Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
s3OBQLA3xR.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Discord.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Discord.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
Generic INItialization configuration [WIN]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4zipkzog.wbp.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4zu4xfsi.o4n.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5yqvmdb3.30w.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ao4aa30l.ywr.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bir5h0qu.unh.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dvk43siu.m0e.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eyg3uvcy.gtg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gdiytu4y.fs3.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ghqtr1ff.1gu.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jph33gpi.ovp.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ndljfo5w.3x4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pi20cdd4.cv5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pncfvtsf.ouw.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_semkodpj.ii0.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sj3t4gbf.4gx.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x112r4y2.yyx.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun Oct 13 15:52:52
2024, mtime=Sun Oct 13 15:52:52 2024, atime=Sun Oct 13 15:52:52 2024, length=358912, window=hide
|
dropped
|
There are 12 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\s3OBQLA3xR.exe
|
"C:\Users\user\Desktop\s3OBQLA3xR.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\s3OBQLA3xR.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 's3OBQLA3xR.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\Discord.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Discord.exe'
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Discord" /tr "C:\Users\user\AppData\Roaming\Discord.exe"
|
||
C:\Users\user\AppData\Roaming\Discord.exe
|
C:\Users\user\AppData\Roaming\Discord.exe
|
||
C:\Users\user\AppData\Roaming\Discord.exe
|
C:\Users\user\AppData\Roaming\Discord.exe
|
||
C:\Users\user\AppData\Roaming\Discord.exe
|
"C:\Users\user\AppData\Roaming\Discord.exe"
|
||
C:\Users\user\AppData\Roaming\Discord.exe
|
"C:\Users\user\AppData\Roaming\Discord.exe"
|
||
C:\Users\user\AppData\Roaming\Discord.exe
|
C:\Users\user\AppData\Roaming\Discord.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 6 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
methods-availability.gl.at.ply.gg
|
|||
http://crl.microso?
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://crl.microsK_o
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://crl.microsoo
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
There are 7 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
methods-availability.gl.at.ply.gg
|
147.185.221.23
|
||
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
||
147.185.221.23
|
methods-availability.gl.at.ply.gg
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\s3OBQLA3xR_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\s3OBQLA3xR_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\s3OBQLA3xR_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\s3OBQLA3xR_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\s3OBQLA3xR_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\s3OBQLA3xR_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\s3OBQLA3xR_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\s3OBQLA3xR_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\s3OBQLA3xR_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\s3OBQLA3xR_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\s3OBQLA3xR_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\s3OBQLA3xR_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\s3OBQLA3xR_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\s3OBQLA3xR_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Discord
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
12BB2000
|
trusted library allocation
|
page read and write
|
||
2BA1000
|
trusted library allocation
|
page read and write
|
||
862000
|
unkown
|
page readonly
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
1AD97FE4000
|
heap
|
page read and write
|
||
720000
|
trusted library allocation
|
page read and write
|
||
21BD0C20000
|
heap
|
page read and write
|
||
7CC000
|
heap
|
page read and write
|
||
239B7DD2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
90553BB000
|
stack
|
page read and write
|
||
239B75A9000
|
trusted library allocation
|
page read and write
|
||
239C767C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
A39ECF9000
|
stack
|
page read and write
|
||
239B5A80000
|
trusted library section
|
page read and write
|
||
239B91A8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
1C6A0000
|
heap
|
page read and write
|
||
7FFD9B78C000
|
trusted library allocation
|
page execute and read and write
|
||
2296F5A9000
|
heap
|
page read and write
|
||
1B40E000
|
stack
|
page read and write
|
||
A39EEF8000
|
stack
|
page read and write
|
||
239B7F79000
|
trusted library allocation
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
7FFD9B6F0000
|
trusted library allocation
|
page read and write
|
||
5387A7E000
|
stack
|
page read and write
|
||
1ADA9CA5000
|
trusted library allocation
|
page read and write
|
||
1385000
|
heap
|
page read and write
|
||
7FFD9B6B4000
|
trusted library allocation
|
page read and write
|
||
1B0C0000
|
heap
|
page read and write
|
||
229551FD000
|
heap
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
26BC000
|
trusted library allocation
|
page read and write
|
||
1C3A5000
|
stack
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
A20000
|
trusted library allocation
|
page read and write
|
||
239B5A00000
|
heap
|
page read and write
|
||
7DF4B4150000
|
trusted library allocation
|
page execute and read and write
|
||
21BEAC67000
|
heap
|
page execute and read and write
|
||
1BACC000
|
stack
|
page read and write
|
||
1AD99C31000
|
trusted library allocation
|
page read and write
|
||
7FFD9B70C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B750000
|
trusted library allocation
|
page read and write
|
||
239C73A1000
|
trusted library allocation
|
page read and write
|
||
21BEAFB2000
|
heap
|
page read and write
|
||
90550B9000
|
stack
|
page read and write
|
||
1190000
|
trusted library allocation
|
page read and write
|
||
229671AB000
|
trusted library allocation
|
page read and write
|
||
1AD9A0FD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B898000
|
trusted library allocation
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
7FFD9B6E2000
|
trusted library allocation
|
page read and write
|
||
99A000
|
heap
|
page read and write
|
||
7FFD9B7E0000
|
trusted library allocation
|
page execute and read and write
|
||
7F0000
|
heap
|
page read and write
|
||
7FFD9BA38000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6D0000
|
trusted library allocation
|
page read and write
|
||
1ADB1F70000
|
heap
|
page read and write
|
||
239B5A90000
|
trusted library section
|
page read and write
|
||
22957C3B000
|
trusted library allocation
|
page read and write
|
||
1B5C3000
|
heap
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
2D31000
|
trusted library allocation
|
page read and write
|
||
AA5000
|
heap
|
page read and write
|
||
260C000
|
trusted library allocation
|
page read and write
|
||
A39F23E000
|
stack
|
page read and write
|
||
21BE2B5D000
|
trusted library allocation
|
page read and write
|
||
21BD37E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
9054F78000
|
stack
|
page read and write
|
||
21BD3B50000
|
trusted library allocation
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
7FFD9B8D0000
|
trusted library allocation
|
page read and write
|
||
22956CF0000
|
heap
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
1AD9A9AC000
|
trusted library allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9B87A000
|
trusted library allocation
|
page read and write
|
||
239B7F6B000
|
trusted library allocation
|
page read and write
|
||
21BD1055000
|
heap
|
page read and write
|
||
7FFD9B6B3000
|
trusted library allocation
|
page execute and read and write
|
||
1AD99E5A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
CC99EE000
|
unkown
|
page read and write
|
||
940000
|
trusted library allocation
|
page read and write
|
||
A85000
|
heap
|
page read and write
|
||
239CFC5D000
|
heap
|
page read and write
|
||
21BEACB8000
|
heap
|
page read and write
|
||
A39F13E000
|
stack
|
page read and write
|
||
21BD3B4E000
|
trusted library allocation
|
page read and write
|
||
22956D08000
|
heap
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
1AD9AE0E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA22000
|
trusted library allocation
|
page read and write
|
||
5387D7F000
|
stack
|
page read and write
|
||
7FFD9B77C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page execute and read and write
|
||
116A6540000
|
heap
|
page read and write
|
||
22956B80000
|
heap
|
page read and write
|
||
22966EF1000
|
trusted library allocation
|
page read and write
|
||
239B588C000
|
heap
|
page read and write
|
||
2730000
|
heap
|
page read and write
|
||
7FFD9BB3D000
|
trusted library allocation
|
page read and write
|
||
A39FD0C000
|
stack
|
page read and write
|
||
1AD99910000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6B3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B860000
|
trusted library allocation
|
page read and write
|
||
53875DF000
|
stack
|
page read and write
|
||
1AD9ACC6000
|
trusted library allocation
|
page read and write
|
||
125F8000
|
trusted library allocation
|
page read and write
|
||
99F000
|
heap
|
page read and write
|
||
21BD3B48000
|
trusted library allocation
|
page read and write
|
||
22958CE7000
|
trusted library allocation
|
page read and write
|
||
2296F600000
|
trusted library allocation
|
page read and write
|
||
C4F000
|
stack
|
page read and write
|
||
9054CFE000
|
stack
|
page read and write
|
||
1AD99950000
|
trusted library allocation
|
page read and write
|
||
1C4AA000
|
stack
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
22955237000
|
heap
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
E91000
|
heap
|
page read and write
|
||
21BD2860000
|
heap
|
page execute and read and write
|
||
2296F23A000
|
heap
|
page read and write
|
||
239B5876000
|
heap
|
page read and write
|
||
2296F4AB000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
21BD28F6000
|
trusted library allocation
|
page read and write
|
||
22955130000
|
heap
|
page read and write
|
||
7FFD9B8C0000
|
trusted library allocation
|
page read and write
|
||
1B200000
|
heap
|
page execute and read and write
|
||
A39FE09000
|
stack
|
page read and write
|
||
21BD464F000
|
trusted library allocation
|
page read and write
|
||
5387B79000
|
stack
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
7DF3FECD0000
|
trusted library allocation
|
page execute and read and write
|
||
1AFC0000
|
heap
|
page read and write
|
||
25E0000
|
heap
|
page execute and read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
239B5854000
|
heap
|
page read and write
|
||
12D38000
|
trusted library allocation
|
page read and write
|
||
A39F2BC000
|
stack
|
page read and write
|
||
1B9CE000
|
stack
|
page read and write
|
||
7FFD9BAEC000
|
trusted library allocation
|
page read and write
|
||
1B0CF000
|
stack
|
page read and write
|
||
239B91A3000
|
trusted library allocation
|
page read and write
|
||
22956B70000
|
heap
|
page execute and read and write
|
||
7FFD9B6E0000
|
trusted library allocation
|
page read and write
|
||
21BE2B64000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7E0000
|
trusted library allocation
|
page execute and read and write
|
||
90551BE000
|
stack
|
page read and write
|
||
7FFD9B786000
|
trusted library allocation
|
page read and write
|
||
341000
|
stack
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
2296F2F7000
|
heap
|
page read and write
|
||
1AD9AC35000
|
trusted library allocation
|
page read and write
|
||
239B80F5000
|
trusted library allocation
|
page read and write
|
||
239B7375000
|
heap
|
page read and write
|
||
7FFD9B892000
|
trusted library allocation
|
page read and write
|
||
239CFC08000
|
heap
|
page read and write
|
||
1ADB2004000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
29A3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6C4000
|
trusted library allocation
|
page read and write
|
||
22956B50000
|
trusted library allocation
|
page read and write
|
||
80E000
|
heap
|
page read and write
|
||
1B2CE000
|
stack
|
page read and write
|
||
1AD980C0000
|
heap
|
page read and write
|
||
7FFD9B882000
|
trusted library allocation
|
page read and write
|
||
99C000
|
heap
|
page read and write
|
||
1AD9B4C3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6C0000
|
trusted library allocation
|
page read and write
|
||
239B8385000
|
trusted library allocation
|
page read and write
|
||
AF5000
|
heap
|
page read and write
|
||
7FFD9B8FF000
|
trusted library allocation
|
page read and write
|
||
12BA1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
53879F7000
|
stack
|
page read and write
|
||
53878FA000
|
stack
|
page read and write
|
||
21BEAE10000
|
heap
|
page read and write
|
||
21BD0D59000
|
heap
|
page read and write
|
||
1B1CE000
|
stack
|
page read and write
|
||
1B520000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
239CF84A000
|
heap
|
page read and write
|
||
A39EF3F000
|
stack
|
page read and write
|
||
C8F44FE000
|
stack
|
page read and write
|
||
1AD9B585000
|
trusted library allocation
|
page read and write
|
||
21BD3809000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
239B7F81000
|
trusted library allocation
|
page read and write
|
||
1ADB2180000
|
heap
|
page execute and read and write
|
||
829000
|
heap
|
page read and write
|
||
21BE28E4000
|
trusted library allocation
|
page read and write
|
||
22956CD0000
|
heap
|
page execute and read and write
|
||
21BEB032000
|
heap
|
page read and write
|
||
1AD98000000
|
heap
|
page read and write
|
||
CC9969000
|
stack
|
page read and write
|
||
FFC000
|
stack
|
page read and write
|
||
239B5AB5000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
2296F4D0000
|
heap
|
page read and write
|
||
22955140000
|
heap
|
page read and write
|
||
229551EE000
|
heap
|
page read and write
|
||
21BD3B17000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
239B8596000
|
trusted library allocation
|
page read and write
|
||
239B7300000
|
heap
|
page read and write
|
||
26A0000
|
heap
|
page read and write
|
||
7FFD9B8C0000
|
trusted library allocation
|
page execute and read and write
|
||
D60000
|
heap
|
page read and write
|
||
1ADB1FC0000
|
heap
|
page read and write
|
||
2295809D000
|
trusted library allocation
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
21BEAE30000
|
heap
|
page read and write
|
||
EC6000
|
heap
|
page read and write
|
||
99F000
|
stack
|
page read and write
|
||
AD8000
|
heap
|
page read and write
|
||
7FFD9B6CD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B6C3000
|
trusted library allocation
|
page execute and read and write
|
||
2296F320000
|
heap
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page execute and read and write
|
||
2A00000
|
heap
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
22967217000
|
trusted library allocation
|
page read and write
|
||
21BE2B6C000
|
trusted library allocation
|
page read and write
|
||
126B8000
|
trusted library allocation
|
page read and write
|
||
2296F277000
|
heap
|
page read and write
|
||
21BEAFB0000
|
heap
|
page read and write
|
||
1B1CE000
|
stack
|
page read and write
|
||
21BD4694000
|
trusted library allocation
|
page read and write
|
||
C8F52CE000
|
stack
|
page read and write
|
||
1AD9804A000
|
heap
|
page read and write
|
||
239B5A20000
|
heap
|
page read and write
|
||
7FFD9B881000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
1ADB2286000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6C3000
|
trusted library allocation
|
page execute and read and write
|
||
1AD99AA0000
|
heap
|
page read and write
|
||
7FFD9B894000
|
trusted library allocation
|
page read and write
|
||
21BD3FF6000
|
trusted library allocation
|
page read and write
|
||
239B868C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA34000
|
trusted library allocation
|
page read and write
|
||
1ADA9F1E000
|
trusted library allocation
|
page read and write
|
||
1ADA9C31000
|
trusted library allocation
|
page read and write
|
||
E68000
|
heap
|
page read and write
|
||
1ADB1FFC000
|
heap
|
page read and write
|
||
1AD980A5000
|
heap
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B6E4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
21BD380F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
EF5000
|
heap
|
page read and write
|
||
21BD3905000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
D26000
|
heap
|
page read and write
|
||
21BD3A4A000
|
trusted library allocation
|
page read and write
|
||
8F1000
|
stack
|
page read and write
|
||
C8F3BCE000
|
stack
|
page read and write
|
||
700000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
C8F3EFE000
|
stack
|
page read and write
|
||
9055139000
|
stack
|
page read and write
|
||
A39FF8E000
|
stack
|
page read and write
|
||
7FFD9BA03000
|
trusted library allocation
|
page read and write
|
||
E75000
|
heap
|
page read and write
|
||
2D3F000
|
trusted library allocation
|
page read and write
|
||
9054E77000
|
stack
|
page read and write
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA3C000
|
trusted library allocation
|
page read and write
|
||
1ADA9C51000
|
trusted library allocation
|
page read and write
|
||
A39F0BA000
|
stack
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
21BD0C90000
|
heap
|
page read and write
|
||
21BD3931000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6FD000
|
trusted library allocation
|
page execute and read and write
|
||
239CFB00000
|
heap
|
page read and write
|
||
7FFD9B6C1000
|
trusted library allocation
|
page read and write
|
||
239CF970000
|
heap
|
page execute and read and write
|
||
22957F84000
|
trusted library allocation
|
page read and write
|
||
A39EDF7000
|
stack
|
page read and write
|
||
1AD980AC000
|
heap
|
page read and write
|
||
12D31000
|
trusted library allocation
|
page read and write
|
||
12903000
|
trusted library allocation
|
page read and write
|
||
21BD40DB000
|
trusted library allocation
|
page read and write
|
||
22957D49000
|
trusted library allocation
|
page read and write
|
||
239C73F5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6DD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
9054DFE000
|
stack
|
page read and write
|
||
21BEAC70000
|
heap
|
page read and write
|
||
2410000
|
heap
|
page read and write
|
||
12908000
|
trusted library allocation
|
page read and write
|
||
9055036000
|
stack
|
page read and write
|
||
2296F200000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
24F0000
|
heap
|
page execute and read and write
|
||
239C768C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6BD000
|
trusted library allocation
|
page execute and read and write
|
||
29A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA19000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
116A6560000
|
heap
|
page read and write
|
||
1B12C000
|
stack
|
page read and write
|
||
1AD9AFF9000
|
trusted library allocation
|
page read and write
|
||
1C8EF000
|
stack
|
page read and write
|
||
25FE000
|
stack
|
page read and write
|
||
251F000
|
stack
|
page read and write
|
||
90552BC000
|
stack
|
page read and write
|
||
116A6608000
|
heap
|
page read and write
|
||
2296F283000
|
heap
|
page read and write
|
||
21BEAF2C000
|
heap
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
21BD26C0000
|
heap
|
page read and write
|
||
22958816000
|
trusted library allocation
|
page read and write
|
||
2296F581000
|
heap
|
page read and write
|
||
7FFD9B6B4000
|
trusted library allocation
|
page read and write
|
||
C8F437A000
|
stack
|
page read and write
|
||
1BB71000
|
heap
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
239B8441000
|
trusted library allocation
|
page read and write
|
||
865000
|
heap
|
page read and write
|
||
22966EC1000
|
trusted library allocation
|
page read and write
|
||
239B7381000
|
trusted library allocation
|
page read and write
|
||
1B6CA000
|
stack
|
page read and write
|
||
1AD99980000
|
trusted library allocation
|
page read and write
|
||
1AD999F6000
|
heap
|
page execute and read and write
|
||
5E0000
|
heap
|
page read and write
|
||
D8D000
|
heap
|
page read and write
|
||
1AD97FD2000
|
heap
|
page read and write
|
||
7FFD9B6D0000
|
trusted library allocation
|
page read and write
|
||
21BD3BBA000
|
trusted library allocation
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
1AD97FDE000
|
heap
|
page read and write
|
||
E18000
|
heap
|
page read and write
|
||
26C1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
1ADB22B0000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
239B7408000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
21BEB083000
|
heap
|
page read and write
|
||
7FFD9B6C0000
|
trusted library allocation
|
page read and write
|
||
239B915E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6EB000
|
trusted library allocation
|
page read and write
|
||
21BD0C50000
|
heap
|
page read and write
|
||
7FFD9B8D0000
|
trusted library allocation
|
page read and write
|
||
1ADB1FC4000
|
heap
|
page read and write
|
||
7FFD9B871000
|
trusted library allocation
|
page read and write
|
||
538894E000
|
stack
|
page read and write
|
||
2296F242000
|
heap
|
page read and write
|
||
22955180000
|
heap
|
page read and write
|
||
2296F442000
|
heap
|
page read and write
|
||
C8F40FE000
|
stack
|
page read and write
|
||
1B0000
|
unkown
|
page readonly
|
||
21BD26D0000
|
trusted library allocation
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
21BD0D0C000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
A75000
|
heap
|
page read and write
|
||
7FFD9B6A3000
|
trusted library allocation
|
page execute and read and write
|
||
239CF8BF000
|
heap
|
page read and write
|
||
7FFD9B891000
|
trusted library allocation
|
page read and write
|
||
21BEADE0000
|
heap
|
page execute and read and write
|
||
A39FC8E000
|
stack
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
239CFC4E000
|
heap
|
page read and write
|
||
21BD274D000
|
heap
|
page read and write
|
||
22956EC1000
|
trusted library allocation
|
page read and write
|
||
5387AF7000
|
stack
|
page read and write
|
||
126B3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
2296F43F000
|
heap
|
page read and write
|
||
2680000
|
heap
|
page execute and read and write
|
||
7FFD9B6CB000
|
trusted library allocation
|
page read and write
|
||
229671B0000
|
trusted library allocation
|
page read and write
|
||
C8F42F7000
|
stack
|
page read and write
|
||
1CBF8000
|
heap
|
page read and write
|
||
C8F4177000
|
stack
|
page read and write
|
||
A8F000
|
stack
|
page read and write
|
||
98F000
|
heap
|
page read and write
|
||
1AD97FFD000
|
heap
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
E15000
|
heap
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B8E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B902000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
21BD0D14000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page execute and read and write
|
||
C8F45FC000
|
stack
|
page read and write
|
||
2296F281000
|
heap
|
page read and write
|
||
7FFD9B8B2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6CD000
|
trusted library allocation
|
page execute and read and write
|
||
239CF924000
|
heap
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6FB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA4C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
239B5820000
|
heap
|
page read and write
|
||
1ADB22CF000
|
heap
|
page read and write
|
||
7DF3FECB0000
|
trusted library allocation
|
page execute and read and write
|
||
22956C00000
|
trusted library allocation
|
page read and write
|
||
C8F3FFF000
|
stack
|
page read and write
|
||
7FFD9B796000
|
trusted library allocation
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
1AD999C0000
|
trusted library allocation
|
page read and write
|
||
1BAEE000
|
heap
|
page read and write
|
||
7FFD9B7C6000
|
trusted library allocation
|
page execute and read and write
|
||
12603000
|
trusted library allocation
|
page read and write
|
||
7FA000
|
heap
|
page read and write
|
||
7FFD9B6DB000
|
trusted library allocation
|
page read and write
|
||
21BD2690000
|
heap
|
page readonly
|
||
1BADD000
|
heap
|
page read and write
|
||
21BD3C3B000
|
trusted library allocation
|
page read and write
|
||
1ADB1FF8000
|
heap
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
1B8CE000
|
stack
|
page read and write
|
||
1C5A8000
|
stack
|
page read and write
|
||
239B84E5000
|
trusted library allocation
|
page read and write
|
||
2296F300000
|
heap
|
page read and write
|
||
905496D000
|
stack
|
page read and write
|
||
7FFD9BABC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
22957AC5000
|
trusted library allocation
|
page read and write
|
||
229551FB000
|
heap
|
page read and write
|
||
7FFD9B6ED000
|
trusted library allocation
|
page execute and read and write
|
||
22956B76000
|
heap
|
page execute and read and write
|
||
1AD9A682000
|
trusted library allocation
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
7FFD9B796000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B8E0000
|
trusted library allocation
|
page read and write
|
||
1CFEC000
|
stack
|
page read and write
|
||
239B586E000
|
heap
|
page read and write
|
||
D5E000
|
heap
|
page read and write
|
||
125F1000
|
trusted library allocation
|
page read and write
|
||
1B7CE000
|
stack
|
page read and write
|
||
239CFB3A000
|
heap
|
page read and write
|
||
239CF88B000
|
heap
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B71C000
|
trusted library allocation
|
page execute and read and write
|
||
239B862B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6E0000
|
trusted library allocation
|
page read and write
|
||
21BD409C000
|
trusted library allocation
|
page read and write
|
||
A39ED7E000
|
stack
|
page read and write
|
||
21BD3B82000
|
trusted library allocation
|
page read and write
|
||
5387BFB000
|
stack
|
page read and write
|
||
229570E9000
|
trusted library allocation
|
page read and write
|
||
22958CC7000
|
trusted library allocation
|
page read and write
|
||
1AD99930000
|
trusted library allocation
|
page read and write
|
||
21BE2A7E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8E0000
|
trusted library allocation
|
page read and write
|
||
239CFC94000
|
heap
|
page read and write
|
||
B8E000
|
stack
|
page read and write
|
||
7FFD9B862000
|
trusted library allocation
|
page read and write
|
||
9055E0A000
|
stack
|
page read and write
|
||
21BD0D54000
|
heap
|
page read and write
|
||
239B5900000
|
heap
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
A39EFBA000
|
stack
|
page read and write
|
||
2B9E000
|
stack
|
page read and write
|
||
7DF489370000
|
trusted library allocation
|
page execute and read and write
|
||
1AC4D000
|
stack
|
page read and write
|
||
1BBBF000
|
heap
|
page read and write
|
||
26BE000
|
stack
|
page read and write
|
||
7FFD9B7E0000
|
trusted library allocation
|
page execute and read and write
|
||
E89000
|
heap
|
page read and write
|
||
EC8000
|
heap
|
page read and write
|
||
C95000
|
heap
|
page read and write
|
||
7FFD9B6B2000
|
trusted library allocation
|
page read and write
|
||
1B0CE000
|
stack
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
7FFD9B70C000
|
trusted library allocation
|
page execute and read and write
|
||
239B72D0000
|
heap
|
page execute and read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
9054EFD000
|
stack
|
page read and write
|
||
239B8415000
|
trusted library allocation
|
page read and write
|
||
21BD35E2000
|
trusted library allocation
|
page read and write
|
||
A30000
|
trusted library allocation
|
page read and write
|
||
7DF4B4160000
|
trusted library allocation
|
page execute and read and write
|
||
21BEAE00000
|
trusted library allocation
|
page read and write
|
||
239B7370000
|
heap
|
page read and write
|
||
239CF8F3000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
B45000
|
heap
|
page read and write
|
||
9F1000
|
stack
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page read and write
|
||
26BF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A2000
|
trusted library allocation
|
page read and write
|
||
21BEB027000
|
heap
|
page read and write
|
||
2C2E000
|
stack
|
page read and write
|
||
1AD99A90000
|
heap
|
page read and write
|
||
7FFD9B6D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
239B7FB7000
|
trusted library allocation
|
page read and write
|
||
22956BC0000
|
trusted library allocation
|
page read and write
|
||
1BB1B000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
1ADB1FB0000
|
heap
|
page read and write
|
||
7FFD9B6E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
EE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B71C000
|
trusted library allocation
|
page execute and read and write
|
||
22957F58000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
2295872E000
|
trusted library allocation
|
page read and write
|
||
22955110000
|
heap
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page execute and read and write
|
||
C8F51C9000
|
stack
|
page read and write
|
||
9055E89000
|
stack
|
page read and write
|
||
7FFD9BA13000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
2296F5A2000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
1C10D000
|
stack
|
page read and write
|
||
1ADB2376000
|
heap
|
page read and write
|
||
1ADB1FA1000
|
heap
|
page read and write
|
||
1ADB25B0000
|
heap
|
page read and write
|
||
1ADB1FEA000
|
heap
|
page read and write
|
||
21BE2871000
|
trusted library allocation
|
page read and write
|
||
1AD9B526000
|
trusted library allocation
|
page read and write
|
||
239B58B5000
|
heap
|
page read and write
|
||
7FFD9B7C0000
|
trusted library allocation
|
page execute and read and write
|
||
12608000
|
trusted library allocation
|
page read and write
|
||
21BD3585000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
22966F32000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
9054C7E000
|
stack
|
page read and write
|
||
1ADB20C7000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page read and write
|
||
7FFD9B796000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B6E3000
|
trusted library allocation
|
page execute and read and write
|
||
C8F41FD000
|
stack
|
page read and write
|
||
21BD0D0E000
|
heap
|
page read and write
|
||
7FFD9BA28000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
2296F42A000
|
heap
|
page read and write
|
||
1AD9AEDB000
|
trusted library allocation
|
page read and write
|
||
1AD9ACF2000
|
trusted library allocation
|
page read and write
|
||
1ADA9C40000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
2296F246000
|
heap
|
page read and write
|
||
116A6600000
|
heap
|
page read and write
|
||
7FFD9B7A6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B6F0000
|
trusted library allocation
|
page read and write
|
||
21BD467D000
|
trusted library allocation
|
page read and write
|
||
1AD9AF3D000
|
trusted library allocation
|
page read and write
|
||
7DF4F13C0000
|
trusted library allocation
|
page execute and read and write
|
||
1ADA9F23000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6ED000
|
trusted library allocation
|
page execute and read and write
|
||
22956B90000
|
trusted library allocation
|
page read and write
|
||
229671B8000
|
trusted library allocation
|
page read and write
|
||
80C000
|
heap
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B852000
|
trusted library allocation
|
page read and write
|
||
A39E94E000
|
stack
|
page read and write
|
||
116A6900000
|
heap
|
page read and write
|
||
7FFD9BA14000
|
trusted library allocation
|
page read and write
|
||
C8F504C000
|
stack
|
page read and write
|
||
7FFD9B88A000
|
trusted library allocation
|
page read and write
|
||
2296F215000
|
heap
|
page read and write
|
||
1CBEC000
|
stack
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
22958754000
|
trusted library allocation
|
page read and write
|
||
2296F400000
|
heap
|
page read and write
|
||
22957C32000
|
trusted library allocation
|
page read and write
|
||
53889C9000
|
stack
|
page read and write
|
||
21BD3994000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
7FFD9B8B4000
|
trusted library allocation
|
page read and write
|
||
1AD9BA11000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
239B5830000
|
heap
|
page read and write
|
||
239B7290000
|
trusted library allocation
|
page read and write
|
||
7FF4A8C30000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
1ADB2344000
|
heap
|
page read and write
|
||
7FFD9B6E3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B79C000
|
trusted library allocation
|
page execute and read and write
|
||
21BE2B62000
|
trusted library allocation
|
page read and write
|
||
2A90000
|
heap
|
page execute and read and write
|
||
7FFD9B842000
|
trusted library allocation
|
page read and write
|
||
239CFC6C000
|
heap
|
page read and write
|
||
7FFD9B6C4000
|
trusted library allocation
|
page read and write
|
||
1AD9801E000
|
heap
|
page read and write
|
||
11C5000
|
heap
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page execute and read and write
|
||
D95000
|
heap
|
page read and write
|
||
7FFD9B6CD000
|
trusted library allocation
|
page execute and read and write
|
||
229581CC000
|
trusted library allocation
|
page read and write
|
||
239CFA10000
|
heap
|
page read and write
|
||
22957EF4000
|
trusted library allocation
|
page read and write
|
||
1AD98002000
|
heap
|
page read and write
|
||
7FFD9B6B4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA24000
|
trusted library allocation
|
page read and write
|
||
239B83B1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8C8000
|
trusted library allocation
|
page read and write
|
||
2296F2BE000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
21BD0CE2000
|
heap
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
7FFD9B7D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B8A4000
|
trusted library allocation
|
page read and write
|
||
2611000
|
trusted library allocation
|
page read and write
|
||
239B58B8000
|
heap
|
page read and write
|
||
B38000
|
heap
|
page read and write
|
||
1AD982C5000
|
heap
|
page read and write
|
||
239B7F89000
|
trusted library allocation
|
page read and write
|
||
7C8000
|
heap
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6F4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6DD000
|
trusted library allocation
|
page execute and read and write
|
||
22957ECA000
|
trusted library allocation
|
page read and write
|
||
12CE000
|
stack
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
2295523C000
|
heap
|
page read and write
|
||
2296F481000
|
heap
|
page read and write
|
||
7FFD9B73C000
|
trusted library allocation
|
page execute and read and write
|
||
12BA8000
|
trusted library allocation
|
page read and write
|
||
21BD38F7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6C0000
|
trusted library allocation
|
page read and write
|
||
A33000
|
trusted library allocation
|
page read and write
|
||
7E5000
|
heap
|
page read and write
|
||
7FFD9B6FC000
|
trusted library allocation
|
page execute and read and write
|
||
2295816B000
|
trusted library allocation
|
page read and write
|
||
21BEAD25000
|
heap
|
page read and write
|
||
12601000
|
trusted library allocation
|
page read and write
|
||
5387CFE000
|
stack
|
page read and write
|
||
260F000
|
trusted library allocation
|
page read and write
|
||
1BF0E000
|
stack
|
page read and write
|
||
22955135000
|
heap
|
page read and write
|
||
A39EC7E000
|
stack
|
page read and write
|
||
239CF380000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6D3000
|
trusted library allocation
|
page read and write
|
||
1BBA2000
|
heap
|
page read and write
|
||
7FFD9B6D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
2296F24E000
|
heap
|
page read and write
|
||
7FFD9B76C000
|
trusted library allocation
|
page execute and read and write
|
||
711000
|
stack
|
page read and write
|
||
1ADB236C000
|
heap
|
page read and write
|
||
7FFD9BAC3000
|
trusted library allocation
|
page read and write
|
||
1AD998E0000
|
heap
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
22966EE1000
|
trusted library allocation
|
page read and write
|
||
1AD98047000
|
heap
|
page read and write
|
||
C8F4FCE000
|
stack
|
page read and write
|
||
1AFC0000
|
heap
|
page execute and read and write
|
||
7FFD9B70C000
|
trusted library allocation
|
page execute and read and write
|
||
229671B2000
|
trusted library allocation
|
page read and write
|
||
239CFC55000
|
heap
|
page read and write
|
||
2901000
|
trusted library allocation
|
page read and write
|
||
21BEAF37000
|
heap
|
page read and write
|
||
21BD2A98000
|
trusted library allocation
|
page read and write
|
||
1ADB2028000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
1BACF000
|
stack
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B700000
|
trusted library allocation
|
page read and write
|
||
239B586C000
|
heap
|
page read and write
|
||
1AD9AC61000
|
trusted library allocation
|
page read and write
|
||
239B80FE000
|
trusted library allocation
|
page read and write
|
||
1ADA9C61000
|
trusted library allocation
|
page read and write
|
||
1B30E000
|
stack
|
page read and write
|
||
1B5C0000
|
heap
|
page read and write
|
||
7FFD9B8E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6C0000
|
trusted library allocation
|
page read and write
|
||
1ADB23E0000
|
trusted library allocation
|
page read and write
|
||
1AD98006000
|
heap
|
page read and write
|
||
7FFD9BB1D000
|
trusted library allocation
|
page read and write
|
||
538759E000
|
stack
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
7FFD9B73C000
|
trusted library allocation
|
page execute and read and write
|
||
2296F556000
|
heap
|
page read and write
|
||
1B6B0000
|
heap
|
page execute and read and write
|
||
1ADB20A0000
|
heap
|
page read and write
|
||
1CAEA000
|
stack
|
page read and write
|
||
7FFD9B6D3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
2296F23E000
|
heap
|
page read and write
|
||
2296F50A000
|
heap
|
page read and write
|
||
7FFD9B8A8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
AEB000
|
heap
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
A39E8C3000
|
stack
|
page read and write
|
||
C8F3E73000
|
stack
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
21BD41C3000
|
trusted library allocation
|
page read and write
|
||
1ADB1F9D000
|
heap
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
22957FE7000
|
trusted library allocation
|
page read and write
|
||
21BD2D3D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page execute and read and write
|
||
239B8C11000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
21BD4062000
|
trusted library allocation
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
1130000
|
heap
|
page read and write
|
||
7FFD9BACC000
|
trusted library allocation
|
page read and write
|
||
8F1000
|
stack
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page read and write
|
||
1ABD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B862000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
7DF489380000
|
trusted library allocation
|
page execute and read and write
|
||
239CF977000
|
heap
|
page execute and read and write
|
||
21BEAD56000
|
heap
|
page read and write
|
||
D2C000
|
heap
|
page read and write
|
||
7FFD9B776000
|
trusted library allocation
|
page read and write
|
||
9055F8E000
|
stack
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
1AD9AF0A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6D4000
|
trusted library allocation
|
page read and write
|
||
22956B30000
|
trusted library allocation
|
page read and write
|
||
25FC000
|
trusted library allocation
|
page read and write
|
||
1AB7C000
|
stack
|
page read and write
|
||
BB1000
|
stack
|
page read and write
|
||
C2F000
|
stack
|
page read and write
|
||
7D4000
|
heap
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page read and write
|
||
E9B000
|
heap
|
page read and write
|
||
EED000
|
heap
|
page read and write
|
||
1AF70000
|
heap
|
page execute and read and write
|
||
1ADB2380000
|
heap
|
page read and write
|
||
7FFD9B882000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
22956B85000
|
heap
|
page read and write
|
||
7FFD9BA48000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6ED000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
229551B0000
|
heap
|
page read and write
|
||
21BD0CC5000
|
heap
|
page read and write
|
||
239B5874000
|
heap
|
page read and write
|
||
21BEAF10000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
239CFE30000
|
heap
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA04000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
D20000
|
heap
|
page read and write
|
||
1AD98004000
|
heap
|
page read and write
|
||
239CF950000
|
heap
|
page execute and read and write
|
||
D49000
|
heap
|
page read and write
|
||
21BD26A0000
|
trusted library allocation
|
page read and write
|
||
905533E000
|
stack
|
page read and write
|
||
28F0000
|
heap
|
page execute and read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
22957AF3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8C0000
|
trusted library allocation
|
page read and write
|
||
1BB2F000
|
heap
|
page read and write
|
||
2296F252000
|
heap
|
page read and write
|
||
7FFD9B6E4000
|
trusted library allocation
|
page read and write
|
||
1170000
|
trusted library allocation
|
page read and write
|
||
D3E000
|
heap
|
page read and write
|
||
22956F3D000
|
trusted library allocation
|
page read and write
|
||
1AFBE000
|
stack
|
page read and write
|
||
21BEAFAE000
|
heap
|
page read and write
|
||
21BE28A1000
|
trusted library allocation
|
page read and write
|
||
1AD99C20000
|
heap
|
page execute and read and write
|
||
D25000
|
heap
|
page read and write
|
||
968000
|
heap
|
page read and write
|
||
239CFB28000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
C8F524C000
|
stack
|
page read and write
|
||
7FFD9B6C0000
|
trusted library allocation
|
page read and write
|
||
1B2CF000
|
stack
|
page read and write
|
||
7FFD9B6A4000
|
trusted library allocation
|
page read and write
|
||
1B7CE000
|
stack
|
page read and write
|
||
2296F578000
|
heap
|
page read and write
|
||
DCE000
|
stack
|
page read and write
|
||
2C70000
|
heap
|
page execute and read and write
|
||
5387493000
|
stack
|
page read and write
|
||
7CA000
|
heap
|
page read and write
|
||
AD0000
|
trusted library allocation
|
page read and write
|
||
1BB75000
|
heap
|
page read and write
|
||
1ADB21E0000
|
heap
|
page read and write
|
||
C8F514E000
|
stack
|
page read and write
|
||
7DB000
|
heap
|
page read and write
|
||
21BD2871000
|
trusted library allocation
|
page read and write
|
||
25F1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA29000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6C4000
|
trusted library allocation
|
page read and write
|
||
1B1CF000
|
stack
|
page read and write
|
||
1CBF0000
|
heap
|
page read and write
|
||
1ADB1FF1000
|
heap
|
page read and write
|
||
21BD0D18000
|
heap
|
page read and write
|
||
7FFD9B9CF000
|
trusted library allocation
|
page read and write
|
||
126B1000
|
trusted library allocation
|
page read and write
|
||
1B240000
|
heap
|
page execute and read and write
|
||
1BB3F000
|
heap
|
page read and write
|
||
C8F4079000
|
stack
|
page read and write
|
||
7FFD9B852000
|
trusted library allocation
|
page read and write
|
||
21BEAC60000
|
heap
|
page execute and read and write
|
||
985000
|
heap
|
page read and write
|
||
1AD99A95000
|
heap
|
page read and write
|
||
1B9CE000
|
stack
|
page read and write
|
||
538751E000
|
stack
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
239CF843000
|
heap
|
page read and write
|
||
7FFD9B72C000
|
trusted library allocation
|
page execute and read and write
|
||
C8F447E000
|
stack
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E3000
|
trusted library allocation
|
page read and write
|
||
12901000
|
trusted library allocation
|
page read and write
|
||
239CFBC5000
|
heap
|
page read and write
|
||
22956B60000
|
heap
|
page readonly
|
||
21BEAF1E000
|
heap
|
page read and write
|
||
229551C2000
|
heap
|
page read and write
|
||
7FFD9B7B6000
|
trusted library allocation
|
page execute and read and write
|
||
239B8BEA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
22957EC8000
|
trusted library allocation
|
page read and write
|
||
2DFA000
|
trusted library allocation
|
page read and write
|
||
1ADB1FB8000
|
heap
|
page read and write
|
||
CCF000
|
stack
|
page read and write
|
||
E1D000
|
heap
|
page read and write
|
||
1ADB2325000
|
heap
|
page read and write
|
||
1AD999F0000
|
heap
|
page execute and read and write
|
||
7DF4F13D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B86A000
|
trusted library allocation
|
page read and write
|
||
1AB8D000
|
stack
|
page read and write
|
||
90548E3000
|
stack
|
page read and write
|
||
1AD9BA56000
|
trusted library allocation
|
page read and write
|
||
21BD2700000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
7FFD9B6D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
2296F435000
|
heap
|
page read and write
|
||
1B2BD000
|
stack
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
290C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8C4000
|
trusted library allocation
|
page read and write
|
||
21BD38A0000
|
trusted library allocation
|
page read and write
|
||
21BD3874000
|
trusted library allocation
|
page read and write
|
||
CC9C7F000
|
stack
|
page read and write
|
||
229671BA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6BD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B6CD000
|
trusted library allocation
|
page execute and read and write
|
||
22956EB0000
|
heap
|
page execute and read and write
|
||
22955239000
|
heap
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
1AD9BA36000
|
trusted library allocation
|
page read and write
|
||
239CFBA4000
|
heap
|
page read and write
|
||
239C73B1000
|
trusted library allocation
|
page read and write
|
||
229551F5000
|
heap
|
page read and write
|
||
C8F3F7E000
|
stack
|
page read and write
|
||
A39F1BE000
|
stack
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
239B9184000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA12000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA42000
|
trusted library allocation
|
page read and write
|
||
A39FE8C000
|
stack
|
page read and write
|
||
9055D8E000
|
stack
|
page read and write
|
||
1AD9800C000
|
heap
|
page read and write
|
||
7FFD9B8B8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B852000
|
trusted library allocation
|
page read and write
|
||
C30000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
1AD97EE0000
|
heap
|
page read and write
|
||
A39FD8E000
|
stack
|
page read and write
|
||
1AF25000
|
heap
|
page read and write
|
||
239B8CD2000
|
trusted library allocation
|
page read and write
|
||
229587B7000
|
trusted library allocation
|
page read and write
|
||
C8F50CE000
|
stack
|
page read and write
|
||
5388A4C000
|
stack
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
239B7270000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6C4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA39000
|
trusted library allocation
|
page read and write
|
||
9055F8C000
|
stack
|
page read and write
|
||
1AD9B3B7000
|
trusted library allocation
|
page read and write
|
||
239B5842000
|
heap
|
page read and write
|
||
7FFD9BA1C000
|
trusted library allocation
|
page read and write
|
||
21BEB062000
|
heap
|
page read and write
|
||
1ADB1FB4000
|
heap
|
page read and write
|
||
7FFD9B6EB000
|
trusted library allocation
|
page execute and read and write
|
||
239B8B05000
|
trusted library allocation
|
page read and write
|
||
21BE2891000
|
trusted library allocation
|
page read and write
|
||
239C7672000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
B0A000
|
heap
|
page read and write
|
||
5387DFE000
|
stack
|
page read and write
|
||
21BD0D2C000
|
heap
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
7FFD9B7D0000
|
trusted library allocation
|
page execute and read and write
|
||
5387E7C000
|
stack
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
C8F43FA000
|
stack
|
page read and write
|
||
B0C000
|
heap
|
page read and write
|
||
7FFD9B862000
|
trusted library allocation
|
page read and write
|
||
1AD9B49D000
|
trusted library allocation
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
2295520F000
|
heap
|
page read and write
|
||
7FFD9B9F3000
|
trusted library allocation
|
page read and write
|
||
2D3C000
|
trusted library allocation
|
page read and write
|
||
1ADA9F3C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
239B855D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6B3000
|
trusted library allocation
|
page execute and read and write
|
||
AFF000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
21BEACD5000
|
heap
|
page read and write
|
||
21BD3B4A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
9054D79000
|
stack
|
page read and write
|
||
1B59E000
|
stack
|
page read and write
|
||
1AD97FC0000
|
heap
|
page read and write
|
||
F24000
|
heap
|
page read and write
|
||
239B84A6000
|
trusted library allocation
|
page read and write
|
||
A39EE7D000
|
stack
|
page read and write
|
||
22957913000
|
trusted library allocation
|
page read and write
|
||
239B8747000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA09000
|
trusted library allocation
|
page read and write
|
||
116A6530000
|
heap
|
page read and write
|
||
239CFD20000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6E4000
|
trusted library allocation
|
page read and write
|
||
7FD000
|
heap
|
page read and write
|
||
7FFD9B6DD000
|
trusted library allocation
|
page execute and read and write
|
||
1B6C0000
|
heap
|
page read and write
|
||
229551B8000
|
heap
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
21BD0CC0000
|
heap
|
page read and write
|
||
7FFD9B6D4000
|
trusted library allocation
|
page read and write
|
||
827000
|
heap
|
page read and write
|
||
26B1000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
trusted library allocation
|
page read and write
|
||
21BD1050000
|
heap
|
page read and write
|
||
21BEACC9000
|
heap
|
page read and write
|
||
A05000
|
heap
|
page read and write
|
||
1B8CE000
|
stack
|
page read and write
|
||
1AD99A60000
|
heap
|
page read and write
|
||
1B160000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
21BD1040000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6BD000
|
trusted library allocation
|
page execute and read and write
|
||
112F000
|
stack
|
page read and write
|
||
2296F670000
|
heap
|
page read and write
|
||
7FFD9B786000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
21BEB022000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6F0000
|
trusted library allocation
|
page read and write
|
||
1B540000
|
heap
|
page execute and read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
21BD4102000
|
trusted library allocation
|
page read and write
|
||
1AD9AD23000
|
trusted library allocation
|
page read and write
|
||
229671CA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page execute and read and write
|
||
21BE2B7C000
|
trusted library allocation
|
page read and write
|
||
239CF3F3000
|
heap
|
page read and write
|
||
7FFD9B6B0000
|
trusted library allocation
|
page read and write
|
||
CE5000
|
heap
|
page read and write
|
||
538797F000
|
stack
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6CD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
21BD2680000
|
trusted library allocation
|
page read and write
|
||
22958289000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB16000
|
trusted library allocation
|
page read and write
|
||
905523E000
|
stack
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
1AD97FC8000
|
heap
|
page read and write
|
||
22958CEC000
|
trusted library allocation
|
page read and write
|
||
239B5AA0000
|
trusted library allocation
|
page read and write
|
||
7DF3FECC0000
|
trusted library allocation
|
page execute and read and write
|
||
239B587A000
|
heap
|
page read and write
|
||
1C00E000
|
stack
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
1CBFC000
|
heap
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
2601000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6BD000
|
trusted library allocation
|
page execute and read and write
|
||
9055F0C000
|
stack
|
page read and write
|
||
860000
|
unkown
|
page readonly
|
||
1AD99940000
|
heap
|
page readonly
|
||
239CF840000
|
heap
|
page read and write
|
||
239B8321000
|
trusted library allocation
|
page read and write
|
||
22966ED0000
|
trusted library allocation
|
page read and write
|
||
21BD0CD0000
|
heap
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA2C000
|
trusted library allocation
|
page read and write
|
||
239C7381000
|
trusted library allocation
|
page read and write
|
||
53888CD000
|
stack
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
7FFD9B796000
|
trusted library allocation
|
page execute and read and write
|
||
2D41000
|
trusted library allocation
|
page read and write
|
||
22955100000
|
heap
|
page read and write
|
||
E9D000
|
heap
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
239CF3B0000
|
trusted library allocation
|
page read and write
|
||
239B5A60000
|
heap
|
page read and write
|
||
239CFB2E000
|
heap
|
page read and write
|
||
1AD99CA2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B700000
|
trusted library allocation
|
page read and write
|
||
239B7280000
|
heap
|
page readonly
|
||
1AD9A9A3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6AD000
|
trusted library allocation
|
page execute and read and write
|
||
7E8000
|
heap
|
page read and write
|
||
239B784D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
90549EE000
|
stack
|
page read and write
|
||
21BD0C30000
|
heap
|
page read and write
|
||
7FFD9B89A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
1B3CE000
|
stack
|
page read and write
|
||
DE5000
|
heap
|
page read and write
|
||
239C7674000
|
trusted library allocation
|
page read and write
|
||
1AD980B0000
|
heap
|
page read and write
|
||
25CE000
|
stack
|
page read and write
|
||
1AD9AD57000
|
trusted library allocation
|
page read and write
|
||
12BAE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA18000
|
trusted library allocation
|
page read and write
|
||
1BE0E000
|
stack
|
page read and write
|
||
239B5870000
|
heap
|
page read and write
|
||
21BD3B4C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB36000
|
trusted library allocation
|
page read and write
|
||
2296F58D000
|
heap
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6C4000
|
trusted library allocation
|
page read and write
|
||
390000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
1AD982C0000
|
heap
|
page read and write
|
||
239C75D7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
239C766E000
|
trusted library allocation
|
page read and write
|
||
1ADB22E4000
|
heap
|
page read and write
|
||
538787E000
|
stack
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
538884F000
|
stack
|
page read and write
|
||
9C5000
|
heap
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
811000
|
heap
|
page read and write
|
||
7FFD9B6C3000
|
trusted library allocation
|
page execute and read and write
|
||
21BEB240000
|
heap
|
page read and write
|
||
1BAD0000
|
heap
|
page read and write
|
||
2296F2EA000
|
heap
|
page read and write
|
||
1AD980E0000
|
heap
|
page read and write
|
||
10FD000
|
stack
|
page read and write
|
||
21BEB056000
|
heap
|
page read and write
|
||
239CFC2B000
|
heap
|
page read and write
|
||
C8F4278000
|
stack
|
page read and write
|
||
22958648000
|
trusted library allocation
|
page read and write
|
||
1ADB202A000
|
heap
|
page read and write
|
||
1ADB1FAC000
|
heap
|
page read and write
|
||
5387C78000
|
stack
|
page read and write
|
||
A39FF0C000
|
stack
|
page read and write
|
||
C8F457E000
|
stack
|
page read and write
|
||
7FFD9B7C6000
|
trusted library allocation
|
page execute and read and write
|
||
7A6000
|
heap
|
page read and write
|
||
239B5902000
|
heap
|
page read and write
|
||
7FFD9B766000
|
trusted library allocation
|
page read and write
|
||
21BEAD03000
|
heap
|
page read and write
|
||
7FFD9B8C2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A6000
|
trusted library allocation
|
page execute and read and write
|
||
21BD4699000
|
trusted library allocation
|
page read and write
|
||
9054FBF000
|
stack
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page execute and read and write
|
||
1AD9BA5B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B861000
|
trusted library allocation
|
page read and write
|
||
1B50E000
|
stack
|
page read and write
|
||
7FFD9B7A6000
|
trusted library allocation
|
page execute and read and write
|
||
1B08F000
|
stack
|
page read and write
|
||
229580D6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
21BD32C2000
|
trusted library allocation
|
page read and write
|
||
2E00000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7D0000
|
trusted library allocation
|
page execute and read and write
|
||
21BD4675000
|
trusted library allocation
|
page read and write
|
||
116A6905000
|
heap
|
page read and write
|
||
1ADA9F2C000
|
trusted library allocation
|
page read and write
|
||
12D33000
|
trusted library allocation
|
page read and write
|
||
7AC000
|
heap
|
page read and write
|
||
239B5AB0000
|
heap
|
page read and write
|
||
7FFD9B6D2000
|
trusted library allocation
|
page read and write
|
||
A39E9CE000
|
stack
|
page read and write
|
||
2295738D000
|
trusted library allocation
|
page read and write
|
||
2296F59D000
|
heap
|
page read and write
|
||
239CFC98000
|
heap
|
page read and write
|
||
2296F42D000
|
heap
|
page read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
5388ACE000
|
stack
|
page read and write
|
||
22958CA2000
|
trusted library allocation
|
page read and write
|
||
125F3000
|
trusted library allocation
|
page read and write
|
||
21BD3A83000
|
trusted library allocation
|
page read and write
|
||
A00000
|
trusted library allocation
|
page read and write
|
||
82F000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
A39F037000
|
stack
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6C2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B776000
|
trusted library allocation
|
page read and write
|
||
D62000
|
heap
|
page read and write
|
||
1B34E000
|
stack
|
page read and write
|
||
1AD7D000
|
stack
|
page read and write
|
There are 1144 hidden memdumps, click here to show them.