Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
X.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\X.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Google Chrome.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Windows Defender.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Google Chrome.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Windows Defender.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Nursultan by fruktoozik.bat
|
Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_153adawq.rww.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2tabp3yi.0z2.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2z3kwouv.uxf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_310wevqq.mq5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3m0f3ufn.yjj.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3p23iqby.njd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ah0ntmup.nog.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bakzojbf.n2v.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bvd1lp44.zwp.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_crse2sov.lui.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dbktxfw3.yln.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_didt0foy.mij.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fi1s4f5o.50c.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hd4b54el.4pz.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hkx1hao5.okz.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kqecefwc.qg0.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l121kadt.pet.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l4gbtcen.ycp.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lhwewkpo.zac.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_obr4o2cp.zqh.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ox1ghied.1hk.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pdw5b5zr.noa.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rfuq4pg4.wfz.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rnyca14o.jx5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ruwsh3it.4xv.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tqw2nxgt.12p.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vu1fhkgy.hxm.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ycnt2h5n.4v3.ps1
|
ASCII text, with no line terminators
|
dropped
|
There are 26 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\X.exe
|
"C:\Users\user\Desktop\X.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Windows
Defender.exe'
|
||
C:\Users\user\AppData\Local\Temp\Windows Defender.exe
|
"C:\Users\user~1\AppData\Local\Temp\Windows Defender.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Google
Chrome.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user~1\AppData\Local\Temp\Windows
Defender.exe'
|
||
C:\Users\user\AppData\Local\Temp\Windows Defender.exe
|
"C:\Users\user\AppData\Local\Temp\Windows Defender.exe"
|
||
C:\Users\user\AppData\Local\Temp\Windows Defender.exe
|
"C:\Users\user\AppData\Local\Temp\Windows Defender.exe"
|
||
C:\Users\user\AppData\Local\Temp\Google Chrome.exe
|
"C:\Users\user~1\AppData\Local\Temp\Google Chrome.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user~1\AppData\Local\Temp\Google
Chrome.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows
Defender.exe'
|
||
C:\Users\user\AppData\Local\Temp\Google Chrome.exe
|
"C:\Users\user\AppData\Local\Temp\Google Chrome.exe"
|
||
C:\Users\user\AppData\Local\Temp\Google Chrome.exe
|
"C:\Users\user\AppData\Local\Temp\Google Chrome.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Google
Chrome.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Windows
Defender.exe'
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user~1\AppData\Local\Temp\Nursultan by fruktoozik.bat" "
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 14 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
22.ip.gl.ply.gg
|
|||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://crl.m
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://crl.microsoqx8
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
http://www.micom/pkiops/Docs/ry.htm0
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://www.microsoft.co
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://www.microsoft.
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
There are 10 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ip-api.com
|
208.95.112.1
|
||
s-part-0017.t-0009.fb-t-msedge.net
|
13.107.253.45
|
||
time.windows.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Windows Defender
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Google Chrome
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASMANCS
|
FileDirectory
|
There are 20 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3161000
|
trusted library allocation
|
page read and write
|
||
172000
|
unkown
|
page readonly
|
||
140F8000
|
trusted library allocation
|
page read and write
|
||
612000
|
unkown
|
page readonly
|
||
EB5000
|
heap
|
page read and write
|
||
1D0F8305000
|
heap
|
page read and write
|
||
21E47767000
|
trusted library allocation
|
page read and write
|
||
7FFAABA90000
|
trusted library allocation
|
page read and write
|
||
1543EF7000
|
stack
|
page read and write
|
||
B73677B000
|
stack
|
page read and write
|
||
7FFAAB9B8000
|
trusted library allocation
|
page read and write
|
||
7FFAAB81A000
|
trusted library allocation
|
page read and write
|
||
12AD3000
|
trusted library allocation
|
page read and write
|
||
7FFAABA6C000
|
trusted library allocation
|
page read and write
|
||
7FFAAB831000
|
trusted library allocation
|
page read and write
|
||
EC5C479000
|
stack
|
page read and write
|
||
253B5FB5000
|
heap
|
page read and write
|
||
7FFAABAA0000
|
trusted library allocation
|
page read and write
|
||
26F576C5000
|
heap
|
page read and write
|
||
1D0F60DC000
|
heap
|
page read and write
|
||
1710000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
7FFAAB6A0000
|
trusted library allocation
|
page read and write
|
||
1D0F7A50000
|
heap
|
page read and write
|
||
7FFAAB852000
|
trusted library allocation
|
page read and write
|
||
7FFAABA60000
|
trusted library allocation
|
page read and write
|
||
1D510070000
|
trusted library allocation
|
page read and write
|
||
1543D7E000
|
stack
|
page read and write
|
||
190C2E6C000
|
heap
|
page read and write
|
||
7FFAABAB0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB9D4000
|
trusted library allocation
|
page read and write
|
||
2539BF86000
|
heap
|
page read and write
|
||
B17B1FE000
|
stack
|
page read and write
|
||
7FFAAB9F0000
|
trusted library allocation
|
page read and write
|
||
190D4801000
|
trusted library allocation
|
page read and write
|
||
190D4C77000
|
trusted library allocation
|
page read and write
|
||
190C6605000
|
trusted library allocation
|
page read and write
|
||
7FFB1E3C2000
|
unkown
|
page readonly
|
||
190DD085000
|
heap
|
page read and write
|
||
7FFAAB7A0000
|
trusted library allocation
|
page execute and read and write
|
||
1D575A85000
|
heap
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
1D081901000
|
trusted library allocation
|
page read and write
|
||
2539D990000
|
trusted library allocation
|
page read and write
|
||
7FFAAB6AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB6CC000
|
trusted library allocation
|
page execute and read and write
|
||
26F593A0000
|
heap
|
page read and write
|
||
7FFAABA63000
|
trusted library allocation
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
1D575A7A000
|
heap
|
page read and write
|
||
DAB95BE000
|
stack
|
page read and write
|
||
190DD210000
|
trusted library allocation
|
page read and write
|
||
2D221031000
|
trusted library allocation
|
page read and write
|
||
190DD12F000
|
heap
|
page read and write
|
||
190C2E93000
|
heap
|
page read and write
|
||
2539F4CE000
|
trusted library allocation
|
page read and write
|
||
7FFAAB67D000
|
trusted library allocation
|
page execute and read and write
|
||
B73657E000
|
stack
|
page read and write
|
||
13BD7535000
|
heap
|
page read and write
|
||
7FFAAB9F0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB6B0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB9D9000
|
trusted library allocation
|
page read and write
|
||
E2A000
|
heap
|
page read and write
|
||
7FFAAB660000
|
trusted library allocation
|
page read and write
|
||
7FFAAB662000
|
trusted library allocation
|
page read and write
|
||
537507E000
|
stack
|
page read and write
|
||
13E1000
|
heap
|
page read and write
|
||
21E4F8D0000
|
heap
|
page read and write
|
||
21E38DE5000
|
trusted library allocation
|
page read and write
|
||
CED000
|
heap
|
page read and write
|
||
2D20F560000
|
heap
|
page read and write
|
||
2539BF12000
|
heap
|
page read and write
|
||
7FFAAB720000
|
trusted library allocation
|
page read and write
|
||
21E374FB000
|
trusted library allocation
|
page read and write
|
||
190C4A0A000
|
trusted library allocation
|
page read and write
|
||
7FFAAB822000
|
trusted library allocation
|
page read and write
|
||
190C2F80000
|
heap
|
page read and write
|
||
D16000
|
heap
|
page read and write
|
||
7FFAAB960000
|
trusted library allocation
|
page read and write
|
||
1D5751C0000
|
heap
|
page read and write
|
||
253B6238000
|
heap
|
page read and write
|
||
190C59B5000
|
trusted library allocation
|
page read and write
|
||
7FFAABAC0000
|
trusted library allocation
|
page read and write
|
||
2D21220E000
|
trusted library allocation
|
page read and write
|
||
DAB907E000
|
stack
|
page read and write
|
||
28F9F09000
|
stack
|
page read and write
|
||
1D0901A1000
|
trusted library allocation
|
page read and write
|
||
7FFAABA6A000
|
trusted library allocation
|
page read and write
|
||
5374EFE000
|
stack
|
page read and write
|
||
7FFAAB770000
|
trusted library allocation
|
page execute and read and write
|
||
1D0F8220000
|
heap
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
21E37ED4000
|
trusted library allocation
|
page read and write
|
||
190DD063000
|
heap
|
page read and write
|
||
1D575B40000
|
trusted library allocation
|
page read and write
|
||
190D4AC8000
|
trusted library allocation
|
page read and write
|
||
1D0F7990000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
7FFAAB694000
|
trusted library allocation
|
page read and write
|
||
15439D2000
|
stack
|
page read and write
|
||
28F8F7D000
|
stack
|
page read and write
|
||
7FFAAB9D8000
|
trusted library allocation
|
page read and write
|
||
21E359DC000
|
heap
|
page read and write
|
||
21E38DD3000
|
trusted library allocation
|
page read and write
|
||
7FFAAB72C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB993000
|
trusted library allocation
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
1E3AB000
|
stack
|
page read and write
|
||
7DF491510000
|
trusted library allocation
|
page execute and read and write
|
||
21E4FC83000
|
heap
|
page read and write
|
||
7FFAAB72C000
|
trusted library allocation
|
page execute and read and write
|
||
1D57572B000
|
heap
|
page read and write
|
||
13D1000
|
heap
|
page read and write
|
||
B17A98F000
|
stack
|
page read and write
|
||
253B61D0000
|
heap
|
page read and write
|
||
7FFAAB8B0000
|
trusted library allocation
|
page read and write
|
||
190DCD60000
|
heap
|
page execute and read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
28F8D7E000
|
stack
|
page read and write
|
||
13B6000
|
heap
|
page read and write
|
||
1D09025C000
|
trusted library allocation
|
page read and write
|
||
7FFAAB664000
|
trusted library allocation
|
page read and write
|
||
7FFAAB9DA000
|
trusted library allocation
|
page read and write
|
||
7FFAABA80000
|
trusted library allocation
|
page read and write
|
||
2D221010000
|
trusted library allocation
|
page read and write
|
||
7FFAAB66B000
|
trusted library allocation
|
page read and write
|
||
2539D8F0000
|
heap
|
page read and write
|
||
29B0000
|
heap
|
page read and write
|
||
7FFAAB822000
|
trusted library allocation
|
page read and write
|
||
7FFAAB68D000
|
trusted library allocation
|
page execute and read and write
|
||
26F599B5000
|
trusted library allocation
|
page read and write
|
||
7FFAAB67D000
|
trusted library allocation
|
page execute and read and write
|
||
2D20F705000
|
heap
|
page read and write
|
||
1B6DD000
|
stack
|
page read and write
|
||
2D221021000
|
trusted library allocation
|
page read and write
|
||
7FFAABA96000
|
trusted library allocation
|
page read and write
|
||
190C589C000
|
trusted library allocation
|
page read and write
|
||
21E477EE000
|
trusted library allocation
|
page read and write
|
||
13BD7540000
|
heap
|
page read and write
|
||
7FFAAB670000
|
trusted library allocation
|
page read and write
|
||
7FFAABAB0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB842000
|
trusted library allocation
|
page read and write
|
||
122000
|
unkown
|
page readonly
|
||
1544138000
|
stack
|
page read and write
|
||
8B8000
|
heap
|
page read and write
|
||
2D229893000
|
heap
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
190DCE48000
|
heap
|
page read and write
|
||
2D212030000
|
trusted library allocation
|
page read and write
|
||
1D5013C5000
|
trusted library allocation
|
page read and write
|
||
7FFAAB726000
|
trusted library allocation
|
page read and write
|
||
7FFAAB82A000
|
trusted library allocation
|
page read and write
|
||
2D20F5AB000
|
heap
|
page read and write
|
||
7FFAAB920000
|
trusted library allocation
|
page read and write
|
||
7FFAAB900000
|
trusted library allocation
|
page read and write
|
||
190DD0C3000
|
heap
|
page read and write
|
||
7FFAAB9B0000
|
trusted library allocation
|
page read and write
|
||
2539D940000
|
trusted library allocation
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
7FFAAB822000
|
trusted library allocation
|
page read and write
|
||
1D500D77000
|
trusted library allocation
|
page read and write
|
||
2530000
|
heap
|
page execute and read and write
|
||
7FFAAB920000
|
trusted library allocation
|
page read and write
|
||
B17ADFE000
|
stack
|
page read and write
|
||
21E35940000
|
heap
|
page read and write
|
||
21E4F48B000
|
heap
|
page read and write
|
||
7FFAAB730000
|
trusted library allocation
|
page read and write
|
||
1D57595D000
|
heap
|
page read and write
|
||
7FFAAB8F0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB910000
|
trusted library allocation
|
page read and write
|
||
7FFAAB966000
|
trusted library allocation
|
page read and write
|
||
B735FB3000
|
stack
|
page read and write
|
||
253B63F0000
|
trusted library allocation
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
1D0F831D000
|
heap
|
page read and write
|
||
1D090067000
|
trusted library allocation
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
154433E000
|
stack
|
page read and write
|
||
2D211079000
|
trusted library allocation
|
page read and write
|
||
21E385A1000
|
trusted library allocation
|
page read and write
|
||
21E359CA000
|
heap
|
page read and write
|
||
163F000
|
stack
|
page read and write
|
||
21E35A03000
|
heap
|
page read and write
|
||
1B3E0000
|
heap
|
page execute and read and write
|
||
3CE0000
|
heap
|
page execute and read and write
|
||
EAF000
|
stack
|
page read and write
|
||
7FFAAB860000
|
trusted library allocation
|
page execute and read and write
|
||
1D080001000
|
trusted library allocation
|
page read and write
|
||
7FFAAB83A000
|
trusted library allocation
|
page read and write
|
||
190DD03B000
|
heap
|
page read and write
|
||
1D500001000
|
trusted library allocation
|
page read and write
|
||
2539F95A000
|
trusted library allocation
|
page read and write
|
||
1D573890000
|
heap
|
page read and write
|
||
1D5018F1000
|
trusted library allocation
|
page read and write
|
||
7FFAAB9DC000
|
trusted library allocation
|
page read and write
|
||
7FFAAB9C0000
|
trusted library allocation
|
page read and write
|
||
253B61D8000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
21E37420000
|
heap
|
page execute and read and write
|
||
EC5D24E000
|
stack
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
28F8EF7000
|
stack
|
page read and write
|
||
40EE000
|
stack
|
page read and write
|
||
21E376A9000
|
trusted library allocation
|
page read and write
|
||
1D0F7970000
|
trusted library allocation
|
page read and write
|
||
B17ACFE000
|
stack
|
page read and write
|
||
1DFAF000
|
stack
|
page read and write
|
||
26F5A4EB000
|
trusted library allocation
|
page read and write
|
||
1D0F79B0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB9B3000
|
trusted library allocation
|
page read and write
|
||
7FFAAB9B9000
|
trusted library allocation
|
page read and write
|
||
7FFAAB9B8000
|
trusted library allocation
|
page read and write
|
||
7FFAAB950000
|
trusted library allocation
|
page read and write
|
||
190DCD66000
|
heap
|
page execute and read and write
|
||
1D0F8300000
|
heap
|
page read and write
|
||
EC5C2FF000
|
stack
|
page read and write
|
||
21E380B3000
|
trusted library allocation
|
page read and write
|
||
21E35A07000
|
heap
|
page read and write
|
||
7FFAAB838000
|
trusted library allocation
|
page read and write
|
||
2600000
|
heap
|
page read and write
|
||
7FFAAB990000
|
trusted library allocation
|
page read and write
|
||
7FFAAB9D5000
|
trusted library allocation
|
page read and write
|
||
7FFAAB9A0000
|
trusted library allocation
|
page read and write
|
||
2539D9F5000
|
heap
|
page read and write
|
||
3B10000
|
heap
|
page read and write
|
||
26F57640000
|
heap
|
page read and write
|
||
2D2120BB000
|
trusted library allocation
|
page read and write
|
||
190DCE15000
|
heap
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
2539C0D0000
|
heap
|
page read and write
|
||
1B1D0000
|
heap
|
page read and write
|
||
1D57378B000
|
heap
|
page read and write
|
||
2539E5D2000
|
trusted library allocation
|
page read and write
|
||
253B637B000
|
heap
|
page read and write
|
||
B73637F000
|
stack
|
page read and write
|
||
1B2DE000
|
stack
|
page read and write
|
||
7FFAAB694000
|
trusted library allocation
|
page read and write
|
||
190C5785000
|
trusted library allocation
|
page read and write
|
||
1D081262000
|
trusted library allocation
|
page read and write
|
||
21E35840000
|
heap
|
page read and write
|
||
7FFAAB890000
|
trusted library allocation
|
page read and write
|
||
1D573777000
|
heap
|
page read and write
|
||
1D081443000
|
trusted library allocation
|
page read and write
|
||
1D0F79A0000
|
heap
|
page readonly
|
||
7FFAAB9B2000
|
trusted library allocation
|
page read and write
|
||
E16000
|
heap
|
page read and write
|
||
7FFAAB766000
|
trusted library allocation
|
page execute and read and write
|
||
B736677000
|
stack
|
page read and write
|
||
26F592CE000
|
heap
|
page read and write
|
||
7FFAAB690000
|
trusted library allocation
|
page read and write
|
||
7FFAABA50000
|
trusted library allocation
|
page read and write
|
||
7FFAAB9F0000
|
trusted library allocation
|
page read and write
|
||
190DD00A000
|
heap
|
page read and write
|
||
26F59500000
|
heap
|
page read and write
|
||
253B61C0000
|
heap
|
page read and write
|
||
7FFAABAAD000
|
trusted library allocation
|
page read and write
|
||
190C53DD000
|
trusted library allocation
|
page read and write
|
||
20CBE597000
|
heap
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
7FFAAB8A0000
|
trusted library allocation
|
page read and write
|
||
190DCD40000
|
heap
|
page execute and read and write
|
||
DABA28C000
|
stack
|
page read and write
|
||
7FFAAB6DC000
|
trusted library allocation
|
page execute and read and write
|
||
2539EAF2000
|
trusted library allocation
|
page read and write
|
||
28F9E0C000
|
stack
|
page read and write
|
||
7FFAAB9D8000
|
trusted library allocation
|
page read and write
|
||
1D0F6090000
|
heap
|
page read and write
|
||
7FFAAB68B000
|
trusted library allocation
|
page read and write
|
||
1D575A6B000
|
heap
|
page read and write
|
||
12813000
|
trusted library allocation
|
page read and write
|
||
7FFAAB800000
|
trusted library allocation
|
page read and write
|
||
EC5C67F000
|
stack
|
page read and write
|
||
7FFAAB950000
|
trusted library allocation
|
page read and write
|
||
26F57680000
|
heap
|
page read and write
|
||
7FFAABAB0000
|
trusted library allocation
|
page read and write
|
||
190C5F61000
|
trusted library allocation
|
page read and write
|
||
21E359C0000
|
heap
|
page read and write
|
||
7FFAAB8C0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB880000
|
trusted library allocation
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
26F5933C000
|
heap
|
page read and write
|
||
2539BF08000
|
heap
|
page read and write
|
||
7FFB1E3C0000
|
unkown
|
page read and write
|
||
1D57376F000
|
heap
|
page read and write
|
||
2D2298C0000
|
heap
|
page read and write
|
||
1D500A53000
|
trusted library allocation
|
page read and write
|
||
7FFAAB8F0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB970000
|
trusted library allocation
|
page read and write
|
||
7FFAABA80000
|
trusted library allocation
|
page execute and read and write
|
||
7DF491520000
|
trusted library allocation
|
page execute and read and write
|
||
2D20F568000
|
heap
|
page read and write
|
||
7FFAAB790000
|
trusted library allocation
|
page execute and read and write
|
||
26F5765E000
|
heap
|
page read and write
|
||
7FFAAB680000
|
trusted library allocation
|
page read and write
|
||
2539F99F000
|
trusted library allocation
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
7FFAAB795000
|
trusted library allocation
|
page execute and read and write
|
||
1D5012AA000
|
trusted library allocation
|
page read and write
|
||
190D47F0000
|
trusted library allocation
|
page read and write
|
||
1D7AE000
|
stack
|
page read and write
|
||
28F933E000
|
stack
|
page read and write
|
||
7FFAAB8F0000
|
trusted library allocation
|
page read and write
|
||
1D573895000
|
heap
|
page read and write
|
||
20CBE5C1000
|
heap
|
page read and write
|
||
7FFAAB670000
|
trusted library allocation
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
5374CFF000
|
stack
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
EC5C1FE000
|
stack
|
page read and write
|
||
13CC000
|
heap
|
page read and write
|
||
7FFAAB6BC000
|
trusted library allocation
|
page execute and read and write
|
||
B7363FA000
|
stack
|
page read and write
|
||
2539E902000
|
trusted library allocation
|
page read and write
|
||
280F000
|
stack
|
page read and write
|
||
1D0F7AD6000
|
heap
|
page read and write
|
||
26F593B3000
|
heap
|
page read and write
|
||
21E4F909000
|
heap
|
page read and write
|
||
B17AFF7000
|
stack
|
page read and write
|
||
B73754C000
|
stack
|
page read and write
|
||
1D575A42000
|
heap
|
page read and write
|
||
B73734E000
|
stack
|
page read and write
|
||
7FFAAB880000
|
trusted library allocation
|
page read and write
|
||
CF1000
|
stack
|
page read and write
|
||
20CBE5C1000
|
heap
|
page read and write
|
||
5375ECC000
|
stack
|
page read and write
|
||
7FFAAB70C000
|
trusted library allocation
|
page execute and read and write
|
||
190C57E5000
|
trusted library allocation
|
page read and write
|
||
190C5810000
|
trusted library allocation
|
page read and write
|
||
26F577C0000
|
trusted library allocation
|
page read and write
|
||
13BD7548000
|
heap
|
page read and write
|
||
1D57376D000
|
heap
|
page read and write
|
||
21E4F939000
|
heap
|
page read and write
|
||
7FFAAB776000
|
trusted library allocation
|
page execute and read and write
|
||
20CBE5C1000
|
heap
|
page read and write
|
||
5374C7F000
|
stack
|
page read and write
|
||
1D5102EF000
|
trusted library allocation
|
page read and write
|
||
1D0F6126000
|
heap
|
page read and write
|
||
7FFAAB9EC000
|
trusted library allocation
|
page read and write
|
||
29CF000
|
stack
|
page read and write
|
||
1D500DF3000
|
trusted library allocation
|
page read and write
|
||
7FFAABAD0000
|
trusted library allocation
|
page read and write
|
||
2D20F6F0000
|
heap
|
page read and write
|
||
12AD1000
|
trusted library allocation
|
page read and write
|
||
2D2123C3000
|
trusted library allocation
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
1D5750B0000
|
heap
|
page readonly
|
||
2539EADE000
|
trusted library allocation
|
page read and write
|
||
5375D4C000
|
stack
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
1D5102E9000
|
trusted library allocation
|
page read and write
|
||
190C65E0000
|
trusted library allocation
|
page read and write
|
||
7FFAABAA0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB9C0000
|
trusted library allocation
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
1D510001000
|
trusted library allocation
|
page read and write
|
||
7FFAAB890000
|
trusted library allocation
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
20CBE5C0000
|
heap
|
page read and write
|
||
EC5C279000
|
stack
|
page read and write
|
||
20CBE5C1000
|
heap
|
page read and write
|
||
B17B07D000
|
stack
|
page read and write
|
||
DABA10C000
|
stack
|
page read and write
|
||
7FFAABAC7000
|
trusted library allocation
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
1D510307000
|
trusted library allocation
|
page read and write
|
||
21E47785000
|
trusted library allocation
|
page read and write
|
||
7FFAABA40000
|
trusted library allocation
|
page read and write
|
||
7FFAAB970000
|
trusted library allocation
|
page read and write
|
||
13BD73E0000
|
heap
|
page read and write
|
||
CB8000
|
heap
|
page read and write
|
||
7FFAAB720000
|
trusted library allocation
|
page read and write
|
||
21E37400000
|
heap
|
page execute and read and write
|
||
1D0F6121000
|
heap
|
page read and write
|
||
1D08007B000
|
trusted library allocation
|
page read and write
|
||
1D5759D1000
|
heap
|
page read and write
|
||
21E4F8D8000
|
heap
|
page read and write
|
||
7FFAAB920000
|
trusted library allocation
|
page read and write
|
||
1543DFA000
|
stack
|
page read and write
|
||
3B52000
|
heap
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
7FFAAB910000
|
trusted library allocation
|
page read and write
|
||
21E4FBF6000
|
heap
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
1D501E01000
|
trusted library allocation
|
page read and write
|
||
B7365F9000
|
stack
|
page read and write
|
||
1D0F8241000
|
heap
|
page read and write
|
||
7FFAAB71C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB7B0000
|
trusted library allocation
|
page execute and read and write
|
||
2D211A52000
|
trusted library allocation
|
page read and write
|
||
190C4750000
|
trusted library allocation
|
page read and write
|
||
20CBE5C1000
|
heap
|
page read and write
|
||
537527F000
|
stack
|
page read and write
|
||
53750FD000
|
stack
|
page read and write
|
||
1BDCF000
|
stack
|
page read and write
|
||
21E392AA000
|
trusted library allocation
|
page read and write
|
||
190C53DF000
|
trusted library allocation
|
page read and write
|
||
1535000
|
heap
|
page read and write
|
||
DAB953E000
|
stack
|
page read and write
|
||
21E38D75000
|
trusted library allocation
|
page read and write
|
||
26F5AE70000
|
trusted library allocation
|
page read and write
|
||
1D575731000
|
heap
|
page read and write
|
||
7FFAAB840000
|
trusted library allocation
|
page read and write
|
||
26F5928D000
|
heap
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
7FFAAB980000
|
trusted library allocation
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
7FFAAB69B000
|
trusted library allocation
|
page read and write
|
||
253ADE6E000
|
trusted library allocation
|
page read and write
|
||
2D229865000
|
heap
|
page read and write
|
||
190C555C000
|
trusted library allocation
|
page read and write
|
||
7FFAABAE0000
|
trusted library allocation
|
page read and write
|
||
21E359C6000
|
heap
|
page read and write
|
||
7FFAAB8B0000
|
trusted library allocation
|
page read and write
|
||
13CC000
|
heap
|
page read and write
|
||
154403F000
|
stack
|
page read and write
|
||
B7366F8000
|
stack
|
page read and write
|
||
190C2E10000
|
heap
|
page read and write
|
||
21E372C5000
|
heap
|
page read and write
|
||
26F59480000
|
trusted library allocation
|
page read and write
|
||
26F5A9A5000
|
trusted library allocation
|
page read and write
|
||
7FFAAB8B0000
|
trusted library allocation
|
page read and write
|
||
2D2123BF000
|
trusted library allocation
|
page read and write
|
||
7FFAAB83D000
|
trusted library allocation
|
page read and write
|
||
7DF464510000
|
trusted library allocation
|
page execute and read and write
|
||
26F59195000
|
heap
|
page read and write
|
||
129D8000
|
trusted library allocation
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
1D090484000
|
trusted library allocation
|
page read and write
|
||
7FFAAB950000
|
trusted library allocation
|
page read and write
|
||
190C4760000
|
heap
|
page readonly
|
||
20CBE5C1000
|
heap
|
page read and write
|
||
1544D8E000
|
stack
|
page read and write
|
||
5375F4C000
|
stack
|
page read and write
|
||
190D47E1000
|
trusted library allocation
|
page read and write
|
||
7FFAABAC0000
|
trusted library allocation
|
page read and write
|
||
21E38657000
|
trusted library allocation
|
page read and write
|
||
7FFAAB6BC000
|
trusted library allocation
|
page execute and read and write
|
||
26F593AE000
|
heap
|
page read and write
|
||
1D0F802B000
|
heap
|
page read and write
|
||
21E35AB0000
|
trusted library section
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
B17BDCA000
|
stack
|
page read and write
|
||
1DBAE000
|
stack
|
page read and write
|
||
1D5011DD000
|
trusted library allocation
|
page read and write
|
||
2539ECE6000
|
trusted library allocation
|
page read and write
|
||
7FFAAB690000
|
trusted library allocation
|
page read and write
|
||
C95000
|
heap
|
page read and write
|
||
7FFAAB6CC000
|
trusted library allocation
|
page execute and read and write
|
||
21E4FC13000
|
heap
|
page read and write
|
||
7DF4F47D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB8A0000
|
trusted library allocation
|
page read and write
|
||
E58000
|
heap
|
page read and write
|
||
2D2298BE000
|
heap
|
page read and write
|
||
2539E04D000
|
trusted library allocation
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
190DD0EB000
|
heap
|
page read and write
|
||
2D2294AF000
|
heap
|
page read and write
|
||
F10000
|
trusted library allocation
|
page read and write
|
||
7FFAAB821000
|
trusted library allocation
|
page read and write
|
||
21E37406000
|
heap
|
page execute and read and write
|
||
28F91B9000
|
stack
|
page read and write
|
||
26F575B0000
|
heap
|
page read and write
|
||
21E37340000
|
trusted library allocation
|
page read and write
|
||
2D21211E000
|
trusted library allocation
|
page read and write
|
||
EC5D44E000
|
stack
|
page read and write
|
||
1D50188E000
|
trusted library allocation
|
page read and write
|
||
2D212307000
|
trusted library allocation
|
page read and write
|
||
154500C000
|
stack
|
page read and write
|
||
1D575746000
|
heap
|
page read and write
|
||
21E474A1000
|
trusted library allocation
|
page read and write
|
||
190C4730000
|
trusted library allocation
|
page read and write
|
||
2D210EB0000
|
trusted library allocation
|
page read and write
|
||
253B60A0000
|
heap
|
page read and write
|
||
1E88E000
|
stack
|
page read and write
|
||
7FFAAB880000
|
trusted library allocation
|
page read and write
|
||
253B5FE7000
|
heap
|
page read and write
|
||
7FFAAB660000
|
trusted library allocation
|
page read and write
|
||
7FFAAB9A0000
|
trusted library allocation
|
page read and write
|
||
1D0F8120000
|
heap
|
page read and write
|
||
7FFAAB67D000
|
trusted library allocation
|
page execute and read and write
|
||
13A6000
|
heap
|
page read and write
|
||
2D2122D2000
|
trusted library allocation
|
page read and write
|
||
1D0F7A20000
|
trusted library allocation
|
page read and write
|
||
7FFAABA80000
|
trusted library allocation
|
page read and write
|
||
190D4B1D000
|
trusted library allocation
|
page read and write
|
||
7FFAAB8C0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB821000
|
trusted library allocation
|
page read and write
|
||
21E38085000
|
trusted library allocation
|
page read and write
|
||
7FFAAB720000
|
trusted library allocation
|
page execute and read and write
|
||
B17A903000
|
stack
|
page read and write
|
||
7FFAAB673000
|
trusted library allocation
|
page read and write
|
||
7FFAABA00000
|
trusted library allocation
|
page read and write
|
||
26F59270000
|
heap
|
page read and write
|
||
7FFAAB670000
|
trusted library allocation
|
page read and write
|
||
1D0F60E6000
|
heap
|
page read and write
|
||
190DCF00000
|
heap
|
page read and write
|
||
1D090010000
|
trusted library allocation
|
page read and write
|
||
1D0F60A0000
|
heap
|
page read and write
|
||
190C4853000
|
trusted library allocation
|
page read and write
|
||
DABA30E000
|
stack
|
page read and write
|
||
7FFAAB890000
|
trusted library allocation
|
page read and write
|
||
53749AF000
|
stack
|
page read and write
|
||
1D57576E000
|
heap
|
page read and write
|
||
7FFAAB980000
|
trusted library allocation
|
page read and write
|
||
2D211DE9000
|
trusted library allocation
|
page read and write
|
||
1D0F80B2000
|
heap
|
page read and write
|
||
1D5751DB000
|
heap
|
page read and write
|
||
253ADE6A000
|
trusted library allocation
|
page read and write
|
||
26F57825000
|
heap
|
page read and write
|
||
154508E000
|
stack
|
page read and write
|
||
1D573754000
|
heap
|
page read and write
|
||
7FFAAB960000
|
trusted library allocation
|
page read and write
|
||
15D0000
|
heap
|
page read and write
|
||
1D0F6095000
|
heap
|
page read and write
|
||
1D575952000
|
heap
|
page read and write
|
||
13F8000
|
heap
|
page read and write
|
||
7FFAAB6DC000
|
trusted library allocation
|
page execute and read and write
|
||
190DD146000
|
heap
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
170000
|
unkown
|
page readonly
|
||
7FFAAB670000
|
trusted library allocation
|
page read and write
|
||
2D2121D5000
|
trusted library allocation
|
page read and write
|
||
7FFAAB9D0000
|
trusted library allocation
|
page read and write
|
||
28F8DFA000
|
stack
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
DAB93B7000
|
stack
|
page read and write
|
||
7FFAAB910000
|
trusted library allocation
|
page read and write
|
||
7FFAAB880000
|
trusted library allocation
|
page read and write
|
||
190C612E000
|
trusted library allocation
|
page read and write
|
||
21E38D12000
|
trusted library allocation
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
26F595F7000
|
trusted library allocation
|
page read and write
|
||
7FFAAB977000
|
trusted library allocation
|
page read and write
|
||
7FFAAB672000
|
trusted library allocation
|
page read and write
|
||
2D229470000
|
heap
|
page read and write
|
||
7FFAAB9C2000
|
trusted library allocation
|
page read and write
|
||
2D2128F1000
|
trusted library allocation
|
page read and write
|
||
21E37481000
|
trusted library allocation
|
page read and write
|
||
1D0902C7000
|
trusted library allocation
|
page read and write
|
||
1D0902E7000
|
trusted library allocation
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
21E47490000
|
trusted library allocation
|
page read and write
|
||
190C6497000
|
trusted library allocation
|
page read and write
|
||
2D212DDC000
|
trusted library allocation
|
page read and write
|
||
EC5C87B000
|
stack
|
page read and write
|
||
2539E76B000
|
trusted library allocation
|
page read and write
|
||
253B6354000
|
heap
|
page read and write
|
||
7FFB1E3A0000
|
unkown
|
page readonly
|
||
24E0000
|
heap
|
page execute and read and write
|
||
13D4000
|
heap
|
page read and write
|
||
26F57790000
|
trusted library allocation
|
page read and write
|
||
7FFAAB970000
|
trusted library allocation
|
page read and write
|
||
21E35A80000
|
heap
|
page read and write
|
||
7FFAAB860000
|
trusted library allocation
|
page read and write
|
||
7FFAAB9DC000
|
trusted library allocation
|
page read and write
|
||
B7F000
|
stack
|
page read and write
|
||
253ADBB1000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
trusted library allocation
|
page read and write
|
||
2539DC07000
|
trusted library allocation
|
page read and write
|
||
E95000
|
heap
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
1D57573B000
|
heap
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
CEB000
|
heap
|
page read and write
|
||
7FFAAB810000
|
trusted library allocation
|
page read and write
|
||
7FFAABA90000
|
trusted library allocation
|
page read and write
|
||
190DD150000
|
heap
|
page read and write
|
||
1D081918000
|
trusted library allocation
|
page read and write
|
||
2539F3E6000
|
trusted library allocation
|
page read and write
|
||
1B55F000
|
stack
|
page read and write
|
||
26F5A7D1000
|
trusted library allocation
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
7FFAAB756000
|
trusted library allocation
|
page execute and read and write
|
||
2539E77B000
|
trusted library allocation
|
page read and write
|
||
1D080D47000
|
trusted library allocation
|
page read and write
|
||
7FFAAB683000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAABA80000
|
trusted library allocation
|
page read and write
|
||
26F576C3000
|
heap
|
page read and write
|
||
7FFAAB960000
|
trusted library allocation
|
page read and write
|
||
253B6374000
|
heap
|
page read and write
|
||
7FFB1E3C0000
|
unkown
|
page read and write
|
||
7FFAAB840000
|
trusted library allocation
|
page execute and read and write
|
||
190C47D5000
|
heap
|
page read and write
|
||
1D5750F0000
|
trusted library allocation
|
page read and write
|
||
26F593C7000
|
heap
|
page read and write
|
||
B17A9CF000
|
stack
|
page read and write
|
||
1D0F60E0000
|
heap
|
page read and write
|
||
2539EEC8000
|
trusted library allocation
|
page read and write
|
||
1D575789000
|
heap
|
page read and write
|
||
7FFAAB9C9000
|
trusted library allocation
|
page read and write
|
||
1544F8E000
|
stack
|
page read and write
|
||
21E38485000
|
trusted library allocation
|
page read and write
|
||
1D080D7F000
|
trusted library allocation
|
page read and write
|
||
7FFAAB736000
|
trusted library allocation
|
page execute and read and write
|
||
DF0000
|
heap
|
page read and write
|
||
2D221001000
|
trusted library allocation
|
page read and write
|
||
21E35AA0000
|
trusted library section
|
page read and write
|
||
21E4FED0000
|
heap
|
page read and write
|
||
21E4776C000
|
trusted library allocation
|
page read and write
|
||
190DD133000
|
heap
|
page read and write
|
||
2D20F5A3000
|
heap
|
page read and write
|
||
EC5BDEE000
|
stack
|
page read and write
|
||
7FFAAB7A0000
|
trusted library allocation
|
page execute and read and write
|
||
190C4CAD000
|
trusted library allocation
|
page read and write
|
||
1D5759FA000
|
heap
|
page read and write
|
||
21E385DB000
|
trusted library allocation
|
page read and write
|
||
2D20F5E4000
|
heap
|
page read and write
|
||
B7375CE000
|
stack
|
page read and write
|
||
1D0F80CA000
|
heap
|
page read and write
|
||
7FFAAB8C0000
|
trusted library allocation
|
page read and write
|
||
2D210FF0000
|
heap
|
page read and write
|
||
1D575700000
|
heap
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
7FFAAB830000
|
trusted library allocation
|
page execute and read and write
|
||
190DD3B0000
|
heap
|
page read and write
|
||
1D575748000
|
heap
|
page read and write
|
||
B7362FE000
|
stack
|
page read and write
|
||
7FFAAB983000
|
trusted library allocation
|
page read and write
|
||
21E4FA60000
|
heap
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
190D4A24000
|
trusted library allocation
|
page read and write
|
||
7FFAABAE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB9C4000
|
trusted library allocation
|
page read and write
|
||
2D2122A3000
|
trusted library allocation
|
page read and write
|
||
7FFAAB69D000
|
trusted library allocation
|
page execute and read and write
|
||
253B61A0000
|
heap
|
page execute and read and write
|
||
7FFAAB990000
|
trusted library allocation
|
page read and write
|
||
28F92BE000
|
stack
|
page read and write
|
||
7FFAAB840000
|
trusted library allocation
|
page execute and read and write
|
||
1D0F5F40000
|
heap
|
page read and write
|
||
DABA207000
|
stack
|
page read and write
|
||
2539F9A4000
|
trusted library allocation
|
page read and write
|
||
190C54BF000
|
trusted library allocation
|
page read and write
|
||
190DD15A000
|
heap
|
page read and write
|
||
1D081430000
|
trusted library allocation
|
page read and write
|
||
2D20F470000
|
heap
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
7FFAAB9F0000
|
trusted library allocation
|
page read and write
|
||
B17B0FA000
|
stack
|
page read and write
|
||
190C5B9D000
|
trusted library allocation
|
page read and write
|
||
28F8C7E000
|
stack
|
page read and write
|
||
DAB927D000
|
stack
|
page read and write
|
||
1D575821000
|
heap
|
page read and write
|
||
1D575837000
|
heap
|
page read and write
|
||
1D080D51000
|
trusted library allocation
|
page read and write
|
||
118F000
|
stack
|
page read and write
|
||
2D210F90000
|
heap
|
page execute and read and write
|
||
26F5931A000
|
heap
|
page read and write
|
||
21E474B1000
|
trusted library allocation
|
page read and write
|
||
13BD754B000
|
heap
|
page read and write
|
||
1D3AE000
|
stack
|
page read and write
|
||
7FFAAB802000
|
trusted library allocation
|
page read and write
|
||
7FFAAB8D0000
|
trusted library allocation
|
page read and write
|
||
1D0F82D8000
|
heap
|
page read and write
|
||
7FFAAB960000
|
trusted library allocation
|
page read and write
|
||
2D210EE0000
|
heap
|
page readonly
|
||
830000
|
heap
|
page read and write
|
||
190DC85F000
|
heap
|
page read and write
|
||
7FFAABAA0000
|
trusted library allocation
|
page read and write
|
||
1065000
|
heap
|
page read and write
|
||
7FFAAB683000
|
trusted library allocation
|
page execute and read and write
|
||
190C2E50000
|
heap
|
page read and write
|
||
1D090300000
|
trusted library allocation
|
page read and write
|
||
1D080A2C000
|
trusted library allocation
|
page read and write
|
||
1D080EC9000
|
trusted library allocation
|
page read and write
|
||
1D500F9F000
|
trusted library allocation
|
page read and write
|
||
1B65E000
|
stack
|
page read and write
|
||
7FFAAB970000
|
trusted library allocation
|
page read and write
|
||
8ED000
|
heap
|
page read and write
|
||
7FFAAB6AC000
|
trusted library allocation
|
page execute and read and write
|
||
21E38DDA000
|
trusted library allocation
|
page read and write
|
||
1D5738E5000
|
heap
|
page read and write
|
||
26F59210000
|
heap
|
page execute and read and write
|
||
1D0902E0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB930000
|
trusted library allocation
|
page read and write
|
||
21E38CEC000
|
trusted library allocation
|
page read and write
|
||
1AD78F000
|
stack
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
7FFAAB664000
|
trusted library allocation
|
page read and write
|
||
7FFAABA80000
|
trusted library allocation
|
page read and write
|
||
DAB917F000
|
stack
|
page read and write
|
||
7FFAABAD0000
|
trusted library allocation
|
page read and write
|
||
7FFB1E3C0000
|
unkown
|
page read and write
|
||
B7374C7000
|
stack
|
page read and write
|
||
2AD1000
|
trusted library allocation
|
page read and write
|
||
7FFAAB780000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB663000
|
trusted library allocation
|
page execute and read and write
|
||
7DF46D850000
|
trusted library allocation
|
page execute and read and write
|
||
F95000
|
heap
|
page read and write
|
||
1D5738E0000
|
heap
|
page read and write
|
||
1D08136E000
|
trusted library allocation
|
page read and write
|
||
26F59267000
|
heap
|
page execute and read and write
|
||
2D212004000
|
trusted library allocation
|
page read and write
|
||
7FFAABAC0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB812000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
2D212E21000
|
trusted library allocation
|
page read and write
|
||
2D2294EC000
|
heap
|
page read and write
|
||
7FFAAB9C8000
|
trusted library allocation
|
page read and write
|
||
2D20F680000
|
heap
|
page read and write
|
||
7FFAAB690000
|
trusted library allocation
|
page read and write
|
||
28F93BC000
|
stack
|
page read and write
|
||
B73647E000
|
stack
|
page read and write
|
||
7FFAAB870000
|
trusted library allocation
|
page execute and read and write
|
||
190C60D0000
|
trusted library allocation
|
page read and write
|
||
190C53E7000
|
trusted library allocation
|
page read and write
|
||
1D575939000
|
heap
|
page read and write
|
||
7FFAAB9C4000
|
trusted library allocation
|
page read and write
|
||
7FFAAB673000
|
trusted library allocation
|
page execute and read and write
|
||
253B628E000
|
heap
|
page read and write
|
||
7FFAAB69D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB9A9000
|
trusted library allocation
|
page read and write
|
||
2D20F6E0000
|
trusted library section
|
page read and write
|
||
7FFAAB746000
|
trusted library allocation
|
page execute and read and write
|
||
20CBE5C1000
|
heap
|
page read and write
|
||
B7373CC000
|
stack
|
page read and write
|
||
1D5000C6000
|
trusted library allocation
|
page read and write
|
||
253B5F51000
|
heap
|
page read and write
|
||
1D0F8349000
|
heap
|
page read and write
|
||
1D5759A7000
|
heap
|
page read and write
|
||
253B5F19000
|
heap
|
page read and write
|
||
1D0F6040000
|
heap
|
page read and write
|
||
7DF48C740000
|
trusted library allocation
|
page execute and read and write
|
||
1D08104B000
|
trusted library allocation
|
page read and write
|
||
1F40000
|
heap
|
page execute and read and write
|
||
2D2212EC000
|
trusted library allocation
|
page read and write
|
||
236E000
|
stack
|
page read and write
|
||
12811000
|
trusted library allocation
|
page read and write
|
||
1D50194F000
|
trusted library allocation
|
page read and write
|
||
7FFAAB900000
|
trusted library allocation
|
page read and write
|
||
253ADB81000
|
trusted library allocation
|
page read and write
|
||
7FFAABAD9000
|
trusted library allocation
|
page read and write
|
||
140F3000
|
trusted library allocation
|
page read and write
|
||
7FFAAB9B0000
|
trusted library allocation
|
page read and write
|
||
1D0F6020000
|
heap
|
page read and write
|
||
26F59260000
|
heap
|
page execute and read and write
|
||
7FFAAB82A000
|
trusted library allocation
|
page read and write
|
||
2539BF4A000
|
heap
|
page read and write
|
||
B17AC7F000
|
stack
|
page read and write
|
||
1AD70F000
|
stack
|
page read and write
|
||
28BE000
|
stack
|
page read and write
|
||
EC5D2CE000
|
stack
|
page read and write
|
||
2539EAEA000
|
trusted library allocation
|
page read and write
|
||
26F57780000
|
heap
|
page readonly
|
||
7FFAABA70000
|
trusted library allocation
|
page read and write
|
||
1D080BD0000
|
trusted library allocation
|
page read and write
|
||
28F9F8E000
|
stack
|
page read and write
|
||
5374923000
|
stack
|
page read and write
|
||
21E38843000
|
trusted library allocation
|
page read and write
|
||
26F592CC000
|
heap
|
page read and write
|
||
7FFAAB990000
|
trusted library allocation
|
page read and write
|
||
7FFAAB68D000
|
trusted library allocation
|
page execute and read and write
|
||
B31000
|
stack
|
page read and write
|
||
1B05D000
|
stack
|
page read and write
|
||
7FFAAB66D000
|
trusted library allocation
|
page execute and read and write
|
||
1D5010C2000
|
trusted library allocation
|
page read and write
|
||
7FFAAB820000
|
trusted library allocation
|
page read and write
|
||
7FFAAB810000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB71C000
|
trusted library allocation
|
page execute and read and write
|
||
EC5C5F8000
|
stack
|
page read and write
|
||
21E35980000
|
heap
|
page read and write
|
||
190C2E4C000
|
heap
|
page read and write
|
||
5374E79000
|
stack
|
page read and write
|
||
20CBE5C1000
|
heap
|
page read and write
|
||
7FFAAB820000
|
trusted library allocation
|
page execute and read and write
|
||
956000
|
heap
|
page read and write
|
||
7FFAAB87E000
|
trusted library allocation
|
page read and write
|
||
7FFAABA5C000
|
trusted library allocation
|
page read and write
|
||
410D000
|
trusted library allocation
|
page read and write
|
||
B7368FE000
|
stack
|
page read and write
|
||
1D501782000
|
trusted library allocation
|
page read and write
|
||
21E4FC02000
|
heap
|
page read and write
|
||
28FA00C000
|
stack
|
page read and write
|
||
7FFAAB652000
|
trusted library allocation
|
page read and write
|
||
7FFAABAB0000
|
trusted library allocation
|
page read and write
|
||
B17B17E000
|
stack
|
page read and write
|
||
2539DB70000
|
heap
|
page read and write
|
||
1D0F80B6000
|
heap
|
page read and write
|
||
7FFAAB766000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB1E3A1000
|
unkown
|
page execute read
|
||
1D0F8200000
|
heap
|
page execute and read and write
|
||
EF0000
|
trusted library allocation
|
page read and write
|
||
1D0F80C6000
|
heap
|
page read and write
|
||
1D501252000
|
trusted library allocation
|
page read and write
|
||
2F40000
|
heap
|
page execute and read and write
|
||
1D5758F0000
|
heap
|
page execute and read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
7FFAABAD0000
|
trusted library allocation
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
5375E47000
|
stack
|
page read and write
|
||
2D22986B000
|
heap
|
page read and write
|
||
7DF48C730000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB9E2000
|
trusted library allocation
|
page read and write
|
||
253B620A000
|
heap
|
page read and write
|
||
7FFAAB710000
|
trusted library allocation
|
page read and write
|
||
1F65000
|
heap
|
page read and write
|
||
21E37290000
|
trusted library allocation
|
page read and write
|
||
253B634E000
|
heap
|
page read and write
|
||
7FFAABA8C000
|
trusted library allocation
|
page read and write
|
||
1F60000
|
heap
|
page read and write
|
||
2D20F5EB000
|
heap
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
1D500D6D000
|
trusted library allocation
|
page read and write
|
||
2539EC42000
|
trusted library allocation
|
page read and write
|
||
7FFAABA60000
|
trusted library allocation
|
page read and write
|
||
21E35920000
|
heap
|
page read and write
|
||
2539C2D5000
|
heap
|
page read and write
|
||
1413000
|
heap
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
2D20F59D000
|
heap
|
page read and write
|
||
1DDE000
|
stack
|
page read and write
|
||
1B65F000
|
stack
|
page read and write
|
||
190DCDE0000
|
heap
|
page read and write
|
||
7FFAAB9A0000
|
trusted library allocation
|
page read and write
|
||
1D0902E5000
|
trusted library allocation
|
page read and write
|
||
1D575A14000
|
heap
|
page read and write
|
||
7FFB1E3C5000
|
unkown
|
page readonly
|
||
7FFAAB9D0000
|
trusted library allocation
|
page read and write
|
||
190DCE6D000
|
heap
|
page read and write
|
||
190C4770000
|
heap
|
page execute and read and write
|
||
8EB000
|
heap
|
page read and write
|
||
1D0902EF000
|
trusted library allocation
|
page read and write
|
||
7FFAABACD000
|
trusted library allocation
|
page read and write
|
||
26F574D0000
|
heap
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
2D22977C000
|
heap
|
page read and write
|
||
7FFAAB850000
|
trusted library allocation
|
page execute and read and write
|
||
1580000
|
heap
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
7FFAAB694000
|
trusted library allocation
|
page read and write
|
||
20CBE5C1000
|
heap
|
page read and write
|
||
E21000
|
heap
|
page read and write
|
||
7FFAAB6DC000
|
trusted library allocation
|
page execute and read and write
|
||
26F57800000
|
trusted library allocation
|
page read and write
|
||
1D501033000
|
trusted library allocation
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
470000
|
unkown
|
page readonly
|
||
7FFAABA10000
|
trusted library allocation
|
page read and write
|
||
2D20F59F000
|
heap
|
page read and write
|
||
190DCE78000
|
heap
|
page read and write
|
||
2D212E26000
|
trusted library allocation
|
page read and write
|
||
B17AF79000
|
stack
|
page read and write
|
||
2539EE5E000
|
trusted library allocation
|
page read and write
|
||
1D0903A8000
|
trusted library allocation
|
page read and write
|
||
2D2294C0000
|
heap
|
page read and write
|
||
190C2E2E000
|
heap
|
page read and write
|
||
7FFAABAF0000
|
trusted library allocation
|
page read and write
|
||
1D575A3C000
|
heap
|
page read and write
|
||
2D212E01000
|
trusted library allocation
|
page read and write
|
||
EC5D3CD000
|
stack
|
page read and write
|
||
7FFAAB9B4000
|
trusted library allocation
|
page read and write
|
||
1D5756E7000
|
heap
|
page execute and read and write
|
||
7FFAAB854000
|
trusted library allocation
|
page read and write
|
||
DAB933E000
|
stack
|
page read and write
|
||
15443BC000
|
stack
|
page read and write
|
||
253B621D000
|
heap
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
7FFAAB710000
|
trusted library allocation
|
page read and write
|
||
7FFAAB750000
|
trusted library allocation
|
page execute and read and write
|
||
253ADE88000
|
trusted library allocation
|
page read and write
|
||
1D0818BC000
|
trusted library allocation
|
page read and write
|
||
190C5553000
|
trusted library allocation
|
page read and write
|
||
DABA08F000
|
stack
|
page read and write
|
||
26F58FDD000
|
heap
|
page read and write
|
||
26F57686000
|
heap
|
page read and write
|
||
1B550000
|
heap
|
page read and write
|
||
1D50007F000
|
trusted library allocation
|
page read and write
|
||
1D575950000
|
heap
|
page read and write
|
||
190C2E52000
|
heap
|
page read and write
|
||
1B450000
|
heap
|
page read and write
|
||
7FFAAB970000
|
trusted library allocation
|
page read and write
|
||
26F5A8DD000
|
trusted library allocation
|
page read and write
|
||
7FFAAB8E0000
|
trusted library allocation
|
page read and write
|
||
129D1000
|
trusted library allocation
|
page read and write
|
||
2D229630000
|
heap
|
page read and write
|
||
190C58FF000
|
trusted library allocation
|
page read and write
|
||
2539D9E0000
|
heap
|
page execute and read and write
|
||
7FFAAB860000
|
trusted library allocation
|
page read and write
|
||
DAB963F000
|
stack
|
page read and write
|
||
1D575825000
|
heap
|
page read and write
|
||
7FFAAB68B000
|
trusted library allocation
|
page read and write
|
||
7FFAAB683000
|
trusted library allocation
|
page execute and read and write
|
||
2539DB40000
|
heap
|
page execute and read and write
|
||
2D210F40000
|
trusted library allocation
|
page read and write
|
||
21E4FC5C000
|
heap
|
page read and write
|
||
21E4FC90000
|
heap
|
page read and write
|
||
7FFAAB8E0000
|
trusted library allocation
|
page read and write
|
||
26F59370000
|
heap
|
page read and write
|
||
2D2294F6000
|
heap
|
page read and write
|
||
7FFAAB9BC000
|
trusted library allocation
|
page read and write
|
||
7FFAAB9C9000
|
trusted library allocation
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
190D4AE6000
|
trusted library allocation
|
page read and write
|
||
B73697B000
|
stack
|
page read and write
|
||
B17BFCE000
|
stack
|
page read and write
|
||
13F6000
|
heap
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
26F5768A000
|
heap
|
page read and write
|
||
26F5A99E000
|
trusted library allocation
|
page read and write
|
||
7FFAABAF0000
|
trusted library allocation
|
page read and write
|
||
190C2D00000
|
heap
|
page read and write
|
||
DAB96BC000
|
stack
|
page read and write
|
||
EC5C7FE000
|
stack
|
page read and write
|
||
253B6267000
|
heap
|
page read and write
|
||
B17AE7B000
|
stack
|
page read and write
|
||
1BBAE000
|
stack
|
page read and write
|
||
21E39260000
|
trusted library allocation
|
page read and write
|
||
7FFAAB68D000
|
trusted library allocation
|
page execute and read and write
|
||
28F9D8F000
|
stack
|
page read and write
|
||
1543F7D000
|
stack
|
page read and write
|
||
7FFAAB980000
|
trusted library allocation
|
page read and write
|
||
253ADE76000
|
trusted library allocation
|
page read and write
|
||
190C5A81000
|
trusted library allocation
|
page read and write
|
||
1D573738000
|
heap
|
page read and write
|
||
EC5C0FE000
|
stack
|
page read and write
|
||
7FFAAB990000
|
trusted library allocation
|
page read and write
|
||
B17AD79000
|
stack
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
26F5772E000
|
heap
|
page read and write
|
||
2D22988B000
|
heap
|
page read and write
|
||
7FFAAB8A0000
|
trusted library allocation
|
page read and write
|
||
26F5769C000
|
heap
|
page read and write
|
||
7DF4F47F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB8C0000
|
trusted library allocation
|
page read and write
|
||
2539D9F0000
|
heap
|
page read and write
|
||
7FFAABA50000
|
trusted library allocation
|
page read and write
|
||
7FFAAB673000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB1E3C0000
|
unkown
|
page read and write
|
||
26F5934C000
|
heap
|
page read and write
|
||
7FFAAB691000
|
trusted library allocation
|
page read and write
|
||
DAB92F9000
|
stack
|
page read and write
|
||
1B39E000
|
stack
|
page read and write
|
||
1544E8E000
|
stack
|
page read and write
|
||
7FFAABAA6000
|
trusted library allocation
|
page read and write
|
||
7FFAAB980000
|
trusted library allocation
|
page read and write
|
||
7FFAAB69D000
|
trusted library allocation
|
page execute and read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
190D4ACC000
|
trusted library allocation
|
page read and write
|
||
20CBE5C1000
|
heap
|
page read and write
|
||
7FFAAB8D0000
|
trusted library allocation
|
page read and write
|
||
1D09030F000
|
trusted library allocation
|
page read and write
|
||
253ADBF1000
|
trusted library allocation
|
page read and write
|
||
7FFAAB852000
|
trusted library allocation
|
page read and write
|
||
7FFAAB880000
|
trusted library allocation
|
page read and write
|
||
7FFAAB822000
|
trusted library allocation
|
page read and write
|
||
190C5233000
|
trusted library allocation
|
page read and write
|
||
1D0F808F000
|
heap
|
page read and write
|
||
13151000
|
trusted library allocation
|
page read and write
|
||
1543FF9000
|
stack
|
page read and write
|
||
2D212950000
|
trusted library allocation
|
page read and write
|
||
7FFAAB6A4000
|
trusted library allocation
|
page read and write
|
||
7FFAAB91B000
|
trusted library allocation
|
page read and write
|
||
7FFAABAB0000
|
trusted library allocation
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
1D57377B000
|
heap
|
page read and write
|
||
7FFAAB663000
|
trusted library allocation
|
page execute and read and write
|
||
2D211001000
|
trusted library allocation
|
page read and write
|
||
21E372B0000
|
trusted library allocation
|
page read and write
|
||
1BCCE000
|
stack
|
page read and write
|
||
13BD74E0000
|
heap
|
page read and write
|
||
1D501125000
|
trusted library allocation
|
page read and write
|
||
7FFAAB980000
|
trusted library allocation
|
page read and write
|
||
2539C2D0000
|
heap
|
page read and write
|
||
2D2297AB000
|
heap
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
7FFAAB7A0000
|
trusted library allocation
|
page execute and read and write
|
||
B17B2FC000
|
stack
|
page read and write
|
||
2539BF00000
|
heap
|
page read and write
|
||
15440BC000
|
stack
|
page read and write
|
||
7FFAAB870000
|
trusted library allocation
|
page read and write
|
||
1025000
|
heap
|
page read and write
|
||
B17AEFE000
|
stack
|
page read and write
|
||
28F89F2000
|
stack
|
page read and write
|
||
1D0F830D000
|
heap
|
page read and write
|
||
190C2DE0000
|
heap
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
DAB90FA000
|
stack
|
page read and write
|
||
253B61C4000
|
heap
|
page read and write
|
||
7FFAAB848000
|
trusted library allocation
|
page read and write
|
||
2539EE90000
|
trusted library allocation
|
page read and write
|
||
1D5004CD000
|
trusted library allocation
|
page read and write
|
||
26F5AE75000
|
trusted library allocation
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
21E372A0000
|
heap
|
page readonly
|
||
140F1000
|
trusted library allocation
|
page read and write
|
||
13BD74C0000
|
heap
|
page read and write
|
||
2D2114CD000
|
trusted library allocation
|
page read and write
|
||
7FFAAB9E0000
|
trusted library allocation
|
page read and write
|
||
7FFAABA70000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
91C000
|
heap
|
page read and write
|
||
7FFAAB680000
|
trusted library allocation
|
page read and write
|
||
21E384B1000
|
trusted library allocation
|
page read and write
|
||
F50000
|
heap
|
page execute and read and write
|
||
7FFAAB9E8000
|
trusted library allocation
|
page read and write
|
||
7FFAAB8A0000
|
trusted library allocation
|
page read and write
|
||
11F4000
|
stack
|
page read and write
|
||
7FFAABAE0000
|
trusted library allocation
|
page read and write
|
||
DAB943E000
|
stack
|
page read and write
|
||
D18000
|
heap
|
page read and write
|
||
537517E000
|
stack
|
page read and write
|
||
B73627F000
|
stack
|
page read and write
|
||
253B60CB000
|
heap
|
page read and write
|
||
190C2E95000
|
heap
|
page read and write
|
||
B17BCCE000
|
stack
|
page read and write
|
||
1D080F79000
|
trusted library allocation
|
page read and write
|
||
EC5C3FE000
|
stack
|
page read and write
|
||
40F1000
|
trusted library allocation
|
page read and write
|
||
B17B27E000
|
stack
|
page read and write
|
||
7FFAAB9A3000
|
trusted library allocation
|
page read and write
|
||
7FFAAB8A0000
|
trusted library allocation
|
page read and write
|
||
190C6600000
|
trusted library allocation
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
2D20F5E6000
|
heap
|
page read and write
|
||
253B62B0000
|
heap
|
page read and write
|
||
1D5757B9000
|
heap
|
page read and write
|
||
1D501E26000
|
trusted library allocation
|
page read and write
|
||
2539EBB2000
|
trusted library allocation
|
page read and write
|
||
1BBC0000
|
heap
|
page execute and read and write
|
||
7FFAAB674000
|
trusted library allocation
|
page read and write
|
||
21E4FB40000
|
heap
|
page read and write
|
||
7D0000
|
unkown
|
page readonly
|
||
C90000
|
heap
|
page read and write
|
||
7FFAAB832000
|
trusted library allocation
|
page read and write
|
||
7FFAAB899000
|
trusted library allocation
|
page read and write
|
||
2D21288E000
|
trusted library allocation
|
page read and write
|
||
2539DDA9000
|
trusted library allocation
|
page read and write
|
||
2D210EF0000
|
trusted library allocation
|
page read and write
|
||
26F575D0000
|
heap
|
page read and write
|
||
190C2E98000
|
heap
|
page read and write
|
||
26F5A32B000
|
trusted library allocation
|
page read and write
|
||
2D229780000
|
heap
|
page read and write
|
||
7FFAAB9A0000
|
trusted library allocation
|
page read and write
|
||
253B61C8000
|
heap
|
page read and write
|
||
14B0000
|
trusted library allocation
|
page read and write
|
||
26F59190000
|
heap
|
page read and write
|
||
190D4811000
|
trusted library allocation
|
page read and write
|
||
7FFAAB970000
|
trusted library allocation
|
page read and write
|
||
26F57648000
|
heap
|
page read and write
|
||
1D0F7AC0000
|
heap
|
page read and write
|
||
21E3794E000
|
trusted library allocation
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
21E4FD40000
|
trusted library allocation
|
page read and write
|
||
253B632C000
|
heap
|
page read and write
|
||
2539EBB7000
|
trusted library allocation
|
page read and write
|
||
190C65BB000
|
trusted library allocation
|
page read and write
|
||
100F000
|
stack
|
page read and write
|
||
7FFAAB65D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB920000
|
trusted library allocation
|
page read and write
|
||
190C2F10000
|
heap
|
page read and write
|
||
2D221306000
|
trusted library allocation
|
page read and write
|
||
53752FB000
|
stack
|
page read and write
|
||
190C2F85000
|
heap
|
page read and write
|
||
1D0F7AC5000
|
heap
|
page read and write
|
||
21E38705000
|
trusted library allocation
|
page read and write
|
||
28F9E8B000
|
stack
|
page read and write
|
||
7FFAAB850000
|
trusted library allocation
|
page execute and read and write
|
||
190D484F000
|
trusted library allocation
|
page read and write
|
||
1D0F7CB0000
|
heap
|
page execute and read and write
|
||
13BD7530000
|
heap
|
page read and write
|
||
7FFAAB682000
|
trusted library allocation
|
page read and write
|
||
7FFAAB8E0000
|
trusted library allocation
|
page read and write
|
||
21E37270000
|
trusted library allocation
|
page read and write
|
||
28F923E000
|
stack
|
page read and write
|
||
2539D950000
|
heap
|
page readonly
|
||
DAB94B8000
|
stack
|
page read and write
|
||
7FFAAB726000
|
trusted library allocation
|
page read and write
|
||
7FFAAB890000
|
trusted library allocation
|
page read and write
|
||
B7364FB000
|
stack
|
page read and write
|
||
2539EAE6000
|
trusted library allocation
|
page read and write
|
||
1D0F60A8000
|
heap
|
page read and write
|
||
B735FFE000
|
stack
|
page read and write
|
||
2539D960000
|
trusted library allocation
|
page read and write
|
||
2539D920000
|
trusted library allocation
|
page read and write
|
||
20CBE5C1000
|
heap
|
page read and write
|
||
26F57820000
|
heap
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
1B4EE000
|
stack
|
page read and write
|
||
1D081906000
|
trusted library allocation
|
page read and write
|
||
1D0F7C70000
|
heap
|
page execute and read and write
|
||
7FFAAB83A000
|
trusted library allocation
|
page read and write
|
||
2D2212F6000
|
trusted library allocation
|
page read and write
|
||
7FFAAB920000
|
trusted library allocation
|
page read and write
|
||
13AC000
|
heap
|
page read and write
|
||
7FFAAB9D2000
|
trusted library allocation
|
page read and write
|
||
7FFAAB811000
|
trusted library allocation
|
page read and write
|
||
26F5767C000
|
heap
|
page read and write
|
||
190C577F000
|
trusted library allocation
|
page read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
16B0000
|
heap
|
page read and write
|
||
190DCEDE000
|
heap
|
page read and write
|
||
26F59798000
|
trusted library allocation
|
page read and write
|
||
7FFAAB8E0000
|
trusted library allocation
|
page read and write
|
||
21E4F949000
|
heap
|
page read and write
|
||
7FFAABA60000
|
trusted library allocation
|
page read and write
|
||
21E47774000
|
trusted library allocation
|
page read and write
|
||
190C5779000
|
trusted library allocation
|
page read and write
|
||
7FFAAB890000
|
trusted library allocation
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
1B5DE000
|
stack
|
page read and write
|
||
1D575989000
|
heap
|
page read and write
|
||
7FFAABA6C000
|
trusted library allocation
|
page read and write
|
||
2539F46F000
|
trusted library allocation
|
page read and write
|
||
7FFAABAB3000
|
trusted library allocation
|
page read and write
|
||
7FFAAB930000
|
trusted library allocation
|
page read and write
|
||
7FFAAB980000
|
trusted library allocation
|
page read and write
|
||
2D20F6B0000
|
heap
|
page read and write
|
||
2D229788000
|
heap
|
page read and write
|
||
2539EAE2000
|
trusted library allocation
|
page read and write
|
||
7FFAAB858000
|
trusted library allocation
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
2D22980E000
|
heap
|
page read and write
|
||
2539EAF7000
|
trusted library allocation
|
page read and write
|
||
2D22900B000
|
heap
|
page read and write
|
||
1D5750C0000
|
trusted library allocation
|
page read and write
|
||
1D501E21000
|
trusted library allocation
|
page read and write
|
||
7FFAAB8A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB870000
|
trusted library allocation
|
page read and write
|
||
21E47481000
|
trusted library allocation
|
page read and write
|
||
7FFAAB73C000
|
trusted library allocation
|
page execute and read and write
|
||
190C5AE2000
|
trusted library allocation
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
270E000
|
stack
|
page read and write
|
||
2D212783000
|
trusted library allocation
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
D56000
|
heap
|
page read and write
|
||
1AD68C000
|
stack
|
page read and write
|
||
1D57376B000
|
heap
|
page read and write
|
||
8D6000
|
heap
|
page read and write
|
||
1D080C0A000
|
trusted library allocation
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
7FFAAB868000
|
trusted library allocation
|
page read and write
|
||
1D575170000
|
heap
|
page execute and read and write
|
||
7FFAAB8B0000
|
trusted library allocation
|
page read and write
|
||
1D0F79E0000
|
trusted library allocation
|
page read and write
|
||
2D210F96000
|
heap
|
page execute and read and write
|
||
21E474EE000
|
trusted library allocation
|
page read and write
|
||
28FA08E000
|
stack
|
page read and write
|
||
21E35AC0000
|
heap
|
page read and write
|
||
7FFAAB950000
|
trusted library allocation
|
page read and write
|
||
20CBE5C1000
|
heap
|
page read and write
|
||
190C60A1000
|
trusted library allocation
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
2D20F660000
|
heap
|
page read and write
|
||
2D22106F000
|
trusted library allocation
|
page read and write
|
||
7FFAAB864000
|
trusted library allocation
|
page read and write
|
||
1D575A60000
|
heap
|
page read and write
|
||
7FF497A00000
|
trusted library allocation
|
page execute and read and write
|
||
190C4790000
|
trusted library allocation
|
page read and write
|
||
918000
|
heap
|
page read and write
|
||
7FFAABA00000
|
trusted library allocation
|
page read and write
|
||
7FFAAB940000
|
trusted library allocation
|
page read and write
|
||
7FFAAB9E0000
|
trusted library allocation
|
page read and write
|
||
1D0F80C2000
|
heap
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
7FFAAB9CC000
|
trusted library allocation
|
page read and write
|
||
7FFAAB8D0000
|
trusted library allocation
|
page read and write
|
||
1D08191E000
|
trusted library allocation
|
page read and write
|
||
7FFAAB790000
|
trusted library allocation
|
page execute and read and write
|
||
1C86D000
|
stack
|
page read and write
|
||
20CBE5C1000
|
heap
|
page read and write
|
||
7FFAAB780000
|
trusted library allocation
|
page execute and read and write
|
||
2539BEF0000
|
heap
|
page read and write
|
||
21E4FBC9000
|
heap
|
page read and write
|
||
7FFAAB756000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB766000
|
trusted library allocation
|
page execute and read and write
|
||
3B8C000
|
heap
|
page read and write
|
||
26F57610000
|
heap
|
page read and write
|
||
7FFAAB832000
|
trusted library allocation
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
7FFAAB920000
|
trusted library allocation
|
page read and write
|
||
2D211C05000
|
trusted library allocation
|
page read and write
|
||
2D229750000
|
heap
|
page read and write
|
||
7FFAABA00000
|
trusted library allocation
|
page read and write
|
||
190DC810000
|
trusted library allocation
|
page read and write
|
||
5374DFE000
|
stack
|
page read and write
|
||
1D0818E1000
|
trusted library allocation
|
page read and write
|
||
1D5756F0000
|
heap
|
page read and write
|
||
7FFAAB910000
|
trusted library allocation
|
page read and write
|
||
622000
|
unkown
|
page readonly
|
||
26F597C2000
|
trusted library allocation
|
page read and write
|
||
2D2298A9000
|
heap
|
page read and write
|
||
1D50130B000
|
trusted library allocation
|
page read and write
|
||
7FFAAB940000
|
trusted library allocation
|
page read and write
|
||
1D500228000
|
trusted library allocation
|
page read and write
|
||
7FFAAB7F2000
|
trusted library allocation
|
page read and write
|
||
7FFAAB950000
|
trusted library allocation
|
page read and write
|
||
2539BF5E000
|
heap
|
page read and write
|
||
13CA000
|
heap
|
page read and write
|
||
253B6228000
|
heap
|
page read and write
|
||
7DF4F47E0000
|
trusted library allocation
|
page execute and read and write
|
||
190DCE29000
|
heap
|
page read and write
|
||
1AD9D000
|
stack
|
page read and write
|
||
1D5756F6000
|
heap
|
page read and write
|
||
1544E0C000
|
stack
|
page read and write
|
||
13158000
|
trusted library allocation
|
page read and write
|
||
5374D79000
|
stack
|
page read and write
|
||
1D510031000
|
trusted library allocation
|
page read and write
|
||
7FFAABAF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB653000
|
trusted library allocation
|
page execute and read and write
|
||
1418000
|
heap
|
page read and write
|
||
EC5C6FE000
|
stack
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
253B61D4000
|
heap
|
page read and write
|
||
1D573640000
|
heap
|
page read and write
|
||
EC5C4F7000
|
stack
|
page read and write
|
||
2811000
|
trusted library allocation
|
page read and write
|
||
2D229950000
|
heap
|
page read and write
|
||
7FFAAB830000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB8D0000
|
trusted library allocation
|
page read and write
|
||
B17BD4D000
|
stack
|
page read and write
|
||
2539EAFB000
|
trusted library allocation
|
page read and write
|
||
140F000
|
heap
|
page read and write
|
||
7FFAAB9A0000
|
trusted library allocation
|
page read and write
|
||
21E372C0000
|
heap
|
page read and write
|
||
145E000
|
heap
|
page read and write
|
||
7FFAAB910000
|
trusted library allocation
|
page read and write
|
||
2D20F6D0000
|
trusted library section
|
page read and write
|
||
2539DB81000
|
trusted library allocation
|
page read and write
|
||
1D0F60DA000
|
heap
|
page read and write
|
||
1D080227000
|
trusted library allocation
|
page read and write
|
||
7FFAAB66D000
|
trusted library allocation
|
page execute and read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
7FFAAB680000
|
trusted library allocation
|
page read and write
|
||
2539BFFA000
|
heap
|
page read and write
|
||
1D5756E0000
|
heap
|
page execute and read and write
|
||
1BAA0000
|
heap
|
page read and write
|
||
2D210F00000
|
heap
|
page execute and read and write
|
||
5375DCE000
|
stack
|
page read and write
|
||
7FFAAB650000
|
trusted library allocation
|
page read and write
|
||
1543C7F000
|
stack
|
page read and write
|
||
13E3000
|
heap
|
page read and write
|
||
2539BF3D000
|
heap
|
page read and write
|
||
129D3000
|
trusted library allocation
|
page read and write
|
||
7FFAAB8E0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB990000
|
trusted library allocation
|
page read and write
|
||
27B0000
|
heap
|
page read and write
|
||
7FFAAB880000
|
trusted library allocation
|
page read and write
|
||
253B631C000
|
heap
|
page read and write
|
||
B7367FE000
|
stack
|
page read and write
|
||
1D501C1B000
|
trusted library allocation
|
page read and write
|
||
15441BA000
|
stack
|
page read and write
|
||
7FFAAB820000
|
trusted library allocation
|
page execute and read and write
|
||
28F90B9000
|
stack
|
page read and write
|
||
1D5103A6000
|
trusted library allocation
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
B17BECC000
|
stack
|
page read and write
|
||
CD6000
|
heap
|
page read and write
|
||
2D211D70000
|
trusted library allocation
|
page read and write
|
||
1D0F80BA000
|
heap
|
page read and write
|
||
1D575A69000
|
heap
|
page read and write
|
||
1D0F80F0000
|
heap
|
page read and write
|
||
7FFAAB674000
|
trusted library allocation
|
page read and write
|
||
1D0F8038000
|
heap
|
page read and write
|
||
7FFAAB766000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB654000
|
trusted library allocation
|
page read and write
|
||
26F5A8B6000
|
trusted library allocation
|
page read and write
|
||
253B5F10000
|
heap
|
page read and write
|
||
2D2212E8000
|
trusted library allocation
|
page read and write
|
||
2539F97F000
|
trusted library allocation
|
page read and write
|
||
7FFAAB870000
|
trusted library allocation
|
page read and write
|
||
21E37300000
|
heap
|
page execute and read and write
|
||
EC5C17E000
|
stack
|
page read and write
|
||
2539EE2C000
|
trusted library allocation
|
page read and write
|
||
2539ED99000
|
trusted library allocation
|
page read and write
|
||
7FFAAB8F0000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
1435000
|
heap
|
page read and write
|
||
2539C0F0000
|
heap
|
page read and write
|
||
21E381FD000
|
trusted library allocation
|
page read and write
|
||
190DD111000
|
heap
|
page read and write
|
||
7FFAAB8D0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB930000
|
trusted library allocation
|
page read and write
|
||
190C4780000
|
heap
|
page read and write
|
||
144E000
|
heap
|
page read and write
|
||
FF1000
|
stack
|
page read and write
|
||
7FFAAB694000
|
trusted library allocation
|
page read and write
|
||
2D229980000
|
trusted library allocation
|
page read and write
|
||
1D5737B4000
|
heap
|
page read and write
|
||
DABA18E000
|
stack
|
page read and write
|
||
1D510021000
|
trusted library allocation
|
page read and write
|
||
7FFAAB9E0000
|
trusted library allocation
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
7FFAABA70000
|
trusted library allocation
|
page execute and read and write
|
||
1B75E000
|
stack
|
page read and write
|
||
26F59380000
|
heap
|
page read and write
|
||
2AC0000
|
heap
|
page execute and read and write
|
||
7FFAAB870000
|
trusted library allocation
|
page read and write
|
||
7FFAAB9B0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB900000
|
trusted library allocation
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
26F59F9C000
|
trusted library allocation
|
page read and write
|
||
B17BF4C000
|
stack
|
page read and write
|
||
190C2E18000
|
heap
|
page read and write
|
||
1D5738A0000
|
heap
|
page read and write
|
||
7FFAAB950000
|
trusted library allocation
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
21E4F90B000
|
heap
|
page read and write
|
||
7FFAAB960000
|
trusted library allocation
|
page read and write
|
||
EC5C578000
|
stack
|
page read and write
|
||
7FFAAB8C0000
|
trusted library allocation
|
page read and write
|
||
2539BF42000
|
heap
|
page read and write
|
||
2950000
|
trusted library allocation
|
page read and write
|
||
7FFAAB684000
|
trusted library allocation
|
page read and write
|
||
7FFAAB854000
|
trusted library allocation
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
7FFAAB9D0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB6A0000
|
trusted library allocation
|
page read and write
|
||
314F000
|
stack
|
page read and write
|
||
186000
|
unkown
|
page readonly
|
||
2D229730000
|
heap
|
page execute and read and write
|
||
53751FE000
|
stack
|
page read and write
|
||
1D0F60DE000
|
heap
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
1D573730000
|
heap
|
page read and write
|
||
2D211228000
|
trusted library allocation
|
page read and write
|
||
21E392A5000
|
trusted library allocation
|
page read and write
|
||
26F59571000
|
trusted library allocation
|
page read and write
|
||
7FFAAB940000
|
trusted library allocation
|
page read and write
|
||
B73744E000
|
stack
|
page read and write
|
||
7FFAAB6A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB860000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB680000
|
trusted library allocation
|
page read and write
|
||
1D0F8000000
|
heap
|
page read and write
|
||
610000
|
unkown
|
page readonly
|
||
2D22983D000
|
heap
|
page read and write
|
||
190C5939000
|
trusted library allocation
|
page read and write
|
||
2D2122D4000
|
trusted library allocation
|
page read and write
|
||
7FFAAB8E0000
|
trusted library allocation
|
page read and write
|
||
190C606D000
|
trusted library allocation
|
page read and write
|
||
B73687E000
|
stack
|
page read and write
|
||
7FFAAB67B000
|
trusted library allocation
|
page read and write
|
||
1543CFE000
|
stack
|
page read and write
|
||
2D212868000
|
trusted library allocation
|
page read and write
|
||
7FFAAB740000
|
trusted library allocation
|
page read and write
|
||
7FFAAB930000
|
trusted library allocation
|
page read and write
|
||
DAB8D4E000
|
stack
|
page read and write
|
||
3151000
|
trusted library allocation
|
page read and write
|
||
14D0000
|
trusted library allocation
|
page read and write
|
||
2539BF8A000
|
heap
|
page read and write
|
||
1D575130000
|
trusted library allocation
|
page read and write
|
||
26F5A877000
|
trusted library allocation
|
page read and write
|
||
12818000
|
trusted library allocation
|
page read and write
|
||
DAB8DCE000
|
stack
|
page read and write
|
||
7FFAAB700000
|
trusted library allocation
|
page read and write
|
||
1D501868000
|
trusted library allocation
|
page read and write
|
||
21E4FBF8000
|
heap
|
page read and write
|
||
7FFAAB9E0000
|
trusted library allocation
|
page read and write
|
||
2539BF4C000
|
heap
|
page read and write
|
||
1D0813D1000
|
trusted library allocation
|
page read and write
|
||
7FFAAB940000
|
trusted library allocation
|
page read and write
|
||
190C47E1000
|
trusted library allocation
|
page read and write
|
||
190DCFF0000
|
heap
|
page read and write
|
||
1D5737B7000
|
heap
|
page read and write
|
||
7FFAABA70000
|
trusted library allocation
|
page read and write
|
||
1B4DE000
|
stack
|
page read and write
|
||
28F8CFF000
|
stack
|
page read and write
|
||
2539DA0D000
|
heap
|
page read and write
|
||
7FFAAB746000
|
trusted library allocation
|
page execute and read and write
|
||
190C2F40000
|
heap
|
page read and write
|
||
2539DB47000
|
heap
|
page execute and read and write
|
||
1B75E000
|
stack
|
page read and write
|
||
1D090001000
|
trusted library allocation
|
page read and write
|
||
7FFAAB9C0000
|
trusted library allocation
|
page read and write
|
||
21E37470000
|
heap
|
page read and write
|
||
2D20F5BD000
|
heap
|
page read and write
|
||
26F5A2FD000
|
trusted library allocation
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
2539D9D0000
|
trusted library allocation
|
page read and write
|
||
21E359BB000
|
heap
|
page read and write
|
||
7FFB1E3B6000
|
unkown
|
page readonly
|
||
2539F40C000
|
trusted library allocation
|
page read and write
|
||
2D20F5A7000
|
heap
|
page read and write
|
||
1D5102ED000
|
trusted library allocation
|
page read and write
|
||
DAB91F9000
|
stack
|
page read and write
|
||
2AE1000
|
trusted library allocation
|
page read and write
|
||
7FFAABAD0000
|
trusted library allocation
|
page read and write
|
||
13B3000
|
heap
|
page read and write
|
||
253ADE70000
|
trusted library allocation
|
page read and write
|
||
7FFAABAA0000
|
trusted library allocation
|
page execute and read and write
|
||
26F576C8000
|
heap
|
page read and write
|
||
DF8000
|
heap
|
page read and write
|
||
5374F78000
|
stack
|
page read and write
|
||
26F5AE8C000
|
trusted library allocation
|
page read and write
|
||
20CBE5C1000
|
heap
|
page read and write
|
||
7FFAAB930000
|
trusted library allocation
|
page read and write
|
||
E2C000
|
heap
|
page read and write
|
||
7FFAAB6EC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB8F0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB683000
|
trusted library allocation
|
page execute and read and write
|
||
2D210ED0000
|
trusted library allocation
|
page read and write
|
||
1D0F60FA000
|
heap
|
page read and write
|
||
7FFAAB68D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB9A4000
|
trusted library allocation
|
page read and write
|
||
15D5000
|
heap
|
page read and write
|
||
1D081348000
|
trusted library allocation
|
page read and write
|
||
21E3909F000
|
trusted library allocation
|
page read and write
|
||
7FFAAB840000
|
trusted library allocation
|
page execute and read and write
|
||
28F8FF8000
|
stack
|
page read and write
|
||
190D4AD6000
|
trusted library allocation
|
page read and write
|
||
1D5738D0000
|
trusted library allocation
|
page read and write
|
||
21E38786000
|
trusted library allocation
|
page read and write
|
||
1D0F834E000
|
heap
|
page read and write
|
||
1B3DE000
|
stack
|
page read and write
|
||
5E1000
|
stack
|
page read and write
|
||
7FFAAB693000
|
trusted library allocation
|
page execute and read and write
|
||
28F913B000
|
stack
|
page read and write
|
||
2539ED60000
|
trusted library allocation
|
page read and write
|
||
13153000
|
trusted library allocation
|
page read and write
|
||
7FFAAB900000
|
trusted library allocation
|
page read and write
|
||
7FFAAB6DC000
|
trusted library allocation
|
page execute and read and write
|
||
21E359C4000
|
heap
|
page read and write
|
||
E19000
|
heap
|
page read and write
|
||
1D080F73000
|
trusted library allocation
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
2D2294CA000
|
heap
|
page read and write
|
||
1D0F8057000
|
heap
|
page read and write
|
||
7FFAAB930000
|
trusted library allocation
|
page read and write
|
||
7FFAAB801000
|
trusted library allocation
|
page read and write
|
||
1D501DDC000
|
trusted library allocation
|
page read and write
|
||
2539ECA9000
|
trusted library allocation
|
page read and write
|
||
154423E000
|
stack
|
page read and write
|
||
B22000
|
unkown
|
page readonly
|
||
7FFAAB68D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB834000
|
trusted library allocation
|
page read and write
|
||
21E4F966000
|
heap
|
page read and write
|
||
2539EAEE000
|
trusted library allocation
|
page read and write
|
||
7FFAAB910000
|
trusted library allocation
|
page read and write
|
||
1543E7F000
|
stack
|
page read and write
|
||
26F5AE50000
|
trusted library allocation
|
page read and write
|
||
2539EF4B000
|
trusted library allocation
|
page read and write
|
||
410B000
|
trusted library allocation
|
page read and write
|
||
EC5C77C000
|
stack
|
page read and write
|
||
7FFAAB940000
|
trusted library allocation
|
page read and write
|
||
7DF46D840000
|
trusted library allocation
|
page execute and read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
1D081130000
|
trusted library allocation
|
page read and write
|
||
7FFAAB716000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
trusted library allocation
|
page read and write
|
||
1398000
|
heap
|
page read and write
|
||
2539F300000
|
trusted library allocation
|
page read and write
|
||
21E38C06000
|
trusted library allocation
|
page read and write
|
||
2ADF000
|
trusted library allocation
|
page read and write
|
||
1D573830000
|
heap
|
page read and write
|
||
DAB8CC3000
|
stack
|
page read and write
|
||
E56000
|
heap
|
page read and write
|
||
26F5AE2B000
|
trusted library allocation
|
page read and write
|
||
253ADBA1000
|
trusted library allocation
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
7FFAAB858000
|
trusted library allocation
|
page read and write
|
||
7DF464500000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB840000
|
trusted library allocation
|
page execute and read and write
|
||
2D20F6F5000
|
heap
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
21E39285000
|
trusted library allocation
|
page read and write
|
||
21E38723000
|
trusted library allocation
|
page read and write
|
||
7FFAAB680000
|
trusted library allocation
|
page read and write
|
||
1D0F7C76000
|
heap
|
page execute and read and write
|
||
1715000
|
heap
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
EC5C377000
|
stack
|
page read and write
|
||
7FFAABAC0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB7F0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB7A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB844000
|
trusted library allocation
|
page read and write
|
||
7FFAAB706000
|
trusted library allocation
|
page read and write
|
||
1D5102F7000
|
trusted library allocation
|
page read and write
|
||
26F57770000
|
trusted library allocation
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
5375CCE000
|
stack
|
page read and write
|
||
1D575920000
|
heap
|
page read and write
|
||
190C47D0000
|
heap
|
page read and write
|
||
1D573850000
|
heap
|
page read and write
|
||
7FFAAB8B0000
|
trusted library allocation
|
page read and write
|
||
B17BE47000
|
stack
|
page read and write
|
||
1D575810000
|
heap
|
page read and write
|
||
7FFAAB900000
|
trusted library allocation
|
page read and write
|
||
7FFAAB740000
|
trusted library allocation
|
page execute and read and write
|
||
1D0F7940000
|
heap
|
page read and write
|
||
1D575A87000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
5375FCE000
|
stack
|
page read and write
|
||
26F5AAEF000
|
trusted library allocation
|
page read and write
|
||
190DD138000
|
heap
|
page read and write
|
||
20CBE5C1000
|
heap
|
page read and write
|
||
28F903F000
|
stack
|
page read and write
|
||
7FFAAB9E0000
|
trusted library allocation
|
page read and write
|
||
253B6202000
|
heap
|
page read and write
|
||
2ABE000
|
stack
|
page read and write
|
||
7FFAAB80A000
|
trusted library allocation
|
page read and write
|
||
5374FF6000
|
stack
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
7FFAAB736000
|
trusted library allocation
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
7FFAAB960000
|
trusted library allocation
|
page read and write
|
||
1330000
|
trusted library allocation
|
page read and write
|
||
28F8E7E000
|
stack
|
page read and write
|
||
7FFAAB940000
|
trusted library allocation
|
page read and write
|
||
26F57750000
|
trusted library allocation
|
page read and write
|
||
1AF5D000
|
stack
|
page read and write
|
||
21E35988000
|
heap
|
page read and write
|
||
190C6047000
|
trusted library allocation
|
page read and write
|
||
253B61CC000
|
heap
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
28C0000
|
heap
|
page execute and read and write
|
||
7FFAAB684000
|
trusted library allocation
|
page read and write
|
||
1CFAD000
|
stack
|
page read and write
|
||
1544F09000
|
stack
|
page read and write
|
||
1D5757E5000
|
heap
|
page read and write
|
||
12AD8000
|
trusted library allocation
|
page read and write
|
||
7FFAABA90000
|
trusted library allocation
|
page read and write
|
||
7FFAAB730000
|
trusted library allocation
|
page read and write
|
||
21E4FC7A000
|
heap
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
7FFAAB8D0000
|
trusted library allocation
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
1D0F80BE000
|
heap
|
page read and write
|
||
253B60E6000
|
heap
|
page read and write
|
||
7FFAABA90000
|
trusted library allocation
|
page read and write
|
||
1D501008000
|
trusted library allocation
|
page read and write
|
||
7FFAAB850000
|
trusted library allocation
|
page read and write
|
||
7FFAAB862000
|
trusted library allocation
|
page read and write
|
||
7FFAAB8B0000
|
trusted library allocation
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
29D1000
|
trusted library allocation
|
page read and write
|
||
253ADE78000
|
trusted library allocation
|
page read and write
|
||
7FFAAB9D0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB8C0000
|
trusted library allocation
|
page read and write
|
||
19DE000
|
stack
|
page read and write
|
||
7FFAAB690000
|
trusted library allocation
|
page read and write
|
||
7FFAAB69D000
|
trusted library allocation
|
page execute and read and write
|
||
2930000
|
trusted library allocation
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
21E35AC5000
|
heap
|
page read and write
|
||
7FFB1E3C0000
|
unkown
|
page read and write
|
||
1D5750A0000
|
trusted library allocation
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
253B60C0000
|
heap
|
page read and write
|
||
EC5D34C000
|
stack
|
page read and write
|
||
20CBE5A0000
|
heap
|
page read and write
|
||
253B6450000
|
heap
|
page read and write
|
||
7FFAAB9A3000
|
trusted library allocation
|
page read and write
|
||
EC5C073000
|
stack
|
page read and write
|
||
53749EE000
|
stack
|
page read and write
|
||
26F59560000
|
heap
|
page execute and read and write
|
||
1D575CC0000
|
heap
|
page read and write
|
||
20CBE5B0000
|
heap
|
page read and write
|
||
15442BE000
|
stack
|
page read and write
|
||
2D20F700000
|
heap
|
page read and write
|
||
315F000
|
trusted library allocation
|
page read and write
|
||
21E3853C000
|
trusted library allocation
|
page read and write
|
||
1D57598F000
|
heap
|
page read and write
|
There are 1551 hidden memdumps, click here to show them.