Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Fulloption_V2.1.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\svchost.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Fulloption_V2.1.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\svchost.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0b5tsa0x.avl.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0soqawef.b1t.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0urdr2wd.rza.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2cidhn5k.gc4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2hmxwhrd.llm.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3ar1pyaf.c1l.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bhpygqr4.zno.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cchnrycx.wfb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gmfcoaaw.gnq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_inp3lahv.cnd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jhrc3s11.3id.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jykicnug.yyi.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o35e3weu.0gv.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ok5n1vgm.m3i.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_quescxip.gbd.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yo1g1c0h.gx4.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Nov 20 08:38:07
2024, mtime=Wed Nov 20 08:38:07 2024, atime=Wed Nov 20 08:38:07 2024, length=75264, window=hide
|
dropped
|
There are 15 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Fulloption_V2.1.exe
|
"C:\Users\user\Desktop\Fulloption_V2.1.exe"
|
||
C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exe
|
"C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exe"
|
||
C:\Users\user\AppData\Roaming\svchost.exe
|
"C:\Users\user\AppData\Roaming\svchost.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svchost.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\ProgramData\svchost.exe"
|
||
C:\ProgramData\svchost.exe
|
C:\ProgramData\svchost.exe
|
||
C:\ProgramData\svchost.exe
|
C:\ProgramData\svchost.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 5 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
45.141.27.248
|
|||
https://scripts.sil.org/OFLThis
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://www.micom/pkiops/Docs/ry.htm0
|
unknown
|
||
http://www.microsoft.co
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://scripts.sil.org/OFLhttps://indiantypefoundry.comNinad
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://curl.haxx.se/docs/http-cookies.html
|
unknown
|
||
http://crl.m
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://ip-api.com
|
unknown
|
||
http://go.microsoft.c
|
unknown
|
||
http://go.microsoft.ctain
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/itfoundry/Poppins)&&&&s
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
There are 16 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
45.141.27.248
|
unknown
|
Netherlands
|
||
208.95.112.1
|
ip-api.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
svchost
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
E72000
|
unkown
|
page readonly
|
||
3251000
|
trusted library allocation
|
page read and write
|
||
32EC000
|
trusted library allocation
|
page read and write
|
||
336E000
|
trusted library allocation
|
page read and write
|
||
32A1000
|
trusted library allocation
|
page read and write
|
||
1E35A000
|
stack
|
page read and write
|
||
132A8000
|
trusted library allocation
|
page read and write
|
||
172E5F11000
|
trusted library allocation
|
page read and write
|
||
22B6C7F0000
|
heap
|
page read and write
|
||
7FFD34AE0000
|
trusted library allocation
|
page read and write
|
||
359F8E3000
|
stack
|
page read and write
|
||
7FFD34972000
|
trusted library allocation
|
page read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page execute and read and write
|
||
12B2000
|
heap
|
page read and write
|
||
22B6E7AC000
|
heap
|
page read and write
|
||
1D200000
|
heap
|
page read and write
|
||
7FFD34886000
|
trusted library allocation
|
page execute and read and write
|
||
132AE000
|
trusted library allocation
|
page read and write
|
||
164EE820000
|
heap
|
page read and write
|
||
164EE8C0000
|
trusted library allocation
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
22B00088000
|
trusted library allocation
|
page read and write
|
||
1F82AE68000
|
trusted library allocation
|
page read and write
|
||
1F8282C0000
|
heap
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page read and write
|
||
16481069000
|
trusted library allocation
|
page read and write
|
||
CF1000
|
stack
|
page read and write
|
||
22B6EB90000
|
trusted library allocation
|
page read and write
|
||
12DA8000
|
trusted library allocation
|
page read and write
|
||
172E3598000
|
heap
|
page read and write
|
||
22B011DB000
|
trusted library allocation
|
page read and write
|
||
1560000
|
trusted library allocation
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
ADA7DF7000
|
stack
|
page read and write
|
||
1BC02000
|
heap
|
page read and write
|
||
131C000
|
heap
|
page read and write
|
||
1D302000
|
heap
|
page read and write
|
||
5DF8E7E000
|
stack
|
page read and write
|
||
1F829DD0000
|
heap
|
page execute and read and write
|
||
35A02BC000
|
stack
|
page read and write
|
||
25D4442C000
|
heap
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
16481345000
|
trusted library allocation
|
page read and write
|
||
22B00BEC000
|
trusted library allocation
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
1F8285A0000
|
heap
|
page read and write
|
||
164F07AF000
|
heap
|
page read and write
|
||
7FFD34BF0000
|
trusted library allocation
|
page read and write
|
||
22B00229000
|
trusted library allocation
|
page read and write
|
||
3358000
|
trusted library allocation
|
page read and write
|
||
1BAFE000
|
stack
|
page read and write
|
||
7FFD34AE0000
|
trusted library allocation
|
page read and write
|
||
164902EA000
|
trusted library allocation
|
page read and write
|
||
22B01E03000
|
trusted library allocation
|
page read and write
|
||
1405000
|
heap
|
page read and write
|
||
7FF6AE6D0000
|
unkown
|
page readonly
|
||
7FFD3494A000
|
trusted library allocation
|
page read and write
|
||
5A97477000
|
stack
|
page read and write
|
||
22B00F62000
|
trusted library allocation
|
page read and write
|
||
16490021000
|
trusted library allocation
|
page read and write
|
||
172E60C1000
|
trusted library allocation
|
page read and write
|
||
7FFD34A40000
|
trusted library allocation
|
page read and write
|
||
172F4F4D000
|
trusted library allocation
|
page read and write
|
||
5A977FE000
|
stack
|
page read and write
|
||
1AC51EB0000
|
heap
|
page read and write
|
||
ADA8F8E000
|
stack
|
page read and write
|
||
7FFD34BB0000
|
trusted library allocation
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
16480086000
|
trusted library allocation
|
page read and write
|
||
172FD735000
|
heap
|
page read and write
|
||
164902AD000
|
trusted library allocation
|
page read and write
|
||
1F842510000
|
heap
|
page execute and read and write
|
||
7FFD34AC3000
|
trusted library allocation
|
page read and write
|
||
15C0000
|
heap
|
page execute and read and write
|
||
143F000
|
heap
|
page read and write
|
||
172FD739000
|
heap
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
1F828304000
|
heap
|
page read and write
|
||
164EE720000
|
heap
|
page read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
172E5EE6000
|
trusted library allocation
|
page read and write
|
||
ADA8E8C000
|
stack
|
page read and write
|
||
7FFD34BB6000
|
trusted library allocation
|
page read and write
|
||
7FFD34763000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34980000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
164F0967000
|
heap
|
page execute and read and write
|
||
1B61E000
|
stack
|
page read and write
|
||
7FFD34AE9000
|
trusted library allocation
|
page read and write
|
||
7FFD34A70000
|
trusted library allocation
|
page read and write
|
||
172FD727000
|
heap
|
page read and write
|
||
22B6E7D9000
|
heap
|
page read and write
|
||
7FFD3478B000
|
trusted library allocation
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page read and write
|
||
7FFD348B6000
|
trusted library allocation
|
page execute and read and write
|
||
1F82B84E000
|
trusted library allocation
|
page read and write
|
||
3319000
|
trusted library allocation
|
page read and write
|
||
13B0000
|
trusted library allocation
|
page read and write
|
||
E3C000
|
heap
|
page read and write
|
||
124A000
|
heap
|
page read and write
|
||
1813000
|
heap
|
page read and write
|
||
1D0FE000
|
stack
|
page read and write
|
||
1F82B207000
|
trusted library allocation
|
page read and write
|
||
5DF9038000
|
stack
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
22B01DDE000
|
trusted library allocation
|
page read and write
|
||
172E53AD000
|
trusted library allocation
|
page read and write
|
||
1F842760000
|
trusted library allocation
|
page read and write
|
||
164EE910000
|
trusted library allocation
|
page read and write
|
||
22B6C790000
|
heap
|
page read and write
|
||
7DF4ABE20000
|
trusted library allocation
|
page execute and read and write
|
||
1648169F000
|
trusted library allocation
|
page read and write
|
||
22B004CD000
|
trusted library allocation
|
page read and write
|
||
7FFD34AFA000
|
trusted library allocation
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
7FFD34A30000
|
trusted library allocation
|
page read and write
|
||
359F96E000
|
stack
|
page read and write
|
||
7FFD34A90000
|
trusted library allocation
|
page read and write
|
||
1F828540000
|
heap
|
page execute and read and write
|
||
172E618D000
|
trusted library allocation
|
page read and write
|
||
22B6C87A000
|
heap
|
page read and write
|
||
172E5C51000
|
trusted library allocation
|
page read and write
|
||
172E67D5000
|
trusted library allocation
|
page read and write
|
||
1238000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
1F82ACEC000
|
trusted library allocation
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
16481E27000
|
trusted library allocation
|
page read and write
|
||
359FD79000
|
stack
|
page read and write
|
||
22B012AA000
|
trusted library allocation
|
page read and write
|
||
16481957000
|
trusted library allocation
|
page read and write
|
||
22B6C7D0000
|
heap
|
page read and write
|
||
ADA813E000
|
stack
|
page read and write
|
||
22B6E99F000
|
heap
|
page read and write
|
||
7FFD34B90000
|
trusted library allocation
|
page execute and read and write
|
||
22B01038000
|
trusted library allocation
|
page read and write
|
||
7FFD34972000
|
trusted library allocation
|
page read and write
|
||
172E4E67000
|
heap
|
page execute and read and write
|
||
1D29A000
|
heap
|
page read and write
|
||
7FFD34AD2000
|
trusted library allocation
|
page read and write
|
||
1F82BCDB000
|
trusted library allocation
|
page read and write
|
||
7FFD34A30000
|
trusted library allocation
|
page read and write
|
||
5A98449000
|
stack
|
page read and write
|
||
172E4EE1000
|
trusted library allocation
|
page read and write
|
||
164F0C02000
|
heap
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page execute and read and write
|
||
1F829DE2000
|
heap
|
page read and write
|
||
1F8282E5000
|
heap
|
page read and write
|
||
7FFD347DC000
|
trusted library allocation
|
page execute and read and write
|
||
164F0A95000
|
heap
|
page read and write
|
||
164812AC000
|
trusted library allocation
|
page read and write
|
||
172E3590000
|
heap
|
page read and write
|
||
22B00A53000
|
trusted library allocation
|
page read and write
|
||
B40000
|
unkown
|
page readonly
|
||
172E3490000
|
heap
|
page read and write
|
||
22B1006D000
|
trusted library allocation
|
page read and write
|
||
1802000
|
heap
|
page read and write
|
||
7FFD34974000
|
trusted library allocation
|
page read and write
|
||
5A9727E000
|
stack
|
page read and write
|
||
22B6C838000
|
heap
|
page read and write
|
||
7FFD34794000
|
trusted library allocation
|
page read and write
|
||
164EE661000
|
heap
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page execute and read and write
|
||
31A0000
|
heap
|
page read and write
|
||
7FFD34792000
|
trusted library allocation
|
page read and write
|
||
F3A000
|
unkown
|
page readonly
|
||
7FFD347EC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34902000
|
trusted library allocation
|
page read and write
|
||
172E6222000
|
trusted library allocation
|
page read and write
|
||
1F82831E000
|
heap
|
page read and write
|
||
164F03B0000
|
heap
|
page execute and read and write
|
||
164F0790000
|
heap
|
page read and write
|
||
16481CB9000
|
trusted library allocation
|
page read and write
|
||
164F07FB000
|
heap
|
page read and write
|
||
7FFD34794000
|
trusted library allocation
|
page read and write
|
||
172FD5FC000
|
heap
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
7FFD3492A000
|
trusted library allocation
|
page read and write
|
||
172FD5C0000
|
heap
|
page read and write
|
||
3389000
|
trusted library allocation
|
page read and write
|
||
1D93D000
|
stack
|
page read and write
|
||
22B6EA77000
|
heap
|
page read and write
|
||
1BFFF000
|
stack
|
page read and write
|
||
1345000
|
heap
|
page read and write
|
||
7FFD34910000
|
trusted library allocation
|
page read and write
|
||
7FFD3483C000
|
trusted library allocation
|
page execute and read and write
|
||
172E35DD000
|
heap
|
page read and write
|
||
1F842560000
|
heap
|
page read and write
|
||
1580000
|
heap
|
page execute and read and write
|
||
1F828570000
|
heap
|
page read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34A50000
|
trusted library allocation
|
page read and write
|
||
7FFD34954000
|
trusted library allocation
|
page read and write
|
||
22B6C8B4000
|
heap
|
page read and write
|
||
172F51E5000
|
trusted library allocation
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
1C0FE000
|
stack
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
172E6CE5000
|
trusted library allocation
|
page read and write
|
||
188F000
|
stack
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
172FD71C000
|
heap
|
page read and write
|
||
5A9787F000
|
stack
|
page read and write
|
||
1BCF0000
|
heap
|
page execute and read and write
|
||
1F842640000
|
heap
|
page read and write
|
||
22B6E380000
|
heap
|
page execute and read and write
|
||
164EE6AE000
|
heap
|
page read and write
|
||
7FFD34C00000
|
trusted library allocation
|
page read and write
|
||
16480001000
|
trusted library allocation
|
page read and write
|
||
1F828348000
|
heap
|
page read and write
|
||
1402000
|
heap
|
page read and write
|
||
16480A52000
|
trusted library allocation
|
page read and write
|
||
22B6C690000
|
heap
|
page read and write
|
||
35A01BF000
|
stack
|
page read and write
|
||
22B6E0A0000
|
trusted library section
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
1AC51FB0000
|
heap
|
page read and write
|
||
5DF8FB6000
|
stack
|
page read and write
|
||
1AC522F0000
|
heap
|
page read and write
|
||
1E55C000
|
stack
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
F02000
|
heap
|
page read and write
|
||
5A984CC000
|
stack
|
page read and write
|
||
22B6EC30000
|
heap
|
page read and write
|
||
7FFD3478D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34960000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34A60000
|
trusted library allocation
|
page read and write
|
||
7FFD34978000
|
trusted library allocation
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
ADA81BE000
|
stack
|
page read and write
|
||
1C4FE000
|
stack
|
page read and write
|
||
7FFD34A12000
|
trusted library allocation
|
page read and write
|
||
1602000
|
heap
|
page read and write
|
||
7FFD34A50000
|
trusted library allocation
|
page read and write
|
||
7FFD34793000
|
trusted library allocation
|
page execute and read and write
|
||
7FF6AE6D1000
|
unkown
|
page execute read
|
||
172FD550000
|
heap
|
page execute and read and write
|
||
91A19FE000
|
stack
|
page read and write
|
||
7FFD34BA0000
|
trusted library allocation
|
page read and write
|
||
132A1000
|
trusted library allocation
|
page read and write
|
||
1F829F87000
|
trusted library allocation
|
page read and write
|
||
1F8422E0000
|
heap
|
page read and write
|
||
7FFD34B10000
|
trusted library allocation
|
page read and write
|
||
22B6E782000
|
heap
|
page read and write
|
||
5DF92BB000
|
stack
|
page read and write
|
||
22B10031000
|
trusted library allocation
|
page read and write
|
||
1B7DD000
|
stack
|
page read and write
|
||
7DF49C650000
|
trusted library allocation
|
page execute and read and write
|
||
5A974FD000
|
stack
|
page read and write
|
||
7FFD34941000
|
trusted library allocation
|
page read and write
|
||
22B0133F000
|
trusted library allocation
|
page read and write
|
||
7FFD347EC000
|
trusted library allocation
|
page execute and read and write
|
||
22B0130C000
|
trusted library allocation
|
page read and write
|
||
143D000
|
heap
|
page read and write
|
||
5DF9C8E000
|
stack
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
164EE665000
|
heap
|
page read and write
|
||
164F0A9E000
|
heap
|
page read and write
|
||
338B000
|
trusted library allocation
|
page read and write
|
||
1445000
|
heap
|
page read and write
|
||
172E6009000
|
trusted library allocation
|
page read and write
|
||
5A978FB000
|
stack
|
page read and write
|
||
35A023E000
|
stack
|
page read and write
|
||
1B9FE000
|
stack
|
page read and write
|
||
35A033E000
|
stack
|
page read and write
|
||
172F51CB000
|
trusted library allocation
|
page read and write
|
||
7FFD34810000
|
trusted library allocation
|
page read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page read and write
|
||
7FFD348B8000
|
trusted library allocation
|
page execute and read and write
|
||
164EE681000
|
heap
|
page read and write
|
||
1F82B111000
|
trusted library allocation
|
page read and write
|
||
22B00F6F000
|
trusted library allocation
|
page read and write
|
||
22B6E880000
|
heap
|
page read and write
|
||
7FFD3477D000
|
trusted library allocation
|
page execute and read and write
|
||
1F84256F000
|
heap
|
page read and write
|
||
1816000
|
heap
|
page read and write
|
||
ADA7CF9000
|
stack
|
page read and write
|
||
132B2000
|
trusted library allocation
|
page read and write
|
||
3170000
|
heap
|
page execute and read and write
|
||
7FFD3478B000
|
trusted library allocation
|
page execute and read and write
|
||
164F03A0000
|
trusted library allocation
|
page read and write
|
||
22B6E761000
|
heap
|
page read and write
|
||
7FFD34A50000
|
trusted library allocation
|
page read and write
|
||
172FD70C000
|
heap
|
page read and write
|
||
172FD60D000
|
heap
|
page read and write
|
||
7FF4E8170000
|
trusted library allocation
|
page execute and read and write
|
||
131A1000
|
trusted library allocation
|
page read and write
|
||
1F8282C8000
|
heap
|
page read and write
|
||
122E000
|
heap
|
page read and write
|
||
7FFD34952000
|
trusted library allocation
|
page read and write
|
||
7FFD34BD0000
|
trusted library allocation
|
page read and write
|
||
7FFD3476D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34880000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34772000
|
trusted library allocation
|
page read and write
|
||
ADA7C7E000
|
stack
|
page read and write
|
||
7FFD34A40000
|
trusted library allocation
|
page read and write
|
||
172E3580000
|
trusted library allocation
|
page read and write
|
||
164813C7000
|
trusted library allocation
|
page read and write
|
||
7FFD34A20000
|
trusted library allocation
|
page read and write
|
||
7FFD34AE4000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
trusted library allocation
|
page read and write
|
||
16481127000
|
trusted library allocation
|
page read and write
|
||
1E25E000
|
stack
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page execute and read and write
|
||
16481783000
|
trusted library allocation
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
5A9834C000
|
stack
|
page read and write
|
||
3030000
|
trusted library allocation
|
page read and write
|
||
16480228000
|
trusted library allocation
|
page read and write
|
||
35A0D8E000
|
stack
|
page read and write
|
||
1BDFE000
|
stack
|
page read and write
|
||
22B01869000
|
trusted library allocation
|
page read and write
|
||
35A00BA000
|
stack
|
page read and write
|
||
1F842680000
|
heap
|
page read and write
|
||
1F83A107000
|
trusted library allocation
|
page read and write
|
||
1229000
|
heap
|
page read and write
|
||
16480C06000
|
trusted library allocation
|
page read and write
|
||
7FFD34A70000
|
trusted library allocation
|
page read and write
|
||
7FF6AE88B000
|
unkown
|
page write copy
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
7FFD34920000
|
trusted library allocation
|
page execute and read and write
|
||
172E35CE000
|
heap
|
page read and write
|
||
164811AC000
|
trusted library allocation
|
page read and write
|
||
172FD6C9000
|
heap
|
page read and write
|
||
7FFD34A80000
|
trusted library allocation
|
page read and write
|
||
7DF4F7A80000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34B80000
|
trusted library allocation
|
page read and write
|
||
7FFD34A20000
|
trusted library allocation
|
page read and write
|
||
1F83A13E000
|
trusted library allocation
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
1D2D5000
|
heap
|
page read and write
|
||
1BCFE000
|
stack
|
page read and write
|
||
7FFD34793000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347CC000
|
trusted library allocation
|
page execute and read and write
|
||
1648130D000
|
trusted library allocation
|
page read and write
|
||
172FDA5B000
|
heap
|
page read and write
|
||
1F82BD20000
|
trusted library allocation
|
page read and write
|
||
172E34F0000
|
heap
|
page read and write
|
||
7FFD34AF5000
|
trusted library allocation
|
page read and write
|
||
1D73E000
|
stack
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
7FFD3481C000
|
trusted library allocation
|
page execute and read and write
|
||
1F828270000
|
heap
|
page read and write
|
||
1F842294000
|
heap
|
page read and write
|
||
7FFD34784000
|
trusted library allocation
|
page read and write
|
||
5DF8DF9000
|
stack
|
page read and write
|
||
22B6E190000
|
heap
|
page execute and read and write
|
||
131A3000
|
trusted library allocation
|
page read and write
|
||
7FFD34A40000
|
trusted library allocation
|
page read and write
|
||
22B00001000
|
trusted library allocation
|
page read and write
|
||
1F82B767000
|
trusted library allocation
|
page read and write
|
||
164F0C11000
|
heap
|
page read and write
|
||
359FCFF000
|
stack
|
page read and write
|
||
16481950000
|
trusted library allocation
|
page read and write
|
||
7FFD347CC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34974000
|
trusted library allocation
|
page read and write
|
||
1F839F10000
|
trusted library allocation
|
page read and write
|
||
1F842583000
|
heap
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page execute and read and write
|
||
3240000
|
heap
|
page read and write
|
||
7FFD348B5000
|
trusted library allocation
|
page execute and read and write
|
||
1F8426C5000
|
heap
|
page read and write
|
||
140B000
|
heap
|
page read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
5DF8EF9000
|
stack
|
page read and write
|
||
E38000
|
heap
|
page read and write
|
||
7FFD34B60000
|
trusted library allocation
|
page read and write
|
||
7FFD34784000
|
trusted library allocation
|
page read and write
|
||
7FFD34816000
|
trusted library allocation
|
page read and write
|
||
35A0E0D000
|
stack
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
22B6E0E0000
|
trusted library allocation
|
page read and write
|
||
7FFD34AF0000
|
trusted library allocation
|
page read and write
|
||
7FFD34941000
|
trusted library allocation
|
page read and write
|
||
7FFD34BED000
|
trusted library allocation
|
page read and write
|
||
7DF49C640000
|
trusted library allocation
|
page execute and read and write
|
||
172E6CC0000
|
trusted library allocation
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page execute and read and write
|
||
1F842655000
|
heap
|
page read and write
|
||
1649006C000
|
trusted library allocation
|
page read and write
|
||
164EE890000
|
trusted library section
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34A20000
|
trusted library allocation
|
page read and write
|
||
E22000
|
heap
|
page read and write
|
||
164F0A99000
|
heap
|
page read and write
|
||
7FFD34974000
|
trusted library allocation
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
164EE975000
|
heap
|
page read and write
|
||
164F0ACF000
|
heap
|
page read and write
|
||
16481E0C000
|
trusted library allocation
|
page read and write
|
||
7FFD34BA0000
|
trusted library allocation
|
page read and write
|
||
B40000
|
unkown
|
page readonly
|
||
5DF8CF9000
|
stack
|
page read and write
|
||
164804CD000
|
trusted library allocation
|
page read and write
|
||
7FF6AEAA2000
|
unkown
|
page read and write
|
||
1478000
|
heap
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
5A9777E000
|
stack
|
page read and write
|
||
1E45A000
|
stack
|
page read and write
|
||
7FFD34A19000
|
trusted library allocation
|
page read and write
|
||
334D000
|
trusted library allocation
|
page read and write
|
||
5DF923E000
|
stack
|
page read and write
|
||
7FFD347A4000
|
trusted library allocation
|
page read and write
|
||
1F82AFBD000
|
trusted library allocation
|
page read and write
|
||
13251000
|
trusted library allocation
|
page read and write
|
||
31AC000
|
trusted library allocation
|
page read and write
|
||
7FFD3477D000
|
trusted library allocation
|
page execute and read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
1279000
|
heap
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
172F51CD000
|
trusted library allocation
|
page read and write
|
||
22B00F80000
|
trusted library allocation
|
page read and write
|
||
7FFD34941000
|
trusted library allocation
|
page read and write
|
||
22B00F6B000
|
trusted library allocation
|
page read and write
|
||
1540000
|
trusted library allocation
|
page read and write
|
||
7FFD34BA0000
|
trusted library allocation
|
page read and write
|
||
1F8282D2000
|
heap
|
page read and write
|
||
1F8285A5000
|
heap
|
page read and write
|
||
ADA8E0C000
|
stack
|
page read and write
|
||
7FFD3484C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34960000
|
trusted library allocation
|
page execute and read and write
|
||
1F8282FD000
|
heap
|
page read and write
|
||
172E61EE000
|
trusted library allocation
|
page read and write
|
||
10F1000
|
stack
|
page read and write
|
||
7FF6AE88C000
|
unkown
|
page write copy
|
||
172FD737000
|
heap
|
page read and write
|
||
172E3618000
|
heap
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
7FFD34A75000
|
trusted library allocation
|
page read and write
|
||
7FFD34AE9000
|
trusted library allocation
|
page read and write
|
||
7FFD34876000
|
trusted library allocation
|
page execute and read and write
|
||
1382000
|
heap
|
page read and write
|
||
2DAC000
|
trusted library allocation
|
page read and write
|
||
1BEFF000
|
stack
|
page read and write
|
||
13CF000
|
heap
|
page read and write
|
||
7FFD349D3000
|
trusted library allocation
|
page read and write
|
||
1BA02000
|
heap
|
page read and write
|
||
7FFD34BB6000
|
trusted library allocation
|
page read and write
|
||
359FFBF000
|
stack
|
page read and write
|
||
164EE701000
|
heap
|
page read and write
|
||
16490031000
|
trusted library allocation
|
page read and write
|
||
5DF9F0E000
|
stack
|
page read and write
|
||
1F828290000
|
heap
|
page read and write
|
||
7FFD34B8A000
|
trusted library allocation
|
page read and write
|
||
133B000
|
heap
|
page read and write
|
||
8F96EFF000
|
stack
|
page read and write
|
||
ADA8D0C000
|
stack
|
page read and write
|
||
7FFD34A80000
|
trusted library allocation
|
page read and write
|
||
1B560000
|
heap
|
page execute and read and write
|
||
7FFD34A70000
|
trusted library allocation
|
page read and write
|
||
1D63E000
|
stack
|
page read and write
|
||
7FFD34773000
|
trusted library allocation
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page execute and read and write
|
||
1B602000
|
heap
|
page read and write
|
||
16481651000
|
trusted library allocation
|
page read and write
|
||
7FFD34876000
|
trusted library allocation
|
page execute and read and write
|
||
359F9EE000
|
stack
|
page read and write
|
||
172E5F9F000
|
trusted library allocation
|
page read and write
|
||
164F0A70000
|
heap
|
page read and write
|
||
1F82AE70000
|
trusted library allocation
|
page read and write
|
||
7FFD34C18000
|
trusted library allocation
|
page read and write
|
||
359FEFD000
|
stack
|
page read and write
|
||
1F83A205000
|
trusted library allocation
|
page read and write
|
||
1F828500000
|
trusted library allocation
|
page read and write
|
||
172E3510000
|
heap
|
page read and write
|
||
1F839F31000
|
trusted library allocation
|
page read and write
|
||
7FFD34BB0000
|
trusted library allocation
|
page read and write
|
||
13CF000
|
stack
|
page read and write
|
||
7FFD347BD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34C00000
|
trusted library allocation
|
page read and write
|
||
172E4F66000
|
trusted library allocation
|
page read and write
|
||
7FFD3479D000
|
trusted library allocation
|
page execute and read and write
|
||
22B6E758000
|
heap
|
page read and write
|
||
22B01123000
|
trusted library allocation
|
page read and write
|
||
7FFD34C10000
|
trusted library allocation
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
172E3570000
|
heap
|
page readonly
|
||
22B6C836000
|
heap
|
page read and write
|
||
172E6D0A000
|
trusted library allocation
|
page read and write
|
||
22B01036000
|
trusted library allocation
|
page read and write
|
||
1227000
|
heap
|
page read and write
|
||
1F82A952000
|
trusted library allocation
|
page read and write
|
||
1F8284A0000
|
heap
|
page read and write
|
||
8F96BC9000
|
stack
|
page read and write
|
||
164EE66F000
|
heap
|
page read and write
|
||
22B01784000
|
trusted library allocation
|
page read and write
|
||
13258000
|
trusted library allocation
|
page read and write
|
||
7FFD34BF0000
|
trusted library allocation
|
page read and write
|
||
7FFD347EC000
|
trusted library allocation
|
page execute and read and write
|
||
1F82B287000
|
trusted library allocation
|
page read and write
|
||
7FFD34920000
|
trusted library allocation
|
page read and write
|
||
22B6E1E0000
|
heap
|
page read and write
|
||
7FFD34AC3000
|
trusted library allocation
|
page read and write
|
||
12CE000
|
stack
|
page read and write
|
||
13253000
|
trusted library allocation
|
page read and write
|
||
7FFD3479D000
|
trusted library allocation
|
page execute and read and write
|
||
1240000
|
heap
|
page read and write
|
||
5A982CE000
|
stack
|
page read and write
|
||
7FFD34793000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34773000
|
trusted library allocation
|
page execute and read and write
|
||
1F8284E0000
|
trusted library allocation
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
172FD600000
|
heap
|
page read and write
|
||
7FF6AE88B000
|
unkown
|
page read and write
|
||
EBF000
|
heap
|
page read and write
|
||
22B013C7000
|
trusted library allocation
|
page read and write
|
||
22B6E3A0000
|
heap
|
page read and write
|
||
7FFD347AB000
|
trusted library allocation
|
page read and write
|
||
1DE5A000
|
stack
|
page read and write
|
||
7FFD34B70000
|
trusted library allocation
|
page read and write
|
||
172FD5FE000
|
heap
|
page read and write
|
||
172FCF10000
|
trusted library allocation
|
page read and write
|
||
172FD5A0000
|
trusted library allocation
|
page read and write
|
||
172E5C5A000
|
trusted library allocation
|
page read and write
|
||
172E62A7000
|
trusted library allocation
|
page read and write
|
||
172E35EF000
|
heap
|
page read and write
|
||
172E3540000
|
trusted library allocation
|
page read and write
|
||
1F82AE74000
|
trusted library allocation
|
page read and write
|
||
5A975F7000
|
stack
|
page read and write
|
||
7FFD34B01000
|
trusted library allocation
|
page read and write
|
||
7FFD34BEE000
|
trusted library allocation
|
page read and write
|
||
1E15E000
|
stack
|
page read and write
|
||
22B10001000
|
trusted library allocation
|
page read and write
|
||
359FDFE000
|
stack
|
page read and write
|
||
1BD02000
|
heap
|
page execute and read and write
|
||
ADA7D7E000
|
stack
|
page read and write
|
||
7FFD34921000
|
trusted library allocation
|
page read and write
|
||
7FFD34C1F000
|
trusted library allocation
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
5DF89CE000
|
stack
|
page read and write
|
||
16481E02000
|
trusted library allocation
|
page read and write
|
||
22B00F66000
|
trusted library allocation
|
page read and write
|
||
1F82B2C3000
|
trusted library allocation
|
page read and write
|
||
1F82BD00000
|
trusted library allocation
|
page read and write
|
||
7FFD34A20000
|
trusted library allocation
|
page read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
142D000
|
heap
|
page read and write
|
||
1D24C000
|
heap
|
page read and write
|
||
1F82B681000
|
trusted library allocation
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
164F0410000
|
heap
|
page read and write
|
||
7FFD34846000
|
trusted library allocation
|
page execute and read and write
|
||
35A0E87000
|
stack
|
page read and write
|
||
7FFD34BD0000
|
trusted library allocation
|
page read and write
|
||
172E3825000
|
heap
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
7FFD34AFC000
|
trusted library allocation
|
page read and write
|
||
7FFD34AC0000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
1C3FC000
|
stack
|
page read and write
|
||
7FFD3484C000
|
trusted library allocation
|
page execute and read and write
|
||
22B102EB000
|
trusted library allocation
|
page read and write
|
||
7FFD34764000
|
trusted library allocation
|
page read and write
|
||
1F82AE7D000
|
trusted library allocation
|
page read and write
|
||
F75000
|
unkown
|
page readonly
|
||
22B6CA80000
|
heap
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page execute and read and write
|
||
22B0182A000
|
trusted library allocation
|
page read and write
|
||
1F82834B000
|
heap
|
page read and write
|
||
7FFD34B90000
|
trusted library allocation
|
page read and write
|
||
1F828546000
|
heap
|
page execute and read and write
|
||
7FFD34AC0000
|
trusted library allocation
|
page read and write
|
||
22B6E70E000
|
heap
|
page read and write
|
||
172E6772000
|
trusted library allocation
|
page read and write
|
||
7FFD34BA0000
|
trusted library allocation
|
page read and write
|
||
164F0370000
|
heap
|
page execute and read and write
|
||
22B6C803000
|
heap
|
page read and write
|
||
7FFD34846000
|
trusted library allocation
|
page read and write
|
||
7FFD34B00000
|
trusted library allocation
|
page read and write
|
||
164EE66D000
|
heap
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
164818F2000
|
trusted library allocation
|
page read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page read and write
|
||
172FD715000
|
heap
|
page read and write
|
||
172E674C000
|
trusted library allocation
|
page read and write
|
||
1F842589000
|
heap
|
page read and write
|
||
7FFD34942000
|
trusted library allocation
|
page read and write
|
||
7FFD34AC0000
|
trusted library allocation
|
page read and write
|
||
7FFD34AE4000
|
trusted library allocation
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page execute and read and write
|
||
1F82B1A6000
|
trusted library allocation
|
page read and write
|
||
359FC7E000
|
stack
|
page read and write
|
||
1D2C5000
|
heap
|
page read and write
|
||
1F842325000
|
heap
|
page read and write
|
||
7FFD347B4000
|
trusted library allocation
|
page read and write
|
||
172E34B0000
|
heap
|
page read and write
|
||
22B6E970000
|
heap
|
page read and write
|
||
1DD55000
|
stack
|
page read and write
|
||
16481869000
|
trusted library allocation
|
page read and write
|
||
7FFD34972000
|
trusted library allocation
|
page read and write
|
||
7FFD34A80000
|
trusted library allocation
|
page read and write
|
||
1785000
|
heap
|
page read and write
|
||
7FFD347AB000
|
trusted library allocation
|
page read and write
|
||
13D0000
|
heap
|
page execute and read and write
|
||
172FD9E0000
|
heap
|
page read and write
|
||
7FFD3478D000
|
trusted library allocation
|
page execute and read and write
|
||
319E000
|
stack
|
page read and write
|
||
1F82B7F0000
|
trusted library allocation
|
page read and write
|
||
16481032000
|
trusted library allocation
|
page read and write
|
||
35A0F0C000
|
stack
|
page read and write
|
||
5A9737A000
|
stack
|
page read and write
|
||
1D2C7000
|
heap
|
page read and write
|
||
1B2D0000
|
trusted library allocation
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
1F828520000
|
trusted library allocation
|
page read and write
|
||
E2D000
|
heap
|
page read and write
|
||
164F0250000
|
heap
|
page read and write
|
||
1F839F6D000
|
trusted library allocation
|
page read and write
|
||
7FFD34A91000
|
trusted library allocation
|
page read and write
|
||
22B6C8A7000
|
heap
|
page read and write
|
||
22B6E370000
|
heap
|
page execute and read and write
|
||
164F0A92000
|
heap
|
page read and write
|
||
5DF8D7E000
|
stack
|
page read and write
|
||
1AC51F90000
|
heap
|
page read and write
|
||
22B6E0C0000
|
trusted library allocation
|
page read and write
|
||
7FFD34B8A000
|
trusted library allocation
|
page read and write
|
||
7FFD34912000
|
trusted library allocation
|
page read and write
|
||
7FFD34A30000
|
trusted library allocation
|
page read and write
|
||
5DF9E8C000
|
stack
|
page read and write
|
||
1F842646000
|
heap
|
page read and write
|
||
7FFD34AB0000
|
trusted library allocation
|
page read and write
|
||
7FFD34BF0000
|
trusted library allocation
|
page read and write
|
||
164EE635000
|
heap
|
page read and write
|
||
7FFD34A3C000
|
trusted library allocation
|
page read and write
|
||
1247000
|
heap
|
page read and write
|
||
22B01951000
|
trusted library allocation
|
page read and write
|
||
164F0864000
|
heap
|
page read and write
|
||
1AC52039000
|
heap
|
page read and write
|
||
E41000
|
heap
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
1BFFE000
|
stack
|
page read and write
|
||
1BBFF000
|
stack
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
14FA000
|
heap
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
7FFD34792000
|
trusted library allocation
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
172E5E77000
|
trusted library allocation
|
page read and write
|
||
7FFD347A3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3494A000
|
trusted library allocation
|
page read and write
|
||
7FFD34B20000
|
trusted library allocation
|
page read and write
|
||
22B6E197000
|
heap
|
page execute and read and write
|
||
E70000
|
unkown
|
page readonly
|
||
12DA3000
|
trusted library allocation
|
page read and write
|
||
1F82BD25000
|
trusted library allocation
|
page read and write
|
||
164F0BD0000
|
heap
|
page read and write
|
||
35A0F8C000
|
stack
|
page read and write
|
||
7FFD34826000
|
trusted library allocation
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
172E3820000
|
heap
|
page read and write
|
||
164F085B000
|
heap
|
page read and write
|
||
172E3616000
|
heap
|
page read and write
|
||
172F4F01000
|
trusted library allocation
|
page read and write
|
||
5A972FE000
|
stack
|
page read and write
|
||
16481E17000
|
trusted library allocation
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
359FE79000
|
stack
|
page read and write
|
||
35A0138000
|
stack
|
page read and write
|
||
164EE970000
|
heap
|
page read and write
|
||
7FF6AE833000
|
unkown
|
page readonly
|
||
5DF9E07000
|
stack
|
page read and write
|
||
7FFD34ADC000
|
trusted library allocation
|
page read and write
|
||
22B6E1F2000
|
heap
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34BB0000
|
trusted library allocation
|
page read and write
|
||
1B8FF000
|
stack
|
page read and write
|
||
1F82A3CE000
|
trusted library allocation
|
page read and write
|
||
1F83A1E6000
|
trusted library allocation
|
page read and write
|
||
1648193B000
|
trusted library allocation
|
page read and write
|
||
ADA7E7D000
|
stack
|
page read and write
|
||
2DA1000
|
trusted library allocation
|
page read and write
|
||
7FFD3482C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34AF2000
|
trusted library allocation
|
page read and write
|
||
5DF91BE000
|
stack
|
page read and write
|
||
1B21D000
|
stack
|
page read and write
|
||
1F828510000
|
heap
|
page readonly
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
ADA8D8E000
|
stack
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
3316000
|
trusted library allocation
|
page read and write
|
||
ADA7FB6000
|
stack
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
7FFD34BC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34978000
|
trusted library allocation
|
page read and write
|
||
1F82AE6C000
|
trusted library allocation
|
page read and write
|
||
25D443F0000
|
heap
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
164F0857000
|
heap
|
page read and write
|
||
7FFD3477D000
|
trusted library allocation
|
page execute and read and write
|
||
1C1FE000
|
stack
|
page read and write
|
||
7DF4F7A70000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
5A96FAD000
|
stack
|
page read and write
|
||
172E4E70000
|
heap
|
page read and write
|
||
1BF00000
|
heap
|
page read and write
|
||
137C000
|
heap
|
page read and write
|
||
22B6C84E000
|
heap
|
page read and write
|
||
172F4F11000
|
trusted library allocation
|
page read and write
|
||
7FFD34AC4000
|
trusted library allocation
|
page read and write
|
||
172FD665000
|
heap
|
page read and write
|
||
7FFD34AE0000
|
trusted library allocation
|
page read and write
|
||
164F07A7000
|
heap
|
page read and write
|
||
164F0B2D000
|
heap
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
1413000
|
heap
|
page read and write
|
||
22B6C877000
|
heap
|
page read and write
|
||
ADA80B9000
|
stack
|
page read and write
|
||
7DF4ABE10000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
331B000
|
trusted library allocation
|
page read and write
|
||
164902F4000
|
trusted library allocation
|
page read and write
|
||
ADA7F3E000
|
stack
|
page read and write
|
||
1F842780000
|
heap
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page execute and read and write
|
||
16481604000
|
trusted library allocation
|
page read and write
|
||
22B6E6F0000
|
heap
|
page read and write
|
||
22B6C830000
|
heap
|
page read and write
|
||
16490001000
|
trusted library allocation
|
page read and write
|
||
35A0037000
|
stack
|
page read and write
|
||
1F83A1F5000
|
trusted library allocation
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34A60000
|
trusted library allocation
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
5A9854C000
|
stack
|
page read and write
|
||
7FFD34846000
|
trusted library allocation
|
page read and write
|
||
22B6EA9D000
|
heap
|
page read and write
|
||
1F839F01000
|
trusted library allocation
|
page read and write
|
||
1493000
|
heap
|
page read and write
|
||
22B6C770000
|
heap
|
page read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
DB0000
|
trusted library allocation
|
page read and write
|
||
164F0255000
|
heap
|
page read and write
|
||
7FFD34BE7000
|
trusted library allocation
|
page read and write
|
||
7FFD34C10000
|
trusted library allocation
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
144A000
|
heap
|
page read and write
|
||
7FFD34A30000
|
trusted library allocation
|
page read and write
|
||
1245000
|
heap
|
page read and write
|
||
3325000
|
trusted library allocation
|
page read and write
|
||
7FFD34AF2000
|
trusted library allocation
|
page read and write
|
||
16480F9D000
|
trusted library allocation
|
page read and write
|
||
5A9767A000
|
stack
|
page read and write
|
||
22B10304000
|
trusted library allocation
|
page read and write
|
||
172E35D1000
|
heap
|
page read and write
|
||
7FFD3484C000
|
trusted library allocation
|
page execute and read and write
|
||
5DF9D0C000
|
stack
|
page read and write
|
||
5A97579000
|
stack
|
page read and write
|
||
5DF90BB000
|
stack
|
page read and write
|
||
164EE667000
|
heap
|
page read and write
|
||
1F828260000
|
heap
|
page read and write
|
||
164F0C17000
|
heap
|
page read and write
|
||
7FFD34A90000
|
trusted library allocation
|
page read and write
|
||
1F82AE64000
|
trusted library allocation
|
page read and write
|
||
1F842290000
|
heap
|
page read and write
|
||
16FF000
|
stack
|
page read and write
|
||
164EE6AC000
|
heap
|
page read and write
|
||
7FFD34BE0000
|
trusted library allocation
|
page read and write
|
||
7FFD3479D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3479D000
|
trusted library allocation
|
page execute and read and write
|
||
1302000
|
heap
|
page read and write
|
||
1F84230C000
|
heap
|
page read and write
|
||
7DF49C630000
|
trusted library allocation
|
page execute and read and write
|
||
1513000
|
heap
|
page read and write
|
||
22B102E6000
|
trusted library allocation
|
page read and write
|
||
7FFD34978000
|
trusted library allocation
|
page read and write
|
||
1AFF000
|
stack
|
page read and write
|
||
7FFD34AF8000
|
trusted library allocation
|
page read and write
|
||
35A03BB000
|
stack
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
172E6834000
|
trusted library allocation
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page execute and read and write
|
||
7DF48DF60000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34B8C000
|
trusted library allocation
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
1D245000
|
heap
|
page read and write
|
||
1F829D80000
|
trusted library allocation
|
page read and write
|
||
B42000
|
unkown
|
page readonly
|
||
1730000
|
heap
|
page read and write
|
||
1BEFE000
|
stack
|
page read and write
|
||
91A159C000
|
stack
|
page read and write
|
||
7FFD34932000
|
trusted library allocation
|
page read and write
|
||
22B6C83C000
|
heap
|
page read and write
|
||
172FDA6D000
|
heap
|
page read and write
|
||
12DA1000
|
trusted library allocation
|
page read and write
|
||
7FF6AE6D1000
|
unkown
|
page execute read
|
||
1F842597000
|
heap
|
page read and write
|
||
16481DFE000
|
trusted library allocation
|
page read and write
|
||
164F0A8C000
|
heap
|
page read and write
|
||
7FFD34774000
|
trusted library allocation
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
1F84269E000
|
heap
|
page read and write
|
||
13B3000
|
trusted library allocation
|
page read and write
|
||
172E4E60000
|
heap
|
page execute and read and write
|
||
172E5931000
|
trusted library allocation
|
page read and write
|
||
7FFD34A80000
|
trusted library allocation
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
172E5FD1000
|
trusted library allocation
|
page read and write
|
||
3050000
|
trusted library allocation
|
page read and write
|
||
1F839F21000
|
trusted library allocation
|
page read and write
|
||
22B01E23000
|
trusted library allocation
|
page read and write
|
||
7FFD34856000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34BC0000
|
trusted library allocation
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34930000
|
trusted library allocation
|
page read and write
|
||
172FD67A000
|
heap
|
page read and write
|
||
7FFD34B83000
|
trusted library allocation
|
page read and write
|
||
22B010BF000
|
trusted library allocation
|
page read and write
|
||
1AC52030000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page execute and read and write
|
||
22B6E1E5000
|
heap
|
page read and write
|
||
131A8000
|
trusted library allocation
|
page read and write
|
||
1D83D000
|
stack
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page execute and read and write
|
||
164EE6A7000
|
heap
|
page read and write
|
||
172FCF5D000
|
heap
|
page read and write
|
||
7FFD34A50000
|
trusted library allocation
|
page read and write
|
||
22B102F3000
|
trusted library allocation
|
page read and write
|
||
7FFD34794000
|
trusted library allocation
|
page read and write
|
||
5DF9D8E000
|
stack
|
page read and write
|
||
7FFD34BD0000
|
trusted library allocation
|
page read and write
|
||
1702000
|
heap
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
172F51C6000
|
trusted library allocation
|
page read and write
|
||
1390000
|
heap
|
page execute and read and write
|
||
7FF6AE6D0000
|
unkown
|
page readonly
|
||
7FFD34AF8000
|
trusted library allocation
|
page read and write
|
||
172E35D7000
|
heap
|
page read and write
|
||
22B00F77000
|
trusted library allocation
|
page read and write
|
||
7FFD34774000
|
trusted library allocation
|
page read and write
|
||
1F829F01000
|
trusted library allocation
|
page read and write
|
||
1F8426D1000
|
heap
|
page read and write
|
||
3362000
|
trusted library allocation
|
page read and write
|
||
172F51D5000
|
trusted library allocation
|
page read and write
|
||
7FFD34856000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
25D44420000
|
heap
|
page read and write
|
||
164F0C0E000
|
heap
|
page read and write
|
||
7FFD34BE0000
|
trusted library allocation
|
page read and write
|
||
1370000
|
trusted library allocation
|
page read and write
|
||
7DF48DF50000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34AC3000
|
trusted library allocation
|
page read and write
|
||
164F0851000
|
heap
|
page read and write
|
||
7FFD34B10000
|
trusted library allocation
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
22B6E711000
|
heap
|
page read and write
|
||
31A1000
|
trusted library allocation
|
page read and write
|
||
164EE860000
|
heap
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page execute and read and write
|
||
1F828346000
|
heap
|
page read and write
|
||
ADA78D3000
|
stack
|
page read and write
|
||
ADA8F8C000
|
stack
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
1D21B000
|
heap
|
page read and write
|
||
7FFD34A91000
|
trusted library allocation
|
page read and write
|
||
1648188F000
|
trusted library allocation
|
page read and write
|
||
172E35A2000
|
heap
|
page read and write
|
||
172E3515000
|
heap
|
page read and write
|
||
164F0440000
|
heap
|
page read and write
|
||
22B6E0F0000
|
heap
|
page readonly
|
||
5A985CE000
|
stack
|
page read and write
|
||
7FFD34AF0000
|
trusted library allocation
|
page read and write
|
||
7FFD34A40000
|
trusted library allocation
|
page read and write
|
||
7FFD34AFC000
|
trusted library allocation
|
page read and write
|
||
359FF77000
|
stack
|
page read and write
|
||
22B6E75A000
|
heap
|
page read and write
|
||
1243000
|
heap
|
page read and write
|
||
16481006000
|
trusted library allocation
|
page read and write
|
||
1F842632000
|
heap
|
page read and write
|
||
ADA79DE000
|
stack
|
page read and write
|
||
1F842658000
|
heap
|
page read and write
|
||
1F842605000
|
heap
|
page read and write
|
||
172FD960000
|
heap
|
page read and write
|
||
1DF58000
|
stack
|
page read and write
|
||
164810C1000
|
trusted library allocation
|
page read and write
|
||
7FFD34797000
|
trusted library allocation
|
page read and write
|
||
7FFD34AC0000
|
trusted library allocation
|
page read and write
|
||
7FFD34BE6000
|
trusted library allocation
|
page read and write
|
||
1600000
|
heap
|
page read and write
|
||
172E3560000
|
trusted library allocation
|
page read and write
|
||
172F4EE1000
|
trusted library allocation
|
page read and write
|
||
E13000
|
heap
|
page read and write
|
||
7FFD34B20000
|
trusted library allocation
|
page read and write
|
||
7FFD34BE0000
|
trusted library allocation
|
page read and write
|
||
ADA823F000
|
stack
|
page read and write
|
||
1426000
|
heap
|
page read and write
|
||
172FCEE0000
|
trusted library allocation
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
7FFD34AF5000
|
trusted library allocation
|
page read and write
|
||
ADA795E000
|
stack
|
page read and write
|
||
7FFD347FC000
|
trusted library allocation
|
page execute and read and write
|
||
11CE000
|
stack
|
page read and write
|
||
2DB1000
|
trusted library allocation
|
page read and write
|
||
172E33B0000
|
heap
|
page read and write
|
||
1E05D000
|
stack
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
5A976F8000
|
stack
|
page read and write
|
||
7FFD34860000
|
trusted library allocation
|
page execute and read and write
|
||
172FD748000
|
heap
|
page read and write
|
||
7FFD34B10000
|
trusted library allocation
|
page read and write
|
||
22B6C834000
|
heap
|
page read and write
|
||
1F842420000
|
heap
|
page read and write
|
||
7FFD347BC000
|
trusted library allocation
|
page execute and read and write
|
||
22B00D7D000
|
trusted library allocation
|
page read and write
|
||
1F82B78D000
|
trusted library allocation
|
page read and write
|
||
7FFD347AD000
|
trusted library allocation
|
page execute and read and write
|
||
22B00C11000
|
trusted library allocation
|
page read and write
|
||
7FF6AE834000
|
unkown
|
page readonly
|
||
1502000
|
heap
|
page read and write
|
||
E51000
|
heap
|
page read and write
|
||
7FFD34BD0000
|
trusted library allocation
|
page read and write
|
||
164EE8E0000
|
trusted library allocation
|
page read and write
|
||
1F8426A5000
|
heap
|
page read and write
|
||
ADA8F0C000
|
stack
|
page read and write
|
||
1BB5A000
|
stack
|
page read and write
|
||
22B01890000
|
trusted library allocation
|
page read and write
|
||
1F83A1ED000
|
trusted library allocation
|
page read and write
|
||
164F012F000
|
heap
|
page read and write
|
||
1F83A1F3000
|
trusted library allocation
|
page read and write
|
||
22B6E170000
|
trusted library allocation
|
page read and write
|
||
164811DF000
|
trusted library allocation
|
page read and write
|
||
164EE800000
|
heap
|
page read and write
|
||
164F0AA2000
|
heap
|
page read and write
|
||
1502000
|
heap
|
page read and write
|
||
7FF6AEAA6000
|
unkown
|
page readonly
|
||
7FFD34C1F000
|
trusted library allocation
|
page read and write
|
||
1C2FE000
|
stack
|
page read and write
|
||
ADA7EF8000
|
stack
|
page read and write
|
||
123D000
|
heap
|
page read and write
|
||
7FFD34AFC000
|
trusted library allocation
|
page read and write
|
||
14FF000
|
stack
|
page read and write
|
||
7FFD34876000
|
trusted library allocation
|
page execute and read and write
|
||
172E608F000
|
trusted library allocation
|
page read and write
|
||
172FD6E0000
|
heap
|
page read and write
|
||
164EE8D0000
|
heap
|
page readonly
|
||
1F82AB03000
|
trusted library allocation
|
page read and write
|
||
5DF88C3000
|
stack
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
13D8000
|
heap
|
page read and write
|
||
172FD688000
|
heap
|
page read and write
|
||
164F0960000
|
heap
|
page execute and read and write
|
||
25D443E0000
|
heap
|
page read and write
|
||
7FF6AE833000
|
unkown
|
page read and write
|
||
172E6D05000
|
trusted library allocation
|
page read and write
|
||
16481E1E000
|
trusted library allocation
|
page read and write
|
||
1BEFE000
|
stack
|
page read and write
|
||
172FD625000
|
heap
|
page read and write
|
||
1B71D000
|
stack
|
page read and write
|
||
1D28E000
|
heap
|
page read and write
|
||
164F0BE4000
|
heap
|
page read and write
|
||
15FE000
|
stack
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page read and write
|
||
8F96E7E000
|
unkown
|
page read and write
|
||
7FFD3494A000
|
trusted library allocation
|
page read and write
|
||
1F842573000
|
heap
|
page read and write
|
||
E9A000
|
heap
|
page read and write
|
||
7FFD34910000
|
trusted library allocation
|
page execute and read and write
|
||
172FD647000
|
heap
|
page read and write
|
||
1251000
|
heap
|
page read and write
|
||
5DF8F3E000
|
stack
|
page read and write
|
||
7FFD34783000
|
trusted library allocation
|
page execute and read and write
|
||
5DF913F000
|
stack
|
page read and write
|
||
EC5000
|
heap
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
7FFD34958000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
172E361B000
|
heap
|
page read and write
|
||
1F829EF5000
|
heap
|
page read and write
|
||
7FFD34B03000
|
trusted library allocation
|
page read and write
|
||
1902000
|
heap
|
page read and write
|
||
1620000
|
heap
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
7FFD34866000
|
trusted library allocation
|
page execute and read and write
|
||
D60000
|
unkown
|
page readonly
|
||
FC1000
|
stack
|
page read and write
|
||
172E35D9000
|
heap
|
page read and write
|
||
22B01E28000
|
trusted library allocation
|
page read and write
|
||
334B000
|
trusted library allocation
|
page read and write
|
||
1F828308000
|
heap
|
page read and write
|
||
7FFD34AFA000
|
trusted library allocation
|
page read and write
|
||
7FFD34BC0000
|
trusted library allocation
|
page execute and read and write
|
||
5A96F23000
|
stack
|
page read and write
|
||
164902EC000
|
trusted library allocation
|
page read and write
|
||
7FFD34B7C000
|
trusted library allocation
|
page read and write
|
||
164EE880000
|
trusted library section
|
page read and write
|
||
16481E22000
|
trusted library allocation
|
page read and write
|
||
7FFD34AE9000
|
trusted library allocation
|
page read and write
|
||
16480D72000
|
trusted library allocation
|
page read and write
|
||
164EE620000
|
heap
|
page read and write
|
||
2DAF000
|
trusted library allocation
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34B00000
|
trusted library allocation
|
page read and write
|
||
164F0822000
|
heap
|
page read and write
|
||
7FFD34AD8000
|
trusted library allocation
|
page read and write
|
||
12F4000
|
stack
|
page read and write
|
||
7FFD34C00000
|
trusted library allocation
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
172E6044000
|
trusted library allocation
|
page read and write
|
||
164EE950000
|
trusted library allocation
|
page read and write
|
||
7FFD34B00000
|
trusted library allocation
|
page read and write
|
||
7FFD34912000
|
trusted library allocation
|
page read and write
|
||
172E6666000
|
trusted library allocation
|
page read and write
|
||
1F83A1EB000
|
trusted library allocation
|
page read and write
|
||
5A973FF000
|
stack
|
page read and write
|
||
172E000
|
stack
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page execute and read and write
|
||
172FD5D1000
|
heap
|
page read and write
|
||
172FD470000
|
heap
|
page read and write
|
||
1AC522F5000
|
heap
|
page read and write
|
||
7FFD34AE4000
|
trusted library allocation
|
page read and write
|
||
22B10021000
|
trusted library allocation
|
page read and write
|
||
1F82B0D8000
|
trusted library allocation
|
page read and write
|
||
7FFD34AB0000
|
trusted library allocation
|
page read and write
|
||
5DF8C7E000
|
stack
|
page read and write
|
||
5DF894E000
|
stack
|
page read and write
|
||
1F82AE79000
|
trusted library allocation
|
page read and write
|
||
22B6EA37000
|
heap
|
page read and write
|
||
137E000
|
heap
|
page read and write
|
||
E45000
|
heap
|
page read and write
|
||
7FFD34AB0000
|
trusted library allocation
|
page read and write
|
||
1720000
|
heap
|
page read and write
|
||
7FFD34AD0000
|
trusted library allocation
|
page read and write
|
||
1F82A129000
|
trusted library allocation
|
page read and write
|
||
164F0C31000
|
heap
|
page read and write
|
||
7FFD34846000
|
trusted library allocation
|
page read and write
|
||
172E4ED0000
|
heap
|
page execute and read and write
|
||
1E800000
|
heap
|
page read and write
|
||
EC2000
|
heap
|
page read and write
|
||
5A983CE000
|
stack
|
page read and write
|
||
7FFD34C10000
|
trusted library allocation
|
page read and write
|
||
ADA82BB000
|
stack
|
page read and write
|
||
7FFD34AA3000
|
trusted library allocation
|
page read and write
|
||
1299000
|
heap
|
page read and write
|
||
7FFD34BC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
172E60FA000
|
trusted library allocation
|
page read and write
|
||
7FFD34B80000
|
trusted library allocation
|
page read and write
|
||
164F0B07000
|
heap
|
page read and write
|
||
315E000
|
stack
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page read and write
|
||
22B6E130000
|
trusted library allocation
|
page read and write
|
||
1F8283B3000
|
heap
|
page read and write
|
||
16490304000
|
trusted library allocation
|
page read and write
|
||
164F0AAA000
|
heap
|
page read and write
|
||
7FFD34B8C000
|
trusted library allocation
|
page read and write
|
||
7FFD34794000
|
trusted library allocation
|
page read and write
|
||
22B6CA85000
|
heap
|
page read and write
|
||
164F0AE9000
|
heap
|
page read and write
|
||
7FFD34AC9000
|
trusted library allocation
|
page read and write
|
||
ADA8039000
|
stack
|
page read and write
|
||
1F82830A000
|
heap
|
page read and write
|
||
7FFD34784000
|
trusted library allocation
|
page read and write
|
||
1780000
|
heap
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
1BDFD000
|
stack
|
page read and write
|
||
172E5FDB000
|
trusted library allocation
|
page read and write
|
||
1F82B020000
|
trusted library allocation
|
page read and write
|
||
1D2CB000
|
heap
|
page read and write
|
||
7FFD34A60000
|
trusted library allocation
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
1352000
|
heap
|
page read and write
|
||
22B00F73000
|
trusted library allocation
|
page read and write
|
||
164902E5000
|
trusted library allocation
|
page read and write
|
||
164F0990000
|
heap
|
page read and write
|
||
172E5109000
|
trusted library allocation
|
page read and write
|
||
E77000
|
heap
|
page read and write
|
||
329E000
|
stack
|
page read and write
|
||
ADA8C8F000
|
stack
|
page read and write
|
||
7FFD3478D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
12C9000
|
heap
|
page read and write
|
||
164EE8A0000
|
trusted library allocation
|
page read and write
|
||
1D2AA000
|
heap
|
page read and write
|
||
1447000
|
heap
|
page read and write
|
||
7FFD34AF8000
|
trusted library allocation
|
page read and write
|
||
1625000
|
heap
|
page read and write
|
||
7FFD34932000
|
trusted library allocation
|
page read and write
|
||
7FFD34A60000
|
trusted library allocation
|
page read and write
|
||
1F82AE5F000
|
trusted library allocation
|
page read and write
|
||
1F829EF0000
|
heap
|
page read and write
|
||
16481DDD000
|
trusted library allocation
|
page read and write
|
||
7FF6AEAA6000
|
unkown
|
page readonly
|
||
22B6E0B0000
|
trusted library section
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
1213000
|
heap
|
page read and write
|
||
25D44426000
|
heap
|
page read and write
|
||
5A96FEE000
|
stack
|
page read and write
|
||
1DC4E000
|
stack
|
page read and write
|
||
7FFD34773000
|
trusted library allocation
|
page execute and read and write
|
||
1800000
|
heap
|
page read and write
|
||
7FFD34B20000
|
trusted library allocation
|
page read and write
|
||
22B6C82D000
|
heap
|
page read and write
|
||
172E5FCF000
|
trusted library allocation
|
page read and write
|
There are 1093 hidden memdumps, click here to show them.