Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
dLRcE11Dkl.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\dLRcE11Dkl.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\BLACKGODDOM V.2 GOD BY LA.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Ratty_win32_directx11.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\All function.cmd
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\All function.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Task Manager.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\svchost.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\All function.cmd.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\All function.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0bjsdv4i.tpz.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0l51iffg.tq0.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0qmxwdfz.kse.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2ztoew11.5c3.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_31fndpky.03j.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3acwfl2g.ba4.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3adzek40.abk.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3hgzyfgm.tzf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_44snx4vq.a5x.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e3d2m2j2.pui.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eazc3edu.5en.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jmdifspy.1mi.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k3avciqn.tvq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l4nuu035.qeb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lkpfrirv.jmi.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o4s02nie.c2c.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p5xjqxul.vnn.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rp0gbebc.bft.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rshn4vvj.qmg.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t5hg4zfs.sgc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ty024g5m.g24.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v5cn0wgk.1ix.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wolrdzkz.yq3.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xopyyo5c.hm3.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xx0xkgqf.4vk.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y3120v30.dhg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yp4wtp3r.owu.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zvxhdpm1.1b1.ps1
|
ASCII text, with no line terminators
|
dropped
|
There are 29 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\dLRcE11Dkl.exe
|
"C:\Users\user\Desktop\dLRcE11Dkl.exe"
|
||
C:\Users\user\AppData\Roaming\All function.cmd
|
"C:\Users\user\AppData\Roaming\All function.cmd"
|
||
C:\Users\user\AppData\Roaming\svchost.exe
|
"C:\Users\user\AppData\Roaming\svchost.exe"
|
||
C:\Users\user\AppData\Roaming\Task Manager.exe
|
"C:\Users\user\AppData\Roaming\Task Manager.exe"
|
||
C:\Users\user\AppData\Roaming\All function.exe
|
"C:\Users\user\AppData\Roaming\All function.exe"
|
||
C:\Users\user\AppData\Local\Temp\Ratty_win32_directx11.exe
|
"C:\Users\user\AppData\Local\Temp\Ratty_win32_directx11.exe"
|
||
C:\Users\user\AppData\Local\Temp\BLACKGODDOM V.2 GOD BY LA.exe
|
"C:\Users\user\AppData\Local\Temp\BLACKGODDOM V.2 GOD BY LA.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\Task
Manager.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\BLACKGODDOM
V.2 GOD BY LA.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'BLACKGODDOM
V.2 GOD BY LA.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Task
Manager.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\XClient.exe'
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 11 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
45.141.27.222
|
|||
https://scripts.sil.org/OFLThis
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://discord.gg/sGNBaJSzYDstart
|
unknown
|
||
https://qualityboy.rdcw.xyz/Rat
|
unknown
|
||
http://www.microsoft.co
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://scripts.sil.org/OFLhttps://indiantypefoundry.comNinad
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://curl.haxx.se/docs/http-cookies.html
|
unknown
|
||
http://crl.m)IZ_
|
unknown
|
||
https://qualityboy.rdcw.xyz/
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://discord.gg/sGNBaJSzYD
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/itfoundry/Poppins)&&&&s
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
||
http://crl.micros
|
unknown
|
There are 16 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Task Manager_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Task Manager_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Task Manager_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Task Manager_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Task Manager_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Task Manager_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Task Manager_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Task Manager_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Task Manager_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Task Manager_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Task Manager_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Task Manager_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Task Manager_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Task Manager_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKGODDOM V_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKGODDOM V_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKGODDOM V_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKGODDOM V_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKGODDOM V_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKGODDOM V_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKGODDOM V_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKGODDOM V_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKGODDOM V_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKGODDOM V_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKGODDOM V_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKGODDOM V_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKGODDOM V_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKGODDOM V_RASMANCS
|
FileDirectory
|
There are 18 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2E91000
|
trusted library allocation
|
page read and write
|
||
27F1000
|
trusted library allocation
|
page read and write
|
||
E12000
|
unkown
|
page readonly
|
||
3B2000
|
unkown
|
page readonly
|
||
A22000
|
unkown
|
page readonly
|
||
2DF1000
|
trusted library allocation
|
page read and write
|
||
7FFD348F0000
|
trusted library allocation
|
page read and write
|
||
745D53F000
|
stack
|
page read and write
|
||
1BA10000
|
heap
|
page read and write
|
||
1A73E50A000
|
trusted library allocation
|
page read and write
|
||
1C4BB031000
|
trusted library allocation
|
page read and write
|
||
7FFD34640000
|
trusted library allocation
|
page read and write
|
||
1A73B4C4000
|
heap
|
page read and write
|
||
7FFD34868000
|
trusted library allocation
|
page read and write
|
||
2D65E6A7000
|
trusted library allocation
|
page read and write
|
||
23B5BFCF000
|
heap
|
page read and write
|
||
F2955BF000
|
stack
|
page read and write
|
||
1C4AC3EE000
|
trusted library allocation
|
page read and write
|
||
7FFD349B2000
|
trusted library allocation
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
2398E8E3000
|
trusted library allocation
|
page read and write
|
||
7FFD3470C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34830000
|
trusted library allocation
|
page execute and read and write
|
||
251DAB40000
|
heap
|
page read and write
|
||
23B43770000
|
heap
|
page read and write
|
||
7FFD34660000
|
trusted library allocation
|
page read and write
|
||
7FFD34660000
|
trusted library allocation
|
page read and write
|
||
D05000
|
unkown
|
page readonly
|
||
1A73DF7E000
|
trusted library allocation
|
page read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page read and write
|
||
7FFD34664000
|
trusted library allocation
|
page read and write
|
||
7FFD349D4000
|
trusted library allocation
|
page read and write
|
||
7FFD3491D000
|
trusted library allocation
|
page read and write
|
||
239A5FC6000
|
heap
|
page execute and read and write
|
||
2399DBDE000
|
trusted library allocation
|
page read and write
|
||
7FFD34A60000
|
trusted library allocation
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349BC000
|
trusted library allocation
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
7FFD3473C000
|
trusted library allocation
|
page execute and read and write
|
||
1B90F000
|
stack
|
page read and write
|
||
2D65F050000
|
trusted library allocation
|
page read and write
|
||
7FFD34983000
|
trusted library allocation
|
page read and write
|
||
239A61DA000
|
heap
|
page read and write
|
||
1A73B430000
|
heap
|
page read and write
|
||
7FF77147A000
|
unkown
|
page readonly
|
||
251D904D000
|
heap
|
page read and write
|
||
7FFD34690000
|
trusted library allocation
|
page read and write
|
||
25831F9000
|
stack
|
page read and write
|
||
12E91000
|
trusted library allocation
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page execute and read and write
|
||
982000
|
heap
|
page read and write
|
||
1A73E167000
|
trusted library allocation
|
page read and write
|
||
1A75559E000
|
heap
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
A64D5BF000
|
stack
|
page read and write
|
||
2D66E900000
|
trusted library allocation
|
page read and write
|
||
1F4CA090000
|
trusted library allocation
|
page read and write
|
||
2399DB80000
|
trusted library allocation
|
page read and write
|
||
7FFD34870000
|
trusted library allocation
|
page execute and read and write
|
||
1A7558CD000
|
heap
|
page read and write
|
||
F2FD4F9000
|
stack
|
page read and write
|
||
6BC364C000
|
stack
|
page read and write
|
||
23B5BC90000
|
heap
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
A64E10C000
|
stack
|
page read and write
|
||
1A73E180000
|
trusted library allocation
|
page read and write
|
||
7FFD34706000
|
trusted library allocation
|
page read and write
|
||
1A73B4C6000
|
heap
|
page read and write
|
||
1A73B6D0000
|
heap
|
page readonly
|
||
37D92F9000
|
stack
|
page read and write
|
||
7DF4856C0000
|
trusted library allocation
|
page execute and read and write
|
||
1A73E238000
|
trusted library allocation
|
page read and write
|
||
1F4CA74D000
|
trusted library allocation
|
page read and write
|
||
1325000
|
heap
|
page read and write
|
||
7FFD34690000
|
trusted library allocation
|
page read and write
|
||
A64D53F000
|
stack
|
page read and write
|
||
10D5000
|
heap
|
page read and write
|
||
1A73EFDA000
|
trusted library allocation
|
page read and write
|
||
7FFD34844000
|
trusted library allocation
|
page read and write
|
||
6BC34CD000
|
stack
|
page read and write
|
||
7FFD34AB0000
|
trusted library allocation
|
page read and write
|
||
C9E000
|
stack
|
page read and write
|
||
23B5BEA4000
|
heap
|
page read and write
|
||
1C4AC332000
|
trusted library allocation
|
page read and write
|
||
23B4576F000
|
trusted library allocation
|
page read and write
|
||
934000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
251D91C5000
|
heap
|
page read and write
|
||
1BD1E000
|
stack
|
page read and write
|
||
2398F3D6000
|
trusted library allocation
|
page read and write
|
||
6BC297C000
|
stack
|
page read and write
|
||
7DF4856B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
1F4C85C0000
|
heap
|
page read and write
|
||
7FFD349AC000
|
trusted library allocation
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34900000
|
trusted library allocation
|
page read and write
|
||
2D65C5E8000
|
heap
|
page read and write
|
||
1090000
|
trusted library allocation
|
page read and write
|
||
251D8FF0000
|
heap
|
page read and write
|
||
1C4C37F5000
|
heap
|
page read and write
|
||
7FFD34736000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
1F4CB339000
|
trusted library allocation
|
page read and write
|
||
7FFD34870000
|
trusted library allocation
|
page read and write
|
||
1C4AAD80000
|
trusted library allocation
|
page read and write
|
||
745D5BE000
|
stack
|
page read and write
|
||
251DBDC5000
|
trusted library allocation
|
page read and write
|
||
1C4ABFCC000
|
trusted library allocation
|
page read and write
|
||
7FFD3468D000
|
trusted library allocation
|
page execute and read and write
|
||
1C4AB0B0000
|
trusted library allocation
|
page read and write
|
||
1F4CA0D0000
|
heap
|
page read and write
|
||
F2FE6C7000
|
stack
|
page read and write
|
||
1A73B6E0000
|
trusted library allocation
|
page read and write
|
||
1A73B480000
|
heap
|
page read and write
|
||
1A73DF17000
|
trusted library allocation
|
page read and write
|
||
1C4A9368000
|
heap
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
7FFD34A90000
|
trusted library allocation
|
page read and write
|
||
1B41D000
|
stack
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page read and write
|
||
2D66E780000
|
trusted library allocation
|
page read and write
|
||
23B438A0000
|
heap
|
page execute and read and write
|
||
F29563E000
|
stack
|
page read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
23B44B5E000
|
trusted library allocation
|
page read and write
|
||
7FFD348E0000
|
trusted library allocation
|
page read and write
|
||
7FFD34682000
|
trusted library allocation
|
page read and write
|
||
27EE000
|
stack
|
page read and write
|
||
7FFD34726000
|
trusted library allocation
|
page read and write
|
||
7FFD3465D000
|
trusted library allocation
|
page execute and read and write
|
||
1A73EB4E000
|
trusted library allocation
|
page read and write
|
||
23B43B7A000
|
trusted library allocation
|
page read and write
|
||
1F4DA624000
|
trusted library allocation
|
page read and write
|
||
1F4C8647000
|
heap
|
page read and write
|
||
1C4C3756000
|
heap
|
page read and write
|
||
1C4AB4FE000
|
trusted library allocation
|
page read and write
|
||
2398D890000
|
trusted library allocation
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page read and write
|
||
239A5F54000
|
heap
|
page read and write
|
||
2398F4BE000
|
trusted library allocation
|
page read and write
|
||
1C4C3854000
|
heap
|
page read and write
|
||
251DBE55000
|
trusted library allocation
|
page read and write
|
||
7FFD34710000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34683000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34684000
|
trusted library allocation
|
page read and write
|
||
1F4C8830000
|
heap
|
page readonly
|
||
1A74D210000
|
trusted library allocation
|
page read and write
|
||
A64CCF3000
|
stack
|
page read and write
|
||
7FFD349D4000
|
trusted library allocation
|
page read and write
|
||
23B41C28000
|
heap
|
page read and write
|
||
1F4E29C0000
|
heap
|
page read and write
|
||
1F4DA281000
|
trusted library allocation
|
page read and write
|
||
1F4CB51F000
|
trusted library allocation
|
page read and write
|
||
A34000
|
unkown
|
page readonly
|
||
251F339F000
|
heap
|
page read and write
|
||
7FFD34852000
|
trusted library allocation
|
page read and write
|
||
1F4CA060000
|
trusted library allocation
|
page read and write
|
||
1070000
|
trusted library allocation
|
page read and write
|
||
1B800000
|
heap
|
page execute and read and write
|
||
F2FD67D000
|
stack
|
page read and write
|
||
7FFD34660000
|
trusted library allocation
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
2D65FD5D000
|
trusted library allocation
|
page read and write
|
||
251EABBD000
|
trusted library allocation
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page read and write
|
||
258367E000
|
stack
|
page read and write
|
||
7FFD348E0000
|
trusted library allocation
|
page read and write
|
||
23B43E1F000
|
trusted library allocation
|
page read and write
|
||
7FFD3471C000
|
trusted library allocation
|
page execute and read and write
|
||
93E000
|
heap
|
page read and write
|
||
23B41DE0000
|
trusted library allocation
|
page read and write
|
||
F29608E000
|
stack
|
page read and write
|
||
37D917F000
|
stack
|
page read and write
|
||
1B1E0000
|
heap
|
page read and write
|
||
7FFD34800000
|
trusted library allocation
|
page read and write
|
||
1F4C85E4000
|
heap
|
page read and write
|
||
916000
|
heap
|
page read and write
|
||
1C4C385F000
|
heap
|
page read and write
|
||
1F4C8800000
|
trusted library allocation
|
page read and write
|
||
DB5000
|
heap
|
page read and write
|
||
745E08D000
|
stack
|
page read and write
|
||
2D65F060000
|
trusted library allocation
|
page read and write
|
||
1A73E3A9000
|
trusted library allocation
|
page read and write
|
||
251EAE45000
|
trusted library allocation
|
page read and write
|
||
1F4E26F6000
|
heap
|
page read and write
|
||
1A74D4F5000
|
trusted library allocation
|
page read and write
|
||
23B41E00000
|
trusted library allocation
|
page read and write
|
||
2DFE000
|
stack
|
page read and write
|
||
1C4A93A2000
|
heap
|
page read and write
|
||
7FFD34868000
|
trusted library allocation
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
1C4C3570000
|
heap
|
page read and write
|
||
23B5C0C1000
|
heap
|
page read and write
|
||
6BC344E000
|
stack
|
page read and write
|
||
1B1D0000
|
heap
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
7FFD3469B000
|
trusted library allocation
|
page read and write
|
||
1C4C3801000
|
heap
|
page read and write
|
||
7FFD349A4000
|
trusted library allocation
|
page read and write
|
||
251F2FFF000
|
heap
|
page read and write
|
||
1F4DA2A1000
|
trusted library allocation
|
page read and write
|
||
1F4CB21D000
|
trusted library allocation
|
page read and write
|
||
7FFD349E8000
|
trusted library allocation
|
page read and write
|
||
7FFD349DC000
|
trusted library allocation
|
page read and write
|
||
7FFD34834000
|
trusted library allocation
|
page read and write
|
||
A64D63E000
|
stack
|
page read and write
|
||
251F3391000
|
heap
|
page read and write
|
||
7FFD34920000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
trusted library allocation
|
page read and write
|
||
251F3001000
|
heap
|
page read and write
|
||
10AC000
|
heap
|
page read and write
|
||
258317F000
|
stack
|
page read and write
|
||
7DF4B4E70000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34654000
|
trusted library allocation
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
2398BFD5000
|
heap
|
page read and write
|
||
7FFD34680000
|
trusted library allocation
|
page read and write
|
||
7FFD348A7000
|
trusted library allocation
|
page read and write
|
||
1F4C8606000
|
heap
|
page read and write
|
||
7FFD34664000
|
trusted library allocation
|
page read and write
|
||
7FFD34A70000
|
trusted library allocation
|
page read and write
|
||
1C4C353F000
|
heap
|
page read and write
|
||
2D65E290000
|
trusted library allocation
|
page read and write
|
||
115C000
|
heap
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
1A74D26F000
|
trusted library allocation
|
page read and write
|
||
7FFD349B9000
|
trusted library allocation
|
page read and write
|
||
2398E927000
|
trusted library allocation
|
page read and write
|
||
7FFD34AF0000
|
trusted library allocation
|
page read and write
|
||
1F4E27A6000
|
heap
|
page read and write
|
||
7FFD34AB0000
|
trusted library allocation
|
page read and write
|
||
1C4BB315000
|
trusted library allocation
|
page read and write
|
||
7FFD34A8E000
|
trusted library allocation
|
page read and write
|
||
2398F2F1000
|
trusted library allocation
|
page read and write
|
||
2398E768000
|
trusted library allocation
|
page read and write
|
||
251D9078000
|
heap
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
1F4CC059000
|
trusted library allocation
|
page read and write
|
||
12E93000
|
trusted library allocation
|
page read and write
|
||
1F4E2A99000
|
heap
|
page read and write
|
||
7FFD349EC000
|
trusted library allocation
|
page read and write
|
||
2D65F8AB000
|
trusted library allocation
|
page read and write
|
||
8D0000
|
trusted library allocation
|
page read and write
|
||
2D65E319000
|
heap
|
page read and write
|
||
7FFD347F5000
|
trusted library allocation
|
page read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page read and write
|
||
37D957E000
|
stack
|
page read and write
|
||
1F4E270E000
|
heap
|
page read and write
|
||
2398BFAE000
|
heap
|
page read and write
|
||
2398BFDA000
|
heap
|
page read and write
|
||
2CEE000
|
stack
|
page read and write
|
||
1F4CB2AE000
|
trusted library allocation
|
page read and write
|
||
7FFD34AC0000
|
trusted library allocation
|
page read and write
|
||
23B5BFF2000
|
heap
|
page read and write
|
||
7FFD34A70000
|
trusted library allocation
|
page read and write
|
||
1A73CF70000
|
trusted library allocation
|
page read and write
|
||
7FFD34662000
|
trusted library allocation
|
page read and write
|
||
7FFD3473C000
|
trusted library allocation
|
page execute and read and write
|
||
1F4CA0D5000
|
heap
|
page read and write
|
||
1BC0E000
|
stack
|
page read and write
|
||
1C4AB4DE000
|
trusted library allocation
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page read and write
|
||
1F4C8840000
|
heap
|
page read and write
|
||
745D279000
|
stack
|
page read and write
|
||
23B5C0FB000
|
heap
|
page read and write
|
||
7FFD349C9000
|
trusted library allocation
|
page read and write
|
||
A64D6BB000
|
stack
|
page read and write
|
||
6BC35CE000
|
stack
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
1A73EA66000
|
trusted library allocation
|
page read and write
|
||
251DBB54000
|
trusted library allocation
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page read and write
|
||
7FFD349CC000
|
trusted library allocation
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34AD0000
|
trusted library allocation
|
page read and write
|
||
7FFD34832000
|
trusted library allocation
|
page read and write
|
||
1C4AC2D1000
|
trusted library allocation
|
page read and write
|
||
37DA0CC000
|
stack
|
page read and write
|
||
1C4A93AA000
|
heap
|
page read and write
|
||
1C4AC8BD000
|
trusted library allocation
|
page read and write
|
||
251DBC0B000
|
trusted library allocation
|
page read and write
|
||
1F4C85DE000
|
heap
|
page read and write
|
||
2D65C5A4000
|
heap
|
page read and write
|
||
1F4E2AC0000
|
heap
|
page read and write
|
||
1B60F000
|
stack
|
page read and write
|
||
1F4C85FE000
|
heap
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
251D91B0000
|
trusted library allocation
|
page read and write
|
||
10CD000
|
heap
|
page read and write
|
||
7FFD34680000
|
trusted library allocation
|
page read and write
|
||
23B43940000
|
heap
|
page execute and read and write
|
||
2582DFE000
|
stack
|
page read and write
|
||
1A73B6A0000
|
trusted library allocation
|
page read and write
|
||
7FFD34662000
|
trusted library allocation
|
page read and write
|
||
1F4CA050000
|
heap
|
page read and write
|
||
239A5F8E000
|
heap
|
page read and write
|
||
37D93FB000
|
stack
|
page read and write
|
||
251DC972000
|
trusted library allocation
|
page read and write
|
||
1A755690000
|
heap
|
page execute and read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
2D66E765000
|
trusted library allocation
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
986000
|
heap
|
page read and write
|
||
7FFD3480A000
|
trusted library allocation
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
1AD8D000
|
stack
|
page read and write
|
||
23B41C1C000
|
heap
|
page read and write
|
||
2398ED46000
|
trusted library allocation
|
page read and write
|
||
2D65E382000
|
heap
|
page read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page read and write
|
||
F294DCF000
|
stack
|
page read and write
|
||
1F4DA4BC000
|
trusted library allocation
|
page read and write
|
||
1A74D4E8000
|
trusted library allocation
|
page read and write
|
||
1F4CBB0B000
|
trusted library allocation
|
page read and write
|
||
1F4DA565000
|
trusted library allocation
|
page read and write
|
||
7FFD34AAD000
|
trusted library allocation
|
page read and write
|
||
7FFD34700000
|
trusted library allocation
|
page read and write
|
||
1A7558DE000
|
heap
|
page read and write
|
||
2398EE73000
|
trusted library allocation
|
page read and write
|
||
1C4AC189000
|
trusted library allocation
|
page read and write
|
||
2D66E986000
|
trusted library allocation
|
page read and write
|
||
251DC928000
|
trusted library allocation
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page execute and read and write
|
||
239A5EBE000
|
heap
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
7FFD34AE0000
|
trusted library allocation
|
page read and write
|
||
7FFD349EC000
|
trusted library allocation
|
page read and write
|
||
7FFD34821000
|
trusted library allocation
|
page read and write
|
||
2398EBA0000
|
trusted library allocation
|
page read and write
|
||
F2FE5CA000
|
stack
|
page read and write
|
||
1A73E5C5000
|
trusted library allocation
|
page read and write
|
||
7FFD349B3000
|
trusted library allocation
|
page read and write
|
||
2D65C5AA000
|
heap
|
page read and write
|
||
2CE0000
|
trusted library allocation
|
page read and write
|
||
23B41BE0000
|
heap
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page read and write
|
||
1C4A93E7000
|
heap
|
page read and write
|
||
745E28D000
|
stack
|
page read and write
|
||
7FFD34A86000
|
trusted library allocation
|
page read and write
|
||
7FFD34673000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34A8C000
|
trusted library allocation
|
page read and write
|
||
239A6115000
|
heap
|
page read and write
|
||
1C4AAE20000
|
heap
|
page read and write
|
||
23B53951000
|
trusted library allocation
|
page read and write
|
||
1A73D429000
|
trusted library allocation
|
page read and write
|
||
258424D000
|
stack
|
page read and write
|
||
7FFD34684000
|
trusted library allocation
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
1C4ACE0F000
|
trusted library allocation
|
page read and write
|
||
1C4ACE59000
|
trusted library allocation
|
page read and write
|
||
1F4E2667000
|
heap
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page read and write
|
||
2399DF0F000
|
trusted library allocation
|
page read and write
|
||
7FFD34726000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3465B000
|
trusted library allocation
|
page read and write
|
||
2D66E748000
|
trusted library allocation
|
page read and write
|
||
23B45774000
|
trusted library allocation
|
page read and write
|
||
7FFD34AB0000
|
trusted library allocation
|
page read and write
|
||
251F3280000
|
heap
|
page read and write
|
||
116D000
|
heap
|
page read and write
|
||
23B5C01E000
|
heap
|
page read and write
|
||
7FFD34880000
|
trusted library allocation
|
page read and write
|
||
7FFD348A4000
|
trusted library allocation
|
page read and write
|
||
1C01E000
|
stack
|
page read and write
|
||
1C4AC336000
|
trusted library allocation
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page read and write
|
||
7FF7720B5000
|
unkown
|
page write copy
|
||
A64D0F9000
|
stack
|
page read and write
|
||
7FFD34862000
|
trusted library allocation
|
page read and write
|
||
23B44BF2000
|
trusted library allocation
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
1C4A9310000
|
heap
|
page read and write
|
||
2D65C59C000
|
heap
|
page read and write
|
||
23B43951000
|
trusted library allocation
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page read and write
|
||
7FFD34680000
|
trusted library allocation
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
2398E959000
|
trusted library allocation
|
page read and write
|
||
23B44981000
|
trusted library allocation
|
page read and write
|
||
251D9075000
|
heap
|
page read and write
|
||
239A5F36000
|
heap
|
page read and write
|
||
1BA0E000
|
stack
|
page read and write
|
||
F2FD6F9000
|
stack
|
page read and write
|
||
1C4A93E5000
|
heap
|
page read and write
|
||
F2FD9FC000
|
stack
|
page read and write
|
||
7FFD34860000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
1C4AAE25000
|
heap
|
page read and write
|
||
1BA1D000
|
stack
|
page read and write
|
||
1A73E17C000
|
trusted library allocation
|
page read and write
|
||
7FFD34674000
|
trusted library allocation
|
page read and write
|
||
25834FE000
|
stack
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
7FFD34800000
|
trusted library allocation
|
page read and write
|
||
6BC237E000
|
stack
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34830000
|
trusted library allocation
|
page execute and read and write
|
||
239A6214000
|
heap
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page read and write
|
||
E10000
|
unkown
|
page readonly
|
||
2D65E020000
|
trusted library allocation
|
page read and write
|
||
2398E03D000
|
trusted library allocation
|
page read and write
|
||
F29618E000
|
stack
|
page read and write
|
||
7FFD349EA000
|
trusted library allocation
|
page read and write
|
||
2D65C820000
|
heap
|
page readonly
|
||
6BC24FE000
|
stack
|
page read and write
|
||
258434E000
|
stack
|
page read and write
|
||
B60000
|
unkown
|
page readonly
|
||
1A73D080000
|
trusted library allocation
|
page read and write
|
||
1BE1E000
|
stack
|
page read and write
|
||
1F4E2780000
|
heap
|
page read and write
|
||
1A73B507000
|
heap
|
page read and write
|
||
7FFD34766000
|
trusted library allocation
|
page execute and read and write
|
||
1A73B790000
|
heap
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
2CF0000
|
heap
|
page execute and read and write
|
||
2D66E767000
|
trusted library allocation
|
page read and write
|
||
7FFD346F0000
|
trusted library allocation
|
page read and write
|
||
1C4BB3CD000
|
trusted library allocation
|
page read and write
|
||
7FFD346A0000
|
trusted library allocation
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
1F4CB282000
|
trusted library allocation
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
A12000
|
unkown
|
page readonly
|
||
6BC22FE000
|
stack
|
page read and write
|
||
129F000
|
stack
|
page read and write
|
||
2399DB71000
|
trusted library allocation
|
page read and write
|
||
1A73F000000
|
trusted library allocation
|
page read and write
|
||
6BC2679000
|
stack
|
page read and write
|
||
7FF771351000
|
unkown
|
page execute read
|
||
258434C000
|
stack
|
page read and write
|
||
7FFD34900000
|
trusted library allocation
|
page read and write
|
||
1F4C860C000
|
heap
|
page read and write
|
||
1B1CE000
|
stack
|
page read and write
|
||
7FFD346DC000
|
trusted library allocation
|
page execute and read and write
|
||
2D65C5A6000
|
heap
|
page read and write
|
||
251EAB81000
|
trusted library allocation
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page read and write
|
||
239A6251000
|
heap
|
page read and write
|
||
7DF4B4E60000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
6BC2273000
|
stack
|
page read and write
|
||
7FFD34854000
|
trusted library allocation
|
page read and write
|
||
23B41B40000
|
heap
|
page read and write
|
||
127F8000
|
trusted library allocation
|
page read and write
|
||
37DA2CC000
|
stack
|
page read and write
|
||
23B41C24000
|
heap
|
page read and write
|
||
1F4CC0A3000
|
trusted library allocation
|
page read and write
|
||
A64E30E000
|
stack
|
page read and write
|
||
1A73B50D000
|
heap
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
7FF4F14A0000
|
trusted library allocation
|
page execute and read and write
|
||
D50000
|
heap
|
page read and write
|
||
1F4C8590000
|
heap
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
1175000
|
heap
|
page read and write
|
||
7FFD34811000
|
trusted library allocation
|
page read and write
|
||
251DBAEF000
|
trusted library allocation
|
page read and write
|
||
1F4E2A1B000
|
heap
|
page read and write
|
||
7FFD34831000
|
trusted library allocation
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
1A73B4DE000
|
heap
|
page read and write
|
||
7FFD34910000
|
trusted library allocation
|
page read and write
|
||
7FFD34824000
|
trusted library allocation
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
1F4E2A58000
|
heap
|
page read and write
|
||
1A73B54C000
|
heap
|
page read and write
|
||
1520000
|
heap
|
page read and write
|
||
2D65C5E5000
|
heap
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
7FFD34864000
|
trusted library allocation
|
page read and write
|
||
1F4CACD1000
|
trusted library allocation
|
page read and write
|
||
A64D4B8000
|
stack
|
page read and write
|
||
23B41BB0000
|
heap
|
page read and write
|
||
1F4E2AF0000
|
heap
|
page read and write
|
||
2398F970000
|
trusted library allocation
|
page read and write
|
||
7FFD34860000
|
trusted library allocation
|
page read and write
|
||
23B53C3B000
|
trusted library allocation
|
page read and write
|
||
2398EE12000
|
trusted library allocation
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
251D90F0000
|
heap
|
page read and write
|
||
F29517F000
|
stack
|
page read and write
|
||
12E98000
|
trusted library allocation
|
page read and write
|
||
F2FDA7F000
|
stack
|
page read and write
|
||
1C4A9720000
|
heap
|
page read and write
|
||
7FFD34644000
|
trusted library allocation
|
page read and write
|
||
2D65EEAB000
|
trusted library allocation
|
page read and write
|
||
10E2000
|
heap
|
page read and write
|
||
239A6320000
|
trusted library allocation
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
2D65E2C0000
|
heap
|
page read and write
|
||
7FFD34880000
|
trusted library allocation
|
page read and write
|
||
7FFD349C2000
|
trusted library allocation
|
page read and write
|
||
7FFD3466B000
|
trusted library allocation
|
page read and write
|
||
F294CC2000
|
stack
|
page read and write
|
||
F2FE54F000
|
stack
|
page read and write
|
||
7FFD3473C000
|
trusted library allocation
|
page execute and read and write
|
||
37D8DCE000
|
stack
|
page read and write
|
||
1A73DF87000
|
trusted library allocation
|
page read and write
|
||
7FFD34920000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
unkown
|
page readonly
|
||
23B41E40000
|
heap
|
page read and write
|
||
6BC1FDE000
|
stack
|
page read and write
|
||
2D65F7C3000
|
trusted library allocation
|
page read and write
|
||
251F2FAF000
|
heap
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
F2FE74D000
|
stack
|
page read and write
|
||
1F4C86B1000
|
heap
|
page read and write
|
||
F29527E000
|
stack
|
page read and write
|
||
D55000
|
heap
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page read and write
|
||
7FFD346AC000
|
trusted library allocation
|
page execute and read and write
|
||
1F4E2A0E000
|
heap
|
page read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page read and write
|
||
1A73B420000
|
heap
|
page read and write
|
||
7FFD349D8000
|
trusted library allocation
|
page read and write
|
||
2398D9A9000
|
heap
|
page read and write
|
||
1A73E16B000
|
trusted library allocation
|
page read and write
|
||
7FFD34AC0000
|
trusted library allocation
|
page read and write
|
||
7FFD3482A000
|
trusted library allocation
|
page read and write
|
||
1F4E2730000
|
heap
|
page execute and read and write
|
||
7FFD3470C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page read and write
|
||
23B44C53000
|
trusted library allocation
|
page read and write
|
||
37DA1C9000
|
stack
|
page read and write
|
||
7FFD34710000
|
trusted library allocation
|
page read and write
|
||
7FFD348D0000
|
trusted library allocation
|
page read and write
|
||
1F4DA2B1000
|
trusted library allocation
|
page read and write
|
||
745D07F000
|
stack
|
page read and write
|
||
F2FD8FE000
|
stack
|
page read and write
|
||
251DC43D000
|
trusted library allocation
|
page read and write
|
||
7FFD346BC000
|
trusted library allocation
|
page execute and read and write
|
||
1A73E4A8000
|
trusted library allocation
|
page read and write
|
||
1C4BB333000
|
trusted library allocation
|
page read and write
|
||
7FFD348F0000
|
trusted library allocation
|
page read and write
|
||
1525000
|
heap
|
page read and write
|
||
37D8D8F000
|
stack
|
page read and write
|
||
23B446C7000
|
trusted library allocation
|
page read and write
|
||
1A755630000
|
heap
|
page read and write
|
||
23B5BD54000
|
heap
|
page read and write
|
||
1A73DE11000
|
trusted library allocation
|
page read and write
|
||
2398DD99000
|
trusted library allocation
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
251F3180000
|
heap
|
page read and write
|
||
2D65C830000
|
trusted library allocation
|
page read and write
|
||
1F4CA281000
|
trusted library allocation
|
page read and write
|
||
7FFD349C8000
|
trusted library allocation
|
page read and write
|
||
1A73B553000
|
heap
|
page read and write
|
||
2399DE75000
|
trusted library allocation
|
page read and write
|
||
745D438000
|
stack
|
page read and write
|
||
2583377000
|
stack
|
page read and write
|
||
7FFD34AD0000
|
trusted library allocation
|
page read and write
|
||
251DC49C000
|
trusted library allocation
|
page read and write
|
||
7FFD34A30000
|
trusted library allocation
|
page read and write
|
||
1C4C385B000
|
heap
|
page read and write
|
||
7FFD34690000
|
trusted library allocation
|
page read and write
|
||
7FFD34A70000
|
trusted library allocation
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page execute and read and write
|
||
A64D3B6000
|
stack
|
page read and write
|
||
239A624F000
|
heap
|
page read and write
|
||
F2951F7000
|
stack
|
page read and write
|
||
7FFD34674000
|
trusted library allocation
|
page read and write
|
||
1185000
|
heap
|
page read and write
|
||
7FFD3466D000
|
trusted library allocation
|
page execute and read and write
|
||
1A73E981000
|
trusted library allocation
|
page read and write
|
||
7FFD34736000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD348E0000
|
trusted library allocation
|
page read and write
|
||
1C4A96F0000
|
trusted library allocation
|
page read and write
|
||
7FFD347F0000
|
trusted library allocation
|
page read and write
|
||
F29630E000
|
stack
|
page read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page read and write
|
||
1F4CBD1D000
|
trusted library allocation
|
page read and write
|
||
1C4ABDAE000
|
trusted library allocation
|
page read and write
|
||
1A73EA8D000
|
trusted library allocation
|
page read and write
|
||
7FFD34A70000
|
trusted library allocation
|
page read and write
|
||
1C4C34C4000
|
heap
|
page read and write
|
||
251F3100000
|
trusted library allocation
|
page read and write
|
||
1C4AADC0000
|
trusted library allocation
|
page read and write
|
||
251F306D000
|
heap
|
page read and write
|
||
23B41B70000
|
heap
|
page read and write
|
||
37DA04E000
|
stack
|
page read and write
|
||
1A73B795000
|
heap
|
page read and write
|
||
1C11E000
|
stack
|
page read and write
|
||
7FFD34880000
|
trusted library allocation
|
page read and write
|
||
1A73E16F000
|
trusted library allocation
|
page read and write
|
||
7DF435620000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34683000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34A8D000
|
trusted library allocation
|
page read and write
|
||
7DF4411A0000
|
trusted library allocation
|
page execute and read and write
|
||
251F3170000
|
heap
|
page execute and read and write
|
||
1F4CA2FF000
|
trusted library allocation
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
251D90B0000
|
heap
|
page read and write
|
||
2398EB15000
|
trusted library allocation
|
page read and write
|
||
7FFD34870000
|
trusted library allocation
|
page read and write
|
||
7FFD346FC000
|
trusted library allocation
|
page execute and read and write
|
||
2398F827000
|
trusted library allocation
|
page read and write
|
||
7FFD34740000
|
trusted library allocation
|
page execute and read and write
|
||
23B44A6F000
|
trusted library allocation
|
page read and write
|
||
7FFD34A4A000
|
trusted library allocation
|
page read and write
|
||
1A73B680000
|
trusted library section
|
page read and write
|
||
1F4E2AA0000
|
heap
|
page read and write
|
||
B60000
|
unkown
|
page readonly
|
||
251F33E1000
|
heap
|
page read and write
|
||
1F4C864C000
|
heap
|
page read and write
|
||
1A755540000
|
heap
|
page read and write
|
||
141E000
|
stack
|
page read and write
|
||
F2FDAFB000
|
stack
|
page read and write
|
||
239A5FC0000
|
heap
|
page execute and read and write
|
||
1C4A93EA000
|
heap
|
page read and write
|
||
251F31A0000
|
heap
|
page read and write
|
||
745CF7E000
|
stack
|
page read and write
|
||
2398DB71000
|
trusted library allocation
|
page read and write
|
||
1BA0D000
|
stack
|
page read and write
|
||
251D9002000
|
heap
|
page read and write
|
||
2398E778000
|
trusted library allocation
|
page read and write
|
||
2398C1F0000
|
heap
|
page read and write
|
||
1BC1E000
|
stack
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
7FFD34920000
|
trusted library allocation
|
page read and write
|
||
7FFD34A7A000
|
trusted library allocation
|
page read and write
|
||
251F33F0000
|
heap
|
page read and write
|
||
A64D1F9000
|
stack
|
page read and write
|
||
7FFD34810000
|
trusted library allocation
|
page read and write
|
||
23B451B6000
|
trusted library allocation
|
page read and write
|
||
1C4BB319000
|
trusted library allocation
|
page read and write
|
||
2398BE20000
|
heap
|
page read and write
|
||
2398D880000
|
heap
|
page readonly
|
||
23B4378F000
|
heap
|
page read and write
|
||
1B83A000
|
heap
|
page read and write
|
||
7FFD34822000
|
trusted library allocation
|
page read and write
|
||
F29507F000
|
stack
|
page read and write
|
||
7FFD34A6C000
|
trusted library allocation
|
page read and write
|
||
2D65E110000
|
heap
|
page execute and read and write
|
||
1A755696000
|
heap
|
page execute and read and write
|
||
7FFD34860000
|
trusted library allocation
|
page read and write
|
||
B70000
|
unkown
|
page readonly
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
6BC287E000
|
stack
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
745CFF9000
|
stack
|
page read and write
|
||
7FFD3471C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD348D0000
|
trusted library allocation
|
page read and write
|
||
1C4C3447000
|
heap
|
page execute and read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347E2000
|
trusted library allocation
|
page read and write
|
||
1F4C8608000
|
heap
|
page read and write
|
||
F294D4F000
|
stack
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page read and write
|
||
23B41C20000
|
heap
|
page read and write
|
||
23B446BE000
|
trusted library allocation
|
page read and write
|
||
7FFD34870000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34822000
|
trusted library allocation
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
2582DBE000
|
stack
|
page read and write
|
||
1C4AC982000
|
trusted library allocation
|
page read and write
|
||
251DBD27000
|
trusted library allocation
|
page read and write
|
||
7DF49A5A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34864000
|
trusted library allocation
|
page read and write
|
||
1A7558BD000
|
heap
|
page read and write
|
||
7DF426500000
|
trusted library allocation
|
page execute and read and write
|
||
1BD0E000
|
stack
|
page read and write
|
||
7FFD34810000
|
trusted library allocation
|
page execute and read and write
|
||
F2FD7FA000
|
stack
|
page read and write
|
||
7FFD3467B000
|
trusted library allocation
|
page read and write
|
||
251F33ED000
|
heap
|
page read and write
|
||
1B820000
|
heap
|
page read and write
|
||
1A73E2BD000
|
trusted library allocation
|
page read and write
|
||
1C4A9725000
|
heap
|
page read and write
|
||
1C4A93A0000
|
heap
|
page read and write
|
||
7DF441190000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD348E0000
|
trusted library allocation
|
page read and write
|
||
7FFD34650000
|
trusted library allocation
|
page read and write
|
||
7FFD348D0000
|
trusted library allocation
|
page read and write
|
||
1C4C3471000
|
heap
|
page read and write
|
||
7FFD34AD0000
|
trusted library allocation
|
page read and write
|
||
6BC26F7000
|
stack
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page read and write
|
||
F29610C000
|
stack
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
7FFD346AC000
|
trusted library allocation
|
page execute and read and write
|
||
745D4BE000
|
stack
|
page read and write
|
||
7FFD34690000
|
trusted library allocation
|
page read and write
|
||
7FFD34900000
|
trusted library allocation
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
F2956BB000
|
stack
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page execute and read and write
|
||
1C4BB051000
|
trusted library allocation
|
page read and write
|
||
251DAA50000
|
heap
|
page execute and read and write
|
||
7FFD34930000
|
trusted library allocation
|
page read and write
|
||
2D65FD37000
|
trusted library allocation
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page execute and read and write
|
||
1195000
|
heap
|
page read and write
|
||
6BC36CC000
|
stack
|
page read and write
|
||
239A6045000
|
heap
|
page read and write
|
||
F2FD878000
|
stack
|
page read and write
|
||
1C4BB061000
|
trusted library allocation
|
page read and write
|
||
7FFD349E2000
|
trusted library allocation
|
page read and write
|
||
6BC2778000
|
stack
|
page read and write
|
||
23B41C3C000
|
heap
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
745E30E000
|
stack
|
page read and write
|
||
1C4C3370000
|
heap
|
page execute and read and write
|
||
1A73D287000
|
trusted library allocation
|
page read and write
|
||
1C4C34F6000
|
heap
|
page read and write
|
||
23B5BE66000
|
heap
|
page execute and read and write
|
||
1F4E2AD0000
|
heap
|
page read and write
|
||
1C4C3450000
|
heap
|
page read and write
|
||
1A7555CC000
|
heap
|
page read and write
|
||
251DAB45000
|
heap
|
page read and write
|
||
7FFD348D0000
|
trusted library allocation
|
page read and write
|
||
A10000
|
unkown
|
page readonly
|
||
117D000
|
heap
|
page read and write
|
||
B62000
|
unkown
|
page readonly
|
||
7FFD34770000
|
trusted library allocation
|
page execute and read and write
|
||
1C4AC14F000
|
trusted library allocation
|
page read and write
|
||
37DA24E000
|
stack
|
page read and write
|
||
7FFD349A3000
|
trusted library allocation
|
page read and write
|
||
1F4C85C8000
|
heap
|
page read and write
|
||
2582CB3000
|
stack
|
page read and write
|
||
2398DBEB000
|
trusted library allocation
|
page read and write
|
||
2398EC2D000
|
trusted library allocation
|
page read and write
|
||
1C4AC7B5000
|
trusted library allocation
|
page read and write
|
||
1C4ABA84000
|
trusted library allocation
|
page read and write
|
||
23B5C09F000
|
heap
|
page read and write
|
||
7FFD349C4000
|
trusted library allocation
|
page read and write
|
||
1A73E3DC000
|
trusted library allocation
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page read and write
|
||
258327D000
|
stack
|
page read and write
|
||
1C4AC0EC000
|
trusted library allocation
|
page read and write
|
||
2D65E352000
|
heap
|
page read and write
|
||
745D2BE000
|
stack
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page execute and read and write
|
||
23B451DC000
|
trusted library allocation
|
page read and write
|
||
7FFD349D9000
|
trusted library allocation
|
page read and write
|
||
7FFD34A90000
|
trusted library allocation
|
page read and write
|
||
7FFD349B3000
|
trusted library allocation
|
page read and write
|
||
F2FE4CE000
|
stack
|
page read and write
|
||
B0E000
|
stack
|
page read and write
|
||
1F4CBB6E000
|
trusted library allocation
|
page read and write
|
||
A64D43B000
|
stack
|
page read and write
|
||
1F4CB031000
|
trusted library allocation
|
page read and write
|
||
23B41C63000
|
heap
|
page read and write
|
||
F2FD18E000
|
stack
|
page read and write
|
||
1C4C3544000
|
heap
|
page read and write
|
||
23B5BEB5000
|
heap
|
page read and write
|
||
1A7557A3000
|
heap
|
page read and write
|
||
239A6440000
|
heap
|
page read and write
|
||
202000
|
unkown
|
page readonly
|
||
6BC25FD000
|
stack
|
page read and write
|
||
1F4DA571000
|
trusted library allocation
|
page read and write
|
||
2D65E3B8000
|
heap
|
page read and write
|
||
1F4E2880000
|
trusted library allocation
|
page read and write
|
||
251D8FF8000
|
heap
|
page read and write
|
||
251F3394000
|
heap
|
page read and write
|
||
7FF772136000
|
unkown
|
page readonly
|
||
239A6139000
|
heap
|
page read and write
|
||
7FFD34862000
|
trusted library allocation
|
page read and write
|
||
7FFD349A8000
|
trusted library allocation
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
23B41E90000
|
heap
|
page read and write
|
||
1C4ACE54000
|
trusted library allocation
|
page read and write
|
||
1A73E178000
|
trusted library allocation
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page read and write
|
||
7FFD34920000
|
trusted library allocation
|
page read and write
|
||
251DBCAD000
|
trusted library allocation
|
page read and write
|
||
1F4E2654000
|
heap
|
page read and write
|
||
23B5C067000
|
heap
|
page read and write
|
||
7FF771350000
|
unkown
|
page readonly
|
||
7FFD34850000
|
trusted library allocation
|
page execute and read and write
|
||
1F4CBBCD000
|
trusted library allocation
|
page read and write
|
||
7FFD34810000
|
trusted library allocation
|
page execute and read and write
|
||
251DB8C4000
|
trusted library allocation
|
page read and write
|
||
1F4DA573000
|
trusted library allocation
|
page read and write
|
||
7FFD34736000
|
trusted library allocation
|
page read and write
|
||
3B0000
|
unkown
|
page readonly
|
||
23B43775000
|
heap
|
page read and write
|
||
1A73D6CD000
|
trusted library allocation
|
page read and write
|
||
7FFD34A50000
|
trusted library allocation
|
page read and write
|
||
127F3000
|
trusted library allocation
|
page read and write
|
||
7FFD34A80000
|
trusted library allocation
|
page read and write
|
||
1BA22000
|
heap
|
page read and write
|
||
2399DE5C000
|
trusted library allocation
|
page read and write
|
||
7FFD34802000
|
trusted library allocation
|
page read and write
|
||
1F4E26DB000
|
heap
|
page read and write
|
||
25841C6000
|
stack
|
page read and write
|
||
7FFD3465D000
|
trusted library allocation
|
page execute and read and write
|
||
1A755610000
|
heap
|
page read and write
|
||
1140000
|
trusted library allocation
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
1F4CAE84000
|
trusted library allocation
|
page read and write
|
||
7FFD34652000
|
trusted library allocation
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
1F4E29D0000
|
heap
|
page read and write
|
||
7FFD34670000
|
trusted library allocation
|
page read and write
|
||
7FFD34A50000
|
trusted library allocation
|
page read and write
|
||
7FFD3468D000
|
trusted library allocation
|
page execute and read and write
|
||
1A7557C3000
|
heap
|
page read and write
|
||
23B5C0EE000
|
heap
|
page read and write
|
||
1A75590A000
|
heap
|
page read and write
|
||
1A73F025000
|
trusted library allocation
|
page read and write
|
||
251DBC6E000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
stack
|
page read and write
|
||
7DF435610000
|
trusted library allocation
|
page execute and read and write
|
||
6F4000
|
stack
|
page read and write
|
||
F2952F8000
|
stack
|
page read and write
|
||
37D9377000
|
stack
|
page read and write
|
||
7FFD34AA6000
|
trusted library allocation
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
A64E28C000
|
stack
|
page read and write
|
||
2D66E761000
|
trusted library allocation
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34858000
|
trusted library allocation
|
page read and write
|
||
2D65E2EE000
|
heap
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
F29553E000
|
stack
|
page read and write
|
||
1C4A96C0000
|
heap
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
7FFD3483A000
|
trusted library allocation
|
page read and write
|
||
2399DBA1000
|
trusted library allocation
|
page read and write
|
||
1F4CB581000
|
trusted library allocation
|
page read and write
|
||
251D8F10000
|
heap
|
page read and write
|
||
1A73B4BE000
|
heap
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD346A0000
|
trusted library allocation
|
page read and write
|
||
F29533E000
|
stack
|
page read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page read and write
|
||
23B53971000
|
trusted library allocation
|
page read and write
|
||
251DAA00000
|
trusted library allocation
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
1A73D1F0000
|
heap
|
page execute and read and write
|
||
7FFD34653000
|
trusted library allocation
|
page execute and read and write
|
||
1C4C384A000
|
heap
|
page read and write
|
||
1C4AAE31000
|
heap
|
page read and write
|
||
239A61A1000
|
heap
|
page read and write
|
||
1F4C9FF0000
|
trusted library allocation
|
page read and write
|
||
1A73D201000
|
trusted library allocation
|
page read and write
|
||
10DF000
|
heap
|
page read and write
|
||
2D65F784000
|
trusted library allocation
|
page read and write
|
||
7FFD349B4000
|
trusted library allocation
|
page read and write
|
||
7FFD3468D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34642000
|
trusted library allocation
|
page read and write
|
||
7FFD34828000
|
trusted library allocation
|
page read and write
|
||
7FFD348F0000
|
trusted library allocation
|
page read and write
|
||
251DC2CE000
|
trusted library allocation
|
page read and write
|
||
F2FD57E000
|
stack
|
page read and write
|
||
7FFD34692000
|
trusted library allocation
|
page read and write
|
||
7FFD3496D000
|
trusted library allocation
|
page read and write
|
||
23B41BE8000
|
heap
|
page read and write
|
||
37D95FE000
|
stack
|
page read and write
|
||
1A74D231000
|
trusted library allocation
|
page read and write
|
||
A64E08E000
|
stack
|
page read and write
|
||
23B5C0DF000
|
heap
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
25832F9000
|
stack
|
page read and write
|
||
B95000
|
heap
|
page read and write
|
||
7FFD34683000
|
trusted library allocation
|
page execute and read and write
|
||
37D90FA000
|
stack
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
1F4E29E3000
|
heap
|
page read and write
|
||
7FFD347F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34910000
|
trusted library allocation
|
page read and write
|
||
25E0000
|
heap
|
page execute and read and write
|
||
1C4C3862000
|
heap
|
page read and write
|
||
1C4AC034000
|
trusted library allocation
|
page read and write
|
||
946000
|
heap
|
page read and write
|
||
239A6028000
|
heap
|
page read and write
|
||
1C4A92E0000
|
heap
|
page read and write
|
||
1192000
|
heap
|
page read and write
|
||
37D927E000
|
stack
|
page read and write
|
||
745E20C000
|
stack
|
page read and write
|
||
7FFD346F6000
|
trusted library allocation
|
page read and write
|
||
7FFD34973000
|
trusted library allocation
|
page read and write
|
||
F2954BB000
|
stack
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
7FFD34A90000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3467D000
|
trusted library allocation
|
page execute and read and write
|
||
2399DE65000
|
trusted library allocation
|
page read and write
|
||
258414E000
|
stack
|
page read and write
|
||
2398BF62000
|
heap
|
page read and write
|
||
11BF000
|
heap
|
page read and write
|
||
2398BF8D000
|
heap
|
page read and write
|
||
1219000
|
heap
|
page read and write
|
||
1A7557A0000
|
heap
|
page read and write
|
||
953000
|
heap
|
page read and write
|
||
251EAB51000
|
trusted library allocation
|
page read and write
|
||
2398F94A000
|
trusted library allocation
|
page read and write
|
||
1F4CA4A8000
|
trusted library allocation
|
page read and write
|
||
7FFD34720000
|
trusted library allocation
|
page execute and read and write
|
||
23B5BE60000
|
heap
|
page execute and read and write
|
||
2398BF90000
|
heap
|
page read and write
|
||
251F301C000
|
heap
|
page read and write
|
||
251DBB80000
|
trusted library allocation
|
page read and write
|
||
7FFD34680000
|
trusted library allocation
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page execute and read and write
|
||
251DBDF3000
|
trusted library allocation
|
page read and write
|
||
EF4000
|
stack
|
page read and write
|
||
7FFD34AF0000
|
trusted library allocation
|
page read and write
|
||
1F4CB452000
|
trusted library allocation
|
page read and write
|
||
7FFD34756000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34880000
|
trusted library allocation
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
7FFD34663000
|
trusted library allocation
|
page execute and read and write
|
||
23B44548000
|
trusted library allocation
|
page read and write
|
||
1C4C37EA000
|
heap
|
page read and write
|
||
2398EB17000
|
trusted library allocation
|
page read and write
|
||
7FFD34A33000
|
trusted library allocation
|
page read and write
|
||
F29543C000
|
stack
|
page read and write
|
||
37D907E000
|
stack
|
page read and write
|
||
2D65C845000
|
heap
|
page read and write
|
||
251DBD60000
|
trusted library allocation
|
page read and write
|
||
7FFD34643000
|
trusted library allocation
|
page execute and read and write
|
||
251D9110000
|
heap
|
page read and write
|
||
7FFD34746000
|
trusted library allocation
|
page execute and read and write
|
||
1F4E2B1A000
|
heap
|
page read and write
|
||
1C4AB000000
|
heap
|
page execute and read and write
|
||
1B300000
|
heap
|
page execute and read and write
|
||
251D902D000
|
heap
|
page read and write
|
||
1F4C8845000
|
heap
|
page read and write
|
||
745CE72000
|
stack
|
page read and write
|
||
1BF1B000
|
stack
|
page read and write
|
||
745D3BE000
|
stack
|
page read and write
|
||
1C4BB09C000
|
trusted library allocation
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
2D65C560000
|
heap
|
page read and write
|
||
1A7558B8000
|
heap
|
page read and write
|
||
1F4C8790000
|
heap
|
page read and write
|
||
7FFD34710000
|
trusted library allocation
|
page read and write
|
||
1B80C000
|
stack
|
page read and write
|
||
2D65C750000
|
heap
|
page read and write
|
||
7FFD34A90000
|
trusted library allocation
|
page read and write
|
||
1F4CB48B000
|
trusted library allocation
|
page read and write
|
||
1445000
|
heap
|
page read and write
|
||
1B8B0000
|
heap
|
page read and write
|
||
A07000
|
heap
|
page read and write
|
||
7FFD34680000
|
trusted library allocation
|
page read and write
|
||
251DAD79000
|
trusted library allocation
|
page read and write
|
||
7FFD348D0000
|
trusted library allocation
|
page read and write
|
||
7FFD34684000
|
trusted library allocation
|
page read and write
|
||
7FFD34720000
|
trusted library allocation
|
page read and write
|
||
7FFD349A2000
|
trusted library allocation
|
page read and write
|
||
1C4A93BE000
|
heap
|
page read and write
|
||
1F4DA569000
|
trusted library allocation
|
page read and write
|
||
F2FE64E000
|
stack
|
page read and write
|
||
1F4C8580000
|
heap
|
page read and write
|
||
1C4C376E000
|
heap
|
page read and write
|
||
1F4CA270000
|
heap
|
page execute and read and write
|
||
1BB1E000
|
stack
|
page read and write
|
||
7FFD34910000
|
trusted library allocation
|
page read and write
|
||
1A73DC51000
|
trusted library allocation
|
page read and write
|
||
1F4CB16F000
|
trusted library allocation
|
page read and write
|
||
7FFD34A70000
|
trusted library allocation
|
page execute and read and write
|
||
127F1000
|
trusted library allocation
|
page read and write
|
||
2D65C59E000
|
heap
|
page read and write
|
||
7FFD34664000
|
trusted library allocation
|
page read and write
|
||
23B5BCD3000
|
heap
|
page read and write
|
||
2D65E147000
|
heap
|
page read and write
|
||
1C4ACE34000
|
trusted library allocation
|
page read and write
|
||
7FFD34672000
|
trusted library allocation
|
page read and write
|
||
7FFD3468B000
|
trusted library allocation
|
page read and write
|
||
7FFD34700000
|
trusted library allocation
|
page read and write
|
||
F2FD10E000
|
stack
|
page read and write
|
||
23B5BD2D000
|
heap
|
page read and write
|
||
239A5FD0000
|
heap
|
page execute and read and write
|
||
745CEFF000
|
stack
|
page read and write
|
||
1F4CB632000
|
trusted library allocation
|
page read and write
|
||
118F000
|
heap
|
page read and write
|
||
23B4574F000
|
trusted library allocation
|
page read and write
|
||
F29628C000
|
stack
|
page read and write
|
||
251D9039000
|
heap
|
page read and write
|
||
7FFD34672000
|
trusted library allocation
|
page read and write
|
||
258357E000
|
stack
|
page read and write
|
||
745D338000
|
stack
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
258347B000
|
stack
|
page read and write
|
||
1C4C3720000
|
heap
|
page read and write
|
||
1F4DA717000
|
trusted library allocation
|
page read and write
|
||
1BF0F000
|
stack
|
page read and write
|
||
7FFD34910000
|
trusted library allocation
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page execute and read and write
|
||
1B50F000
|
stack
|
page read and write
|
||
7FFD34A60000
|
trusted library allocation
|
page read and write
|
||
1C4A939E000
|
heap
|
page read and write
|
||
7FFD349E8000
|
trusted library allocation
|
page read and write
|
||
1C4AC8C1000
|
trusted library allocation
|
page read and write
|
||
1F4CA010000
|
heap
|
page execute and read and write
|
||
7FFD34840000
|
trusted library allocation
|
page execute and read and write
|
||
1F4DA583000
|
trusted library allocation
|
page read and write
|
||
A64CD7F000
|
stack
|
page read and write
|
||
7FFD34880000
|
trusted library allocation
|
page read and write
|
||
1B1F5000
|
heap
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
1BE0E000
|
stack
|
page read and write
|
||
7FFD34994000
|
trusted library allocation
|
page read and write
|
||
7FFD34910000
|
trusted library allocation
|
page read and write
|
||
1C4AC205000
|
trusted library allocation
|
page read and write
|
||
2398D990000
|
heap
|
page read and write
|
||
7FFD34A80000
|
trusted library allocation
|
page execute and read and write
|
||
2398EB0F000
|
trusted library allocation
|
page read and write
|
||
2D65C7F0000
|
trusted library allocation
|
page read and write
|
||
23B41B50000
|
heap
|
page read and write
|
||
151F000
|
stack
|
page read and write
|
||
251DC96D000
|
trusted library allocation
|
page read and write
|
||
23B5BD79000
|
heap
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page read and write
|
||
23B5BE9A000
|
heap
|
page read and write
|
||
239A6100000
|
heap
|
page read and write
|
||
2D65E2B0000
|
heap
|
page read and write
|
||
1F4CB63C000
|
trusted library allocation
|
page read and write
|
||
2D65FD7C000
|
trusted library allocation
|
page read and write
|
||
23B4529D000
|
trusted library allocation
|
page read and write
|
||
7FFD3464D000
|
trusted library allocation
|
page execute and read and write
|
||
1C4AAD40000
|
heap
|
page readonly
|
||
7FFD3466D000
|
trusted library allocation
|
page execute and read and write
|
||
251DA980000
|
trusted library allocation
|
page read and write
|
||
251DC94D000
|
trusted library allocation
|
page read and write
|
||
37D8D0F000
|
stack
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
23B5BE50000
|
heap
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
1A74D201000
|
trusted library allocation
|
page read and write
|
||
A64E18E000
|
stack
|
page read and write
|
||
7FFD349B8000
|
trusted library allocation
|
page read and write
|
||
2D65C810000
|
trusted library allocation
|
page read and write
|
||
1C4C33D0000
|
trusted library allocation
|
page read and write
|
||
251DA9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD34766000
|
trusted library allocation
|
page execute and read and write
|
||
1B70E000
|
stack
|
page read and write
|
||
6BC28FE000
|
stack
|
page read and write
|
||
1A73E320000
|
trusted library allocation
|
page read and write
|
||
7FFD347F2000
|
trusted library allocation
|
page read and write
|
||
2398D8B0000
|
heap
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page execute and read and write
|
||
2D65E470000
|
heap
|
page execute and read and write
|
||
239A612C000
|
heap
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page read and write
|
||
1A74D4ED000
|
trusted library allocation
|
page read and write
|
||
7FFD34870000
|
trusted library allocation
|
page read and write
|
||
2D65F6DE000
|
trusted library allocation
|
page read and write
|
||
7FFD34663000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34993000
|
trusted library allocation
|
page read and write
|
||
745D63B000
|
stack
|
page read and write
|
||
7FFD34653000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34831000
|
trusted library allocation
|
page read and write
|
||
1A73B730000
|
heap
|
page read and write
|
||
23B41C67000
|
heap
|
page read and write
|
||
251F33CD000
|
heap
|
page read and write
|
||
7FF7714CD000
|
unkown
|
page write copy
|
||
F2FD082000
|
stack
|
page read and write
|
||
91C000
|
heap
|
page read and write
|
||
1C4C3487000
|
heap
|
page read and write
|
||
2D66E4E7000
|
trusted library allocation
|
page read and write
|
||
1F4C86A0000
|
heap
|
page read and write
|
||
25840CE000
|
stack
|
page read and write
|
||
1C4C3795000
|
heap
|
page read and write
|
||
A64CDFF000
|
stack
|
page read and write
|
||
1B40E000
|
stack
|
page read and write
|
||
2398F397000
|
trusted library allocation
|
page read and write
|
||
2398D8F0000
|
trusted library allocation
|
page read and write
|
||
7FFD3472C000
|
trusted library allocation
|
page execute and read and write
|
||
2398DB60000
|
heap
|
page execute and read and write
|
||
1BA18000
|
heap
|
page read and write
|
||
1C4A9710000
|
trusted library allocation
|
page read and write
|
||
1A755898000
|
heap
|
page read and write
|
||
7FFD34AD3000
|
trusted library allocation
|
page read and write
|
||
23B5BC99000
|
heap
|
page read and write
|
||
1F4E2630000
|
heap
|
page read and write
|
||
1A73E23A000
|
trusted library allocation
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
2398BF50000
|
heap
|
page read and write
|
||
6BC2579000
|
stack
|
page read and write
|
||
1A74D4F7000
|
trusted library allocation
|
page read and write
|
||
7FFD348F0000
|
trusted library allocation
|
page read and write
|
||
1F4E2AFD000
|
heap
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
F2FD1CE000
|
stack
|
page read and write
|
||
1B7C0000
|
heap
|
page execute and read and write
|
||
A64D17E000
|
stack
|
page read and write
|
||
1C4BB23F000
|
trusted library allocation
|
page read and write
|
||
2399DB91000
|
trusted library allocation
|
page read and write
|
||
6BC2A7B000
|
stack
|
page read and write
|
||
7FFD34A60000
|
trusted library allocation
|
page read and write
|
||
745E18B000
|
stack
|
page read and write
|
||
2398BF20000
|
heap
|
page read and write
|
||
1A73B6C0000
|
trusted library allocation
|
page read and write
|
||
F2FD47E000
|
stack
|
page read and write
|
||
23B43670000
|
trusted library allocation
|
page read and write
|
||
23B5C0F8000
|
heap
|
page read and write
|
||
23B5BF9B000
|
heap
|
page read and write
|
||
251F33D4000
|
heap
|
page read and write
|
||
2D65F7EA000
|
trusted library allocation
|
page read and write
|
||
7FFD34800000
|
trusted library allocation
|
page execute and read and write
|
||
239A622A000
|
heap
|
page read and write
|
||
7FFD34736000
|
trusted library allocation
|
page read and write
|
||
23B443A4000
|
trusted library allocation
|
page read and write
|
||
7FFD348F0000
|
trusted library allocation
|
page read and write
|
||
2D65E135000
|
heap
|
page read and write
|
||
7FFD346DC000
|
trusted library allocation
|
page execute and read and write
|
||
A64D2F9000
|
stack
|
page read and write
|
||
745D177000
|
stack
|
page read and write
|
||
2D65C770000
|
heap
|
page read and write
|
||
7FFD34A50000
|
trusted library allocation
|
page read and write
|
||
1F4CB9FF000
|
trusted library allocation
|
page read and write
|
||
1A73E163000
|
trusted library allocation
|
page read and write
|
||
251F3056000
|
heap
|
page read and write
|
||
37D8C83000
|
stack
|
page read and write
|
||
2399DE57000
|
trusted library allocation
|
page read and write
|
||
23B5BE9F000
|
heap
|
page read and write
|
||
23B44D0E000
|
trusted library allocation
|
page read and write
|
||
7FFD34AB0000
|
trusted library allocation
|
page read and write
|
||
7FFD34746000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34999000
|
trusted library allocation
|
page read and write
|
||
7FFD3468D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
7FFD34822000
|
trusted library allocation
|
page read and write
|
||
745D0FE000
|
stack
|
page read and write
|
||
25836FB000
|
stack
|
page read and write
|
||
1A73B735000
|
heap
|
page read and write
|
||
A10000
|
unkown
|
page readonly
|
||
AFB000
|
unkown
|
page readonly
|
||
7FFD34A40000
|
trusted library allocation
|
page read and write
|
||
7FFD34900000
|
trusted library allocation
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
7FFD348E0000
|
trusted library allocation
|
page read and write
|
||
7FFD34A80000
|
trusted library allocation
|
page read and write
|
||
1A74D221000
|
trusted library allocation
|
page read and write
|
||
251DA9C0000
|
heap
|
page read and write
|
||
7FFD34920000
|
trusted library allocation
|
page read and write
|
||
251EAB71000
|
trusted library allocation
|
page read and write
|
||
2398D870000
|
trusted library allocation
|
page read and write
|
||
7FFD34870000
|
trusted library allocation
|
page read and write
|
||
1F4CC07E000
|
trusted library allocation
|
page read and write
|
||
745E10E000
|
stack
|
page read and write
|
||
251F30B0000
|
heap
|
page execute and read and write
|
||
F296209000
|
stack
|
page read and write
|
||
2398EF31000
|
trusted library allocation
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
1F4DA2EC000
|
trusted library allocation
|
page read and write
|
||
23B451E1000
|
trusted library allocation
|
page read and write
|
||
A64D27E000
|
stack
|
page read and write
|
||
239A5EB0000
|
heap
|
page read and write
|
||
1F4C8820000
|
trusted library allocation
|
page read and write
|
||
7FFD34A40000
|
trusted library allocation
|
page read and write
|
||
7FFD34900000
|
trusted library allocation
|
page read and write
|
||
251DBE22000
|
trusted library allocation
|
page read and write
|
||
7FFD349D9000
|
trusted library allocation
|
page read and write
|
||
7FFD34670000
|
trusted library allocation
|
page read and write
|
||
F2FD97E000
|
stack
|
page read and write
|
||
7FFD3483A000
|
trusted library allocation
|
page read and write
|
||
7FFD348E0000
|
trusted library allocation
|
page read and write
|
||
2D66E490000
|
trusted library allocation
|
page read and write
|
||
1A7556C0000
|
heap
|
page read and write
|
||
7FFD3469D000
|
trusted library allocation
|
page execute and read and write
|
||
745D1FE000
|
stack
|
page read and write
|
||
7FFD34AE0000
|
trusted library allocation
|
page read and write
|
||
1C4A92F0000
|
heap
|
page read and write
|
||
7FFD34B00000
|
trusted library allocation
|
page read and write
|
||
2398E9FD000
|
trusted library allocation
|
page read and write
|
||
251EAE36000
|
trusted library allocation
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page read and write
|
||
25833F8000
|
stack
|
page read and write
|
||
26E0000
|
heap
|
page read and write
|
||
2398E5C1000
|
trusted library allocation
|
page read and write
|
||
7FFD34880000
|
trusted library allocation
|
page read and write
|
||
23B4572A000
|
trusted library allocation
|
page read and write
|
||
1C4A93A4000
|
heap
|
page read and write
|
||
251D902F000
|
heap
|
page read and write
|
||
1A73D050000
|
heap
|
page execute and read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page read and write
|
||
7FFD346DC000
|
trusted library allocation
|
page execute and read and write
|
||
23B539BD000
|
trusted library allocation
|
page read and write
|
||
23B53C36000
|
trusted library allocation
|
page read and write
|
||
239A6104000
|
heap
|
page read and write
|
||
1C4A9360000
|
heap
|
page read and write
|
||
7DF426520000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34AB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3481A000
|
trusted library allocation
|
page read and write
|
||
251DC3B4000
|
trusted library allocation
|
page read and write
|
||
251DAB51000
|
trusted library allocation
|
page read and write
|
||
1C4C3844000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
23B44955000
|
trusted library allocation
|
page read and write
|
||
251DC3DA000
|
trusted library allocation
|
page read and write
|
||
A20000
|
unkown
|
page readonly
|
||
1A73B690000
|
trusted library section
|
page read and write
|
||
23B438F0000
|
trusted library allocation
|
page read and write
|
||
1B82A000
|
heap
|
page read and write
|
||
2D65E4F4000
|
trusted library allocation
|
page read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
25835FC000
|
stack
|
page read and write
|
||
1A73B450000
|
heap
|
page read and write
|
||
1C4AB020000
|
heap
|
page read and write
|
||
7FFD34766000
|
trusted library allocation
|
page execute and read and write
|
||
251F2B5A000
|
heap
|
page read and write
|
||
1C4AC060000
|
trusted library allocation
|
page read and write
|
||
1F4E2A33000
|
heap
|
page read and write
|
||
23B41DC0000
|
trusted library allocation
|
page read and write
|
||
23B41BFE000
|
heap
|
page read and write
|
||
23B5BE90000
|
heap
|
page read and write
|
||
251EAE3B000
|
trusted library allocation
|
page read and write
|
||
2398D8B5000
|
heap
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
251DB01D000
|
trusted library allocation
|
page read and write
|
||
2398C230000
|
heap
|
page read and write
|
||
7FFD34AE0000
|
trusted library allocation
|
page read and write
|
||
1F4CB579000
|
trusted library allocation
|
page read and write
|
||
7FFD34716000
|
trusted library allocation
|
page read and write
|
||
23B5BE70000
|
heap
|
page read and write
|
||
7FFD34900000
|
trusted library allocation
|
page read and write
|
||
1A73B4CC000
|
heap
|
page read and write
|
||
12DF3000
|
trusted library allocation
|
page read and write
|
||
251DA970000
|
heap
|
page readonly
|
||
13F0000
|
heap
|
page execute and read and write
|
||
2398EB74000
|
trusted library allocation
|
page read and write
|
||
F2FD778000
|
stack
|
page read and write
|
||
23B41C2A000
|
heap
|
page read and write
|
||
2D66E481000
|
trusted library allocation
|
page read and write
|
||
2582D3D000
|
stack
|
page read and write
|
||
2398EC90000
|
trusted library allocation
|
page read and write
|
||
23B41E95000
|
heap
|
page read and write
|
||
37DA14E000
|
stack
|
page read and write
|
||
2D65C5BC000
|
heap
|
page read and write
|
||
1A73D0A7000
|
heap
|
page read and write
|
||
7FFD3467D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
23B5BD50000
|
heap
|
page read and write
|
||
1F4CC09E000
|
trusted library allocation
|
page read and write
|
||
7FFD34A70000
|
trusted library allocation
|
page read and write
|
||
7FFD34654000
|
trusted library allocation
|
page read and write
|
||
239A6020000
|
heap
|
page read and write
|
||
1C4AB031000
|
trusted library allocation
|
page read and write
|
||
23B439C3000
|
trusted library allocation
|
page read and write
|
||
2D65C7B0000
|
heap
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34860000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34650000
|
trusted library allocation
|
page read and write
|
||
2D66E621000
|
trusted library allocation
|
page read and write
|
||
251D90B5000
|
heap
|
page read and write
|
||
6BC29FE000
|
stack
|
page read and write
|
||
23B5C0E4000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
7FFD34670000
|
trusted library allocation
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
2D65FD81000
|
trusted library allocation
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
251D91C0000
|
heap
|
page read and write
|
||
1A73D090000
|
heap
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
2398BF9A000
|
heap
|
page read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page read and write
|
||
7FFD346CC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34694000
|
trusted library allocation
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page read and write
|
||
251F3177000
|
heap
|
page execute and read and write
|
||
2D65C5AC000
|
heap
|
page read and write
|
||
23B45312000
|
trusted library allocation
|
page read and write
|
||
1C4C381D000
|
heap
|
page read and write
|
||
7FFD34A4C000
|
trusted library allocation
|
page read and write
|
||
1C4C3724000
|
heap
|
page read and write
|
||
7FFD346BC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349E5000
|
trusted library allocation
|
page read and write
|
||
12DF1000
|
trusted library allocation
|
page read and write
|
||
251D9035000
|
heap
|
page read and write
|
||
258307E000
|
stack
|
page read and write
|
||
7FFD3466D000
|
trusted library allocation
|
page execute and read and write
|
||
239A5EBA000
|
heap
|
page read and write
|
||
7FFD34670000
|
trusted library allocation
|
page read and write
|
||
1A74D4EF000
|
trusted library allocation
|
page read and write
|
||
1C4AC924000
|
trusted library allocation
|
page read and write
|
||
1A73B660000
|
heap
|
page read and write
|
||
12DF8000
|
trusted library allocation
|
page read and write
|
||
251F2FA0000
|
heap
|
page read and write
|
||
6BC3547000
|
stack
|
page read and write
|
||
23B5C043000
|
heap
|
page read and write
|
||
1F4CA0E2000
|
heap
|
page read and write
|
||
1C4BB322000
|
trusted library allocation
|
page read and write
|
||
23B5BD3C000
|
heap
|
page read and write
|
||
1C4C3440000
|
heap
|
page execute and read and write
|
||
37D947D000
|
stack
|
page read and write
|
||
23B5BD4C000
|
heap
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page read and write
|
||
23B5BCD5000
|
heap
|
page read and write
|
||
251DBF11000
|
trusted library allocation
|
page read and write
|
||
7FFD34838000
|
trusted library allocation
|
page read and write
|
||
1C4C3700000
|
heap
|
page read and write
|
||
1F4C861E000
|
heap
|
page read and write
|
||
1A73E173000
|
trusted library allocation
|
page read and write
|
||
2398F994000
|
trusted library allocation
|
page read and write
|
||
2D66E78F000
|
trusted library allocation
|
page read and write
|
||
1F4CA017000
|
heap
|
page execute and read and write
|
||
37DA34E000
|
stack
|
page read and write
|
||
23B53C54000
|
trusted library allocation
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page read and write
|
||
7FFD34A60000
|
trusted library allocation
|
page read and write
|
||
1A7555A0000
|
heap
|
page read and write
|
||
1F4E2AF8000
|
heap
|
page read and write
|
||
2D65DFF0000
|
trusted library allocation
|
page read and write
|
||
2D65C670000
|
heap
|
page read and write
|
||
251F33AD000
|
heap
|
page read and write
|
||
A64D33E000
|
stack
|
page read and write
|
||
1C00C000
|
stack
|
page read and write
|
||
7FFD348F0000
|
trusted library allocation
|
page read and write
|
||
251DB5A2000
|
trusted library allocation
|
page read and write
|
||
1A73B505000
|
heap
|
page read and write
|
||
B48000
|
unkown
|
page readonly
|
||
1B37D000
|
stack
|
page read and write
|
||
37D91F7000
|
stack
|
page read and write
|
||
2D65C840000
|
heap
|
page read and write
|
||
1C4A9438000
|
heap
|
page read and write
|
||
23B41DF0000
|
heap
|
page readonly
|
||
7FFD34910000
|
trusted library allocation
|
page read and write
|
||
955000
|
heap
|
page read and write
|
||
7FFD349E2000
|
trusted library allocation
|
page read and write
|
||
1B810000
|
heap
|
page read and write
|
||
745E00E000
|
stack
|
page read and write
|
||
1F4E2788000
|
heap
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page execute and read and write
|
||
1A73F01F000
|
trusted library allocation
|
page read and write
|
||
2398D850000
|
trusted library allocation
|
page read and write
|
||
7FFD34A90000
|
trusted library allocation
|
page read and write
|
||
1F4CB39C000
|
trusted library allocation
|
page read and write
|
||
25842CC000
|
stack
|
page read and write
|
||
23B53960000
|
trusted library allocation
|
page read and write
|
||
9DB000
|
heap
|
page read and write
|
||
2D65FD99000
|
trusted library allocation
|
page read and write
|
||
251EAE3D000
|
trusted library allocation
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page read and write
|
||
7FFD34660000
|
trusted library allocation
|
page read and write
|
||
2D65F058000
|
trusted library allocation
|
page read and write
|
||
7FFD34AD0000
|
trusted library allocation
|
page read and write
|
||
251D9150000
|
heap
|
page read and write
|
||
1A73E4D8000
|
trusted library allocation
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
1F4DA6EA000
|
trusted library allocation
|
page read and write
|
||
2D65E481000
|
trusted library allocation
|
page read and write
|
||
7FFD34920000
|
trusted library allocation
|
page read and write
|
||
7FFD34670000
|
trusted library allocation
|
page read and write
|
||
23B44A0C000
|
trusted library allocation
|
page read and write
|
||
7FFD34AD0000
|
trusted library allocation
|
page read and write
|
||
F2950FA000
|
stack
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page read and write
|
||
23B44B25000
|
trusted library allocation
|
page read and write
|
||
251F3610000
|
heap
|
page read and write
|
||
23B5BF70000
|
heap
|
page read and write
|
||
6BC27F9000
|
stack
|
page read and write
|
||
23B450D0000
|
trusted library allocation
|
page read and write
|
||
7FFD349A9000
|
trusted library allocation
|
page read and write
|
||
2398BF00000
|
heap
|
page read and write
|
||
7DF49A590000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34801000
|
trusted library allocation
|
page read and write
|
||
F2FD5F9000
|
stack
|
page read and write
|
||
A64E207000
|
stack
|
page read and write
|
||
2398F3FD000
|
trusted library allocation
|
page read and write
|
||
6BC23FE000
|
stack
|
page read and write
|
||
7FFD3469B000
|
trusted library allocation
|
page read and write
|
||
25830FA000
|
stack
|
page read and write
|
||
7DF426510000
|
trusted library allocation
|
page execute and read and write
|
||
251DABD7000
|
trusted library allocation
|
page read and write
|
||
1A7555F0000
|
heap
|
page read and write
|
||
7FFD34AC0000
|
trusted library allocation
|
page read and write
|
||
1F4E2B2C000
|
heap
|
page read and write
|
||
2D66E76F000
|
trusted library allocation
|
page read and write
|
||
7FFD34AB0000
|
trusted library allocation
|
page read and write
|
||
2D65E130000
|
heap
|
page read and write
|
||
1C4AC89B000
|
trusted library allocation
|
page read and write
|
||
7FFD3469C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34AC0000
|
trusted library allocation
|
page read and write
|
||
93C000
|
heap
|
page read and write
|
||
7FFD348D0000
|
trusted library allocation
|
page read and write
|
||
2398E8ED000
|
trusted library allocation
|
page read and write
|
||
7FFD347E0000
|
trusted library allocation
|
page read and write
|
||
2398C235000
|
heap
|
page read and write
|
||
23B5BD40000
|
heap
|
page read and write
|
||
1F4C87C0000
|
heap
|
page read and write
|
||
6BC247A000
|
stack
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
1F4CBAE5000
|
trusted library allocation
|
page read and write
|
||
1F4E271F000
|
heap
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
7FFD34AC0000
|
trusted library allocation
|
page read and write
|
||
10CB000
|
heap
|
page read and write
|
||
23B41CA4000
|
heap
|
page read and write
|
||
1A755AB0000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
A64D07F000
|
stack
|
page read and write
|
||
7FFD34AB6000
|
trusted library allocation
|
page read and write
|
||
1F4E2B1F000
|
heap
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
1A74D507000
|
trusted library allocation
|
page read and write
|
||
23B53981000
|
trusted library allocation
|
page read and write
|
||
2398F98F000
|
trusted library allocation
|
page read and write
|
||
7FFD34A5C000
|
trusted library allocation
|
page read and write
|
||
7FFD34AC0000
|
trusted library allocation
|
page read and write
|
||
1A73E232000
|
trusted library allocation
|
page read and write
|
||
1C4C3710000
|
heap
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
7FFD34848000
|
trusted library allocation
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
1C4AB25A000
|
trusted library allocation
|
page read and write
|
||
37D967B000
|
stack
|
page read and write
|
||
1F4E2B0F000
|
heap
|
page read and write
|
||
7FFD34842000
|
trusted library allocation
|
page read and write
|
||
251D9190000
|
trusted library allocation
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page read and write
|
||
1A73EA27000
|
trusted library allocation
|
page read and write
|
||
F2953B8000
|
stack
|
page read and write
|
||
37D94FE000
|
stack
|
page read and write
|
||
7FFD34A90000
|
trusted library allocation
|
page read and write
|
||
251EAE55000
|
trusted library allocation
|
page read and write
|
||
1F4CB285000
|
trusted library allocation
|
page read and write
|
||
23B53C44000
|
trusted library allocation
|
page read and write
|
||
7FFD347F0000
|
trusted library allocation
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34A80000
|
trusted library allocation
|
page read and write
|
||
11BB000
|
heap
|
page read and write
|
||
7FFD347FA000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
There are 1424 hidden memdumps, click here to show them.