Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Trojan.Inject4.56087.24588.10142.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SecuriteInfo.com.Trojan.Inject4.56087.24588.10142.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Roaming\XsdType\Target.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\XsdType\Target.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Target.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0lavtjam.fny.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_50wdy5ob.v4u.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_55p0ehha.sje.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uywlj2m2.cg1.psm1
|
ASCII text, with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject4.56087.24588.10142.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject4.56087.24588.10142.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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
|
||
C:\Users\user\AppData\Roaming\XsdType\Target.exe
|
C:\Users\user\AppData\Roaming\XsdType\Target.exe
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
|
||
C:\Users\user\AppData\Roaming\XsdType\Target.exe
|
C:\Users\user\AppData\Roaming\XsdType\Target.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://nuget.org/NuGet.exe
|
unknown
|
||
https://stackoverflow.com/q/14436606/23354
|
unknown
|
||
https://github.com/mgravell/protobuf-netJ
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://ion=v4.535umer
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://github.com/mgravell/protobuf-net
|
unknown
|
||
https://cdn.discordapp.com/attachments/1301574231573663746/1301575510102507551/plugin3.dll?ex=6724fa27&is=6723a8a7&hm=de75ef4bcda6b9340b0357973edbc8ae95f493136ccb6eede12840c8370e40e0&
|
162.159.135.233
|
||
https://files.catbox.moe/kwfxr7.dll
|
unknown
|
||
https://cdn.discordapp.com/attachments/1301574231573663746/1301575510102507551/plugin3.dll?ex=6724fa
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://files.catbox.moe/k541xr.dll0
|
unknown
|
||
https://github.com/mgravell/protobuf-neti
|
unknown
|
||
https://stackoverflow.com/q/11564914/23354;
|
unknown
|
||
https://stackoverflow.com/q/2152978/23354
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
https://files.catbox.moe/k541xr.dll
|
unknown
|
||
http://schemas.micO
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
There are 15 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
fla1337.site
|
147.189.173.36
|
||
cdn.discordapp.com
|
162.159.135.233
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
147.189.173.36
|
fla1337.site
|
United Kingdom
|
||
162.159.135.233
|
cdn.discordapp.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\26d19999dcc6916aedeba96cfef5e476
|
4925efb44414aafd197e64f6f86a9439
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\26d19999dcc6916aedeba96cfef5e476
|
9F5D511A35C11A2E2510B2394FAB93EC
|
There are 6 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1DC43F58000
|
trusted library allocation
|
page read and write
|
||
1FC10306000
|
trusted library allocation
|
page read and write
|
||
1FC00346000
|
trusted library allocation
|
page read and write
|
||
1FC105D6000
|
trusted library allocation
|
page read and write
|
||
1B0CAC76000
|
trusted library allocation
|
page read and write
|
||
1FC00001000
|
trusted library allocation
|
page read and write
|
||
1DC42495000
|
heap
|
page read and write
|
||
1B0CABD6000
|
trusted library allocation
|
page read and write
|
||
1B0BA6A1000
|
trusted library allocation
|
page read and write
|
||
1FC70500000
|
trusted library section
|
page read and write
|
||
1FC10536000
|
trusted library allocation
|
page read and write
|
||
1F51E306000
|
trusted library allocation
|
page read and write
|
||
1DC43F8E000
|
trusted library allocation
|
page read and write
|
||
1F51E536000
|
trusted library allocation
|
page read and write
|
||
1DC43E21000
|
trusted library allocation
|
page read and write
|
||
1F51E5D6000
|
trusted library allocation
|
page read and write
|
||
1F50E018000
|
trusted library allocation
|
page read and write
|
||
1DC44454000
|
trusted library allocation
|
page read and write
|
||
7FFD9B924000
|
trusted library allocation
|
page read and write
|
||
1B0D2EF8000
|
heap
|
page read and write
|
||
1DC5418E000
|
trusted library allocation
|
page read and write
|
||
1B0D32A5000
|
heap
|
page read and write
|
||
4B6D9BE000
|
stack
|
page read and write
|
||
1DC440A5000
|
trusted library allocation
|
page read and write
|
||
1FC001A1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
1FC0027E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
1FC10007000
|
trusted library allocation
|
page read and write
|
||
1DC4415E000
|
trusted library allocation
|
page read and write
|
||
1DC4433E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B934000
|
trusted library allocation
|
page read and write
|
||
1DC44474000
|
trusted library allocation
|
page read and write
|
||
1FC001F0000
|
trusted library allocation
|
page read and write
|
||
1FC00212000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A5000
|
trusted library allocation
|
page read and write
|
||
1FC00589000
|
trusted library allocation
|
page read and write
|
||
1B0D315A000
|
heap
|
page read and write
|
||
1DC442E8000
|
trusted library allocation
|
page read and write
|
||
1B0BA9F5000
|
trusted library allocation
|
page read and write
|
||
1D145285000
|
heap
|
page read and write
|
||
7FFD9B99B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
1B0D2F60000
|
heap
|
page read and write
|
||
1FC70460000
|
heap
|
page read and write
|
||
1DC44075000
|
trusted library allocation
|
page read and write
|
||
1FC729AD000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
1F50C5C5000
|
heap
|
page read and write
|
||
1B0D2F0C000
|
heap
|
page read and write
|
||
1B0B8AAC000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
1DC441B9000
|
trusted library allocation
|
page read and write
|
||
1DC42435000
|
heap
|
page read and write
|
||
1DC5CAFB000
|
heap
|
page read and write
|
||
1D145248000
|
heap
|
page read and write
|
||
3B123F7000
|
stack
|
page read and write
|
||
1B0D2EB1000
|
heap
|
page read and write
|
||
1DC4244F000
|
heap
|
page read and write
|
||
1B0BAA10000
|
trusted library allocation
|
page read and write
|
||
1B0BAB3B000
|
trusted library allocation
|
page read and write
|
||
1B0D3340000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
1DC44321000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
1DC44390000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7B4000
|
trusted library allocation
|
page read and write
|
||
75375FE000
|
stack
|
page read and write
|
||
1DC44358000
|
trusted library allocation
|
page read and write
|
||
1DC443E2000
|
trusted library allocation
|
page read and write
|
||
1DC53FC8000
|
trusted library allocation
|
page read and write
|
||
1D12C2B0000
|
heap
|
page read and write
|
||
1B0B8A6B000
|
heap
|
page read and write
|
||
1B0BA86A000
|
trusted library allocation
|
page read and write
|
||
1B0BA9C8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7AD000
|
trusted library allocation
|
page execute and read and write
|
||
1B0CAD17000
|
trusted library allocation
|
page read and write
|
||
9B4BBFE000
|
stack
|
page read and write
|
||
1D13CA5F000
|
trusted library allocation
|
page read and write
|
||
1B0D3242000
|
heap
|
page read and write
|
||
1D1449F7000
|
heap
|
page read and write
|
||
1B0D3122000
|
heap
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
1D12C820000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
1DC4447F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
1FC721A4000
|
heap
|
page read and write
|
||
1DC440B9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
1DC4434E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
1FC729F6000
|
heap
|
page read and write
|
||
7FFD9B99F000
|
trusted library allocation
|
page read and write
|
||
1B0D3388000
|
heap
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
1B0B8A80000
|
heap
|
page read and write
|
||
1FC10001000
|
trusted library allocation
|
page read and write
|
||
1FC702C0000
|
heap
|
page read and write
|
||
1B0D3119000
|
heap
|
page read and write
|
||
7FFD9B986000
|
trusted library allocation
|
page read and write
|
||
1FC72C0E000
|
heap
|
page read and write
|
||
1B0BACB9000
|
trusted library allocation
|
page read and write
|
||
1F50C37F000
|
heap
|
page read and write
|
||
1DC44189000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B984000
|
trusted library allocation
|
page read and write
|
||
1D12D966000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
1DC4411A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAA3000
|
trusted library allocation
|
page read and write
|
||
1B0D338B000
|
heap
|
page read and write
|
||
1FC00250000
|
trusted library allocation
|
page read and write
|
||
4B6D47E000
|
stack
|
page read and write
|
||
7FFD9B954000
|
trusted library allocation
|
page read and write
|
||
1DC4439A000
|
trusted library allocation
|
page read and write
|
||
1FC0056F000
|
trusted library allocation
|
page read and write
|
||
1D1451D3000
|
heap
|
page read and write
|
||
1FC70290000
|
heap
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
1DC44369000
|
trusted library allocation
|
page read and write
|
||
1DC442E2000
|
trusted library allocation
|
page read and write
|
||
1B0BA922000
|
trusted library allocation
|
page read and write
|
||
1FC72BE2000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
1FC0019B000
|
trusted library allocation
|
page read and write
|
||
1D12E7D2000
|
trusted library allocation
|
page read and write
|
||
1DC5CB1C000
|
heap
|
page read and write
|
||
1B0D331D000
|
heap
|
page read and write
|
||
1B0CA7F2000
|
trusted library allocation
|
page read and write
|
||
1B0BAC1F000
|
trusted library allocation
|
page read and write
|
||
1F50C6F0000
|
heap
|
page read and write
|
||
1B0BAB0F000
|
trusted library allocation
|
page read and write
|
||
1FC72ADB000
|
heap
|
page read and write
|
||
3B13BF9000
|
stack
|
page read and write
|
||
1FC003CC000
|
trusted library allocation
|
page read and write
|
||
1DC44081000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
1D144EFA000
|
heap
|
page read and write
|
||
1D12E21F000
|
trusted library allocation
|
page read and write
|
||
1D1452CE000
|
heap
|
page read and write
|
||
1FC70303000
|
heap
|
page read and write
|
||
1DC54356000
|
trusted library allocation
|
page read and write
|
||
1DC44055000
|
trusted library allocation
|
page read and write
|
||
1B0D3392000
|
heap
|
page read and write
|
||
1B0D2F6B000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page execute and read and write
|
||
1D12C940000
|
heap
|
page execute and read and write
|
||
4B6D5F9000
|
stack
|
page read and write
|
||
1DC4451C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B988000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
1DC44110000
|
trusted library allocation
|
page read and write
|
||
1B0B8A00000
|
heap
|
page read and write
|
||
1FC7282E000
|
heap
|
page read and write
|
||
1DC443AE000
|
trusted library allocation
|
page read and write
|
||
1D12E817000
|
trusted library allocation
|
page read and write
|
||
1DC44175000
|
trusted library allocation
|
page read and write
|
||
1DC42523000
|
trusted library allocation
|
page read and write
|
||
7FFD9B94F000
|
trusted library allocation
|
page read and write
|
||
1F50C2E0000
|
heap
|
page read and write
|
||
1B0D31A4000
|
heap
|
page read and write
|
||
75379FE000
|
stack
|
page read and write
|
||
1F50C6F5000
|
heap
|
page read and write
|
||
1DC443B3000
|
trusted library allocation
|
page read and write
|
||
1FC7285B000
|
heap
|
page read and write
|
||
1FC7287E000
|
heap
|
page read and write
|
||
1FC00128000
|
trusted library allocation
|
page read and write
|
||
7FFD9B925000
|
trusted library allocation
|
page read and write
|
||
4B6E58D000
|
stack
|
page read and write
|
||
7FFD9B7AD000
|
trusted library allocation
|
page execute and read and write
|
||
1DC5CB4D000
|
heap
|
page read and write
|
||
1FC72B7F000
|
heap
|
page read and write
|
||
1FC728A5000
|
heap
|
page read and write
|
||
1B0CA74E000
|
trusted library allocation
|
page read and write
|
||
1D12CC1A000
|
trusted library allocation
|
page read and write
|
||
1B0BAC53000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
1FC72BE5000
|
heap
|
page read and write
|
||
1FC72763000
|
heap
|
page read and write
|
||
C22EFFF000
|
stack
|
page read and write
|
||
1B0D2F01000
|
heap
|
page read and write
|
||
1FC7285E000
|
heap
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
C22E7FF000
|
stack
|
page read and write
|
||
1FC00318000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
1D12E179000
|
trusted library allocation
|
page read and write
|
||
1D12DD32000
|
trusted library allocation
|
page read and write
|
||
4B6D93C000
|
stack
|
page read and write
|
||
1B0D3399000
|
heap
|
page read and write
|
||
1DC4430F000
|
trusted library allocation
|
page read and write
|
||
1D12D9FB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
1DC4434A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B876000
|
trusted library allocation
|
page execute and read and write
|
||
1B0D339C000
|
heap
|
page read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
1DC42455000
|
heap
|
page read and write
|
||
1B0D2E81000
|
heap
|
page read and write
|
||
3B157FA000
|
stack
|
page read and write
|
||
1DC443C0000
|
trusted library allocation
|
page read and write
|
||
1DC4244B000
|
heap
|
page read and write
|
||
1FC72B45000
|
heap
|
page read and write
|
||
1FC7288D000
|
heap
|
page read and write
|
||
1DC42580000
|
heap
|
page read and write
|
||
1B0D337B000
|
heap
|
page read and write
|
||
3B113FF000
|
stack
|
page read and write
|
||
1D12DBD0000
|
trusted library allocation
|
page read and write
|
||
1DC42493000
|
heap
|
page read and write
|
||
7FFD9B995000
|
trusted library allocation
|
page read and write
|
||
1B0B8AB1000
|
heap
|
page read and write
|
||
7FFD9B96F000
|
trusted library allocation
|
page read and write
|
||
1B0D2FFE000
|
heap
|
page read and write
|
||
1D13C9F1000
|
trusted library allocation
|
page read and write
|
||
9B4A3FE000
|
stack
|
page read and write
|
||
7FFD9B9AD000
|
trusted library allocation
|
page read and write
|
||
3B143FB000
|
stack
|
page read and write
|
||
1B0D2F1D000
|
heap
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
1DC423F0000
|
heap
|
page read and write
|
||
1B0CACC7000
|
trusted library allocation
|
page read and write
|
||
1DC44404000
|
trusted library allocation
|
page read and write
|
||
1DC5CCF0000
|
heap
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB63000
|
trusted library allocation
|
page read and write
|
||
1FC7034A000
|
heap
|
page read and write
|
||
1B0BA777000
|
trusted library allocation
|
page read and write
|
||
1FC7277A000
|
heap
|
page read and write
|
||
1B0BAAC7000
|
trusted library allocation
|
page read and write
|
||
1FC72884000
|
heap
|
page read and write
|
||
7FFD9B84C000
|
trusted library allocation
|
page execute and read and write
|
||
1DC443C7000
|
trusted library allocation
|
page read and write
|
||
1DC5CAE0000
|
heap
|
page read and write
|
||
1B0D30C6000
|
heap
|
page read and write
|
||
1FC702EA000
|
heap
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
1D14525A000
|
heap
|
page read and write
|
||
1B0D3013000
|
heap
|
page read and write
|
||
1B0B8D00000
|
heap
|
page read and write
|
||
1D12C296000
|
heap
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
1B0BAA5B000
|
trusted library allocation
|
page read and write
|
||
1B0BAB6B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
1B0BA7C5000
|
trusted library allocation
|
page read and write
|
||
1DC440FF000
|
trusted library allocation
|
page read and write
|
||
1D145040000
|
heap
|
page read and write
|
||
1DC44297000
|
trusted library allocation
|
page read and write
|
||
1DC443EC000
|
trusted library allocation
|
page read and write
|
||
1F50C379000
|
heap
|
page read and write
|
||
1FC72C00000
|
heap
|
page read and write
|
||
7FFD9B937000
|
trusted library allocation
|
page read and write
|
||
1B0D2EA4000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
1B0BA841000
|
trusted library allocation
|
page read and write
|
||
1FC7280D000
|
heap
|
page read and write
|
||
7FFD9B99E000
|
trusted library allocation
|
page read and write
|
||
1D12C9A0000
|
heap
|
page execute and read and write
|
||
1DC44451000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page execute and read and write
|
||
1DC44353000
|
trusted library allocation
|
page read and write
|
||
1DC443A7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
1FC70590000
|
heap
|
page read and write
|
||
1DC4245B000
|
heap
|
page read and write
|
||
1D12C9E0000
|
heap
|
page read and write
|
||
1B0D3261000
|
heap
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page execute and read and write
|
||
1D12C7E0000
|
trusted library section
|
page read and write
|
||
1FC72874000
|
heap
|
page read and write
|
||
1DC442CA000
|
trusted library allocation
|
page read and write
|
||
1F51E001000
|
trusted library allocation
|
page read and write
|
||
1FC72B14000
|
heap
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
1FC003ED000
|
trusted library allocation
|
page read and write
|
||
1DC5415A000
|
trusted library allocation
|
page read and write
|
||
1FC729C4000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
1B0BA779000
|
trusted library allocation
|
page read and write
|
||
1DC4407C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B93D000
|
trusted library allocation
|
page read and write
|
||
4B6D6B6000
|
stack
|
page read and write
|
||
1DC4440C000
|
trusted library allocation
|
page read and write
|
||
1D12C830000
|
heap
|
page readonly
|
||
7FFD9B7AB000
|
trusted library allocation
|
page execute and read and write
|
||
1FC70030000
|
unkown
|
page readonly
|
||
1D12C9F1000
|
trusted library allocation
|
page read and write
|
||
1FC001DB000
|
trusted library allocation
|
page read and write
|
||
1D12D963000
|
trusted library allocation
|
page read and write
|
||
1DC440B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
1FC00496000
|
trusted library allocation
|
page read and write
|
||
1DC44377000
|
trusted library allocation
|
page read and write
|
||
1FC00149000
|
trusted library allocation
|
page read and write
|
||
1DC44145000
|
trusted library allocation
|
page read and write
|
||
1B0D2E9F000
|
heap
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page execute and read and write
|
||
1D1451FA000
|
heap
|
page read and write
|
||
1D13CA11000
|
trusted library allocation
|
page read and write
|
||
1FC728B6000
|
heap
|
page read and write
|
||
1B0BAC2C000
|
trusted library allocation
|
page read and write
|
||
1DC440F7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
1DC4432B000
|
trusted library allocation
|
page read and write
|
||
1DC4411C000
|
trusted library allocation
|
page read and write
|
||
1FC72849000
|
heap
|
page read and write
|
||
1FC72B60000
|
heap
|
page read and write
|
||
1F50C5C0000
|
heap
|
page read and write
|
||
1B0D2FDD000
|
heap
|
page read and write
|
||
1D13CCE6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7EC000
|
trusted library allocation
|
page execute and read and write
|
||
1DC44386000
|
trusted library allocation
|
page read and write
|
||
1FC725F0000
|
trusted library section
|
page read and write
|
||
1B0D3187000
|
heap
|
page read and write
|
||
1B0D32C7000
|
heap
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
1B0D3173000
|
heap
|
page read and write
|
||
1B0D2E70000
|
heap
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
1FC0025D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8CB000
|
trusted library allocation
|
page execute and read and write
|
||
1B0D3383000
|
heap
|
page read and write
|
||
1FC702FF000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
1D12D601000
|
trusted library allocation
|
page read and write
|
||
1B0D30FA000
|
heap
|
page read and write
|
||
7FFD9B79B000
|
trusted library allocation
|
page execute and read and write
|
||
1B0D312C000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
1DC44459000
|
trusted library allocation
|
page read and write
|
||
1D12E285000
|
trusted library allocation
|
page read and write
|
||
1FC106DB000
|
trusted library allocation
|
page read and write
|
||
1B0BA81A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B98F000
|
trusted library allocation
|
page read and write
|
||
1D144E7E000
|
heap
|
page read and write
|
||
9B49BE0000
|
stack
|
page read and write
|
||
1B0BA814000
|
trusted library allocation
|
page read and write
|
||
1DC53FE6000
|
trusted library allocation
|
page read and write
|
||
1DC5C805000
|
heap
|
page read and write
|
||
1F50C3A5000
|
heap
|
page read and write
|
||
1F50DFF0000
|
heap
|
page execute and read and write
|
||
1B0D30C0000
|
heap
|
page read and write
|
||
7FFD9B797000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page execute and read and write
|
||
4B6D3FA000
|
stack
|
page read and write
|
||
1DC4406D000
|
trusted library allocation
|
page read and write
|
||
1D12C445000
|
heap
|
page read and write
|
||
1FC71E10000
|
heap
|
page execute and read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
1D145052000
|
heap
|
page read and write
|
||
1D12C8A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B95F000
|
trusted library allocation
|
page read and write
|
||
1B0BA8C8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7BD000
|
trusted library allocation
|
page execute and read and write
|
||
1B0BA91C000
|
trusted library allocation
|
page read and write
|
||
1FC72B9C000
|
heap
|
page read and write
|
||
75389FE000
|
stack
|
page read and write
|
||
1FC002DA000
|
trusted library allocation
|
page read and write
|
||
1DC4430D000
|
trusted library allocation
|
page read and write
|
||
1DC42675000
|
heap
|
page read and write
|
||
1FC7032E000
|
heap
|
page read and write
|
||
1D13CA21000
|
trusted library allocation
|
page read and write
|
||
1FC00135000
|
trusted library allocation
|
page read and write
|
||
1B0CADD5000
|
trusted library allocation
|
page read and write
|
||
1B0BAB9F000
|
trusted library allocation
|
page read and write
|
||
4B6E48E000
|
stack
|
page read and write
|
||
1F51E0AE000
|
trusted library allocation
|
page read and write
|
||
1B0D335B000
|
heap
|
page read and write
|
||
4B6D7B7000
|
stack
|
page read and write
|
||
7FFD9B83C000
|
trusted library allocation
|
page execute and read and write
|
||
4B6DA3B000
|
stack
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
1B0D32AC000
|
heap
|
page read and write
|
||
1FC00178000
|
trusted library allocation
|
page read and write
|
||
1D12D9DF000
|
trusted library allocation
|
page read and write
|
||
1B0BACAC000
|
trusted library allocation
|
page read and write
|
||
1D14504C000
|
heap
|
page read and write
|
||
1DC44060000
|
trusted library allocation
|
page read and write
|
||
1B0D2F21000
|
heap
|
page read and write
|
||
1DC4448E000
|
trusted library allocation
|
page read and write
|
||
1FC70595000
|
heap
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
4B6D4F9000
|
stack
|
page read and write
|
||
1DC5CB25000
|
heap
|
page read and write
|
||
1D145010000
|
heap
|
page execute and read and write
|
||
1DC44094000
|
trusted library allocation
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
1B0BA79B000
|
trusted library allocation
|
page read and write
|
||
1B0D3248000
|
heap
|
page read and write
|
||
7FFD9B98F000
|
trusted library allocation
|
page read and write
|
||
1B0BA8BB000
|
trusted library allocation
|
page read and write
|
||
1B0B8CC0000
|
heap
|
page execute and read and write
|
||
1B0D33AC000
|
heap
|
page read and write
|
||
1D12DB16000
|
trusted library allocation
|
page read and write
|
||
1DC44107000
|
trusted library allocation
|
page read and write
|
||
1FC729C8000
|
heap
|
page read and write
|
||
1FC71D90000
|
trusted library section
|
page read and write
|
||
1DC440F3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page execute and read and write
|
||
1B0BAA26000
|
trusted library allocation
|
page read and write
|
||
1B0BAAD5000
|
trusted library allocation
|
page read and write
|
||
1B0BAB99000
|
trusted library allocation
|
page read and write
|
||
1DC444B3000
|
trusted library allocation
|
page read and write
|
||
1DC44477000
|
trusted library allocation
|
page read and write
|
||
1FC7286B000
|
heap
|
page read and write
|
||
7FFD9B98C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page execute and read and write
|
||
1B0BABB4000
|
trusted library allocation
|
page read and write
|
||
1DC42670000
|
heap
|
page read and write
|
||
1B0BA8A8000
|
trusted library allocation
|
page read and write
|
||
1F51E677000
|
trusted library allocation
|
page read and write
|
||
1FC702C6000
|
heap
|
page read and write
|
||
7FFD9B82C000
|
trusted library allocation
|
page execute and read and write
|
||
1DC441D7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
1FC700E6000
|
unkown
|
page readonly
|
||
1FC7275D000
|
heap
|
page read and write
|
||
1B0B8920000
|
heap
|
page read and write
|
||
1D12C7F0000
|
trusted library section
|
page read and write
|
||
1DC5C1A6000
|
heap
|
page read and write
|
||
1DC42520000
|
trusted library allocation
|
page read and write
|
||
C22D3E0000
|
stack
|
page read and write
|
||
7FFD9B95F000
|
trusted library allocation
|
page read and write
|
||
1B0D2EC2000
|
heap
|
page read and write
|
||
C22DBFE000
|
stack
|
page read and write
|
||
7FFD9BAC4000
|
trusted library allocation
|
page read and write
|
||
1FC002A4000
|
trusted library allocation
|
page read and write
|
||
1B0CA6A1000
|
trusted library allocation
|
page read and write
|
||
1B0D2FCA000
|
heap
|
page read and write
|
||
1DC442F3000
|
trusted library allocation
|
page read and write
|
||
1DC53FD9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
1B0D2FCE000
|
heap
|
page read and write
|
||
1DC442E6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B943000
|
trusted library allocation
|
page read and write
|
||
1B0BAB20000
|
trusted library allocation
|
page read and write
|
||
1FC704FE000
|
heap
|
page read and write
|
||
4B6D37E000
|
stack
|
page read and write
|
||
1B0B8AAA000
|
heap
|
page read and write
|
||
1FC72A35000
|
heap
|
page read and write
|
||
1DC440D7000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA92000
|
trusted library allocation
|
page read and write
|
||
1FC72B38000
|
heap
|
page read and write
|
||
1D12C29C000
|
heap
|
page read and write
|
||
1B0CA9A6000
|
trusted library allocation
|
page read and write
|
||
1D12D989000
|
trusted library allocation
|
page read and write
|
||
1F50C367000
|
heap
|
page read and write
|
||
1D12E346000
|
trusted library allocation
|
page read and write
|
||
1DC444B5000
|
trusted library allocation
|
page read and write
|
||
1B0B8B90000
|
trusted library allocation
|
page read and write
|
||
1FC72759000
|
heap
|
page read and write
|
||
7FFD9B93A000
|
trusted library allocation
|
page read and write
|
||
3B0F99E000
|
stack
|
page read and write
|
||
1F50C650000
|
heap
|
page read and write
|
||
7FFD9BAAA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
1FC703E0000
|
trusted library allocation
|
page read and write
|
||
1FC70170000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
1FC0010E000
|
trusted library allocation
|
page read and write
|
||
1B0D33A2000
|
heap
|
page read and write
|
||
1B0CA866000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
1DC42370000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
3B11BFD000
|
stack
|
page read and write
|
||
1F51E1C6000
|
trusted library allocation
|
page read and write
|
||
1F50C348000
|
heap
|
page read and write
|
||
1FC729D8000
|
heap
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
1F50C3FD000
|
heap
|
page read and write
|
||
1D12C2D7000
|
heap
|
page read and write
|
||
1FC72B3B000
|
heap
|
page read and write
|
||
1F526030000
|
trusted library allocation
|
page read and write
|
||
1FC004D4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B99E000
|
trusted library allocation
|
page read and write
|
||
1FC7276C000
|
heap
|
page read and write
|
||
1DC5C660000
|
trusted library allocation
|
page read and write
|
||
1DC4445C000
|
trusted library allocation
|
page read and write
|
||
1DC443A9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page execute and read and write
|
||
1DC44465000
|
trusted library allocation
|
page read and write
|
||
1FC72794000
|
heap
|
page read and write
|
||
1DC44487000
|
trusted library allocation
|
page read and write
|
||
1FC72BD0000
|
heap
|
page read and write
|
||
1B0D30CB000
|
heap
|
page read and write
|
||
1DC44152000
|
trusted library allocation
|
page read and write
|
||
7536DE1000
|
stack
|
page read and write
|
||
1F50C550000
|
trusted library allocation
|
page read and write
|
||
1DC442FA000
|
trusted library allocation
|
page read and write
|
||
1DC443F3000
|
trusted library allocation
|
page read and write
|
||
1B0D2F30000
|
heap
|
page read and write
|
||
1F51E1A9000
|
trusted library allocation
|
page read and write
|
||
1D145143000
|
heap
|
page read and write
|
||
1B0BA870000
|
trusted library allocation
|
page read and write
|
||
7537DFC000
|
stack
|
page read and write
|
||
1D144E40000
|
heap
|
page read and write
|
||
1FC704F0000
|
heap
|
page read and write
|
||
1DC5CB74000
|
heap
|
page read and write
|
||
1FC727CF000
|
heap
|
page read and write
|
||
1DC423F5000
|
heap
|
page read and write
|
||
1F51E3CD000
|
trusted library allocation
|
page read and write
|
||
1D1451D7000
|
heap
|
page read and write
|
||
1B0D2F2B000
|
heap
|
page read and write
|
||
1DC44493000
|
trusted library allocation
|
page read and write
|
||
1D12C292000
|
heap
|
page read and write
|
||
7FFD9B94F000
|
trusted library allocation
|
page read and write
|
||
1FC727B5000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
1DC44069000
|
trusted library allocation
|
page read and write
|
||
1DC442F5000
|
trusted library allocation
|
page read and write
|
||
1FC71D40000
|
trusted library section
|
page read and write
|
||
1FC00524000
|
trusted library allocation
|
page read and write
|
||
4B6D8BE000
|
stack
|
page read and write
|
||
1B0D31E3000
|
heap
|
page read and write
|
||
1FC002ED000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A4000
|
trusted library allocation
|
page read and write
|
||
1B0BAB50000
|
trusted library allocation
|
page read and write
|
||
1B0BA8E3000
|
trusted library allocation
|
page read and write
|
||
1FC00531000
|
trusted library allocation
|
page read and write
|
||
4B6E68E000
|
stack
|
page read and write
|
||
1DC42410000
|
heap
|
page read and write
|
||
7FFD9BAB2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78B000
|
trusted library allocation
|
page read and write
|
||
1B0D32BA000
|
heap
|
page read and write
|
||
1FC0053F000
|
trusted library allocation
|
page read and write
|
||
1F51E3F5000
|
trusted library allocation
|
page read and write
|
||
1FC7294A000
|
heap
|
page read and write
|
||
1D1452BD000
|
heap
|
page read and write
|
||
1DC442FC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
3B0FFE1000
|
stack
|
page read and write
|
||
75371FE000
|
stack
|
page read and write
|
||
1F50C620000
|
heap
|
page execute and read and write
|
||
1B0B8B40000
|
heap
|
page read and write
|
||
1FC7276F000
|
heap
|
page read and write
|
||
1DC53FC1000
|
trusted library allocation
|
page read and write
|
||
1DC44002000
|
trusted library allocation
|
page read and write
|
||
3B10BFA000
|
stack
|
page read and write
|
||
1B0B8AFA000
|
heap
|
page read and write
|
||
7FFD9B93C000
|
trusted library allocation
|
page read and write
|
||
1DC44370000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
1D12E7F8000
|
trusted library allocation
|
page read and write
|
||
1FC00228000
|
trusted library allocation
|
page read and write
|
||
1DC4412B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B937000
|
trusted library allocation
|
page read and write
|
||
1DC44132000
|
trusted library allocation
|
page read and write
|
||
1B0BA690000
|
heap
|
page read and write
|
||
1B0BAC46000
|
trusted library allocation
|
page read and write
|
||
1DC44170000
|
trusted library allocation
|
page read and write
|
||
7FFD9B996000
|
trusted library allocation
|
page read and write
|
||
1B0D3138000
|
heap
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
1FC72743000
|
heap
|
page read and write
|
||
1B0CA849000
|
trusted library allocation
|
page read and write
|
||
1FC004BB000
|
trusted library allocation
|
page read and write
|
||
1B0D2E95000
|
heap
|
page read and write
|
||
1DC44472000
|
trusted library allocation
|
page read and write
|
||
9B4A7FE000
|
stack
|
page read and write
|
||
1B0D300D000
|
heap
|
page read and write
|
||
1B0B8B34000
|
heap
|
page read and write
|
||
1FC72B54000
|
heap
|
page read and write
|
||
1FC0030A000
|
trusted library allocation
|
page read and write
|
||
1B0D3282000
|
heap
|
page read and write
|
||
1FC72C07000
|
heap
|
page read and write
|
||
1B0BAA02000
|
trusted library allocation
|
page read and write
|
||
7DF416C90000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
7FFD9B782000
|
trusted library allocation
|
page read and write
|
||
1FC72782000
|
heap
|
page read and write
|
||
1DC4440E000
|
trusted library allocation
|
page read and write
|
||
1B0BA87D000
|
trusted library allocation
|
page read and write
|
||
1D12D9E9000
|
trusted library allocation
|
page read and write
|
||
1DC443F1000
|
trusted library allocation
|
page read and write
|
||
1DC44364000
|
trusted library allocation
|
page read and write
|
||
7FFD9B772000
|
trusted library allocation
|
page read and write
|
||
1D12DCFE000
|
trusted library allocation
|
page read and write
|
||
1B0B8BC0000
|
trusted library allocation
|
page read and write
|
||
1DC441BE000
|
trusted library allocation
|
page read and write
|
||
1B0D3348000
|
heap
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
1FC7278E000
|
heap
|
page read and write
|
||
1DC4437A000
|
trusted library allocation
|
page read and write
|
||
3B147FA000
|
stack
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
1FC10753000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
1B0BAC6E000
|
trusted library allocation
|
page read and write
|
||
9B4ABFC000
|
stack
|
page read and write
|
||
1DC4443F000
|
trusted library allocation
|
page read and write
|
||
1DC5CAF0000
|
heap
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
1DC442DF000
|
trusted library allocation
|
page read and write
|
||
1FC72BCA000
|
heap
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
1DC4435D000
|
trusted library allocation
|
page read and write
|
||
3B103FA000
|
stack
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
1FC729D3000
|
heap
|
page read and write
|
||
1DC44137000
|
trusted library allocation
|
page read and write
|
||
1FC70270000
|
heap
|
page read and write
|
||
1FC7284E000
|
heap
|
page read and write
|
||
7FFD9BADC000
|
trusted library allocation
|
page read and write
|
||
1B0BAADC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B94C000
|
trusted library allocation
|
page read and write
|
||
3B12FFA000
|
stack
|
page read and write
|
||
3B107FE000
|
stack
|
page read and write
|
||
7FFD9B79B000
|
trusted library allocation
|
page execute and read and write
|
||
1D144EC0000
|
heap
|
page read and write
|
||
3B133FE000
|
stack
|
page read and write
|
||
1FC002FC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page execute and read and write
|
||
9B49FFE000
|
stack
|
page read and write
|
||
1DC442DC000
|
trusted library allocation
|
page read and write
|
||
1DC440C0000
|
trusted library allocation
|
page read and write
|
||
1B0BACD9000
|
trusted library allocation
|
page read and write
|
||
4B6D83F000
|
stack
|
page read and write
|
||
1DC44314000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
1FC7032A000
|
heap
|
page read and write
|
||
1B0D2FEB000
|
heap
|
page read and write
|
||
7FFD9B927000
|
trusted library allocation
|
page read and write
|
||
1FC0026A000
|
trusted library allocation
|
page read and write
|
||
3B13FFA000
|
stack
|
page read and write
|
||
1F50E001000
|
trusted library allocation
|
page read and write
|
||
1B0D2F66000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
4B6E60C000
|
stack
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
1FC0041C000
|
trusted library allocation
|
page read and write
|
||
1FC72B23000
|
heap
|
page read and write
|
||
1F50C37C000
|
heap
|
page read and write
|
||
1DC440D9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9AE000
|
trusted library allocation
|
page read and write
|
||
1DC53ECE000
|
trusted library allocation
|
page read and write
|
||
1D14527A000
|
heap
|
page read and write
|
||
1FC001BB000
|
trusted library allocation
|
page read and write
|
||
1DC44196000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
1B0D3179000
|
heap
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
1DC5C693000
|
heap
|
page execute and read and write
|
||
1B0D2FC4000
|
heap
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
1FC72B0C000
|
heap
|
page read and write
|
||
7FFD9B9BE000
|
trusted library allocation
|
page read and write
|
||
1B0B8C40000
|
heap
|
page execute and read and write
|
||
3B10FFC000
|
stack
|
page read and write
|
||
C22EBFE000
|
stack
|
page read and write
|
||
1B0BA863000
|
trusted library allocation
|
page read and write
|
||
1DC444A9000
|
trusted library allocation
|
page read and write
|
||
1B0D2EBA000
|
heap
|
page read and write
|
||
1DC4242F000
|
heap
|
page read and write
|
||
1DC444A4000
|
trusted library allocation
|
page read and write
|
||
1FC70336000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
1DC44077000
|
trusted library allocation
|
page read and write
|
||
1B0BA919000
|
trusted library allocation
|
page read and write
|
||
7FF4B7D20000
|
trusted library allocation
|
page execute and read and write
|
||
1FC00430000
|
trusted library allocation
|
page read and write
|
||
1B0BA9DC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B793000
|
trusted library allocation
|
page execute and read and write
|
||
1D12C1F0000
|
heap
|
page read and write
|
||
1DC42600000
|
heap
|
page execute and read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page read and write
|
||
1DC5CB6E000
|
heap
|
page read and write
|
||
1FC727A9000
|
heap
|
page read and write
|
||
1FC72BB6000
|
heap
|
page read and write
|
||
75381FD000
|
stack
|
page read and write
|
||
3B12BFA000
|
stack
|
page read and write
|
||
1D12D779000
|
trusted library allocation
|
page read and write
|
||
1D12E81C000
|
trusted library allocation
|
page read and write
|
||
1FC103F4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
1B0D32BE000
|
heap
|
page read and write
|
||
1B0D32EE000
|
heap
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
1F50E00C000
|
trusted library allocation
|
page read and write
|
||
1FC702EC000
|
heap
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
1B0BAB8B000
|
trusted library allocation
|
page read and write
|
||
1DC42459000
|
heap
|
page read and write
|
||
1FC72720000
|
heap
|
page execute and read and write
|
||
1D12C800000
|
trusted library allocation
|
page read and write
|
||
4B6E507000
|
stack
|
page read and write
|
||
1B0BAAF6000
|
trusted library allocation
|
page read and write
|
||
1F50C340000
|
heap
|
page read and write
|
||
1DC4431E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B98D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
1B0D31B7000
|
heap
|
page read and write
|
||
1B0BAA76000
|
trusted library allocation
|
page read and write
|
||
1D144E96000
|
heap
|
page read and write
|
||
7FFD9B92A000
|
trusted library allocation
|
page read and write
|
||
1DC5BE50000
|
trusted library allocation
|
page read and write
|
||
1B0D2EF1000
|
heap
|
page read and write
|
||
1DC53FA5000
|
trusted library allocation
|
page read and write
|
||
1F51E627000
|
trusted library allocation
|
page read and write
|
||
4B6E40E000
|
stack
|
page read and write
|
||
1D13CCDC000
|
trusted library allocation
|
page read and write
|
||
1FC00423000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8B9000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B7BB000
|
trusted library allocation
|
page execute and read and write
|
||
1DC5C7B0000
|
heap
|
page read and write
|
||
4B6CFC3000
|
stack
|
page read and write
|
||
1B0B8D05000
|
heap
|
page read and write
|
||
4B6D63E000
|
stack
|
page read and write
|
||
1FC00338000
|
trusted library allocation
|
page read and write
|
||
1FC00482000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7B0000
|
trusted library allocation
|
page read and write
|
||
1B0D30E9000
|
heap
|
page read and write
|
||
1B0D2ED1000
|
heap
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
1B0BAA97000
|
trusted library allocation
|
page read and write
|
||
1B0BAA2C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B958000
|
trusted library allocation
|
page read and write
|
||
1DC442AB000
|
trusted library allocation
|
page read and write
|
||
9B4B3FF000
|
stack
|
page read and write
|
||
1FC00575000
|
trusted library allocation
|
page read and write
|
||
1B0B8A20000
|
heap
|
page read and write
|
||
1B0D31AE000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
1FC72808000
|
heap
|
page read and write
|
||
1DC443DD000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
1DC42270000
|
heap
|
page read and write
|
||
1D1451D5000
|
heap
|
page read and write
|
||
3B14BFF000
|
stack
|
page read and write
|
||
1FC71E50000
|
trusted library allocation
|
page read and write
|
||
1DC4417C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B92F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
1FC001E2000
|
trusted library allocation
|
page read and write
|
||
1D145120000
|
heap
|
page read and write
|
||
1F50C2F0000
|
heap
|
page read and write
|
||
1DC4417A000
|
trusted library allocation
|
page read and write
|
||
1B0D2F12000
|
heap
|
page read and write
|
||
7FFD9B9B8000
|
trusted library allocation
|
page read and write
|
||
1B0BA9A7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A5000
|
trusted library allocation
|
page read and write
|
||
1B0D3218000
|
heap
|
page read and write
|
||
1FC72B72000
|
heap
|
page read and write
|
||
7FFD9B7DC000
|
trusted library allocation
|
page execute and read and write
|
||
1B0D32C0000
|
heap
|
page read and write
|
||
1DC5C640000
|
heap
|
page execute and read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
1DC443CE000
|
trusted library allocation
|
page read and write
|
||
1FC72AD0000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
1D12DAB3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B929000
|
trusted library allocation
|
page read and write
|
||
1DC441D2000
|
trusted library allocation
|
page read and write
|
||
1DC444AE000
|
trusted library allocation
|
page read and write
|
||
C22DFFE000
|
stack
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
1FC7297E000
|
heap
|
page read and write
|
||
4B6D738000
|
stack
|
page read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
1D12D9F7000
|
trusted library allocation
|
page read and write
|
||
1B0BAA1F000
|
trusted library allocation
|
page read and write
|
||
1FC70351000
|
heap
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
1D12DDBC000
|
trusted library allocation
|
page read and write
|
||
1DC4449A000
|
trusted library allocation
|
page read and write
|
||
1D12D958000
|
trusted library allocation
|
page read and write
|
||
1B0D2EDA000
|
heap
|
page read and write
|
||
1D13CCF6000
|
trusted library allocation
|
page read and write
|
||
1DC54126000
|
trusted library allocation
|
page read and write
|
||
3B14FF9000
|
stack
|
page read and write
|
||
7FFD9B997000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
1B0BABCF000
|
trusted library allocation
|
page read and write
|
||
1FC7283A000
|
heap
|
page read and write
|
||
1B0D2F50000
|
heap
|
page read and write
|
||
1D12C895000
|
heap
|
page read and write
|
||
1DC44099000
|
trusted library allocation
|
page read and write
|
||
1DC42510000
|
trusted library allocation
|
page read and write
|
||
7FFD9B952000
|
trusted library allocation
|
page read and write
|
||
1DC443FD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
1B0BA7D9000
|
trusted library allocation
|
page read and write
|
||
1B0D2EC5000
|
heap
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
1FC72930000
|
heap
|
page read and write
|
||
1DC53E21000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
1B0D2EAF000
|
heap
|
page read and write
|
||
9B4AFFD000
|
stack
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
4B6D2FF000
|
stack
|
page read and write
|
||
1B0D322E000
|
heap
|
page read and write
|
||
75385FE000
|
stack
|
page read and write
|
||
1D12C9D0000
|
trusted library allocation
|
page read and write
|
||
1D12C110000
|
heap
|
page read and write
|
||
1D12C890000
|
heap
|
page read and write
|
||
1D12D444000
|
trusted library allocation
|
page read and write
|
||
1DC44481000
|
trusted library allocation
|
page read and write
|
||
1B0D33A0000
|
heap
|
page read and write
|
||
1DC541E1000
|
trusted library allocation
|
page read and write
|
||
1DC44337000
|
trusted library allocation
|
page read and write
|
||
1FC005A2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
1FC004CD000
|
trusted library allocation
|
page read and write
|
||
1DC444A2000
|
trusted library allocation
|
page read and write
|
||
7DF416C80000
|
trusted library allocation
|
page execute and read and write
|
||
1D12DD7C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B99C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
1D14513F000
|
heap
|
page read and write
|
||
1D145017000
|
heap
|
page execute and read and write
|
||
1F50C570000
|
trusted library allocation
|
page read and write
|
||
1B0D2F5B000
|
heap
|
page read and write
|
||
1FC72774000
|
heap
|
page read and write
|
||
1B0D2ECD000
|
heap
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
1B0D26D0000
|
trusted library allocation
|
page read and write
|
||
1B0B8A40000
|
heap
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
1FC727C7000
|
heap
|
page read and write
|
||
1FC004B5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B96F000
|
trusted library allocation
|
page read and write
|
||
1DC42390000
|
heap
|
page read and write
|
||
1FC72730000
|
heap
|
page read and write
|
||
1FC7298F000
|
heap
|
page read and write
|
||
1DC42418000
|
heap
|
page read and write
|
||
1D145243000
|
heap
|
page read and write
|
||
7FFD9B947000
|
trusted library allocation
|
page read and write
|
||
1FC7039E000
|
heap
|
page read and write
|
||
1DC444AB000
|
trusted library allocation
|
page read and write
|
||
1FC7294E000
|
heap
|
page read and write
|
||
1B0D31EA000
|
heap
|
page read and write
|
||
1B0BA92F000
|
trusted library allocation
|
page read and write
|
||
1DC42350000
|
heap
|
page read and write
|
||
1DC54215000
|
trusted library allocation
|
page read and write
|
||
1FC72830000
|
heap
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
1DC44292000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
1DC4444C000
|
trusted library allocation
|
page read and write
|
||
1DC440F0000
|
trusted library allocation
|
page read and write
|
||
1F50C310000
|
heap
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
1F50C510000
|
heap
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page execute and read and write
|
||
1FC72B2E000
|
heap
|
page read and write
|
||
1B0D3246000
|
heap
|
page read and write
|
||
1D1452C7000
|
heap
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
1B0BACD3000
|
trusted library allocation
|
page read and write
|
||
1FC72787000
|
heap
|
page read and write
|
||
1FC72BF1000
|
heap
|
page read and write
|
||
1D145290000
|
heap
|
page read and write
|
||
1DC44467000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
1D12C210000
|
heap
|
page read and write
|
||
1D12C2DB000
|
heap
|
page read and write
|
||
1D1451BF000
|
heap
|
page read and write
|
||
3B117FF000
|
stack
|
page read and write
|
||
1B0D3310000
|
heap
|
page read and write
|
||
1DC5C690000
|
heap
|
page execute and read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
3B11FFA000
|
stack
|
page read and write
|
||
1B0B8A82000
|
heap
|
page read and write
|
||
1B0B8BAB000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
1FC72BE0000
|
heap
|
page read and write
|
||
1DC442BE000
|
trusted library allocation
|
page read and write
|
||
3B127FC000
|
stack
|
page read and write
|
||
1DC441C8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
1D13CCD8000
|
trusted library allocation
|
page read and write
|
||
1FC72B6D000
|
heap
|
page read and write
|
||
1FC72A40000
|
heap
|
page read and write
|
||
C22D7FF000
|
stack
|
page read and write
|
||
1D12CA78000
|
trusted library allocation
|
page read and write
|
||
1D12C259000
|
heap
|
page read and write
|
||
1B0BA4B4000
|
heap
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
1B0B8BA0000
|
heap
|
page read and write
|
||
1FC70250000
|
heap
|
page read and write
|
||
1D12DC9C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
1DC423E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
1B0D3015000
|
heap
|
page read and write
|
||
1F51E1A1000
|
trusted library allocation
|
page read and write
|
||
1FC72B30000
|
heap
|
page read and write
|
||
1FC70032000
|
unkown
|
page readonly
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
C22E3FD000
|
stack
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
1FC0013C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
1F51E152000
|
trusted library allocation
|
page read and write
|
||
1FC72834000
|
heap
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
1B0D3177000
|
heap
|
page read and write
|
||
7FFD9B995000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
1B0BAB34000
|
trusted library allocation
|
page read and write
|
||
7FFD9B92B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD8000
|
trusted library allocation
|
page read and write
|
||
1D12C440000
|
heap
|
page read and write
|
||
1D12CEC0000
|
trusted library allocation
|
page read and write
|
||
1B0BAB42000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
1B0BACE6000
|
trusted library allocation
|
page read and write
|
||
1D12C420000
|
heap
|
page read and write
|
||
1D145205000
|
heap
|
page read and write
|
||
1D12C8D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page execute and read and write
|
||
1DC4446D000
|
trusted library allocation
|
page read and write
|
||
1D14514F000
|
heap
|
page read and write
|
||
4B6D57D000
|
stack
|
page read and write
|
||
1B0BA807000
|
trusted library allocation
|
page read and write
|
||
1B0D325F000
|
heap
|
page read and write
|
||
1B0BA8CF000
|
trusted library allocation
|
page read and write
|
||
1F50C3AA000
|
heap
|
page read and write
|
||
1FC00325000
|
trusted library allocation
|
page read and write
|
||
1DC443D6000
|
trusted library allocation
|
page read and write
|
||
1D12C290000
|
heap
|
page read and write
|
||
7538DFE000
|
stack
|
page read and write
|
||
1DC440D2000
|
trusted library allocation
|
page read and write
|
||
1FC72899000
|
heap
|
page read and write
|
||
4B6D27E000
|
stack
|
page read and write
|
||
3B137FE000
|
stack
|
page read and write
|
||
1FC004AF000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
1D12C29A000
|
heap
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
1FC103ED000
|
trusted library allocation
|
page read and write
|
||
1FC001CE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B82C000
|
trusted library allocation
|
page execute and read and write
|
||
1B0D2FC0000
|
heap
|
page read and write
|
||
1D12E25E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA04000
|
trusted library allocation
|
page read and write
|
||
1DC44126000
|
trusted library allocation
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
1DC4246B000
|
heap
|
page read and write
|
||
1FC002B1000
|
trusted library allocation
|
page read and write
|
||
1D12D9ED000
|
trusted library allocation
|
page read and write
|
||
1D12D95C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
1B0BABE9000
|
trusted library allocation
|
page read and write
|
||
3B0F9DE000
|
stack
|
page read and write
|
||
1B0D31FB000
|
heap
|
page read and write
|
||
1B0D328E000
|
heap
|
page read and write
|
||
9B4B7FE000
|
stack
|
page read and write
|
||
1B0B8A46000
|
heap
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page execute and read and write
|
||
1B0BA8F0000
|
trusted library allocation
|
page read and write
|
||
1DC441A3000
|
trusted library allocation
|
page read and write
|
||
1B0BA8DC000
|
trusted library allocation
|
page read and write
|
||
1FC00298000
|
trusted library allocation
|
page read and write
|
||
1DC44154000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC9000
|
trusted library allocation
|
page read and write
|
||
1B0BABA6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
1D145044000
|
heap
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
1DC44343000
|
trusted library allocation
|
page read and write
|
||
1D12C250000
|
heap
|
page read and write
|
||
1DC442A3000
|
trusted library allocation
|
page read and write
|
||
1FC0048F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
1FC004A9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
1D12C840000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
1FC7295A000
|
heap
|
page read and write
|
||
1FC70400000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
7DF416C70000
|
trusted library allocation
|
page execute and read and write
|
||
1DC442C3000
|
trusted library allocation
|
page read and write
|
||
1B0B8BA5000
|
heap
|
page read and write
|
||
1DC53F72000
|
trusted library allocation
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
1FC7287A000
|
heap
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
1FC000E7000
|
trusted library allocation
|
page read and write
|
||
1FC00114000
|
trusted library allocation
|
page read and write
|
||
1D144F20000
|
heap
|
page read and write
|
||
1DC4441C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9AF000
|
trusted library allocation
|
page read and write
|
||
1DC442A1000
|
trusted library allocation
|
page read and write
|
||
1D12D955000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
1B0BA969000
|
trusted library allocation
|
page read and write
|
||
1B0BA7B8000
|
trusted library allocation
|
page read and write
|
||
1B0BA78B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
1FC704F5000
|
heap
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
There are 1024 hidden memdumps, click here to show them.