Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
KvS2rT08PQ.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\ANDYzz-protected.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Umbral.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\svchost.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\KvS2rT08PQ.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Umbral.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Roaming\app
|
Unicode text, UTF-8 (with BOM) text, with no line terminators
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\KvS2rT08PQ.exe
|
"C:\Users\user\Desktop\KvS2rT08PQ.exe"
|
||
C:\Users\user\AppData\Local\Temp\Umbral.exe
|
"C:\Users\user\AppData\Local\Temp\Umbral.exe"
|
||
C:\Users\user\AppData\Local\Temp\svchost.exe
|
"C:\Users\user\AppData\Local\Temp\svchost.exe"
|
||
C:\Users\user\AppData\Local\Temp\ANDYzz-protected.exe
|
"C:\Users\user\AppData\Local\Temp\ANDYzz-protected.exe"
|
||
C:\Windows\SysWOW64\netsh.exe
|
netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\svchost.exe" "svchost.exe" ENABLE
|
||
C:\Windows\SysWOW64\netsh.exe
|
netsh firewall delete allowedprogram "C:\Users\user\AppData\Local\Temp\svchost.exe"
|
||
C:\Windows\SysWOW64\netsh.exe
|
netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\svchost.exe" "svchost.exe" ENABLE
|
||
C:\Windows\System32\wbem\WMIC.exe
|
"wmic.exe" csproduct get uuid
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 2 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://discord.com/api/webhooks/1225910337656590376/EwVP3wlMQgDXxoBxwLhaflFWF2WGja-17Tz3uwtoNirVyl9iU_nVCUsOrUJN46JTk-_-
|
|||
https://discord.com/api/webhooks/1225910337656590376/EwVP3wlMQgDXxoBxwLhaflFWF2WGja-17Tz3uwtoNirVyl9
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://www.fontbureau.com
|
unknown
|
||
http://www.fontbureau.com/designersG
|
unknown
|
||
https://discord.com/api/v10/users/
|
unknown
|
||
http://www.fontbureau.com/designers/?
|
unknown
|
||
http://www.founder.com.cn/cn/bThe
|
unknown
|
||
https://keyauth.win
|
unknown
|
||
http://schemas.datacontract.org/2004/07/
|
unknown
|
||
http://microsoft.co
|
unknown
|
||
http://www.fontbureau.com/designers?
|
unknown
|
||
https://discordapp.com/api/v9/users/
|
unknown
|
||
http://www.tiro.com
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
http://www.goodfont.co.kr
|
unknown
|
||
http://www.carterandcone.coml
|
unknown
|
||
http://www.sajatypeworks.com
|
unknown
|
||
http://www.typography.netD
|
unknown
|
||
http://schemas.datacontract.org/2004/07/tWQFFgygASaEccWKmNiVdEXnTMYHruQoFGGxlHMVsnlabuZvwozniMWOZDMT
|
unknown
|
||
http://www.fontbureau.com/designers/cabarga.htmlN
|
unknown
|
||
http://www.founder.com.cn/cn/cThe
|
unknown
|
||
http://www.galapagosdesign.com/staff/dennis.htm
|
unknown
|
||
https://github.com/Blank-c/Umbral-Stealer
|
unknown
|
||
http://www.founder.com.cn/cn
|
unknown
|
||
http://www.fontbureau.com/designers/frere-user.html
|
unknown
|
||
https://gunaframework.com/api/licensing.php
|
unknown
|
||
http://www.jiyu-kobo.co.jp/
|
unknown
|
||
http://ip-api.com
|
unknown
|
||
http://www.galapagosdesign.com/DPlease
|
unknown
|
||
http://www.fontbureau.com/designers8
|
unknown
|
||
http://www.fonts.com
|
unknown
|
||
http://www.sandoll.co.kr
|
unknown
|
||
https://gunaui.com/api/licensing.php
|
unknown
|
||
http://www.urwpp.deDPlease
|
unknown
|
||
http://www.zhongyicts.com.cn
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.sakkal.com
|
unknown
|
||
https://gunaui.com/
|
unknown
|
||
https://gunaui.com/pricing
|
unknown
|
||
http://ip-api.com/json/?fields=225545
|
unknown
|
||
https://keyauth.win/api/1.0/
|
104.26.0.5
|
||
http://ip-api.com/line/?fields=hostingI7AB5C494-39F5-4941-9163-47F54D6D5016I032E02B4-0499-05C3-0806-
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
There are 34 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
0.tcp.eu.ngrok.io
|
18.158.249.75
|
||
keyauth.win
|
104.26.0.5
|
||
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
3.125.223.134
|
unknown
|
United States
|
||
3.125.209.94
|
unknown
|
United States
|
||
3.124.142.205
|
unknown
|
United States
|
||
18.158.249.75
|
0.tcp.eu.ngrok.io
|
United States
|
||
208.95.112.1
|
ip-api.com
|
United States
|
||
104.26.0.5
|
keyauth.win
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Environment
|
SEE_MASK_NOZONECHECKS
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ANDYzz-protected_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ANDYzz-protected_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ANDYzz-protected_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ANDYzz-protected_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ANDYzz-protected_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ANDYzz-protected_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ANDYzz-protected_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ANDYzz-protected_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ANDYzz-protected_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ANDYzz-protected_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ANDYzz-protected_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ANDYzz-protected_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ANDYzz-protected_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ANDYzz-protected_RASMANCS
|
FileDirectory
|
There are 19 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
253F8F32000
|
unkown
|
page readonly
|
||
191C3C81000
|
trusted library allocation
|
page read and write
|
||
2791000
|
trusted library allocation
|
page read and write
|
||
E02000
|
unkown
|
page readonly
|
||
191C1C92000
|
unkown
|
page readonly
|
||
191DC700000
|
trusted library section
|
page read and write
|
||
3A91000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
A3B000
|
heap
|
page read and write
|
||
14D3000
|
heap
|
page read and write
|
||
37B7000
|
heap
|
page read and write
|
||
253F90D0000
|
heap
|
page read and write
|
||
2282AF7E000
|
heap
|
page read and write
|
||
37AB000
|
heap
|
page read and write
|
||
191C44D6000
|
trusted library allocation
|
page read and write
|
||
379D000
|
heap
|
page read and write
|
||
B67000
|
heap
|
page read and write
|
||
A3F000
|
heap
|
page read and write
|
||
B9E000
|
heap
|
page read and write
|
||
191C41BB000
|
trusted library allocation
|
page read and write
|
||
191C4106000
|
trusted library allocation
|
page read and write
|
||
191C4411000
|
trusted library allocation
|
page read and write
|
||
A4C000
|
heap
|
page read and write
|
||
2282AF91000
|
heap
|
page read and write
|
||
191C1BE0000
|
unkown
|
page execute and read and write
|
||
381E000
|
heap
|
page read and write
|
||
5450000
|
heap
|
page read and write
|
||
E14E6FE000
|
stack
|
page read and write
|
||
14A5000
|
heap
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
C0E000
|
stack
|
page read and write
|
||
191DF939000
|
trusted library allocation
|
page read and write
|
||
191C4414000
|
trusted library allocation
|
page read and write
|
||
37FF000
|
heap
|
page read and write
|
||
37B0000
|
heap
|
page read and write
|
||
191C3C70000
|
heap
|
page execute and read and write
|
||
2282AF91000
|
heap
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
5160000
|
heap
|
page read and write
|
||
2282CF84000
|
heap
|
page read and write
|
||
191C20AD000
|
heap
|
page read and write
|
||
191DBCB0000
|
trusted library allocation
|
page read and write
|
||
A05000
|
heap
|
page read and write
|
||
783000
|
stack
|
page read and write
|
||
2282B1D5000
|
heap
|
page read and write
|
||
191C3AFB000
|
heap
|
page read and write
|
||
33C0000
|
trusted library allocation
|
page read and write
|
||
2282AF91000
|
heap
|
page read and write
|
||
AB1000
|
heap
|
page read and write
|
||
253FB552000
|
heap
|
page read and write
|
||
2282B1F2000
|
heap
|
page read and write
|
||
3BCB000
|
trusted library allocation
|
page read and write
|
||
2282AF82000
|
heap
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
E14E73E000
|
stack
|
page read and write
|
||
191C4278000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
B42000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
59BE000
|
heap
|
page read and write
|
||
3785000
|
heap
|
page read and write
|
||
5CC0000
|
trusted library allocation
|
page execute and read and write
|
||
AB9000
|
heap
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
BE3000
|
heap
|
page read and write
|
||
373F000
|
stack
|
page read and write
|
||
191C444A000
|
trusted library allocation
|
page read and write
|
||
253800DC000
|
trusted library allocation
|
page read and write
|
||
37A7000
|
heap
|
page read and write
|
||
191C43C8000
|
trusted library allocation
|
page read and write
|
||
E14F27D000
|
stack
|
page read and write
|
||
E14F17E000
|
stack
|
page read and write
|
||
7FFD9B793000
|
trusted library allocation
|
page execute and read and write
|
||
A4B000
|
heap
|
page read and write
|
||
253F9161000
|
heap
|
page read and write
|
||
2282B1F3000
|
heap
|
page read and write
|
||
4E93000
|
heap
|
page read and write
|
||
2282B1E9000
|
heap
|
page read and write
|
||
140A000
|
heap
|
page read and write
|
||
B9F000
|
heap
|
page read and write
|
||
95E000
|
stack
|
page read and write
|
||
37AB000
|
heap
|
page read and write
|
||
A8543E000
|
stack
|
page read and write
|
||
191C2290000
|
heap
|
page read and write
|
||
37BA000
|
heap
|
page read and write
|
||
4E94000
|
heap
|
page read and write
|
||
9B5000
|
heap
|
page read and write
|
||
191C420B000
|
trusted library allocation
|
page read and write
|
||
B79000
|
heap
|
page read and write
|
||
191DFEC0000
|
heap
|
page read and write
|
||
3787000
|
heap
|
page read and write
|
||
37B4000
|
heap
|
page read and write
|
||
AB8000
|
heap
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
5990000
|
heap
|
page read and write
|
||
B3C000
|
heap
|
page read and write
|
||
B71000
|
heap
|
page read and write
|
||
EFF000
|
stack
|
page read and write
|
||
253F919B000
|
heap
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
191C4103000
|
trusted library allocation
|
page read and write
|
||
7FFD9B95B000
|
trusted library allocation
|
page read and write
|
||
5D6C000
|
stack
|
page read and write
|
||
B71000
|
heap
|
page read and write
|
||
B5C000
|
heap
|
page read and write
|
||
2282B2CE000
|
heap
|
page read and write
|
||
191DC52A000
|
heap
|
page read and write
|
||
3774000
|
heap
|
page read and write
|
||
7FFD9B7AC000
|
trusted library allocation
|
page read and write
|
||
A4B000
|
heap
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
191C3D35000
|
trusted library allocation
|
page read and write
|
||
59B8000
|
heap
|
page read and write
|
||
3BD7000
|
trusted library allocation
|
page read and write
|
||
93D000
|
unkown
|
page read and write
|
||
3AD2000
|
trusted library allocation
|
page read and write
|
||
2282AFAD000
|
heap
|
page read and write
|
||
191DFD74000
|
heap
|
page read and write
|
||
7FFD9B956000
|
trusted library allocation
|
page read and write
|
||
3730000
|
heap
|
page read and write
|
||
B4A000
|
heap
|
page read and write
|
||
A81FFE000
|
stack
|
page read and write
|
||
4E93000
|
heap
|
page read and write
|
||
B6E000
|
heap
|
page read and write
|
||
191DFD78000
|
heap
|
page read and write
|
||
FA6000
|
stack
|
page read and write
|
||
191C4206000
|
trusted library allocation
|
page read and write
|
||
B3C000
|
heap
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page read and write
|
||
37B8000
|
heap
|
page read and write
|
||
953000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
191DDA20000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
2282B1DF000
|
heap
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
7FFD9B7EC000
|
trusted library allocation
|
page execute and read and write
|
||
191DFD5F000
|
heap
|
page read and write
|
||
A47000
|
heap
|
page read and write
|
||
37B7000
|
heap
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
4A91000
|
trusted library allocation
|
page read and write
|
||
A2F000
|
heap
|
page read and write
|
||
2282B170000
|
trusted library allocation
|
page read and write
|
||
1412000
|
heap
|
page read and write
|
||
DB556E8000
|
stack
|
page read and write
|
||
B27000
|
heap
|
page read and write
|
||
A09000
|
heap
|
page read and write
|
||
7FFD9B984000
|
trusted library allocation
|
page read and write
|
||
59B4000
|
heap
|
page read and write
|
||
7FFD9B9AD000
|
trusted library allocation
|
page read and write
|
||
379D000
|
heap
|
page read and write
|
||
2282AFB8000
|
heap
|
page read and write
|
||
191E0636000
|
heap
|
page read and write
|
||
2282CF73000
|
heap
|
page read and write
|
||
3787000
|
heap
|
page read and write
|
||
B11000
|
heap
|
page read and write
|
||
3AFB000
|
trusted library allocation
|
page read and write
|
||
2282B754000
|
heap
|
page read and write
|
||
191DFD6E000
|
heap
|
page read and write
|
||
37E0000
|
heap
|
page read and write
|
||
191C3D8A000
|
trusted library allocation
|
page read and write
|
||
B4A000
|
heap
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
3768000
|
heap
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
2282B1D4000
|
heap
|
page read and write
|
||
382C000
|
heap
|
page read and write
|
||
6530000
|
trusted library allocation
|
page execute and read and write
|
||
191C3AE0000
|
heap
|
page read and write
|
||
191C2050000
|
trusted library allocation
|
page read and write
|
||
1A01000
|
heap
|
page read and write
|
||
B76000
|
heap
|
page read and write
|
||
B6F000
|
heap
|
page read and write
|
||
2282B75A000
|
heap
|
page read and write
|
||
191C1FE0000
|
heap
|
page read and write
|
||
191C40E2000
|
trusted library allocation
|
page read and write
|
||
191C3C20000
|
heap
|
page execute and read and write
|
||
1450000
|
heap
|
page read and write
|
||
A1A000
|
heap
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
3B01000
|
trusted library allocation
|
page read and write
|
||
143F000
|
heap
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
8D0000
|
heap
|
page read and write
|
||
A45000
|
heap
|
page read and write
|
||
A3D000
|
heap
|
page read and write
|
||
3751000
|
heap
|
page read and write
|
||
253800AE000
|
trusted library allocation
|
page read and write
|
||
916000
|
heap
|
page read and write
|
||
191DFE7E000
|
heap
|
page read and write
|
||
2282B1D2000
|
heap
|
page read and write
|
||
191DC93E000
|
heap
|
page read and write
|
||
2282B755000
|
heap
|
page read and write
|
||
37B2000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
33E2000
|
trusted library allocation
|
page execute and read and write
|
||
B4B000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page execute and read and write
|
||
14D0000
|
heap
|
page read and write
|
||
191C42E8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
381F000
|
heap
|
page read and write
|
||
B36000
|
heap
|
page read and write
|
||
A38000
|
heap
|
page read and write
|
||
B48000
|
heap
|
page read and write
|
||
191C42A2000
|
trusted library allocation
|
page read and write
|
||
A48000
|
heap
|
page read and write
|
||
2282AF76000
|
heap
|
page read and write
|
||
2282AFA7000
|
heap
|
page read and write
|
||
363E000
|
stack
|
page read and write
|
||
835000
|
heap
|
page read and write
|
||
7FFD9B84C000
|
trusted library allocation
|
page execute and read and write
|
||
2282AF52000
|
heap
|
page read and write
|
||
400C000
|
trusted library allocation
|
page read and write
|
||
191C3A40000
|
heap
|
page read and write
|
||
59B1000
|
heap
|
page read and write
|
||
7FFD9B7B4000
|
trusted library allocation
|
page read and write
|
||
A0B000
|
heap
|
page read and write
|
||
59C5000
|
heap
|
page read and write
|
||
E0E000
|
stack
|
page read and write
|
||
191C4480000
|
trusted library allocation
|
page read and write
|
||
3824000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
191C443A000
|
trusted library allocation
|
page read and write
|
||
191DE279000
|
heap
|
page read and write
|
||
379F000
|
heap
|
page read and write
|
||
191C4275000
|
trusted library allocation
|
page read and write
|
||
253800A4000
|
trusted library allocation
|
page read and write
|
||
191DFD5A000
|
heap
|
page read and write
|
||
B7D000
|
heap
|
page read and write
|
||
191DFD68000
|
heap
|
page read and write
|
||
A4C000
|
heap
|
page read and write
|
||
191E0407000
|
heap
|
page read and write
|
||
FBB000
|
stack
|
page read and write
|
||
191C403A000
|
trusted library allocation
|
page read and write
|
||
50BA000
|
heap
|
page read and write
|
||
2282B1CF000
|
heap
|
page read and write
|
||
A47000
|
heap
|
page read and write
|
||
191C2086000
|
heap
|
page read and write
|
||
2282B75B000
|
heap
|
page read and write
|
||
B01000
|
heap
|
page read and write
|
||
E14E1FF000
|
stack
|
page read and write
|
||
191C3D01000
|
trusted library allocation
|
page read and write
|
||
377B000
|
heap
|
page read and write
|
||
B37000
|
heap
|
page read and write
|
||
B71000
|
heap
|
page read and write
|
||
191C4335000
|
trusted library allocation
|
page read and write
|
||
B68000
|
heap
|
page read and write
|
||
2282CF84000
|
heap
|
page read and write
|
||
143E000
|
unkown
|
page read and write
|
||
191C4177000
|
trusted library allocation
|
page read and write
|
||
59C2000
|
heap
|
page read and write
|
||
8B0000
|
trusted library allocation
|
page read and write
|
||
191DE220000
|
heap
|
page read and write
|
||
191C43E3000
|
trusted library allocation
|
page read and write
|
||
37A0000
|
heap
|
page read and write
|
||
37AB000
|
heap
|
page read and write
|
||
A13000
|
heap
|
page read and write
|
||
253800DE000
|
trusted library allocation
|
page read and write
|
||
3E91000
|
trusted library allocation
|
page read and write
|
||
77E000
|
stack
|
page read and write
|
||
B61000
|
heap
|
page read and write
|
||
96E000
|
stack
|
page read and write
|
||
6600000
|
heap
|
page read and write
|
||
A2F000
|
heap
|
page read and write
|
||
191C42A4000
|
trusted library allocation
|
page read and write
|
||
4E96000
|
heap
|
page read and write
|
||
A2F000
|
heap
|
page read and write
|
||
A3B000
|
heap
|
page read and write
|
||
3788000
|
heap
|
page read and write
|
||
37DD000
|
heap
|
page read and write
|
||
150000
|
unkown
|
page readonly
|
||
2282B1E9000
|
heap
|
page read and write
|
||
2282B1D4000
|
heap
|
page read and write
|
||
191C414B000
|
trusted library allocation
|
page read and write
|
||
191DC548000
|
heap
|
page read and write
|
||
37BA000
|
heap
|
page read and write
|
||
37A4000
|
heap
|
page read and write
|
||
3784000
|
heap
|
page read and write
|
||
1056000
|
heap
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
191DFD00000
|
heap
|
page read and write
|
||
147D000
|
heap
|
page read and write
|
||
191C3FA8000
|
trusted library allocation
|
page read and write
|
||
191DFD4A000
|
heap
|
page read and write
|
||
2282AFA1000
|
heap
|
page read and write
|
||
191C1BE0000
|
unkown
|
page readonly
|
||
37A3000
|
heap
|
page read and write
|
||
2282B1F2000
|
heap
|
page read and write
|
||
59C5000
|
heap
|
page read and write
|
||
191C20EA000
|
heap
|
page read and write
|
||
191DFF84000
|
heap
|
page read and write
|
||
9DD000
|
heap
|
page read and write
|
||
253F9136000
|
heap
|
page read and write
|
||
B79000
|
heap
|
page read and write
|
||
37AD000
|
heap
|
page read and write
|
||
B3C000
|
heap
|
page read and write
|
||
2282AF83000
|
heap
|
page read and write
|
||
191C3CF2000
|
trusted library allocation
|
page read and write
|
||
37AE000
|
heap
|
page read and write
|
||
59CA000
|
heap
|
page read and write
|
||
E14EA3D000
|
stack
|
page read and write
|
||
2282B050000
|
heap
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
191C1C92000
|
unkown
|
page execute and read and write
|
||
E14E4FD000
|
stack
|
page read and write
|
||
25380001000
|
trusted library allocation
|
page read and write
|
||
191C4497000
|
trusted library allocation
|
page read and write
|
||
37BC000
|
heap
|
page read and write
|
||
191DFE16000
|
heap
|
page read and write
|
||
191C2000000
|
heap
|
page read and write
|
||
1B7FB000
|
stack
|
page read and write
|
||
3788000
|
heap
|
page read and write
|
||
7FFD9B7B0000
|
trusted library allocation
|
page read and write
|
||
508F000
|
stack
|
page read and write
|
||
2282B170000
|
trusted library allocation
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
3B0C000
|
trusted library allocation
|
page read and write
|
||
253F913C000
|
heap
|
page read and write
|
||
191C1E5C000
|
unkown
|
page readonly
|
||
5A90000
|
trusted library allocation
|
page read and write
|
||
191E02E6000
|
heap
|
page read and write
|
||
2282B1D1000
|
heap
|
page read and write
|
||
191C42CE000
|
trusted library allocation
|
page read and write
|
||
37B5000
|
heap
|
page read and write
|
||
191E0559000
|
heap
|
page read and write
|
||
1461000
|
heap
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
B61000
|
heap
|
page read and write
|
||
BA1000
|
heap
|
page read and write
|
||
A6F000
|
heap
|
page read and write
|
||
E14EB3E000
|
stack
|
page read and write
|
||
A4A000
|
heap
|
page read and write
|
||
3ADF000
|
trusted library allocation
|
page read and write
|
||
191C42B7000
|
trusted library allocation
|
page read and write
|
||
191DC520000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page execute and read and write
|
||
2282CF84000
|
heap
|
page read and write
|
||
B9E000
|
heap
|
page read and write
|
||
37DD000
|
heap
|
page read and write
|
||
381F000
|
heap
|
page read and write
|
||
191C40DF000
|
trusted library allocation
|
page read and write
|
||
1501000
|
heap
|
page read and write
|
||
191DFDD6000
|
heap
|
page read and write
|
||
DB55A7E000
|
stack
|
page read and write
|
||
4E97000
|
heap
|
page read and write
|
||
A6D000
|
heap
|
page read and write
|
||
37A3000
|
heap
|
page read and write
|
||
191DFD6B000
|
heap
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page execute and read and write
|
||
59BE000
|
heap
|
page read and write
|
||
A2B000
|
heap
|
page read and write
|
||
191C43A8000
|
trusted library allocation
|
page read and write
|
||
642C000
|
stack
|
page read and write
|
||
3751000
|
heap
|
page read and write
|
||
3C3B000
|
trusted library allocation
|
page read and write
|
||
37B0000
|
heap
|
page read and write
|
||
191DC609000
|
heap
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
191DC920000
|
heap
|
page read and write
|
||
A13000
|
heap
|
page read and write
|
||
B5D000
|
heap
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
A19000
|
heap
|
page read and write
|
||
191C3A90000
|
trusted library allocation
|
page read and write
|
||
33B2000
|
trusted library allocation
|
page execute and read and write
|
||
2282AFAC000
|
heap
|
page read and write
|
||
191C2205000
|
heap
|
page read and write
|
||
191C20AA000
|
heap
|
page read and write
|
||
A3C000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
3788000
|
heap
|
page read and write
|
||
5CB0000
|
trusted library allocation
|
page read and write
|
||
191C1C3A000
|
unkown
|
page readonly
|
||
3501000
|
heap
|
page read and write
|
||
1B01000
|
heap
|
page read and write
|
||
4E8A000
|
heap
|
page read and write
|
||
382D000
|
heap
|
page read and write
|
||
2282B1DF000
|
heap
|
page read and write
|
||
33F7000
|
trusted library allocation
|
page execute and read and write
|
||
E14EE7D000
|
stack
|
page read and write
|
||
B49000
|
heap
|
page read and write
|
||
B6E000
|
heap
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
59C6000
|
heap
|
page read and write
|
||
91C000
|
heap
|
page read and write
|
||
A42000
|
heap
|
page read and write
|
||
2282AF75000
|
heap
|
page read and write
|
||
A6D000
|
heap
|
page read and write
|
||
3822000
|
heap
|
page read and write
|
||
379E000
|
heap
|
page read and write
|
||
253F93F5000
|
heap
|
page read and write
|
||
5FEE000
|
stack
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
B45000
|
heap
|
page read and write
|
||
50B2000
|
heap
|
page read and write
|
||
144A000
|
heap
|
page read and write
|
||
A0A000
|
heap
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
12791000
|
trusted library allocation
|
page read and write
|
||
A1A000
|
heap
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
2282AFB8000
|
heap
|
page read and write
|
||
191DC5C6000
|
heap
|
page read and write
|
||
C2E000
|
unkown
|
page read and write
|
||
191C4307000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page execute and read and write
|
||
253F919D000
|
heap
|
page read and write
|
||
7FFD9B876000
|
trusted library allocation
|
page execute and read and write
|
||
A47000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
7FFD9B792000
|
trusted library allocation
|
page read and write
|
||
4E93000
|
heap
|
page read and write
|
||
B7C000
|
heap
|
page read and write
|
||
4E81000
|
heap
|
page read and write
|
||
2282AF94000
|
heap
|
page read and write
|
||
1880000
|
heap
|
page read and write
|
||
191E0157000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
1850000
|
heap
|
page read and write
|
||
A14000
|
heap
|
page read and write
|
||
B5D000
|
heap
|
page read and write
|
||
A84FFE000
|
stack
|
page read and write
|
||
191DFD7D000
|
heap
|
page read and write
|
||
A48000
|
heap
|
page read and write
|
||
191DFD42000
|
heap
|
page read and write
|
||
59B3000
|
heap
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
191E0262000
|
heap
|
page read and write
|
||
D05000
|
heap
|
page read and write
|
||
A84BFE000
|
stack
|
page read and write
|
||
191C3CEB000
|
trusted library allocation
|
page read and write
|
||
2282AF40000
|
heap
|
page read and write
|
||
373A000
|
heap
|
page read and write
|
||
B6C000
|
heap
|
page read and write
|
||
12EE000
|
stack
|
page read and write
|
||
191C20BF000
|
heap
|
page read and write
|
||
A3B000
|
heap
|
page read and write
|
||
1B4FE000
|
stack
|
page read and write
|
||
191E0517000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
A05000
|
heap
|
page read and write
|
||
191DE1AA000
|
trusted library allocation
|
page read and write
|
||
BEE000
|
heap
|
page read and write
|
||
5C90000
|
trusted library allocation
|
page read and write
|
||
1860000
|
heap
|
page execute and read and write
|
||
3778000
|
heap
|
page read and write
|
||
381D000
|
heap
|
page read and write
|
||
B79000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
381D000
|
heap
|
page read and write
|
||
2282AF94000
|
heap
|
page read and write
|
||
4E60000
|
heap
|
page read and write
|
||
BEE000
|
heap
|
page read and write
|
||
14C6000
|
heap
|
page read and write
|
||
59BC000
|
heap
|
page read and write
|
||
2282B1D8000
|
heap
|
page read and write
|
||
59BE000
|
heap
|
page read and write
|
||
2282B75A000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
191DC6F0000
|
heap
|
page execute and read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
986000
|
heap
|
page read and write
|
||
37BC000
|
heap
|
page read and write
|
||
191C20EE000
|
heap
|
page read and write
|
||
191C3CF5000
|
trusted library allocation
|
page read and write
|
||
33F0000
|
trusted library allocation
|
page read and write
|
||
253FB550000
|
heap
|
page read and write
|
||
A32000
|
heap
|
page read and write
|
||
191C3CFD000
|
trusted library allocation
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
37BB000
|
heap
|
page read and write
|
||
68B000
|
stack
|
page read and write
|
||
191C412A000
|
trusted library allocation
|
page read and write
|
||
5EAC000
|
stack
|
page read and write
|
||
2282B1DF000
|
heap
|
page read and write
|
||
2282B2CA000
|
heap
|
page read and write
|
||
5C6E000
|
stack
|
page read and write
|
||
E14EC3B000
|
stack
|
page read and write
|
||
191DC910000
|
heap
|
page read and write
|
||
2282CF7E000
|
heap
|
page read and write
|
||
B9F000
|
heap
|
page read and write
|
||
191C434D000
|
trusted library allocation
|
page read and write
|
||
253F92F5000
|
heap
|
page read and write
|
||
191C20C1000
|
heap
|
page read and write
|
||
191C3D88000
|
trusted library allocation
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
59C9000
|
heap
|
page read and write
|
||
4E93000
|
heap
|
page read and write
|
||
191E059D000
|
heap
|
page read and write
|
||
A16000
|
heap
|
page read and write
|
||
B69000
|
heap
|
page read and write
|
||
2282AFAA000
|
heap
|
page read and write
|
||
2282AF57000
|
heap
|
page read and write
|
||
9F7000
|
heap
|
page read and write
|
||
3AE6000
|
trusted library allocation
|
page read and write
|
||
A43000
|
heap
|
page read and write
|
||
2282AF91000
|
heap
|
page read and write
|
||
2282AF85000
|
heap
|
page read and write
|
||
2282AF9F000
|
heap
|
page read and write
|
||
3786000
|
heap
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page read and write
|
||
191C20A2000
|
heap
|
page read and write
|
||
2282AFBF000
|
heap
|
page read and write
|
||
2282B1EA000
|
heap
|
page read and write
|
||
191DE2BB000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
A18000
|
heap
|
page read and write
|
||
191DC513000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page execute and read and write
|
||
2282B1CC000
|
heap
|
page read and write
|
||
33DA000
|
trusted library allocation
|
page execute and read and write
|
||
191C2070000
|
trusted library allocation
|
page read and write
|
||
59B1000
|
heap
|
page read and write
|
||
A6D000
|
heap
|
page read and write
|
||
191C2183000
|
trusted library allocation
|
page read and write
|
||
191DC52E000
|
heap
|
page read and write
|
||
1202000
|
heap
|
page read and write
|
||
191C44DE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B81C000
|
trusted library allocation
|
page execute and read and write
|
||
A0B000
|
heap
|
page read and write
|
||
253FB52E000
|
heap
|
page read and write
|
||
A8103E000
|
stack
|
page read and write
|
||
652B000
|
stack
|
page read and write
|
||
3AF0000
|
trusted library allocation
|
page read and write
|
||
4E98000
|
heap
|
page read and write
|
||
191C44D9000
|
trusted library allocation
|
page read and write
|
||
2282B750000
|
heap
|
page read and write
|
||
253FACE0000
|
heap
|
page read and write
|
||
2282AFB4000
|
heap
|
page read and write
|
||
59BF000
|
heap
|
page read and write
|
||
2282CF70000
|
heap
|
page read and write
|
||
37BA000
|
heap
|
page read and write
|
||
191C4019000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7AD000
|
trusted library allocation
|
page execute and read and write
|
||
37B2000
|
heap
|
page read and write
|
||
2282AFA3000
|
heap
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
B7C000
|
heap
|
page read and write
|
||
A42000
|
heap
|
page read and write
|
||
3775000
|
heap
|
page read and write
|
||
50BA000
|
heap
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
253800B8000
|
trusted library allocation
|
page read and write
|
||
B39000
|
heap
|
page read and write
|
||
2282AF57000
|
heap
|
page read and write
|
||
A82FFE000
|
stack
|
page read and write
|
||
191C41E2000
|
trusted library allocation
|
page read and write
|
||
2282D0B0000
|
heap
|
page read and write
|
||
253F90F0000
|
heap
|
page read and write
|
||
191C43DB000
|
trusted library allocation
|
page read and write
|
||
2282AF78000
|
heap
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
A34000
|
heap
|
page read and write
|
||
191C2200000
|
heap
|
page read and write
|
||
7FFD9B7BD000
|
trusted library allocation
|
page execute and read and write
|
||
14A2000
|
heap
|
page read and write
|
||
9E1000
|
heap
|
page read and write
|
||
A18000
|
heap
|
page read and write
|
||
B75000
|
heap
|
page read and write
|
||
1B6FE000
|
stack
|
page read and write
|
||
2282CF7D000
|
heap
|
page read and write
|
||
1475000
|
heap
|
page read and write
|
||
191DE24E000
|
heap
|
page read and write
|
||
191C3FA5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B935000
|
trusted library allocation
|
page read and write
|
||
2282CF76000
|
heap
|
page read and write
|
||
37B8000
|
heap
|
page read and write
|
||
3821000
|
heap
|
page read and write
|
||
1436000
|
heap
|
page read and write
|
||
B68000
|
heap
|
page read and write
|
||
253F8F30000
|
unkown
|
page readonly
|
||
2282B130000
|
heap
|
page read and write
|
||
2282AFB7000
|
heap
|
page read and write
|
||
25380088000
|
trusted library allocation
|
page read and write
|
||
253F92C0000
|
heap
|
page execute and read and write
|
||
840000
|
heap
|
page read and write
|
||
A17000
|
heap
|
page read and write
|
||
59B6000
|
heap
|
page read and write
|
||
598F000
|
stack
|
page read and write
|
||
191C1FC0000
|
heap
|
page read and write
|
||
3825000
|
heap
|
page read and write
|
||
5090000
|
heap
|
page read and write
|
||
7FFD9B7BB000
|
trusted library allocation
|
page execute and read and write
|
||
191DE195000
|
trusted library allocation
|
page read and write
|
||
B6E000
|
heap
|
page read and write
|
||
2282B75E000
|
heap
|
page read and write
|
||
2282B75A000
|
heap
|
page read and write
|
||
37A0000
|
heap
|
page read and write
|
||
BEE000
|
heap
|
page read and write
|
||
2282B1E9000
|
heap
|
page read and write
|
||
59BF000
|
heap
|
page read and write
|
||
7FFD9B793000
|
trusted library allocation
|
page execute and read and write
|
||
FF0000
|
heap
|
page read and write
|
||
3751000
|
heap
|
page read and write
|
||
37A4000
|
heap
|
page read and write
|
||
E6F000
|
stack
|
page read and write
|
||
191C3F65000
|
trusted library allocation
|
page read and write
|
||
191C444D000
|
trusted library allocation
|
page read and write
|
||
37AD000
|
heap
|
page read and write
|
||
191C4250000
|
trusted library allocation
|
page read and write
|
||
191C4090000
|
trusted library allocation
|
page read and write
|
||
2282AFB1000
|
heap
|
page read and write
|
||
B45000
|
heap
|
page read and write
|
||
2282AFBA000
|
heap
|
page read and write
|
||
253F9130000
|
heap
|
page read and write
|
||
377E000
|
heap
|
page read and write
|
||
253F8F30000
|
unkown
|
page readonly
|
||
25390006000
|
trusted library allocation
|
page read and write
|
||
B47000
|
heap
|
page read and write
|
||
191C4016000
|
trusted library allocation
|
page read and write
|
||
59B1000
|
heap
|
page read and write
|
||
7FFD9B933000
|
trusted library allocation
|
page read and write
|
||
37A5000
|
heap
|
page read and write
|
||
253800D8000
|
trusted library allocation
|
page read and write
|
||
253800A0000
|
trusted library allocation
|
page read and write
|
||
2282B1C7000
|
heap
|
page read and write
|
||
E14E0F3000
|
stack
|
page read and write
|
||
2538008E000
|
trusted library allocation
|
page read and write
|
||
4E95000
|
heap
|
page read and write
|
||
253800F3000
|
trusted library allocation
|
page read and write
|
||
E00000
|
unkown
|
page readonly
|
||
ABB000
|
heap
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
E14E83F000
|
stack
|
page read and write
|
||
50BA000
|
heap
|
page read and write
|
||
B6C000
|
heap
|
page read and write
|
||
191C3FF7000
|
trusted library allocation
|
page read and write
|
||
E14EF7B000
|
stack
|
page read and write
|
||
191E061E000
|
heap
|
page read and write
|
||
3B42000
|
trusted library allocation
|
page read and write
|
||
4E82000
|
heap
|
page read and write
|
||
7FFD9B7B4000
|
trusted library allocation
|
page read and write
|
||
9D6000
|
heap
|
page read and write
|
||
933000
|
heap
|
page read and write
|
||
2282AFA3000
|
heap
|
page read and write
|
||
DB557EF000
|
stack
|
page read and write
|
||
33CA000
|
trusted library allocation
|
page execute and read and write
|
||
37B4000
|
heap
|
page read and write
|
||
3782000
|
heap
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
9D2000
|
heap
|
page read and write
|
||
A36000
|
heap
|
page read and write
|
||
2282AF8F000
|
heap
|
page read and write
|
||
B74000
|
heap
|
page read and write
|
||
382A000
|
heap
|
page read and write
|
||
A17000
|
heap
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
4E93000
|
heap
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
191DC61E000
|
heap
|
page read and write
|
||
A2B000
|
heap
|
page read and write
|
||
2282B170000
|
trusted library allocation
|
page read and write
|
||
B69000
|
heap
|
page read and write
|
||
191C3D05000
|
trusted library allocation
|
page read and write
|
||
E14E5FE000
|
stack
|
page read and write
|
||
1B200000
|
heap
|
page read and write
|
||
191DC510000
|
heap
|
page read and write
|
||
37BC000
|
heap
|
page read and write
|
||
4E88000
|
heap
|
page read and write
|
||
12FB000
|
stack
|
page read and write
|
||
3824000
|
heap
|
page read and write
|
||
B45000
|
heap
|
page read and write
|
||
191DFD80000
|
heap
|
page read and write
|
||
2282B2CD000
|
heap
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
BEA000
|
heap
|
page read and write
|
||
7FFD9B7EC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B966000
|
trusted library allocation
|
page read and write
|
||
A6D000
|
heap
|
page read and write
|
||
25380108000
|
trusted library allocation
|
page read and write
|
||
191DFF42000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
5A98000
|
trusted library allocation
|
page read and write
|
||
A19000
|
heap
|
page read and write
|
||
A3B000
|
heap
|
page read and write
|
||
191C2080000
|
heap
|
page read and write
|
||
191C3F11000
|
trusted library allocation
|
page read and write
|
||
52BE000
|
stack
|
page read and write
|
||
2282AF9B000
|
heap
|
page read and write
|
||
37DE000
|
heap
|
page read and write
|
||
191E0007000
|
heap
|
page read and write
|
||
97F000
|
heap
|
page read and write
|
||
B77000
|
heap
|
page read and write
|
||
3FF3000
|
trusted library allocation
|
page read and write
|
||
BBF000
|
unkown
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page execute and read and write
|
||
191E008D000
|
heap
|
page read and write
|
||
1620000
|
heap
|
page read and write
|
||
191C4209000
|
trusted library allocation
|
page read and write
|
||
6F4000
|
stack
|
page read and write
|
||
B3B000
|
heap
|
page read and write
|
||
191DFD71000
|
heap
|
page read and write
|
||
3829000
|
heap
|
page read and write
|
||
A43000
|
heap
|
page read and write
|
||
B4A000
|
heap
|
page read and write
|
||
14BE000
|
stack
|
page read and write
|
||
A08000
|
heap
|
page read and write
|
||
191E0622000
|
heap
|
page read and write
|
||
A2F000
|
heap
|
page read and write
|
||
2282AF94000
|
heap
|
page read and write
|
||
37AB000
|
heap
|
page read and write
|
||
37B8000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
B42000
|
heap
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
26AE000
|
stack
|
page read and write
|
||
191E0300000
|
heap
|
page read and write
|
||
191C408D000
|
trusted library allocation
|
page read and write
|
||
B7C000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
B6C000
|
heap
|
page read and write
|
||
B7C000
|
heap
|
page read and write
|
||
33BA000
|
trusted library allocation
|
page execute and read and write
|
||
AFB000
|
heap
|
page read and write
|
||
2282AF7E000
|
heap
|
page read and write
|
||
25390001000
|
trusted library allocation
|
page read and write
|
||
A817FF000
|
stack
|
page read and write
|
||
B49000
|
heap
|
page read and write
|
||
9CA000
|
heap
|
page read and write
|
||
191C422E000
|
trusted library allocation
|
page read and write
|
||
5FAD000
|
stack
|
page read and write
|
||
BEA000
|
heap
|
page read and write
|
||
377F000
|
heap
|
page read and write
|
||
4E80000
|
heap
|
page read and write
|
||
191E03C6000
|
heap
|
page read and write
|
||
2282CF71000
|
heap
|
page read and write
|
||
191DDA42000
|
trusted library allocation
|
page read and write
|
||
7FF414010000
|
trusted library allocation
|
page execute and read and write
|
||
191DC5C8000
|
heap
|
page read and write
|
||
253F9170000
|
heap
|
page read and write
|
||
25380075000
|
trusted library allocation
|
page read and write
|
||
191C1C90000
|
unkown
|
page execute and read and write
|
||
191C4240000
|
trusted library allocation
|
page read and write
|
||
A82BFB000
|
stack
|
page read and write
|
||
2282B753000
|
heap
|
page read and write
|
||
37B7000
|
heap
|
page read and write
|
||
191C1EE0000
|
heap
|
page read and write
|
||
A38000
|
heap
|
page read and write
|
||
33EA000
|
trusted library allocation
|
page execute and read and write
|
||
A14000
|
heap
|
page read and write
|
||
A19000
|
heap
|
page read and write
|
||
D2F000
|
unkown
|
page read and write
|
||
253800CA000
|
trusted library allocation
|
page read and write
|
||
B76000
|
heap
|
page read and write
|
||
3AF5000
|
trusted library allocation
|
page read and write
|
||
86B000
|
stack
|
page read and write
|
||
7FFD9B7BD000
|
trusted library allocation
|
page execute and read and write
|
||
191E05DF000
|
heap
|
page read and write
|
||
7FFD9B958000
|
trusted library allocation
|
page read and write
|
||
2282AF48000
|
heap
|
page read and write
|
||
253F93F0000
|
heap
|
page read and write
|
||
B7C000
|
heap
|
page read and write
|
||
3773000
|
heap
|
page read and write
|
||
944000
|
heap
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page execute and read and write
|
||
59C8000
|
heap
|
page read and write
|
||
B6C000
|
heap
|
page read and write
|
||
191C3D71000
|
trusted library allocation
|
page read and write
|
||
253F9280000
|
trusted library allocation
|
page read and write
|
||
2282B1F3000
|
heap
|
page read and write
|
||
191E04D1000
|
heap
|
page read and write
|
||
3784000
|
heap
|
page read and write
|
||
3784000
|
heap
|
page read and write
|
||
6580000
|
trusted library allocation
|
page execute and read and write
|
||
14B3000
|
heap
|
page read and write
|
||
7FFD9B772000
|
trusted library allocation
|
page read and write
|
||
59CC000
|
heap
|
page read and write
|
||
7FFD9B792000
|
trusted library allocation
|
page read and write
|
||
9F5000
|
heap
|
page read and write
|
||
A80FEF000
|
stack
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
2282AFB4000
|
heap
|
page read and write
|
||
A39000
|
heap
|
page read and write
|
||
2282B757000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
A809CE000
|
stack
|
page read and write
|
||
33D7000
|
trusted library allocation
|
page execute and read and write
|
||
191C2295000
|
heap
|
page read and write
|
||
153E000
|
stack
|
page read and write
|
||
5491000
|
trusted library allocation
|
page read and write
|
||
59BE000
|
heap
|
page read and write
|
||
2282AFBF000
|
heap
|
page read and write
|
||
7FFD9B962000
|
trusted library allocation
|
page read and write
|
||
A19000
|
heap
|
page read and write
|
||
A4A000
|
heap
|
page read and write
|
||
4D0E000
|
stack
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
37B7000
|
heap
|
page read and write
|
||
12798000
|
trusted library allocation
|
page read and write
|
||
3B2F000
|
stack
|
page read and write
|
||
191C20E8000
|
heap
|
page read and write
|
||
2282AFAA000
|
heap
|
page read and write
|
||
3B03000
|
trusted library allocation
|
page read and write
|
||
2282AF94000
|
heap
|
page read and write
|
||
8D0000
|
trusted library allocation
|
page read and write
|
||
1AD1D000
|
stack
|
page read and write
|
||
150000
|
unkown
|
page readonly
|
||
37B8000
|
heap
|
page read and write
|
||
59B3000
|
heap
|
page read and write
|
||
253F920C000
|
heap
|
page read and write
|
||
253F9260000
|
trusted library allocation
|
page read and write
|
||
A09000
|
heap
|
page read and write
|
||
253F9110000
|
heap
|
page read and write
|
||
3829000
|
heap
|
page read and write
|
||
3BD2000
|
trusted library allocation
|
page read and write
|
||
2282CF7E000
|
heap
|
page read and write
|
||
B61000
|
heap
|
page read and write
|
||
191C4260000
|
trusted library allocation
|
page read and write
|
||
B7B000
|
heap
|
page read and write
|
||
A38000
|
heap
|
page read and write
|
||
37AC000
|
heap
|
page read and write
|
||
E14F37E000
|
stack
|
page read and write
|
||
1700000
|
heap
|
page read and write
|
||
2282AF83000
|
heap
|
page read and write
|
||
191DDF0F000
|
heap
|
page read and write
|
||
2282B1C0000
|
heap
|
page read and write
|
||
A36000
|
heap
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
191C404A000
|
trusted library allocation
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
191C3A70000
|
heap
|
page read and write
|
||
DB5576F000
|
stack
|
page read and write
|
||
7FFD9B7A3000
|
trusted library allocation
|
page read and write
|
||
A2F000
|
heap
|
page read and write
|
||
2282B757000
|
heap
|
page read and write
|
||
12F4000
|
stack
|
page read and write
|
||
3826000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
2282CF74000
|
heap
|
page read and write
|
||
382D000
|
heap
|
page read and write
|
||
253F9172000
|
heap
|
page read and write
|
||
2282AFBF000
|
heap
|
page read and write
|
||
37A3000
|
heap
|
page read and write
|
||
5096000
|
heap
|
page read and write
|
||
191DCA10000
|
heap
|
page read and write
|
||
2282AFA4000
|
heap
|
page read and write
|
||
3781000
|
heap
|
page read and write
|
||
191C403D000
|
trusted library allocation
|
page read and write
|
||
382B000
|
heap
|
page read and write
|
||
2282B150000
|
heap
|
page read and write
|
||
12793000
|
trusted library allocation
|
page read and write
|
||
B49000
|
heap
|
page read and write
|
||
B24000
|
heap
|
page read and write
|
||
2282AF84000
|
heap
|
page read and write
|
||
A81BFD000
|
stack
|
page read and write
|
||
2282AF94000
|
heap
|
page read and write
|
||
DB55B7E000
|
stack
|
page read and write
|
||
191C3F62000
|
trusted library allocation
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
191E0616000
|
heap
|
page read and write
|
||
2282B1F9000
|
heap
|
page read and write
|
||
3779000
|
heap
|
page read and write
|
||
191C20BD000
|
heap
|
page read and write
|
||
37DD000
|
heap
|
page read and write
|
||
B5C000
|
heap
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
191C3FFA000
|
trusted library allocation
|
page read and write
|
||
37AE000
|
heap
|
page read and write
|
||
6550000
|
unclassified section
|
page read and write
|
||
253F9220000
|
heap
|
page read and write
|
||
2282AFA9000
|
heap
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
191DDE84000
|
heap
|
page read and write
|
||
1B212000
|
heap
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
37BA000
|
heap
|
page read and write
|
||
E14E93E000
|
stack
|
page read and write
|
||
E14F076000
|
stack
|
page read and write
|
||
382D000
|
heap
|
page read and write
|
||
377F000
|
heap
|
page read and write
|
||
A827FC000
|
stack
|
page read and write
|
||
191E04CD000
|
heap
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
60EE000
|
stack
|
page read and write
|
||
367F000
|
unkown
|
page read and write
|
||
191C3F81000
|
trusted library allocation
|
page read and write
|
||
191C40B6000
|
trusted library allocation
|
page read and write
|
||
A3D000
|
heap
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
3788000
|
heap
|
page read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
2282CF86000
|
heap
|
page read and write
|
||
7FFD9B876000
|
trusted library allocation
|
page execute and read and write
|
||
983000
|
heap
|
page read and write
|
||
B11000
|
heap
|
page read and write
|
||
B36000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
191DDF42000
|
trusted library allocation
|
page read and write
|
||
E14E2FF000
|
stack
|
page read and write
|
||
A6D000
|
heap
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
EAA000
|
stack
|
page read and write
|
||
191DFD65000
|
heap
|
page read and write
|
||
2282AF94000
|
heap
|
page read and write
|
||
2282B170000
|
trusted library allocation
|
page read and write
|
||
2282B1CE000
|
heap
|
page read and write
|
||
3EC4000
|
trusted library allocation
|
page read and write
|
||
191DFD7A000
|
heap
|
page read and write
|
||
191DC532000
|
heap
|
page read and write
|
||
191C3A60000
|
trusted library section
|
page readonly
|
||
191C414E000
|
trusted library allocation
|
page read and write
|
||
25380081000
|
trusted library allocation
|
page read and write
|
||
93A000
|
heap
|
page read and write
|
||
379F000
|
heap
|
page read and write
|
||
191C208C000
|
heap
|
page read and write
|
||
33F2000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
heap
|
page execute and read and write
|
||
A34000
|
heap
|
page read and write
|
||
191C4174000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
59BF000
|
heap
|
page read and write
|
||
A43000
|
heap
|
page read and write
|
||
191C449A000
|
trusted library allocation
|
page read and write
|
||
B0E000
|
stack
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
25380084000
|
trusted library allocation
|
page read and write
|
||
E14E3FE000
|
stack
|
page read and write
|
||
B66000
|
heap
|
page read and write
|
||
33FB000
|
trusted library allocation
|
page execute and read and write
|
||
A2D000
|
heap
|
page read and write
|
||
7FFD9B7B0000
|
trusted library allocation
|
page read and write
|
||
2539000D000
|
trusted library allocation
|
page read and write
|
||
2282AF7E000
|
heap
|
page read and write
|
||
191C41E5000
|
trusted library allocation
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
191C436C000
|
trusted library allocation
|
page read and write
|
||
E14ED7E000
|
stack
|
page read and write
|
||
2282AF74000
|
heap
|
page read and write
|
||
78B000
|
stack
|
page read and write
|
||
50B0000
|
heap
|
page read and write
|
||
4B40000
|
heap
|
page read and write
|
||
191E069C000
|
heap
|
page read and write
|
||
A47000
|
heap
|
page read and write
|
||
2282AFB4000
|
heap
|
page read and write
|
||
1B1FE000
|
stack
|
page read and write
|
||
37B4000
|
heap
|
page read and write
|
||
2282CF72000
|
heap
|
page read and write
|
||
A4B000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
DB55AFE000
|
stack
|
page read and write
|
||
2282AFB8000
|
heap
|
page read and write
|
||
3765000
|
heap
|
page read and write
|
||
B3A000
|
heap
|
page read and write
|
||
A0D000
|
heap
|
page read and write
|
||
3775000
|
heap
|
page read and write
|
||
5340000
|
heap
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
191D3C81000
|
trusted library allocation
|
page read and write
|
||
964000
|
stack
|
page read and write
|
||
59B2000
|
heap
|
page read and write
|
||
253F8FF0000
|
heap
|
page read and write
|
||
191C4069000
|
trusted library allocation
|
page read and write
|
||
191DFFC9000
|
heap
|
page read and write
|
||
3775000
|
heap
|
page read and write
|
||
3828000
|
heap
|
page read and write
|
||
7FA90000
|
trusted library allocation
|
page execute and read and write
|
||
2282B1DF000
|
heap
|
page read and write
|
||
379E000
|
heap
|
page read and write
|
||
191DC6F3000
|
heap
|
page execute and read and write
|
||
191C2180000
|
trusted library allocation
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
BA1000
|
heap
|
page read and write
|
||
2282AFA7000
|
heap
|
page read and write
|
||
1B20C000
|
heap
|
page read and write
|
||
2282B1C8000
|
heap
|
page read and write
|
||
253F9380000
|
heap
|
page execute and read and write
|
||
2282B1DF000
|
heap
|
page read and write
|
||
B36000
|
heap
|
page read and write
|
||
B77000
|
heap
|
page read and write
|
||
B4A000
|
heap
|
page read and write
|
||
381D000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
191C3F28000
|
trusted library allocation
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
||
2538007B000
|
trusted library allocation
|
page read and write
|
||
2282B1F5000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
381D000
|
heap
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
191C404D000
|
trusted library allocation
|
page read and write
|
||
253FB4F0000
|
heap
|
page read and write
|
||
A6D000
|
heap
|
page read and write
|
||
37B0000
|
heap
|
page read and write
|
||
2282AFA7000
|
heap
|
page read and write
|
||
7FFD9B7AD000
|
trusted library allocation
|
page execute and read and write
|
||
B39000
|
heap
|
page read and write
|
||
7FFD9B7BB000
|
trusted library allocation
|
page execute and read and write
|
||
2282B1E9000
|
heap
|
page read and write
|
||
191DC596000
|
heap
|
page read and write
|
||
1494000
|
heap
|
page read and write
|
||
253F92F0000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
191E004F000
|
heap
|
page read and write
|
||
14D5000
|
heap
|
page read and write
|
||
ABA000
|
heap
|
page read and write
|
||
381E000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
2538007E000
|
trusted library allocation
|
page read and write
|
||
5E6B000
|
stack
|
page read and write
|
||
2780000
|
heap
|
page execute and read and write
|
||
D6E000
|
stack
|
page read and write
|
||
191DFF00000
|
heap
|
page read and write
|
||
191C40B9000
|
trusted library allocation
|
page read and write
|
||
A4C000
|
heap
|
page read and write
|
||
59BE000
|
heap
|
page read and write
|
||
5C70000
|
heap
|
page read and write
|
||
2282B2C0000
|
heap
|
page read and write
|
||
A6D000
|
heap
|
page read and write
|
||
59C9000
|
heap
|
page read and write
|
||
191C438E000
|
trusted library allocation
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
A2B000
|
heap
|
page read and write
|
||
191C3F0E000
|
trusted library allocation
|
page read and write
|
||
3742000
|
heap
|
page read and write
|
||
B9E000
|
heap
|
page read and write
|
||
5B6C000
|
stack
|
page read and write
|
||
2282B1EC000
|
heap
|
page read and write
|
||
2282B75E000
|
heap
|
page read and write
|
||
B79000
|
heap
|
page read and write
|
||
2282B1A0000
|
heap
|
page read and write
|
||
A05000
|
heap
|
page read and write
|
||
4E0F000
|
stack
|
page read and write
|
||
96B000
|
stack
|
page read and write
|
||
1B3FE000
|
stack
|
page read and write
|
||
8F5000
|
heap
|
page read and write
|
||
253800AA000
|
trusted library allocation
|
page read and write
|
||
3401000
|
heap
|
page execute and read and write
|
||
379E000
|
heap
|
page read and write
|
||
2282B1E9000
|
heap
|
page read and write
|
||
3B05000
|
trusted library allocation
|
page read and write
|
||
A6E000
|
heap
|
page read and write
|
||
191C1BE2000
|
unkown
|
page readonly
|
||
C40000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
152000
|
unkown
|
page readonly
|
||
4E84000
|
heap
|
page read and write
|
||
A16000
|
heap
|
page read and write
|
||
3DEF000
|
trusted library allocation
|
page read and write
|
||
191C4193000
|
trusted library allocation
|
page read and write
|
||
4E93000
|
heap
|
page read and write
|
||
1B5FE000
|
stack
|
page read and write
|
||
7FFD9B84C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B7BC000
|
trusted library allocation
|
page execute and read and write
|
||
191E02A4000
|
heap
|
page read and write
|
||
191DFD5C000
|
heap
|
page read and write
|
||
191C406C000
|
trusted library allocation
|
page read and write
|
||
3777000
|
heap
|
page read and write
|
||
382C000
|
heap
|
page read and write
|
||
191E0195000
|
heap
|
page read and write
|
||
1B219000
|
heap
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
191DDE72000
|
heap
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
4B50000
|
heap
|
page read and write
|
||
253F92E0000
|
trusted library allocation
|
page read and write
|
||
A4C000
|
heap
|
page read and write
|
||
33C2000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
2282AFA0000
|
heap
|
page read and write
|
||
191E01DE000
|
heap
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
3788000
|
heap
|
page read and write
|
||
25380078000
|
trusted library allocation
|
page read and write
|
||
B9E000
|
heap
|
page read and write
|
||
B69000
|
heap
|
page read and write
|
||
191DDE20000
|
heap
|
page read and write
|
||
59C5000
|
heap
|
page read and write
|
||
3B39000
|
trusted library allocation
|
page read and write
|
||
A38000
|
heap
|
page read and write
|
||
6540000
|
trusted library allocation
|
page read and write
|
||
A19000
|
heap
|
page read and write
|
||
191DE30E000
|
heap
|
page read and write
|
||
2282B752000
|
heap
|
page read and write
|
||
33A0000
|
trusted library allocation
|
page read and write
|
||
12FE000
|
stack
|
page read and write
|
||
92F000
|
heap
|
page read and write
|
||
59C9000
|
heap
|
page read and write
|
||
3AC6000
|
trusted library allocation
|
page read and write
|
||
191DFE3C000
|
heap
|
page read and write
|
||
191C3AA0000
|
heap
|
page read and write
|
||
3745000
|
heap
|
page read and write
|
||
37BB000
|
heap
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
2282B2C5000
|
heap
|
page read and write
|
||
A09000
|
heap
|
page read and write
|
||
37B7000
|
heap
|
page read and write
|
||
191DFD62000
|
heap
|
page read and write
|
||
2282AF92000
|
heap
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page execute and read and write
|
||
AC0000
|
heap
|
page read and write
|
||
37B0000
|
heap
|
page read and write
|
||
191DDE4C000
|
heap
|
page read and write
|
||
2282AF91000
|
heap
|
page read and write
|
||
191DC5F1000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
2282CF7E000
|
heap
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
A16000
|
heap
|
page read and write
|
||
B11000
|
heap
|
page read and write
|
||
BEC000
|
heap
|
page read and write
|
||
2282AFAA000
|
heap
|
page read and write
|
||
1B8FE000
|
stack
|
page read and write
|
||
BEE000
|
heap
|
page read and write
|
There are 1110 hidden memdumps, click here to show them.