Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,JdXfbK
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,MDlQdmktXg
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,VejwwBbES
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",JdXfbK
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",MDlQdmktXg
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",VejwwBbES
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",XeZsfh
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",YqufWwLNu
|
||
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\ijexogdf64.dll"
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",#1
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
peranistaer.top
|
|||
ultomductingbig.pro
|
|||
klareqvino.com
|
|||
gruvihabralo.nl
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1F73E077000
|
heap
|
page read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
2AD77866000
|
heap
|
page read and write
|
||
157F89A0000
|
heap
|
page read and write
|
||
157F8838000
|
heap
|
page read and write
|
||
2130E8F0000
|
heap
|
page read and write
|
||
2130EA13000
|
heap
|
page read and write
|
||
157F8C74000
|
heap
|
page read and write
|
||
1EB9B413000
|
heap
|
page read and write
|
||
2B066E18000
|
heap
|
page read and write
|
||
D132C7E000
|
stack
|
page read and write
|
||
21E36260000
|
heap
|
page read and write
|
||
21E37190000
|
trusted library allocation
|
page read and write
|
||
157F89FD000
|
heap
|
page read and write
|
||
157F8834000
|
heap
|
page read and write
|
||
27ADAE35000
|
heap
|
page read and write
|
||
157F8D10000
|
heap
|
page read and write
|
||
157F894C000
|
heap
|
page read and write
|
||
1999EC41000
|
heap
|
page read and write
|
||
8EA57FF000
|
stack
|
page read and write
|
||
21E36ED0000
|
trusted library allocation
|
page read and write
|
||
27ADAA80000
|
heap
|
page read and write
|
||
2AD777E0000
|
trusted library allocation
|
page read and write
|
||
103AFC000
|
stack
|
page read and write
|
||
157F89D0000
|
heap
|
page read and write
|
||
186F11C000
|
stack
|
page read and write
|
||
157F8CF7000
|
heap
|
page read and write
|
||
157F82C0000
|
trusted library allocation
|
page read and write
|
||
1ACAA2ED000
|
heap
|
page read and write
|
||
157F33AF000
|
heap
|
page read and write
|
||
157F33F3000
|
heap
|
page read and write
|
||
157F82CE000
|
trusted library allocation
|
page read and write
|
||
1ACAAB85000
|
heap
|
page read and write
|
||
10CF2064000
|
heap
|
page read and write
|
||
157F8C44000
|
heap
|
page read and write
|
||
2AD77913000
|
heap
|
page read and write
|
||
1D9D3C28000
|
heap
|
page read and write
|
||
157F2A3C000
|
heap
|
page read and write
|
||
11CE5318000
|
heap
|
page read and write
|
||
C1125AA000
|
stack
|
page read and write
|
||
2130EA00000
|
heap
|
page read and write
|
||
157F8C52000
|
heap
|
page read and write
|
||
186F47E000
|
stack
|
page read and write
|
||
2002DA00000
|
heap
|
page read and write
|
||
46787E000
|
stack
|
page read and write
|
||
157F8C4F000
|
heap
|
page read and write
|
||
1ACAA308000
|
heap
|
page read and write
|
||
157F82A1000
|
trusted library allocation
|
page read and write
|
||
157F35E3000
|
heap
|
page read and write
|
||
46747F000
|
stack
|
page read and write
|
||
20CE2C00000
|
heap
|
page read and write
|
||
212E9F13000
|
heap
|
page read and write
|
||
157F8856000
|
heap
|
page read and write
|
||
24899587000
|
heap
|
page read and write
|
||
157F8420000
|
trusted library allocation
|
page read and write
|
||
157F8470000
|
trusted library allocation
|
page read and write
|
||
2AD77902000
|
heap
|
page read and write
|
||
157F8DAB000
|
heap
|
page read and write
|
||
157F84F0000
|
trusted library allocation
|
page read and write
|
||
157F8C86000
|
heap
|
page read and write
|
||
157F89C0000
|
heap
|
page read and write
|
||
1D9D4190000
|
trusted library allocation
|
page read and write
|
||
2130F302000
|
heap
|
page read and write
|
||
2130EA92000
|
heap
|
page read and write
|
||
157F8CA7000
|
heap
|
page read and write
|
||
E7EAA7F000
|
stack
|
page read and write
|
||
21314080000
|
trusted library allocation
|
page read and write
|
||
1451F470000
|
heap
|
page read and write
|
||
1EB9B200000
|
heap
|
page read and write
|
||
212EA602000
|
trusted library allocation
|
page read and write
|
||
11CE5685000
|
heap
|
page read and write
|
||
157F882C000
|
heap
|
page read and write
|
||
157F8CEF000
|
heap
|
page read and write
|
||
EBFBF1B000
|
stack
|
page read and write
|
||
2AD7788F000
|
heap
|
page read and write
|
||
2B066FB5000
|
heap
|
page read and write
|
||
1451F688000
|
heap
|
page read and write
|
||
157F8DF0000
|
heap
|
page read and write
|
||
157F332E000
|
heap
|
page read and write
|
||
12F63500000
|
heap
|
page read and write
|
||
E7EA1CC000
|
stack
|
page read and write
|
||
895E97E000
|
stack
|
page read and write
|
||
157F85F0000
|
remote allocation
|
page read and write
|
||
1999EC55000
|
heap
|
page read and write
|
||
157F8963000
|
heap
|
page read and write
|
||
11D107B000
|
stack
|
page read and write
|
||
157F8D13000
|
heap
|
page read and write
|
||
1ACAAB7E000
|
heap
|
page read and write
|
||
1ACAA24B000
|
heap
|
page read and write
|
||
2130F202000
|
heap
|
page read and write
|
||
157F8834000
|
heap
|
page read and write
|
||
157F89BA000
|
heap
|
page read and write
|
||
157F33CA000
|
heap
|
page read and write
|
||
248994C0000
|
heap
|
page read and write
|
||
B57E47F000
|
stack
|
page read and write
|
||
157F8DAA000
|
heap
|
page read and write
|
||
157F8923000
|
heap
|
page read and write
|
||
EBFCBFC000
|
stack
|
page read and write
|
||
46727F000
|
stack
|
page read and write
|
||
157F35CB000
|
heap
|
page read and write
|
||
157F8CC2000
|
heap
|
page read and write
|
||
46777F000
|
stack
|
page read and write
|
||
157F4100000
|
trusted library allocation
|
page read and write
|
||
1999EC3E000
|
heap
|
page read and write
|
||
157F843C000
|
trusted library allocation
|
page read and write
|
||
212E9E76000
|
heap
|
page read and write
|
||
157F89C5000
|
heap
|
page read and write
|
||
157F8D7A000
|
heap
|
page read and write
|
||
21E362AC000
|
heap
|
page read and write
|
||
1451F66D000
|
heap
|
page read and write
|
||
157F8D69000
|
heap
|
page read and write
|
||
157F3327000
|
heap
|
page read and write
|
||
2002DA02000
|
heap
|
page read and write
|
||
1ACAA2A9000
|
heap
|
page read and write
|
||
E7EA77E000
|
stack
|
page read and write
|
||
2130F1F0000
|
trusted library allocation
|
page read and write
|
||
157F8CA9000
|
heap
|
page read and write
|
||
157F340A000
|
heap
|
page read and write
|
||
B7F3C7E000
|
stack
|
page read and write
|
||
248994E0000
|
heap
|
page read and write
|
||
157F89B0000
|
heap
|
page read and write
|
||
157F8D24000
|
heap
|
page read and write
|
||
1C29E850000
|
heap
|
page read and write
|
||
157F8994000
|
heap
|
page read and write
|
||
157F82C0000
|
trusted library allocation
|
page read and write
|
||
157F89F2000
|
heap
|
page read and write
|
||
1999EC43000
|
heap
|
page read and write
|
||
1999EC45000
|
heap
|
page read and write
|
||
157F8C32000
|
heap
|
page read and write
|
||
24899860000
|
heap
|
page read and write
|
||
157F8430000
|
trusted library allocation
|
page read and write
|
||
1ACAA8F0000
|
remote allocation
|
page read and write
|
||
1ACAA250000
|
heap
|
page read and write
|
||
213142FF000
|
heap
|
page read and write
|
||
72F4D7C000
|
stack
|
page read and write
|
||
79599DB000
|
stack
|
page read and write
|
||
157F8CD3000
|
heap
|
page read and write
|
||
157F882F000
|
heap
|
page read and write
|
||
157F8CA1000
|
heap
|
page read and write
|
||
157F8993000
|
heap
|
page read and write
|
||
21314256000
|
heap
|
page read and write
|
||
1999EBF0000
|
trusted library allocation
|
page read and write
|
||
157F8839000
|
heap
|
page read and write
|
||
2FC48FE000
|
stack
|
page read and write
|
||
157F82D0000
|
trusted library allocation
|
page read and write
|
||
157F8963000
|
heap
|
page read and write
|
||
157F8434000
|
trusted library allocation
|
page read and write
|
||
24EBBE70000
|
heap
|
page read and write
|
||
24EBBF20000
|
heap
|
page read and write
|
||
157F89FA000
|
heap
|
page read and write
|
||
21E361D0000
|
heap
|
page read and write
|
||
1C29E870000
|
heap
|
page read and write
|
||
2130FE20000
|
trusted library allocation
|
page read and write
|
||
2130EA8B000
|
heap
|
page read and write
|
||
21313FF0000
|
trusted library allocation
|
page read and write
|
||
795A07E000
|
stack
|
page read and write
|
||
C3A02DC000
|
stack
|
page read and write
|
||
213142AF000
|
heap
|
page read and write
|
||
2002DA8A000
|
heap
|
page read and write
|
||
D13293C000
|
stack
|
page read and write
|
||
157F8DDC000
|
heap
|
page read and write
|
||
1219AC000
|
stack
|
page read and write
|
||
288C2490000
|
heap
|
page read and write
|
||
157F8CD8000
|
heap
|
page read and write
|
||
2130EAAB000
|
heap
|
page read and write
|
||
186F19E000
|
stack
|
page read and write
|
||
1F73DFF0000
|
heap
|
page read and write
|
||
1D9D39D0000
|
heap
|
page read and write
|
||
157F8DB4000
|
heap
|
page read and write
|
||
157F8900000
|
heap
|
page read and write
|
||
1999EC50000
|
heap
|
page read and write
|
||
157F8DA6000
|
heap
|
page read and write
|
||
157F882F000
|
heap
|
page read and write
|
||
1ACAB002000
|
heap
|
page read and write
|
||
1ACAAB4C000
|
heap
|
page read and write
|
||
157F8C60000
|
heap
|
page read and write
|
||
212E9E66000
|
heap
|
page read and write
|
||
2130EB02000
|
heap
|
page read and write
|
||
597487F000
|
stack
|
page read and write
|
||
157F8DB7000
|
heap
|
page read and write
|
||
157F89BA000
|
heap
|
page read and write
|
||
1DFF4290000
|
heap
|
page read and write
|
||
1D9D3C02000
|
heap
|
page read and write
|
||
5E86EFF000
|
stack
|
page read and write
|
||
157F8CFD000
|
heap
|
page read and write
|
||
2B066E10000
|
heap
|
page read and write
|
||
157F89EC000
|
heap
|
page read and write
|
||
1999EC46000
|
heap
|
page read and write
|
||
1451F4E0000
|
heap
|
page read and write
|
||
157F33C4000
|
heap
|
page read and write
|
||
1EB9BC02000
|
trusted library allocation
|
page read and write
|
||
EBFC47C000
|
stack
|
page read and write
|
||
157F8CEF000
|
heap
|
page read and write
|
||
1ACAA313000
|
heap
|
page read and write
|
||
157F89E5000
|
heap
|
page read and write
|
||
157F8DDC000
|
heap
|
page read and write
|
||
157F8D39000
|
heap
|
page read and write
|
||
2130EB16000
|
heap
|
page read and write
|
||
157F89E8000
|
heap
|
page read and write
|
||
2B066FB0000
|
heap
|
page read and write
|
||
157F8710000
|
trusted library allocation
|
page read and write
|
||
72F4FFF000
|
stack
|
page read and write
|
||
21314303000
|
heap
|
page read and write
|
||
157F35B6000
|
heap
|
page read and write
|
||
157F8D7F000
|
heap
|
page read and write
|
||
157F8969000
|
heap
|
page read and write
|
||
7FFC66E00000
|
unkown
|
page readonly
|
||
2002D8D0000
|
heap
|
page read and write
|
||
157F82D4000
|
trusted library allocation
|
page read and write
|
||
1C29E910000
|
heap
|
page read and write
|
||
21E36EC0000
|
trusted library allocation
|
page read and write
|
||
1ACAA302000
|
heap
|
page read and write
|
||
139DB7E000
|
stack
|
page read and write
|
||
1ACAAB8D000
|
heap
|
page read and write
|
||
157F8C1C000
|
heap
|
page read and write
|
||
21314080000
|
trusted library allocation
|
page read and write
|
||
212E9D60000
|
heap
|
page read and write
|
||
2131423E000
|
heap
|
page read and write
|
||
1ACAA2DB000
|
heap
|
page read and write
|
||
157F2890000
|
heap
|
page read and write
|
||
20CE2C5F000
|
heap
|
page read and write
|
||
157F82DA000
|
trusted library allocation
|
page read and write
|
||
1EB9B437000
|
heap
|
page read and write
|
||
157F82D0000
|
trusted library allocation
|
page read and write
|
||
E7EA6FB000
|
stack
|
page read and write
|
||
157F82C0000
|
trusted library allocation
|
page read and write
|
||
1451F640000
|
heap
|
page read and write
|
||
157F882D000
|
heap
|
page read and write
|
||
20CE3202000
|
trusted library allocation
|
page read and write
|
||
157F8C05000
|
heap
|
page read and write
|
||
21315000000
|
heap
|
page read and write
|
||
12F63569000
|
heap
|
page read and write
|
||
72F50FD000
|
stack
|
page read and write
|
||
157F8C02000
|
heap
|
page read and write
|
||
157F89C0000
|
heap
|
page read and write
|
||
EBFCD79000
|
stack
|
page read and write
|
||
2002D940000
|
heap
|
page read and write
|
||
2AD77888000
|
heap
|
page read and write
|
||
2130F358000
|
heap
|
page read and write
|
||
10CF2102000
|
heap
|
page read and write
|
||
157F882D000
|
heap
|
page read and write
|
||
1999EC6E000
|
heap
|
page read and write
|
||
157F8C0F000
|
heap
|
page read and write
|
||
EBFC77B000
|
stack
|
page read and write
|
||
157F89C1000
|
heap
|
page read and write
|
||
157F8915000
|
heap
|
page read and write
|
||
157F899D000
|
heap
|
page read and write
|
||
1C2A0460000
|
heap
|
page read and write
|
||
157F8C5B000
|
heap
|
page read and write
|
||
157F8C29000
|
heap
|
page read and write
|
||
157F35EF000
|
heap
|
page read and write
|
||
157F8C7E000
|
heap
|
page read and write
|
||
1ACAA2B3000
|
heap
|
page read and write
|
||
248995AF000
|
heap
|
page read and write
|
||
1999EC69000
|
heap
|
page read and write
|
||
1ACAAB3D000
|
heap
|
page read and write
|
||
157F33D9000
|
heap
|
page read and write
|
||
2FC437B000
|
stack
|
page read and write
|
||
157F8650000
|
trusted library allocation
|
page read and write
|
||
157F8C0A000
|
heap
|
page read and write
|
||
12F65120000
|
heap
|
page read and write
|
||
46757D000
|
stack
|
page read and write
|
||
157F8C91000
|
heap
|
page read and write
|
||
157F8C48000
|
heap
|
page read and write
|
||
C3F00FF000
|
stack
|
page read and write
|
||
157F896B000
|
heap
|
page read and write
|
||
2130F304000
|
heap
|
page read and write
|
||
157F331D000
|
heap
|
page read and write
|
||
157F8C38000
|
heap
|
page read and write
|
||
21314302000
|
heap
|
page read and write
|
||
157F8853000
|
heap
|
page read and write
|
||
157F8C40000
|
heap
|
page read and write
|
||
2FC427E000
|
stack
|
page read and write
|
||
2A5A62B0000
|
heap
|
page read and write
|
||
212E9F02000
|
heap
|
page read and write
|
||
157F8D9D000
|
heap
|
page read and write
|
||
72F4EFE000
|
stack
|
page read and write
|
||
2130F9E0000
|
trusted library allocation
|
page read and write
|
||
B57E1CF000
|
stack
|
page read and write
|
||
21313FE0000
|
trusted library allocation
|
page read and write
|
||
1D9D39C0000
|
heap
|
page read and write
|
||
157F8D35000
|
heap
|
page read and write
|
||
157F8DAF000
|
heap
|
page read and write
|
||
157F8D0C000
|
heap
|
page read and write
|
||
248995A1000
|
heap
|
page read and write
|
||
11D11FE000
|
stack
|
page read and write
|
||
1ACAA253000
|
heap
|
page read and write
|
||
157F2990000
|
trusted library allocation
|
page read and write
|
||
10CF20BC000
|
heap
|
page read and write
|
||
157F8C61000
|
heap
|
page read and write
|
||
2002DA70000
|
heap
|
page read and write
|
||
157F8C05000
|
heap
|
page read and write
|
||
157F83F0000
|
trusted library allocation
|
page read and write
|
||
21314110000
|
trusted library allocation
|
page read and write
|
||
212E9E3C000
|
heap
|
page read and write
|
||
213140D0000
|
trusted library allocation
|
page read and write
|
||
10CF2932000
|
heap
|
page read and write
|
||
20CE2A00000
|
heap
|
page read and write
|
||
157F8826000
|
heap
|
page read and write
|
||
1ACAAB13000
|
heap
|
page read and write
|
||
1999EC4C000
|
heap
|
page read and write
|
||
E7EA4FE000
|
stack
|
page read and write
|
||
157F8D70000
|
heap
|
page read and write
|
||
157F8D73000
|
heap
|
page read and write
|
||
157F82E2000
|
trusted library allocation
|
page read and write
|
||
5E87079000
|
stack
|
page read and write
|
||
1D9D3C00000
|
heap
|
page read and write
|
||
288C2498000
|
heap
|
page read and write
|
||
157F8CEF000
|
heap
|
page read and write
|
||
157F3202000
|
heap
|
page read and write
|
||
121CFF000
|
stack
|
page read and write
|
||
157F8E02000
|
heap
|
page read and write
|
||
157F8C1E000
|
heap
|
page read and write
|
||
1D9D3C62000
|
heap
|
page read and write
|
||
157F8C70000
|
heap
|
page read and write
|
||
157F899A000
|
heap
|
page read and write
|
||
11CE5680000
|
heap
|
page read and write
|
||
21E361D9000
|
heap
|
page read and write
|
||
157F843C000
|
trusted library allocation
|
page read and write
|
||
10CF2088000
|
heap
|
page read and write
|
||
157F33CD000
|
heap
|
page read and write
|
||
157F82C0000
|
trusted library allocation
|
page read and write
|
||
157F8CF5000
|
heap
|
page read and write
|
||
180002000
|
direct allocation
|
page readonly
|
||
157F8C4A000
|
heap
|
page read and write
|
||
157F3543000
|
heap
|
page read and write
|
||
1999EC4F000
|
heap
|
page read and write
|
||
157F89B6000
|
heap
|
page read and write
|
||
11CE54E0000
|
heap
|
page read and write
|
||
1ACAAB7C000
|
heap
|
page read and write
|
||
1999EC66000
|
heap
|
page read and write
|
||
157F82CE000
|
trusted library allocation
|
page read and write
|
||
157F345A000
|
heap
|
page read and write
|
||
10CF2023000
|
heap
|
page read and write
|
||
20CE2C02000
|
heap
|
page read and write
|
||
2AD77813000
|
heap
|
page read and write
|
||
157F882D000
|
heap
|
page read and write
|
||
157F89D2000
|
heap
|
page read and write
|
||
157F8CC4000
|
heap
|
page read and write
|
||
2B068850000
|
heap
|
page read and write
|
||
10CF20CA000
|
heap
|
page read and write
|
||
157F8C78000
|
heap
|
page read and write
|
||
157F8862000
|
heap
|
page read and write
|
||
157F3575000
|
heap
|
page read and write
|
||
21314230000
|
heap
|
page read and write
|
||
157F8720000
|
trusted library allocation
|
page read and write
|
||
157F89C1000
|
heap
|
page read and write
|
||
157F8434000
|
trusted library allocation
|
page read and write
|
||
21E36450000
|
trusted library allocation
|
page read and write
|
||
103DFC000
|
stack
|
page read and write
|
||
157F2A71000
|
heap
|
page read and write
|
||
157F8C2E000
|
heap
|
page read and write
|
||
157F3EC0000
|
trusted library section
|
page readonly
|
||
248995A1000
|
heap
|
page read and write
|
||
1ACAA281000
|
heap
|
page read and write
|
||
2130E8E0000
|
heap
|
page read and write
|
||
157F8510000
|
trusted library allocation
|
page read and write
|
||
8EA547B000
|
stack
|
page read and write
|
||
1D9D3A30000
|
heap
|
page read and write
|
||
895E8FE000
|
stack
|
page read and write
|
||
157F336F000
|
heap
|
page read and write
|
||
1451F672000
|
heap
|
page read and write
|
||
7959CFE000
|
stack
|
page read and write
|
||
1ACAA213000
|
heap
|
page read and write
|
||
157F8D6E000
|
heap
|
page read and write
|
||
20CE2C3C000
|
heap
|
page read and write
|
||
20CE3190000
|
remote allocation
|
page read and write
|
||
157F894B000
|
heap
|
page read and write
|
||
213142C1000
|
heap
|
page read and write
|
||
C112AFC000
|
stack
|
page read and write
|
||
12F63490000
|
heap
|
page read and write
|
||
213142E6000
|
heap
|
page read and write
|
||
1999EC47000
|
heap
|
page read and write
|
||
157F3D60000
|
trusted library allocation
|
page read and write
|
||
24899583000
|
heap
|
page read and write
|
||
21313FD0000
|
trusted library allocation
|
page read and write
|
||
288C26F5000
|
heap
|
page read and write
|
||
157F8810000
|
heap
|
page read and write
|
||
157F8C1A000
|
heap
|
page read and write
|
||
157F8C03000
|
heap
|
page read and write
|
||
157F8D46000
|
heap
|
page read and write
|
||
157F40D1000
|
trusted library allocation
|
page read and write
|
||
157F2B8E000
|
heap
|
page read and write
|
||
2FC47FF000
|
unkown
|
page read and write
|
||
157F35D7000
|
heap
|
page read and write
|
||
1ACAA2C5000
|
heap
|
page read and write
|
||
157F8D0E000
|
heap
|
page read and write
|
||
C3A09FB000
|
stack
|
page read and write
|
||
157F8855000
|
heap
|
page read and write
|
||
157F356D000
|
heap
|
page read and write
|
||
157F3ED0000
|
trusted library section
|
page readonly
|
||
46767E000
|
stack
|
page read and write
|
||
7959C7E000
|
stack
|
page read and write
|
||
157F8C1B000
|
heap
|
page read and write
|
||
157F40F0000
|
trusted library allocation
|
page read and write
|
||
10CF20C1000
|
heap
|
page read and write
|
||
1D9D4202000
|
trusted library allocation
|
page read and write
|
||
D1329BF000
|
stack
|
page read and write
|
||
157F8922000
|
heap
|
page read and write
|
||
2131428C000
|
heap
|
page read and write
|
||
212E9D00000
|
heap
|
page read and write
|
||
157F82CC000
|
trusted library allocation
|
page read and write
|
||
157F8600000
|
remote allocation
|
page read and write
|
||
24899599000
|
heap
|
page read and write
|
||
11D13FE000
|
stack
|
page read and write
|
||
157F8C4C000
|
heap
|
page read and write
|
||
21E36250000
|
trusted library allocation
|
page read and write
|
||
157F8CF4000
|
heap
|
page read and write
|
||
157F82D0000
|
trusted library allocation
|
page read and write
|
||
2A5A6250000
|
heap
|
page read and write
|
||
157F8C3B000
|
heap
|
page read and write
|
||
157F8440000
|
trusted library allocation
|
page read and write
|
||
1ACAA2E2000
|
heap
|
page read and write
|
||
2AD77900000
|
heap
|
page read and write
|
||
157F8480000
|
trusted library allocation
|
page read and write
|
||
1F73E325000
|
heap
|
page read and write
|
||
11D0D7E000
|
stack
|
page read and write
|
||
157F8869000
|
heap
|
page read and write
|
||
24EBBD30000
|
heap
|
page read and write
|
||
157F3587000
|
heap
|
page read and write
|
||
157F8CF1000
|
heap
|
page read and write
|
||
157F8C90000
|
heap
|
page read and write
|
||
157F2A5B000
|
heap
|
page read and write
|
||
11D1EFD000
|
stack
|
page read and write
|
||
103D7E000
|
stack
|
page read and write
|
||
157F82DC000
|
trusted library allocation
|
page read and write
|
||
10CF2900000
|
heap
|
page read and write
|
||
157F3EE0000
|
trusted library section
|
page readonly
|
||
1EB9B402000
|
heap
|
page read and write
|
||
157F82DE000
|
trusted library allocation
|
page read and write
|
||
157F8800000
|
heap
|
page read and write
|
||
1ACAAB92000
|
heap
|
page read and write
|
||
1DFF429D000
|
heap
|
page read and write
|
||
11D1FFA000
|
stack
|
page read and write
|
||
157F2A43000
|
heap
|
page read and write
|
||
21314305000
|
heap
|
page read and write
|
||
288C25F0000
|
heap
|
page read and write
|
||
2AD776E0000
|
heap
|
page read and write
|
||
1ACAAB85000
|
heap
|
page read and write
|
||
157F8C2B000
|
heap
|
page read and write
|
||
157F89B6000
|
heap
|
page read and write
|
||
157F89EA000
|
heap
|
page read and write
|
||
157F8C88000
|
heap
|
page read and write
|
||
21E36430000
|
heap
|
page read and write
|
||
1EB9B424000
|
heap
|
page read and write
|
||
1999EC6B000
|
heap
|
page read and write
|
||
157F8CCD000
|
heap
|
page read and write
|
||
1999EC52000
|
heap
|
page read and write
|
||
157F8C8A000
|
heap
|
page read and write
|
||
157F8600000
|
remote allocation
|
page read and write
|
||
157F89B0000
|
heap
|
page read and write
|
||
157F8861000
|
heap
|
page read and write
|
||
157F882F000
|
heap
|
page read and write
|
||
157F8430000
|
trusted library allocation
|
page read and write
|
||
2B066C70000
|
heap
|
page read and write
|
||
157F882F000
|
heap
|
page read and write
|
||
1451F5E0000
|
trusted library allocation
|
page read and write
|
||
157F899D000
|
heap
|
page read and write
|
||
157F8C0B000
|
heap
|
page read and write
|
||
157F8DD4000
|
heap
|
page read and write
|
||
157F8C22000
|
heap
|
page read and write
|
||
213140F0000
|
trusted library allocation
|
page read and write
|
||
157F8430000
|
trusted library allocation
|
page read and write
|
||
11D18FA000
|
stack
|
page read and write
|
||
2130E980000
|
trusted library allocation
|
page read and write
|
||
157F8C55000
|
heap
|
page read and write
|
||
157F84A0000
|
trusted library allocation
|
page read and write
|
||
20CE2BD0000
|
trusted library allocation
|
page read and write
|
||
157F8C1B000
|
heap
|
page read and write
|
||
2FC4677000
|
stack
|
page read and write
|
||
1ACAA0D0000
|
heap
|
page read and write
|
||
157F8C57000
|
heap
|
page read and write
|
||
2A5A6230000
|
heap
|
page read and write
|
||
157F82DC000
|
trusted library allocation
|
page read and write
|
||
C1128FF000
|
stack
|
page read and write
|
||
157F8C8E000
|
heap
|
page read and write
|
||
1999EC49000
|
heap
|
page read and write
|
||
157F8CC8000
|
heap
|
page read and write
|
||
1999EC7F000
|
heap
|
page read and write
|
||
2FC4577000
|
stack
|
page read and write
|
||
2AD78002000
|
trusted library allocation
|
page read and write
|
||
11CE52A0000
|
heap
|
page read and write
|
||
157F8C34000
|
heap
|
page read and write
|
||
157F8C30000
|
heap
|
page read and write
|
||
157F8861000
|
heap
|
page read and write
|
||
157F8C7C000
|
heap
|
page read and write
|
||
157F896E000
|
heap
|
page read and write
|
||
157F8869000
|
heap
|
page read and write
|
||
157F894B000
|
heap
|
page read and write
|
||
157F8D5C000
|
heap
|
page read and write
|
||
157F8C11000
|
heap
|
page read and write
|
||
157F894B000
|
heap
|
page read and write
|
||
157F3358000
|
heap
|
page read and write
|
||
1999EC53000
|
heap
|
page read and write
|
||
157F843C000
|
trusted library allocation
|
page read and write
|
||
157F2A6E000
|
heap
|
page read and write
|
||
2130EB07000
|
heap
|
page read and write
|
||
248995A1000
|
heap
|
page read and write
|
||
1D9D3D13000
|
heap
|
page read and write
|
||
157F82C5000
|
trusted library allocation
|
page read and write
|
||
157F8D94000
|
heap
|
page read and write
|
||
157F89EC000
|
heap
|
page read and write
|
||
21313FB8000
|
trusted library allocation
|
page read and write
|
||
157F8DB2000
|
heap
|
page read and write
|
||
157F8CD2000
|
heap
|
page read and write
|
||
157F89C2000
|
heap
|
page read and write
|
||
157F8C0B000
|
heap
|
page read and write
|
||
157F3A40000
|
trusted library allocation
|
page read and write
|
||
DB1A5FB000
|
stack
|
page read and write
|
||
1D9D3C40000
|
heap
|
page read and write
|
||
DB1A08B000
|
stack
|
page read and write
|
||
11D167A000
|
stack
|
page read and write
|
||
10437F000
|
stack
|
page read and write
|
||
11D17FE000
|
stack
|
page read and write
|
||
157F2A43000
|
heap
|
page read and write
|
||
157F8DFC000
|
heap
|
page read and write
|
||
157F3458000
|
heap
|
page read and write
|
||
157F8C29000
|
heap
|
page read and write
|
||
E7EA47E000
|
stack
|
page read and write
|
||
157F8C15000
|
heap
|
page read and write
|
||
157F8869000
|
heap
|
page read and write
|
||
157F33C8000
|
heap
|
page read and write
|
||
2A5A62B8000
|
heap
|
page read and write
|
||
1ACAB000000
|
heap
|
page read and write
|
||
157F8869000
|
heap
|
page read and write
|
||
21314110000
|
remote allocation
|
page read and write
|
||
157F35B9000
|
heap
|
page read and write
|
||
157F8400000
|
trusted library allocation
|
page read and write
|
||
157F8D16000
|
heap
|
page read and write
|
||
157F8C98000
|
heap
|
page read and write
|
||
157F8838000
|
heap
|
page read and write
|
||
157F8826000
|
heap
|
page read and write
|
||
12F63910000
|
heap
|
page read and write
|
||
1999EC76000
|
heap
|
page read and write
|
||
1ACAA265000
|
heap
|
page read and write
|
||
467A7E000
|
stack
|
page read and write
|
||
1D9D3C68000
|
heap
|
page read and write
|
||
72F527D000
|
stack
|
page read and write
|
||
157F8968000
|
heap
|
page read and write
|
||
157F89EE000
|
heap
|
page read and write
|
||
C112978000
|
stack
|
page read and write
|
||
157F894E000
|
heap
|
page read and write
|
||
157F8826000
|
heap
|
page read and write
|
||
157F8D59000
|
heap
|
page read and write
|
||
157F8CC1000
|
heap
|
page read and write
|
||
2AD77860000
|
heap
|
page read and write
|
||
21E36268000
|
heap
|
page read and write
|
||
157F332C000
|
heap
|
page read and write
|
||
157F884D000
|
heap
|
page read and write
|
||
2002DA4D000
|
heap
|
page read and write
|
||
157F8325000
|
trusted library allocation
|
page read and write
|
||
157F8826000
|
heap
|
page read and write
|
||
21314410000
|
trusted library allocation
|
page read and write
|
||
157F8D83000
|
heap
|
page read and write
|
||
157F89F6000
|
heap
|
page read and write
|
||
1EB9B431000
|
heap
|
page read and write
|
||
8EA54FE000
|
stack
|
page read and write
|
||
157F892B000
|
heap
|
page read and write
|
||
1ACAAB92000
|
heap
|
page read and write
|
||
157F8837000
|
heap
|
page read and write
|
||
157F8C4B000
|
heap
|
page read and write
|
||
1ACAAB94000
|
heap
|
page read and write
|
||
2002DA3C000
|
heap
|
page read and write
|
||
157F8C2C000
|
heap
|
page read and write
|
||
20CE2C13000
|
heap
|
page read and write
|
||
157F89B6000
|
heap
|
page read and write
|
||
157F8C53000
|
heap
|
page read and write
|
||
1F73E240000
|
unclassified section
|
page execute and read and write
|
||
157F8D2F000
|
heap
|
page read and write
|
||
157F82BC000
|
trusted library allocation
|
page read and write
|
||
157F29B0000
|
trusted library allocation
|
page read and write
|
||
157F84C0000
|
trusted library allocation
|
page read and write
|
||
1ACAA2AA000
|
heap
|
page read and write
|
||
157F830E000
|
trusted library allocation
|
page read and write
|
||
157F8CDD000
|
heap
|
page read and write
|
||
11D147E000
|
stack
|
page read and write
|
||
21E36E50000
|
trusted library allocation
|
page read and write
|
||
157F8826000
|
heap
|
page read and write
|
||
27ADACC0000
|
heap
|
page read and write
|
||
1ACAA1D0000
|
trusted library allocation
|
page read and write
|
||
157F8C65000
|
heap
|
page read and write
|
||
157F8C72000
|
heap
|
page read and write
|
||
157F2A8F000
|
heap
|
page read and write
|
||
2130F318000
|
heap
|
page read and write
|
||
24EBD9E0000
|
heap
|
page read and write
|
||
7959F7E000
|
stack
|
page read and write
|
||
2AD77827000
|
heap
|
page read and write
|
||
213140E0000
|
trusted library allocation
|
page read and write
|
||
157F885F000
|
heap
|
page read and write
|
||
157F82D0000
|
trusted library allocation
|
page read and write
|
||
212E9E82000
|
heap
|
page read and write
|
||
157F8C4E000
|
heap
|
page read and write
|
||
2130EAFD000
|
heap
|
page read and write
|
||
157F8D92000
|
heap
|
page read and write
|
||
157F883D000
|
heap
|
page read and write
|
||
1999EB60000
|
heap
|
page read and write
|
||
157F8CAA000
|
heap
|
page read and write
|
||
157F8C6C000
|
heap
|
page read and write
|
||
157F8420000
|
trusted library allocation
|
page read and write
|
||
21313FF4000
|
trusted library allocation
|
page read and write
|
||
B57E14C000
|
stack
|
page read and write
|
||
157F8869000
|
heap
|
page read and write
|
||
157F8420000
|
trusted library allocation
|
page read and write
|
||
2FC49FD000
|
stack
|
page read and write
|
||
157F331D000
|
heap
|
page read and write
|
||
24899591000
|
heap
|
page read and write
|
||
2002DA4B000
|
heap
|
page read and write
|
||
157F8C72000
|
heap
|
page read and write
|
||
1EB9B443000
|
heap
|
page read and write
|
||
466BCB000
|
stack
|
page read and write
|
||
157F8D4E000
|
heap
|
page read and write
|
||
157F89D6000
|
heap
|
page read and write
|
||
157F2A57000
|
heap
|
page read and write
|
||
1ACAA2F4000
|
heap
|
page read and write
|
||
1999EC7E000
|
heap
|
page read and write
|
||
2130EA9D000
|
heap
|
page read and write
|
||
157F8C5C000
|
heap
|
page read and write
|
||
157F8420000
|
trusted library allocation
|
page read and write
|
||
1ACAAB92000
|
heap
|
page read and write
|
||
157F89B6000
|
heap
|
page read and write
|
||
1F73DF60000
|
heap
|
page read and write
|
||
157F8861000
|
heap
|
page read and write
|
||
72F4E7E000
|
stack
|
page read and write
|
||
157F8834000
|
heap
|
page read and write
|
||
10407C000
|
stack
|
page read and write
|
||
DB1A97C000
|
stack
|
page read and write
|
||
157F8826000
|
heap
|
page read and write
|
||
2002DA4F000
|
heap
|
page read and write
|
||
21313FB0000
|
trusted library allocation
|
page read and write
|
||
157F8C46000
|
heap
|
page read and write
|
||
157F2A85000
|
heap
|
page read and write
|
||
157F8D8F000
|
heap
|
page read and write
|
||
21314305000
|
heap
|
page read and write
|
||
1ACAAB90000
|
heap
|
page read and write
|
||
24899594000
|
heap
|
page read and write
|
||
157F8843000
|
heap
|
page read and write
|
||
157F8C97000
|
heap
|
page read and write
|
||
157F3F00000
|
trusted library section
|
page readonly
|
||
1DFF44A0000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
157F8540000
|
trusted library allocation
|
page read and write
|
||
157F8C76000
|
heap
|
page read and write
|
||
157F8982000
|
heap
|
page read and write
|
||
1999EC30000
|
heap
|
page read and write
|
||
2130EA71000
|
heap
|
page read and write
|
||
11D19FD000
|
stack
|
page read and write
|
||
E7EA97F000
|
stack
|
page read and write
|
||
2AD7783C000
|
heap
|
page read and write
|
||
212E9E29000
|
heap
|
page read and write
|
||
157F2820000
|
heap
|
page read and write
|
||
157F8C56000
|
heap
|
page read and write
|
||
11D0F7E000
|
stack
|
page read and write
|
||
1999EC54000
|
heap
|
page read and write
|
||
157F82A0000
|
trusted library allocation
|
page read and write
|
||
157F3D50000
|
trusted library allocation
|
page read and write
|
||
21314110000
|
remote allocation
|
page read and write
|
||
157F82DA000
|
trusted library allocation
|
page read and write
|
||
157F8850000
|
heap
|
page read and write
|
||
2130EA55000
|
heap
|
page read and write
|
||
1ACAAB7E000
|
heap
|
page read and write
|
||
2002E202000
|
trusted library allocation
|
page read and write
|
||
157F8C93000
|
heap
|
page read and write
|
||
157F8C06000
|
heap
|
page read and write
|
||
1ACAA288000
|
heap
|
page read and write
|
||
157F89FE000
|
heap
|
page read and write
|
||
157F8C29000
|
heap
|
page read and write
|
||
157F89B4000
|
heap
|
page read and write
|
||
157F8D1B000
|
heap
|
page read and write
|
||
212E9E61000
|
heap
|
page read and write
|
||
157F89EE000
|
heap
|
page read and write
|
||
1C29EB60000
|
heap
|
page read and write
|
||
1ACAAB5F000
|
heap
|
page read and write
|
||
2130EA41000
|
heap
|
page read and write
|
||
157F82D4000
|
trusted library allocation
|
page read and write
|
||
121C7F000
|
stack
|
page read and write
|
||
157F8963000
|
heap
|
page read and write
|
||
157F8826000
|
heap
|
page read and write
|
||
157F882D000
|
heap
|
page read and write
|
||
157F35F2000
|
heap
|
page read and write
|
||
157F82E0000
|
trusted library allocation
|
page read and write
|
||
157F883A000
|
heap
|
page read and write
|
||
1F73E2D0000
|
heap
|
page read and write
|
||
213142FD000
|
heap
|
page read and write
|
||
1ACAA2BF000
|
heap
|
page read and write
|
||
157F8C3A000
|
heap
|
page read and write
|
||
1D9D3D02000
|
heap
|
page read and write
|
||
4B2EA7C000
|
stack
|
page read and write
|
||
8EA58F7000
|
stack
|
page read and write
|
||
157F89E9000
|
heap
|
page read and write
|
||
157F8660000
|
trusted library allocation
|
page read and write
|
||
157F3569000
|
heap
|
page read and write
|
||
157F8CEF000
|
heap
|
page read and write
|
||
157F894B000
|
heap
|
page read and write
|
||
12F63520000
|
heap
|
page read and write
|
||
157F8922000
|
heap
|
page read and write
|
||
11D16FE000
|
stack
|
page read and write
|
||
157F8500000
|
trusted library allocation
|
page read and write
|
||
C11287E000
|
stack
|
page read and write
|
||
2130F200000
|
heap
|
page read and write
|
||
10CF1DE0000
|
heap
|
page read and write
|
||
157F8D00000
|
heap
|
page read and write
|
||
157F8922000
|
heap
|
page read and write
|
||
157F2A64000
|
heap
|
page read and write
|
||
157F2A94000
|
heap
|
page read and write
|
||
157F834C000
|
trusted library allocation
|
page read and write
|
||
212E9E5B000
|
heap
|
page read and write
|
||
157F882F000
|
heap
|
page read and write
|
||
2AD77908000
|
heap
|
page read and write
|
||
157F884F000
|
heap
|
page read and write
|
||
24899598000
|
heap
|
page read and write
|
||
21314110000
|
remote allocation
|
page read and write
|
||
20CE2C29000
|
heap
|
page read and write
|
||
157F82E0000
|
trusted library allocation
|
page read and write
|
||
1ACAA8F0000
|
remote allocation
|
page read and write
|
||
157F8834000
|
heap
|
page read and write
|
||
1999EC5D000
|
heap
|
page read and write
|
||
157F882D000
|
heap
|
page read and write
|
||
157F8869000
|
heap
|
page read and write
|
||
157F82D6000
|
trusted library allocation
|
page read and write
|
||
597456C000
|
stack
|
page read and write
|
||
157F8848000
|
heap
|
page read and write
|
||
157F89B0000
|
heap
|
page read and write
|
||
2130EA76000
|
heap
|
page read and write
|
||
157F8C4C000
|
heap
|
page read and write
|
||
1C29EB65000
|
heap
|
page read and write
|
||
157F8D53000
|
heap
|
page read and write
|
||
2002DB02000
|
heap
|
page read and write
|
||
2130EA8D000
|
heap
|
page read and write
|
||
157F8922000
|
heap
|
page read and write
|
||
1999EC48000
|
heap
|
page read and write
|
||
157F8C9D000
|
heap
|
page read and write
|
||
288C2440000
|
heap
|
page read and write
|
||
157F899D000
|
heap
|
page read and write
|
||
10CF2113000
|
heap
|
page read and write
|
||
103F7B000
|
stack
|
page read and write
|
||
DB1A18E000
|
stack
|
page read and write
|
||
103EFC000
|
stack
|
page read and write
|
||
11D1AFE000
|
stack
|
page read and write
|
||
157F84D0000
|
trusted library allocation
|
page read and write
|
||
157F8CEF000
|
heap
|
page read and write
|
||
1999EC13000
|
heap
|
page read and write
|
||
2130EA7B000
|
heap
|
page read and write
|
||
2A5A64E0000
|
heap
|
page read and write
|
||
157F882D000
|
heap
|
page read and write
|
||
1DFF4390000
|
heap
|
page read and write
|
||
1451F667000
|
heap
|
page read and write
|
||
157F82DE000
|
trusted library allocation
|
page read and write
|
||
157F8C7F000
|
heap
|
page read and write
|
||
157F89F4000
|
heap
|
page read and write
|
||
157F82C0000
|
trusted library allocation
|
page read and write
|
||
157F8C29000
|
heap
|
page read and write
|
||
2002DB08000
|
heap
|
page read and write
|
||
10CF2043000
|
heap
|
page read and write
|
||
895E87C000
|
stack
|
page read and write
|
||
157F89B0000
|
heap
|
page read and write
|
||
157F843C000
|
trusted library allocation
|
page read and write
|
||
24899582000
|
heap
|
page read and write
|
||
EBFC67E000
|
stack
|
page read and write
|
||
157F8C42000
|
heap
|
page read and write
|
||
157F358B000
|
heap
|
page read and write
|
||
157F899D000
|
heap
|
page read and write
|
||
1999EC85000
|
heap
|
page read and write
|
||
157F830A000
|
trusted library allocation
|
page read and write
|
||
21314300000
|
heap
|
page read and write
|
||
157F8802000
|
heap
|
page read and write
|
||
157F8922000
|
heap
|
page read and write
|
||
1D9D3C5A000
|
heap
|
page read and write
|
||
213140A0000
|
trusted library allocation
|
page read and write
|
||
1EB9B260000
|
heap
|
page read and write
|
||
10CF2802000
|
heap
|
page read and write
|
||
213141F0000
|
trusted library allocation
|
page read and write
|
||
212E9E4D000
|
heap
|
page read and write
|
||
157F3402000
|
heap
|
page read and write
|
||
157F8430000
|
trusted library allocation
|
page read and write
|
||
157F2BC2000
|
heap
|
page read and write
|
||
157F3EB0000
|
trusted library section
|
page readonly
|
||
157F8C13000
|
heap
|
page read and write
|
||
EBFC378000
|
stack
|
page read and write
|
||
11D1BF5000
|
stack
|
page read and write
|
||
157F8180000
|
trusted library allocation
|
page read and write
|
||
157F8CEF000
|
heap
|
page read and write
|
||
27ADAAF9000
|
heap
|
page read and write
|
||
288C2460000
|
heap
|
page read and write
|
||
2130EA58000
|
heap
|
page read and write
|
||
157F8C0D000
|
heap
|
page read and write
|
||
157F8996000
|
heap
|
page read and write
|
||
1ACAA316000
|
heap
|
page read and write
|
||
1ACAAB7C000
|
heap
|
page read and write
|
||
157F8434000
|
trusted library allocation
|
page read and write
|
||
157F830A000
|
trusted library allocation
|
page read and write
|
||
157F8C0D000
|
heap
|
page read and write
|
||
157F8190000
|
trusted library allocation
|
page read and write
|
||
157F8CEF000
|
heap
|
page read and write
|
||
1ACAABD3000
|
heap
|
page read and write
|
||
157F89D6000
|
heap
|
page read and write
|
||
1ACAB044000
|
heap
|
page read and write
|
||
157F8430000
|
trusted library allocation
|
page read and write
|
||
157F8C03000
|
heap
|
page read and write
|
||
46797F000
|
stack
|
page read and write
|
||
2130EB02000
|
heap
|
page read and write
|
||
2A5A6505000
|
heap
|
page read and write
|
||
157F882D000
|
heap
|
page read and write
|
||
157F899F000
|
heap
|
page read and write
|
||
1999EC51000
|
heap
|
page read and write
|
||
157F8420000
|
trusted library allocation
|
page read and write
|
||
11D1CFE000
|
stack
|
page read and write
|
||
2AD77680000
|
heap
|
page read and write
|
||
157F8D31000
|
heap
|
page read and write
|
||
1ACAA2EC000
|
heap
|
page read and write
|
||
157F341B000
|
heap
|
page read and write
|
||
21313EA0000
|
trusted library allocation
|
page read and write
|
||
139DAFE000
|
stack
|
page read and write
|
||
157F82E2000
|
trusted library allocation
|
page read and write
|
||
103C7F000
|
stack
|
page read and write
|
||
157F8C84000
|
heap
|
page read and write
|
||
157F8978000
|
heap
|
page read and write
|
||
213142F7000
|
heap
|
page read and write
|
||
11D157F000
|
stack
|
page read and write
|
||
157F82C5000
|
trusted library allocation
|
page read and write
|
||
157F355C000
|
heap
|
page read and write
|
||
157F8D14000
|
heap
|
page read and write
|
||
157F8D7C000
|
heap
|
page read and write
|
||
157F89EA000
|
heap
|
page read and write
|
||
157F8C7B000
|
heap
|
page read and write
|
||
157F82D4000
|
trusted library allocation
|
page read and write
|
||
4B2F07C000
|
stack
|
page read and write
|
||
1ACAAB94000
|
heap
|
page read and write
|
||
157F830E000
|
trusted library allocation
|
page read and write
|
||
157F8C99000
|
heap
|
page read and write
|
||
157F8993000
|
heap
|
page read and write
|
||
157F8D27000
|
heap
|
page read and write
|
||
157F8C5D000
|
heap
|
page read and write
|
||
1DFF43B0000
|
heap
|
page read and write
|
||
21E36270000
|
heap
|
page read and write
|
||
157F8C7A000
|
heap
|
page read and write
|
||
10CF1DF0000
|
heap
|
page read and write
|
||
8EA567C000
|
stack
|
page read and write
|
||
1ACAB002000
|
heap
|
page read and write
|
||
157F8D06000
|
heap
|
page read and write
|
||
8EA557E000
|
stack
|
page read and write
|
||
157F8CAD000
|
heap
|
page read and write
|
||
1D9D3D00000
|
heap
|
page read and write
|
||
212E9CF0000
|
heap
|
page read and write
|
||
157F35E8000
|
heap
|
page read and write
|
||
21E362C6000
|
heap
|
page read and write
|
||
213142AC000
|
heap
|
page read and write
|
||
157F35B0000
|
heap
|
page read and write
|
||
157F8C09000
|
heap
|
page read and write
|
||
10CF1F50000
|
trusted library allocation
|
page read and write
|
||
157F82D0000
|
trusted library allocation
|
page read and write
|
||
46717B000
|
stack
|
page read and write
|
||
2AD7787F000
|
heap
|
page read and write
|
||
DB1A4FC000
|
stack
|
page read and write
|
||
157F8C18000
|
heap
|
page read and write
|
||
157F3500000
|
heap
|
page read and write
|
||
157F8855000
|
heap
|
page read and write
|
||
1ACAAB92000
|
heap
|
page read and write
|
||
157F82C0000
|
trusted library allocation
|
page read and write
|
||
1EB9B452000
|
heap
|
page read and write
|
||
157F3400000
|
heap
|
page read and write
|
||
157F3FF0000
|
trusted library allocation
|
page read and write
|
||
1F73E320000
|
heap
|
page read and write
|
||
157F8DD1000
|
heap
|
page read and write
|
||
157F8922000
|
heap
|
page read and write
|
||
157F883C000
|
heap
|
page read and write
|
||
157F8838000
|
heap
|
page read and write
|
||
157F3302000
|
heap
|
page read and write
|
||
157F8D6B000
|
heap
|
page read and write
|
||
157F82D8000
|
trusted library allocation
|
page read and write
|
||
2130E9F0000
|
trusted library allocation
|
page read and write
|
||
157F8CC2000
|
heap
|
page read and write
|
||
157F86B0000
|
trusted library allocation
|
page read and write
|
||
20CE29A0000
|
heap
|
page read and write
|
||
157F8C0E000
|
heap
|
page read and write
|
||
1ACAA200000
|
heap
|
page read and write
|
||
157F89C1000
|
heap
|
page read and write
|
||
157F8D91000
|
heap
|
page read and write
|
||
1999EC70000
|
heap
|
page read and write
|
||
1999EC00000
|
heap
|
page read and write
|
||
21313FE0000
|
trusted library allocation
|
page read and write
|
||
157F82C8000
|
trusted library allocation
|
page read and write
|
||
27ADAAF0000
|
heap
|
page read and write
|
||
157F8813000
|
heap
|
page read and write
|
||
157F899D000
|
heap
|
page read and write
|
||
2130EAB9000
|
heap
|
page read and write
|
||
157F8968000
|
heap
|
page read and write
|
||
21E37140000
|
trusted library allocation
|
page read and write
|
||
157F8C29000
|
heap
|
page read and write
|
||
EBFCA7A000
|
stack
|
page read and write
|
||
157F82A0000
|
trusted library allocation
|
page read and write
|
||
213142DF000
|
heap
|
page read and write
|
||
157F8963000
|
heap
|
page read and write
|
||
157F8D57000
|
heap
|
page read and write
|
||
157F8963000
|
heap
|
page read and write
|
||
157F89E6000
|
heap
|
page read and write
|
||
157F8C66000
|
heap
|
page read and write
|
||
157F8D99000
|
heap
|
page read and write
|
||
20CE2D02000
|
heap
|
page read and write
|
||
157F89B6000
|
heap
|
page read and write
|
||
DB1A10E000
|
stack
|
page read and write
|
||
8EA577A000
|
stack
|
page read and write
|
||
21E362AC000
|
heap
|
page read and write
|
||
2002DA7F000
|
heap
|
page read and write
|
||
157F882D000
|
heap
|
page read and write
|
||
1C29E917000
|
heap
|
page read and write
|
||
157F882F000
|
heap
|
page read and write
|
||
157F843C000
|
trusted library allocation
|
page read and write
|
||
157F8DCB000
|
heap
|
page read and write
|
||
10417E000
|
stack
|
page read and write
|
||
157F8D4A000
|
heap
|
page read and write
|
||
21E36230000
|
heap
|
page read and write
|
||
212E9D90000
|
trusted library allocation
|
page read and write
|
||
157F8C80000
|
heap
|
page read and write
|
||
157F8C68000
|
heap
|
page read and write
|
||
157F8C29000
|
heap
|
page read and write
|
||
157F899D000
|
heap
|
page read and write
|
||
157F35C1000
|
heap
|
page read and write
|
||
157F8CBF000
|
heap
|
page read and write
|
||
157F8430000
|
trusted library allocation
|
page read and write
|
||
212E9E57000
|
heap
|
page read and write
|
||
157F8965000
|
heap
|
page read and write
|
||
157F8C08000
|
heap
|
page read and write
|
||
2002DA49000
|
heap
|
page read and write
|
||
24EBBE90000
|
heap
|
page read and write
|
||
212E9F08000
|
heap
|
page read and write
|
||
1451F652000
|
heap
|
page read and write
|
||
157F8C21000
|
heap
|
page read and write
|
||
2AD77851000
|
heap
|
page read and write
|
||
212E9F00000
|
heap
|
page read and write
|
||
157F8DB5000
|
heap
|
page read and write
|
||
C3A08FB000
|
stack
|
page read and write
|
||
157F8100000
|
trusted library allocation
|
page read and write
|
||
21313FD4000
|
trusted library allocation
|
page read and write
|
||
157F8C1F000
|
heap
|
page read and write
|
||
157F2A8A000
|
heap
|
page read and write
|
||
157F894E000
|
heap
|
page read and write
|
||
157F8C33000
|
heap
|
page read and write
|
||
157F89C7000
|
heap
|
page read and write
|
||
7FFC66E01000
|
unkown
|
page execute read
|
||
157F3D48000
|
trusted library allocation
|
page read and write
|
||
24899590000
|
heap
|
page read and write
|
||
157F89FB000
|
heap
|
page read and write
|
||
5E86F7F000
|
stack
|
page read and write
|
||
157F3215000
|
heap
|
page read and write
|
||
21313FBE000
|
trusted library allocation
|
page read and write
|
||
157F8C5F000
|
heap
|
page read and write
|
||
2AD7785C000
|
heap
|
page read and write
|
||
180003000
|
direct allocation
|
page read and write
|
||
27ADACE0000
|
heap
|
page read and write
|
||
157F8C51000
|
heap
|
page read and write
|
||
157F8862000
|
heap
|
page read and write
|
||
21314080000
|
trusted library allocation
|
page read and write
|
||
157F8D6C000
|
heap
|
page read and write
|
||
157F82C8000
|
trusted library allocation
|
page read and write
|
||
8EA5AFD000
|
stack
|
page read and write
|
||
157F8CA3000
|
heap
|
page read and write
|
||
157F8D75000
|
heap
|
page read and write
|
||
157F8861000
|
heap
|
page read and write
|
||
157F8490000
|
trusted library allocation
|
page read and write
|
||
157F8950000
|
heap
|
page read and write
|
||
2130F300000
|
heap
|
page read and write
|
||
157F8C07000
|
heap
|
page read and write
|
||
288C26F0000
|
heap
|
page read and write
|
||
157F8C61000
|
heap
|
page read and write
|
||
157F8D17000
|
heap
|
page read and write
|
||
5E87179000
|
stack
|
page read and write
|
||
C3A07FB000
|
stack
|
page read and write
|
||
1ACAA060000
|
heap
|
page read and write
|
||
1ACAA23C000
|
heap
|
page read and write
|
||
72F517F000
|
stack
|
page read and write
|
||
27ADAE30000
|
heap
|
page read and write
|
||
2FC3F7B000
|
stack
|
page read and write
|
||
157F8CE3000
|
heap
|
page read and write
|
||
1999ED02000
|
heap
|
page read and write
|
||
1999EC6C000
|
heap
|
page read and write
|
||
2130F313000
|
heap
|
page read and write
|
||
1D9D3C13000
|
heap
|
page read and write
|
||
2131424B000
|
heap
|
page read and write
|
||
11D177F000
|
stack
|
page read and write
|
||
1EB9B44A000
|
heap
|
page read and write
|
||
1ACAAA02000
|
heap
|
page read and write
|
||
157F86B3000
|
trusted library allocation
|
page read and write
|
||
21313FD1000
|
trusted library allocation
|
page read and write
|
||
21E37120000
|
heap
|
page readonly
|
||
157F89F8000
|
heap
|
page read and write
|
||
1451F713000
|
heap
|
page read and write
|
||
24EBBF90000
|
heap
|
page read and write
|
||
157F2830000
|
heap
|
page read and write
|
||
157F8420000
|
trusted library allocation
|
page read and write
|
||
1ACAAB94000
|
heap
|
page read and write
|
||
1D9D3C79000
|
heap
|
page read and write
|
||
10CF2013000
|
heap
|
page read and write
|
||
157F8834000
|
heap
|
page read and write
|
||
157F8D64000
|
heap
|
page read and write
|
||
157F899D000
|
heap
|
page read and write
|
||
157F8869000
|
heap
|
page read and write
|
||
157F8C00000
|
heap
|
page read and write
|
||
157F8C8C000
|
heap
|
page read and write
|
||
157F8C9F000
|
heap
|
page read and write
|
||
2AD77800000
|
heap
|
page read and write
|
||
157F8D1A000
|
heap
|
page read and write
|
||
157F8C71000
|
heap
|
page read and write
|
||
157F8981000
|
heap
|
page read and write
|
||
157F82A0000
|
trusted library allocation
|
page read and write
|
||
2AD7785F000
|
heap
|
page read and write
|
||
24EBBF99000
|
heap
|
page read and write
|
||
157F8C3D000
|
heap
|
page read and write
|
||
157F8862000
|
heap
|
page read and write
|
||
2AD77863000
|
heap
|
page read and write
|
||
157F84C0000
|
trusted library allocation
|
page read and write
|
||
157F8D68000
|
heap
|
page read and write
|
||
157F35CE000
|
heap
|
page read and write
|
||
157F8D62000
|
heap
|
page read and write
|
||
C3A0AFE000
|
stack
|
page read and write
|
||
157F3300000
|
heap
|
page read and write
|
||
157F883C000
|
heap
|
page read and write
|
||
157F8C29000
|
heap
|
page read and write
|
||
2130EAFD000
|
heap
|
page read and write
|
||
157F82D2000
|
trusted library allocation
|
page read and write
|
||
1451F600000
|
heap
|
page read and write
|
||
157F8D65000
|
heap
|
page read and write
|
||
2130EA78000
|
heap
|
page read and write
|
||
157F9010000
|
heap
|
page read and write
|
||
21314303000
|
heap
|
page read and write
|
||
157F8D50000
|
heap
|
page read and write
|
||
157F882F000
|
heap
|
page read and write
|
||
2002DB13000
|
heap
|
page read and write
|
||
157F8C77000
|
heap
|
page read and write
|
||
1999EC4A000
|
heap
|
page read and write
|
||
157F89F6000
|
heap
|
page read and write
|
||
11D0E7A000
|
stack
|
page read and write
|
||
10CF2000000
|
heap
|
page read and write
|
||
1999EBC0000
|
heap
|
page read and write
|
||
157F8C6B000
|
heap
|
page read and write
|
||
10CF1E50000
|
heap
|
page read and write
|
||
157F899D000
|
heap
|
page read and write
|
||
24899587000
|
heap
|
page read and write
|
||
20CE3190000
|
remote allocation
|
page read and write
|
||
B7F39CE000
|
stack
|
page read and write
|
||
7FFC66E55000
|
unkown
|
page readonly
|
||
21E36E60000
|
trusted library allocation
|
page read and write
|
||
1DFF4150000
|
heap
|
page read and write
|
||
157F8D78000
|
heap
|
page read and write
|
||
466FFB000
|
stack
|
page read and write
|
||
157F89D0000
|
heap
|
page read and write
|
||
157F8CAE000
|
heap
|
page read and write
|
||
139DA7C000
|
stack
|
page read and write
|
||
10CF20B9000
|
heap
|
page read and write
|
||
21314217000
|
heap
|
page read and write
|
||
1ACAA8F0000
|
remote allocation
|
page read and write
|
||
157F8CC8000
|
heap
|
page read and write
|
||
157F8CBA000
|
heap
|
page read and write
|
||
1ACAA24E000
|
heap
|
page read and write
|
||
157F8434000
|
trusted library allocation
|
page read and write
|
||
1999EB50000
|
heap
|
page read and write
|
||
1999EC75000
|
heap
|
page read and write
|
||
21313FF0000
|
trusted library allocation
|
page read and write
|
||
157F89FE000
|
heap
|
page read and write
|
||
1ACAAB00000
|
heap
|
page read and write
|
||
157F8943000
|
heap
|
page read and write
|
||
12F63915000
|
heap
|
page read and write
|
||
157F8D60000
|
heap
|
page read and write
|
||
157F8861000
|
heap
|
page read and write
|
||
157F894B000
|
heap
|
page read and write
|
||
157F8530000
|
trusted library allocation
|
page read and write
|
||
10369B000
|
stack
|
page read and write
|
||
157F899D000
|
heap
|
page read and write
|
||
2FC3FFE000
|
stack
|
page read and write
|
||
4B2ED7A000
|
stack
|
page read and write
|
||
21314200000
|
heap
|
page read and write
|
||
1EB9B210000
|
heap
|
page read and write
|
||
2130E9F3000
|
trusted library allocation
|
page read and write
|
||
157F3423000
|
heap
|
page read and write
|
||
157F8D5B000
|
heap
|
page read and write
|
||
21313FB0000
|
trusted library allocation
|
page read and write
|
||
1ACAA265000
|
heap
|
page read and write
|
||
157F8CD3000
|
heap
|
page read and write
|
||
1999EC2E000
|
heap
|
page read and write
|
||
157F8325000
|
trusted library allocation
|
page read and write
|
||
11CE5310000
|
heap
|
page read and write
|
||
157F8434000
|
trusted library allocation
|
page read and write
|
||
212E9E78000
|
heap
|
page read and write
|
||
1451F702000
|
heap
|
page read and write
|
||
1ACAA271000
|
heap
|
page read and write
|
||
157F8C29000
|
heap
|
page read and write
|
||
157F8834000
|
heap
|
page read and write
|
||
157F8963000
|
heap
|
page read and write
|
||
157F8CC4000
|
heap
|
page read and write
|
||
1EB9B502000
|
heap
|
page read and write
|
||
5E86E7C000
|
stack
|
page read and write
|
||
157F8C82000
|
heap
|
page read and write
|
||
157F8D7D000
|
heap
|
page read and write
|
||
157F8855000
|
heap
|
page read and write
|
||
157F882F000
|
heap
|
page read and write
|
||
157F2BEB000
|
heap
|
page read and write
|
||
C1129FF000
|
stack
|
page read and write
|
||
157F8CEF000
|
heap
|
page read and write
|
||
20CE3190000
|
remote allocation
|
page read and write
|
||
157F3200000
|
heap
|
page read and write
|
||
24899570000
|
heap
|
page read and write
|
||
212E9E76000
|
heap
|
page read and write
|
||
E7EA877000
|
stack
|
page read and write
|
||
12F63560000
|
heap
|
page read and write
|
||
157F8963000
|
heap
|
page read and write
|
||
21E362AC000
|
heap
|
page read and write
|
||
157F35F6000
|
heap
|
page read and write
|
||
1ACAA249000
|
heap
|
page read and write
|
||
11CE5500000
|
heap
|
page read and write
|
||
157F8CA5000
|
heap
|
page read and write
|
||
21313E20000
|
trusted library allocation
|
page read and write
|
||
21314263000
|
heap
|
page read and write
|
||
21E361D5000
|
heap
|
page read and write
|
||
C112A7E000
|
stack
|
page read and write
|
||
157F8963000
|
heap
|
page read and write
|
||
795A17F000
|
stack
|
page read and write
|
||
2FC477F000
|
stack
|
page read and write
|
||
157F8C36000
|
heap
|
page read and write
|
||
2002DA4A000
|
heap
|
page read and write
|
||
2FC4478000
|
stack
|
page read and write
|
||
157F2A13000
|
heap
|
page read and write
|
||
248995B0000
|
heap
|
page read and write
|
||
157F8663000
|
trusted library allocation
|
page read and write
|
||
157F885C000
|
heap
|
page read and write
|
||
11CE55F0000
|
heap
|
page read and write
|
||
157F8C6E000
|
heap
|
page read and write
|
||
157F8922000
|
heap
|
page read and write
|
||
21314100000
|
trusted library allocation
|
page read and write
|
||
10427D000
|
stack
|
page read and write
|
||
8EA59FE000
|
stack
|
page read and write
|
||
157F8941000
|
heap
|
page read and write
|
||
DB1A67F000
|
stack
|
page read and write
|
||
4B2EF7F000
|
stack
|
page read and write
|
||
157F8410000
|
trusted library allocation
|
page read and write
|
||
157F82D2000
|
trusted library allocation
|
page read and write
|
||
157F8869000
|
heap
|
page read and write
|
||
157F8DDF000
|
heap
|
page read and write
|
||
157F8C95000
|
heap
|
page read and write
|
||
157F82DC000
|
trusted library allocation
|
page read and write
|
||
2AD77829000
|
heap
|
page read and write
|
||
157F89E6000
|
heap
|
page read and write
|
||
2130FE01000
|
trusted library allocation
|
page read and write
|
||
157F8CBF000
|
heap
|
page read and write
|
||
157F8998000
|
heap
|
page read and write
|
||
157F8D2B000
|
heap
|
page read and write
|
||
1EB9B43E000
|
heap
|
page read and write
|
||
24EBBF25000
|
heap
|
page read and write
|
||
157F3EF0000
|
trusted library section
|
page readonly
|
||
1ACAABD5000
|
heap
|
page read and write
|
||
2002D8E0000
|
heap
|
page read and write
|
||
27ADC6C0000
|
heap
|
page read and write
|
||
24899865000
|
heap
|
page read and write
|
||
C3F017E000
|
stack
|
page read and write
|
||
157F8CAC000
|
heap
|
page read and write
|
||
EBFC57B000
|
stack
|
page read and write
|
||
157F8826000
|
heap
|
page read and write
|
||
157F8110000
|
trusted library allocation
|
page read and write
|
||
157F843C000
|
trusted library allocation
|
page read and write
|
||
2130F318000
|
heap
|
page read and write
|
||
DB1AA7F000
|
stack
|
page read and write
|
||
213140C0000
|
trusted library allocation
|
page read and write
|
||
157F3565000
|
heap
|
page read and write
|
||
157F893C000
|
heap
|
page read and write
|
||
11D0C7C000
|
stack
|
page read and write
|
||
157F8410000
|
trusted library allocation
|
page read and write
|
||
157F8CEF000
|
heap
|
page read and write
|
||
24899593000
|
heap
|
page read and write
|
||
157F8C63000
|
heap
|
page read and write
|
||
4B2EE79000
|
stack
|
page read and write
|
||
C3F007C000
|
stack
|
page read and write
|
||
1ACAAB84000
|
heap
|
page read and write
|
||
157F8853000
|
heap
|
page read and write
|
||
157F82C0000
|
trusted library allocation
|
page read and write
|
||
2130F215000
|
heap
|
page read and write
|
||
157F33E1000
|
heap
|
page read and write
|
||
157F9010000
|
heap
|
page read and write
|
||
DB1A777000
|
stack
|
page read and write
|
||
157F8D89000
|
heap
|
page read and write
|
||
2002D970000
|
trusted library allocation
|
page read and write
|
||
157F8340000
|
trusted library allocation
|
page read and write
|
||
212E9E00000
|
heap
|
page read and write
|
||
157F8360000
|
trusted library allocation
|
page read and write
|
||
157F883F000
|
heap
|
page read and write
|
||
157F8C3E000
|
heap
|
page read and write
|
||
1ACAA2EA000
|
heap
|
page read and write
|
||
157F82CC000
|
trusted library allocation
|
page read and write
|
||
7C9A6FD000
|
stack
|
page read and write
|
||
1999F402000
|
trusted library allocation
|
page read and write
|
||
157F8834000
|
heap
|
page read and write
|
||
2002DA4E000
|
heap
|
page read and write
|
||
B7F394C000
|
stack
|
page read and write
|
||
157F89E5000
|
heap
|
page read and write
|
||
157F8834000
|
heap
|
page read and write
|
||
2B066DD0000
|
heap
|
page read and write
|
||
157F8C16000
|
heap
|
page read and write
|
||
24899390000
|
heap
|
page read and write
|
||
157F8DA2000
|
heap
|
page read and write
|
||
1451FE02000
|
trusted library allocation
|
page read and write
|
||
212E9E5E000
|
heap
|
page read and write
|
||
157F894B000
|
heap
|
page read and write
|
||
157F82BC000
|
trusted library allocation
|
page read and write
|
||
2AD7787F000
|
heap
|
page read and write
|
||
2A5A6500000
|
heap
|
page read and write
|
||
2002DB00000
|
heap
|
page read and write
|
||
2002DA29000
|
heap
|
page read and write
|
||
1999EC2A000
|
heap
|
page read and write
|
||
1451F602000
|
heap
|
page read and write
|
||
157F8D39000
|
heap
|
page read and write
|
||
59745EF000
|
stack
|
page read and write
|
||
157F33CF000
|
heap
|
page read and write
|
||
2002DA13000
|
heap
|
page read and write
|
||
157F8CC6000
|
heap
|
page read and write
|
||
10CF206D000
|
heap
|
page read and write
|
||
1ACAA070000
|
heap
|
page read and write
|
||
1F73DFD0000
|
heap
|
page read and write
|
||
157F89C4000
|
heap
|
page read and write
|
||
21E361C0000
|
heap
|
page read and write
|
||
11D10F9000
|
stack
|
page read and write
|
||
157F8826000
|
heap
|
page read and write
|
||
2B066DB0000
|
heap
|
page read and write
|
||
157F89F0000
|
heap
|
page read and write
|
||
157F8964000
|
heap
|
page read and write
|
||
2130E950000
|
heap
|
page read and write
|
||
1451F480000
|
heap
|
page read and write
|
||
EBFCF7F000
|
stack
|
page read and write
|
||
DB1A87E000
|
stack
|
page read and write
|
||
157F2A28000
|
heap
|
page read and write
|
||
21313E90000
|
trusted library allocation
|
page read and write
|
||
1C29E710000
|
heap
|
page read and write
|
||
5E86FFA000
|
stack
|
page read and write
|
||
157F3390000
|
heap
|
page read and write
|
||
11D12FA000
|
stack
|
page read and write
|
||
1F73E070000
|
heap
|
page read and write
|
||
157F82D6000
|
trusted library allocation
|
page read and write
|
||
157F885B000
|
heap
|
page read and write
|
||
157F8C0F000
|
heap
|
page read and write
|
||
72F49AB000
|
stack
|
page read and write
|
||
20CE2990000
|
heap
|
page read and write
|
||
157F8C64000
|
heap
|
page read and write
|
||
7959E7E000
|
stack
|
page read and write
|
||
157F8CC6000
|
heap
|
page read and write
|
||
157F8D47000
|
heap
|
page read and write
|
||
1ACAA229000
|
heap
|
page read and write
|
||
2AD77670000
|
heap
|
page read and write
|
||
157F8922000
|
heap
|
page read and write
|
||
157F82D8000
|
trusted library allocation
|
page read and write
|
||
1999EC7C000
|
heap
|
page read and write
|
||
157F8C59000
|
heap
|
page read and write
|
||
2130EA29000
|
heap
|
page read and write
|
||
21E37110000
|
trusted library allocation
|
page read and write
|
||
1EB9B400000
|
heap
|
page read and write
|
||
157F894F000
|
heap
|
page read and write
|
||
157F8858000
|
heap
|
page read and write
|
||
212E9E13000
|
heap
|
page read and write
|
||
1ACAAB11000
|
heap
|
page read and write
|
||
157F8CEF000
|
heap
|
page read and write
|
||
157F3AC0000
|
trusted library allocation
|
page read and write
|
||
157F8CCF000
|
heap
|
page read and write
|
||
157F8C73000
|
heap
|
page read and write
|
||
2A5A60F0000
|
heap
|
page read and write
|
||
21E37130000
|
trusted library allocation
|
page read and write
|
||
1451F629000
|
heap
|
page read and write
|
||
1999EC32000
|
heap
|
page read and write
|
||
157F8DA4000
|
heap
|
page read and write
|
||
10CF2029000
|
heap
|
page read and write
|
||
1451F613000
|
heap
|
page read and write
|
||
1999EC5D000
|
heap
|
page read and write
|
||
288C2300000
|
heap
|
page read and write
|
||
157F3596000
|
heap
|
page read and write
|
||
157F8CD7000
|
heap
|
page read and write
|
||
1ACAAB88000
|
heap
|
page read and write
|
||
157F8C9B000
|
heap
|
page read and write
|
||
157F2B13000
|
heap
|
page read and write
|
||
157F8C29000
|
heap
|
page read and write
|
||
1999EC42000
|
heap
|
page read and write
|
||
157F8D5E000
|
heap
|
page read and write
|
||
5E870FE000
|
stack
|
page read and write
|
||
157F8C0A000
|
heap
|
page read and write
|
||
157F8D4C000
|
heap
|
page read and write
|
||
1EB9B360000
|
trusted library allocation
|
page read and write
|
||
21314222000
|
heap
|
page read and write
|
||
157F2A00000
|
heap
|
page read and write
|
||
157F8434000
|
trusted library allocation
|
page read and write
|
||
157F3D40000
|
trusted library allocation
|
page read and write
|
||
157F8C3A000
|
heap
|
page read and write
|
||
157F8869000
|
heap
|
page read and write
|
There are 1275 hidden memdumps, click here to show them.