Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Nova Mod Pack.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Nova Mod Pack.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\System32.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\System32.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1j4yimxj.jst.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1rqokafh.4i1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1zadr2tq.mkh.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2uo1srqk.hi3.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4tenjwns.blx.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5ch5540p.4i5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g1vrj2ce.xbd.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gqwjntzp.xyz.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gsoqp3hx.dwb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jcbf3edo.q11.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lsm4rzfq.y0l.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_orhqjl2t.lrk.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rsvszcxp.d2g.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uj5ezubt.gbq.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ydnknbyb.bcg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ydxb40ij.rt3.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp3B7C.tmp.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System32.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Jul 5 06:34:28
2024, mtime=Fri Jul 5 06:34:48 2024, atime=Fri Jul 5 06:34:28 2024, length=124416, window=hide
|
dropped
|
||
\Device\Null
|
ASCII text, with CRLF line terminators, with overstriking
|
dropped
|
There are 15 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Nova Mod Pack.exe
|
"C:\Users\user\Desktop\Nova Mod Pack.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\Nova
Mod Pack.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Nova
Mod Pack.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\System32.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'System32.exe'
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "System32" /tr "C:\Users\user\System32.exe"
|
||
C:\Users\user\System32.exe
|
C:\Users\user\System32.exe
|
||
C:\Users\user\System32.exe
|
"C:\Users\user\System32.exe"
|
||
C:\Users\user\System32.exe
|
"C:\Users\user\System32.exe"
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /delete /f /tn "System32"
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "System32" /tr "C:\Users\user\System32.exe"
|
||
C:\Users\user\System32.exe
|
C:\Users\user\System32.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp3B7C.tmp.bat""
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\timeout.exe
|
timeout 3
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 12 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
pdf-standards.gl.at.ply.gg
|
|||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://discord.gg/sU6Cv4MGev
|
unknown
|
||
http://schemas.mic
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://ion=v4.5
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://www.microsoft.
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://www.microsoft.cob
|
unknown
|
||
http://crl.micros
|
unknown
|
There are 9 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
pdf-standards.gl.at.ply.gg
|
147.185.221.20
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
147.185.221.20
|
pdf-standards.gl.at.ply.gg
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
System32
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
System32
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2641000
|
trusted library allocation
|
page read and write
|
||
3196000
|
trusted library allocation
|
page read and write
|
||
281B000
|
trusted library allocation
|
page read and write
|
||
28BCED90000
|
trusted library allocation
|
page read and write
|
||
3250000
|
heap
|
page execute and read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8C0000
|
trusted library allocation
|
page read and write
|
||
1C00BC40000
|
heap
|
page read and write
|
||
2EE0000
|
heap
|
page execute and read and write
|
||
257B7055000
|
heap
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
D13000
|
heap
|
page read and write
|
||
1B230000
|
heap
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
1BC84000
|
heap
|
page read and write
|
||
257B8930000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
257D0E40000
|
heap
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
4FA000
|
unkown
|
page execute and read and write
|
||
257D0FC0000
|
heap
|
page read and write
|
||
7FFD9BC5D000
|
trusted library allocation
|
page read and write
|
||
7FF4A6F60000
|
trusted library allocation
|
page execute and read and write
|
||
82209AB000
|
stack
|
page read and write
|
||
21B6DB67000
|
heap
|
page read and write
|
||
257B9701000
|
trusted library allocation
|
page read and write
|
||
21B6DB11000
|
heap
|
page read and write
|
||
7FFD9BB78000
|
trusted library allocation
|
page read and write
|
||
28BCEDF1000
|
trusted library allocation
|
page read and write
|
||
28BD717D000
|
heap
|
page read and write
|
||
257D10D0000
|
heap
|
page read and write
|
||
6A5BF79000
|
stack
|
page read and write
|
||
28BC0147000
|
trusted library allocation
|
page read and write
|
||
25747D00000
|
heap
|
page read and write
|
||
1B18F000
|
stack
|
page read and write
|
||
257B9A85000
|
trusted library allocation
|
page read and write
|
||
A65000
|
heap
|
page read and write
|
||
1BBE0000
|
heap
|
page read and write
|
||
28CFC041000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page execute and read and write
|
||
1C45E000
|
stack
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
C70000
|
trusted library allocation
|
page read and write
|
||
28CFC3A1000
|
heap
|
page read and write
|
||
28CFC108000
|
heap
|
page read and write
|
||
28C90001000
|
trusted library allocation
|
page read and write
|
||
28C90309000
|
trusted library allocation
|
page read and write
|
||
28CFA175000
|
heap
|
page read and write
|
||
7FFD9BB79000
|
trusted library allocation
|
page read and write
|
||
21B56842000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F4000
|
trusted library allocation
|
page read and write
|
||
28C8115F000
|
trusted library allocation
|
page read and write
|
||
1C7EB000
|
stack
|
page read and write
|
||
1E011530000
|
heap
|
page read and write
|
||
12628000
|
trusted library allocation
|
page read and write
|
||
28CFA0A0000
|
heap
|
page read and write
|
||
28BBD198000
|
heap
|
page read and write
|
||
21B539F0000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page execute and read and write
|
||
1AED0000
|
heap
|
page read and write
|
||
28BD7191000
|
heap
|
page read and write
|
||
BC2000
|
heap
|
page read and write
|
||
21B65A69000
|
trusted library allocation
|
page read and write
|
||
21B555B0000
|
heap
|
page read and write
|
||
F0B3FF9000
|
stack
|
page read and write
|
||
F0B3F7F000
|
stack
|
page read and write
|
||
257C8CF9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8BC000
|
trusted library allocation
|
page execute and read and write
|
||
15A0000
|
heap
|
page read and write
|
||
21B6DE90000
|
heap
|
page read and write
|
||
53BCFBE000
|
unkown
|
page read and write
|
||
B2A000
|
heap
|
page read and write
|
||
A70F73E000
|
stack
|
page read and write
|
||
28C81892000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB33000
|
trusted library allocation
|
page read and write
|
||
135B000
|
heap
|
page read and write
|
||
B1C000
|
heap
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
21B53BE5000
|
heap
|
page read and write
|
||
7FFD9B87C000
|
trusted library allocation
|
page execute and read and write
|
||
28BBEAC0000
|
trusted library allocation
|
page read and write
|
||
21B6DBE0000
|
heap
|
page read and write
|
||
28BBEA80000
|
trusted library section
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page read and write
|
||
240E000
|
stack
|
page read and write
|
||
21B6DF3F000
|
heap
|
page read and write
|
||
6A5C1FF000
|
stack
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
25747D11000
|
heap
|
page read and write
|
||
E6F5B87000
|
stack
|
page read and write
|
||
257C8A11000
|
trusted library allocation
|
page read and write
|
||
1AA9D000
|
stack
|
page read and write
|
||
21B6DBF3000
|
heap
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
21B53BFF000
|
heap
|
page read and write
|
||
257C8CDA000
|
trusted library allocation
|
page read and write
|
||
28C81953000
|
trusted library allocation
|
page read and write
|
||
28CFA2B0000
|
trusted library allocation
|
page read and write
|
||
21B56877000
|
trusted library allocation
|
page read and write
|
||
28BC008D000
|
trusted library allocation
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
2817000
|
trusted library allocation
|
page read and write
|
||
A68000
|
heap
|
page read and write
|
||
28BBFE14000
|
trusted library allocation
|
page read and write
|
||
21B6DBE9000
|
heap
|
page read and write
|
||
28BBEA50000
|
heap
|
page read and write
|
||
7FFD9BB75000
|
trusted library allocation
|
page read and write
|
||
13148000
|
trusted library allocation
|
page read and write
|
||
7FFD9B83B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B814000
|
trusted library allocation
|
page read and write
|
||
21B568AA000
|
trusted library allocation
|
page read and write
|
||
2838000
|
trusted library allocation
|
page read and write
|
||
28C902EB000
|
trusted library allocation
|
page read and write
|
||
28BBFEDD000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
28CFC590000
|
heap
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
12C1000
|
heap
|
page read and write
|
||
7FFD9B9CA000
|
trusted library allocation
|
page read and write
|
||
1B6DB000
|
heap
|
page read and write
|
||
28BBFCE6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7F4000
|
trusted library allocation
|
page read and write
|
||
28CFC401000
|
heap
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBFA000
|
trusted library allocation
|
page read and write
|
||
1BDBE000
|
stack
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
1BA95000
|
stack
|
page read and write
|
||
28BD7276000
|
heap
|
page execute and read and write
|
||
E6F4BFE000
|
stack
|
page read and write
|
||
28C9035A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC0C000
|
trusted library allocation
|
page read and write
|
||
A710406000
|
stack
|
page read and write
|
||
6A5BDFF000
|
stack
|
page read and write
|
||
27C1000
|
trusted library allocation
|
page read and write
|
||
28BBFB42000
|
trusted library allocation
|
page read and write
|
||
1BC7F000
|
heap
|
page read and write
|
||
21B53B45000
|
heap
|
page read and write
|
||
14AE000
|
stack
|
page read and write
|
||
2836000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
21B53AD0000
|
heap
|
page read and write
|
||
28BBEA75000
|
heap
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page execute and read and write
|
||
28BC0BAD000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
F0B4FCC000
|
stack
|
page read and write
|
||
21B561D3000
|
trusted library allocation
|
page read and write
|
||
E3E000
|
stack
|
page read and write
|
||
6A5BC7E000
|
stack
|
page read and write
|
||
1316A000
|
trusted library allocation
|
page read and write
|
||
1C00BFE0000
|
heap
|
page read and write
|
||
28CFA197000
|
heap
|
page read and write
|
||
E6F49FF000
|
stack
|
page read and write
|
||
21B55460000
|
heap
|
page readonly
|
||
E6F4B79000
|
stack
|
page read and write
|
||
21B6DB20000
|
heap
|
page read and write
|
||
7FFD9B823000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB64000
|
trusted library allocation
|
page read and write
|
||
28CFC280000
|
heap
|
page read and write
|
||
257B8877000
|
heap
|
page execute and read and write
|
||
21B567B1000
|
trusted library allocation
|
page read and write
|
||
1C82F000
|
stack
|
page read and write
|
||
1E012DF5000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
A20000
|
trusted library allocation
|
page read and write
|
||
28CFC010000
|
heap
|
page read and write
|
||
28BCF078000
|
trusted library allocation
|
page read and write
|
||
7FFD9B822000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8C6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
28CFA140000
|
trusted library allocation
|
page read and write
|
||
F0B40F7000
|
stack
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
7FFD9B9A2000
|
trusted library allocation
|
page read and write
|
||
1B35E000
|
stack
|
page read and write
|
||
21B53BDE000
|
heap
|
page read and write
|
||
257B95DB000
|
trusted library allocation
|
page read and write
|
||
115F000
|
heap
|
page read and write
|
||
7FFD9B812000
|
trusted library allocation
|
page read and write
|
||
28C811DB000
|
trusted library allocation
|
page read and write
|
||
21B53E45000
|
heap
|
page read and write
|
||
257BA81E000
|
trusted library allocation
|
page read and write
|
||
21B53AF0000
|
heap
|
page read and write
|
||
E6F5B0E000
|
stack
|
page read and write
|
||
28CFC372000
|
heap
|
page read and write
|
||
28BD7115000
|
heap
|
page read and write
|
||
21B6DB0F000
|
heap
|
page read and write
|
||
28BBEA90000
|
trusted library section
|
page read and write
|
||
1B9FE000
|
stack
|
page read and write
|
||
28CFA18D000
|
heap
|
page read and write
|
||
A75000
|
heap
|
page read and write
|
||
21B6DB97000
|
heap
|
page read and write
|
||
257D0E8C000
|
heap
|
page read and write
|
||
28BD7477000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
1BDD4000
|
stack
|
page read and write
|
||
21B56999000
|
trusted library allocation
|
page read and write
|
||
E6F48FE000
|
stack
|
page read and write
|
||
25747F30000
|
heap
|
page read and write
|
||
1B0B0000
|
heap
|
page execute and read and write
|
||
5E0000
|
heap
|
page read and write
|
||
E6F4A79000
|
stack
|
page read and write
|
||
7FFD9B8D0000
|
trusted library allocation
|
page execute and read and write
|
||
28C90021000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8C6000
|
trusted library allocation
|
page read and write
|
||
28CFA1D9000
|
heap
|
page read and write
|
||
7FFD9BB43000
|
trusted library allocation
|
page read and write
|
||
1C86E000
|
stack
|
page read and write
|
||
28BBD1D9000
|
heap
|
page read and write
|
||
28BBFCF3000
|
trusted library allocation
|
page read and write
|
||
257B6F21000
|
heap
|
page read and write
|
||
371000
|
stack
|
page read and write
|
||
257B9772000
|
trusted library allocation
|
page read and write
|
||
6A5CE49000
|
stack
|
page read and write
|
||
7FFD9B9E8000
|
trusted library allocation
|
page read and write
|
||
1C01E000
|
stack
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
257B6F65000
|
heap
|
page read and write
|
||
257B6EE8000
|
heap
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
257B6F2B000
|
heap
|
page read and write
|
||
1C00BFE5000
|
heap
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
B5B000
|
heap
|
page read and write
|
||
A70F47D000
|
stack
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
21B6DBAF000
|
heap
|
page read and write
|
||
21B575AA000
|
trusted library allocation
|
page read and write
|
||
28C80BFB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
2610000
|
heap
|
page execute and read and write
|
||
21B6DAC0000
|
heap
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
7FFD9BB7A000
|
trusted library allocation
|
page read and write
|
||
28CFC2DB000
|
heap
|
page read and write
|
||
257D1197000
|
heap
|
page read and write
|
||
21B6DBC0000
|
heap
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8B6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B8C6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B824000
|
trusted library allocation
|
page read and write
|
||
133E000
|
stack
|
page read and write
|
||
28CFC40A000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
28CFA250000
|
heap
|
page readonly
|
||
7FFD9B813000
|
trusted library allocation
|
page execute and read and write
|
||
28BD7486000
|
heap
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB72000
|
trusted library allocation
|
page read and write
|
||
21B55470000
|
trusted library allocation
|
page read and write
|
||
F0B50C9000
|
stack
|
page read and write
|
||
1B170000
|
trusted library allocation
|
page read and write
|
||
2631000
|
trusted library allocation
|
page read and write
|
||
B2F000
|
heap
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
28CFBC90000
|
heap
|
page execute and read and write
|
||
7FFD9B8D6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC0A000
|
trusted library allocation
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
257B8870000
|
heap
|
page execute and read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
257D10D4000
|
heap
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
249B2930000
|
heap
|
page read and write
|
||
6A5BD79000
|
stack
|
page read and write
|
||
28BD718D000
|
heap
|
page read and write
|
||
7FFD9B7F3000
|
trusted library allocation
|
page execute and read and write
|
||
1C3FA000
|
stack
|
page read and write
|
||
21B65A77000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8D6000
|
trusted library allocation
|
page execute and read and write
|
||
D10000
|
heap
|
page read and write
|
||
28BD7250000
|
heap
|
page read and write
|
||
257C89F1000
|
trusted library allocation
|
page read and write
|
||
257B6F3D000
|
heap
|
page read and write
|
||
1B55D000
|
stack
|
page read and write
|
||
126B1000
|
trusted library allocation
|
page read and write
|
||
1B1BF000
|
stack
|
page read and write
|
||
28BD7181000
|
heap
|
page read and write
|
||
28C80087000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
28CFBCC5000
|
heap
|
page read and write
|
||
28BD7185000
|
heap
|
page read and write
|
||
28C81E25000
|
trusted library allocation
|
page read and write
|
||
28BD73BA000
|
heap
|
page read and write
|
||
28BD7438000
|
heap
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
28BCEDB1000
|
trusted library allocation
|
page read and write
|
||
B31000
|
heap
|
page read and write
|
||
28CFC2A3000
|
heap
|
page read and write
|
||
99FF1EF000
|
stack
|
page read and write
|
||
BC6000
|
heap
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
257D10A0000
|
heap
|
page execute and read and write
|
||
7FFD9B906000
|
trusted library allocation
|
page execute and read and write
|
||
21B6DF87000
|
heap
|
page read and write
|
||
21B53C26000
|
heap
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
257D1264000
|
heap
|
page read and write
|
||
21B65A08000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
257B8840000
|
trusted library allocation
|
page read and write
|
||
1B2BE000
|
stack
|
page read and write
|
||
2FE0000
|
heap
|
page execute and read and write
|
||
C80000
|
trusted library allocation
|
page read and write
|
||
257D0EF2000
|
heap
|
page read and write
|
||
A00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
21B6DE80000
|
heap
|
page read and write
|
||
28CFA320000
|
heap
|
page read and write
|
||
7FFD9B7FD000
|
trusted library allocation
|
page execute and read and write
|
||
257BA819000
|
trusted library allocation
|
page read and write
|
||
F0B3BFE000
|
stack
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page execute and read and write
|
||
25747D03000
|
heap
|
page read and write
|
||
6A5B9FE000
|
stack
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
7DF43B0D0000
|
trusted library allocation
|
page execute and read and write
|
||
8220CFF000
|
unkown
|
page read and write
|
||
257B95F1000
|
trusted library allocation
|
page read and write
|
||
21B65A6D000
|
trusted library allocation
|
page read and write
|
||
F0B3E7E000
|
stack
|
page read and write
|
||
D35000
|
heap
|
page read and write
|
||
28CFA1D4000
|
heap
|
page read and write
|
||
257B89F1000
|
trusted library allocation
|
page read and write
|
||
26AF000
|
stack
|
page read and write
|
||
7FFD9B8E6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B8F6000
|
trusted library allocation
|
page execute and read and write
|
||
28BBFCEE000
|
trusted library allocation
|
page read and write
|
||
25747ED0000
|
heap
|
page read and write
|
||
257D09F0000
|
heap
|
page read and write
|
||
7FFD9B80D000
|
trusted library allocation
|
page execute and read and write
|
||
1B6DD000
|
stack
|
page read and write
|
||
C5E000
|
stack
|
page read and write
|
||
7FFD9BB68000
|
trusted library allocation
|
page read and write
|
||
28BBFF95000
|
trusted library allocation
|
page read and write
|
||
A71048C000
|
stack
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page execute and read and write
|
||
1290000
|
heap
|
page read and write
|
||
8F1000
|
stack
|
page read and write
|
||
E6F5C8E000
|
stack
|
page read and write
|
||
3261000
|
trusted library allocation
|
page read and write
|
||
28BBD060000
|
heap
|
page read and write
|
||
21B56960000
|
trusted library allocation
|
page read and write
|
||
2866000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B804000
|
trusted library allocation
|
page read and write
|
||
21B657EF000
|
trusted library allocation
|
page read and write
|
||
AE17ADC000
|
stack
|
page read and write
|
||
7FFD9BC66000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
28BD746E000
|
heap
|
page read and write
|
||
C83000
|
trusted library allocation
|
page read and write
|
||
7FFD9B80D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page execute and read and write
|
||
A70F37E000
|
stack
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
3279000
|
trusted library allocation
|
page read and write
|
||
7FFD9B82B000
|
trusted library allocation
|
page read and write
|
||
F0B4277000
|
stack
|
page read and write
|
||
257C8A61000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
28CFC3B4000
|
heap
|
page read and write
|
||
257B95E9000
|
trusted library allocation
|
page read and write
|
||
53BD27F000
|
stack
|
page read and write
|
||
257B8850000
|
heap
|
page readonly
|
||
26A0000
|
heap
|
page execute and read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
21B564FE000
|
trusted library allocation
|
page read and write
|
||
28BD750B000
|
heap
|
page read and write
|
||
21B6DCF0000
|
trusted library allocation
|
page read and write
|
||
21B56B4B000
|
trusted library allocation
|
page read and write
|
||
1B19E000
|
stack
|
page read and write
|
||
21B55510000
|
heap
|
page execute and read and write
|
||
28BCF071000
|
trusted library allocation
|
page read and write
|
||
27AF000
|
stack
|
page read and write
|
||
257B8EBD000
|
trusted library allocation
|
page read and write
|
||
F0B51CE000
|
stack
|
page read and write
|
||
7FFD9BA02000
|
trusted library allocation
|
page read and write
|
||
28C810C0000
|
trusted library allocation
|
page read and write
|
||
1299000
|
heap
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
A70EFFF000
|
stack
|
page read and write
|
||
28BBD194000
|
heap
|
page read and write
|
||
28CFC03B000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
257B8800000
|
trusted library section
|
page read and write
|
||
28CFC055000
|
heap
|
page read and write
|
||
7FFD9B86C000
|
trusted library allocation
|
page execute and read and write
|
||
2637000
|
trusted library allocation
|
page read and write
|
||
26C1000
|
trusted library allocation
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
21B6DF36000
|
heap
|
page read and write
|
||
28CFA2E0000
|
trusted library allocation
|
page read and write
|
||
28CFC29D000
|
heap
|
page read and write
|
||
7FFD9BC6D000
|
trusted library allocation
|
page read and write
|
||
257C8CE1000
|
trusted library allocation
|
page read and write
|
||
28BBED40000
|
heap
|
page execute and read and write
|
||
7FFD9B8CC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9F2000
|
trusted library allocation
|
page read and write
|
||
257B8900000
|
trusted library allocation
|
page read and write
|
||
2844000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAFF000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB78000
|
trusted library allocation
|
page read and write
|
||
C6A000
|
unkown
|
page readonly
|
||
249B2640000
|
heap
|
page read and write
|
||
28CFBCC0000
|
heap
|
page read and write
|
||
28CFA191000
|
heap
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
21B53B40000
|
heap
|
page read and write
|
||
FB1000
|
stack
|
page read and write
|
||
AFC000
|
heap
|
page read and write
|
||
28CFC42E000
|
heap
|
page read and write
|
||
28CFA2A0000
|
heap
|
page execute and read and write
|
||
E6F4DB8000
|
stack
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
28C90242000
|
trusted library allocation
|
page read and write
|
||
31E6000
|
trusted library allocation
|
page read and write
|
||
3271000
|
trusted library allocation
|
page read and write
|
||
6A5C37C000
|
stack
|
page read and write
|
||
28BD743E000
|
heap
|
page read and write
|
||
28BCF06F000
|
trusted library allocation
|
page read and write
|
||
2430000
|
heap
|
page read and write
|
||
F0B417D000
|
stack
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
249B2630000
|
heap
|
page read and write
|
||
12CD000
|
heap
|
page read and write
|
||
F0B41F9000
|
stack
|
page read and write
|
||
258E000
|
stack
|
page read and write
|
||
7FFD9B802000
|
trusted library allocation
|
page read and write
|
||
282B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
126B3000
|
trusted library allocation
|
page read and write
|
||
28BBEBC0000
|
heap
|
page read and write
|
||
28BBD190000
|
heap
|
page read and write
|
||
28BBF991000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB8C000
|
trusted library allocation
|
page read and write
|
||
21B6DFC8000
|
heap
|
page read and write
|
||
6A5CF4E000
|
stack
|
page read and write
|
||
1BC77000
|
heap
|
page read and write
|
||
28CFC347000
|
heap
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
25747DD0000
|
heap
|
page read and write
|
||
A70F3F9000
|
stack
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page execute and read and write
|
||
28BBFF29000
|
trusted library allocation
|
page read and write
|
||
257B88F0000
|
heap
|
page read and write
|
||
28BD7539000
|
heap
|
page read and write
|
||
7FFD9B86C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
A71028E000
|
stack
|
page read and write
|
||
10E3000
|
heap
|
page read and write
|
||
1A7F0000
|
trusted library allocation
|
page read and write
|
||
28C90072000
|
trusted library allocation
|
page read and write
|
||
21B555CE000
|
heap
|
page read and write
|
||
2831000
|
trusted library allocation
|
page read and write
|
||
7FFD9B814000
|
trusted library allocation
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
28BBFEA2000
|
trusted library allocation
|
page read and write
|
||
BC9000
|
heap
|
page read and write
|
||
1C35A000
|
stack
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
7FFD9BB69000
|
trusted library allocation
|
page read and write
|
||
21B657B1000
|
trusted library allocation
|
page read and write
|
||
25747CD0000
|
heap
|
page read and write
|
||
21B6DF89000
|
heap
|
page read and write
|
||
257B9D7D000
|
trusted library allocation
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
28BBFDBA000
|
trusted library allocation
|
page read and write
|
||
A70F2F9000
|
stack
|
page read and write
|
||
21B554E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
B6E000
|
stack
|
page read and write
|
||
257B8A78000
|
trusted library allocation
|
page read and write
|
||
28BBEA70000
|
heap
|
page read and write
|
||
E6F4CBE000
|
stack
|
page read and write
|
||
7FFD9B7FD000
|
trusted library allocation
|
page execute and read and write
|
||
AE17BDF000
|
stack
|
page read and write
|
||
25747D10000
|
heap
|
page read and write
|
||
21B55750000
|
heap
|
page execute and read and write
|
||
AC0000
|
heap
|
page read and write
|
||
12CB000
|
heap
|
page read and write
|
||
7FFD9B814000
|
trusted library allocation
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
127D1000
|
trusted library allocation
|
page read and write
|
||
B5D000
|
heap
|
page read and write
|
||
15A5000
|
heap
|
page read and write
|
||
257D10CC000
|
heap
|
page read and write
|
||
A70EF7D000
|
stack
|
page read and write
|
||
257B6FE0000
|
heap
|
page read and write
|
||
12F7000
|
heap
|
page read and write
|
||
99FF16F000
|
unkown
|
page read and write
|
||
6A5BE77000
|
stack
|
page read and write
|
||
7FFD9B84C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page execute and read and write
|
||
C5E000
|
unkown
|
page readonly
|
||
6A5BEFD000
|
stack
|
page read and write
|
||
A71058E000
|
stack
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
1C96A000
|
stack
|
page read and write
|
||
257C8A21000
|
trusted library allocation
|
page read and write
|
||
E6F4FBE000
|
stack
|
page read and write
|
||
25747D02000
|
heap
|
page read and write
|
||
7FFD9BB74000
|
trusted library allocation
|
page read and write
|
||
257BA7D4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8C0000
|
trusted library allocation
|
page read and write
|
||
1CF6D000
|
stack
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
257BA286000
|
trusted library allocation
|
page read and write
|
||
28CFBC30000
|
heap
|
page execute and read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
28CFC180000
|
heap
|
page read and write
|
||
257C8CDF000
|
trusted library allocation
|
page read and write
|
||
28C81308000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F8000
|
trusted library allocation
|
page read and write
|
||
28BBF9BD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9BA000
|
trusted library allocation
|
page read and write
|
||
F0B44FE000
|
stack
|
page read and write
|
||
A70F53E000
|
stack
|
page read and write
|
||
28BBEBD5000
|
heap
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
28C80D81000
|
trusted library allocation
|
page read and write
|
||
28CFC1B3000
|
heap
|
page read and write
|
||
28CFC069000
|
heap
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
BB3000
|
heap
|
page read and write
|
||
F0B42F8000
|
stack
|
page read and write
|
||
7FFD9B9F8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC56000
|
trusted library allocation
|
page read and write
|
||
10B3000
|
heap
|
page read and write
|
||
1C00BBA0000
|
heap
|
page read and write
|
||
A45000
|
heap
|
page read and write
|
||
257D0F21000
|
heap
|
page read and write
|
||
7FFD9B813000
|
trusted library allocation
|
page execute and read and write
|
||
28BD74DF000
|
heap
|
page read and write
|
||
7FFD9B7F3000
|
trusted library allocation
|
page execute and read and write
|
||
21B55517000
|
heap
|
page execute and read and write
|
||
28BBFFD4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA08000
|
trusted library allocation
|
page read and write
|
||
6A5B93E000
|
stack
|
page read and write
|
||
7FFD9BC72000
|
trusted library allocation
|
page read and write
|
||
28C80001000
|
trusted library allocation
|
page read and write
|
||
E6F4EBE000
|
stack
|
page read and write
|
||
257B6DF0000
|
heap
|
page read and write
|
||
21B53BED000
|
heap
|
page read and write
|
||
2840000
|
trusted library allocation
|
page read and write
|
||
1285000
|
heap
|
page read and write
|
||
7FFD9BC76000
|
trusted library allocation
|
page read and write
|
||
1C00BBB0000
|
heap
|
page read and write
|
||
A70F83E000
|
stack
|
page read and write
|
||
7FFD9BC6D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
28CF9FA0000
|
heap
|
page read and write
|
||
21B56816000
|
trusted library allocation
|
page read and write
|
||
257B7000000
|
heap
|
page read and write
|
||
28CFC061000
|
heap
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
7FFD9B82B000
|
trusted library allocation
|
page read and write
|
||
6A5CD4E000
|
stack
|
page read and write
|
||
A50000
|
trusted library allocation
|
page read and write
|
||
28CFA080000
|
heap
|
page read and write
|
||
F0B3BB3000
|
stack
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
13170000
|
trusted library allocation
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
1076000
|
heap
|
page read and write
|
||
28CFC441000
|
heap
|
page read and write
|
||
28BC06D6000
|
trusted library allocation
|
page read and write
|
||
F0B3EFE000
|
stack
|
page read and write
|
||
249B2660000
|
heap
|
page read and write
|
||
F0B457B000
|
stack
|
page read and write
|
||
7DF43B0E0000
|
trusted library allocation
|
page execute and read and write
|
||
10DF000
|
heap
|
page read and write
|
||
6A5C2FE000
|
stack
|
page read and write
|
||
28BC0509000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
21B570D3000
|
trusted library allocation
|
page read and write
|
||
257B9DBD000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
28CFC3FB000
|
heap
|
page read and write
|
||
28BC0615000
|
trusted library allocation
|
page read and write
|
||
28C80A52000
|
trusted library allocation
|
page read and write
|
||
7FFD9B83D000
|
trusted library allocation
|
page execute and read and write
|
||
A70F27E000
|
stack
|
page read and write
|
||
A71038E000
|
stack
|
page read and write
|
||
A71050C000
|
stack
|
page read and write
|
||
28CFC1A8000
|
heap
|
page read and write
|
||
7FFD9B9CA000
|
trusted library allocation
|
page read and write
|
||
28C81E2A000
|
trusted library allocation
|
page read and write
|
||
1605000
|
heap
|
page read and write
|
||
7FFD9BC1C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page execute and read and write
|
||
28BCF06A000
|
trusted library allocation
|
page read and write
|
||
28CFC374000
|
heap
|
page read and write
|
||
12B9000
|
heap
|
page read and write
|
||
25747D00000
|
heap
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page execute and read and write
|
||
28BD74B2000
|
heap
|
page read and write
|
||
99FF0E9000
|
stack
|
page read and write
|
||
28C902F7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B834000
|
trusted library allocation
|
page read and write
|
||
21B53E30000
|
trusted library allocation
|
page read and write
|
||
1580000
|
trusted library allocation
|
page read and write
|
||
1B45F000
|
stack
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
E6F497E000
|
stack
|
page read and write
|
||
1BBBE000
|
stack
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
1B250000
|
heap
|
page execute and read and write
|
||
257B6EE0000
|
heap
|
page read and write
|
||
21B65A6F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
25747D13000
|
heap
|
page read and write
|
||
7FFD9B8CC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB7C000
|
trusted library allocation
|
page read and write
|
||
A70F5B9000
|
stack
|
page read and write
|
||
6A5C0F8000
|
stack
|
page read and write
|
||
25747CDA000
|
heap
|
page read and write
|
||
7DF4E9160000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
28CFC315000
|
heap
|
page read and write
|
||
7FFD9B9F2000
|
trusted library allocation
|
page read and write
|
||
28BC002C000
|
trusted library allocation
|
page read and write
|
||
6A5C079000
|
stack
|
page read and write
|
||
A9C000
|
heap
|
page read and write
|
||
B19000
|
heap
|
page read and write
|
||
25747F20000
|
heap
|
page read and write
|
||
E6F4E3A000
|
stack
|
page read and write
|
||
28C81E05000
|
trusted library allocation
|
page read and write
|
||
A35000
|
heap
|
page read and write
|
||
25747D11000
|
heap
|
page read and write
|
||
2621000
|
trusted library allocation
|
page read and write
|
||
1BBC0000
|
heap
|
page read and write
|
||
7FFD9B9D1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B803000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
7FFD9B81B000
|
trusted library allocation
|
page read and write
|
||
21B57585000
|
trusted library allocation
|
page read and write
|
||
28BD73FA000
|
heap
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
28CFBAD1000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page execute and read and write
|
||
28BBFAFF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB64000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
21B56F06000
|
trusted library allocation
|
page read and write
|
||
10DD000
|
heap
|
page read and write
|
||
1C0BB000
|
stack
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
1C55D000
|
stack
|
page read and write
|
||
AE17B5E000
|
stack
|
page read and write
|
||
AC5000
|
heap
|
page read and write
|
||
6A5CECD000
|
stack
|
page read and write
|
||
1BEBE000
|
stack
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
1B090000
|
heap
|
page read and write
|
||
28BBD270000
|
heap
|
page read and write
|
||
21B56A8F000
|
trusted library allocation
|
page read and write
|
||
6A5BFF7000
|
stack
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
28CFC398000
|
heap
|
page read and write
|
||
28BD7189000
|
heap
|
page read and write
|
||
25747EB0000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
28C81005000
|
trusted library allocation
|
page read and write
|
||
1B660000
|
heap
|
page read and write
|
||
2F5E000
|
stack
|
page read and write
|
||
750000
|
trusted library allocation
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
257D120F000
|
heap
|
page read and write
|
||
28BBEFA9000
|
trusted library allocation
|
page read and write
|
||
7DF426EA0000
|
trusted library allocation
|
page execute and read and write
|
||
2E50000
|
trusted library allocation
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
28BBFCF7000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
F0B514C000
|
stack
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
12621000
|
trusted library allocation
|
page read and write
|
||
31EE000
|
trusted library allocation
|
page read and write
|
||
28CFC0D8000
|
heap
|
page read and write
|
||
7FFD9B86C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page read and write
|
||
257D1261000
|
heap
|
page read and write
|
||
F0B4379000
|
stack
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
28C81094000
|
trusted library allocation
|
page read and write
|
||
3141000
|
trusted library allocation
|
page read and write
|
||
21B53BE1000
|
heap
|
page read and write
|
||
25747D11000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B80D000
|
trusted library allocation
|
page execute and read and write
|
||
28CFC1AF000
|
heap
|
page read and write
|
||
12B6000
|
heap
|
page read and write
|
||
28BBFE40000
|
trusted library allocation
|
page read and write
|
||
109A000
|
heap
|
page read and write
|
||
1BAB0000
|
heap
|
page read and write
|
||
21B56FEB000
|
trusted library allocation
|
page read and write
|
||
C50000
|
unkown
|
page readonly
|
||
257BA25F000
|
trusted library allocation
|
page read and write
|
||
E6F503C000
|
stack
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
28BC0B88000
|
trusted library allocation
|
page read and write
|
||
28BBD158000
|
heap
|
page read and write
|
||
21B53C28000
|
heap
|
page read and write
|
||
7FFD9B8C6000
|
trusted library allocation
|
page read and write
|
||
28CFC305000
|
heap
|
page read and write
|
||
21B53BA0000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
257BA17A000
|
trusted library allocation
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
28CFC1A0000
|
heap
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
7FFD9B804000
|
trusted library allocation
|
page read and write
|
||
28BBD420000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
7FFD9BB7C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
1BE4E000
|
stack
|
page read and write
|
||
3130000
|
heap
|
page execute and read and write
|
||
134F000
|
heap
|
page read and write
|
||
7FFD9B85C000
|
trusted library allocation
|
page execute and read and write
|
||
28BBFCFB000
|
trusted library allocation
|
page read and write
|
||
12623000
|
trusted library allocation
|
page read and write
|
||
1CA6A000
|
stack
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
BC4000
|
heap
|
page read and write
|
||
15AE000
|
stack
|
page read and write
|
||
28BCF088000
|
trusted library allocation
|
page read and write
|
||
28C90031000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
3281000
|
trusted library allocation
|
page read and write
|
||
1CB70000
|
heap
|
page read and write
|
||
6A5B9BE000
|
stack
|
page read and write
|
||
257D1460000
|
heap
|
page read and write
|
||
31A2000
|
trusted library allocation
|
page read and write
|
||
28CFA0E0000
|
heap
|
page read and write
|
||
1BB40000
|
heap
|
page read and write
|
||
25747D11000
|
heap
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
28CFC445000
|
heap
|
page read and write
|
||
7FFD9B9B1000
|
trusted library allocation
|
page read and write
|
||
28C81786000
|
trusted library allocation
|
page read and write
|
||
7FFD9B82D000
|
trusted library allocation
|
page execute and read and write
|
||
1B65F000
|
stack
|
page read and write
|
||
7FFD9B8CC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
1AFDE000
|
stack
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
A70F8BC000
|
stack
|
page read and write
|
||
28BD7260000
|
trusted library allocation
|
page read and write
|
||
7FFD9B822000
|
trusted library allocation
|
page read and write
|
||
AC7000
|
heap
|
page read and write
|
||
257B8820000
|
trusted library allocation
|
page read and write
|
||
257B9C9D000
|
trusted library allocation
|
page read and write
|
||
28CFBC37000
|
heap
|
page execute and read and write
|
||
7FFD9B834000
|
trusted library allocation
|
page read and write
|
||
E6F5A0E000
|
stack
|
page read and write
|
||
F0B4F4E000
|
stack
|
page read and write
|
||
28CFC42B000
|
heap
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
257B6F1C000
|
heap
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
28BD72A0000
|
heap
|
page read and write
|
||
21B56963000
|
trusted library allocation
|
page read and write
|
||
28BCED81000
|
trusted library allocation
|
page read and write
|
||
28BCEDA1000
|
trusted library allocation
|
page read and write
|
||
E6F4AFE000
|
stack
|
page read and write
|
||
249B26B0000
|
heap
|
page read and write
|
||
7FFD9B9E2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F6000
|
trusted library allocation
|
page execute and read and write
|
||
257D10C8000
|
heap
|
page read and write
|
||
21B56785000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8DC000
|
trusted library allocation
|
page execute and read and write
|
||
1280000
|
heap
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
127C1000
|
trusted library allocation
|
page read and write
|
||
127C8000
|
trusted library allocation
|
page read and write
|
||
7CD000
|
heap
|
page read and write
|
||
28CFA120000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
28BD748A000
|
heap
|
page read and write
|
||
21B56875000
|
trusted library allocation
|
page read and write
|
||
28BBED81000
|
trusted library allocation
|
page read and write
|
||
E6F4D39000
|
stack
|
page read and write
|
||
7FFD9B9C1000
|
trusted library allocation
|
page read and write
|
||
21B657A1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8D6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B81D000
|
trusted library allocation
|
page execute and read and write
|
||
28BD7380000
|
heap
|
page read and write
|
||
7FFD9B86C000
|
trusted library allocation
|
page execute and read and write
|
||
28CFC050000
|
heap
|
page read and write
|
||
28BD70EC000
|
heap
|
page read and write
|
||
7FFD9BA04000
|
trusted library allocation
|
page read and write
|
||
7B8000
|
heap
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
21B6DFBA000
|
heap
|
page read and write
|
||
28BBF980000
|
trusted library allocation
|
page read and write
|
||
A55000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
28C81DE0000
|
trusted library allocation
|
page read and write
|
||
28BBFF5C000
|
trusted library allocation
|
page read and write
|
||
A70F63B000
|
stack
|
page read and write
|
||
7FFD9B9B2000
|
trusted library allocation
|
page read and write
|
||
28CFC3FF000
|
heap
|
page read and write
|
||
1E011439000
|
heap
|
page read and write
|
||
7FFD9B814000
|
trusted library allocation
|
page read and write
|
||
21B55770000
|
heap
|
page execute and read and write
|
||
21B5671B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
114B000
|
heap
|
page read and write
|
||
249B26BF000
|
heap
|
page read and write
|
||
257C8CE9000
|
trusted library allocation
|
page read and write
|
||
E6F5C0C000
|
stack
|
page read and write
|
||
1370000
|
trusted library allocation
|
page read and write
|
||
28BD74D1000
|
heap
|
page read and write
|
||
7FFD9B935000
|
trusted library allocation
|
page execute and read and write
|
||
DB1000
|
stack
|
page read and write
|
||
1D06A000
|
stack
|
page read and write
|
||
28BC0BA8000
|
trusted library allocation
|
page read and write
|
||
1C00BBD0000
|
heap
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7F3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB72000
|
trusted library allocation
|
page read and write
|
||
283E000
|
trusted library allocation
|
page read and write
|
||
7F8000
|
heap
|
page read and write
|
||
16AE000
|
stack
|
page read and write
|
||
28CFA325000
|
heap
|
page read and write
|
||
799000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
28BD7270000
|
heap
|
page execute and read and write
|
||
21B53B50000
|
heap
|
page read and write
|
||
7FFD9B9C1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B802000
|
trusted library allocation
|
page read and write
|
||
7FFD9B81D000
|
trusted library allocation
|
page execute and read and write
|
||
1070000
|
heap
|
page read and write
|
||
21B564F5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
13261000
|
trusted library allocation
|
page read and write
|
||
28BC071D000
|
trusted library allocation
|
page read and write
|
||
6A5CF4C000
|
stack
|
page read and write
|
||
28BD70C0000
|
heap
|
page read and write
|
||
1C2F5000
|
stack
|
page read and write
|
||
21B53C2B000
|
heap
|
page read and write
|
||
7FFD9B83B000
|
trusted library allocation
|
page read and write
|
||
1CB6D000
|
stack
|
page read and write
|
||
28BC0109000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
7FFD9BB53000
|
trusted library allocation
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
257D1134000
|
heap
|
page read and write
|
||
A70EEF3000
|
stack
|
page read and write
|
||
155F000
|
stack
|
page read and write
|
||
249B2935000
|
heap
|
page read and write
|
||
7FFD9B8D6000
|
trusted library allocation
|
page execute and read and write
|
||
257B99F4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8D0000
|
trusted library allocation
|
page read and write
|
||
21B6DFC3000
|
heap
|
page read and write
|
||
257B9625000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
257B9995000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page execute and read and write
|
||
A71030C000
|
stack
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page execute and read and write
|
||
E6F4873000
|
stack
|
page read and write
|
||
25747D11000
|
heap
|
page read and write
|
||
263D000
|
trusted library allocation
|
page read and write
|
||
A9A000
|
heap
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
21B559A9000
|
trusted library allocation
|
page read and write
|
||
7DF4BF4E0000
|
trusted library allocation
|
page execute and read and write
|
||
21B554A0000
|
trusted library allocation
|
page read and write
|
||
28BBEB10000
|
trusted library allocation
|
page read and write
|
||
257B9A78000
|
trusted library allocation
|
page read and write
|
||
6A5C27C000
|
stack
|
page read and write
|
||
7FFD9B9F4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page execute and read and write
|
||
1E011610000
|
heap
|
page read and write
|
||
A70F6BA000
|
stack
|
page read and write
|
||
28CFA1AD000
|
heap
|
page read and write
|
||
28CFA150000
|
heap
|
page read and write
|
||
257B8880000
|
heap
|
page execute and read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B802000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
28CFC362000
|
heap
|
page read and write
|
||
E6F5A8D000
|
stack
|
page read and write
|
||
28C812A7000
|
trusted library allocation
|
page read and write
|
||
257B9CFE000
|
trusted library allocation
|
page read and write
|
||
1AC3E000
|
stack
|
page read and write
|
||
2639000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7FD000
|
trusted library allocation
|
page execute and read and write
|
||
1BAB3000
|
heap
|
page read and write
|
||
28BBD425000
|
heap
|
page read and write
|
||
257B95F9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
257B6FD3000
|
heap
|
page read and write
|
||
21B65781000
|
trusted library allocation
|
page read and write
|
||
8220DFF000
|
stack
|
page read and write
|
||
28CFC4A0000
|
trusted library allocation
|
page read and write
|
||
28CFC037000
|
heap
|
page read and write
|
||
7DF426EB0000
|
trusted library allocation
|
page execute and read and write
|
||
21B53B80000
|
trusted library allocation
|
page read and write
|
||
28C81124000
|
trusted library allocation
|
page read and write
|
||
28CFC035000
|
heap
|
page read and write
|
||
7FFD9B84C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B81D000
|
trusted library allocation
|
page execute and read and write
|
||
28CFA19B000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
28CFC3F6000
|
heap
|
page read and write
|
||
28BC0B63000
|
trusted library allocation
|
page read and write
|
||
7DF4BF4F0000
|
trusted library allocation
|
page execute and read and write
|
||
1E012DF0000
|
heap
|
page read and write
|
||
21B53BE7000
|
heap
|
page read and write
|
||
6A5BCFE000
|
stack
|
page read and write
|
||
28C8186C000
|
trusted library allocation
|
page read and write
|
||
13141000
|
trusted library allocation
|
page read and write
|
||
21B55C4D000
|
trusted library allocation
|
page read and write
|
||
257B9BCF000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB43000
|
trusted library allocation
|
page read and write
|
||
21B57012000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8D0000
|
trusted library allocation
|
page execute and read and write
|
||
5E0000
|
heap
|
page read and write
|
||
21B57560000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
28BD7179000
|
heap
|
page read and write
|
||
257B6FDC000
|
heap
|
page read and write
|
||
257B7030000
|
heap
|
page read and write
|
||
7FFD9B813000
|
trusted library allocation
|
page execute and read and write
|
||
28BBD250000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page execute and read and write
|
||
28BBFD08000
|
trusted library allocation
|
page read and write
|
||
1B29F000
|
stack
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
1BC53000
|
heap
|
page read and write
|
||
21B55781000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F6000
|
trusted library allocation
|
page execute and read and write
|
||
AF6000
|
heap
|
page read and write
|
||
28CFA235000
|
heap
|
page read and write
|
||
1CE6E000
|
stack
|
page read and write
|
||
257D10D8000
|
heap
|
page read and write
|
||
28C80C8F000
|
trusted library allocation
|
page read and write
|
||
4E0000
|
unkown
|
page execute and read and write
|
||
28BBD18D000
|
heap
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B813000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
1C05E000
|
stack
|
page read and write
|
||
7FFD9B8F6000
|
trusted library allocation
|
page execute and read and write
|
||
F0B407F000
|
stack
|
page read and write
|
||
7AB000
|
heap
|
page read and write
|
||
21B53E40000
|
heap
|
page read and write
|
||
21B5648B000
|
trusted library allocation
|
page read and write
|
||
327D000
|
trusted library allocation
|
page read and write
|
||
21B6DBF0000
|
heap
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
C52000
|
unkown
|
page readonly
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
257B6EF2000
|
heap
|
page read and write
|
||
21B65A87000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC13000
|
trusted library allocation
|
page read and write
|
||
257D1103000
|
heap
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
1BD4F000
|
stack
|
page read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
28CFA193000
|
heap
|
page read and write
|
||
53BCF39000
|
stack
|
page read and write
|
||
1159000
|
heap
|
page read and write
|
||
28BBD150000
|
heap
|
page read and write
|
||
7FFD9B83D000
|
trusted library allocation
|
page execute and read and write
|
||
28CFA260000
|
trusted library allocation
|
page read and write
|
||
21B56A2D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B84C000
|
trusted library allocation
|
page execute and read and write
|
||
21B56B47000
|
trusted library allocation
|
page read and write
|
||
21B6DBEC000
|
heap
|
page read and write
|
||
28BBEAD0000
|
heap
|
page readonly
|
||
7FFD9BB6C000
|
trusted library allocation
|
page read and write
|
||
28CFC07F000
|
heap
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
1C4F4000
|
stack
|
page read and write
|
||
257B7050000
|
heap
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
1BB9A000
|
stack
|
page read and write
|
||
6A5B8B3000
|
stack
|
page read and write
|
||
CEF000
|
stack
|
page read and write
|
||
28BBD1AE000
|
heap
|
page read and write
|
||
1600000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
1B6D7000
|
heap
|
page read and write
|
||
1B070000
|
heap
|
page execute and read and write
|
||
7FFD9BC67000
|
trusted library allocation
|
page read and write
|
||
7FFD9B82D000
|
trusted library allocation
|
page execute and read and write
|
||
1BB1E000
|
stack
|
page read and write
|
||
F0B447E000
|
stack
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
1B6D1000
|
heap
|
page read and write
|
||
21B56FAC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
28BD7512000
|
heap
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD3000
|
trusted library allocation
|
page read and write
|
||
28BD7151000
|
heap
|
page read and write
|
||
28C80C01000
|
trusted library allocation
|
page read and write
|
||
28CFBC50000
|
heap
|
page read and write
|
||
7FFD9BB88000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
13A5000
|
heap
|
page read and write
|
||
28BBD1D6000
|
heap
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
257D12F0000
|
trusted library allocation
|
page read and write
|
||
F0B43FE000
|
stack
|
page read and write
|
||
257B8860000
|
trusted library allocation
|
page read and write
|
||
1B49F000
|
stack
|
page read and write
|
||
28BD71B7000
|
heap
|
page read and write
|
||
28BBD19C000
|
heap
|
page read and write
|
||
13263000
|
trusted library allocation
|
page read and write
|
||
257BA7F9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
257B8810000
|
trusted library section
|
page read and write
|
||
257B89E0000
|
heap
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
28C902F1000
|
trusted library allocation
|
page read and write
|
||
28BBEAA0000
|
trusted library allocation
|
page read and write
|
||
6A5CDCE000
|
stack
|
page read and write
|
||
28C813C5000
|
trusted library allocation
|
page read and write
|
||
B24000
|
heap
|
page read and write
|
||
21B55806000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
28BBF24D000
|
trusted library allocation
|
page read and write
|
||
25A0000
|
heap
|
page execute and read and write
|
||
28BC05EE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B804000
|
trusted library allocation
|
page read and write
|
||
257B9B17000
|
trusted library allocation
|
page read and write
|
||
257B9A20000
|
trusted library allocation
|
page read and write
|
||
A70F4F6000
|
stack
|
page read and write
|
||
21B6DF9A000
|
heap
|
page read and write
|
||
B4E000
|
heap
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
28CFC319000
|
heap
|
page read and write
|
||
1BC4E000
|
stack
|
page read and write
|
||
28C903CD000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB59000
|
trusted library allocation
|
page read and write
|
||
257B9442000
|
trusted library allocation
|
page read and write
|
||
26B1000
|
trusted library allocation
|
page read and write
|
||
A70F7BE000
|
stack
|
page read and write
|
||
257BA347000
|
trusted library allocation
|
page read and write
|
||
1C25B000
|
stack
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
257D114A000
|
heap
|
page read and write
|
||
28BBED70000
|
heap
|
page execute and read and write
|
||
257D10C0000
|
heap
|
page read and write
|
||
7FFD9BB69000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B81D000
|
trusted library allocation
|
page execute and read and write
|
||
1010000
|
heap
|
page read and write
|
||
2833000
|
trusted library allocation
|
page read and write
|
||
E6F4C77000
|
stack
|
page read and write
|
||
7FFD9B8C0000
|
trusted library allocation
|
page read and write
|
||
1E011430000
|
heap
|
page read and write
|
||
249B26B8000
|
heap
|
page read and write
|
||
4F8000
|
unkown
|
page execute and read and write
|
||
8F1000
|
stack
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
7FFD9B80D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB54000
|
trusted library allocation
|
page read and write
|
||
27B0000
|
heap
|
page read and write
|
||
257B8C1A000
|
trusted library allocation
|
page read and write
|
||
21B6DFDE000
|
heap
|
page read and write
|
||
7FFD9B8CC000
|
trusted library allocation
|
page execute and read and write
|
||
F0B504D000
|
stack
|
page read and write
|
||
1BFBE000
|
stack
|
page read and write
|
||
257B88F5000
|
heap
|
page read and write
|
||
257B9769000
|
trusted library allocation
|
page read and write
|
||
28BBEE00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
13268000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
3277000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
1AD4D000
|
stack
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
257B6F27000
|
heap
|
page read and write
|
||
28C80D0F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page execute and read and write
|
||
1B5BD000
|
stack
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
98E000
|
stack
|
page read and write
|
||
257D1233000
|
heap
|
page read and write
|
||
7FFD9B9DA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B804000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
28C81031000
|
trusted library allocation
|
page read and write
|
||
257B9AB1000
|
trusted library allocation
|
page read and write
|
||
126B8000
|
trusted library allocation
|
page read and write
|
||
257D1231000
|
heap
|
page read and write
|
||
1BC17000
|
heap
|
page read and write
|
||
257B9633000
|
trusted library allocation
|
page read and write
|
||
1BFDA000
|
stack
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
1C00BC48000
|
heap
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
6A5BFFE000
|
stack
|
page read and write
|
||
7DF4E9150000
|
trusted library allocation
|
page execute and read and write
|
||
10B0000
|
heap
|
page read and write
|
||
730000
|
trusted library allocation
|
page read and write
|
||
28C902F9000
|
trusted library allocation
|
page read and write
|
||
28C80C09000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
1390000
|
trusted library allocation
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
28BBEB50000
|
trusted library allocation
|
page read and write
|
||
31D2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
28C902EF000
|
trusted library allocation
|
page read and write
|
||
21B575A5000
|
trusted library allocation
|
page read and write
|
||
E6F4F3E000
|
stack
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
1B39E000
|
stack
|
page read and write
|
||
1E012E00000
|
heap
|
page read and write
|
||
7FFD9B8C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB62000
|
trusted library allocation
|
page read and write
|
||
6A5C17E000
|
stack
|
page read and write
|
||
28C80229000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
257B6EFF000
|
heap
|
page read and write
|
||
7FFD9B822000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page execute and read and write
|
||
28C804CD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B82D000
|
trusted library allocation
|
page execute and read and write
|
||
7DF4BF4D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
28BBF7D2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B802000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
There are 1184 hidden memdumps, click here to show them.