BBDA0000
|
trusted library allocation
|
page execute and read and write
|
||
74684000
|
unkown
|
page readonly
|
||
2A99FC35000
|
heap
|
page read and write
|
||
2A99FEAF000
|
heap
|
page read and write
|
||
2678CAF6000
|
trusted library allocation
|
page read and write
|
||
2B2806A8000
|
trusted library allocation
|
page read and write
|
||
231793F9000
|
heap
|
page read and write
|
||
29857E000
|
stack
|
page read and write
|
||
196D5B10000
|
heap
|
page read and write
|
||
196D597B000
|
heap
|
page read and write
|
||
7FF9BBD80000
|
trusted library allocation
|
page read and write
|
||
196D5D38000
|
heap
|
page read and write
|
||
2B2F5413000
|
heap
|
page execute and read and write
|
||
2A997CD7000
|
heap
|
page read and write
|
||
2678C75D000
|
trusted library allocation
|
page read and write
|
||
5B0A000
|
heap
|
page read and write
|
||
231799A2000
|
heap
|
page read and write
|
||
2A99FF79000
|
heap
|
page read and write
|
||
6BEFA000
|
unkown
|
page read and write
|
||
7FF9BAE14000
|
trusted library allocation
|
page read and write
|
||
196D5D85000
|
heap
|
page read and write
|
||
23162C98000
|
trusted library allocation
|
page read and write
|
||
60DA4FA000
|
stack
|
page read and write
|
||
2A997DBD000
|
heap
|
page read and write
|
||
231624FB000
|
trusted library allocation
|
page read and write
|
||
196D5F3A000
|
heap
|
page read and write
|
||
196D5DA3000
|
heap
|
page read and write
|
||
11000000
|
unkown
|
page readonly
|
||
2A99FED8000
|
heap
|
page read and write
|
||
5AFB000
|
heap
|
page read and write
|
||
196D5C14000
|
heap
|
page read and write
|
||
7FF9BB510000
|
trusted library allocation
|
page read and write
|
||
2B2F3441000
|
heap
|
page read and write
|
||
2797D1A0000
|
heap
|
page read and write
|
||
23179313000
|
heap
|
page read and write
|
||
196CDB5B000
|
heap
|
page read and write
|
||
403000
|
unkown
|
page write copy
|
||
2797D200000
|
heap
|
page read and write
|
||
196D5949000
|
heap
|
page read and write
|
||
196D51EC000
|
heap
|
page read and write
|
||
196D5BAF000
|
heap
|
page read and write
|
||
196D50BF000
|
heap
|
page read and write
|
||
2A99A363000
|
heap
|
page read and write
|
||
270C000
|
heap
|
page read and write
|
||
2B280472000
|
trusted library allocation
|
page read and write
|
||
2A99FD7C000
|
heap
|
page read and write
|
||
2A997BF0000
|
trusted library allocation
|
page read and write
|
||
D65BE34000
|
stack
|
page read and write
|
||
196CDA9D000
|
heap
|
page read and write
|
||
23179863000
|
heap
|
page read and write
|
||
196D59DC000
|
heap
|
page read and write
|
||
196D5351000
|
heap
|
page read and write
|
||
196D5BE1000
|
heap
|
page read and write
|
||
196D580A000
|
heap
|
page read and write
|
||
196D596D000
|
heap
|
page read and write
|
||
7FF9BBA20000
|
trusted library allocation
|
page read and write
|
||
43971FE000
|
stack
|
page read and write
|
||
7FF9BB820000
|
trusted library allocation
|
page read and write
|
||
196D5F6E000
|
heap
|
page read and write
|
||
196D5A78000
|
heap
|
page read and write
|
||
2316356B000
|
trusted library allocation
|
page read and write
|
||
2A99FED2000
|
heap
|
page read and write
|
||
2B2F3413000
|
heap
|
page read and write
|
||
23161B02000
|
trusted library allocation
|
page read and write
|
||
23162CA3000
|
trusted library allocation
|
page read and write
|
||
2316286C000
|
trusted library allocation
|
page read and write
|
||
7FF9BB5E0000
|
trusted library allocation
|
page read and write
|
||
7FF9BB070000
|
trusted library allocation
|
page read and write
|
||
196D5955000
|
heap
|
page read and write
|
||
2A997A40000
|
heap
|
page read and write
|
||
231799F0000
|
heap
|
page read and write
|
||
196D5E3C000
|
heap
|
page read and write
|
||
196D5FE2000
|
heap
|
page read and write
|
||
FDFF597000
|
stack
|
page read and write
|
||
1D2C5E02000
|
heap
|
page read and write
|
||
7FF9BAE30000
|
trusted library allocation
|
page read and write
|
||
2B5AD202000
|
heap
|
page read and write
|
||
196D5B04000
|
heap
|
page read and write
|
||
196D5B5B000
|
heap
|
page read and write
|
||
7FF695D50000
|
unkown
|
page readonly
|
||
7FF9BAF16000
|
trusted library allocation
|
page execute and read and write
|
||
3CA6A3F000
|
stack
|
page read and write
|
||
2A99FDE7000
|
heap
|
page read and write
|
||
4EEF000
|
stack
|
page read and write
|
||
196D51A2000
|
heap
|
page read and write
|
||
177F3E00000
|
heap
|
page read and write
|
||
1E135405000
|
heap
|
page execute and read and write
|
||
111DC000
|
unkown
|
page read and write
|
||
2A99FC25000
|
heap
|
page read and write
|
||
196D0132000
|
heap
|
page read and write
|
||
7FF9BAE1D000
|
trusted library allocation
|
page execute and read and write
|
||
75191CE000
|
stack
|
page read and write
|
||
7FF9BB0B0000
|
trusted library allocation
|
page read and write
|
||
7FF9BB2A0000
|
trusted library allocation
|
page read and write
|
||
196D5952000
|
heap
|
page read and write
|
||
2A99FC07000
|
heap
|
page read and write
|
||
E27847E000
|
stack
|
page read and write
|
||
196D5B15000
|
heap
|
page read and write
|
||
2B2F551F000
|
heap
|
page read and write
|
||
196D5B9B000
|
heap
|
page read and write
|
||
196D5C57000
|
heap
|
page read and write
|
||
231798C9000
|
heap
|
page read and write
|
||
1C75F9F0000
|
heap
|
page read and write
|
||
6C1B0000
|
unkown
|
page readonly
|
||
196D5D82000
|
heap
|
page read and write
|
||
2A99FB4E000
|
heap
|
page read and write
|
||
196D594E000
|
heap
|
page read and write
|
||
196D5B39000
|
heap
|
page read and write
|
||
196D5C45000
|
heap
|
page read and write
|
||
2678AA48000
|
heap
|
page read and write
|
||
196D5A13000
|
heap
|
page read and write
|
||
2678AA9B000
|
heap
|
page read and write
|
||
7FF9BB8C0000
|
trusted library allocation
|
page read and write
|
||
231713AD000
|
trusted library allocation
|
page read and write
|
||
2A99FE0B000
|
heap
|
page read and write
|
||
4396CFE000
|
stack
|
page read and write
|
||
196D5CA4000
|
heap
|
page read and write
|
||
196D5A0F000
|
heap
|
page read and write
|
||
2A99FBDA000
|
heap
|
page read and write
|
||
23162DF4000
|
trusted library allocation
|
page read and write
|
||
23162E7A000
|
trusted library allocation
|
page read and write
|
||
196D5903000
|
heap
|
page read and write
|
||
7FF9BBAF0000
|
trusted library allocation
|
page read and write
|
||
5A9A000
|
heap
|
page read and write
|
||
231634DF000
|
trusted library allocation
|
page read and write
|
||
7FF9BB750000
|
trusted library allocation
|
page read and write
|
||
2678C714000
|
trusted library allocation
|
page read and write
|
||
2A99FC68000
|
heap
|
page read and write
|
||
2A99FC3C000
|
heap
|
page read and write
|
||
7FF9BB340000
|
trusted library allocation
|
page read and write
|
||
7FF9BB790000
|
trusted library allocation
|
page execute and read and write
|
||
196CDBA4000
|
heap
|
page read and write
|
||
7FF9BBA90000
|
trusted library allocation
|
page read and write
|
||
2A997CA2000
|
heap
|
page read and write
|
||
2A99FB40000
|
heap
|
page read and write
|
||
196D5A32000
|
heap
|
page read and write
|
||
2A99F562000
|
heap
|
page read and write
|
||
196D51E0000
|
heap
|
page read and write
|
||
7FF9BB650000
|
trusted library allocation
|
page read and write
|
||
7FF9BB732000
|
trusted library allocation
|
page read and write
|
||
6C1B4000
|
unkown
|
page readonly
|
||
196D59A3000
|
heap
|
page read and write
|
||
2678A980000
|
trusted library allocation
|
page read and write
|
||
D65BFBE000
|
stack
|
page read and write
|
||
2A99FE1D000
|
heap
|
page read and write
|
||
2A99FF0A000
|
heap
|
page read and write
|
||
7FF9BB780000
|
trusted library allocation
|
page read and write
|
||
2B5AB313000
|
heap
|
page read and write
|
||
196D5BDA000
|
heap
|
page read and write
|
||
8EF000
|
heap
|
page read and write
|
||
2B05000
|
heap
|
page read and write
|
||
7FF9BB280000
|
trusted library allocation
|
page read and write
|
||
2A99FDC7000
|
heap
|
page read and write
|
||
2A99FE3E000
|
heap
|
page read and write
|
||
2A99F35A000
|
heap
|
page read and write
|
||
2A99FD5C000
|
heap
|
page read and write
|
||
2316246A000
|
trusted library allocation
|
page read and write
|
||
196D5BE7000
|
heap
|
page read and write
|
||
6C1A6000
|
unkown
|
page write copy
|
||
2A99FB4C000
|
heap
|
page read and write
|
||
196D5B88000
|
heap
|
page read and write
|
||
196D5CAB000
|
heap
|
page read and write
|
||
2B2805BE000
|
trusted library allocation
|
page read and write
|
||
7FF9BB03A000
|
trusted library allocation
|
page read and write
|
||
196CDAD3000
|
heap
|
page read and write
|
||
2A99F3F2000
|
heap
|
page read and write
|
||
2A99FB47000
|
heap
|
page read and write
|
||
196D5979000
|
heap
|
page read and write
|
||
2A99FDD1000
|
heap
|
page read and write
|
||
2A99F225000
|
heap
|
page read and write
|
||
196D5770000
|
unkown
|
page readonly
|
||
2A99FB31000
|
heap
|
page read and write
|
||
5A96000
|
heap
|
page read and write
|
||
7FF9BB130000
|
trusted library allocation
|
page execute and read and write
|
||
7FF9BB0E0000
|
trusted library allocation
|
page read and write
|
||
186BADE0000
|
heap
|
page read and write
|
||
196D5B4F000
|
heap
|
page read and write
|
||
7FF9BB790000
|
trusted library allocation
|
page execute and read and write
|
||
1E11B3D0000
|
heap
|
page read and write
|
||
23163287000
|
trusted library allocation
|
page read and write
|
||
196D5200000
|
heap
|
page read and write
|
||
901000
|
heap
|
page read and write
|
||
196D5C33000
|
heap
|
page read and write
|
||
7FF9BB74A000
|
trusted library allocation
|
page read and write
|
||
2B2F5620000
|
heap
|
page read and write
|
||
60DA1FE000
|
stack
|
page read and write
|
||
2678AA53000
|
heap
|
page read and write
|
||
196D5364000
|
heap
|
page read and write
|
||
196D5790000
|
trusted library section
|
page read and write
|
||
2B280A92000
|
trusted library allocation
|
page read and write
|
||
196D5B3F000
|
heap
|
page read and write
|
||
1C75F9D0000
|
heap
|
page read and write
|
||
196CDB7F000
|
heap
|
page read and write
|
||
5AA9000
|
heap
|
page read and write
|
||
43968FE000
|
stack
|
page read and write
|
||
196CDB89000
|
heap
|
page read and write
|
||
2A99FE92000
|
heap
|
page read and write
|
||
196D5900000
|
heap
|
page read and write
|
||
7FF9BAE2B000
|
trusted library allocation
|
page read and write
|
||
2678C711000
|
trusted library allocation
|
page read and write
|
||
7FF9BB250000
|
trusted library allocation
|
page execute and read and write
|
||
E27897E000
|
stack
|
page read and write
|
||
505E000
|
stack
|
page read and write
|
||
196D6225000
|
heap
|
page read and write
|
||
1D2C5DF0000
|
heap
|
page read and write
|
||
1E11B2D0000
|
heap
|
page read and write
|
||
196D5B45000
|
heap
|
page read and write
|
||
2A997DC2000
|
heap
|
page read and write
|
||
2B5AB1D0000
|
heap
|
page read and write
|
||
2A99F56F000
|
heap
|
page read and write
|
||
196D5992000
|
heap
|
page read and write
|
||
2A997D7E000
|
heap
|
page read and write
|
||
2A997DCE000
|
heap
|
page read and write
|
||
196CDAD5000
|
heap
|
page read and write
|
||
2B28040C000
|
trusted library allocation
|
page read and write
|
||
196D5BE3000
|
heap
|
page read and write
|
||
196D51FB000
|
heap
|
page read and write
|
||
2A99FB5F000
|
heap
|
page read and write
|
||
23163330000
|
trusted library allocation
|
page read and write
|
||
196D5A10000
|
heap
|
page read and write
|
||
2A99FD4F000
|
heap
|
page read and write
|
||
2A99FF84000
|
heap
|
page read and write
|
||
196D5D38000
|
heap
|
page read and write
|
||
196D5982000
|
heap
|
page read and write
|
||
196D5D17000
|
heap
|
page read and write
|
||
7FF9BB7B0000
|
trusted library allocation
|
page read and write
|
||
7FF9BB530000
|
trusted library allocation
|
page read and write
|
||
196CDAF3000
|
heap
|
page read and write
|
||
7DF42A750000
|
trusted library allocation
|
page execute and read and write
|
||
2A99FCCD000
|
heap
|
page read and write
|
||
7FF9BAEC0000
|
trusted library allocation
|
page read and write
|
||
43972FC000
|
stack
|
page read and write
|
||
2B5AB140000
|
heap
|
page read and write
|
||
11257000
|
unkown
|
page readonly
|
||
1E135A17000
|
heap
|
page read and write
|
||
196D5F52000
|
heap
|
page read and write
|
||
2A99FB57000
|
heap
|
page read and write
|
||
231713BD000
|
trusted library allocation
|
page read and write
|
||
2B2808E3000
|
trusted library allocation
|
page read and write
|
||
196D5A87000
|
heap
|
page read and write
|
||
2A99FC03000
|
heap
|
page read and write
|
||
2A99FB13000
|
heap
|
page read and write
|
||
231613AB000
|
trusted library allocation
|
page read and write
|
||
7FF9BB9D4000
|
trusted library allocation
|
page read and write
|
||
1E11CE13000
|
heap
|
page read and write
|
||
2A99FF44000
|
heap
|
page read and write
|
||
23160BF0000
|
heap
|
page read and write
|
||
196CDB9E000
|
heap
|
page read and write
|
||
7FF9BB390000
|
trusted library allocation
|
page read and write
|
||
5AAB000
|
heap
|
page read and write
|
||
7FF9BBD60000
|
trusted library allocation
|
page read and write
|
||
75182FE000
|
stack
|
page read and write
|
||
2A99A3BD000
|
heap
|
page read and write
|
||
2A99F35C000
|
heap
|
page read and write
|
||
7FF9BB100000
|
trusted library allocation
|
page read and write
|
||
196D5CF2000
|
heap
|
page read and write
|
||
196D5975000
|
heap
|
page read and write
|
||
7FF9BB27A000
|
trusted library allocation
|
page read and write
|
||
2A99F35F000
|
heap
|
page read and write
|
||
196CDB46000
|
heap
|
page read and write
|
||
2A99FC90000
|
heap
|
page read and write
|
||
7FF9BB330000
|
trusted library allocation
|
page read and write
|
||
196D5A08000
|
heap
|
page read and write
|
||
7FF9BB600000
|
trusted library allocation
|
page read and write
|
||
2A99FEA1000
|
heap
|
page read and write
|
||
196D5331000
|
heap
|
page read and write
|
||
2B2F3446000
|
heap
|
page read and write
|
||
7FF9BB0E0000
|
trusted library allocation
|
page read and write
|
||
7FF9BB0E3000
|
trusted library allocation
|
page read and write
|
||
196D5D3E000
|
heap
|
page read and write
|
||
1E11B2B0000
|
heap
|
page read and write
|
||
196D5A53000
|
heap
|
page read and write
|
||
2A99FDC1000
|
heap
|
page read and write
|
||
7FF9BB480000
|
trusted library allocation
|
page read and write
|
||
7FF9BB880000
|
trusted library allocation
|
page read and write
|
||
7FF9BB0B5000
|
trusted library allocation
|
page read and write
|
||
231624E0000
|
trusted library allocation
|
page read and write
|
||
2A99FE39000
|
heap
|
page read and write
|
||
196D5DC0000
|
heap
|
page read and write
|
||
4DEE000
|
stack
|
page read and write
|
||
177E6DA0000
|
heap
|
page read and write
|
||
2B2F5C9C000
|
heap
|
page read and write
|
||
2A997DC0000
|
heap
|
page read and write
|
||
D65B6E2000
|
stack
|
page read and write
|
||
196D5F6A000
|
heap
|
page read and write
|
||
196D5D22000
|
heap
|
page read and write
|
||
7FF9BB330000
|
trusted library allocation
|
page read and write
|
||
1128A000
|
unkown
|
page readonly
|
||
2A997DF6000
|
heap
|
page read and write
|
||
7FF9BB900000
|
trusted library allocation
|
page read and write
|
||
196D5C53000
|
heap
|
page read and write
|
||
2B28083D000
|
trusted library allocation
|
page read and write
|
||
196D5C00000
|
heap
|
page read and write
|
||
5AA0000
|
heap
|
page read and write
|
||
23171458000
|
trusted library allocation
|
page read and write
|
||
2B2F3451000
|
heap
|
page read and write
|
||
196D5DE1000
|
heap
|
page read and write
|
||
1E12D078000
|
trusted library allocation
|
page read and write
|
||
2A99FB3D000
|
heap
|
page read and write
|
||
87A000
|
heap
|
page read and write
|
||
410000
|
heap
|
page read and write
|
||
11297000
|
unkown
|
page readonly
|
||
7FF9BB056000
|
trusted library allocation
|
page read and write
|
||
9AB74FF000
|
stack
|
page read and write
|
||
231624B4000
|
trusted library allocation
|
page read and write
|
||
23161B04000
|
trusted library allocation
|
page read and write
|
||
2A99FB8C000
|
heap
|
page read and write
|
||
7FF9BB9B3000
|
trusted library allocation
|
page read and write
|
||
23179943000
|
heap
|
page read and write
|
||
177F3C48000
|
heap
|
page read and write
|
||
2678CAEE000
|
trusted library allocation
|
page read and write
|
||
2A99FD2A000
|
heap
|
page read and write
|
||
5A3F000
|
heap
|
page read and write
|
||
7FF9BB912000
|
trusted library allocation
|
page read and write
|
||
1E1355B4000
|
heap
|
page read and write
|
||
196D5A37000
|
heap
|
page read and write
|
||
2B2F4F02000
|
heap
|
page read and write
|
||
2A99FBAE000
|
heap
|
page read and write
|
||
2B280A0F000
|
trusted library allocation
|
page read and write
|
||
196D5B46000
|
heap
|
page read and write
|
||
28FE000
|
stack
|
page read and write
|
||
196D5A48000
|
heap
|
page read and write
|
||
2A99F54B000
|
heap
|
page read and write
|
||
23161CBA000
|
trusted library allocation
|
page read and write
|
||
2A99FF7A000
|
heap
|
page read and write
|
||
23162D59000
|
trusted library allocation
|
page read and write
|
||
2A99FD5C000
|
heap
|
page read and write
|
||
5A43000
|
heap
|
page read and write
|
||
2A99FC55000
|
heap
|
page read and write
|
||
2A99FBAB000
|
heap
|
page read and write
|
||
7FF9BB5D0000
|
trusted library allocation
|
page read and write
|
||
23179190000
|
trusted library allocation
|
page read and write
|
||
37EF4FF000
|
stack
|
page read and write
|
||
7FF6C3696000
|
unkown
|
page write copy
|
||
2B2805D6000
|
trusted library allocation
|
page read and write
|
||
196D5945000
|
heap
|
page read and write
|
||
1E11B43D000
|
heap
|
page read and write
|
||
2A99FB82000
|
heap
|
page read and write
|
||
2B281BD1000
|
trusted library allocation
|
page read and write
|
||
2A99FD22000
|
heap
|
page read and write
|
||
196D5DF9000
|
heap
|
page read and write
|
||
2A99FC78000
|
heap
|
page read and write
|
||
196D5B50000
|
heap
|
page read and write
|
||
7FF9BB2B0000
|
trusted library allocation
|
page read and write
|
||
196D5BD3000
|
heap
|
page read and write
|
||
353D000
|
stack
|
page read and write
|
||
196D5951000
|
heap
|
page read and write
|
||
7FF9BB690000
|
trusted library allocation
|
page read and write
|
||
196D5BE8000
|
heap
|
page read and write
|
||
2A99FE90000
|
heap
|
page read and write
|
||
7FF9BB705000
|
trusted library allocation
|
page read and write
|
||
2B290001000
|
trusted library allocation
|
page read and write
|
||
6C0F1000
|
unkown
|
page execute read
|
||
7FF9BB460000
|
trusted library allocation
|
page read and write
|
||
2678C413000
|
heap
|
page read and write
|
||
196D59A5000
|
heap
|
page read and write
|
||
1E11B4CD000
|
heap
|
page read and write
|
||
196D5DB8000
|
heap
|
page read and write
|
||
196D5BCF000
|
heap
|
page read and write
|
||
7FFA1C52B000
|
unkown
|
page read and write
|
||
177F3C7D000
|
heap
|
page read and write
|
||
2B280621000
|
trusted library allocation
|
page read and write
|
||
196D5C1C000
|
heap
|
page read and write
|
||
2B2F5000000
|
heap
|
page execute and read and write
|
||
2315F34C000
|
heap
|
page read and write
|
||
196D5DF1000
|
heap
|
page read and write
|
||
5A75000
|
heap
|
page read and write
|
||
2B280890000
|
trusted library allocation
|
page read and write
|
||
196CDA26000
|
heap
|
page read and write
|
||
7FF9BB4D0000
|
trusted library allocation
|
page read and write
|
||
23162E68000
|
trusted library allocation
|
page read and write
|
||
196D5926000
|
heap
|
page read and write
|
||
196D5AA4000
|
heap
|
page read and write
|
||
2A99FF4A000
|
heap
|
page read and write
|
||
196D5D93000
|
heap
|
page read and write
|
||
2A99FD91000
|
heap
|
page read and write
|
||
7FF695D70000
|
remote allocation
|
page read and write
|
||
2A99FBAC000
|
heap
|
page read and write
|
||
9AB71DB000
|
stack
|
page read and write
|
||
2A99FBA5000
|
heap
|
page read and write
|
||
43983FE000
|
stack
|
page read and write
|
||
7FF9BBD70000
|
trusted library allocation
|
page read and write
|
||
2678A950000
|
heap
|
page read and write
|
||
2A997DD2000
|
heap
|
page read and write
|
||
2A99FCAE000
|
heap
|
page read and write
|
||
196D5928000
|
heap
|
page read and write
|
||
2A99FCD1000
|
heap
|
page read and write
|
||
7FF9BB610000
|
trusted library allocation
|
page read and write
|
||
5AF4000
|
heap
|
page read and write
|
||
231631AF000
|
trusted library allocation
|
page read and write
|
||
2B2F5575000
|
heap
|
page read and write
|
||
2A99FED2000
|
heap
|
page read and write
|
||
C22A3FE000
|
stack
|
page read and write
|
||
196D5941000
|
heap
|
page read and write
|
||
196D59B1000
|
heap
|
page read and write
|
||
2A99FC61000
|
heap
|
page read and write
|
||
25E0000
|
heap
|
page read and write
|
||
2B280A2A000
|
trusted library allocation
|
page read and write
|
||
23163562000
|
trusted library allocation
|
page read and write
|
||
1E12D1B8000
|
trusted library allocation
|
page read and write
|
||
2A99FC47000
|
heap
|
page read and write
|
||
196D5C81000
|
heap
|
page read and write
|
||
196D5D0A000
|
heap
|
page read and write
|
||
2A99FC32000
|
heap
|
page read and write
|
||
7FF6C3640000
|
unkown
|
page readonly
|
||
23160BC0000
|
trusted library allocation
|
page read and write
|
||
196D5F42000
|
heap
|
page read and write
|
||
196D57D0000
|
heap
|
page read and write
|
||
2A99FBE1000
|
heap
|
page read and write
|
||
2316164C000
|
trusted library allocation
|
page read and write
|
||
196D5B6C000
|
heap
|
page read and write
|
||
196D5959000
|
heap
|
page read and write
|
||
196D5ADB000
|
heap
|
page read and write
|
||
37EF6FC000
|
stack
|
page read and write
|
||
196CDB13000
|
heap
|
page read and write
|
||
2A99FB9C000
|
heap
|
page read and write
|
||
7FF9BB190000
|
trusted library allocation
|
page read and write
|
||
7FF9BB4E0000
|
trusted library allocation
|
page read and write
|
||
7FF9BB3A0000
|
trusted library allocation
|
page read and write
|
||
51AF000
|
stack
|
page read and write
|
||
2B2F5CD8000
|
heap
|
page read and write
|
||
2A99FF19000
|
heap
|
page read and write
|
||
2A99A322000
|
heap
|
page read and write
|
||
2A9A0010000
|
heap
|
page read and write
|
||
2A99FB61000
|
heap
|
page read and write
|
||
8F7000
|
heap
|
page read and write
|
||
2B2F53E0000
|
trusted library allocation
|
page read and write
|
||
1E11B4F6000
|
heap
|
page read and write
|
||
7FF9BB830000
|
trusted library allocation
|
page read and write
|
||
2A99FEB0000
|
heap
|
page read and write
|
||
2A997CF4000
|
heap
|
page read and write
|
||
196CDB0A000
|
heap
|
page read and write
|
||
23162A0C000
|
trusted library allocation
|
page read and write
|
||
196D5B20000
|
heap
|
page read and write
|
||
177E6EA0000
|
heap
|
page read and write
|
||
7FF9BB970000
|
trusted library allocation
|
page read and write
|
||
2B280A57000
|
trusted library allocation
|
page read and write
|
||
2984FC000
|
stack
|
page read and write
|
||
2B5AB27A000
|
heap
|
page read and write
|
||
196D5A44000
|
heap
|
page read and write
|
||
2678A820000
|
heap
|
page read and write
|
||
2B2F5E82000
|
heap
|
page read and write
|
||
2A99FC83000
|
heap
|
page read and write
|
||
7FF9BAE7C000
|
trusted library allocation
|
page execute and read and write
|
||
2A99FB24000
|
heap
|
page read and write
|
||
23160BE0000
|
trusted library allocation
|
page read and write
|
||
196D59BE000
|
heap
|
page read and write
|
||
2A99FB47000
|
heap
|
page read and write
|
||
2A99FCC5000
|
heap
|
page read and write
|
||
2A99FC8C000
|
heap
|
page read and write
|
||
23179213000
|
heap
|
page execute and read and write
|
||
196D59DB000
|
heap
|
page read and write
|
||
196D536E000
|
heap
|
page read and write
|
||
7FF9BBDB0000
|
trusted library allocation
|
page read and write
|
||
7FF9BBD10000
|
trusted library allocation
|
page read and write
|
||
196D59BC000
|
heap
|
page read and write
|
||
7FF9BBAEC000
|
trusted library allocation
|
page read and write
|
||
2317118D000
|
trusted library allocation
|
page read and write
|
||
7FF9BB070000
|
trusted library allocation
|
page read and write
|
||
7FF9BB4E0000
|
trusted library allocation
|
page read and write
|
||
2A99FB99000
|
heap
|
page read and write
|
||
177E6EA8000
|
heap
|
page read and write
|
||
2A99FF2A000
|
heap
|
page read and write
|
||
23160D02000
|
heap
|
page read and write
|
||
23162D74000
|
trusted library allocation
|
page read and write
|
||
8FA000
|
heap
|
page read and write
|
||
196D53A5000
|
heap
|
page read and write
|
||
7FF9BBD00000
|
trusted library allocation
|
page read and write
|
||
2A99FDC3000
|
heap
|
page read and write
|
||
2A99FDB3000
|
heap
|
page read and write
|
||
2A997A60000
|
heap
|
page read and write
|
||
2A99FBBE000
|
heap
|
page read and write
|
||
196D5937000
|
heap
|
page read and write
|
||
7FF9BB280000
|
trusted library allocation
|
page read and write
|
||
2A99FB3B000
|
heap
|
page read and write
|
||
2A99FB50000
|
heap
|
page read and write
|
||
196D5D89000
|
heap
|
page read and write
|
||
23179820000
|
heap
|
page read and write
|
||
196D5947000
|
heap
|
page read and write
|
||
196D5BA5000
|
heap
|
page read and write
|
||
7FF9BB2D0000
|
trusted library allocation
|
page read and write
|
||
7FF9BB7F0000
|
trusted library allocation
|
page read and write
|
||
5B0F000
|
heap
|
page read and write
|
||
7FF9BAE27000
|
trusted library allocation
|
page read and write
|
||
196CDBA3000
|
heap
|
page read and write
|
||
231634C7000
|
trusted library allocation
|
page read and write
|
||
7FF9BB0D0000
|
trusted library allocation
|
page read and write
|
||
7FF9BAE4D000
|
trusted library allocation
|
page execute and read and write
|
||
196D5BCB000
|
heap
|
page read and write
|
||
7FF9BB150000
|
trusted library allocation
|
page execute and read and write
|
||
5AC5000
|
heap
|
page read and write
|
||
196CDA7E000
|
heap
|
page read and write
|
||
196D62B3000
|
heap
|
page read and write
|
||
196D5BD5000
|
heap
|
page read and write
|
||
2A99FDBF000
|
heap
|
page read and write
|
||
231713A5000
|
trusted library allocation
|
page read and write
|
||
1E11CDF0000
|
heap
|
page readonly
|
||
1E11CDC0000
|
trusted library allocation
|
page read and write
|
||
196D5D11000
|
heap
|
page read and write
|
||
196D5A59000
|
heap
|
page read and write
|
||
7FF9BB0A0000
|
trusted library allocation
|
page read and write
|
||
2B29006A000
|
trusted library allocation
|
page read and write
|
||
196D5029000
|
heap
|
page read and write
|
||
196D5CEF000
|
heap
|
page read and write
|
||
7FF9BBAEE000
|
trusted library allocation
|
page read and write
|
||
2A99FCB3000
|
heap
|
page read and write
|
||
2B2F5E9C000
|
heap
|
page read and write
|
||
2A99FE70000
|
heap
|
page read and write
|
||
7FF9BB680000
|
trusted library allocation
|
page read and write
|
||
4F5E000
|
stack
|
page read and write
|
||
7FF9BB140000
|
trusted library allocation
|
page read and write
|
||
196D5D0D000
|
heap
|
page read and write
|
||
196D5C4D000
|
heap
|
page read and write
|
||
23162E6A000
|
trusted library allocation
|
page read and write
|
||
11325000
|
unkown
|
page readonly
|
||
5A1B000
|
heap
|
page read and write
|
||
2A99FF8E000
|
heap
|
page read and write
|
||
2A99FB41000
|
heap
|
page read and write
|
||
196D5CF7000
|
heap
|
page read and write
|
||
2678AB34000
|
heap
|
page read and write
|
||
196D5CA1000
|
heap
|
page read and write
|
||
7FF9BB480000
|
trusted library allocation
|
page read and write
|
||
2A99FDDA000
|
heap
|
page read and write
|
||
1C75FA00000
|
heap
|
page read and write
|
||
7FF9BB014000
|
trusted library allocation
|
page read and write
|
||
196D5000000
|
heap
|
page read and write
|
||
23161B22000
|
trusted library allocation
|
page read and write
|
||
7FF9BB380000
|
trusted library allocation
|
page read and write
|
||
196D5D2C000
|
heap
|
page read and write
|
||
196D5A1C000
|
heap
|
page read and write
|
||
196D5965000
|
heap
|
page read and write
|
||
11001000
|
unkown
|
page execute read
|
||
196D5D15000
|
heap
|
page read and write
|
||
7FF9BB030000
|
trusted library allocation
|
page read and write
|
||
2A99F5AB000
|
heap
|
page read and write
|
||
2316227F000
|
trusted library allocation
|
page read and write
|
||
2678C620000
|
trusted library allocation
|
page read and write
|
||
7FF695D5A000
|
unkown
|
page write copy
|
||
7FF9BB0BA000
|
trusted library allocation
|
page read and write
|
||
196D5F54000
|
heap
|
page read and write
|
||
196D5B25000
|
heap
|
page read and write
|
||
196D5C38000
|
heap
|
page read and write
|
||
2A99FD1E000
|
heap
|
page read and write
|
||
2A99FB5B000
|
heap
|
page read and write
|
||
7FFA1C50F000
|
unkown
|
page readonly
|
||
E27978E000
|
stack
|
page read and write
|
||
2A99FBB6000
|
heap
|
page read and write
|
||
196D5F52000
|
heap
|
page read and write
|
||
1D2C5E13000
|
heap
|
page read and write
|
||
2A99FE0D000
|
heap
|
page read and write
|
||
2B2F5C1E000
|
heap
|
page read and write
|
||
1C75FA13000
|
heap
|
page read and write
|
||
2A99FB8F000
|
heap
|
page read and write
|
||
196D5A86000
|
heap
|
page read and write
|
||
196D5B08000
|
heap
|
page read and write
|
||
196D5D75000
|
heap
|
page read and write
|
||
7FF9BB923000
|
trusted library allocation
|
page read and write
|
||
2B2F34F0000
|
heap
|
page read and write
|
||
AFE000
|
stack
|
page read and write
|
||
FDFFAFE000
|
stack
|
page read and write
|
||
FD621FF000
|
stack
|
page read and write
|
||
196D53AB000
|
heap
|
page read and write
|
||
E2780B1000
|
stack
|
page read and write
|
||
7FF9BB440000
|
trusted library allocation
|
page read and write
|
||
1E11D089000
|
trusted library allocation
|
page read and write
|
||
1E135A07000
|
heap
|
page read and write
|
||
7FF9BB2C0000
|
trusted library allocation
|
page read and write
|
||
7FF9BBD6C000
|
trusted library allocation
|
page read and write
|
||
196D5A8E000
|
heap
|
page read and write
|
||
2B280A07000
|
trusted library allocation
|
page read and write
|
||
7FF9BAFC2000
|
trusted library allocation
|
page read and write
|
||
7FF9BB800000
|
trusted library allocation
|
page read and write
|
||
7FF9BB2A0000
|
trusted library allocation
|
page read and write
|
||
196D5C0F000
|
heap
|
page read and write
|
||
196D5977000
|
heap
|
page read and write
|
||
1C75FA43000
|
heap
|
page read and write
|
||
196D5B35000
|
heap
|
page read and write
|
||
2678C726000
|
trusted library allocation
|
page read and write
|
||
196D6302000
|
heap
|
page read and write
|
||
5A41000
|
heap
|
page read and write
|
||
2A99FF22000
|
heap
|
page read and write
|
||
7FF9BB770000
|
trusted library allocation
|
page read and write
|
||
2B280423000
|
trusted library allocation
|
page read and write
|
||
5A39000
|
heap
|
page read and write
|
||
D65BF39000
|
stack
|
page read and write
|
||
196D5B8D000
|
heap
|
page read and write
|
||
BFE000
|
stack
|
page read and write
|
||
2A99FB36000
|
heap
|
page read and write
|
||
7FF9BAE47000
|
trusted library allocation
|
page read and write
|
||
2A99FB23000
|
heap
|
page read and write
|
||
196D5AE1000
|
heap
|
page read and write
|
||
2A99A347000
|
heap
|
page read and write
|
||
196D5D43000
|
heap
|
page read and write
|
||
FD633FA000
|
stack
|
page read and write
|
||
177F3D02000
|
heap
|
page read and write
|
||
196CDADE000
|
heap
|
page read and write
|
||
196CF7B0000
|
trusted library allocation
|
page read and write
|
||
2A99FD30000
|
heap
|
page read and write
|
||
231793D4000
|
heap
|
page read and write
|
||
3CA69B6000
|
stack
|
page read and write
|
||
231632A2000
|
trusted library allocation
|
page read and write
|
||
2A997DE2000
|
heap
|
page read and write
|
||
2A99FFAB000
|
heap
|
page read and write
|
||
196D5AAA000
|
heap
|
page read and write
|
||
2315F22E000
|
heap
|
page read and write
|
||
3CA67EC000
|
stack
|
page read and write
|
||
196D5B3D000
|
heap
|
page read and write
|
||
2A997C07000
|
heap
|
page read and write
|
||
177F3C2B000
|
heap
|
page read and write
|
||
1E135572000
|
heap
|
page read and write
|
||
2B2F55A2000
|
heap
|
page read and write
|
||
2A99FD87000
|
heap
|
page read and write
|
||
196D5BFB000
|
heap
|
page read and write
|
||
196D59EB000
|
heap
|
page read and write
|
||
7FF9BBA30000
|
trusted library allocation
|
page read and write
|
||
2A99FF4F000
|
heap
|
page read and write
|
||
7FFA1B0A1000
|
unkown
|
page execute read
|
||
2316343E000
|
trusted library allocation
|
page read and write
|
||
7FF9BB5E0000
|
trusted library allocation
|
page read and write
|
||
2A99FD00000
|
heap
|
page read and write
|
||
2A997D13000
|
heap
|
page read and write
|
||
2A99F200000
|
heap
|
page read and write
|
||
196D5C5B000
|
heap
|
page read and write
|
||
7FF9BB0C0000
|
trusted library allocation
|
page read and write
|
||
7FF9BB370000
|
trusted library allocation
|
page read and write
|
||
2A99FE23000
|
heap
|
page read and write
|
||
196D59E3000
|
heap
|
page read and write
|
||
7FF9BB840000
|
trusted library allocation
|
page read and write
|
||
7FF9BB460000
|
trusted library allocation
|
page read and write
|
||
7FF9BB520000
|
trusted library allocation
|
page read and write
|
||
196D598C000
|
heap
|
page read and write
|
||
196D5D53000
|
heap
|
page read and write
|
||
7FF9BB6C5000
|
trusted library allocation
|
page read and write
|
||
7FF9BB0D0000
|
trusted library allocation
|
page read and write
|
||
7FF9BB530000
|
trusted library allocation
|
page execute and read and write
|
||
2A99FFA2000
|
heap
|
page read and write
|
||
7FF9BB640000
|
trusted library allocation
|
page read and write
|
||
1C75FA29000
|
heap
|
page read and write
|
||
7FF9BB076000
|
trusted library allocation
|
page read and write
|
||
1E135033000
|
trusted library allocation
|
page read and write
|
||
23161659000
|
trusted library allocation
|
page read and write
|
||
2A99FCBD000
|
heap
|
page read and write
|
||
196D5B88000
|
heap
|
page read and write
|
||
196D5A45000
|
heap
|
page read and write
|
||
231799AB000
|
heap
|
page read and write
|
||
2A99FB6F000
|
heap
|
page read and write
|
||
2B281617000
|
trusted library allocation
|
page read and write
|
||
FD622F9000
|
stack
|
page read and write
|
||
2B2F5402000
|
heap
|
page execute and read and write
|
||
196D5D60000
|
heap
|
page read and write
|
||
196D5F7C000
|
heap
|
page read and write
|
||
23179650000
|
trusted library allocation
|
page read and write
|
||
23163258000
|
trusted library allocation
|
page read and write
|
||
196D5A63000
|
heap
|
page read and write
|
||
2A99FBC4000
|
heap
|
page read and write
|
||
54FE000
|
stack
|
page read and write
|
||
7FF9BB8A0000
|
trusted library allocation
|
page read and write
|
||
2A99FC63000
|
heap
|
page read and write
|
||
23179868000
|
heap
|
page read and write
|
||
2A99FE6B000
|
heap
|
page read and write
|
||
196D5A2C000
|
heap
|
page read and write
|
||
2A99FBB5000
|
heap
|
page read and write
|
||
196D5D5C000
|
heap
|
page read and write
|
||
196D51B7000
|
heap
|
page read and write
|
||
2A99FB80000
|
heap
|
page read and write
|
||
2A99FF8B000
|
heap
|
page read and write
|
||
7FF9BB6B0000
|
trusted library allocation
|
page read and write
|
||
2A99FB3C000
|
heap
|
page read and write
|
||
196D5D5A000
|
heap
|
page read and write
|
||
2A99FBA3000
|
heap
|
page read and write
|
||
7FF9BBAD4000
|
trusted library allocation
|
page read and write
|
||
196D0100000
|
heap
|
page read and write
|
||
7FF695D5A000
|
unkown
|
page read and write
|
||
2B2F5C92000
|
heap
|
page read and write
|
||
2A99FC95000
|
heap
|
page read and write
|
||
196CDA3F000
|
heap
|
page read and write
|
||
2797D20E000
|
heap
|
page read and write
|
||
2A99FD6A000
|
heap
|
page read and write
|
||
196D5AAC000
|
heap
|
page read and write
|
||
196D516C000
|
heap
|
page read and write
|
||
2A99FFF1000
|
heap
|
page read and write
|
||
23163223000
|
trusted library allocation
|
page read and write
|
||
196D5A51000
|
heap
|
page read and write
|
||
196D5BB9000
|
heap
|
page read and write
|
||
196D5ADF000
|
heap
|
page read and write
|
||
2A99FD8F000
|
heap
|
page read and write
|
||
5A3D000
|
heap
|
page read and write
|
||
2A99FC00000
|
heap
|
page read and write
|
||
2A99FC15000
|
heap
|
page read and write
|
||
5A9B000
|
heap
|
page read and write
|
||
2A99FDD5000
|
heap
|
page read and write
|
||
7FF9BB7C0000
|
trusted library allocation
|
page read and write
|
||
23162E85000
|
trusted library allocation
|
page read and write
|
||
196D5B1C000
|
heap
|
page read and write
|
||
2A9A0012000
|
heap
|
page read and write
|
||
2A9999B0000
|
trusted library allocation
|
page read and write
|
||
231611A4000
|
trusted library allocation
|
page read and write
|
||
196D5D32000
|
heap
|
page read and write
|
||
2A99FBF0000
|
heap
|
page read and write
|
||
1E11E93D000
|
trusted library allocation
|
page read and write
|
||
196D5936000
|
heap
|
page read and write
|
||
7FF695D5A000
|
unkown
|
page read and write
|
||
196D5C20000
|
heap
|
page read and write
|
||
7FF9BB6EC000
|
trusted library allocation
|
page read and write
|
||
29FE000
|
stack
|
page read and write
|
||
2A99FC2E000
|
heap
|
page read and write
|
||
231793C4000
|
heap
|
page read and write
|
||
2315F334000
|
heap
|
page read and write
|
||
196D599A000
|
heap
|
page read and write
|
||
7FF9BAEE0000
|
trusted library allocation
|
page read and write
|
||
7FF9BB3B0000
|
trusted library allocation
|
page read and write
|
||
7FF9BB8B0000
|
trusted library allocation
|
page read and write
|
||
7FF9BB320000
|
trusted library allocation
|
page read and write
|
||
7FF9BBAA0000
|
trusted library allocation
|
page read and write
|
||
7FF6C367E000
|
unkown
|
page readonly
|
||
196D5B6A000
|
heap
|
page read and write
|
||
196CDAC7000
|
heap
|
page read and write
|
||
2B2801BA000
|
trusted library allocation
|
page read and write
|
||
2A99F140000
|
trusted library allocation
|
page read and write
|
||
7FF9BB0B0000
|
trusted library allocation
|
page read and write
|
||
196D5B52000
|
heap
|
page read and write
|
||
196D592E000
|
heap
|
page read and write
|
||
7FF9BB9E0000
|
trusted library allocation
|
page read and write
|
||
FD636FB000
|
unkown
|
page read and write
|
||
2A99FA0F000
|
heap
|
page read and write
|
||
1118F000
|
unkown
|
page readonly
|
||
2A99FBF0000
|
heap
|
page read and write
|
||
7FF9BB2CF000
|
trusted library allocation
|
page read and write
|
||
3CA61FE000
|
unkown
|
page read and write
|
||
196D5BC4000
|
heap
|
page read and write
|
||
2A99FE53000
|
heap
|
page read and write
|
||
2678AA3E000
|
heap
|
page read and write
|
||
2A99FBB7000
|
heap
|
page read and write
|
||
2A99FF2D000
|
heap
|
page read and write
|
||
196D59A9000
|
heap
|
page read and write
|
||
7FF9BB9B0000
|
trusted library allocation
|
page read and write
|
||
7FF9BBD90000
|
trusted library allocation
|
page read and write
|
||
7FF695D70000
|
remote allocation
|
page read and write
|
||
196CDAD1000
|
heap
|
page read and write
|
||
2A99FE1B000
|
heap
|
page read and write
|
||
2A99FDEE000
|
heap
|
page read and write
|
||
7FFA1B10F000
|
unkown
|
page readonly
|
||
231625A2000
|
trusted library allocation
|
page read and write
|
||
196D5A70000
|
heap
|
page read and write
|
||
196D5BDF000
|
heap
|
page read and write
|
||
196D5D15000
|
heap
|
page read and write
|
||
7FF9BB4B0000
|
trusted library allocation
|
page read and write
|
||
751827B000
|
stack
|
page read and write
|
||
196CDB11000
|
heap
|
page read and write
|
||
186BAE74000
|
heap
|
page read and write
|
||
5A8D000
|
heap
|
page read and write
|
||
196D59FD000
|
heap
|
page read and write
|
||
2A99FEA1000
|
heap
|
page read and write
|
||
196CD830000
|
heap
|
page read and write
|
||
2A997D89000
|
heap
|
page read and write
|
||
7FF9BB7D0000
|
trusted library allocation
|
page read and write
|
||
23162258000
|
trusted library allocation
|
page read and write
|
||
2A99FB7B000
|
heap
|
page read and write
|
||
5AF1000
|
heap
|
page read and write
|
||
7FF9BB3F0000
|
trusted library allocation
|
page execute and read and write
|
||
2A99FD7E000
|
heap
|
page read and write
|
||
186BAF02000
|
heap
|
page read and write
|
||
23162861000
|
trusted library allocation
|
page read and write
|
||
2316339E000
|
trusted library allocation
|
page read and write
|
||
23179E2B000
|
heap
|
page read and write
|
||
2315F254000
|
heap
|
page read and write
|
||
7FFA1B10D000
|
unkown
|
page read and write
|
||
2A99FB4C000
|
heap
|
page read and write
|
||
7FF9BB630000
|
trusted library allocation
|
page read and write
|
||
2A99FE5B000
|
heap
|
page read and write
|
||
2317933D000
|
heap
|
page read and write
|
||
2A99FD59000
|
heap
|
page read and write
|
||
7FF9BBA00000
|
trusted library allocation
|
page execute and read and write
|
||
2A99FE26000
|
heap
|
page read and write
|
||
7FF9BAE34000
|
trusted library allocation
|
page read and write
|
||
2797D1E0000
|
heap
|
page read and write
|
||
2A99FF45000
|
heap
|
page read and write
|
||
196D598C000
|
heap
|
page read and write
|
||
2A99FBDF000
|
heap
|
page read and write
|
||
2700000
|
heap
|
page read and write
|
||
FDFFBFC000
|
stack
|
page read and write
|
||
7FF9BB300000
|
trusted library allocation
|
page read and write
|
||
7FF9BB230000
|
trusted library allocation
|
page execute and read and write
|
||
7FF9BB8B2000
|
trusted library allocation
|
page read and write
|
||
196D59ED000
|
heap
|
page read and write
|
||
904000
|
heap
|
page read and write
|
||
7FF9BAE3D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF9BBA80000
|
trusted library allocation
|
page read and write
|
||
23179851000
|
heap
|
page read and write
|
||
2A99FBBE000
|
heap
|
page read and write
|
||
196D598F000
|
heap
|
page read and write
|
||
2316179B000
|
trusted library allocation
|
page read and write
|
||
7FF9BB6D6000
|
trusted library allocation
|
page read and write
|
||
23160BA0000
|
trusted library section
|
page read and write
|
||
2A99FC68000
|
heap
|
page read and write
|
||
2A99FCC7000
|
heap
|
page read and write
|
||
2A99FE61000
|
heap
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
196D5D20000
|
heap
|
page read and write
|
||
196D5D3B000
|
heap
|
page read and write
|
||
23161B0F000
|
trusted library allocation
|
page read and write
|
||
2A997CB9000
|
heap
|
page read and write
|
||
55E000
|
stack
|
page read and write
|
||
196D5C48000
|
heap
|
page read and write
|
||
2B2F5C65000
|
heap
|
page read and write
|
||
11205000
|
unkown
|
page readonly
|
||
7FF9BB9D0000
|
trusted library allocation
|
page read and write
|
||
5A52000
|
heap
|
page read and write
|
||
32BB000
|
stack
|
page read and write
|
||
196D5961000
|
heap
|
page read and write
|
||
FDFF8FD000
|
stack
|
page read and write
|
||
1E135030000
|
trusted library allocation
|
page read and write
|
||
2B280978000
|
trusted library allocation
|
page read and write
|
||
2A99FDAA000
|
heap
|
page read and write
|
||
7FF9BB4F0000
|
trusted library allocation
|
page read and write
|
||
196D5344000
|
heap
|
page read and write
|
||
196D5349000
|
heap
|
page read and write
|
||
196D5D3E000
|
heap
|
page read and write
|
||
2A99FC51000
|
heap
|
page read and write
|
||
2678CAD0000
|
trusted library allocation
|
page read and write
|
||
FD61FFE000
|
stack
|
page read and write
|
||
196D5A21000
|
heap
|
page read and write
|
||
2B28099F000
|
trusted library allocation
|
page read and write
|
||
7FF9BB1A0000
|
trusted library allocation
|
page execute and read and write
|
||
2A99FB7E000
|
heap
|
page read and write
|
||
2A99FEDA000
|
heap
|
page read and write
|
||
196D51A6000
|
heap
|
page read and write
|
||
196D5A55000
|
heap
|
page read and write
|
||
7FF9BB260000
|
trusted library allocation
|
page read and write
|
||
2317A010000
|
heap
|
page read and write
|
||
2B280A66000
|
trusted library allocation
|
page read and write
|
||
7FF9BAE10000
|
trusted library allocation
|
page read and write
|
||
60DA2FE000
|
stack
|
page read and write
|
||
8D4000
|
heap
|
page read and write
|
||
D65BBFE000
|
stack
|
page read and write
|
||
2B2809B4000
|
trusted library allocation
|
page read and write
|
||
196D5D6C000
|
heap
|
page read and write
|
||
196D581E000
|
heap
|
page read and write
|
||
2B280541000
|
trusted library allocation
|
page read and write
|
||
5ABF000
|
heap
|
page read and write
|
||
4396BFC000
|
stack
|
page read and write
|
||
196D5B87000
|
heap
|
page read and write
|
||
1E11B538000
|
heap
|
page read and write
|
||
196D5F6C000
|
heap
|
page read and write
|
||
177E7180000
|
heap
|
page read and write
|
||
196D5CF1000
|
heap
|
page read and write
|
||
2A99FBE3000
|
heap
|
page read and write
|
||
2A99A315000
|
heap
|
page read and write
|
||
FD627FC000
|
stack
|
page read and write
|
||
196D5DDC000
|
heap
|
page read and write
|
||
3CA6C7E000
|
stack
|
page read and write
|
||
7FFA1D9A0000
|
direct allocation
|
page execute and read and write
|
||
196D6291000
|
heap
|
page read and write
|
||
7FF9BB140000
|
trusted library allocation
|
page execute and read and write
|
||
7FF9BB6A0000
|
trusted library allocation
|
page read and write
|
||
7FF9BAE37000
|
trusted library allocation
|
page read and write
|
||
2678AA43000
|
heap
|
page read and write
|
||
7FF9BB92A000
|
trusted library allocation
|
page read and write
|
||
403000
|
unkown
|
page read and write
|
||
2A99FBED000
|
heap
|
page read and write
|
||
2A99FBCE000
|
heap
|
page read and write
|
||
8F5000
|
heap
|
page read and write
|
||
196D5B7E000
|
heap
|
page read and write
|
||
196D59AC000
|
heap
|
page read and write
|
||
2B2F5C0E000
|
heap
|
page read and write
|
||
196D5B13000
|
heap
|
page read and write
|
||
196D5C8B000
|
heap
|
page read and write
|
||
6BEB0000
|
unkown
|
page readonly
|
||
D65BA7E000
|
stack
|
page read and write
|
||
7FF6C3641000
|
unkown
|
page execute read
|
||
2B2F34F4000
|
heap
|
page read and write
|
||
2A99F5DB000
|
heap
|
page read and write
|
||
196D59F8000
|
heap
|
page read and write
|
||
2A99FF6C000
|
heap
|
page read and write
|
||
23161CFD000
|
trusted library allocation
|
page read and write
|
||
2A99FF68000
|
heap
|
page read and write
|
||
7DF42A740000
|
trusted library allocation
|
page execute and read and write
|
||
2B280A0B000
|
trusted library allocation
|
page read and write
|
||
177E7185000
|
heap
|
page read and write
|
||
7FF9BAEEC000
|
trusted library allocation
|
page execute and read and write
|
||
196D5BC0000
|
heap
|
page read and write
|
||
563E000
|
stack
|
page read and write
|
||
2A99F413000
|
heap
|
page read and write
|
||
196D5D7A000
|
heap
|
page read and write
|
||
C22A0FB000
|
stack
|
page read and write
|
||
2A997C28000
|
heap
|
page read and write
|
||
2B2F4E13000
|
heap
|
page read and write
|
||
1E1355C0000
|
heap
|
page read and write
|
||
5A3D000
|
heap
|
page read and write
|
||
2A99FC43000
|
heap
|
page read and write
|
||
50AE000
|
stack
|
page read and write
|
||
2A99FEF9000
|
heap
|
page read and write
|
||
2B280575000
|
trusted library allocation
|
page read and write
|
||
FD628FC000
|
stack
|
page read and write
|
||
196D5D9E000
|
heap
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
2A99FBBE000
|
heap
|
page read and write
|
||
7FF9BBB30000
|
trusted library allocation
|
page read and write
|
||
7FF9BB350000
|
trusted library allocation
|
page read and write
|
||
196D5E23000
|
heap
|
page read and write
|
||
2678AA7C000
|
heap
|
page read and write
|
||
196D011E000
|
heap
|
page read and write
|
||
196D0121000
|
heap
|
page read and write
|
||
2A997CCC000
|
heap
|
page read and write
|
||
5A6C000
|
heap
|
page read and write
|
||
D65BD76000
|
stack
|
page read and write
|
||
7FF9BB250000
|
trusted library allocation
|
page read and write
|
||
196D594F000
|
heap
|
page read and write
|
||
23161650000
|
trusted library allocation
|
page read and write
|
||
23161150000
|
heap
|
page readonly
|
||
1E12D066000
|
trusted library allocation
|
page read and write
|
||
196D6294000
|
heap
|
page read and write
|
||
7FF9BB060000
|
trusted library allocation
|
page read and write
|
||
2678C729000
|
trusted library allocation
|
page read and write
|
||
2A99A202000
|
heap
|
page read and write
|
||
196D5AAC000
|
heap
|
page read and write
|
||
196D5A00000
|
heap
|
page read and write
|
||
196D620A000
|
heap
|
page read and write
|
||
8F9000
|
heap
|
page read and write
|
||
7FF9BB4B0000
|
trusted library allocation
|
page read and write
|
||
2A99FF53000
|
heap
|
page read and write
|
||
1E135A00000
|
heap
|
page read and write
|
||
196D596F000
|
heap
|
page read and write
|
||
196D581B000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
E2781BD000
|
stack
|
page read and write
|
||
2A99FCA9000
|
heap
|
page read and write
|
||
7FF9BB170000
|
trusted library allocation
|
page read and write
|
||
2A997CB5000
|
heap
|
page read and write
|
||
7FF9BB7C0000
|
trusted library allocation
|
page read and write
|
||
196D5F49000
|
heap
|
page read and write
|
||
196D5B0E000
|
heap
|
page read and write
|
||
2A99FC34000
|
heap
|
page read and write
|
||
196D5362000
|
heap
|
page read and write
|
||
7FF9BB290000
|
trusted library allocation
|
page read and write
|
||
1E135500000
|
heap
|
page read and write
|
||
FD634FF000
|
stack
|
page read and write
|
||
2B2F5C22000
|
heap
|
page read and write
|
||
231632D6000
|
trusted library allocation
|
page read and write
|
||
1E135593000
|
heap
|
page read and write
|
||
2A99FF71000
|
heap
|
page read and write
|
||
7FFA1C52B000
|
unkown
|
page read and write
|
||
2A99FCFD000
|
heap
|
page read and write
|
||
196D59AB000
|
heap
|
page read and write
|
||
1E11EA2C000
|
trusted library allocation
|
page read and write
|
||
2A99FD75000
|
heap
|
page read and write
|
||
196D621B000
|
heap
|
page read and write
|
||
231791F3000
|
trusted library allocation
|
page read and write
|
||
196D5B91000
|
heap
|
page read and write
|
||
7FF9BB373000
|
trusted library allocation
|
page read and write
|
||
23162449000
|
trusted library allocation
|
page read and write
|
||
196D5ADB000
|
heap
|
page read and write
|
||
7FF9BB0B0000
|
trusted library allocation
|
page read and write
|
||
196D5B82000
|
heap
|
page read and write
|
||
74676000
|
unkown
|
page read and write
|
||
2678A9C0000
|
heap
|
page execute and read and write
|
||
2A99FC76000
|
heap
|
page read and write
|
||
1E1355DF000
|
heap
|
page read and write
|
||
196D0151000
|
heap
|
page read and write
|
||
2A997C97000
|
heap
|
page read and write
|
||
FD632F7000
|
stack
|
page read and write
|
||
196D4FA0000
|
heap
|
page read and write
|
||
196D0128000
|
heap
|
page read and write
|
||
2797D228000
|
heap
|
page read and write
|
||
2B5AB110000
|
heap
|
page read and write
|
||
231632B4000
|
trusted library allocation
|
page read and write
|
||
2315F29B000
|
heap
|
page read and write
|
||
2B280A03000
|
trusted library allocation
|
page read and write
|
||
5AF6000
|
heap
|
page read and write
|
||
196D5C4B000
|
heap
|
page read and write
|
||
5CFF000
|
stack
|
page read and write
|
||
196D5ABB000
|
heap
|
page read and write
|
||
2A99FB59000
|
heap
|
page read and write
|
||
7FF9BB940000
|
trusted library allocation
|
page read and write
|
||
2A997CD2000
|
heap
|
page read and write
|
||
23162884000
|
trusted library allocation
|
page read and write
|
||
2A99A3B7000
|
heap
|
page read and write
|
||
196D6622000
|
trusted library allocation
|
page read and write
|
||
B9702FE000
|
stack
|
page read and write
|
||
7FF9BB75A000
|
trusted library allocation
|
page read and write
|
||
196D5C19000
|
heap
|
page read and write
|
||
7FF9BB300000
|
trusted library allocation
|
page read and write
|
||
7FF9BB060000
|
trusted library allocation
|
page read and write
|
||
23161140000
|
heap
|
page execute and read and write
|
||
2B2F3400000
|
heap
|
page read and write
|
||
196D5343000
|
heap
|
page read and write
|
||
3CA6B3F000
|
stack
|
page read and write
|
||
2316354B000
|
trusted library allocation
|
page read and write
|
||
2B2F6010000
|
heap
|
page read and write
|
||
2A99FE69000
|
heap
|
page read and write
|
||
7FF9BB09E000
|
trusted library allocation
|
page read and write
|
||
5A4A000
|
heap
|
page read and write
|
||
196D5D40000
|
heap
|
page read and write
|
||
23162F99000
|
trusted library allocation
|
page read and write
|
||
7FF9BB900000
|
trusted library allocation
|
page read and write
|
||
2B2901D9000
|
trusted library allocation
|
page read and write
|
||
2A99FDDC000
|
heap
|
page read and write
|
||
196D583A000
|
heap
|
page read and write
|
||
2A99FE00000
|
heap
|
page read and write
|
||
196D5D38000
|
heap
|
page read and write
|
||
2A99FDBD000
|
heap
|
page read and write
|
||
23162FB9000
|
trusted library allocation
|
page read and write
|
||
196D5D3E000
|
heap
|
page read and write
|
||
23179892000
|
heap
|
page read and write
|
||
196D5A9E000
|
heap
|
page read and write
|
||
2A99FD57000
|
heap
|
page read and write
|
||
7FF9BB2E0000
|
trusted library allocation
|
page read and write
|
||
196D5B24000
|
heap
|
page read and write
|
||
1E135513000
|
heap
|
page read and write
|
||
2A99FBE9000
|
heap
|
page read and write
|
||
231632F0000
|
trusted library allocation
|
page read and write
|
||
2A99FD13000
|
heap
|
page read and write
|
||
2B280848000
|
trusted library allocation
|
page read and write
|
||
23162D57000
|
trusted library allocation
|
page read and write
|
||
2B2F5E2B000
|
heap
|
page read and write
|
||
2A99FF3C000
|
heap
|
page read and write
|
||
37EED57000
|
stack
|
page read and write
|
||
2A99FDEC000
|
heap
|
page read and write
|
||
593E000
|
stack
|
page read and write
|
||
2612000
|
heap
|
page read and write
|
||
7FF9BB04B000
|
trusted library allocation
|
page read and write
|
||
196CD810000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
2A99FA13000
|
heap
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
6BEF0000
|
unkown
|
page readonly
|
||
2A99FEF4000
|
heap
|
page read and write
|
||
FD62AFC000
|
stack
|
page read and write
|
||
196D5C2B000
|
heap
|
page read and write
|
||
7FF9BB440000
|
trusted library allocation
|
page read and write
|
||
196D51D5000
|
heap
|
page read and write
|
||
2A99F57B000
|
heap
|
page read and write
|
||
2A99FF74000
|
heap
|
page read and write
|
||
196D5BC6000
|
heap
|
page read and write
|
||
2A99FF12000
|
heap
|
page read and write
|
||
2A99FBA5000
|
heap
|
page read and write
|
||
2B281921000
|
trusted library allocation
|
page read and write
|
||
196D5FEE000
|
heap
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
2A99F31F000
|
heap
|
page read and write
|
||
2A99FC2D000
|
heap
|
page read and write
|
||
23171450000
|
trusted library allocation
|
page read and write
|
||
196D5C90000
|
heap
|
page read and write
|
||
196D5A9A000
|
heap
|
page read and write
|
||
2A01000
|
heap
|
page read and write
|
||
196CDB0F000
|
heap
|
page read and write
|
||
2A99FBB1000
|
heap
|
page read and write
|
||
196D53FD000
|
heap
|
page read and write
|
||
196D51FD000
|
heap
|
page read and write
|
||
8AF000
|
heap
|
page read and write
|
||
196D5B60000
|
heap
|
page read and write
|
||
196D5ACD000
|
heap
|
page read and write
|
||
2A99FC41000
|
heap
|
page read and write
|
||
196D5A1F000
|
heap
|
page read and write
|
||
196D5B30000
|
heap
|
page read and write
|
||
23161161000
|
trusted library allocation
|
page read and write
|
||
231711C7000
|
trusted library allocation
|
page read and write
|
||
2A99FB5D000
|
heap
|
page read and write
|
||
196D5D4F000
|
heap
|
page read and write
|
||
1E11E621000
|
trusted library allocation
|
page read and write
|
||
7FF9BBAD0000
|
trusted library allocation
|
page read and write
|
||
23160C13000
|
heap
|
page read and write
|
||
7FF9BBD80000
|
trusted library allocation
|
page read and write
|
||
23162E87000
|
trusted library allocation
|
page read and write
|
||
196D599B000
|
heap
|
page read and write
|
||
196D5346000
|
heap
|
page read and write
|
||
7FF9BB073000
|
trusted library allocation
|
page read and write
|
||
196D5D11000
|
heap
|
page read and write
|
||
2A99FD20000
|
heap
|
page read and write
|
||
7FF9BB120000
|
trusted library allocation
|
page read and write
|
||
196D5A2B000
|
heap
|
page read and write
|
||
2A99FA00000
|
heap
|
page read and write
|
||
196D62BB000
|
heap
|
page read and write
|
||
196D5FA9000
|
heap
|
page read and write
|
||
7FF9BB066000
|
trusted library allocation
|
page read and write
|
||
2678C3A0000
|
trusted library allocation
|
page read and write
|
||
2A99FE83000
|
heap
|
page read and write
|
||
5AEA000
|
heap
|
page read and write
|
||
1E11B47A000
|
heap
|
page read and write
|
||
196D5213000
|
heap
|
page read and write
|
||
196D5D71000
|
heap
|
page read and write
|
||
2A997C85000
|
heap
|
page read and write
|
||
196D5B6F000
|
heap
|
page read and write
|
||
196D5C99000
|
heap
|
page read and write
|
||
812000
|
heap
|
page read and write
|
||
7DF42A760000
|
trusted library allocation
|
page execute and read and write
|
||
7FF9BB540000
|
trusted library allocation
|
page execute and read and write
|
||
2A99FE35000
|
heap
|
page read and write
|
||
2A99FC7B000
|
heap
|
page read and write
|
||
2A99FC0D000
|
heap
|
page read and write
|
||
196D5D46000
|
heap
|
page read and write
|
||
2678CAAD000
|
trusted library allocation
|
page read and write
|
||
5A45000
|
heap
|
page read and write
|
||
196D5337000
|
heap
|
page read and write
|
||
2B28094E000
|
trusted library allocation
|
page read and write
|
||
196CDB5F000
|
heap
|
page read and write
|
||
7FF9BB4F0000
|
trusted library allocation
|
page read and write
|
||
2797D213000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
196D5AAE000
|
heap
|
page read and write
|
||
7FF9BB734000
|
trusted library allocation
|
page read and write
|
||
FD635FE000
|
stack
|
page read and write
|
||
196D5908000
|
heap
|
page read and write
|
||
2A99FB6D000
|
heap
|
page read and write
|
||
7FF9BB222000
|
trusted library allocation
|
page read and write
|
||
7FF9BB560000
|
trusted library allocation
|
page execute and read and write
|
||
2A99FC3D000
|
heap
|
page read and write
|
||
1D2C5DD0000
|
heap
|
page read and write
|
||
196D5A24000
|
heap
|
page read and write
|
||
196D5BFF000
|
heap
|
page read and write
|
||
2B2F5020000
|
trusted library allocation
|
page read and write
|
||
D65BC7F000
|
stack
|
page read and write
|
||
7FF9BB490000
|
trusted library allocation
|
page read and write
|
||
196D59EE000
|
heap
|
page read and write
|
||
2678C960000
|
trusted library allocation
|
page read and write
|
||
2678A9F0000
|
trusted library allocation
|
page read and write
|
||
2A99A32C000
|
heap
|
page read and write
|
||
2B2805BB000
|
trusted library allocation
|
page read and write
|
||
7FF9BB71C000
|
trusted library allocation
|
page read and write
|
||
2A99FBCA000
|
heap
|
page read and write
|
||
7FF9BB0F0000
|
trusted library allocation
|
page read and write
|
||
7FF9BB330000
|
trusted library allocation
|
page read and write
|
||
196D5AAE000
|
heap
|
page read and write
|
||
196D5A8A000
|
heap
|
page read and write
|
||
196D5C6F000
|
heap
|
page read and write
|
||
196D5F9B000
|
heap
|
page read and write
|
||
196D5C59000
|
heap
|
page read and write
|
||
23162ECC000
|
trusted library allocation
|
page read and write
|
||
7FF9BB7A0000
|
trusted library allocation
|
page read and write
|
||
2B2F5E7C000
|
heap
|
page read and write
|
||
7FF655D30000
|
direct allocation
|
page execute read
|
||
196D5CFF000
|
heap
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
2A99FDFF000
|
heap
|
page read and write
|
||
7FF9BB040000
|
trusted library allocation
|
page read and write
|
||
43975FC000
|
stack
|
page read and write
|
||
FD629FC000
|
stack
|
page read and write
|
||
7FF9BB8E0000
|
trusted library allocation
|
page execute and read and write
|
||
196D5D3B000
|
heap
|
page read and write
|
||
2A99FDF9000
|
heap
|
page read and write
|
||
7FF9BB2FD000
|
trusted library allocation
|
page read and write
|
||
196D538F000
|
heap
|
page read and write
|
||
7FF9BB480000
|
trusted library allocation
|
page read and write
|
||
196D5968000
|
heap
|
page read and write
|
||
2A99FCDB000
|
heap
|
page read and write
|
||
2678CC32000
|
trusted library allocation
|
page read and write
|
||
7FF9BB1A0000
|
trusted library allocation
|
page execute and read and write
|
||
196D5D40000
|
heap
|
page read and write
|
||
2B28090C000
|
trusted library allocation
|
page read and write
|
||
8C8000
|
heap
|
page read and write
|
||
904000
|
heap
|
page read and write
|
||
7FF6C369A000
|
unkown
|
page readonly
|
||
2A99F538000
|
heap
|
page read and write
|
||
2A99FE4A000
|
heap
|
page read and write
|
||
196D5C7C000
|
heap
|
page read and write
|
||
196D5D73000
|
heap
|
page read and write
|
||
7FF9BB430000
|
trusted library allocation
|
page read and write
|
||
2A99FB82000
|
heap
|
page read and write
|
||
231793A5000
|
heap
|
page read and write
|
||
2B2F3498000
|
heap
|
page read and write
|
||
23161654000
|
trusted library allocation
|
page read and write
|
||
2B2900A2000
|
trusted library allocation
|
page read and write
|
||
2A99FEAC000
|
heap
|
page read and write
|
||
196D5F7A000
|
heap
|
page read and write
|
||
2A99FCB1000
|
heap
|
page read and write
|
||
196D5BDA000
|
heap
|
page read and write
|
||
7FF9BB670000
|
trusted library allocation
|
page read and write
|
||
196D5D46000
|
heap
|
page read and write
|
||
7FF9BB600000
|
trusted library allocation
|
page read and write
|
||
7FF9BBAD0000
|
trusted library allocation
|
page read and write
|
||
2A99F5E0000
|
heap
|
page read and write
|
||
196D5A70000
|
heap
|
page read and write
|
||
196D5DDD000
|
heap
|
page read and write
|
||
23162FC9000
|
trusted library allocation
|
page read and write
|
||
196D6200000
|
heap
|
page read and write
|
||
7FF9BB6B0000
|
trusted library allocation
|
page read and write
|
||
7FF9BB2B0000
|
trusted library allocation
|
page read and write
|
||
23163150000
|
trusted library allocation
|
page read and write
|
||
2B280651000
|
trusted library allocation
|
page read and write
|
||
2A997D24000
|
heap
|
page read and write
|
||
186BAE43000
|
heap
|
page read and write
|
||
2A99FF16000
|
heap
|
page read and write
|
||
2A99FF25000
|
heap
|
page read and write
|
||
7FF9BB090000
|
trusted library allocation
|
page read and write
|
||
196D5BB9000
|
heap
|
page read and write
|
||
2B290067000
|
trusted library allocation
|
page read and write
|
||
2B2F5E9A000
|
heap
|
page read and write
|
||
196D5325000
|
heap
|
page read and write
|
||
2315F2D5000
|
heap
|
page read and write
|
||
2B28086E000
|
trusted library allocation
|
page read and write
|
||
2A99FCEF000
|
heap
|
page read and write
|
||
7FF9BB5C0000
|
trusted library allocation
|
page read and write
|
||
2B28064A000
|
trusted library allocation
|
page read and write
|
||
E27968B000
|
stack
|
page read and write
|
||
196D5BB9000
|
heap
|
page read and write
|
||
75181FE000
|
stack
|
page read and write
|
||
196D5D20000
|
heap
|
page read and write
|
||
7FF9BB740000
|
trusted library allocation
|
page read and write
|
||
7FF9BB350000
|
trusted library allocation
|
page read and write
|
||
1E11E902000
|
trusted library allocation
|
page read and write
|
||
5AA6000
|
heap
|
page read and write
|
||
2A99FE7C000
|
heap
|
page read and write
|
||
7FF9BB930000
|
trusted library allocation
|
page read and write
|
||
2A997D0A000
|
heap
|
page read and write
|
||
196D5A72000
|
heap
|
page read and write
|
||
4396EF5000
|
stack
|
page read and write
|
||
FD626FE000
|
stack
|
page read and write
|
||
CFF000
|
stack
|
page read and write
|
||
7FF9BB9E0000
|
trusted library allocation
|
page read and write
|
||
196D0114000
|
heap
|
page read and write
|
||
196D5F55000
|
heap
|
page read and write
|
||
196D5A8C000
|
heap
|
page read and write
|
||
7FF9BB4D0000
|
trusted library allocation
|
page read and write
|
||
196D5CD0000
|
heap
|
page read and write
|
||
2B281B85000
|
trusted library allocation
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
2A99FF12000
|
heap
|
page read and write
|
||
196D5C39000
|
heap
|
page read and write
|
||
2A99FCC5000
|
heap
|
page read and write
|
||
5A4A000
|
heap
|
page read and write
|
||
196D5B64000
|
heap
|
page read and write
|
||
196D5D4A000
|
heap
|
page read and write
|
||
196D5BF0000
|
heap
|
page read and write
|
||
2A99FF59000
|
heap
|
page read and write
|
||
196D5F80000
|
heap
|
page read and write
|
||
23162F82000
|
trusted library allocation
|
page read and write
|
||
2316331E000
|
trusted library allocation
|
page read and write
|
||
2A9A000A000
|
heap
|
page read and write
|
||
196D5B6E000
|
heap
|
page read and write
|
||
2A99FF24000
|
heap
|
page read and write
|
||
196D4F50000
|
heap
|
page read and write
|
||
2A99FDA8000
|
heap
|
page read and write
|
||
196D5CEE000
|
heap
|
page read and write
|
||
196D620A000
|
heap
|
page read and write
|
||
E27867E000
|
stack
|
page read and write
|
||
196D5AE7000
|
heap
|
page read and write
|
||
196D62AB000
|
heap
|
page read and write
|
||
2A99FCFE000
|
heap
|
page read and write
|
||
196D59CF000
|
heap
|
page read and write
|
||
2A99FC66000
|
heap
|
page read and write
|
||
E2785FF000
|
stack
|
page read and write
|
||
196D5DBB000
|
heap
|
page read and write
|
||
2739000
|
heap
|
page read and write
|
||
23163320000
|
trusted library allocation
|
page read and write
|
||
2A99FBD4000
|
heap
|
page read and write
|
||
2A99FE5F000
|
heap
|
page read and write
|
||
23163421000
|
trusted library allocation
|
page read and write
|
||
2B2805AA000
|
trusted library allocation
|
page read and write
|
||
2A99FE30000
|
heap
|
page read and write
|
||
7FF9BBB40000
|
trusted library allocation
|
page read and write
|
||
7FF9BBAC0000
|
trusted library allocation
|
page read and write
|
||
7FF9BB810000
|
trusted library allocation
|
page read and write
|
||
196D5F93000
|
heap
|
page read and write
|
||
7FF9BB9D0000
|
trusted library allocation
|
page read and write
|
||
7FF9BB050000
|
trusted library allocation
|
page read and write
|
||
23162C86000
|
trusted library allocation
|
page read and write
|
||
196D5992000
|
heap
|
page read and write
|
||
2A99FBA2000
|
heap
|
page read and write
|
||
2A99FB42000
|
heap
|
page read and write
|
||
23179E23000
|
heap
|
page read and write
|
||
7FF9BB4B0000
|
trusted library allocation
|
page read and write
|
||
7517DFE000
|
stack
|
page read and write
|
||
2A997DFF000
|
heap
|
page read and write
|
||
3CA66FD000
|
stack
|
page read and write
|
||
196CDB48000
|
heap
|
page read and write
|
||
2A99FF05000
|
heap
|
page read and write
|
||
196D534A000
|
heap
|
page read and write
|
||
2A99FDD3000
|
heap
|
page read and write
|
||
8D4000
|
heap
|
page read and write
|
||
2A99FF18000
|
heap
|
page read and write
|
||
196D5940000
|
heap
|
page read and write
|
||
2B280924000
|
trusted library allocation
|
page read and write
|
||
196D539C000
|
heap
|
page read and write
|
||
2A99FF6E000
|
heap
|
page read and write
|
||
177E6CC0000
|
heap
|
page read and write
|
||
196D5140000
|
heap
|
page read and write
|
||
7FFA1B0EF000
|
unkown
|
page readonly
|
||
196D59B2000
|
heap
|
page read and write
|
||
196D5D1A000
|
heap
|
page read and write
|
||
C22A2FF000
|
stack
|
page read and write
|
||
2B2F4DE0000
|
trusted library allocation
|
page read and write
|
||
7FF9BB370000
|
trusted library allocation
|
page read and write
|
||
7FF9BB8CA000
|
trusted library allocation
|
page read and write
|
||
2A99FD21000
|
heap
|
page read and write
|
||
1E11EBC2000
|
trusted library allocation
|
page read and write
|
||
1E136010000
|
heap
|
page read and write
|
||
7FF9BBB60000
|
trusted library allocation
|
page read and write
|
||
1E11B423000
|
heap
|
page read and write
|
||
2A99FBCE000
|
heap
|
page read and write
|
||
2B2F5CD6000
|
heap
|
page read and write
|
||
196D599E000
|
heap
|
page read and write
|
||
196D5D41000
|
heap
|
page read and write
|
||
889000
|
heap
|
page read and write
|
||
2A99F500000
|
heap
|
page read and write
|
||
196D5CE1000
|
heap
|
page read and write
|
||
E278AF9000
|
stack
|
page read and write
|
||
196D622B000
|
heap
|
page read and write
|
||
2A99FBDD000
|
heap
|
page read and write
|
||
2A99FF7E000
|
heap
|
page read and write
|
||
7FF9BBB00000
|
trusted library allocation
|
page read and write
|
||
2A99FC5D000
|
heap
|
page read and write
|
||
196D5B33000
|
heap
|
page read and write
|
||
196D5DCC000
|
heap
|
page read and write
|
||
2A99FD0A000
|
heap
|
page read and write
|
||
2A99A38B000
|
heap
|
page read and write
|
||
7FF9BB650000
|
trusted library allocation
|
page read and write
|
||
196D59B6000
|
heap
|
page read and write
|
||
2A99FB10000
|
heap
|
page read and write
|
||
2A99FF55000
|
heap
|
page read and write
|
||
2B2806DA000
|
trusted library allocation
|
page read and write
|
||
2A99FDE4000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
2A99FD8C000
|
heap
|
page read and write
|
||
196D59BE000
|
heap
|
page read and write
|
||
23161791000
|
trusted library allocation
|
page read and write
|
||
196D5C26000
|
heap
|
page read and write
|
||
2A99FD7C000
|
heap
|
page read and write
|
||
196D59A1000
|
heap
|
page read and write
|
||
23171169000
|
trusted library allocation
|
page read and write
|
||
8FD000
|
heap
|
page read and write
|
||
196D5342000
|
heap
|
page read and write
|
||
2A99FD8E000
|
heap
|
page read and write
|
||
196D5400000
|
trusted library allocation
|
page read and write
|
||
7FF9BBA70000
|
trusted library allocation
|
page read and write
|
||
2A99FF44000
|
heap
|
page read and write
|
||
2A99FCB6000
|
heap
|
page read and write
|
||
5A5A000
|
heap
|
page read and write
|
||
196D59CA000
|
heap
|
page read and write
|
||
2B2F5E00000
|
heap
|
page read and write
|
||
7FF9BB670000
|
trusted library allocation
|
page read and write
|
||
43982FB000
|
unkown
|
page read and write
|
||
2B280AAE000
|
trusted library allocation
|
page read and write
|
||
7FF9BB0E0000
|
trusted library allocation
|
page read and write
|
||
196D59E2000
|
heap
|
page read and write
|
||
2A997DBD000
|
heap
|
page read and write
|
||
7FF9BB500000
|
trusted library allocation
|
page read and write
|
||
5AA6000
|
heap
|
page read and write
|
||
196D5D36000
|
heap
|
page read and write
|
||
2B5AB22B000
|
heap
|
page read and write
|
||
196D59A3000
|
heap
|
page read and write
|
||
196D5343000
|
heap
|
page read and write
|
||
2678C66C000
|
trusted library allocation
|
page read and write
|
||
2B2F5505000
|
heap
|
page read and write
|
||
2CFF000
|
stack
|
page read and write
|
||
196D5995000
|
heap
|
page read and write
|
||
196D5BA7000
|
heap
|
page read and write
|
||
7FF9BAECC000
|
trusted library allocation
|
page execute and read and write
|
||
1E11B400000
|
heap
|
page read and write
|
||
196D5BEA000
|
heap
|
page read and write
|
||
2B2F5CD0000
|
heap
|
page read and write
|
||
2B290019000
|
trusted library allocation
|
page read and write
|
||
2A99FCAC000
|
heap
|
page read and write
|
||
23163557000
|
trusted library allocation
|
page read and write
|
||
196D5E35000
|
heap
|
page read and write
|
||
7FF6C3698000
|
unkown
|
page read and write
|
||
2A99FEEE000
|
heap
|
page read and write
|
||
598E000
|
stack
|
page read and write
|
||
2A99FC53000
|
heap
|
page read and write
|
||
196D51E2000
|
heap
|
page read and write
|
||
2A99FF45000
|
heap
|
page read and write
|
||
7FF9BAFB0000
|
trusted library allocation
|
page read and write
|
||
23162EB8000
|
trusted library allocation
|
page read and write
|
||
1E11CF02000
|
heap
|
page read and write
|
||
196D5ACD000
|
heap
|
page read and write
|
||
2A99FC05000
|
heap
|
page read and write
|
||
2A99FDFE000
|
heap
|
page read and write
|
||
196D4F10000
|
trusted library allocation
|
page read and write
|
||
7FF9BB735000
|
trusted library allocation
|
page read and write
|
||
D65BAFF000
|
stack
|
page read and write
|
||
196D5D6A000
|
heap
|
page read and write
|
||
7FF9BAE33000
|
trusted library allocation
|
page execute and read and write
|
||
2712000
|
heap
|
page read and write
|
||
7FF9BAE24000
|
trusted library allocation
|
page read and write
|
||
196D5C06000
|
heap
|
page read and write
|
||
196D594D000
|
heap
|
page read and write
|
||
D65BB7D000
|
stack
|
page read and write
|
||
196D5B19000
|
heap
|
page read and write
|
||
196D536D000
|
heap
|
page read and write
|
||
2A997C9A000
|
heap
|
page read and write
|
||
7FF9BB520000
|
trusted library allocation
|
page read and write
|
||
196D59D7000
|
heap
|
page read and write
|
||
2A99FBB0000
|
heap
|
page read and write
|
||
231798C7000
|
heap
|
page read and write
|
||
2678C70E000
|
trusted library allocation
|
page read and write
|
||
196D5D6E000
|
heap
|
page read and write
|
||
1E11D001000
|
trusted library allocation
|
page read and write
|
||
5ADB000
|
heap
|
page read and write
|
||
196D5F84000
|
heap
|
page read and write
|
||
7FF9BB728000
|
trusted library allocation
|
page read and write
|
||
2A99FD7C000
|
heap
|
page read and write
|
||
74671000
|
unkown
|
page execute read
|
||
2315F0C0000
|
heap
|
page read and write
|
||
7FF9BB828000
|
trusted library allocation
|
page read and write
|
||
7FF9BBA80000
|
trusted library allocation
|
page read and write
|
||
D65BEB8000
|
stack
|
page read and write
|
||
2A99FF57000
|
heap
|
page read and write
|
||
2B2808A1000
|
trusted library allocation
|
page read and write
|
||
196D5AF3000
|
heap
|
page read and write
|
||
196D5B84000
|
heap
|
page read and write
|
||
196D5913000
|
heap
|
page read and write
|
||
196D5A26000
|
heap
|
page read and write
|
||
E27970E000
|
stack
|
page read and write
|
||
231633AE000
|
trusted library allocation
|
page read and write
|
||
2B2F5C00000
|
heap
|
page read and write
|
||
7FF9BB02B000
|
trusted library allocation
|
page read and write
|
||
7FF9BB9A0000
|
trusted library allocation
|
page read and write
|
||
196D593C000
|
heap
|
page read and write
|
||
196D5BE6000
|
heap
|
page read and write
|
||
8C8000
|
heap
|
page read and write
|
||
43977FC000
|
stack
|
page read and write
|
||
196CDB7B000
|
heap
|
page read and write
|
||
7FF9BAFB2000
|
trusted library allocation
|
page read and write
|
||
7FF9BB710000
|
trusted library allocation
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
7FF9BBD50000
|
trusted library allocation
|
page read and write
|
||
E279547000
|
stack
|
page read and write
|
||
7FF9BB1A0000
|
trusted library allocation
|
page read and write
|
||
196D5D38000
|
heap
|
page read and write
|
||
2A99FB87000
|
heap
|
page read and write
|
||
196D5CF9000
|
heap
|
page read and write
|
||
196D5B4D000
|
heap
|
page read and write
|
||
2A99FDE1000
|
heap
|
page read and write
|
||
196D5D1E000
|
heap
|
page read and write
|
||
3CA667E000
|
stack
|
page read and write
|
||
D65C1B9000
|
stack
|
page read and write
|
||
7FF9BB7A0000
|
trusted library allocation
|
page read and write
|
||
2A99FE2E000
|
heap
|
page read and write
|
||
196D5B69000
|
heap
|
page read and write
|
||
2A99FC61000
|
heap
|
page read and write
|
||
177F3D13000
|
heap
|
page read and write
|
||
2A99FBA7000
|
heap
|
page read and write
|
||
177F3C62000
|
heap
|
page read and write
|
||
FD800FB000
|
stack
|
page read and write
|
||
2A99FB8C000
|
heap
|
page read and write
|
||
2A99FE2A000
|
heap
|
page read and write
|
||
2678AA45000
|
heap
|
page read and write
|
||
7FF9BB5B0000
|
trusted library allocation
|
page read and write
|
||
2A99FD9F000
|
heap
|
page read and write
|
||
2A99FF88000
|
heap
|
page read and write
|
||
404000
|
unkown
|
page readonly
|
||
196D5B28000
|
heap
|
page read and write
|
||
196CDBBE000
|
heap
|
page read and write
|
||
196D59D6000
|
heap
|
page read and write
|
||
2A99FB9A000
|
heap
|
page read and write
|
||
3CA6DFC000
|
stack
|
page read and write
|
||
2A99FA02000
|
heap
|
page read and write
|
||
2A99FBBC000
|
heap
|
page read and write
|
||
196D5B00000
|
heap
|
page read and write
|
||
2317117D000
|
trusted library allocation
|
page read and write
|
||
186BAE2C000
|
heap
|
page read and write
|
||
7FF9BB770000
|
trusted library allocation
|
page read and write
|
||
7FF9BB4E0000
|
trusted library allocation
|
page read and write
|
||
196D594E000
|
heap
|
page read and write
|
||
2A99E7A0000
|
heap
|
page readonly
|
||
196D5D7D000
|
heap
|
page read and write
|
||
7FF9BB29A000
|
trusted library allocation
|
page read and write
|
||
196D59C0000
|
heap
|
page read and write
|
||
196D59E9000
|
heap
|
page read and write
|
||
B9701FD000
|
stack
|
page read and write
|
||
196D5D77000
|
heap
|
page read and write
|
||
5A71000
|
heap
|
page read and write
|
||
196D5D1A000
|
heap
|
page read and write
|
||
7FF9BB03B000
|
trusted library allocation
|
page read and write
|
||
2B280532000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
2B280A48000
|
trusted library allocation
|
page read and write
|
||
196D5A83000
|
heap
|
page read and write
|
||
2A99FDCB000
|
heap
|
page read and write
|
||
2A99FEB6000
|
heap
|
page read and write
|
||
196D5BAE000
|
heap
|
page read and write
|
||
196D5780000
|
heap
|
page read and write
|
||
196D5F53000
|
heap
|
page read and write
|
||
196D5AD1000
|
heap
|
page read and write
|
||
2316286E000
|
trusted library allocation
|
page read and write
|
||
7FF9BB270000
|
trusted library allocation
|
page read and write
|
||
2B28061D000
|
trusted library allocation
|
page read and write
|
||
E2781FE000
|
stack
|
page read and write
|
||
23162D08000
|
trusted library allocation
|
page read and write
|
||
851000
|
heap
|
page read and write
|
||
7FF655D30000
|
direct allocation
|
page execute read
|
||
2A99FCD1000
|
heap
|
page read and write
|
||
231799E7000
|
heap
|
page read and write
|
||
2A99FE99000
|
heap
|
page read and write
|
||
7FF9BBB20000
|
trusted library allocation
|
page read and write
|
||
196D51CA000
|
heap
|
page read and write
|
||
2B2808BB000
|
trusted library allocation
|
page read and write
|
||
8F5000
|
heap
|
page read and write
|
||
196D5B72000
|
heap
|
page read and write
|
||
7FF9BB9F0000
|
trusted library allocation
|
page read and write
|
||
2A99FB28000
|
heap
|
page read and write
|
||
3CA6777000
|
stack
|
page read and write
|
||
7FF9BB870000
|
trusted library allocation
|
page read and write
|
||
5A68000
|
heap
|
page read and write
|
||
196D5B84000
|
heap
|
page read and write
|
||
86F000
|
heap
|
page read and write
|
||
196D5F3D000
|
heap
|
page read and write
|
||
2A99A300000
|
heap
|
page read and write
|
||
196D5DA2000
|
heap
|
page read and write
|
||
2A99FBF3000
|
heap
|
page read and write
|
||
2A99FEE7000
|
heap
|
page read and write
|
||
7FF9BB310000
|
trusted library allocation
|
page read and write
|
||
2A99FD9C000
|
heap
|
page read and write
|
||
2B280933000
|
trusted library allocation
|
page read and write
|
||
2B280419000
|
trusted library allocation
|
page read and write
|
||
1E11B4AF000
|
heap
|
page read and write
|
||
23179376000
|
heap
|
page read and write
|
||
8E5000
|
heap
|
page read and write
|
||
2A997DFF000
|
heap
|
page read and write
|
||
2A99FDE3000
|
heap
|
page read and write
|
||
196D5BE4000
|
heap
|
page read and write
|
||
7FF9BB0C0000
|
trusted library allocation
|
page read and write
|
||
196D4590000
|
trusted library allocation
|
page read and write
|
||
196D5C29000
|
heap
|
page read and write
|
||
2A99FEF1000
|
heap
|
page read and write
|
||
196D5B14000
|
heap
|
page read and write
|
||
2A99FED2000
|
heap
|
page read and write
|
||
2315F2F7000
|
heap
|
page read and write
|
||
7FF9BB910000
|
trusted library allocation
|
page read and write
|
||
1E11B534000
|
heap
|
page read and write
|
||
2A99FCA6000
|
heap
|
page read and write
|
||
5A48000
|
heap
|
page read and write
|
||
1E1355F3000
|
heap
|
page read and write
|
||
196D5DDA000
|
heap
|
page read and write
|
||
2A99F5E5000
|
heap
|
page read and write
|
||
2A99F399000
|
heap
|
page read and write
|
||
2A997DDE000
|
heap
|
page read and write
|
||
2A99E790000
|
trusted library allocation
|
page read and write
|
||
196D5361000
|
heap
|
page read and write
|
||
7FF9BB980000
|
trusted library allocation
|
page read and write
|
||
7FF9BB5E0000
|
trusted library allocation
|
page read and write
|
||
1E11D232000
|
trusted library allocation
|
page read and write
|
||
196D5A76000
|
heap
|
page read and write
|
||
196D5D83000
|
heap
|
page read and write
|
||
23161646000
|
trusted library allocation
|
page read and write
|
||
196D592B000
|
heap
|
page read and write
|
||
7FF9BB7D0000
|
trusted library allocation
|
page read and write
|
||
2A997DDE000
|
heap
|
page read and write
|
||
5B1F000
|
heap
|
page read and write
|
||
196D5300000
|
heap
|
page read and write
|
||
196D5D12000
|
heap
|
page read and write
|
||
2A99FD8A000
|
heap
|
page read and write
|
||
196D5AA2000
|
heap
|
page read and write
|
||
7FF9BBD40000
|
trusted library allocation
|
page read and write
|
||
5A34000
|
heap
|
page read and write
|
||
196D5D66000
|
heap
|
page read and write
|
||
196D5950000
|
heap
|
page read and write
|
||
7FF9BB1C0000
|
trusted library allocation
|
page execute and read and write
|
||
196D5C15000
|
heap
|
page read and write
|
||
2A99FC70000
|
heap
|
page read and write
|
||
196D597B000
|
heap
|
page read and write
|
||
2B2809D7000
|
trusted library allocation
|
page read and write
|
||
196D5CB0000
|
heap
|
page read and write
|
||
7FF9BB245000
|
trusted library allocation
|
page read and write
|
||
2A99FEF7000
|
heap
|
page read and write
|
||
7FF9BAE40000
|
trusted library allocation
|
page read and write
|
||
2B2F5CF2000
|
heap
|
page read and write
|
||
2B290009000
|
trusted library allocation
|
page read and write
|
||
2B2F4DC0000
|
trusted library allocation
|
page read and write
|
||
2B5AB25C000
|
heap
|
page read and write
|
||
196D5A89000
|
heap
|
page read and write
|
||
7FF9BB260000
|
trusted library allocation
|
page read and write
|
||
1E12D011000
|
trusted library allocation
|
page read and write
|
||
2A99FBB6000
|
heap
|
page read and write
|
||
2A99FE59000
|
heap
|
page read and write
|
||
2A99F31B000
|
heap
|
page read and write
|
||
196D5C35000
|
heap
|
page read and write
|
||
7FF9BBD30000
|
trusted library allocation
|
page read and write
|
||
196D5B76000
|
heap
|
page read and write
|
||
2A99FA04000
|
heap
|
page read and write
|
||
196D5AB5000
|
heap
|
page read and write
|
||
5AE5000
|
heap
|
page read and write
|
||
5A1F000
|
heap
|
page read and write
|
||
23163542000
|
trusted library allocation
|
page read and write
|
||
2B2F5C54000
|
heap
|
page read and write
|
||
6BF00000
|
unkown
|
page readonly
|
||
196D5A4F000
|
heap
|
page read and write
|
||
2A99FE25000
|
heap
|
page read and write
|
||
7FF9BB800000
|
trusted library allocation
|
page read and write
|
||
2A99FC0A000
|
heap
|
page read and write
|
||
196D59F5000
|
heap
|
page read and write
|
||
5A9A000
|
heap
|
page read and write
|
||
2A99FD9B000
|
heap
|
page read and write
|
||
196D5D3E000
|
heap
|
page read and write
|
||
196D5B36000
|
heap
|
page read and write
|
||
2B281BDF000
|
trusted library allocation
|
page read and write
|
||
2315F244000
|
heap
|
page read and write
|
||
23162EB6000
|
trusted library allocation
|
page read and write
|
||
196D5CD0000
|
heap
|
page read and write
|
||
7FF9BB080000
|
trusted library allocation
|
page read and write
|
||
7FF683640000
|
direct allocation
|
page execute read
|
||
23163197000
|
trusted library allocation
|
page read and write
|
||
7FF695D5C000
|
unkown
|
page readonly
|
||
7FFA1B0A0000
|
unkown
|
page readonly
|
||
196D5B5C000
|
heap
|
page read and write
|
||
2797D1C0000
|
heap
|
page read and write
|
||
7FF9BB5D0000
|
trusted library allocation
|
page read and write
|
||
7FF9BB2C0000
|
trusted library allocation
|
page read and write
|
||
7FF9BB610000
|
trusted library allocation
|
page read and write
|
||
196D5BE8000
|
heap
|
page read and write
|
||
196D5806000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
2A99FBC6000
|
heap
|
page read and write
|
||
2A99FD93000
|
heap
|
page read and write
|
||
196D5C50000
|
heap
|
page read and write
|
||
2A99FB9E000
|
heap
|
page read and write
|
||
7FF9BAFE0000
|
trusted library allocation
|
page read and write
|
||
23163131000
|
trusted library allocation
|
page read and write
|
||
196D592C000
|
heap
|
page read and write
|
||
196D5A48000
|
heap
|
page read and write
|
||
196D5D73000
|
heap
|
page read and write
|
||
2A99FCCD000
|
heap
|
page read and write
|
||
196D5CFB000
|
heap
|
page read and write
|
||
23161B2E000
|
trusted library allocation
|
page read and write
|
||
23179670000
|
trusted library allocation
|
page read and write
|
||
196D5E1B000
|
heap
|
page read and write
|
||
FDFF9FE000
|
stack
|
page read and write
|
||
2316284F000
|
trusted library allocation
|
page read and write
|
||
2A99A320000
|
heap
|
page read and write
|
||
23179E46000
|
heap
|
page read and write
|
||
2315F1F0000
|
heap
|
page read and write
|
||
2A99FF37000
|
heap
|
page read and write
|
||
6C1B1000
|
unkown
|
page execute read
|
||
7FF9BB1B0000
|
trusted library allocation
|
page read and write
|
||
196D595D000
|
heap
|
page read and write
|
||
2B280483000
|
trusted library allocation
|
page read and write
|
||
7FF9BB170000
|
trusted library allocation
|
page read and write
|
||
2A99FE42000
|
heap
|
page read and write
|
||
7FF9BB3C0000
|
trusted library allocation
|
page execute and read and write
|
||
196D5C8B000
|
heap
|
page read and write
|
||
196D5B48000
|
heap
|
page read and write
|
||
2A99FBFE000
|
heap
|
page read and write
|
||
2A99FD38000
|
heap
|
page read and write
|
||
231798F3000
|
heap
|
page read and write
|
||
2A99FA0A000
|
heap
|
page read and write
|
||
2A99FC79000
|
heap
|
page read and write
|
||
196D5F91000
|
heap
|
page read and write
|
||
196D59B3000
|
heap
|
page read and write
|
||
186BC890000
|
heap
|
page read and write
|
||
2B2F5C43000
|
heap
|
page read and write
|
||
7FF9BB500000
|
trusted library allocation
|
page read and write
|
||
196CDA32000
|
heap
|
page read and write
|
||
6C0F0000
|
unkown
|
page readonly
|
||
5AF9000
|
heap
|
page read and write
|
||
751817E000
|
stack
|
page read and write
|
||
D65BCFF000
|
stack
|
page read and write
|
||
2B2F55BA000
|
heap
|
page read and write
|
||
43976FC000
|
stack
|
page read and write
|
||
2A99FED0000
|
heap
|
page read and write
|
||
2B2808CF000
|
trusted library allocation
|
page read and write
|
||
7FF9BB290000
|
trusted library allocation
|
page read and write
|
||
2B281BCE000
|
trusted library allocation
|
page read and write
|
||
7FF9BB470000
|
trusted library allocation
|
page read and write
|
||
196D5A66000
|
heap
|
page read and write
|
||
23163161000
|
trusted library allocation
|
page read and write
|
||
23179E0A000
|
heap
|
page read and write
|
||
2A99FEAD000
|
heap
|
page read and write
|
||
2A99FF32000
|
heap
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
2B2F32D0000
|
heap
|
page read and write
|
||
196D5F3F000
|
heap
|
page read and write
|
||
2A99FA02000
|
heap
|
page read and write
|
||
2B2F3534000
|
heap
|
page read and write
|
||
2A99FE8F000
|
heap
|
page read and write
|
||
23179382000
|
heap
|
page read and write
|
||
2A99F9D0000
|
heap
|
page read and write
|
||
196D59DF000
|
heap
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
23162F1C000
|
trusted library allocation
|
page read and write
|
||
7FF9BB680000
|
trusted library allocation
|
page read and write
|
||
196D011B000
|
heap
|
page read and write
|
||
2A997D5B000
|
heap
|
page read and write
|
||
6BEB1000
|
unkown
|
page execute read
|
||
2A99FB94000
|
heap
|
page read and write
|
||
7FF9BB930000
|
trusted library allocation
|
page read and write
|
||
2B2808C4000
|
trusted library allocation
|
page read and write
|
||
7FF9BB360000
|
trusted library allocation
|
page read and write
|
||
2A99FBDD000
|
heap
|
page read and write
|
||
43974FD000
|
stack
|
page read and write
|
||
2A99F5E9000
|
heap
|
page read and write
|
||
196D5E19000
|
heap
|
page read and write
|
||
7FF9BB6BC000
|
trusted library allocation
|
page read and write
|
||
7FF9BB760000
|
trusted library allocation
|
page read and write
|
||
7FFA1B10B000
|
unkown
|
page read and write
|
||
7FF695D41000
|
unkown
|
page execute read
|
||
196D5A59000
|
heap
|
page read and write
|
||
58FF000
|
stack
|
page read and write
|
||
7FF9BB910000
|
trusted library allocation
|
page read and write
|
||
2B280A09000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
E2787F5000
|
stack
|
page read and write
|
||
7FF9BB390000
|
trusted library allocation
|
page read and write
|
||
7FF9BBB6A000
|
trusted library allocation
|
page read and write
|
||
43980FE000
|
stack
|
page read and write
|
||
2B2F5E33000
|
heap
|
page read and write
|
||
43978FC000
|
stack
|
page read and write
|
||
7FF9BB160000
|
trusted library allocation
|
page read and write
|
||
196D5BC2000
|
heap
|
page read and write
|
||
196D530B000
|
heap
|
page read and write
|
||
196D5BDA000
|
heap
|
page read and write
|
||
23162E9D000
|
trusted library allocation
|
page read and write
|
||
2A99FCEE000
|
heap
|
page read and write
|
||
8D8000
|
heap
|
page read and write
|
||
7FF9BBB00000
|
trusted library allocation
|
page execute and read and write
|
||
23163440000
|
trusted library allocation
|
page read and write
|
||
7FF9BB73D000
|
trusted library allocation
|
page read and write
|
||
1E13555A000
|
heap
|
page read and write
|
||
196D5F95000
|
heap
|
page read and write
|
||
2317998C000
|
heap
|
page read and write
|
||
2A99FF76000
|
heap
|
page read and write
|
||
196CDBE0000
|
heap
|
page read and write
|
||
2A99FF6B000
|
heap
|
page read and write
|
||
196D5ABD000
|
heap
|
page read and write
|
||
2A997D0F000
|
heap
|
page read and write
|
||
2A99FB2D000
|
heap
|
page read and write
|
||
7FF9BB820000
|
trusted library allocation
|
page execute and read and write
|
||
23162D1E000
|
trusted library allocation
|
page read and write
|
||
177E6EAE000
|
heap
|
page read and write
|
||
2A99FD2C000
|
heap
|
page read and write
|
||
196D5D3A000
|
heap
|
page read and write
|
||
196D59C6000
|
heap
|
page read and write
|
||
2A99FDE8000
|
heap
|
page read and write
|
||
196D5A8B000
|
heap
|
page read and write
|
||
85A000
|
heap
|
page read and write
|
||
196D5AF5000
|
heap
|
page read and write
|
||
7FF9BB860000
|
trusted library allocation
|
page read and write
|
||
7FF9BB640000
|
trusted library allocation
|
page read and write
|
||
2A99FB90000
|
heap
|
page read and write
|
||
23162D8C000
|
trusted library allocation
|
page read and write
|
||
7FF9BB242000
|
trusted library allocation
|
page read and write
|
||
177E88A0000
|
heap
|
page read and write
|
||
5A99000
|
heap
|
page read and write
|
||
5AF2000
|
heap
|
page read and write
|
||
196D5F00000
|
heap
|
page read and write
|
||
7FF9BB920000
|
trusted library allocation
|
page read and write
|
||
2A99FBA5000
|
heap
|
page read and write
|
||
196D5F5B000
|
heap
|
page read and write
|
||
2A99FB4A000
|
heap
|
page read and write
|
||
2678AA3C000
|
heap
|
page read and write
|
||
196D5BBD000
|
heap
|
page read and write
|
||
7FF9BAE4B000
|
trusted library allocation
|
page read and write
|
||
2678CAE6000
|
trusted library allocation
|
page read and write
|
||
196D5F3A000
|
heap
|
page read and write
|
||
2B28097E000
|
trusted library allocation
|
page read and write
|
||
2A99F271000
|
heap
|
page read and write
|
||
2A997CF7000
|
heap
|
page read and write
|
||
2A99FB30000
|
heap
|
page read and write
|
||
2A99FEA1000
|
heap
|
page read and write
|
||
196D5BA8000
|
heap
|
page read and write
|
||
75180FE000
|
stack
|
page read and write
|
||
2A99FE2B000
|
heap
|
page read and write
|
||
196D5202000
|
heap
|
page read and write
|
||
196D5A89000
|
heap
|
page read and write
|
||
7FF6C369E000
|
unkown
|
page readonly
|
||
2A99FB8C000
|
heap
|
page read and write
|
||
196CDBAC000
|
heap
|
page read and write
|
||
7FF9BB914000
|
trusted library allocation
|
page read and write
|
||
2678AA00000
|
heap
|
page read and write
|
||
2A99FF7C000
|
heap
|
page read and write
|
||
9AB75FF000
|
stack
|
page read and write
|
||
196D5DD8000
|
heap
|
page read and write
|
||
2A99FB73000
|
heap
|
page read and write
|
||
5A2B000
|
heap
|
page read and write
|
||
7FF9BBAA0000
|
trusted library allocation
|
page read and write
|
||
7FF9BB7E0000
|
trusted library allocation
|
page read and write
|
||
196D5CDE000
|
heap
|
page read and write
|
||
196D5CE8000
|
heap
|
page read and write
|
||
196D59D9000
|
heap
|
page read and write
|
||
7FF9BB6C3000
|
trusted library allocation
|
page read and write
|
||
196D599C000
|
heap
|
page read and write
|
||
2A99FBF3000
|
heap
|
page read and write
|
||
2A997D72000
|
heap
|
page read and write
|
||
2B2F5589000
|
heap
|
page read and write
|
||
196D5D0B000
|
heap
|
page read and write
|
||
4396DFF000
|
stack
|
page read and write
|
||
7DF4CF450000
|
trusted library allocation
|
page execute and read and write
|
||
196D5B88000
|
heap
|
page read and write
|
||
2B281B51000
|
trusted library allocation
|
page read and write
|
||
196D598C000
|
heap
|
page read and write
|
||
2A99FD28000
|
heap
|
page read and write
|
||
2A99FB79000
|
heap
|
page read and write
|
||
196D5FDE000
|
heap
|
page read and write
|
||
7FF9BB4C0000
|
trusted library allocation
|
page read and write
|
||
7FF9BB8E0000
|
trusted library allocation
|
page read and write
|
||
2A99FC4F000
|
heap
|
page read and write
|
||
2B5AB302000
|
heap
|
page read and write
|
||
196CDA70000
|
heap
|
page read and write
|
||
231798F9000
|
heap
|
page read and write
|
||
7FF9BB2F0000
|
trusted library allocation
|
page read and write
|
||
196D5E34000
|
heap
|
page read and write
|
||
37EF1FE000
|
stack
|
page read and write
|
||
196D590B000
|
heap
|
page read and write
|
||
177F5E02000
|
heap
|
page read and write
|
||
7FF9BB4A0000
|
trusted library allocation
|
page read and write
|
||
196D5A3C000
|
heap
|
page read and write
|
||
2A99FC0E000
|
heap
|
page read and write
|
||
2B2F5010000
|
heap
|
page readonly
|
||
55FD000
|
stack
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
23162DD9000
|
trusted library allocation
|
page read and write
|
||
196D5314000
|
heap
|
page read and write
|
||
5A08000
|
heap
|
page read and write
|
||
C22A1FE000
|
stack
|
page read and write
|
||
2A99FB2B000
|
heap
|
page read and write
|
||
196D62A1000
|
heap
|
page read and write
|
||
196D59F6000
|
heap
|
page read and write
|
||
2A99FC92000
|
heap
|
page read and write
|
||
2A99FD04000
|
heap
|
page read and write
|
||
7FFA1C4C0000
|
unkown
|
page readonly
|
||
7FF9BB960000
|
trusted library allocation
|
page read and write
|
||
8AF000
|
heap
|
page read and write
|
||
7FF9BB280000
|
trusted library allocation
|
page read and write
|
||
2A99FF36000
|
heap
|
page read and write
|
||
196D59CE000
|
heap
|
page read and write
|
||
196CDBA7000
|
heap
|
page read and write
|
||
7FF9BB850000
|
trusted library allocation
|
page read and write
|
||
196D5CD2000
|
heap
|
page read and write
|
||
2A99FCA2000
|
heap
|
page read and write
|
||
2A99FE4D000
|
heap
|
page read and write
|
||
196D5D79000
|
heap
|
page read and write
|
||
196D0186000
|
heap
|
page read and write
|
||
2B28065E000
|
trusted library allocation
|
page read and write
|
||
5A43000
|
heap
|
page read and write
|
||
196D5DAB000
|
heap
|
page read and write
|
||
5A73000
|
heap
|
page read and write
|
||
196D5B26000
|
heap
|
page read and write
|
||
7FF9BB2C0000
|
trusted library allocation
|
page read and write
|
||
2A99FD4D000
|
heap
|
page read and write
|
||
3CA68B4000
|
stack
|
page read and write
|
||
196D5904000
|
heap
|
page read and write
|
||
7FFA1C535000
|
unkown
|
page readonly
|
||
7FF9BBA40000
|
trusted library allocation
|
page read and write
|
||
196D5AA5000
|
heap
|
page read and write
|
||
196D5996000
|
heap
|
page read and write
|
||
7FF9BB2E0000
|
trusted library allocation
|
page read and write
|
||
2A99FE14000
|
heap
|
page read and write
|
||
2A99FC9A000
|
heap
|
page read and write
|
||
2A99FD46000
|
heap
|
page read and write
|
||
2A99FC65000
|
heap
|
page read and write
|
||
196D5A40000
|
heap
|
page read and write
|
||
231799F4000
|
heap
|
page read and write
|
||
2A99FFBC000
|
heap
|
page read and write
|
||
7FF9BB320000
|
trusted library allocation
|
page read and write
|
||
196D5997000
|
heap
|
page read and write
|
||
196D5AB2000
|
heap
|
page read and write
|
||
2A99F592000
|
heap
|
page read and write
|
||
FD61DFD000
|
stack
|
page read and write
|
||
2678AAB0000
|
heap
|
page read and write
|
||
60DA3FE000
|
stack
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
7FF9BB180000
|
trusted library allocation
|
page read and write
|
||
2A99FD90000
|
heap
|
page read and write
|
||
2678C70B000
|
trusted library allocation
|
page read and write
|
||
2A99FE20000
|
heap
|
page read and write
|
||
7FF9BAE13000
|
trusted library allocation
|
page execute and read and write
|
||
231799B0000
|
heap
|
page read and write
|
||
23179205000
|
heap
|
page execute and read and write
|
||
7FF9BB9E8000
|
trusted library allocation
|
page read and write
|
||
5A38000
|
heap
|
page read and write
|
||
7FF9BB0D0000
|
trusted library allocation
|
page read and write
|
||
1E11E8FC000
|
trusted library allocation
|
page read and write
|
||
2B280632000
|
trusted library allocation
|
page read and write
|
||
1127C000
|
unkown
|
page readonly
|
||
7FF9BB720000
|
trusted library allocation
|
page read and write
|
||
7FF6C367E000
|
unkown
|
page readonly
|
||
7FF9BBAE0000
|
trusted library allocation
|
page read and write
|
||
7FF9BB660000
|
trusted library allocation
|
page read and write
|
||
7FF9BAFD0000
|
trusted library allocation
|
page read and write
|
||
196CDAF9000
|
heap
|
page read and write
|
||
2B2814AE000
|
trusted library allocation
|
page read and write
|
||
2A99A32F000
|
heap
|
page read and write
|
||
196D5F90000
|
heap
|
page read and write
|
||
2678A9D0000
|
heap
|
page readonly
|
||
23162512000
|
trusted library allocation
|
page read and write
|
||
2A99FBA9000
|
heap
|
page read and write
|
||
2A997A30000
|
heap
|
page read and write
|
||
84D000
|
heap
|
page read and write
|
||
2B2F5050000
|
trusted library allocation
|
page read and write
|
||
7FF695D50000
|
unkown
|
page readonly
|
||
5A47000
|
heap
|
page read and write
|
||
23162F65000
|
trusted library allocation
|
page read and write
|
||
7FF9BB8DA000
|
trusted library allocation
|
page read and write
|
||
7FF9BB3B0000
|
trusted library allocation
|
page read and write
|
||
196D5ACB000
|
heap
|
page read and write
|
||
7FF9BB950000
|
trusted library allocation
|
page read and write
|
||
2315F23F000
|
heap
|
page read and write
|
||
7FF9BBA10000
|
trusted library allocation
|
page read and write
|
||
43973FC000
|
stack
|
page read and write
|
||
7FF9BB2F0000
|
trusted library allocation
|
page read and write
|
||
2A997CE0000
|
heap
|
page read and write
|
||
196D4F30000
|
heap
|
page read and write
|
||
2A99FB00000
|
heap
|
page read and write
|
||
23162F4B000
|
trusted library allocation
|
page read and write
|
||
196D01FF000
|
heap
|
page read and write
|
||
196D5B22000
|
heap
|
page read and write
|
||
6BEFE000
|
unkown
|
page read and write
|
||
196D5371000
|
heap
|
page read and write
|
||
2B2F5528000
|
heap
|
page read and write
|
||
2A99FF3A000
|
heap
|
page read and write
|
||
7FF9BB190000
|
trusted library allocation
|
page read and write
|
||
196D5973000
|
heap
|
page read and write
|
||
196D5BDC000
|
heap
|
page read and write
|
||
2A997CC4000
|
heap
|
page read and write
|
||
7517DB1000
|
stack
|
page read and write
|
||
196D5B82000
|
heap
|
page read and write
|
||
2A99FF51000
|
heap
|
page read and write
|
||
196D59B9000
|
heap
|
page read and write
|
||
23179305000
|
heap
|
page read and write
|
||
196D5813000
|
heap
|
page read and write
|
||
7FF9BB080000
|
trusted library allocation
|
page read and write
|
||
1E1353C0000
|
trusted library allocation
|
page read and write
|
||
196D5B18000
|
heap
|
page read and write
|
||
2A99FB33000
|
heap
|
page read and write
|
||
196D5A15000
|
heap
|
page read and write
|
||
2A99F1B0000
|
heap
|
page read and write
|
||
7FF9BB8A0000
|
trusted library allocation
|
page read and write
|
||
196D640B000
|
trusted library allocation
|
page read and write
|
||
5AA3000
|
heap
|
page read and write
|
||
5DFF000
|
stack
|
page read and write
|
||
7FF9BBA73000
|
trusted library allocation
|
page read and write
|
||
1E11B2A0000
|
heap
|
page read and write
|
||
2A99FF81000
|
heap
|
page read and write
|
||
196D5C47000
|
heap
|
page read and write
|
||
FD62CFC000
|
stack
|
page read and write
|
||
196CD9C0000
|
trusted library allocation
|
page read and write
|
||
2A99FC7F000
|
heap
|
page read and write
|
||
2A99FBA5000
|
heap
|
page read and write
|
||
231711D9000
|
trusted library allocation
|
page read and write
|
||
7FF9BB770000
|
trusted library allocation
|
page execute and read and write
|
||
196D5AC9000
|
heap
|
page read and write
|
||
7FF9BB690000
|
trusted library allocation
|
page read and write
|
||
7FF9BAFD0000
|
trusted library allocation
|
page read and write
|
||
196D598A000
|
heap
|
page read and write
|
||
2A99FD24000
|
heap
|
page read and write
|
||
2B28066D000
|
trusted library allocation
|
page read and write
|
||
2A99FF66000
|
heap
|
page read and write
|
||
2A99FB4A000
|
heap
|
page read and write
|
||
FD61EFE000
|
stack
|
page read and write
|
||
2A9A000B000
|
heap
|
page read and write
|
||
7FF9BB3D0000
|
trusted library allocation
|
page read and write
|
||
2A99FC72000
|
heap
|
page read and write
|
||
2A99FE62000
|
heap
|
page read and write
|
||
23171161000
|
trusted library allocation
|
page read and write
|
||
7FF9BB9C0000
|
trusted library allocation
|
page read and write
|
||
7FF9BB2D0000
|
trusted library allocation
|
page read and write
|
||
196D53A5000
|
heap
|
page read and write
|
||
24C0000
|
heap
|
page read and write
|
||
1E135413000
|
heap
|
page execute and read and write
|
||
2B2F5E18000
|
heap
|
page read and write
|
||
196D5F73000
|
heap
|
page read and write
|
||
7FF9BB2A0000
|
trusted library allocation
|
page read and write
|
||
231791D0000
|
heap
|
page execute and read and write
|
||
D65CB42000
|
stack
|
page read and write
|
||
1E11EC8B000
|
trusted library allocation
|
page read and write
|
||
196CDAD7000
|
heap
|
page read and write
|
||
7FF9BB610000
|
trusted library allocation
|
page read and write
|
||
196CDACF000
|
heap
|
page read and write
|
||
2315F2D7000
|
heap
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
196D5327000
|
heap
|
page read and write
|
||
11283000
|
unkown
|
page readonly
|
||
2B2F5513000
|
heap
|
page read and write
|
||
7FF9BB660000
|
trusted library allocation
|
page read and write
|
||
7FF9BB660000
|
trusted library allocation
|
page read and write
|
||
7FF9BB110000
|
trusted library allocation
|
page read and write
|
||
7FF9BB3B0000
|
trusted library allocation
|
page execute and read and write
|
||
196D5620000
|
unkown
|
page readonly
|
||
2A99F190000
|
heap
|
page read and write
|
||
7FF9BB470000
|
trusted library allocation
|
page read and write
|
||
2A99FF42000
|
heap
|
page read and write
|
||
7FF9BB450000
|
trusted library allocation
|
page read and write
|
||
7FF9BB510000
|
trusted library allocation
|
page read and write
|
||
2B2805F4000
|
trusted library allocation
|
page read and write
|
||
196D536F000
|
heap
|
page read and write
|
||
2A99FC39000
|
heap
|
page read and write
|
||
1E12D009000
|
trusted library allocation
|
page read and write
|
||
2A99FEE8000
|
heap
|
page read and write
|
||
196D5C2C000
|
heap
|
page read and write
|
||
D65CB8F000
|
stack
|
page read and write
|
||
57FE000
|
stack
|
page read and write
|
||
196CDBA9000
|
heap
|
page read and write
|
||
2A99F2A6000
|
heap
|
page read and write
|
||
2A99FC44000
|
heap
|
page read and write
|
||
196D5A0A000
|
heap
|
page read and write
|
||
2B280001000
|
trusted library allocation
|
page read and write
|
||
7FF9BB780000
|
trusted library allocation
|
page read and write
|
||
2B280086000
|
trusted library allocation
|
page read and write
|
||
2A99FB8F000
|
heap
|
page read and write
|
||
5AA9000
|
heap
|
page read and write
|
||
7FF9BB650000
|
trusted library allocation
|
page read and write
|
||
2A99FCE2000
|
heap
|
page read and write
|
||
FD623F5000
|
stack
|
page read and write
|
||
196CDAF6000
|
heap
|
page read and write
|
||
196D5361000
|
heap
|
page read and write
|
||
196D5C42000
|
heap
|
page read and write
|
||
2315F213000
|
heap
|
page read and write
|
||
196D5DD0000
|
heap
|
page read and write
|
||
23162DE9000
|
trusted library allocation
|
page read and write
|
||
196D5B4A000
|
heap
|
page read and write
|
||
2A99FC6C000
|
heap
|
page read and write
|
||
2A99FE1B000
|
heap
|
page read and write
|
||
196D5C0D000
|
heap
|
page read and write
|
||
2A99FF83000
|
heap
|
page read and write
|
||
7FF9BB230000
|
trusted library allocation
|
page read and write
|
||
7FF9BB242000
|
trusted library allocation
|
page read and write
|
||
7FF9BB3A0000
|
trusted library allocation
|
page read and write
|
||
37EF5FD000
|
stack
|
page read and write
|
||
904000
|
heap
|
page read and write
|
||
FDFFEFB000
|
stack
|
page read and write
|
||
7FF9BB095000
|
trusted library allocation
|
page read and write
|
||
2B2805C4000
|
trusted library allocation
|
page read and write
|
||
196CDAE4000
|
heap
|
page read and write
|
||
37EF2FD000
|
stack
|
page read and write
|
||
5A2B000
|
heap
|
page read and write
|
||
7FF9BB3C0000
|
trusted library allocation
|
page read and write
|
||
196D5A85000
|
heap
|
page read and write
|
||
2A99FB86000
|
heap
|
page read and write
|
||
2A9A0019000
|
heap
|
page read and write
|
||
23163456000
|
trusted library allocation
|
page read and write
|
||
23161D24000
|
trusted library allocation
|
page read and write
|
||
2A99FF3A000
|
heap
|
page read and write
|
||
23179E02000
|
heap
|
page read and write
|
||
7FF9BB2F3000
|
trusted library allocation
|
page read and write
|
||
196CDACC000
|
heap
|
page read and write
|
||
186BB000000
|
heap
|
page read and write
|
||
196D5B9E000
|
heap
|
page read and write
|
||
196D59C0000
|
heap
|
page read and write
|
||
7FF9BB310000
|
trusted library allocation
|
page read and write
|
||
2B2F347A000
|
heap
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
196D5F42000
|
heap
|
page read and write
|
||
196D5B72000
|
heap
|
page read and write
|
||
E2794CE000
|
stack
|
page read and write
|
||
2A99F5F7000
|
heap
|
page read and write
|
||
2A99FE8B000
|
heap
|
page read and write
|
||
7FF9BB890000
|
trusted library allocation
|
page read and write
|
||
23161F4D000
|
trusted library allocation
|
page read and write
|
||
2A997C13000
|
heap
|
page read and write
|
||
196D5AA7000
|
heap
|
page read and write
|
||
7FF9BBAE0000
|
trusted library allocation
|
page read and write
|
||
2A99FBE3000
|
heap
|
page read and write
|
||
1D2C5E2D000
|
heap
|
page read and write
|
||
196D5C71000
|
heap
|
page read and write
|
||
2B280A1C000
|
trusted library allocation
|
page read and write
|
||
7FF9BB090000
|
trusted library allocation
|
page read and write
|
||
2678C3A3000
|
trusted library allocation
|
page read and write
|
||
7FF9BB699000
|
trusted library allocation
|
page read and write
|
||
2A99FB9C000
|
heap
|
page read and write
|
||
1E11B451000
|
heap
|
page read and write
|
||
7FF9BB0BE000
|
trusted library allocation
|
page read and write
|
||
5AB2000
|
heap
|
page read and write
|
||
196D59D5000
|
heap
|
page read and write
|
||
196D5FCD000
|
heap
|
page read and write
|
||
2A99FD82000
|
heap
|
page read and write
|
||
2B281B53000
|
trusted library allocation
|
page read and write
|
||
196D5C0B000
|
heap
|
page read and write
|
||
7FF9BB9A0000
|
trusted library allocation
|
page read and write
|
||
23161C94000
|
trusted library allocation
|
page read and write
|
||
2A99FE96000
|
heap
|
page read and write
|
||
196D5980000
|
heap
|
page read and write
|
||
196D5A75000
|
heap
|
page read and write
|
||
7FF9BB300000
|
trusted library allocation
|
page read and write
|
||
7FF9BB360000
|
trusted library allocation
|
page read and write
|
||
196D5CA1000
|
heap
|
page read and write
|
||
7FF9BB0A0000
|
trusted library allocation
|
page read and write
|
||
2315F27D000
|
heap
|
page read and write
|
||
196D5BBE000
|
heap
|
page read and write
|
||
196D5D1C000
|
heap
|
page read and write
|
||
2B2F33F0000
|
heap
|
page read and write
|
||
1E12D07C000
|
trusted library allocation
|
page read and write
|
||
196D5FB4000
|
heap
|
page read and write
|
||
7FF9BB190000
|
trusted library allocation
|
page read and write
|
||
2A99FC98000
|
heap
|
page read and write
|
||
196D5907000
|
heap
|
page read and write
|
||
5AEE000
|
heap
|
page read and write
|
||
2A997DC6000
|
heap
|
page read and write
|
||
2A997D11000
|
heap
|
page read and write
|
||
5A97000
|
heap
|
page read and write
|
||
196D5D8D000
|
heap
|
page read and write
|
||
7FF9BB260000
|
trusted library allocation
|
page read and write
|
||
196D5A29000
|
heap
|
page read and write
|
||
602000
|
heap
|
page read and write
|
||
7FF9BB6A0000
|
trusted library allocation
|
page read and write
|
||
196D5D47000
|
heap
|
page read and write
|
||
231634BC000
|
trusted library allocation
|
page read and write
|
||
2A99FD14000
|
heap
|
page read and write
|
||
2A99FC2B000
|
heap
|
page read and write
|
||
196D5D46000
|
heap
|
page read and write
|
||
196D5C30000
|
heap
|
page read and write
|
||
2A99FCD9000
|
heap
|
page read and write
|
||
2A99FDFB000
|
heap
|
page read and write
|
||
196D5C17000
|
heap
|
page read and write
|
||
2A99FDAF000
|
heap
|
page read and write
|
||
2A99FBF3000
|
heap
|
page read and write
|
||
E278878000
|
stack
|
page read and write
|
||
231632BF000
|
trusted library allocation
|
page read and write
|
||
7FF6C365A000
|
unkown
|
page execute read
|
||
2B2F5E78000
|
heap
|
page read and write
|
||
196D5D34000
|
heap
|
page read and write
|
||
196D5A36000
|
heap
|
page read and write
|
||
2A997CA6000
|
heap
|
page read and write
|
||
196CD9D0000
|
heap
|
page read and write
|
||
7FF9BB270000
|
trusted library allocation
|
page read and write
|
||
196D5DBC000
|
heap
|
page read and write
|
||
2A99FBD1000
|
heap
|
page read and write
|
||
112D9000
|
unkown
|
page readonly
|
||
2315F248000
|
heap
|
page read and write
|
||
2A99FF1A000
|
heap
|
page read and write
|
||
8B3000
|
heap
|
page read and write
|
||
2A99FE48000
|
heap
|
page read and write
|
||
7FF695D41000
|
unkown
|
page execute read
|
||
7FF9BB180000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
23162851000
|
trusted library allocation
|
page read and write
|
||
231624DE000
|
trusted library allocation
|
page read and write
|
||
2A99FF30000
|
heap
|
page read and write
|
||
2A9A010A000
|
heap
|
page read and write
|
||
1E11B42E000
|
heap
|
page read and write
|
||
1E11CE02000
|
heap
|
page read and write
|
||
196D593B000
|
heap
|
page read and write
|
||
7FF9BB9F0000
|
trusted library allocation
|
page read and write
|
||
7FF9BB247000
|
trusted library allocation
|
page read and write
|
||
196CDB35000
|
heap
|
page read and write
|
||
23162D0A000
|
trusted library allocation
|
page read and write
|
||
23179E59000
|
heap
|
page read and write
|
||
5AD3000
|
heap
|
page read and write
|
||
7FF9BB490000
|
trusted library allocation
|
page read and write
|
||
7FFA1B115000
|
unkown
|
page readonly
|
||
1E11B4F2000
|
heap
|
page read and write
|
||
196D5B0C000
|
heap
|
page read and write
|
||
196D5AB8000
|
heap
|
page read and write
|
||
196D5C8D000
|
heap
|
page read and write
|
||
7FF9BB320000
|
trusted library allocation
|
page read and write
|
||
196D5FA6000
|
heap
|
page read and write
|
||
7FF9BB7F0000
|
trusted library allocation
|
page read and write
|
||
7FF9BB2E0000
|
trusted library allocation
|
page read and write
|
||
7FF9BB0A0000
|
trusted library allocation
|
page read and write
|
||
196D5933000
|
heap
|
page read and write
|
||
2B5AB130000
|
heap
|
page read and write
|
||
2A99FF2E000
|
heap
|
page read and write
|
||
439658B000
|
stack
|
page read and write
|
||
2B281B6B000
|
trusted library allocation
|
page read and write
|
||
2678AB37000
|
heap
|
page read and write
|
||
5A05000
|
heap
|
page read and write
|
||
177F5C10000
|
heap
|
page read and write
|
||
196D5C3E000
|
heap
|
page read and write
|
||
196D5C23000
|
heap
|
page read and write
|
||
23161B12000
|
trusted library allocation
|
page read and write
|
||
75187F9000
|
stack
|
page read and write
|
||
7FF9BB350000
|
trusted library allocation
|
page execute and read and write
|
||
7FF9BB290000
|
trusted library allocation
|
page read and write
|
||
5A9E000
|
heap
|
page read and write
|
||
37EF8FB000
|
stack
|
page read and write
|
||
751807E000
|
stack
|
page read and write
|
||
196D5D87000
|
heap
|
page read and write
|
||
231624F0000
|
trusted library allocation
|
page read and write
|
||
5AC3000
|
heap
|
page read and write
|
||
196D5978000
|
heap
|
page read and write
|
||
7FF9BB7B0000
|
trusted library allocation
|
page read and write
|
||
196D59D1000
|
heap
|
page read and write
|
||
7FF9BB8C3000
|
trusted library allocation
|
page read and write
|
||
196D5C3C000
|
heap
|
page read and write
|
||
196D5802000
|
heap
|
page read and write
|
||
5AE4000
|
heap
|
page read and write
|
||
196D5AFA000
|
heap
|
page read and write
|
||
7FF9BB630000
|
trusted library allocation
|
page read and write
|
||
2A99FE3C000
|
heap
|
page read and write
|
||
196D5ACF000
|
heap
|
page read and write
|
||
85E000
|
heap
|
page read and write
|
||
2678C697000
|
trusted library allocation
|
page read and write
|
||
7FF9BB620000
|
trusted library allocation
|
page read and write
|
||
196D5C61000
|
heap
|
page read and write
|
||
2A99FBA9000
|
heap
|
page read and write
|
||
196D5A06000
|
heap
|
page read and write
|
||
196CDA84000
|
heap
|
page read and write
|
||
FD631FC000
|
stack
|
page read and write
|
||
196D625B000
|
heap
|
page read and write
|
||
2A997C00000
|
heap
|
page read and write
|
||
23179E05000
|
heap
|
page read and write
|
||
7FF9BB4C0000
|
trusted library allocation
|
page read and write
|
||
5AA4000
|
heap
|
page read and write
|
||
186BAE00000
|
heap
|
page read and write
|
||
2A99FB37000
|
heap
|
page read and write
|
||
2A99FCF4000
|
heap
|
page read and write
|
||
2A997CFA000
|
heap
|
page read and write
|
||
7FF9BB8B0000
|
trusted library allocation
|
page read and write
|
||
2B5AB2A0000
|
heap
|
page read and write
|
||
196D6298000
|
heap
|
page read and write
|
||
3CA6BBA000
|
stack
|
page read and write
|
||
196D6291000
|
heap
|
page read and write
|
||
196D5D23000
|
heap
|
page read and write
|
||
196CDB24000
|
heap
|
page read and write
|
||
7FF9BB9EC000
|
trusted library allocation
|
page read and write
|
||
2B2F5CC5000
|
heap
|
page read and write
|
||
5A91000
|
heap
|
page read and write
|
||
7FF9BB240000
|
trusted library allocation
|
page read and write
|
||
2A99FD72000
|
heap
|
page read and write
|
||
1D2C5E00000
|
heap
|
page read and write
|
||
7FF9BB150000
|
trusted library allocation
|
page read and write
|
||
7FF9BB3A0000
|
trusted library allocation
|
page read and write
|
||
E27960E000
|
stack
|
page read and write
|
||
196D5D36000
|
heap
|
page read and write
|
||
23161231000
|
trusted library allocation
|
page read and write
|
||
2A99FDA5000
|
heap
|
page read and write
|
||
23162E0E000
|
trusted library allocation
|
page read and write
|
||
7FF9BAE3B000
|
trusted library allocation
|
page read and write
|
||
2B2F5543000
|
heap
|
page read and write
|
||
7FF9BB180000
|
trusted library allocation
|
page read and write
|
||
255C000
|
stack
|
page read and write
|
||
2B2F3443000
|
heap
|
page read and write
|
||
2A99FB45000
|
heap
|
page read and write
|
||
23163271000
|
trusted library allocation
|
page read and write
|
||
1E11CDD0000
|
heap
|
page read and write
|
||
2A99F363000
|
heap
|
page read and write
|
||
827000
|
heap
|
page read and write
|
||
2A997C40000
|
heap
|
page read and write
|
||
573F000
|
stack
|
page read and write
|
||
1E135630000
|
heap
|
page read and write
|
||
2A99FF5C000
|
heap
|
page read and write
|
||
5DE000
|
stack
|
page read and write
|
||
2A99FE29000
|
heap
|
page read and write
|
||
196D5D30000
|
heap
|
page read and write
|
||
196D5C4D000
|
heap
|
page read and write
|
||
23162EF9000
|
trusted library allocation
|
page read and write
|
||
196D598F000
|
heap
|
page read and write
|
||
2B5AB261000
|
heap
|
page read and write
|
||
196D598F000
|
heap
|
page read and write
|
||
33FA000
|
stack
|
page read and write
|
||
2A99FB9A000
|
heap
|
page read and write
|
||
3CA6ABF000
|
stack
|
page read and write
|
||
7FF9BB9B0000
|
trusted library allocation
|
page read and write
|
||
196D5905000
|
heap
|
page read and write
|
||
2B2F5CB5000
|
heap
|
page read and write
|
||
112A7000
|
unkown
|
page readonly
|
||
7FF9BB620000
|
trusted library allocation
|
page read and write
|
||
196D62D4000
|
heap
|
page read and write
|
||
2A99FC3F000
|
heap
|
page read and write
|
||
7FFA1B119000
|
unkown
|
page readonly
|
||
7FF9BB5F0000
|
trusted library allocation
|
page read and write
|
||
2A99F1C0000
|
trusted library allocation
|
page read and write
|
||
111F1000
|
unkown
|
page readonly
|
||
196D5AA1000
|
heap
|
page read and write
|
||
2A99FBD9000
|
heap
|
page read and write
|
||
2A99FDCF000
|
heap
|
page read and write
|
||
2B2809FD000
|
trusted library allocation
|
page read and write
|
||
196D595F000
|
heap
|
page read and write
|
||
1E135402000
|
heap
|
page execute and read and write
|
There are 3078 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://wsj.pm/
|