Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
MicrosoftEdgeWebview2.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\MicrosoftEdgeWebview2.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MicrosoftEdgeWebview2.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
Generic INItialization configuration [WIN]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_34iwqt4s.0t5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3gaqwihj.o0i.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4jinyxfh.h4e.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5xpncdbv.z2s.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b42rrvsg.ld5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ctdchimt.qhv.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fxbxkrae.fgq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hjflzlkn.dne.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lff3tido.w3q.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p3bsye50.i2l.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ubuc4jkz.nxp.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v1gftxz3.umf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vlt3hmss.vpl.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yuvqzeoe.vq0.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yvar1kmp.cjy.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zeryj23e.2te.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MicrosoftEdgeWebview2.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 30 04:18:50
2024, mtime=Fri Aug 30 04:18:50 2024, atime=Fri Aug 30 04:18:50 2024, length=64000, window=hide
|
dropped
|
There are 12 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\MicrosoftEdgeWebview2.exe
|
"C:\Users\user\Desktop\MicrosoftEdgeWebview2.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\MicrosoftEdgeWebview2.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'MicrosoftEdgeWebview2.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\MicrosoftEdgeWebview2.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'MicrosoftEdgeWebview2.exe'
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "MicrosoftEdgeWebview2" /tr "C:\Users\user\AppData\Local\Temp\MicrosoftEdgeWebview2.exe"
|
||
C:\Users\user\AppData\Local\Temp\MicrosoftEdgeWebview2.exe
|
C:\Users\user\AppData\Local\Temp\MicrosoftEdgeWebview2.exe
|
||
C:\Users\user\AppData\Local\Temp\MicrosoftEdgeWebview2.exe
|
"C:\Users\user\AppData\Local\Temp\MicrosoftEdgeWebview2.exe"
|
||
C:\Users\user\AppData\Local\Temp\MicrosoftEdgeWebview2.exe
|
C:\Users\user\AppData\Local\Temp\MicrosoftEdgeWebview2.exe
|
||
C:\Users\user\AppData\Local\Temp\MicrosoftEdgeWebview2.exe
|
"C:\Users\user\AppData\Local\Temp\MicrosoftEdgeWebview2.exe"
|
||
C:\Users\user\AppData\Local\Temp\MicrosoftEdgeWebview2.exe
|
C:\Users\user\AppData\Local\Temp\MicrosoftEdgeWebview2.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 6 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
on-weighted.gl.at.ply.gg
|
|||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://crl.microse
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://www.microsoft.
|
unknown
|
||
http://crl.micft.cMicRosof
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
There are 7 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
on-weighted.gl.at.ply.gg
|
147.185.221.20
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
147.185.221.20
|
on-weighted.gl.at.ply.gg
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
MicrosoftEdgeWebview2
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
8E2000
|
unkown
|
page readonly
|
||
7FFD9B5A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
7FFD9B67C000
|
trusted library allocation
|
page execute and read and write
|
||
19B880C0000
|
heap
|
page read and write
|
||
19B891E3000
|
trusted library allocation
|
page read and write
|
||
D35000
|
heap
|
page read and write
|
||
7FFD9B8D0000
|
trusted library allocation
|
page read and write
|
||
F00000
|
trusted library allocation
|
page read and write
|
||
1593E8D3000
|
trusted library allocation
|
page read and write
|
||
415477D000
|
stack
|
page read and write
|
||
4154ABE000
|
stack
|
page read and write
|
||
D00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5CD000
|
trusted library allocation
|
page execute and read and write
|
||
19B866B0000
|
heap
|
page read and write
|
||
D45000
|
heap
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page execute and read and write
|
||
273BACC000
|
stack
|
page read and write
|
||
126F1000
|
trusted library allocation
|
page read and write
|
||
1BA0F000
|
stack
|
page read and write
|
||
135B000
|
heap
|
page read and write
|
||
16A010C1000
|
trusted library allocation
|
page read and write
|
||
41541F3000
|
stack
|
page read and write
|
||
7FFD9B7D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
19B8A050000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page read and write
|
||
19B86690000
|
heap
|
page read and write
|
||
7FFD9B5A4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A2000
|
trusted library allocation
|
page read and write
|
||
FAF000
|
heap
|
page read and write
|
||
41545FA000
|
stack
|
page read and write
|
||
19BA0950000
|
heap
|
page read and write
|
||
1C3CA854000
|
trusted library allocation
|
page read and write
|
||
16A6980A000
|
heap
|
page read and write
|
||
273ADFE000
|
stack
|
page read and write
|
||
273A8FE000
|
stack
|
page read and write
|
||
7FFD9B8E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B676000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B594000
|
trusted library allocation
|
page read and write
|
||
1593B680000
|
heap
|
page execute and read and write
|
||
1593E075000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5EC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
1594D055000
|
trusted library allocation
|
page read and write
|
||
19BA0974000
|
heap
|
page read and write
|
||
F75000
|
heap
|
page read and write
|
||
16A011DE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B74A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5AD000
|
trusted library allocation
|
page execute and read and write
|
||
159556D2000
|
heap
|
page read and write
|
||
1B64D000
|
stack
|
page read and write
|
||
273AA77000
|
stack
|
page read and write
|
||
16A6770A000
|
heap
|
page read and write
|
||
1C3D8F00000
|
trusted library allocation
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
1593B600000
|
heap
|
page readonly
|
||
26F1000
|
trusted library allocation
|
page read and write
|
||
1C3CA14A000
|
trusted library allocation
|
page read and write
|
||
19BA09CC000
|
heap
|
page read and write
|
||
1594D011000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5BD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B5A0000
|
trusted library allocation
|
page read and write
|
||
1593E286000
|
trusted library allocation
|
page read and write
|
||
2A50000
|
heap
|
page execute and read and write
|
||
1593EDE3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5D0000
|
trusted library allocation
|
page read and write
|
||
1C3CA675000
|
trusted library allocation
|
page read and write
|
||
E46000
|
heap
|
page read and write
|
||
7FFD9B5A2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B59D000
|
trusted library allocation
|
page execute and read and write
|
||
4154B3F000
|
stack
|
page read and write
|
||
273AD7E000
|
stack
|
page read and write
|
||
26FF000
|
trusted library allocation
|
page read and write
|
||
1C3CA71B000
|
trusted library allocation
|
page read and write
|
||
16A01E2A000
|
trusted library allocation
|
page read and write
|
||
16A69990000
|
heap
|
page read and write
|
||
1C3C93BD000
|
trusted library allocation
|
page read and write
|
||
1C3CA146000
|
trusted library allocation
|
page read and write
|
||
15955640000
|
heap
|
page read and write
|
||
7FFD9B660000
|
trusted library allocation
|
page read and write
|
||
7FFD9B650000
|
trusted library allocation
|
page execute and read and write
|
||
1C3C8D10000
|
heap
|
page readonly
|
||
19BA05ED000
|
heap
|
page read and write
|
||
1B41E000
|
stack
|
page read and write
|
||
15955835000
|
heap
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
1C3C9FB6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page read and write
|
||
1593D05F000
|
trusted library allocation
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
19BA0BA0000
|
heap
|
page read and write
|
||
7DF403010000
|
trusted library allocation
|
page execute and read and write
|
||
1220000
|
heap
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
41546F7000
|
stack
|
page read and write
|
||
6C28E7F000
|
stack
|
page read and write
|
||
7FFD9B8C0000
|
trusted library allocation
|
page read and write
|
||
7DF45FA20000
|
trusted library allocation
|
page execute and read and write
|
||
D1F000
|
stack
|
page read and write
|
||
273A979000
|
stack
|
page read and write
|
||
1C3E164F000
|
heap
|
page read and write
|
||
19B89331000
|
trusted library allocation
|
page read and write
|
||
159557A2000
|
heap
|
page read and write
|
||
A88000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page execute and read and write
|
||
16A69190000
|
trusted library allocation
|
page read and write
|
||
6C293BE000
|
stack
|
page read and write
|
||
16A10021000
|
trusted library allocation
|
page read and write
|
||
1C3C736C000
|
heap
|
page read and write
|
||
F13000
|
trusted library allocation
|
page read and write
|
||
12CB8000
|
trusted library allocation
|
page read and write
|
||
1D368020000
|
heap
|
page read and write
|
||
B48000
|
heap
|
page read and write
|
||
16A00229000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
16A1030B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77A000
|
trusted library allocation
|
page read and write
|
||
1593E870000
|
trusted library allocation
|
page read and write
|
||
D19000
|
heap
|
page read and write
|
||
16A10031000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
9C903BE000
|
stack
|
page read and write
|
||
7FFD9B914000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page read and write
|
||
12851000
|
trusted library allocation
|
page read and write
|
||
16A699C1000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page execute and read and write
|
||
19B8675E000
|
heap
|
page read and write
|
||
1B700000
|
heap
|
page read and write
|
||
159556DE000
|
heap
|
page read and write
|
||
4154A3E000
|
stack
|
page read and write
|
||
7FFD9B670000
|
trusted library allocation
|
page read and write
|
||
7FFD9B912000
|
trusted library allocation
|
page read and write
|
||
EFB000
|
heap
|
page read and write
|
||
1C720000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
2A61000
|
trusted library allocation
|
page read and write
|
||
7FFD9B686000
|
trusted library allocation
|
page execute and read and write
|
||
16A69150000
|
heap
|
page read and write
|
||
1B47E000
|
stack
|
page read and write
|
||
16A67706000
|
heap
|
page read and write
|
||
1C3C76F5000
|
heap
|
page read and write
|
||
1AC7D000
|
stack
|
page read and write
|
||
AB9000
|
heap
|
page read and write
|
||
16A69797000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
7FFD9B860000
|
trusted library allocation
|
page read and write
|
||
285F000
|
trusted library allocation
|
page read and write
|
||
116F000
|
stack
|
page read and write
|
||
1593B4F2000
|
heap
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
273AEFB000
|
stack
|
page read and write
|
||
6C292B9000
|
stack
|
page read and write
|
||
6C28F7E000
|
stack
|
page read and write
|
||
7FFD9B5EC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page read and write
|
||
1593B690000
|
trusted library allocation
|
page read and write
|
||
CEC000
|
heap
|
page read and write
|
||
7FFD9B5D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5DD000
|
trusted library allocation
|
page execute and read and write
|
||
DB0000
|
heap
|
page read and write
|
||
16A01893000
|
trusted library allocation
|
page read and write
|
||
19B88498000
|
trusted library allocation
|
page read and write
|
||
1C3CAD19000
|
trusted library allocation
|
page read and write
|
||
1C3C7338000
|
heap
|
page read and write
|
||
1593E2B6000
|
trusted library allocation
|
page read and write
|
||
1593B53C000
|
heap
|
page read and write
|
||
1B270000
|
heap
|
page read and write
|
||
7FFD9B7A4000
|
trusted library allocation
|
page read and write
|
||
19B891F8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5A0000
|
trusted library allocation
|
page read and write
|
||
19B89305000
|
trusted library allocation
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page execute and read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
16A691F0000
|
heap
|
page execute and read and write
|
||
7FFD9B7A8000
|
trusted library allocation
|
page read and write
|
||
E7F000
|
heap
|
page read and write
|
||
CD6000
|
heap
|
page read and write
|
||
7FFD9B762000
|
trusted library allocation
|
page read and write
|
||
6C2A08C000
|
stack
|
page read and write
|
||
9C909F8000
|
stack
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
19BA089E000
|
heap
|
page read and write
|
||
7DF402FF0000
|
trusted library allocation
|
page execute and read and write
|
||
1593B522000
|
heap
|
page read and write
|
||
8E0000
|
unkown
|
page readonly
|
||
7FFD9B730000
|
trusted library allocation
|
page read and write
|
||
7FFD9B914000
|
trusted library allocation
|
page read and write
|
||
19B891D6000
|
trusted library allocation
|
page read and write
|
||
19B86830000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
12F48000
|
trusted library allocation
|
page read and write
|
||
E5F000
|
heap
|
page read and write
|
||
7FFD9B61C000
|
trusted library allocation
|
page execute and read and write
|
||
16A013C5000
|
trusted library allocation
|
page read and write
|
||
2B9E000
|
stack
|
page read and write
|
||
1205000
|
heap
|
page read and write
|
||
1315000
|
heap
|
page read and write
|
||
7FFD9B8E4000
|
trusted library allocation
|
page read and write
|
||
1B0BF000
|
stack
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
16A69AE5000
|
heap
|
page read and write
|
||
7FFD9B8E9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
1BF25000
|
stack
|
page read and write
|
||
7FFD9B6D0000
|
trusted library allocation
|
page execute and read and write
|
||
FE0000
|
heap
|
page read and write
|
||
BD1000
|
stack
|
page read and write
|
||
15955819000
|
heap
|
page read and write
|
||
16A6771C000
|
heap
|
page read and write
|
||
1C3E16E4000
|
heap
|
page read and write
|
||
7FFD9B750000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B860000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page read and write
|
||
12F43000
|
trusted library allocation
|
page read and write
|
||
19BA0AB0000
|
trusted library allocation
|
page read and write
|
||
1593D4AD000
|
trusted library allocation
|
page read and write
|
||
1C3CACCF000
|
trusted library allocation
|
page read and write
|
||
9C907FF000
|
stack
|
page read and write
|
||
16A004CD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B640000
|
trusted library allocation
|
page read and write
|
||
7FFD9B771000
|
trusted library allocation
|
page read and write
|
||
1C124000
|
stack
|
page read and write
|
||
16A69BB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
16A677AF000
|
heap
|
page read and write
|
||
19B88050000
|
trusted library allocation
|
page read and write
|
||
6C2953B000
|
stack
|
page read and write
|
||
1593CF90000
|
heap
|
page execute and read and write
|
||
7FFD9B5BD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page read and write
|
||
9C90332000
|
stack
|
page read and write
|
||
273ACFA000
|
stack
|
page read and write
|
||
EAC000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
19B8873D000
|
trusted library allocation
|
page read and write
|
||
4155709000
|
stack
|
page read and write
|
||
19B867F7000
|
heap
|
page read and write
|
||
7FFD9B750000
|
trusted library allocation
|
page read and write
|
||
1B37F000
|
stack
|
page read and write
|
||
1C3C76B0000
|
trusted library section
|
page read and write
|
||
2861000
|
trusted library allocation
|
page read and write
|
||
16A67704000
|
heap
|
page read and write
|
||
16A102ED000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
19B8951D000
|
trusted library allocation
|
page read and write
|
||
1C3CA842000
|
trusted library allocation
|
page read and write
|
||
9C903FE000
|
stack
|
page read and write
|
||
19B899F7000
|
trusted library allocation
|
page read and write
|
||
1593B350000
|
heap
|
page read and write
|
||
16A011AD000
|
trusted library allocation
|
page read and write
|
||
1BC0E000
|
stack
|
page read and write
|
||
415568D000
|
stack
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page read and write
|
||
6C2A10E000
|
stack
|
page read and write
|
||
16A102F1000
|
trusted library allocation
|
page read and write
|
||
16A6770E000
|
heap
|
page read and write
|
||
9C90AFA000
|
stack
|
page read and write
|
||
1600000
|
heap
|
page read and write
|
||
16A676FB000
|
heap
|
page read and write
|
||
1593E1BA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B922000
|
trusted library allocation
|
page read and write
|
||
1B4CD000
|
stack
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B59D000
|
trusted library allocation
|
page execute and read and write
|
||
19BA09C1000
|
heap
|
page read and write
|
||
7FFD9B5B3000
|
trusted library allocation
|
page execute and read and write
|
||
1593CFD0000
|
heap
|
page read and write
|
||
19B894C6000
|
trusted library allocation
|
page read and write
|
||
931000
|
stack
|
page read and write
|
||
7FFD9B60C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B5EC000
|
trusted library allocation
|
page execute and read and write
|
||
9C90A7D000
|
stack
|
page read and write
|
||
9C9067E000
|
stack
|
page read and write
|
||
1593B450000
|
heap
|
page read and write
|
||
19B8674A000
|
heap
|
page read and write
|
||
16A00D72000
|
trusted library allocation
|
page read and write
|
||
159557E4000
|
heap
|
page read and write
|
||
16A69B03000
|
heap
|
page read and write
|
||
6C28B7E000
|
stack
|
page read and write
|
||
1593D494000
|
trusted library allocation
|
page read and write
|
||
1C3E16DC000
|
heap
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
1C3E13AC000
|
heap
|
page read and write
|
||
1C3C8D20000
|
trusted library allocation
|
page read and write
|
||
16A01123000
|
trusted library allocation
|
page read and write
|
||
15955844000
|
heap
|
page read and write
|
||
CF1000
|
heap
|
page read and write
|
||
1C3C72B0000
|
heap
|
page read and write
|
||
19B9857D000
|
trusted library allocation
|
page read and write
|
||
2660000
|
heap
|
page execute and read and write
|
||
15955764000
|
heap
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
CB8000
|
heap
|
page read and write
|
||
7FFD9B5CD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page read and write
|
||
C7E000
|
stack
|
page read and write
|
||
12A61000
|
trusted library allocation
|
page read and write
|
||
CD1000
|
heap
|
page read and write
|
||
1C3D9194000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7C0000
|
trusted library allocation
|
page read and write
|
||
16A01254000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page execute and read and write
|
||
F20000
|
heap
|
page read and write
|
||
19B9856D000
|
trusted library allocation
|
page read and write
|
||
16A012AC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
7FFD9B741000
|
trusted library allocation
|
page read and write
|
||
1C3C738C000
|
heap
|
page read and write
|
||
1AFED000
|
stack
|
page read and write
|
||
28A0000
|
heap
|
page read and write
|
||
19B8A09A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B761000
|
trusted library allocation
|
page read and write
|
||
F9D000
|
heap
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
16A69207000
|
heap
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
EB2000
|
heap
|
page read and write
|
||
7FFD9B5B4000
|
trusted library allocation
|
page read and write
|
||
16A69130000
|
trusted library allocation
|
page read and write
|
||
19B88260000
|
heap
|
page execute and read and write
|
||
7FFD9B8FC000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
19B88FED000
|
trusted library allocation
|
page read and write
|
||
19B8963B000
|
trusted library allocation
|
page read and write
|
||
9C90779000
|
stack
|
page read and write
|
||
B7D4EE9000
|
stack
|
page read and write
|
||
7FFD9B750000
|
trusted library allocation
|
page read and write
|
||
16A67700000
|
heap
|
page read and write
|
||
7FFD9B593000
|
trusted library allocation
|
page execute and read and write
|
||
16A00F9D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8C3000
|
trusted library allocation
|
page read and write
|
||
19BA0994000
|
heap
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7E0000
|
trusted library allocation
|
page read and write
|
||
15955810000
|
heap
|
page read and write
|
||
7FFD9B676000
|
trusted library allocation
|
page execute and read and write
|
||
16A690F0000
|
trusted library allocation
|
page read and write
|
||
19B880EE000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
130B000
|
heap
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B5A4000
|
trusted library allocation
|
page read and write
|
||
19BA06F0000
|
heap
|
page execute and read and write
|
||
B11000
|
stack
|
page read and write
|
||
273A5BF000
|
stack
|
page read and write
|
||
1210000
|
trusted library allocation
|
page read and write
|
||
7FFD9B60C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B5A2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B918000
|
trusted library allocation
|
page read and write
|
||
16A676B0000
|
heap
|
page read and write
|
||
1C02A000
|
stack
|
page read and write
|
||
1C3CA018000
|
trusted library allocation
|
page read and write
|
||
12853000
|
trusted library allocation
|
page read and write
|
||
1C3C8D50000
|
heap
|
page execute and read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
41547F9000
|
stack
|
page read and write
|
||
16A699C5000
|
heap
|
page read and write
|
||
19B891E7000
|
trusted library allocation
|
page read and write
|
||
19B891DF000
|
trusted library allocation
|
page read and write
|
||
273BB4E000
|
stack
|
page read and write
|
||
1C3E1708000
|
heap
|
page read and write
|
||
16A6770C000
|
heap
|
page read and write
|
||
7DF403000000
|
trusted library allocation
|
page execute and read and write
|
||
12A63000
|
trusted library allocation
|
page read and write
|
||
1C3E1980000
|
heap
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
1594D2D3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5AD000
|
trusted library allocation
|
page execute and read and write
|
||
1B67E000
|
stack
|
page read and write
|
||
1595583D000
|
heap
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
7FFD9B7A2000
|
trusted library allocation
|
page read and write
|
||
15955466000
|
heap
|
page read and write
|
||
19B86708000
|
heap
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
CEE000
|
heap
|
page read and write
|
||
2F4F000
|
trusted library allocation
|
page read and write
|
||
1593E2E9000
|
trusted library allocation
|
page read and write
|
||
F7C000
|
heap
|
page read and write
|
||
19B8A095000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
16A678C0000
|
heap
|
page read and write
|
||
15955630000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
19B86860000
|
heap
|
page readonly
|
||
7FFD9BA1D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page read and write
|
||
19B89ADC000
|
trusted library allocation
|
page read and write
|
||
26EE000
|
stack
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page read and write
|
||
1C3E16F2000
|
heap
|
page read and write
|
||
1C3C8F63000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
1B90E000
|
stack
|
page read and write
|
||
16A697CC000
|
heap
|
page read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
1595552D000
|
heap
|
page read and write
|
||
1225000
|
heap
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page execute and read and write
|
||
EE0000
|
trusted library allocation
|
page read and write
|
||
FDD000
|
heap
|
page read and write
|
||
7FFD9B7A4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page read and write
|
||
1D368025000
|
heap
|
page read and write
|
||
9C908FD000
|
stack
|
page read and write
|
||
19B982A1000
|
trusted library allocation
|
page read and write
|
||
1C3C9C6E000
|
trusted library allocation
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
7DF45FA10000
|
trusted library allocation
|
page execute and read and write
|
||
12B0000
|
heap
|
page read and write
|
||
1C3D8F65000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5A3000
|
trusted library allocation
|
page execute and read and write
|
||
159556A0000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
1593B563000
|
heap
|
page read and write
|
||
19B98271000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
1C3C8EB6000
|
heap
|
page execute and read and write
|
||
1D367D8F000
|
heap
|
page read and write
|
||
12858000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA0D000
|
trusted library allocation
|
page read and write
|
||
19B866F0000
|
trusted library section
|
page read and write
|
||
16A0130C000
|
trusted library allocation
|
page read and write
|
||
14EF000
|
stack
|
page read and write
|
||
16A69B0A000
|
heap
|
page read and write
|
||
7FFD9B7F0000
|
trusted library allocation
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
19B88CC3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page execute and read and write
|
||
19BA06F7000
|
heap
|
page execute and read and write
|
||
19B880D0000
|
heap
|
page read and write
|
||
19BA0870000
|
heap
|
page execute and read and write
|
||
19B882F8000
|
trusted library allocation
|
page read and write
|
||
1ADDD000
|
stack
|
page read and write
|
||
19BA0790000
|
heap
|
page read and write
|
||
273AB79000
|
stack
|
page read and write
|
||
2F20000
|
heap
|
page execute and read and write
|
||
7FFD9B904000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5C3000
|
trusted library allocation
|
page execute and read and write
|
||
1CA1C000
|
stack
|
page read and write
|
||
1C3CA053000
|
trusted library allocation
|
page read and write
|
||
16A690D5000
|
heap
|
page read and write
|
||
16A00C06000
|
trusted library allocation
|
page read and write
|
||
A80000
|
unkown
|
page readonly
|
||
7FFD9B8D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
19BA09EA000
|
heap
|
page read and write
|
||
7FF4C88F0000
|
trusted library allocation
|
page execute and read and write
|
||
ABD000
|
heap
|
page read and write
|
||
41549BB000
|
stack
|
page read and write
|
||
1C3C9AF6000
|
trusted library allocation
|
page read and write
|
||
1BCEE000
|
stack
|
page read and write
|
||
1C3E15B0000
|
heap
|
page read and write
|
||
19B89396000
|
trusted library allocation
|
page read and write
|
||
7FFD9B696000
|
trusted library allocation
|
page execute and read and write
|
||
6C2907D000
|
stack
|
page read and write
|
||
16A69ADC000
|
heap
|
page read and write
|
||
16A69740000
|
heap
|
page execute and read and write
|
||
126F8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
1C3C7342000
|
heap
|
page read and write
|
||
12BB1000
|
trusted library allocation
|
page read and write
|
||
E6A000
|
heap
|
page read and write
|
||
1C3E1340000
|
heap
|
page read and write
|
||
19B895FD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B60C000
|
trusted library allocation
|
page execute and read and write
|
||
6C29F8D000
|
stack
|
page read and write
|
||
AB5000
|
heap
|
page read and write
|
||
1593B640000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5C0000
|
trusted library allocation
|
page read and write
|
||
1593EBFF000
|
trusted library allocation
|
page read and write
|
||
19BA0890000
|
heap
|
page read and write
|
||
15955550000
|
heap
|
page read and write
|
||
7FFD9B5B4000
|
trusted library allocation
|
page read and write
|
||
1C3CA2BD000
|
trusted library allocation
|
page read and write
|
||
2701000
|
trusted library allocation
|
page read and write
|
||
9C90CFC000
|
stack
|
page read and write
|
||
2CB1000
|
trusted library allocation
|
page read and write
|
||
1594D001000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7C0000
|
trusted library allocation
|
page read and write
|
||
19B86700000
|
heap
|
page read and write
|
||
273AE7E000
|
stack
|
page read and write
|
||
1C3C7320000
|
trusted library section
|
page read and write
|
||
7FFD9B5B0000
|
trusted library allocation
|
page read and write
|
||
273ABF7000
|
stack
|
page read and write
|
||
7FFD9B7B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B8D0000
|
trusted library allocation
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
E4C000
|
heap
|
page read and write
|
||
1C3C9F21000
|
trusted library allocation
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page read and write
|
||
1BAEF000
|
stack
|
page read and write
|
||
7FFD9B7E0000
|
trusted library allocation
|
page read and write
|
||
1593DE6B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5BD000
|
trusted library allocation
|
page execute and read and write
|
||
16A69AB5000
|
heap
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
1593B700000
|
heap
|
page read and write
|
||
7FFD9B640000
|
trusted library allocation
|
page read and write
|
||
1C220000
|
heap
|
page read and write
|
||
7FFD9B676000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5C0000
|
trusted library allocation
|
page read and write
|
||
16A0182D000
|
trusted library allocation
|
page read and write
|
||
7D1000
|
stack
|
page read and write
|
||
7FFD9B9E3000
|
trusted library allocation
|
page read and write
|
||
19B9855E000
|
trusted library allocation
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
7FFD9B732000
|
trusted library allocation
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
1593E764000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5B4000
|
trusted library allocation
|
page read and write
|
||
19BA05FA000
|
heap
|
page read and write
|
||
1593E010000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5CD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B5D0000
|
trusted library allocation
|
page read and write
|
||
16A0186C000
|
trusted library allocation
|
page read and write
|
||
1593CFD5000
|
heap
|
page read and write
|
||
19B86742000
|
heap
|
page read and write
|
||
1C3D8F11000
|
trusted library allocation
|
page read and write
|
||
1C3C8E80000
|
heap
|
page execute and read and write
|
||
7DF439D00000
|
trusted library allocation
|
page execute and read and write
|
||
19B895B7000
|
trusted library allocation
|
page read and write
|
||
1594D41E000
|
trusted library allocation
|
page read and write
|
||
1595584F000
|
heap
|
page read and write
|
||
415447E000
|
stack
|
page read and write
|
||
7FFD9B670000
|
trusted library allocation
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
AE9000
|
heap
|
page read and write
|
||
1C3E13C8000
|
heap
|
page read and write
|
||
CE5000
|
heap
|
page read and write
|
||
7FFD9B919000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
1B23E000
|
stack
|
page read and write
|
||
1593B6E0000
|
heap
|
page execute and read and write
|
||
7FFD9B5C2000
|
trusted library allocation
|
page read and write
|
||
19B86870000
|
heap
|
page read and write
|
||
6C28AF3000
|
stack
|
page read and write
|
||
1C3C8DF5000
|
heap
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6E0000
|
trusted library allocation
|
page execute and read and write
|
||
16A69770000
|
heap
|
page execute and read and write
|
||
16A6978D000
|
heap
|
page read and write
|
||
19B86800000
|
heap
|
page read and write
|
||
7FFD9B670000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B660000
|
trusted library allocation
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
16A690C0000
|
trusted library section
|
page read and write
|
||
10F1000
|
stack
|
page read and write
|
||
19B865B0000
|
heap
|
page read and write
|
||
1ABD0000
|
trusted library allocation
|
page read and write
|
||
19BA0A0A000
|
heap
|
page read and write
|
||
1593DFE4000
|
trusted library allocation
|
page read and write
|
||
415580E000
|
stack
|
page read and write
|
||
1B51E000
|
stack
|
page read and write
|
||
12A68000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6A6000
|
trusted library allocation
|
page execute and read and write
|
||
1C3E0EF5000
|
heap
|
page read and write
|
||
A8A000
|
heap
|
page read and write
|
||
1C3E1387000
|
heap
|
page read and write
|
||
16A10011000
|
trusted library allocation
|
page read and write
|
||
19B89BC4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
101B000
|
heap
|
page read and write
|
||
7FFD9B8E0000
|
trusted library allocation
|
page read and write
|
||
15954FE0000
|
heap
|
page read and write
|
||
7FFD9B92C000
|
trusted library allocation
|
page read and write
|
||
B7D4FEE000
|
stack
|
page read and write
|
||
1593B526000
|
heap
|
page read and write
|
||
2BA1000
|
trusted library allocation
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
7FFD9B752000
|
trusted library allocation
|
page read and write
|
||
6C290F9000
|
stack
|
page read and write
|
||
1593B4D0000
|
trusted library allocation
|
page read and write
|
||
9C90B7F000
|
stack
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
16A103A9000
|
trusted library allocation
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
1C3E14D0000
|
heap
|
page read and write
|
||
273B94C000
|
stack
|
page read and write
|
||
16A69110000
|
trusted library allocation
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
7FFD9B5D0000
|
trusted library allocation
|
page read and write
|
||
273BA49000
|
stack
|
page read and write
|
||
7FFD9B928000
|
trusted library allocation
|
page read and write
|
||
16A690E0000
|
trusted library section
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
EFF000
|
heap
|
page read and write
|
||
1605000
|
heap
|
page read and write
|
||
6C2943C000
|
stack
|
page read and write
|
||
7FFD9B7F0000
|
trusted library allocation
|
page read and write
|
||
1D367D40000
|
heap
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
19B88020000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7F0000
|
trusted library allocation
|
page read and write
|
||
19BA05B0000
|
heap
|
page read and write
|
||
7FFD9B5DB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page read and write
|
||
19B982E5000
|
trusted library allocation
|
page read and write
|
||
7DF439D10000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B5DB000
|
trusted library allocation
|
page read and write
|
||
2950000
|
heap
|
page execute and read and write
|
||
1594D2CE000
|
trusted library allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
9C90877000
|
stack
|
page read and write
|
||
415560D000
|
stack
|
page read and write
|
||
1C3C73B5000
|
heap
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
1C3C8DF0000
|
heap
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page read and write
|
||
19B8923E000
|
trusted library allocation
|
page read and write
|
||
15EF000
|
stack
|
page read and write
|
||
7FFD9B8E0000
|
trusted library allocation
|
page read and write
|
||
B7D4F6F000
|
unkown
|
page read and write
|
||
7FFD9B7D0000
|
trusted library allocation
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
7FFD9B59D000
|
trusted library allocation
|
page execute and read and write
|
||
1593B490000
|
heap
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
1C2D0000
|
heap
|
page read and write
|
||
6C28BFE000
|
stack
|
page read and write
|
||
7FFD9B919000
|
trusted library allocation
|
page read and write
|
||
7FFD9B99C000
|
trusted library allocation
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
1593DD54000
|
trusted library allocation
|
page read and write
|
||
16A102F3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
6C28FF7000
|
stack
|
page read and write
|
||
7FFD9B5A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6B0000
|
trusted library allocation
|
page execute and read and write
|
||
16A01956000
|
trusted library allocation
|
page read and write
|
||
19BA09C3000
|
heap
|
page read and write
|
||
B46000
|
heap
|
page read and write
|
||
9C906FE000
|
stack
|
page read and write
|
||
7FFD9B676000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
16A01340000
|
trusted library allocation
|
page read and write
|
||
273A9FE000
|
stack
|
page read and write
|
||
7FFD9B76A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
415558E000
|
stack
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page execute and read and write
|
||
19BA0952000
|
heap
|
page read and write
|
||
E82000
|
heap
|
page read and write
|
||
19BA0657000
|
heap
|
page read and write
|
||
7FFD9B9B3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B67C000
|
trusted library allocation
|
page execute and read and write
|
||
6C29237000
|
stack
|
page read and write
|
||
1190000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B730000
|
trusted library allocation
|
page read and write
|
||
12BA8000
|
trusted library allocation
|
page read and write
|
||
1C3C8EB0000
|
heap
|
page execute and read and write
|
||
1C3D91DE000
|
trusted library allocation
|
page read and write
|
||
1C3CACF4000
|
trusted library allocation
|
page read and write
|
||
19B880D5000
|
heap
|
page read and write
|
||
7FFD9B5C4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5E0000
|
trusted library allocation
|
page read and write
|
||
1C3C72C0000
|
heap
|
page read and write
|
||
7FFD9B7D0000
|
trusted library allocation
|
page read and write
|
||
11B0000
|
trusted library allocation
|
page read and write
|
||
1C3C7372000
|
heap
|
page read and write
|
||
7FFD9B696000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
1B9EE000
|
stack
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
41548B7000
|
stack
|
page read and write
|
||
7FFD9B593000
|
trusted library allocation
|
page execute and read and write
|
||
1593B705000
|
heap
|
page read and write
|
||
1593B4C0000
|
trusted library section
|
page read and write
|
||
7FFD9B778000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5CD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B7A8000
|
trusted library allocation
|
page read and write
|
||
1C3C8EE0000
|
heap
|
page read and write
|
||
1593D421000
|
trusted library allocation
|
page read and write
|
||
1593E104000
|
trusted library allocation
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
19B98565000
|
trusted library allocation
|
page read and write
|
||
19B8A075000
|
trusted library allocation
|
page read and write
|
||
1C3C9EF5000
|
trusted library allocation
|
page read and write
|
||
16A678C5000
|
heap
|
page read and write
|
||
1B12C000
|
stack
|
page read and write
|
||
6C291B7000
|
stack
|
page read and write
|
||
1593B565000
|
heap
|
page read and write
|
||
19B89B03000
|
trusted library allocation
|
page read and write
|
||
6C2933E000
|
stack
|
page read and write
|
||
6C2913E000
|
stack
|
page read and write
|
||
1593E1F3000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
1593D208000
|
trusted library allocation
|
page read and write
|
||
1593E931000
|
trusted library allocation
|
page read and write
|
||
19B89363000
|
trusted library allocation
|
page read and write
|
||
7FFD9B730000
|
trusted library allocation
|
page read and write
|
||
12F8000
|
heap
|
page read and write
|
||
A8F000
|
heap
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
4154938000
|
stack
|
page read and write
|
||
19B8673D000
|
heap
|
page read and write
|
||
6C2A009000
|
stack
|
page read and write
|
||
7FFD9B5A4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8E3000
|
trusted library allocation
|
page read and write
|
||
16A00085000
|
trusted library allocation
|
page read and write
|
||
1BBBF000
|
heap
|
page read and write
|
||
1593B5F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5A2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
19B86875000
|
heap
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
7FFD9B8F2000
|
trusted library allocation
|
page read and write
|
||
16A01095000
|
trusted library allocation
|
page read and write
|
||
1BB84000
|
heap
|
page read and write
|
||
7FFD9B5B4000
|
trusted library allocation
|
page read and write
|
||
F76000
|
heap
|
page read and write
|
||
16A69160000
|
trusted library allocation
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
7FFD9B792000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6B0000
|
trusted library allocation
|
page execute and read and write
|
||
16A102FB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7F0000
|
trusted library allocation
|
page read and write
|
||
27DE000
|
stack
|
page read and write
|
||
7FFD9B66C000
|
trusted library allocation
|
page execute and read and write
|
||
1B540000
|
heap
|
page execute and read and write
|
||
1593CFE1000
|
trusted library allocation
|
page read and write
|
||
16A01E25000
|
trusted library allocation
|
page read and write
|
||
16A00A52000
|
trusted library allocation
|
page read and write
|
||
7FFD9B650000
|
trusted library allocation
|
page read and write
|
||
7FFD9B750000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6B0000
|
trusted library allocation
|
page execute and read and write
|
||
CA0000
|
heap
|
page read and write
|
||
7FFD9B92A000
|
trusted library allocation
|
page read and write
|
||
19B8678A000
|
heap
|
page read and write
|
||
273AC78000
|
stack
|
page read and write
|
||
7FFD9B7E0000
|
trusted library allocation
|
page read and write
|
||
16A01DE0000
|
trusted library allocation
|
page read and write
|
||
159554C3000
|
heap
|
page read and write
|
||
9E5000
|
heap
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
159556CA000
|
heap
|
page read and write
|
||
1B660000
|
heap
|
page execute and read and write
|
||
7FFD9B909000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
E3F000
|
stack
|
page read and write
|
||
11A3000
|
heap
|
page read and write
|
||
1B4B0000
|
heap
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
AA9000
|
heap
|
page read and write
|
||
1C51E000
|
stack
|
page read and write
|
||
16A00001000
|
trusted library allocation
|
page read and write
|
||
1C29F000
|
stack
|
page read and write
|
||
12CB1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9BC000
|
trusted library allocation
|
page read and write
|
||
1593E0A1000
|
trusted library allocation
|
page read and write
|
||
1C3C76F0000
|
heap
|
page read and write
|
||
7FFD9B5D4000
|
trusted library allocation
|
page read and write
|
||
1C3CA204000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77A000
|
trusted library allocation
|
page read and write
|
||
159556CE000
|
heap
|
page read and write
|
||
1B23E000
|
stack
|
page read and write
|
||
16A69A42000
|
heap
|
page read and write
|
||
7FFD9B860000
|
trusted library allocation
|
page read and write
|
||
7FFD9B593000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B5D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5B2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
1BAF0000
|
heap
|
page read and write
|
||
16A0156F000
|
trusted library allocation
|
page read and write
|
||
1593B4B0000
|
trusted library section
|
page read and write
|
||
19B88271000
|
trusted library allocation
|
page read and write
|
||
2EF0000
|
heap
|
page execute and read and write
|
||
E33000
|
trusted library allocation
|
page read and write
|
||
1C3E1424000
|
heap
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
1595582E000
|
heap
|
page read and write
|
||
7FFD9B6E5000
|
trusted library allocation
|
page execute and read and write
|
||
1C3D8F21000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6A6000
|
trusted library allocation
|
page execute and read and write
|
||
1BA0F000
|
stack
|
page read and write
|
||
F34000
|
heap
|
page read and write
|
||
1B90E000
|
stack
|
page read and write
|
||
7FFD9B5EC000
|
trusted library allocation
|
page execute and read and write
|
||
16A67890000
|
heap
|
page read and write
|
||
19B86820000
|
trusted library section
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
1C3C76E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
113E000
|
stack
|
page read and write
|
||
7FFD9B670000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B5AB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page execute and read and write
|
||
9C90978000
|
stack
|
page read and write
|
||
1D367D80000
|
heap
|
page read and write
|
||
F10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
4154BBC000
|
stack
|
page read and write
|
||
1C3C7330000
|
heap
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
1593EE03000
|
trusted library allocation
|
page read and write
|
||
AB1000
|
heap
|
page read and write
|
||
1C3C9E91000
|
trusted library allocation
|
page read and write
|
||
16A69776000
|
heap
|
page execute and read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page execute and read and write
|
||
16A0102F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page execute and read and write
|
||
1C3CA175000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B646000
|
trusted library allocation
|
page read and write
|
||
1B80F000
|
stack
|
page read and write
|
||
1C3CA75A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B660000
|
trusted library allocation
|
page read and write
|
||
ABB000
|
heap
|
page read and write
|
||
273A533000
|
stack
|
page read and write
|
||
16A0115E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA06000
|
trusted library allocation
|
page read and write
|
||
D20000
|
trusted library allocation
|
page read and write
|
||
1B310000
|
heap
|
page execute and read and write
|
||
12B5000
|
heap
|
page read and write
|
||
FB1000
|
heap
|
page read and write
|
||
16A690A0000
|
heap
|
page read and write
|
||
16A01E06000
|
trusted library allocation
|
page read and write
|
||
1BB0E000
|
stack
|
page read and write
|
||
1594CFE1000
|
trusted library allocation
|
page read and write
|
||
16A01954000
|
trusted library allocation
|
page read and write
|
||
FA5000
|
heap
|
page read and write
|
||
1BB60000
|
heap
|
page read and write
|
||
7FFD9B91C000
|
trusted library allocation
|
page read and write
|
||
9C918CD000
|
stack
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page read and write
|
||
1C3C9943000
|
trusted library allocation
|
page read and write
|
||
2A40000
|
heap
|
page execute and read and write
|
||
16A678D0000
|
heap
|
page read and write
|
||
7FFD9B8F8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
273A5FE000
|
stack
|
page read and write
|
||
1C3CA781000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8C0000
|
trusted library allocation
|
page read and write
|
||
19B8941F000
|
trusted library allocation
|
page read and write
|
||
9C9174D000
|
stack
|
page read and write
|
||
19B86850000
|
trusted library allocation
|
page read and write
|
||
EAE000
|
stack
|
page read and write
|
||
15955493000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
2851000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6E0000
|
trusted library allocation
|
page execute and read and write
|
||
159556C6000
|
heap
|
page read and write
|
||
7FFD9B676000
|
trusted library allocation
|
page execute and read and write
|
||
16A698A0000
|
heap
|
page read and write
|
||
16A676C8000
|
heap
|
page read and write
|
||
1593DA32000
|
trusted library allocation
|
page read and write
|
||
1B8EE000
|
stack
|
page read and write
|
||
415483E000
|
stack
|
page read and write
|
||
9C916CE000
|
stack
|
page read and write
|
||
1C71A000
|
stack
|
page read and write
|
||
2840000
|
heap
|
page execute and read and write
|
||
7FFD9B8E0000
|
trusted library allocation
|
page read and write
|
||
1C3C72E0000
|
heap
|
page read and write
|
||
19BA0683000
|
heap
|
page read and write
|
||
12BA1000
|
trusted library allocation
|
page read and write
|
||
273B9CE000
|
stack
|
page read and write
|
||
7FFD9B5C3000
|
trusted library allocation
|
page execute and read and write
|
||
415467F000
|
stack
|
page read and write
|
||
7FFD9B5AD000
|
trusted library allocation
|
page execute and read and write
|
||
1594D2ED000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6D0000
|
trusted library allocation
|
page execute and read and write
|
||
9C90BFE000
|
stack
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page read and write
|
||
1C3CA1A2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8C0000
|
trusted library allocation
|
page read and write
|
||
1593B430000
|
heap
|
page read and write
|
||
19B86786000
|
heap
|
page read and write
|
||
7FFD9B8C0000
|
trusted library allocation
|
page read and write
|
||
19BA061F000
|
heap
|
page read and write
|
||
12F41000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5CB000
|
trusted library allocation
|
page read and write
|
||
159556DA000
|
heap
|
page read and write
|
||
9C917CD000
|
stack
|
page read and write
|
||
1593CFB0000
|
heap
|
page read and write
|
||
A7F000
|
heap
|
page read and write
|
||
1230000
|
trusted library allocation
|
page read and write
|
||
16A69D00000
|
heap
|
page read and write
|
||
1357000
|
heap
|
page read and write
|
||
EAE000
|
heap
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
1C3C8EF1000
|
trusted library allocation
|
page read and write
|
||
19B98563000
|
trusted library allocation
|
page read and write
|
||
1B130000
|
heap
|
page read and write
|
||
7FFD9B5C0000
|
trusted library allocation
|
page read and write
|
||
A58000
|
heap
|
page read and write
|
||
16A676C0000
|
heap
|
page read and write
|
||
7FFD9B5A4000
|
trusted library allocation
|
page read and write
|
||
F16000
|
heap
|
page read and write
|
||
19B891DA000
|
trusted library allocation
|
page read and write
|
||
1C3D91EC000
|
trusted library allocation
|
page read and write
|
||
1C3C9119000
|
trusted library allocation
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page execute and read and write
|
||
1593B568000
|
heap
|
page read and write
|
||
273A87F000
|
stack
|
page read and write
|
||
9C91849000
|
stack
|
page read and write
|
||
103C000
|
stack
|
page read and write
|
||
7FFD9B59D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B5C2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
1C3C7376000
|
heap
|
page read and write
|
||
7FFD9B5B0000
|
trusted library allocation
|
page read and write
|
||
1593B51C000
|
heap
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page execute and read and write
|
||
2570000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
1593B6E7000
|
heap
|
page execute and read and write
|
||
16A102A3000
|
trusted library allocation
|
page read and write
|
||
1B61E000
|
stack
|
page read and write
|
||
12FC000
|
stack
|
page read and write
|
||
16A01787000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5B0000
|
trusted library allocation
|
page read and write
|
||
19B86746000
|
heap
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B696000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B740000
|
trusted library allocation
|
page read and write
|
||
1BB96000
|
heap
|
page read and write
|
||
7FFD9B676000
|
trusted library allocation
|
page read and write
|
||
6C294BE000
|
stack
|
page read and write
|
||
AE7000
|
heap
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
26D0000
|
heap
|
page read and write
|
||
7DF4C0950000
|
trusted library allocation
|
page execute and read and write
|
||
19B892A6000
|
trusted library allocation
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
1C3E1698000
|
heap
|
page read and write
|
||
15955704000
|
heap
|
page read and write
|
||
159557B5000
|
heap
|
page read and write
|
||
7FFD9B660000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B772000
|
trusted library allocation
|
page read and write
|
||
1C3C8D60000
|
trusted library allocation
|
page read and write
|
||
16A697D7000
|
heap
|
page read and write
|
||
1C3C73BA000
|
heap
|
page read and write
|
||
1594D2DD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F3000
|
trusted library allocation
|
page read and write
|
||
19B98291000
|
trusted library allocation
|
page read and write
|
||
1C3C9F8A000
|
trusted library allocation
|
page read and write
|
||
2B5F000
|
stack
|
page read and write
|
||
1593E84A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B66C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B6D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B730000
|
trusted library allocation
|
page read and write
|
||
16A01003000
|
trusted library allocation
|
page read and write
|
||
7FFD9B590000
|
trusted library allocation
|
page read and write
|
||
16A67744000
|
heap
|
page read and write
|
||
19B86748000
|
heap
|
page read and write
|
||
415580C000
|
stack
|
page read and write
|
||
1593EDBE000
|
trusted library allocation
|
page read and write
|
||
273AAFD000
|
stack
|
page read and write
|
||
16A690D0000
|
heap
|
page read and write
|
||
7FFD9B5B3000
|
trusted library allocation
|
page execute and read and write
|
||
1593E3A5000
|
trusted library allocation
|
page read and write
|
||
415578C000
|
stack
|
page read and write
|
||
1C3C7690000
|
heap
|
page read and write
|
||
16A69120000
|
heap
|
page readonly
|
||
1594D2D5000
|
trusted library allocation
|
page read and write
|
||
2F41000
|
trusted library allocation
|
page read and write
|
||
1594D2DB000
|
trusted library allocation
|
page read and write
|
||
16A69780000
|
heap
|
page read and write
|
||
1046000
|
heap
|
page read and write
|
||
2CAF000
|
stack
|
page read and write
|
||
7FFD9B7B0000
|
trusted library allocation
|
page execute and read and write
|
||
159556D6000
|
heap
|
page read and write
|
||
FDB000
|
heap
|
page read and write
|
||
7FFD9B5C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5B3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B928000
|
trusted library allocation
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
16A67748000
|
heap
|
page read and write
|
||
19BA05EF000
|
heap
|
page read and write
|
||
1C3E17B0000
|
trusted library allocation
|
page read and write
|
||
19B891D2000
|
trusted library allocation
|
page read and write
|
||
A8C000
|
heap
|
page read and write
|
||
7FFD9B61C000
|
trusted library allocation
|
page execute and read and write
|
||
9C90C7E000
|
stack
|
page read and write
|
||
19B89450000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7B0000
|
trusted library allocation
|
page read and write
|
||
16A10074000
|
trusted library allocation
|
page read and write
|
||
19B88090000
|
trusted library allocation
|
page read and write
|
||
1C3E16A9000
|
heap
|
page read and write
|
||
19B8957F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
41544FE000
|
stack
|
page read and write
|
||
19BA09F6000
|
heap
|
page read and write
|
||
7FFD9B5C2000
|
trusted library allocation
|
page read and write
|
||
6C28EF9000
|
stack
|
page read and write
|
||
1D367D88000
|
heap
|
page read and write
|
||
1B57F000
|
stack
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
7FFD9B64C000
|
trusted library allocation
|
page execute and read and write
|
||
980000
|
heap
|
page read and write
|
||
25B0000
|
heap
|
page execute and read and write
|
||
7FFD9B798000
|
trusted library allocation
|
page read and write
|
||
273B8CE000
|
stack
|
page read and write
|
||
1B21E000
|
stack
|
page read and write
|
||
132D000
|
heap
|
page read and write
|
||
7FFD9BA16000
|
trusted library allocation
|
page read and write
|
||
12CB3000
|
trusted library allocation
|
page read and write
|
||
1C3D91E2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5BD000
|
trusted library allocation
|
page execute and read and write
|
||
25E0000
|
heap
|
page read and write
|
||
1C3C8D90000
|
trusted library allocation
|
page read and write
|
||
7FFD9B592000
|
trusted library allocation
|
page read and write
|
||
7FFD9B860000
|
trusted library allocation
|
page read and write
|
||
1160000
|
heap
|
page execute and read and write
|
||
107E000
|
stack
|
page read and write
|
||
1593EE08000
|
trusted library allocation
|
page read and write
|
||
7FFD9B92C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B771000
|
trusted library allocation
|
page read and write
|
||
1C3CA0CE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5AD000
|
trusted library allocation
|
page execute and read and write
|
||
9C9194E000
|
stack
|
page read and write
|
||
1C3E13E5000
|
heap
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page read and write
|
||
1593B524000
|
heap
|
page read and write
|
||
1B7EE000
|
stack
|
page read and write
|
||
126F3000
|
trusted library allocation
|
page read and write
|
||
1C3D8EF1000
|
trusted library allocation
|
page read and write
|
||
1C3D91FC000
|
trusted library allocation
|
page read and write
|
||
1C3C9F57000
|
trusted library allocation
|
page read and write
|
||
1C3D91EA000
|
trusted library allocation
|
page read and write
|
||
19BA092B000
|
heap
|
page read and write
|
||
19B88E81000
|
trusted library allocation
|
page read and write
|
||
19BA05E9000
|
heap
|
page read and write
|
||
7FFD9B5C0000
|
trusted library allocation
|
page read and write
|
||
CF1000
|
stack
|
page read and write
|
||
1C3CAD14000
|
trusted library allocation
|
page read and write
|
||
CCC000
|
heap
|
page read and write
|
||
7FFD9B593000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B666000
|
trusted library allocation
|
page read and write
|
||
1593B4E0000
|
heap
|
page read and write
|
||
1C3C76C0000
|
trusted library allocation
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5C4000
|
trusted library allocation
|
page read and write
|
||
A75000
|
heap
|
page read and write
|
||
2DA9000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
trusted library allocation
|
page read and write
|
||
6C29F0E000
|
stack
|
page read and write
|
||
1D367D60000
|
heap
|
page read and write
|
||
7FFD9B7C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
16A10001000
|
trusted library allocation
|
page read and write
|
||
415457F000
|
stack
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
7FFD9B7C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5C4000
|
trusted library allocation
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
1D367D30000
|
heap
|
page read and write
|
||
7FFD9B925000
|
trusted library allocation
|
page read and write
|
||
7FFD9B594000
|
trusted library allocation
|
page read and write
|
||
7DF4C0940000
|
trusted library allocation
|
page execute and read and write
|
||
2F51000
|
trusted library allocation
|
page read and write
|
||
15955430000
|
heap
|
page read and write
|
||
7FFD9B5B2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B666000
|
trusted library allocation
|
page read and write
|
||
1C3C73B3000
|
heap
|
page read and write
|
||
19BA0A01000
|
heap
|
page read and write
|
There are 1095 hidden memdumps, click here to show them.