Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
UH7iNNKgPW.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\UH7iNNKgPW.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Roaming\ADWASl.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\KUPAL.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0laiuu5a.43r.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0q1o4an5.5xs.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3qhksazs.y2i.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4rjljiwu.x1w.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_55pkjazo.w12.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5axlstur.qxb.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cfyfzqj0.3xz.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d3orsoly.e4g.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d3umcrtz.wcy.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dpyndwbw.qgo.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f3znqaiw.sbj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fezj51pd.lfs.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ha4qrnbm.wdr.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_huvki03i.bg3.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hz5lerdo.ij2.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i5bs2wk2.svb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k5h3poes.q1x.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kdiva3sm.osh.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_msa4nzto.d4u.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nyeksvtm.nqj.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qsxdcpbk.wnw.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qvxsy0z5.bim.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qzo4arj3.2gi.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rdwq2z1i.jwe.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tihjq4gb.off.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vmqovp4e.hxh.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vrioal35.3nl.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vyo5mbyo.2va.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vysfs1ih.zqi.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xbaiktln.csg.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xsnyxakx.03b.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z23u4h5e.be3.psm1
|
ASCII text, with no line terminators
|
dropped
|
There are 27 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\UH7iNNKgPW.exe
|
"C:\Users\user\Desktop\UH7iNNKgPW.exe"
|
||
C:\Users\user\AppData\Roaming\KUPAL.exe
|
"C:\Users\user\AppData\Roaming\KUPAL.exe"
|
||
C:\Users\user\AppData\Roaming\ADWASl.exe
|
"C:\Users\user\AppData\Roaming\ADWASl.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\KUPAL.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ADWASl.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'KUPAL.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'ADWASl.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\system
user'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\system
user'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'system
user'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'system
user'
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 9 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
plant-serial.gl.at.ply.gg
|
|||
147.185.221.18
|
|||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://crl.m
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
http://www.micom/pkiops/Docs/ry.htm0
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://crl.micft.cMicRosof
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
127.0.0.1
|
|||
http://crl.mi
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
There are 12 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\KUPAL_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\KUPAL_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\KUPAL_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\KUPAL_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\KUPAL_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\KUPAL_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\KUPAL_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\KUPAL_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\KUPAL_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\KUPAL_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\KUPAL_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\KUPAL_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\KUPAL_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\KUPAL_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ADWASl_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ADWASl_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ADWASl_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ADWASl_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ADWASl_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ADWASl_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ADWASl_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ADWASl_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ADWASl_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ADWASl_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ADWASl_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ADWASl_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ADWASl_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ADWASl_RASMANCS
|
FileDirectory
|
There are 18 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
12CF8000
|
trusted library allocation
|
page read and write
|
||
E92000
|
unkown
|
page readonly
|
||
682000
|
unkown
|
page readonly
|
||
18C4F2A3000
|
trusted library allocation
|
page read and write
|
||
1FFFF96E000
|
heap
|
page read and write
|
||
D88AC7E000
|
stack
|
page read and write
|
||
1FF831BF000
|
trusted library allocation
|
page read and write
|
||
1FF9A0EB000
|
heap
|
page read and write
|
||
7FFD34866000
|
trusted library allocation
|
page execute and read and write
|
||
D2715F9000
|
stack
|
page read and write
|
||
18C66640000
|
trusted library allocation
|
page read and write
|
||
22F24335000
|
heap
|
page read and write
|
||
1FF83198000
|
trusted library allocation
|
page read and write
|
||
23A6253A000
|
trusted library allocation
|
page read and write
|
||
22BDEF72000
|
heap
|
page read and write
|
||
7FFD34AF0000
|
trusted library allocation
|
page read and write
|
||
225CBC70000
|
trusted library allocation
|
page read and write
|
||
7FFD34AF9000
|
trusted library allocation
|
page read and write
|
||
22BC750A000
|
trusted library allocation
|
page read and write
|
||
20DAE394000
|
heap
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
1FFFF9AD000
|
heap
|
page read and write
|
||
D27127F000
|
stack
|
page read and write
|
||
24020010000
|
heap
|
page read and write
|
||
20DB1080000
|
trusted library allocation
|
page read and write
|
||
240200CC000
|
heap
|
page read and write
|
||
24022C4D000
|
trusted library allocation
|
page read and write
|
||
7FFD34BE6000
|
trusted library allocation
|
page read and write
|
||
7FFD34794000
|
trusted library allocation
|
page read and write
|
||
D88B9CD000
|
stack
|
page read and write
|
||
23A609E0000
|
heap
|
page readonly
|
||
23A6185A000
|
trusted library allocation
|
page read and write
|
||
20DB0BF6000
|
trusted library allocation
|
page read and write
|
||
81456C3000
|
stack
|
page read and write
|
||
22F25C90000
|
heap
|
page execute and read and write
|
||
2403A1E0000
|
heap
|
page read and write
|
||
24032038000
|
trusted library allocation
|
page read and write
|
||
18C4FF1B000
|
trusted library allocation
|
page read and write
|
||
225CB573000
|
trusted library allocation
|
page read and write
|
||
22F24370000
|
trusted library allocation
|
page read and write
|
||
20DAE359000
|
heap
|
page read and write
|
||
2403A5AC000
|
heap
|
page read and write
|
||
7FFD34AF8000
|
trusted library allocation
|
page read and write
|
||
240227A1000
|
trusted library allocation
|
page read and write
|
||
24021C16000
|
trusted library allocation
|
page read and write
|
||
D2712FF000
|
stack
|
page read and write
|
||
22BC7966000
|
trusted library allocation
|
page read and write
|
||
2403A56D000
|
heap
|
page read and write
|
||
7FFD34782000
|
trusted library allocation
|
page read and write
|
||
7FFD34910000
|
trusted library allocation
|
page read and write
|
||
22BC77C6000
|
trusted library allocation
|
page read and write
|
||
1FF9A034000
|
heap
|
page read and write
|
||
1FF83736000
|
trusted library allocation
|
page read and write
|
||
20DAFC00000
|
trusted library allocation
|
page read and write
|
||
20DAE357000
|
heap
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page execute and read and write
|
||
23A5F160000
|
heap
|
page read and write
|
||
7FFD34A50000
|
trusted library allocation
|
page read and write
|
||
C13B57F000
|
stack
|
page read and write
|
||
7FFD34784000
|
trusted library allocation
|
page read and write
|
||
7FFD3485C000
|
trusted library allocation
|
page execute and read and write
|
||
1FF83756000
|
trusted library allocation
|
page read and write
|
||
20DAE353000
|
heap
|
page read and write
|
||
7FFD34BC0000
|
trusted library allocation
|
page read and write
|
||
7DF4BB1F0000
|
trusted library allocation
|
page execute and read and write
|
||
1FF82A25000
|
trusted library allocation
|
page read and write
|
||
20DAE36D000
|
heap
|
page read and write
|
||
22F24420000
|
heap
|
page read and write
|
||
C13B8BE000
|
stack
|
page read and write
|
||
225CB6EF000
|
trusted library allocation
|
page read and write
|
||
24022B02000
|
trusted library allocation
|
page read and write
|
||
22BC4C22000
|
heap
|
page read and write
|
||
20DAE34B000
|
heap
|
page read and write
|
||
22F35D6D000
|
trusted library allocation
|
page read and write
|
||
22BDEB9A000
|
heap
|
page read and write
|
||
22F26C97000
|
trusted library allocation
|
page read and write
|
||
1FF815C0000
|
trusted library section
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
1FFFF950000
|
heap
|
page read and write
|
||
22BC7B4F000
|
trusted library allocation
|
page read and write
|
||
1BCAE0F000
|
stack
|
page read and write
|
||
240203F0000
|
trusted library allocation
|
page read and write
|
||
23A6255F000
|
trusted library allocation
|
page read and write
|
||
18C4C8A5000
|
heap
|
page read and write
|
||
7FFD34A40000
|
trusted library allocation
|
page read and write
|
||
18C66660000
|
heap
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
18C4F9CD000
|
trusted library allocation
|
page read and write
|
||
23A61EE0000
|
trusted library allocation
|
page read and write
|
||
225CC751000
|
trusted library allocation
|
page read and write
|
||
22BC7A93000
|
trusted library allocation
|
page read and write
|
||
18C4FA30000
|
trusted library allocation
|
page read and write
|
||
C13B6FE000
|
stack
|
page read and write
|
||
20DAE3D3000
|
heap
|
page read and write
|
||
1FF82CF7000
|
trusted library allocation
|
page read and write
|
||
D88A87F000
|
stack
|
page read and write
|
||
7FFD347A2000
|
trusted library allocation
|
page read and write
|
||
7FFD34BD3000
|
trusted library allocation
|
page read and write
|
||
7FFD34A90000
|
trusted library allocation
|
page read and write
|
||
18C4C800000
|
heap
|
page readonly
|
||
6C0A98C000
|
stack
|
page read and write
|
||
1FF91C19000
|
trusted library allocation
|
page read and write
|
||
22BC77BE000
|
trusted library allocation
|
page read and write
|
||
7FFD34B9C000
|
trusted library allocation
|
page read and write
|
||
24039B9E000
|
heap
|
page read and write
|
||
2403A4A1000
|
heap
|
page read and write
|
||
22F24257000
|
heap
|
page read and write
|
||
18C4ED4D000
|
trusted library allocation
|
page read and write
|
||
1BC9E7A000
|
stack
|
page read and write
|
||
22BC78B0000
|
trusted library allocation
|
page read and write
|
||
8145FBE000
|
stack
|
page read and write
|
||
24021DB9000
|
trusted library allocation
|
page read and write
|
||
1FF815D0000
|
trusted library section
|
page read and write
|
||
22F24252000
|
heap
|
page read and write
|
||
7FFD34B30000
|
trusted library allocation
|
page read and write
|
||
1BC9CFE000
|
stack
|
page read and write
|
||
7FFD34BC0000
|
trusted library allocation
|
page read and write
|
||
7FFD34910000
|
trusted library allocation
|
page read and write
|
||
24023968000
|
trusted library allocation
|
page read and write
|
||
7FFD34988000
|
trusted library allocation
|
page read and write
|
||
22BC8080000
|
trusted library allocation
|
page read and write
|
||
1BC3E000
|
stack
|
page read and write
|
||
6C0A70E000
|
stack
|
page read and write
|
||
7FFD34962000
|
trusted library allocation
|
page read and write
|
||
18C66656000
|
heap
|
page execute and read and write
|
||
18C4F4C5000
|
trusted library allocation
|
page read and write
|
||
2403A11E000
|
heap
|
page read and write
|
||
20DAE321000
|
heap
|
page read and write
|
||
20DAE2F0000
|
trusted library section
|
page read and write
|
||
4186513000
|
stack
|
page read and write
|
||
7FFD34866000
|
trusted library allocation
|
page execute and read and write
|
||
240200B2000
|
heap
|
page read and write
|
||
7FFD34AA3000
|
trusted library allocation
|
page read and write
|
||
7FFD34A40000
|
trusted library allocation
|
page read and write
|
||
24022AFA000
|
trusted library allocation
|
page read and write
|
||
22BDF0CD000
|
heap
|
page read and write
|
||
7FFD34AB0000
|
trusted library allocation
|
page read and write
|
||
D88ADFC000
|
stack
|
page read and write
|
||
7FFD3494A000
|
trusted library allocation
|
page read and write
|
||
22BD6BD8000
|
trusted library allocation
|
page read and write
|
||
18C4FA8E000
|
trusted library allocation
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
C6E53BF000
|
stack
|
page read and write
|
||
7FFD34BF0000
|
trusted library allocation
|
page read and write
|
||
E26000
|
heap
|
page read and write
|
||
20DAFCB1000
|
trusted library allocation
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page execute and read and write
|
||
18C4F503000
|
trusted library allocation
|
page read and write
|
||
D2717FE000
|
stack
|
page read and write
|
||
C6E52BA000
|
stack
|
page read and write
|
||
18C4C8A0000
|
heap
|
page read and write
|
||
7FFD34AC9000
|
trusted library allocation
|
page read and write
|
||
7FFD34856000
|
trusted library allocation
|
page execute and read and write
|
||
20DB0BEE000
|
trusted library allocation
|
page read and write
|
||
7FFD3478D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
225E3030000
|
heap
|
page read and write
|
||
24021AD0000
|
trusted library allocation
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
18C4FF40000
|
trusted library allocation
|
page read and write
|
||
23A5F1A5000
|
heap
|
page read and write
|
||
7FFD34BF6000
|
trusted library allocation
|
page read and write
|
||
6C099BE000
|
stack
|
page read and write
|
||
D88A8FE000
|
stack
|
page read and write
|
||
23A60A20000
|
trusted library allocation
|
page read and write
|
||
7FFD347AB000
|
trusted library allocation
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
7FFD34B00000
|
trusted library allocation
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page read and write
|
||
C13BABE000
|
stack
|
page read and write
|
||
C6E4EF9000
|
stack
|
page read and write
|
||
22F3E56A000
|
heap
|
page read and write
|
||
225E33AA000
|
heap
|
page read and write
|
||
225E2EA0000
|
heap
|
page read and write
|
||
6C0967F000
|
stack
|
page read and write
|
||
7FFD34B60000
|
trusted library allocation
|
page read and write
|
||
225C8FCA000
|
heap
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
23A6259C000
|
trusted library allocation
|
page read and write
|
||
1FF81931000
|
trusted library allocation
|
page read and write
|
||
1FF99FB6000
|
heap
|
page read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
24022C7D000
|
trusted library allocation
|
page read and write
|
||
1B948000
|
heap
|
page read and write
|
||
18C5E446000
|
trusted library allocation
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page execute and read and write
|
||
2403A4C3000
|
heap
|
page read and write
|
||
18C66906000
|
heap
|
page read and write
|
||
22BC4BD0000
|
trusted library allocation
|
page read and write
|
||
C6E4FF7000
|
stack
|
page read and write
|
||
24022D68000
|
trusted library allocation
|
page read and write
|
||
7FFD347CC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34B80000
|
trusted library allocation
|
page read and write
|
||
7FFD34972000
|
trusted library allocation
|
page read and write
|
||
7FFD34A80000
|
trusted library allocation
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34AE8000
|
trusted library allocation
|
page read and write
|
||
1FF99CBA000
|
heap
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34A30000
|
trusted library allocation
|
page read and write
|
||
7FFD34982000
|
trusted library allocation
|
page read and write
|
||
7FFD34AE5000
|
trusted library allocation
|
page read and write
|
||
1BC9D7F000
|
stack
|
page read and write
|
||
22F3E160000
|
heap
|
page read and write
|
||
1FFFFA47000
|
heap
|
page read and write
|
||
7FFD34920000
|
trusted library allocation
|
page read and write
|
||
225CC203000
|
trusted library allocation
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
225CC776000
|
trusted library allocation
|
page read and write
|
||
C6E5F89000
|
stack
|
page read and write
|
||
2403A0BF000
|
heap
|
page read and write
|
||
24022B0B000
|
trusted library allocation
|
page read and write
|
||
18C4C580000
|
heap
|
page read and write
|
||
7FFD34BA0000
|
trusted library allocation
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page execute and read and write
|
||
22F27483000
|
trusted library allocation
|
page read and write
|
||
20DAFBE0000
|
heap
|
page execute and read and write
|
||
18C4C750000
|
heap
|
page read and write
|
||
7FFD34A9F000
|
trusted library allocation
|
page read and write
|
||
1FF91961000
|
trusted library allocation
|
page read and write
|
||
4186CF9000
|
stack
|
page read and write
|
||
225C90E0000
|
trusted library allocation
|
page read and write
|
||
22BC4C55000
|
heap
|
page read and write
|
||
20DAE3C9000
|
heap
|
page read and write
|
||
22F3DD0F000
|
heap
|
page read and write
|
||
23A5EFD9000
|
heap
|
page read and write
|
||
24031B91000
|
trusted library allocation
|
page read and write
|
||
23A61BCF000
|
trusted library allocation
|
page read and write
|
||
225CAB99000
|
trusted library allocation
|
page read and write
|
||
8146C07000
|
stack
|
page read and write
|
||
20DAE170000
|
heap
|
page read and write
|
||
7FFD34BB0000
|
trusted library allocation
|
page execute and read and write
|
||
1FF82BDB000
|
trusted library allocation
|
page read and write
|
||
2402341B000
|
trusted library allocation
|
page read and write
|
||
18C4F3E7000
|
trusted library allocation
|
page read and write
|
||
225E32B1000
|
heap
|
page read and write
|
||
23A5EFDB000
|
heap
|
page read and write
|
||
20DB0C3C000
|
trusted library allocation
|
page read and write
|
||
C6E543C000
|
stack
|
page read and write
|
||
225E2E90000
|
heap
|
page execute and read and write
|
||
23A5EF98000
|
heap
|
page read and write
|
||
23A61A41000
|
trusted library allocation
|
page read and write
|
||
7FFD347AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3478D000
|
trusted library allocation
|
page execute and read and write
|
||
23A61BBA000
|
trusted library allocation
|
page read and write
|
||
C6E50F9000
|
stack
|
page read and write
|
||
2403A489000
|
heap
|
page read and write
|
||
418794C000
|
stack
|
page read and write
|
||
D2724C9000
|
stack
|
page read and write
|
||
18C669CA000
|
heap
|
page read and write
|
||
C6E608E000
|
stack
|
page read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page read and write
|
||
7FFD34AB3000
|
trusted library allocation
|
page read and write
|
||
1FF99FAE000
|
heap
|
page read and write
|
||
7FFD34A30000
|
trusted library allocation
|
page read and write
|
||
22F24425000
|
heap
|
page read and write
|
||
225CAE3D000
|
trusted library allocation
|
page read and write
|
||
7FFD34A30000
|
trusted library allocation
|
page read and write
|
||
7FFD34B90000
|
trusted library allocation
|
page read and write
|
||
22BC4C9C000
|
heap
|
page read and write
|
||
18C6674B000
|
heap
|
page read and write
|
||
225CBB43000
|
trusted library allocation
|
page read and write
|
||
22F3E650000
|
heap
|
page read and write
|
||
225E2F87000
|
heap
|
page read and write
|
||
22F3603C000
|
trusted library allocation
|
page read and write
|
||
20DAE35D000
|
heap
|
page read and write
|
||
18C4E60D000
|
trusted library allocation
|
page read and write
|
||
1FF91C26000
|
trusted library allocation
|
page read and write
|
||
7FFD34773000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34AB0000
|
trusted library allocation
|
page read and write
|
||
24022F51000
|
trusted library allocation
|
page read and write
|
||
22BDECA6000
|
heap
|
page execute and read and write
|
||
D88B7CF000
|
stack
|
page read and write
|
||
7FFD34AE0000
|
trusted library allocation
|
page read and write
|
||
7DF451C10000
|
trusted library allocation
|
page execute and read and write
|
||
24031BFD000
|
trusted library allocation
|
page read and write
|
||
C6E4E7E000
|
stack
|
page read and write
|
||
6C0A78D000
|
stack
|
page read and write
|
||
22BC7A32000
|
trusted library allocation
|
page read and write
|
||
7FFD34792000
|
trusted library allocation
|
page read and write
|
||
225C8F80000
|
heap
|
page read and write
|
||
20DAE34F000
|
heap
|
page read and write
|
||
24020070000
|
heap
|
page read and write
|
||
225C90F0000
|
heap
|
page execute and read and write
|
||
2401FFE0000
|
heap
|
page read and write
|
||
22BC4C51000
|
heap
|
page read and write
|
||
1FF99E56000
|
heap
|
page execute and read and write
|
||
22BC4B70000
|
heap
|
page read and write
|
||
22BDECA0000
|
heap
|
page execute and read and write
|
||
23A61BBE000
|
trusted library allocation
|
page read and write
|
||
7FFD34B20000
|
trusted library allocation
|
page read and write
|
||
22BC78EA000
|
trusted library allocation
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
D88A673000
|
stack
|
page read and write
|
||
23A62584000
|
trusted library allocation
|
page read and write
|
||
225CB8D6000
|
trusted library allocation
|
page read and write
|
||
22F2703C000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
trusted library allocation
|
page read and write
|
||
225C8FC4000
|
heap
|
page read and write
|
||
C6E54BE000
|
stack
|
page read and write
|
||
22BDF0D8000
|
heap
|
page read and write
|
||
22BC787D000
|
trusted library allocation
|
page read and write
|
||
225CC2C4000
|
trusted library allocation
|
page read and write
|
||
7FFD34A30000
|
trusted library allocation
|
page read and write
|
||
20DAE399000
|
heap
|
page read and write
|
||
6C09979000
|
stack
|
page read and write
|
||
22BC4C18000
|
heap
|
page read and write
|
||
C13BBBF000
|
stack
|
page read and write
|
||
18C5E141000
|
trusted library allocation
|
page read and write
|
||
7FFD347DC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34AD4000
|
trusted library allocation
|
page read and write
|
||
7DF462CD0000
|
trusted library allocation
|
page execute and read and write
|
||
225E3291000
|
heap
|
page read and write
|
||
22BDEF6F000
|
heap
|
page read and write
|
||
7FFD34774000
|
trusted library allocation
|
page read and write
|
||
8145BF9000
|
stack
|
page read and write
|
||
225C91A0000
|
heap
|
page read and write
|
||
18C4F448000
|
trusted library allocation
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
18C4C5C6000
|
heap
|
page read and write
|
||
7FFD34BF0000
|
trusted library allocation
|
page read and write
|
||
1FF82C3C000
|
trusted library allocation
|
page read and write
|
||
20DB0888000
|
trusted library allocation
|
page read and write
|
||
240200F3000
|
heap
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page execute and read and write
|
||
22F2421B000
|
heap
|
page read and write
|
||
7FFD34A80000
|
trusted library allocation
|
page read and write
|
||
225E32EE000
|
heap
|
page read and write
|
||
6C09A38000
|
stack
|
page read and write
|
||
225CBA29000
|
trusted library allocation
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
18C66600000
|
heap
|
page execute and read and write
|
||
22BC7F11000
|
trusted library allocation
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page execute and read and write
|
||
8145DB6000
|
stack
|
page read and write
|
||
18C4F354000
|
trusted library allocation
|
page read and write
|
||
22BC4A30000
|
heap
|
page read and write
|
||
22F27568000
|
trusted library allocation
|
page read and write
|
||
7FFD34AF5000
|
trusted library allocation
|
page read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
D88A77E000
|
stack
|
page read and write
|
||
7FFD34AE8000
|
trusted library allocation
|
page read and write
|
||
7FFD3495A000
|
trusted library allocation
|
page read and write
|
||
24022B06000
|
trusted library allocation
|
page read and write
|
||
7FFD34AE2000
|
trusted library allocation
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
18C4C865000
|
heap
|
page read and write
|
||
D2714F7000
|
stack
|
page read and write
|
||
1BCB08C000
|
stack
|
page read and write
|
||
22BC737A000
|
trusted library allocation
|
page read and write
|
||
7FFD3478D000
|
trusted library allocation
|
page execute and read and write
|
||
22F361A2000
|
trusted library allocation
|
page read and write
|
||
6C09B3A000
|
stack
|
page read and write
|
||
1FF828B4000
|
trusted library allocation
|
page read and write
|
||
7FFD34793000
|
trusted library allocation
|
page execute and read and write
|
||
8146D0E000
|
stack
|
page read and write
|
||
225E3261000
|
heap
|
page read and write
|
||
225CC19D000
|
trusted library allocation
|
page read and write
|
||
1BCAF0E000
|
stack
|
page read and write
|
||
24031E7B000
|
trusted library allocation
|
page read and write
|
||
7FFD34836000
|
trusted library allocation
|
page read and write
|
||
23A61BC3000
|
trusted library allocation
|
page read and write
|
||
2403A572000
|
heap
|
page read and write
|
||
22BC80DF000
|
trusted library allocation
|
page read and write
|
||
1FF99F78000
|
heap
|
page read and write
|
||
23A609F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
7FFD3479D000
|
trusted library allocation
|
page execute and read and write
|
||
22F2422B000
|
heap
|
page read and write
|
||
22BC76FC000
|
trusted library allocation
|
page read and write
|
||
20DB0CFA000
|
trusted library allocation
|
page read and write
|
||
8145D3E000
|
stack
|
page read and write
|
||
22F3E579000
|
heap
|
page read and write
|
||
1FFFF8F0000
|
heap
|
page read and write
|
||
18C4C605000
|
heap
|
page read and write
|
||
22F3E483000
|
heap
|
page read and write
|
||
7FFD34B82000
|
trusted library allocation
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
7FFD34AF2000
|
trusted library allocation
|
page read and write
|
||
225C9100000
|
heap
|
page readonly
|
||
22BC7395000
|
trusted library allocation
|
page read and write
|
||
22BD67C4000
|
trusted library allocation
|
page read and write
|
||
1FF826AA000
|
trusted library allocation
|
page read and write
|
||
22F35FEB000
|
trusted library allocation
|
page read and write
|
||
225DACF5000
|
trusted library allocation
|
page read and write
|
||
22BDF094000
|
heap
|
page read and write
|
||
1BCB007000
|
stack
|
page read and write
|
||
225E3289000
|
heap
|
page read and write
|
||
7FFD34A80000
|
trusted library allocation
|
page read and write
|
||
18C4ED77000
|
trusted library allocation
|
page read and write
|
||
225C9110000
|
trusted library allocation
|
page read and write
|
||
18C4C810000
|
trusted library allocation
|
page read and write
|
||
D88BA4C000
|
stack
|
page read and write
|
||
8145CF8000
|
stack
|
page read and write
|
||
1BCAF8E000
|
stack
|
page read and write
|
||
E8F000
|
heap
|
page read and write
|
||
24021B30000
|
heap
|
page execute and read and write
|
||
7FFD3479B000
|
trusted library allocation
|
page read and write
|
||
22BC4C1F000
|
heap
|
page read and write
|
||
24031E85000
|
trusted library allocation
|
page read and write
|
||
225CB8DA000
|
trusted library allocation
|
page read and write
|
||
225C9006000
|
heap
|
page read and write
|
||
18C4C790000
|
heap
|
page read and write
|
||
7FFD34783000
|
trusted library allocation
|
page execute and read and write
|
||
23A60B00000
|
heap
|
page read and write
|
||
22F3E4C2000
|
heap
|
page read and write
|
||
20DAE2E0000
|
trusted library section
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
18C4FF65000
|
trusted library allocation
|
page read and write
|
||
7FFD34B90000
|
trusted library allocation
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
7FFD34856000
|
trusted library allocation
|
page execute and read and write
|
||
18C4C60A000
|
heap
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34BC0000
|
trusted library allocation
|
page read and write
|
||
22F3E54D000
|
heap
|
page read and write
|
||
22BC4C59000
|
heap
|
page read and write
|
||
23A609D0000
|
trusted library allocation
|
page read and write
|
||
22BC4B30000
|
heap
|
page read and write
|
||
2403A54D000
|
heap
|
page read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page read and write
|
||
23A620B6000
|
trusted library allocation
|
page read and write
|
||
7FFD34AEA000
|
trusted library allocation
|
page read and write
|
||
20DAE318000
|
heap
|
page read and write
|
||
20DAE250000
|
heap
|
page read and write
|
||
2CEE000
|
stack
|
page read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
1BD3F000
|
stack
|
page read and write
|
||
7FFD34A30000
|
trusted library allocation
|
page read and write
|
||
18C668F0000
|
heap
|
page read and write
|
||
7FFD34BA0000
|
trusted library allocation
|
page execute and read and write
|
||
23A60A90000
|
heap
|
page execute and read and write
|
||
7FFD3479B000
|
trusted library allocation
|
page read and write
|
||
D27137E000
|
stack
|
page read and write
|
||
D27197B000
|
stack
|
page read and write
|
||
1BCA43C000
|
stack
|
page read and write
|
||
4186DFE000
|
stack
|
page read and write
|
||
2403A58A000
|
heap
|
page read and write
|
||
24022B0F000
|
trusted library allocation
|
page read and write
|
||
7FFD34974000
|
trusted library allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
7FFD34846000
|
trusted library allocation
|
page read and write
|
||
C13C68D000
|
stack
|
page read and write
|
||
23A609B0000
|
trusted library allocation
|
page read and write
|
||
7DF462CC0000
|
trusted library allocation
|
page execute and read and write
|
||
1FF81755000
|
heap
|
page read and write
|
||
7DF4C8440000
|
trusted library allocation
|
page execute and read and write
|
||
23A619D2000
|
trusted library allocation
|
page read and write
|
||
2403A0A0000
|
heap
|
page read and write
|
||
18C4F264000
|
trusted library allocation
|
page read and write
|
||
7FFD34BA0000
|
trusted library allocation
|
page read and write
|
||
22BC85B5000
|
trusted library allocation
|
page read and write
|
||
1FF99E8B000
|
heap
|
page read and write
|
||
D270FFE000
|
stack
|
page read and write
|
||
225CA971000
|
trusted library allocation
|
page read and write
|
||
22F35FED000
|
trusted library allocation
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
7FFD34AD0000
|
trusted library allocation
|
page read and write
|
||
1FF83751000
|
trusted library allocation
|
page read and write
|
||
20DAE300000
|
trusted library allocation
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
24031E95000
|
trusted library allocation
|
page read and write
|
||
4186979000
|
stack
|
page read and write
|
||
1FF828CF000
|
trusted library allocation
|
page read and write
|
||
20DB0880000
|
trusted library allocation
|
page read and write
|
||
7FFD3477D000
|
trusted library allocation
|
page execute and read and write
|
||
22F26D33000
|
trusted library allocation
|
page read and write
|
||
22F35F75000
|
trusted library allocation
|
page read and write
|
||
1FF99C74000
|
heap
|
page read and write
|
||
2403A545000
|
heap
|
page read and write
|
||
225DAC5D000
|
trusted library allocation
|
page read and write
|
||
20DAFD30000
|
trusted library allocation
|
page read and write
|
||
7FFD34AC3000
|
trusted library allocation
|
page read and write
|
||
1BC9C73000
|
stack
|
page read and write
|
||
20DB088D000
|
trusted library allocation
|
page read and write
|
||
1FF99FE0000
|
heap
|
page read and write
|
||
7FFD34BF0000
|
trusted library allocation
|
page read and write
|
||
7FFD34BED000
|
trusted library allocation
|
page read and write
|
||
1FF83732000
|
trusted library allocation
|
page read and write
|
||
1BCA23E000
|
stack
|
page read and write
|
||
C6E533E000
|
stack
|
page read and write
|
||
225CBC0F000
|
trusted library allocation
|
page read and write
|
||
7FFD34BDD000
|
trusted library allocation
|
page read and write
|
||
7FFD34968000
|
trusted library allocation
|
page read and write
|
||
E95000
|
heap
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34BA0000
|
trusted library allocation
|
page read and write
|
||
4187A47000
|
stack
|
page read and write
|
||
7FFD34BC0000
|
trusted library allocation
|
page read and write
|
||
23A5F019000
|
heap
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
22BC801D000
|
trusted library allocation
|
page read and write
|
||
225C9004000
|
heap
|
page read and write
|
||
22BDEFBA000
|
heap
|
page read and write
|
||
20DB0997000
|
trusted library allocation
|
page read and write
|
||
20DAE295000
|
heap
|
page read and write
|
||
4186BF7000
|
stack
|
page read and write
|
||
22F3E42B000
|
heap
|
page read and write
|
||
7FFD34BA0000
|
trusted library allocation
|
page read and write
|
||
22F27B01000
|
trusted library allocation
|
page read and write
|
||
24020078000
|
heap
|
page read and write
|
||
23A60B05000
|
heap
|
page read and write
|
||
9B2000
|
unkown
|
page readonly
|
||
240239B2000
|
trusted library allocation
|
page read and write
|
||
23A5EFB4000
|
heap
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page read and write
|
||
22F26752000
|
trusted library allocation
|
page read and write
|
||
22F25CF0000
|
heap
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page execute and read and write
|
||
18C4C5DE000
|
heap
|
page read and write
|
||
2403A2E0000
|
trusted library allocation
|
page read and write
|
||
C13C809000
|
stack
|
page read and write
|
||
1FF81610000
|
heap
|
page readonly
|
||
8145B7F000
|
stack
|
page read and write
|
||
1BCA136000
|
stack
|
page read and write
|
||
1FF82B0F000
|
trusted library allocation
|
page read and write
|
||
22BC4E25000
|
heap
|
page read and write
|
||
E4A000
|
heap
|
page read and write
|
||
1FF81900000
|
heap
|
page execute and read and write
|
||
7FFD3494A000
|
trusted library allocation
|
page read and write
|
||
1B27C000
|
stack
|
page read and write
|
||
225CC796000
|
trusted library allocation
|
page read and write
|
||
22BC7700000
|
trusted library allocation
|
page read and write
|
||
22F3E47B000
|
heap
|
page read and write
|
||
1BCA33E000
|
stack
|
page read and write
|
||
7FFD34A70000
|
trusted library allocation
|
page read and write
|
||
7FFD34782000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34B0C000
|
trusted library allocation
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
7FFD34B00000
|
trusted library allocation
|
page read and write
|
||
1FF99FBA000
|
heap
|
page read and write
|
||
7FFD34BD0000
|
trusted library allocation
|
page read and write
|
||
18C66780000
|
heap
|
page read and write
|
||
1BCB18E000
|
stack
|
page read and write
|
||
24031E76000
|
trusted library allocation
|
page read and write
|
||
7FFD34AF0000
|
trusted library allocation
|
page read and write
|
||
2403A47D000
|
heap
|
page read and write
|
||
7FFD34B08000
|
trusted library allocation
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page execute and read and write
|
||
24022AF6000
|
trusted library allocation
|
page read and write
|
||
240225E2000
|
trusted library allocation
|
page read and write
|
||
7FFD34A50000
|
trusted library allocation
|
page read and write
|
||
225C8F88000
|
heap
|
page read and write
|
||
4186E7F000
|
stack
|
page read and write
|
||
7FFD34AF4000
|
trusted library allocation
|
page read and write
|
||
D88A7F9000
|
stack
|
page read and write
|
||
23A60970000
|
heap
|
page read and write
|
||
23A61C89000
|
trusted library allocation
|
page read and write
|
||
7FFD34B90000
|
trusted library allocation
|
page read and write
|
||
22F27B21000
|
trusted library allocation
|
page read and write
|
||
18C5E428000
|
trusted library allocation
|
page read and write
|
||
18C4C607000
|
heap
|
page read and write
|
||
22F3E49B000
|
heap
|
page read and write
|
||
22BD6B00000
|
trusted library allocation
|
page read and write
|
||
22F36005000
|
trusted library allocation
|
page read and write
|
||
22BD67B1000
|
trusted library allocation
|
page read and write
|
||
22F24213000
|
heap
|
page read and write
|
||
4186AFE000
|
stack
|
page read and write
|
||
7FFD34A90000
|
trusted library allocation
|
page read and write
|
||
7FFD34B70000
|
trusted library allocation
|
page read and write
|
||
C6E4B4E000
|
stack
|
page read and write
|
||
7FFD34BE0000
|
trusted library allocation
|
page read and write
|
||
7FFD34B90000
|
trusted library allocation
|
page read and write
|
||
7FFD34974000
|
trusted library allocation
|
page read and write
|
||
225C8FBD000
|
heap
|
page read and write
|
||
1BC9DFF000
|
stack
|
page read and write
|
||
1FF99E86000
|
heap
|
page read and write
|
||
225E3140000
|
trusted library allocation
|
page read and write
|
||
22BD6A3E000
|
trusted library allocation
|
page read and write
|
||
22BD6A96000
|
trusted library allocation
|
page read and write
|
||
1FFFF98D000
|
heap
|
page read and write
|
||
225E3240000
|
heap
|
page read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page read and write
|
||
7FFD34C00000
|
trusted library allocation
|
page read and write
|
||
E62000
|
heap
|
page read and write
|
||
C6E553B000
|
stack
|
page read and write
|
||
6C093DE000
|
stack
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34972000
|
trusted library allocation
|
page read and write
|
||
225CB8DF000
|
trusted library allocation
|
page read and write
|
||
D88B8CE000
|
stack
|
page read and write
|
||
C6E4BCF000
|
stack
|
page read and write
|
||
22BDF00A000
|
heap
|
page read and write
|
||
1195000
|
heap
|
page read and write
|
||
23A5EFCA000
|
heap
|
page read and write
|
||
7FFD34BD0000
|
trusted library allocation
|
page read and write
|
||
2403A46A000
|
heap
|
page read and write
|
||
1FF91940000
|
trusted library allocation
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
225E339E000
|
heap
|
page read and write
|
||
20DAE396000
|
heap
|
page read and write
|
||
23A60A60000
|
trusted library allocation
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
D88B94B000
|
stack
|
page read and write
|
||
1FF81920000
|
heap
|
page execute and read and write
|
||
22BC4C71000
|
heap
|
page read and write
|
||
18C66A3E000
|
heap
|
page read and write
|
||
C13B473000
|
stack
|
page read and write
|
||
18C66981000
|
heap
|
page read and write
|
||
22F25C00000
|
trusted library allocation
|
page read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
1B83D000
|
stack
|
page read and write
|
||
1FF81620000
|
trusted library allocation
|
page read and write
|
||
18C4F0A0000
|
trusted library allocation
|
page read and write
|
||
7FFD34BB0000
|
trusted library allocation
|
page read and write
|
||
6C09D3B000
|
stack
|
page read and write
|
||
7FFD34AF2000
|
trusted library allocation
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
225C91B0000
|
heap
|
page read and write
|
||
23A620AD000
|
trusted library allocation
|
page read and write
|
||
18C4C7D0000
|
trusted library allocation
|
page read and write
|
||
225E3347000
|
heap
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
22BDF0B1000
|
heap
|
page read and write
|
||
6C09779000
|
stack
|
page read and write
|
||
7FFD34AC0000
|
trusted library allocation
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
225E338B000
|
heap
|
page read and write
|
||
6C09BBE000
|
stack
|
page read and write
|
||
23A5F1A0000
|
heap
|
page read and write
|
||
22BC4BB0000
|
trusted library allocation
|
page read and write
|
||
22BD6BA2000
|
trusted library allocation
|
page read and write
|
||
22F26DC2000
|
trusted library allocation
|
page read and write
|
||
12CF1000
|
trusted library allocation
|
page read and write
|
||
24021B85000
|
heap
|
page read and write
|
||
7FFD348B5000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347EC000
|
trusted library allocation
|
page execute and read and write
|
||
2403A5A0000
|
heap
|
page read and write
|
||
18C4C560000
|
heap
|
page read and write
|
||
4187B4E000
|
stack
|
page read and write
|
||
225CBD2B000
|
trusted library allocation
|
page read and write
|
||
18C4E141000
|
trusted library allocation
|
page read and write
|
||
7FFD347EC000
|
trusted library allocation
|
page execute and read and write
|
||
12CF3000
|
trusted library allocation
|
page read and write
|
||
225C90C0000
|
trusted library allocation
|
page read and write
|
||
7FFD34BE7000
|
trusted library allocation
|
page read and write
|
||
7FFD34AE0000
|
trusted library allocation
|
page read and write
|
||
225E33AE000
|
heap
|
page read and write
|
||
23A61A15000
|
trusted library allocation
|
page read and write
|
||
1BF3E000
|
stack
|
page read and write
|
||
7FFD34AFA000
|
trusted library allocation
|
page read and write
|
||
7FFD34AC0000
|
trusted library allocation
|
page read and write
|
||
7FFD34B8C000
|
trusted library allocation
|
page read and write
|
||
1FFFFC75000
|
heap
|
page read and write
|
||
23A60B11000
|
heap
|
page read and write
|
||
22BDEB13000
|
heap
|
page read and write
|
||
1FF81640000
|
trusted library allocation
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
22F26F14000
|
trusted library allocation
|
page read and write
|
||
22BDEAD0000
|
heap
|
page read and write
|
||
18C4E0C0000
|
heap
|
page execute and read and write
|
||
6C098FD000
|
stack
|
page read and write
|
||
22F242D0000
|
heap
|
page read and write
|
||
7FFD34AD0000
|
trusted library allocation
|
page read and write
|
||
23A5EFED000
|
heap
|
page read and write
|
||
225DA9DF000
|
trusted library allocation
|
page read and write
|
||
225CB9A2000
|
trusted library allocation
|
page read and write
|
||
7FFD34846000
|
trusted library allocation
|
page read and write
|
||
2403A0D9000
|
heap
|
page read and write
|
||
1BCAE8C000
|
stack
|
page read and write
|
||
22BC4E10000
|
heap
|
page execute and read and write
|
||
20DB0F12000
|
trusted library allocation
|
page read and write
|
||
18C4E080000
|
trusted library allocation
|
page read and write
|
||
7FFD34AF0000
|
trusted library allocation
|
page read and write
|
||
7FFD34AB0000
|
trusted library allocation
|
page read and write
|
||
7FFD34931000
|
trusted library allocation
|
page read and write
|
||
1FF8176E000
|
heap
|
page read and write
|
||
7FFD347DC000
|
trusted library allocation
|
page execute and read and write
|
||
1FF9A0F9000
|
heap
|
page read and write
|
||
22BC6791000
|
trusted library allocation
|
page read and write
|
||
20DB0C98000
|
trusted library allocation
|
page read and write
|
||
1FFFF958000
|
heap
|
page read and write
|
||
2403A0F1000
|
heap
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
7FFD34A9F000
|
trusted library allocation
|
page read and write
|
||
7FFD34B10000
|
trusted library allocation
|
page read and write
|
||
7FFD34C08000
|
trusted library allocation
|
page read and write
|
||
22BC69BA000
|
trusted library allocation
|
page read and write
|
||
814613B000
|
stack
|
page read and write
|
||
7FFD34B00000
|
trusted library allocation
|
page read and write
|
||
20DAFBD0000
|
heap
|
page readonly
|
||
18C6669D000
|
heap
|
page read and write
|
||
24021B80000
|
heap
|
page read and write
|
||
7FFD34AC0000
|
trusted library allocation
|
page read and write
|
||
6C0A80A000
|
stack
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
C13B679000
|
stack
|
page read and write
|
||
C6E51B6000
|
stack
|
page read and write
|
||
1FF81670000
|
trusted library allocation
|
page read and write
|
||
18C4E369000
|
trusted library allocation
|
page read and write
|
||
7FFD34C00000
|
trusted library allocation
|
page read and write
|
||
240200AC000
|
heap
|
page read and write
|
||
7FFD34A20000
|
trusted library allocation
|
page read and write
|
||
20DB0BE5000
|
trusted library allocation
|
page read and write
|
||
225E2F46000
|
heap
|
page read and write
|
||
18C5E1AF000
|
trusted library allocation
|
page read and write
|
||
225DA991000
|
trusted library allocation
|
page read and write
|
||
6C096FE000
|
stack
|
page read and write
|
||
225E2ED4000
|
heap
|
page read and write
|
||
7FFD34978000
|
trusted library allocation
|
page read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
8145C7D000
|
stack
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page execute and read and write
|
||
22F26D6B000
|
trusted library allocation
|
page read and write
|
||
7FFD34AB3000
|
trusted library allocation
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page execute and read and write
|
||
1FF8370C000
|
trusted library allocation
|
page read and write
|
||
1FF99F60000
|
heap
|
page read and write
|
||
20DAE270000
|
heap
|
page read and write
|
||
C13C88C000
|
stack
|
page read and write
|
||
1B690000
|
heap
|
page execute and read and write
|
||
18C4C550000
|
heap
|
page read and write
|
||
18C4F174000
|
trusted library allocation
|
page read and write
|
||
2403A440000
|
heap
|
page read and write
|
||
1FF819AA000
|
trusted library allocation
|
page read and write
|
||
225CB8E3000
|
trusted library allocation
|
page read and write
|
||
23A6257F000
|
trusted library allocation
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
225CC79B000
|
trusted library allocation
|
page read and write
|
||
1FF9A0BA000
|
heap
|
page read and write
|
||
22F35D21000
|
trusted library allocation
|
page read and write
|
||
24021B60000
|
heap
|
page execute and read and write
|
||
7FFD34922000
|
trusted library allocation
|
page read and write
|
||
22BC65DA000
|
heap
|
page read and write
|
||
2403A430000
|
heap
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34A40000
|
trusted library allocation
|
page read and write
|
||
7FFD34C00000
|
trusted library allocation
|
page read and write
|
||
7FFD34A50000
|
trusted library allocation
|
page read and write
|
||
7FFD34A20000
|
trusted library allocation
|
page read and write
|
||
1FF9A085000
|
heap
|
page read and write
|
||
7FFD34A40000
|
trusted library allocation
|
page read and write
|
||
225CB57D000
|
trusted library allocation
|
page read and write
|
||
22BC4D10000
|
trusted library allocation
|
page read and write
|
||
225CBA8C000
|
trusted library allocation
|
page read and write
|
||
C13B9B9000
|
stack
|
page read and write
|
||
7FFD3493A000
|
trusted library allocation
|
page read and write
|
||
225DAC65000
|
trusted library allocation
|
page read and write
|
||
41865DE000
|
stack
|
page read and write
|
||
69F000
|
unkown
|
page readonly
|
||
7FFD34A70000
|
trusted library allocation
|
page read and write
|
||
22F3E1B1000
|
heap
|
page read and write
|
||
1FF830B3000
|
trusted library allocation
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
23A5EFD3000
|
heap
|
page read and write
|
||
1FFFF9DA000
|
heap
|
page read and write
|
||
225DAC76000
|
trusted library allocation
|
page read and write
|
||
7DF430590000
|
trusted library allocation
|
page execute and read and write
|
||
D27157D000
|
stack
|
page read and write
|
||
814603C000
|
stack
|
page read and write
|
||
22F261CD000
|
trusted library allocation
|
page read and write
|
||
7FFD34BE0000
|
trusted library allocation
|
page read and write
|
||
22BC6780000
|
heap
|
page read and write
|
||
22F2420B000
|
heap
|
page read and write
|
||
23A5F180000
|
heap
|
page read and write
|
||
7FFD34B8E000
|
trusted library allocation
|
page read and write
|
||
22F3E4EE000
|
heap
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
20DB0FF7000
|
trusted library allocation
|
page read and write
|
||
8145E39000
|
stack
|
page read and write
|
||
22BD6A78000
|
trusted library allocation
|
page read and write
|
||
1FF99FAA000
|
heap
|
page read and write
|
||
22F3E310000
|
heap
|
page read and write
|
||
7FFD34BE0000
|
trusted library allocation
|
page read and write
|
||
1FF99E80000
|
heap
|
page read and write
|
||
1BC9F7B000
|
stack
|
page read and write
|
||
22BD6972000
|
trusted library allocation
|
page read and write
|
||
18C4ED3F000
|
trusted library allocation
|
page read and write
|
||
225E2E70000
|
heap
|
page execute and read and write
|
||
18C5E42C000
|
trusted library allocation
|
page read and write
|
||
225E331E000
|
heap
|
page read and write
|
||
D27234E000
|
stack
|
page read and write
|
||
24022CEC000
|
trusted library allocation
|
page read and write
|
||
20DB10DF000
|
trusted library allocation
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
D88BACE000
|
stack
|
page read and write
|
||
18C5E171000
|
trusted library allocation
|
page read and write
|
||
6C097FE000
|
stack
|
page read and write
|
||
225E3010000
|
heap
|
page read and write
|
||
20DB0C07000
|
trusted library allocation
|
page read and write
|
||
22F24330000
|
heap
|
page read and write
|
||
22BDF0D1000
|
heap
|
page read and write
|
||
7FFD34A80000
|
trusted library allocation
|
page read and write
|
||
7FFD34A20000
|
trusted library allocation
|
page read and write
|
||
22F24380000
|
heap
|
page readonly
|
||
22F2758F000
|
trusted library allocation
|
page read and write
|
||
7FFD34A90000
|
trusted library allocation
|
page read and write
|
||
C13BB3F000
|
stack
|
page read and write
|
||
240239AD000
|
trusted library allocation
|
page read and write
|
||
1FF82381000
|
trusted library allocation
|
page read and write
|
||
7FFD3484C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34B00000
|
trusted library allocation
|
page read and write
|
||
1FF99D25000
|
heap
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
7DF451C00000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34B70000
|
trusted library allocation
|
page read and write
|
||
7FFD34AD4000
|
trusted library allocation
|
page read and write
|
||
7FFD34BE0000
|
trusted library allocation
|
page read and write
|
||
7FFD34A40000
|
trusted library allocation
|
page read and write
|
||
20DB0C8F000
|
trusted library allocation
|
page read and write
|
||
22F241A0000
|
heap
|
page read and write
|
||
7FFD34ADC000
|
trusted library allocation
|
page read and write
|
||
4186A79000
|
stack
|
page read and write
|
||
22BC784B000
|
trusted library allocation
|
page read and write
|
||
D27147E000
|
stack
|
page read and write
|
||
7FFD347CC000
|
trusted library allocation
|
page execute and read and write
|
||
1FFFF99D000
|
heap
|
page read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page execute and read and write
|
||
22BC4C98000
|
heap
|
page read and write
|
||
23A60D07000
|
trusted library allocation
|
page read and write
|
||
225C91C0000
|
heap
|
page read and write
|
||
7FFD34B80000
|
trusted library allocation
|
page read and write
|
||
18C4C588000
|
heap
|
page read and write
|
||
6C09C3E000
|
stack
|
page read and write
|
||
1FF81DFD000
|
trusted library allocation
|
page read and write
|
||
22F26D07000
|
trusted library allocation
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
2403A1C0000
|
heap
|
page read and write
|
||
2403A18A000
|
heap
|
page read and write
|
||
D88A9FD000
|
stack
|
page read and write
|
||
18C66650000
|
heap
|
page execute and read and write
|
||
D2723CC000
|
stack
|
page read and write
|
||
23A5EFCF000
|
heap
|
page read and write
|
||
22F3E19F000
|
heap
|
page read and write
|
||
225C9180000
|
trusted library allocation
|
page read and write
|
||
10EE000
|
stack
|
page read and write
|
||
7FFD34B02000
|
trusted library allocation
|
page read and write
|
||
22F25F29000
|
trusted library allocation
|
page read and write
|
||
22F243E0000
|
heap
|
page execute and read and write
|
||
1FF99E94000
|
heap
|
page read and write
|
||
1FF91C37000
|
trusted library allocation
|
page read and write
|
||
E8D000
|
heap
|
page read and write
|
||
C6E5238000
|
stack
|
page read and write
|
||
20DAE34D000
|
heap
|
page read and write
|
||
1B959000
|
heap
|
page read and write
|
||
20DAE32F000
|
heap
|
page read and write
|
||
7FFD34B70000
|
trusted library allocation
|
page read and write
|
||
1FFFF9D5000
|
heap
|
page read and write
|
||
22F26E25000
|
trusted library allocation
|
page read and write
|
||
7FFD34AC0000
|
trusted library allocation
|
page read and write
|
||
18C4F0B5000
|
trusted library allocation
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
22F27B16000
|
trusted library allocation
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
22BDF005000
|
heap
|
page read and write
|
||
22BC739F000
|
trusted library allocation
|
page read and write
|
||
225C8FDE000
|
heap
|
page read and write
|
||
11B5000
|
heap
|
page read and write
|
||
22F270C3000
|
trusted library allocation
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
225E3387000
|
heap
|
page read and write
|
||
1FF99C70000
|
heap
|
page read and write
|
||
23A60C81000
|
trusted library allocation
|
page read and write
|
||
18C5E436000
|
trusted library allocation
|
page read and write
|
||
22BD6A73000
|
trusted library allocation
|
page read and write
|
||
24020425000
|
heap
|
page read and write
|
||
22F25D01000
|
trusted library allocation
|
page read and write
|
||
20DB06DB000
|
trusted library allocation
|
page read and write
|
||
7FFD34AE9000
|
trusted library allocation
|
page read and write
|
||
C6E4F7F000
|
stack
|
page read and write
|
||
7FFD34BFD000
|
trusted library allocation
|
page read and write
|
||
225E2F43000
|
heap
|
page read and write
|
||
7FFD34941000
|
trusted library allocation
|
page read and write
|
||
7FFD34784000
|
trusted library allocation
|
page read and write
|
||
7FFD34A20000
|
trusted library allocation
|
page read and write
|
||
22BC4C00000
|
heap
|
page read and write
|
||
7FFD34A70000
|
trusted library allocation
|
page read and write
|
||
1FFFF995000
|
heap
|
page read and write
|
||
18C4F0AD000
|
trusted library allocation
|
page read and write
|
||
1FF82993000
|
trusted library allocation
|
page read and write
|
||
22BD67FF000
|
trusted library allocation
|
page read and write
|
||
22F3E290000
|
heap
|
page execute and read and write
|
||
22BC77C4000
|
trusted library allocation
|
page read and write
|
||
22BDF06A000
|
heap
|
page read and write
|
||
22F26FA7000
|
trusted library allocation
|
page read and write
|
||
22BC4C10000
|
heap
|
page read and write
|
||
225C9080000
|
heap
|
page read and write
|
||
D27254C000
|
stack
|
page read and write
|
||
2403A598000
|
heap
|
page read and write
|
||
7FFD34AF8000
|
trusted library allocation
|
page read and write
|
||
1FF91C1E000
|
trusted library allocation
|
page read and write
|
||
4186C7A000
|
stack
|
page read and write
|
||
C6E4AC3000
|
stack
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
7FFD34AEC000
|
trusted library allocation
|
page read and write
|
||
41878CE000
|
stack
|
page read and write
|
||
7FFD34941000
|
trusted library allocation
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
24031BB1000
|
trusted library allocation
|
page read and write
|
||
7FFD34AE9000
|
trusted library allocation
|
page read and write
|
||
1FF81630000
|
heap
|
page read and write
|
||
7FFD3484C000
|
trusted library allocation
|
page execute and read and write
|
||
18C4C7B0000
|
trusted library section
|
page read and write
|
||
C13C787000
|
stack
|
page read and write
|
||
22F27650000
|
trusted library allocation
|
page read and write
|
||
41879CE000
|
stack
|
page read and write
|
||
C13B936000
|
stack
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
1FF82A21000
|
trusted library allocation
|
page read and write
|
||
F1C000
|
heap
|
page read and write
|
||
1BCA2BE000
|
stack
|
page read and write
|
||
7FFD34BD0000
|
trusted library allocation
|
page read and write
|
||
1BC9EFE000
|
stack
|
page read and write
|
||
225E33A6000
|
heap
|
page read and write
|
||
7FFD34794000
|
trusted library allocation
|
page read and write
|
||
6C09AB8000
|
stack
|
page read and write
|
||
1FF81600000
|
trusted library allocation
|
page read and write
|
||
41869FF000
|
stack
|
page read and write
|
||
225CB8E7000
|
trusted library allocation
|
page read and write
|
||
225C8FC8000
|
heap
|
page read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
18C666FE000
|
heap
|
page read and write
|
||
22BD6928000
|
trusted library allocation
|
page read and write
|
||
2403A0AA000
|
heap
|
page read and write
|
||
24022AFE000
|
trusted library allocation
|
page read and write
|
||
23A616AD000
|
trusted library allocation
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
240200F8000
|
heap
|
page read and write
|
||
2403A5A4000
|
heap
|
page read and write
|
||
C13C60F000
|
stack
|
page read and write
|
||
2403A1B7000
|
heap
|
page execute and read and write
|
||
18C4E1C7000
|
trusted library allocation
|
page read and write
|
||
7FFD3478B000
|
trusted library allocation
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
7FFD34A20000
|
trusted library allocation
|
page read and write
|
||
18C4C679000
|
heap
|
page read and write
|
||
1FF99CB3000
|
heap
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
7FFD34B00000
|
trusted library allocation
|
page read and write
|
||
1BCA1BA000
|
stack
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
C6E600C000
|
stack
|
page read and write
|
||
7FFD34AF0000
|
trusted library allocation
|
page read and write
|
||
18C4C5CC000
|
heap
|
page read and write
|
||
240233F4000
|
trusted library allocation
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
7FFD34AB0000
|
trusted library allocation
|
page read and write
|
||
225CA9EF000
|
trusted library allocation
|
page read and write
|
||
22F35D01000
|
trusted library allocation
|
page read and write
|
||
225E2F78000
|
heap
|
page read and write
|
||
1FF99D06000
|
heap
|
page read and write
|
||
18C66900000
|
heap
|
page read and write
|
||
24021B91000
|
trusted library allocation
|
page read and write
|
||
22BD6A17000
|
trusted library allocation
|
page read and write
|
||
7DF4305A0000
|
trusted library allocation
|
page execute and read and write
|
||
1B951000
|
heap
|
page read and write
|
||
7DF451BF0000
|
trusted library allocation
|
page execute and read and write
|
||
22BC7513000
|
trusted library allocation
|
page read and write
|
||
8145EBA000
|
stack
|
page read and write
|
||
23A60EA9000
|
trusted library allocation
|
page read and write
|
||
D27187E000
|
stack
|
page read and write
|
||
18C4C7F0000
|
trusted library allocation
|
page read and write
|
||
22F26EDB000
|
trusted library allocation
|
page read and write
|
||
24031BC1000
|
trusted library allocation
|
page read and write
|
||
7FFD34922000
|
trusted library allocation
|
page read and write
|
||
1FF91D95000
|
trusted library allocation
|
page read and write
|
||
23A61BC7000
|
trusted library allocation
|
page read and write
|
||
C13B7FE000
|
stack
|
page read and write
|
||
1FF82A57000
|
trusted library allocation
|
page read and write
|
||
7FFD3482C000
|
trusted library allocation
|
page execute and read and write
|
||
225E32D3000
|
heap
|
page read and write
|
||
7FFD34784000
|
trusted library allocation
|
page read and write
|
||
7DF4C8430000
|
trusted library allocation
|
page execute and read and write
|
||
7DF4BB200000
|
trusted library allocation
|
page execute and read and write
|
||
D88A6FF000
|
stack
|
page read and write
|
||
7FF4E79B0000
|
trusted library allocation
|
page execute and read and write
|
||
1FFFF920000
|
heap
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
7FFD3477D000
|
trusted library allocation
|
page execute and read and write
|
||
1FFFFC70000
|
heap
|
page read and write
|
||
7FFD34962000
|
trusted library allocation
|
page read and write
|
||
1BC9FFD000
|
stack
|
page read and write
|
||
1FF815A0000
|
heap
|
page read and write
|
||
7FFD34B10000
|
trusted library allocation
|
page read and write
|
||
4186D7E000
|
stack
|
page read and write
|
||
225CB56E000
|
trusted library allocation
|
page read and write
|
||
6C09CBE000
|
stack
|
page read and write
|
||
1BE3B000
|
stack
|
page read and write
|
||
2402330F000
|
trusted library allocation
|
page read and write
|
||
814574E000
|
stack
|
page read and write
|
||
1FF82935000
|
trusted library allocation
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
7FFD34B20000
|
trusted library allocation
|
page read and write
|
||
1FF83280000
|
trusted library allocation
|
page read and write
|
||
22BDEF40000
|
heap
|
page read and write
|
||
7FFD34964000
|
trusted library allocation
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page execute and read and write
|
||
1BCB10C000
|
stack
|
page read and write
|
||
7FFD34B20000
|
trusted library allocation
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
24031EFF000
|
trusted library allocation
|
page read and write
|
||
1FF82961000
|
trusted library allocation
|
page read and write
|
||
7FFD34AE4000
|
trusted library allocation
|
page read and write
|
||
20DAFBC0000
|
trusted library allocation
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
1FF815E0000
|
trusted library allocation
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
C13C70A000
|
stack
|
page read and write
|
||
7FFD34BF0000
|
trusted library allocation
|
page read and write
|
||
20DAFC30000
|
trusted library allocation
|
page read and write
|
||
7FFD34A60000
|
trusted library allocation
|
page read and write
|
||
7FFD34BB0000
|
trusted library allocation
|
page read and write
|
||
2403A16E000
|
heap
|
page read and write
|
||
D88AB78000
|
stack
|
page read and write
|
||
22BDEF50000
|
heap
|
page read and write
|
||
1FF99FB2000
|
heap
|
page read and write
|
||
7FFD34A60000
|
trusted library allocation
|
page read and write
|
||
22BC7FF7000
|
trusted library allocation
|
page read and write
|
||
225E33B1000
|
heap
|
page read and write
|
||
7FFD34958000
|
trusted library allocation
|
page read and write
|
||
D88AAF7000
|
stack
|
page read and write
|
||
22F25D86000
|
trusted library allocation
|
page read and write
|
||
7FFD34A50000
|
trusted library allocation
|
page read and write
|
||
240234DC000
|
trusted library allocation
|
page read and write
|
||
7FFD34C10000
|
trusted library allocation
|
page read and write
|
||
22BC4B10000
|
heap
|
page read and write
|
||
24022E95000
|
trusted library allocation
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
7FFD34BB0000
|
trusted library allocation
|
page read and write
|
||
C13C90E000
|
stack
|
page read and write
|
||
22BDEF94000
|
heap
|
page read and write
|
||
C13BC3B000
|
stack
|
page read and write
|
||
20DB0BFA000
|
trusted library allocation
|
page read and write
|
||
22BC76F8000
|
trusted library allocation
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page read and write
|
||
7FFD34931000
|
trusted library allocation
|
page read and write
|
||
D270FB3000
|
stack
|
page read and write
|
||
1FF83159000
|
trusted library allocation
|
page read and write
|
||
2403A450000
|
heap
|
page read and write
|
||
1FF91931000
|
trusted library allocation
|
page read and write
|
||
22F3E473000
|
heap
|
page read and write
|
||
22F3E547000
|
heap
|
page read and write
|
||
7FFD34AFC000
|
trusted library allocation
|
page read and write
|
||
23A5EFCD000
|
heap
|
page read and write
|
||
22F27350000
|
trusted library allocation
|
page read and write
|
||
7FFD34B10000
|
trusted library allocation
|
page read and write
|
||
7FFD34886000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34AD3000
|
trusted library allocation
|
page read and write
|
||
225E33B4000
|
heap
|
page read and write
|
||
7FFD34C0F000
|
trusted library allocation
|
page read and write
|
||
7FFD3493A000
|
trusted library allocation
|
page read and write
|
||
225DA9A1000
|
trusted library allocation
|
page read and write
|
||
D88ACFE000
|
stack
|
page read and write
|
||
7FFD34836000
|
trusted library allocation
|
page read and write
|
||
22F241D0000
|
heap
|
page read and write
|
||
4186B78000
|
stack
|
page read and write
|
||
418687F000
|
stack
|
page read and write
|
||
20DAE290000
|
heap
|
page read and write
|
||
23A61FEC000
|
trusted library allocation
|
page read and write
|
||
81460BE000
|
stack
|
page read and write
|
||
2402205D000
|
trusted library allocation
|
page read and write
|
||
2403A148000
|
heap
|
page read and write
|
||
23A60C70000
|
heap
|
page read and write
|
||
1FF91B74000
|
trusted library allocation
|
page read and write
|
||
24031E7D000
|
trusted library allocation
|
page read and write
|
||
225CC0F7000
|
trusted library allocation
|
page read and write
|
||
23A6204F000
|
trusted library allocation
|
page read and write
|
||
7FFD34772000
|
trusted library allocation
|
page read and write
|
||
22F3E1C1000
|
heap
|
page read and write
|
||
D88A977000
|
stack
|
page read and write
|
||
7FFD34AE0000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
23A5EF80000
|
heap
|
page read and write
|
||
23A61BD8000
|
trusted library allocation
|
page read and write
|
||
22BD6A7C000
|
trusted library allocation
|
page read and write
|
||
225CB8CE000
|
trusted library allocation
|
page read and write
|
||
7FFD34A70000
|
trusted library allocation
|
page read and write
|
||
8146B8D000
|
stack
|
page read and write
|
||
22BC4C5F000
|
heap
|
page read and write
|
||
D88AA79000
|
stack
|
page read and write
|
||
7FFD347BB000
|
trusted library allocation
|
page read and write
|
||
20DAFCA0000
|
heap
|
page read and write
|
||
6C09352000
|
stack
|
page read and write
|
||
4186EFB000
|
stack
|
page read and write
|
||
22F26E29000
|
trusted library allocation
|
page read and write
|
||
D2725CE000
|
stack
|
page read and write
|
||
7FFD34A80000
|
trusted library allocation
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
1FF82536000
|
trusted library allocation
|
page read and write
|
||
7FFD34B10000
|
trusted library allocation
|
page read and write
|
||
7FFD3483C000
|
trusted library allocation
|
page execute and read and write
|
||
20DAE2C0000
|
heap
|
page read and write
|
||
7FFD34921000
|
trusted library allocation
|
page read and write
|
||
18C4EEBB000
|
trusted library allocation
|
page read and write
|
||
22F24350000
|
trusted library allocation
|
page read and write
|
||
7FFD34AFC000
|
trusted library allocation
|
page read and write
|
||
7FFD34876000
|
trusted library allocation
|
page execute and read and write
|
||
20DAFBF0000
|
heap
|
page read and write
|
||
8145AFA000
|
stack
|
page read and write
|
||
1BCA0BE000
|
stack
|
page read and write
|
||
D88ABFD000
|
stack
|
page read and write
|
||
1110000
|
trusted library allocation
|
page read and write
|
||
2403A180000
|
heap
|
page read and write
|
||
225E3380000
|
heap
|
page read and write
|
||
22BDEBD0000
|
heap
|
page execute and read and write
|
||
1FF9A106000
|
heap
|
page read and write
|
||
1FF829EF000
|
trusted library allocation
|
page read and write
|
||
1FF99FA2000
|
heap
|
page read and write
|
||
7FFD34AB0000
|
trusted library allocation
|
page read and write
|
||
9B0000
|
unkown
|
page readonly
|
||
22F27B26000
|
trusted library allocation
|
page read and write
|
||
240200F5000
|
heap
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
24020420000
|
heap
|
page read and write
|
||
22F35FF5000
|
trusted library allocation
|
page read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
C6E507E000
|
stack
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
6C09877000
|
stack
|
page read and write
|
||
24022E34000
|
trusted library allocation
|
page read and write
|
||
1B940000
|
heap
|
page read and write
|
||
22F27ADC000
|
trusted library allocation
|
page read and write
|
||
225CB8F4000
|
trusted library allocation
|
page read and write
|
||
7FFD3482C000
|
trusted library allocation
|
page execute and read and write
|
||
4187ACC000
|
stack
|
page read and write
|
||
225DAC58000
|
trusted library allocation
|
page read and write
|
||
240227CD000
|
trusted library allocation
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
7FFD34BF0000
|
trusted library allocation
|
page read and write
|
||
7FFD34BB0000
|
trusted library allocation
|
page read and write
|
||
7FFD34B80000
|
trusted library allocation
|
page read and write
|
||
22F3E410000
|
heap
|
page read and write
|
||
225E2973000
|
heap
|
page read and write
|
||
22F25CE0000
|
trusted library allocation
|
page read and write
|
||
24022BC0000
|
trusted library allocation
|
page read and write
|
||
22F241D8000
|
heap
|
page read and write
|
||
8146C8C000
|
stack
|
page read and write
|
||
7FFD34A80000
|
trusted library allocation
|
page read and write
|
||
18C4E050000
|
trusted library allocation
|
page read and write
|
||
24021A40000
|
heap
|
page readonly
|
||
22BC4E20000
|
heap
|
page read and write
|
||
22F3E4BC000
|
heap
|
page read and write
|
||
22BD6ACB000
|
trusted library allocation
|
page read and write
|
||
1FF82717000
|
trusted library allocation
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
6C0A889000
|
stack
|
page read and write
|
||
1FFFF99B000
|
heap
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
1FFFF98F000
|
heap
|
page read and write
|
||
1FF9A310000
|
heap
|
page read and write
|
||
1FFFF999000
|
heap
|
page read and write
|
||
7FFD34A50000
|
trusted library allocation
|
page read and write
|
||
22F26AC1000
|
trusted library allocation
|
page read and write
|
||
7FFD34AC4000
|
trusted library allocation
|
page read and write
|
||
D88B84C000
|
stack
|
page read and write
|
||
1FF81750000
|
heap
|
page read and write
|
||
C13B4FE000
|
stack
|
page read and write
|
||
18C4C860000
|
heap
|
page read and write
|
||
7FFD34954000
|
trusted library allocation
|
page read and write
|
||
22F26CCD000
|
trusted library allocation
|
page read and write
|
||
8146B0E000
|
stack
|
page read and write
|
||
23A6185E000
|
trusted library allocation
|
page read and write
|
||
22BC4D40000
|
trusted library allocation
|
page read and write
|
||
418659E000
|
stack
|
page read and write
|
||
18C4FF60000
|
trusted library allocation
|
page read and write
|
||
C6E513E000
|
stack
|
page read and write
|
||
7FFD34A40000
|
trusted library allocation
|
page read and write
|
||
22F3E330000
|
heap
|
page read and write
|
||
240200BA000
|
heap
|
page read and write
|
||
22BC4BE0000
|
heap
|
page readonly
|
||
22F242B1000
|
heap
|
page read and write
|
||
C13B879000
|
stack
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
22F35D31000
|
trusted library allocation
|
page read and write
|
||
22BD6A86000
|
trusted library allocation
|
page read and write
|
||
6C0AA0E000
|
stack
|
page read and write
|
||
12BE000
|
stack
|
page read and write
|
||
20DB0BF2000
|
trusted library allocation
|
page read and write
|
||
1BCA079000
|
stack
|
page read and write
|
||
22F3E1B8000
|
heap
|
page read and write
|
||
81457CE000
|
stack
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
7FFD34AC3000
|
trusted library allocation
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page execute and read and write
|
||
22BC76F3000
|
trusted library allocation
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
22F240C0000
|
heap
|
page read and write
|
||
22F24300000
|
heap
|
page read and write
|
||
225E3397000
|
heap
|
page read and write
|
||
7FFD34BED000
|
trusted library allocation
|
page read and write
|
||
D88A3FE000
|
stack
|
page read and write
|
||
7FFD34932000
|
trusted library allocation
|
page read and write
|
||
41868FE000
|
stack
|
page read and write
|
||
2403A1B0000
|
heap
|
page execute and read and write
|
||
22BC8590000
|
trusted library allocation
|
page read and write
|
||
7FFD34AF0000
|
trusted library allocation
|
page read and write
|
||
C13B77B000
|
stack
|
page read and write
|
||
22F26A7A000
|
trusted library allocation
|
page read and write
|
||
6C0A90D000
|
stack
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
2403A0EF000
|
heap
|
page read and write
|
||
22BC7704000
|
trusted library allocation
|
page read and write
|
||
7FFD34AD8000
|
trusted library allocation
|
page read and write
|
||
7FFD34B00000
|
trusted library allocation
|
page read and write
|
||
1FF82CBB000
|
trusted library allocation
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34876000
|
trusted library allocation
|
page execute and read and write
|
||
18C66910000
|
heap
|
page read and write
|
||
7FFD34BD6000
|
trusted library allocation
|
page read and write
|
||
22F3E236000
|
heap
|
page read and write
|
||
8145A7E000
|
stack
|
page read and write
|
||
225CB8D2000
|
trusted library allocation
|
page read and write
|
||
C13B5FE000
|
stack
|
page read and write
|
||
D2713F9000
|
stack
|
page read and write
|
||
23A5F014000
|
heap
|
page read and write
|
||
225CB3C2000
|
trusted library allocation
|
page read and write
|
||
2402294E000
|
trusted library allocation
|
page read and write
|
||
1FF81B58000
|
trusted library allocation
|
page read and write
|
||
7FFD34952000
|
trusted library allocation
|
page read and write
|
||
18C5E161000
|
trusted library allocation
|
page read and write
|
||
225DA971000
|
trusted library allocation
|
page read and write
|
||
22BD698A000
|
trusted library allocation
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page execute and read and write
|
||
22BC6C5D000
|
trusted library allocation
|
page read and write
|
||
13BE000
|
stack
|
page read and write
|
||
2403A594000
|
heap
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
7FFD34964000
|
trusted library allocation
|
page read and write
|
||
20DAFCA5000
|
heap
|
page read and write
|
||
22F35F24000
|
trusted library allocation
|
page read and write
|
||
225E2F1B000
|
heap
|
page read and write
|
||
23A61852000
|
trusted library allocation
|
page read and write
|
||
24022AF2000
|
trusted library allocation
|
page read and write
|
||
7FFD347A4000
|
trusted library allocation
|
page read and write
|
||
7FFD34B90000
|
trusted library allocation
|
page execute and read and write
|
||
D27244E000
|
stack
|
page read and write
|
||
18C66A6C000
|
heap
|
page read and write
|
||
1FFFF9D7000
|
heap
|
page read and write
|
||
225C8E40000
|
heap
|
page read and write
|
||
D88AD7E000
|
stack
|
page read and write
|
||
7FFD34A60000
|
trusted library allocation
|
page read and write
|
||
18C66A4F000
|
heap
|
page read and write
|
||
1BB3E000
|
stack
|
page read and write
|
||
22F35FE6000
|
trusted library allocation
|
page read and write
|
||
D34000
|
stack
|
page read and write
|
||
22BD6C0F000
|
trusted library allocation
|
page read and write
|
||
18C4F0B1000
|
trusted library allocation
|
page read and write
|
||
18C4F8C1000
|
trusted library allocation
|
page read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page read and write
|
||
1FFFF900000
|
heap
|
page read and write
|
||
7FFD347FC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34AE4000
|
trusted library allocation
|
page read and write
|
||
D2718FF000
|
stack
|
page read and write
|
||
22F24254000
|
heap
|
page read and write
|
||
18C4C5BE000
|
heap
|
page read and write
|
||
225C8FC0000
|
heap
|
page read and write
|
||
7FFD3483C000
|
trusted library allocation
|
page execute and read and write
|
||
20DAE310000
|
heap
|
page read and write
|
||
24022CB2000
|
trusted library allocation
|
page read and write
|
||
7FFD34AD9000
|
trusted library allocation
|
page read and write
|
||
7FFD34984000
|
trusted library allocation
|
page read and write
|
||
2401FFF0000
|
heap
|
page read and write
|
||
22BD6791000
|
trusted library allocation
|
page read and write
|
||
24031F6C000
|
trusted library allocation
|
page read and write
|
||
225C9009000
|
heap
|
page read and write
|
||
7FFD34942000
|
trusted library allocation
|
page read and write
|
||
225C8F40000
|
heap
|
page read and write
|
||
7FFD3479D000
|
trusted library allocation
|
page execute and read and write
|
||
18C669B0000
|
heap
|
page read and write
|
||
23A5EF90000
|
heap
|
page read and write
|
||
7FFD34BC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34783000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34AD9000
|
trusted library allocation
|
page read and write
|
||
D271677000
|
stack
|
page read and write
|
||
23A61BCB000
|
trusted library allocation
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page execute and read and write
|
||
225C91B5000
|
heap
|
page read and write
|
||
225C91C5000
|
heap
|
page read and write
|
||
18C4F0A9000
|
trusted library allocation
|
page read and write
|
||
22F3E297000
|
heap
|
page execute and read and write
|
||
7FFD3492A000
|
trusted library allocation
|
page read and write
|
||
7FFD34932000
|
trusted library allocation
|
page read and write
|
||
22BDEC20000
|
trusted library allocation
|
page read and write
|
||
22F26A71000
|
trusted library allocation
|
page read and write
|
||
20DAFED8000
|
trusted library allocation
|
page read and write
|
||
1FF919A0000
|
trusted library allocation
|
page read and write
|
||
22BC856B000
|
trusted library allocation
|
page read and write
|
||
22BC4C53000
|
heap
|
page read and write
|
||
1FF826A1000
|
trusted library allocation
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
22BC4BF0000
|
trusted library allocation
|
page read and write
|
||
22BD6B35000
|
trusted library allocation
|
page read and write
|
||
225C9140000
|
trusted library allocation
|
page read and write
|
||
22F26D65000
|
trusted library allocation
|
page read and write
|
||
18C4F9A7000
|
trusted library allocation
|
page read and write
|
||
18C4F31B000
|
trusted library allocation
|
page read and write
|
||
7FFD34AE2000
|
trusted library allocation
|
page read and write
|
||
7FFD34B10000
|
trusted library allocation
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page execute and read and write
|
||
225CC1DC000
|
trusted library allocation
|
page read and write
|
||
680000
|
unkown
|
page readonly
|
||
24020050000
|
heap
|
page read and write
|
||
E2C000
|
heap
|
page read and write
|
||
23A61FC6000
|
trusted library allocation
|
page read and write
|
||
7FFD34773000
|
trusted library allocation
|
page execute and read and write
|
||
240200B8000
|
heap
|
page read and write
|
||
7FFD34A30000
|
trusted library allocation
|
page read and write
|
||
7FFD34774000
|
trusted library allocation
|
page read and write
|
||
1FF99E50000
|
heap
|
page execute and read and write
|
||
18C6614A000
|
heap
|
page read and write
|
||
7FFD3492B000
|
trusted library allocation
|
page read and write
|
||
D2716F9000
|
stack
|
page read and write
|
||
22F24390000
|
trusted library allocation
|
page read and write
|
||
225CB72A000
|
trusted library allocation
|
page read and write
|
||
23A5F084000
|
heap
|
page read and write
|
||
225E335A000
|
heap
|
page read and write
|
||
7FFD34BE0000
|
trusted library allocation
|
page read and write
|
||
1FF8270D000
|
trusted library allocation
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
7DF4E5290000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page execute and read and write
|
||
22F3E567000
|
heap
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page read and write
|
||
7FFD34968000
|
trusted library allocation
|
page read and write
|
||
18C6675C000
|
heap
|
page read and write
|
||
7FFD34BD0000
|
trusted library allocation
|
page read and write
|
||
7FFD347AB000
|
trusted library allocation
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
22BD6B6C000
|
trusted library allocation
|
page read and write
|
||
7FFD34A60000
|
trusted library allocation
|
page read and write
|
||
1140000
|
heap
|
page execute and read and write
|
||
C6E5F0E000
|
stack
|
page read and write
|
||
225E2E97000
|
heap
|
page execute and read and write
|
||
18C4EB92000
|
trusted library allocation
|
page read and write
|
||
24021A90000
|
heap
|
page read and write
|
||
22F3E554000
|
heap
|
page read and write
|
||
22F27009000
|
trusted library allocation
|
page read and write
|
||
7FFD34951000
|
trusted library allocation
|
page read and write
|
||
1BCA3BE000
|
stack
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
7FFD34A70000
|
trusted library allocation
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
22BC76EF000
|
trusted library allocation
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34793000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
20DB0CA1000
|
trusted library allocation
|
page read and write
|
||
9B0000
|
unkown
|
page readonly
|
||
1FF91951000
|
trusted library allocation
|
page read and write
|
||
7DF4E5280000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34A20000
|
trusted library allocation
|
page read and write
|
||
E90000
|
unkown
|
page readonly
|
||
7FFD34A90000
|
trusted library allocation
|
page read and write
|
||
225CC465000
|
trusted library allocation
|
page read and write
|
||
225E3250000
|
heap
|
page read and write
|
||
7FFD34A90000
|
trusted library allocation
|
page read and write
|
||
8145F3E000
|
stack
|
page read and write
|
||
7FFD347A3000
|
trusted library allocation
|
page execute and read and write
|
||
D271778000
|
stack
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
22F3E1B5000
|
heap
|
page read and write
|
||
22BDECD0000
|
heap
|
page read and write
|
||
22F3E1F3000
|
heap
|
page read and write
|
||
7FFD34826000
|
trusted library allocation
|
page read and write
|
||
18C4F201000
|
trusted library allocation
|
page read and write
|
||
2402398E000
|
trusted library allocation
|
page read and write
|
||
18C66A75000
|
heap
|
page read and write
|
||
7FFD34A50000
|
trusted library allocation
|
page read and write
|
||
23A5EFAE000
|
heap
|
page read and write
|
||
20DB101D000
|
trusted library allocation
|
page read and write
|
||
C13BA38000
|
stack
|
page read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page read and write
|
||
7FFD34978000
|
trusted library allocation
|
page read and write
|
||
7FFD34A60000
|
trusted library allocation
|
page read and write
|
||
7FFD34A90000
|
trusted library allocation
|
page read and write
|
||
7FFD34A70000
|
trusted library allocation
|
page read and write
|
||
2CF1000
|
trusted library allocation
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
7FFD34A60000
|
trusted library allocation
|
page read and write
|
||
1B93E000
|
stack
|
page read and write
|
||
24020410000
|
trusted library allocation
|
page read and write
|
||
24031DCA000
|
trusted library allocation
|
page read and write
|
||
24022BA9000
|
trusted library allocation
|
page read and write
|
||
1FF99DA0000
|
trusted library allocation
|
page read and write
|
||
18C4E130000
|
heap
|
page read and write
|
||
2403A446000
|
heap
|
page read and write
|
||
1FF9A082000
|
heap
|
page read and write
|
||
1FF99CFA000
|
heap
|
page read and write
|
||
20DB0BE9000
|
trusted library allocation
|
page read and write
|
||
7FFD34AEC000
|
trusted library allocation
|
page read and write
|
||
20DB10F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34BD7000
|
trusted library allocation
|
page read and write
|
||
22BC6817000
|
trusted library allocation
|
page read and write
|
||
22BD67C1000
|
trusted library allocation
|
page read and write
|
||
18C4C7C0000
|
trusted library section
|
page read and write
|
||
7FFD34856000
|
trusted library allocation
|
page read and write
|
||
225C8F20000
|
heap
|
page read and write
|
||
7FFD34BC0000
|
trusted library allocation
|
page read and write
|
||
20DAFC70000
|
trusted library allocation
|
page read and write
|
||
7FFD34B8C000
|
trusted library allocation
|
page read and write
|
||
7FFD34AD0000
|
trusted library allocation
|
page read and write
|
||
22F3E528000
|
heap
|
page read and write
|
||
22F3E545000
|
heap
|
page read and write
|
||
22BDECB0000
|
heap
|
page read and write
|
||
1FF9A0DE000
|
heap
|
page read and write
|
||
7FFD34BAC000
|
trusted library allocation
|
page read and write
|
||
18C66A17000
|
heap
|
page read and write
|
||
22F3E44D000
|
heap
|
page read and write
|
||
24021A50000
|
trusted library allocation
|
page read and write
|
||
1FF99FA6000
|
heap
|
page read and write
|
||
225E2F97000
|
heap
|
page read and write
|
||
22BDEB77000
|
heap
|
page read and write
|
||
22BC71E1000
|
trusted library allocation
|
page read and write
|
||
22BC85B0000
|
trusted library allocation
|
page read and write
|
||
22BC6785000
|
heap
|
page read and write
|
||
2403A0A3000
|
heap
|
page read and write
|
||
7FFD34BDB000
|
trusted library allocation
|
page read and write
|
There are 1408 hidden memdumps, click here to show them.