Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Dragons Dogma 2 v1.0 Plus 36 Trainer.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\FLiNGTrainer\TrainerSettings.ini
|
ASCII text, with CRLF line terminators
|
modified
|
||
Chrome Cache Entry: 45
|
ASCII text, with very long lines (771)
|
downloaded
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Dragons Dogma 2 v1.0 Plus 36 Trainer.exe
|
"C:\Users\user\Desktop\Dragons Dogma 2 v1.0 Plus 36 Trainer.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://473750571567004317064230583514468350804565684324378075159610742091604698238217701484029465762430135913242023857750034401559054060945654540273638867228794983640833862748912121851334807031249099092790952130035074227943842970399582505875/
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=2012,i,12561812202603157812,13767010147293151412,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://flingtrainer.com/tag/
|
unknown
|
||
https://flingtrainer.com/cn/community/forums/update-request/
|
unknown
|
||
https://flingtrainer.com/download-wemod-trainer.php?nameHmj
|
unknown
|
||
https://bbs.3dmgame.com/thread-
|
unknown
|
||
https://flingtrainer.com/wp-content/check-for-trainer-update/get-trainer-update
|
104.21.85.118
|
||
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgRmgZjcGK_wrrEGIjAn3Wc5iwnZMZgX6R7yhDKD_86kMZeGk-qF3cDY8yyy7fbGEK6IqCghGSgQn1GUoW8yAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
|
142.250.64.196
|
||
https://flingtrainer.com/cn/community/forums/trainer-request/
|
unknown
|
||
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgRmgZjcGK_wrrEGIjAA-kYpC-Y-c7RBERJsELzsgpywuUS7w5EbA-x6wgoWhDAN92TwrMKaq9jZAJA03X4yAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
|
142.250.64.196
|
||
https://www.google.com/async/newtab_promos
|
142.250.64.196
|
||
https://flingtrainer.com/download-wemod-trainer.php?nameHm
|
unknown
|
||
https://flingtrainer.com/download-wemod-trainer.php?name=
|
unknown
|
||
https://flingtrainer.com/tag/dragons-dogma-28
|
unknown
|
||
https://flingtrainer.com/wp-content/check-for-trainer-update/get-trainer-updateV
|
unknown
|
||
https://flingtrainer.com/
|
unknown
|
||
https://flingtrainer.com/.(R
|
unknown
|
||
https://flingtrainer.com/wp-json/trainer-api/update-page?name=
|
unknown
|
||
https://flingtrainer.com/wp-content/check-for-trainer-update/dragons-dogma-2-trainerZ
|
unknown
|
||
https://flingtrainer.com/tag/dragons-dogma-2
|
unknown
|
||
https://www.google.com/async/ddljson?async=ntp:2
|
142.250.64.196
|
||
https://flingtrainer.com/cn/2.html0
|
unknown
|
||
http://www.founder.com.cn/cn
|
unknown
|
||
https://flingtrainer.com/wp-content/check-for-trainer-update/dragons-dogma-2-trainer
|
104.21.85.118
|
||
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
|
142.250.64.196
|
||
https://flingtrainer.com/cn/community/threads/4260/
|
unknown
|
||
https://flingtrainer.com/download-wemod-trainer.php?name=dragons-dogma-2-trainer
|
unknown
|
||
https://flingtrainer.com/cn/community/threads/4260/3https://flingtrainer.com/qhttps://flingtrainer.c
|
unknown
|
||
https://flingtrainer.com/wp-content/check-for-trainer-update/
|
unknown
|
||
https://flingtrainer.com/patreon
|
unknown
|
||
https://flingtrainer.com/cn/community/support_the_author
|
unknown
|
||
https://flingtrainer.com/wp-content/check-for-trainer-update/get-trainer-updatel
|
unknown
|
||
https://flingtrainer.com/cn/community/forums/update-request/8
|
unknown
|
||
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
|
142.250.64.196
|
||
https://flingtrainer.com/wp-content/check-for-trainer-update/get-trainer-updateIV
|
unknown
|
||
https://www.3dmgame.com/flxgq.html
|
unknown
|
||
https://flingtrainer.com/cn/community/api/v2/app-login.php
|
unknown
|
||
https://bbs.3dmgame.com/thread-https://flingtrainer.com/tag/TRAINER_INITIALIZEWMURLhttps://flingtrai
|
unknown
|
There are 26 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
flingtrainer.com
|
104.21.85.118
|
||
www.google.com
|
142.250.64.196
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.85.118
|
flingtrainer.com
|
United States
|
||
142.250.64.196
|
www.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
192.168.2.4
|
unknown
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1C27C8A0000
|
trusted library section
|
page read and write
|
||
1C21DB9F000
|
heap
|
page read and write
|
||
1C21DA06000
|
heap
|
page read and write
|
||
1C27D0D0000
|
heap
|
page read and write
|
||
1C21E74A000
|
heap
|
page read and write
|
||
1C21D953000
|
heap
|
page read and write
|
||
1C21DA5F000
|
heap
|
page read and write
|
||
1C21E419000
|
heap
|
page read and write
|
||
1C21E096000
|
heap
|
page read and write
|
||
1C27D442000
|
heap
|
page read and write
|
||
1C21E3E4000
|
heap
|
page read and write
|
||
1C21D9F8000
|
heap
|
page read and write
|
||
1C21DBF6000
|
heap
|
page read and write
|
||
1C21DFDA000
|
heap
|
page read and write
|
||
1C21E040000
|
heap
|
page read and write
|
||
1C21E107000
|
heap
|
page read and write
|
||
1C21DBEA000
|
heap
|
page read and write
|
||
1C21E371000
|
heap
|
page read and write
|
||
1C21E36D000
|
heap
|
page read and write
|
||
1C21DA36000
|
heap
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
1C21DBAF000
|
heap
|
page read and write
|
||
1C27F0E0000
|
heap
|
page read and write
|
||
1C21DD07000
|
heap
|
page read and write
|
||
7FF4C1F43000
|
trusted library allocation
|
page execute read
|
||
1C21D8E2000
|
heap
|
page read and write
|
||
1C21D9B5000
|
heap
|
page read and write
|
||
1C21DD65000
|
heap
|
page read and write
|
||
1C21D820000
|
heap
|
page read and write
|
||
7FFD9B7BB000
|
trusted library allocation
|
page execute and read and write
|
||
1C21D9FC000
|
heap
|
page read and write
|
||
1C21DB1F000
|
heap
|
page read and write
|
||
1C21DE69000
|
heap
|
page read and write
|
||
1C27EEC0000
|
trusted library allocation
|
page read and write
|
||
1C21E2F8000
|
heap
|
page read and write
|
||
1C21DA2C000
|
heap
|
page read and write
|
||
1C27CC90000
|
trusted library allocation
|
page read and write
|
||
1C21DEBA000
|
heap
|
page read and write
|
||
1C21DA55000
|
heap
|
page read and write
|
||
1C21DF1A000
|
heap
|
page read and write
|
||
1C27F02F000
|
heap
|
page read and write
|
||
7FF4C1F42000
|
trusted library allocation
|
page readonly
|
||
1C21DC1E000
|
heap
|
page read and write
|
||
1C21DA67000
|
heap
|
page read and write
|
||
1C27F00C000
|
heap
|
page read and write
|
||
1C21D969000
|
heap
|
page read and write
|
||
1C21DE65000
|
heap
|
page read and write
|
||
1C21DB5B000
|
heap
|
page read and write
|
||
1C27ACFC000
|
heap
|
page read and write
|
||
1C21DB89000
|
heap
|
page read and write
|
||
1C21DCE5000
|
heap
|
page read and write
|
||
1C27EF6F000
|
heap
|
page read and write
|
||
1C21E058000
|
heap
|
page read and write
|
||
1C21DBFE000
|
heap
|
page read and write
|
||
1C27D419000
|
heap
|
page read and write
|
||
1C21DE85000
|
heap
|
page read and write
|
||
1C21B4C0000
|
trusted library allocation
|
page read and write
|
||
1C21E08C000
|
heap
|
page read and write
|
||
1C21D8C3000
|
heap
|
page read and write
|
||
1C21E086000
|
heap
|
page read and write
|
||
1C21E032000
|
heap
|
page read and write
|
||
1C21DF5C000
|
heap
|
page read and write
|
||
1C21E0B9000
|
heap
|
page read and write
|
||
1C2001ED000
|
trusted library allocation
|
page read and write
|
||
1C21DA6B000
|
heap
|
page read and write
|
||
1C27EF35000
|
heap
|
page read and write
|
||
1C21DCDD000
|
heap
|
page read and write
|
||
1C21E38D000
|
heap
|
page read and write
|
||
1C21DDDE000
|
heap
|
page read and write
|
||
1C21DC5F000
|
heap
|
page read and write
|
||
1C21DF42000
|
heap
|
page read and write
|
||
1C21DC34000
|
heap
|
page read and write
|
||
1C21D8D3000
|
heap
|
page read and write
|
||
1C21E024000
|
heap
|
page read and write
|
||
1C21D863000
|
heap
|
page read and write
|
||
1C21D9B9000
|
heap
|
page read and write
|
||
9F8413B000
|
stack
|
page read and write
|
||
1C27F255000
|
heap
|
page read and write
|
||
1C27F014000
|
heap
|
page read and write
|
||
1C27F595000
|
trusted library allocation
|
page read and write
|
||
1C21E420000
|
heap
|
page read and write
|
||
1C21E391000
|
heap
|
page read and write
|
||
7FFD9B7B0000
|
trusted library allocation
|
page read and write
|
||
1C21D9CD000
|
heap
|
page read and write
|
||
1C21E310000
|
heap
|
page read and write
|
||
1C21DC08000
|
heap
|
page read and write
|
||
1C27F20C000
|
heap
|
page read and write
|
||
1C21DC26000
|
heap
|
page read and write
|
||
1C21DB37000
|
heap
|
page read and write
|
||
1C21DC75000
|
heap
|
page read and write
|
||
1C27D2FD000
|
heap
|
page read and write
|
||
1C21DA91000
|
heap
|
page read and write
|
||
1C21DB8D000
|
heap
|
page read and write
|
||
1C21B080000
|
heap
|
page read and write
|
||
1C21E0FD000
|
heap
|
page read and write
|
||
1C27C750000
|
trusted library allocation
|
page read and write
|
||
1C21B550000
|
trusted library allocation
|
page read and write
|
||
1C21D8CB000
|
heap
|
page read and write
|
||
1C21D9DB000
|
heap
|
page read and write
|
||
1C21E30C000
|
heap
|
page read and write
|
||
1C21E04C000
|
heap
|
page read and write
|
||
7FF4C1F23000
|
trusted library allocation
|
page execute read
|
||
1C21DA7B000
|
heap
|
page read and write
|
||
1C27D270000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
1C27F0E4000
|
heap
|
page read and write
|
||
1C21DBEE000
|
heap
|
page read and write
|
||
7FFD9B7EC000
|
trusted library allocation
|
page execute and read and write
|
||
1C21DEC0000
|
heap
|
page read and write
|
||
7FF4C1F2A000
|
trusted library allocation
|
page readonly
|
||
1C21DD6D000
|
heap
|
page read and write
|
||
1C27F000000
|
heap
|
page read and write
|
||
1C21E369000
|
heap
|
page read and write
|
||
1C27D067000
|
heap
|
page read and write
|
||
1C21DB19000
|
heap
|
page read and write
|
||
1C21E092000
|
heap
|
page read and write
|
||
1C21DE1A000
|
heap
|
page read and write
|
||
1C21DA57000
|
heap
|
page read and write
|
||
1C21DB95000
|
heap
|
page read and write
|
||
1C27D45F000
|
heap
|
page read and write
|
||
1C27D574000
|
heap
|
page read and write
|
||
1C21D8DD000
|
heap
|
page read and write
|
||
1C27D3EF000
|
heap
|
page read and write
|
||
1C27AD46000
|
heap
|
page read and write
|
||
1C21E324000
|
heap
|
page read and write
|
||
1C21B490000
|
trusted library allocation
|
page read and write
|
||
1C27C760000
|
heap
|
page read and write
|
||
1C27F544000
|
trusted library allocation
|
page read and write
|
||
1C21E088000
|
heap
|
page read and write
|
||
1C21DC6F000
|
heap
|
page read and write
|
||
1C27C720000
|
trusted library allocation
|
page read and write
|
||
1C21DAB2000
|
heap
|
page read and write
|
||
1C27AD48000
|
heap
|
page read and write
|
||
1C21E45F000
|
heap
|
page read and write
|
||
1C21E36B000
|
heap
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
1C27F1B8000
|
heap
|
page read and write
|
||
1C27EF9C000
|
heap
|
page read and write
|
||
1C27EEFC000
|
heap
|
page read and write
|
||
1C21DD23000
|
heap
|
page read and write
|
||
1C21E318000
|
heap
|
page read and write
|
||
1C21D833000
|
heap
|
page read and write
|
||
7FFD9B876000
|
trusted library allocation
|
page execute and read and write
|
||
1C21DFB0000
|
heap
|
page read and write
|
||
1C21DD10000
|
heap
|
page read and write
|
||
1C21E330000
|
heap
|
page read and write
|
||
9F831F0000
|
stack
|
page read and write
|
||
7FF4C1F4C000
|
trusted library allocation
|
page readonly
|
||
1C21DA4E000
|
heap
|
page read and write
|
||
1C21DA26000
|
heap
|
page read and write
|
||
1C27D5A0000
|
heap
|
page read and write
|
||
1C21DD79000
|
heap
|
page read and write
|
||
1C21DC12000
|
heap
|
page read and write
|
||
1C21D85D000
|
heap
|
page read and write
|
||
1C21DA6D000
|
heap
|
page read and write
|
||
1C21DF26000
|
heap
|
page read and write
|
||
1C21DB8F000
|
heap
|
page read and write
|
||
1C21E385000
|
heap
|
page read and write
|
||
1C21D9CB000
|
heap
|
page read and write
|
||
1C27F1A2000
|
heap
|
page read and write
|
||
1C21DD73000
|
heap
|
page read and write
|
||
1C21DF12000
|
heap
|
page read and write
|
||
1C21DACA000
|
heap
|
page read and write
|
||
7FF4C1F3E000
|
trusted library allocation
|
page readonly
|
||
1C27AD76000
|
heap
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
1C21D971000
|
heap
|
page read and write
|
||
1C21E37F000
|
heap
|
page read and write
|
||
1C21DFC6000
|
heap
|
page read and write
|
||
1C21DBCF000
|
heap
|
page read and write
|
||
1C21E0E3000
|
heap
|
page read and write
|
||
1C21B470000
|
trusted library allocation
|
page read and write
|
||
1C21D8D7000
|
heap
|
page read and write
|
||
1C27ADF0000
|
heap
|
page read and write
|
||
1C21E52C000
|
heap
|
page read and write
|
||
1C27D3C2000
|
heap
|
page read and write
|
||
1C21DDCC000
|
heap
|
page read and write
|
||
1C21E08A000
|
heap
|
page read and write
|
||
1C21DF98000
|
heap
|
page read and write
|
||
1C21E02E000
|
heap
|
page read and write
|
||
1C21DC02000
|
heap
|
page read and write
|
||
1C21DEC4000
|
heap
|
page read and write
|
||
9F84B3F000
|
stack
|
page read and write
|
||
1C21DF81000
|
heap
|
page read and write
|
||
1C27C6F0000
|
trusted library section
|
page read and write
|
||
1C27C910000
|
heap
|
page read and write
|
||
1C21DA2E000
|
heap
|
page read and write
|
||
1C21E432000
|
heap
|
page read and write
|
||
1C27C700000
|
trusted library allocation
|
page read and write
|
||
1C27F019000
|
heap
|
page read and write
|
||
1C21DEB4000
|
heap
|
page read and write
|
||
1C21D8CD000
|
heap
|
page read and write
|
||
1C21DAD0000
|
heap
|
page read and write
|
||
1C200001000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
1C27D521000
|
heap
|
page read and write
|
||
1C21DFB6000
|
heap
|
page read and write
|
||
1C21DFCE000
|
heap
|
page read and write
|
||
1C21E042000
|
heap
|
page read and write
|
||
1C21E0BD000
|
heap
|
page read and write
|
||
7FF4C1F47000
|
trusted library allocation
|
page execute read
|
||
1C21DA71000
|
heap
|
page read and write
|
||
1C21DE7F000
|
heap
|
page read and write
|
||
1C21E0A4000
|
heap
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page read and write
|
||
1C21B4B0000
|
trusted library allocation
|
page read and write
|
||
1C27D3E7000
|
heap
|
page read and write
|
||
1C21DE47000
|
heap
|
page read and write
|
||
1C21DA8B000
|
heap
|
page read and write
|
||
1C21DD67000
|
heap
|
page read and write
|
||
1C21E2D6000
|
heap
|
page read and write
|
||
1C21DB45000
|
heap
|
page read and write
|
||
1C21DA8D000
|
heap
|
page read and write
|
||
1C21E440000
|
heap
|
page read and write
|
||
1C21DF0A000
|
heap
|
page read and write
|
||
1C21E442000
|
heap
|
page read and write
|
||
1C21D8A5000
|
heap
|
page read and write
|
||
1C27F19C000
|
heap
|
page read and write
|
||
7FF4C1F2B000
|
trusted library allocation
|
page execute read
|
||
1C21E0B5000
|
heap
|
page read and write
|
||
1C21E0CA000
|
heap
|
page read and write
|
||
1C21DC69000
|
heap
|
page read and write
|
||
1C21E022000
|
heap
|
page read and write
|
||
1C21DC73000
|
heap
|
page read and write
|
||
1C21E050000
|
heap
|
page read and write
|
||
7FF4C1F26000
|
trusted library allocation
|
page readonly
|
||
1C21E3FB000
|
heap
|
page read and write
|
||
9F838FE000
|
stack
|
page read and write
|
||
1C21E094000
|
heap
|
page read and write
|
||
1C21B4D0000
|
trusted library allocation
|
page read and write
|
||
1C27CC60000
|
trusted library allocation
|
page read and write
|
||
1C21D97D000
|
heap
|
page read and write
|
||
1C21B510000
|
trusted library allocation
|
page read and write
|
||
1C27F1C6000
|
heap
|
page read and write
|
||
1C21E397000
|
heap
|
page read and write
|
||
1C21DC79000
|
heap
|
page read and write
|
||
1C21DF2E000
|
heap
|
page read and write
|
||
1C27EF54000
|
heap
|
page read and write
|
||
1C21DF66000
|
heap
|
page read and write
|
||
7FF4C1F20000
|
trusted library allocation
|
page readonly
|
||
1C21E3E8000
|
heap
|
page read and write
|
||
1C21E0A8000
|
heap
|
page read and write
|
||
1C27C6E0000
|
trusted library section
|
page read and write
|
||
1C27F1C0000
|
heap
|
page read and write
|
||
1C27D088000
|
heap
|
page read and write
|
||
1C21DCD1000
|
heap
|
page read and write
|
||
1C27D3F9000
|
heap
|
page read and write
|
||
1C21E2CC000
|
heap
|
page read and write
|
||
1C27D47C000
|
heap
|
page read and write
|
||
1C21DCBB000
|
heap
|
page read and write
|
||
1C21DCE9000
|
heap
|
page read and write
|
||
1C21DA59000
|
heap
|
page read and write
|
||
1C21DBB1000
|
heap
|
page read and write
|
||
1C21DECA000
|
heap
|
page read and write
|
||
1C21DC67000
|
heap
|
page read and write
|
||
1C21E05C000
|
heap
|
page read and write
|
||
1C21DB85000
|
heap
|
page read and write
|
||
1C21DADC000
|
heap
|
page read and write
|
||
1C21DAAE000
|
heap
|
page read and write
|
||
1C21DC1A000
|
heap
|
page read and write
|
||
1C21E2FE000
|
heap
|
page read and write
|
||
1C21E402000
|
heap
|
page read and write
|
||
1C21DE9E000
|
heap
|
page read and write
|
||
1C21DAFE000
|
heap
|
page read and write
|
||
1C21E3A2000
|
heap
|
page read and write
|
||
1C27D3DB000
|
heap
|
page read and write
|
||
1C27D597000
|
heap
|
page read and write
|
||
1C21D9A3000
|
heap
|
page read and write
|
||
1C27EF5A000
|
heap
|
page read and write
|
||
7FF4C1F21000
|
trusted library allocation
|
page execute read
|
||
1C21D963000
|
heap
|
page read and write
|
||
7FF4C1F41000
|
trusted library allocation
|
page execute read
|
||
1C21D985000
|
heap
|
page read and write
|
||
1C27EF67000
|
heap
|
page read and write
|
||
1C21DA95000
|
heap
|
page read and write
|
||
1C21DA04000
|
heap
|
page read and write
|
||
1C21DE5B000
|
heap
|
page read and write
|
||
1C21DFA4000
|
heap
|
page read and write
|
||
1C21D989000
|
heap
|
page read and write
|
||
1C21D9B7000
|
heap
|
page read and write
|
||
1C21DC7F000
|
heap
|
page read and write
|
||
1C21E0DD000
|
heap
|
page read and write
|
||
1C21DBA9000
|
heap
|
page read and write
|
||
9F836FE000
|
stack
|
page read and write
|
||
1C21E0DF000
|
heap
|
page read and write
|
||
1C21D841000
|
heap
|
page read and write
|
||
1C21E747000
|
heap
|
page read and write
|
||
1C21DC97000
|
heap
|
page read and write
|
||
1C21E0E1000
|
heap
|
page read and write
|
||
1C21D967000
|
heap
|
page read and write
|
||
1C27F012000
|
heap
|
page read and write
|
||
1C21DF02000
|
heap
|
page read and write
|
||
1C21DF52000
|
heap
|
page read and write
|
||
1C21DDB3000
|
heap
|
page read and write
|
||
1C21DABC000
|
heap
|
page read and write
|
||
1C21DA1A000
|
heap
|
page read and write
|
||
1C21E020000
|
heap
|
page read and write
|
||
1C27F103000
|
heap
|
page read and write
|
||
1C21B4E0000
|
trusted library allocation
|
page read and write
|
||
1C27C76E000
|
heap
|
page read and write
|
||
1C21DB49000
|
heap
|
page read and write
|
||
1C27D427000
|
heap
|
page read and write
|
||
1C21E308000
|
heap
|
page read and write
|
||
1C21E316000
|
heap
|
page read and write
|
||
1C21D9C5000
|
heap
|
page read and write
|
||
1C27F0B5000
|
heap
|
page read and write
|
||
9F83AF4000
|
stack
|
page read and write
|
||
1C21E399000
|
heap
|
page read and write
|
||
1C21DF9A000
|
heap
|
page read and write
|
||
1C21E304000
|
heap
|
page read and write
|
||
1C21DC22000
|
heap
|
page read and write
|
||
1C21DEB2000
|
heap
|
page read and write
|
||
1C21DE81000
|
heap
|
page read and write
|
||
1C21B4A0000
|
trusted library allocation
|
page read and write
|
||
1C27F19A000
|
heap
|
page read and write
|
||
1C27D3F1000
|
heap
|
page read and write
|
||
1C21DFAA000
|
heap
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
1C21D94F000
|
heap
|
page read and write
|
||
1C21D873000
|
heap
|
page read and write
|
||
1C21D84F000
|
heap
|
page read and write
|
||
1C21D86D000
|
heap
|
page read and write
|
||
7FF4C1F2F000
|
trusted library allocation
|
page execute read
|
||
1C21E413000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
7FF4C1F32000
|
trusted library allocation
|
page readonly
|
||
1C27D3CC000
|
heap
|
page read and write
|
||
1C21DFD4000
|
heap
|
page read and write
|
||
1C21DE96000
|
heap
|
page read and write
|
||
1C21B540000
|
trusted library allocation
|
page read and write
|
||
1C21B520000
|
trusted library allocation
|
page read and write
|
||
1C21E2FC000
|
heap
|
page read and write
|
||
1C21DC2A000
|
heap
|
page read and write
|
||
1C21DEC6000
|
heap
|
page read and write
|
||
1C21DF44000
|
heap
|
page read and write
|
||
1C21E0F5000
|
heap
|
page read and write
|
||
1C21E03A000
|
heap
|
page read and write
|
||
1C21D9AF000
|
heap
|
page read and write
|
||
1C21DB57000
|
heap
|
page read and write
|
||
1C27D411000
|
heap
|
page read and write
|
||
1C210001000
|
trusted library allocation
|
page read and write
|
||
1C21E062000
|
heap
|
page read and write
|
||
1C27D466000
|
heap
|
page read and write
|
||
1C27EED0000
|
trusted library allocation
|
page read and write
|
||
1C21B900000
|
trusted library allocation
|
page read and write
|
||
1C21DB87000
|
heap
|
page read and write
|
||
1C21DCCD000
|
heap
|
page read and write
|
||
1C27F264000
|
heap
|
page read and write
|
||
1C21DA14000
|
heap
|
page read and write
|
||
1C21D961000
|
heap
|
page read and write
|
||
1C21DEC2000
|
heap
|
page read and write
|
||
1C27EF0F000
|
heap
|
page read and write
|
||
1C21E2F6000
|
heap
|
page read and write
|
||
1C27C890000
|
heap
|
page read and write
|
||
1C27D290000
|
heap
|
page read and write
|
||
1C21DA24000
|
heap
|
page read and write
|
||
1C21DE79000
|
heap
|
page read and write
|
||
7FF4C1F4D000
|
trusted library allocation
|
page execute read
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
1C21D883000
|
heap
|
page read and write
|
||
1C21E3E2000
|
heap
|
page read and write
|
||
1C27F2A7000
|
heap
|
page read and write
|
||
1C21DA83000
|
heap
|
page read and write
|
||
1C27D3BE000
|
heap
|
page read and write
|
||
1C21DDD6000
|
heap
|
page read and write
|
||
1C21B500000
|
trusted library allocation
|
page read and write
|
||
1C27D390000
|
heap
|
page execute and read and write
|
||
1C21DA00000
|
heap
|
page read and write
|
||
1C27D2AC000
|
heap
|
page read and write
|
||
1C21E406000
|
heap
|
page read and write
|
||
1C21D92B000
|
heap
|
page read and write
|
||
1C21E0C6000
|
heap
|
page read and write
|
||
1C21DB2F000
|
heap
|
page read and write
|
||
1C21DA0C000
|
heap
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
1C21DEB0000
|
heap
|
page read and write
|
||
1C21DE8E000
|
heap
|
page read and write
|
||
1C21DC24000
|
heap
|
page read and write
|
||
1C21DD4B000
|
heap
|
page read and write
|
||
1C21DD49000
|
heap
|
page read and write
|
||
1C21DA43000
|
heap
|
page read and write
|
||
1C21E070000
|
heap
|
page read and write
|
||
1C21D869000
|
heap
|
page read and write
|
||
1C21DC06000
|
heap
|
page read and write
|
||
1C21DF54000
|
heap
|
page read and write
|
||
1C21DF3C000
|
heap
|
page read and write
|
||
1C21B480000
|
trusted library allocation
|
page read and write
|
||
1C21DB25000
|
heap
|
page read and write
|
||
1C27C776000
|
heap
|
page read and write
|
||
1C21D9F6000
|
heap
|
page read and write
|
||
1C21DAEC000
|
heap
|
page read and write
|
||
7FF7C9371000
|
unkown
|
page readonly
|
||
1C21DB4B000
|
heap
|
page read and write
|
||
1C21E078000
|
heap
|
page read and write
|
||
1C21DB2B000
|
heap
|
page read and write
|
||
1C21E2BD000
|
heap
|
page read and write
|
||
1C21DCEB000
|
heap
|
page read and write
|
||
1C21D879000
|
heap
|
page read and write
|
||
1C21DE73000
|
heap
|
page read and write
|
||
1C21DE92000
|
heap
|
page read and write
|
||
1C21DE8C000
|
heap
|
page read and write
|
||
1C21D8BD000
|
heap
|
page read and write
|
||
1C21D96D000
|
heap
|
page read and write
|
||
1C27AED0000
|
heap
|
page read and write
|
||
1C21DEA6000
|
heap
|
page read and write
|
||
1C21E026000
|
heap
|
page read and write
|
||
1C21DD77000
|
heap
|
page read and write
|
||
1C27D40C000
|
heap
|
page read and write
|
||
1C21DF2C000
|
heap
|
page read and write
|
||
1C21DB7F000
|
heap
|
page read and write
|
||
1C21D9D3000
|
heap
|
page read and write
|
||
1C21DBBF000
|
heap
|
page read and write
|
||
7FF7C936C000
|
unkown
|
page write copy
|
||
1C27F1B0000
|
heap
|
page read and write
|
||
1C21D8B1000
|
heap
|
page read and write
|
||
7FFD9B94C000
|
trusted library allocation
|
page read and write
|
||
1C21DD6B000
|
heap
|
page read and write
|
||
1C21E43A000
|
heap
|
page read and write
|
||
1C21DEFE000
|
heap
|
page read and write
|
||
1C21DEA4000
|
heap
|
page read and write
|
||
1C27F59B000
|
trusted library allocation
|
page read and write
|
||
1C21DF89000
|
heap
|
page read and write
|
||
1C21DAC8000
|
heap
|
page read and write
|
||
1C21E2B5000
|
heap
|
page read and write
|
||
1C21DAD8000
|
heap
|
page read and write
|
||
1C21DA18000
|
heap
|
page read and write
|
||
1C21D8A9000
|
heap
|
page read and write
|
||
1C21DCEF000
|
heap
|
page read and write
|
||
1C21E111000
|
heap
|
page read and write
|
||
1C21DB8B000
|
heap
|
page read and write
|
||
1C21DA46000
|
heap
|
page read and write
|
||
1C21DB4D000
|
heap
|
page read and write
|
||
1C21E428000
|
heap
|
page read and write
|
||
1C21E436000
|
heap
|
page read and write
|
||
1C27C743000
|
heap
|
page read and write
|
||
1C21DA1C000
|
heap
|
page read and write
|
||
1C21DB4F000
|
heap
|
page read and write
|
||
1C21DF9E000
|
heap
|
page read and write
|
||
1C21E387000
|
heap
|
page read and write
|
||
1C21E31E000
|
heap
|
page read and write
|
||
1C21E0D5000
|
heap
|
page read and write
|
||
1C21E38F000
|
heap
|
page read and write
|
||
1C21DF9C000
|
heap
|
page read and write
|
||
1C21DA81000
|
heap
|
page read and write
|
||
1C27D44F000
|
heap
|
page read and write
|
||
1C21E705000
|
heap
|
page read and write
|
||
7FF4C1F28000
|
trusted library allocation
|
page readonly
|
||
1C27F562000
|
trusted library allocation
|
page read and write
|
||
1C21DF50000
|
heap
|
page read and write
|
||
1C21DF60000
|
heap
|
page read and write
|
||
1C21DE13000
|
heap
|
page read and write
|
||
1C27D407000
|
heap
|
page read and write
|
||
1C21E383000
|
heap
|
page read and write
|
||
1C21E45A000
|
heap
|
page read and write
|
||
1C27D485000
|
heap
|
page read and write
|
||
1C21E0FB000
|
heap
|
page read and write
|
||
1C21DF28000
|
heap
|
page read and write
|
||
7FF4C1F3F000
|
trusted library allocation
|
page execute read
|
||
1C21DD3F000
|
heap
|
page read and write
|
||
1C21D8B3000
|
heap
|
page read and write
|
||
1C21DE6B000
|
heap
|
page read and write
|
||
1C27EF94000
|
heap
|
page read and write
|
||
1C21D9D5000
|
heap
|
page read and write
|
||
1C21DBA1000
|
heap
|
page read and write
|
||
1C21DF92000
|
heap
|
page read and write
|
||
1C21DD03000
|
heap
|
page read and write
|
||
1C21DBB3000
|
heap
|
page read and write
|
||
1C21E43C000
|
heap
|
page read and write
|
||
1C21D8AD000
|
heap
|
page read and write
|
||
1C27C730000
|
heap
|
page execute and read and write
|
||
7FFD9B952000
|
trusted library allocation
|
page read and write
|
||
1C21E33F000
|
heap
|
page read and write
|
||
1C21DE98000
|
heap
|
page read and write
|
||
7FF4C1F34000
|
trusted library allocation
|
page readonly
|
||
1C21E048000
|
heap
|
page read and write
|
||
9F8483F000
|
stack
|
page read and write
|
||
1C27F08C000
|
heap
|
page read and write
|
||
7FFD9B792000
|
trusted library allocation
|
page read and write
|
||
1C21DB43000
|
heap
|
page read and write
|
||
9F839FD000
|
stack
|
page read and write
|
||
1C27F070000
|
heap
|
page read and write
|
||
7FF4C1F22000
|
trusted library allocation
|
page readonly
|
||
1C21D979000
|
heap
|
page read and write
|
||
1C21D851000
|
heap
|
page read and write
|
||
1C21DA3F000
|
heap
|
page read and write
|
||
1C21DE6D000
|
heap
|
page read and write
|
||
1C21DA65000
|
heap
|
page read and write
|
||
1C21D9B1000
|
heap
|
page read and write
|
||
1C27D100000
|
heap
|
page execute and read and write
|
||
1C21DBFC000
|
heap
|
page read and write
|
||
1C21DD14000
|
heap
|
page read and write
|
||
1C21DBBB000
|
heap
|
page read and write
|
||
1C21E450000
|
heap
|
page read and write
|
||
1C21DD3D000
|
heap
|
page read and write
|
||
1C21E32A000
|
heap
|
page read and write
|
||
1C21E43E000
|
heap
|
page read and write
|
||
1C21E40A000
|
heap
|
page read and write
|
||
7FF7C9290000
|
unkown
|
page readonly
|
||
1C21E0ED000
|
heap
|
page read and write
|
||
1C27F1CB000
|
heap
|
page read and write
|
||
7FF4C1F3C000
|
trusted library allocation
|
page readonly
|
||
1C27D567000
|
heap
|
page read and write
|
||
1C21DCF1000
|
heap
|
page read and write
|
||
1C21DD45000
|
heap
|
page read and write
|
||
1C21D940000
|
heap
|
page read and write
|
||
1C21DEE1000
|
heap
|
page read and write
|
||
1C21E328000
|
heap
|
page read and write
|
||
1C27F009000
|
heap
|
page read and write
|
||
1C21E2EA000
|
heap
|
page read and write
|
||
1C21DDDA000
|
heap
|
page read and write
|
||
1C21DF3E000
|
heap
|
page read and write
|
||
1C27AD17000
|
heap
|
page read and write
|
||
1C27D448000
|
heap
|
page read and write
|
||
1C21D87B000
|
heap
|
page read and write
|
||
1C27CFE0000
|
heap
|
page read and write
|
||
1C27ACF6000
|
heap
|
page read and write
|
||
7FF4C1F33000
|
trusted library allocation
|
page execute read
|
||
1C27F2AF000
|
heap
|
page read and write
|
||
9F84338000
|
stack
|
page read and write
|
||
1C21E076000
|
heap
|
page read and write
|
||
1C21E056000
|
heap
|
page read and write
|
||
7FFD9B978000
|
trusted library allocation
|
page read and write
|
||
7FF7C936C000
|
unkown
|
page read and write
|
||
1C21DBC8000
|
heap
|
page read and write
|
||
1C21D9A5000
|
heap
|
page read and write
|
||
1C27D33F000
|
heap
|
page read and write
|
||
7FF7C9291000
|
unkown
|
page execute read
|
||
7FFD9B84C000
|
trusted library allocation
|
page execute and read and write
|
||
1C21DB35000
|
heap
|
page read and write
|
||
1C21DB9D000
|
heap
|
page read and write
|
||
1C21DEA0000
|
heap
|
page read and write
|
||
1C21DA12000
|
heap
|
page read and write
|
||
7FFD9B7BD000
|
trusted library allocation
|
page execute and read and write
|
||
1C27D4FF000
|
heap
|
page read and write
|
||
7FF4C1F2E000
|
trusted library allocation
|
page readonly
|
||
1C21D943000
|
heap
|
page read and write
|
||
1C21E786000
|
heap
|
page read and write
|
||
1C21DACE000
|
heap
|
page read and write
|
||
7FF4C1F3B000
|
trusted library allocation
|
page execute read
|
||
7FF4C1F46000
|
trusted library allocation
|
page readonly
|
||
1C21E044000
|
heap
|
page read and write
|
||
1C27D2C3000
|
heap
|
page read and write
|
||
1C21E44C000
|
heap
|
page read and write
|
||
1C21E0EB000
|
heap
|
page read and write
|
||
1C21D867000
|
heap
|
page read and write
|
||
1C21E028000
|
heap
|
page read and write
|
||
1C21D9CF000
|
heap
|
page read and write
|
||
1C21DBF2000
|
heap
|
page read and write
|
||
1C21DF76000
|
heap
|
page read and write
|
||
1C21DCBD000
|
heap
|
page read and write
|
||
1C21DC20000
|
heap
|
page read and write
|
||
1C21DE7D000
|
heap
|
page read and write
|
||
1C21E430000
|
heap
|
page read and write
|
||
1C27D570000
|
heap
|
page read and write
|
||
7FFD9B7AD000
|
trusted library allocation
|
page execute and read and write
|
||
1C21DF68000
|
heap
|
page read and write
|
||
1C21E0AC000
|
heap
|
page read and write
|
||
1C21D9E1000
|
heap
|
page read and write
|
||
1C21E452000
|
heap
|
page read and write
|
||
1C21DAB0000
|
heap
|
page read and write
|
||
1C21DCB9000
|
heap
|
page read and write
|
||
1C21D88C000
|
heap
|
page read and write
|
||
1C21E3E0000
|
heap
|
page read and write
|
||
1C21E0A6000
|
heap
|
page read and write
|
||
1C21D959000
|
heap
|
page read and write
|
||
1C21E751000
|
heap
|
page read and write
|
||
1C21E07E000
|
heap
|
page read and write
|
||
1C21E0E7000
|
heap
|
page read and write
|
||
1C21DCDF000
|
heap
|
page read and write
|
||
1C21B8E0000
|
trusted library allocation
|
page read and write
|
||
1C21DD59000
|
heap
|
page read and write
|
||
1C21DF24000
|
heap
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
1C21E30E000
|
heap
|
page read and write
|
||
1C21DF85000
|
heap
|
page read and write
|
||
7FF4C1F25000
|
trusted library allocation
|
page execute read
|
||
1C21DC04000
|
heap
|
page read and write
|
||
1C21D86F000
|
heap
|
page read and write
|
||
1C21DB1D000
|
heap
|
page read and write
|
||
1C21DF06000
|
heap
|
page read and write
|
||
1C21B530000
|
trusted library allocation
|
page read and write
|
||
1C27D3B3000
|
heap
|
page read and write
|
||
1C27EF51000
|
heap
|
page read and write
|
||
1C21DADE000
|
heap
|
page read and write
|
||
1C21DFB2000
|
heap
|
page read and write
|
||
1C21DBCC000
|
heap
|
page read and write
|
||
1C27F187000
|
heap
|
page read and write
|
||
1C21DD69000
|
heap
|
page read and write
|
||
1C21DD71000
|
heap
|
page read and write
|
||
1C21D8C9000
|
heap
|
page read and write
|
||
1C27F029000
|
heap
|
page read and write
|
||
1C27F01E000
|
heap
|
page read and write
|
||
1C21D85B000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
1C21D93C000
|
heap
|
page read and write
|
||
1C21D849000
|
heap
|
page read and write
|
||
1C27C8E3000
|
trusted library allocation
|
page read and write
|
||
1C21B910000
|
trusted library allocation
|
page read and write
|
||
1C21DA28000
|
heap
|
page read and write
|
||
1C21D877000
|
heap
|
page read and write
|
||
1C27EF5E000
|
heap
|
page read and write
|
||
1C21E32E000
|
heap
|
page read and write
|
||
9F8423B000
|
stack
|
page read and write
|
||
1C27EEE0000
|
heap
|
page read and write
|
||
1C21DB91000
|
heap
|
page read and write
|
||
1C21D97F000
|
heap
|
page read and write
|
||
1C21DAD6000
|
heap
|
page read and write
|
||
1C21DEB6000
|
heap
|
page read and write
|
||
1C21DD90000
|
heap
|
page read and write
|
||
1C21DAC6000
|
heap
|
page read and write
|
||
1C21DC9B000
|
heap
|
page read and write
|
||
1C21DF30000
|
heap
|
page read and write
|
||
1C21E363000
|
heap
|
page read and write
|
||
1C27C915000
|
heap
|
page read and write
|
||
1C21DFC8000
|
heap
|
page read and write
|
||
1C21E101000
|
heap
|
page read and write
|
||
1C21E377000
|
heap
|
page read and write
|
||
7FF7C9335000
|
unkown
|
page readonly
|
||
7FF4C1F27000
|
trusted library allocation
|
page execute read
|
||
9F8473B000
|
stack
|
page read and write
|
||
1C27F083000
|
heap
|
page read and write
|
||
1C21DC18000
|
heap
|
page read and write
|
||
1C21DF5A000
|
heap
|
page read and write
|
||
1C21E742000
|
heap
|
page read and write
|
||
1C21DB83000
|
heap
|
page read and write
|
||
1C21D95F000
|
heap
|
page read and write
|
||
1C21E115000
|
heap
|
page read and write
|
||
1C21DECE000
|
heap
|
page read and write
|
||
1C21DC0A000
|
heap
|
page read and write
|
||
1C21DD61000
|
heap
|
page read and write
|
||
1C21E10B000
|
heap
|
page read and write
|
||
1C21DE77000
|
heap
|
page read and write
|
||
1C27D109000
|
heap
|
page execute and read and write
|
||
1C21DC4A000
|
heap
|
page read and write
|
||
1C21D9D7000
|
heap
|
page read and write
|
||
7FF4C1F45000
|
trusted library allocation
|
page execute read
|
||
1C21DB31000
|
heap
|
page read and write
|
||
1C21DA87000
|
heap
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
1C21DF4C000
|
heap
|
page read and write
|
||
1C27EF0B000
|
heap
|
page read and write
|
||
1C21E302000
|
heap
|
page read and write
|
||
1C21DFA8000
|
heap
|
page read and write
|
||
1C21D853000
|
heap
|
page read and write
|
||
1C27D080000
|
heap
|
page read and write
|
||
1C21DB53000
|
heap
|
page read and write
|
||
1C27D3FD000
|
heap
|
page read and write
|
||
7FFD9B793000
|
trusted library allocation
|
page execute and read and write
|
||
1C21DFAC000
|
heap
|
page read and write
|
||
1C27C6A0000
|
heap
|
page read and write
|
||
1C21DC6B000
|
heap
|
page read and write
|
||
1C21DA10000
|
heap
|
page read and write
|
||
7FF4C1F50000
|
trusted library allocation
|
page execute and read and write
|
||
1C210059000
|
trusted library allocation
|
page read and write
|
||
1C21E438000
|
heap
|
page read and write
|
||
1C27D069000
|
heap
|
page read and write
|
||
1C21DBF0000
|
heap
|
page read and write
|
||
1C21DAB4000
|
heap
|
page read and write
|
||
1C21DAD4000
|
heap
|
page read and write
|
||
1C21E04A000
|
heap
|
page read and write
|
||
1C21DA63000
|
heap
|
page read and write
|
||
1C27D2C5000
|
heap
|
page read and write
|
||
1C21DD7D000
|
heap
|
page read and write
|
||
1C21DA85000
|
heap
|
page read and write
|
||
1C27C740000
|
heap
|
page read and write
|
||
1C27D302000
|
heap
|
page read and write
|
||
1C27D3EC000
|
heap
|
page read and write
|
||
1C27EF1C000
|
heap
|
page read and write
|
||
1C27D0B7000
|
heap
|
page read and write
|
||
1C20061A000
|
trusted library allocation
|
page read and write
|
||
1C21E06C000
|
heap
|
page read and write
|
||
1C21E10F000
|
heap
|
page read and write
|
||
1C21DC65000
|
heap
|
page read and write
|
||
1C21DEF4000
|
heap
|
page read and write
|
||
1C21D965000
|
heap
|
page read and write
|
||
1C21DC87000
|
heap
|
page read and write
|
||
1C21DCD3000
|
heap
|
page read and write
|
||
1C21DCE1000
|
heap
|
page read and write
|
||
1C21E1F2000
|
heap
|
page read and write
|
||
1C21D8B7000
|
heap
|
page read and write
|
||
1C21DC95000
|
heap
|
page read and write
|
||
1C21E336000
|
heap
|
page read and write
|
||
1C21DAAC000
|
heap
|
page read and write
|
||
1C21DA5D000
|
heap
|
page read and write
|
||
1C27F2AB000
|
heap
|
page read and write
|
||
1C27F088000
|
heap
|
page read and write
|
||
1C21E098000
|
heap
|
page read and write
|
||
1C21E137000
|
heap
|
page read and write
|
||
1C21DCF6000
|
heap
|
page read and write
|
||
1C21E458000
|
heap
|
page read and write
|
||
1C21DE83000
|
heap
|
page read and write
|
||
1C21DEEE000
|
heap
|
page read and write
|
||
1C27D556000
|
heap
|
page read and write
|
||
1C21DC10000
|
heap
|
page read and write
|
||
1C21DA79000
|
heap
|
page read and write
|
||
1C27AD74000
|
heap
|
page read and write
|
||
1C21DCC5000
|
heap
|
page read and write
|
||
1C21D98D000
|
heap
|
page read and write
|
||
1C27D4CD000
|
heap
|
page read and write
|
||
1C27F05B000
|
heap
|
page read and write
|
||
7FF4C1F35000
|
trusted library allocation
|
page execute read
|
||
1C21DBA7000
|
heap
|
page read and write
|
||
1C21D875000
|
heap
|
page read and write
|
||
1C21DD51000
|
heap
|
page read and write
|
||
1C27D096000
|
heap
|
page read and write
|
||
1C21DB05000
|
heap
|
page read and write
|
||
1C21DF6E000
|
heap
|
page read and write
|
||
1C21DAC2000
|
heap
|
page read and write
|
||
7FF4C1F24000
|
trusted library allocation
|
page readonly
|
||
1C21DFD2000
|
heap
|
page read and write
|
||
1C27F1B4000
|
heap
|
page read and write
|
||
1C21DA5B000
|
heap
|
page read and write
|
||
1C21E0D9000
|
heap
|
page read and write
|
||
1C21B4F0000
|
trusted library allocation
|
page read and write
|
||
1C21D85F000
|
heap
|
page read and write
|
||
1C27C8E0000
|
trusted library allocation
|
page read and write
|
||
1C21DB02000
|
heap
|
page read and write
|
||
1C21DD4F000
|
heap
|
page read and write
|
||
1C21DB47000
|
heap
|
page read and write
|
||
1C21DCE7000
|
heap
|
page read and write
|
||
1C21DAC0000
|
heap
|
page read and write
|
||
1C21DB3D000
|
heap
|
page read and write
|
||
1C21DCFF000
|
heap
|
page read and write
|
||
1C21D87F000
|
heap
|
page read and write
|
||
1C21DF46000
|
heap
|
page read and write
|
||
1C27EF6B000
|
heap
|
page read and write
|
||
1C21DFA0000
|
heap
|
page read and write
|
||
1C21B2B0000
|
trusted library allocation
|
page read and write
|
||
1C27EF9E000
|
heap
|
page read and write
|
||
1C21DF34000
|
heap
|
page read and write
|
||
1C21D9FA000
|
heap
|
page read and write
|
||
1C21DBF4000
|
heap
|
page read and write
|
||
1C21DB9B000
|
heap
|
page read and write
|
||
7FF4C1F29000
|
trusted library allocation
|
page execute read
|
||
1C21D955000
|
heap
|
page read and write
|
||
1C21DAE8000
|
heap
|
page read and write
|
||
1C27D53E000
|
heap
|
page read and write
|
||
1C21DE75000
|
heap
|
page read and write
|
||
1C21DD47000
|
heap
|
page read and write
|
||
1C21DF36000
|
heap
|
page read and write
|
||
1C21E426000
|
heap
|
page read and write
|
||
1C21DF0C000
|
heap
|
page read and write
|
||
1C27F1BE000
|
heap
|
page read and write
|
||
1C21DC93000
|
heap
|
page read and write
|
||
1C27D46B000
|
heap
|
page read and write
|
||
1C21E090000
|
heap
|
page read and write
|
||
1C21E312000
|
heap
|
page read and write
|
||
1C21DFD6000
|
heap
|
page read and write
|
||
7FFD9B7B4000
|
trusted library allocation
|
page read and write
|
||
1C21E320000
|
heap
|
page read and write
|
||
1C21DEA8000
|
heap
|
page read and write
|
||
1C21DC46000
|
heap
|
page read and write
|
||
1C21DBB5000
|
heap
|
page read and write
|
||
1C21DA20000
|
heap
|
page read and write
|
||
1C27F0CF000
|
heap
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
1C27D2E1000
|
heap
|
page read and write
|
||
1C21B8F0000
|
trusted library allocation
|
page read and write
|
||
7FF4C1F3A000
|
trusted library allocation
|
page readonly
|
||
1C21DF96000
|
heap
|
page read and write
|
||
1C21E37B000
|
heap
|
page read and write
|
||
1C21E395000
|
heap
|
page read and write
|
||
7FF7C9335000
|
unkown
|
page readonly
|
||
1C21E0CC000
|
heap
|
page read and write
|
||
7FF4C1F3D000
|
trusted library allocation
|
page execute read
|
||
1C27F1AE000
|
heap
|
page read and write
|
||
1C21B8D0000
|
trusted library allocation
|
page read and write
|
||
1C27F00F000
|
heap
|
page read and write
|
||
1C21D983000
|
heap
|
page read and write
|
||
1C21E08E000
|
heap
|
page read and write
|
||
1C21B070000
|
heap
|
page read and write
|
||
1C27F29B000
|
heap
|
page read and write
|
||
1C21D97B000
|
heap
|
page read and write
|
||
1C27D541000
|
heap
|
page read and write
|
||
1C27D2A0000
|
heap
|
page read and write
|
||
1C27C6C0000
|
heap
|
page read and write
|
||
1C27C765000
|
heap
|
page read and write
|
||
1C21E322000
|
heap
|
page read and write
|
||
1C21DF22000
|
heap
|
page read and write
|
||
1C21DC0E000
|
heap
|
page read and write
|
||
7FF4C1F44000
|
trusted library allocation
|
page readonly
|
||
1C21DC63000
|
heap
|
page read and write
|
||
1C21D865000
|
heap
|
page read and write
|
||
1C27EF13000
|
heap
|
page read and write
|
||
1C21E448000
|
heap
|
page read and write
|
||
1C27ACF0000
|
heap
|
page read and write
|
||
1C27F572000
|
trusted library allocation
|
page read and write
|
||
1C21D9A1000
|
heap
|
page read and write
|
||
1C21DC4D000
|
heap
|
page read and write
|
||
1C21DBB7000
|
heap
|
page read and write
|
||
1C21E0F3000
|
heap
|
page read and write
|
||
1C21E6BE000
|
heap
|
page read and write
|
||
1C21DD16000
|
heap
|
page read and write
|
||
1C21DE9A000
|
heap
|
page read and write
|
||
1C21DC77000
|
heap
|
page read and write
|
There are 786 hidden memdumps, click here to show them.