Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
BoostFPS.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\BoostFPS.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Roaming\svchost.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2ggvwb5x.uqe.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2zkytvg1.nif.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eme0efz3.pd2.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_enlihd5y.irv.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gml4olhe.zxi.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_huopx33y.r1e.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iif5qvo5.czu.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ke5jdrkb.hft.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mom512g0.reg.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mu0ndttj.kcj.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qicgx3xx.vhs.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vfqerpcf.nnq.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wn1jbp2n.b3z.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wzm31iqy.54h.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xhxc2g0f.nd2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ysmqhlt4.gvc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\FPS_BY FILMGODX.bat
|
Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Nov 20 08:37:03
2024, mtime=Wed Nov 20 08:37:03 2024, atime=Wed Nov 20 08:37:03 2024, length=78848, window=hide
|
dropped
|
There are 14 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\BoostFPS.exe
|
"C:\Users\user\Desktop\BoostFPS.exe"
|
||
C:\Users\user\AppData\Roaming\svchost.exe
|
"C:\Users\user\AppData\Roaming\svchost.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\user\AppData\Roaming\svchost.exe"
|
||
C:\Users\user\AppData\Roaming\svchost.exe
|
C:\Users\user\AppData\Roaming\svchost.exe
|
||
C:\Users\user\AppData\Roaming\svchost.exe
|
"C:\Users\user\AppData\Roaming\svchost.exe"
|
||
C:\Users\user\AppData\Roaming\svchost.exe
|
"C:\Users\user\AppData\Roaming\svchost.exe"
|
||
C:\Users\user\AppData\Roaming\svchost.exe
|
C:\Users\user\AppData\Roaming\svchost.exe
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\FPS_BY FILMGODX.bat" "
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\mode.com
|
Mode 100,25
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "prompt #$H#$E# & echo on & for %b in (1) do rem"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 11 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
45.141.27.248
|
|||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
http://www.micom/pkiops/Docs/ry.htm0
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://wwwft.com/pkiops/crProPCA2011_2011-l0a
|
unknown
|
||
https://go.microsoft.co_
|
unknown
|
||
https://Token.dll
|
unknown
|
||
http://www.microsoft.
|
unknown
|
||
http://crl.micft.cMicRosof
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://wwoft.com/pkiops/c
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
There are 12 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
45.141.27.248
|
unknown
|
Netherlands
|
||
208.95.112.1
|
ip-api.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
svchost
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
25A1000
|
trusted library allocation
|
page read and write
|
||
1A2000
|
unkown
|
page readonly
|
||
24E1000
|
trusted library allocation
|
page read and write
|
||
25EC000
|
trusted library allocation
|
page read and write
|
||
3F3C94C000
|
stack
|
page read and write
|
||
21BD84CB000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
21BD8076000
|
heap
|
page read and write
|
||
2242F613000
|
trusted library allocation
|
page read and write
|
||
60B000
|
heap
|
page read and write
|
||
EBD000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
1C1FE000
|
stack
|
page read and write
|
||
1BFFE000
|
stack
|
page read and write
|
||
1DBDE7C0000
|
heap
|
page readonly
|
||
270602ED000
|
trusted library allocation
|
page read and write
|
||
2706F582000
|
trusted library allocation
|
page read and write
|
||
1DBE115C000
|
trusted library allocation
|
page read and write
|
||
7FF848CAD000
|
trusted library allocation
|
page execute and read and write
|
||
2243E563000
|
trusted library allocation
|
page read and write
|
||
1DBE13D0000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
5D0000
|
trusted library allocation
|
page read and write
|
||
7FF848E50000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D36000
|
trusted library allocation
|
page read and write
|
||
6BA000
|
heap
|
page read and write
|
||
648000
|
heap
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
E2B000
|
heap
|
page read and write
|
||
7FF848C60000
|
trusted library allocation
|
page read and write
|
||
C02000
|
heap
|
page read and write
|
||
1AF02000
|
heap
|
page execute and read and write
|
||
7FF848C83000
|
trusted library allocation
|
page execute and read and write
|
||
BC0000
|
heap
|
page execute and read and write
|
||
2CC1000
|
trusted library allocation
|
page read and write
|
||
1DCFD000
|
stack
|
page read and write
|
||
7FF848C90000
|
trusted library allocation
|
page read and write
|
||
21BC1A63000
|
trusted library allocation
|
page read and write
|
||
1DBE11B7000
|
trusted library allocation
|
page read and write
|
||
2707788D000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
70A000
|
heap
|
page read and write
|
||
2706F81A000
|
trusted library allocation
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
7FF848D10000
|
trusted library allocation
|
page read and write
|
||
1B150000
|
heap
|
page read and write
|
||
224468F0000
|
heap
|
page execute and read and write
|
||
5F0000
|
heap
|
page execute and read and write
|
||
6AE000
|
heap
|
page read and write
|
||
22446925000
|
heap
|
page read and write
|
||
1DBF8A80000
|
heap
|
page read and write
|
||
125A1000
|
trusted library allocation
|
page read and write
|
||
97993CE000
|
stack
|
page read and write
|
||
2242C900000
|
trusted library allocation
|
page read and write
|
||
270606EC000
|
trusted library allocation
|
page read and write
|
||
7FF848E1A000
|
trusted library allocation
|
page read and write
|
||
7FF848E32000
|
trusted library allocation
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
22446B00000
|
heap
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
22446B35000
|
heap
|
page read and write
|
||
12BC000
|
heap
|
page read and write
|
||
2243E501000
|
trusted library allocation
|
page read and write
|
||
1C6D3000
|
heap
|
page read and write
|
||
600000
|
trusted library allocation
|
page read and write
|
||
7DF488060000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D40000
|
trusted library allocation
|
page read and write
|
||
1C6E9000
|
heap
|
page read and write
|
||
7FF848C93000
|
trusted library allocation
|
page execute and read and write
|
||
2705D9CD000
|
heap
|
page read and write
|
||
7FF848D3C000
|
trusted library allocation
|
page execute and read and write
|
||
2678000
|
trusted library allocation
|
page read and write
|
||
7FF848CDC000
|
trusted library allocation
|
page execute and read and write
|
||
2623000
|
trusted library allocation
|
page read and write
|
||
1B5AE000
|
stack
|
page read and write
|
||
12603000
|
trusted library allocation
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page execute and read and write
|
||
2705D978000
|
heap
|
page read and write
|
||
21BCFC71000
|
trusted library allocation
|
page read and write
|
||
270779E0000
|
heap
|
page execute and read and write
|
||
27060540000
|
trusted library allocation
|
page read and write
|
||
21BBE110000
|
trusted library section
|
page read and write
|
||
2242F0EC000
|
trusted library allocation
|
page read and write
|
||
7FF848C72000
|
trusted library allocation
|
page read and write
|
||
7FF848CA0000
|
trusted library allocation
|
page read and write
|
||
7FF8490D8000
|
trusted library allocation
|
page read and write
|
||
1202000
|
heap
|
page read and write
|
||
2706F7E6000
|
trusted library allocation
|
page read and write
|
||
1DBDE840000
|
trusted library allocation
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
24E0000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
B8367F9000
|
stack
|
page read and write
|
||
7FF848E58000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
23BE4930000
|
heap
|
page read and write
|
||
180000
|
heap
|
page read and write
|
||
1B6000
|
unkown
|
page readonly
|
||
2243E7E1000
|
trusted library allocation
|
page read and write
|
||
7FF848C6D000
|
trusted library allocation
|
page execute and read and write
|
||
1160000
|
heap
|
page read and write
|
||
1DBE2014000
|
trusted library allocation
|
page read and write
|
||
1DBF8ACD000
|
heap
|
page read and write
|
||
21BBDF03000
|
heap
|
page read and write
|
||
1DBDE870000
|
heap
|
page read and write
|
||
1C3FE000
|
stack
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
902000
|
heap
|
page read and write
|
||
125B2000
|
trusted library allocation
|
page read and write
|
||
1DBE1317000
|
trusted library allocation
|
page read and write
|
||
7FF849083000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
131A8000
|
trusted library allocation
|
page read and write
|
||
2242C8E0000
|
trusted library allocation
|
page read and write
|
||
1B54F000
|
stack
|
page read and write
|
||
125A000
|
heap
|
page read and write
|
||
7FF848C6D000
|
trusted library allocation
|
page execute and read and write
|
||
1ADF0000
|
heap
|
page execute and read and write
|
||
7FF848C74000
|
trusted library allocation
|
page read and write
|
||
3F3BEFB000
|
stack
|
page read and write
|
||
1C61B000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page execute and read and write
|
||
1B990000
|
heap
|
page execute and read and write
|
||
2705DAC0000
|
trusted library section
|
page read and write
|
||
C16000
|
heap
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
22446C48000
|
heap
|
page read and write
|
||
979827F000
|
stack
|
page read and write
|
||
7FF848D16000
|
trusted library allocation
|
page read and write
|
||
21BBDF09000
|
heap
|
page read and write
|
||
7FF848FC8000
|
trusted library allocation
|
page read and write
|
||
2243E7FA000
|
trusted library allocation
|
page read and write
|
||
21BBDEC8000
|
heap
|
page read and write
|
||
1DBDE610000
|
heap
|
page read and write
|
||
2705F500000
|
heap
|
page execute and read and write
|
||
6F1000
|
stack
|
page read and write
|
||
1DBE01E5000
|
heap
|
page read and write
|
||
1DBE0DDC000
|
trusted library allocation
|
page read and write
|
||
2705F511000
|
trusted library allocation
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
2242F491000
|
trusted library allocation
|
page read and write
|
||
3DF6A3C000
|
stack
|
page read and write
|
||
7FF848D10000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
2242C760000
|
heap
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
12CB3000
|
trusted library allocation
|
page read and write
|
||
2242F0F0000
|
trusted library allocation
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
21BBDF44000
|
heap
|
page read and write
|
||
3DF647F000
|
stack
|
page read and write
|
||
9DE000
|
stack
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
3F3B979000
|
stack
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page execute and read and write
|
||
83E000
|
stack
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
7FF848E50000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848CDC000
|
trusted library allocation
|
page execute and read and write
|
||
124E1000
|
trusted library allocation
|
page read and write
|
||
1DBF0211000
|
trusted library allocation
|
page read and write
|
||
B836B3E000
|
stack
|
page read and write
|
||
2705D9F3000
|
heap
|
page read and write
|
||
2242C963000
|
heap
|
page read and write
|
||
170E000
|
stack
|
page read and write
|
||
17FE000
|
stack
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
7FF848FCC000
|
trusted library allocation
|
page read and write
|
||
21BC146A000
|
trusted library allocation
|
page read and write
|
||
2706F914000
|
trusted library allocation
|
page read and write
|
||
2242F37B000
|
trusted library allocation
|
page read and write
|
||
224E9E70000
|
heap
|
page read and write
|
||
2242C9A4000
|
heap
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
3DF65F7000
|
stack
|
page read and write
|
||
1B8FF000
|
stack
|
page read and write
|
||
21BC09B3000
|
trusted library allocation
|
page read and write
|
||
2BA0000
|
heap
|
page execute and read and write
|
||
3DF667D000
|
stack
|
page read and write
|
||
3DF60C3000
|
stack
|
page read and write
|
||
23BE4930000
|
heap
|
page read and write
|
||
1C5FE000
|
stack
|
page read and write
|
||
1222000
|
heap
|
page read and write
|
||
27077850000
|
heap
|
page read and write
|
||
1DBF867A000
|
heap
|
page read and write
|
||
7FF8490A7000
|
trusted library allocation
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
1DBF0221000
|
trusted library allocation
|
page read and write
|
||
1BAFF000
|
stack
|
page read and write
|
||
7FF848D4C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848CA0000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
trusted library allocation
|
page read and write
|
||
23BE4900000
|
heap
|
page read and write
|
||
2242E4E5000
|
heap
|
page read and write
|
||
7FF848E1A000
|
trusted library allocation
|
page read and write
|
||
E39000
|
heap
|
page read and write
|
||
21BBFC30000
|
heap
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
12C2000
|
heap
|
page read and write
|
||
21BBE160000
|
heap
|
page readonly
|
||
1DBDE875000
|
heap
|
page read and write
|
||
21BBFCBB000
|
trusted library allocation
|
page read and write
|
||
1DBF8816000
|
heap
|
page execute and read and write
|
||
7FF848C80000
|
trusted library allocation
|
page read and write
|
||
22446C22000
|
heap
|
page read and write
|
||
27060634000
|
trusted library allocation
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
1DBE1158000
|
trusted library allocation
|
page read and write
|
||
142587F000
|
stack
|
page read and write
|
||
2242F740000
|
trusted library allocation
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page execute and read and write
|
||
27077C20000
|
heap
|
page read and write
|
||
2242F798000
|
trusted library allocation
|
page read and write
|
||
7FF848DF2000
|
trusted library allocation
|
page read and write
|
||
7FF848D30000
|
trusted library allocation
|
page execute and read and write
|
||
1F0000
|
heap
|
page read and write
|
||
27077CBC000
|
heap
|
page read and write
|
||
E78000
|
heap
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page execute and read and write
|
||
21BBDED2000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
1C6E7000
|
heap
|
page read and write
|
||
21BD8513000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
7DF4A0F50000
|
trusted library allocation
|
page execute and read and write
|
||
2242C910000
|
heap
|
page readonly
|
||
1DBE12B4000
|
trusted library allocation
|
page read and write
|
||
1DBF873C000
|
heap
|
page read and write
|
||
21BC14D0000
|
trusted library allocation
|
page read and write
|
||
2619000
|
trusted library allocation
|
page read and write
|
||
2705DB30000
|
trusted library allocation
|
page read and write
|
||
3F3B5FE000
|
stack
|
page read and write
|
||
3DF67B7000
|
stack
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
7FF848E48000
|
trusted library allocation
|
page read and write
|
||
1B04D000
|
stack
|
page read and write
|
||
7FF848C60000
|
trusted library allocation
|
page read and write
|
||
3DF7609000
|
stack
|
page read and write
|
||
2706F541000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
22446C42000
|
heap
|
page read and write
|
||
1D78B000
|
stack
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
2663000
|
trusted library allocation
|
page read and write
|
||
1DBE0F6F000
|
trusted library allocation
|
page read and write
|
||
1DBE1409000
|
trusted library allocation
|
page read and write
|
||
1DBF8BEB000
|
heap
|
page read and write
|
||
1AD60000
|
heap
|
page execute and read and write
|
||
21BC0C0B000
|
trusted library allocation
|
page read and write
|
||
7FF848FC3000
|
trusted library allocation
|
page read and write
|
||
7FF848C9D000
|
trusted library allocation
|
page execute and read and write
|
||
1AA6D000
|
stack
|
page read and write
|
||
7FF848E22000
|
trusted library allocation
|
page read and write
|
||
21BC0C71000
|
trusted library allocation
|
page read and write
|
||
1DBDE510000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
7FF84907C000
|
trusted library allocation
|
page read and write
|
||
1DBDE6B8000
|
heap
|
page read and write
|
||
B8364FE000
|
stack
|
page read and write
|
||
2242F4F5000
|
trusted library allocation
|
page read and write
|
||
3F3B533000
|
stack
|
page read and write
|
||
7FF848CEC000
|
trusted library allocation
|
page execute and read and write
|
||
2242C9A6000
|
heap
|
page read and write
|
||
27060766000
|
trusted library allocation
|
page read and write
|
||
EBA000
|
heap
|
page read and write
|
||
22446948000
|
heap
|
page read and write
|
||
1DBF01F1000
|
trusted library allocation
|
page read and write
|
||
E52000
|
heap
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page execute and read and write
|
||
2242F7F9000
|
trusted library allocation
|
page read and write
|
||
83E000
|
heap
|
page read and write
|
||
1A5D0000
|
trusted library allocation
|
page read and write
|
||
1DBE1227000
|
trusted library allocation
|
page read and write
|
||
27077B40000
|
trusted library allocation
|
page read and write
|
||
2705DB00000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
7FF848EE0000
|
trusted library allocation
|
page read and write
|
||
22446C02000
|
heap
|
page read and write
|
||
6AA000
|
heap
|
page read and write
|
||
B836ABE000
|
stack
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
2E5C000
|
trusted library allocation
|
page read and write
|
||
1D88A000
|
stack
|
page read and write
|
||
613000
|
heap
|
page read and write
|
||
1C6D0000
|
heap
|
page read and write
|
||
1DBE0120000
|
heap
|
page execute and read and write
|
||
1302000
|
heap
|
page read and write
|
||
1A3F000
|
stack
|
page read and write
|
||
7FF848CA0000
|
trusted library allocation
|
page read and write
|
||
2706F802000
|
trusted library allocation
|
page read and write
|
||
22446A20000
|
heap
|
page read and write
|
||
21BCFF2B000
|
trusted library allocation
|
page read and write
|
||
21BC0CD5000
|
trusted library allocation
|
page read and write
|
||
E45000
|
heap
|
page read and write
|
||
1C2FF000
|
stack
|
page read and write
|
||
24F0000
|
heap
|
page execute and read and write
|
||
1DBF8AE5000
|
heap
|
page read and write
|
||
23BE4944000
|
heap
|
page read and write
|
||
1DBDE650000
|
heap
|
page read and write
|
||
21BBDF1D000
|
heap
|
page read and write
|
||
27061334000
|
trusted library allocation
|
page read and write
|
||
E13000
|
heap
|
page read and write
|
||
1DBF8B5E000
|
heap
|
page read and write
|
||
7FF8490ED000
|
trusted library allocation
|
page read and write
|
||
7FF848E50000
|
trusted library allocation
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page execute and read and write
|
||
23BE4941000
|
heap
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page execute and read and write
|
||
21BD83A0000
|
heap
|
page read and write
|
||
1DBE15BC000
|
trusted library allocation
|
page read and write
|
||
7FF8490E6000
|
trusted library allocation
|
page read and write
|
||
1DBE0DEC000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
7FF848C90000
|
trusted library allocation
|
page read and write
|
||
1DBF8840000
|
heap
|
page read and write
|
||
21BD850B000
|
heap
|
page read and write
|
||
16E0000
|
heap
|
page read and write
|
||
2625000
|
trusted library allocation
|
page read and write
|
||
23BE4BA5000
|
heap
|
page read and write
|
||
7FF848D20000
|
trusted library allocation
|
page read and write
|
||
31A1000
|
trusted library allocation
|
page read and write
|
||
1CC3D000
|
stack
|
page read and write
|
||
7FF848C73000
|
trusted library allocation
|
page execute and read and write
|
||
24B0000
|
trusted library allocation
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
27077A55000
|
heap
|
page read and write
|
||
1B156000
|
heap
|
page read and write
|
||
1C4FF000
|
stack
|
page read and write
|
||
63D000
|
heap
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
2242C9A9000
|
heap
|
page read and write
|
||
7FF848C54000
|
trusted library allocation
|
page read and write
|
||
2705DAE0000
|
trusted library allocation
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
21BC0D33000
|
trusted library allocation
|
page read and write
|
||
21BD7F80000
|
heap
|
page read and write
|
||
3FE02FB000
|
stack
|
page read and write
|
||
7FF848D76000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E12000
|
trusted library allocation
|
page read and write
|
||
23BE4941000
|
heap
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
1DBE1154000
|
trusted library allocation
|
page read and write
|
||
2705D970000
|
heap
|
page read and write
|
||
23BE4941000
|
heap
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page read and write
|
||
7FF848C6D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F6F000
|
trusted library allocation
|
page read and write
|
||
1C600000
|
heap
|
page read and write
|
||
7FF848C83000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F20000
|
trusted library allocation
|
page read and write
|
||
1DBDE6F6000
|
heap
|
page read and write
|
||
1DBDE6FA000
|
heap
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
2CB1000
|
trusted library allocation
|
page read and write
|
||
7FF848C80000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
trusted library allocation
|
page read and write
|
||
190E000
|
stack
|
page read and write
|
||
2242C920000
|
heap
|
page read and write
|
||
224EA0F0000
|
heap
|
page read and write
|
||
7FF849052000
|
trusted library allocation
|
page read and write
|
||
21BC0F1C000
|
trusted library allocation
|
page read and write
|
||
23BE4944000
|
heap
|
page read and write
|
||
7FF848D1C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
21BC0C45000
|
trusted library allocation
|
page read and write
|
||
7FF848E41000
|
trusted library allocation
|
page read and write
|
||
21BC0DA0000
|
trusted library allocation
|
page read and write
|
||
3F3B9FE000
|
stack
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FCA000
|
trusted library allocation
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
7FF848CA4000
|
trusted library allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
B83778C000
|
stack
|
page read and write
|
||
652000
|
heap
|
page read and write
|
||
73DC7F9000
|
stack
|
page read and write
|
||
21BC1591000
|
trusted library allocation
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
7FF848E2A000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
1DBF8B70000
|
heap
|
page read and write
|
||
270608DB000
|
trusted library allocation
|
page read and write
|
||
613000
|
heap
|
page read and write
|
||
1DBE0DF4000
|
trusted library allocation
|
page read and write
|
||
1DBF8B89000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
131A1000
|
trusted library allocation
|
page read and write
|
||
2244696B000
|
heap
|
page read and write
|
||
21BD83B0000
|
heap
|
page read and write
|
||
7FF8490C6000
|
trusted library allocation
|
page read and write
|
||
1ADD0000
|
trusted library allocation
|
page read and write
|
||
7FF848C84000
|
trusted library allocation
|
page read and write
|
||
7FF848FC4000
|
trusted library allocation
|
page read and write
|
||
21BC13C4000
|
trusted library allocation
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848C70000
|
trusted library allocation
|
page read and write
|
||
7FF848D16000
|
trusted library allocation
|
page read and write
|
||
E2D000
|
heap
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
128E000
|
stack
|
page read and write
|
||
1DBF8B98000
|
heap
|
page read and write
|
||
7FF848C84000
|
trusted library allocation
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
2242FD80000
|
trusted library allocation
|
page read and write
|
||
3F3BDFE000
|
stack
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
264B000
|
trusted library allocation
|
page read and write
|
||
1DBF8676000
|
heap
|
page read and write
|
||
3F3BD7F000
|
stack
|
page read and write
|
||
7FF848DB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
693000
|
heap
|
page read and write
|
||
2706028A000
|
trusted library allocation
|
page read and write
|
||
7DF4A7830000
|
trusted library allocation
|
page execute and read and write
|
||
27060C95000
|
trusted library allocation
|
page read and write
|
||
979837D000
|
stack
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
1B161000
|
heap
|
page read and write
|
||
1E3A22B6000
|
heap
|
page read and write
|
||
1DBF8BCC000
|
heap
|
page read and write
|
||
97983F9000
|
stack
|
page read and write
|
||
7FF848D30000
|
trusted library allocation
|
page read and write
|
||
224469B9000
|
heap
|
page read and write
|
||
1AE02000
|
heap
|
page read and write
|
||
12608000
|
trusted library allocation
|
page read and write
|
||
27060281000
|
trusted library allocation
|
page read and write
|
||
2242CA20000
|
trusted library allocation
|
page read and write
|
||
1DBE01B0000
|
heap
|
page read and write
|
||
7FF848C63000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D36000
|
trusted library allocation
|
page execute and read and write
|
||
D2000
|
unkown
|
page readonly
|
||
23BE4BB0000
|
heap
|
page read and write
|
||
7FF8490CD000
|
trusted library allocation
|
page read and write
|
||
622000
|
heap
|
page read and write
|
||
21BBE0B0000
|
heap
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page execute and read and write
|
||
1DBDE684000
|
heap
|
page read and write
|
||
2707787A000
|
heap
|
page read and write
|
||
21BBDF46000
|
heap
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
27077BBE000
|
heap
|
page read and write
|
||
1251000
|
heap
|
page read and write
|
||
23BE4941000
|
heap
|
page read and write
|
||
1255000
|
heap
|
page read and write
|
||
3F3CBCE000
|
stack
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
3DF6ABE000
|
stack
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page read and write
|
||
224EA0F5000
|
heap
|
page read and write
|
||
674000
|
heap
|
page read and write
|
||
22446C2D000
|
heap
|
page read and write
|
||
21BBDEFD000
|
heap
|
page read and write
|
||
8C6000
|
heap
|
page read and write
|
||
1DBE1165000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
27077CD7000
|
heap
|
page read and write
|
||
7FF848C92000
|
trusted library allocation
|
page read and write
|
||
7FF848E54000
|
trusted library allocation
|
page read and write
|
||
22446991000
|
heap
|
page read and write
|
||
1DBF8B07000
|
heap
|
page read and write
|
||
7FF848C94000
|
trusted library allocation
|
page read and write
|
||
1DBF8711000
|
heap
|
page read and write
|
||
23D0000
|
heap
|
page read and write
|
||
B83677D000
|
stack
|
page read and write
|
||
B8366F7000
|
stack
|
page read and write
|
||
23BE4941000
|
heap
|
page read and write
|
||
3DF6B3C000
|
stack
|
page read and write
|
||
1DBE149C000
|
trusted library allocation
|
page read and write
|
||
1C688000
|
heap
|
page read and write
|
||
66A000
|
heap
|
page read and write
|
||
27060514000
|
trusted library allocation
|
page read and write
|
||
27077ED0000
|
heap
|
page read and write
|
||
2612000
|
trusted library allocation
|
page read and write
|
||
2705DB20000
|
heap
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
1C64F000
|
heap
|
page read and write
|
||
4F4000
|
stack
|
page read and write
|
||
7FF848F93000
|
trusted library allocation
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
682000
|
heap
|
page read and write
|
||
2E51000
|
trusted library allocation
|
page read and write
|
||
7FF848C93000
|
trusted library allocation
|
page read and write
|
||
27077893000
|
heap
|
page read and write
|
||
A3AA71C000
|
stack
|
page read and write
|
||
2242E56A000
|
trusted library allocation
|
page read and write
|
||
97982F7000
|
stack
|
page read and write
|
||
2705DAD0000
|
trusted library section
|
page read and write
|
||
1DBE2019000
|
trusted library allocation
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
7FF848D46000
|
trusted library allocation
|
page read and write
|
||
1B34F000
|
stack
|
page read and write
|
||
CFF000
|
stack
|
page read and write
|
||
7FF848D46000
|
trusted library allocation
|
page execute and read and write
|
||
626000
|
heap
|
page read and write
|
||
21BC0692000
|
trusted library allocation
|
page read and write
|
||
8B8000
|
heap
|
page read and write
|
||
3DF750E000
|
stack
|
page read and write
|
||
B8368B7000
|
stack
|
page read and write
|
||
125A8000
|
trusted library allocation
|
page read and write
|
||
224469F5000
|
heap
|
page read and write
|
||
22430318000
|
trusted library allocation
|
page read and write
|
||
7FF848DA0000
|
trusted library allocation
|
page execute and read and write
|
||
6FE000
|
heap
|
page read and write
|
||
14255DD000
|
stack
|
page read and write
|
||
1DBDE6AE000
|
heap
|
page read and write
|
||
25572B08000
|
heap
|
page read and write
|
||
7FF848C84000
|
trusted library allocation
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
880000
|
heap
|
page execute and read and write
|
||
2242F585000
|
trusted library allocation
|
page read and write
|
||
651000
|
heap
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page read and write
|
||
2243E4F1000
|
trusted library allocation
|
page read and write
|
||
1AE02000
|
heap
|
page read and write
|
||
3DF6838000
|
stack
|
page read and write
|
||
124E3000
|
trusted library allocation
|
page read and write
|
||
C13000
|
heap
|
page read and write
|
||
1DBF86B6000
|
heap
|
page read and write
|
||
1DBF8BAF000
|
heap
|
page read and write
|
||
1DBDE6CE000
|
heap
|
page read and write
|
||
7FF848E4A000
|
trusted library allocation
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
1DBF81F6000
|
heap
|
page read and write
|
||
1DBE1A5B000
|
trusted library allocation
|
page read and write
|
||
7FF848DB0000
|
trusted library allocation
|
page execute and read and write
|
||
B83657F000
|
stack
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
1DBE06BE000
|
trusted library allocation
|
page read and write
|
||
A02000
|
heap
|
page read and write
|
||
27077B87000
|
heap
|
page read and write
|
||
1DBF0263000
|
trusted library allocation
|
page read and write
|
||
82D000
|
heap
|
page read and write
|
||
1DBE0277000
|
trusted library allocation
|
page read and write
|
||
27077C0C000
|
heap
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
22430313000
|
trusted library allocation
|
page read and write
|
||
21BD8467000
|
heap
|
page read and write
|
||
E11000
|
heap
|
page read and write
|
||
1E3A2260000
|
heap
|
page read and write
|
||
23BE4943000
|
heap
|
page read and write
|
||
2242C860000
|
heap
|
page read and write
|
||
7FF848C8D000
|
trusted library allocation
|
page execute and read and write
|
||
1BCFE000
|
stack
|
page read and write
|
||
3DF61CE000
|
stack
|
page read and write
|
||
12E51000
|
trusted library allocation
|
page read and write
|
||
1DBF8B18000
|
heap
|
page read and write
|
||
2242FE41000
|
trusted library allocation
|
page read and write
|
||
7FF848C94000
|
trusted library allocation
|
page read and write
|
||
E3F000
|
heap
|
page read and write
|
||
270779E7000
|
heap
|
page execute and read and write
|
||
1B12D000
|
stack
|
page read and write
|
||
7FF848FCC000
|
trusted library allocation
|
page read and write
|
||
23BE4941000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
7FF848E22000
|
trusted library allocation
|
page read and write
|
||
7FF848FE9000
|
trusted library allocation
|
page read and write
|
||
7FF848FB4000
|
trusted library allocation
|
page read and write
|
||
7DF4A7840000
|
trusted library allocation
|
page execute and read and write
|
||
1AF4E000
|
stack
|
page read and write
|
||
2242F64E000
|
trusted library allocation
|
page read and write
|
||
27060820000
|
trusted library allocation
|
page read and write
|
||
2242FD1A000
|
trusted library allocation
|
page read and write
|
||
12CB1000
|
trusted library allocation
|
page read and write
|
||
1AA1C000
|
stack
|
page read and write
|
||
15CF000
|
stack
|
page read and write
|
||
677000
|
heap
|
page read and write
|
||
A3AA79F000
|
stack
|
page read and write
|
||
270778BD000
|
heap
|
page read and write
|
||
7FF848FD2000
|
trusted library allocation
|
page read and write
|
||
21BBDF49000
|
heap
|
page read and write
|
||
142555E000
|
stack
|
page read and write
|
||
2601000
|
trusted library allocation
|
page read and write
|
||
22446C4C000
|
heap
|
page read and write
|
||
7FF848C9D000
|
trusted library allocation
|
page execute and read and write
|
||
21BC0F4E000
|
trusted library allocation
|
page read and write
|
||
7FF848C90000
|
trusted library allocation
|
page read and write
|
||
979867E000
|
stack
|
page read and write
|
||
A3AAA7F000
|
stack
|
page read and write
|
||
270612EF000
|
trusted library allocation
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
21BD83CD000
|
heap
|
page read and write
|
||
1C6D9000
|
heap
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
trusted library allocation
|
page read and write
|
||
7DF4A88C0000
|
trusted library allocation
|
page execute and read and write
|
||
BE3000
|
trusted library allocation
|
page read and write
|
||
2706F799000
|
trusted library allocation
|
page read and write
|
||
6D2000
|
heap
|
page read and write
|
||
1B44E000
|
stack
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
27077B9F000
|
heap
|
page read and write
|
||
1DBE1A81000
|
trusted library allocation
|
page read and write
|
||
73DCA7F000
|
unkown
|
page read and write
|
||
7FF848E32000
|
trusted library allocation
|
page read and write
|
||
4F1000
|
stack
|
page read and write
|
||
2706F80A000
|
trusted library allocation
|
page read and write
|
||
69B000
|
heap
|
page read and write
|
||
3F3C9CA000
|
stack
|
page read and write
|
||
1A0000
|
unkown
|
page readonly
|
||
B83780E000
|
stack
|
page read and write
|
||
1C690000
|
heap
|
page read and write
|
||
21BD8448000
|
heap
|
page read and write
|
||
BCE000
|
stack
|
page read and write
|
||
7FF848C64000
|
trusted library allocation
|
page read and write
|
||
3F3B5BE000
|
stack
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
trusted library allocation
|
page read and write
|
||
22446B2A000
|
heap
|
page read and write
|
||
B83647E000
|
stack
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
7FF848FDC000
|
trusted library allocation
|
page read and write
|
||
1D48E000
|
stack
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
2706F800000
|
trusted library allocation
|
page read and write
|
||
21BD80A6000
|
heap
|
page execute and read and write
|
||
25572930000
|
heap
|
page read and write
|
||
7FF848D66000
|
trusted library allocation
|
page execute and read and write
|
||
2705DB60000
|
trusted library allocation
|
page read and write
|
||
1DBE1500000
|
trusted library allocation
|
page read and write
|
||
25572D75000
|
heap
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
2242C840000
|
heap
|
page read and write
|
||
7FF848E50000
|
trusted library allocation
|
page execute and read and write
|
||
21BBFE68000
|
trusted library allocation
|
page read and write
|
||
2706F7FB000
|
trusted library allocation
|
page read and write
|
||
27077C77000
|
heap
|
page read and write
|
||
7FF848FD8000
|
trusted library allocation
|
page read and write
|
||
23BE4870000
|
heap
|
page read and write
|
||
21BBE0F0000
|
heap
|
page read and write
|
||
B836BBB000
|
stack
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
1D38C000
|
stack
|
page read and write
|
||
7FF848C80000
|
trusted library allocation
|
page read and write
|
||
7FF848CCC000
|
trusted library allocation
|
page execute and read and write
|
||
21BBE1C0000
|
heap
|
page read and write
|
||
B837709000
|
stack
|
page read and write
|
||
7FF848E72000
|
trusted library allocation
|
page read and write
|
||
3DF614E000
|
stack
|
page read and write
|
||
27077B93000
|
heap
|
page read and write
|
||
270605CF000
|
trusted library allocation
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
2CBF000
|
trusted library allocation
|
page read and write
|
||
7FF848FF8000
|
trusted library allocation
|
page read and write
|
||
21BBFA30000
|
heap
|
page execute and read and write
|
||
12601000
|
trusted library allocation
|
page read and write
|
||
B8369BB000
|
stack
|
page read and write
|
||
7FF848E48000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
7FF848D00000
|
trusted library allocation
|
page read and write
|
||
1DBE01F1000
|
trusted library allocation
|
page read and write
|
||
7FF848E12000
|
trusted library allocation
|
page read and write
|
||
7FF848D56000
|
trusted library allocation
|
page execute and read and write
|
||
24DE000
|
stack
|
page read and write
|
||
1DBF04E2000
|
trusted library allocation
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
2243E7EA000
|
trusted library allocation
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
12BE000
|
heap
|
page read and write
|
||
23BE4941000
|
heap
|
page read and write
|
||
8FF000
|
stack
|
page read and write
|
||
639000
|
heap
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page execute and read and write
|
||
9798578000
|
stack
|
page read and write
|
||
1225000
|
heap
|
page read and write
|
||
1DBF8AC1000
|
heap
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
1E3A22B9000
|
heap
|
page read and write
|
||
21BD83C3000
|
heap
|
page read and write
|
||
7FF84905C000
|
trusted library allocation
|
page read and write
|
||
11FF000
|
stack
|
page read and write
|
||
7FF848D76000
|
trusted library allocation
|
page execute and read and write
|
||
21BBF9A0000
|
trusted library allocation
|
page read and write
|
||
21BD84EE000
|
heap
|
page read and write
|
||
21BC14A9000
|
trusted library allocation
|
page read and write
|
||
1BA02000
|
heap
|
page read and write
|
||
1AA7D000
|
stack
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
97992C9000
|
stack
|
page read and write
|
||
97980FE000
|
stack
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
7FF848D90000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848CB0000
|
trusted library allocation
|
page read and write
|
||
7FF848E11000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page read and write
|
||
7FF848EE0000
|
trusted library allocation
|
page read and write
|
||
1DBDE5F0000
|
heap
|
page read and write
|
||
7FF49AB90000
|
trusted library allocation
|
page execute and read and write
|
||
2242C928000
|
heap
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
270778DB000
|
heap
|
page read and write
|
||
1C6FF000
|
stack
|
page read and write
|
||
7FF848FB9000
|
trusted library allocation
|
page read and write
|
||
1E3A21E0000
|
heap
|
page read and write
|
||
7FF848E42000
|
trusted library allocation
|
page read and write
|
||
7FF848CB0000
|
trusted library allocation
|
page read and write
|
||
7FF848CEC000
|
trusted library allocation
|
page execute and read and write
|
||
1DBDE6B2000
|
heap
|
page read and write
|
||
1288000
|
heap
|
page read and write
|
||
23BE4941000
|
heap
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
3F3CAC9000
|
stack
|
page read and write
|
||
7FF848C83000
|
trusted library allocation
|
page execute and read and write
|
||
1DBF04E0000
|
trusted library allocation
|
page read and write
|
||
21BD80D0000
|
heap
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
21BD84FB000
|
heap
|
page read and write
|
||
7FF848C8B000
|
trusted library allocation
|
page read and write
|
||
21BCFF32000
|
trusted library allocation
|
page read and write
|
||
2CAE000
|
stack
|
page read and write
|
||
1D08A000
|
stack
|
page read and write
|
||
7FF8490AB000
|
trusted library allocation
|
page read and write
|
||
7FF848C53000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848C90000
|
trusted library allocation
|
page read and write
|
||
3DF64F9000
|
stack
|
page read and write
|
||
2706F531000
|
trusted library allocation
|
page read and write
|
||
1B4A0000
|
heap
|
page execute and read and write
|
||
7FF8490B7000
|
trusted library allocation
|
page read and write
|
||
2242C8D0000
|
trusted library section
|
page read and write
|
||
7FF848C92000
|
trusted library allocation
|
page read and write
|
||
1B61D000
|
stack
|
page read and write
|
||
2242F264000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
2617000
|
trusted library allocation
|
page read and write
|
||
21BBFC00000
|
heap
|
page execute and read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
21BD84E9000
|
heap
|
page read and write
|
||
22446C44000
|
heap
|
page read and write
|
||
21BBFA50000
|
heap
|
page read and write
|
||
21BD7FF4000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
D02000
|
heap
|
page read and write
|
||
2242CB40000
|
heap
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page read and write
|
||
2705DBF0000
|
heap
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page read and write
|
||
3F3CA47000
|
stack
|
page read and write
|
||
21BC1A68000
|
trusted library allocation
|
page read and write
|
||
2242C8A0000
|
heap
|
page read and write
|
||
21BBFA64000
|
heap
|
page read and write
|
||
224E9E50000
|
heap
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page read and write
|
||
2705DB90000
|
trusted library allocation
|
page read and write
|
||
2706089D000
|
trusted library allocation
|
page read and write
|
||
7FF848F93000
|
trusted library allocation
|
page read and write
|
||
27060C48000
|
trusted library allocation
|
page read and write
|
||
7FF848FC5000
|
trusted library allocation
|
page read and write
|
||
3F3BBF7000
|
stack
|
page read and write
|
||
224468F6000
|
heap
|
page execute and read and write
|
||
7FF848C94000
|
trusted library allocation
|
page read and write
|
||
1CA3E000
|
stack
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
23BE4941000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
E41000
|
heap
|
page read and write
|
||
7FF848CAB000
|
trusted library allocation
|
page read and write
|
||
1DBE1976000
|
trusted library allocation
|
page read and write
|
||
224302F3000
|
trusted library allocation
|
page read and write
|
||
2705DBF5000
|
heap
|
page read and write
|
||
1C702000
|
heap
|
page read and write
|
||
25572A10000
|
heap
|
page read and write
|
||
1B602000
|
heap
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
B60000
|
trusted library allocation
|
page read and write
|
||
B60000
|
heap
|
page execute and read and write
|
||
2705DAA0000
|
heap
|
page read and write
|
||
1DBE0C44000
|
trusted library allocation
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
7FF848C93000
|
trusted library allocation
|
page execute and read and write
|
||
25572A30000
|
heap
|
page read and write
|
||
1CF85000
|
stack
|
page read and write
|
||
67F000
|
heap
|
page read and write
|
||
1302000
|
heap
|
page read and write
|
||
7FF848DA0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848C7D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848CBC000
|
trusted library allocation
|
page execute and read and write
|
||
AFF000
|
stack
|
page read and write
|
||
27060E04000
|
trusted library allocation
|
page read and write
|
||
7FF848FB9000
|
trusted library allocation
|
page read and write
|
||
27060950000
|
trusted library allocation
|
page read and write
|
||
7FF848C8D000
|
trusted library allocation
|
page execute and read and write
|
||
2651000
|
trusted library allocation
|
page read and write
|
||
1D68A000
|
stack
|
page read and write
|
||
21BC1009000
|
trusted library allocation
|
page read and write
|
||
1DBE0190000
|
trusted library allocation
|
page read and write
|
||
2242C96B000
|
heap
|
page read and write
|
||
7FF848EE0000
|
trusted library allocation
|
page read and write
|
||
2242C97D000
|
heap
|
page read and write
|
||
2706F511000
|
trusted library allocation
|
page read and write
|
||
1DBE1169000
|
trusted library allocation
|
page read and write
|
||
62D000
|
heap
|
page read and write
|
||
1E3A2100000
|
heap
|
page read and write
|
||
8BC000
|
heap
|
page read and write
|
||
21BD8515000
|
heap
|
page read and write
|
||
1BEFE000
|
stack
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
6AE000
|
heap
|
page read and write
|
||
7FF848C64000
|
trusted library allocation
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
2705D940000
|
heap
|
page read and write
|
||
1DBE1B43000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page read and write
|
||
7FF848C9D000
|
trusted library allocation
|
page execute and read and write
|
||
27061314000
|
trusted library allocation
|
page read and write
|
||
21BBE130000
|
trusted library allocation
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page read and write
|
||
23BE490B000
|
heap
|
page read and write
|
||
27077B70000
|
heap
|
page read and write
|
||
260E000
|
trusted library allocation
|
page read and write
|
||
131A3000
|
trusted library allocation
|
page read and write
|
||
2705F597000
|
trusted library allocation
|
page read and write
|
||
27077B83000
|
heap
|
page read and write
|
||
2242CB10000
|
heap
|
page execute and read and write
|
||
2242C967000
|
heap
|
page read and write
|
||
7FF8490DF000
|
trusted library allocation
|
page read and write
|
||
7FF848C63000
|
trusted library allocation
|
page execute and read and write
|
||
2242CA90000
|
trusted library allocation
|
page read and write
|
||
7FF848D26000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
125AE000
|
trusted library allocation
|
page read and write
|
||
1DBF04DC000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
3DF657E000
|
stack
|
page read and write
|
||
7FF848D20000
|
trusted library allocation
|
page read and write
|
||
1DBE0DEA000
|
trusted library allocation
|
page read and write
|
||
21BCFF3A000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
trusted library allocation
|
page read and write
|
||
1DBF8810000
|
heap
|
page execute and read and write
|
||
979914F000
|
stack
|
page read and write
|
||
3F3BA7B000
|
stack
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
7FF848E42000
|
trusted library allocation
|
page read and write
|
||
3F3BC78000
|
stack
|
page read and write
|
||
2705D860000
|
heap
|
page read and write
|
||
21BD8506000
|
heap
|
page read and write
|
||
1B14E000
|
stack
|
page read and write
|
||
1C6D5000
|
heap
|
page read and write
|
||
27077CD0000
|
heap
|
page read and write
|
||
27077C28000
|
heap
|
page read and write
|
||
22446900000
|
heap
|
page read and write
|
||
2242E311000
|
heap
|
page read and write
|
||
16CE000
|
stack
|
page read and write
|
||
21BBE170000
|
trusted library allocation
|
page read and write
|
||
27077C94000
|
heap
|
page read and write
|
||
21BC0E1C000
|
trusted library allocation
|
page read and write
|
||
B8361D3000
|
stack
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page read and write
|
||
B80000
|
heap
|
page execute and read and write
|
||
1DBDE6BA000
|
heap
|
page read and write
|
||
839000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page read and write
|
||
C02000
|
heap
|
page read and write
|
||
21BCFF4A000
|
trusted library allocation
|
page read and write
|
||
31AC000
|
trusted library allocation
|
page read and write
|
||
23BE4860000
|
heap
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
21BBFC41000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page execute and read and write
|
||
22446945000
|
heap
|
page read and write
|
||
1DBE116D000
|
trusted library allocation
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
21BD8078000
|
heap
|
page read and write
|
||
7FF848FE4000
|
trusted library allocation
|
page read and write
|
||
21BC1A43000
|
trusted library allocation
|
page read and write
|
||
979807E000
|
stack
|
page read and write
|
||
2705D983000
|
heap
|
page read and write
|
||
1B960000
|
heap
|
page read and write
|
||
7FF848DA0000
|
trusted library allocation
|
page execute and read and write
|
||
31AF000
|
trusted library allocation
|
page read and write
|
||
97981FA000
|
stack
|
page read and write
|
||
7FF848EF0000
|
trusted library allocation
|
page read and write
|
||
21BBFA55000
|
heap
|
page read and write
|
||
1C6DB000
|
heap
|
page read and write
|
||
7FF848EE0000
|
trusted library allocation
|
page read and write
|
||
3F3BAFD000
|
stack
|
page read and write
|
||
CF1000
|
stack
|
page read and write
|
||
2705D9F8000
|
heap
|
page read and write
|
||
2705FF61000
|
trusted library allocation
|
page read and write
|
||
D02000
|
heap
|
page read and write
|
||
7FF848FF2000
|
trusted library allocation
|
page read and write
|
||
1B74E000
|
stack
|
page read and write
|
||
2705DA70000
|
heap
|
page read and write
|
||
27077A30000
|
heap
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
21BBE090000
|
heap
|
page read and write
|
||
678000
|
heap
|
page read and write
|
||
6AE000
|
heap
|
page read and write
|
||
1DBDE800000
|
trusted library allocation
|
page read and write
|
||
270605A3000
|
trusted library allocation
|
page read and write
|
||
124E8000
|
trusted library allocation
|
page read and write
|
||
22446BE0000
|
heap
|
page read and write
|
||
22446850000
|
trusted library allocation
|
page read and write
|
||
1B9FE000
|
stack
|
page read and write
|
||
7FF848D1C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D85000
|
trusted library allocation
|
page execute and read and write
|
||
1DBF8BE4000
|
heap
|
page read and write
|
||
2705D9B5000
|
heap
|
page read and write
|
||
7FF848FC2000
|
trusted library allocation
|
page read and write
|
||
7FF848FC9000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
7FF848C9D000
|
trusted library allocation
|
page execute and read and write
|
||
23BE4930000
|
heap
|
page read and write
|
||
7FF848D90000
|
trusted library allocation
|
page execute and read and write
|
||
625000
|
heap
|
page read and write
|
||
7FF848FB4000
|
trusted library allocation
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
2705D9AC000
|
heap
|
page read and write
|
||
21BCFEA7000
|
trusted library allocation
|
page read and write
|
||
62D000
|
heap
|
page read and write
|
||
12E58000
|
trusted library allocation
|
page read and write
|
||
260A000
|
trusted library allocation
|
page read and write
|
||
2243E7DC000
|
trusted library allocation
|
page read and write
|
||
888000
|
heap
|
page read and write
|
||
B836A3F000
|
stack
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
122D000
|
heap
|
page read and write
|
||
21BCFC41000
|
trusted library allocation
|
page read and write
|
||
7FF848C90000
|
trusted library allocation
|
page read and write
|
||
7FF848FFC000
|
trusted library allocation
|
page read and write
|
||
2243E521000
|
trusted library allocation
|
page read and write
|
||
1CE7E000
|
stack
|
page read and write
|
||
2242F831000
|
trusted library allocation
|
page read and write
|
||
3F3B8FE000
|
stack
|
page read and write
|
||
21BCFCB2000
|
trusted library allocation
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
64C000
|
heap
|
page read and write
|
||
16D0000
|
trusted library allocation
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D46000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490BD000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
21BC0BDF000
|
trusted library allocation
|
page read and write
|
||
1DBF8640000
|
heap
|
page read and write
|
||
7FF848C60000
|
trusted library allocation
|
page read and write
|
||
21BBDEB0000
|
heap
|
page read and write
|
||
7FF848D56000
|
trusted library allocation
|
page execute and read and write
|
||
21BCFC50000
|
trusted library allocation
|
page read and write
|
||
7FF848E02000
|
trusted library allocation
|
page read and write
|
||
224E9E77000
|
heap
|
page read and write
|
||
21BD81B0000
|
trusted library allocation
|
page read and write
|
||
21BBDEC0000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
3DF758E000
|
stack
|
page read and write
|
||
7FF848C64000
|
trusted library allocation
|
page read and write
|
||
3DF770E000
|
stack
|
page read and write
|
||
2243E511000
|
trusted library allocation
|
page read and write
|
||
1E3A2265000
|
heap
|
page read and write
|
||
B8365F9000
|
stack
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
713000
|
heap
|
page read and write
|
||
2242F0F8000
|
trusted library allocation
|
page read and write
|
||
21BCFC61000
|
trusted library allocation
|
page read and write
|
||
123C000
|
heap
|
page read and write
|
||
7FF848CA0000
|
trusted library allocation
|
page read and write
|
||
22446C38000
|
heap
|
page read and write
|
||
7FF848D2C000
|
trusted library allocation
|
page execute and read and write
|
||
1D58E000
|
stack
|
page read and write
|
||
7FF848D66000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
7FF848FA3000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
2242E9BD000
|
trusted library allocation
|
page read and write
|
||
1B470000
|
heap
|
page read and write
|
||
63E000
|
heap
|
page read and write
|
||
7FF848CAB000
|
trusted library allocation
|
page execute and read and write
|
||
27077B50000
|
heap
|
page execute and read and write
|
||
1DBE0F78000
|
trusted library allocation
|
page read and write
|
||
7FF848C80000
|
trusted library allocation
|
page read and write
|
||
2242F8B5000
|
trusted library allocation
|
page read and write
|
||
2242E4E0000
|
heap
|
page read and write
|
||
10FF000
|
stack
|
page read and write
|
||
7FF848C70000
|
trusted library allocation
|
page read and write
|
||
7FF84909C000
|
trusted library allocation
|
page read and write
|
||
7FF848C8D000
|
trusted library allocation
|
page execute and read and write
|
||
2705D9B7000
|
heap
|
page read and write
|
||
260C000
|
trusted library allocation
|
page read and write
|
||
7FF848E44000
|
trusted library allocation
|
page read and write
|
||
21BC0D65000
|
trusted library allocation
|
page read and write
|
||
3F3C8CE000
|
stack
|
page read and write
|
||
224E9E7A000
|
heap
|
page read and write
|
||
170000
|
heap
|
page read and write
|
||
7FF848C7B000
|
trusted library allocation
|
page read and write
|
||
21BC09BC000
|
trusted library allocation
|
page read and write
|
||
27060D7B000
|
trusted library allocation
|
page read and write
|
||
F02000
|
heap
|
page read and write
|
||
9797DCF000
|
stack
|
page read and write
|
||
2243E99A000
|
trusted library allocation
|
page read and write
|
||
1DBE1534000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
12D9000
|
heap
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page read and write
|
||
9798477000
|
stack
|
page read and write
|
||
1DBDE790000
|
trusted library allocation
|
page read and write
|
||
224E9D50000
|
heap
|
page read and write
|
||
2705F739000
|
trusted library allocation
|
page read and write
|
||
2705DB55000
|
heap
|
page read and write
|
||
21BC0D01000
|
trusted library allocation
|
page read and write
|
||
224E9E30000
|
heap
|
page read and write
|
||
2705FE41000
|
trusted library allocation
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
23BE4890000
|
heap
|
page read and write
|
||
7FF848C62000
|
trusted library allocation
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page execute and read and write
|
||
7DF4A88E0000
|
trusted library allocation
|
page execute and read and write
|
||
21BD84BB000
|
heap
|
page read and write
|
||
2242C95D000
|
heap
|
page read and write
|
||
224302CE000
|
trusted library allocation
|
page read and write
|
||
1131000
|
stack
|
page read and write
|
||
7FF848C94000
|
trusted library allocation
|
page read and write
|
||
1DBF86D3000
|
heap
|
page read and write
|
||
21BCFF30000
|
trusted library allocation
|
page read and write
|
||
1DBE1171000
|
trusted library allocation
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
7FF848CA0000
|
trusted library allocation
|
page read and write
|
||
12CB8000
|
trusted library allocation
|
page read and write
|
||
1DBF04FA000
|
trusted library allocation
|
page read and write
|
||
21BC1005000
|
trusted library allocation
|
page read and write
|
||
E9A000
|
heap
|
page read and write
|
||
979817E000
|
stack
|
page read and write
|
||
25FE000
|
stack
|
page read and write
|
||
EB8000
|
heap
|
page read and write
|
||
7FF848E78000
|
trusted library allocation
|
page read and write
|
||
7FF848CA4000
|
trusted library allocation
|
page read and write
|
||
1B64B000
|
stack
|
page read and write
|
||
2705F9DD000
|
trusted library allocation
|
page read and write
|
||
270607BF000
|
trusted library allocation
|
page read and write
|
||
97985FF000
|
stack
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
2242F6CA000
|
trusted library allocation
|
page read and write
|
||
2242E4A0000
|
heap
|
page execute and read and write
|
||
7FF848EF0000
|
trusted library allocation
|
page read and write
|
||
3F3B87E000
|
stack
|
page read and write
|
||
1BDFE000
|
stack
|
page read and write
|
||
2242C8C0000
|
trusted library section
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
27060762000
|
trusted library allocation
|
page read and write
|
||
7FF848E44000
|
trusted library allocation
|
page read and write
|
||
2242EF42000
|
trusted library allocation
|
page read and write
|
||
2242CB60000
|
heap
|
page read and write
|
||
21BBE120000
|
trusted library section
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
646000
|
heap
|
page read and write
|
||
1ADD3000
|
trusted library allocation
|
page read and write
|
||
7FF848C5D000
|
trusted library allocation
|
page execute and read and write
|
||
1DBE01E0000
|
heap
|
page read and write
|
||
1DBF8A90000
|
heap
|
page read and write
|
||
23BE4BA0000
|
heap
|
page read and write
|
||
1AF40000
|
heap
|
page read and write
|
||
3DF693E000
|
stack
|
page read and write
|
||
1E3A2200000
|
heap
|
page read and write
|
||
2705DB10000
|
heap
|
page readonly
|
||
264F000
|
trusted library allocation
|
page read and write
|
||
2242E4F1000
|
trusted library allocation
|
page read and write
|
||
2705DA4C000
|
heap
|
page read and write
|
||
25572D70000
|
heap
|
page read and write
|
||
1DA00000
|
heap
|
page read and write
|
||
3DF673E000
|
stack
|
page read and write
|
||
224468C0000
|
heap
|
page read and write
|
||
7FF848D66000
|
trusted library allocation
|
page execute and read and write
|
||
27060DA1000
|
trusted library allocation
|
page read and write
|
||
7FF848C70000
|
trusted library allocation
|
page read and write
|
||
1DBE0140000
|
heap
|
page execute and read and write
|
||
1DBF8BF5000
|
heap
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
7FF848CDC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E52000
|
trusted library allocation
|
page read and write
|
||
2242E718000
|
trusted library allocation
|
page read and write
|
||
2CBC000
|
trusted library allocation
|
page read and write
|
||
7FF848C74000
|
trusted library allocation
|
page read and write
|
||
16F0000
|
heap
|
page execute and read and write
|
||
7FF848E74000
|
trusted library allocation
|
page read and write
|
||
21BD8509000
|
heap
|
page read and write
|
||
1DBF8721000
|
heap
|
page read and write
|
||
B83683E000
|
stack
|
page read and write
|
||
ADF000
|
stack
|
page read and write
|
||
7FF848C84000
|
trusted library allocation
|
page read and write
|
||
B83667F000
|
stack
|
page read and write
|
||
21BBE1C5000
|
heap
|
page read and write
|
||
25572B00000
|
heap
|
page read and write
|
||
7FF848F82000
|
trusted library allocation
|
page read and write
|
||
2242C969000
|
heap
|
page read and write
|
||
27077A46000
|
heap
|
page read and write
|
||
7FF848C73000
|
trusted library allocation
|
page execute and read and write
|
||
B90000
|
heap
|
page read and write
|
||
1802000
|
heap
|
page read and write
|
||
979934C000
|
stack
|
page read and write
|
||
3F3BCFE000
|
stack
|
page read and write
|
||
7FF848E21000
|
trusted library allocation
|
page read and write
|
||
21BC0EEA000
|
trusted library allocation
|
page read and write
|
||
21BD7FCF000
|
heap
|
page read and write
|
||
7FF848C9D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
B836939000
|
stack
|
page read and write
|
||
24D0000
|
trusted library allocation
|
page read and write
|
||
1DDFC000
|
stack
|
page read and write
|
||
21BBDEFF000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
6EE000
|
heap
|
page read and write
|
||
822000
|
heap
|
page read and write
|
||
64C000
|
heap
|
page read and write
|
||
3F3CB4C000
|
stack
|
page read and write
|
||
97986FE000
|
stack
|
page read and write
|
||
23BE4941000
|
heap
|
page read and write
|
||
2242CA50000
|
trusted library allocation
|
page read and write
|
||
360000
|
unkown
|
page readonly
|
||
7FF848FC8000
|
trusted library allocation
|
page read and write
|
||
2649000
|
trusted library allocation
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
27060E63000
|
trusted library allocation
|
page read and write
|
||
14254DC000
|
stack
|
page read and write
|
||
21BC010D000
|
trusted library allocation
|
page read and write
|
||
7FF848D10000
|
trusted library allocation
|
page read and write
|
||
23BE4941000
|
heap
|
page read and write
|
||
7DF4A0F60000
|
trusted library allocation
|
page execute and read and write
|
||
180E000
|
stack
|
page read and write
|
||
643000
|
heap
|
page read and write
|
||
979877C000
|
stack
|
page read and write
|
||
27060725000
|
trusted library allocation
|
page read and write
|
||
1DBDE670000
|
heap
|
page read and write
|
||
1DBE1160000
|
trusted library allocation
|
page read and write
|
||
7FF848C8D000
|
trusted library allocation
|
page execute and read and write
|
||
1DBE1288000
|
trusted library allocation
|
page read and write
|
||
23BE4941000
|
heap
|
page read and write
|
||
2244693A000
|
heap
|
page read and write
|
||
23BE4930000
|
heap
|
page read and write
|
||
852000
|
heap
|
page read and write
|
||
1238000
|
heap
|
page read and write
|
||
B83768E000
|
stack
|
page read and write
|
||
22446907000
|
heap
|
page read and write
|
||
7DF4A88D0000
|
trusted library allocation
|
page execute and read and write
|
||
1DBE041A000
|
trusted library allocation
|
page read and write
|
||
2242F5B1000
|
trusted library allocation
|
page read and write
|
||
97991CD000
|
stack
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
12E53000
|
trusted library allocation
|
page read and write
|
||
3DF66F9000
|
stack
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
1DBE1FF4000
|
trusted library allocation
|
page read and write
|
||
21BBE150000
|
trusted library allocation
|
page read and write
|
||
7FF848D3C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
B02000
|
heap
|
page read and write
|
||
1CB3E000
|
stack
|
page read and write
|
||
97984FB000
|
stack
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
1C6BD000
|
heap
|
page read and write
|
||
9797D83000
|
stack
|
page read and write
|
||
3DF768C000
|
stack
|
page read and write
|
||
27061339000
|
trusted library allocation
|
page read and write
|
||
1213000
|
heap
|
page read and write
|
||
7DF488050000
|
trusted library allocation
|
page execute and read and write
|
||
1C649000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
1C0FB000
|
stack
|
page read and write
|
||
2705DB50000
|
heap
|
page read and write
|
||
1257000
|
heap
|
page read and write
|
||
B83760C000
|
stack
|
page read and write
|
||
3DF69BF000
|
stack
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
2242F521000
|
trusted library allocation
|
page read and write
|
||
1DBF04EA000
|
trusted library allocation
|
page read and write
|
||
1DBE1FCF000
|
trusted library allocation
|
page read and write
|
||
7FF848C90000
|
trusted library allocation
|
page read and write
|
||
7FF848D30000
|
trusted library allocation
|
page read and write
|
||
1DBDE7B0000
|
trusted library allocation
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
21BBF970000
|
trusted library allocation
|
page read and write
|
||
B75000
|
heap
|
page read and write
|
||
31B1000
|
trusted library allocation
|
page read and write
|
||
715000
|
heap
|
page read and write
|
||
27077915000
|
heap
|
page read and write
|
||
7FF848E11000
|
trusted library allocation
|
page read and write
|
||
7FF848CBC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E90000
|
trusted library allocation
|
page read and write
|
||
23BE4930000
|
heap
|
page read and write
|
||
3DF68BA000
|
stack
|
page read and write
|
||
7FF848EF0000
|
trusted library allocation
|
page read and write
|
||
979924E000
|
stack
|
page read and write
|
||
848000
|
heap
|
page read and write
|
||
7FF848CCC000
|
trusted library allocation
|
page execute and read and write
|
||
D0000
|
unkown
|
page readonly
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
1ADC0000
|
heap
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
2705F3A7000
|
heap
|
page read and write
|
||
7FF848D30000
|
trusted library allocation
|
page read and write
|
||
2243E778000
|
trusted library allocation
|
page read and write
|
||
7FF848C7B000
|
trusted library allocation
|
page read and write
|
||
3F3BB79000
|
stack
|
page read and write
|
||
2242FC74000
|
trusted library allocation
|
page read and write
|
||
21BC1A1E000
|
trusted library allocation
|
page read and write
|
||
73DCAFF000
|
stack
|
page read and write
|
||
E22000
|
heap
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
7FF848C7D000
|
trusted library allocation
|
page execute and read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
646000
|
heap
|
page read and write
|
||
4F1000
|
stack
|
page read and write
|
||
1E3A22B0000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page execute and read and write
|
||
1C402000
|
heap
|
page read and write
|
||
845000
|
heap
|
page read and write
|
||
2242FD59000
|
trusted library allocation
|
page read and write
|
||
21BD80A0000
|
heap
|
page execute and read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
8D5000
|
heap
|
page read and write
|
||
1902000
|
heap
|
page read and write
|
||
261F000
|
trusted library allocation
|
page read and write
|
||
7FF848EF0000
|
trusted library allocation
|
page read and write
|
||
2242CB65000
|
heap
|
page read and write
|
||
1D188000
|
stack
|
page read and write
|
||
7FF848CAD000
|
trusted library allocation
|
page execute and read and write
|
||
E3D000
|
heap
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
3F3BE7E000
|
stack
|
page read and write
|
||
B83758F000
|
stack
|
page read and write
|
There are 1237 hidden memdumps, click here to show them.