Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
ServerManager.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Server Manager.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Server Manager.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
Generic INItialization configuration [WIN]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_03ub440h.spu.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1s1x41c4.yx3.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bfelk4g0.w2n.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bu2srmpn.be1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d2rcdjyt.4ld.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ecmchfxq.k3c.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f04iqpyq.ti4.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fxvdo4lg.vhj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lnfmr250.lhs.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lueoyisi.xdv.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_va1qowu1.eyr.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vwlqk5zu.imz.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wwzxyr4i.ahu.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xadqwjz0.zja.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y33vvror.xr1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yqggigke.u15.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Server Manager.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jul 2 04:37:53
2024, mtime=Tue Jul 2 04:37:53 2024, atime=Tue Jul 2 04:37:53 2024, length=187904, window=hide
|
dropped
|
There are 12 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\ServerManager.exe
|
"C:\Users\user\Desktop\ServerManager.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\ServerManager.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'ServerManager.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Server
Manager.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Server
Manager.exe'
|
||
C:\ProgramData\Server Manager.exe
|
"C:\ProgramData\Server Manager.exe"
|
||
C:\ProgramData\Server Manager.exe
|
"C:\ProgramData\Server Manager.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
89.213.177.81
|
|||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://ion=v4.5mConsumer
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
http://www.micom/pkiops/Docs/ry.htm0
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://crl.micft.cMicRosof
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
||
http://crl.micros
|
unknown
|
There are 9 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
||
89.213.177.81
|
unknown
|
United Kingdom
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ServerManager_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ServerManager_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ServerManager_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ServerManager_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ServerManager_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ServerManager_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ServerManager_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ServerManager_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ServerManager_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ServerManager_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ServerManager_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ServerManager_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ServerManager_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ServerManager_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Server Manager
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
E22000
|
unkown
|
page readonly
|
||
3331000
|
trusted library allocation
|
page read and write
|
||
13342000
|
trusted library allocation
|
page read and write
|
||
2D9C66F0000
|
trusted library allocation
|
page read and write
|
||
29A0000
|
heap
|
page execute and read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
126F000
|
stack
|
page read and write
|
||
1D510510000
|
trusted library allocation
|
page read and write
|
||
1BD19E06000
|
heap
|
page read and write
|
||
2D9C6938000
|
trusted library allocation
|
page read and write
|
||
1B06D000
|
stack
|
page read and write
|
||
1D50F110000
|
trusted library allocation
|
page read and write
|
||
1BD7F1D0000
|
heap
|
page read and write
|
||
1BD19AB1000
|
heap
|
page read and write
|
||
DBC000
|
heap
|
page read and write
|
||
1D5111D1000
|
trusted library allocation
|
page read and write
|
||
221AAFE000
|
stack
|
page read and write
|
||
1344000
|
heap
|
page read and write
|
||
2D9C55D0000
|
heap
|
page execute and read and write
|
||
13C2000
|
heap
|
page read and write
|
||
1D527CB4000
|
heap
|
page read and write
|
||
7FFD3462C000
|
trusted library allocation
|
page execute and read and write
|
||
21AE14C2000
|
heap
|
page read and write
|
||
DDE2EBE000
|
stack
|
page read and write
|
||
7FFD34754000
|
trusted library allocation
|
page read and write
|
||
2D9C3CC0000
|
trusted library section
|
page read and write
|
||
1BD0280A000
|
trusted library allocation
|
page read and write
|
||
1C0D2000
|
heap
|
page read and write
|
||
7FFD34540000
|
trusted library allocation
|
page read and write
|
||
1D50F3A0000
|
heap
|
page execute and read and write
|
||
1C8C5000
|
stack
|
page read and write
|
||
7DF458CF0000
|
trusted library allocation
|
page execute and read and write
|
||
2D9DDBF8000
|
heap
|
page read and write
|
||
7FFD34884000
|
trusted library allocation
|
page read and write
|
||
DDE2A73000
|
stack
|
page read and write
|
||
7FFD348B9000
|
trusted library allocation
|
page read and write
|
||
7FFD348C2000
|
trusted library allocation
|
page read and write
|
||
7FFD348C9000
|
trusted library allocation
|
page read and write
|
||
DB1000
|
heap
|
page read and write
|
||
1BD7F242000
|
heap
|
page read and write
|
||
7FFD34880000
|
trusted library allocation
|
page read and write
|
||
1BD11571000
|
trusted library allocation
|
page read and write
|
||
1D50F140000
|
heap
|
page read and write
|
||
DDE2FB9000
|
stack
|
page read and write
|
||
D45000
|
heap
|
page read and write
|
||
7FFD3470A000
|
trusted library allocation
|
page read and write
|
||
1BD19C00000
|
heap
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page read and write
|
||
1333E000
|
trusted library allocation
|
page read and write
|
||
1D50D6A0000
|
heap
|
page read and write
|
||
1B7FE000
|
stack
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3458C000
|
trusted library allocation
|
page execute and read and write
|
||
2D9C7431000
|
trusted library allocation
|
page read and write
|
||
1480000
|
trusted library allocation
|
page read and write
|
||
2D9C678D000
|
trusted library allocation
|
page read and write
|
||
12BE8000
|
trusted library allocation
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
1D51F6B9000
|
trusted library allocation
|
page read and write
|
||
1BD7F237000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
1C52D000
|
stack
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
136D000
|
heap
|
page read and write
|
||
2D9C5570000
|
trusted library allocation
|
page read and write
|
||
DDE3E8B000
|
stack
|
page read and write
|
||
2D9D5651000
|
trusted library allocation
|
page read and write
|
||
1D50D734000
|
heap
|
page read and write
|
||
1BD19D76000
|
heap
|
page read and write
|
||
1D5103B5000
|
trusted library allocation
|
page read and write
|
||
7FFD34620000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
7FFD34570000
|
trusted library allocation
|
page read and write
|
||
2D9D5661000
|
trusted library allocation
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
18F5000
|
heap
|
page read and write
|
||
2D9C3A9F000
|
heap
|
page read and write
|
||
7FFD347D0000
|
trusted library allocation
|
page read and write
|
||
1BD01410000
|
trusted library section
|
page read and write
|
||
1BD19A50000
|
trusted library allocation
|
page read and write
|
||
1D50D750000
|
heap
|
page read and write
|
||
EAC000
|
heap
|
page read and write
|
||
D4FE0F7000
|
stack
|
page read and write
|
||
1BDEE000
|
stack
|
page read and write
|
||
1BD7F2BA000
|
heap
|
page read and write
|
||
7FFD345AC000
|
trusted library allocation
|
page execute and read and write
|
||
1D50D6B0000
|
heap
|
page read and write
|
||
21AE1B10000
|
heap
|
page read and write
|
||
60E87FF000
|
stack
|
page read and write
|
||
1BD7F410000
|
heap
|
page read and write
|
||
21AD9191000
|
trusted library allocation
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page execute and read and write
|
||
F0F000
|
heap
|
page read and write
|
||
2D9C6636000
|
trusted library allocation
|
page read and write
|
||
2D9D5939000
|
trusted library allocation
|
page read and write
|
||
D4FF00C000
|
stack
|
page read and write
|
||
1BD19A20000
|
heap
|
page execute and read and write
|
||
D89000
|
heap
|
page read and write
|
||
1BD01A2D000
|
trusted library allocation
|
page read and write
|
||
1BD1184A000
|
trusted library allocation
|
page read and write
|
||
7FFD34750000
|
trusted library allocation
|
page read and write
|
||
7FFD34554000
|
trusted library allocation
|
page read and write
|
||
2D9C7451000
|
trusted library allocation
|
page read and write
|
||
7FFD34580000
|
trusted library allocation
|
page read and write
|
||
2D9DDD8C000
|
heap
|
page read and write
|
||
1BD017FB000
|
trusted library allocation
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
1B8FE000
|
stack
|
page read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page read and write
|
||
1B16D000
|
stack
|
page read and write
|
||
1B360000
|
trusted library allocation
|
page read and write
|
||
1BD19FC0000
|
heap
|
page read and write
|
||
1D0E0000
|
heap
|
page read and write
|
||
2D9C3AA1000
|
heap
|
page read and write
|
||
21AE18C0000
|
heap
|
page read and write
|
||
1C32E000
|
stack
|
page read and write
|
||
1D527B70000
|
heap
|
page read and write
|
||
2D9C5631000
|
trusted library allocation
|
page read and write
|
||
1C0D6000
|
heap
|
page read and write
|
||
1BD02620000
|
trusted library allocation
|
page read and write
|
||
2D9DDD88000
|
heap
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
1BD19A70000
|
heap
|
page read and write
|
||
7FFD345BC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347D0000
|
trusted library allocation
|
page read and write
|
||
7FFD348DC000
|
trusted library allocation
|
page read and write
|
||
21AE1990000
|
trusted library allocation
|
page read and write
|
||
7FFD3461C000
|
trusted library allocation
|
page execute and read and write
|
||
21AC7580000
|
heap
|
page read and write
|
||
1BD19E19000
|
heap
|
page read and write
|
||
7FFD34562000
|
trusted library allocation
|
page read and write
|
||
12AE1000
|
trusted library allocation
|
page read and write
|
||
1D510199000
|
trusted library allocation
|
page read and write
|
||
1BD017F6000
|
trusted library allocation
|
page read and write
|
||
1D51F69B000
|
trusted library allocation
|
page read and write
|
||
1BD19E97000
|
heap
|
page read and write
|
||
1BD7F930000
|
heap
|
page read and write
|
||
319F000
|
stack
|
page read and write
|
||
1450000
|
trusted library allocation
|
page read and write
|
||
1BD02DC6000
|
trusted library allocation
|
page read and write
|
||
7FFD34620000
|
trusted library allocation
|
page execute and read and write
|
||
21ACA0DE000
|
trusted library allocation
|
page read and write
|
||
7FFD34880000
|
trusted library allocation
|
page read and write
|
||
21AE14FF000
|
heap
|
page read and write
|
||
1D527720000
|
trusted library allocation
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
7FFD3457D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34738000
|
trusted library allocation
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
21AD945B000
|
trusted library allocation
|
page read and write
|
||
7FFD34860000
|
trusted library allocation
|
page read and write
|
||
9B5000
|
heap
|
page read and write
|
||
31BA000
|
heap
|
page read and write
|
||
2D9DDB07000
|
heap
|
page execute and read and write
|
||
1CBC0000
|
heap
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
21ACAA60000
|
trusted library allocation
|
page read and write
|
||
21ACA0E6000
|
trusted library allocation
|
page read and write
|
||
1C9CA000
|
stack
|
page read and write
|
||
7FFD34553000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34760000
|
trusted library allocation
|
page read and write
|
||
7FFD34758000
|
trusted library allocation
|
page read and write
|
||
2D9D5921000
|
trusted library allocation
|
page read and write
|
||
2D9C6841000
|
trusted library allocation
|
page read and write
|
||
1D510C12000
|
trusted library allocation
|
page read and write
|
||
21AE1686000
|
heap
|
page execute and read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page read and write
|
||
DED000
|
heap
|
page read and write
|
||
7FFD34563000
|
trusted library allocation
|
page execute and read and write
|
||
CF1000
|
stack
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page read and write
|
||
21ACA539000
|
trusted library allocation
|
page read and write
|
||
DDE30BF000
|
stack
|
page read and write
|
||
1D51F6A0000
|
trusted library allocation
|
page read and write
|
||
1BD0185C000
|
trusted library allocation
|
page read and write
|
||
1BD19D22000
|
heap
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
1D510B2D000
|
trusted library allocation
|
page read and write
|
||
1D50F220000
|
heap
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
7FFD34573000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
1D5111AC000
|
trusted library allocation
|
page read and write
|
||
60E8CBE000
|
stack
|
page read and write
|
||
2D9D56A2000
|
trusted library allocation
|
page read and write
|
||
BF5000
|
heap
|
page read and write
|
||
1D5103E0000
|
trusted library allocation
|
page read and write
|
||
21AC8F70000
|
trusted library allocation
|
page read and write
|
||
1C0CA000
|
heap
|
page read and write
|
||
7FFD345CC000
|
trusted library allocation
|
page execute and read and write
|
||
21AC7604000
|
heap
|
page read and write
|
||
7FFD34600000
|
trusted library allocation
|
page read and write
|
||
1BD19D33000
|
heap
|
page read and write
|
||
1D511145000
|
trusted library allocation
|
page read and write
|
||
7FFD34720000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34570000
|
trusted library allocation
|
page read and write
|
||
7FFD34580000
|
trusted library allocation
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page read and write
|
||
1BD02590000
|
trusted library allocation
|
page read and write
|
||
E3B000
|
unkown
|
page readonly
|
||
7FFD34670000
|
trusted library allocation
|
page execute and read and write
|
||
2D9DDBC2000
|
heap
|
page read and write
|
||
1BD02EAE000
|
trusted library allocation
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
7FFD34721000
|
trusted library allocation
|
page read and write
|
||
21AE18C9000
|
heap
|
page read and write
|
||
7FFD347E0000
|
trusted library allocation
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
2D9C6273000
|
trusted library allocation
|
page read and write
|
||
7FFD348E0000
|
trusted library allocation
|
page read and write
|
||
2D9DDEDA000
|
heap
|
page read and write
|
||
21AC9160000
|
heap
|
page execute and read and write
|
||
7FFD34748000
|
trusted library allocation
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
1D50F180000
|
trusted library allocation
|
page read and write
|
||
12BE1000
|
trusted library allocation
|
page read and write
|
||
7FFD345EC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
21ACA0E2000
|
trusted library allocation
|
page read and write
|
||
7FFD34646000
|
trusted library allocation
|
page execute and read and write
|
||
2D9DDB6B000
|
heap
|
page read and write
|
||
2D9C740C000
|
trusted library allocation
|
page read and write
|
||
1D50DAB0000
|
trusted library allocation
|
page read and write
|
||
221B0BE000
|
stack
|
page read and write
|
||
7FFD34573000
|
trusted library allocation
|
page read and write
|
||
7FFD3456D000
|
trusted library allocation
|
page execute and read and write
|
||
D4FE23F000
|
stack
|
page read and write
|
||
2D9C3CD5000
|
heap
|
page read and write
|
||
104F000
|
stack
|
page read and write
|
||
60E8B3B000
|
stack
|
page read and write
|
||
1BD7F28E000
|
heap
|
page read and write
|
||
2D9C3D30000
|
trusted library allocation
|
page read and write
|
||
7FFD3461C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34560000
|
trusted library allocation
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
1BD0289F000
|
trusted library allocation
|
page read and write
|
||
1BD02596000
|
trusted library allocation
|
page read and write
|
||
2D9C7456000
|
trusted library allocation
|
page read and write
|
||
F74000
|
heap
|
page read and write
|
||
1D50DAC0000
|
heap
|
page read and write
|
||
7FFD347E0000
|
trusted library allocation
|
page read and write
|
||
29D0000
|
heap
|
page read and write
|
||
2D9C3A72000
|
heap
|
page read and write
|
||
EE5000
|
heap
|
page read and write
|
||
7FFD3497C000
|
trusted library allocation
|
page read and write
|
||
21ACA315000
|
trusted library allocation
|
page read and write
|
||
1D52776A000
|
heap
|
page read and write
|
||
DDE323E000
|
stack
|
page read and write
|
||
60E980E000
|
stack
|
page read and write
|
||
130C000
|
heap
|
page read and write
|
||
2D9C3C60000
|
heap
|
page read and write
|
||
1BD01789000
|
trusted library allocation
|
page read and write
|
||
7FFD34880000
|
trusted library allocation
|
page read and write
|
||
2D9DDB10000
|
heap
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
1BD024C1000
|
trusted library allocation
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page execute and read and write
|
||
1D50F232000
|
heap
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
21AC7588000
|
heap
|
page read and write
|
||
21AC9D63000
|
trusted library allocation
|
page read and write
|
||
1B550000
|
heap
|
page execute and read and write
|
||
1D51046C000
|
trusted library allocation
|
page read and write
|
||
7FFD34702000
|
trusted library allocation
|
page read and write
|
||
7FFD34680000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD346F0000
|
trusted library allocation
|
page read and write
|
||
2D9D591B000
|
trusted library allocation
|
page read and write
|
||
21AC9035000
|
heap
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
21AD945F000
|
trusted library allocation
|
page read and write
|
||
1C0CC000
|
heap
|
page read and write
|
||
DDE2AFE000
|
stack
|
page read and write
|
||
1D5278F0000
|
heap
|
page read and write
|
||
7FFD348A9000
|
trusted library allocation
|
page read and write
|
||
221BC0E000
|
stack
|
page read and write
|
||
1C085000
|
heap
|
page read and write
|
||
1BD024CE000
|
trusted library allocation
|
page read and write
|
||
21AC8EC0000
|
trusted library allocation
|
page read and write
|
||
221B1BE000
|
stack
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page read and write
|
||
21AC9D6F000
|
trusted library allocation
|
page read and write
|
||
2D9C3D90000
|
heap
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
21ACA93E000
|
trusted library allocation
|
page read and write
|
||
7FFD34646000
|
trusted library allocation
|
page execute and read and write
|
||
D80000
|
heap
|
page read and write
|
||
1BD19562000
|
heap
|
page read and write
|
||
1D5277D9000
|
heap
|
page read and write
|
||
13359000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
1D527C46000
|
heap
|
page read and write
|
||
1D510775000
|
trusted library allocation
|
page read and write
|
||
221ADFD000
|
stack
|
page read and write
|
||
7FFD34636000
|
trusted library allocation
|
page execute and read and write
|
||
1D510655000
|
trusted library allocation
|
page read and write
|
||
1CAC8000
|
stack
|
page read and write
|
||
7FFD34742000
|
trusted library allocation
|
page read and write
|
||
F0B000
|
heap
|
page read and write
|
||
1D5106F0000
|
trusted library allocation
|
page read and write
|
||
21AC75BC000
|
heap
|
page read and write
|
||
7FFD34600000
|
trusted library allocation
|
page read and write
|
||
1D510588000
|
trusted library allocation
|
page read and write
|
||
7FFD348CC000
|
trusted library allocation
|
page read and write
|
||
1BD19AF4000
|
heap
|
page read and write
|
||
2D9DDDC2000
|
heap
|
page read and write
|
||
2D9DDD94000
|
heap
|
page read and write
|
||
7FFD34570000
|
trusted library allocation
|
page read and write
|
||
2AEF000
|
trusted library allocation
|
page read and write
|
||
1BD02162000
|
trusted library allocation
|
page read and write
|
||
2D9DDCBE000
|
heap
|
page read and write
|
||
1BD01550000
|
heap
|
page read and write
|
||
DDE2BFE000
|
stack
|
page read and write
|
||
1BD7F278000
|
heap
|
page read and write
|
||
21AC8F30000
|
trusted library allocation
|
page read and write
|
||
221B23B000
|
stack
|
page read and write
|
||
7FFD34920000
|
trusted library allocation
|
page read and write
|
||
1B7AD000
|
stack
|
page read and write
|
||
7FFD34860000
|
trusted library allocation
|
page read and write
|
||
13367000
|
trusted library allocation
|
page read and write
|
||
1BD19B5C000
|
heap
|
page read and write
|
||
7FFD345BC000
|
trusted library allocation
|
page execute and read and write
|
||
21AC9DAA000
|
trusted library allocation
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page read and write
|
||
21AC8EE0000
|
trusted library allocation
|
page read and write
|
||
DDE3C8E000
|
stack
|
page read and write
|
||
D4FEF8F000
|
stack
|
page read and write
|
||
1D50FFB8000
|
trusted library allocation
|
page read and write
|
||
1BD7F26D000
|
heap
|
page read and write
|
||
7FFD34810000
|
trusted library allocation
|
page read and write
|
||
21AC75DC000
|
heap
|
page read and write
|
||
7FFD34580000
|
trusted library allocation
|
page read and write
|
||
21AC7710000
|
heap
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
21AE1846000
|
heap
|
page read and write
|
||
1BD01FB2000
|
trusted library allocation
|
page read and write
|
||
2D9C621B000
|
trusted library allocation
|
page read and write
|
||
2D9C3AE8000
|
heap
|
page read and write
|
||
DDE2DFD000
|
stack
|
page read and write
|
||
21AC7715000
|
heap
|
page read and write
|
||
2D9DDB5C000
|
heap
|
page read and write
|
||
1BD02197000
|
trusted library allocation
|
page read and write
|
||
221B13E000
|
stack
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
D4FE07E000
|
stack
|
page read and write
|
||
7FFD34800000
|
trusted library allocation
|
page read and write
|
||
7FFD34670000
|
trusted library allocation
|
page execute and read and write
|
||
1D50F3B1000
|
trusted library allocation
|
page read and write
|
||
7FFD3456D000
|
trusted library allocation
|
page execute and read and write
|
||
DDE32BB000
|
stack
|
page read and write
|
||
2D9C6752000
|
trusted library allocation
|
page read and write
|
||
1D50F145000
|
heap
|
page read and write
|
||
D4FE4BF000
|
stack
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page read and write
|
||
7FFD345BC000
|
trusted library allocation
|
page execute and read and write
|
||
1BD02275000
|
trusted library allocation
|
page read and write
|
||
1BD025C5000
|
trusted library allocation
|
page read and write
|
||
7FFD34883000
|
trusted library allocation
|
page read and write
|
||
1D510355000
|
trusted library allocation
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page read and write
|
||
D4FF20E000
|
stack
|
page read and write
|
||
7FFD34533000
|
trusted library allocation
|
page execute and read and write
|
||
ED5000
|
heap
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
21AC76A0000
|
heap
|
page read and write
|
||
60E89BF000
|
stack
|
page read and write
|
||
7FFD348D0000
|
trusted library allocation
|
page read and write
|
||
7FFD34690000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
2AE1000
|
trusted library allocation
|
page read and write
|
||
21AC76D0000
|
heap
|
page read and write
|
||
1630000
|
heap
|
page execute and read and write
|
||
1BD0286C000
|
trusted library allocation
|
page read and write
|
||
21AD9469000
|
trusted library allocation
|
page read and write
|
||
7FFD34554000
|
trusted library allocation
|
page read and write
|
||
1D51F422000
|
trusted library allocation
|
page read and write
|
||
2ADE000
|
stack
|
page read and write
|
||
1D51F6A8000
|
trusted library allocation
|
page read and write
|
||
21AC7490000
|
heap
|
page read and write
|
||
2D9C3CE0000
|
trusted library section
|
page read and write
|
||
2AF1000
|
trusted library allocation
|
page read and write
|
||
1BD01460000
|
heap
|
page readonly
|
||
1B5F0000
|
heap
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
7FFD3457D000
|
trusted library allocation
|
page execute and read and write
|
||
1BD024CA000
|
trusted library allocation
|
page read and write
|
||
2D9D591F000
|
trusted library allocation
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
7FFD34702000
|
trusted library allocation
|
page read and write
|
||
1BD19D7D000
|
heap
|
page read and write
|
||
7FFD347E0000
|
trusted library allocation
|
page read and write
|
||
1BD19E57000
|
heap
|
page read and write
|
||
21ACAF4B000
|
trusted library allocation
|
page read and write
|
||
2D9C3ABD000
|
heap
|
page read and write
|
||
1C7CC000
|
stack
|
page read and write
|
||
7FFD3454B000
|
trusted library allocation
|
page read and write
|
||
7FFD345AC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD348B2000
|
trusted library allocation
|
page read and write
|
||
7FFD34553000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
1D50DA70000
|
heap
|
page read and write
|
||
60E9889000
|
stack
|
page read and write
|
||
21AE188C000
|
heap
|
page read and write
|
||
7FFD349BD000
|
trusted library allocation
|
page read and write
|
||
1D527858000
|
heap
|
page read and write
|
||
7FFD34752000
|
trusted library allocation
|
page read and write
|
||
1BD19AB3000
|
heap
|
page read and write
|
||
1BD19CFC000
|
heap
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
unkown
|
page readonly
|
||
1D51F3D1000
|
trusted library allocation
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
60E8353000
|
stack
|
page read and write
|
||
2D9C3A9C000
|
heap
|
page read and write
|
||
2D9DE060000
|
heap
|
page read and write
|
||
1D527C60000
|
heap
|
page read and write
|
||
7FFD349CD000
|
trusted library allocation
|
page read and write
|
||
7FFD34570000
|
trusted library allocation
|
page read and write
|
||
D4FDBE3000
|
stack
|
page read and write
|
||
21AC7680000
|
heap
|
page read and write
|
||
1D50F425000
|
trusted library allocation
|
page read and write
|
||
7FFD34701000
|
trusted library allocation
|
page read and write
|
||
1D4DC000
|
stack
|
page read and write
|
||
2A80000
|
heap
|
page execute and read and write
|
||
1BD11591000
|
trusted library allocation
|
page read and write
|
||
1BD7F4B0000
|
heap
|
page read and write
|
||
7FFD34550000
|
trusted library allocation
|
page read and write
|
||
1BD01450000
|
trusted library allocation
|
page read and write
|
||
21AC939A000
|
trusted library allocation
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page read and write
|
||
60E978C000
|
stack
|
page read and write
|
||
2D9DDD84000
|
heap
|
page read and write
|
||
7FFD348A3000
|
trusted library allocation
|
page read and write
|
||
D4FF18D000
|
stack
|
page read and write
|
||
21AC9EF6000
|
trusted library allocation
|
page read and write
|
||
60E8D3B000
|
stack
|
page read and write
|
||
21AC9DF6000
|
trusted library allocation
|
page read and write
|
||
221BD0E000
|
stack
|
page read and write
|
||
D4FE339000
|
stack
|
page read and write
|
||
2D9DDD90000
|
heap
|
page read and write
|
||
2D9C5AFD000
|
trusted library allocation
|
page read and write
|
||
7FFD346F2000
|
trusted library allocation
|
page read and write
|
||
1470000
|
trusted library allocation
|
page read and write
|
||
221AEBE000
|
stack
|
page read and write
|
||
2D9DDE1E000
|
heap
|
page read and write
|
||
21AE1886000
|
heap
|
page read and write
|
||
7DF458D00000
|
trusted library allocation
|
page execute and read and write
|
||
1D5104D1000
|
trusted library allocation
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page execute and read and write
|
||
1BD19B14000
|
heap
|
page read and write
|
||
1BD117C5000
|
trusted library allocation
|
page read and write
|
||
7FFD34898000
|
trusted library allocation
|
page read and write
|
||
7FFD34636000
|
trusted library allocation
|
page execute and read and write
|
||
1D51F3C0000
|
trusted library allocation
|
page read and write
|
||
1BD024C5000
|
trusted library allocation
|
page read and write
|
||
1BD024D6000
|
trusted library allocation
|
page read and write
|
||
21AC9030000
|
heap
|
page read and write
|
||
7FFD34552000
|
trusted library allocation
|
page read and write
|
||
60E8AB8000
|
stack
|
page read and write
|
||
7FFD34744000
|
trusted library allocation
|
page read and write
|
||
1D527B89000
|
heap
|
page read and write
|
||
1BD01847000
|
trusted library allocation
|
page read and write
|
||
21AD91A1000
|
trusted library allocation
|
page read and write
|
||
7FFD34710000
|
trusted library allocation
|
page read and write
|
||
1BD0216B000
|
trusted library allocation
|
page read and write
|
||
D4FE5BB000
|
stack
|
page read and write
|
||
7FFD349C6000
|
trusted library allocation
|
page read and write
|
||
21AC9BC3000
|
trusted library allocation
|
page read and write
|
||
1BD028E9000
|
trusted library allocation
|
page read and write
|
||
7FFD34610000
|
trusted library allocation
|
page read and write
|
||
1D51012F000
|
trusted library allocation
|
page read and write
|
||
60E83DE000
|
stack
|
page read and write
|
||
2D9C3B60000
|
heap
|
page read and write
|
||
1BD7F274000
|
heap
|
page read and write
|
||
60E990D000
|
stack
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
1BD7F230000
|
heap
|
page read and write
|
||
7FFD34626000
|
trusted library allocation
|
page read and write
|
||
7FFD34606000
|
trusted library allocation
|
page read and write
|
||
1D510737000
|
trusted library allocation
|
page read and write
|
||
1D527760000
|
heap
|
page read and write
|
||
21ACA9FD000
|
trusted library allocation
|
page read and write
|
||
7FFD34710000
|
trusted library allocation
|
page execute and read and write
|
||
1D51F3E1000
|
trusted library allocation
|
page read and write
|
||
7FFD34650000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34710000
|
trusted library allocation
|
page execute and read and write
|
||
21ACAABF000
|
trusted library allocation
|
page read and write
|
||
21ACA9D7000
|
trusted library allocation
|
page read and write
|
||
7FFD34880000
|
trusted library allocation
|
page read and write
|
||
21ACA0F3000
|
trusted library allocation
|
page read and write
|
||
21AE18D2000
|
heap
|
page read and write
|
||
1BFEC000
|
stack
|
page read and write
|
||
7FFD3460C000
|
trusted library allocation
|
page execute and read and write
|
||
2BE1000
|
trusted library allocation
|
page read and write
|
||
60E88FD000
|
stack
|
page read and write
|
||
B51000
|
stack
|
page read and write
|
||
7FFD348A4000
|
trusted library allocation
|
page read and write
|
||
2D9C3C40000
|
heap
|
page read and write
|
||
221AF39000
|
stack
|
page read and write
|
||
2D9C3AAB000
|
heap
|
page read and write
|
||
EA6000
|
heap
|
page read and write
|
||
7FFD34870000
|
trusted library allocation
|
page read and write
|
||
DDE3E8E000
|
stack
|
page read and write
|
||
7FFD34800000
|
trusted library allocation
|
page read and write
|
||
21ACA8F1000
|
trusted library allocation
|
page read and write
|
||
7FFD347F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page execute and read and write
|
||
1BD01849000
|
trusted library allocation
|
page read and write
|
||
1D50F100000
|
heap
|
page readonly
|
||
7FFD34810000
|
trusted library allocation
|
page read and write
|
||
D4FE1F9000
|
stack
|
page read and write
|
||
21AC7609000
|
heap
|
page read and write
|
||
1BD7F1E0000
|
heap
|
page read and write
|
||
1BCEE000
|
stack
|
page read and write
|
||
7FFD34570000
|
trusted library allocation
|
page read and write
|
||
21AC91EB000
|
trusted library allocation
|
page read and write
|
||
15FE000
|
stack
|
page read and write
|
||
DDE2CFE000
|
stack
|
page read and write
|
||
7FFD34720000
|
trusted library allocation
|
page execute and read and write
|
||
1D5106B8000
|
trusted library allocation
|
page read and write
|
||
1BD19CF0000
|
heap
|
page read and write
|
||
7FFD34720000
|
trusted library allocation
|
page execute and read and write
|
||
12D0000
|
heap
|
page read and write
|
||
2D9DDCA5000
|
heap
|
page read and write
|
||
21AE1790000
|
heap
|
page read and write
|
||
7DF4C26F0000
|
trusted library allocation
|
page execute and read and write
|
||
1D50F5D8000
|
trusted library allocation
|
page read and write
|
||
1D5106EB000
|
trusted library allocation
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
1BD024D2000
|
trusted library allocation
|
page read and write
|
||
7FFD3471A000
|
trusted library allocation
|
page read and write
|
||
1BD19E03000
|
heap
|
page read and write
|
||
116F000
|
stack
|
page read and write
|
||
1D510CFA000
|
trusted library allocation
|
page read and write
|
||
21AE152D000
|
heap
|
page read and write
|
||
21AC7592000
|
heap
|
page read and write
|
||
1D50FE02000
|
trusted library allocation
|
page read and write
|
||
21AD91E2000
|
trusted library allocation
|
page read and write
|
||
1483000
|
trusted library allocation
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
21AE1908000
|
heap
|
page read and write
|
||
1CFDB000
|
stack
|
page read and write
|
||
1D51049D000
|
trusted library allocation
|
page read and write
|
||
1C62D000
|
stack
|
page read and write
|
||
21AE18D6000
|
heap
|
page read and write
|
||
2D9C5859000
|
trusted library allocation
|
page read and write
|
||
21AD9180000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
7DF4D9210000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34863000
|
trusted library allocation
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
21ACAF95000
|
trusted library allocation
|
page read and write
|
||
7FFD34532000
|
trusted library allocation
|
page read and write
|
||
7FFD34714000
|
trusted library allocation
|
page read and write
|
||
1BD19E8B000
|
heap
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
7FFD3455D000
|
trusted library allocation
|
page execute and read and write
|
||
D4FE3B8000
|
stack
|
page read and write
|
||
21AE1592000
|
heap
|
page read and write
|
||
1BD11858000
|
trusted library allocation
|
page read and write
|
||
7FFD34564000
|
trusted library allocation
|
page read and write
|
||
7FFD34646000
|
trusted library allocation
|
page execute and read and write
|
||
F91000
|
stack
|
page read and write
|
||
7FFD3456D000
|
trusted library allocation
|
page execute and read and write
|
||
2D9DD63C000
|
heap
|
page read and write
|
||
21ACA291000
|
trusted library allocation
|
page read and write
|
||
60E8C3F000
|
stack
|
page read and write
|
||
7FFD34700000
|
trusted library allocation
|
page read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
2960000
|
heap
|
page execute and read and write
|
||
1400000
|
heap
|
page read and write
|
||
7FFD34870000
|
trusted library allocation
|
page read and write
|
||
7FFD34800000
|
trusted library allocation
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
1D50D79A000
|
heap
|
page read and write
|
||
221AFB9000
|
stack
|
page read and write
|
||
1BFF0000
|
heap
|
page read and write
|
||
1BD19D2C000
|
heap
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
2D9DDD80000
|
heap
|
page read and write
|
||
7FFD34572000
|
trusted library allocation
|
page read and write
|
||
7FFD3496C000
|
trusted library allocation
|
page read and write
|
||
60E8779000
|
stack
|
page read and write
|
||
7FFD34560000
|
trusted library allocation
|
page read and write
|
||
1B6AF000
|
stack
|
page read and write
|
||
7FFD348D8000
|
trusted library allocation
|
page read and write
|
||
7FFD346F0000
|
trusted library allocation
|
page execute and read and write
|
||
EE2000
|
heap
|
page read and write
|
||
1D50D754000
|
heap
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
1BD026BF000
|
trusted library allocation
|
page read and write
|
||
1BD03385000
|
trusted library allocation
|
page read and write
|
||
7FFD34734000
|
trusted library allocation
|
page read and write
|
||
1341000
|
heap
|
page read and write
|
||
E20000
|
unkown
|
page readonly
|
||
21AC75C0000
|
heap
|
page read and write
|
||
7FFD34893000
|
trusted library allocation
|
page read and write
|
||
7FFD34923000
|
trusted library allocation
|
page read and write
|
||
D30000
|
trusted library allocation
|
page read and write
|
||
2D9C3CD0000
|
heap
|
page read and write
|
||
2D9C6DB3000
|
trusted library allocation
|
page read and write
|
||
1BD7F2B5000
|
heap
|
page read and write
|
||
1BD0333B000
|
trusted library allocation
|
page read and write
|
||
1BD01500000
|
trusted library allocation
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page read and write
|
||
ECD000
|
heap
|
page read and write
|
||
221BC8C000
|
stack
|
page read and write
|
||
D4FE2B6000
|
stack
|
page read and write
|
||
1BD1184F000
|
trusted library allocation
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page read and write
|
||
7FFD3455D000
|
trusted library allocation
|
page execute and read and write
|
||
21AE1501000
|
heap
|
page read and write
|
||
7FF4B5420000
|
trusted library allocation
|
page execute and read and write
|
||
2D9C3AAD000
|
heap
|
page read and write
|
||
DDE3D0E000
|
stack
|
page read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
7FFD3472A000
|
trusted library allocation
|
page read and write
|
||
2D9C63AE000
|
trusted library allocation
|
page read and write
|
||
21AC8EF0000
|
heap
|
page readonly
|
||
1BD11561000
|
trusted library allocation
|
page read and write
|
||
7FFD34564000
|
trusted library allocation
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page read and write
|
||
7FFD34610000
|
trusted library allocation
|
page read and write
|
||
2D9C56B8000
|
trusted library allocation
|
page read and write
|
||
1D50D6D0000
|
heap
|
page read and write
|
||
1BD19A66000
|
heap
|
page execute and read and write
|
||
7FFD34860000
|
trusted library allocation
|
page read and write
|
||
21ACA0D6000
|
trusted library allocation
|
page read and write
|
||
7FFD348D0000
|
trusted library allocation
|
page read and write
|
||
1D50DAC5000
|
heap
|
page read and write
|
||
1D527B80000
|
heap
|
page read and write
|
||
60E8877000
|
stack
|
page read and write
|
||
7FFD34564000
|
trusted library allocation
|
page read and write
|
||
1BD19B33000
|
heap
|
page read and write
|
||
7DF4D9200000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34656000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD348E0000
|
trusted library allocation
|
page read and write
|
||
21AC9F32000
|
trusted library allocation
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page read and write
|
||
7FFD346D0000
|
trusted library allocation
|
page read and write
|
||
7FFD346E1000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
168E000
|
stack
|
page read and write
|
||
1D527750000
|
heap
|
page execute and read and write
|
||
2D9C5610000
|
trusted library allocation
|
page read and write
|
||
1C052000
|
heap
|
page read and write
|
||
1BD19D2E000
|
heap
|
page read and write
|
||
7FFD34534000
|
trusted library allocation
|
page read and write
|
||
1BD7F2B7000
|
heap
|
page read and write
|
||
60E970E000
|
stack
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page read and write
|
||
1D50D7FF000
|
heap
|
page read and write
|
||
1BD015E6000
|
trusted library allocation
|
page read and write
|
||
1D527BD9000
|
heap
|
page read and write
|
||
1BD19CE0000
|
heap
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
1BD119D0000
|
trusted library allocation
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
1BD115D1000
|
trusted library allocation
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
21ACA204000
|
trusted library allocation
|
page read and write
|
||
1BD19E91000
|
heap
|
page read and write
|
||
1BD19D48000
|
heap
|
page read and write
|
||
221AD79000
|
stack
|
page read and write
|
||
18A0000
|
heap
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page read and write
|
||
2D9C3AE5000
|
heap
|
page read and write
|
||
7FFD34810000
|
trusted library allocation
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page read and write
|
||
2D9C3AA7000
|
heap
|
page read and write
|
||
1BD0181A000
|
trusted library allocation
|
page read and write
|
||
60E8A39000
|
stack
|
page read and write
|
||
1D527BD1000
|
heap
|
page read and write
|
||
7FFD34740000
|
trusted library allocation
|
page read and write
|
||
2D9C6F80000
|
trusted library allocation
|
page read and write
|
||
7FFD34530000
|
trusted library allocation
|
page read and write
|
||
2D9DDF03000
|
heap
|
page read and write
|
||
1BD19E60000
|
heap
|
page read and write
|
||
16CE000
|
stack
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
21AD9171000
|
trusted library allocation
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
7FFD34702000
|
trusted library allocation
|
page read and write
|
||
7FFD34564000
|
trusted library allocation
|
page read and write
|
||
1D527C72000
|
heap
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
21AC8F90000
|
heap
|
page read and write
|
||
1D50D75E000
|
heap
|
page read and write
|
||
2D9C65CD000
|
trusted library allocation
|
page read and write
|
||
21ACA47E000
|
trusted library allocation
|
page read and write
|
||
DDE3D87000
|
stack
|
page read and write
|
||
7FFD34610000
|
trusted library allocation
|
page execute and read and write
|
||
21AE1557000
|
heap
|
page read and write
|
||
1BD7F272000
|
heap
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
7FFD347D0000
|
trusted library allocation
|
page read and write
|
||
1BD02CE1000
|
trusted library allocation
|
page read and write
|
||
2D9C6082000
|
trusted library allocation
|
page read and write
|
||
2D9C5620000
|
heap
|
page read and write
|
||
1B5A0000
|
heap
|
page read and write
|
||
21AE16B0000
|
heap
|
page read and write
|
||
1BD03380000
|
trusted library allocation
|
page read and write
|
||
21AE179A000
|
heap
|
page read and write
|
||
D4FE17E000
|
stack
|
page read and write
|
||
1D50D76E000
|
heap
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page execute and read and write
|
||
21AC75C4000
|
heap
|
page read and write
|
||
7FFD34560000
|
trusted library allocation
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
7FFD34560000
|
trusted library allocation
|
page read and write
|
||
7FFD34732000
|
trusted library allocation
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page read and write
|
||
1BD19A89000
|
heap
|
page read and write
|
||
21ACA31D000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
7FFD34616000
|
trusted library allocation
|
page read and write
|
||
D4FF08E000
|
stack
|
page read and write
|
||
7FFD347D0000
|
trusted library allocation
|
page read and write
|
||
1D5105C1000
|
trusted library allocation
|
page read and write
|
||
7FFD345E0000
|
trusted library allocation
|
page read and write
|
||
D4FDE7E000
|
stack
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
7DF4C26E0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD348B4000
|
trusted library allocation
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
1BD02DED000
|
trusted library allocation
|
page read and write
|
||
1D527CAC000
|
heap
|
page read and write
|
||
7FFD348B8000
|
trusted library allocation
|
page read and write
|
||
DDE2F37000
|
stack
|
page read and write
|
||
2D9C3CA0000
|
heap
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
2D9C55E0000
|
heap
|
page execute and read and write
|
||
7FFD347F0000
|
trusted library allocation
|
page read and write
|
||
221ACFF000
|
stack
|
page read and write
|
||
7FFD346F2000
|
trusted library allocation
|
page read and write
|
||
21ACA0DA000
|
trusted library allocation
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page read and write
|
||
221AC7A000
|
stack
|
page read and write
|
||
7FFD3458B000
|
trusted library allocation
|
page read and write
|
||
2D9C6231000
|
trusted library allocation
|
page read and write
|
||
18A3000
|
heap
|
page read and write
|
||
7DF404B50000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34889000
|
trusted library allocation
|
page read and write
|
||
7FFD348F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34680000
|
trusted library allocation
|
page execute and read and write
|
||
1BD01561000
|
trusted library allocation
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
221BD87000
|
stack
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
1D527756000
|
heap
|
page execute and read and write
|
||
2D9DDCA0000
|
heap
|
page read and write
|
||
7FFD34720000
|
trusted library allocation
|
page execute and read and write
|
||
1BD19A60000
|
heap
|
page execute and read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
12AE8000
|
trusted library allocation
|
page read and write
|
||
1D51073B000
|
trusted library allocation
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page read and write
|
||
2D9C5540000
|
trusted library allocation
|
page read and write
|
||
21ACA22D000
|
trusted library allocation
|
page read and write
|
||
DBA000
|
heap
|
page read and write
|
||
1BD02684000
|
trusted library allocation
|
page read and write
|
||
2D9DDEFA000
|
heap
|
page read and write
|
||
2D9C3D20000
|
heap
|
page readonly
|
||
2D9D5631000
|
trusted library allocation
|
page read and write
|
||
21ACA41D000
|
trusted library allocation
|
page read and write
|
||
21AE18E4000
|
heap
|
page read and write
|
||
7FFD348D0000
|
trusted library allocation
|
page read and write
|
||
7FFD34718000
|
trusted library allocation
|
page read and write
|
||
1BD01420000
|
trusted library section
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
21AD9479000
|
trusted library allocation
|
page read and write
|
||
1D50F0F0000
|
trusted library allocation
|
page read and write
|
||
60E998E000
|
stack
|
page read and write
|
||
1BD19DF2000
|
heap
|
page read and write
|
||
1BD11868000
|
trusted library allocation
|
page read and write
|
||
7FFD3458B000
|
trusted library allocation
|
page execute and read and write
|
||
2B8F000
|
stack
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page read and write
|
||
60E8977000
|
stack
|
page read and write
|
||
7FFD348C4000
|
trusted library allocation
|
page read and write
|
||
12AE3000
|
trusted library allocation
|
page read and write
|
||
1BEEF000
|
stack
|
page read and write
|
||
21AE18A3000
|
heap
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
1BD014C0000
|
heap
|
page execute and read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
DDE31BC000
|
stack
|
page read and write
|
||
21AC9D75000
|
trusted library allocation
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page read and write
|
||
14F5000
|
heap
|
page read and write
|
||
3320000
|
heap
|
page execute and read and write
|
||
7FFD34740000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34620000
|
trusted library allocation
|
page read and write
|
||
221B038000
|
stack
|
page read and write
|
||
1BD01430000
|
trusted library allocation
|
page read and write
|
||
1D5111CC000
|
trusted library allocation
|
page read and write
|
||
1D50D758000
|
heap
|
page read and write
|
||
2D9C6EBE000
|
trusted library allocation
|
page read and write
|
||
1D50F87D000
|
trusted library allocation
|
page read and write
|
||
2D9C3D10000
|
trusted library allocation
|
page read and write
|
||
1D50D718000
|
heap
|
page read and write
|
||
DA9000
|
heap
|
page read and write
|
||
1BD024DF000
|
trusted library allocation
|
page read and write
|
||
DDE2D79000
|
stack
|
page read and write
|
||
2D9C3A68000
|
heap
|
page read and write
|
||
114F000
|
stack
|
page read and write
|
||
1B4AF000
|
stack
|
page read and write
|
||
1BD028A4000
|
trusted library allocation
|
page read and write
|
||
1D510C39000
|
trusted library allocation
|
page read and write
|
||
DDE2E78000
|
stack
|
page read and write
|
||
1BD0273C000
|
trusted library allocation
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
2D9DDD98000
|
heap
|
page read and write
|
||
21AC75BE000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
21AC9171000
|
trusted library allocation
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
221AA73000
|
stack
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
7FFD34680000
|
trusted library allocation
|
page execute and read and write
|
||
13338000
|
trusted library allocation
|
page read and write
|
||
7FFD34712000
|
trusted library allocation
|
page read and write
|
||
DDE3E0C000
|
stack
|
page read and write
|
||
2D9C65D3000
|
trusted library allocation
|
page read and write
|
||
1CEDD000
|
stack
|
page read and write
|
||
7FFD3457B000
|
trusted library allocation
|
page read and write
|
||
7FFD349B6000
|
trusted library allocation
|
page read and write
|
||
21AE14B0000
|
heap
|
page read and write
|
||
1BD017B3000
|
trusted library allocation
|
page read and write
|
||
E38000
|
unkown
|
page readonly
|
||
17CD000
|
stack
|
page read and write
|
||
21AE1690000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
2D9C3A60000
|
heap
|
page read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page read and write
|
||
DDE313E000
|
stack
|
page read and write
|
||
2D9C6662000
|
trusted library allocation
|
page read and write
|
||
2D9C68D5000
|
trusted library allocation
|
page read and write
|
||
D9B000
|
heap
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
1BD19CEC000
|
heap
|
page read and write
|
||
21ACA351000
|
trusted library allocation
|
page read and write
|
||
7FFD34700000
|
trusted library allocation
|
page execute and read and write
|
||
2D9C3CF0000
|
trusted library allocation
|
page read and write
|
||
1D51023D000
|
trusted library allocation
|
page read and write
|
||
1BD7F4B5000
|
heap
|
page read and write
|
||
21ACA1A5000
|
trusted library allocation
|
page read and write
|
||
2D9C69F5000
|
trusted library allocation
|
page read and write
|
||
7FFD3495C000
|
trusted library allocation
|
page read and write
|
||
EDE000
|
heap
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
7FFD34574000
|
trusted library allocation
|
page read and write
|
||
2D9C6E98000
|
trusted library allocation
|
page read and write
|
||
1B7AF000
|
stack
|
page read and write
|
||
1D50D75C000
|
heap
|
page read and write
|
||
221AB7E000
|
stack
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
1D50D795000
|
heap
|
page read and write
|
||
1BD03360000
|
trusted library allocation
|
page read and write
|
||
1D50D74D000
|
heap
|
page read and write
|
||
2D9C3D95000
|
heap
|
page read and write
|
||
1D0DA000
|
stack
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34563000
|
trusted library allocation
|
page execute and read and write
|
||
21AC75C6000
|
heap
|
page read and write
|
||
DE9000
|
heap
|
page read and write
|
||
1D511187000
|
trusted library allocation
|
page read and write
|
||
1D51034F000
|
trusted library allocation
|
page read and write
|
||
7FFD34740000
|
trusted library allocation
|
page execute and read and write
|
||
18F0000
|
heap
|
page read and write
|
||
2D9C6F21000
|
trusted library allocation
|
page read and write
|
||
7FFD34900000
|
trusted library allocation
|
page read and write
|
||
1B6FE000
|
stack
|
page read and write
|
||
21ACAF90000
|
trusted library allocation
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
221BE0C000
|
stack
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page read and write
|
||
1374000
|
heap
|
page read and write
|
||
7FFD3458D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3489C000
|
trusted library allocation
|
page read and write
|
||
DDE303A000
|
stack
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
60E867E000
|
stack
|
page read and write
|
||
7FFD346EA000
|
trusted library allocation
|
page read and write
|
||
12BE3000
|
trusted library allocation
|
page read and write
|
||
2D9DDB58000
|
heap
|
page read and write
|
||
1285000
|
heap
|
page read and write
|
||
7FFD34610000
|
trusted library allocation
|
page read and write
|
||
1BD017D3000
|
trusted library allocation
|
page read and write
|
||
7FFD3453D000
|
trusted library allocation
|
page execute and read and write
|
||
E49000
|
unkown
|
page readonly
|
||
21AE1630000
|
heap
|
page execute and read and write
|
||
60E86FE000
|
stack
|
page read and write
|
||
1BD7F935000
|
heap
|
page read and write
|
||
2D9DDB00000
|
heap
|
page execute and read and write
|
||
7FFD34570000
|
trusted library allocation
|
page read and write
|
||
21ACA0EA000
|
trusted library allocation
|
page read and write
|
||
21AE1884000
|
heap
|
page read and write
|
||
2D9C63A5000
|
trusted library allocation
|
page read and write
|
||
60E8BBE000
|
stack
|
page read and write
|
||
1D5100BE000
|
trusted library allocation
|
page read and write
|
||
1BD11581000
|
trusted library allocation
|
page read and write
|
||
1D50D722000
|
heap
|
page read and write
|
||
7DF404B40000
|
trusted library allocation
|
page execute and read and write
|
||
21AC904B000
|
heap
|
page read and write
|
||
7FFD34750000
|
trusted library allocation
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
1D50F150000
|
trusted library allocation
|
page read and write
|
||
7FFD34870000
|
trusted library allocation
|
page read and write
|
||
1BD19CE8000
|
heap
|
page read and write
|
||
7FFD34616000
|
trusted library allocation
|
page execute and read and write
|
||
7DF4D9220000
|
trusted library allocation
|
page execute and read and write
|
||
221BE8E000
|
stack
|
page read and write
|
||
7FFD34750000
|
trusted library allocation
|
page execute and read and write
|
||
2D9DDDDA000
|
heap
|
page read and write
|
||
D4FDF7E000
|
stack
|
page read and write
|
||
D4FDEFE000
|
stack
|
page read and write
|
||
7FFD34712000
|
trusted library allocation
|
page read and write
|
||
DE7000
|
heap
|
page read and write
|
||
F72000
|
heap
|
page read and write
|
||
7FFD34860000
|
trusted library allocation
|
page read and write
|
||
2D9C6239000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
D4FF109000
|
stack
|
page read and write
|
||
1BD01470000
|
trusted library allocation
|
page read and write
|
||
1D50F370000
|
heap
|
page execute and read and write
|
||
2D9DDB40000
|
heap
|
page read and write
|
||
7FFD3456D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
1D527C95000
|
heap
|
page read and write
|
||
7FFD34810000
|
trusted library allocation
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
7FFD34574000
|
trusted library allocation
|
page read and write
|
||
D4FDFF9000
|
stack
|
page read and write
|
||
7FFD34584000
|
trusted library allocation
|
page read and write
|
||
3634000
|
trusted library allocation
|
page read and write
|
||
1D527C44000
|
heap
|
page read and write
|
||
1D51F3B1000
|
trusted library allocation
|
page read and write
|
||
21AD94F7000
|
trusted library allocation
|
page read and write
|
||
13331000
|
trusted library allocation
|
page read and write
|
||
7FFD34616000
|
trusted library allocation
|
page read and write
|
||
1BD02927000
|
trusted library allocation
|
page read and write
|
||
7FFD34590000
|
trusted library allocation
|
page read and write
|
||
7FFD34711000
|
trusted library allocation
|
page read and write
|
||
1880000
|
heap
|
page execute and read and write
|
||
D4FE53E000
|
stack
|
page read and write
|
||
1C42E000
|
stack
|
page read and write
|
||
7FFD348D2000
|
trusted library allocation
|
page read and write
|
||
1BD19CF4000
|
heap
|
page read and write
|
||
1BBEA000
|
stack
|
page read and write
|
||
2D9C6808000
|
trusted library allocation
|
page read and write
|
||
21AC9D80000
|
trusted library allocation
|
page read and write
|
||
21AE1680000
|
heap
|
page execute and read and write
|
||
7FFD347F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page execute and read and write
|
||
21AE1888000
|
heap
|
page read and write
|
||
21ACAF70000
|
trusted library allocation
|
page read and write
|
||
221AE77000
|
stack
|
page read and write
|
||
7FFD3456B000
|
trusted library allocation
|
page read and write
|
||
7FFD34550000
|
trusted library allocation
|
page read and write
|
||
7FFD34800000
|
trusted library allocation
|
page read and write
|
||
2D9DDCB2000
|
heap
|
page read and write
|
||
2D9D5929000
|
trusted library allocation
|
page read and write
|
||
1D5277B6000
|
heap
|
page read and write
|
||
1BD19D3C000
|
heap
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34580000
|
trusted library allocation
|
page read and write
|
||
7FFD348E0000
|
trusted library allocation
|
page read and write
|
||
1D50D797000
|
heap
|
page read and write
|
||
1D5277B4000
|
heap
|
page read and write
|
||
21AE184A000
|
heap
|
page read and write
|
||
2D9C3B58000
|
heap
|
page read and write
|
||
7FFD348C8000
|
trusted library allocation
|
page read and write
|
||
1BD19CF8000
|
heap
|
page read and write
|
||
1BD7F27C000
|
heap
|
page read and write
|
||
1B9FF000
|
stack
|
page read and write
|
||
7FFD348BC000
|
trusted library allocation
|
page read and write
|
||
1BD01809000
|
trusted library allocation
|
page read and write
|
||
1BD1180F000
|
trusted library allocation
|
page read and write
|
||
1BD19D6F000
|
heap
|
page read and write
|
||
221ABFE000
|
stack
|
page read and write
|
||
7FFD345E6000
|
trusted library allocation
|
page read and write
|
||
1D50D710000
|
heap
|
page read and write
|
||
1BD7F200000
|
heap
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page read and write
|
||
2D9C6229000
|
trusted library allocation
|
page read and write
|
||
7FFD347E0000
|
trusted library allocation
|
page read and write
|
||
DDE2B7E000
|
stack
|
page read and write
|
||
2D9C6693000
|
trusted library allocation
|
page read and write
|
||
DDE2C79000
|
stack
|
page read and write
|
||
7FFD34563000
|
trusted library allocation
|
page execute and read and write
|
||
D60000
|
trusted library allocation
|
page read and write
|
||
D4FE43E000
|
stack
|
page read and write
|
||
21AC963E000
|
trusted library allocation
|
page read and write
|
||
21AE14F2000
|
heap
|
page read and write
|
||
7FFD348F0000
|
trusted library allocation
|
page read and write
|
||
7FFD347F0000
|
trusted library allocation
|
page read and write
|
||
7FFD3457D000
|
trusted library allocation
|
page execute and read and write
|
||
F62000
|
heap
|
page read and write
|
There are 996 hidden memdumps, click here to show them.