Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
owuP726k3d.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Windows Defender.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Windows Defender.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0nx1v3hw.fij.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_14togbwg.ute.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_342w5sga.kmf.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_41bky102.isw.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4ztbimda.0ta.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ber4toij.pl1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bqeupybr.nad.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c4jr02t4.yhf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_clxt30k0.v4n.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cmw1hgce.5hd.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ede2s5uo.ic4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gxdcoy4i.x2u.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_in3wnjfa.i20.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_twgmggrt.lw2.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y2ewjlvd.vk4.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ywleyvwn.jhl.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Defender.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sat Nov 23 19:09:12
2024, mtime=Sat Nov 23 19:09:12 2024, atime=Sat Nov 23 19:09:12 2024, length=46080, window=hide
|
dropped
|
There are 12 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\owuP726k3d.exe
|
"C:\Users\user\Desktop\owuP726k3d.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\owuP726k3d.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'owuP726k3d.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\Windows
Defender.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows
Defender.exe'
|
||
C:\Users\user\AppData\Roaming\Windows Defender.exe
|
"C:\Users\user\AppData\Roaming\Windows Defender.exe"
|
||
C:\Users\user\AppData\Roaming\Windows Defender.exe
|
"C:\Users\user\AppData\Roaming\Windows Defender.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
george-liechtenstein.gl.at.ply.gg
|
|||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://crl.m
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
https://rentry.co/8wum7vax/raw
|
172.67.75.40
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://rentry.co
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://.VisualC
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://www.microsofm/pki/certs/MicRooCerAut_2010-06-23.
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://schemas.microsoft.co
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://rentry.co
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
||
http://crl.mH
|
unknown
|
||
http://crl.micros
|
unknown
|
There are 13 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
george-liechtenstein.gl.at.ply.gg
|
147.185.221.19
|
||
rentry.co
|
172.67.75.40
|
||
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
147.185.221.19
|
george-liechtenstein.gl.at.ply.gg
|
United States
|
||
208.95.112.1
|
ip-api.com
|
United States
|
||
172.67.75.40
|
rentry.co
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\owuP726k3d_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\owuP726k3d_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\owuP726k3d_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\owuP726k3d_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\owuP726k3d_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\owuP726k3d_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\owuP726k3d_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\owuP726k3d_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\owuP726k3d_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\owuP726k3d_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\owuP726k3d_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\owuP726k3d_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\owuP726k3d_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\owuP726k3d_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Windows Defender
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2C91000
|
trusted library allocation
|
page read and write
|
||
8D2000
|
unkown
|
page readonly
|
||
278102F8000
|
trusted library allocation
|
page read and write
|
||
7FFB4AFEA000
|
trusted library allocation
|
page read and write
|
||
19499D28000
|
trusted library allocation
|
page read and write
|
||
1B1340C0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AEC7000
|
trusted library allocation
|
page read and write
|
||
194B1537000
|
heap
|
page read and write
|
||
7FFB4ACF6000
|
trusted library allocation
|
page execute and read and write
|
||
278102F0000
|
trusted library allocation
|
page read and write
|
||
1C765000
|
heap
|
page read and write
|
||
7FFB4AD30000
|
trusted library allocation
|
page execute and read and write
|
||
1B13C4DB000
|
heap
|
page read and write
|
||
19499DF4000
|
trusted library allocation
|
page read and write
|
||
251F11E0000
|
heap
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
1B13C4A7000
|
heap
|
page read and write
|
||
FE0000
|
unkown
|
page readonly
|
||
7FFB4AE80000
|
trusted library allocation
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
19499D31000
|
trusted library allocation
|
page read and write
|
||
251F0DA4000
|
heap
|
page read and write
|
||
278696BC000
|
heap
|
page read and write
|
||
7FFB4AE60000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACD6000
|
trusted library allocation
|
page execute and read and write
|
||
251F0CCD000
|
heap
|
page read and write
|
||
7FFB4AF78000
|
trusted library allocation
|
page read and write
|
||
7DF441340000
|
trusted library allocation
|
page execute and read and write
|
||
251F0CDD000
|
heap
|
page read and write
|
||
1949ABE2000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC00000
|
trusted library allocation
|
page read and write
|
||
10623FF000
|
stack
|
page read and write
|
||
1B124D4F000
|
trusted library allocation
|
page read and write
|
||
19499D20000
|
trusted library allocation
|
page read and write
|
||
1949A063000
|
trusted library allocation
|
page read and write
|
||
19496F88000
|
heap
|
page read and write
|
||
2786B7B0000
|
heap
|
page read and write
|
||
7FFB4AD90000
|
trusted library allocation
|
page read and write
|
||
F726979000
|
stack
|
page read and write
|
||
278699B0000
|
heap
|
page read and write
|
||
251F0D90000
|
heap
|
page read and write
|
||
19496F10000
|
heap
|
page read and write
|
||
1B124FAB000
|
trusted library allocation
|
page read and write
|
||
1B996000
|
heap
|
page read and write
|
||
F72774E000
|
stack
|
page read and write
|
||
251811DB000
|
trusted library allocation
|
page read and write
|
||
A955A77000
|
stack
|
page read and write
|
||
F726A7B000
|
stack
|
page read and write
|
||
25180BFA000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACB0000
|
trusted library allocation
|
page execute and read and write
|
||
194B13E8000
|
heap
|
page read and write
|
||
19497004000
|
heap
|
page read and write
|
||
7FFB4AC03000
|
trusted library allocation
|
page execute and read and write
|
||
900000
|
heap
|
page read and write
|
||
1B125BCE000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE20000
|
trusted library allocation
|
page read and write
|
||
1B952000
|
heap
|
page read and write
|
||
278000EC000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF10000
|
trusted library allocation
|
page read and write
|
||
31C0000
|
heap
|
page execute and read and write
|
||
25180A52000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACB6000
|
trusted library allocation
|
page read and write
|
||
1B124D4B000
|
trusted library allocation
|
page read and write
|
||
251F0E7B000
|
heap
|
page read and write
|
||
1B122162000
|
heap
|
page read and write
|
||
7FFB4AF44000
|
trusted library allocation
|
page read and write
|
||
7FFB4B010000
|
trusted library allocation
|
page read and write
|
||
1B1220A0000
|
heap
|
page read and write
|
||
1B93F000
|
stack
|
page read and write
|
||
25180F6F000
|
trusted library allocation
|
page read and write
|
||
278102EE000
|
trusted library allocation
|
page read and write
|
||
251EEDF0000
|
trusted library allocation
|
page read and write
|
||
A956A0A000
|
stack
|
page read and write
|
||
251EEE35000
|
heap
|
page read and write
|
||
B89D4FF000
|
stack
|
page read and write
|
||
27801E27000
|
trusted library allocation
|
page read and write
|
||
7FFB4B030000
|
trusted library allocation
|
page read and write
|
||
278010BE000
|
trusted library allocation
|
page read and write
|
||
7FFB4AEA0000
|
trusted library allocation
|
page read and write
|
||
19496FBD000
|
heap
|
page read and write
|
||
1B13C256000
|
heap
|
page execute and read and write
|
||
2786B190000
|
heap
|
page execute and read and write
|
||
251F0870000
|
heap
|
page execute and read and write
|
||
25181063000
|
trusted library allocation
|
page read and write
|
||
1B9E7000
|
heap
|
page read and write
|
||
278697C0000
|
heap
|
page read and write
|
||
1061F79000
|
stack
|
page read and write
|
||
1C32C000
|
stack
|
page read and write
|
||
1061B13000
|
stack
|
page read and write
|
||
27801306000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE90000
|
trusted library allocation
|
page read and write
|
||
12C91000
|
trusted library allocation
|
page read and write
|
||
19496FDD000
|
heap
|
page read and write
|
||
1949A629000
|
trusted library allocation
|
page read and write
|
||
194B13D4000
|
heap
|
page read and write
|
||
7FFB4AE00000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACD6000
|
trusted library allocation
|
page execute and read and write
|
||
1B1224C5000
|
heap
|
page read and write
|
||
251EEC30000
|
heap
|
page read and write
|
||
7FFB4AF60000
|
trusted library allocation
|
page read and write
|
||
1B13C524000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
2D70000
|
trusted library allocation
|
page read and write
|
||
DEB000
|
heap
|
page read and write
|
||
1B1E0000
|
heap
|
page read and write
|
||
7FFB4ACA6000
|
trusted library allocation
|
page read and write
|
||
19499EDF000
|
trusted library allocation
|
page read and write
|
||
B89E5CC000
|
stack
|
page read and write
|
||
A955BBE000
|
stack
|
page read and write
|
||
27801E2C000
|
trusted library allocation
|
page read and write
|
||
251F06D0000
|
heap
|
page read and write
|
||
2786B9E4000
|
heap
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
2786BA63000
|
heap
|
page read and write
|
||
2DFB000
|
trusted library allocation
|
page read and write
|
||
194B155B000
|
heap
|
page read and write
|
||
7FFB4AC14000
|
trusted library allocation
|
page read and write
|
||
1C42A000
|
stack
|
page read and write
|
||
194A90BA000
|
trusted library allocation
|
page read and write
|
||
1063047000
|
stack
|
page read and write
|
||
7FFB4AE30000
|
trusted library allocation
|
page read and write
|
||
7DF4E5270000
|
trusted library allocation
|
page execute and read and write
|
||
2786B6B0000
|
heap
|
page read and write
|
||
251F0D9D000
|
heap
|
page read and write
|
||
1B124D53000
|
trusted library allocation
|
page read and write
|
||
27800DB7000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC30000
|
trusted library allocation
|
page read and write
|
||
251902F0000
|
trusted library allocation
|
page read and write
|
||
27800001000
|
trusted library allocation
|
page read and write
|
||
251F0C98000
|
heap
|
page read and write
|
||
194B14B4000
|
heap
|
page read and write
|
||
7FFB4AD30000
|
trusted library allocation
|
page execute and read and write
|
||
2D4A000
|
trusted library allocation
|
page read and write
|
||
1061EFF000
|
stack
|
page read and write
|
||
180F000
|
stack
|
page read and write
|
||
9E4000
|
heap
|
page read and write
|
||
1B13C183000
|
heap
|
page read and write
|
||
7FFB4ACAC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4ADF0000
|
trusted library allocation
|
page read and write
|
||
1B13C161000
|
heap
|
page read and write
|
||
2786B197000
|
heap
|
page execute and read and write
|
||
18F0000
|
heap
|
page read and write
|
||
7FFB4AE50000
|
trusted library allocation
|
page read and write
|
||
27801121000
|
trusted library allocation
|
page read and write
|
||
2780188D000
|
trusted library allocation
|
page read and write
|
||
7FFB4B06D000
|
trusted library allocation
|
page read and write
|
||
7FFB4ABF2000
|
trusted library allocation
|
page read and write
|
||
1061FFE000
|
stack
|
page read and write
|
||
7DF437A70000
|
trusted library allocation
|
page execute and read and write
|
||
5E0000
|
heap
|
page read and write
|
||
1C95F000
|
stack
|
page read and write
|
||
1B3EF000
|
stack
|
page read and write
|
||
1B13C389000
|
heap
|
page read and write
|
||
1C625000
|
stack
|
page read and write
|
||
7FFB4ADA1000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF20000
|
trusted library allocation
|
page read and write
|
||
251F0CB5000
|
heap
|
page read and write
|
||
251F05E0000
|
trusted library allocation
|
page read and write
|
||
251F0CD1000
|
heap
|
page read and write
|
||
1B13C3FA000
|
heap
|
page read and write
|
||
25181038000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF00000
|
trusted library allocation
|
page read and write
|
||
1B8B0000
|
heap
|
page read and write
|
||
27810031000
|
trusted library allocation
|
page read and write
|
||
1062178000
|
stack
|
page read and write
|
||
D10000
|
trusted library allocation
|
page read and write
|
||
1B124F76000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACB0000
|
trusted library allocation
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
2786B010000
|
trusted library allocation
|
page read and write
|
||
2786AFD0000
|
heap
|
page read and write
|
||
19498B40000
|
heap
|
page execute and read and write
|
||
19499F97000
|
trusted library allocation
|
page read and write
|
||
2786B090000
|
heap
|
page read and write
|
||
7FFB4B060000
|
trusted library allocation
|
page read and write
|
||
2CF1000
|
trusted library allocation
|
page read and write
|
||
1B123DC0000
|
heap
|
page execute and read and write
|
||
251F06D5000
|
heap
|
page read and write
|
||
1B125BEE000
|
trusted library allocation
|
page read and write
|
||
2D87000
|
trusted library allocation
|
page read and write
|
||
7FFB4AD10000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AF70000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC00000
|
trusted library allocation
|
page read and write
|
||
A955F3B000
|
stack
|
page read and write
|
||
19496FCB000
|
heap
|
page read and write
|
||
7FFB4AF00000
|
trusted library allocation
|
page read and write
|
||
F726313000
|
stack
|
page read and write
|
||
2786B9BF000
|
heap
|
page read and write
|
||
B89DA7E000
|
stack
|
page read and write
|
||
25190001000
|
trusted library allocation
|
page read and write
|
||
2786B77C000
|
heap
|
page read and write
|
||
25180F80000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE88000
|
trusted library allocation
|
page read and write
|
||
1BF8D000
|
stack
|
page read and write
|
||
1B1220C0000
|
heap
|
page read and write
|
||
2D98000
|
trusted library allocation
|
page read and write
|
||
7FFB4ADE2000
|
trusted library allocation
|
page read and write
|
||
1B124D46000
|
trusted library allocation
|
page read and write
|
||
278695E2000
|
heap
|
page read and write
|
||
106314E000
|
stack
|
page read and write
|
||
27800D7A000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC00000
|
trusted library allocation
|
page read and write
|
||
1B12429E000
|
trusted library allocation
|
page read and write
|
||
19497200000
|
trusted library allocation
|
page read and write
|
||
251810BF000
|
trusted library allocation
|
page read and write
|
||
F726AF7000
|
stack
|
page read and write
|
||
F727847000
|
stack
|
page read and write
|
||
1C76D000
|
heap
|
page read and write
|
||
7FFB4ADE8000
|
trusted library allocation
|
page read and write
|
||
251F0EE4000
|
heap
|
page read and write
|
||
25181869000
|
trusted library allocation
|
page read and write
|
||
1B133DE0000
|
trusted library allocation
|
page read and write
|
||
7DF43DC50000
|
trusted library allocation
|
page execute and read and write
|
||
1B12222D000
|
heap
|
page read and write
|
||
1B89F000
|
unkown
|
page read and write
|
||
251F0C16000
|
heap
|
page read and write
|
||
950000
|
trusted library allocation
|
page read and write
|
||
194B156C000
|
heap
|
page read and write
|
||
27801957000
|
trusted library allocation
|
page read and write
|
||
251F0C10000
|
heap
|
page read and write
|
||
194B119C000
|
heap
|
page read and write
|
||
F72667E000
|
stack
|
page read and write
|
||
1B124825000
|
trusted library allocation
|
page read and write
|
||
7FFB4AEB0000
|
trusted library allocation
|
page read and write
|
||
194B12F0000
|
heap
|
page read and write
|
||
A955EBE000
|
stack
|
page read and write
|
||
B89D9FE000
|
stack
|
page read and write
|
||
194B11ED000
|
heap
|
page read and write
|
||
1BD8E000
|
stack
|
page read and write
|
||
7FFB4ADC1000
|
trusted library allocation
|
page read and write
|
||
A95698C000
|
stack
|
page read and write
|
||
7FFB4B040000
|
trusted library allocation
|
page read and write
|
||
194B14BA000
|
heap
|
page read and write
|
||
F726CFE000
|
stack
|
page read and write
|
||
27869657000
|
heap
|
page read and write
|
||
1B123AE0000
|
trusted library allocation
|
page read and write
|
||
106247E000
|
stack
|
page read and write
|
||
251F0F91000
|
heap
|
page read and write
|
||
7FFB4ADD0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AEE0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AEF0000
|
trusted library allocation
|
page read and write
|
||
2786B6FD000
|
heap
|
page read and write
|
||
1062079000
|
stack
|
page read and write
|
||
13243000
|
trusted library allocation
|
page read and write
|
||
2786B6D1000
|
heap
|
page read and write
|
||
7FFB4ADE8000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC10000
|
trusted library allocation
|
page read and write
|
||
194B1100000
|
heap
|
page read and write
|
||
251EECD5000
|
heap
|
page read and write
|
||
A955E3E000
|
stack
|
page read and write
|
||
1B123AF0000
|
heap
|
page readonly
|
||
7FFB4AF10000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC04000
|
trusted library allocation
|
page read and write
|
||
7FFB4ABFD000
|
trusted library allocation
|
page execute and read and write
|
||
251F08C0000
|
heap
|
page read and write
|
||
2D75000
|
trusted library allocation
|
page read and write
|
||
25181951000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACA0000
|
trusted library allocation
|
page read and write
|
||
7FFB4ADD0000
|
trusted library allocation
|
page execute and read and write
|
||
A955979000
|
stack
|
page read and write
|
||
8F1000
|
stack
|
page read and write
|
||
251EECEE000
|
heap
|
page read and write
|
||
251F08B0000
|
trusted library allocation
|
page read and write
|
||
7FFB4ADF2000
|
trusted library allocation
|
page read and write
|
||
2DC6000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF52000
|
trusted library allocation
|
page read and write
|
||
A955C37000
|
stack
|
page read and write
|
||
7FFB4ACCC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AC02000
|
trusted library allocation
|
page read and write
|
||
DCC000
|
heap
|
page read and write
|
||
251F0FB2000
|
heap
|
page read and write
|
||
1B10D000
|
stack
|
page read and write
|
||
251F0CC9000
|
heap
|
page read and write
|
||
251F0E90000
|
heap
|
page read and write
|
||
2786B040000
|
heap
|
page readonly
|
||
1BF3F000
|
stack
|
page read and write
|
||
7FFB4AC6C000
|
trusted library allocation
|
page execute and read and write
|
||
2D43000
|
trusted library allocation
|
page read and write
|
||
2786962D000
|
heap
|
page read and write
|
||
12731000
|
trusted library allocation
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
7FFB4B057000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF10000
|
trusted library allocation
|
page read and write
|
||
1B125BA9000
|
trusted library allocation
|
page read and write
|
||
194B14E9000
|
heap
|
page read and write
|
||
A24000
|
heap
|
page read and write
|
||
7FFB4AF6C000
|
trusted library allocation
|
page read and write
|
||
251EEB30000
|
heap
|
page read and write
|
||
251F0EC6000
|
heap
|
page read and write
|
||
7FFB4ACA0000
|
trusted library allocation
|
page read and write
|
||
1B123BD0000
|
heap
|
page read and write
|
||
194A90CA000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACB0000
|
trusted library allocation
|
page read and write
|
||
1CC7E000
|
stack
|
page read and write
|
||
2786B9E0000
|
heap
|
page read and write
|
||
27869615000
|
heap
|
page read and write
|
||
7FFB4AE50000
|
trusted library allocation
|
page read and write
|
||
2786BA81000
|
heap
|
page read and write
|
||
251EEDD0000
|
trusted library allocation
|
page read and write
|
||
10624FB000
|
stack
|
page read and write
|
||
1B74E000
|
stack
|
page read and write
|
||
B89E74C000
|
stack
|
page read and write
|
||
27801210000
|
trusted library allocation
|
page read and write
|
||
7FFB4ADE4000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF62000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACCF000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AFFC000
|
trusted library allocation
|
page read and write
|
||
1BA2C000
|
heap
|
page read and write
|
||
7FFB4ADD4000
|
trusted library allocation
|
page read and write
|
||
1CE7F000
|
stack
|
page read and write
|
||
1B13C3C8000
|
heap
|
page read and write
|
||
251902F2000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC13000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AE50000
|
trusted library allocation
|
page read and write
|
||
278695D0000
|
heap
|
page read and write
|
||
2660000
|
heap
|
page execute and read and write
|
||
D40000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE40000
|
trusted library allocation
|
page read and write
|
||
194B13D0000
|
heap
|
page read and write
|
||
1CB5E000
|
stack
|
page read and write
|
||
25181E27000
|
trusted library allocation
|
page read and write
|
||
194B1760000
|
heap
|
page read and write
|
||
25190072000
|
trusted library allocation
|
page read and write
|
||
194B1559000
|
heap
|
page read and write
|
||
7FFB4AF20000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF70000
|
trusted library allocation
|
page read and write
|
||
1B124D3E000
|
trusted library allocation
|
page read and write
|
||
1B13C3C4000
|
heap
|
page read and write
|
||
1B1250A9000
|
trusted library allocation
|
page read and write
|
||
1B123B00000
|
trusted library allocation
|
page read and write
|
||
A79000
|
heap
|
page read and write
|
||
251F06E2000
|
heap
|
page read and write
|
||
7FFB4AF50000
|
trusted library allocation
|
page read and write
|
||
7DF43DC40000
|
trusted library allocation
|
page execute and read and write
|
||
1331000
|
stack
|
page read and write
|
||
E2C000
|
heap
|
page read and write
|
||
194971B0000
|
trusted library allocation
|
page read and write
|
||
1B13C380000
|
heap
|
page read and write
|
||
251F0CC5000
|
heap
|
page read and write
|
||
251F0D70000
|
heap
|
page read and write
|
||
7FFB4ABF4000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC5C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AF20000
|
trusted library allocation
|
page read and write
|
||
7FFB4B060000
|
trusted library allocation
|
page read and write
|
||
27869613000
|
heap
|
page read and write
|
||
7FFB4B070000
|
trusted library allocation
|
page read and write
|
||
2780186E000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC4C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B080000
|
trusted library allocation
|
page read and write
|
||
194A90AB000
|
trusted library allocation
|
page read and write
|
||
251EEC10000
|
heap
|
page read and write
|
||
194B1554000
|
heap
|
page read and write
|
||
1B1249D8000
|
trusted library allocation
|
page read and write
|
||
251F0F95000
|
heap
|
page read and write
|
||
7FFB4AC10000
|
trusted library allocation
|
page read and write
|
||
19496FCD000
|
heap
|
page read and write
|
||
27801955000
|
trusted library allocation
|
page read and write
|
||
7FFB4B040000
|
trusted library allocation
|
page read and write
|
||
DC6000
|
heap
|
page read and write
|
||
251F0F08000
|
heap
|
page read and write
|
||
1B1249E2000
|
trusted library allocation
|
page read and write
|
||
25180F73000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC24000
|
trusted library allocation
|
page read and write
|
||
A956B0D000
|
stack
|
page read and write
|
||
7FFB4AEF0000
|
trusted library allocation
|
page read and write
|
||
1B13C3C0000
|
heap
|
page read and write
|
||
194B1150000
|
heap
|
page read and write
|
||
19498FE9000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACB6000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE30000
|
trusted library allocation
|
page read and write
|
||
B89D7F9000
|
stack
|
page read and write
|
||
7FFB4AF54000
|
trusted library allocation
|
page read and write
|
||
1B13C250000
|
heap
|
page execute and read and write
|
||
27810021000
|
trusted library allocation
|
page read and write
|
||
19497006000
|
heap
|
page read and write
|
||
1062F4C000
|
stack
|
page read and write
|
||
7FFB4AF01000
|
trusted library allocation
|
page read and write
|
||
7FFB4B060000
|
trusted library allocation
|
page read and write
|
||
278102F6000
|
trusted library allocation
|
page read and write
|
||
19499813000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC10000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE40000
|
trusted library allocation
|
page read and write
|
||
A9555FE000
|
stack
|
page read and write
|
||
27869655000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
7FFB4AF23000
|
trusted library allocation
|
page read and write
|
||
25190031000
|
trusted library allocation
|
page read and write
|
||
7FFB4ADB0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF58000
|
trusted library allocation
|
page read and write
|
||
251EEDE0000
|
heap
|
page readonly
|
||
1CF7E000
|
stack
|
page read and write
|
||
7FFB4AD20000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AE80000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC20000
|
trusted library allocation
|
page read and write
|
||
1B13413A000
|
trusted library allocation
|
page read and write
|
||
278697E0000
|
heap
|
page read and write
|
||
7DF441330000
|
trusted library allocation
|
page execute and read and write
|
||
12733000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF20000
|
trusted library allocation
|
page read and write
|
||
1B13C110000
|
heap
|
page read and write
|
||
7FFB4B08F000
|
trusted library allocation
|
page read and write
|
||
251EECF4000
|
heap
|
page read and write
|
||
1B64E000
|
stack
|
page read and write
|
||
7FFB4AEA0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC10000
|
trusted library allocation
|
page read and write
|
||
2786BA40000
|
heap
|
page read and write
|
||
B89D97B000
|
stack
|
page read and write
|
||
7FFB4B000000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE80000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC00000
|
trusted library allocation
|
page read and write
|
||
F72639E000
|
stack
|
page read and write
|
||
19498E47000
|
trusted library allocation
|
page read and write
|
||
7FFB4B066000
|
trusted library allocation
|
page read and write
|
||
7FFB4AD90000
|
trusted library allocation
|
page read and write
|
||
1B1221D8000
|
heap
|
page read and write
|
||
7FFB4AD10000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AC2D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF4131F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B000000
|
trusted library allocation
|
page read and write
|
||
251F1004000
|
heap
|
page read and write
|
||
7FFB4ADC0000
|
trusted library allocation
|
page execute and read and write
|
||
1470000
|
heap
|
page read and write
|
||
7FFB4AC0B000
|
trusted library allocation
|
page read and write
|
||
194B12C0000
|
heap
|
page execute and read and write
|
||
7FFB4B070000
|
trusted library allocation
|
page read and write
|
||
D95000
|
heap
|
page read and write
|
||
7FFB4AD20000
|
trusted library allocation
|
page execute and read and write
|
||
A9559FE000
|
stack
|
page read and write
|
||
194999CF000
|
trusted library allocation
|
page read and write
|
||
251F0660000
|
heap
|
page execute and read and write
|
||
7FFB4AE50000
|
trusted library allocation
|
page read and write
|
||
1B1221D3000
|
heap
|
page read and write
|
||
D43000
|
trusted library allocation
|
page read and write
|
||
251EECF0000
|
heap
|
page read and write
|
||
1949AB9D000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
7FFB4AF33000
|
trusted library allocation
|
page read and write
|
||
251804CD000
|
trusted library allocation
|
page read and write
|
||
7FFB4AEC0000
|
trusted library allocation
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
1B13C5A0000
|
trusted library allocation
|
page read and write
|
||
251818F2000
|
trusted library allocation
|
page read and write
|
||
1B124D36000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACD6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AF90000
|
trusted library allocation
|
page read and write
|
||
7FFB4B050000
|
trusted library allocation
|
page read and write
|
||
7FFB4ABF4000
|
trusted library allocation
|
page read and write
|
||
149D000
|
heap
|
page read and write
|
||
1B125635000
|
trusted library allocation
|
page read and write
|
||
25180F6B000
|
trusted library allocation
|
page read and write
|
||
27801006000
|
trusted library allocation
|
page read and write
|
||
1B124D42000
|
trusted library allocation
|
page read and write
|
||
2786BA1E000
|
heap
|
page read and write
|
||
7FFB4AEB0000
|
trusted library allocation
|
page read and write
|
||
1B13C3BC000
|
heap
|
page read and write
|
||
278011D7000
|
trusted library allocation
|
page read and write
|
||
1B122100000
|
heap
|
page read and write
|
||
A956A89000
|
stack
|
page read and write
|
||
7FFB4AD90000
|
trusted library allocation
|
page read and write
|
||
7FFB4ADF0000
|
trusted library allocation
|
page execute and read and write
|
||
194B14DB000
|
heap
|
page read and write
|
||
27810071000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF70000
|
trusted library allocation
|
page read and write
|
||
2519030A000
|
trusted library allocation
|
page read and write
|
||
278013C3000
|
trusted library allocation
|
page read and write
|
||
7FFB4ADB0000
|
trusted library allocation
|
page execute and read and write
|
||
B89E64E000
|
stack
|
page read and write
|
||
251EEDA9000
|
heap
|
page read and write
|
||
25180F77000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF54000
|
trusted library allocation
|
page read and write
|
||
2731000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE70000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF64000
|
trusted library allocation
|
page read and write
|
||
25181E22000
|
trusted library allocation
|
page read and write
|
||
1B13C3D4000
|
heap
|
page read and write
|
||
7FFB4AF70000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF5C000
|
trusted library allocation
|
page read and write
|
||
1B54B000
|
stack
|
page read and write
|
||
1B1340BB000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF80000
|
trusted library allocation
|
page read and write
|
||
27800DE3000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC1B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AC6C000
|
trusted library allocation
|
page execute and read and write
|
||
1B133DD1000
|
trusted library allocation
|
page read and write
|
||
1B1224C0000
|
heap
|
page read and write
|
||
CF1000
|
stack
|
page read and write
|
||
7FFB4ADF8000
|
trusted library allocation
|
page read and write
|
||
194B156A000
|
heap
|
page read and write
|
||
B89E54E000
|
stack
|
page read and write
|
||
B89D6F9000
|
stack
|
page read and write
|
||
7FFB4ADC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4ABF4000
|
trusted library allocation
|
page read and write
|
||
1BA29000
|
heap
|
page read and write
|
||
7FFB4B040000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC5C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AEC0000
|
trusted library allocation
|
page read and write
|
||
12C9E000
|
trusted library allocation
|
page read and write
|
||
7FFB4AD92000
|
trusted library allocation
|
page read and write
|
||
1B1256BE000
|
trusted library allocation
|
page read and write
|
||
2786BA83000
|
heap
|
page read and write
|
||
1061E7F000
|
stack
|
page read and write
|
||
1B13C4E9000
|
heap
|
page read and write
|
||
9F9000
|
heap
|
page read and write
|
||
7FFB4ADE2000
|
trusted library allocation
|
page read and write
|
||
251EED36000
|
heap
|
page read and write
|
||
7FFB4ABFD000
|
trusted library allocation
|
page execute and read and write
|
||
27810494000
|
trusted library allocation
|
page read and write
|
||
27800D71000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC02000
|
trusted library allocation
|
page read and write
|
||
1B13C1D3000
|
heap
|
page read and write
|
||
25181E02000
|
trusted library allocation
|
page read and write
|
||
E39000
|
heap
|
page read and write
|
||
7FFB4AF72000
|
trusted library allocation
|
page read and write
|
||
3241000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE30000
|
trusted library allocation
|
page read and write
|
||
27800F9D000
|
trusted library allocation
|
page read and write
|
||
F726BFE000
|
stack
|
page read and write
|
||
1B13C1FE000
|
heap
|
page read and write
|
||
B89DB7B000
|
stack
|
page read and write
|
||
1B124D3A000
|
trusted library allocation
|
page read and write
|
||
19498DC1000
|
trusted library allocation
|
page read and write
|
||
251813C7000
|
trusted library allocation
|
page read and write
|
||
1BC8E000
|
stack
|
page read and write
|
||
25180BEE000
|
trusted library allocation
|
page read and write
|
||
970000
|
trusted library allocation
|
page read and write
|
||
2A8E000
|
stack
|
page read and write
|
||
7FFB4ACB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AF30000
|
trusted library allocation
|
page read and write
|
||
1420000
|
trusted library allocation
|
page read and write
|
||
27869619000
|
heap
|
page read and write
|
||
251F0FED000
|
heap
|
page read and write
|
||
1B13C511000
|
heap
|
page read and write
|
||
1949A181000
|
trusted library allocation
|
page read and write
|
||
1C12B000
|
stack
|
page read and write
|
||
251F0D60000
|
heap
|
page execute and read and write
|
||
1B13C414000
|
heap
|
page read and write
|
||
B89D77D000
|
stack
|
page read and write
|
||
1B950000
|
heap
|
page read and write
|
||
1B1250DC000
|
trusted library allocation
|
page read and write
|
||
2786960B000
|
heap
|
page read and write
|
||
2786B6C3000
|
heap
|
page read and write
|
||
A32000
|
heap
|
page read and write
|
||
194B1412000
|
heap
|
page read and write
|
||
7FFB4ADBA000
|
trusted library allocation
|
page read and write
|
||
1B124E8D000
|
trusted library allocation
|
page read and write
|
||
1C225000
|
stack
|
page read and write
|
||
7FFB4AC00000
|
trusted library allocation
|
page read and write
|
||
251F0FDB000
|
heap
|
page read and write
|
||
7FFB4AC03000
|
trusted library allocation
|
page execute and read and write
|
||
194B14D3000
|
heap
|
page read and write
|
||
25180228000
|
trusted library allocation
|
page read and write
|
||
1C76B000
|
heap
|
page read and write
|
||
278699B5000
|
heap
|
page read and write
|
||
A26000
|
heap
|
page read and write
|
||
2780003B000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF6A000
|
trusted library allocation
|
page read and write
|
||
B89DAFF000
|
stack
|
page read and write
|
||
7DF437A60000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AF59000
|
trusted library allocation
|
page read and write
|
||
7FFB4B040000
|
trusted library allocation
|
page read and write
|
||
7FFB4ABF0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE00000
|
trusted library allocation
|
page read and write
|
||
7FFB4AED0000
|
trusted library allocation
|
page read and write
|
||
19496FBF000
|
heap
|
page read and write
|
||
25181DDD000
|
trusted library allocation
|
page read and write
|
||
19498B90000
|
trusted library allocation
|
page read and write
|
||
1350000
|
heap
|
page execute and read and write
|
||
7FFB4ACA6000
|
trusted library allocation
|
page read and write
|
||
251F0FE3000
|
heap
|
page read and write
|
||
7FFB4B070000
|
trusted library allocation
|
page read and write
|
||
194B11E1000
|
heap
|
page read and write
|
||
1B1249D4000
|
trusted library allocation
|
page read and write
|
||
2D2F000
|
trusted library allocation
|
page read and write
|
||
194999C5000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF10000
|
trusted library allocation
|
page read and write
|
||
F726D7B000
|
stack
|
page read and write
|
||
1949A6B2000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC2B000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF65000
|
trusted library allocation
|
page read and write
|
||
1B13C6C0000
|
heap
|
page read and write
|
||
1B12571D000
|
trusted library allocation
|
page read and write
|
||
1B123BD5000
|
heap
|
page read and write
|
||
1CD7A000
|
stack
|
page read and write
|
||
27810308000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC04000
|
trusted library allocation
|
page read and write
|
||
25181784000
|
trusted library allocation
|
page read and write
|
||
1C528000
|
stack
|
page read and write
|
||
7FFB4AEB0000
|
trusted library allocation
|
page read and write
|
||
251EECC2000
|
heap
|
page read and write
|
||
1B122243000
|
heap
|
page read and write
|
||
194971C0000
|
heap
|
page readonly
|
||
106237E000
|
stack
|
page read and write
|
||
251F0D67000
|
heap
|
page execute and read and write
|
||
7FFB4AED0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC1D000
|
trusted library allocation
|
page execute and read and write
|
||
19496F20000
|
heap
|
page read and write
|
||
19499D24000
|
trusted library allocation
|
page read and write
|
||
B89D8F8000
|
stack
|
page read and write
|
||
7FFB4B030000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AF90000
|
trusted library allocation
|
page read and write
|
||
5B5000
|
heap
|
page read and write
|
||
7FFB4AE70000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC20000
|
trusted library allocation
|
page read and write
|
||
9E7000
|
heap
|
page read and write
|
||
7FFB4ACAC000
|
trusted library allocation
|
page execute and read and write
|
||
B89D183000
|
stack
|
page read and write
|
||
2D33000
|
trusted library allocation
|
page read and write
|
||
F7268FD000
|
stack
|
page read and write
|
||
F7266FF000
|
stack
|
page read and write
|
||
194A90B2000
|
trusted library allocation
|
page read and write
|
||
1B124EF0000
|
trusted library allocation
|
page read and write
|
||
10621F7000
|
stack
|
page read and write
|
||
7FFB4B020000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACBC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4ADE0000
|
trusted library allocation
|
page execute and read and write
|
||
1B125BF3000
|
trusted library allocation
|
page read and write
|
||
251F0610000
|
trusted library allocation
|
page read and write
|
||
7FFB4B050000
|
trusted library allocation
|
page read and write
|
||
7FFB4AEA0000
|
trusted library allocation
|
page read and write
|
||
1062ECE000
|
stack
|
page read and write
|
||
7FFB4ABF0000
|
trusted library allocation
|
page read and write
|
||
13248000
|
trusted library allocation
|
page read and write
|
||
19498BF0000
|
heap
|
page read and write
|
||
A955B79000
|
stack
|
page read and write
|
||
7FFB4B05D000
|
trusted library allocation
|
page read and write
|
||
251EEDA5000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
27801DE2000
|
trusted library allocation
|
page read and write
|
||
251EEE30000
|
heap
|
page read and write
|
||
19499D2C000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE20000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF6C000
|
trusted library allocation
|
page read and write
|
||
251EED0E000
|
heap
|
page read and write
|
||
7FFB4ACF6000
|
trusted library allocation
|
page execute and read and write
|
||
1B123BB0000
|
heap
|
page read and write
|
||
7FFB4B010000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF90000
|
trusted library allocation
|
page read and write
|
||
19497009000
|
heap
|
page read and write
|
||
19497270000
|
heap
|
page read and write
|
||
1949ABC2000
|
trusted library allocation
|
page read and write
|
||
25180F66000
|
trusted library allocation
|
page read and write
|
||
7FFB4ADE0000
|
trusted library allocation
|
page execute and read and write
|
||
F7278CC000
|
stack
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
7FFB4AF59000
|
trusted library allocation
|
page read and write
|
||
7FFB4B010000
|
trusted library allocation
|
page read and write
|
||
2786BA5E000
|
heap
|
page read and write
|
||
9FC000
|
heap
|
page read and write
|
||
251811A9000
|
trusted library allocation
|
page read and write
|
||
7FFB4ABF3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AE40000
|
trusted library allocation
|
page read and write
|
||
D30000
|
trusted library allocation
|
page read and write
|
||
194B13DC000
|
heap
|
page read and write
|
||
7FFB4AE10000
|
trusted library allocation
|
page read and write
|
||
7FFB4AFA0000
|
trusted library allocation
|
page read and write
|
||
1B133E01000
|
trusted library allocation
|
page read and write
|
||
251EEDB0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE10000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACE6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AC20000
|
trusted library allocation
|
page read and write
|
||
1B122192000
|
heap
|
page read and write
|
||
1949A0C4000
|
trusted library allocation
|
page read and write
|
||
1B84E000
|
stack
|
page read and write
|
||
7FFB4ADF4000
|
trusted library allocation
|
page read and write
|
||
2786B711000
|
heap
|
page read and write
|
||
1062FCE000
|
stack
|
page read and write
|
||
7FFB4AED0000
|
trusted library allocation
|
page read and write
|
||
1B123FFB000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC02000
|
trusted library allocation
|
page read and write
|
||
10620FE000
|
stack
|
page read and write
|
||
2786BAD0000
|
trusted library allocation
|
page read and write
|
||
25180001000
|
trusted library allocation
|
page read and write
|
||
2DC0000
|
trusted library allocation
|
page read and write
|
||
1B12218C000
|
heap
|
page read and write
|
||
194A912E000
|
trusted library allocation
|
page read and write
|
||
1B13C280000
|
heap
|
page read and write
|
||
7FFB4AF68000
|
trusted library allocation
|
page read and write
|
||
F7267FF000
|
stack
|
page read and write
|
||
F726779000
|
stack
|
page read and write
|
||
19498B10000
|
heap
|
page read and write
|
||
A9558FF000
|
stack
|
page read and write
|
||
1BBD0000
|
heap
|
page execute and read and write
|
||
7FFB4ADA0000
|
trusted library allocation
|
page execute and read and write
|
||
2786B8D0000
|
heap
|
page read and write
|
||
7FFB4AF80000
|
trusted library allocation
|
page read and write
|
||
19499D3D000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE80000
|
trusted library allocation
|
page read and write
|
||
7FFB4B010000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC22000
|
trusted library allocation
|
page read and write
|
||
1B123BEF000
|
heap
|
page read and write
|
||
1C73D000
|
heap
|
page read and write
|
||
1705000
|
heap
|
page read and write
|
||
1949A156000
|
trusted library allocation
|
page read and write
|
||
2786B050000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF30000
|
trusted library allocation
|
page read and write
|
||
7DF4E5260000
|
trusted library allocation
|
page execute and read and write
|
||
16FE000
|
stack
|
page read and write
|
||
1061B9E000
|
stack
|
page read and write
|
||
1B13C1E3000
|
heap
|
page read and write
|
||
7FFB4ACA0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AD28000
|
trusted library allocation
|
page execute and read and write
|
||
1B124D79000
|
trusted library allocation
|
page read and write
|
||
2786B240000
|
heap
|
page execute and read and write
|
||
25180C11000
|
trusted library allocation
|
page read and write
|
||
251F0D03000
|
heap
|
page read and write
|
||
7FFB4AC4C000
|
trusted library allocation
|
page execute and read and write
|
||
C8F000
|
stack
|
page read and write
|
||
7FFB4ADD2000
|
trusted library allocation
|
page read and write
|
||
7FFB4AEF0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE00000
|
trusted library allocation
|
page execute and read and write
|
||
278695D9000
|
heap
|
page read and write
|
||
1B13C4B6000
|
heap
|
page read and write
|
||
2D3F000
|
trusted library allocation
|
page read and write
|
||
19497190000
|
trusted library allocation
|
page read and write
|
||
251F0D99000
|
heap
|
page read and write
|
||
2720000
|
heap
|
page execute and read and write
|
||
1B13C51E000
|
heap
|
page read and write
|
||
7FFB4AEE0000
|
trusted library allocation
|
page read and write
|
||
1B2EE000
|
stack
|
page read and write
|
||
19498DB0000
|
heap
|
page execute and read and write
|
||
7FFB4AE20000
|
trusted library allocation
|
page read and write
|
||
7FFB4B046000
|
trusted library allocation
|
page read and write
|
||
12738000
|
trusted library allocation
|
page read and write
|
||
7FFB4ADC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4ADA2000
|
trusted library allocation
|
page read and write
|
||
251F0E70000
|
heap
|
page read and write
|
||
1B123E56000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACBC000
|
trusted library allocation
|
page execute and read and write
|
||
2786961D000
|
heap
|
page read and write
|
||
1B125550000
|
trusted library allocation
|
page read and write
|
||
1BE8E000
|
stack
|
page read and write
|
||
19498C08000
|
heap
|
page read and write
|
||
7FFB4ACC6000
|
trusted library allocation
|
page read and write
|
||
7FFB4AEE0000
|
trusted library allocation
|
page read and write
|
||
1B133DF1000
|
trusted library allocation
|
page read and write
|
||
1949A711000
|
trusted library allocation
|
page read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
7FFB4AEF0000
|
trusted library allocation
|
page read and write
|
||
7FFB4ADB2000
|
trusted library allocation
|
page read and write
|
||
27800086000
|
trusted library allocation
|
page read and write
|
||
1B12572E000
|
trusted library allocation
|
page read and write
|
||
1B1221AC000
|
heap
|
page read and write
|
||
13241000
|
trusted library allocation
|
page read and write
|
||
1B123DD1000
|
trusted library allocation
|
page read and write
|
||
2786B130000
|
heap
|
page read and write
|
||
7FFB4AE90000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC1B000
|
trusted library allocation
|
page read and write
|
||
1C03E000
|
stack
|
page read and write
|
||
194B14DE000
|
heap
|
page read and write
|
||
1B0FE000
|
stack
|
page read and write
|
||
7FFB4AF40000
|
trusted library allocation
|
page read and write
|
||
1ACC0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE60000
|
trusted library allocation
|
page read and write
|
||
2786B7D0000
|
heap
|
page read and write
|
||
2786960F000
|
heap
|
page read and write
|
||
251EED3B000
|
heap
|
page read and write
|
||
149B000
|
heap
|
page read and write
|
||
7FFB4AEC0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE90000
|
trusted library allocation
|
page read and write
|
||
7FFB4B04D000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
194B13E0000
|
heap
|
page read and write
|
||
1B13C3CC000
|
heap
|
page read and write
|
||
2786BAE0000
|
heap
|
page read and write
|
||
1AC90000
|
trusted library allocation
|
page read and write
|
||
2786BA70000
|
heap
|
page read and write
|
||
7FFB4AFE0000
|
trusted library allocation
|
page read and write
|
||
2786B8B0000
|
heap
|
page execute and read and write
|
||
194B13E4000
|
heap
|
page read and write
|
||
27810001000
|
trusted library allocation
|
page read and write
|
||
194A8DC1000
|
trusted library allocation
|
page read and write
|
||
1949928D000
|
trusted library allocation
|
page read and write
|
||
7FFB4ADB0000
|
trusted library allocation
|
page read and write
|
||
10630CC000
|
stack
|
page read and write
|
||
E32000
|
heap
|
page read and write
|
||
25181214000
|
trusted library allocation
|
page read and write
|
||
194B13D8000
|
heap
|
page read and write
|
||
7FFB4B060000
|
trusted library allocation
|
page read and write
|
||
251812A8000
|
trusted library allocation
|
page read and write
|
||
1949A64F000
|
trusted library allocation
|
page read and write
|
||
1B124E09000
|
trusted library allocation
|
page read and write
|
||
1B13C4A2000
|
heap
|
page read and write
|
||
7FFB4AFF0000
|
trusted library allocation
|
page read and write
|
||
194B12C7000
|
heap
|
page execute and read and write
|
||
2786B74E000
|
heap
|
page read and write
|
||
1B1340C9000
|
trusted library allocation
|
page read and write
|
||
278004CD000
|
trusted library allocation
|
page read and write
|
||
1061BDE000
|
stack
|
page read and write
|
||
D53000
|
heap
|
page read and write
|
||
7FFB4AF7C000
|
trusted library allocation
|
page read and write
|
||
A955CB8000
|
stack
|
page read and write
|
||
A955AFD000
|
stack
|
page read and write
|
||
18F5000
|
heap
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
7FFB4AF49000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC10000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF68000
|
trusted library allocation
|
page read and write
|
||
12C98000
|
trusted library allocation
|
page read and write
|
||
194B1147000
|
heap
|
page read and write
|
||
7FFB4AED0000
|
trusted library allocation
|
page read and write
|
||
7FFB4ADA0000
|
trusted library allocation
|
page read and write
|
||
A955D39000
|
stack
|
page read and write
|
||
1B122120000
|
trusted library section
|
page read and write
|
||
7FFB4B080000
|
trusted library allocation
|
page read and write
|
||
1B125719000
|
trusted library allocation
|
page read and write
|
||
194B151E000
|
heap
|
page read and write
|
||
B89D67E000
|
stack
|
page read and write
|
||
7FFB4B030000
|
trusted library allocation
|
page execute and read and write
|
||
19499B3B000
|
trusted library allocation
|
page read and write
|
||
1B12515A000
|
trusted library allocation
|
page read and write
|
||
2786B135000
|
heap
|
page read and write
|
||
7FFB4AD10000
|
trusted library allocation
|
page execute and read and write
|
||
19499D35000
|
trusted library allocation
|
page read and write
|
||
273F000
|
trusted library allocation
|
page read and write
|
||
7FFB4ABFD000
|
trusted library allocation
|
page execute and read and write
|
||
194B11D0000
|
heap
|
page read and write
|
||
145E000
|
heap
|
page read and write
|
||
7FFB4AF30000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE60000
|
trusted library allocation
|
page read and write
|
||
194A8E32000
|
trusted library allocation
|
page read and write
|
||
251F0FD1000
|
heap
|
page read and write
|
||
7FFB4AC30000
|
trusted library allocation
|
page read and write
|
||
278696E0000
|
heap
|
page read and write
|
||
2518188F000
|
trusted library allocation
|
page read and write
|
||
1B13C230000
|
heap
|
page execute and read and write
|
||
1C720000
|
heap
|
page read and write
|
||
7FFB4AC0D000
|
trusted library allocation
|
page execute and read and write
|
||
2741000
|
trusted library allocation
|
page read and write
|
||
7FFB4AFFC000
|
trusted library allocation
|
page read and write
|
||
F7269F7000
|
stack
|
page read and write
|
||
194B155D000
|
heap
|
page read and write
|
||
B89D5FA000
|
stack
|
page read and write
|
||
7FFB4AF40000
|
trusted library allocation
|
page read and write
|
||
1B13C45E000
|
heap
|
page read and write
|
||
19496F80000
|
heap
|
page read and write
|
||
1949ABE7000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE90000
|
trusted library allocation
|
page read and write
|
||
2786B030000
|
trusted library allocation
|
page read and write
|
||
1949A543000
|
trusted library allocation
|
page read and write
|
||
8DE000
|
unkown
|
page readonly
|
||
7FFB4ACE6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B080000
|
trusted library allocation
|
page read and write
|
||
2786BA91000
|
heap
|
page read and write
|
||
1B13C4BA000
|
heap
|
page read and write
|
||
7FFB4AF69000
|
trusted library allocation
|
page read and write
|
||
1B1340D9000
|
trusted library allocation
|
page read and write
|
||
F726B7E000
|
stack
|
page read and write
|
||
7FFB4AD26000
|
trusted library allocation
|
page execute and read and write
|
||
2CFA000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE30000
|
trusted library allocation
|
page read and write
|
||
251EED00000
|
heap
|
page read and write
|
||
7FFB4AF60000
|
trusted library allocation
|
page read and write
|
||
19497275000
|
heap
|
page read and write
|
||
7FFB4ADB1000
|
trusted library allocation
|
page read and write
|
||
27801788000
|
trusted library allocation
|
page read and write
|
||
1375000
|
heap
|
page read and write
|
||
7FFB4AE10000
|
trusted library allocation
|
page read and write
|
||
7FFB4AEA0000
|
trusted library allocation
|
page read and write
|
||
A95587E000
|
stack
|
page read and write
|
||
12CA1000
|
trusted library allocation
|
page read and write
|
||
A955573000
|
stack
|
page read and write
|
||
7FFB4AFF3000
|
trusted library allocation
|
page read and write
|
||
7FFB4AFF0000
|
trusted library allocation
|
page read and write
|
||
1B122130000
|
trusted library section
|
page read and write
|
||
1B7CD000
|
stack
|
page read and write
|
||
1502000
|
heap
|
page read and write
|
||
B89D1CE000
|
stack
|
page read and write
|
||
1B122150000
|
heap
|
page read and write
|
||
7FFB4B030000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AC0D000
|
trusted library allocation
|
page execute and read and write
|
||
F7263DE000
|
stack
|
page read and write
|
||
7FFB4AEB0000
|
trusted library allocation
|
page read and write
|
||
F72794B000
|
stack
|
page read and write
|
||
7FFB4AC1D000
|
trusted library allocation
|
page execute and read and write
|
||
1B122140000
|
trusted library allocation
|
page read and write
|
||
2786960D000
|
heap
|
page read and write
|
||
7FFB4B020000
|
trusted library allocation
|
page execute and read and write
|
||
D90000
|
heap
|
page read and write
|
||
E02000
|
heap
|
page read and write
|
||
7FFB4AC12000
|
trusted library allocation
|
page read and write
|
||
1B1249D0000
|
trusted library allocation
|
page read and write
|
||
1C76F000
|
heap
|
page read and write
|
||
1B123B70000
|
trusted library allocation
|
page read and write
|
||
2786B25F000
|
heap
|
page read and write
|
||
194A8DF1000
|
trusted library allocation
|
page read and write
|
||
7FFB4AEE5000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC1D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AF43000
|
trusted library allocation
|
page read and write
|
||
F7277CE000
|
stack
|
page read and write
|
||
251F0D09000
|
heap
|
page read and write
|
||
2CFE000
|
trusted library allocation
|
page read and write
|
||
A956B8E000
|
stack
|
page read and write
|
||
27800229000
|
trusted library allocation
|
page read and write
|
||
9EF000
|
heap
|
page read and write
|
||
27801E07000
|
trusted library allocation
|
page read and write
|
||
1B13C4C2000
|
heap
|
page read and write
|
||
7FFB4B026000
|
trusted library allocation
|
page read and write
|
||
25190021000
|
trusted library allocation
|
page read and write
|
||
1B1249D2000
|
trusted library allocation
|
page read and write
|
||
7DF4E5250000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AF33000
|
trusted library allocation
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
1B13C453000
|
heap
|
page read and write
|
||
A955DBE000
|
stack
|
page read and write
|
||
7FFB4ADE4000
|
trusted library allocation
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
1B13C517000
|
heap
|
page read and write
|
||
1466000
|
heap
|
page read and write
|
||
1B125198000
|
trusted library allocation
|
page read and write
|
||
7FFB4B020000
|
trusted library allocation
|
page read and write
|
||
1BC30000
|
heap
|
page read and write
|
||
7FFB4AFFA000
|
trusted library allocation
|
page read and write
|
||
B89E7CE000
|
stack
|
page read and write
|
||
106227C000
|
stack
|
page read and write
|
||
319E000
|
stack
|
page read and write
|
||
1B133E42000
|
trusted library allocation
|
page read and write
|
||
19496F40000
|
heap
|
page read and write
|
||
1700000
|
heap
|
page read and write
|
||
251F0CD5000
|
heap
|
page read and write
|
||
F726C7C000
|
stack
|
page read and write
|
||
1B125079000
|
trusted library allocation
|
page read and write
|
||
194B1495000
|
heap
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
7FFB4AE40000
|
trusted library allocation
|
page read and write
|
||
194A90B0000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACD0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4ADB1000
|
trusted library allocation
|
page read and write
|
||
7FFB4ADAA000
|
trusted library allocation
|
page read and write
|
||
F726879000
|
stack
|
page read and write
|
||
1B122090000
|
heap
|
page read and write
|
||
7FFB4AF60000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC0D000
|
trusted library allocation
|
page execute and read and write
|
||
27800A52000
|
trusted library allocation
|
page read and write
|
||
143C000
|
heap
|
page read and write
|
||
7FFB4B000000
|
trusted library allocation
|
page read and write
|
||
1BE3E000
|
stack
|
page read and write
|
||
10622F9000
|
stack
|
page read and write
|
||
B89D877000
|
stack
|
page read and write
|
||
B89D57E000
|
stack
|
page read and write
|
||
7FFB4AC1B000
|
trusted library allocation
|
page read and write
|
||
7FFB4ADB0000
|
trusted library allocation
|
page execute and read and write
|
||
251EECB0000
|
heap
|
page read and write
|
||
D8F000
|
stack
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
25181250000
|
trusted library allocation
|
page read and write
|
||
19499E7C000
|
trusted library allocation
|
page read and write
|
||
7FFB4B050000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE10000
|
trusted library allocation
|
page read and write
|
||
9C8000
|
heap
|
page read and write
|
||
25180087000
|
trusted library allocation
|
page read and write
|
||
1B8F0000
|
heap
|
page read and write
|
||
7FFB4AC13000
|
trusted library allocation
|
page execute and read and write
|
||
194B13EC000
|
heap
|
page read and write
|
||
7FFB4AC10000
|
trusted library allocation
|
page read and write
|
||
1ACBD000
|
stack
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
7FFB4AEC0000
|
trusted library allocation
|
page read and write
|
||
19497150000
|
heap
|
page read and write
|
||
7FFB4ACC0000
|
trusted library allocation
|
page read and write
|
||
278012A5000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC0D000
|
trusted library allocation
|
page execute and read and write
|
||
5C0000
|
heap
|
page read and write
|
||
7FFB4AF50000
|
trusted library allocation
|
page read and write
|
||
1B13C3D0000
|
heap
|
page read and write
|
||
7FFB4ADF0000
|
trusted library allocation
|
page execute and read and write
|
||
2786B709000
|
heap
|
page read and write
|
||
2786B0D0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF80000
|
trusted library allocation
|
page read and write
|
||
1820000
|
trusted library allocation
|
page read and write
|
||
1CB60000
|
heap
|
page execute and read and write
|
||
7FFB4AE00000
|
trusted library allocation
|
page read and write
|
||
7FFB4B070000
|
trusted library allocation
|
page read and write
|
||
251EEC70000
|
heap
|
page read and write
|
||
194A8DE1000
|
trusted library allocation
|
page read and write
|
||
1B13C4CF000
|
heap
|
page read and write
|
||
7FFB4AC4C000
|
trusted library allocation
|
page execute and read and write
|
||
1B12565B000
|
trusted library allocation
|
page read and write
|
||
194B118D000
|
heap
|
page read and write
|
||
145C000
|
heap
|
page read and write
|
||
27801894000
|
trusted library allocation
|
page read and write
|
||
2786B961000
|
heap
|
page read and write
|
||
7FFB4AE70000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC14000
|
trusted library allocation
|
page read and write
|
||
14F2000
|
heap
|
page read and write
|
||
7FFB4ACC0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF00000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE60000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE70000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC04000
|
trusted library allocation
|
page read and write
|
||
7FFB4B01C000
|
trusted library allocation
|
page read and write
|
||
1B1252EA000
|
trusted library allocation
|
page read and write
|
||
1B123B30000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE20000
|
trusted library allocation
|
page read and write
|
||
1B123BDA000
|
heap
|
page read and write
|
||
1472000
|
heap
|
page read and write
|
||
2C80000
|
heap
|
page execute and read and write
|
||
2518130B000
|
trusted library allocation
|
page read and write
|
||
B89E6C7000
|
stack
|
page read and write
|
||
25181036000
|
trusted library allocation
|
page read and write
|
||
7FFB4ADD0000
|
trusted library allocation
|
page execute and read and write
|
||
5B0000
|
heap
|
page read and write
|
||
278102EA000
|
trusted library allocation
|
page read and write
|
||
25181123000
|
trusted library allocation
|
page read and write
|
||
A85000
|
heap
|
page read and write
|
||
19499D46000
|
trusted library allocation
|
page read and write
|
||
D95000
|
heap
|
page read and write
|
||
7FFB4AC14000
|
trusted library allocation
|
page read and write
|
||
7FFB4ADD8000
|
trusted library allocation
|
page read and write
|
||
E2E000
|
heap
|
page read and write
|
||
251902EB000
|
trusted library allocation
|
page read and write
|
||
251F0F32000
|
heap
|
page read and write
|
||
19496FC9000
|
heap
|
page read and write
|
||
1B122158000
|
heap
|
page read and write
|
||
2786965A000
|
heap
|
page read and write
|
||
E8B000
|
heap
|
page read and write
|
||
7FFB4ADC0000
|
trusted library allocation
|
page read and write
|
||
8D0000
|
unkown
|
page readonly
|
||
2786B70F000
|
heap
|
page read and write
|
||
27801032000
|
trusted library allocation
|
page read and write
|
||
7FFB4ABF3000
|
trusted library allocation
|
page execute and read and write
|
||
1BD3E000
|
stack
|
page read and write
|
||
251EECFE000
|
heap
|
page read and write
|
||
7FFB4ABF3000
|
trusted library allocation
|
page execute and read and write
|
||
194971D0000
|
trusted library allocation
|
page read and write
|
||
2D4D000
|
trusted library allocation
|
page read and write
|
||
7FFB4B088000
|
trusted library allocation
|
page read and write
|
||
2D02000
|
trusted library allocation
|
page read and write
|
||
19497240000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF80000
|
trusted library allocation
|
page read and write
|
||
A95690E000
|
stack
|
page read and write
|
||
19498BF5000
|
heap
|
page read and write
|
||
19499D39000
|
trusted library allocation
|
page read and write
|
||
1B124F7C000
|
trusted library allocation
|
page read and write
|
||
2518115E000
|
trusted library allocation
|
page read and write
|
||
B89D47D000
|
stack
|
page read and write
|
||
7FFB4ADCA000
|
trusted library allocation
|
page read and write
|
||
263E000
|
stack
|
page read and write
|
||
7FFB4ADBA000
|
trusted library allocation
|
page read and write
|
||
1B13C39C000
|
heap
|
page read and write
|
There are 1029 hidden memdumps, click here to show them.