Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
dh58NtARpk.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\IXP000.TMP\l91ip55.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6381.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\IXP001.TMP\iycPo61.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba7464.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\IXP002.TMP\f6228Ih.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\IXP002.TMP\h27pP32.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\f6228Ih.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\h27pP32.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\dh58NtARpk.exe
|
C:\Users\user\Desktop\dh58NtARpk.exe
|
||
C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6381.exe
|
C:\Users\user~1\AppData\Local\Temp\IXP000.TMP\niba6381.exe
|
||
C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba7464.exe
|
C:\Users\user~1\AppData\Local\Temp\IXP001.TMP\niba7464.exe
|
||
C:\Users\user\AppData\Local\Temp\IXP002.TMP\f6228Ih.exe
|
C:\Users\user~1\AppData\Local\Temp\IXP002.TMP\f6228Ih.exe
|
||
C:\Users\user\AppData\Local\Temp\IXP002.TMP\h27pP32.exe
|
C:\Users\user~1\AppData\Local\Temp\IXP002.TMP\h27pP32.exe
|
||
C:\Windows\System32\rundll32.exe
|
C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user~1\AppData\Local\Temp\IXP000.TMP\
|
||
C:\Windows\System32\rundll32.exe
|
C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user~1\AppData\Local\Temp\IXP001.TMP\
|
||
C:\Windows\System32\rundll32.exe
|
C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user~1\AppData\Local\Temp\IXP002.TMP\
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
193.233.20.28:4125
|
|||
https://api.ip.sb/ip
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
windowsupdatebg.s.llnwi.net
|
95.140.230.128
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
|
wextract_cleanup0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
|
wextract_cleanup1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
|
wextract_cleanup2
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Features
|
TamperProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
There are 3 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
51A1000
|
heap
|
page read and write
|
||
44E0000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
4530000
|
direct allocation
|
page read and write
|
||
4BE2000
|
trusted library allocation
|
page read and write
|
||
5B51000
|
trusted library allocation
|
page read and write
|
||
1BD14F34000
|
heap
|
page read and write
|
||
1BD14F7A000
|
heap
|
page read and write
|
||
24291E56000
|
heap
|
page read and write
|
||
4E3000
|
heap
|
page read and write
|
||
1BD154C2000
|
heap
|
page read and write
|
||
3445000
|
heap
|
page read and write
|
||
26E23FF000
|
stack
|
page read and write
|
||
5E5000
|
heap
|
page read and write
|
||
1CB1DFAC000
|
heap
|
page read and write
|
||
241AED00000
|
heap
|
page read and write
|
||
6AE0000
|
heap
|
page read and write
|
||
A5B67C000
|
stack
|
page read and write
|
||
1BD15489000
|
heap
|
page read and write
|
||
1D63903D000
|
heap
|
page read and write
|
||
1BD1549F000
|
heap
|
page read and write
|
||
1BD14F29000
|
heap
|
page read and write
|
||
1A174D00000
|
heap
|
page read and write
|
||
1BD14F33000
|
heap
|
page read and write
|
||
1B948E7A000
|
heap
|
page read and write
|
||
1BD14F2E000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
1EDED002000
|
heap
|
page read and write
|
||
20961C00000
|
heap
|
page read and write
|
||
1CB1E418000
|
heap
|
page read and write
|
||
1BD14F75000
|
heap
|
page read and write
|
||
1D638FC5000
|
heap
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
1EDEBB61000
|
heap
|
page read and write
|
||
34D2000
|
heap
|
page read and write
|
||
1D639000000
|
heap
|
page read and write
|
||
1EDEB043000
|
heap
|
page read and write
|
||
4BCF000
|
trusted library allocation
|
page read and write
|
||
1BD154AC000
|
heap
|
page read and write
|
||
1BD14F08000
|
heap
|
page read and write
|
||
241AEAB0000
|
heap
|
page read and write
|
||
1BD14F5A000
|
heap
|
page read and write
|
||
1BD14F32000
|
heap
|
page read and write
|
||
1D638DE0000
|
heap
|
page read and write
|
||
71344FC000
|
stack
|
page read and write
|
||
1BD154DA000
|
heap
|
page read and write
|
||
1BD14F9D000
|
heap
|
page read and write
|
||
1BD14F63000
|
heap
|
page read and write
|
||
1BD15499000
|
heap
|
page read and write
|
||
1BD14F9D000
|
heap
|
page read and write
|
||
4860000
|
heap
|
page read and write
|
||
1BD14F2E000
|
heap
|
page read and write
|
||
1BD144A1000
|
heap
|
page read and write
|
||
528D000
|
heap
|
page read and write
|
||
2A89E913000
|
heap
|
page read and write
|
||
1BD14F2A000
|
heap
|
page read and write
|
||
1BD14F68000
|
heap
|
page read and write
|
||
22318DF0000
|
remote allocation
|
page read and write
|
||
26E1EFD000
|
stack
|
page read and write
|
||
1E0DC25A000
|
heap
|
page read and write
|
||
1A174D02000
|
heap
|
page read and write
|
||
CC0000
|
unkown
|
page readonly
|
||
1BD14F33000
|
heap
|
page read and write
|
||
1CB1D6E0000
|
heap
|
page read and write
|
||
1BD1547F000
|
heap
|
page read and write
|
||
1BD14F74000
|
heap
|
page read and write
|
||
1BD144A7000
|
heap
|
page read and write
|
||
1BD154E0000
|
heap
|
page read and write
|
||
34D5000
|
heap
|
page read and write
|
||
BE0000
|
unkown
|
page readonly
|
||
255F1451000
|
heap
|
page read and write
|
||
4B95000
|
trusted library allocation
|
page read and write
|
||
73F000
|
stack
|
page read and write
|
||
1BD14F6D000
|
heap
|
page read and write
|
||
35D5000
|
heap
|
page read and write
|
||
1CB1DF8E000
|
heap
|
page read and write
|
||
D7A6DFF000
|
stack
|
page read and write
|
||
1CB1E403000
|
heap
|
page read and write
|
||
1BD14F6E000
|
heap
|
page read and write
|
||
4BBF000
|
trusted library allocation
|
page read and write
|
||
255F1502000
|
heap
|
page read and write
|
||
1BD14F7F000
|
heap
|
page read and write
|
||
1BD14F75000
|
heap
|
page read and write
|
||
1BD14F6D000
|
heap
|
page read and write
|
||
1B948E7B000
|
heap
|
page read and write
|
||
7FFDC431D000
|
trusted library allocation
|
page execute and read and write
|
||
1F9B37F000
|
stack
|
page read and write
|
||
1BD154D3000
|
heap
|
page read and write
|
||
1CB1DF89000
|
heap
|
page read and write
|
||
3880000
|
heap
|
page read and write
|
||
7070000
|
trusted library allocation
|
page read and write
|
||
1BD15441000
|
heap
|
page read and write
|
||
1BD14F6F000
|
heap
|
page read and write
|
||
1A174C88000
|
heap
|
page read and write
|
||
1CB1DFA4000
|
heap
|
page read and write
|
||
959E5FC000
|
stack
|
page read and write
|
||
8180000
|
trusted library allocation
|
page read and write
|
||
45A0000
|
heap
|
page read and write
|
||
1CB1DF83000
|
heap
|
page read and write
|
||
1BD154C5000
|
heap
|
page read and write
|
||
20961AA0000
|
heap
|
page read and write
|
||
1BD144A7000
|
heap
|
page read and write
|
||
1BD14F31000
|
heap
|
page read and write
|
||
430000
|
unkown
|
page read and write
|
||
A4B3378000
|
stack
|
page read and write
|
||
1BD14F30000
|
heap
|
page read and write
|
||
7090000
|
trusted library section
|
page read and write
|
||
1BD15487000
|
heap
|
page read and write
|
||
12587000
|
trusted library allocation
|
page read and write
|
||
1BD14F52000
|
heap
|
page read and write
|
||
1BD14F84000
|
heap
|
page read and write
|
||
1BD14F5C000
|
heap
|
page read and write
|
||
4BC1000
|
trusted library allocation
|
page read and write
|
||
CC1000
|
unkown
|
page execute read
|
||
1CB1DF92000
|
heap
|
page read and write
|
||
35CE000
|
heap
|
page read and write
|
||
35C9000
|
heap
|
page read and write
|
||
5B2000
|
heap
|
page read and write
|
||
5B79000
|
trusted library allocation
|
page read and write
|
||
1BD144A1000
|
heap
|
page read and write
|
||
1BD14F5B000
|
heap
|
page read and write
|
||
7730000
|
trusted library allocation
|
page read and write
|
||
1BD14491000
|
heap
|
page read and write
|
||
D7A72FD000
|
stack
|
page read and write
|
||
959DC7C000
|
stack
|
page read and write
|
||
4374000
|
heap
|
page read and write
|
||
1BD14F58000
|
heap
|
page read and write
|
||
71345FA000
|
stack
|
page read and write
|
||
1BD14F63000
|
heap
|
page read and write
|
||
1BD14F32000
|
heap
|
page read and write
|
||
1CB1E400000
|
heap
|
page read and write
|
||
1BD14F86000
|
heap
|
page read and write
|
||
1CB1D716000
|
heap
|
page read and write
|
||
1BD14F07000
|
heap
|
page read and write
|
||
1BD144A7000
|
heap
|
page read and write
|
||
1BD14549000
|
heap
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
241AED08000
|
heap
|
page read and write
|
||
7A0000
|
trusted library allocation
|
page read and write
|
||
1BD14F6D000
|
heap
|
page read and write
|
||
1B948E59000
|
heap
|
page read and write
|
||
4BEA000
|
trusted library allocation
|
page read and write
|
||
6AE4000
|
heap
|
page read and write
|
||
4BB0000
|
trusted library allocation
|
page read and write
|
||
35FC000
|
heap
|
page read and write
|
||
1ECCF780000
|
trusted library allocation
|
page read and write
|
||
7FFDC4302000
|
trusted library allocation
|
page read and write
|
||
1BD14F29000
|
heap
|
page read and write
|
||
35D7000
|
heap
|
page read and write
|
||
456E000
|
stack
|
page read and write
|
||
1ECCF750000
|
heap
|
page read and write
|
||
2A89E83C000
|
heap
|
page read and write
|
||
1BD1545D000
|
heap
|
page read and write
|
||
1A174C47000
|
heap
|
page read and write
|
||
1CB1DF85000
|
heap
|
page read and write
|
||
1CB1DF92000
|
heap
|
page read and write
|
||
1BD14F7A000
|
heap
|
page read and write
|
||
1BD14475000
|
heap
|
page read and write
|
||
1BD14F34000
|
heap
|
page read and write
|
||
24291E7C000
|
heap
|
page read and write
|
||
1BD14538000
|
heap
|
page read and write
|
||
1BD14491000
|
heap
|
page read and write
|
||
1B948F02000
|
heap
|
page read and write
|
||
2A89E852000
|
heap
|
page read and write
|
||
1EDEBB7D000
|
heap
|
page read and write
|
||
1BD14F8E000
|
heap
|
page read and write
|
||
72528FE000
|
stack
|
page read and write
|
||
1EDEBB6D000
|
heap
|
page read and write
|
||
1BD14F52000
|
heap
|
page read and write
|
||
1BD14F62000
|
heap
|
page read and write
|
||
33EE000
|
stack
|
page read and write
|
||
241AEAA0000
|
heap
|
page read and write
|
||
24291F00000
|
heap
|
page read and write
|
||
1BD14479000
|
heap
|
page read and write
|
||
1BD14F6E000
|
heap
|
page read and write
|
||
26E1AFB000
|
stack
|
page read and write
|
||
35E0000
|
heap
|
page read and write
|
||
1EDEB102000
|
heap
|
page read and write
|
||
35D1000
|
heap
|
page read and write
|
||
A4B30FB000
|
stack
|
page read and write
|
||
1CB1DF8D000
|
heap
|
page read and write
|
||
430000
|
unkown
|
page write copy
|
||
1BD144E8000
|
heap
|
page read and write
|
||
ABF317F000
|
stack
|
page read and write
|
||
7FFDC42F4000
|
trusted library allocation
|
page read and write
|
||
2C65000
|
heap
|
page read and write
|
||
1A176710000
|
trusted library allocation
|
page read and write
|
||
72529FF000
|
stack
|
page read and write
|
||
F9D8B1E000
|
stack
|
page read and write
|
||
22318613000
|
heap
|
page read and write
|
||
1BD154C8000
|
heap
|
page read and write
|
||
1EDEBBA0000
|
heap
|
page read and write
|
||
1BD14F29000
|
heap
|
page read and write
|
||
8FEADF9000
|
stack
|
page read and write
|
||
1A174C47000
|
heap
|
page read and write
|
||
219F000
|
stack
|
page read and write
|
||
CC0000
|
unkown
|
page readonly
|
||
6FDE07F000
|
stack
|
page read and write
|
||
1CB1DF8E000
|
heap
|
page read and write
|
||
1CB1D500000
|
trusted library allocation
|
page read and write
|
||
1BD14F86000
|
heap
|
page read and write
|
||
3490000
|
heap
|
page read and write
|
||
1BD14F6F000
|
heap
|
page read and write
|
||
1CB1D6F7000
|
heap
|
page read and write
|
||
1CB1DF9C000
|
heap
|
page read and write
|
||
BA0BD7F000
|
stack
|
page read and write
|
||
784000
|
trusted library allocation
|
page read and write
|
||
8FEA7CC000
|
stack
|
page read and write
|
||
20961CCA000
|
heap
|
page read and write
|
||
1CB1E421000
|
heap
|
page read and write
|
||
1EDEBB5A000
|
heap
|
page read and write
|
||
1BD14F72000
|
heap
|
page read and write
|
||
34AA000
|
heap
|
page read and write
|
||
770000
|
trusted library allocation
|
page read and write
|
||
4B93000
|
trusted library allocation
|
page read and write
|
||
1CB1DFA3000
|
heap
|
page read and write
|
||
1B948E26000
|
heap
|
page read and write
|
||
1BD15500000
|
heap
|
page read and write
|
||
1EDEB029000
|
heap
|
page read and write
|
||
2A89E900000
|
heap
|
page read and write
|
||
1BD15457000
|
heap
|
page read and write
|
||
1BD154B2000
|
heap
|
page read and write
|
||
1BD14F99000
|
heap
|
page read and write
|
||
7B0000
|
trusted library allocation
|
page read and write
|
||
1BD14F6D000
|
heap
|
page read and write
|
||
959E6FF000
|
stack
|
page read and write
|
||
1CB1DFAB000
|
heap
|
page read and write
|
||
1BD144AF000
|
heap
|
page read and write
|
||
1B948E58000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
76B0000
|
trusted library allocation
|
page read and write
|
||
1BD14F13000
|
heap
|
page read and write
|
||
1BD14F80000
|
heap
|
page read and write
|
||
34CE000
|
stack
|
page read and write
|
||
7C0000
|
trusted library allocation
|
page read and write
|
||
1BD14F84000
|
heap
|
page read and write
|
||
1BD14F6D000
|
heap
|
page read and write
|
||
35C9000
|
heap
|
page read and write
|
||
1ECCF802000
|
heap
|
page read and write
|
||
1E0DC1B0000
|
trusted library allocation
|
page read and write
|
||
341E000
|
stack
|
page read and write
|
||
34C6000
|
heap
|
page read and write
|
||
6BC4000
|
heap
|
page read and write
|
||
2AE0000
|
unkown
|
page readonly
|
||
1CB1E42B000
|
heap
|
page read and write
|
||
1BD14F6D000
|
heap
|
page read and write
|
||
1BD15481000
|
heap
|
page read and write
|
||
4BEF000
|
trusted library allocation
|
page read and write
|
||
1BD143A0000
|
trusted library allocation
|
page read and write
|
||
170000
|
heap
|
page read and write
|
||
F6C497E000
|
stack
|
page read and write
|
||
1B948E47000
|
heap
|
page read and write
|
||
1BD14429000
|
heap
|
page read and write
|
||
4BD2000
|
trusted library allocation
|
page read and write
|
||
1BD154D1000
|
heap
|
page read and write
|
||
451D000
|
trusted library allocation
|
page execute and read and write
|
||
1BD14F2A000
|
heap
|
page read and write
|
||
195000
|
stack
|
page read and write
|
||
CCC000
|
unkown
|
page readonly
|
||
7FFDC4310000
|
trusted library allocation
|
page read and write
|
||
2A89E813000
|
heap
|
page read and write
|
||
4E5000
|
heap
|
page read and write
|
||
1BD14F6F000
|
heap
|
page read and write
|
||
1BD154E5000
|
heap
|
page read and write
|
||
2A89E886000
|
heap
|
page read and write
|
||
1D639017000
|
heap
|
page read and write
|
||
255F143C000
|
heap
|
page read and write
|
||
1B948E62000
|
heap
|
page read and write
|
||
1CB1DF8E000
|
heap
|
page read and write
|
||
1BD14F80000
|
heap
|
page read and write
|
||
B17C377000
|
stack
|
page read and write
|
||
35CC000
|
heap
|
page read and write
|
||
1CB1D5C0000
|
remote allocation
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
1EDEB000000
|
heap
|
page read and write
|
||
1BD15502000
|
heap
|
page read and write
|
||
1CB1DF81000
|
heap
|
page read and write
|
||
76A0000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
heap
|
page execute and read and write
|
||
12581000
|
trusted library allocation
|
page read and write
|
||
790000
|
trusted library allocation
|
page read and write
|
||
A5BA7C000
|
stack
|
page read and write
|
||
1B948DA0000
|
trusted library allocation
|
page read and write
|
||
1BD14F68000
|
heap
|
page read and write
|
||
1BD144A1000
|
heap
|
page read and write
|
||
1BD15457000
|
heap
|
page read and write
|
||
1BD14F32000
|
heap
|
page read and write
|
||
7640000
|
trusted library allocation
|
page read and write
|
||
1BD154D5000
|
heap
|
page read and write
|
||
1BD154BE000
|
heap
|
page read and write
|
||
17C35690000
|
heap
|
page read and write
|
||
53F7000
|
heap
|
page read and write
|
||
1D639027000
|
heap
|
page read and write
|
||
1EDEBB7D000
|
heap
|
page read and write
|
||
20962402000
|
heap
|
page read and write
|
||
1BD14F29000
|
heap
|
page read and write
|
||
1CB1DF75000
|
heap
|
page read and write
|
||
4597000
|
trusted library allocation
|
page execute and read and write
|
||
1EEDD72F000
|
heap
|
page read and write
|
||
28EF27E0000
|
heap
|
page read and write
|
||
1BD14F62000
|
heap
|
page read and write
|
||
2A89E88C000
|
heap
|
page read and write
|
||
175BDC07000
|
heap
|
page read and write
|
||
1BD14E15000
|
heap
|
page read and write
|
||
17C35A60000
|
heap
|
page read and write
|
||
1A174C62000
|
heap
|
page read and write
|
||
1BD14F76000
|
heap
|
page read and write
|
||
1BD14F7A000
|
heap
|
page read and write
|
||
781F000
|
stack
|
page read and write
|
||
1BD14F7F000
|
heap
|
page read and write
|
||
2A89E84C000
|
heap
|
page read and write
|
||
1BD14F63000
|
heap
|
page read and write
|
||
1BD14F2B000
|
heap
|
page read and write
|
||
1D638FC0000
|
heap
|
page read and write
|
||
1BD14F5A000
|
heap
|
page read and write
|
||
1CB1DF8E000
|
heap
|
page read and write
|
||
1BD14F88000
|
heap
|
page read and write
|
||
530E000
|
stack
|
page read and write
|
||
241AEC51000
|
heap
|
page read and write
|
||
1BD14F68000
|
heap
|
page read and write
|
||
1BD14F56000
|
heap
|
page read and write
|
||
790000
|
trusted library allocation
|
page read and write
|
||
1BD14F6F000
|
heap
|
page read and write
|
||
1BD1456A000
|
heap
|
page read and write
|
||
7710000
|
trusted library allocation
|
page read and write
|
||
426000
|
unkown
|
page execute and read and write
|
||
1BD14F2A000
|
heap
|
page read and write
|
||
1BD14491000
|
heap
|
page read and write
|
||
1BD154AC000
|
heap
|
page read and write
|
||
1BD154D8000
|
heap
|
page read and write
|
||
1EEDD681000
|
heap
|
page read and write
|
||
7A0000
|
trusted library allocation
|
page read and write
|
||
26E16EB000
|
stack
|
page read and write
|
||
1BD14F6D000
|
heap
|
page read and write
|
||
1BD14F5A000
|
heap
|
page read and write
|
||
1BD14F93000
|
heap
|
page read and write
|
||
2A89E84D000
|
heap
|
page read and write
|
||
1BD14F7E000
|
heap
|
page read and write
|
||
3440000
|
heap
|
page read and write
|
||
1CB1D390000
|
heap
|
page read and write
|
||
1BD154EC000
|
heap
|
page read and write
|
||
1A1766D0000
|
trusted library allocation
|
page read and write
|
||
4590000
|
trusted library allocation
|
page read and write
|
||
BA0BCFA000
|
stack
|
page read and write
|
||
1B948E64000
|
heap
|
page read and write
|
||
2A89F002000
|
trusted library allocation
|
page read and write
|
||
1BD14F4D000
|
heap
|
page read and write
|
||
1EEDD63D000
|
heap
|
page read and write
|
||
42F000
|
unkown
|
page execute and read and write
|
||
1E0DC202000
|
heap
|
page read and write
|
||
1BD14F31000
|
heap
|
page read and write
|
||
1EDEAFD0000
|
trusted library allocation
|
page read and write
|
||
1D638F30000
|
heap
|
page read and write
|
||
1BD14517000
|
heap
|
page read and write
|
||
1BD14F5A000
|
heap
|
page read and write
|
||
D7A71FF000
|
stack
|
page read and write
|
||
7080000
|
trusted library allocation
|
page read and write
|
||
1E0DC110000
|
heap
|
page read and write
|
||
1BD14F9F000
|
heap
|
page read and write
|
||
1EEDDE02000
|
trusted library allocation
|
page read and write
|
||
1CB1D6B0000
|
heap
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
483F000
|
stack
|
page read and write
|
||
7ADF000
|
stack
|
page read and write
|
||
1B948E00000
|
heap
|
page read and write
|
||
1F9B17F000
|
stack
|
page read and write
|
||
241AEC5F000
|
heap
|
page read and write
|
||
1CB1DFAD000
|
heap
|
page read and write
|
||
7A0000
|
trusted library allocation
|
page read and write
|
||
7770000
|
trusted library allocation
|
page read and write
|
||
1CB1DFB6000
|
heap
|
page read and write
|
||
4BCD000
|
trusted library allocation
|
page read and write
|
||
4BAA000
|
trusted library allocation
|
page read and write
|
||
1BD1548D000
|
heap
|
page read and write
|
||
1B948E6B000
|
heap
|
page read and write
|
||
1EEDD550000
|
trusted library allocation
|
page read and write
|
||
1BD14F4D000
|
heap
|
page read and write
|
||
1CB1DF92000
|
heap
|
page read and write
|
||
1BD154E9000
|
heap
|
page read and write
|
||
4BA6000
|
trusted library allocation
|
page read and write
|
||
24291E5F000
|
heap
|
page read and write
|
||
1BD14F4D000
|
heap
|
page read and write
|
||
4630000
|
heap
|
page read and write
|
||
5A1000
|
heap
|
page read and write
|
||
1EEDD675000
|
heap
|
page read and write
|
||
1BD14F2A000
|
heap
|
page read and write
|
||
241AF402000
|
trusted library allocation
|
page read and write
|
||
1EDEBA02000
|
heap
|
page read and write
|
||
1B948CA0000
|
heap
|
page read and write
|
||
1BD1447B000
|
heap
|
page read and write
|
||
1BD14F2F000
|
heap
|
page read and write
|
||
790000
|
trusted library allocation
|
page read and write
|
||
28EF2870000
|
heap
|
page read and write
|
||
1EDEBB00000
|
heap
|
page read and write
|
||
2A89E650000
|
heap
|
page read and write
|
||
6FDDD2F000
|
stack
|
page read and write
|
||
241AF3B0000
|
trusted library allocation
|
page read and write
|
||
20962513000
|
heap
|
page read and write
|
||
7064000
|
trusted library allocation
|
page read and write
|
||
1ECCF913000
|
heap
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
1EDEBA00000
|
heap
|
page read and write
|
||
255F1468000
|
heap
|
page read and write
|
||
75E0000
|
heap
|
page read and write
|
||
1BD14F5F000
|
heap
|
page read and write
|
||
22318DC0000
|
trusted library allocation
|
page read and write
|
||
1BD14F83000
|
heap
|
page read and write
|
||
BEA000
|
unkown
|
page readonly
|
||
1BD14491000
|
heap
|
page read and write
|
||
1BD14F88000
|
heap
|
page read and write
|
||
BE1000
|
unkown
|
page execute read
|
||
76E0000
|
trusted library allocation
|
page read and write
|
||
1BD14370000
|
heap
|
page read and write
|
||
1BD14F84000
|
heap
|
page read and write
|
||
24291F13000
|
heap
|
page read and write
|
||
1BD14F2C000
|
heap
|
page read and write
|
||
348E000
|
stack
|
page read and write
|
||
1BD14F53000
|
heap
|
page read and write
|
||
24291BB0000
|
heap
|
page read and write
|
||
241AED13000
|
heap
|
page read and write
|
||
241AEC61000
|
heap
|
page read and write
|
||
790000
|
trusted library allocation
|
page read and write
|
||
1A174C57000
|
heap
|
page read and write
|
||
1BD14300000
|
heap
|
page read and write
|
||
F6C4E7F000
|
stack
|
page read and write
|
||
34C9000
|
heap
|
page read and write
|
||
1CB1D5C0000
|
remote allocation
|
page read and write
|
||
1CB1DF8F000
|
heap
|
page read and write
|
||
1BD14F84000
|
heap
|
page read and write
|
||
1BD14F32000
|
heap
|
page read and write
|
||
A5B97B000
|
stack
|
page read and write
|
||
1BD14F77000
|
heap
|
page read and write
|
||
209E000
|
stack
|
page read and write
|
||
1BD15467000
|
heap
|
page read and write
|
||
4BA000
|
heap
|
page read and write
|
||
F9D8B9E000
|
stack
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
1BD15485000
|
heap
|
page read and write
|
||
33AE000
|
stack
|
page read and write
|
||
1BD14F62000
|
heap
|
page read and write
|
||
1BD14F34000
|
heap
|
page read and write
|
||
1EDEB084000
|
heap
|
page read and write
|
||
2A89E6B0000
|
heap
|
page read and write
|
||
175BDC00000
|
heap
|
page read and write
|
||
1BD154C8000
|
heap
|
page read and write
|
||
1CB1DF92000
|
heap
|
page read and write
|
||
1BD14F2B000
|
heap
|
page read and write
|
||
1CB1DFAF000
|
heap
|
page read and write
|
||
1BD14F69000
|
heap
|
page read and write
|
||
1EDEBB8A000
|
heap
|
page read and write
|
||
2BE5000
|
heap
|
page read and write
|
||
790000
|
trusted library allocation
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
1BD14F2A000
|
heap
|
page read and write
|
||
959E4FF000
|
stack
|
page read and write
|
||
1BD14F6F000
|
heap
|
page read and write
|
||
4B8B000
|
trusted library allocation
|
page read and write
|
||
790000
|
trusted library allocation
|
page read and write
|
||
1BD14F74000
|
heap
|
page read and write
|
||
24291E3C000
|
heap
|
page read and write
|
||
1BD154CF000
|
heap
|
page read and write
|
||
55366FD000
|
stack
|
page read and write
|
||
22318602000
|
heap
|
page read and write
|
||
1CB1DFA3000
|
heap
|
page read and write
|
||
1CB1DF81000
|
heap
|
page read and write
|
||
3DC957F000
|
stack
|
page read and write
|
||
241AEC3C000
|
heap
|
page read and write
|
||
1EEDD450000
|
heap
|
page read and write
|
||
255F11B0000
|
heap
|
page read and write
|
||
255F1400000
|
heap
|
page read and write
|
||
2BCF000
|
heap
|
page read and write
|
||
1D63900B000
|
heap
|
page read and write
|
||
1BD14F2C000
|
heap
|
page read and write
|
||
A4B2C7E000
|
stack
|
page read and write
|
||
D7A6C7B000
|
stack
|
page read and write
|
||
55359DC000
|
stack
|
page read and write
|
||
22318E02000
|
trusted library allocation
|
page read and write
|
||
1CB1D64D000
|
heap
|
page read and write
|
||
1BD14F6F000
|
heap
|
page read and write
|
||
7076000
|
trusted library allocation
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
1BD154CF000
|
heap
|
page read and write
|
||
7780000
|
trusted library allocation
|
page read and write
|
||
BA0B92F000
|
stack
|
page read and write
|
||
1BD15512000
|
heap
|
page read and write
|
||
1BD14F7A000
|
heap
|
page read and write
|
||
1CB1DF00000
|
heap
|
page read and write
|
||
1CB1DF22000
|
heap
|
page read and write
|
||
1EDEBB7B000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
1BD14F81000
|
heap
|
page read and write
|
||
57C000
|
heap
|
page read and write
|
||
2A89E87C000
|
heap
|
page read and write
|
||
1BD14F81000
|
heap
|
page read and write
|
||
1BD154D7000
|
heap
|
page read and write
|
||
1CB1DF71000
|
heap
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
ABF2C7C000
|
stack
|
page read and write
|
||
175BDD85000
|
heap
|
page read and write
|
||
34CD000
|
heap
|
page read and write
|
||
3899000
|
heap
|
page read and write
|
||
A4B34F9000
|
stack
|
page read and write
|
||
1BD14F75000
|
heap
|
page read and write
|
||
1E0DC120000
|
heap
|
page read and write
|
||
241AEC29000
|
heap
|
page read and write
|
||
1BD14F88000
|
heap
|
page read and write
|
||
1CB1DFBD000
|
heap
|
page read and write
|
||
26E1CFD000
|
stack
|
page read and write
|
||
1BD14F71000
|
heap
|
page read and write
|
||
BCC000
|
unkown
|
page readonly
|
||
1BD14F6F000
|
heap
|
page read and write
|
||
A4B327E000
|
stack
|
page read and write
|
||
1BD14F35000
|
heap
|
page read and write
|
||
7FFDC430D000
|
trusted library allocation
|
page execute and read and write
|
||
1BD14F6E000
|
heap
|
page read and write
|
||
2B86000
|
heap
|
page read and write
|
||
1BD154BA000
|
heap
|
page read and write
|
||
1BD14F6A000
|
heap
|
page read and write
|
||
1BD154E9000
|
heap
|
page read and write
|
||
1EEDD702000
|
heap
|
page read and write
|
||
1CB1D400000
|
heap
|
page read and write
|
||
1BD14F33000
|
heap
|
page read and write
|
||
A5B77E000
|
stack
|
page read and write
|
||
2A89E84B000
|
heap
|
page read and write
|
||
1BD14F53000
|
heap
|
page read and write
|
||
1BD14F2D000
|
heap
|
page read and write
|
||
1BD14F2A000
|
heap
|
page read and write
|
||
1CB1E402000
|
heap
|
page read and write
|
||
34A0000
|
heap
|
page read and write
|
||
36B9000
|
heap
|
page read and write
|
||
791000
|
trusted library allocation
|
page read and write
|
||
1BD154CA000
|
heap
|
page read and write
|
||
2A89E848000
|
heap
|
page read and write
|
||
1BD154E9000
|
heap
|
page read and write
|
||
1BD14F85000
|
heap
|
page read and write
|
||
7690000
|
trusted library allocation
|
page read and write
|
||
1EEDD602000
|
heap
|
page read and write
|
||
1B948E6F000
|
heap
|
page read and write
|
||
4F6000
|
stack
|
page read and write
|
||
1A174C57000
|
heap
|
page read and write
|
||
1BD14F34000
|
heap
|
page read and write
|
||
1BD14F77000
|
heap
|
page read and write
|
||
2A89E850000
|
heap
|
page read and write
|
||
35E9000
|
heap
|
page read and write
|
||
17C356D7000
|
heap
|
page read and write
|
||
5B55000
|
trusted library allocation
|
page read and write
|
||
1BD14F74000
|
heap
|
page read and write
|
||
35A0000
|
heap
|
page read and write
|
||
790000
|
trusted library allocation
|
page read and write
|
||
48B0000
|
heap
|
page read and write
|
||
7630000
|
trusted library allocation
|
page read and write
|
||
1CB1DF9E000
|
heap
|
page read and write
|
||
1BD14F4E000
|
heap
|
page read and write
|
||
4BA8000
|
trusted library allocation
|
page read and write
|
||
20962500000
|
heap
|
page read and write
|
||
1BD15513000
|
heap
|
page read and write
|
||
1BD1544D000
|
heap
|
page read and write
|
||
1EEDD3E0000
|
heap
|
page read and write
|
||
175BDBE0000
|
heap
|
page read and write
|
||
CCC000
|
unkown
|
page readonly
|
||
B17C27F000
|
stack
|
page read and write
|
||
55361FF000
|
stack
|
page read and write
|
||
1BD14F6D000
|
heap
|
page read and write
|
||
1BD14F74000
|
heap
|
page read and write
|
||
1BD14F3B000
|
heap
|
page read and write
|
||
1BD14F29000
|
heap
|
page read and write
|
||
20961D13000
|
heap
|
page read and write
|
||
1CB1DFB6000
|
heap
|
page read and write
|
||
1BD14F00000
|
heap
|
page read and write
|
||
24291E5B000
|
heap
|
page read and write
|
||
1A174C13000
|
heap
|
page read and write
|
||
1BD15499000
|
heap
|
page read and write
|
||
22318635000
|
heap
|
page read and write
|
||
1BD14F72000
|
heap
|
page read and write
|
||
1F9AFFC000
|
stack
|
page read and write
|
||
7074000
|
trusted library allocation
|
page read and write
|
||
45E0000
|
heap
|
page read and write
|
||
1B948E65000
|
heap
|
page read and write
|
||
4570000
|
trusted library allocation
|
page read and write
|
||
1BD15406000
|
heap
|
page read and write
|
||
35F4000
|
heap
|
page read and write
|
||
255F1464000
|
heap
|
page read and write
|
||
1BD14F5C000
|
heap
|
page read and write
|
||
20961C29000
|
heap
|
page read and write
|
||
1BD144AF000
|
heap
|
page read and write
|
||
1A174C57000
|
heap
|
page read and write
|
||
1BD14482000
|
heap
|
page read and write
|
||
1BD14F80000
|
heap
|
page read and write
|
||
1BD14F7E000
|
heap
|
page read and write
|
||
1BD14F27000
|
heap
|
page read and write
|
||
1BD154BE000
|
heap
|
page read and write
|
||
1EDEBB5A000
|
heap
|
page read and write
|
||
A5B57A000
|
stack
|
page read and write
|
||
1BD14F89000
|
heap
|
page read and write
|
||
1CB1DF96000
|
heap
|
page read and write
|
||
1BD14F7A000
|
heap
|
page read and write
|
||
5535EFF000
|
stack
|
page read and write
|
||
F9D8A9C000
|
stack
|
page read and write
|
||
BC1000
|
unkown
|
page execute read
|
||
1BD154E2000
|
heap
|
page read and write
|
||
1BD14F79000
|
heap
|
page read and write
|
||
24291E00000
|
heap
|
page read and write
|
||
1BD14F68000
|
heap
|
page read and write
|
||
4B8F000
|
trusted library allocation
|
page read and write
|
||
1BD14486000
|
heap
|
page read and write
|
||
1BD1547C000
|
heap
|
page read and write
|
||
1BD144D9000
|
heap
|
page read and write
|
||
1BD154A8000
|
heap
|
page read and write
|
||
4573000
|
trusted library allocation
|
page read and write
|
||
7FFDC4492000
|
trusted library allocation
|
page read and write
|
||
1BD14F2C000
|
heap
|
page read and write
|
||
35FB000
|
heap
|
page read and write
|
||
1BD14549000
|
heap
|
page read and write
|
||
1BD14549000
|
heap
|
page read and write
|
||
1A174C47000
|
heap
|
page read and write
|
||
1ECCF85D000
|
heap
|
page read and write
|
||
1BD14F75000
|
heap
|
page read and write
|
||
175BDBC0000
|
heap
|
page read and write
|
||
1BD14F82000
|
heap
|
page read and write
|
||
4BC7000
|
trusted library allocation
|
page read and write
|
||
34DA000
|
heap
|
page read and write
|
||
1BD14F2C000
|
heap
|
page read and write
|
||
1CB1DF61000
|
heap
|
page read and write
|
||
1B948E84000
|
heap
|
page read and write
|
||
2BAD000
|
heap
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
22318640000
|
heap
|
page read and write
|
||
1BD14F7C000
|
heap
|
page read and write
|
||
1CB1D6DB000
|
heap
|
page read and write
|
||
4BC9000
|
trusted library allocation
|
page read and write
|
||
2A89E7B0000
|
trusted library allocation
|
page read and write
|
||
F6C48FE000
|
stack
|
page read and write
|
||
1A174B70000
|
heap
|
page read and write
|
||
2A89E902000
|
heap
|
page read and write
|
||
1BD14F74000
|
heap
|
page read and write
|
||
345E000
|
stack
|
page read and write
|
||
1BD14F2E000
|
heap
|
page read and write
|
||
175BDD50000
|
heap
|
page read and write
|
||
35D1000
|
heap
|
page read and write
|
||
34CD000
|
heap
|
page read and write
|
||
1BD154C1000
|
heap
|
page read and write
|
||
34F5000
|
heap
|
page read and write
|
||
1A174C00000
|
heap
|
page read and write
|
||
1CB1DF81000
|
heap
|
page read and write
|
||
1B948E56000
|
heap
|
page read and write
|
||
1EDEBB6B000
|
heap
|
page read and write
|
||
458A000
|
trusted library allocation
|
page execute and read and write
|
||
A4B2CFF000
|
stack
|
page read and write
|
||
1BD154E1000
|
heap
|
page read and write
|
||
1B948E7E000
|
heap
|
page read and write
|
||
241AEB10000
|
heap
|
page read and write
|
||
1BD144DF000
|
heap
|
page read and write
|
||
1BD14F77000
|
heap
|
page read and write
|
||
1BD154E1000
|
heap
|
page read and write
|
||
1BD154DF000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
B17C1FB000
|
stack
|
page read and write
|
||
4BAC000
|
trusted library allocation
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
5535DFA000
|
stack
|
page read and write
|
||
20961C6F000
|
heap
|
page read and write
|
||
1BD14F6D000
|
heap
|
page read and write
|
||
1BD154BE000
|
heap
|
page read and write
|
||
A4B33FE000
|
stack
|
page read and write
|
||
4510000
|
trusted library allocation
|
page read and write
|
||
1BD14F97000
|
heap
|
page read and write
|
||
1BD14F7A000
|
heap
|
page read and write
|
||
8FEAFFA000
|
stack
|
page read and write
|
||
1BD14F6D000
|
heap
|
page read and write
|
||
1B949602000
|
trusted library allocation
|
page read and write
|
||
1CB1DF87000
|
heap
|
page read and write
|
||
1BD14F2C000
|
heap
|
page read and write
|
||
F6C487C000
|
stack
|
page read and write
|
||
1BD14F71000
|
heap
|
page read and write
|
||
1CB1D653000
|
heap
|
page read and write
|
||
4B87000
|
trusted library allocation
|
page read and write
|
||
1BD14F30000
|
heap
|
page read and write
|
||
1BD14549000
|
heap
|
page read and write
|
||
1A174C3D000
|
heap
|
page read and write
|
||
1B948E60000
|
heap
|
page read and write
|
||
3DC94FE000
|
stack
|
page read and write
|
||
7680000
|
trusted library allocation
|
page read and write
|
||
1BD14F30000
|
heap
|
page read and write
|
||
1BD154DB000
|
heap
|
page read and write
|
||
1E0DC213000
|
heap
|
page read and write
|
||
1A176680000
|
trusted library allocation
|
page read and write
|
||
1CB1D687000
|
heap
|
page read and write
|
||
1BD14DC0000
|
remote allocation
|
page read and write
|
||
1BD154C8000
|
heap
|
page read and write
|
||
1BD14F0E000
|
heap
|
page read and write
|
||
77D0000
|
trusted library allocation
|
page read and write
|
||
7740000
|
trusted library allocation
|
page read and write
|
||
7610000
|
trusted library allocation
|
page read and write
|
||
1BD15483000
|
heap
|
page read and write
|
||
1BD1443F000
|
heap
|
page read and write
|
||
1A174C2A000
|
heap
|
page read and write
|
||
4640000
|
heap
|
page read and write
|
||
255F1479000
|
heap
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
1B948C30000
|
heap
|
page read and write
|
||
1EDEB03D000
|
heap
|
page read and write
|
||
BCA000
|
unkown
|
page readonly
|
||
4574000
|
heap
|
page read and write
|
||
1EDEBB88000
|
heap
|
page read and write
|
||
A4B29BB000
|
stack
|
page read and write
|
||
1BD14F82000
|
heap
|
page read and write
|
||
BC8000
|
unkown
|
page read and write
|
||
1BD14F69000
|
heap
|
page read and write
|
||
2A89E640000
|
heap
|
page read and write
|
||
1B948E61000
|
heap
|
page read and write
|
||
4B7C000
|
trusted library allocation
|
page read and write
|
||
8FEACFA000
|
stack
|
page read and write
|
||
28EF2910000
|
heap
|
page read and write
|
||
1BD14538000
|
heap
|
page read and write
|
||
1EDEBB5A000
|
heap
|
page read and write
|
||
1F9B47C000
|
stack
|
page read and write
|
||
1A9ED000
|
stack
|
page read and write
|
||
1BD14F55000
|
heap
|
page read and write
|
||
1BD14F32000
|
heap
|
page read and write
|
||
959E17C000
|
stack
|
page read and write
|
||
239E000
|
stack
|
page read and write
|
||
1F9B57D000
|
stack
|
page read and write
|
||
1BD14549000
|
heap
|
page read and write
|
||
1CB1DF81000
|
heap
|
page read and write
|
||
1BD14F52000
|
heap
|
page read and write
|
||
1BD1542D000
|
heap
|
page read and write
|
||
7700000
|
trusted library allocation
|
page read and write
|
||
1BD15502000
|
heap
|
page read and write
|
||
BE1000
|
unkown
|
page execute read
|
||
4BB9000
|
trusted library allocation
|
page read and write
|
||
1BD154E5000
|
heap
|
page read and write
|
||
327B000
|
stack
|
page read and write
|
||
1BD14F86000
|
heap
|
page read and write
|
||
2400000
|
heap
|
page read and write
|
||
A4B2EF8000
|
stack
|
page read and write
|
||
1D639030000
|
heap
|
page read and write
|
||
7720000
|
trusted library allocation
|
page read and write
|
||
1BD14F0E000
|
heap
|
page read and write
|
||
34E8000
|
heap
|
page read and write
|
||
4B91000
|
trusted library allocation
|
page read and write
|
||
603000
|
heap
|
page read and write
|
||
1BD14F6E000
|
heap
|
page read and write
|
||
1CB1DF89000
|
heap
|
page read and write
|
||
1EDEBB71000
|
heap
|
page read and write
|
||
1CB1E402000
|
heap
|
page read and write
|
||
35D1000
|
heap
|
page read and write
|
||
CCA000
|
unkown
|
page readonly
|
||
75C0000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
trusted library allocation
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
241AEC66000
|
heap
|
page read and write
|
||
1ECCF83D000
|
heap
|
page read and write
|
||
1CB1D702000
|
heap
|
page read and write
|
||
2A89E849000
|
heap
|
page read and write
|
||
1BD14F9A000
|
heap
|
page read and write
|
||
1CB1D613000
|
heap
|
page read and write
|
||
7FFDC4300000
|
trusted library allocation
|
page read and write
|
||
26E1FFF000
|
stack
|
page read and write
|
||
F6C4D7F000
|
stack
|
page read and write
|
||
1BD1443D000
|
heap
|
page read and write
|
||
1BD14F72000
|
heap
|
page read and write
|
||
53A1000
|
heap
|
page read and write
|
||
175BDA80000
|
heap
|
page read and write
|
||
BE0000
|
unkown
|
page readonly
|
||
1BD15502000
|
heap
|
page read and write
|
||
2C60000
|
heap
|
page read and write
|
||
1BD14F83000
|
heap
|
page read and write
|
||
1B948E29000
|
heap
|
page read and write
|
||
1BD14F77000
|
heap
|
page read and write
|
||
1BD14F71000
|
heap
|
page read and write
|
||
1F9B27F000
|
stack
|
page read and write
|
||
BC1000
|
unkown
|
page execute read
|
||
2BE8000
|
heap
|
page read and write
|
||
1EEDD613000
|
heap
|
page read and write
|
||
1BD154DB000
|
heap
|
page read and write
|
||
1BD14F2A000
|
heap
|
page read and write
|
||
1BD1447E000
|
heap
|
page read and write
|
||
1BD14F80000
|
heap
|
page read and write
|
||
1BD14F2A000
|
heap
|
page read and write
|
||
1BD154A8000
|
heap
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
1F9B77C000
|
stack
|
page read and write
|
||
1B948E4D000
|
heap
|
page read and write
|
||
1BD14F74000
|
heap
|
page read and write
|
||
1E0DC200000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
1BD14F83000
|
heap
|
page read and write
|
||
2AE0000
|
unkown
|
page readonly
|
||
799E000
|
stack
|
page read and write
|
||
790000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2B10000
|
heap
|
page read and write
|
||
2A89E870000
|
heap
|
page read and write
|
||
1BD1453B000
|
heap
|
page read and write
|
||
1BD14F86000
|
heap
|
page read and write
|
||
1BD14F2A000
|
heap
|
page read and write
|
||
1BD154D7000
|
heap
|
page read and write
|
||
432000
|
unkown
|
page read and write
|
||
1BD14F62000
|
heap
|
page read and write
|
||
1CB1DF89000
|
heap
|
page read and write
|
||
4BAE000
|
trusted library allocation
|
page read and write
|
||
1BD15499000
|
heap
|
page read and write
|
||
3895000
|
heap
|
page read and write
|
||
2BC6000
|
heap
|
page read and write
|
||
9586D6C000
|
stack
|
page read and write
|
||
1BD1547F000
|
heap
|
page read and write
|
||
1B948E5F000
|
heap
|
page read and write
|
||
2B4A000
|
heap
|
page read and write
|
||
4520000
|
heap
|
page read and write
|
||
1BD14F4E000
|
heap
|
page read and write
|
||
ABF307C000
|
stack
|
page read and write
|
||
1CB1DF9A000
|
heap
|
page read and write
|
||
1BD14DE0000
|
remote allocation
|
page read and write
|
||
55363FA000
|
stack
|
page read and write
|
||
7B0000
|
trusted library allocation
|
page read and write
|
||
6BC0000
|
heap
|
page read and write
|
||
7670000
|
trusted library allocation
|
page read and write
|
||
1B948E7D000
|
heap
|
page read and write
|
||
1D63903C000
|
heap
|
page read and write
|
||
20961CB9000
|
heap
|
page read and write
|
||
BC8000
|
unkown
|
page write copy
|
||
55362FA000
|
stack
|
page read and write
|
||
1BD14F75000
|
heap
|
page read and write
|
||
1CB1DF85000
|
heap
|
page read and write
|
||
1CB1D6E8000
|
heap
|
page read and write
|
||
255F1423000
|
heap
|
page read and write
|
||
1BD14F7A000
|
heap
|
page read and write
|
||
1A176790000
|
remote allocation
|
page read and write
|
||
1CB1D629000
|
heap
|
page read and write
|
||
1BD144B3000
|
heap
|
page read and write
|
||
1BD14F83000
|
heap
|
page read and write
|
||
34D2000
|
heap
|
page read and write
|
||
6FDDDAE000
|
stack
|
page read and write
|
||
7FFDC434C000
|
trusted library allocation
|
page execute and read and write
|
||
17C35670000
|
heap
|
page read and write
|
||
A4B35FF000
|
stack
|
page read and write
|
||
1BD154DB000
|
heap
|
page read and write
|
||
781000
|
trusted library allocation
|
page read and write
|
||
7FFDC43D6000
|
trusted library allocation
|
page execute and read and write
|
||
1BD14F5C000
|
heap
|
page read and write
|
||
34C9000
|
heap
|
page read and write
|
||
1BD14F71000
|
heap
|
page read and write
|
||
1CB1DF86000
|
heap
|
page read and write
|
||
1CB1D6BF000
|
heap
|
page read and write
|
||
55360FA000
|
stack
|
page read and write
|
||
1B948E6A000
|
heap
|
page read and write
|
||
34E0000
|
heap
|
page read and write
|
||
1BD14F07000
|
heap
|
page read and write
|
||
1BD144AF000
|
heap
|
page read and write
|
||
255F1210000
|
heap
|
page read and write
|
||
1EEDD713000
|
heap
|
page read and write
|
||
1BD14F52000
|
heap
|
page read and write
|
||
1BD14F29000
|
heap
|
page read and write
|
||
1BD154BE000
|
heap
|
page read and write
|
||
3890000
|
heap
|
page read and write
|
||
1BD14F62000
|
heap
|
page read and write
|
||
1B948E40000
|
heap
|
page read and write
|
||
1EDEC010000
|
heap
|
page read and write
|
||
1BD1548F000
|
heap
|
page read and write
|
||
17C35A70000
|
heap
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
5535FFA000
|
stack
|
page read and write
|
||
1BD154C8000
|
heap
|
page read and write
|
||
1EDEBB81000
|
heap
|
page read and write
|
||
D7A6EFC000
|
stack
|
page read and write
|
||
1EDEBB57000
|
heap
|
page read and write
|
||
1BD14F69000
|
heap
|
page read and write
|
||
7FFDC42FD000
|
trusted library allocation
|
page execute and read and write
|
||
28EF26EB000
|
heap
|
page read and write
|
||
462E000
|
stack
|
page read and write
|
||
1BD1447E000
|
heap
|
page read and write
|
||
7650000
|
trusted library allocation
|
page read and write
|
||
1BD154E4000
|
heap
|
page read and write
|
||
1CB1DF81000
|
heap
|
page read and write
|
||
1BD14F6F000
|
heap
|
page read and write
|
||
1BD15452000
|
heap
|
page read and write
|
||
2A89E800000
|
heap
|
page read and write
|
||
B17BD4E000
|
stack
|
page read and write
|
||
28EF2570000
|
heap
|
page read and write
|
||
1BD14F7F000
|
heap
|
page read and write
|
||
1D639030000
|
heap
|
page read and write
|
||
BA0B9AF000
|
stack
|
page read and write
|
||
1BD15486000
|
heap
|
page read and write
|
||
1EDEC120000
|
heap
|
page read and write
|
||
1BD14F62000
|
heap
|
page read and write
|
||
958757E000
|
stack
|
page read and write
|
||
26E1BFF000
|
stack
|
page read and write
|
||
1BD14F72000
|
heap
|
page read and write
|
||
4BCB000
|
trusted library allocation
|
page read and write
|
||
36B5000
|
heap
|
page read and write
|
||
1BD14F4D000
|
heap
|
page read and write
|
||
1BD14F30000
|
heap
|
page read and write
|
||
24291F08000
|
heap
|
page read and write
|
||
1BD14F52000
|
heap
|
page read and write
|
||
1EDEBB71000
|
heap
|
page read and write
|
||
1ECCF813000
|
heap
|
page read and write
|
||
1CB1D6D7000
|
heap
|
page read and write
|
||
7D0000
|
trusted library allocation
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
785E000
|
stack
|
page read and write
|
||
35B0000
|
heap
|
page read and write
|
||
A4B2FF7000
|
stack
|
page read and write
|
||
959E27E000
|
stack
|
page read and write
|
||
1CB1D6C6000
|
heap
|
page read and write
|
||
D7A6F7C000
|
stack
|
page read and write
|
||
24291C10000
|
heap
|
page read and write
|
||
1A176790000
|
remote allocation
|
page read and write
|
||
4840000
|
trusted library section
|
page read and write
|
||
1BD14F84000
|
heap
|
page read and write
|
||
1CB1DE02000
|
heap
|
page read and write
|
||
6CEE000
|
stack
|
page read and write
|
||
1BD14476000
|
heap
|
page read and write
|
||
26E22FF000
|
stack
|
page read and write
|
||
459B000
|
trusted library allocation
|
page execute and read and write
|
||
255F1402000
|
heap
|
page read and write
|
||
1BD154E8000
|
heap
|
page read and write
|
||
1CB1DF16000
|
heap
|
page read and write
|
||
1BD14F91000
|
heap
|
page read and write
|
||
1BD14DC0000
|
remote allocation
|
page read and write
|
||
1CB1D708000
|
heap
|
page read and write
|
||
1BD14F6F000
|
heap
|
page read and write
|
||
1BD14F74000
|
heap
|
page read and write
|
||
1A174C78000
|
heap
|
page read and write
|
||
20961CC8000
|
heap
|
page read and write
|
||
7BDF000
|
stack
|
page read and write
|
||
1BD14F32000
|
heap
|
page read and write
|
||
1BD14F32000
|
heap
|
page read and write
|
||
241AEC7F000
|
heap
|
page read and write
|
||
255F1C02000
|
trusted library allocation
|
page read and write
|
||
1CB1E403000
|
heap
|
page read and write
|
||
1BD1548D000
|
heap
|
page read and write
|
||
72524FE000
|
stack
|
page read and write
|
||
35D2000
|
heap
|
page read and write
|
||
1BD14F53000
|
heap
|
page read and write
|
||
8260000
|
trusted library allocation
|
page read and write
|
||
255F1428000
|
heap
|
page read and write
|
||
1BD154B3000
|
heap
|
page read and write
|
||
1BD14F6D000
|
heap
|
page read and write
|
||
1BD14549000
|
heap
|
page read and write
|
||
76F0000
|
trusted library allocation
|
page read and write
|
||
1CB1DFA3000
|
heap
|
page read and write
|
||
1BD1545D000
|
heap
|
page read and write
|
||
1BD1549B000
|
heap
|
page read and write
|
||
4D7000
|
heap
|
page read and write
|
||
1BD14F75000
|
heap
|
page read and write
|
||
4B8D000
|
trusted library allocation
|
page read and write
|
||
1BD14491000
|
heap
|
page read and write
|
||
1B948E32000
|
heap
|
page read and write
|
||
24291E87000
|
heap
|
page read and write
|
||
ABF2AFE000
|
stack
|
page read and write
|
||
790000
|
trusted library allocation
|
page read and write
|
||
1ECCF800000
|
heap
|
page read and write
|
||
1BD14310000
|
heap
|
page read and write
|
||
72526FE000
|
stack
|
page read and write
|
||
1CB1DF83000
|
heap
|
page read and write
|
||
1BD14F75000
|
heap
|
page read and write
|
||
241AEC13000
|
heap
|
page read and write
|
||
1EDEBB7B000
|
heap
|
page read and write
|
||
1B948E72000
|
heap
|
page read and write
|
||
4BE6000
|
trusted library allocation
|
page read and write
|
||
1BD14F62000
|
heap
|
page read and write
|
||
7719000
|
trusted library allocation
|
page read and write
|
||
241AEC00000
|
heap
|
page read and write
|
||
24291E29000
|
heap
|
page read and write
|
||
BCC000
|
unkown
|
page readonly
|
||
241AEC8A000
|
heap
|
page read and write
|
||
1B948E75000
|
heap
|
page read and write
|
||
1BD154D5000
|
heap
|
page read and write
|
||
20961C65000
|
heap
|
page read and write
|
||
20961BA0000
|
trusted library allocation
|
page read and write
|
||
2A89E829000
|
heap
|
page read and write
|
||
1BD154E2000
|
heap
|
page read and write
|
||
1CB1D6E9000
|
heap
|
page read and write
|
||
CC1000
|
unkown
|
page execute read
|
||
223184C0000
|
heap
|
page read and write
|
||
1BD1447E000
|
heap
|
page read and write
|
||
1EEDD66A000
|
heap
|
page read and write
|
||
1BD14F52000
|
heap
|
page read and write
|
||
1BD14F40000
|
heap
|
page read and write
|
||
1BD14F0E000
|
heap
|
page read and write
|
||
34D7000
|
heap
|
page read and write
|
||
1BD14F71000
|
heap
|
page read and write
|
||
4BC5000
|
trusted library allocation
|
page read and write
|
||
1BD14F0E000
|
heap
|
page read and write
|
||
223184B0000
|
heap
|
page read and write
|
||
5B6000
|
heap
|
page read and write
|
||
1D638F10000
|
heap
|
page read and write
|
||
1ECCF902000
|
heap
|
page read and write
|
||
1BD14F91000
|
heap
|
page read and write
|
||
229F000
|
stack
|
page read and write
|
||
535000
|
heap
|
page read and write
|
||
1EEDD700000
|
heap
|
page read and write
|
||
17C356D0000
|
heap
|
page read and write
|
||
2A89E908000
|
heap
|
page read and write
|
||
5FD000
|
heap
|
page read and write
|
||
1BD14F7C000
|
heap
|
page read and write
|
||
1CB1DF87000
|
heap
|
page read and write
|
||
1CB1DFB2000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
1EDED002000
|
heap
|
page read and write
|
||
4513000
|
trusted library allocation
|
page execute and read and write
|
||
1BD14F0E000
|
heap
|
page read and write
|
||
1BD14549000
|
heap
|
page read and write
|
||
1B948E79000
|
heap
|
page read and write
|
||
1BD15474000
|
heap
|
page read and write
|
||
1BD14F52000
|
heap
|
page read and write
|
||
24291D10000
|
trusted library allocation
|
page read and write
|
||
1B948E5A000
|
heap
|
page read and write
|
||
1A174B80000
|
heap
|
page read and write
|
||
1BD14F6F000
|
heap
|
page read and write
|
||
1BD144AF000
|
heap
|
page read and write
|
||
1BD154DD000
|
heap
|
page read and write
|
||
1BD154D7000
|
heap
|
page read and write
|
||
959E3FD000
|
stack
|
page read and write
|
||
7133FDC000
|
stack
|
page read and write
|
||
1EDED002000
|
heap
|
page read and write
|
||
1BD14F2A000
|
heap
|
page read and write
|
||
77E0000
|
trusted library allocation
|
page read and write
|
||
1BD14479000
|
heap
|
page read and write
|
||
BE8000
|
unkown
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
1EDEB06B000
|
heap
|
page read and write
|
||
959DFFF000
|
stack
|
page read and write
|
||
1BD1456A000
|
heap
|
page read and write
|
||
D0000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
BEA000
|
unkown
|
page readonly
|
||
48AE000
|
stack
|
page read and write
|
||
1BD14E00000
|
heap
|
page read and write
|
||
24291BA0000
|
heap
|
page read and write
|
||
1EEDD600000
|
heap
|
page read and write
|
||
A5B27C000
|
stack
|
page read and write
|
||
1CB1DF47000
|
heap
|
page read and write
|
||
4BC3000
|
trusted library allocation
|
page read and write
|
||
1EDEBB95000
|
heap
|
page read and write
|
||
1EDEB0F8000
|
heap
|
page read and write
|
||
1BD14F6F000
|
heap
|
page read and write
|
||
4A1E000
|
stack
|
page read and write
|
||
1BD14F4D000
|
heap
|
page read and write
|
||
52CE000
|
stack
|
page read and write
|
||
4BB4000
|
trusted library allocation
|
page read and write
|
||
4BF5000
|
trusted library allocation
|
page read and write
|
||
1BD15400000
|
heap
|
page read and write
|
||
1BD14549000
|
heap
|
page read and write
|
||
4A30000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
trusted library allocation
|
page read and write
|
||
1BD154D9000
|
heap
|
page read and write
|
||
323A000
|
stack
|
page read and write
|
||
1BD14F32000
|
heap
|
page read and write
|
||
1BD14F2C000
|
heap
|
page read and write
|
||
52E0000
|
heap
|
page read and write
|
||
1F9ABFB000
|
stack
|
page read and write
|
||
7609000
|
trusted library allocation
|
page read and write
|
||
1ADD0000
|
heap
|
page execute and read and write
|
||
20961A40000
|
heap
|
page read and write
|
||
1BD14413000
|
heap
|
page read and write
|
||
7090000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
unkown
|
page readonly
|
||
1BD154DB000
|
heap
|
page read and write
|
||
1EDEBB02000
|
heap
|
page read and write
|
||
255F1500000
|
heap
|
page read and write
|
||
1BD14549000
|
heap
|
page read and write
|
||
4580000
|
trusted library allocation
|
page read and write
|
||
1BD14F37000
|
heap
|
page read and write
|
||
1BD14513000
|
heap
|
page read and write
|
||
7FFDC43A0000
|
trusted library allocation
|
page read and write
|
||
1CB1E402000
|
heap
|
page read and write
|
||
24291E5A000
|
heap
|
page read and write
|
||
4B89000
|
trusted library allocation
|
page read and write
|
||
771E000
|
stack
|
page read and write
|
||
1BD154BA000
|
heap
|
page read and write
|
||
F9D8E7E000
|
stack
|
page read and write
|
||
24291F02000
|
heap
|
page read and write
|
||
48D0000
|
heap
|
page read and write
|
||
1BD14F7F000
|
heap
|
page read and write
|
||
1BD154D5000
|
heap
|
page read and write
|
||
1BD14F2B000
|
heap
|
page read and write
|
||
1CB1E421000
|
heap
|
page read and write
|
||
790000
|
trusted library allocation
|
page read and write
|
||
2096253A000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1EDEBB7D000
|
heap
|
page read and write
|
||
A4B31FE000
|
stack
|
page read and write
|
||
166000
|
unkown
|
page readonly
|
||
76D0000
|
trusted library allocation
|
page read and write
|
||
255F1310000
|
trusted library allocation
|
page read and write
|
||
1BD154B0000
|
heap
|
page read and write
|
||
1BD154DB000
|
heap
|
page read and write
|
||
B17C47F000
|
stack
|
page read and write
|
||
255F1513000
|
heap
|
page read and write
|
||
1BD14F9F000
|
heap
|
page read and write
|
||
1B948E57000
|
heap
|
page read and write
|
||
4B97000
|
trusted library allocation
|
page read and write
|
||
750000
|
trusted library allocation
|
page read and write
|
||
2570000
|
heap
|
page execute and read and write
|
||
1CB1D671000
|
heap
|
page read and write
|
||
1CB1DF8D000
|
heap
|
page read and write
|
||
1BD14486000
|
heap
|
page read and write
|
||
1BD14549000
|
heap
|
page read and write
|
||
1BD14F5B000
|
heap
|
page read and write
|
||
35D1000
|
heap
|
page read and write
|
||
1BD14F75000
|
heap
|
page read and write
|
||
790000
|
trusted library allocation
|
page read and write
|
||
1B948C40000
|
heap
|
page read and write
|
||
1EDEBB64000
|
heap
|
page read and write
|
||
1BD14F6D000
|
heap
|
page read and write
|
||
24292602000
|
trusted library allocation
|
page read and write
|
||
1A174D18000
|
heap
|
page read and write
|
||
BC0000
|
unkown
|
page readonly
|
||
1BD14F5A000
|
heap
|
page read and write
|
||
49DF000
|
stack
|
page read and write
|
||
3430000
|
heap
|
page read and write
|
||
4B81000
|
trusted library allocation
|
page read and write
|
||
1BD14F30000
|
heap
|
page read and write
|
||
2231865C000
|
heap
|
page read and write
|
||
1EDEAF50000
|
heap
|
page read and write
|
||
2A89E84F000
|
heap
|
page read and write
|
||
1E0DC302000
|
heap
|
page read and write
|
||
1EDEBB70000
|
heap
|
page read and write
|
||
1BD14F2A000
|
heap
|
page read and write
|
||
76E0000
|
trusted library allocation
|
page read and write
|
||
1ECCF854000
|
heap
|
page read and write
|
||
1BD154D5000
|
heap
|
page read and write
|
||
B17BDCE000
|
stack
|
page read and write
|
||
959E0FF000
|
stack
|
page read and write
|
||
35CD000
|
heap
|
page read and write
|
||
BEC000
|
unkown
|
page readonly
|
||
1BD14F71000
|
heap
|
page read and write
|
||
1BD14F8C000
|
heap
|
page read and write
|
||
71343FF000
|
stack
|
page read and write
|
||
1BD154DE000
|
heap
|
page read and write
|
||
1E0DC313000
|
heap
|
page read and write
|
||
17C35600000
|
heap
|
page read and write
|
||
ABF2A7B000
|
stack
|
page read and write
|
||
1BD154DE000
|
heap
|
page read and write
|
||
1BD14F2A000
|
heap
|
page read and write
|
||
1EEDD3F0000
|
heap
|
page read and write
|
||
12589000
|
trusted library allocation
|
page read and write
|
||
1EDEBB31000
|
heap
|
page read and write
|
||
ABF2E77000
|
stack
|
page read and write
|
||
1BD14F86000
|
heap
|
page read and write
|
||
2B66000
|
heap
|
page execute and read and write
|
||
1BD14F86000
|
heap
|
page read and write
|
||
A5B87B000
|
stack
|
page read and write
|
||
1BD14F6E000
|
heap
|
page read and write
|
||
1CB1E402000
|
heap
|
page read and write
|
||
1BD1548F000
|
heap
|
page read and write
|
||
F6C4B7B000
|
stack
|
page read and write
|
||
1BD154C2000
|
heap
|
page read and write
|
||
1B948E6D000
|
heap
|
page read and write
|
||
1BD14F7A000
|
heap
|
page read and write
|
||
77C0000
|
trusted library allocation
|
page read and write
|
||
1BD14F5A000
|
heap
|
page read and write
|
||
1BD14F66000
|
heap
|
page read and write
|
||
1ECCF6E0000
|
heap
|
page read and write
|
||
1CB1DF8E000
|
heap
|
page read and write
|
||
1CB1DF96000
|
heap
|
page read and write
|
||
4B4F000
|
stack
|
page read and write
|
||
1BD154DF000
|
heap
|
page read and write
|
||
34FC000
|
heap
|
page read and write
|
||
17C356DB000
|
heap
|
page read and write
|
||
1BD14DC0000
|
remote allocation
|
page read and write
|
||
24291E5C000
|
heap
|
page read and write
|
||
1BD14F69000
|
heap
|
page read and write
|
||
4BB2000
|
trusted library allocation
|
page read and write
|
||
791000
|
trusted library allocation
|
page read and write
|
||
1A174D13000
|
heap
|
page read and write
|
||
1BD14549000
|
heap
|
page read and write
|
||
1CB1D650000
|
heap
|
page read and write
|
||
1BD14F62000
|
heap
|
page read and write
|
||
792000
|
trusted library allocation
|
page read and write
|
||
1BD154AC000
|
heap
|
page read and write
|
||
1BD14F5D000
|
heap
|
page read and write
|
||
22318DF0000
|
remote allocation
|
page read and write
|
||
1BD14F30000
|
heap
|
page read and write
|
||
7A9F000
|
stack
|
page read and write
|
||
162000
|
unkown
|
page readonly
|
||
241AED02000
|
heap
|
page read and write
|
||
1BD14F74000
|
heap
|
page read and write
|
||
1B948E42000
|
heap
|
page read and write
|
||
792000
|
trusted library allocation
|
page read and write
|
||
1BD14F53000
|
heap
|
page read and write
|
||
6FDDCAC000
|
stack
|
page read and write
|
||
1B948E73000
|
heap
|
page read and write
|
||
1BD1544C000
|
heap
|
page read and write
|
||
1D639028000
|
heap
|
page read and write
|
||
22318702000
|
heap
|
page read and write
|
||
43A8000
|
heap
|
page read and write
|
||
7600000
|
trusted library allocation
|
page read and write
|
||
4587000
|
trusted library allocation
|
page execute and read and write
|
||
798000
|
trusted library allocation
|
page read and write
|
||
1B948E5C000
|
heap
|
page read and write
|
||
175BDD80000
|
heap
|
page read and write
|
||
1BD14486000
|
heap
|
page read and write
|
||
1BD15454000
|
heap
|
page read and write
|
||
1EDEB013000
|
heap
|
page read and write
|
||
20961C13000
|
heap
|
page read and write
|
||
1EEDD656000
|
heap
|
page read and write
|
||
1A174BE0000
|
heap
|
page read and write
|
||
1BD14F2C000
|
heap
|
page read and write
|
||
1CB1D3A0000
|
heap
|
page read and write
|
||
1CB1D63C000
|
heap
|
page read and write
|
||
1BD14F77000
|
heap
|
page read and write
|
||
7FFDC43B0000
|
trusted library allocation
|
page execute and read and write
|
||
1BD14F5A000
|
heap
|
page read and write
|
||
1B948E63000
|
heap
|
page read and write
|
||
24291E5E000
|
heap
|
page read and write
|
||
1CB1D6E6000
|
heap
|
page read and write
|
||
1BD154F1000
|
heap
|
page read and write
|
||
7FF42DE10000
|
trusted library allocation
|
page execute and read and write
|
||
4B51000
|
trusted library allocation
|
page read and write
|
||
28EF26B0000
|
heap
|
page read and write
|
||
1BD14502000
|
heap
|
page read and write
|
||
1BD14F95000
|
heap
|
page read and write
|
||
8FEABFB000
|
stack
|
page read and write
|
||
1EDEBB75000
|
heap
|
page read and write
|
||
1EDEAF40000
|
heap
|
page read and write
|
||
1ECCF6F0000
|
heap
|
page read and write
|
||
1BD14F55000
|
heap
|
page read and write
|
||
1D639012000
|
heap
|
page read and write
|
||
22318520000
|
heap
|
page read and write
|
||
1EDEBB78000
|
heap
|
page read and write
|
||
1BD14F62000
|
heap
|
page read and write
|
||
1CB1DF8D000
|
heap
|
page read and write
|
||
4A20000
|
trusted library allocation
|
page execute and read and write
|
||
1CB1DFA7000
|
heap
|
page read and write
|
||
1CB1D627000
|
heap
|
page read and write
|
||
725247C000
|
stack
|
page read and write
|
||
1BD154E5000
|
heap
|
page read and write
|
||
5A7000
|
heap
|
page read and write
|
||
1CB1E402000
|
heap
|
page read and write
|
||
55368FC000
|
stack
|
page read and write
|
||
1CB1DF88000
|
heap
|
page read and write
|
||
35AA000
|
heap
|
page read and write
|
||
1EDEBB81000
|
heap
|
page read and write
|
||
959E2FC000
|
stack
|
page read and write
|
||
1BD14F75000
|
heap
|
page read and write
|
||
1EEDD629000
|
heap
|
page read and write
|
||
1BD14F8F000
|
heap
|
page read and write
|
||
1BD14F2E000
|
heap
|
page read and write
|
||
1BD154AA000
|
heap
|
page read and write
|
||
1B948E41000
|
heap
|
page read and write
|
||
959DE7B000
|
stack
|
page read and write
|
||
7030000
|
trusted library allocation
|
page read and write
|
||
1BD15512000
|
heap
|
page read and write
|
||
1BD14F75000
|
heap
|
page read and write
|
||
24291E13000
|
heap
|
page read and write
|
||
CC8000
|
unkown
|
page read and write
|
||
1EDEBB71000
|
heap
|
page read and write
|
||
1E0DC277000
|
heap
|
page read and write
|
||
1BD14F34000
|
heap
|
page read and write
|
||
1BD154D8000
|
heap
|
page read and write
|
||
1EDEBB7D000
|
heap
|
page read and write
|
||
1CB1D68D000
|
heap
|
page read and write
|
||
1BD144F4000
|
heap
|
page read and write
|
||
1BD144F9000
|
heap
|
page read and write
|
||
1BD15512000
|
heap
|
page read and write
|
||
1BD14432000
|
heap
|
page read and write
|
||
1A176790000
|
remote allocation
|
page read and write
|
||
28EF2915000
|
heap
|
page read and write
|
||
1CB1D600000
|
heap
|
page read and write
|
||
1BD14F53000
|
heap
|
page read and write
|
||
1BD144A1000
|
heap
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
1CB1DFA7000
|
heap
|
page read and write
|
||
1BD14F9D000
|
heap
|
page read and write
|
||
1BD14F32000
|
heap
|
page read and write
|
||
1CB1DFAB000
|
heap
|
page read and write
|
||
BCA000
|
unkown
|
page readonly
|
||
1A176802000
|
trusted library allocation
|
page read and write
|
||
1CB1DF85000
|
heap
|
page read and write
|
||
1BD1546A000
|
heap
|
page read and write
|
||
35C3000
|
heap
|
page read and write
|
||
1EDEBB42000
|
heap
|
page read and write
|
||
1BD14F32000
|
heap
|
page read and write
|
||
1B948E68000
|
heap
|
page read and write
|
||
1BD14F52000
|
heap
|
page read and write
|
||
1BD15465000
|
heap
|
page read and write
|
||
4D7000
|
heap
|
page read and write
|
||
1BD15471000
|
heap
|
page read and write
|
||
1CB1DF82000
|
heap
|
page read and write
|
||
20961D02000
|
heap
|
page read and write
|
||
BEC000
|
unkown
|
page readonly
|
||
22318629000
|
heap
|
page read and write
|
||
13D000
|
stack
|
page read and write
|
||
1CB1DF9A000
|
heap
|
page read and write
|
||
1BD14F7B000
|
heap
|
page read and write
|
||
323B000
|
stack
|
page read and write
|
||
1BD14E02000
|
heap
|
page read and write
|
||
1BD14F81000
|
heap
|
page read and write
|
||
77B0000
|
trusted library allocation
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
4BEC000
|
trusted library allocation
|
page read and write
|
||
1BD14F68000
|
heap
|
page read and write
|
||
1CB1DF5A000
|
heap
|
page read and write
|
||
1BD14F8D000
|
heap
|
page read and write
|
||
7660000
|
trusted library allocation
|
page read and write
|
||
1A174C02000
|
heap
|
page read and write
|
||
1EDEBA15000
|
heap
|
page read and write
|
||
1ECCF829000
|
heap
|
page read and write
|
||
34D7000
|
heap
|
page read and write
|
||
1E0DC180000
|
heap
|
page read and write
|
||
1A1766A0000
|
trusted library allocation
|
page read and write
|
||
1B948E55000
|
heap
|
page read and write
|
||
B17C57F000
|
stack
|
page read and write
|
||
241AEC5B000
|
heap
|
page read and write
|
||
958727B000
|
stack
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
1BD14F57000
|
heap
|
page read and write
|
||
12583000
|
trusted library allocation
|
page read and write
|
||
1CB1DF85000
|
heap
|
page read and write
|
||
1ECD0202000
|
trusted library allocation
|
page read and write
|
||
20961C43000
|
heap
|
page read and write
|
||
22318600000
|
heap
|
page read and write
|
||
28EF26E0000
|
heap
|
page read and write
|
||
1BD14F8D000
|
heap
|
page read and write
|
||
1BD14F7A000
|
heap
|
page read and write
|
||
ABF2B7E000
|
stack
|
page read and write
|
||
1CB1DF85000
|
heap
|
page read and write
|
||
725257E000
|
stack
|
page read and write
|
||
1BD14F80000
|
heap
|
page read and write
|
||
1D639030000
|
heap
|
page read and write
|
||
2FCA000
|
stack
|
page read and write
|
||
4BE8000
|
trusted library allocation
|
page read and write
|
||
77B5000
|
trusted library allocation
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
1CB1DF50000
|
heap
|
page read and write
|
||
2581000
|
trusted library allocation
|
page read and write
|
||
1CB1DF8E000
|
heap
|
page read and write
|
||
34E0000
|
heap
|
page read and write
|
||
CC8000
|
unkown
|
page write copy
|
||
26E21FF000
|
stack
|
page read and write
|
||
1CB1DF18000
|
heap
|
page read and write
|
||
1BD154C8000
|
heap
|
page read and write
|
||
BE8000
|
unkown
|
page write copy
|
||
4BE4000
|
trusted library allocation
|
page read and write
|
||
1BD14F2C000
|
heap
|
page read and write
|
||
1BD14F72000
|
heap
|
page read and write
|
||
77F0000
|
trusted library allocation
|
page read and write
|
||
2C50000
|
trusted library allocation
|
page read and write
|
||
BA0B8AA000
|
stack
|
page read and write
|
||
1BD14F83000
|
heap
|
page read and write
|
||
55367FD000
|
stack
|
page read and write
|
||
1BD14F7C000
|
heap
|
page read and write
|
||
70B0000
|
heap
|
page execute and read and write
|
||
1BD14F34000
|
heap
|
page read and write
|
||
2BE5000
|
heap
|
page read and write
|
||
1BD14F97000
|
heap
|
page read and write
|
||
1CB1D5C0000
|
remote allocation
|
page read and write
|
||
175BDC0B000
|
heap
|
page read and write
|
||
1BD14F62000
|
heap
|
page read and write
|
||
1BD14400000
|
heap
|
page read and write
|
||
7760000
|
trusted library allocation
|
page read and write
|
||
72527FE000
|
stack
|
page read and write
|
||
1B948E13000
|
heap
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
ABF2D7B000
|
stack
|
page read and write
|
||
7FFDC4410000
|
trusted library allocation
|
page execute and read and write
|
||
1BD14F53000
|
heap
|
page read and write
|
||
7FFDC42F3000
|
trusted library allocation
|
page execute and read and write
|
||
ABF2F7E000
|
stack
|
page read and write
|
||
1EDEBB12000
|
heap
|
page read and write
|
||
1CB1DF8D000
|
heap
|
page read and write
|
||
1BD14F34000
|
heap
|
page read and write
|
||
1B948E74000
|
heap
|
page read and write
|
||
958737B000
|
stack
|
page read and write
|
||
4D5000
|
heap
|
page read and write
|
||
255F11A0000
|
heap
|
page read and write
|
||
D7A717D000
|
stack
|
page read and write
|
||
1EDEAFA0000
|
heap
|
page read and write
|
||
1BD14486000
|
heap
|
page read and write
|
||
BA0BDFC000
|
stack
|
page read and write
|
||
76C0000
|
trusted library allocation
|
page read and write
|
||
1BD14F32000
|
heap
|
page read and write
|
||
1BD14F55000
|
heap
|
page read and write
|
||
B17BCCB000
|
stack
|
page read and write
|
||
1CB1D713000
|
heap
|
page read and write
|
||
1E0DC224000
|
heap
|
page read and write
|
||
1BD14F2C000
|
heap
|
page read and write
|
||
1BD14F32000
|
heap
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
795F000
|
stack
|
page read and write
|
||
35D9000
|
heap
|
page read and write
|
||
F6C4C77000
|
stack
|
page read and write
|
||
1CB1E418000
|
heap
|
page read and write
|
||
35D4000
|
heap
|
page read and write
|
||
17C35A75000
|
heap
|
page read and write
|
||
790000
|
trusted library allocation
|
page read and write
|
||
26E20FF000
|
stack
|
page read and write
|
||
1BD14F55000
|
heap
|
page read and write
|
||
1BD14F68000
|
heap
|
page read and write
|
||
1B948E3D000
|
heap
|
page read and write
|
||
1BD1445D000
|
heap
|
page read and write
|
||
255F1413000
|
heap
|
page read and write
|
||
1BD154B3000
|
heap
|
page read and write
|
||
1BD14473000
|
heap
|
page read and write
|
||
1BD14F76000
|
heap
|
page read and write
|
||
1E0DC23F000
|
heap
|
page read and write
|
||
1CB1DF98000
|
heap
|
page read and write
|
||
1BD14F53000
|
heap
|
page read and write
|
||
28EF26EE000
|
heap
|
page read and write
|
||
1BD14549000
|
heap
|
page read and write
|
||
1E0DCC02000
|
trusted library allocation
|
page read and write
|
||
2BD3000
|
heap
|
page read and write
|
||
1BD14549000
|
heap
|
page read and write
|
||
3DC947C000
|
stack
|
page read and write
|
||
1BD144A7000
|
heap
|
page read and write
|
||
35FC000
|
heap
|
page read and write
|
||
CCA000
|
unkown
|
page readonly
|
||
20961C68000
|
heap
|
page read and write
|
||
45D0000
|
trusted library allocation
|
page read and write
|
||
1BD154EF000
|
heap
|
page read and write
|
||
1B948E3B000
|
heap
|
page read and write
|
||
20961A30000
|
heap
|
page read and write
|
||
4514000
|
trusted library allocation
|
page read and write
|
||
1E0DC275000
|
heap
|
page read and write
|
||
51F7000
|
heap
|
page read and write
|
||
BA0BC79000
|
stack
|
page read and write
|
||
1CB1DF81000
|
heap
|
page read and write
|
||
7750000
|
trusted library allocation
|
page read and write
|
||
1BD14F95000
|
heap
|
page read and write
|
||
7620000
|
trusted library allocation
|
page read and write
|
||
958747E000
|
stack
|
page read and write
|
||
1CB1DF9B000
|
heap
|
page read and write
|
||
17B000
|
stack
|
page read and write
|
||
1CB1E414000
|
heap
|
page read and write
|
||
22318DF0000
|
remote allocation
|
page read and write
|
||
241AEC02000
|
heap
|
page read and write
|
There are 1419 hidden memdumps, click here to show them.