Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
obvious.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\uGCIY.scr
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\uGCIY.scr:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\obvious.exe.log
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Windows\System32\drivers\etc\hosts
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\KtE6mRAFZ5iEcgF
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie
0xb, schema 4, UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\VUku0KRjiZfWItk
|
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie
0xe, schema 4, UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\XztjmX3oOWYRvow
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8,
version-valid-for 11
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1bn5izav.svr.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3zs0arm0.yv4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_54lwo32v.j0g.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_55rxnatn.e34.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5bbe1ofz.iyz.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aug5f4cu.a1j.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gyooz3qh.iwe.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ld2h1shx.1kr.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mkft2utz.wte.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ovmlvudg.mq1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q4rkrywx.hjg.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x5v1osxi.j4o.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\hGQwf2dJC9byEfm.ligma
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\hGQwf2dJC9byEfm\Browsers\Cookies\Chrome Cookies.txt
|
ASCII text, with very long lines (522), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\hGQwf2dJC9byEfm\Display\Display.png
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
dropped
|
There are 14 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\obvious.exe
|
"C:\Users\user\Desktop\obvious.exe"
|
||
C:\Windows\System32\attrib.exe
|
"attrib.exe" +h +s "C:\Users\user\Desktop\obvious.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\obvious.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring
$true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting
Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
|
||
C:\Windows\System32\cmd.exe
|
"cmd.exe" /c ping localhost && del /F /A h "C:\Users\user\Desktop\obvious.exe" && pause
|
||
C:\Windows\System32\PING.EXE
|
ping localhost
|
||
C:\Windows\System32\wbem\WMIC.exe
|
"wmic.exe" csproduct get uuid
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WMIC.exe
|
"wmic.exe" os get Caption
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WMIC.exe
|
"wmic.exe" computersystem get totalphysicalmemory
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WMIC.exe
|
"wmic.exe" csproduct get uuid
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WMIC.exe
|
"wmic" path win32_VideoController get name
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 17 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://discord.com/api/webhooks/1240617539009249350/TqBzgc6PPLDK8U9sL3OIQ7VPVwnDIoONcaMLCG9G1Uo5vMQ9KEFuAEkuqQ_6XKEkyetX
|
162.159.136.232
|
||
https://discord.com
|
unknown
|
||
https://discord.com/api/webhooks/1240617539009249350/TqBzgc6PPLDK8U9sL3OIQ7VPVwnDIoONcaMLCG9G1Uo5vMQ
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://mail.google.com/mail/installwebapp?usp=chrome_default
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://discordapp.com/api/v9/users/
|
unknown
|
||
https://www.youtube.com/:
|
unknown
|
||
https://media.discordapp.net/attachments/1176050474064019486/12780529320964Pj
|
unknown
|
||
http://discord.com
|
unknown
|
||
https://mail.google.com/mail/:
|
unknown
|
||
https://docs.google.com/document/installwebapp?usp=chrome_default
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
https://docs.google.com/presentation/installwebapp?usp=chrome_default
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://docs.google.com/spreadsheets/J
|
unknown
|
||
https://docs.google.com/spreadsheets/?usp=installed_webapp
|
unknown
|
||
https://mail.google.com/mail/J
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://docs.google.com/spreadsheets/:
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://ip-api.com
|
unknown
|
||
https://oneget.orgX
|
unknown
|
||
https://www.youtube.com/s/notifications/manifest/cr_install.html
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
http://ip-api.com/line/?fields=hostingI7AB5C494-39F5-4941-9163-47F54D6D5016I032E02B4-0499-05C3-0806-
|
unknown
|
||
https://www.youtube.com/J
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
https://discord.com/api/v10/users/
|
unknown
|
||
https://drive.google.com/:
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://media.discordapp.net/attachments/1176050474064019486/1278052932096491550/Umbral-927537.zip?e
|
unknown
|
||
https://cdn.discordapp.com/attachments/1176050474064019486/1278052932096491550/Umbral-927537.zip?ex=
|
unknown
|
||
https://drive.google.com/J
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://github.com/Blank-c/Umbral-Stealer
|
unknown
|
||
https://docs.google.com/spreadsheets/installwebapp?usp=chrome_default
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://media.discordapp.net/attachments/1176050474064019486/12780529320964
|
unknown
|
||
https://docs.google.com/presentation/?usp=installed_webapp
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://ip-api.com/json/?fields=225545P
|
unknown
|
||
https://docs.google.com/document/?usp=installed_webapp
|
unknown
|
||
https://oneget.org
|
unknown
|
||
http://ip-api.com/json/?fields=225545
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
||
http://crl.micros
|
unknown
|
There are 46 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
discord.com
|
162.159.136.232
|
||
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
||
162.159.136.232
|
discord.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obvious_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obvious_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obvious_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obvious_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obvious_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obvious_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obvious_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obvious_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obvious_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obvious_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obvious_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obvious_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obvious_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obvious_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit
|
Version
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
12F5F5A2000
|
unkown
|
page readonly
|
||
12F6169F000
|
trusted library allocation
|
page read and write
|
||
12F61605000
|
trusted library allocation
|
page read and write
|
||
1B902EB4000
|
heap
|
page read and write
|
||
7FFD9BA5C000
|
trusted library allocation
|
page execute and read and write
|
||
22D6B8DC000
|
heap
|
page read and write
|
||
22D6B8FC000
|
heap
|
page read and write
|
||
12F61800000
|
trusted library allocation
|
page read and write
|
||
7DF4A9B90000
|
trusted library allocation
|
page execute and read and write
|
||
1E0AAA07000
|
trusted library allocation
|
page read and write
|
||
12F61273000
|
trusted library allocation
|
page read and write
|
||
B7B5C7E000
|
stack
|
page read and write
|
||
12F613BB000
|
trusted library allocation
|
page read and write
|
||
22D6B8D0000
|
heap
|
page read and write
|
||
1B5EEE8E000
|
heap
|
page read and write
|
||
7FFD9BBBA000
|
trusted library allocation
|
page read and write
|
||
B7B5D79000
|
stack
|
page read and write
|
||
1B5EF388000
|
heap
|
page read and write
|
||
7FFD9B9EC000
|
trusted library allocation
|
page execute and read and write
|
||
10D224E000
|
stack
|
page read and write
|
||
2349AB67000
|
heap
|
page read and write
|
||
1B5EF388000
|
heap
|
page read and write
|
||
2349B12A000
|
heap
|
page read and write
|
||
12BB9380000
|
heap
|
page execute and read and write
|
||
12F5FA75000
|
heap
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
223BEAE1000
|
trusted library allocation
|
page read and write
|
||
236195C2000
|
heap
|
page read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
1B5EED70000
|
trusted library allocation
|
page read and write
|
||
22D6B8E8000
|
heap
|
page read and write
|
||
12F61805000
|
trusted library allocation
|
page read and write
|
||
1E204126000
|
heap
|
page read and write
|
||
7FFD9B9A4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
12BB7975000
|
heap
|
page read and write
|
||
7FFD9BD00000
|
trusted library allocation
|
page read and write
|
||
1B900E61000
|
heap
|
page read and write
|
||
10D1479000
|
stack
|
page read and write
|
||
1B5EF37F000
|
heap
|
page read and write
|
||
1B5EECAE000
|
heap
|
page read and write
|
||
236195BF000
|
heap
|
page read and write
|
||
1E0B9AED000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
236195B2000
|
heap
|
page read and write
|
||
1B5EEC63000
|
heap
|
page read and write
|
||
B2913DE000
|
stack
|
page read and write
|
||
23619760000
|
heap
|
page read and write
|
||
2349B27C000
|
heap
|
page read and write
|
||
22D6B8E3000
|
heap
|
page read and write
|
||
2349CB26000
|
heap
|
page read and write
|
||
1E205BA0000
|
heap
|
page read and write
|
||
2249DFE000
|
stack
|
page read and write
|
||
1B901641000
|
heap
|
page read and write
|
||
1B5EEC40000
|
trusted library allocation
|
page read and write
|
||
1E21E27F000
|
heap
|
page read and write
|
||
B291B7E000
|
stack
|
page read and write
|
||
1E0AA9CE000
|
trusted library allocation
|
page read and write
|
||
12BB7720000
|
heap
|
page read and write
|
||
12BB9140000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
22D6B3A2000
|
heap
|
page read and write
|
||
1B901627000
|
heap
|
page read and write
|
||
12BB93B1000
|
trusted library allocation
|
page read and write
|
||
5B7FE78000
|
stack
|
page read and write
|
||
1E0AAA9B000
|
trusted library allocation
|
page read and write
|
||
1B5EF388000
|
heap
|
page read and write
|
||
1E0B97F1000
|
trusted library allocation
|
page read and write
|
||
2349B100000
|
heap
|
page read and write
|
||
588957E000
|
stack
|
page read and write
|
||
2349CB1E000
|
heap
|
page read and write
|
||
10D14F8000
|
stack
|
page read and write
|
||
223CE9F1000
|
trusted library allocation
|
page read and write
|
||
23619600000
|
heap
|
page read and write
|
||
24922074000
|
trusted library allocation
|
page read and write
|
||
22D6BA47000
|
heap
|
page read and write
|
||
1E204165000
|
heap
|
page read and write
|
||
1E0B9AEB000
|
trusted library allocation
|
page read and write
|
||
2361B572000
|
heap
|
page read and write
|
||
1E0A7D00000
|
heap
|
page read and write
|
||
2349CB1E000
|
heap
|
page read and write
|
||
10D1578000
|
stack
|
page read and write
|
||
B7B578E000
|
stack
|
page read and write
|
||
1B902EC4000
|
heap
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page execute and read and write
|
||
B291BFE000
|
stack
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page execute and read and write
|
||
22D6B330000
|
heap
|
page read and write
|
||
23619767000
|
heap
|
page read and write
|
||
1B900E5B000
|
heap
|
page read and write
|
||
7FFD9BD10000
|
trusted library allocation
|
page read and write
|
||
2349B27E000
|
heap
|
page read and write
|
||
22D6B2A0000
|
trusted library allocation
|
page read and write
|
||
23619577000
|
heap
|
page read and write
|
||
1E205C65000
|
heap
|
page read and write
|
||
22D6B8F9000
|
heap
|
page read and write
|
||
5A08EFF000
|
stack
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
2349ABA0000
|
heap
|
page read and write
|
||
58895FE000
|
stack
|
page read and write
|
||
2349AB38000
|
heap
|
page read and write
|
||
2249CF3000
|
stack
|
page read and write
|
||
236198B5000
|
heap
|
page read and write
|
||
1B90163D000
|
heap
|
page read and write
|
||
2349AB43000
|
heap
|
page read and write
|
||
1B5EF389000
|
heap
|
page read and write
|
||
1B5EECB9000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
B7B5B7E000
|
stack
|
page read and write
|
||
58894FE000
|
stack
|
page read and write
|
||
1B5EF394000
|
heap
|
page read and write
|
||
1E0A7EF0000
|
heap
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
5B7FCFE000
|
stack
|
page read and write
|
||
1664F5C000
|
stack
|
page read and write
|
||
2491EA20000
|
heap
|
page readonly
|
||
1B901649000
|
heap
|
page read and write
|
||
23619C4C000
|
heap
|
page read and write
|
||
5B7FBFD000
|
stack
|
page read and write
|
||
12F5F820000
|
heap
|
page read and write
|
||
22D6BA40000
|
heap
|
page read and write
|
||
22D6B398000
|
heap
|
page read and write
|
||
1B5EEC84000
|
heap
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C3000
|
trusted library allocation
|
page read and write
|
||
2349B125000
|
heap
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page execute and read and write
|
||
12BD1A0A000
|
heap
|
page read and write
|
||
B7B5A7E000
|
stack
|
page read and write
|
||
1B5EF370000
|
heap
|
page read and write
|
||
1B902EBE000
|
heap
|
page read and write
|
||
22D6B3A4000
|
heap
|
page read and write
|
||
1B5EECC3000
|
heap
|
page read and write
|
||
23619C62000
|
heap
|
page read and write
|
||
1B5EEE84000
|
heap
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
10D167E000
|
stack
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page execute and read and write
|
||
1B5EECF1000
|
heap
|
page read and write
|
||
12F61286000
|
trusted library allocation
|
page read and write
|
||
1E205C85000
|
heap
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD70000
|
trusted library allocation
|
page read and write
|
||
1B902EB6000
|
heap
|
page read and write
|
||
23619C10000
|
heap
|
page read and write
|
||
2349AB00000
|
heap
|
page read and write
|
||
1E0B9866000
|
trusted library allocation
|
page read and write
|
||
1E21E261000
|
heap
|
page read and write
|
||
12F5F841000
|
heap
|
page read and write
|
||
22D6BA4A000
|
heap
|
page read and write
|
||
7042E4E000
|
stack
|
page read and write
|
||
2349B124000
|
heap
|
page read and write
|
||
7FFD9BD20000
|
trusted library allocation
|
page read and write
|
||
12F617D6000
|
trusted library allocation
|
page read and write
|
||
2349CB13000
|
heap
|
page read and write
|
||
1B5EECB2000
|
heap
|
page read and write
|
||
7FFD9BB82000
|
trusted library allocation
|
page read and write
|
||
12F617CE000
|
trusted library allocation
|
page read and write
|
||
1E207060000
|
trusted library allocation
|
page read and write
|
||
23619629000
|
heap
|
page read and write
|
||
1B5EECE8000
|
heap
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page execute and read and write
|
||
1E205A41000
|
heap
|
page read and write
|
||
22D6B8FF000
|
heap
|
page read and write
|
||
223BCDB5000
|
heap
|
page read and write
|
||
2361976A000
|
heap
|
page read and write
|
||
1B5EEB40000
|
heap
|
page read and write
|
||
1E0C1EE1000
|
heap
|
page read and write
|
||
4F8B17F000
|
stack
|
page read and write
|
||
1B5EECE4000
|
heap
|
page read and write
|
||
23619639000
|
heap
|
page read and write
|
||
24938A30000
|
heap
|
page read and write
|
||
1E0AAB81000
|
trusted library allocation
|
page read and write
|
||
24938825000
|
heap
|
page read and write
|
||
2361B57E000
|
heap
|
page read and write
|
||
2349B2A9000
|
heap
|
page read and write
|
||
1B900E31000
|
heap
|
page read and write
|
||
1E0C2021000
|
heap
|
page read and write
|
||
1B900E46000
|
heap
|
page read and write
|
||
22D6B393000
|
heap
|
page read and write
|
||
7FFD9BB5A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
236195DA000
|
heap
|
page read and write
|
||
1E215F70000
|
trusted library allocation
|
page read and write
|
||
23619C44000
|
heap
|
page read and write
|
||
23619C59000
|
heap
|
page read and write
|
||
1E205EF1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE00000
|
trusted library allocation
|
page read and write
|
||
B2916FE000
|
stack
|
page read and write
|
||
2349B123000
|
heap
|
page read and write
|
||
236198BD000
|
heap
|
page read and write
|
||
12F61281000
|
trusted library allocation
|
page read and write
|
||
223BCD75000
|
heap
|
page read and write
|
||
7FFD9B9EC000
|
trusted library allocation
|
page execute and read and write
|
||
12BD184B000
|
heap
|
page read and write
|
||
2361B576000
|
heap
|
page read and write
|
||
12F61766000
|
trusted library allocation
|
page read and write
|
||
1B5EED90000
|
heap
|
page read and write
|
||
22D6B3A5000
|
heap
|
page read and write
|
||
2349B270000
|
heap
|
page read and write
|
||
7FFD9B9D4000
|
trusted library allocation
|
page read and write
|
||
2349B29C000
|
heap
|
page read and write
|
||
7FFD9B9DB000
|
trusted library allocation
|
page execute and read and write
|
||
22D6D1F0000
|
heap
|
page read and write
|
||
1B900E34000
|
heap
|
page read and write
|
||
22D6B580000
|
heap
|
page read and write
|
||
1B5EECA1000
|
heap
|
page read and write
|
||
7FFD9BB41000
|
trusted library allocation
|
page read and write
|
||
1B901110000
|
heap
|
page read and write
|
||
1B5EF391000
|
heap
|
page read and write
|
||
23619600000
|
heap
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
2349CB14000
|
heap
|
page read and write
|
||
7FFD9BCF0000
|
trusted library allocation
|
page read and write
|
||
23619C3F000
|
heap
|
page read and write
|
||
22D6B384000
|
heap
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
2361B584000
|
heap
|
page read and write
|
||
223BCCE0000
|
heap
|
page read and write
|
||
1E0AAB04000
|
trusted library allocation
|
page read and write
|
||
1B900E57000
|
heap
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
24920370000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
1E20416A000
|
heap
|
page read and write
|
||
22D6B8D7000
|
heap
|
page read and write
|
||
7FFD9BB72000
|
trusted library allocation
|
page read and write
|
||
236195FF000
|
heap
|
page read and write
|
||
1B901117000
|
heap
|
page read and write
|
||
236195EB000
|
heap
|
page read and write
|
||
1E205C00000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
22D6D1F6000
|
heap
|
page read and write
|
||
B2918FD000
|
stack
|
page read and write
|
||
70422FE000
|
stack
|
page read and write
|
||
22D6B358000
|
heap
|
page read and write
|
||
7FFD9BCB0000
|
trusted library allocation
|
page read and write
|
||
12F61374000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
12F617E9000
|
trusted library allocation
|
page read and write
|
||
22D6B358000
|
heap
|
page read and write
|
||
22D6B384000
|
heap
|
page read and write
|
||
2361963A000
|
heap
|
page read and write
|
||
1B901000000
|
trusted library allocation
|
page read and write
|
||
12BB9539000
|
trusted library allocation
|
page read and write
|
||
1E207761000
|
trusted library allocation
|
page read and write
|
||
1B900E4E000
|
heap
|
page read and write
|
||
23619642000
|
heap
|
page read and write
|
||
1B5EEE8A000
|
heap
|
page read and write
|
||
1E20411D000
|
heap
|
page read and write
|
||
2491E8EB000
|
heap
|
page read and write
|
||
2349AB9D000
|
heap
|
page read and write
|
||
2361B584000
|
heap
|
page read and write
|
||
2349B12A000
|
heap
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page execute and read and write
|
||
2349B277000
|
heap
|
page read and write
|
||
22D6B358000
|
heap
|
page read and write
|
||
2491E8F1000
|
heap
|
page read and write
|
||
12BD1CB0000
|
heap
|
page read and write
|
||
7FFD9BDC0000
|
trusted library allocation
|
page read and write
|
||
23619750000
|
trusted library allocation
|
page read and write
|
||
1E205C0E000
|
heap
|
page read and write
|
||
24938867000
|
heap
|
page read and write
|
||
223D6D20000
|
heap
|
page read and write
|
||
1E0AA755000
|
trusted library allocation
|
page read and write
|
||
2349CB1E000
|
heap
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
1E0A9A19000
|
trusted library allocation
|
page read and write
|
||
1E2040F2000
|
heap
|
page read and write
|
||
1B90111B000
|
heap
|
page read and write
|
||
2349AB91000
|
heap
|
page read and write
|
||
223D6DFF000
|
heap
|
page read and write
|
||
12F61748000
|
trusted library allocation
|
page read and write
|
||
2349CB12000
|
heap
|
page read and write
|
||
5B7FEF9000
|
stack
|
page read and write
|
||
2349AB64000
|
heap
|
page read and write
|
||
1E0C1C40000
|
heap
|
page read and write
|
||
7042177000
|
stack
|
page read and write
|
||
1B5EECA5000
|
heap
|
page read and write
|
||
12BB772A000
|
heap
|
page read and write
|
||
1B5EECB0000
|
heap
|
page read and write
|
||
2349AAFA000
|
heap
|
page read and write
|
||
B291A79000
|
stack
|
page read and write
|
||
2349CB1D000
|
heap
|
page read and write
|
||
24938882000
|
heap
|
page read and write
|
||
12F613B4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCB0000
|
trusted library allocation
|
page read and write
|
||
12F79B0C000
|
heap
|
page read and write
|
||
7FFD9BB41000
|
trusted library allocation
|
page read and write
|
||
10D137F000
|
stack
|
page read and write
|
||
22D6B280000
|
heap
|
page read and write
|
||
B2927CA000
|
stack
|
page read and write
|
||
12BC9426000
|
trusted library allocation
|
page read and write
|
||
22D6B909000
|
heap
|
page read and write
|
||
1E204030000
|
heap
|
page read and write
|
||
1B900E59000
|
heap
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
224A9F9000
|
stack
|
page read and write
|
||
1BAECEF0000
|
heap
|
page read and write
|
||
236195DA000
|
heap
|
page read and write
|
||
1B5EEE80000
|
heap
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
2349ABB0000
|
heap
|
page read and write
|
||
22D6B8E1000
|
heap
|
page read and write
|
||
12BD17F0000
|
heap
|
page read and write
|
||
22D6D390000
|
heap
|
page read and write
|
||
7FFD9BCE0000
|
trusted library allocation
|
page read and write
|
||
2249FFE000
|
stack
|
page read and write
|
||
4F8AD1E000
|
stack
|
page read and write
|
||
249387FE000
|
heap
|
page read and write
|
||
4F8AC97000
|
stack
|
page read and write
|
||
23619C59000
|
heap
|
page read and write
|
||
B7B570D000
|
unkown
|
page read and write
|
||
12F617BC000
|
trusted library allocation
|
page read and write
|
||
5B7FDF9000
|
stack
|
page read and write
|
||
2349B12E000
|
heap
|
page read and write
|
||
12BB76E8000
|
heap
|
page read and write
|
||
2349AB88000
|
heap
|
page read and write
|
||
12F79FB1000
|
heap
|
page read and write
|
||
2349CB16000
|
heap
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
1B903000000
|
heap
|
page read and write
|
||
23619763000
|
heap
|
page read and write
|
||
22D6B377000
|
heap
|
page read and write
|
||
223BEAF6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9BD000
|
trusted library allocation
|
page execute and read and write
|
||
2349AB85000
|
heap
|
page read and write
|
||
23619644000
|
heap
|
page read and write
|
||
236195C9000
|
heap
|
page read and write
|
||
236195A3000
|
heap
|
page read and write
|
||
1B902EB0000
|
heap
|
page read and write
|
||
1E0A7D3E000
|
heap
|
page read and write
|
||
1E0C1EC0000
|
heap
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
224B0F9000
|
stack
|
page read and write
|
||
22D6BA43000
|
heap
|
page read and write
|
||
1E207386000
|
trusted library allocation
|
page read and write
|
||
12F5F897000
|
heap
|
page read and write
|
||
23619C59000
|
heap
|
page read and write
|
||
1B900E26000
|
heap
|
page read and write
|
||
7FFD9B9B4000
|
trusted library allocation
|
page read and write
|
||
236195FA000
|
heap
|
page read and write
|
||
1B5EED70000
|
trusted library allocation
|
page read and write
|
||
249204E9000
|
trusted library allocation
|
page read and write
|
||
12BC9568000
|
trusted library allocation
|
page read and write
|
||
23619C5C000
|
heap
|
page read and write
|
||
1E0A7D08000
|
heap
|
page read and write
|
||
2361B560000
|
heap
|
page read and write
|
||
5B7FF78000
|
stack
|
page read and write
|
||
2349B299000
|
heap
|
page read and write
|
||
125AEFD0000
|
heap
|
page read and write
|
||
1E0A7CE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
B291AFA000
|
stack
|
page read and write
|
||
7FFD9BCD0000
|
trusted library allocation
|
page read and write
|
||
1E0AA951000
|
trusted library allocation
|
page read and write
|
||
2361B574000
|
heap
|
page read and write
|
||
2349B127000
|
heap
|
page read and write
|
||
1B902EC6000
|
heap
|
page read and write
|
||
1B5EECF2000
|
heap
|
page read and write
|
||
22D6D203000
|
heap
|
page read and write
|
||
223BEEF4000
|
trusted library allocation
|
page read and write
|
||
1E205C10000
|
heap
|
page read and write
|
||
22D6D1F1000
|
heap
|
page read and write
|
||
1E215EF1000
|
trusted library allocation
|
page read and write
|
||
222792C000
|
stack
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
1B5EF38D000
|
heap
|
page read and write
|
||
223BCDB9000
|
heap
|
page read and write
|
||
236195C2000
|
heap
|
page read and write
|
||
12BB9220000
|
heap
|
page read and write
|
||
22D6B3A8000
|
heap
|
page read and write
|
||
1B5EEE8A000
|
heap
|
page read and write
|
||
1E0C1C9B000
|
heap
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
2349B120000
|
heap
|
page read and write
|
||
22D6BA4A000
|
heap
|
page read and write
|
||
236195C9000
|
heap
|
page read and write
|
||
22D6B900000
|
heap
|
page read and write
|
||
1B900E57000
|
heap
|
page read and write
|
||
12F71296000
|
trusted library allocation
|
page read and write
|
||
1B901113000
|
heap
|
page read and write
|
||
24922078000
|
trusted library allocation
|
page read and write
|
||
1BAECF78000
|
heap
|
page read and write
|
||
1B5EED50000
|
heap
|
page read and write
|
||
1B900E35000
|
heap
|
page read and write
|
||
223BCD42000
|
heap
|
page read and write
|
||
7FFD9BCC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCD4000
|
trusted library allocation
|
page read and write
|
||
23619C3C000
|
heap
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
1B902EB3000
|
heap
|
page read and write
|
||
7FFD9B992000
|
trusted library allocation
|
page read and write
|
||
10D127D000
|
stack
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
23619620000
|
heap
|
page read and write
|
||
1B901638000
|
heap
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page execute and read and write
|
||
22D6B39C000
|
heap
|
page read and write
|
||
7FFD9BA36000
|
trusted library allocation
|
page read and write
|
||
23619C63000
|
heap
|
page read and write
|
||
23619593000
|
heap
|
page read and write
|
||
1B901115000
|
heap
|
page read and write
|
||
5B7FC7E000
|
stack
|
page read and write
|
||
7041E7E000
|
stack
|
page read and write
|
||
1B5EECE4000
|
heap
|
page read and write
|
||
2349AB85000
|
heap
|
page read and write
|
||
7FFD9BC77000
|
trusted library allocation
|
page read and write
|
||
2349B12E000
|
heap
|
page read and write
|
||
1B902EC4000
|
heap
|
page read and write
|
||
23619C62000
|
heap
|
page read and write
|
||
7FFD9B99B000
|
trusted library allocation
|
page read and write
|
||
1B5EEE8A000
|
heap
|
page read and write
|
||
12BB7763000
|
heap
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
22D6B180000
|
heap
|
page read and write
|
||
1B901643000
|
heap
|
page read and write
|
||
1B5EF36C000
|
heap
|
page read and write
|
||
B291313000
|
stack
|
page read and write
|
||
5A08CFE000
|
stack
|
page read and write
|
||
B7B5E78000
|
stack
|
page read and write
|
||
12F616D5000
|
trusted library allocation
|
page read and write
|
||
2349B2A5000
|
heap
|
page read and write
|
||
7FFD9BB42000
|
trusted library allocation
|
page read and write
|
||
1B5EECB2000
|
heap
|
page read and write
|
||
1B5F0C00000
|
heap
|
page read and write
|
||
23619C60000
|
heap
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
2361976A000
|
heap
|
page read and write
|
||
2349AB96000
|
heap
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
1B900E26000
|
heap
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B983000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
1B5EEEDA000
|
heap
|
page read and write
|
||
1B901112000
|
heap
|
page read and write
|
||
7FFD9BB68000
|
trusted library allocation
|
page read and write
|
||
1BAECF7B000
|
heap
|
page read and write
|
||
12F6174E000
|
trusted library allocation
|
page read and write
|
||
12BB78D0000
|
heap
|
page read and write
|
||
2361B57E000
|
heap
|
page read and write
|
||
1B5EECB2000
|
heap
|
page read and write
|
||
23619C48000
|
heap
|
page read and write
|
||
22D6B8DC000
|
heap
|
page read and write
|
||
2349AB88000
|
heap
|
page read and write
|
||
236195EB000
|
heap
|
page read and write
|
||
22499BE000
|
stack
|
page read and write
|
||
12F61398000
|
trusted library allocation
|
page read and write
|
||
12BD1813000
|
heap
|
page read and write
|
||
223BEB36000
|
trusted library allocation
|
page read and write
|
||
23619593000
|
heap
|
page read and write
|
||
1B900E03000
|
heap
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page execute and read and write
|
||
1B5EEC86000
|
heap
|
page read and write
|
||
223BCE80000
|
trusted library allocation
|
page read and write
|
||
223D6D49000
|
heap
|
page read and write
|
||
12BB9215000
|
heap
|
page read and write
|
||
1E0A7E00000
|
heap
|
page readonly
|
||
23619767000
|
heap
|
page read and write
|
||
2349B2A2000
|
heap
|
page read and write
|
||
7FFD9B9DC000
|
trusted library allocation
|
page execute and read and write
|
||
1E0AA439000
|
trusted library allocation
|
page read and write
|
||
12BB95E2000
|
trusted library allocation
|
page read and write
|
||
125AEC4A000
|
heap
|
page read and write
|
||
2349AD00000
|
trusted library allocation
|
page read and write
|
||
22D6D1FD000
|
heap
|
page read and write
|
||
223CEA56000
|
trusted library allocation
|
page read and write
|
||
24920450000
|
heap
|
page read and write
|
||
223BE9E1000
|
trusted library allocation
|
page read and write
|
||
1B900E5A000
|
heap
|
page read and write
|
||
1B5EEC86000
|
heap
|
page read and write
|
||
1E21E490000
|
heap
|
page read and write
|
||
125AEC64000
|
heap
|
page read and write
|
||
223BEA65000
|
trusted library allocation
|
page read and write
|
||
2349AB88000
|
heap
|
page read and write
|
||
1B5EF37F000
|
heap
|
page read and write
|
||
2349B299000
|
heap
|
page read and write
|
||
1B901638000
|
heap
|
page read and write
|
||
B291C7C000
|
stack
|
page read and write
|
||
12F79AE0000
|
heap
|
page read and write
|
||
23619C69000
|
heap
|
page read and write
|
||
1B5EECB6000
|
heap
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
1E0C1C96000
|
heap
|
page read and write
|
||
22D6B260000
|
heap
|
page read and write
|
||
2349B127000
|
heap
|
page read and write
|
||
1E204290000
|
heap
|
page read and write
|
||
23619632000
|
heap
|
page read and write
|
||
12BB9193000
|
trusted library allocation
|
page read and write
|
||
1B5EF374000
|
heap
|
page read and write
|
||
2491E850000
|
heap
|
page read and write
|
||
22D6B3A2000
|
heap
|
page read and write
|
||
7FFD9BBF2000
|
trusted library allocation
|
page read and write
|
||
1B900DF9000
|
heap
|
page read and write
|
||
629C37E000
|
stack
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
1B901641000
|
heap
|
page read and write
|
||
12F5F9F0000
|
heap
|
page read and write
|
||
236198BE000
|
heap
|
page read and write
|
||
1E0AAAD5000
|
trusted library allocation
|
page read and write
|
||
23619591000
|
heap
|
page read and write
|
||
2349B285000
|
heap
|
page read and write
|
||
2361B573000
|
heap
|
page read and write
|
||
2361964A000
|
heap
|
page read and write
|
||
7FFD9BC7F000
|
trusted library allocation
|
page read and write
|
||
1B902EB2000
|
heap
|
page read and write
|
||
12F5F8AF000
|
heap
|
page read and write
|
||
1B901620000
|
heap
|
page read and write
|
||
23619C59000
|
heap
|
page read and write
|
||
12F61794000
|
trusted library allocation
|
page read and write
|
||
12F61493000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB5A000
|
trusted library allocation
|
page read and write
|
||
12F5FA70000
|
heap
|
page read and write
|
||
7FFD9BA76000
|
trusted library allocation
|
page execute and read and write
|
||
224A7FE000
|
stack
|
page read and write
|
||
1B5EEC68000
|
heap
|
page read and write
|
||
12F5F5A0000
|
unkown
|
page readonly
|
||
7FFD9BB54000
|
trusted library allocation
|
page read and write
|
||
2349AB85000
|
heap
|
page read and write
|
||
2491EAB0000
|
heap
|
page read and write
|
||
1E0C2004000
|
heap
|
page read and write
|
||
1B90162B000
|
heap
|
page read and write
|
||
7FFD9B9CD000
|
trusted library allocation
|
page execute and read and write
|
||
125AEC30000
|
heap
|
page read and write
|
||
629C3FE000
|
stack
|
page read and write
|
||
1B5EEC86000
|
heap
|
page read and write
|
||
24920266000
|
heap
|
page read and write
|
||
1E0B9AE3000
|
trusted library allocation
|
page read and write
|
||
2491EA73000
|
trusted library allocation
|
page read and write
|
||
1B5EECB3000
|
heap
|
page read and write
|
||
223BEE95000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
1B90111A000
|
heap
|
page read and write
|
||
12BD18D2000
|
heap
|
page read and write
|
||
1B900E6A000
|
heap
|
page read and write
|
||
2349AB67000
|
heap
|
page read and write
|
||
12F61693000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA46000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
23619645000
|
heap
|
page read and write
|
||
1B900DFF000
|
heap
|
page read and write
|
||
223BCD6F000
|
heap
|
page read and write
|
||
1B90118A000
|
heap
|
page read and write
|
||
2349AB85000
|
heap
|
page read and write
|
||
7FFD9BB6B000
|
trusted library allocation
|
page read and write
|
||
23619597000
|
heap
|
page read and write
|
||
12BBA968000
|
trusted library allocation
|
page read and write
|
||
223BEA23000
|
trusted library allocation
|
page read and write
|
||
1B900DF0000
|
heap
|
page read and write
|
||
22D6B585000
|
heap
|
page read and write
|
||
22D6B902000
|
heap
|
page read and write
|
||
4F8B0FF000
|
stack
|
page read and write
|
||
12F5F760000
|
heap
|
page read and write
|
||
1B900E60000
|
heap
|
page read and write
|
||
1E21E230000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
223BCBE0000
|
heap
|
page read and write
|
||
12F615F1000
|
trusted library allocation
|
page read and write
|
||
5B0007F000
|
stack
|
page read and write
|
||
7FFD9BB64000
|
trusted library allocation
|
page read and write
|
||
23619636000
|
heap
|
page read and write
|
||
1B900E28000
|
heap
|
page read and write
|
||
7DF4A9BA0000
|
trusted library allocation
|
page execute and read and write
|
||
1B901000000
|
trusted library allocation
|
page read and write
|
||
12BBAA48000
|
trusted library allocation
|
page read and write
|
||
B291877000
|
stack
|
page read and write
|
||
2349AB65000
|
heap
|
page read and write
|
||
1E0A7D4F000
|
heap
|
page read and write
|
||
7FFD9BA6C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
24921CD2000
|
trusted library allocation
|
page read and write
|
||
1E0AA766000
|
trusted library allocation
|
page read and write
|
||
1E0C1D40000
|
trusted library allocation
|
page read and write
|
||
12BBAFC7000
|
trusted library allocation
|
page read and write
|
||
1E0C1F81000
|
heap
|
page read and write
|
||
7FFD9BA4C000
|
trusted library allocation
|
page execute and read and write
|
||
1E204010000
|
heap
|
page read and write
|
||
1B90111E000
|
heap
|
page read and write
|
||
223D7190000
|
heap
|
page read and write
|
||
1B900E5A000
|
heap
|
page read and write
|
||
223D6D7C000
|
heap
|
page read and write
|
||
1B5EF360000
|
heap
|
page read and write
|
||
7FFD9BB62000
|
trusted library allocation
|
page read and write
|
||
1B5EF391000
|
heap
|
page read and write
|
||
2349B050000
|
heap
|
page read and write
|
||
22D6B2A0000
|
trusted library allocation
|
page read and write
|
||
1B5EECE8000
|
heap
|
page read and write
|
||
24921CA7000
|
trusted library allocation
|
page read and write
|
||
1E0AA75E000
|
trusted library allocation
|
page read and write
|
||
1B902EBE000
|
heap
|
page read and write
|
||
2349B2A3000
|
heap
|
page read and write
|
||
22D6B342000
|
heap
|
page read and write
|
||
223BCD4F000
|
heap
|
page read and write
|
||
1B5EEC86000
|
heap
|
page read and write
|
||
7FFD9BCEC000
|
trusted library allocation
|
page read and write
|
||
24920692000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
236195F2000
|
heap
|
page read and write
|
||
1E205CF0000
|
heap
|
page execute and read and write
|
||
7FFD9BDF0000
|
trusted library allocation
|
page read and write
|
||
373407D000
|
stack
|
page read and write
|
||
2349AAB0000
|
heap
|
page read and write
|
||
1E205BF0000
|
heap
|
page read and write
|
||
23619530000
|
heap
|
page read and write
|
||
12F6171A000
|
trusted library allocation
|
page read and write
|
||
236195BA000
|
heap
|
page read and write
|
||
7041F7E000
|
stack
|
page read and write
|
||
1B900E70000
|
heap
|
page read and write
|
||
22D6B347000
|
heap
|
page read and write
|
||
1B5EECC7000
|
heap
|
page read and write
|
||
12F5F960000
|
heap
|
page execute and read and write
|
||
2349AB92000
|
heap
|
page read and write
|
||
1B5EEE82000
|
heap
|
page read and write
|
||
22D6B396000
|
heap
|
page read and write
|
||
236195A4000
|
heap
|
page read and write
|
||
1B5EEC50000
|
heap
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
12F5F740000
|
heap
|
page read and write
|
||
236195BA000
|
heap
|
page read and write
|
||
2491E8EF000
|
heap
|
page read and write
|
||
7041FFF000
|
stack
|
page read and write
|
||
7FFD9BA4C000
|
trusted library allocation
|
page execute and read and write
|
||
1B5EECC3000
|
heap
|
page read and write
|
||
23619560000
|
heap
|
page read and write
|
||
1B5EF388000
|
heap
|
page read and write
|
||
2349ABAA000
|
heap
|
page read and write
|
||
2349B27F000
|
heap
|
page read and write
|
||
12F61221000
|
trusted library allocation
|
page read and write
|
||
1B5EF36E000
|
heap
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page execute and read and write
|
||
22D6B386000
|
heap
|
page read and write
|
||
12F5F8B5000
|
heap
|
page read and write
|
||
1B90162B000
|
heap
|
page read and write
|
||
22D6BA47000
|
heap
|
page read and write
|
||
2491E937000
|
heap
|
page read and write
|
||
223BE7E0000
|
heap
|
page read and write
|
||
7FFD9BDD0000
|
trusted library allocation
|
page read and write
|
||
12BB9FE2000
|
trusted library allocation
|
page read and write
|
||
12BB7970000
|
heap
|
page read and write
|
||
12F71221000
|
trusted library allocation
|
page read and write
|
||
224A2FF000
|
stack
|
page read and write
|
||
1E0A7F40000
|
heap
|
page read and write
|
||
22D6B347000
|
heap
|
page read and write
|
||
12BBAEFE000
|
trusted library allocation
|
page read and write
|
||
B292849000
|
stack
|
page read and write
|
||
23619C62000
|
heap
|
page read and write
|
||
23619608000
|
heap
|
page read and write
|
||
1E0A7C80000
|
heap
|
page read and write
|
||
236195BE000
|
heap
|
page read and write
|
||
12F79DD0000
|
heap
|
page read and write
|
||
7FFD9B9AD000
|
trusted library allocation
|
page execute and read and write
|
||
1B900E5A000
|
heap
|
page read and write
|
||
12F79DA0000
|
heap
|
page read and write
|
||
22D6B369000
|
heap
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
2491EA30000
|
heap
|
page execute and read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
23619634000
|
heap
|
page read and write
|
||
12F79250000
|
trusted library allocation
|
page read and write
|
||
2361976B000
|
heap
|
page read and write
|
||
1B5EECB9000
|
heap
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD80000
|
trusted library allocation
|
page read and write
|
||
1E0AB14B000
|
trusted library allocation
|
page read and write
|
||
1E21E238000
|
heap
|
page read and write
|
||
1B900FC0000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
1B5F0C14000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page execute and read and write
|
||
1B5EEE8B000
|
heap
|
page read and write
|
||
24938896000
|
heap
|
page read and write
|
||
12BBAD6A000
|
trusted library allocation
|
page read and write
|
||
1E0AA3EC000
|
trusted library allocation
|
page read and write
|
||
1E0AA886000
|
trusted library allocation
|
page read and write
|
||
7FFD9B994000
|
trusted library allocation
|
page read and write
|
||
12F61635000
|
trusted library allocation
|
page read and write
|
||
12F5F5A0000
|
unkown
|
page readonly
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
22D6B397000
|
heap
|
page read and write
|
||
1E204223000
|
trusted library allocation
|
page read and write
|
||
125AEE30000
|
heap
|
page read and write
|
||
10D117F000
|
stack
|
page read and write
|
||
1B900E08000
|
heap
|
page read and write
|
||
12F61713000
|
trusted library allocation
|
page read and write
|
||
12BD1A1C000
|
heap
|
page read and write
|
||
223BE970000
|
heap
|
page execute and read and write
|
||
24920455000
|
heap
|
page read and write
|
||
1E0AB61C000
|
trusted library allocation
|
page read and write
|
||
22D6B8F9000
|
heap
|
page read and write
|
||
1B901000000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCB0000
|
trusted library allocation
|
page read and write
|
||
1E0A7C20000
|
heap
|
page read and write
|
||
4F8AD9E000
|
stack
|
page read and write
|
||
1B901638000
|
heap
|
page read and write
|
||
23619550000
|
trusted library allocation
|
page read and write
|
||
2349B281000
|
heap
|
page read and write
|
||
22D6B8E4000
|
heap
|
page read and write
|
||
12F7122D000
|
trusted library allocation
|
page read and write
|
||
1E207735000
|
trusted library allocation
|
page read and write
|
||
1E0A97F1000
|
trusted library allocation
|
page read and write
|
||
24938910000
|
heap
|
page read and write
|
||
1B901641000
|
heap
|
page read and write
|
||
1B5EECC3000
|
heap
|
page read and write
|
||
B291977000
|
stack
|
page read and write
|
||
1E0C1CAB000
|
heap
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
1E204295000
|
heap
|
page read and write
|
||
12BB76E0000
|
heap
|
page read and write
|
||
1B5EECF5000
|
heap
|
page read and write
|
||
223D6F38000
|
heap
|
page read and write
|
||
23619C44000
|
heap
|
page read and write
|
||
223CE9E1000
|
trusted library allocation
|
page read and write
|
||
B7B5FFE000
|
stack
|
page read and write
|
||
5B7FFFE000
|
stack
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9A2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCF0000
|
trusted library allocation
|
page read and write
|
||
223D6E13000
|
heap
|
page read and write
|
||
10D13FE000
|
stack
|
page read and write
|
||
12BB9425000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
1E0C17F1000
|
heap
|
page read and write
|
||
22D6B386000
|
heap
|
page read and write
|
||
12BBAC1C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page execute and read and write
|
||
22D6D1FD000
|
heap
|
page read and write
|
||
1E205C95000
|
heap
|
page read and write
|
||
10D1072000
|
stack
|
page read and write
|
||
22D6B909000
|
heap
|
page read and write
|
||
23619C59000
|
heap
|
page read and write
|
||
7FFD9BA3C000
|
trusted library allocation
|
page execute and read and write
|
||
7041EFD000
|
stack
|
page read and write
|
||
12F79FA0000
|
heap
|
page read and write
|
||
12F615E0000
|
trusted library allocation
|
page read and write
|
||
1B5EECA5000
|
heap
|
page read and write
|
||
10D0DDF000
|
stack
|
page read and write
|
||
2361976A000
|
heap
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
1B90118D000
|
heap
|
page read and write
|
||
1E0B9AFD000
|
trusted library allocation
|
page read and write
|
||
1E0AAACF000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
1B5EECEB000
|
heap
|
page read and write
|
||
1E207B03000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
12F79B99000
|
heap
|
page read and write
|
||
12F613AE000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
2491E932000
|
heap
|
page read and write
|
||
23619C38000
|
heap
|
page read and write
|
||
22D6B393000
|
heap
|
page read and write
|
||
7FFD9BCE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
2349CB10000
|
heap
|
page read and write
|
||
23619C4C000
|
heap
|
page read and write
|
||
1B901649000
|
heap
|
page read and write
|
||
B7B5EFE000
|
stack
|
page read and write
|
||
1E0C1DB6000
|
heap
|
page execute and read and write
|
||
588967E000
|
stack
|
page read and write
|
||
1B5EECA8000
|
heap
|
page read and write
|
||
12BBABF1000
|
trusted library allocation
|
page read and write
|
||
12F5F7F0000
|
trusted library allocation
|
page read and write
|
||
22D6B38E000
|
heap
|
page read and write
|
||
588947D000
|
stack
|
page read and write
|
||
1E0B9811000
|
trusted library allocation
|
page read and write
|
||
1B901617000
|
heap
|
page read and write
|
||
12F79FBD000
|
heap
|
page read and write
|
||
223BE9FD000
|
trusted library allocation
|
page read and write
|
||
12F613A3000
|
trusted library allocation
|
page read and write
|
||
1B5EECC3000
|
heap
|
page read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
B291CFE000
|
stack
|
page read and write
|
||
2349AAF0000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
2349AB6A000
|
heap
|
page read and write
|
||
24938ABA000
|
heap
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
2349ABB0000
|
heap
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
12BD17E0000
|
heap
|
page execute and read and write
|
||
23619632000
|
heap
|
page read and write
|
||
7FFD9B99D000
|
trusted library allocation
|
page execute and read and write
|
||
125AEE10000
|
heap
|
page read and write
|
||
7FFD9BCC0000
|
trusted library allocation
|
page read and write
|
||
22D6B3A2000
|
heap
|
page read and write
|
||
22D6B8FA000
|
heap
|
page read and write
|
||
23619C67000
|
heap
|
page read and write
|
||
7FFD9BCC0000
|
trusted library allocation
|
page read and write
|
||
1B5EF391000
|
heap
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
1E20413E000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
1B901649000
|
heap
|
page read and write
|
||
12BD1A2E000
|
heap
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
1E0C1EF3000
|
heap
|
page read and write
|
||
5B000FE000
|
stack
|
page read and write
|
||
1B900E6B000
|
heap
|
page read and write
|
||
1E207A3D000
|
trusted library allocation
|
page read and write
|
||
23619762000
|
heap
|
page read and write
|
||
3733DC7000
|
stack
|
page read and write
|
||
1B5F0C04000
|
heap
|
page read and write
|
||
22D6B376000
|
heap
|
page read and write
|
||
236195C1000
|
heap
|
page read and write
|
||
1B90111A000
|
heap
|
page read and write
|
||
24921D2D000
|
trusted library allocation
|
page read and write
|
||
10D21CE000
|
stack
|
page read and write
|
||
B7B5BFE000
|
stack
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
12F5FA00000
|
heap
|
page read and write
|
||
1E0AA3EA000
|
trusted library allocation
|
page read and write
|
||
37342FF000
|
stack
|
page read and write
|
||
2349AAE0000
|
trusted library allocation
|
page read and write
|
||
2349AAE0000
|
trusted library allocation
|
page read and write
|
||
22D6BA4A000
|
heap
|
page read and write
|
||
7FFD9B9DD000
|
trusted library allocation
|
page execute and read and write
|
||
1E0AA401000
|
trusted library allocation
|
page read and write
|
||
1E0AABBF000
|
trusted library allocation
|
page read and write
|
||
12BBA96A000
|
trusted library allocation
|
page read and write
|
||
1B90118E000
|
heap
|
page read and write
|
||
7FFD9BB32000
|
trusted library allocation
|
page read and write
|
||
23619644000
|
heap
|
page read and write
|
||
2349CB11000
|
heap
|
page read and write
|
||
16652FF000
|
stack
|
page read and write
|
||
12F617FB000
|
trusted library allocation
|
page read and write
|
||
1B90161C000
|
heap
|
page read and write
|
||
7FFD9BD73000
|
trusted library allocation
|
page read and write
|
||
2349ABA3000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
1E0AAF7E000
|
trusted library allocation
|
page read and write
|
||
12F5FA0E000
|
heap
|
page read and write
|
||
22D6B8D8000
|
heap
|
page read and write
|
||
22D6B8DF000
|
heap
|
page read and write
|
||
24920380000
|
trusted library allocation
|
page read and write
|
||
1E2040D0000
|
trusted library allocation
|
page read and write
|
||
1B900E26000
|
heap
|
page read and write
|
||
1B5F0C14000
|
heap
|
page read and write
|
||
1E2078AA000
|
trusted library allocation
|
page read and write
|
||
12F613C1000
|
trusted library allocation
|
page read and write
|
||
1B900E43000
|
heap
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page execute and read and write
|
||
223BCF05000
|
heap
|
page read and write
|
||
2349AB9C000
|
heap
|
page read and write
|
||
2349B12B000
|
heap
|
page read and write
|
||
1B901624000
|
heap
|
page read and write
|
||
1E207361000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
12F795A4000
|
heap
|
page read and write
|
||
7FFD9B984000
|
trusted library allocation
|
page read and write
|
||
B7B5AFD000
|
stack
|
page read and write
|
||
1E0C1DE0000
|
heap
|
page read and write
|
||
12BC93C0000
|
trusted library allocation
|
page read and write
|
||
1B5EECD7000
|
heap
|
page read and write
|
||
1B900E52000
|
heap
|
page read and write
|
||
1E0A7CF0000
|
heap
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA56000
|
trusted library allocation
|
page read and write
|
||
23619765000
|
heap
|
page read and write
|
||
23619C4C000
|
heap
|
page read and write
|
||
224A0FE000
|
stack
|
page read and write
|
||
2349B2A3000
|
heap
|
page read and write
|
||
2349AB75000
|
heap
|
page read and write
|
||
1B900E46000
|
heap
|
page read and write
|
||
223BE9D0000
|
heap
|
page read and write
|
||
1E215F64000
|
trusted library allocation
|
page read and write
|
||
1B5EEED5000
|
heap
|
page read and write
|
||
1B901638000
|
heap
|
page read and write
|
||
5B0017C000
|
stack
|
page read and write
|
||
23619C3C000
|
heap
|
page read and write
|
||
1B900E46000
|
heap
|
page read and write
|
||
22D6B39F000
|
heap
|
page read and write
|
||
2349B299000
|
heap
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
2349ABB0000
|
heap
|
page read and write
|
||
2349B278000
|
heap
|
page read and write
|
||
2349AB48000
|
heap
|
page read and write
|
||
12BB771C000
|
heap
|
page read and write
|
||
B291D7B000
|
stack
|
page read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
2249EFE000
|
stack
|
page read and write
|
||
1E0A7D8B000
|
heap
|
page read and write
|
||
22D6B364000
|
heap
|
page read and write
|
||
1B5EECC8000
|
heap
|
page read and write
|
||
1E206B91000
|
trusted library allocation
|
page read and write
|
||
236195FA000
|
heap
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
223D6E40000
|
heap
|
page read and write
|
||
125AEC40000
|
heap
|
page read and write
|
||
7FFD9BB4A000
|
trusted library allocation
|
page read and write
|
||
23619C5F000
|
heap
|
page read and write
|
||
1B900E4F000
|
heap
|
page read and write
|
||
12F617D9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page execute and read and write
|
||
22D6BA4E000
|
heap
|
page read and write
|
||
7FFD9B9FC000
|
trusted library allocation
|
page execute and read and write
|
||
12BB9120000
|
trusted library allocation
|
page read and write
|
||
1B5EF37F000
|
heap
|
page read and write
|
||
22D6B8F9000
|
heap
|
page read and write
|
||
7FFD9BA86000
|
trusted library allocation
|
page execute and read and write
|
||
12F5F660000
|
heap
|
page read and write
|
||
12F5F863000
|
heap
|
page read and write
|
||
12BB9190000
|
trusted library allocation
|
page read and write
|
||
B7B607B000
|
stack
|
page read and write
|
||
12BBAC3C000
|
trusted library allocation
|
page read and write
|
||
10D11FE000
|
stack
|
page read and write
|
||
1E215F00000
|
trusted library allocation
|
page read and write
|
||
2349AB88000
|
heap
|
page read and write
|
||
1E0AB0EC000
|
trusted library allocation
|
page read and write
|
||
2349B29A000
|
heap
|
page read and write
|
||
12F61560000
|
trusted library allocation
|
page read and write
|
||
236198B0000
|
heap
|
page read and write
|
||
1B5EECE4000
|
heap
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page execute and read and write
|
||
1B5EF368000
|
heap
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
B29177A000
|
stack
|
page read and write
|
||
23619640000
|
heap
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
1E0A7CC0000
|
trusted library allocation
|
page read and write
|
||
B2917FE000
|
stack
|
page read and write
|
||
223BEF9F000
|
trusted library allocation
|
page read and write
|
||
236195B2000
|
heap
|
page read and write
|
||
7FFD9BA5C000
|
trusted library allocation
|
page execute and read and write
|
||
1B901644000
|
heap
|
page read and write
|
||
224B2FD000
|
stack
|
page read and write
|
||
1B5EECBE000
|
heap
|
page read and write
|
||
7FFD9BD13000
|
trusted library allocation
|
page read and write
|
||
22D6B384000
|
heap
|
page read and write
|
||
22D6D1F2000
|
heap
|
page read and write
|
||
1B5EECE5000
|
heap
|
page read and write
|
||
1B5EECC3000
|
heap
|
page read and write
|
||
1E0C1FE2000
|
heap
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
1B5EEC87000
|
heap
|
page read and write
|
||
12F6127D000
|
trusted library allocation
|
page read and write
|
||
23619593000
|
heap
|
page read and write
|
||
1B5EECF3000
|
heap
|
page read and write
|
||
1E0AB5D7000
|
trusted library allocation
|
page read and write
|
||
1E0A97E0000
|
heap
|
page execute and read and write
|
||
1BAECE10000
|
heap
|
page read and write
|
||
629C77F000
|
stack
|
page read and write
|
||
1E0C1DB0000
|
heap
|
page execute and read and write
|
||
B29139E000
|
unkown
|
page read and write
|
||
1E0A7E80000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCB0000
|
trusted library allocation
|
page read and write
|
||
1B901117000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
2349AB76000
|
heap
|
page read and write
|
||
7FFD9BCD0000
|
trusted library allocation
|
page read and write
|
||
24938A50000
|
heap
|
page execute and read and write
|
||
373427E000
|
stack
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
1E0A7B40000
|
heap
|
page read and write
|
||
12F61624000
|
trusted library allocation
|
page read and write
|
||
2349AAF5000
|
heap
|
page read and write
|
||
1E0AB621000
|
trusted library allocation
|
page read and write
|
||
223D6DBE000
|
heap
|
page read and write
|
||
12F61523000
|
trusted library allocation
|
page read and write
|
||
B2928CC000
|
stack
|
page read and write
|
||
23619C5F000
|
heap
|
page read and write
|
||
23619550000
|
trusted library allocation
|
page read and write
|
||
1E0A7D5F000
|
heap
|
page read and write
|
||
24930461000
|
trusted library allocation
|
page read and write
|
||
1B5EECA5000
|
heap
|
page read and write
|
||
2491E9F0000
|
trusted library allocation
|
page read and write
|
||
1B901610000
|
heap
|
page read and write
|
||
22499FF000
|
stack
|
page read and write
|
||
7FFD9B9B3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
2491E8B8000
|
heap
|
page read and write
|
||
1B900E61000
|
heap
|
page read and write
|
||
1BAECF10000
|
heap
|
page read and write
|
||
1B901621000
|
heap
|
page read and write
|
||
1B90162B000
|
heap
|
page read and write
|
||
223BCD6D000
|
heap
|
page read and write
|
||
2493887B000
|
heap
|
page read and write
|
||
1B5EEE00000
|
heap
|
page read and write
|
||
7FFD9B9BB000
|
trusted library allocation
|
page read and write
|
||
236195B0000
|
heap
|
page read and write
|
||
12BB7930000
|
heap
|
page read and write
|
||
1E2040E0000
|
heap
|
page read and write
|
||
58891B7000
|
stack
|
page read and write
|
||
1B902EBE000
|
heap
|
page read and write
|
||
223BCF00000
|
heap
|
page read and write
|
||
629C6FE000
|
stack
|
page read and write
|
||
1E0C1CFE000
|
heap
|
page read and write
|
||
2349AB9F000
|
heap
|
page read and write
|
||
1E0A7F45000
|
heap
|
page read and write
|
||
2349ABA9000
|
heap
|
page read and write
|
||
22D6B3A7000
|
heap
|
page read and write
|
||
12F6168D000
|
trusted library allocation
|
page read and write
|
||
2349AB9F000
|
heap
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
23619C37000
|
heap
|
page read and write
|
||
12F6156B000
|
trusted library allocation
|
page read and write
|
||
224A8F5000
|
stack
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
1B5F0C0D000
|
heap
|
page read and write
|
||
12BB93A0000
|
heap
|
page read and write
|
||
B7B6A4E000
|
stack
|
page read and write
|
||
12BC93B1000
|
trusted library allocation
|
page read and write
|
||
2349AB69000
|
heap
|
page read and write
|
||
7041BBE000
|
stack
|
page read and write
|
||
1B5EECA5000
|
heap
|
page read and write
|
||
23619632000
|
heap
|
page read and write
|
||
22D6D1FD000
|
heap
|
page read and write
|
||
1E0AA76F000
|
trusted library allocation
|
page read and write
|
||
1B5EF388000
|
heap
|
page read and write
|
||
7FFD9B9AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
1B5EEE83000
|
heap
|
page read and write
|
||
223BCE1D000
|
heap
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page execute and read and write
|
||
22D6B373000
|
heap
|
page read and write
|
||
7FFD9B982000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB32000
|
trusted library allocation
|
page read and write
|
||
24921092000
|
trusted library allocation
|
page read and write
|
||
12F79BC8000
|
heap
|
page read and write
|
||
12F79B5F000
|
heap
|
page read and write
|
||
223BCD30000
|
heap
|
page read and write
|
||
23619750000
|
trusted library allocation
|
page read and write
|
||
2349AB30000
|
heap
|
page read and write
|
||
1E206191000
|
trusted library allocation
|
page read and write
|
||
223BEADE000
|
trusted library allocation
|
page read and write
|
||
1B5EEC89000
|
heap
|
page read and write
|
||
7FFD9BCE0000
|
trusted library allocation
|
page read and write
|
||
1B5EF399000
|
heap
|
page read and write
|
||
5A08C78000
|
stack
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
236195B2000
|
heap
|
page read and write
|
||
7FFD9B99D000
|
trusted library allocation
|
page execute and read and write
|
||
12BB7765000
|
heap
|
page read and write
|
||
7FFD9BC43000
|
trusted library allocation
|
page read and write
|
||
2361957D000
|
heap
|
page read and write
|
||
22D6B904000
|
heap
|
page read and write
|
||
1E206122000
|
trusted library allocation
|
page read and write
|
||
10D10FF000
|
unkown
|
page read and write
|
||
23619593000
|
heap
|
page read and write
|
||
2349AB8C000
|
heap
|
page read and write
|
||
12F6157C000
|
trusted library allocation
|
page read and write
|
||
1B5EF377000
|
heap
|
page read and write
|
||
22D6B58B000
|
heap
|
page read and write
|
||
1B900E46000
|
heap
|
page read and write
|
||
12F617EF000
|
trusted library allocation
|
page read and write
|
||
1B901000000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD10000
|
trusted library allocation
|
page read and write
|
||
2491EA10000
|
trusted library allocation
|
page read and write
|
||
12BB77F0000
|
heap
|
page read and write
|
||
2491E934000
|
heap
|
page read and write
|
||
1E21E236000
|
heap
|
page read and write
|
||
1E204167000
|
heap
|
page read and write
|
||
12F61312000
|
trusted library allocation
|
page read and write
|
||
12F61697000
|
trusted library allocation
|
page read and write
|
||
12F61629000
|
trusted library allocation
|
page read and write
|
||
22D6B366000
|
heap
|
page read and write
|
||
7FFD9BDE0000
|
trusted library allocation
|
page read and write
|
||
22D6B8E4000
|
heap
|
page read and write
|
||
223D6F62000
|
heap
|
page read and write
|
||
223BEA3E000
|
trusted library allocation
|
page read and write
|
||
24921A62000
|
trusted library allocation
|
page read and write
|
||
166527F000
|
stack
|
page read and write
|
||
1B5EF38B000
|
heap
|
page read and write
|
||
12F615D1000
|
trusted library allocation
|
page read and write
|
||
1E0C1D16000
|
heap
|
page read and write
|
||
12BD17E7000
|
heap
|
page execute and read and write
|
||
23619C30000
|
heap
|
page read and write
|
||
5A08E7F000
|
stack
|
page read and write
|
||
10D15F9000
|
stack
|
page read and write
|
||
23619620000
|
heap
|
page read and write
|
||
1E205DB0000
|
heap
|
page read and write
|
||
23619764000
|
heap
|
page read and write
|
||
5B7F7DE000
|
stack
|
page read and write
|
||
23619636000
|
heap
|
page read and write
|
||
7FFD9BCC0000
|
trusted library allocation
|
page read and write
|
||
223BCD8D000
|
heap
|
page read and write
|
||
7FFD9B9A3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page execute and read and write
|
||
249387DB000
|
heap
|
page read and write
|
||
7FFD9B9A3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
12F61576000
|
trusted library allocation
|
page read and write
|
||
1E204220000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page execute and read and write
|
||
1E2160A6000
|
trusted library allocation
|
page read and write
|
||
12BB7768000
|
heap
|
page read and write
|
||
12BB78F0000
|
heap
|
page read and write
|
||
7FFD9BA0C000
|
trusted library allocation
|
page execute and read and write
|
||
1E204260000
|
trusted library allocation
|
page read and write
|
||
1B5EEED0000
|
heap
|
page read and write
|
||
24921BF6000
|
trusted library allocation
|
page read and write
|
||
10D17FB000
|
stack
|
page read and write
|
||
1E203F30000
|
heap
|
page read and write
|
||
24920461000
|
trusted library allocation
|
page read and write
|
||
23619636000
|
heap
|
page read and write
|
||
1E21E277000
|
heap
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page execute and read and write
|
||
224B1F8000
|
stack
|
page read and write
|
||
24921FAE000
|
trusted library allocation
|
page read and write
|
||
22D6B3AD000
|
heap
|
page read and write
|
||
22D6B365000
|
heap
|
page read and write
|
||
5B7FD7E000
|
stack
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
1BAED205000
|
heap
|
page read and write
|
||
12BB91D0000
|
trusted library allocation
|
page read and write
|
||
12F613A6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
1E0AA762000
|
trusted library allocation
|
page read and write
|
||
12F79BD4000
|
heap
|
page read and write
|
||
2349B299000
|
heap
|
page read and write
|
||
1E0A7D88000
|
heap
|
page read and write
|
||
12F6155C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page execute and read and write
|
||
23619730000
|
heap
|
page read and write
|
||
1B5EF37F000
|
heap
|
page read and write
|
||
1B902EBD000
|
heap
|
page read and write
|
||
23619632000
|
heap
|
page read and write
|
||
1B5EECA8000
|
heap
|
page read and write
|
||
7FFD9BB31000
|
trusted library allocation
|
page read and write
|
||
223D6E20000
|
heap
|
page read and write
|
||
2491E8F9000
|
heap
|
page read and write
|
||
7FFD9BB51000
|
trusted library allocation
|
page read and write
|
||
22D6B384000
|
heap
|
page read and write
|
||
223BCE60000
|
trusted library allocation
|
page read and write
|
||
249304E2000
|
trusted library allocation
|
page read and write
|
||
236195E1000
|
heap
|
page read and write
|
||
1B5EEC59000
|
heap
|
page read and write
|
||
1B90162B000
|
heap
|
page read and write
|
||
223D6DFD000
|
heap
|
page read and write
|
||
5A08DFE000
|
stack
|
page read and write
|
||
1E0A7D4D000
|
heap
|
page read and write
|
||
5B7FA7E000
|
stack
|
page read and write
|
||
7FFD9BB4A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
223BCEA0000
|
trusted library allocation
|
page read and write
|
||
1B901185000
|
heap
|
page read and write
|
||
70421FC000
|
stack
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
223BCE20000
|
heap
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
2491EAB5000
|
heap
|
page read and write
|
||
2349AB67000
|
heap
|
page read and write
|
||
2491E9B0000
|
heap
|
page read and write
|
||
12BB9210000
|
heap
|
page read and write
|
||
2349AAFE000
|
heap
|
page read and write
|
||
23619C5F000
|
heap
|
page read and write
|
||
22D6BA44000
|
heap
|
page read and write
|
||
12F5F940000
|
trusted library allocation
|
page read and write
|
||
23619C5A000
|
heap
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
1B901180000
|
heap
|
page read and write
|
||
23619632000
|
heap
|
page read and write
|
||
1B900E61000
|
heap
|
page read and write
|
||
7FFD9BB42000
|
trusted library allocation
|
page read and write
|
||
22D6B372000
|
heap
|
page read and write
|
||
2349B2A2000
|
heap
|
page read and write
|
||
12F61565000
|
trusted library allocation
|
page read and write
|
||
1E0A97D0000
|
heap
|
page read and write
|
||
1E0A9780000
|
heap
|
page execute and read and write
|
||
12BD1910000
|
heap
|
page read and write
|
||
1B90111A000
|
heap
|
page read and write
|
||
7041B3F000
|
unkown
|
page read and write
|
||
7FFD9B9AB000
|
trusted library allocation
|
page read and write
|
||
1B5EF36C000
|
heap
|
page read and write
|
||
2349AB93000
|
heap
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
2349AB48000
|
heap
|
page read and write
|
||
223BEAF4000
|
trusted library allocation
|
page read and write
|
||
1B900E53000
|
heap
|
page read and write
|
||
223D6F20000
|
heap
|
page read and write
|
||
22D6B384000
|
heap
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page execute and read and write
|
||
23619629000
|
heap
|
page read and write
|
||
249304D5000
|
trusted library allocation
|
page read and write
|
||
1B5EEC68000
|
heap
|
page read and write
|
||
1B5EECA5000
|
heap
|
page read and write
|
||
23619640000
|
heap
|
page read and write
|
||
7041BFE000
|
stack
|
page read and write
|
||
22D6B338000
|
heap
|
page read and write
|
||
1E205CF7000
|
heap
|
page execute and read and write
|
||
1B900E2A000
|
heap
|
page read and write
|
||
12F6162F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
1B5EEE8E000
|
heap
|
page read and write
|
||
22D6B2A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
2491E8B0000
|
heap
|
page read and write
|
||
B2919F6000
|
stack
|
page read and write
|
||
2349CB24000
|
heap
|
page read and write
|
||
10D177E000
|
stack
|
page read and write
|
||
7DF4564E0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
1B5EF371000
|
heap
|
page read and write
|
||
7FFD9BCD0000
|
trusted library allocation
|
page read and write
|
||
5A08D7D000
|
stack
|
page read and write
|
||
1E0A9CBD000
|
trusted library allocation
|
page read and write
|
||
22D6B905000
|
heap
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
1B5F0C01000
|
heap
|
page read and write
|
||
224AEFE000
|
stack
|
page read and write
|
||
2361957D000
|
heap
|
page read and write
|
||
1E0A7CA0000
|
trusted library section
|
page read and write
|
||
2493886D000
|
heap
|
page read and write
|
||
1B5EF373000
|
heap
|
page read and write
|
||
1E205C5A000
|
heap
|
page read and write
|
||
236195E1000
|
heap
|
page read and write
|
||
5B7FB7E000
|
stack
|
page read and write
|
||
12F5F866000
|
heap
|
page read and write
|
||
223BE7E5000
|
heap
|
page read and write
|
||
12F617B9000
|
trusted library allocation
|
page read and write
|
||
1B5EEC86000
|
heap
|
page read and write
|
||
12BB9370000
|
heap
|
page execute and read and write
|
||
236195BA000
|
heap
|
page read and write
|
||
12BB7722000
|
heap
|
page read and write
|
||
12F612A0000
|
trusted library allocation
|
page read and write
|
||
7042279000
|
stack
|
page read and write
|
||
2349AB9A000
|
heap
|
page read and write
|
||
7FFD9BD90000
|
trusted library allocation
|
page read and write
|
||
12F6169B000
|
trusted library allocation
|
page read and write
|
||
2349AB85000
|
heap
|
page read and write
|
||
2349ABA3000
|
heap
|
page read and write
|
||
22D6D1FD000
|
heap
|
page read and write
|
||
1B900E5C000
|
heap
|
page read and write
|
||
B7B5DFC000
|
stack
|
page read and write
|
||
12BD18A7000
|
heap
|
page read and write
|
||
224A3FE000
|
stack
|
page read and write
|
||
704247B000
|
stack
|
page read and write
|
||
7DF4A9B80000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B98D000
|
trusted library allocation
|
page execute and read and write
|
||
1E0AA3F7000
|
trusted library allocation
|
page read and write
|
||
22D6B2A0000
|
trusted library allocation
|
page read and write
|
||
1B5EEE85000
|
heap
|
page read and write
|
||
1E205E90000
|
heap
|
page execute and read and write
|
||
B7B5F7F000
|
stack
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
249387A0000
|
heap
|
page read and write
|
||
22D6D1F4000
|
heap
|
page read and write
|
||
12BB9150000
|
heap
|
page readonly
|
||
1B5EECF6000
|
heap
|
page read and write
|
||
2349B282000
|
heap
|
page read and write
|
||
22D6BA4E000
|
heap
|
page read and write
|
||
22D6B8F9000
|
heap
|
page read and write
|
||
236195B2000
|
heap
|
page read and write
|
||
70420F9000
|
stack
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
23619C4C000
|
heap
|
page read and write
|
||
1B902EC4000
|
heap
|
page read and write
|
||
629C2F8000
|
stack
|
page read and write
|
||
2349B122000
|
heap
|
page read and write
|
||
24921A1B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
224A5FE000
|
stack
|
page read and write
|
||
7FFD9BCD0000
|
trusted library allocation
|
page read and write
|
||
1B901624000
|
heap
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
1B900E70000
|
heap
|
page read and write
|
||
10D12FE000
|
stack
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
22D6BA42000
|
heap
|
page read and write
|
||
23619572000
|
heap
|
page read and write
|
||
2491E770000
|
heap
|
page read and write
|
||
12F61789000
|
trusted library allocation
|
page read and write
|
||
1B900E26000
|
heap
|
page read and write
|
||
7FFD9BA66000
|
trusted library allocation
|
page execute and read and write
|
||
12BB773C000
|
heap
|
page read and write
|
||
7FFD9BA56000
|
trusted library allocation
|
page read and write
|
||
12F7A370000
|
heap
|
page read and write
|
||
1E207A4A000
|
trusted library allocation
|
page read and write
|
||
12F79AEE000
|
heap
|
page read and write
|
||
125AEFD5000
|
heap
|
page read and write
|
||
1BAECF70000
|
heap
|
page read and write
|
||
B29274E000
|
stack
|
page read and write
|
||
236195C4000
|
heap
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
10D16FF000
|
stack
|
page read and write
|
||
7FFD9BD30000
|
trusted library allocation
|
page read and write
|
||
22D6BA45000
|
heap
|
page read and write
|
||
12F5F5DC000
|
unkown
|
page readonly
|
||
224ACFB000
|
stack
|
page read and write
|
||
236195F2000
|
heap
|
page read and write
|
||
1B90161E000
|
heap
|
page read and write
|
||
1B5F0C02000
|
heap
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
12F5FA05000
|
heap
|
page read and write
|
||
1E0A7CB0000
|
trusted library section
|
page read and write
|
||
7FFD9BA66000
|
trusted library allocation
|
page read and write
|
||
1B5EECE8000
|
heap
|
page read and write
|
||
224A4FE000
|
stack
|
page read and write
|
||
24920447000
|
heap
|
page execute and read and write
|
||
2349AD00000
|
trusted library allocation
|
page read and write
|
||
24938930000
|
heap
|
page read and write
|
||
2491E870000
|
heap
|
page read and write
|
||
23619598000
|
heap
|
page read and write
|
||
224B3F6000
|
stack
|
page read and write
|
||
37340FE000
|
stack
|
page read and write
|
||
1B90163B000
|
heap
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
22D6B3AD000
|
heap
|
page read and write
|
||
22D6B3A5000
|
heap
|
page read and write
|
||
23619520000
|
heap
|
page read and write
|
||
12F5F826000
|
heap
|
page read and write
|
||
22D6B8FF000
|
heap
|
page read and write
|
||
12F5F82C000
|
heap
|
page read and write
|
||
7FFD9BDB0000
|
trusted library allocation
|
page execute and read and write
|
||
1E207394000
|
trusted library allocation
|
page read and write
|
||
1B900DE0000
|
heap
|
page read and write
|
||
236195B2000
|
heap
|
page read and write
|
||
1E205F78000
|
trusted library allocation
|
page read and write
|
||
1E0A7D45000
|
heap
|
page read and write
|
||
B7B57CF000
|
stack
|
page read and write
|
||
2361B584000
|
heap
|
page read and write
|
||
12F61754000
|
trusted library allocation
|
page read and write
|
||
224A1FC000
|
stack
|
page read and write
|
||
7FFD9BA76000
|
trusted library allocation
|
page execute and read and write
|
||
12F79DE6000
|
heap
|
page read and write
|
||
1B5EECAE000
|
heap
|
page read and write
|
||
22D6B8F9000
|
heap
|
page read and write
|
||
236195C2000
|
heap
|
page read and write
|
||
1E0AB063000
|
trusted library allocation
|
page read and write
|
||
2349AB66000
|
heap
|
page read and write
|
||
223BE7C6000
|
heap
|
page execute and read and write
|
||
1B900E53000
|
heap
|
page read and write
|
||
24938823000
|
heap
|
page read and write
|
||
2349AAC0000
|
heap
|
page read and write
|
||
23619C65000
|
heap
|
page read and write
|
||
1B5EF388000
|
heap
|
page read and write
|
||
2349ABAB000
|
heap
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
70423FE000
|
stack
|
page read and write
|
||
23619632000
|
heap
|
page read and write
|
||
23619C59000
|
heap
|
page read and write
|
||
1E0C1CA0000
|
heap
|
page read and write
|
||
2349B284000
|
heap
|
page read and write
|
||
1E205EE0000
|
heap
|
page execute and read and write
|
||
1E0AA916000
|
trusted library allocation
|
page read and write
|
||
1B901618000
|
heap
|
page read and write
|
||
1B5EF374000
|
heap
|
page read and write
|
||
1B5EEC20000
|
heap
|
page read and write
|
||
1B900E28000
|
heap
|
page read and write
|
||
236198BB000
|
heap
|
page read and write
|
||
2349AB98000
|
heap
|
page read and write
|
||
1B901639000
|
heap
|
page read and write
|
||
223BCD7B000
|
heap
|
page read and write
|
||
1B900E51000
|
heap
|
page read and write
|
||
12F61353000
|
trusted library allocation
|
page read and write
|
||
12F617BF000
|
trusted library allocation
|
page read and write
|
||
2361976E000
|
heap
|
page read and write
|
||
23619C42000
|
heap
|
page read and write
|
||
373417E000
|
stack
|
page read and write
|
||
1B5EECA3000
|
heap
|
page read and write
|
||
12F615E6000
|
trusted library allocation
|
page read and write
|
||
12F5F7D0000
|
trusted library allocation
|
page read and write
|
||
1B900E4B000
|
heap
|
page read and write
|
||
1E2040B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page execute and read and write
|
||
1E2041E0000
|
heap
|
page readonly
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
23619C45000
|
heap
|
page read and write
|
||
223BE7C0000
|
heap
|
page execute and read and write
|
||
1E0B9ADF000
|
trusted library allocation
|
page read and write
|
||
22D6B367000
|
heap
|
page read and write
|
||
1E21E259000
|
heap
|
page read and write
|
||
1E204070000
|
heap
|
page read and write
|
||
2349CB24000
|
heap
|
page read and write
|
||
1B5F0C0D000
|
heap
|
page read and write
|
||
1E2077BC000
|
trusted library allocation
|
page read and write
|
||
1E2041DA000
|
heap
|
page read and write
|
||
23619569000
|
heap
|
page read and write
|
||
1E207B07000
|
trusted library allocation
|
page read and write
|
||
1B900E31000
|
heap
|
page read and write
|
||
12F5F780000
|
heap
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
1B5EECAE000
|
heap
|
page read and write
|
||
2349B299000
|
heap
|
page read and write
|
||
1B5EEE87000
|
heap
|
page read and write
|
||
1B5EEE87000
|
heap
|
page read and write
|
||
7FFD9B994000
|
trusted library allocation
|
page read and write
|
||
224AFF7000
|
stack
|
page read and write
|
||
223BCE30000
|
heap
|
page read and write
|
||
12BC9432000
|
trusted library allocation
|
page read and write
|
||
704207F000
|
stack
|
page read and write
|
||
37341FF000
|
stack
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
223D6D59000
|
heap
|
page read and write
|
||
22D6B38F000
|
heap
|
page read and write
|
||
12F6181A000
|
trusted library allocation
|
page read and write
|
||
1B5F0C0D000
|
heap
|
page read and write
|
||
7FFD9BA86000
|
trusted library allocation
|
page execute and read and write
|
||
22D6B2D0000
|
heap
|
page read and write
|
||
2361976E000
|
heap
|
page read and write
|
||
7FFD9BDA0000
|
trusted library allocation
|
page read and write
|
||
22D6B397000
|
heap
|
page read and write
|
||
22D6B363000
|
heap
|
page read and write
|
||
12F79B5D000
|
heap
|
page read and write
|
||
1E0AB5FC000
|
trusted library allocation
|
page read and write
|
||
5B7F793000
|
stack
|
page read and write
|
||
24920440000
|
heap
|
page execute and read and write
|
||
2349AB96000
|
heap
|
page read and write
|
||
1B5EF391000
|
heap
|
page read and write
|
||
1E0B9821000
|
trusted library allocation
|
page read and write
|
||
1B5EEC40000
|
trusted library allocation
|
page read and write
|
||
1E2040E8000
|
heap
|
page read and write
|
||
1E0C1CDA000
|
heap
|
page read and write
|
||
22D6B386000
|
heap
|
page read and write
|
||
1E0C1F8B000
|
heap
|
page read and write
|
||
2349AB88000
|
heap
|
page read and write
|
||
1B5EECB9000
|
heap
|
page read and write
|
||
24930470000
|
trusted library allocation
|
page read and write
|
||
2361B57E000
|
heap
|
page read and write
|
||
236195C3000
|
heap
|
page read and write
|
||
2361B570000
|
heap
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
1E205BA5000
|
heap
|
page read and write
|
||
1E0C201A000
|
heap
|
page read and write
|
||
1E0A9877000
|
trusted library allocation
|
page read and write
|
||
22D6BA4B000
|
heap
|
page read and write
|
||
23619577000
|
heap
|
page read and write
|
||
1E0A7C40000
|
heap
|
page read and write
|
||
7FFD9BB51000
|
trusted library allocation
|
page read and write
|
||
1B900E61000
|
heap
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
2349AAFD000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page execute and read and write
|
||
12BD186D000
|
heap
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page execute and read and write
|
||
704237E000
|
stack
|
page read and write
|
||
2349B284000
|
heap
|
page read and write
|
||
7041AB3000
|
stack
|
page read and write
|
||
12F61265000
|
trusted library allocation
|
page read and write
|
||
B29167E000
|
stack
|
page read and write
|
||
1B900E57000
|
heap
|
page read and write
|
||
1E0AAB3C000
|
trusted library allocation
|
page read and write
|
||
12F61717000
|
trusted library allocation
|
page read and write
|
||
2349B288000
|
heap
|
page read and write
|
||
1B900E26000
|
heap
|
page read and write
|
||
12F616BA000
|
trusted library allocation
|
page read and write
|
||
1B5EECAE000
|
heap
|
page read and write
|
||
23619639000
|
heap
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
22D6B386000
|
heap
|
page read and write
|
||
7FFD9BA46000
|
trusted library allocation
|
page read and write
|
||
4F8B07F000
|
stack
|
page read and write
|
||
1B5F0C14000
|
heap
|
page read and write
|
||
1E204105000
|
heap
|
page read and write
|
||
22D6B8F9000
|
heap
|
page read and write
|
||
1B900E08000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
B7B5CF6000
|
stack
|
page read and write
|
||
1B5EF367000
|
heap
|
page read and write
|
||
1E205BDC000
|
heap
|
page read and write
|
||
12F7A170000
|
heap
|
page read and write
|
||
224AAFD000
|
stack
|
page read and write
|
||
1B5EEEDE000
|
heap
|
page read and write
|
||
7FFD9BCB3000
|
trusted library allocation
|
page read and write
|
||
1B901030000
|
heap
|
page read and write
|
||
223BCE90000
|
heap
|
page readonly
|
||
12BD19F0000
|
heap
|
page read and write
|
||
1B900E42000
|
heap
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page execute and read and write
|
||
2349CB24000
|
heap
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
236195BF000
|
heap
|
page read and write
|
||
1B5EEEDD000
|
heap
|
page read and write
|
||
1B90111E000
|
heap
|
page read and write
|
||
12BBAC79000
|
trusted library allocation
|
page read and write
|
||
B7B5683000
|
stack
|
page read and write
|
||
2349AB95000
|
heap
|
page read and write
|
||
2361B571000
|
heap
|
page read and write
|
||
629C67E000
|
stack
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9BB000
|
trusted library allocation
|
page read and write
|
||
2493887F000
|
heap
|
page read and write
|
||
7FFD9BCD9000
|
trusted library allocation
|
page read and write
|
||
1E0AA242000
|
trusted library allocation
|
page read and write
|
||
23619C4C000
|
heap
|
page read and write
|
||
2349ABAA000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B993000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB72000
|
trusted library allocation
|
page read and write
|
||
22D6B373000
|
heap
|
page read and write
|
||
12F79AD0000
|
heap
|
page execute and read and write
|
||
1B5EECA0000
|
heap
|
page read and write
|
||
2491EA70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
1E0A7CF5000
|
heap
|
page read and write
|
||
24930618000
|
trusted library allocation
|
page read and write
|
||
1E0A7E40000
|
trusted library allocation
|
page read and write
|
||
23619593000
|
heap
|
page read and write
|
||
12BD18A9000
|
heap
|
page read and write
|
||
1E0AA75A000
|
trusted library allocation
|
page read and write
|
||
1E21E232000
|
heap
|
page read and write
|
||
B29294E000
|
stack
|
page read and write
|
||
22D6B386000
|
heap
|
page read and write
|
||
2349B12A000
|
heap
|
page read and write
|
||
1BAED200000
|
heap
|
page read and write
|
||
7FFD9BCE8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA96000
|
trusted library allocation
|
page execute and read and write
|
||
1B902EB1000
|
heap
|
page read and write
|
||
5B7FAFE000
|
stack
|
page read and write
|
||
1B900FE0000
|
heap
|
page read and write
|
||
1E205D10000
|
heap
|
page read and write
|
||
24938A70000
|
heap
|
page read and write
|
||
223BEADB000
|
trusted library allocation
|
page read and write
|
||
1E205BC0000
|
heap
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
224A6FD000
|
stack
|
page read and write
|
||
1E0AA8B2000
|
trusted library allocation
|
page read and write
|
||
223BCCC0000
|
heap
|
page read and write
|
||
12BBAFC3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A4000
|
trusted library allocation
|
page read and write
|
||
1664FDE000
|
unkown
|
page read and write
|
||
1B900E69000
|
heap
|
page read and write
|
||
223BE9A0000
|
heap
|
page execute and read and write
|
||
1B90161C000
|
heap
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page execute and read and write
|
||
125AEE50000
|
heap
|
page read and write
|
||
23619C41000
|
heap
|
page read and write
|
||
2491E90B000
|
heap
|
page read and write
|
||
1B900E31000
|
heap
|
page read and write
|
||
7FFD9BB82000
|
trusted library allocation
|
page read and write
|
||
1B5EF37F000
|
heap
|
page read and write
|
||
223BEB30000
|
trusted library allocation
|
page read and write
|
||
2349AB99000
|
heap
|
page read and write
|
||
1B5EF37F000
|
heap
|
page read and write
|
||
23619C4C000
|
heap
|
page read and write
|
||
7FFD9B993000
|
trusted library allocation
|
page execute and read and write
|
||
1E0AB089000
|
trusted library allocation
|
page read and write
|
||
2361B57D000
|
heap
|
page read and write
|
||
22D6B907000
|
heap
|
page read and write
|
||
12F613B8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCE0000
|
trusted library allocation
|
page read and write
|
||
2361957D000
|
heap
|
page read and write
|
||
1B901114000
|
heap
|
page read and write
|
||
1E204122000
|
heap
|
page read and write
|
||
12BB7724000
|
heap
|
page read and write
|
||
7FFD9BB3A000
|
trusted library allocation
|
page read and write
|
||
1B5EECEA000
|
heap
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
There are 1546 hidden memdumps, click here to show them.