Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
DQxttu2Qrr.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\61312899942613011832.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\1000018002\avicapn32.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\1000019012\syncfiles.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\syncfiles[1].dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\avicapn32[1].exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\umciavi32[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\umciavi64[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\Emit64[1].exe
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\nppshell[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000017001\Emit64.exe
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\advapi32.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\jekppnay.tmp
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\1000020000\umciavi64.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\1000021000\umciavi32.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\c33e9ad058e5d3\cred64.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Locktime\RtkAudUService64.exe
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\System32\drivers\etc\hosts
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\11164286057916229991747962
|
SQLite 3.x database, last written using SQLite version 3038005, file counter 17, database pages 7, 1st free page 5, free pages
2, cookie 0x13, schema 4, UTF-8, version-valid-for 17
|
dropped
|
||
C:\ProgramData\11693430970401306944494184
|
SQLite 3.x database, last written using SQLite version 3038005, file counter 7, database pages 36, 1st free page 10, free
pages 1, cookie 0x29, schema 4, UTF-8, version-valid-for 7
|
dropped
|
||
C:\ProgramData\14765269315554389947119608
|
SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 2, database pages 23, cookie
0x19, schema 4, UTF-8, version-valid-for 2
|
dropped
|
||
C:\ProgramData\17061304525933759500214796
|
SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 4, database pages 45, cookie
0x3d, schema 4, UTF-8, version-valid-for 4
|
dropped
|
||
C:\ProgramData\44571614278734644827034568
|
SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 4, database pages 45, cookie
0x3d, schema 4, UTF-8, version-valid-for 4
|
dropped
|
||
C:\ProgramData\48205952313381291261104955
|
SQLite 3.x database, last written using SQLite version 3038005, file counter 7, database pages 36, 1st free page 10, free
pages 1, cookie 0x29, schema 4, UTF-8, version-valid-for 7
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\library[1].bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\resource[1].bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\minor[2].bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\853321935212
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024,
components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fzpuqn5z.g0g.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yjjnzwnv.xjd.psm1
|
very short file (no magic)
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with no line terminators
|
dropped
|
||
\Device\Mup\computer\PIPE\samr
|
GLS_BINARY_LSB_FIRST
|
dropped
|
There are 26 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\DQxttu2Qrr.exe
|
C:\Users\user\Desktop\DQxttu2Qrr.exe
|
||
C:\ProgramData\61312899942613011832.exe
|
"C:\ProgramData\61312899942613011832.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\user\Desktop\DQxttu2Qrr.exe" & exit
|
||
C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe
|
"C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe"
/F
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "user:N"&&CACLS "gntuud.exe" /P "user:R" /E&&echo Y|CACLS "..\03bd543fce"
/P "user:N"&&CACLS "..\03bd543fce" /P "user:R" /E&&Exit
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
|
||
C:\Windows\SysWOW64\rundll32.exe
|
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\c33e9ad058e5d3\cred64.dll, Main
|
||
C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe
|
C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe
|
||
C:\Users\user\AppData\Local\Temp\1000017001\Emit64.exe
|
"C:\Users\user\AppData\Local\Temp\1000017001\Emit64.exe"
|
||
C:\Users\user\1000018002\avicapn32.exe
|
"C:\Users\user\1000018002\avicapn32.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg
delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc"
/f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits"
/f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac
0 & powercfg /x -standby-timeout-dc 0
|
||
C:\Windows\System32\powercfg.exe
|
powercfg /x -hibernate-timeout-ac 0
|
||
C:\Windows\System32\powercfg.exe
|
powercfg /x -hibernate-timeout-dc 0
|
||
C:\Windows\System32\powercfg.exe
|
powercfg /x -standby-timeout-ac 0
|
||
C:\Windows\System32\powercfg.exe
|
powercfg /x -standby-timeout-dc 0
|
||
C:\Windows\System32\reg.exe
|
reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
|
||
C:\Windows\SysWOW64\rundll32.exe
|
"C:\Windows\System32\rundll32.exe" C:\Users\user\1000019012\syncfiles.dll, rundll
|
||
C:\Windows\System32\reg.exe
|
reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
|
||
C:\Windows\System32\reg.exe
|
reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
|
||
C:\Windows\System32\reg.exe
|
reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
|
||
C:\Windows\System32\reg.exe
|
reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
|
||
C:\Users\user\AppData\Roaming\1000020000\umciavi64.exe
|
"C:\Users\user\AppData\Roaming\1000020000\umciavi64.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\timeout.exe
|
timeout /t 6
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cacls.exe
|
CACLS "gntuud.exe" /P "user:N"
|
||
C:\Windows\SysWOW64\cacls.exe
|
CACLS "gntuud.exe" /P "user:R" /E
|
||
C:\Windows\SysWOW64\cacls.exe
|
CACLS "..\03bd543fce" /P "user:N"
|
||
C:\Windows\SysWOW64\cacls.exe
|
CACLS "..\03bd543fce" /P "user:R" /E
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qgoyddbo#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator))
{ IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn
'RtkAudUService64.exe' /tr '''C:\Users\user\Locktime\RtkAudUService64.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction
-Execute 'C:\Users\user\Locktime\RtkAudUService64.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet
-AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan
-Days 1000)) -TaskName 'RtkAudUService64.exe' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run"
/v "RtkAudUService64.exe" /t REG_SZ /f /d 'C:\Users\user\Locktime\RtkAudUService64.exe' }
|
||
C:\Windows\System32\sc.exe
|
sc stop UsoSvc
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
sc stop WaaSMedicSvc
|
||
C:\Windows\System32\sc.exe
|
sc stop wuauserv
|
||
C:\Windows\System32\sc.exe
|
sc stop bits
|
||
C:\Windows\System32\sc.exe
|
sc stop dosvc
|
There are 32 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://65.21.119.56:80
|
|||
85.209.135.109/jg94cVd30f/index.php
|
|||
https://bitbucket.org/alfolod79597/advancedapi32/downloads/minor.bin
|
unknown
|
||
http://cjdlifvn3qkbi0ymi0ma.wclwox4jcqzsnqbjvs/)a
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
https://bitbucket.org/alfolod79597/advancedapi32/downloads/minor.bin8
|
unknown
|
||
https://bbuseruploads.s3.amazonaws.com/f3ef24fc-08b2-408a-a2c5-1fad12572ea6/downloads/b803c041-f8b5-
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://ripple-wells-2022.net/
|
unknown
|
||
https://www.google.com/intl/en_uk/chrome/https://www.google.com/intl/en_uk/chrome/https://www.google
|
unknown
|
||
https://steamcommunity.com/profiles/76561199441933804
|
unknown
|
||
https://bitbucket.org/alfolod79597/advancedapi32/downloads/minor.binR
|
unknown
|
||
https://t.me/vmt001
|
|||
http://cjdlifvn3qkbi0ymi0ma.wclwox4jcqzsnqbjvs/
|
unknown
|
||
http://65.21.119.56:80/update.zip
|
unknown
|
||
https://support.google.com/chrome/answer/6315198?product=
|
unknown
|
||
https://bitbucket.org/alfolod79597/advancedapi32/downloads/library.bin
|
unknown
|
||
https://d301sr5gafysq2.cloudfront.net;
|
unknown
|
||
https://support.google.com/chrome/answer/111996?visit_id=637962485686793996-3320600880&p=update_erro
|
unknown
|
||
https://www.google.com/intl/en_uk/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrows
|
unknown
|
||
https://bitbucket.org/alfolod79597/advancedapi32/downloads/resource.bin0c9c7142b75e/library.bin
|
unknown
|
||
https://bitbucket.org/alfolod79597/advancedapi32/downloads/resource.binn
|
unknown
|
||
https://www.google.com/intl/en_uk/chrome/
|
unknown
|
||
https://bitbucket.org/alfolod79597/advancedapi32/downloads/resource.bint
|
unknown
|
||
https://bitbucket.org/ww
|
unknown
|
||
http://65.21.119.56:80/update.zipb0dfc5b548762778904926-d06ed635-68f6-4e9a-955c-90ce-806e6f6e6963
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://bbuseruploads.s3.amazonaws.com/f3ef24fc-08b2-408a-a2c5-1fad12572ea6/downloads/b97f81fe-0ba4-
|
unknown
|
||
https://bitbucket.org/alfolod79597/advancedapi32/downloads/resource.bin
|
unknown
|
||
https://bitbucket.org/alfolod79597/advancedapi32/downloads/minor.bin6
|
unknown
|
||
https://support.google.com/chrome?p=update_error
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://65.21.119.56:80https://t.me/vmt001hello0;open_open
|
unknown
|
||
https://bbuseruploads.s3.amazonaws.com/E
|
unknown
|
||
https://bbuseruploads.s3.amazonaws.com/H
|
unknown
|
||
https://bitbucket.org/alfolod79597/advancedapi32/downloads/resource.bind
|
unknown
|
||
http://www.sqlite.org/copyright.html.
|
unknown
|
||
https://bbuseruploads.s3.amazonaws.com/l
|
unknown
|
||
https://bitbucket.org/
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
https://t.me/dishastahttps://steamcommunity.com/profiles/76561199441933804http://167.235.150.8:80dis
|
unknown
|
||
https://www.google.com/search?q=chrome&oq=chrome&aqs=chrome..69i57j0j5l3j69i60l3.2663j0j4&sourceid=c
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://bbuseruploads.s3.amazonaws.com/f3ef24fc-08b2-408a-a2c5-1fad12572ea6/down.
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://bbuseruploads.s3.amazonaws.com/f3ef24fc-08b2-408a-a2c5-1fad12572ea6/downloads/cba79466-746d-
|
unknown
|
||
https://web-security-reports.services.atlassian.com/csp-report/bb-website
|
unknown
|
||
http://cjDliFVN3QKbi0ymi0MA.WclWOx4jCqZsNQbjvsAivMLJa9uT5DhrasATByTHQ5iENK14UsJkLrDsnRarngdZ7r0MiULb
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://bitbucket.org/versal
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://support.google.com/installer/?product=
|
unknown
|
||
http://167.235.150.8:80
|
unknown
|
||
https://bitbucket.org/alfolod79597/advancedapi32/downloads/resource.bin8
|
unknown
|
||
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
|
unknown
|
||
https://bitbucket.org/alfolod79597/advancedapi32/downloads/library.binIua2gnOxsYQNjWglYDZ3357MMJTmqF
|
unknown
|
||
https://bitbucket.org/alfolod79597
|
unknown
|
||
https://ion=v4.5
|
unknown
|
||
http://www.zlib.net/D
|
unknown
|
||
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://bitbucket.org/D
|
unknown
|
||
https://bitbucket.org/alfolod79597/advancedapi32/downloads/minor.binin
|
unknown
|
||
https://aui-cdn.atlassian.com
|
unknown
|
||
https://bbuseruploads.s3.amazonaws.com/
|
unknown
|
||
https://bitbucket.org/alfolod79597/advancedapi32/downloads/minor.binl
|
unknown
|
||
https://t.me/dishasta
|
unknown
|
There are 61 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
65.21.119.56
|
unknown
|
United States
|
||
89.22.236.225
|
unknown
|
Russian Federation
|
||
85.209.135.109
|
unknown
|
Germany
|
||
192.168.2.3
|
unknown
|
unknown
|
||
8.8.8.8
|
unknown
|
United States
|
||
104.192.141.1
|
unknown
|
United States
|
||
45.159.188.118
|
unknown
|
Netherlands
|
||
54.231.164.65
|
unknown
|
United States
|
||
88.119.169.157
|
unknown
|
Lithuania
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
|
syncfiles.dll
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
|
umciavi64.exe
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
|
umciavi32.exe
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
|
Startup
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3D1000
|
unkown
|
page execute read
|
||
10C5000
|
unkown
|
page readonly
|
||
F230000
|
trusted library allocation
|
page read and write
|
||
F0D2000
|
trusted library allocation
|
page execute and read and write
|
||
E00000
|
unkown
|
page readonly
|
||
F0D0000
|
trusted library allocation
|
page read and write
|
||
F2F1000
|
trusted library allocation
|
page read and write
|
||
1151000
|
unkown
|
page execute read
|
||
E00000
|
unkown
|
page readonly
|
||
1CB7000
|
heap
|
page read and write
|
||
1A095EF9000
|
trusted library allocation
|
page read and write
|
||
1A0ACB40000
|
trusted library allocation
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
1D290DB0000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0AC726000
|
heap
|
page read and write
|
||
83C000
|
heap
|
page read and write
|
||
61EB4000
|
direct allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
14030000
|
direct allocation
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
EF0E000
|
stack
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1BD28E40000
|
unkown
|
page readonly
|
||
61D8A7D000
|
stack
|
page read and write
|
||
316E000
|
stack
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
3851000
|
heap
|
page read and write
|
||
1A0AC75C000
|
heap
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
790000
|
trusted library allocation
|
page read and write
|
||
1A0ACB61000
|
trusted library allocation
|
page read and write
|
||
2650AFF000
|
stack
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
2359C666000
|
heap
|
page read and write
|
||
2359C661000
|
heap
|
page read and write
|
||
1C7D1C6A000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
18FB6C13000
|
heap
|
page read and write
|
||
7FFBAFD90000
|
trusted library allocation
|
page read and write
|
||
A19000
|
heap
|
page read and write
|
||
C1E73FF000
|
stack
|
page read and write
|
||
34FE000
|
stack
|
page read and write
|
||
9FD64F5000
|
stack
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
354DBFF000
|
stack
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1A094E79000
|
trusted library allocation
|
page read and write
|
||
4C2236C000
|
stack
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
4BAE000
|
stack
|
page read and write
|
||
7DF4D4AE0000
|
trusted library allocation
|
page execute and read and write
|
||
1110000
|
heap
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0ACCB0000
|
trusted library allocation
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
7FFBAFD20000
|
trusted library allocation
|
page read and write
|
||
42A1000
|
trusted library allocation
|
page read and write
|
||
2FAD000
|
stack
|
page read and write
|
||
26445AA5000
|
heap
|
page read and write
|
||
1A0AC6F5000
|
heap
|
page read and write
|
||
14CB000
|
unkown
|
page execute read
|
||
750000
|
trusted library allocation
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
14008000
|
direct allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
156A000
|
heap
|
page read and write
|
||
7FFBAFE50000
|
trusted library allocation
|
page read and write
|
||
1830B155000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
7FFBAF9B4000
|
trusted library allocation
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0958B2000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
3851000
|
heap
|
page read and write
|
||
14048000
|
direct allocation
|
page read and write
|
||
7FFBAFBC0000
|
trusted library allocation
|
page read and write
|
||
C1E75FB000
|
stack
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
7FFBAFBD0000
|
trusted library allocation
|
page read and write
|
||
1A0926DC000
|
heap
|
page read and write
|
||
1A0ACF20000
|
trusted library allocation
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
7FFBAFA40000
|
trusted library allocation
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
F76000
|
unkown
|
page readonly
|
||
1A0ACAE6000
|
heap
|
page read and write
|
||
12DDA8D0000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
14245FF000
|
stack
|
page read and write
|
||
B9B000
|
stack
|
page read and write
|
||
CDD26FE000
|
stack
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1C64000
|
heap
|
page read and write
|
||
2359C560000
|
heap
|
page read and write
|
||
1A0ACCA0000
|
trusted library allocation
|
page read and write
|
||
1A0ACB68000
|
trusted library allocation
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
4C0E000
|
stack
|
page read and write
|
||
2359C658000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
75A3B7F000
|
stack
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
7FFBAFAB0000
|
trusted library allocation
|
page execute and read and write
|
||
1A0ACCA0000
|
trusted library allocation
|
page read and write
|
||
7FFBAF9BD000
|
trusted library allocation
|
page execute and read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
7FFBF20D0000
|
direct allocation
|
page execute read
|
||
29E3000
|
trusted library allocation
|
page execute and read and write
|
||
1484000
|
heap
|
page read and write
|
||
1A0ACA5D000
|
heap
|
page read and write
|
||
FDC000
|
stack
|
page read and write
|
||
7FFBAF9AB000
|
trusted library allocation
|
page read and write
|
||
1C20B205000
|
heap
|
page read and write
|
||
1A0ACCD0000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1A095874000
|
trusted library allocation
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
2359C662000
|
heap
|
page read and write
|
||
1A095656000
|
trusted library allocation
|
page read and write
|
||
1A0960F9000
|
trusted library allocation
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
1A0A4632000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
465E000
|
trusted library allocation
|
page read and write
|
||
1A0A4617000
|
trusted library allocation
|
page read and write
|
||
13FB0000
|
direct allocation
|
page read and write
|
||
D6BF000
|
stack
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1A0ACCA7000
|
trusted library allocation
|
page read and write
|
||
15921E00000
|
heap
|
page read and write
|
||
1A0957EB000
|
trusted library allocation
|
page read and write
|
||
18FB6C3C000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
7FF675FF8000
|
unkown
|
page execute read
|
||
1A0ACEE0000
|
heap
|
page read and write
|
||
1A0ACB62000
|
trusted library allocation
|
page read and write
|
||
1A0ACC80000
|
trusted library allocation
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
1A0ACB40000
|
trusted library allocation
|
page read and write
|
||
27A7F000
|
trusted library allocation
|
page read and write
|
||
1830AE80000
|
heap
|
page read and write
|
||
C0F000
|
stack
|
page read and write
|
||
7ED000
|
unkown
|
page execute read
|
||
6B4000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A094548000
|
trusted library allocation
|
page read and write
|
||
7FF6758A0000
|
unkown
|
page read and write
|
||
F0F0000
|
remote allocation
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
27895000
|
trusted library allocation
|
page read and write
|
||
14247FF000
|
stack
|
page read and write
|
||
32E0000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
DA3F000
|
stack
|
page read and write
|
||
1A094188000
|
heap
|
page read and write
|
||
1A464FF000
|
stack
|
page read and write
|
||
35BE000
|
stack
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
13DAF000
|
stack
|
page read and write
|
||
1A0ACF30000
|
trusted library allocation
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
2ED7000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
27E9B3B0000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
27A78000
|
trusted library allocation
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
31B0000
|
trusted library allocation
|
page read and write
|
||
21501F70000
|
direct allocation
|
page execute and read and write
|
||
1A0AC732000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
27A76000
|
trusted library allocation
|
page read and write
|
||
1D28F42A000
|
heap
|
page read and write
|
||
1A0ACB20000
|
trusted library allocation
|
page read and write
|
||
1A0ACB40000
|
trusted library allocation
|
page read and write
|
||
27A76000
|
trusted library allocation
|
page read and write
|
||
1A0ACA0F000
|
heap
|
page read and write
|
||
1A0957BF000
|
trusted library allocation
|
page read and write
|
||
845000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1A09570B000
|
trusted library allocation
|
page read and write
|
||
C1E72FC000
|
stack
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
9FD657F000
|
stack
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
1A0ACC80000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
7FFBAF994000
|
trusted library allocation
|
page read and write
|
||
BC1000
|
unkown
|
page execute read
|
||
684000
|
heap
|
page read and write
|
||
F1952FF000
|
stack
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
287E000
|
stack
|
page read and write
|
||
1A42EDB0000
|
heap
|
page read and write
|
||
27A98000
|
trusted library allocation
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
15921D90000
|
trusted library allocation
|
page read and write
|
||
7FFBAF9EC000
|
trusted library allocation
|
page execute and read and write
|
||
84A000
|
heap
|
page read and write
|
||
27AD0000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
7FFBAFDF0000
|
trusted library allocation
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
20A7E480000
|
remote allocation
|
page execute and read and write
|
||
7DF4D4AD0000
|
trusted library allocation
|
page execute and read and write
|
||
1A0ACF60000
|
trusted library allocation
|
page read and write
|
||
27AD0000
|
trusted library allocation
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
2359CE02000
|
trusted library allocation
|
page read and write
|
||
1A0ACB24000
|
trusted library allocation
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
9C357D000
|
stack
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1401A000
|
direct allocation
|
page read and write
|
||
BC0000
|
unkown
|
page readonly
|
||
E1E000
|
stack
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
7FF675890000
|
unkown
|
page readonly
|
||
1111000
|
heap
|
page read and write
|
||
3851000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
7FFBAFD10000
|
trusted library allocation
|
page read and write
|
||
2359C65E000
|
heap
|
page read and write
|
||
1D28F502000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1A0ACA6A000
|
heap
|
page read and write
|
||
1A0958C6000
|
trusted library allocation
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
1A0ACB00000
|
trusted library allocation
|
page read and write
|
||
14022000
|
direct allocation
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
FEA000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
2359C66C000
|
heap
|
page read and write
|
||
3D7CEFE000
|
stack
|
page read and write
|
||
9FD69FD000
|
stack
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1A0940D0000
|
trusted library allocation
|
page read and write
|
||
303D000
|
stack
|
page read and write
|
||
3D7D27B000
|
stack
|
page read and write
|
||
155A000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
7FF675C4D000
|
unkown
|
page execute read
|
||
684000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
27A98000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
13F74000
|
direct allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0ACCA0000
|
trusted library allocation
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
7FFBAFD60000
|
trusted library allocation
|
page read and write
|
||
1A095159000
|
trusted library allocation
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
1D28F400000
|
heap
|
page read and write
|
||
7FFBAFBA0000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0926E2000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A09278E000
|
heap
|
page read and write
|
||
3170000
|
trusted library allocation
|
page read and write
|
||
685000
|
heap
|
page read and write
|
||
2359C5D0000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
21501F30000
|
remote allocation
|
page read and write
|
||
1A0ACC80000
|
trusted library allocation
|
page read and write
|
||
1A0ACB64000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
228635B5000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
27AC2000
|
trusted library allocation
|
page read and write
|
||
1A0ACA53000
|
heap
|
page read and write
|
||
32E0000
|
trusted library allocation
|
page read and write
|
||
1A09565C000
|
trusted library allocation
|
page read and write
|
||
118E000
|
unkown
|
page execute read
|
||
12DDA850000
|
heap
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
89B000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1A0ACEE0000
|
trusted library allocation
|
page read and write
|
||
2F0C000
|
stack
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1A0ACB20000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1A09571D000
|
trusted library allocation
|
page read and write
|
||
14010000
|
direct allocation
|
page read and write
|
||
155A000
|
heap
|
page read and write
|
||
27AD0000
|
trusted library allocation
|
page read and write
|
||
DB4EF3D000
|
stack
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
92C000
|
stack
|
page read and write
|
||
7FFBAFD70000
|
trusted library allocation
|
page read and write
|
||
7FFBAFC50000
|
trusted library allocation
|
page read and write
|
||
1A0ACF50000
|
trusted library allocation
|
page read and write
|
||
1A0ACB50000
|
trusted library allocation
|
page read and write
|
||
1A0ACC80000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
7FFBAFCD0000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
156D000
|
unkown
|
page execute read
|
||
340F000
|
stack
|
page read and write
|
||
28F9C000
|
stack
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
1A0ACAE4000
|
heap
|
page read and write
|
||
4FD000
|
stack
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1C64000
|
heap
|
page read and write
|
||
1150000
|
unkown
|
page readonly
|
||
684000
|
heap
|
page read and write
|
||
15921F00000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
685000
|
heap
|
page read and write
|
||
27AD0000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
1A0ACCA0000
|
trusted library allocation
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
75A3AFF000
|
stack
|
page read and write
|
||
1A0ACB71000
|
trusted library allocation
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
9D8000
|
heap
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
1A0ACCA0000
|
trusted library allocation
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1CA0000
|
heap
|
page read and write
|
||
21501902000
|
heap
|
page read and write
|
||
20A7D8E2000
|
heap
|
page read and write
|
||
1A095176000
|
trusted library allocation
|
page read and write
|
||
966000
|
heap
|
page read and write
|
||
1A0ACA52000
|
heap
|
page read and write
|
||
1A09523F000
|
trusted library allocation
|
page read and write
|
||
4B5F000
|
trusted library allocation
|
page read and write
|
||
32B7000
|
heap
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
845000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
16E8000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
47B000
|
stack
|
page read and write
|
||
32C3000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
7FFBAFD33000
|
trusted library allocation
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
F172000
|
trusted library allocation
|
page execute and read and write
|
||
1420000
|
heap
|
page read and write
|
||
ED0000
|
trusted library allocation
|
page read and write
|
||
1A0ACB40000
|
trusted library allocation
|
page read and write
|
||
1D28F45A000
|
heap
|
page read and write
|
||
3850000
|
heap
|
page read and write
|
||
1A095298000
|
trusted library allocation
|
page read and write
|
||
429A000
|
heap
|
page read and write
|
||
13DEE000
|
stack
|
page read and write
|
||
2D07000
|
heap
|
page read and write
|
||
1A0AC763000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
1A0957D9000
|
trusted library allocation
|
page read and write
|
||
27BB7000
|
trusted library allocation
|
page read and write
|
||
1830B120000
|
unkown
|
page read and write
|
||
7FFBAFD50000
|
trusted library allocation
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
10EA000
|
unkown
|
page execute read
|
||
6B4000
|
heap
|
page read and write
|
||
9CF000
|
heap
|
page read and write
|
||
6ECAEFD000
|
stack
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
4C25000
|
heap
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
9C8000
|
heap
|
page read and write
|
||
1A0ACCA0000
|
trusted library allocation
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
27992580000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
1A0928C0000
|
trusted library allocation
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
14044000
|
direct allocation
|
page read and write
|
||
1A0ACCB0000
|
trusted library allocation
|
page read and write
|
||
1A095457000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
F70000
|
trusted library allocation
|
page read and write
|
||
1A0ACC80000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
1A095EDE000
|
trusted library allocation
|
page read and write
|
||
1117000
|
unkown
|
page execute read
|
||
1A0ACB80000
|
heap
|
page read and write
|
||
1C7D2402000
|
trusted library allocation
|
page read and write
|
||
1D28F458000
|
heap
|
page read and write
|
||
1A0ACF80000
|
trusted library allocation
|
page read and write
|
||
2359C702000
|
heap
|
page read and write
|
||
9FD798C000
|
stack
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0AC90C000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
14014000
|
direct allocation
|
page read and write
|
||
1A0AC755000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
4D9000
|
stack
|
page read and write
|
||
1D291000000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1D2914B5000
|
direct allocation
|
page execute and read and write
|
||
6B4000
|
heap
|
page read and write
|
||
7FFBAFCA0000
|
trusted library allocation
|
page read and write
|
||
1A0942E7000
|
heap
|
page execute and read and write
|
||
7A4000
|
heap
|
page read and write
|
||
1A0ACA97000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
9BA000
|
heap
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
EE0A000
|
stack
|
page read and write
|
||
1A0AC768000
|
heap
|
page read and write
|
||
22B8CC49000
|
heap
|
page read and write
|
||
27A28000
|
trusted library allocation
|
page read and write
|
||
18FB7402000
|
trusted library allocation
|
page read and write
|
||
16F0000
|
heap
|
page read and write
|
||
54E0000
|
direct allocation
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
CDD29FE000
|
stack
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
D5E000
|
unkown
|
page readonly
|
||
1484000
|
heap
|
page read and write
|
||
7FFBAFD57000
|
trusted library allocation
|
page read and write
|
||
28AD0000
|
trusted library allocation
|
page read and write
|
||
1A0ACCA0000
|
trusted library allocation
|
page read and write
|
||
EE5000
|
unkown
|
page readonly
|
||
1D290E02000
|
trusted library allocation
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
343F000
|
stack
|
page read and write
|
||
2359CD30000
|
trusted library allocation
|
page read and write
|
||
1A0ACCB0000
|
trusted library allocation
|
page read and write
|
||
35B7000
|
heap
|
page read and write
|
||
15921E28000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
28B1D000
|
trusted library allocation
|
page read and write
|
||
1A0ACCA0000
|
trusted library allocation
|
page read and write
|
||
1A0ACABD000
|
heap
|
page read and write
|
||
1707000
|
heap
|
page read and write
|
||
1FD2AD55000
|
heap
|
page read and write
|
||
1A0ACB6E000
|
trusted library allocation
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
20A7D8BA000
|
heap
|
page read and write
|
||
F34F000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
18FB6AA0000
|
heap
|
page read and write
|
||
1D28F459000
|
heap
|
page read and write
|
||
1A09525F000
|
trusted library allocation
|
page read and write
|
||
3851000
|
heap
|
page read and write
|
||
27992330000
|
heap
|
page read and write
|
||
1A42EEB0000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1017000
|
heap
|
page read and write
|
||
1C7D1C7F000
|
heap
|
page read and write
|
||
1A0ACCB0000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1340000
|
trusted library allocation
|
page read and write
|
||
2CAF000
|
stack
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1A095821000
|
trusted library allocation
|
page read and write
|
||
1091000
|
unkown
|
page execute read
|
||
2891000
|
heap
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
2A907880000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
B3B000
|
stack
|
page read and write
|
||
2359C613000
|
heap
|
page read and write
|
||
B3F000
|
stack
|
page read and write
|
||
1400A000
|
direct allocation
|
page read and write
|
||
1E0654B000
|
stack
|
page read and write
|
||
7FFBAFB41000
|
trusted library allocation
|
page read and write
|
||
1A0ACB40000
|
trusted library allocation
|
page read and write
|
||
7FFBAF9BB000
|
trusted library allocation
|
page execute and read and write
|
||
1074000
|
unkown
|
page execute read
|
||
2150185C000
|
heap
|
page read and write
|
||
102A000
|
unkown
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
966000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
14050000
|
direct allocation
|
page read and write
|
||
1A42EEB7000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1A095738000
|
trusted library allocation
|
page read and write
|
||
2821C000
|
stack
|
page read and write
|
||
1D28F484000
|
heap
|
page read and write
|
||
21501740000
|
heap
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
1061000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1A0AC739000
|
heap
|
page read and write
|
||
15921F13000
|
heap
|
page read and write
|
||
1A4647D000
|
stack
|
page read and write
|
||
1D290DE0000
|
remote allocation
|
page read and write
|
||
1A0ACCB0000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
18FB6C29000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
21501F30000
|
remote allocation
|
page read and write
|
||
15921E02000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
9FD6BBE000
|
stack
|
page read and write
|
||
832000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
2650B7F000
|
stack
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
30EF000
|
stack
|
page read and write
|
||
F64000
|
heap
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6ECB07D000
|
stack
|
page read and write
|
||
14028000
|
direct allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
10A1000
|
unkown
|
page execute read
|
||
87B000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
1A0ACF90000
|
trusted library allocation
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
13F2D000
|
stack
|
page read and write
|
||
3A70000
|
direct allocation
|
page read and write
|
||
1A0ACB40000
|
trusted library allocation
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
1A095741000
|
trusted library allocation
|
page read and write
|
||
1A0ACEE0000
|
trusted library allocation
|
page read and write
|
||
A19000
|
heap
|
page read and write
|
||
1A095484000
|
trusted library allocation
|
page read and write
|
||
6ECACFF000
|
stack
|
page read and write
|
||
2DE0000
|
trusted library allocation
|
page read and write
|
||
F110000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
9FD6E3E000
|
stack
|
page read and write
|
||
978000
|
heap
|
page read and write
|
||
1BD28880000
|
direct allocation
|
page execute and read and write
|
||
1830B0C0000
|
unkown
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
2359C65C000
|
heap
|
page read and write
|
||
6B0000
|
trusted library allocation
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
D61D8BD000
|
stack
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1C20AF6D000
|
heap
|
page read and write
|
||
9FD788E000
|
stack
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
F97000
|
heap
|
page read and write
|
||
1A0ACFC0000
|
trusted library allocation
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
1A0A4574000
|
trusted library allocation
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
27DCD000
|
trusted library allocation
|
page read and write
|
||
4D1A000
|
trusted library allocation
|
page read and write
|
||
3D9000
|
stack
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
47B0000
|
heap
|
page read and write
|
||
1A0ACC80000
|
trusted library allocation
|
page read and write
|
||
3A90000
|
direct allocation
|
page read and write
|
||
27AD0000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
2359C640000
|
heap
|
page read and write
|
||
1A095227000
|
trusted library allocation
|
page read and write
|
||
1A0958A1000
|
trusted library allocation
|
page read and write
|
||
993000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
5470000
|
trusted library allocation
|
page read and write
|
||
6ECAC7C000
|
stack
|
page read and write
|
||
4D31000
|
trusted library allocation
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1C7D1AD0000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1A0ACC80000
|
trusted library allocation
|
page read and write
|
||
750000
|
trusted library allocation
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
1A0ACA38000
|
heap
|
page read and write
|
||
15921D60000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
1FD2AE40000
|
heap
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0ACA2B000
|
heap
|
page read and write
|
||
1A0ACCA0000
|
trusted library allocation
|
page read and write
|
||
42A1000
|
trusted library allocation
|
page read and write
|
||
1A0ACC8D000
|
trusted library allocation
|
page read and write
|
||
54D0000
|
heap
|
page read and write
|
||
1BD286D0000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
3851000
|
heap
|
page read and write
|
||
9C2CCB000
|
stack
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
92FEA7D000
|
stack
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
1A0ACC80000
|
trusted library allocation
|
page read and write
|
||
DAE000
|
stack
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
15921CF0000
|
heap
|
page read and write
|
||
1A0AC77E000
|
heap
|
page read and write
|
||
1A095898000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
7FFBAFD80000
|
trusted library allocation
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
7FF6769E7000
|
unkown
|
page write copy
|
||
1A0ACB40000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
7FFBF20D0000
|
direct allocation
|
page execute read
|
||
1A096102000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
F61000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
750000
|
trusted library allocation
|
page read and write
|
||
1A0ACB30000
|
trusted library allocation
|
page read and write
|
||
1A0ACB64000
|
trusted library allocation
|
page read and write
|
||
29DF20A0000
|
heap
|
page read and write
|
||
1830C900000
|
unkown
|
page read and write
|
||
D1E000
|
stack
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1A09517F000
|
trusted library allocation
|
page read and write
|
||
20A7D823000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
105E000
|
stack
|
page read and write
|
||
1A0958BE000
|
trusted library allocation
|
page read and write
|
||
1A095494000
|
trusted library allocation
|
page read and write
|
||
F12E000
|
stack
|
page read and write
|
||
2704503A000
|
heap
|
page read and write
|
||
1A094DB4000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
92FEB7F000
|
stack
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1B6BA000
|
stack
|
page read and write
|
||
42A1000
|
trusted library allocation
|
page read and write
|
||
2650A7C000
|
stack
|
page read and write
|
||
A3F000
|
stack
|
page read and write
|
||
1A0ACCA0000
|
trusted library allocation
|
page read and write
|
||
1A0AC752000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
F0F0000
|
remote allocation
|
page read and write
|
||
1A0ACC80000
|
trusted library allocation
|
page read and write
|
||
7FFBAFE20000
|
trusted library allocation
|
page read and write
|
||
110F000
|
stack
|
page read and write
|
||
20A7DE02000
|
heap
|
page read and write
|
||
20A7D813000
|
heap
|
page read and write
|
||
465E000
|
trusted library allocation
|
page read and write
|
||
47BA000
|
heap
|
page read and write
|
||
2359C683000
|
heap
|
page read and write
|
||
133CEFE000
|
stack
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
20A7D5A0000
|
heap
|
page read and write
|
||
42A1000
|
trusted library allocation
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
42A1000
|
trusted library allocation
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
27992585000
|
heap
|
page read and write
|
||
E21000
|
heap
|
page read and write
|
||
1A0ACB48000
|
trusted library allocation
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
24971D60000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
21501858000
|
heap
|
page read and write
|
||
EE5000
|
unkown
|
page readonly
|
||
57A0000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1A09275D000
|
heap
|
page read and write
|
||
1026000
|
unkown
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
1A09439B000
|
trusted library allocation
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
15922555000
|
direct allocation
|
page execute and read and write
|
||
15921E13000
|
heap
|
page read and write
|
||
1A0A462A000
|
trusted library allocation
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
A28000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A094EB9000
|
trusted library allocation
|
page read and write
|
||
29DF25E0000
|
heap
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
1D28F518000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1A0ACEE9000
|
trusted library allocation
|
page read and write
|
||
F3F0000
|
trusted library allocation
|
page read and write
|
||
7FFBAFCC0000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
22B8CC05000
|
heap
|
page read and write
|
||
4DC0000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
21501F95000
|
direct allocation
|
page execute and read and write
|
||
2891000
|
heap
|
page read and write
|
||
312E000
|
stack
|
page read and write
|
||
1A0ACB74000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
19F0000
|
trusted library allocation
|
page read and write
|
||
27A42000
|
trusted library allocation
|
page read and write
|
||
1A0AC744000
|
heap
|
page read and write
|
||
1A0ACC80000
|
trusted library allocation
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1FD2AC00000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
C1E6E9C000
|
stack
|
page read and write
|
||
4820000
|
heap
|
page read and write
|
||
133D1FE000
|
stack
|
page read and write
|
||
7FFBAF9AD000
|
trusted library allocation
|
page execute and read and write
|
||
9C8000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0958EF000
|
trusted library allocation
|
page read and write
|
||
22B8CC40000
|
heap
|
page read and write
|
||
1FD2AD80000
|
heap
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
1BD0000
|
unkown
|
page readonly
|
||
1A0ACB62000
|
trusted library allocation
|
page read and write
|
||
1A095730000
|
trusted library allocation
|
page read and write
|
||
1B8C6000
|
trusted library allocation
|
page read and write
|
||
109E000
|
unkown
|
page read and write
|
||
6B5000
|
heap
|
page read and write
|
||
1A0ACC80000
|
trusted library allocation
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
CDD277E000
|
stack
|
page read and write
|
||
1A0AD2F0000
|
trusted library allocation
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1A09588F000
|
trusted library allocation
|
page read and write
|
||
1C20B200000
|
heap
|
page read and write
|
||
27AC2000
|
trusted library allocation
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
6ECABFF000
|
stack
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
1D28F48A000
|
heap
|
page read and write
|
||
C1E7B7F000
|
stack
|
page read and write
|
||
27E9B4F0000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
24971DD9000
|
heap
|
page read and write
|
||
1A0ACF30000
|
trusted library allocation
|
page read and write
|
||
1A0AC744000
|
heap
|
page read and write
|
||
10033000
|
unkown
|
page execute read
|
||
1A095250000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
685000
|
heap
|
page read and write
|
||
20A7D800000
|
heap
|
page read and write
|
||
1A0ACB6D000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0ACB41000
|
trusted library allocation
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
22B8CB50000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0926FC000
|
heap
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
1A0ACF20000
|
trusted library allocation
|
page read and write
|
||
12DDA8DA000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
2359C600000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
1A0ACFB0000
|
trusted library allocation
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
27A7F000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
3851000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
15921F02000
|
heap
|
page read and write
|
||
7FFBAFE30000
|
trusted library allocation
|
page execute and read and write
|
||
1591000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
2810C000
|
stack
|
page read and write
|
||
2C6E000
|
stack
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
9FD68F9000
|
stack
|
page read and write
|
||
1C7D1C6E000
|
heap
|
page read and write
|
||
61EB7000
|
direct allocation
|
page readonly
|
||
DA7D000
|
stack
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0958AA000
|
trusted library allocation
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1C20AD50000
|
heap
|
page read and write
|
||
1A094330000
|
heap
|
page read and write
|
||
21502002000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1402E000
|
direct allocation
|
page read and write
|
||
14CB000
|
unkown
|
page execute read
|
||
7DF4D4AC0000
|
trusted library allocation
|
page execute and read and write
|
||
1402A000
|
direct allocation
|
page read and write
|
||
1830C930000
|
unkown
|
page read and write
|
||
27E9B570000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
1A096116000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0AC7F0000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1A0AC9CC000
|
heap
|
page read and write
|
||
1A0ACCB7000
|
trusted library allocation
|
page read and write
|
||
287CB000
|
trusted library allocation
|
page read and write
|
||
1A0ACF70000
|
trusted library allocation
|
page read and write
|
||
32A0000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1B9C0000
|
unclassified section
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
14035000
|
direct allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1C65000
|
unkown
|
page readonly
|
||
1A0ACCC0000
|
trusted library allocation
|
page read and write
|
||
D5E000
|
unkown
|
page readonly
|
||
180000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
685000
|
heap
|
page read and write
|
||
1052000
|
unkown
|
page read and write
|
||
3851000
|
heap
|
page read and write
|
||
10CD000
|
stack
|
page read and write
|
||
324E000
|
stack
|
page read and write
|
||
15921DD0000
|
remote allocation
|
page execute and read and write
|
||
1A092789000
|
heap
|
page read and write
|
||
1A09274F000
|
heap
|
page read and write
|
||
14243CD000
|
stack
|
page read and write
|
||
1A0928E0000
|
trusted library allocation
|
page read and write
|
||
1A0ACB61000
|
trusted library allocation
|
page read and write
|
||
1BD288A5000
|
direct allocation
|
page execute and read and write
|
||
42A1000
|
trusted library allocation
|
page read and write
|
||
2359C64E000
|
heap
|
page read and write
|
||
27ACE000
|
trusted library allocation
|
page read and write
|
||
3851000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
579000
|
stack
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
133CFFF000
|
stack
|
page read and write
|
||
1A0958E6000
|
trusted library allocation
|
page read and write
|
||
1A0AC6FB000
|
heap
|
page read and write
|
||
1C7D1C7A000
|
heap
|
page read and write
|
||
42A1000
|
trusted library allocation
|
page read and write
|
||
1A095714000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0ACCA0000
|
trusted library allocation
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
16DF000
|
heap
|
page read and write
|
||
2359C63D000
|
heap
|
page read and write
|
||
FF3000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1A095201000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
20A7D902000
|
heap
|
page read and write
|
||
42A1000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1A0ACB61000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
2A90788D000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
2359C676000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
22863320000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
3D0000
|
unkown
|
page readonly
|
||
7A4000
|
heap
|
page read and write
|
||
24971BB0000
|
heap
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
1C20AE90000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1001000
|
heap
|
page read and write
|
||
1A0ACF70000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
83C000
|
heap
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
105B000
|
unkown
|
page write copy
|
||
4290000
|
heap
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
1A0ACCA0000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1A094E48000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
1C4511C000
|
stack
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0AC752000
|
heap
|
page read and write
|
||
1D28F2F0000
|
heap
|
page read and write
|
||
1C4547F000
|
stack
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0AC748000
|
heap
|
page read and write
|
||
4C20000
|
heap
|
page read and write
|
||
1189000
|
unkown
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
3D7D37F000
|
stack
|
page read and write
|
||
1A0ACB20000
|
trusted library allocation
|
page read and write
|
||
7FFBAFD68000
|
trusted library allocation
|
page read and write
|
||
1830AEC0000
|
trusted library allocation
|
page read and write
|
||
7FFBAF99D000
|
trusted library allocation
|
page execute and read and write
|
||
1A0ACC92000
|
trusted library allocation
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
1E06B7F000
|
stack
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
61ED0000
|
direct allocation
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1C7D1C00000
|
heap
|
page read and write
|
||
1A095F02000
|
trusted library allocation
|
page read and write
|
||
39D0000
|
direct allocation
|
page read and write
|
||
61ED4000
|
direct allocation
|
page readonly
|
||
CCE5A7F000
|
stack
|
page read and write
|
||
2DDE000
|
stack
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1A0ACC92000
|
trusted library allocation
|
page read and write
|
||
1090000
|
unkown
|
page readonly
|
||
2FF1000
|
heap
|
page read and write
|
||
4C20000
|
heap
|
page read and write
|
||
1A0ACB74000
|
trusted library allocation
|
page read and write
|
||
2359C679000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
43B000
|
unkown
|
page execute read
|
||
1D28F473000
|
heap
|
page read and write
|
||
105B000
|
unkown
|
page write copy
|
||
21501825000
|
heap
|
page read and write
|
||
1A095188000
|
trusted library allocation
|
page read and write
|
||
1A0ACB40000
|
trusted library allocation
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1A0ACCA0000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
3851000
|
heap
|
page read and write
|
||
27E9B510000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
7FFBAFB30000
|
trusted library allocation
|
page read and write
|
||
F64000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
1FD2AD50000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
7ED000
|
unkown
|
page execute read
|
||
14243DE000
|
stack
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
7FFBAF9B0000
|
trusted library allocation
|
page read and write
|
||
4B5F000
|
trusted library allocation
|
page read and write
|
||
61ECD000
|
direct allocation
|
page readonly
|
||
393F000
|
stack
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
832000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
18FB7260000
|
trusted library allocation
|
page read and write
|
||
27CBE000
|
trusted library allocation
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1D291040000
|
trusted library allocation
|
page read and write
|
||
685000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
92FEAFF000
|
stack
|
page read and write
|
||
DBA816D000
|
stack
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0ACCB0000
|
trusted library allocation
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
409000
|
unkown
|
page read and write
|
||
F64000
|
heap
|
page read and write
|
||
1A094160000
|
heap
|
page execute and read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1A0957AE000
|
trusted library allocation
|
page read and write
|
||
1A0ACCC0000
|
trusted library allocation
|
page read and write
|
||
21501F40000
|
remote allocation
|
page execute and read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1BD288D0000
|
heap
|
page read and write
|
||
CDD28FF000
|
stack
|
page read and write
|
||
2A907887000
|
heap
|
page read and write
|
||
1A0928F0000
|
heap
|
page readonly
|
||
1A095EB6000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
1A0ACACA000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
28110000
|
heap
|
page read and write
|
||
7FFBAFCE0000
|
trusted library allocation
|
page read and write
|
||
7FFBAFC40000
|
trusted library allocation
|
page read and write
|
||
79A000
|
heap
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
1A0AC77B000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
685000
|
heap
|
page read and write
|
||
10D4000
|
unkown
|
page read and write
|
||
228631E0000
|
heap
|
page read and write
|
||
1FD2AE49000
|
heap
|
page read and write
|
||
3E90000
|
heap
|
page read and write
|
||
4C0F000
|
stack
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1A094E8A000
|
trusted library allocation
|
page read and write
|
||
C1E76FE000
|
stack
|
page read and write
|
||
1A095471000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1D28F467000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
20A7D8CB000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
307C000
|
stack
|
page read and write
|
||
2E60000
|
heap
|
page read and write
|
||
1A0ACCB0000
|
trusted library allocation
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0AC729000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
10005000
|
unkown
|
page read and write
|
||
D61D93F000
|
stack
|
page read and write
|
||
1A0ACB40000
|
trusted library allocation
|
page read and write
|
||
11BB000
|
unkown
|
page execute read
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
7FFBAFC90000
|
trusted library allocation
|
page read and write
|
||
1A0ACB40000
|
trusted library allocation
|
page read and write
|
||
17DE000
|
unkown
|
page readonly
|
||
1A0956F4000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1A0ACAE4000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
3851000
|
heap
|
page read and write
|
||
3AB0000
|
direct allocation
|
page read and write
|
||
27A29000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
3A2D000
|
stack
|
page read and write
|
||
7FFBAFC00000
|
trusted library allocation
|
page read and write
|
||
4CC9000
|
trusted library allocation
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
7FFBAFB90000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
133D0FA000
|
stack
|
page read and write
|
||
FFD000
|
unkown
|
page write copy
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
185FDDB0000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
18FB6D13000
|
heap
|
page read and write
|
||
D93E000
|
stack
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
264457F0000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
C1E777B000
|
stack
|
page read and write
|
||
7FFBAFB72000
|
trusted library allocation
|
page read and write
|
||
10033000
|
unkown
|
page execute read
|
||
1A0AC9A7000
|
heap
|
page read and write
|
||
21925000
|
trusted library allocation
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
279923A0000
|
heap
|
page read and write
|
||
1C7D1C3D000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
7FFBAFD6C000
|
trusted library allocation
|
page read and write
|
||
762C67F000
|
stack
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
1A0ACF40000
|
trusted library allocation
|
page read and write
|
||
109B000
|
unkown
|
page read and write
|
||
9C30FC000
|
stack
|
page read and write
|
||
1A095783000
|
trusted library allocation
|
page read and write
|
||
1A0A4341000
|
trusted library allocation
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
109C000
|
unkown
|
page write copy
|
||
6B4000
|
heap
|
page read and write
|
||
61ED3000
|
direct allocation
|
page read and write
|
||
31AF000
|
stack
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
7FFBF20D0000
|
direct allocation
|
page execute read
|
||
1A0ACA97000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
2359C65A000
|
heap
|
page read and write
|
||
10005000
|
unkown
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
14002000
|
direct allocation
|
page read and write
|
||
2823A000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
20A7DF32000
|
heap
|
page read and write
|
||
2359C648000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
14018000
|
direct allocation
|
page read and write
|
||
2A907850000
|
heap
|
page read and write
|
||
1A0AC998000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
2644585B000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
AFC000
|
stack
|
page read and write
|
||
3851000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
3851000
|
heap
|
page read and write
|
||
1830C9D0000
|
unkown
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
1BD0000
|
unkown
|
page readonly
|
||
684000
|
heap
|
page read and write
|
||
1C64000
|
heap
|
page read and write
|
||
42A1000
|
trusted library allocation
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
26445AA0000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0ACF60000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
F0F0000
|
remote allocation
|
page read and write
|
||
3308000
|
heap
|
page read and write
|
||
15921E3C000
|
heap
|
page read and write
|
||
1A0ACF90000
|
trusted library allocation
|
page read and write
|
||
1A0958D5000
|
trusted library allocation
|
page read and write
|
||
16B9000
|
heap
|
page read and write
|
||
42A1000
|
trusted library allocation
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
7FFBAF993000
|
trusted library allocation
|
page execute and read and write
|
||
1111000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1BD28850000
|
remote allocation
|
page execute and read and write
|
||
40E000
|
unkown
|
page execute read
|
||
3E8A000
|
heap
|
page read and write
|
||
4B5F000
|
trusted library allocation
|
page read and write
|
||
2359C570000
|
heap
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
1A0AC904000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1A0ACF40000
|
trusted library allocation
|
page read and write
|
||
9FD6CBE000
|
stack
|
page read and write
|
||
7FF6769E7000
|
unkown
|
page write copy
|
||
7A4000
|
heap
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
1A092920000
|
heap
|
page read and write
|
||
1A0AC736000
|
heap
|
page read and write
|
||
157A000
|
heap
|
page read and write
|
||
1A0AC744000
|
heap
|
page read and write
|
||
2359C645000
|
heap
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
3D7D07E000
|
stack
|
page read and write
|
||
1A0ACB68000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
18FB6C43000
|
heap
|
page read and write
|
||
1A0ACB50000
|
trusted library allocation
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
156D000
|
unkown
|
page execute read
|
||
105C000
|
unkown
|
page readonly
|
||
1111000
|
heap
|
page read and write
|
||
435000
|
unkown
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1A0ACEF0000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
2C90000
|
heap
|
page read and write
|
||
1A0AC722000
|
heap
|
page read and write
|
||
279923AA000
|
heap
|
page read and write
|
||
22863359000
|
heap
|
page read and write
|
||
3851000
|
heap
|
page read and write
|
||
4C223EF000
|
stack
|
page read and write
|
||
1D28F402000
|
heap
|
page read and write
|
||
7FFBF20D0000
|
direct allocation
|
page execute read
|
||
2891000
|
heap
|
page read and write
|
||
1A0951CB000
|
trusted library allocation
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
BC0000
|
unkown
|
page readonly
|
||
353E000
|
stack
|
page read and write
|
||
36BF000
|
stack
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
C1E747E000
|
stack
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
762C38F000
|
stack
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
685000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
C1E787D000
|
stack
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
4B53000
|
trusted library allocation
|
page read and write
|
||
9389ADD000
|
stack
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
185FDE35000
|
heap
|
page read and write
|
||
1A0ACB67000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
7FFBAFD00000
|
trusted library allocation
|
page read and write
|
||
15921E24000
|
heap
|
page read and write
|
||
2359C63A000
|
heap
|
page read and write
|
||
1A0ACB61000
|
trusted library allocation
|
page read and write
|
||
1A0942E0000
|
heap
|
page execute and read and write
|
||
1111000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
1A0ACCA0000
|
trusted library allocation
|
page read and write
|
||
3851000
|
heap
|
page read and write
|
||
1A0926DE000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1A0ACA6A000
|
heap
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
1400C000
|
direct allocation
|
page read and write
|
||
F050000
|
trusted library allocation
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
3950000
|
trusted library allocation
|
page read and write
|
||
12DDAAA0000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
3A60000
|
heap
|
page read and write
|
||
7FFBAFD70000
|
trusted library allocation
|
page execute and read and write
|
||
BC0000
|
unkown
|
page readonly
|
||
1A09527F000
|
trusted library allocation
|
page read and write
|
||
32D0000
|
heap
|
page read and write
|
||
7FFBAF9A3000
|
trusted library allocation
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
1E06E7E000
|
stack
|
page read and write
|
||
1A0ACF10000
|
trusted library allocation
|
page read and write
|
||
27AD2000
|
trusted library allocation
|
page read and write
|
||
3851000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
34BE000
|
stack
|
page read and write
|
||
1A092925000
|
heap
|
page read and write
|
||
4240000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
F0D0000
|
trusted library allocation
|
page execute and read and write
|
||
4971000
|
heap
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1724000
|
heap
|
page read and write
|
||
1A0AC76D000
|
heap
|
page read and write
|
||
228635B0000
|
heap
|
page read and write
|
||
42A1000
|
trusted library allocation
|
page read and write
|
||
1A0AC77A000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
24971CF0000
|
heap
|
page read and write
|
||
3851000
|
heap
|
page read and write
|
||
9FD6DBF000
|
stack
|
page read and write
|
||
16B0000
|
heap
|
page read and write
|
||
1D28F440000
|
heap
|
page read and write
|
||
1A0AC771000
|
heap
|
page read and write
|
||
F9E000
|
stack
|
page read and write
|
||
F12E000
|
stack
|
page read and write
|
||
7FFBAFBC5000
|
trusted library allocation
|
page read and write
|
||
F80000
|
trusted library allocation
|
page read and write
|
||
16BC000
|
heap
|
page read and write
|
||
1C7D1C60000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1D28F280000
|
heap
|
page read and write
|
||
1A0ACC80000
|
trusted library allocation
|
page read and write
|
||
155A000
|
heap
|
page read and write
|
||
CCE578D000
|
stack
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
98F000
|
stack
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0ACB30000
|
trusted library allocation
|
page read and write
|
||
61ECC000
|
direct allocation
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
7FFBAFA76000
|
trusted library allocation
|
page execute and read and write
|
||
684000
|
heap
|
page read and write
|
||
1A0ACCBD000
|
trusted library allocation
|
page read and write
|
||
1A095703000
|
trusted library allocation
|
page read and write
|
||
EF4D000
|
stack
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
27992350000
|
heap
|
page read and write
|
||
424A000
|
heap
|
page read and write
|
||
1E06C7B000
|
stack
|
page read and write
|
||
9C327F000
|
stack
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
4B30000
|
heap
|
page read and write
|
||
14042000
|
direct allocation
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
2359C631000
|
heap
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
1A42EC70000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
22863450000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
18FB7280000
|
trusted library allocation
|
page read and write
|
||
2FD0000
|
trusted library allocation
|
page read and write
|
||
27A9C000
|
trusted library allocation
|
page read and write
|
||
316E000
|
stack
|
page read and write
|
||
185FDE40000
|
heap
|
page read and write
|
||
12DDABD5000
|
heap
|
page read and write
|
||
1A092660000
|
heap
|
page read and write
|
||
1A0951F8000
|
trusted library allocation
|
page read and write
|
||
1A095107000
|
trusted library allocation
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
24971D65000
|
heap
|
page read and write
|
||
7FFBAFC60000
|
trusted library allocation
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
3D7D17E000
|
stack
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
9FD6FBE000
|
stack
|
page read and write
|
||
1A0ACB40000
|
trusted library allocation
|
page read and write
|
||
1A0AC73E000
|
heap
|
page read and write
|
||
27045130000
|
heap
|
page read and write
|
||
54D5000
|
heap
|
page read and write
|
||
279D6000
|
trusted library allocation
|
page read and write
|
||
105C000
|
unkown
|
page readonly
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
1499000
|
unkown
|
page execute read
|
||
4B56000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
10004000
|
unkown
|
page readonly
|
||
4B90000
|
heap
|
page read and write
|
||
1A0AC731000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
10006000
|
unkown
|
page execute read
|
||
1A0ACCB0000
|
trusted library allocation
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1B4BF000
|
stack
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
1A09610E000
|
trusted library allocation
|
page read and write
|
||
117F000
|
unkown
|
page readonly
|
||
684000
|
heap
|
page read and write
|
||
1027000
|
unkown
|
page write copy
|
||
1484000
|
heap
|
page read and write
|
||
B5C000
|
stack
|
page read and write
|
||
1C20AF6B000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1CAA000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
3851000
|
heap
|
page read and write
|
||
1A0ACCA0000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0ACCC0000
|
trusted library allocation
|
page read and write
|
||
3460000
|
heap
|
page read and write
|
||
1A095F8B000
|
trusted library allocation
|
page read and write
|
||
28230000
|
heap
|
page read and write
|
||
20A7D829000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1A0ACAD6000
|
heap
|
page read and write
|
||
1A0ACB20000
|
trusted library allocation
|
page read and write
|
||
1A094341000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
1A09549E000
|
trusted library allocation
|
page read and write
|
||
1A0AC960000
|
heap
|
page read and write
|
||
1A0ACC91000
|
trusted library allocation
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
11B5000
|
unkown
|
page read and write
|
||
2A90788B000
|
heap
|
page read and write
|
||
42A1000
|
trusted library allocation
|
page read and write
|
||
1A0926A0000
|
heap
|
page read and write
|
||
1A42EDD0000
|
heap
|
page read and write
|
||
2359C602000
|
heap
|
page read and write
|
||
10434000
|
unkown
|
page execute read
|
||
1A0ACAB2000
|
heap
|
page read and write
|
||
7FFBAFE60000
|
trusted library allocation
|
page read and write
|
||
1A0926B3000
|
heap
|
page read and write
|
||
1D28F290000
|
heap
|
page read and write
|
||
2834000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
22B8CB70000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
1A095685000
|
trusted library allocation
|
page read and write
|
||
7DE000
|
stack
|
page read and write
|
||
3851000
|
heap
|
page read and write
|
||
42A1000
|
trusted library allocation
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
2359C629000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
1A0AC701000
|
heap
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
9FD6A7E000
|
stack
|
page read and write
|
||
1A0ACB50000
|
trusted library allocation
|
page read and write
|
||
1A0AC99F000
|
heap
|
page read and write
|
||
A19000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
42A1000
|
trusted library allocation
|
page read and write
|
||
26445810000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
18FB6A90000
|
heap
|
page read and write
|
||
15921E57000
|
heap
|
page read and write
|
||
5480000
|
trusted library allocation
|
page read and write
|
||
42A1000
|
trusted library allocation
|
page read and write
|
||
83A000
|
heap
|
page read and write
|
||
1A0ACC91000
|
trusted library allocation
|
page read and write
|
||
1A0AC71C000
|
heap
|
page read and write
|
||
1BD28AA5000
|
heap
|
page read and write
|
||
1A09587D000
|
trusted library allocation
|
page read and write
|
||
7FF675C4A000
|
unkown
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
42A1000
|
trusted library allocation
|
page read and write
|
||
14004000
|
direct allocation
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
32DE000
|
stack
|
page read and write
|
||
1C60000
|
heap
|
page read and write
|
||
1A094E82000
|
trusted library allocation
|
page read and write
|
||
2359C646000
|
heap
|
page read and write
|
||
1111000
|
unkown
|
page read and write
|
||
1A095230000
|
trusted library allocation
|
page read and write
|
||
1A0956E4000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
18FB6C02000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
24971DD0000
|
heap
|
page read and write
|
||
2359C657000
|
heap
|
page read and write
|
||
9FD6B3E000
|
stack
|
page read and write
|
||
9BA000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1A0958FE000
|
trusted library allocation
|
page read and write
|
||
1B2BE000
|
stack
|
page read and write
|
||
159A000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0AC70B000
|
heap
|
page read and write
|
||
354DE7E000
|
stack
|
page read and write
|
||
7FFBAFBE0000
|
trusted library allocation
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
7F3000
|
heap
|
page read and write
|
||
7FFBAFB80000
|
trusted library allocation
|
page execute and read and write
|
||
3851000
|
heap
|
page read and write
|
||
1A0ACB20000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
F194FFD000
|
stack
|
page read and write
|
||
1A094176000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
15921E79000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
20A7D7D0000
|
trusted library allocation
|
page read and write
|
||
1A0AC6A4000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
1A0ACC80000
|
trusted library allocation
|
page read and write
|
||
1BD28AB0000
|
unkown
|
page readonly
|
||
684000
|
heap
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
185FDE30000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
5450000
|
heap
|
page read and write
|
||
3FF000
|
unkown
|
page readonly
|
||
15921E68000
|
heap
|
page read and write
|
||
1029000
|
unkown
|
page write copy
|
||
6B4000
|
heap
|
page read and write
|
||
9FD6AFC000
|
stack
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
18FB6C67000
|
heap
|
page read and write
|
||
29DF2200000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
27A97000
|
trusted library allocation
|
page read and write
|
||
15922530000
|
direct allocation
|
page execute and read and write
|
||
1A0AC9EB000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
42A1000
|
trusted library allocation
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
1002D000
|
unkown
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
18FB6C67000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
3EEA000
|
heap
|
page read and write
|
||
27ACD000
|
trusted library allocation
|
page read and write
|
||
27ACD000
|
trusted library allocation
|
page read and write
|
||
18FB6C00000
|
heap
|
page read and write
|
||
27A47000
|
trusted library allocation
|
page read and write
|
||
1A095267000
|
trusted library allocation
|
page read and write
|
||
B8E000
|
stack
|
page read and write
|
||
1A0AC6DA000
|
heap
|
page read and write
|
||
10004000
|
unkown
|
page readonly
|
||
1A0ACB40000
|
trusted library allocation
|
page read and write
|
||
3958000
|
direct allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
1A0AC908000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
7FFBAFBB0000
|
trusted library allocation
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1A0ACCB9000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
10A1000
|
unkown
|
page execute read
|
||
1A0ACB20000
|
trusted library allocation
|
page read and write
|
||
4DF000
|
stack
|
page read and write
|
||
9FD65FF000
|
stack
|
page read and write
|
||
1A0ACEF0000
|
trusted library allocation
|
page read and write
|
||
7FFBAFCF5000
|
trusted library allocation
|
page read and write
|
||
1A0ACC80000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
1A0AC754000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0ACC94000
|
trusted library allocation
|
page read and write
|
||
2DC000
|
stack
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
482A000
|
heap
|
page read and write
|
||
1A092776000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
142A000
|
heap
|
page read and write
|
||
3D7CE7D000
|
stack
|
page read and write
|
||
1BD28830000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
7DD000
|
stack
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
982000
|
heap
|
page read and write
|
||
22B8CA10000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
82F000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
96A000
|
stack
|
page read and write
|
||
1A0ACA7A000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
EE5000
|
unkown
|
page readonly
|
||
1484000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
14000000
|
direct allocation
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
1A0ACF10000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
28E9E000
|
stack
|
page read and write
|
||
4B52000
|
trusted library allocation
|
page read and write
|
||
1A0ACC80000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1A0AC73B000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1591000
|
heap
|
page read and write
|
||
1A0AC900000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
C1E797E000
|
stack
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
1D291490000
|
direct allocation
|
page execute and read and write
|
||
4B59000
|
trusted library allocation
|
page read and write
|
||
1C20AEB0000
|
heap
|
page read and write
|
||
1A0ACCC0000
|
trusted library allocation
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
D5E000
|
stack
|
page read and write
|
||
1C20AF60000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
1A0ACA4D000
|
heap
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1A094DDC000
|
trusted library allocation
|
page read and write
|
||
750000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
20A7DF00000
|
heap
|
page read and write
|
||
94A000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
101E000
|
stack
|
page read and write
|
||
133CB7E000
|
stack
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
E21000
|
heap
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
1A0ACB20000
|
trusted library allocation
|
page read and write
|
||
1A09577A000
|
trusted library allocation
|
page read and write
|
||
1A0ACB40000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
1A0926E6000
|
heap
|
page read and write
|
||
29CE000
|
stack
|
page read and write
|
||
DB4EFBE000
|
stack
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
1A095FA4000
|
trusted library allocation
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
1A0ACB40000
|
trusted library allocation
|
page read and write
|
||
47A3000
|
trusted library allocation
|
page read and write
|
||
1A0ACB67000
|
trusted library allocation
|
page read and write
|
||
1A0AC759000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
7E0000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0ACA30000
|
heap
|
page read and write
|
||
2359C67D000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
3D7CBFB000
|
stack
|
page read and write
|
||
9B1000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
199C000
|
stack
|
page read and write
|
||
1830C9C4000
|
heap
|
page read and write
|
||
1A095763000
|
trusted library allocation
|
page read and write
|
||
185FDEE9000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
F61000
|
heap
|
page read and write
|
||
FB0000
|
trusted library allocation
|
page read and write
|
||
1A0957B6000
|
trusted library allocation
|
page read and write
|
||
1A095EF0000
|
trusted library allocation
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
1A09516E000
|
trusted library allocation
|
page read and write
|
||
1A0ACB40000
|
trusted library allocation
|
page read and write
|
||
20A7D843000
|
heap
|
page read and write
|
||
DABE000
|
stack
|
page read and write
|
||
27A42000
|
trusted library allocation
|
page read and write
|
||
1A0ACB30000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
31E8000
|
heap
|
page read and write
|
||
15921D00000
|
heap
|
page read and write
|
||
1A0ACB67000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
685000
|
heap
|
page read and write
|
||
1A095EA2000
|
trusted library allocation
|
page read and write
|
||
24971D10000
|
heap
|
page read and write
|
||
2359C67A000
|
heap
|
page read and write
|
||
7FFBAFB4D000
|
trusted library allocation
|
page read and write
|
||
640000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
7FFBAFE10000
|
trusted library allocation
|
page read and write
|
||
1A0951C3000
|
trusted library allocation
|
page read and write
|
||
1A0ACB24000
|
trusted library allocation
|
page read and write
|
||
1830B0A0000
|
heap
|
page read and write
|
||
1A0AC74B000
|
heap
|
page read and write
|
||
346A000
|
heap
|
page read and write
|
||
685000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
A1A000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
21501802000
|
heap
|
page read and write
|
||
2150183C000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1D28F459000
|
heap
|
page read and write
|
||
1A0AC698000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
1C7D1C02000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
22B8CC00000
|
heap
|
page read and write
|
||
328F000
|
stack
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
4970000
|
heap
|
page read and write
|
||
CDD2AFE000
|
stack
|
page read and write
|
||
9C337E000
|
stack
|
page read and write
|
||
C1E757E000
|
stack
|
page read and write
|
||
9B1000
|
heap
|
page read and write
|
||
21501829000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
66E000
|
stack
|
page read and write
|
||
1830AEDB000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
1A0AC99D000
|
heap
|
page read and write
|
||
7FFBAFA46000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
2650BFF000
|
stack
|
page read and write
|
||
28AF7000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1A42EEBD000
|
heap
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
F2F1000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1A092680000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
1160000
|
trusted library allocation
|
page read and write
|
||
7FF675C81000
|
unkown
|
page read and write
|
||
1A0AC734000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1D28F513000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1830B130000
|
unkown
|
page read and write
|
||
1A0926A9000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
1A0ACC80000
|
trusted library allocation
|
page read and write
|
||
F3F0000
|
trusted library allocation
|
page read and write
|
||
1A0AC9A9000
|
heap
|
page read and write
|
||
1A092781000
|
heap
|
page read and write
|
||
1A0ACB50000
|
trusted library allocation
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
3851000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
7FFBAFE00000
|
trusted library allocation
|
page read and write
|
||
1A0AC771000
|
heap
|
page read and write
|
||
1A0ACEF7000
|
trusted library allocation
|
page read and write
|
||
21501827000
|
heap
|
page read and write
|
||
7FFBAFC70000
|
trusted library allocation
|
page read and write
|
||
A3C000
|
stack
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
29DF2300000
|
heap
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
1A095752000
|
trusted library allocation
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
A1A000
|
heap
|
page read and write
|
||
910000
|
heap
|
page execute and read and write
|
||
2890000
|
heap
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
21501800000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
DBA81EF000
|
stack
|
page read and write
|
||
27045260000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
97E000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1C7D1BD0000
|
trusted library allocation
|
page read and write
|
||
27AB0000
|
trusted library allocation
|
page read and write
|
||
215017D0000
|
trusted library allocation
|
page read and write
|
||
3290000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0ACA7A000
|
heap
|
page read and write
|
||
1A0ACCB1000
|
trusted library allocation
|
page read and write
|
||
82F000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
1A0ACB71000
|
trusted library allocation
|
page read and write
|
||
831000
|
heap
|
page read and write
|
||
21501F30000
|
remote allocation
|
page read and write
|
||
1A0AC932000
|
heap
|
page read and write
|
||
1830AEE0000
|
heap
|
page read and write
|
||
1A095818000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
1A092723000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
79E000
|
stack
|
page read and write
|
||
3851000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1400E000
|
direct allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
7FF675C87000
|
unkown
|
page execute read
|
||
4A11000
|
heap
|
page read and write
|
||
7ED000
|
unkown
|
page execute read
|
||
2359C65F000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
14EA000
|
heap
|
page read and write
|
||
20A7D886000
|
heap
|
page read and write
|
||
7FFBAFE70000
|
trusted library allocation
|
page read and write
|
||
12DDAAC0000
|
heap
|
page read and write
|
||
20A7D913000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
1BD28810000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
27045030000
|
heap
|
page read and write
|
||
270000
|
heap
|
page read and write
|
||
1A42EEBB000
|
heap
|
page read and write
|
||
7FFBAFDF3000
|
trusted library allocation
|
page read and write
|
||
3A7F000
|
stack
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
18FB6C43000
|
heap
|
page read and write
|
||
2359C66A000
|
heap
|
page read and write
|
||
1830C990000
|
unkown
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
9FD6EBB000
|
stack
|
page read and write
|
||
18FB6B00000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
F3F0000
|
trusted library allocation
|
page read and write
|
||
F5E000
|
stack
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
1A0AC74C000
|
heap
|
page read and write
|
||
1830AE10000
|
heap
|
page read and write
|
||
1A0ACC98000
|
trusted library allocation
|
page read and write
|
||
1A0ACCA0000
|
trusted library allocation
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
7FFBAFCF0000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
1A0ACEE0000
|
trusted library allocation
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
1C7D1C2A000
|
heap
|
page read and write
|
||
FDA000
|
heap
|
page read and write
|
||
2D3C000
|
stack
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1BD28AA0000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
1A0ACC81000
|
trusted library allocation
|
page read and write
|
||
9389BDF000
|
stack
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
1403C000
|
direct allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0ACA7A000
|
heap
|
page read and write
|
||
1A0951D9000
|
trusted library allocation
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
1A4657F000
|
stack
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
D60000
|
unkown
|
page write copy
|
||
1A0ACC80000
|
trusted library allocation
|
page read and write
|
||
18FB6D18000
|
heap
|
page read and write
|
||
1A0AC707000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1A0ACC80000
|
trusted library allocation
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
1A09579E000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1C7D1A60000
|
heap
|
page read and write
|
||
9FD687E000
|
stack
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
383E000
|
stack
|
page read and write
|
||
7FF6769E6000
|
unkown
|
page readonly
|
||
1484000
|
heap
|
page read and write
|
||
7FFBAFC20000
|
trusted library allocation
|
page read and write
|
||
BC1000
|
unkown
|
page execute read
|
||
3EE0000
|
heap
|
page read and write
|
||
1032000
|
unkown
|
page read and write
|
||
1A0ACCA0000
|
trusted library allocation
|
page read and write
|
||
42A1000
|
trusted library allocation
|
page read and write
|
||
1A0ACCC0000
|
trusted library allocation
|
page read and write
|
||
133CAFE000
|
stack
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1A0AC75A000
|
heap
|
page read and write
|
||
1028000
|
unkown
|
page read and write
|
||
1A0ACA23000
|
heap
|
page read and write
|
||
1B5BB000
|
stack
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
264456B0000
|
heap
|
page read and write
|
||
20A7D600000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
BC0000
|
unkown
|
page readonly
|
||
1A0ACCC0000
|
trusted library allocation
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
1830B0F0000
|
unkown
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
9C387C000
|
stack
|
page read and write
|
||
3D0000
|
unkown
|
page readonly
|
||
34C0000
|
heap
|
page read and write
|
||
2A907A50000
|
heap
|
page read and write
|
||
1499000
|
unkown
|
page execute read
|
||
1C7D1C5A000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
4B51000
|
trusted library allocation
|
page read and write
|
||
348F000
|
stack
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
1A09514D000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
9C8000
|
heap
|
page read and write
|
||
29DF230B000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
1A0ACB40000
|
trusted library allocation
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
2A907C25000
|
heap
|
page read and write
|
||
1A0ACCC0000
|
trusted library allocation
|
page read and write
|
||
61D8AFE000
|
stack
|
page read and write
|
||
3A72000
|
direct allocation
|
page read and write
|
||
215017A0000
|
heap
|
page read and write
|
||
1A0ACC80000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
4B57000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1074000
|
unkown
|
page execute read
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
28240000
|
trusted library allocation
|
page read and write
|
||
1A094320000
|
trusted library allocation
|
page read and write
|
||
8A1000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
3950000
|
direct allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
9C367C000
|
stack
|
page read and write
|
||
1BD288DB000
|
heap
|
page read and write
|
||
7FFBAFC30000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
E21000
|
heap
|
page read and write
|
||
1A0ACF19000
|
trusted library allocation
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
7FFBAFD54000
|
trusted library allocation
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1830AED0000
|
heap
|
page read and write
|
||
397E000
|
stack
|
page read and write
|
||
6ECA79C000
|
stack
|
page read and write
|
||
D8FF000
|
stack
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
C1E7A7D000
|
stack
|
page read and write
|
||
61E01000
|
direct allocation
|
page execute read
|
||
684000
|
heap
|
page read and write
|
||
1A095772000
|
trusted library allocation
|
page read and write
|
||
27E9B57A000
|
heap
|
page read and write
|
||
1A094100000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
13EEF000
|
stack
|
page read and write
|
||
1A0ACB00000
|
trusted library allocation
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
1A0ACC80000
|
trusted library allocation
|
page read and write
|
||
7FF6769E6000
|
unkown
|
page readonly
|
||
6B4000
|
heap
|
page read and write
|
||
27AD5000
|
trusted library allocation
|
page read and write
|
||
1A0ACB40000
|
trusted library allocation
|
page read and write
|
||
10006000
|
unkown
|
page execute read
|
||
F22F000
|
stack
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
7FFBAF990000
|
trusted library allocation
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B5000
|
heap
|
page read and write
|
||
F76000
|
unkown
|
page readonly
|
||
9C8000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
9FD6C3A000
|
stack
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0ACB22000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
32D8000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
831000
|
heap
|
page read and write
|
||
1A0ACB64000
|
trusted library allocation
|
page read and write
|
||
9D8000
|
heap
|
page read and write
|
||
29D0000
|
heap
|
page read and write
|
||
279B0000
|
trusted library allocation
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
762C30D000
|
stack
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
26445850000
|
heap
|
page read and write
|
||
1A092900000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
7FFBAFC27000
|
trusted library allocation
|
page read and write
|
||
7FFBAF9A0000
|
trusted library allocation
|
page read and write
|
||
1A0AC8F0000
|
heap
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A095247000
|
trusted library allocation
|
page read and write
|
||
1A0959E9000
|
trusted library allocation
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1A0ACF00000
|
trusted library allocation
|
page read and write
|
||
1A0AC74F000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
FF6000
|
unkown
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1A094324000
|
trusted library allocation
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
1A0ACA57000
|
heap
|
page read and write
|
||
15921E64000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
F3F0000
|
trusted library allocation
|
page read and write
|
||
7FFBAFD30000
|
trusted library allocation
|
page read and write
|
||
1A0ACCA0000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
D60000
|
unkown
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
14012000
|
direct allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
1A0ACC80000
|
trusted library allocation
|
page read and write
|
||
2A907C20000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
FA0000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
9FD6D3E000
|
stack
|
page read and write
|
||
1A09548C000
|
trusted library allocation
|
page read and write
|
||
1A0A439D000
|
trusted library allocation
|
page read and write
|
||
1A09279E000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1A0AC762000
|
heap
|
page read and write
|
||
1830C9C0000
|
heap
|
page read and write
|
||
7FF675FF8000
|
unkown
|
page execute read
|
||
680000
|
trusted library allocation
|
page read and write
|
||
1A092620000
|
heap
|
page read and write
|
||
1A0951F0000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A09527B000
|
trusted library allocation
|
page read and write
|
||
3EA0000
|
heap
|
page read and write
|
||
1A09575A000
|
trusted library allocation
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
279921F0000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
BC1000
|
unkown
|
page execute read
|
||
3851000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1B7BF000
|
stack
|
page read and write
|
||
1A0ACB44000
|
trusted library allocation
|
page read and write
|
||
2359C664000
|
heap
|
page read and write
|
||
14016000
|
direct allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0AC9EE000
|
heap
|
page read and write
|
||
3851000
|
heap
|
page read and write
|
||
1A0ACF50000
|
trusted library allocation
|
page read and write
|
||
1A42F100000
|
heap
|
page read and write
|
||
20A7E4D5000
|
direct allocation
|
page execute and read and write
|
||
1A0ACC80000
|
trusted library allocation
|
page read and write
|
||
1A095400000
|
trusted library allocation
|
page read and write
|
||
7FFBAFCB0000
|
trusted library allocation
|
page read and write
|
||
CDD2BFF000
|
stack
|
page read and write
|
||
1A095414000
|
trusted library allocation
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
685000
|
heap
|
page read and write
|
||
3A30000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
685000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
978000
|
heap
|
page read and write
|
||
1A09510B000
|
trusted library allocation
|
page read and write
|
||
10434000
|
unkown
|
page execute read
|
||
1111000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1A0ACB40000
|
trusted library allocation
|
page read and write
|
||
1A0AC974000
|
heap
|
page read and write
|
||
685000
|
heap
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
18FB6D02000
|
heap
|
page read and write
|
||
4BC0000
|
heap
|
page read and write
|
||
27A78000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1830000
|
heap
|
page read and write
|
||
1BD288B0000
|
unkown
|
page readonly
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
320E000
|
stack
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
27A9C000
|
trusted library allocation
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
1A0ACA03000
|
heap
|
page read and write
|
||
2D00000
|
heap
|
page read and write
|
||
1A0ACB50000
|
trusted library allocation
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
4B5D000
|
trusted library allocation
|
page read and write
|
||
1A094F79000
|
trusted library allocation
|
page read and write
|
||
1E06A7B000
|
stack
|
page read and write
|
||
31BE000
|
stack
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
328E000
|
stack
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
9C347E000
|
stack
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0ACB00000
|
heap
|
page execute and read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
1A095887000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
9FD6979000
|
stack
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1C7D1D02000
|
heap
|
page read and write
|
||
2359C642000
|
heap
|
page read and write
|
||
133CA7B000
|
stack
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
12DDABD0000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
12FB000
|
stack
|
page read and write
|
||
F19527F000
|
stack
|
page read and write
|
||
4D57000
|
trusted library allocation
|
page read and write
|
||
1A0ACC98000
|
trusted library allocation
|
page read and write
|
||
1A0ACCC0000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
7FF675891000
|
unkown
|
page execute read
|
||
1111000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
7FFBAFBF0000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
61E00000
|
direct allocation
|
page execute and read and write
|
||
1C7D1A70000
|
heap
|
page read and write
|
||
3311000
|
heap
|
page read and write
|
||
CCE5AFF000
|
stack
|
page read and write
|
||
1A0ACA5D000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
74C000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
20A7D888000
|
heap
|
page read and write
|
||
7FFBAFB60000
|
trusted library allocation
|
page execute and read and write
|
||
1484000
|
heap
|
page read and write
|
||
27E9B6F0000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
3ABD000
|
stack
|
page read and write
|
||
1A0ACC80000
|
trusted library allocation
|
page read and write
|
||
36FE000
|
stack
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
18FB6D14000
|
heap
|
page read and write
|
||
F34A000
|
trusted library allocation
|
page read and write
|
||
83A000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
312D000
|
stack
|
page read and write
|
||
1D290DE0000
|
remote allocation
|
page read and write
|
||
14052000
|
direct allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
3851000
|
heap
|
page read and write
|
||
15D0000
|
trusted library allocation
|
page read and write
|
||
1A0ACB61000
|
trusted library allocation
|
page read and write
|
||
1A0ACCB0000
|
trusted library allocation
|
page read and write
|
||
F04A000
|
stack
|
page read and write
|
||
1A0ACAB1000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
15922602000
|
trusted library allocation
|
page read and write
|
||
7FFBAFC80000
|
trusted library allocation
|
page read and write
|
||
3D0000
|
unkown
|
page readonly
|
||
1484000
|
heap
|
page read and write
|
||
620000
|
trusted library allocation
|
page read and write
|
||
DBA847F000
|
stack
|
page read and write
|
||
1A0ACF00000
|
trusted library allocation
|
page read and write
|
||
1397000
|
heap
|
page read and write
|
||
21501813000
|
heap
|
page read and write
|
||
7FFBAFB32000
|
trusted library allocation
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
4C6F000
|
stack
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
838000
|
heap
|
page read and write
|
||
1FD2AD60000
|
heap
|
page read and write
|
||
A28000
|
heap
|
page read and write
|
||
3851000
|
heap
|
page read and write
|
||
1002D000
|
unkown
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
2CFC000
|
stack
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
6B5000
|
heap
|
page read and write
|
||
1A0ACB20000
|
trusted library allocation
|
page read and write
|
||
27A74000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0ACF80000
|
trusted library allocation
|
page read and write
|
||
37FF000
|
stack
|
page read and write
|
||
22863350000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
1080000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0AC734000
|
heap
|
page read and write
|
||
4C2267F000
|
stack
|
page read and write
|
||
1D28F3F0000
|
trusted library allocation
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
35B0000
|
heap
|
page read and write
|
||
BC1000
|
unkown
|
page execute read
|
||
27044EE0000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A0ACCB0000
|
trusted library allocation
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
1720000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
3247000
|
heap
|
page read and write
|
||
1A0ACCB0000
|
trusted library allocation
|
page read and write
|
||
32F7000
|
heap
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
1A094170000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
3E9A000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
1A094F65000
|
trusted library allocation
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1C80000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1D28F448000
|
heap
|
page read and write
|
||
3540000
|
trusted library allocation
|
page read and write
|
||
1B3BF000
|
stack
|
page read and write
|
||
1A092793000
|
heap
|
page read and write
|
||
7FF675C45000
|
unkown
|
page readonly
|
||
684000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
1D28F500000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
1A0ACB50000
|
trusted library allocation
|
page read and write
|
||
7FFBAFB75000
|
trusted library allocation
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
1A0AC711000
|
heap
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
1A0A4626000
|
trusted library allocation
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
1A0958DE000
|
trusted library allocation
|
page read and write
|
||
113D000
|
stack
|
page read and write
|
||
1090000
|
unkown
|
page readonly
|
||
6B4000
|
heap
|
page read and write
|
||
F050000
|
trusted library allocation
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1830B0C0000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
7FF675890000
|
unkown
|
page readonly
|
||
684000
|
heap
|
page read and write
|
||
1A0AC752000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1380000
|
trusted library allocation
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
27AC6000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
18FB6D00000
|
heap
|
page read and write
|
||
28A0000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
82F000
|
heap
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
3A98000
|
direct allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
21501730000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
750000
|
trusted library allocation
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
807000
|
heap
|
page read and write
|
||
1C65000
|
unkown
|
page readonly
|
||
3E80000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A095F1C000
|
trusted library allocation
|
page read and write
|
||
9C377F000
|
stack
|
page read and write
|
||
1A092880000
|
heap
|
page read and write
|
||
1401C000
|
direct allocation
|
page read and write
|
||
1A0ACCA0000
|
trusted library allocation
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
F2F0000
|
trusted library allocation
|
page read and write
|
||
3EAA000
|
heap
|
page read and write
|
||
34C7000
|
heap
|
page read and write
|
||
7FFBAFB78000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1D28F413000
|
heap
|
page read and write
|
||
2ECD000
|
stack
|
page read and write
|
||
1A0ACB61000
|
trusted library allocation
|
page read and write
|
||
838000
|
heap
|
page read and write
|
||
D7FE000
|
stack
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
A38000
|
heap
|
page read and write
|
||
1C7D1C13000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
1A092791000
|
heap
|
page read and write
|
||
1D290DE0000
|
remote allocation
|
page read and write
|
||
4B55000
|
trusted library allocation
|
page read and write
|
||
FF6000
|
unkown
|
page write copy
|
||
6ECB0FC000
|
stack
|
page read and write
|
||
9389B5F000
|
stack
|
page read and write
|
||
1830AEE0000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
354DB7D000
|
stack
|
page read and write
|
||
1A0ACAA3000
|
heap
|
page read and write
|
||
7FFBF20D0000
|
direct allocation
|
page execute read
|
||
1A095270000
|
trusted library allocation
|
page read and write
|
||
27045265000
|
heap
|
page read and write
|
||
1A0ACA36000
|
heap
|
page read and write
|
||
1A0ACB60000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
189C000
|
stack
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
1A0ACC80000
|
trusted library allocation
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
1A42F105000
|
heap
|
page read and write
|
||
1A0ACB40000
|
trusted library allocation
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
2A9077E0000
|
heap
|
page read and write
|
||
20A7D86F000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
155A000
|
heap
|
page read and write
|
||
17DE000
|
unkown
|
page readonly
|
||
F190000
|
trusted library allocation
|
page execute and read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
||
CDD267B000
|
stack
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
2359C669000
|
heap
|
page read and write
|
||
1830C960000
|
unkown
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
18FB6C5A000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
3851000
|
heap
|
page read and write
|
||
1830B150000
|
heap
|
page read and write
|
||
13F6D000
|
stack
|
page read and write
|
||
185FDE60000
|
heap
|
page read and write
|
||
27045150000
|
heap
|
page read and write
|
||
14243EE000
|
stack
|
page read and write
|
||
1A0AC703000
|
heap
|
page read and write
|
||
20A7D590000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1150000
|
unkown
|
page readonly
|
||
3A81000
|
direct allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
2644585D000
|
heap
|
page read and write
|
||
1A0AD2E0000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
1830AEE0000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
3BBC000
|
stack
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
344E000
|
stack
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1A09521F000
|
trusted library allocation
|
page read and write
|
||
1D291460000
|
remote allocation
|
page execute and read and write
|
||
29DF25E5000
|
heap
|
page read and write
|
||
1036000
|
unkown
|
page read and write
|
||
1C7D1D13000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
1E06D7E000
|
stack
|
page read and write
|
||
1401E000
|
direct allocation
|
page read and write
|
||
185FDEE0000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
1C64000
|
heap
|
page read and write
|
||
27A74000
|
trusted library allocation
|
page read and write
|
||
29DF21E0000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
2FEC000
|
stack
|
page read and write
|
||
7FFBAFA4C000
|
trusted library allocation
|
page execute and read and write
|
||
1706000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1A0ACA09000
|
heap
|
page read and write
|
||
1A0ACFA0000
|
trusted library allocation
|
page read and write
|
||
75A3A7D000
|
stack
|
page read and write
|
||
569000
|
stack
|
page read and write
|
||
1A0AC762000
|
heap
|
page read and write
|
||
1A0ACB70000
|
trusted library allocation
|
page read and write
|
||
1D28F449000
|
heap
|
page read and write
|
||
1A0AC73F000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
4A10000
|
heap
|
page read and write
|
||
1C4519F000
|
stack
|
page read and write
|
||
1D28F449000
|
heap
|
page read and write
|
||
27E9B6F5000
|
heap
|
page read and write
|
||
1A0AC680000
|
heap
|
page read and write
|
||
685000
|
heap
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
18FB6C67000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
6ECAF7E000
|
stack
|
page read and write
|
||
1C7D1C70000
|
heap
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
20A7E4B0000
|
direct allocation
|
page execute and read and write
|
||
D7BF000
|
stack
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
14243FC000
|
stack
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
2359C626000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
7FFBAFC10000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1830AEA0000
|
heap
|
page read and write
|
||
1EC000
|
stack
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
27A2C000
|
trusted library allocation
|
page read and write
|
||
1A0ACC90000
|
trusted library allocation
|
page read and write
|
There are 2623 hidden memdumps, click here to show them.