Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Windows Defender.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Windows Defender.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Windows Defender.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3mz3yklq.0er.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4bgonc1e.axp.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4kw2qyt5.pgg.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_54gfknof.qbi.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_arooirdp.yhs.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_chzbvprm.k4n.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dti0ppf5.beu.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dxmsxief.1od.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e3fkp05t.ajq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ljtuef3l.sho.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o2fs4jrv.0nb.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rhpwirbc.ab4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uc45zjc0.wd3.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wtcjmwls.p0f.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xg0j3rl5.dw2.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yv2pw3ou.4ls.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Defender.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Oct 8 11:03:17
2024, mtime=Tue Oct 8 11:03:17 2024, atime=Tue Oct 8 11:03:17 2024, length=87552, window=hide
|
dropped
|
There are 12 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Windows Defender.exe
|
"C:\Users\user\Desktop\Windows Defender.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\Windows
Defender.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows
Defender.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Windows
Defender.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows
Defender.exe'
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Windows Defender" /tr "C:\Users\user\AppData\Local\Windows
Defender.exe"
|
||
C:\Users\user\AppData\Local\Windows Defender.exe
|
"C:\Users\user\AppData\Local\Windows Defender.exe"
|
||
C:\Users\user\AppData\Local\Windows Defender.exe
|
"C:\Users\user\AppData\Local\Windows Defender.exe"
|
||
C:\Users\user\AppData\Local\Windows Defender.exe
|
"C:\Users\user\AppData\Local\Windows Defender.exe"
|
||
C:\Users\user\AppData\Local\Windows Defender.exe
|
"C:\Users\user\AppData\Local\Windows Defender.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 5 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
22.ip.gl.ply.gg
|
|||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://www.microsoft.cL
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
There are 5 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
22.ip.gl.ply.gg
|
147.185.221.22
|
||
ip-api.com
|
208.95.112.1
|
||
s-part-0017.t-0009.t-msedge.net
|
13.107.246.45
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
||
147.185.221.22
|
22.ip.gl.ply.gg
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Windows Defender
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
12EA1000
|
trusted library allocation
|
page read and write
|
||
2E91000
|
trusted library allocation
|
page read and write
|
||
AD2000
|
unkown
|
page readonly
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
1857BDC9000
|
heap
|
page read and write
|
||
12F53000
|
trusted library allocation
|
page read and write
|
||
7FFD34752000
|
trusted library allocation
|
page read and write
|
||
253A18C0000
|
heap
|
page execute and read and write
|
||
7FFD346E0000
|
trusted library allocation
|
page read and write
|
||
1B0623E2000
|
trusted library allocation
|
page read and write
|
||
123C000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
2538B201000
|
trusted library allocation
|
page read and write
|
||
7FFD34626000
|
trusted library allocation
|
page read and write
|
||
19F8C730000
|
trusted library allocation
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
1857B9E4000
|
heap
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34574000
|
trusted library allocation
|
page read and write
|
||
253876E8000
|
heap
|
page read and write
|
||
19F8E2EB000
|
trusted library allocation
|
page read and write
|
||
7DF49C3A0000
|
trusted library allocation
|
page execute and read and write
|
||
25387870000
|
trusted library section
|
page read and write
|
||
7FFD34870000
|
trusted library allocation
|
page read and write
|
||
7FFD3457D000
|
trusted library allocation
|
page execute and read and write
|
||
1857BC8E000
|
heap
|
page read and write
|
||
A36000
|
heap
|
page read and write
|
||
1857BC38000
|
heap
|
page read and write
|
||
253A18F0000
|
heap
|
page read and write
|
||
1B07A270000
|
heap
|
page read and write
|
||
5EC9EB7000
|
stack
|
page read and write
|
||
7133D77000
|
stack
|
page read and write
|
||
19F8FAD6000
|
trusted library allocation
|
page read and write
|
||
1857B4D4000
|
heap
|
page read and write
|
||
49FC78C000
|
stack
|
page read and write
|
||
1B071C82000
|
trusted library allocation
|
page read and write
|
||
18510031000
|
trusted library allocation
|
page read and write
|
||
19F8F396000
|
trusted library allocation
|
page read and write
|
||
1B05FF36000
|
heap
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
1B9DE000
|
stack
|
page read and write
|
||
7FFD3459C000
|
trusted library allocation
|
page execute and read and write
|
||
1AFF0000
|
heap
|
page execute and read and write
|
||
19FA6716000
|
heap
|
page execute and read and write
|
||
7FFD348AC000
|
trusted library allocation
|
page read and write
|
||
7FFD34581000
|
trusted library allocation
|
page read and write
|
||
2E51000
|
trusted library allocation
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
7FFD347C2000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
1231000
|
heap
|
page read and write
|
||
18501069000
|
trusted library allocation
|
page read and write
|
||
13F0000
|
trusted library allocation
|
page read and write
|
||
5EC9BFE000
|
stack
|
page read and write
|
||
7133B7E000
|
stack
|
page read and write
|
||
2538AC6E000
|
trusted library allocation
|
page read and write
|
||
19FA660C000
|
heap
|
page read and write
|
||
7FFD34560000
|
trusted library allocation
|
page read and write
|
||
7FFD34900000
|
trusted library allocation
|
page read and write
|
||
E5F000
|
stack
|
page read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
7FFD3456D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34560000
|
trusted library allocation
|
page read and write
|
||
7FFD34610000
|
trusted library allocation
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page read and write
|
||
7133693000
|
stack
|
page read and write
|
||
1857BC10000
|
heap
|
page execute and read and write
|
||
7FFD34730000
|
trusted library allocation
|
page execute and read and write
|
||
19F8C50E000
|
heap
|
page read and write
|
||
7FFD34880000
|
trusted library allocation
|
page read and write
|
||
7FFD3457D000
|
trusted library allocation
|
page execute and read and write
|
||
253996E3000
|
trusted library allocation
|
page read and write
|
||
CE2EBC3000
|
stack
|
page read and write
|
||
11B0000
|
trusted library allocation
|
page read and write
|
||
7FFD346F1000
|
trusted library allocation
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
1C11E000
|
stack
|
page read and write
|
||
253878C0000
|
heap
|
page readonly
|
||
2538B1E1000
|
trusted library allocation
|
page read and write
|
||
5EC9D79000
|
stack
|
page read and write
|
||
1B0600C0000
|
trusted library allocation
|
page read and write
|
||
185012AC000
|
trusted library allocation
|
page read and write
|
||
253890C0000
|
trusted library allocation
|
page read and write
|
||
C7E000
|
stack
|
page read and write
|
||
1857B430000
|
trusted library allocation
|
page read and write
|
||
7FFD34584000
|
trusted library allocation
|
page read and write
|
||
18501031000
|
trusted library allocation
|
page read and write
|
||
7FFD34574000
|
trusted library allocation
|
page read and write
|
||
71337DE000
|
stack
|
page read and write
|
||
253878B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34702000
|
trusted library allocation
|
page read and write
|
||
7FFD348AC000
|
trusted library allocation
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
5ECA0BC000
|
stack
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
1857B390000
|
trusted library allocation
|
page read and write
|
||
7FF40F540000
|
trusted library allocation
|
page execute and read and write
|
||
CD0000
|
heap
|
page execute and read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
7FFD34710000
|
trusted library allocation
|
page read and write
|
||
7FFD34870000
|
trusted library allocation
|
page read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page read and write
|
||
7FFD348AA000
|
trusted library allocation
|
page read and write
|
||
1850186A000
|
trusted library allocation
|
page read and write
|
||
253A1720000
|
heap
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
19FA6913000
|
heap
|
page read and write
|
||
7FFD34620000
|
trusted library allocation
|
page read and write
|
||
1B0629CB000
|
trusted library allocation
|
page read and write
|
||
7FFD34810000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
1BCE0000
|
heap
|
page read and write
|
||
185010C4000
|
trusted library allocation
|
page read and write
|
||
1B079EB4000
|
heap
|
page read and write
|
||
98C000
|
heap
|
page read and write
|
||
1B060140000
|
trusted library allocation
|
page read and write
|
||
25387890000
|
trusted library allocation
|
page read and write
|
||
7FFD34563000
|
trusted library allocation
|
page execute and read and write
|
||
900000
|
heap
|
page read and write
|
||
7FFD34562000
|
trusted library allocation
|
page read and write
|
||
18501E28000
|
trusted library allocation
|
page read and write
|
||
19F8C573000
|
heap
|
page read and write
|
||
935000
|
heap
|
page read and write
|
||
1B05FEFC000
|
heap
|
page read and write
|
||
CE2EF7E000
|
stack
|
page read and write
|
||
19F90070000
|
trusted library allocation
|
page read and write
|
||
7FFD34860000
|
trusted library allocation
|
page read and write
|
||
1C5BA000
|
stack
|
page read and write
|
||
26FF000
|
stack
|
page read and write
|
||
12738000
|
trusted library allocation
|
page read and write
|
||
5ECAD8C000
|
stack
|
page read and write
|
||
275F6BB0000
|
heap
|
page read and write
|
||
7FFD34580000
|
trusted library allocation
|
page read and write
|
||
1857B330000
|
trusted library section
|
page read and write
|
||
1B07A3BA000
|
heap
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
1B062B67000
|
trusted library allocation
|
page read and write
|
||
18510001000
|
trusted library allocation
|
page read and write
|
||
114D000
|
heap
|
page read and write
|
||
CE3000C000
|
stack
|
page read and write
|
||
19FA6740000
|
heap
|
page read and write
|
||
7FFD34800000
|
trusted library allocation
|
page read and write
|
||
18579920000
|
heap
|
page read and write
|
||
7FFD345FC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
1B3DD000
|
stack
|
page read and write
|
||
1B06376E000
|
trusted library allocation
|
page read and write
|
||
19F8C4FA000
|
heap
|
page read and write
|
||
C10000
|
unkown
|
page readonly
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
18501890000
|
trusted library allocation
|
page read and write
|
||
1B07A345000
|
heap
|
page read and write
|
||
7133EFF000
|
stack
|
page read and write
|
||
713407B000
|
stack
|
page read and write
|
||
1B0637B8000
|
trusted library allocation
|
page read and write
|
||
CE2F53E000
|
stack
|
page read and write
|
||
18579981000
|
heap
|
page read and write
|
||
7FFD3459C000
|
trusted library allocation
|
page execute and read and write
|
||
AB2000
|
heap
|
page read and write
|
||
1B05FEB0000
|
heap
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page read and write
|
||
1B063793000
|
trusted library allocation
|
page read and write
|
||
7FFD3455B000
|
trusted library allocation
|
page read and write
|
||
7FFD348D0000
|
trusted library allocation
|
page read and write
|
||
253878E0000
|
trusted library allocation
|
page read and write
|
||
19FA6AF0000
|
heap
|
page read and write
|
||
19F8C6A0000
|
heap
|
page read and write
|
||
1857B380000
|
heap
|
page readonly
|
||
49FC889000
|
stack
|
page read and write
|
||
19FA6664000
|
heap
|
page read and write
|
||
7FFD34740000
|
trusted library allocation
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page read and write
|
||
1BADE000
|
stack
|
page read and write
|
||
1857998B000
|
heap
|
page read and write
|
||
1857BB30000
|
heap
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
trusted library allocation
|
page read and write
|
||
1C6B8000
|
stack
|
page read and write
|
||
1CBAE000
|
stack
|
page read and write
|
||
1208000
|
heap
|
page read and write
|
||
10E6000
|
heap
|
page read and write
|
||
1B071C7A000
|
trusted library allocation
|
page read and write
|
||
1B079F76000
|
heap
|
page execute and read and write
|
||
19FA6710000
|
heap
|
page execute and read and write
|
||
110B000
|
heap
|
page read and write
|
||
CE2F2B9000
|
stack
|
page read and write
|
||
1857BC3C000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
1B05FDF0000
|
heap
|
page read and write
|
||
19F8C4B0000
|
heap
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
1857BA08000
|
heap
|
page read and write
|
||
18501163000
|
trusted library allocation
|
page read and write
|
||
1B4DD000
|
stack
|
page read and write
|
||
7FFD34594000
|
trusted library allocation
|
page read and write
|
||
1BC1E000
|
stack
|
page read and write
|
||
7FFD348C4000
|
trusted library allocation
|
page read and write
|
||
19F8E080000
|
heap
|
page read and write
|
||
19F8F2A5000
|
trusted library allocation
|
page read and write
|
||
25387880000
|
trusted library section
|
page read and write
|
||
25389210000
|
heap
|
page read and write
|
||
1857BCBD000
|
heap
|
page read and write
|
||
1B8A0000
|
heap
|
page execute and read and write
|
||
19F9E574000
|
trusted library allocation
|
page read and write
|
||
1C4BE000
|
stack
|
page read and write
|
||
1B07A0E0000
|
trusted library allocation
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
7FFD3462C000
|
trusted library allocation
|
page execute and read and write
|
||
7134C4C000
|
stack
|
page read and write
|
||
7133FFE000
|
stack
|
page read and write
|
||
49FBB39000
|
stack
|
page read and write
|
||
7FFD34660000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34873000
|
trusted library allocation
|
page read and write
|
||
1B07A274000
|
heap
|
page read and write
|
||
2F1C000
|
trusted library allocation
|
page read and write
|
||
253A19D0000
|
heap
|
page read and write
|
||
7FFD34583000
|
trusted library allocation
|
page read and write
|
||
19F90090000
|
trusted library allocation
|
page read and write
|
||
253993F1000
|
trusted library allocation
|
page read and write
|
||
25387610000
|
heap
|
page read and write
|
||
2538A6E7000
|
trusted library allocation
|
page read and write
|
||
1BBDE000
|
stack
|
page read and write
|
||
19F9004B000
|
trusted library allocation
|
page read and write
|
||
13DE000
|
stack
|
page read and write
|
||
2F80000
|
trusted library allocation
|
page read and write
|
||
1B8F0000
|
heap
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
5ECAC87000
|
stack
|
page read and write
|
||
114B000
|
heap
|
page read and write
|
||
1B0FE000
|
stack
|
page read and write
|
||
7FFD348A8000
|
trusted library allocation
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
7FFD34646000
|
trusted library allocation
|
page execute and read and write
|
||
185004CD000
|
trusted library allocation
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page read and write
|
||
7FFD347EE000
|
trusted library allocation
|
page read and write
|
||
12DF000
|
stack
|
page read and write
|
||
7FFD34722000
|
trusted library allocation
|
page read and write
|
||
5EC9AFE000
|
stack
|
page read and write
|
||
253893D0000
|
heap
|
page execute and read and write
|
||
10BD000
|
heap
|
page read and write
|
||
253A1ADA000
|
heap
|
page read and write
|
||
7FFD3458D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34646000
|
trusted library allocation
|
page execute and read and write
|
||
19F8C4B8000
|
heap
|
page read and write
|
||
2E4E000
|
stack
|
page read and write
|
||
1C21E000
|
stack
|
page read and write
|
||
253993E1000
|
trusted library allocation
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
253876C5000
|
heap
|
page read and write
|
||
19FA6957000
|
heap
|
page read and write
|
||
7FFD34550000
|
trusted library allocation
|
page read and write
|
||
253A18C6000
|
heap
|
page execute and read and write
|
||
1B062900000
|
trusted library allocation
|
page read and write
|
||
7FFD34996000
|
trusted library allocation
|
page read and write
|
||
997000
|
heap
|
page read and write
|
||
CE2FF8E000
|
stack
|
page read and write
|
||
1857BC40000
|
heap
|
page read and write
|
||
7FFD34744000
|
trusted library allocation
|
page read and write
|
||
253A19F6000
|
heap
|
page read and write
|
||
1B41D000
|
stack
|
page read and write
|
||
25387915000
|
heap
|
page read and write
|
||
1B062589000
|
trusted library allocation
|
page read and write
|
||
7FFD34564000
|
trusted library allocation
|
page read and write
|
||
7FFD34570000
|
trusted library allocation
|
page read and write
|
||
CE3020C000
|
stack
|
page read and write
|
||
1B20F000
|
stack
|
page read and write
|
||
2F59000
|
trusted library allocation
|
page read and write
|
||
7FFD34800000
|
trusted library allocation
|
page read and write
|
||
1423000
|
trusted library allocation
|
page read and write
|
||
1850188C000
|
trusted library allocation
|
page read and write
|
||
18579987000
|
heap
|
page read and write
|
||
CE3008E000
|
stack
|
page read and write
|
||
18510021000
|
trusted library allocation
|
page read and write
|
||
12F58000
|
trusted library allocation
|
page read and write
|
||
1B8D3000
|
heap
|
page read and write
|
||
7FFD34574000
|
trusted library allocation
|
page read and write
|
||
105E000
|
heap
|
page read and write
|
||
1BADF000
|
stack
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
7FFD34740000
|
trusted library allocation
|
page read and write
|
||
275F6AD0000
|
heap
|
page read and write
|
||
7133CF9000
|
stack
|
page read and write
|
||
AE7000
|
heap
|
page read and write
|
||
1B05FEB8000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
1857B370000
|
trusted library allocation
|
page read and write
|
||
19F9E280000
|
trusted library allocation
|
page read and write
|
||
49FC70F000
|
stack
|
page read and write
|
||
CA0000
|
trusted library allocation
|
page read and write
|
||
7FFD34660000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34810000
|
trusted library allocation
|
page read and write
|
||
7DF405680000
|
trusted library allocation
|
page execute and read and write
|
||
49FB8FD000
|
stack
|
page read and write
|
||
1B0629C3000
|
trusted library allocation
|
page read and write
|
||
5EC9FBF000
|
stack
|
page read and write
|
||
7FFD34574000
|
trusted library allocation
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34748000
|
trusted library allocation
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
253A1785000
|
heap
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page read and write
|
||
49FC80D000
|
stack
|
page read and write
|
||
7FFD34610000
|
trusted library allocation
|
page read and write
|
||
7FFD3462C000
|
trusted library allocation
|
page execute and read and write
|
||
19F8C680000
|
heap
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
2D20000
|
heap
|
page execute and read and write
|
||
1BCE3000
|
heap
|
page read and write
|
||
2D80000
|
heap
|
page execute and read and write
|
||
BC5000
|
heap
|
page read and write
|
||
7FFD34570000
|
trusted library allocation
|
page read and write
|
||
1B05FFA6000
|
heap
|
page read and write
|
||
7FFD3471A000
|
trusted library allocation
|
page read and write
|
||
1031000
|
heap
|
page read and write
|
||
1B05FE50000
|
heap
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page read and write
|
||
7FFD348E0000
|
trusted library allocation
|
page read and write
|
||
1B079FE0000
|
heap
|
page read and write
|
||
1B06290D000
|
trusted library allocation
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
1B079F70000
|
heap
|
page execute and read and write
|
||
7FFD34870000
|
trusted library allocation
|
page read and write
|
||
12708000
|
trusted library allocation
|
page read and write
|
||
12701000
|
trusted library allocation
|
page read and write
|
||
7FFD3455B000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
7FFD348B4000
|
trusted library allocation
|
page read and write
|
||
7FFD345F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34630000
|
trusted library allocation
|
page execute and read and write
|
||
49FBBBE000
|
stack
|
page read and write
|
||
2538A53A000
|
trusted library allocation
|
page read and write
|
||
253A19FA000
|
heap
|
page read and write
|
||
18501347000
|
trusted library allocation
|
page read and write
|
||
1857B95D000
|
heap
|
page read and write
|
||
1857BDC0000
|
heap
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
1857BC34000
|
heap
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page read and write
|
||
7FFD34543000
|
trusted library allocation
|
page execute and read and write
|
||
1B079E1C000
|
heap
|
page read and write
|
||
1340000
|
trusted library allocation
|
page read and write
|
||
25387910000
|
heap
|
page read and write
|
||
7FFD347E0000
|
trusted library allocation
|
page read and write
|
||
1857B980000
|
heap
|
page read and write
|
||
49FB372000
|
stack
|
page read and write
|
||
7FFD34690000
|
trusted library allocation
|
page execute and read and write
|
||
253A1B15000
|
heap
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page read and write
|
||
A89000
|
heap
|
page read and write
|
||
1857B3A0000
|
heap
|
page read and write
|
||
25387729000
|
heap
|
page read and write
|
||
7FFD34554000
|
trusted library allocation
|
page read and write
|
||
19F8F450000
|
trusted library allocation
|
page read and write
|
||
7FFD34700000
|
trusted library allocation
|
page read and write
|
||
1B05FE10000
|
heap
|
page read and write
|
||
CE2EE7E000
|
stack
|
page read and write
|
||
7FFD348A8000
|
trusted library allocation
|
page read and write
|
||
7FFD34710000
|
trusted library allocation
|
page execute and read and write
|
||
1B062C88000
|
trusted library allocation
|
page read and write
|
||
49FBCBF000
|
stack
|
page read and write
|
||
16D5000
|
heap
|
page read and write
|
||
ABD000
|
heap
|
page read and write
|
||
253876FC000
|
heap
|
page read and write
|
||
49FB3FE000
|
stack
|
page read and write
|
||
18579940000
|
heap
|
page read and write
|
||
1857B3F0000
|
heap
|
page execute and read and write
|
||
7FFD34680000
|
trusted library allocation
|
page execute and read and write
|
||
253A176D000
|
heap
|
page read and write
|
||
7FFD345F0000
|
trusted library allocation
|
page read and write
|
||
19FA68A9000
|
heap
|
page read and write
|
||
7FFD3454D000
|
trusted library allocation
|
page execute and read and write
|
||
18579B30000
|
heap
|
page read and write
|
||
49FB9BF000
|
stack
|
page read and write
|
||
49FBD3B000
|
stack
|
page read and write
|
||
19F8DFD0000
|
trusted library allocation
|
page read and write
|
||
7FFD34810000
|
trusted library allocation
|
page read and write
|
||
C80000
|
trusted library allocation
|
page read and write
|
||
7FFD34544000
|
trusted library allocation
|
page read and write
|
||
275F6ED5000
|
heap
|
page read and write
|
||
BF1D879000
|
stack
|
page read and write
|
||
1B0719FD000
|
trusted library allocation
|
page read and write
|
||
253A1902000
|
heap
|
page read and write
|
||
2EF2000
|
trusted library allocation
|
page read and write
|
||
19F90095000
|
trusted library allocation
|
page read and write
|
||
7FFD348B9000
|
trusted library allocation
|
page read and write
|
||
1B0629C9000
|
trusted library allocation
|
page read and write
|
||
1229000
|
heap
|
page read and write
|
||
7FFD34550000
|
trusted library allocation
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
7FFD34700000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
7FFD34572000
|
trusted library allocation
|
page read and write
|
||
7FFD346FA000
|
trusted library allocation
|
page read and write
|
||
253876DE000
|
heap
|
page read and write
|
||
49FB978000
|
stack
|
page read and write
|
||
18501063000
|
trusted library allocation
|
page read and write
|
||
253A17B7000
|
heap
|
page read and write
|
||
1857BD51000
|
heap
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page execute and read and write
|
||
275F6C30000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
19F8C790000
|
heap
|
page read and write
|
||
12731000
|
trusted library allocation
|
page read and write
|
||
1B079DE0000
|
heap
|
page read and write
|
||
7DF42D1B0000
|
trusted library allocation
|
page execute and read and write
|
||
2538A5B7000
|
trusted library allocation
|
page read and write
|
||
1857B9DB000
|
heap
|
page read and write
|
||
7FFD348A3000
|
trusted library allocation
|
page read and write
|
||
7FFD3457B000
|
trusted library allocation
|
page read and write
|
||
7FFD34893000
|
trusted library allocation
|
page read and write
|
||
1B1FF000
|
stack
|
page read and write
|
||
7FFD348F0000
|
trusted library allocation
|
page read and write
|
||
18579D15000
|
heap
|
page read and write
|
||
253996C9000
|
trusted library allocation
|
page read and write
|
||
7FFD34616000
|
trusted library allocation
|
page read and write
|
||
CE30109000
|
stack
|
page read and write
|
||
1B062D53000
|
trusted library allocation
|
page read and write
|
||
5EC9C79000
|
stack
|
page read and write
|
||
1410000
|
trusted library allocation
|
page read and write
|
||
1033000
|
heap
|
page read and write
|
||
9D9000
|
heap
|
page read and write
|
||
7FFD34700000
|
trusted library allocation
|
page execute and read and write
|
||
1B07A2B0000
|
heap
|
page read and write
|
||
49FBA38000
|
stack
|
page read and write
|
||
1435000
|
heap
|
page read and write
|
||
7DF405670000
|
trusted library allocation
|
page execute and read and write
|
||
12E9E000
|
trusted library allocation
|
page read and write
|
||
25387724000
|
heap
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
1B9DE000
|
stack
|
page read and write
|
||
1B0601E5000
|
heap
|
page read and write
|
||
19F8C578000
|
heap
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
B24000
|
heap
|
page read and write
|
||
AD0000
|
unkown
|
page readonly
|
||
7FFD34584000
|
trusted library allocation
|
page read and write
|
||
7DF48A1E0000
|
trusted library allocation
|
page execute and read and write
|
||
19F8C536000
|
heap
|
page read and write
|
||
DF1000
|
stack
|
page read and write
|
||
551000
|
stack
|
page read and write
|
||
7FFD3459B000
|
trusted library allocation
|
page execute and read and write
|
||
2EF9000
|
trusted library allocation
|
page read and write
|
||
7FFD345CC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD345BC000
|
trusted library allocation
|
page execute and read and write
|
||
19F8C740000
|
heap
|
page readonly
|
||
185011DF000
|
trusted library allocation
|
page read and write
|
||
7FFD34656000
|
trusted library allocation
|
page execute and read and write
|
||
1200000
|
heap
|
page read and write
|
||
7133BF9000
|
stack
|
page read and write
|
||
5ECA1BC000
|
stack
|
page read and write
|
||
19F8C795000
|
heap
|
page read and write
|
||
1B0600A0000
|
heap
|
page readonly
|
||
1CEAA000
|
stack
|
page read and write
|
||
25389360000
|
heap
|
page execute and read and write
|
||
1857B982000
|
heap
|
page read and write
|
||
2538AC47000
|
trusted library allocation
|
page read and write
|
||
1857BAF0000
|
trusted library allocation
|
page read and write
|
||
1B07A32B000
|
heap
|
page read and write
|
||
253876B2000
|
heap
|
page read and write
|
||
940000
|
trusted library allocation
|
page read and write
|
||
18500FA1000
|
trusted library allocation
|
page read and write
|
||
7FFD348A2000
|
trusted library allocation
|
page read and write
|
||
EF1000
|
stack
|
page read and write
|
||
7FFD346E2000
|
trusted library allocation
|
page read and write
|
||
7FFD34570000
|
trusted library allocation
|
page read and write
|
||
19F8F51B000
|
trusted library allocation
|
page read and write
|
||
2538922D000
|
heap
|
page read and write
|
||
7FFD347D0000
|
trusted library allocation
|
page read and write
|
||
1121000
|
heap
|
page read and write
|
||
9DB000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
1B0628FC000
|
trusted library allocation
|
page read and write
|
||
7FFD347D0000
|
trusted library allocation
|
page read and write
|
||
253878D0000
|
heap
|
page read and write
|
||
1B8D0000
|
heap
|
page read and write
|
||
7FFD34690000
|
trusted library allocation
|
page execute and read and write
|
||
11C0000
|
heap
|
page read and write
|
||
19F8F41B000
|
trusted library allocation
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
7FFD3455D000
|
trusted library allocation
|
page execute and read and write
|
||
19F8E09A000
|
heap
|
page read and write
|
||
7FFD34590000
|
trusted library allocation
|
page read and write
|
||
1B071991000
|
trusted library allocation
|
page read and write
|
||
5ECAE0E000
|
stack
|
page read and write
|
||
1B079F80000
|
heap
|
page execute and read and write
|
||
9E0000
|
heap
|
page read and write
|
||
19F8EE77000
|
trusted library allocation
|
page read and write
|
||
275F6BD0000
|
heap
|
page read and write
|
||
D61000
|
stack
|
page read and write
|
||
19F8DF90000
|
heap
|
page execute and read and write
|
||
2711000
|
trusted library allocation
|
page read and write
|
||
1B0719B1000
|
trusted library allocation
|
page read and write
|
||
19F8C4F2000
|
heap
|
page read and write
|
||
1B05FF39000
|
heap
|
page read and write
|
||
7FFD3457D000
|
trusted library allocation
|
page execute and read and write
|
||
970000
|
heap
|
page read and write
|
||
18579CF0000
|
heap
|
page read and write
|
||
7FFD347D0000
|
trusted library allocation
|
page read and write
|
||
19F8F27A000
|
trusted library allocation
|
page read and write
|
||
2741000
|
trusted library allocation
|
page read and write
|
||
25387680000
|
heap
|
page read and write
|
||
1850022A000
|
trusted library allocation
|
page read and write
|
||
7FFD345FC000
|
trusted library allocation
|
page execute and read and write
|
||
7134A4E000
|
stack
|
page read and write
|
||
25399411000
|
trusted library allocation
|
page read and write
|
||
1BD1E000
|
stack
|
page read and write
|
||
7133C7D000
|
stack
|
page read and write
|
||
12E91000
|
trusted library allocation
|
page read and write
|
||
19FA6830000
|
heap
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
185013C9000
|
trusted library allocation
|
page read and write
|
||
12E53000
|
trusted library allocation
|
page read and write
|
||
CE3018D000
|
stack
|
page read and write
|
||
5EC9DBE000
|
stack
|
page read and write
|
||
1857B920000
|
heap
|
page read and write
|
||
7FFD34656000
|
trusted library allocation
|
page execute and read and write
|
||
1B079E4D000
|
heap
|
page read and write
|
||
7FFD34860000
|
trusted library allocation
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page execute and read and write
|
||
25389215000
|
heap
|
page read and write
|
||
1B2FF000
|
stack
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
7FFD345F6000
|
trusted library allocation
|
page read and write
|
||
253A1B05000
|
heap
|
page read and write
|
||
12F51000
|
trusted library allocation
|
page read and write
|
||
253876EA000
|
heap
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
253890F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34656000
|
trusted library allocation
|
page execute and read and write
|
||
1120000
|
heap
|
page read and write
|
||
1B061E5E000
|
trusted library allocation
|
page read and write
|
||
7FFD349C3000
|
trusted library allocation
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page read and write
|
||
A65000
|
heap
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page execute and read and write
|
||
1380000
|
heap
|
page execute and read and write
|
||
1B07A37A000
|
heap
|
page read and write
|
||
18501785000
|
trusted library allocation
|
page read and write
|
||
253A19D5000
|
heap
|
page read and write
|
||
7133AFA000
|
stack
|
page read and write
|
||
1B0628F8000
|
trusted library allocation
|
page read and write
|
||
7FFD34580000
|
trusted library allocation
|
page read and write
|
||
1B07A260000
|
heap
|
page read and write
|
||
273F000
|
trusted library allocation
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
7FFD3472A000
|
trusted library allocation
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
7FFD34573000
|
trusted library allocation
|
page execute and read and write
|
||
253A1B09000
|
heap
|
page read and write
|
||
7FFD34710000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34750000
|
trusted library allocation
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
1064000
|
heap
|
page read and write
|
||
7FFD34544000
|
trusted library allocation
|
page read and write
|
||
1857BC44000
|
heap
|
page read and write
|
||
12733000
|
trusted library allocation
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
19F8C4F8000
|
heap
|
page read and write
|
||
7FFD346E2000
|
trusted library allocation
|
page read and write
|
||
1AEC0000
|
trusted library allocation
|
page read and write
|
||
7FFD34564000
|
trusted library allocation
|
page read and write
|
||
19FA660A000
|
heap
|
page read and write
|
||
7FFD348C9000
|
trusted library allocation
|
page read and write
|
||
1B061991000
|
trusted library allocation
|
page read and write
|
||
1B05FE55000
|
heap
|
page read and write
|
||
5ECA03F000
|
stack
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page read and write
|
||
7FFD3459C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD348CC000
|
trusted library allocation
|
page read and write
|
||
7FFD34800000
|
trusted library allocation
|
page read and write
|
||
1B062678000
|
trusted library allocation
|
page read and write
|
||
7FFD34590000
|
trusted library allocation
|
page read and write
|
||
CE3028E000
|
stack
|
page read and write
|
||
7FFD34580000
|
trusted library allocation
|
page read and write
|
||
7FFD34720000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34850000
|
trusted library allocation
|
page read and write
|
||
1857BC30000
|
heap
|
page read and write
|
||
49FBABA000
|
stack
|
page read and write
|
||
1857BC48000
|
heap
|
page read and write
|
||
CE2F07E000
|
stack
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
2538A37B000
|
trusted library allocation
|
page read and write
|
||
1B30E000
|
stack
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
7FFD34722000
|
trusted library allocation
|
page read and write
|
||
1320000
|
trusted library allocation
|
page read and write
|
||
7DF48A1D0000
|
trusted library allocation
|
page execute and read and write
|
||
ABB000
|
heap
|
page read and write
|
||
1B062AAF000
|
trusted library allocation
|
page read and write
|
||
7FFD345CC000
|
trusted library allocation
|
page execute and read and write
|
||
1BA10000
|
heap
|
page execute and read and write
|
||
19F9E291000
|
trusted library allocation
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
7FFD3499D000
|
trusted library allocation
|
page read and write
|
||
7FFD34690000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34724000
|
trusted library allocation
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page read and write
|
||
B6E000
|
stack
|
page read and write
|
||
19F8F57E000
|
trusted library allocation
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page execute and read and write
|
||
19FA65F5000
|
heap
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page read and write
|
||
1AB7E000
|
stack
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
1B061BB9000
|
trusted library allocation
|
page read and write
|
||
1B062905000
|
trusted library allocation
|
page read and write
|
||
2F20000
|
trusted library allocation
|
page read and write
|
||
18579948000
|
heap
|
page read and write
|
||
2731000
|
trusted library allocation
|
page read and write
|
||
7FFD34740000
|
trusted library allocation
|
page execute and read and write
|
||
12703000
|
trusted library allocation
|
page read and write
|
||
2538AD2F000
|
trusted library allocation
|
page read and write
|
||
111F000
|
heap
|
page read and write
|
||
19F8C53A000
|
heap
|
page read and write
|
||
1B05FDE0000
|
heap
|
page read and write
|
||
19FA6945000
|
heap
|
page read and write
|
||
18501952000
|
trusted library allocation
|
page read and write
|
||
1BBDF000
|
stack
|
page read and write
|
||
253A1A03000
|
heap
|
page read and write
|
||
1B062C33000
|
trusted library allocation
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page read and write
|
||
1857BED0000
|
heap
|
page read and write
|
||
19F8C490000
|
heap
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34543000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
49FB6FE000
|
stack
|
page read and write
|
||
253876DC000
|
heap
|
page read and write
|
||
5ECAC0A000
|
stack
|
page read and write
|
||
12E51000
|
trusted library allocation
|
page read and write
|
||
CE2EEFE000
|
stack
|
page read and write
|
||
1AFBF000
|
stack
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page execute and read and write
|
||
19F9E556000
|
trusted library allocation
|
page read and write
|
||
C6F000
|
stack
|
page read and write
|
||
1B05FEED000
|
heap
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
19FA6972000
|
heap
|
page read and write
|
||
18501E23000
|
trusted library allocation
|
page read and write
|
||
7FFD34754000
|
trusted library allocation
|
page read and write
|
||
7FFD348D2000
|
trusted library allocation
|
page read and write
|
||
7FFD34724000
|
trusted library allocation
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
7FFD34630000
|
trusted library allocation
|
page execute and read and write
|
||
1C31D000
|
stack
|
page read and write
|
||
1B071C94000
|
trusted library allocation
|
page read and write
|
||
49FB67D000
|
stack
|
page read and write
|
||
49FC90C000
|
stack
|
page read and write
|
||
1115000
|
heap
|
page read and write
|
||
CE2F33A000
|
stack
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
1CCAA000
|
stack
|
page read and write
|
||
1BB1E000
|
stack
|
page read and write
|
||
BF1D97F000
|
stack
|
page read and write
|
||
253A19E3000
|
heap
|
page read and write
|
||
AE9000
|
heap
|
page read and write
|
||
1857BB07000
|
heap
|
page execute and read and write
|
||
7FFD348A5000
|
trusted library allocation
|
page read and write
|
||
CE2F17D000
|
stack
|
page read and write
|
||
7FFD348D0000
|
trusted library allocation
|
page read and write
|
||
5EC9CFD000
|
stack
|
page read and write
|
||
2F5F000
|
trusted library allocation
|
page read and write
|
||
12E58000
|
trusted library allocation
|
page read and write
|
||
7FFD3457D000
|
trusted library allocation
|
page execute and read and write
|
||
19F8FAFD000
|
trusted library allocation
|
page read and write
|
||
7FFD34542000
|
trusted library allocation
|
page read and write
|
||
7FFD3494E000
|
trusted library allocation
|
page read and write
|
||
12E98000
|
trusted library allocation
|
page read and write
|
||
185102EA000
|
trusted library allocation
|
page read and write
|
||
7FFD34860000
|
trusted library allocation
|
page read and write
|
||
253A1AF8000
|
heap
|
page read and write
|
||
DF5000
|
heap
|
page read and write
|
||
5EC9B7A000
|
stack
|
page read and write
|
||
1385000
|
heap
|
page read and write
|
||
1B05FEF6000
|
heap
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
19F8C750000
|
trusted library allocation
|
page read and write
|
||
19F8E085000
|
heap
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
10EC000
|
heap
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
5ECA13E000
|
stack
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
1B100000
|
heap
|
page execute and read and write
|
||
1C01E000
|
stack
|
page read and write
|
||
7FFD34626000
|
trusted library allocation
|
page execute and read and write
|
||
19F9E2DD000
|
trusted library allocation
|
page read and write
|
||
253996CB000
|
trusted library allocation
|
page read and write
|
||
2539944B000
|
trusted library allocation
|
page read and write
|
||
CE2F5BC000
|
stack
|
page read and write
|
||
7FFD34740000
|
trusted library allocation
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
7FFD34894000
|
trusted library allocation
|
page read and write
|
||
7FFD34680000
|
trusted library allocation
|
page execute and read and write
|
||
1B071C84000
|
trusted library allocation
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
7FFD34712000
|
trusted library allocation
|
page read and write
|
||
7FFD346E2000
|
trusted library allocation
|
page read and write
|
||
19FA6820000
|
heap
|
page read and write
|
||
1B8D0000
|
heap
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page read and write
|
||
18500D7E000
|
trusted library allocation
|
page read and write
|
||
185102E6000
|
trusted library allocation
|
page read and write
|
||
1857999D000
|
heap
|
page read and write
|
||
A3A000
|
heap
|
page read and write
|
||
7FFD348F0000
|
trusted library allocation
|
page read and write
|
||
7FFD347F0000
|
trusted library allocation
|
page read and write
|
||
118B000
|
heap
|
page read and write
|
||
123A000
|
heap
|
page read and write
|
||
2538B206000
|
trusted library allocation
|
page read and write
|
||
253996C4000
|
trusted library allocation
|
page read and write
|
||
7FFD34573000
|
trusted library allocation
|
page execute and read and write
|
||
1857B340000
|
trusted library section
|
page read and write
|
||
5EC9A7E000
|
stack
|
page read and write
|
||
7FFD34720000
|
trusted library allocation
|
page execute and read and write
|
||
19F8ECC3000
|
trusted library allocation
|
page read and write
|
||
1B062A4C000
|
trusted library allocation
|
page read and write
|
||
18510304000
|
trusted library allocation
|
page read and write
|
||
7FFD348DC000
|
trusted library allocation
|
page read and write
|
||
7FFD34933000
|
trusted library allocation
|
page read and write
|
||
19F9E564000
|
trusted library allocation
|
page read and write
|
||
5EC9E36000
|
stack
|
page read and write
|
||
270F000
|
trusted library allocation
|
page read and write
|
||
1B062596000
|
trusted library allocation
|
page read and write
|
||
253A1890000
|
heap
|
page read and write
|
||
19F8F2D7000
|
trusted library allocation
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
1B0628F4000
|
trusted library allocation
|
page read and write
|
||
1857B97A000
|
heap
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page read and write
|
||
7FFD34758000
|
trusted library allocation
|
page read and write
|
||
1BD45000
|
heap
|
page read and write
|
||
7FFD347F0000
|
trusted library allocation
|
page read and write
|
||
253A191B000
|
heap
|
page read and write
|
||
7FFD34860000
|
trusted library allocation
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
7FFD34573000
|
trusted library allocation
|
page execute and read and write
|
||
2EDB000
|
trusted library allocation
|
page read and write
|
||
CE2EFF9000
|
stack
|
page read and write
|
||
713371D000
|
stack
|
page read and write
|
||
19F8C4ED000
|
heap
|
page read and write
|
||
2538A49B000
|
trusted library allocation
|
page read and write
|
||
1B05FE80000
|
trusted library section
|
page read and write
|
||
2EFB000
|
trusted library allocation
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
7FFD34750000
|
trusted library allocation
|
page execute and read and write
|
||
1C7BC000
|
heap
|
page read and write
|
||
19F8FBBE000
|
trusted library allocation
|
page read and write
|
||
19F8EE6B000
|
trusted library allocation
|
page read and write
|
||
185102F4000
|
trusted library allocation
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page execute and read and write
|
||
25399401000
|
trusted library allocation
|
page read and write
|
||
13FF000
|
stack
|
page read and write
|
||
7DF49C3B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD345CC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
18500087000
|
trusted library allocation
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
253876A7000
|
heap
|
page read and write
|
||
5EC9773000
|
stack
|
page read and write
|
||
253A1A60000
|
heap
|
page read and write
|
||
7FFD34540000
|
trusted library allocation
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
1857BC7C000
|
heap
|
page read and write
|
||
7FFD346F1000
|
trusted library allocation
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page read and write
|
||
7134B4E000
|
stack
|
page read and write
|
||
7FFD34690000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34712000
|
trusted library allocation
|
page read and write
|
||
7FFD34563000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34620000
|
trusted library allocation
|
page read and write
|
||
1857BDF4000
|
heap
|
page read and write
|
||
1857B9D6000
|
heap
|
page read and write
|
||
7FFD34620000
|
trusted library allocation
|
page execute and read and write
|
||
CE2F3BE000
|
stack
|
page read and write
|
||
7FFD345F0000
|
trusted library allocation
|
page read and write
|
||
253898AD000
|
trusted library allocation
|
page read and write
|
||
CE2F4B8000
|
stack
|
page read and write
|
||
2538945C000
|
trusted library allocation
|
page read and write
|
||
1B079E70000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
1B0637B3000
|
trusted library allocation
|
page read and write
|
||
9E1000
|
heap
|
page read and write
|
||
7FFD34899000
|
trusted library allocation
|
page read and write
|
||
253876A0000
|
heap
|
page read and write
|
||
2F17000
|
trusted library allocation
|
page read and write
|
||
7FFD34656000
|
trusted library allocation
|
page execute and read and write
|
||
7133E79000
|
stack
|
page read and write
|
||
7FFD3494C000
|
trusted library allocation
|
page read and write
|
||
2F51000
|
trusted library allocation
|
page read and write
|
||
7FFD34626000
|
trusted library allocation
|
page read and write
|
||
1857BC4C000
|
heap
|
page read and write
|
||
1266000
|
heap
|
page read and write
|
||
49FB779000
|
stack
|
page read and write
|
||
7FFD348E0000
|
trusted library allocation
|
page read and write
|
||
1851006D000
|
trusted library allocation
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
7FFD34560000
|
trusted library allocation
|
page read and write
|
||
1B05FE60000
|
heap
|
page read and write
|
||
1B07A2A4000
|
heap
|
page read and write
|
||
CE2F1F6000
|
stack
|
page read and write
|
||
1BCD5000
|
stack
|
page read and write
|
||
1B05FEC2000
|
heap
|
page read and write
|
||
2F68000
|
trusted library allocation
|
page read and write
|
||
7FFD34870000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
9AC000
|
heap
|
page read and write
|
||
7133DF8000
|
stack
|
page read and write
|
||
7FFD34573000
|
trusted library allocation
|
page execute and read and write
|
||
1B0632E2000
|
trusted library allocation
|
page read and write
|
||
19F9E2A1000
|
trusted library allocation
|
page read and write
|
||
7FFD348D0000
|
trusted library allocation
|
page read and write
|
||
1857997D000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
2538A5F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34540000
|
trusted library allocation
|
page read and write
|
||
19F8E260000
|
heap
|
page read and write
|
||
CE2F43E000
|
stack
|
page read and write
|
||
11C5000
|
heap
|
page read and write
|
||
19F8C57C000
|
heap
|
page read and write
|
||
18500001000
|
trusted library allocation
|
page read and write
|
||
1BCE6000
|
heap
|
page read and write
|
||
1268000
|
heap
|
page read and write
|
||
185799C3000
|
heap
|
page read and write
|
||
275F6ED0000
|
heap
|
page read and write
|
||
1857B944000
|
heap
|
page read and write
|
||
7FFD3456D000
|
trusted library allocation
|
page execute and read and write
|
||
253893B0000
|
trusted library allocation
|
page read and write
|
||
5EC97FE000
|
stack
|
page read and write
|
||
7FFD3454D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34626000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3458D000
|
trusted library allocation
|
page execute and read and write
|
||
25387640000
|
heap
|
page read and write
|
||
49FBC3E000
|
stack
|
page read and write
|
||
7DF42D1A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34620000
|
trusted library allocation
|
page read and write
|
||
910000
|
trusted library allocation
|
page read and write
|
||
2538A3E4000
|
trusted library allocation
|
page read and write
|
||
19F8E498000
|
trusted library allocation
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
1B0600B0000
|
heap
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
1B9FF000
|
stack
|
page read and write
|
||
1B062C96000
|
trusted library allocation
|
page read and write
|
||
1420000
|
trusted library allocation
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
49FB7FF000
|
stack
|
page read and write
|
||
7134CCE000
|
stack
|
page read and write
|
||
19F8C710000
|
trusted library allocation
|
page read and write
|
||
7FFD34728000
|
trusted library allocation
|
page read and write
|
||
7FFD347F0000
|
trusted library allocation
|
page read and write
|
||
1857BDA2000
|
heap
|
page read and write
|
||
7FFD34712000
|
trusted library allocation
|
page read and write
|
||
19F8F54C000
|
trusted library allocation
|
page read and write
|
||
7FFD34543000
|
trusted library allocation
|
page execute and read and write
|
||
253996D1000
|
trusted library allocation
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page read and write
|
||
7FFD3461C000
|
trusted library allocation
|
page execute and read and write
|
||
1857BD8E000
|
heap
|
page read and write
|
||
7FFD3459D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34721000
|
trusted library allocation
|
page read and write
|
||
7FFD347D0000
|
trusted library allocation
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
1857BCDA000
|
heap
|
page read and write
|
||
7FFD348C8000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
1B07A363000
|
heap
|
page read and write
|
||
1B061A13000
|
trusted library allocation
|
page read and write
|
||
7FFD347E0000
|
trusted library allocation
|
page read and write
|
||
2538A500000
|
trusted library allocation
|
page read and write
|
||
7FFD347E0000
|
trusted library allocation
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
9AF000
|
heap
|
page read and write
|
||
19F8F332000
|
trusted library allocation
|
page read and write
|
||
18501005000
|
trusted library allocation
|
page read and write
|
||
18579B10000
|
heap
|
page read and write
|
||
184F000
|
stack
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
1857B4C0000
|
heap
|
page read and write
|
||
1B07A399000
|
heap
|
page read and write
|
||
14FF000
|
stack
|
page read and write
|
||
2538A685000
|
trusted library allocation
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
19FA6647000
|
heap
|
page read and write
|
||
253893E1000
|
trusted library allocation
|
page read and write
|
||
7FFD34728000
|
trusted library allocation
|
page read and write
|
||
5ECAB8E000
|
stack
|
page read and write
|
||
1B071C76000
|
trusted library allocation
|
page read and write
|
||
1B0625A0000
|
trusted library allocation
|
page read and write
|
||
DAE000
|
stack
|
page read and write
|
||
1B063115000
|
trusted library allocation
|
page read and write
|
||
25389609000
|
trusted library allocation
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page read and write
|
||
1857BC72000
|
heap
|
page read and write
|
||
2E8E000
|
stack
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
1B0FE000
|
stack
|
page read and write
|
||
7FFD3457D000
|
trusted library allocation
|
page execute and read and write
|
||
253A1768000
|
heap
|
page read and write
|
||
1857B4C5000
|
heap
|
page read and write
|
||
275F6C38000
|
heap
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
7FFD34711000
|
trusted library allocation
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page read and write
|
||
18501128000
|
trusted library allocation
|
page read and write
|
||
7FFD346FA000
|
trusted library allocation
|
page read and write
|
||
7FFD34742000
|
trusted library allocation
|
page read and write
|
||
19FA696D000
|
heap
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
19F8E271000
|
trusted library allocation
|
page read and write
|
||
CE2F23E000
|
stack
|
page read and write
|
||
7FFD348A2000
|
trusted library allocation
|
page read and write
|
||
7134ACC000
|
stack
|
page read and write
|
||
19F8E73D000
|
trusted library allocation
|
page read and write
|
||
19F8E230000
|
trusted library allocation
|
page read and write
|
||
16D0000
|
heap
|
page read and write
|
||
2701000
|
trusted library allocation
|
page read and write
|
||
7FFD34899000
|
trusted library allocation
|
page read and write
|
||
2538B1BC000
|
trusted library allocation
|
page read and write
|
||
1B85A000
|
stack
|
page read and write
|
||
185799C5000
|
heap
|
page read and write
|
||
1BCDE000
|
stack
|
page read and write
|
||
2538A652000
|
trusted library allocation
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
10B3000
|
heap
|
page read and write
|
||
19FA68DD000
|
heap
|
page read and write
|
||
7FFD34750000
|
trusted library allocation
|
page read and write
|
||
7134BC7000
|
stack
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
19F9E55B000
|
trusted library allocation
|
page read and write
|
||
D55000
|
heap
|
page read and write
|
||
7FFD34800000
|
trusted library allocation
|
page read and write
|
||
7FFD345F6000
|
trusted library allocation
|
page read and write
|
||
253996D3000
|
trusted library allocation
|
page read and write
|
||
19F8EFE5000
|
trusted library allocation
|
page read and write
|
||
19F9E271000
|
trusted library allocation
|
page read and write
|
||
1850130F000
|
trusted library allocation
|
page read and write
|
||
1B079994000
|
heap
|
page read and write
|
||
1227000
|
heap
|
page read and write
|
||
7FFD34550000
|
trusted library allocation
|
page read and write
|
||
5ECAD0D000
|
stack
|
page read and write
|
||
7FFD34712000
|
trusted library allocation
|
page read and write
|
||
1857B958000
|
heap
|
page read and write
|
||
2F61000
|
trusted library allocation
|
page read and write
|
||
1857BD25000
|
heap
|
page read and write
|
||
18501E03000
|
trusted library allocation
|
page read and write
|
||
AE6000
|
unkown
|
page readonly
|
||
18579D10000
|
heap
|
page read and write
|
||
7133A7E000
|
stack
|
page read and write
|
||
1857BD93000
|
heap
|
page read and write
|
||
19F8C6D0000
|
heap
|
page read and write
|
||
1B05FF0E000
|
heap
|
page read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page read and write
|
||
713379E000
|
stack
|
page read and write
|
||
7FFD34600000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34873000
|
trusted library allocation
|
page read and write
|
||
8F1000
|
stack
|
page read and write
|
||
7FFD348D0000
|
trusted library allocation
|
page read and write
|
||
19F8F637000
|
trusted library allocation
|
page read and write
|
||
19FA65B0000
|
heap
|
page read and write
|
||
49FB877000
|
stack
|
page read and write
|
||
18501DDE000
|
trusted library allocation
|
page read and write
|
||
7FFD34810000
|
trusted library allocation
|
page read and write
|
||
1B7E0000
|
heap
|
page execute and read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
7FFD34626000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3458B000
|
trusted library allocation
|
page read and write
|
||
26F0000
|
heap
|
page execute and read and write
|
||
19F8EFEE000
|
trusted library allocation
|
page read and write
|
||
1B0601E0000
|
heap
|
page read and write
|
||
7FFD34544000
|
trusted library allocation
|
page read and write
|
||
2538A7A3000
|
trusted library allocation
|
page read and write
|
||
7FFD345CC000
|
trusted library allocation
|
page execute and read and write
|
||
1B05FE90000
|
trusted library section
|
page read and write
|
||
2FB8000
|
trusted library allocation
|
page read and write
|
||
7FFD34570000
|
trusted library allocation
|
page read and write
|
||
25399634000
|
trusted library allocation
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
1CCB0000
|
heap
|
page read and write
|
||
2F4F000
|
stack
|
page read and write
|
||
1857BB00000
|
heap
|
page execute and read and write
|
||
FFC000
|
heap
|
page read and write
|
||
1B063220000
|
trusted library allocation
|
page read and write
|
||
19F8F9F1000
|
trusted library allocation
|
page read and write
|
||
1ACBD000
|
stack
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
49FC98E000
|
stack
|
page read and write
|
||
7FFD34580000
|
trusted library allocation
|
page read and write
|
||
7FFD34580000
|
trusted library allocation
|
page read and write
|
||
1B05FEA0000
|
trusted library allocation
|
page read and write
|
||
1B05FFA2000
|
heap
|
page read and write
|
||
BF1D8FE000
|
unkown
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
2D60000
|
heap
|
page execute and read and write
|
||
18500D75000
|
trusted library allocation
|
page read and write
|
||
1B060090000
|
trusted library allocation
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page read and write
|
||
19F8C56E000
|
heap
|
page read and write
|
||
2538AB62000
|
trusted library allocation
|
page read and write
|
||
1857B350000
|
trusted library allocation
|
page read and write
|
||
7FFD34660000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
5EC9F39000
|
stack
|
page read and write
|
||
1BDB5000
|
heap
|
page read and write
|
||
1857B9AE000
|
heap
|
page read and write
|
||
7FFD3458D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
1C7B0000
|
heap
|
page read and write
|
||
9A1000
|
heap
|
page read and write
|
||
1B07A368000
|
heap
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
1B40E000
|
stack
|
page read and write
|
||
1B062909000
|
trusted library allocation
|
page read and write
|
||
19F8E050000
|
heap
|
page execute and read and write
|
||
AAA000
|
heap
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
7133F7E000
|
stack
|
page read and write
|
||
1CFAC000
|
stack
|
page read and write
|
||
1B079E1A000
|
heap
|
page read and write
|
||
7FFD34590000
|
trusted library allocation
|
page read and write
|
||
1B060100000
|
heap
|
page execute and read and write
|
||
18579954000
|
heap
|
page read and write
|
||
2EFF000
|
trusted library allocation
|
page read and write
|
||
CE2F0F7000
|
stack
|
page read and write
|
||
7FFD3497C000
|
trusted library allocation
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
7FFD34894000
|
trusted library allocation
|
page read and write
|
||
7FFD348D8000
|
trusted library allocation
|
page read and write
|
||
25389E32000
|
trusted library allocation
|
page read and write
|
||
1857BDD4000
|
heap
|
page read and write
|
||
7FFD3454D000
|
trusted library allocation
|
page execute and read and write
|
||
7DF49C3C0000
|
trusted library allocation
|
page execute and read and write
|
||
1B0631FA000
|
trusted library allocation
|
page read and write
|
||
18500A53000
|
trusted library allocation
|
page read and write
|
||
979000
|
heap
|
page read and write
|
||
7FFD345BC000
|
trusted library allocation
|
page execute and read and write
|
||
2538A71A000
|
trusted library allocation
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
1B0719C1000
|
trusted library allocation
|
page read and write
|
||
7FFD34880000
|
trusted library allocation
|
page read and write
|
||
1545000
|
heap
|
page read and write
|
||
25387620000
|
heap
|
page read and write
|
||
2538A410000
|
trusted library allocation
|
page read and write
|
There are 1049 hidden memdumps, click here to show them.