Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
1bE8S5sN9S.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\winlogon.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\winlogon.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1myf0o0d.gpu.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3mvbbfge.3nd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_43dicpzh.gxm.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4mucf15u.gme.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5g4ddmsf.2ep.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_byxr4s4s.u2u.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f3awwud0.cup.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_febcydls.ud2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gsciwpnw.jvg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h1b5t1im.0hv.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jqafyzdm.efn.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nepcs5ib.osd.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qg4ta4de.fae.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ud0qsn4k.qe2.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uki5cg5d.wbr.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zqqlgrcb.xlj.psm1
|
ASCII text, with no line terminators
|
dropped
|
There are 10 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\1bE8S5sN9S.exe
|
"C:\Users\user\Desktop\1bE8S5sN9S.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\1bE8S5sN9S.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '1bE8S5sN9S.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\winlogon.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'winlogon.exe'
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "winlogon" /tr "C:\ProgramData\winlogon.exe"
|
||
C:\ProgramData\winlogon.exe
|
C:\ProgramData\winlogon.exe
|
||
C:\ProgramData\winlogon.exe
|
C:\ProgramData\winlogon.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://pastebin.com/raw/QUwdrCNg
|
104.20.4.235
|
||
https://pastebin.com
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://crl.microso
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://www.microsoft.9G
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://crl.micft.cMicRosof
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://pastebin.com
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
There are 9 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
pastebin.com
|
104.20.4.235
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.20.4.235
|
pastebin.com
|
United States
|
||
108.177.127.147
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1bE8S5sN9S_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1bE8S5sN9S_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1bE8S5sN9S_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1bE8S5sN9S_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1bE8S5sN9S_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1bE8S5sN9S_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1bE8S5sN9S_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1bE8S5sN9S_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1bE8S5sN9S_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1bE8S5sN9S_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1bE8S5sN9S_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1bE8S5sN9S_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1bE8S5sN9S_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1bE8S5sN9S_RASMANCS
|
FileDirectory
|
There are 4 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
202000
|
unkown
|
page readonly
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849170000
|
trusted library allocation
|
page execute and read and write
|
||
27AA6F2B000
|
trusted library allocation
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page execute and read and write
|
||
206D21FF000
|
trusted library allocation
|
page read and write
|
||
22927600000
|
heap
|
page read and write
|
||
12673000
|
trusted library allocation
|
page read and write
|
||
7FF848F42000
|
trusted library allocation
|
page read and write
|
||
2660000
|
heap
|
page execute and read and write
|
||
27AA62A8000
|
trusted library allocation
|
page read and write
|
||
2291049E000
|
trusted library allocation
|
page read and write
|
||
27AA755E000
|
trusted library allocation
|
page read and write
|
||
E11000
|
heap
|
page read and write
|
||
1B56F000
|
stack
|
page read and write
|
||
A63340C000
|
stack
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
206DA3C0000
|
heap
|
page read and write
|
||
A6325F9000
|
stack
|
page read and write
|
||
7FF848D73000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F00000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E60000
|
trusted library allocation
|
page execute and read and write
|
||
790000
|
heap
|
page read and write
|
||
27ABEA13000
|
heap
|
page read and write
|
||
206C3071000
|
trusted library allocation
|
page read and write
|
||
A63358C000
|
stack
|
page read and write
|
||
229279B4000
|
heap
|
page read and write
|
||
1B76F000
|
stack
|
page read and write
|
||
1B41F000
|
stack
|
page read and write
|
||
7FF848D84000
|
trusted library allocation
|
page read and write
|
||
27AA477F000
|
heap
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
27ABE860000
|
heap
|
page read and write
|
||
2290D612000
|
heap
|
page read and write
|
||
7FF8490D2000
|
trusted library allocation
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page execute and read and write
|
||
2291F5B0000
|
trusted library allocation
|
page read and write
|
||
2290D970000
|
heap
|
page readonly
|
||
2290F040000
|
heap
|
page read and write
|
||
206C0320000
|
heap
|
page read and write
|
||
1B31F000
|
stack
|
page read and write
|
||
27AA47C6000
|
heap
|
page read and write
|
||
2290D980000
|
trusted library allocation
|
page read and write
|
||
22927A2B000
|
heap
|
page read and write
|
||
7FF848D6B000
|
trusted library allocation
|
page read and write
|
||
A631FC3000
|
stack
|
page read and write
|
||
7FF848D63000
|
trusted library allocation
|
page execute and read and write
|
||
206C01C9000
|
heap
|
page read and write
|
||
1B99D000
|
stack
|
page read and write
|
||
27AA46B0000
|
heap
|
page read and write
|
||
27ABE892000
|
heap
|
page read and write
|
||
1FE532CD000
|
heap
|
page read and write
|
||
229105CF000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
229279E7000
|
heap
|
page read and write
|
||
1B35F000
|
stack
|
page read and write
|
||
3F5DF8C000
|
stack
|
page read and write
|
||
7FF848DCC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E26000
|
trusted library allocation
|
page read and write
|
||
22927A91000
|
heap
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
206DA412000
|
heap
|
page read and write
|
||
1FE3B82F000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
1FE3C45E000
|
trusted library allocation
|
page read and write
|
||
2290F2B0000
|
heap
|
page execute and read and write
|
||
206DA403000
|
heap
|
page read and write
|
||
7FF84913A000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
7FF848EF0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
206C019D000
|
heap
|
page read and write
|
||
7FF848DFC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
1FE3BFD0000
|
trusted library allocation
|
page read and write
|
||
229276D3000
|
heap
|
page read and write
|
||
7FF848F54000
|
trusted library allocation
|
page read and write
|
||
206C1D25000
|
heap
|
page read and write
|
||
7FF849093000
|
trusted library allocation
|
page read and write
|
||
B85000
|
heap
|
page read and write
|
||
1FE52F91000
|
heap
|
page read and write
|
||
A63293E000
|
stack
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
E37000
|
heap
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
1FE4ACA1000
|
trusted library allocation
|
page read and write
|
||
1FE39026000
|
heap
|
page read and write
|
||
1FE532FB000
|
heap
|
page read and write
|
||
1FE3AE59000
|
trusted library allocation
|
page read and write
|
||
27ABE5F6000
|
heap
|
page read and write
|
||
229102C4000
|
trusted library allocation
|
page read and write
|
||
1C620000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page execute and read and write
|
||
206C1EC0000
|
heap
|
page execute and read and write
|
||
206C1F95000
|
trusted library allocation
|
page read and write
|
||
E0B000
|
heap
|
page read and write
|
||
27ABE6B0000
|
heap
|
page execute and read and write
|
||
7FF848D8B000
|
trusted library allocation
|
page read and write
|
||
A23000
|
heap
|
page read and write
|
||
1FE3B0FD000
|
trusted library allocation
|
page read and write
|
||
7FF8490C8000
|
trusted library allocation
|
page read and write
|
||
27AA6E29000
|
trusted library allocation
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page execute and read and write
|
||
A5E8FDE000
|
stack
|
page read and write
|
||
7DF4EC260000
|
trusted library allocation
|
page execute and read and write
|
||
156EDF40000
|
heap
|
page read and write
|
||
2290D6C7000
|
heap
|
page read and write
|
||
206C2FA8000
|
trusted library allocation
|
page read and write
|
||
1FE534F0000
|
heap
|
page read and write
|
||
7FF848EF1000
|
trusted library allocation
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
7FF8490A3000
|
trusted library allocation
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E16000
|
trusted library allocation
|
page read and write
|
||
1FE3B682000
|
trusted library allocation
|
page read and write
|
||
A5EA2CD000
|
stack
|
page read and write
|
||
7FF848D5D000
|
trusted library allocation
|
page execute and read and write
|
||
206C2C8B000
|
trusted library allocation
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
1175000
|
heap
|
page read and write
|
||
7FF848D74000
|
trusted library allocation
|
page read and write
|
||
7FF848D54000
|
trusted library allocation
|
page read and write
|
||
A5EA54E000
|
stack
|
page read and write
|
||
1FE3C022000
|
trusted library allocation
|
page read and write
|
||
2291F5CA000
|
trusted library allocation
|
page read and write
|
||
1FE39022000
|
heap
|
page read and write
|
||
206C1D90000
|
heap
|
page execute and read and write
|
||
7FF848E60000
|
trusted library allocation
|
page execute and read and write
|
||
A30000
|
heap
|
page read and write
|
||
7FF848DBC000
|
trusted library allocation
|
page execute and read and write
|
||
265B000
|
trusted library allocation
|
page read and write
|
||
1FE3BCCA000
|
trusted library allocation
|
page read and write
|
||
1FE3903E000
|
heap
|
page read and write
|
||
206C30BD000
|
trusted library allocation
|
page read and write
|
||
1B55E000
|
stack
|
page read and write
|
||
1FE3C4C4000
|
trusted library allocation
|
page read and write
|
||
1FE531FC000
|
heap
|
page read and write
|
||
7FF848D90000
|
trusted library allocation
|
page read and write
|
||
12AA3000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
22927604000
|
heap
|
page read and write
|
||
2290EFD0000
|
trusted library allocation
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
206DA461000
|
heap
|
page read and write
|
||
7FF848D9C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
DF9000
|
heap
|
page read and write
|
||
206C0380000
|
trusted library allocation
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
2290D625000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
206C2139000
|
trusted library allocation
|
page read and write
|
||
CBEE57B000
|
stack
|
page read and write
|
||
7FF848D73000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
206DA41E000
|
heap
|
page read and write
|
||
7FF848EF0000
|
trusted library allocation
|
page read and write
|
||
1FE3BEDD000
|
trusted library allocation
|
page read and write
|
||
1C220000
|
heap
|
page read and write
|
||
3F5C973000
|
stack
|
page read and write
|
||
2291F5BA000
|
trusted library allocation
|
page read and write
|
||
1FE3B9AD000
|
trusted library allocation
|
page read and write
|
||
1FE52FD7000
|
heap
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
2292767D000
|
heap
|
page read and write
|
||
229277F0000
|
heap
|
page execute and read and write
|
||
CBEF0CD000
|
stack
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
2292761F000
|
heap
|
page read and write
|
||
27ABEA70000
|
trusted library allocation
|
page read and write
|
||
2290D560000
|
heap
|
page read and write
|
||
27ABE8E6000
|
heap
|
page read and write
|
||
229102F6000
|
trusted library allocation
|
page read and write
|
||
79C000
|
heap
|
page read and write
|
||
12611000
|
trusted library allocation
|
page read and write
|
||
7FF848F12000
|
trusted library allocation
|
page read and write
|
||
27ABE9AC000
|
heap
|
page read and write
|
||
2664000
|
trusted library allocation
|
page read and write
|
||
7FF848D6D000
|
trusted library allocation
|
page execute and read and write
|
||
1FE4AC31000
|
trusted library allocation
|
page read and write
|
||
1FE3BCF3000
|
trusted library allocation
|
page read and write
|
||
206DA482000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
2290D686000
|
heap
|
page read and write
|
||
22927800000
|
heap
|
page read and write
|
||
27AA71BB000
|
trusted library allocation
|
page read and write
|
||
3F5CCFE000
|
stack
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
206DA426000
|
heap
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
2611000
|
trusted library allocation
|
page read and write
|
||
206DA2E0000
|
heap
|
page read and write
|
||
1FE3C49D000
|
trusted library allocation
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
3F5C9FD000
|
stack
|
page read and write
|
||
27AA47C8000
|
heap
|
page read and write
|
||
1AFDD000
|
stack
|
page read and write
|
||
1FE3BBFF000
|
trusted library allocation
|
page read and write
|
||
27AA479F000
|
heap
|
page read and write
|
||
264E000
|
stack
|
page read and write
|
||
27AA7433000
|
trusted library allocation
|
page read and write
|
||
2290D6FB000
|
heap
|
page read and write
|
||
26F3000
|
trusted library allocation
|
page read and write
|
||
1B39A000
|
heap
|
page read and write
|
||
2930000
|
heap
|
page execute and read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
7FF848D64000
|
trusted library allocation
|
page read and write
|
||
CBEDBEF000
|
stack
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
3F5DE89000
|
stack
|
page read and write
|
||
7FF8490BC000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
27AA4670000
|
heap
|
page read and write
|
||
2AB1000
|
trusted library allocation
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
7DF491280000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
3F5D036000
|
stack
|
page read and write
|
||
1FE52FC6000
|
heap
|
page read and write
|
||
1FE3B837000
|
trusted library allocation
|
page read and write
|
||
1FE53100000
|
heap
|
page read and write
|
||
22927730000
|
trusted library allocation
|
page read and write
|
||
1FE5334C000
|
heap
|
page read and write
|
||
A63348E000
|
stack
|
page read and write
|
||
206C3D37000
|
trusted library allocation
|
page read and write
|
||
7FF848F32000
|
trusted library allocation
|
page read and write
|
||
7FF848EE2000
|
trusted library allocation
|
page read and write
|
||
7FF848E36000
|
trusted library allocation
|
page execute and read and write
|
||
2291F2F1000
|
trusted library allocation
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
1FE52FFB000
|
heap
|
page read and write
|
||
206DA50E000
|
heap
|
page read and write
|
||
CBEE077000
|
stack
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
206C1DFD000
|
heap
|
page read and write
|
||
1FE39066000
|
heap
|
page read and write
|
||
CBEF14E000
|
stack
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
A5EA3C9000
|
stack
|
page read and write
|
||
1FE390E0000
|
heap
|
page read and write
|
||
156EDF4E000
|
heap
|
page read and write
|
||
22927820000
|
heap
|
page read and write
|
||
7FF8491C0000
|
trusted library allocation
|
page read and write
|
||
229110A0000
|
trusted library allocation
|
page read and write
|
||
7FF8491C6000
|
trusted library allocation
|
page read and write
|
||
7FF848E2C000
|
trusted library allocation
|
page execute and read and write
|
||
229102D3000
|
trusted library allocation
|
page read and write
|
||
7FF848D8D000
|
trusted library allocation
|
page execute and read and write
|
||
206DA528000
|
heap
|
page read and write
|
||
CBEE279000
|
stack
|
page read and write
|
||
1FE53252000
|
heap
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page execute and read and write
|
||
A5E92F9000
|
stack
|
page read and write
|
||
7FF848E1C000
|
trusted library allocation
|
page execute and read and write
|
||
22927900000
|
heap
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
22910380000
|
trusted library allocation
|
page read and write
|
||
1FE52F70000
|
heap
|
page read and write
|
||
A633509000
|
stack
|
page read and write
|
||
2290FD14000
|
trusted library allocation
|
page read and write
|
||
2290F000000
|
trusted library allocation
|
page read and write
|
||
27AA6E0B000
|
trusted library allocation
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
206C1DA0000
|
heap
|
page read and write
|
||
1FE3AA40000
|
trusted library allocation
|
page read and write
|
||
1FE3CA5B000
|
trusted library allocation
|
page read and write
|
||
206D1F41000
|
trusted library allocation
|
page read and write
|
||
206C377E000
|
trusted library allocation
|
page read and write
|
||
A63338E000
|
stack
|
page read and write
|
||
7FF849099000
|
trusted library allocation
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1FE4AF21000
|
trusted library allocation
|
page read and write
|
||
27AB6241000
|
trusted library allocation
|
page read and write
|
||
206C3807000
|
trusted library allocation
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
1FE3AA20000
|
heap
|
page execute and read and write
|
||
27AA46F0000
|
trusted library allocation
|
page read and write
|
||
1FE3BD5A000
|
trusted library allocation
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
229102C8000
|
trusted library allocation
|
page read and write
|
||
22927AB1000
|
heap
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
206C018B000
|
heap
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
CBEF049000
|
stack
|
page read and write
|
||
268C000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
93E000
|
heap
|
page read and write
|
||
206DA4A9000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
1B3D5000
|
heap
|
page read and write
|
||
26AF000
|
trusted library allocation
|
page read and write
|
||
1FE3AA50000
|
heap
|
page read and write
|
||
2290D64A000
|
heap
|
page read and write
|
||
CBEE3FE000
|
stack
|
page read and write
|
||
7FF848D90000
|
trusted library allocation
|
page read and write
|
||
7FF848DF6000
|
trusted library allocation
|
page read and write
|
||
2990000
|
heap
|
page execute and read and write
|
||
3F5DD8C000
|
stack
|
page read and write
|
||
27ABE5B0000
|
heap
|
page read and write
|
||
27AB651A000
|
trusted library allocation
|
page read and write
|
||
CBEE179000
|
stack
|
page read and write
|
||
796000
|
heap
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
2292792E000
|
heap
|
page read and write
|
||
27AA47CB000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
7FF848F48000
|
trusted library allocation
|
page read and write
|
||
7FF849073000
|
trusted library allocation
|
page read and write
|
||
2290FEF4000
|
trusted library allocation
|
page read and write
|
||
206C1D97000
|
heap
|
page execute and read and write
|
||
206C2962000
|
trusted library allocation
|
page read and write
|
||
206C1DAD000
|
heap
|
page read and write
|
||
7FF848D4D000
|
trusted library allocation
|
page execute and read and write
|
||
7BC000
|
heap
|
page read and write
|
||
26E6000
|
trusted library allocation
|
page read and write
|
||
1FE3AC20000
|
heap
|
page execute and read and write
|
||
27ABE679000
|
heap
|
page read and write
|
||
1FE53222000
|
heap
|
page read and write
|
||
1FE4AC40000
|
trusted library allocation
|
page read and write
|
||
2291056E000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
7FF848D63000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
27AA7AB5000
|
trusted library allocation
|
page read and write
|
||
206C30F0000
|
trusted library allocation
|
page read and write
|
||
1FE531E8000
|
heap
|
page read and write
|
||
1BD9A000
|
stack
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
C8F000
|
stack
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
CBEEF4E000
|
stack
|
page read and write
|
||
3F5CE77000
|
stack
|
page read and write
|
||
27AA7B76000
|
trusted library allocation
|
page read and write
|
||
3F5DE0E000
|
stack
|
page read and write
|
||
206C3036000
|
trusted library allocation
|
page read and write
|
||
1FE3BC39000
|
trusted library allocation
|
page read and write
|
||
97A000
|
heap
|
page read and write
|
||
1FE3CA11000
|
trusted library allocation
|
page read and write
|
||
A63360E000
|
stack
|
page read and write
|
||
7FF848D74000
|
trusted library allocation
|
page read and write
|
||
1FE38FE0000
|
heap
|
page read and write
|
||
3F5D0B9000
|
stack
|
page read and write
|
||
27AA4781000
|
heap
|
page read and write
|
||
27AA8028000
|
trusted library allocation
|
page read and write
|
||
27AA60FE000
|
heap
|
page read and write
|
||
7FF848E46000
|
trusted library allocation
|
page execute and read and write
|
||
1BB95000
|
stack
|
page read and write
|
||
807000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
22927938000
|
heap
|
page read and write
|
||
1FE5305E000
|
heap
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
7FF848D53000
|
trusted library allocation
|
page read and write
|
||
7FF848F38000
|
trusted library allocation
|
page read and write
|
||
206D1F11000
|
trusted library allocation
|
page read and write
|
||
1FE532D6000
|
heap
|
page read and write
|
||
1FE532A6000
|
heap
|
page read and write
|
||
229102EE000
|
trusted library allocation
|
page read and write
|
||
1FE38E90000
|
heap
|
page read and write
|
||
7FF40A9B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490AC000
|
trusted library allocation
|
page read and write
|
||
7FF848E56000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D40000
|
trusted library allocation
|
page read and write
|
||
E0D000
|
heap
|
page read and write
|
||
2290D65E000
|
heap
|
page read and write
|
||
2290D68B000
|
heap
|
page read and write
|
||
2290D688000
|
heap
|
page read and write
|
||
22910515000
|
trusted library allocation
|
page read and write
|
||
27AA6C72000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
1FE3BCC2000
|
trusted library allocation
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
7FF848D64000
|
trusted library allocation
|
page read and write
|
||
CBEDBAE000
|
stack
|
page read and write
|
||
27AA8047000
|
trusted library allocation
|
page read and write
|
||
206C3D3C000
|
trusted library allocation
|
page read and write
|
||
27AA73FA000
|
trusted library allocation
|
page read and write
|
||
2290F2C1000
|
trusted library allocation
|
page read and write
|
||
7DF404920000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EF2000
|
trusted library allocation
|
page read and write
|
||
27AA4730000
|
trusted library allocation
|
page read and write
|
||
7FF8490B2000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
2290F4EA000
|
trusted library allocation
|
page read and write
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
2600000
|
heap
|
page execute and read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
1FE3906B000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
27ABEBF0000
|
heap
|
page read and write
|
||
7FF8490B4000
|
trusted library allocation
|
page read and write
|
||
22910C20000
|
trusted library allocation
|
page read and write
|
||
273E000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
8FB000
|
heap
|
page read and write
|
||
7FF848DFC000
|
trusted library allocation
|
page execute and read and write
|
||
2290F16F000
|
heap
|
page read and write
|
||
7FF8490A4000
|
trusted library allocation
|
page read and write
|
||
1FE39150000
|
trusted library allocation
|
page read and write
|
||
156EDF47000
|
heap
|
page read and write
|
||
3F5CF79000
|
stack
|
page read and write
|
||
A6326B6000
|
stack
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
2AAF000
|
trusted library allocation
|
page read and write
|
||
7FF8491C0000
|
trusted library allocation
|
page read and write
|
||
1FE3BCF6000
|
trusted library allocation
|
page read and write
|
||
25FE000
|
stack
|
page read and write
|
||
1BA9E000
|
stack
|
page read and write
|
||
B3E000
|
stack
|
page read and write
|
||
206D1F82000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
3F5D1BF000
|
stack
|
page read and write
|
||
7FF848EE0000
|
trusted library allocation
|
page read and write
|
||
206C303A000
|
trusted library allocation
|
page read and write
|
||
206C0183000
|
heap
|
page read and write
|
||
1B360000
|
heap
|
page read and write
|
||
267C000
|
trusted library allocation
|
page read and write
|
||
206C3129000
|
trusted library allocation
|
page read and write
|
||
1FE3901D000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
3F5CD79000
|
stack
|
page read and write
|
||
2AAC000
|
trusted library allocation
|
page read and write
|
||
27AA4A25000
|
heap
|
page read and write
|
||
1B110000
|
heap
|
page read and write
|
||
1FE3BCD5000
|
trusted library allocation
|
page read and write
|
||
2291F2E1000
|
trusted library allocation
|
page read and write
|
||
1FE4AC51000
|
trusted library allocation
|
page read and write
|
||
22927AA0000
|
heap
|
page read and write
|
||
27AA7A8E000
|
trusted library allocation
|
page read and write
|
||
DF7000
|
heap
|
page read and write
|
||
1FE3AA63000
|
heap
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
7FF848F11000
|
trusted library allocation
|
page read and write
|
||
A5E96FF000
|
stack
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
1FE3BFF9000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
8FD000
|
heap
|
page read and write
|
||
206DA42A000
|
heap
|
page read and write
|
||
206D21FB000
|
trusted library allocation
|
page read and write
|
||
C95000
|
heap
|
page read and write
|
||
3F5CEFD000
|
stack
|
page read and write
|
||
156EE1D5000
|
heap
|
page read and write
|
||
A35000
|
heap
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
A63237E000
|
stack
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
A5E8F9E000
|
stack
|
page read and write
|
||
CBEDFFF000
|
stack
|
page read and write
|
||
1FE391B0000
|
heap
|
page read and write
|
||
2291037C000
|
trusted library allocation
|
page read and write
|
||
7DF404910000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849094000
|
trusted library allocation
|
page read and write
|
||
27AA6210000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
22910385000
|
trusted library allocation
|
page read and write
|
||
22910C13000
|
trusted library allocation
|
page read and write
|
||
7FF848F01000
|
trusted library allocation
|
page read and write
|
||
206DA450000
|
heap
|
page read and write
|
||
1FE3AA55000
|
heap
|
page read and write
|
||
3F5D23E000
|
stack
|
page read and write
|
||
22910BB5000
|
trusted library allocation
|
page read and write
|
||
206C0140000
|
heap
|
page read and write
|
||
1B89E000
|
stack
|
page read and write
|
||
27AB650B000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
206DA54F000
|
heap
|
page read and write
|
||
1AB9D000
|
stack
|
page read and write
|
||
A5EA44C000
|
stack
|
page read and write
|
||
206C1BC0000
|
trusted library allocation
|
page read and write
|
||
22910B52000
|
trusted library allocation
|
page read and write
|
||
206C00E0000
|
heap
|
page read and write
|
||
7FF848D43000
|
trusted library allocation
|
page execute and read and write
|
||
27AA4710000
|
trusted library allocation
|
page read and write
|
||
206DA506000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
FCE000
|
stack
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
27AA6E19000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
229110C5000
|
trusted library allocation
|
page read and write
|
||
351000
|
stack
|
page read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
27AA6449000
|
trusted library allocation
|
page read and write
|
||
ACF000
|
stack
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
26D4000
|
trusted library allocation
|
page read and write
|
||
CBEDAA3000
|
stack
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
206C0360000
|
trusted library allocation
|
page read and write
|
||
7FF8490DC000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
27AA4720000
|
heap
|
page readonly
|
||
CBEE37F000
|
stack
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
CBEDB2E000
|
stack
|
page read and write
|
||
229110E5000
|
trusted library allocation
|
page read and write
|
||
2290D540000
|
heap
|
page read and write
|
||
1FE3AA10000
|
heap
|
page read and write
|
||
206C0181000
|
heap
|
page read and write
|
||
7FF848F21000
|
trusted library allocation
|
page read and write
|
||
1FE531EC000
|
heap
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
A5E947D000
|
stack
|
page read and write
|
||
26CD000
|
trusted library allocation
|
page read and write
|
||
7FF848D6D000
|
trusted library allocation
|
page execute and read and write
|
||
A6328BE000
|
stack
|
page read and write
|
||
7FF848DBC000
|
trusted library allocation
|
page execute and read and write
|
||
E99000
|
heap
|
page read and write
|
||
27ABE8E1000
|
heap
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
27ABE868000
|
heap
|
page read and write
|
||
27AA804C000
|
trusted library allocation
|
page read and write
|
||
1FE531F0000
|
heap
|
page read and write
|
||
1B65E000
|
stack
|
page read and write
|
||
7FF848D6B000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
27AA6200000
|
heap
|
page execute and read and write
|
||
1C010000
|
heap
|
page read and write
|
||
1FE3BE11000
|
trusted library allocation
|
page read and write
|
||
2290F045000
|
heap
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
27AA7223000
|
trusted library allocation
|
page read and write
|
||
27AA4650000
|
heap
|
page read and write
|
||
206C3865000
|
trusted library allocation
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
A5E987B000
|
stack
|
page read and write
|
||
7FF848D42000
|
trusted library allocation
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8491AD000
|
trusted library allocation
|
page read and write
|
||
229102CF000
|
trusted library allocation
|
page read and write
|
||
1FE3ACB5000
|
trusted library allocation
|
page read and write
|
||
206C321D000
|
trusted library allocation
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
206C1E85000
|
heap
|
page read and write
|
||
A6329BC000
|
stack
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
269C000
|
trusted library allocation
|
page read and write
|
||
1FE53373000
|
heap
|
page read and write
|
||
1FE4AC61000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page execute and read and write
|
||
551000
|
stack
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
A5EA24E000
|
stack
|
page read and write
|
||
22910B2C000
|
trusted library allocation
|
page read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
2FABBBE000
|
stack
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
7FF848DF6000
|
trusted library allocation
|
page read and write
|
||
7FF849196000
|
trusted library allocation
|
page read and write
|
||
1BC94000
|
stack
|
page read and write
|
||
9A2000
|
heap
|
page read and write
|
||
7FF8490A9000
|
trusted library allocation
|
page read and write
|
||
7FF8491D0000
|
trusted library allocation
|
page read and write
|
||
22927909000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
2291064E000
|
trusted library allocation
|
page read and write
|
||
3F5CC7E000
|
stack
|
page read and write
|
||
1FE3BF3E000
|
trusted library allocation
|
page read and write
|
||
206DA522000
|
heap
|
page read and write
|
||
27AA66EE000
|
trusted library allocation
|
page read and write
|
||
27ABE9FC000
|
heap
|
page read and write
|
||
22927A8B000
|
heap
|
page read and write
|
||
7FF848D62000
|
trusted library allocation
|
page read and write
|
||
7FF848F1A000
|
trusted library allocation
|
page read and write
|
||
7DF4EC250000
|
trusted library allocation
|
page execute and read and write
|
||
27ABE6B7000
|
heap
|
page execute and read and write
|
||
7FF848EFA000
|
trusted library allocation
|
page read and write
|
||
27AA6070000
|
trusted library allocation
|
page read and write
|
||
2290F346000
|
trusted library allocation
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
A63247E000
|
stack
|
page read and write
|
||
DD9000
|
heap
|
page read and write
|
||
A5E967A000
|
stack
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page execute and read and write
|
||
1FE3BCD2000
|
trusted library allocation
|
page read and write
|
||
2654000
|
trusted library allocation
|
page read and write
|
||
1FE39130000
|
trusted library allocation
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
7FF84914C000
|
trusted library allocation
|
page read and write
|
||
7FF848D53000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
22927AA8000
|
heap
|
page read and write
|
||
1FE39196000
|
heap
|
page execute and read and write
|
||
1FE5336D000
|
heap
|
page read and write
|
||
1B46E000
|
stack
|
page read and write
|
||
2290F290000
|
heap
|
page execute and read and write
|
||
27ABE750000
|
heap
|
page read and write
|
||
1FE39140000
|
heap
|
page readonly
|
||
3F5D2BE000
|
stack
|
page read and write
|
||
7FF848EE2000
|
trusted library allocation
|
page read and write
|
||
2292765F000
|
heap
|
page read and write
|
||
7DF4AC010000
|
trusted library allocation
|
page execute and read and write
|
||
27AA4785000
|
heap
|
page read and write
|
||
1FE3AC31000
|
trusted library allocation
|
page read and write
|
||
7FF8490C9000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
206C0110000
|
heap
|
page read and write
|
||
2290D530000
|
heap
|
page read and write
|
||
7FF8490A8000
|
trusted library allocation
|
page read and write
|
||
7FF8491E0000
|
trusted library allocation
|
page read and write
|
||
1FE38F70000
|
heap
|
page read and write
|
||
22927992000
|
heap
|
page read and write
|
||
27AA8002000
|
trusted library allocation
|
page read and write
|
||
A63227E000
|
stack
|
page read and write
|
||
8DC000
|
heap
|
page read and write
|
||
3F5CFBF000
|
stack
|
page read and write
|
||
206C2F17000
|
trusted library allocation
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
1FE3A960000
|
trusted library allocation
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
7FF848EE0000
|
trusted library allocation
|
page read and write
|
||
206D2209000
|
trusted library allocation
|
page read and write
|
||
7DF491290000
|
trusted library allocation
|
page execute and read and write
|
||
12678000
|
trusted library allocation
|
page read and write
|
||
1FE4AF1A000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
2290D608000
|
heap
|
page read and write
|
||
1A640000
|
trusted library allocation
|
page read and write
|
||
7FF8490A2000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
12671000
|
trusted library allocation
|
page read and write
|
||
1FE531F8000
|
heap
|
page read and write
|
||
206DA512000
|
heap
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
27ABE85C000
|
heap
|
page read and write
|
||
1B15E000
|
stack
|
page read and write
|
||
12AA8000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
1BFCE000
|
stack
|
page read and write
|
||
22927982000
|
heap
|
page read and write
|
||
2290D9B0000
|
heap
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
7FF8490C4000
|
trusted library allocation
|
page read and write
|
||
206DA5E0000
|
trusted library allocation
|
page read and write
|
||
A5E937E000
|
stack
|
page read and write
|
||
1FE3A990000
|
trusted library allocation
|
page read and write
|
||
26F7000
|
trusted library allocation
|
page read and write
|
||
22910357000
|
trusted library allocation
|
page read and write
|
||
730000
|
trusted library allocation
|
page read and write
|
||
CBEE4FE000
|
stack
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
229279EA000
|
heap
|
page read and write
|
||
7FF848E56000
|
trusted library allocation
|
page execute and read and write
|
||
1130000
|
heap
|
page read and write
|
||
1FE52F96000
|
heap
|
page read and write
|
||
2290D646000
|
heap
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
27AA6E21000
|
trusted library allocation
|
page read and write
|
||
206DA547000
|
heap
|
page read and write
|
||
206DA416000
|
heap
|
page read and write
|
||
271B000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
206C3698000
|
trusted library allocation
|
page read and write
|
||
A63263E000
|
stack
|
page read and write
|
||
206DA3F8000
|
heap
|
page read and write
|
||
206C03D0000
|
heap
|
page execute and read and write
|
||
2290F78F000
|
trusted library allocation
|
page read and write
|
||
A5EA34D000
|
stack
|
page read and write
|
||
1FE3BFF1000
|
trusted library allocation
|
page read and write
|
||
CF1000
|
stack
|
page read and write
|
||
7FF848F02000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
7FF8491C0000
|
trusted library allocation
|
page read and write
|
||
206C1C0D000
|
heap
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
CBEE0FD000
|
stack
|
page read and write
|
||
A6324F7000
|
stack
|
page read and write
|
||
27AA60E0000
|
heap
|
page read and write
|
||
156EDEA0000
|
heap
|
page read and write
|
||
740000
|
trusted library allocation
|
page read and write
|
||
27AA6040000
|
trusted library allocation
|
page read and write
|
||
7FF8490D8000
|
trusted library allocation
|
page read and write
|
||
206C2F43000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
2A9E000
|
stack
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
206C023C000
|
heap
|
page read and write
|
||
206C2B09000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
206C0227000
|
heap
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
206C01C5000
|
heap
|
page read and write
|
||
A6322FE000
|
stack
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
9E5000
|
heap
|
page read and write
|
||
206C329A000
|
trusted library allocation
|
page read and write
|
||
206C03E5000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
26C4000
|
trusted library allocation
|
page read and write
|
||
7FF848F28000
|
trusted library allocation
|
page read and write
|
||
206C31BC000
|
trusted library allocation
|
page read and write
|
||
206C2E97000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
206C1E0D000
|
heap
|
page read and write
|
||
206C03E0000
|
heap
|
page read and write
|
||
1B02D000
|
stack
|
page read and write
|
||
27AB6221000
|
trusted library allocation
|
page read and write
|
||
156EE1D0000
|
heap
|
page read and write
|
||
27ABE98E000
|
heap
|
page read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
1FE3B889000
|
trusted library allocation
|
page read and write
|
||
2671000
|
trusted library allocation
|
page read and write
|
||
206D2390000
|
trusted library allocation
|
page read and write
|
||
206C3CF2000
|
trusted library allocation
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
27AA74C8000
|
trusted library allocation
|
page read and write
|
||
27AA72B2000
|
trusted library allocation
|
page read and write
|
||
229110EA000
|
trusted library allocation
|
page read and write
|
||
7FF848F12000
|
trusted library allocation
|
page read and write
|
||
1FE39068000
|
heap
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
27AA75E5000
|
trusted library allocation
|
page read and write
|
||
206C1DE5000
|
heap
|
page read and write
|
||
27ABE9DA000
|
heap
|
page read and write
|
||
206C1F11000
|
trusted library allocation
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
2290D642000
|
heap
|
page read and write
|
||
206DA41A000
|
heap
|
page read and write
|
||
27ABE931000
|
heap
|
page read and write
|
||
CBEDEFE000
|
stack
|
page read and write
|
||
7FF848D43000
|
trusted library allocation
|
page execute and read and write
|
||
27AA4791000
|
heap
|
page read and write
|
||
941000
|
heap
|
page read and write
|
||
7DF4AC020000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D4D000
|
trusted library allocation
|
page execute and read and write
|
||
2290FEC8000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
7FF848D64000
|
trusted library allocation
|
page read and write
|
||
2290D6CE000
|
heap
|
page read and write
|
||
A5E927E000
|
stack
|
page read and write
|
||
A5E8E93000
|
stack
|
page read and write
|
||
206C0390000
|
heap
|
page readonly
|
||
8D6000
|
heap
|
page read and write
|
||
206C1F00000
|
heap
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
7FF848F52000
|
trusted library allocation
|
page read and write
|
||
1ABFD000
|
stack
|
page read and write
|
||
A5E9579000
|
stack
|
page read and write
|
||
7FF848E0C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E80000
|
trusted library allocation
|
page execute and read and write
|
||
206C32D8000
|
trusted library allocation
|
page read and write
|
||
27AA79A9000
|
trusted library allocation
|
page read and write
|
||
27ABE854000
|
heap
|
page read and write
|
||
26CF000
|
trusted library allocation
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
1FE3C3B8000
|
trusted library allocation
|
page read and write
|
||
206C37A4000
|
trusted library allocation
|
page read and write
|
||
E01000
|
heap
|
page read and write
|
||
27AA478F000
|
heap
|
page read and write
|
||
7FF848E26000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E26000
|
trusted library allocation
|
page execute and read and write
|
||
1FE391B5000
|
heap
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
27AA724F000
|
trusted library allocation
|
page read and write
|
||
7FF848F44000
|
trusted library allocation
|
page read and write
|
||
7FF848DCC000
|
trusted library allocation
|
page execute and read and write
|
||
2290D5A0000
|
heap
|
page read and write
|
||
A5E97FF000
|
stack
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
27AB6510000
|
trusted library allocation
|
page read and write
|
||
206C1E30000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page read and write
|
||
27ABE858000
|
heap
|
page read and write
|
||
22910A46000
|
trusted library allocation
|
page read and write
|
||
27AA46E0000
|
trusted library section
|
page read and write
|
||
7FF849153000
|
trusted library allocation
|
page read and write
|
||
206DA422000
|
heap
|
page read and write
|
||
22927C10000
|
heap
|
page read and write
|
||
2290F150000
|
heap
|
page read and write
|
||
A6323F9000
|
stack
|
page read and write
|
||
206DA4EF000
|
heap
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
27ABE850000
|
heap
|
page read and write
|
||
156EDE70000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
7FF848E06000
|
trusted library allocation
|
page read and write
|
||
10CF000
|
stack
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
CBEE2FA000
|
stack
|
page read and write
|
||
7FF84917C000
|
trusted library allocation
|
page read and write
|
||
7FF848D5D000
|
trusted library allocation
|
page execute and read and write
|
||
A5E95F9000
|
stack
|
page read and write
|
||
27AA46D0000
|
trusted library section
|
page read and write
|
||
1B03E000
|
stack
|
page read and write
|
||
27AA752A000
|
trusted library allocation
|
page read and write
|
||
269E000
|
trusted library allocation
|
page read and write
|
||
1FE3CA56000
|
trusted library allocation
|
page read and write
|
||
2291034F000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
1FE39110000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
2290D63D000
|
heap
|
page read and write
|
||
27AA6215000
|
heap
|
page read and write
|
||
2290FEBE000
|
trusted library allocation
|
page read and write
|
||
7FF848F22000
|
trusted library allocation
|
page read and write
|
||
7FF848DAC000
|
trusted library allocation
|
page execute and read and write
|
||
22910353000
|
trusted library allocation
|
page read and write
|
||
CBEE1F7000
|
stack
|
page read and write
|
||
1FE531E4000
|
heap
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
206D2219000
|
trusted library allocation
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
7FF848D7B000
|
trusted library allocation
|
page read and write
|
||
24F0000
|
heap
|
page read and write
|
||
A63257E000
|
stack
|
page read and write
|
||
3F5DF0D000
|
stack
|
page read and write
|
||
CBEDE7E000
|
stack
|
page read and write
|
||
22927A69000
|
heap
|
page read and write
|
||
2290D5E0000
|
trusted library allocation
|
page read and write
|
||
1FE3902A000
|
heap
|
page read and write
|
||
27AA72DE000
|
trusted library allocation
|
page read and write
|
||
206C03A0000
|
trusted library allocation
|
page read and write
|
||
156EDE80000
|
heap
|
page read and write
|
||
7FF8491D0000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page execute and read and write
|
||
229103E7000
|
trusted library allocation
|
page read and write
|
||
3F5DF8E000
|
stack
|
page read and write
|
||
2FABB3F000
|
unkown
|
page read and write
|
||
CBEEFCA000
|
stack
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
1B01F000
|
stack
|
page read and write
|
||
2291F5AC000
|
trusted library allocation
|
page read and write
|
||
1FE4AF1F000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
A5EA4CC000
|
stack
|
page read and write
|
||
A632739000
|
stack
|
page read and write
|
||
1FE4AF39000
|
trusted library allocation
|
page read and write
|
||
2291068C000
|
trusted library allocation
|
page read and write
|
||
2728000
|
trusted library allocation
|
page read and write
|
||
1FE3BC65000
|
trusted library allocation
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
22910362000
|
trusted library allocation
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
3F5D33B000
|
stack
|
page read and write
|
||
27AB6292000
|
trusted library allocation
|
page read and write
|
||
7FF848D44000
|
trusted library allocation
|
page read and write
|
||
2FABAB9000
|
stack
|
page read and write
|
||
27AA4740000
|
heap
|
page read and write
|
||
27AB6251000
|
trusted library allocation
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
229277F7000
|
heap
|
page execute and read and write
|
||
2290D960000
|
trusted library allocation
|
page read and write
|
||
1FE3BCC6000
|
trusted library allocation
|
page read and write
|
||
27ABE830000
|
heap
|
page execute and read and write
|
||
7FF848D6D000
|
trusted library allocation
|
page execute and read and write
|
||
1FE4AF29000
|
trusted library allocation
|
page read and write
|
||
2291046E000
|
trusted library allocation
|
page read and write
|
||
7FF8490B8000
|
trusted library allocation
|
page read and write
|
||
7FF848E46000
|
trusted library allocation
|
page execute and read and write
|
||
93C000
|
heap
|
page read and write
|
||
1FE38F90000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
206D1F31000
|
trusted library allocation
|
page read and write
|
||
856000
|
heap
|
page read and write
|
||
1FE4B034000
|
trusted library allocation
|
page read and write
|
||
3F5DD0E000
|
stack
|
page read and write
|
||
7FF8491E0000
|
trusted library allocation
|
page read and write
|
||
7FF848D52000
|
trusted library allocation
|
page read and write
|
||
E3D000
|
heap
|
page read and write
|
||
26B4000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
206C1B90000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
7FC000
|
heap
|
page read and write
|
||
206C3D17000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
12AA1000
|
trusted library allocation
|
page read and write
|
||
2746000
|
trusted library allocation
|
page read and write
|
||
3F5CDFE000
|
stack
|
page read and write
|
||
DA5000
|
heap
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
27AB6512000
|
trusted library allocation
|
page read and write
|
||
1FE3CA37000
|
trusted library allocation
|
page read and write
|
||
27AA4789000
|
heap
|
page read and write
|
||
27ABE60F000
|
heap
|
page read and write
|
||
2290D9B5000
|
heap
|
page read and write
|
||
A63283E000
|
stack
|
page read and write
|
||
1FE3BBCB000
|
trusted library allocation
|
page read and write
|
||
27AA4570000
|
heap
|
page read and write
|
||
CBEE47C000
|
stack
|
page read and write
|
||
7FF849083000
|
trusted library allocation
|
page read and write
|
||
1B66E000
|
stack
|
page read and write
|
||
206C23DE000
|
trusted library allocation
|
page read and write
|
||
2AA1000
|
trusted library allocation
|
page read and write
|
||
27ABE8B5000
|
heap
|
page read and write
|
||
2290D648000
|
heap
|
page read and write
|
||
27AA71C1000
|
trusted library allocation
|
page read and write
|
||
229102C0000
|
trusted library allocation
|
page read and write
|
||
27ABE687000
|
heap
|
page read and write
|
||
1FE3BCF8000
|
trusted library allocation
|
page read and write
|
||
A6327B8000
|
stack
|
page read and write
|
||
206C0189000
|
heap
|
page read and write
|
||
1FE39190000
|
heap
|
page execute and read and write
|
||
7FF8490CC000
|
trusted library allocation
|
page read and write
|
||
7FF848F58000
|
trusted library allocation
|
page read and write
|
||
27AA4A20000
|
heap
|
page read and write
|
||
7FF8491C0000
|
trusted library allocation
|
page read and write
|
||
7FF8490B9000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
7DF4AC030000
|
trusted library allocation
|
page execute and read and write
|
||
22927A96000
|
heap
|
page read and write
|
||
7FF848F24000
|
trusted library allocation
|
page read and write
|
||
206C2FD4000
|
trusted library allocation
|
page read and write
|
||
A5E8F1D000
|
stack
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
206C2B17000
|
trusted library allocation
|
page read and write
|
||
1C61A000
|
stack
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
206DA760000
|
heap
|
page read and write
|
||
7FF848D5B000
|
trusted library allocation
|
page read and write
|
||
7FF848F34000
|
trusted library allocation
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page execute and read and write
|
||
2290D600000
|
heap
|
page read and write
|
||
27AA7343000
|
trusted library allocation
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
1C51C000
|
stack
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
1FE531E0000
|
heap
|
page read and write
|
||
7FF848F0A000
|
trusted library allocation
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
206C1E0F000
|
heap
|
page read and write
|
||
7FF848D72000
|
trusted library allocation
|
page read and write
|
||
27ABE66E000
|
heap
|
page read and write
|
||
3F5D13B000
|
stack
|
page read and write
|
||
7FF848D9C000
|
trusted library allocation
|
page execute and read and write
|
||
1BE94000
|
stack
|
page read and write
|
||
2291035F000
|
trusted library allocation
|
page read and write
|
||
743000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
206C1D20000
|
heap
|
page read and write
|
||
1B21F000
|
stack
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
27ABE864000
|
heap
|
page read and write
|
||
1FE3C585000
|
trusted library allocation
|
page read and write
|
||
1FE38FF2000
|
heap
|
page read and write
|
||
CBEDF7A000
|
stack
|
page read and write
|
||
27AA6221000
|
trusted library allocation
|
page read and write
|
||
A5E93F7000
|
stack
|
page read and write
|
||
27AB652A000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
206DA55D000
|
heap
|
page read and write
|
||
206DA56A000
|
heap
|
page read and write
|
||
A5E977E000
|
stack
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page execute and read and write
|
||
710000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page execute and read and write
|
||
27AA4747000
|
heap
|
page read and write
|
||
2292763F000
|
heap
|
page read and write
|
||
22927970000
|
heap
|
page read and write
|
||
7FF8491CD000
|
trusted library allocation
|
page read and write
|
||
A5E94F6000
|
stack
|
page read and write
|
||
7FF8491A6000
|
trusted library allocation
|
page read and write
|
||
1B25E000
|
stack
|
page read and write
|
||
2291F333000
|
trusted library allocation
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
7FF848D74000
|
trusted library allocation
|
page read and write
|
||
2291F2C1000
|
trusted library allocation
|
page read and write
|
||
7FF848F2A000
|
trusted library allocation
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
905000
|
heap
|
page read and write
|
||
22910383000
|
trusted library allocation
|
page read and write
|
||
1B3D3000
|
heap
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page execute and read and write
|
||
27AA4767000
|
heap
|
page read and write
|
||
7D2000
|
heap
|
page read and write
|
||
1FE3B93D000
|
trusted library allocation
|
page read and write
|
||
7FF84915C000
|
trusted library allocation
|
page read and write
|
||
206DA2C0000
|
heap
|
page read and write
|
||
206C00F0000
|
heap
|
page read and write
|
||
1FE3BCEF000
|
trusted library allocation
|
page read and write
|
||
206C017C000
|
heap
|
page read and write
|
||
7FF848D44000
|
trusted library allocation
|
page read and write
|
||
1B050000
|
heap
|
page execute and read and write
|
There are 1018 hidden memdumps, click here to show them.