Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
H-Output.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\firefox.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\H-Output.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\firefox.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2gk1z1qe.pne.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2obfcjm1.y1z.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bogj55bi.3e2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gn0n1jdf.as5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gwwizq25.yrb.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hvuzgciq.cx2.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m4nxbm2o.sha.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mmwvmx1a.wbx.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nx50ng1b.vae.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pabmcvnx.w40.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q5neqjnq.gho.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_shfyfakd.p2o.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_slxha2vy.p2w.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t34o4hkt.1vp.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uzlfhclc.za4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_waj3bpaa.3j0.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wlftl53q.o0j.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wzytpscm.dyw.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x5usutq5.05g.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xvmcykht.tth.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp7F5.tmp.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
\Device\Null
|
ASCII text, with CRLF line terminators, with overstriking
|
dropped
|
There are 17 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\H-Output.exe
|
"C:\Users\user\Desktop\H-Output.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\firefox.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'firefox.exe'
|
||
C:\Users\user\AppData\Local\Temp\firefox.exe
|
C:\Users\user\AppData\Local\Temp\firefox.exe
|
||
C:\Users\user\AppData\Local\Temp\firefox.exe
|
C:\Users\user\AppData\Local\Temp\firefox.exe
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\firefox.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'firefox.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Skype.exe'
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp7F5.tmp.bat""
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\timeout.exe
|
timeout 3
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 6 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
45.88.90.74
|
|||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://crl.m
|
unknown
|
||
http://crl.microso
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://ion=v4.5
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
http://www.micom/pkiops/Docs/ry.htm0
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://www.microsoft.co
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://ip-api.com
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://crl.microsE63
|
unknown
|
||
http://www.microsoft.
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://crl.v
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
||
http://crl.micros
|
unknown
|
There are 14 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\H-Output_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\H-Output_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\H-Output_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\H-Output_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\H-Output_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\H-Output_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\H-Output_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\H-Output_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\H-Output_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\H-Output_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\H-Output_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\H-Output_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\H-Output_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\H-Output_RASMANCS
|
FileDirectory
|
There are 4 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
12E55000
|
trusted library allocation
|
page read and write
|
||
CC0000
|
trusted library section
|
page read and write
|
||
8D2000
|
unkown
|
page readonly
|
||
2611000
|
trusted library allocation
|
page read and write
|
||
31ED000
|
trusted library allocation
|
page read and write
|
||
7DF4BA930000
|
trusted library allocation
|
page execute and read and write
|
||
1180000
|
trusted library allocation
|
page read and write
|
||
13430580000
|
trusted library allocation
|
page read and write
|
||
22A19522000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
22A16999000
|
heap
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
147CDDD3000
|
heap
|
page read and write
|
||
1344258D000
|
trusted library allocation
|
page read and write
|
||
147E831F000
|
heap
|
page read and write
|
||
147D0C83000
|
trusted library allocation
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
22A16A18000
|
heap
|
page read and write
|
||
147E8362000
|
heap
|
page read and write
|
||
F00000
|
trusted library allocation
|
page read and write
|
||
336D87B000
|
stack
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
3F4000
|
stack
|
page read and write
|
||
22A19E50000
|
trusted library allocation
|
page read and write
|
||
2B233B10000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
F2D000
|
heap
|
page read and write
|
||
26794CE000
|
stack
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
25B0000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
147E7E6F000
|
heap
|
page read and write
|
||
3066000
|
trusted library allocation
|
page read and write
|
||
147D06A6000
|
trusted library allocation
|
page read and write
|
||
8D0000
|
unkown
|
page readonly
|
||
1344A64F000
|
heap
|
page read and write
|
||
336E2CD000
|
stack
|
page read and write
|
||
147DFAA1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B782000
|
trusted library allocation
|
page read and write
|
||
22A288C6000
|
trusted library allocation
|
page read and write
|
||
2B219A20000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
147CDDD7000
|
heap
|
page read and write
|
||
2B21C055000
|
trusted library allocation
|
page read and write
|
||
2F3E000
|
trusted library allocation
|
page read and write
|
||
147E81F0000
|
heap
|
page read and write
|
||
13430598000
|
heap
|
page read and write
|
||
2B21C740000
|
trusted library allocation
|
page read and write
|
||
233ECDEB000
|
heap
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
23381217000
|
trusted library allocation
|
page read and write
|
||
26785FE000
|
stack
|
page read and write
|
||
233EAB59000
|
heap
|
page read and write
|
||
3251000
|
trusted library allocation
|
page read and write
|
||
233EC600000
|
heap
|
page read and write
|
||
134324C9000
|
trusted library allocation
|
page read and write
|
||
233ECC8B000
|
heap
|
page read and write
|
||
B98BDFB000
|
stack
|
page read and write
|
||
3087000
|
trusted library allocation
|
page read and write
|
||
233ECB9B000
|
heap
|
page read and write
|
||
540F7BE000
|
stack
|
page read and write
|
||
7FFD9BAE2000
|
trusted library allocation
|
page read and write
|
||
F85000
|
heap
|
page read and write
|
||
2F88000
|
trusted library allocation
|
page read and write
|
||
233ECD90000
|
heap
|
page read and write
|
||
7FFD9B942000
|
trusted library allocation
|
page read and write
|
||
279D000
|
trusted library allocation
|
page read and write
|
||
3041000
|
trusted library allocation
|
page read and write
|
||
23390021000
|
trusted library allocation
|
page read and write
|
||
22A30AEA000
|
heap
|
page read and write
|
||
7FFD9BAF2000
|
trusted library allocation
|
page read and write
|
||
2F9D000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
1BAE2000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
2B233480000
|
trusted library allocation
|
page read and write
|
||
336D2F9000
|
stack
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
1B5E0000
|
heap
|
page read and write
|
||
22A185C1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
2F58000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
13430770000
|
trusted library allocation
|
page read and write
|
||
134305EE000
|
heap
|
page read and write
|
||
2B233C1D000
|
heap
|
page read and write
|
||
D1CD70C000
|
stack
|
page read and write
|
||
2B21B440000
|
heap
|
page execute and read and write
|
||
D21000
|
heap
|
page read and write
|
||
12613000
|
trusted library allocation
|
page read and write
|
||
B98BB79000
|
stack
|
page read and write
|
||
32BC000
|
trusted library allocation
|
page read and write
|
||
22A19540000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB9C000
|
trusted library allocation
|
page read and write
|
||
2F6A000
|
trusted library allocation
|
page read and write
|
||
114F000
|
stack
|
page read and write
|
||
2B22B744000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
2678AFB000
|
stack
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
13433335000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
336CF9E000
|
stack
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
22A16B60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
1344A5E8000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
26781DE000
|
stack
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
D1CC93E000
|
stack
|
page read and write
|
||
3288000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B816000
|
trusted library allocation
|
page read and write
|
||
233ECBD7000
|
heap
|
page execute and read and write
|
||
3102000
|
trusted library allocation
|
page read and write
|
||
147D0BC7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
3072000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD8000
|
trusted library allocation
|
page read and write
|
||
B98BD7E000
|
stack
|
page read and write
|
||
5410D4C000
|
stack
|
page read and write
|
||
1344A5F0000
|
heap
|
page read and write
|
||
F7D000
|
heap
|
page read and write
|
||
7FFD9BAE9000
|
trusted library allocation
|
page read and write
|
||
1343347A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB9000
|
trusted library allocation
|
page read and write
|
||
316D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
233EC4E5000
|
heap
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BACA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B932000
|
trusted library allocation
|
page read and write
|
||
13442608000
|
trusted library allocation
|
page read and write
|
||
2B219A6C000
|
heap
|
page read and write
|
||
22A30A61000
|
heap
|
page read and write
|
||
22A18580000
|
trusted library allocation
|
page read and write
|
||
7FFD9B902000
|
trusted library allocation
|
page read and write
|
||
147CFA60000
|
heap
|
page execute and read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
2B219A7E000
|
heap
|
page read and write
|
||
22A30EFA000
|
heap
|
page read and write
|
||
13432EA6000
|
trusted library allocation
|
page read and write
|
||
2866A5E2000
|
heap
|
page read and write
|
||
147D04F3000
|
trusted library allocation
|
page read and write
|
||
2B21B330000
|
trusted library section
|
page read and write
|
||
3056000
|
trusted library allocation
|
page read and write
|
||
23380F77000
|
trusted library allocation
|
page read and write
|
||
1BB4C000
|
heap
|
page read and write
|
||
2F52000
|
trusted library allocation
|
page read and write
|
||
147D187C000
|
trusted library allocation
|
page read and write
|
||
147E7F70000
|
heap
|
page read and write
|
||
D1CCA3A000
|
stack
|
page read and write
|
||
D1CCB3F000
|
stack
|
page read and write
|
||
1BAA5000
|
heap
|
page read and write
|
||
147CDDCF000
|
heap
|
page read and write
|
||
3222000
|
trusted library allocation
|
page read and write
|
||
147E7E8F000
|
heap
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
2B22B451000
|
trusted library allocation
|
page read and write
|
||
1344A5E3000
|
heap
|
page read and write
|
||
336CF1F000
|
stack
|
page read and write
|
||
336D47E000
|
stack
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
2B21C480000
|
trusted library allocation
|
page read and write
|
||
7FFD9B968000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
1B6EF000
|
stack
|
page read and write
|
||
13430540000
|
heap
|
page read and write
|
||
1BB65000
|
heap
|
page read and write
|
||
3329000
|
trusted library allocation
|
page read and write
|
||
1343301E000
|
trusted library allocation
|
page read and write
|
||
233ECBD0000
|
heap
|
page execute and read and write
|
||
2B219A66000
|
heap
|
page read and write
|
||
233ECF07000
|
heap
|
page read and write
|
||
30B5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
2F8B000
|
trusted library allocation
|
page read and write
|
||
31E1000
|
trusted library allocation
|
page read and write
|
||
147CDE16000
|
heap
|
page read and write
|
||
23380C0F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
D7A29FF000
|
unkown
|
page read and write
|
||
3158000
|
trusted library allocation
|
page read and write
|
||
233EAE70000
|
heap
|
page read and write
|
||
7FFD9B793000
|
trusted library allocation
|
page execute and read and write
|
||
134422C1000
|
trusted library allocation
|
page read and write
|
||
22A168F0000
|
heap
|
page read and write
|
||
323D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
D1CCCBB000
|
stack
|
page read and write
|
||
31FF000
|
trusted library allocation
|
page read and write
|
||
300B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
3070000
|
trusted library allocation
|
page read and write
|
||
3155000
|
trusted library allocation
|
page read and write
|
||
1344A670000
|
heap
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
1B790000
|
heap
|
page execute and read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
22A19D44000
|
trusted library allocation
|
page read and write
|
||
22A185B0000
|
heap
|
page read and write
|
||
755000
|
heap
|
page read and write
|
||
22A1979C000
|
trusted library allocation
|
page read and write
|
||
1B89E000
|
stack
|
page read and write
|
||
101F000
|
heap
|
page read and write
|
||
336D7FE000
|
stack
|
page read and write
|
||
26787F8000
|
stack
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
30C1000
|
trusted library allocation
|
page read and write
|
||
1343061B000
|
heap
|
page read and write
|
||
2B21C819000
|
trusted library allocation
|
page read and write
|
||
13433193000
|
trusted library allocation
|
page read and write
|
||
147D0DAF000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
7FFD9BACC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B921000
|
trusted library allocation
|
page read and write
|
||
306C000
|
trusted library allocation
|
page read and write
|
||
23381E09000
|
trusted library allocation
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
22A305CA000
|
heap
|
page read and write
|
||
2866A5F3000
|
heap
|
page read and write
|
||
147D18C1000
|
trusted library allocation
|
page read and write
|
||
13433B0B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
22A19012000
|
trusted library allocation
|
page read and write
|
||
147E82AA000
|
heap
|
page read and write
|
||
333B000
|
trusted library allocation
|
page read and write
|
||
1344A7EC000
|
heap
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
32D1000
|
trusted library allocation
|
page read and write
|
||
F56000
|
heap
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
1344A83B000
|
heap
|
page read and write
|
||
2B219A28000
|
heap
|
page read and write
|
||
233ECB9F000
|
heap
|
page read and write
|
||
22A196E6000
|
trusted library allocation
|
page read and write
|
||
30C4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page execute and read and write
|
||
2AFE000
|
stack
|
page read and write
|
||
147D1223000
|
trusted library allocation
|
page read and write
|
||
D7A2AFF000
|
stack
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page execute and read and write
|
||
D1CCC3F000
|
stack
|
page read and write
|
||
303C000
|
trusted library allocation
|
page read and write
|
||
2FE5000
|
trusted library allocation
|
page read and write
|
||
22A1A3C3000
|
trusted library allocation
|
page read and write
|
||
26786FE000
|
stack
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
2F91000
|
trusted library allocation
|
page read and write
|
||
22A16B20000
|
heap
|
page read and write
|
||
313D000
|
trusted library allocation
|
page read and write
|
||
54100FB000
|
stack
|
page read and write
|
||
326A000
|
trusted library allocation
|
page read and write
|
||
F5C000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
3024000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page execute and read and write
|
||
2FD6000
|
trusted library allocation
|
page read and write
|
||
22A1953C000
|
trusted library allocation
|
page read and write
|
||
2B219A44000
|
heap
|
page read and write
|
||
147CE020000
|
trusted library allocation
|
page read and write
|
||
2866A5E0000
|
heap
|
page read and write
|
||
147D18A1000
|
trusted library allocation
|
page read and write
|
||
7DF4349C0000
|
trusted library allocation
|
page execute and read and write
|
||
3053000
|
trusted library allocation
|
page read and write
|
||
1344259C000
|
trusted library allocation
|
page read and write
|
||
1C27C000
|
stack
|
page read and write
|
||
2E29000
|
trusted library allocation
|
page read and write
|
||
317F000
|
trusted library allocation
|
page read and write
|
||
336D6FE000
|
stack
|
page read and write
|
||
12618000
|
trusted library allocation
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
1AF63000
|
heap
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
233810F3000
|
trusted library allocation
|
page read and write
|
||
147CF8BB000
|
heap
|
page read and write
|
||
147CE000000
|
trusted library allocation
|
page read and write
|
||
2B21B451000
|
trusted library allocation
|
page read and write
|
||
13442314000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB3000
|
trusted library allocation
|
page read and write
|
||
147E821B000
|
heap
|
page read and write
|
||
233ECF00000
|
heap
|
page read and write
|
||
320A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
1344A700000
|
heap
|
page read and write
|
||
7FFD9BA8D000
|
trusted library allocation
|
page read and write
|
||
22A198CA000
|
trusted library allocation
|
page read and write
|
||
125E000
|
stack
|
page read and write
|
||
2B21C3C2000
|
trusted library allocation
|
page read and write
|
||
F8F000
|
heap
|
page read and write
|
||
2FD0000
|
trusted library allocation
|
page read and write
|
||
13433B32000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
233EAB4C000
|
heap
|
page read and write
|
||
540FAF9000
|
stack
|
page read and write
|
||
147CFCC9000
|
trusted library allocation
|
page read and write
|
||
22A285F1000
|
trusted library allocation
|
page read and write
|
||
147CDDEF000
|
heap
|
page read and write
|
||
2B233C8D000
|
heap
|
page read and write
|
||
30AE000
|
trusted library allocation
|
page read and write
|
||
22A16B90000
|
heap
|
page read and write
|
||
23FE000
|
stack
|
page read and write
|
||
233EAB6D000
|
heap
|
page read and write
|
||
5410C4D000
|
stack
|
page read and write
|
||
2FFA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
12611000
|
trusted library allocation
|
page read and write
|
||
3029000
|
trusted library allocation
|
page read and write
|
||
2866A7C0000
|
heap
|
page read and write
|
||
233ECFB0000
|
trusted library allocation
|
page read and write
|
||
2FA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B923000
|
trusted library allocation
|
page read and write
|
||
233ECAC0000
|
heap
|
page read and write
|
||
2B219A3E000
|
heap
|
page read and write
|
||
3108000
|
trusted library allocation
|
page read and write
|
||
22A18A8D000
|
trusted library allocation
|
page read and write
|
||
7DF4349D0000
|
trusted library allocation
|
page execute and read and write
|
||
3391000
|
trusted library allocation
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
13430780000
|
heap
|
page readonly
|
||
233ECE72000
|
heap
|
page read and write
|
||
3078000
|
trusted library allocation
|
page read and write
|
||
2866A890000
|
heap
|
page read and write
|
||
F55000
|
heap
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
2B21B310000
|
heap
|
page read and write
|
||
540FB7F000
|
stack
|
page read and write
|
||
3264000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
23390001000
|
trusted library allocation
|
page read and write
|
||
2B22B75E000
|
trusted library allocation
|
page read and write
|
||
2678A7E000
|
stack
|
page read and write
|
||
2866A5F1000
|
heap
|
page read and write
|
||
2B21C50F000
|
trusted library allocation
|
page read and write
|
||
336D4F9000
|
stack
|
page read and write
|
||
23381958000
|
trusted library allocation
|
page read and write
|
||
30BB000
|
trusted library allocation
|
page read and write
|
||
336E54E000
|
stack
|
page read and write
|
||
13432290000
|
heap
|
page execute and read and write
|
||
7FFD9B974000
|
trusted library allocation
|
page read and write
|
||
22A30AF0000
|
heap
|
page read and write
|
||
2B233A3E000
|
heap
|
page read and write
|
||
233EAAB0000
|
heap
|
page read and write
|
||
B98BAF9000
|
stack
|
page read and write
|
||
304D000
|
trusted library allocation
|
page read and write
|
||
32B2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
22A191C4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
147E8330000
|
heap
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page read and write
|
||
147CFA80000
|
trusted library allocation
|
page read and write
|
||
31D3000
|
trusted library allocation
|
page read and write
|
||
13432050000
|
heap
|
page execute and read and write
|
||
3362000
|
trusted library allocation
|
page read and write
|
||
2FDF000
|
trusted library allocation
|
page read and write
|
||
22A16B50000
|
trusted library section
|
page read and write
|
||
23380088000
|
trusted library allocation
|
page read and write
|
||
22A19537000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
147D0BD3000
|
trusted library allocation
|
page read and write
|
||
233818F9000
|
trusted library allocation
|
page read and write
|
||
1210000
|
heap
|
page execute and read and write
|
||
7FFD9B78B000
|
trusted library allocation
|
page read and write
|
||
6347CFF000
|
stack
|
page read and write
|
||
1AF50000
|
heap
|
page execute and read and write
|
||
147E826F000
|
heap
|
page read and write
|
||
233ECEE1000
|
heap
|
page read and write
|
||
7FFD9BAD4000
|
trusted library allocation
|
page read and write
|
||
233ECC92000
|
heap
|
page read and write
|
||
3173000
|
trusted library allocation
|
page read and write
|
||
23381E29000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7AB000
|
trusted library allocation
|
page execute and read and write
|
||
22A16BC0000
|
heap
|
page execute and read and write
|
||
324B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
B98B3DF000
|
stack
|
page read and write
|
||
3011000
|
trusted library allocation
|
page read and write
|
||
2B233FD0000
|
heap
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page execute and read and write
|
||
233EC520000
|
heap
|
page readonly
|
||
147CE010000
|
heap
|
page readonly
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
1BB22000
|
heap
|
page read and write
|
||
8E3000
|
trusted library allocation
|
page read and write
|
||
2B233940000
|
heap
|
page execute and read and write
|
||
134422D1000
|
trusted library allocation
|
page read and write
|
||
1BAE8000
|
heap
|
page read and write
|
||
2B21CDAA000
|
trusted library allocation
|
page read and write
|
||
12C08000
|
trusted library allocation
|
page read and write
|
||
1BB3B000
|
heap
|
page read and write
|
||
13433F5C000
|
trusted library allocation
|
page read and write
|
||
22A30A10000
|
heap
|
page read and write
|
||
2B233E10000
|
trusted library allocation
|
page read and write
|
||
22A16993000
|
heap
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
2F7C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B793000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
3161000
|
trusted library allocation
|
page read and write
|
||
23380F6A000
|
trusted library allocation
|
page read and write
|
||
2F9A000
|
trusted library allocation
|
page read and write
|
||
32DD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
22A16910000
|
heap
|
page read and write
|
||
233EABFE000
|
heap
|
page read and write
|
||
7FFD9B77B000
|
trusted library allocation
|
page read and write
|
||
22A16C15000
|
heap
|
page read and write
|
||
5410ACE000
|
stack
|
page read and write
|
||
147DFD8C000
|
trusted library allocation
|
page read and write
|
||
23381036000
|
trusted library allocation
|
page read and write
|
||
2B233D51000
|
heap
|
page read and write
|
||
22A30B3D000
|
heap
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
7DF4349E0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
2600000
|
heap
|
page execute and read and write
|
||
D1CC9B7000
|
stack
|
page read and write
|
||
30C7000
|
trusted library allocation
|
page read and write
|
||
1BB32000
|
heap
|
page read and write
|
||
1BB5C000
|
heap
|
page read and write
|
||
2F8E000
|
trusted library allocation
|
page read and write
|
||
31A6000
|
trusted library allocation
|
page read and write
|
||
22A19E29000
|
trusted library allocation
|
page read and write
|
||
22A288AC000
|
trusted library allocation
|
page read and write
|
||
2866A5BA000
|
heap
|
page read and write
|
||
13430835000
|
heap
|
page read and write
|
||
1344A851000
|
heap
|
page read and write
|
||
147CE070000
|
heap
|
page execute and read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
147D13F0000
|
trusted library allocation
|
page read and write
|
||
22A30EE7000
|
heap
|
page read and write
|
||
23381254000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB6E000
|
trusted library allocation
|
page read and write
|
||
1C298000
|
heap
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page execute and read and write
|
||
32BF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
7DF42B3D0000
|
trusted library allocation
|
page execute and read and write
|
||
233902F5000
|
trusted library allocation
|
page read and write
|
||
2B21B390000
|
trusted library allocation
|
page read and write
|
||
12DE1000
|
trusted library allocation
|
page read and write
|
||
22A169D8000
|
heap
|
page read and write
|
||
3326000
|
trusted library allocation
|
page read and write
|
||
7FFD9B83C000
|
trusted library allocation
|
page execute and read and write
|
||
302F000
|
trusted library allocation
|
page read and write
|
||
233EC4C0000
|
trusted library section
|
page read and write
|
||
540FF7E000
|
stack
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
23380F6E000
|
trusted library allocation
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
147E8329000
|
heap
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
B98C947000
|
stack
|
page read and write
|
||
1343276D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
31F3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
233EAAE0000
|
heap
|
page read and write
|
||
7FFD9B978000
|
trusted library allocation
|
page read and write
|
||
2B21C7DD000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA3000
|
trusted library allocation
|
page read and write
|
||
2F33000
|
trusted library allocation
|
page read and write
|
||
30F6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
22A30B55000
|
heap
|
page read and write
|
||
336D37E000
|
stack
|
page read and write
|
||
1C29C000
|
heap
|
page read and write
|
||
22A169AF000
|
heap
|
page read and write
|
||
13432056000
|
heap
|
page execute and read and write
|
||
3350000
|
trusted library allocation
|
page read and write
|
||
2F64000
|
trusted library allocation
|
page read and write
|
||
5410B4A000
|
stack
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
B98B6FD000
|
stack
|
page read and write
|
||
1344ABC0000
|
heap
|
page read and write
|
||
13432280000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
319A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA7C000
|
trusted library allocation
|
page read and write
|
||
1B165000
|
stack
|
page read and write
|
||
134422B1000
|
trusted library allocation
|
page read and write
|
||
13430790000
|
trusted library allocation
|
page read and write
|
||
22A288AE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page read and write
|
||
7FFD9B942000
|
trusted library allocation
|
page read and write
|
||
233EC4A0000
|
heap
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
23381E2E000
|
trusted library allocation
|
page read and write
|
||
336E24E000
|
stack
|
page read and write
|
||
2FD9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
233EAAC0000
|
heap
|
page read and write
|
||
7FFD9BA1D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
D7A28FB000
|
stack
|
page read and write
|
||
1CD62288000
|
heap
|
page read and write
|
||
2B219A5E000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
3302000
|
trusted library allocation
|
page read and write
|
||
26796CC000
|
stack
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
13432110000
|
heap
|
page read and write
|
||
2FF1000
|
trusted library allocation
|
page read and write
|
||
2B233D39000
|
heap
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page execute and read and write
|
||
22A169DC000
|
heap
|
page read and write
|
||
147E7E71000
|
heap
|
page read and write
|
||
2420000
|
heap
|
page read and write
|
||
7FFD9B79B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B948000
|
trusted library allocation
|
page read and write
|
||
147E833A000
|
heap
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
22A1698F000
|
heap
|
page read and write
|
||
7FFD9BBD9000
|
trusted library allocation
|
page read and write
|
||
3149000
|
trusted library allocation
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
1B067000
|
stack
|
page read and write
|
||
D41000
|
heap
|
page read and write
|
||
233902F0000
|
trusted library allocation
|
page read and write
|
||
23381346000
|
trusted library allocation
|
page read and write
|
||
1343407F000
|
trusted library allocation
|
page read and write
|
||
1BB1E000
|
heap
|
page read and write
|
||
22A19683000
|
trusted library allocation
|
page read and write
|
||
2338178A000
|
trusted library allocation
|
page read and write
|
||
233EAE75000
|
heap
|
page read and write
|
||
147D0AD7000
|
trusted library allocation
|
page read and write
|
||
147E7E8A000
|
heap
|
page read and write
|
||
1BB83000
|
heap
|
page read and write
|
||
540F6B3000
|
stack
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
2DE1000
|
trusted library allocation
|
page read and write
|
||
310B000
|
trusted library allocation
|
page read and write
|
||
F30000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB6000
|
trusted library allocation
|
page read and write
|
||
147E8350000
|
heap
|
page read and write
|
||
2F16000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
2B219AA7000
|
heap
|
page read and write
|
||
3210000
|
trusted library allocation
|
page read and write
|
||
134305D6000
|
heap
|
page read and write
|
||
1BB7C000
|
heap
|
page read and write
|
||
7DF451530000
|
trusted library allocation
|
page execute and read and write
|
||
23381870000
|
trusted library allocation
|
page read and write
|
||
1BA9A000
|
stack
|
page read and write
|
||
7FFD9B954000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
2866A6C0000
|
heap
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
540FA7E000
|
stack
|
page read and write
|
||
540FDF8000
|
stack
|
page read and write
|
||
233EAB55000
|
heap
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
1B99E000
|
stack
|
page read and write
|
||
2FC4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
328B000
|
trusted library allocation
|
page read and write
|
||
2FC7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77B000
|
trusted library allocation
|
page read and write
|
||
D1CC3EE000
|
stack
|
page read and write
|
||
7FFD9BAC2000
|
trusted library allocation
|
page read and write
|
||
8E0000
|
trusted library allocation
|
page read and write
|
||
23390077000
|
trusted library allocation
|
page read and write
|
||
2B21C668000
|
trusted library allocation
|
page read and write
|
||
30EA000
|
trusted library allocation
|
page read and write
|
||
2B219A62000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B792000
|
trusted library allocation
|
page read and write
|
||
1C0DD000
|
stack
|
page read and write
|
||
22A30A5B000
|
heap
|
page read and write
|
||
2678677000
|
stack
|
page read and write
|
||
22A30ABC000
|
heap
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
13433243000
|
trusted library allocation
|
page read and write
|
||
233ECEA0000
|
heap
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page execute and read and write
|
||
233EC4E0000
|
heap
|
page read and write
|
||
22A19657000
|
trusted library allocation
|
page read and write
|
||
7FFD9B902000
|
trusted library allocation
|
page read and write
|
||
32C5000
|
trusted library allocation
|
page read and write
|
||
1344A842000
|
heap
|
page read and write
|
||
7FFD9B772000
|
trusted library allocation
|
page read and write
|
||
13430800000
|
trusted library allocation
|
page read and write
|
||
336E3C7000
|
stack
|
page read and write
|
||
2B21CD9E000
|
trusted library allocation
|
page read and write
|
||
147D0AAB000
|
trusted library allocation
|
page read and write
|
||
147E81E0000
|
heap
|
page read and write
|
||
1AA8D000
|
stack
|
page read and write
|
||
337D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC2000
|
trusted library allocation
|
page read and write
|
||
1BB9E000
|
stack
|
page read and write
|
||
3114000
|
trusted library allocation
|
page read and write
|
||
147CDD90000
|
heap
|
page read and write
|
||
22A30E31000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE4000
|
trusted library allocation
|
page read and write
|
||
1BB48000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
1B400000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page execute and read and write
|
||
2B21D26F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
2F5E000
|
trusted library allocation
|
page read and write
|
||
22A30DA0000
|
heap
|
page read and write
|
||
1355000
|
heap
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
147D0E69000
|
trusted library allocation
|
page read and write
|
||
7FFD9B944000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
22A16BB0000
|
trusted library allocation
|
page read and write
|
||
3075000
|
trusted library allocation
|
page read and write
|
||
233EAB10000
|
heap
|
page read and write
|
||
147DFCEF000
|
trusted library allocation
|
page read and write
|
||
3179000
|
trusted library allocation
|
page read and write
|
||
2B21B380000
|
heap
|
page read and write
|
||
2DD0000
|
heap
|
page execute and read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
233ECEB3000
|
heap
|
page read and write
|
||
22A16950000
|
heap
|
page read and write
|
||
2F76000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
147DFD88000
|
trusted library allocation
|
page read and write
|
||
7FFD9B91A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
13433549000
|
trusted library allocation
|
page read and write
|
||
2B21C460000
|
trusted library allocation
|
page read and write
|
||
5410D4E000
|
stack
|
page read and write
|
||
1B18E000
|
stack
|
page read and write
|
||
7FFD9B916000
|
trusted library allocation
|
page read and write
|
||
13432220000
|
heap
|
page execute and read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
22A191CD000
|
trusted library allocation
|
page read and write
|
||
22A1A3E3000
|
trusted library allocation
|
page read and write
|
||
23380D7B000
|
trusted library allocation
|
page read and write
|
||
2B219A6A000
|
heap
|
page read and write
|
||
147CFAB2000
|
trusted library allocation
|
page read and write
|
||
D1CD88C000
|
stack
|
page read and write
|
||
2B2334C8000
|
heap
|
page read and write
|
||
D6E000
|
heap
|
page read and write
|
||
23380A52000
|
trusted library allocation
|
page read and write
|
||
30B2000
|
trusted library allocation
|
page read and write
|
||
3285000
|
trusted library allocation
|
page read and write
|
||
2B233BF0000
|
heap
|
page read and write
|
||
3204000
|
trusted library allocation
|
page read and write
|
||
7FFD9B91A000
|
trusted library allocation
|
page read and write
|
||
1225000
|
heap
|
page read and write
|
||
233ECB0F000
|
heap
|
page read and write
|
||
339F000
|
trusted library allocation
|
page read and write
|
||
147CDD70000
|
heap
|
page read and write
|
||
22A1699D000
|
heap
|
page read and write
|
||
1BDDE000
|
stack
|
page read and write
|
||
3170000
|
trusted library allocation
|
page read and write
|
||
267897E000
|
stack
|
page read and write
|
||
147D0A33000
|
trusted library allocation
|
page read and write
|
||
13442740000
|
trusted library allocation
|
page read and write
|
||
12C01000
|
trusted library allocation
|
page read and write
|
||
7FFD9B911000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
30A8000
|
trusted library allocation
|
page read and write
|
||
2B233976000
|
heap
|
page execute and read and write
|
||
22A1A3E8000
|
trusted library allocation
|
page read and write
|
||
325E000
|
trusted library allocation
|
page read and write
|
||
134340C9000
|
trusted library allocation
|
page read and write
|
||
13433BF3000
|
trusted library allocation
|
page read and write
|
||
330E000
|
trusted library allocation
|
page read and write
|
||
22A191FD000
|
trusted library allocation
|
page read and write
|
||
2B21B67A000
|
trusted library allocation
|
page read and write
|
||
7DF42B3C0000
|
trusted library allocation
|
page execute and read and write
|
||
26788FB000
|
stack
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
22A30EDA000
|
heap
|
page read and write
|
||
2B233A6F000
|
heap
|
page read and write
|
||
22A19987000
|
trusted library allocation
|
page read and write
|
||
3314000
|
trusted library allocation
|
page read and write
|
||
2338130E000
|
trusted library allocation
|
page read and write
|
||
3231000
|
trusted library allocation
|
page read and write
|
||
7FFD9B772000
|
trusted library allocation
|
page read and write
|
||
2866A5F0000
|
heap
|
page read and write
|
||
32CB000
|
trusted library allocation
|
page read and write
|
||
13433A26000
|
trusted library allocation
|
page read and write
|
||
267819E000
|
stack
|
page read and write
|
||
7FFD9B91A000
|
trusted library allocation
|
page read and write
|
||
1BEDE000
|
stack
|
page read and write
|
||
2B219AA5000
|
heap
|
page read and write
|
||
2866A880000
|
heap
|
page read and write
|
||
336E4CC000
|
stack
|
page read and write
|
||
7FFD9B911000
|
trusted library allocation
|
page read and write
|
||
B98B9FD000
|
stack
|
page read and write
|
||
147D0BC3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
22A19B7A000
|
trusted library allocation
|
page read and write
|
||
22A30E9E000
|
heap
|
page read and write
|
||
F25000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
233ECFD0000
|
heap
|
page read and write
|
||
D1CC77E000
|
stack
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
22A1A39E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
233ECED1000
|
heap
|
page read and write
|
||
1AE10000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
31DA000
|
trusted library allocation
|
page read and write
|
||
1BB3F000
|
heap
|
page read and write
|
||
233EAB18000
|
heap
|
page read and write
|
||
2FC1000
|
trusted library allocation
|
page read and write
|
||
2B219A5B000
|
heap
|
page read and write
|
||
2FA6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
2B233CA2000
|
heap
|
page read and write
|
||
233ECDA2000
|
heap
|
page read and write
|
||
32B8000
|
trusted library allocation
|
page read and write
|
||
3167000
|
trusted library allocation
|
page read and write
|
||
147CFA95000
|
heap
|
page read and write
|
||
2B219B65000
|
heap
|
page read and write
|
||
147E82F7000
|
heap
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
23380DE8000
|
trusted library allocation
|
page read and write
|
||
13430590000
|
heap
|
page read and write
|
||
336D57C000
|
stack
|
page read and write
|
||
D1CD90E000
|
stack
|
page read and write
|
||
2F38000
|
trusted library allocation
|
page read and write
|
||
233ECC8E000
|
heap
|
page read and write
|
||
336E34E000
|
stack
|
page read and write
|
||
2EA5000
|
trusted library allocation
|
page read and write
|
||
147E7F4C000
|
heap
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
2F19000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
267974E000
|
stack
|
page read and write
|
||
147E834C000
|
heap
|
page read and write
|
||
7FFD9B944000
|
trusted library allocation
|
page read and write
|
||
22A16B80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B93A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
3176000
|
trusted library allocation
|
page read and write
|
||
1017000
|
heap
|
page read and write
|
||
2B80000
|
heap
|
page execute and read and write
|
||
920000
|
heap
|
page read and write
|
||
233ECB6A000
|
heap
|
page read and write
|
||
3135000
|
trusted library allocation
|
page read and write
|
||
22A16B40000
|
trusted library section
|
page read and write
|
||
B98BC7F000
|
stack
|
page read and write
|
||
D1CC87D000
|
stack
|
page read and write
|
||
2B233D6C000
|
heap
|
page read and write
|
||
3317000
|
trusted library allocation
|
page read and write
|
||
134335AC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B762000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
D1CC8F8000
|
stack
|
page read and write
|
||
2B21C3C6000
|
trusted library allocation
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
7FFD9B962000
|
trusted library allocation
|
page read and write
|
||
105F000
|
stack
|
page read and write
|
||
7FFD9BADC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
EF0000
|
heap
|
page read and write
|
||
925000
|
heap
|
page read and write
|
||
233ECB0D000
|
heap
|
page read and write
|
||
22A30B30000
|
heap
|
page read and write
|
||
540FCF9000
|
stack
|
page read and write
|
||
7FFD9B7DC000
|
trusted library allocation
|
page execute and read and write
|
||
2B233C02000
|
heap
|
page read and write
|
||
2B2339F0000
|
heap
|
page read and write
|
||
22A1A0FC000
|
trusted library allocation
|
page read and write
|
||
D2C000
|
heap
|
page read and write
|
||
B98B7FF000
|
stack
|
page read and write
|
||
2B21C4E3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
2B22B481000
|
trusted library allocation
|
page read and write
|
||
1B7FE000
|
stack
|
page read and write
|
||
F91000
|
heap
|
page read and write
|
||
2F82000
|
trusted library allocation
|
page read and write
|
||
7FFD9B82C000
|
trusted library allocation
|
page execute and read and write
|
||
541007E000
|
stack
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
22A288B6000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
31E7000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB9000
|
trusted library allocation
|
page read and write
|
||
22A187E9000
|
trusted library allocation
|
page read and write
|
||
22A285C1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
309C000
|
trusted library allocation
|
page read and write
|
||
134422A1000
|
trusted library allocation
|
page read and write
|
||
2B21C3B1000
|
trusted library allocation
|
page read and write
|
||
2866A5F1000
|
heap
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B948000
|
trusted library allocation
|
page read and write
|
||
147DFAD1000
|
trusted library allocation
|
page read and write
|
||
8D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
1343231A000
|
trusted library allocation
|
page read and write
|
||
1B69B000
|
stack
|
page read and write
|
||
147CFB13000
|
trusted library allocation
|
page read and write
|
||
540FE7E000
|
stack
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
2B21C3CF000
|
trusted library allocation
|
page read and write
|
||
1C28F000
|
heap
|
page read and write
|
||
22A30AAE000
|
heap
|
page read and write
|
||
CF4000
|
stack
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
||
3047000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page execute and read and write
|
||
D1CC36E000
|
stack
|
page read and write
|
||
D0C000
|
heap
|
page read and write
|
||
2B21C240000
|
trusted library allocation
|
page read and write
|
||
134332A5000
|
trusted library allocation
|
page read and write
|
||
30FC000
|
trusted library allocation
|
page read and write
|
||
147CDD60000
|
heap
|
page read and write
|
||
2B21B340000
|
trusted library allocation
|
page read and write
|
||
3017000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAFC000
|
trusted library allocation
|
page read and write
|
||
540FEFE000
|
stack
|
page read and write
|
||
329D000
|
trusted library allocation
|
page read and write
|
||
12C05000
|
trusted library allocation
|
page read and write
|
||
1C280000
|
heap
|
page read and write
|
||
739000
|
heap
|
page read and write
|
||
7FFD9BAC8000
|
trusted library allocation
|
page read and write
|
||
22A19F11000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
1CD620B0000
|
heap
|
page read and write
|
||
2B233D46000
|
heap
|
page read and write
|
||
233EC4D0000
|
trusted library section
|
page read and write
|
||
2B22B74C000
|
trusted library allocation
|
page read and write
|
||
233ECE29000
|
heap
|
page read and write
|
||
D1CC7F7000
|
stack
|
page read and write
|
||
1C28B000
|
heap
|
page read and write
|
||
540F7FE000
|
stack
|
page read and write
|
||
22A19527000
|
trusted library allocation
|
page read and write
|
||
7FFD9B941000
|
trusted library allocation
|
page read and write
|
||
1B2E2000
|
heap
|
page read and write
|
||
3129000
|
trusted library allocation
|
page read and write
|
||
233EC61A000
|
heap
|
page read and write
|
||
310E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
1344A626000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
147E8359000
|
heap
|
page read and write
|
||
147D132E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
3213000
|
trusted library allocation
|
page read and write
|
||
540FFFC000
|
stack
|
page read and write
|
||
7FFD9B958000
|
trusted library allocation
|
page read and write
|
||
134334F0000
|
trusted library allocation
|
page read and write
|
||
132E000
|
stack
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
336CFDE000
|
stack
|
page read and write
|
||
233EAB51000
|
heap
|
page read and write
|
||
540FE78000
|
stack
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
2FAC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
13442592000
|
trusted library allocation
|
page read and write
|
||
13432CF2000
|
trusted library allocation
|
page read and write
|
||
2B233C10000
|
heap
|
page read and write
|
||
2B21C576000
|
trusted library allocation
|
page read and write
|
||
2679649000
|
stack
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
1B6FD000
|
stack
|
page read and write
|
||
7FFD9B81C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
233804CD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAE8000
|
trusted library allocation
|
page read and write
|
||
1344A7F2000
|
heap
|
page read and write
|
||
2B219B12000
|
heap
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
2B21C3BE000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
2FA3000
|
trusted library allocation
|
page read and write
|
||
2B21CCDD000
|
trusted library allocation
|
page read and write
|
||
2B22B471000
|
trusted library allocation
|
page read and write
|
||
22A185B5000
|
heap
|
page read and write
|
||
7DF455820000
|
trusted library allocation
|
page execute and read and write
|
||
321F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
2B21D250000
|
trusted library allocation
|
page read and write
|
||
3182000
|
trusted library allocation
|
page read and write
|
||
13430500000
|
heap
|
page read and write
|
||
134305D8000
|
heap
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB4000
|
trusted library allocation
|
page read and write
|
||
B98C9CC000
|
stack
|
page read and write
|
||
233811DE000
|
trusted library allocation
|
page read and write
|
||
2B21B370000
|
heap
|
page readonly
|
||
7FFD9B972000
|
trusted library allocation
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
233811AB000
|
trusted library allocation
|
page read and write
|
||
147DFD94000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
22A1952F000
|
trusted library allocation
|
page read and write
|
||
134322A1000
|
trusted library allocation
|
page read and write
|
||
22A19812000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
1CD62190000
|
heap
|
page read and write
|
||
32E0000
|
trusted library allocation
|
page read and write
|
||
2EA3000
|
trusted library allocation
|
page read and write
|
||
D1CD809000
|
stack
|
page read and write
|
||
7FFD9B7DC000
|
trusted library allocation
|
page execute and read and write
|
||
147D0B67000
|
trusted library allocation
|
page read and write
|
||
334A000
|
trusted library allocation
|
page read and write
|
||
1344A693000
|
heap
|
page read and write
|
||
7FFD9BB6C000
|
trusted library allocation
|
page read and write
|
||
1BB6A000
|
heap
|
page read and write
|
||
30D0000
|
trusted library allocation
|
page read and write
|
||
2BFF000
|
stack
|
page read and write
|
||
7FFD9BAC5000
|
trusted library allocation
|
page read and write
|
||
22A18500000
|
heap
|
page execute and read and write
|
||
23381038000
|
trusted library allocation
|
page read and write
|
||
2B22B4C7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
243C000
|
heap
|
page read and write
|
||
B98B879000
|
stack
|
page read and write
|
||
233ECC85000
|
heap
|
page read and write
|
||
233810C1000
|
trusted library allocation
|
page read and write
|
||
147E8357000
|
heap
|
page read and write
|
||
134304E0000
|
heap
|
page read and write
|
||
3398000
|
trusted library allocation
|
page read and write
|
||
7FF4389C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
1344A844000
|
heap
|
page read and write
|
||
147CDD98000
|
heap
|
page read and write
|
||
B98C7CE000
|
stack
|
page read and write
|
||
2866A5E3000
|
heap
|
page read and write
|
||
2678112000
|
stack
|
page read and write
|
||
D1CC67E000
|
stack
|
page read and write
|
||
1344A919000
|
heap
|
page read and write
|
||
B98CA4E000
|
stack
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
2B219B50000
|
trusted library section
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
1344A7E0000
|
heap
|
page read and write
|
||
147D1391000
|
trusted library allocation
|
page read and write
|
||
3307000
|
trusted library allocation
|
page read and write
|
||
7FFD9B922000
|
trusted library allocation
|
page read and write
|
||
2B21B3DA000
|
heap
|
page read and write
|
||
D1CC6FA000
|
stack
|
page read and write
|
||
134332D0000
|
trusted library allocation
|
page read and write
|
||
22A18646000
|
trusted library allocation
|
page read and write
|
||
267954C000
|
stack
|
page read and write
|
||
1344A8E2000
|
heap
|
page read and write
|
||
1343323D000
|
trusted library allocation
|
page read and write
|
||
1AECA000
|
stack
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
||
147CFA66000
|
heap
|
page execute and read and write
|
||
1344A8FA000
|
heap
|
page read and write
|
||
31F9000
|
trusted library allocation
|
page read and write
|
||
1B5CE000
|
stack
|
page read and write
|
||
147DFDA6000
|
trusted library allocation
|
page read and write
|
||
B98B8FE000
|
stack
|
page read and write
|
||
2B21D274000
|
trusted library allocation
|
page read and write
|
||
2B21B91D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA93000
|
trusted library allocation
|
page read and write
|
||
13430850000
|
heap
|
page read and write
|
||
2B219910000
|
heap
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
32A3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB4000
|
trusted library allocation
|
page read and write
|
||
13433245000
|
trusted library allocation
|
page read and write
|
||
2B21C432000
|
trusted library allocation
|
page read and write
|
||
540FD77000
|
stack
|
page read and write
|
||
267847E000
|
stack
|
page read and write
|
||
134340C4000
|
trusted library allocation
|
page read and write
|
||
233EC770000
|
heap
|
page execute and read and write
|
||
23381126000
|
trusted library allocation
|
page read and write
|
||
1344A926000
|
heap
|
page read and write
|
||
7FFD9BAC9000
|
trusted library allocation
|
page read and write
|
||
336D77E000
|
stack
|
page read and write
|
||
1344A924000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
2B233D17000
|
heap
|
page read and write
|
||
B98BBF9000
|
stack
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
134333C4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B921000
|
trusted library allocation
|
page read and write
|
||
2B21C797000
|
trusted library allocation
|
page read and write
|
||
336D27E000
|
stack
|
page read and write
|
||
26784FE000
|
stack
|
page read and write
|
||
147E82E1000
|
heap
|
page read and write
|
||
1CD62240000
|
heap
|
page read and write
|
||
1261C000
|
trusted library allocation
|
page read and write
|
||
7DF451540000
|
trusted library allocation
|
page execute and read and write
|
||
233EC560000
|
trusted library allocation
|
page read and write
|
||
233EAB4F000
|
heap
|
page read and write
|
||
3093000
|
trusted library allocation
|
page read and write
|
||
147D06D3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBED000
|
trusted library allocation
|
page read and write
|
||
22A19533000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
13432FAC000
|
trusted library allocation
|
page read and write
|
||
2FB2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B94A000
|
trusted library allocation
|
page read and write
|
||
1BB59000
|
heap
|
page read and write
|
||
2866A7A0000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7EC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBBD000
|
trusted library allocation
|
page read and write
|
||
147CFF6D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
2B219AAA000
|
heap
|
page read and write
|
||
320D000
|
trusted library allocation
|
page read and write
|
||
233813C9000
|
trusted library allocation
|
page read and write
|
||
233EC5A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
758000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B84C000
|
trusted library allocation
|
page execute and read and write
|
||
3270000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
23381095000
|
trusted library allocation
|
page read and write
|
||
332F000
|
trusted library allocation
|
page read and write
|
||
1344A8EC000
|
heap
|
page read and write
|
||
22A30DB0000
|
heap
|
page read and write
|
||
22A16997000
|
heap
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
147E8200000
|
heap
|
page read and write
|
||
7FFD9B7BC000
|
trusted library allocation
|
page execute and read and write
|
||
2B233970000
|
heap
|
page execute and read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
22A183F0000
|
trusted library allocation
|
page read and write
|
||
22A195F6000
|
trusted library allocation
|
page read and write
|
||
CE5000
|
heap
|
page read and write
|
||
2B22B74E000
|
trusted library allocation
|
page read and write
|
||
3005000
|
trusted library allocation
|
page read and write
|
||
147CFA90000
|
heap
|
page read and write
|
||
147CDE6F000
|
heap
|
page read and write
|
||
2B21B4CC000
|
trusted library allocation
|
page read and write
|
||
3117000
|
trusted library allocation
|
page read and write
|
||
76B000
|
heap
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
1B99E000
|
stack
|
page read and write
|
||
1CD62280000
|
heap
|
page read and write
|
||
147CDDDB000
|
heap
|
page read and write
|
||
2B21C6FD000
|
trusted library allocation
|
page read and write
|
||
2678878000
|
stack
|
page read and write
|
||
2866A5E0000
|
heap
|
page read and write
|
||
33A6000
|
trusted library allocation
|
page read and write
|
||
32AC000
|
trusted library allocation
|
page read and write
|
||
101A000
|
heap
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
FBD000
|
heap
|
page read and write
|
||
3282000
|
trusted library allocation
|
page read and write
|
||
12C03000
|
trusted library allocation
|
page read and write
|
||
233EAB95000
|
heap
|
page read and write
|
||
23380F62000
|
trusted library allocation
|
page read and write
|
||
1BB78000
|
heap
|
page read and write
|
||
2B21CCB6000
|
trusted library allocation
|
page read and write
|
||
D06000
|
heap
|
page read and write
|
||
336CE92000
|
stack
|
page read and write
|
||
7FFD9B7AD000
|
trusted library allocation
|
page execute and read and write
|
||
233ECD60000
|
heap
|
page execute and read and write
|
||
233EC4F0000
|
trusted library allocation
|
page read and write
|
||
2B233A47000
|
heap
|
page read and write
|
||
31FC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
540FC7D000
|
stack
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
A50000
|
unkown
|
page readonly
|
||
147E8326000
|
heap
|
page read and write
|
||
D1CCABA000
|
stack
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
22A285E1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAEC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B82C000
|
trusted library allocation
|
page execute and read and write
|
||
3353000
|
trusted library allocation
|
page read and write
|
||
134305D4000
|
heap
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
2B22B740000
|
trusted library allocation
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
30A3000
|
trusted library allocation
|
page read and write
|
||
3035000
|
trusted library allocation
|
page read and write
|
||
B98BCFF000
|
stack
|
page read and write
|
||
22A288A7000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
D1CCBBE000
|
stack
|
page read and write
|
||
147CDFE0000
|
trusted library allocation
|
page read and write
|
||
2F24000
|
trusted library allocation
|
page read and write
|
||
1B2E4000
|
heap
|
page read and write
|
||
1BB71000
|
heap
|
page read and write
|
||
2FCD000
|
trusted library allocation
|
page read and write
|
||
233ECB46000
|
heap
|
page read and write
|
||
1B99E000
|
stack
|
page read and write
|
||
147CE0F0000
|
heap
|
page read and write
|
||
314F000
|
trusted library allocation
|
page read and write
|
||
3143000
|
trusted library allocation
|
page read and write
|
||
147CE100000
|
heap
|
page read and write
|
||
7FFD9B81C000
|
trusted library allocation
|
page execute and read and write
|
||
B98BA77000
|
stack
|
page read and write
|
||
2B219B20000
|
heap
|
page read and write
|
||
540FBF7000
|
stack
|
page read and write
|
||
23381DE4000
|
trusted library allocation
|
page read and write
|
||
22A16958000
|
heap
|
page read and write
|
||
3320000
|
trusted library allocation
|
page read and write
|
||
315B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB8A000
|
trusted library allocation
|
page read and write
|
||
147D0813000
|
trusted library allocation
|
page read and write
|
||
31AC000
|
trusted library allocation
|
page read and write
|
||
331A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB8C000
|
trusted library allocation
|
page read and write
|
||
7FC000
|
heap
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
13433669000
|
trusted library allocation
|
page read and write
|
||
22A30DCC000
|
heap
|
page read and write
|
||
147CE105000
|
heap
|
page read and write
|
||
336D5F8000
|
stack
|
page read and write
|
||
75D000
|
heap
|
page read and write
|
||
8B0000
|
trusted library allocation
|
page read and write
|
||
3383000
|
trusted library allocation
|
page read and write
|
||
233EC510000
|
trusted library allocation
|
page read and write
|
||
2F44000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
1AF60000
|
heap
|
page read and write
|
||
6347C7C000
|
stack
|
page read and write
|
||
D1CD68E000
|
stack
|
page read and write
|
||
147D1308000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
2B219B60000
|
heap
|
page read and write
|
||
3356000
|
trusted library allocation
|
page read and write
|
||
2B21C1C7000
|
trusted library allocation
|
page read and write
|
||
3059000
|
trusted library allocation
|
page read and write
|
||
2678579000
|
stack
|
page read and write
|
||
2866A5B0000
|
heap
|
page read and write
|
||
2FD3000
|
trusted library allocation
|
page read and write
|
||
31B2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B876000
|
trusted library allocation
|
page execute and read and write
|
||
2BE9000
|
heap
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
1B2A8000
|
heap
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
1261E000
|
trusted library allocation
|
page read and write
|
||
147DFB0F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
30F0000
|
trusted library allocation
|
page read and write
|
||
115E000
|
stack
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
F50000
|
heap
|
page read and write
|
||
23380229000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA93000
|
trusted library allocation
|
page read and write
|
||
147D0C0A000
|
trusted library allocation
|
page read and write
|
||
1343362B000
|
trusted library allocation
|
page read and write
|
||
327F000
|
trusted library allocation
|
page read and write
|
||
2B21C3B5000
|
trusted library allocation
|
page read and write
|
||
DF9000
|
heap
|
page read and write
|
||
2B233A2D000
|
heap
|
page read and write
|
||
7FFD9B816000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B931000
|
trusted library allocation
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
22A30E41000
|
heap
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
33AA000
|
trusted library allocation
|
page read and write
|
||
2C01000
|
trusted library allocation
|
page read and write
|
||
1BAA0000
|
heap
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
31DE000
|
trusted library allocation
|
page read and write
|
||
22A197D5000
|
trusted library allocation
|
page read and write
|
||
B98B77E000
|
stack
|
page read and write
|
||
147E82B1000
|
heap
|
page read and write
|
||
7FFD9B964000
|
trusted library allocation
|
page read and write
|
||
2B233CA7000
|
heap
|
page read and write
|
||
1BAA2000
|
heap
|
page read and write
|
||
7FFD9B92A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7BC000
|
trusted library allocation
|
page execute and read and write
|
||
335C000
|
trusted library allocation
|
page read and write
|
||
22A168E0000
|
heap
|
page read and write
|
||
2B219A60000
|
heap
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
76D000
|
heap
|
page read and write
|
||
2B21C545000
|
trusted library allocation
|
page read and write
|
||
3323000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
147DFE47000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
3359000
|
trusted library allocation
|
page read and write
|
||
2678779000
|
stack
|
page read and write
|
||
22A18520000
|
heap
|
page execute and read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
D75000
|
heap
|
page read and write
|
||
7DF455810000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
233EAB9B000
|
heap
|
page read and write
|
||
147E7EDE000
|
heap
|
page read and write
|
||
23380F7B000
|
trusted library allocation
|
page read and write
|
||
147E7E50000
|
heap
|
page read and write
|
||
7FFD9B7AB000
|
trusted library allocation
|
page read and write
|
||
1BB76000
|
heap
|
page read and write
|
||
147E824D000
|
heap
|
page read and write
|
||
12DED000
|
trusted library allocation
|
page read and write
|
||
147D0DE7000
|
trusted library allocation
|
page read and write
|
||
2866A5F1000
|
heap
|
page read and write
|
||
22A2862E000
|
trusted library allocation
|
page read and write
|
||
2B21C6A6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
1BFDD000
|
stack
|
page read and write
|
||
22A30B47000
|
heap
|
page read and write
|
||
540F73E000
|
stack
|
page read and write
|
||
7FFD9BB63000
|
trusted library allocation
|
page read and write
|
||
327C000
|
trusted library allocation
|
page read and write
|
||
1B25C000
|
stack
|
page read and write
|
||
147DFD6B000
|
trusted library allocation
|
page read and write
|
||
26795CE000
|
stack
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
22A30A3B000
|
heap
|
page read and write
|
||
5410CCC000
|
stack
|
page read and write
|
||
2B233A20000
|
heap
|
page read and write
|
||
798000
|
heap
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
2F94000
|
trusted library allocation
|
page read and write
|
||
22A1952B000
|
trusted library allocation
|
page read and write
|
||
13430855000
|
heap
|
page read and write
|
||
2B21B3D0000
|
heap
|
page read and write
|
||
13433361000
|
trusted library allocation
|
page read and write
|
||
2B21D22A000
|
trusted library allocation
|
page read and write
|
||
3276000
|
trusted library allocation
|
page read and write
|
||
2FFF000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
134304D0000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
233ECC80000
|
heap
|
page read and write
|
||
147D0B3B000
|
trusted library allocation
|
page read and write
|
||
336D3F9000
|
stack
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
1B89E000
|
stack
|
page read and write
|
||
1CD621D0000
|
heap
|
page read and write
|
||
23380001000
|
trusted library allocation
|
page read and write
|
||
7F9000
|
heap
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
3060000
|
trusted library allocation
|
page read and write
|
||
1BA9F000
|
stack
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
D1CD78E000
|
stack
|
page read and write
|
||
233812AC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
23381896000
|
trusted library allocation
|
page read and write
|
||
7FFD9B921000
|
trusted library allocation
|
page read and write
|
||
D1CC2E3000
|
stack
|
page read and write
|
||
6347D7F000
|
stack
|
page read and write
|
||
2339030E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
30BE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page read and write
|
||
1344A91F000
|
heap
|
page read and write
|
||
147DFAC1000
|
trusted library allocation
|
page read and write
|
||
3258000
|
trusted library allocation
|
page read and write
|
||
134340A4000
|
trusted library allocation
|
page read and write
|
||
2B21C75F000
|
trusted library allocation
|
page read and write
|
||
32E6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
2B233AD2000
|
heap
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
2866A5F1000
|
heap
|
page read and write
|
||
1344A5E0000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
1C47E000
|
stack
|
page read and write
|
||
22A16C10000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
B98C84C000
|
stack
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
147CFAA1000
|
trusted library allocation
|
page read and write
|
||
13432100000
|
heap
|
page read and write
|
||
22A18EF1000
|
trusted library allocation
|
page read and write
|
||
13442594000
|
trusted library allocation
|
page read and write
|
||
147CDF60000
|
heap
|
page read and write
|
||
2B21B3D5000
|
heap
|
page read and write
|
||
147DFAB0000
|
trusted library allocation
|
page read and write
|
||
2B21C3BA000
|
trusted library allocation
|
page read and write
|
||
B98B979000
|
stack
|
page read and write
|
||
134307C0000
|
trusted library allocation
|
page read and write
|
||
1BB02000
|
heap
|
page read and write
|
||
13430615000
|
heap
|
page read and write
|
||
336E44E000
|
stack
|
page read and write
|
||
7FFD9B7B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
147CFA40000
|
heap
|
page execute and read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
2B233C15000
|
heap
|
page read and write
|
||
13430830000
|
heap
|
page read and write
|
||
2B22B746000
|
trusted library allocation
|
page read and write
|
||
1A640000
|
trusted library allocation
|
page read and write
|
||
2B21C05F000
|
trusted library allocation
|
page read and write
|
||
233902FE000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
1B79F000
|
stack
|
page read and write
|
||
2B21CBD1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BACC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
22A16BC7000
|
heap
|
page execute and read and write
|
||
22A16BA0000
|
heap
|
page readonly
|
||
12DF1000
|
trusted library allocation
|
page read and write
|
||
147D0BCB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
B98C8CE000
|
stack
|
page read and write
|
||
2B233ADD000
|
heap
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
147D0A3B000
|
trusted library allocation
|
page read and write
|
||
32D7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B83C000
|
trusted library allocation
|
page execute and read and write
|
||
2B2199F0000
|
heap
|
page read and write
|
||
147CE080000
|
trusted library allocation
|
page read and write
|
||
22A1986A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
147CE0B0000
|
trusted library allocation
|
page read and write
|
||
134425AC000
|
trusted library allocation
|
page read and write
|
||
233ECEEB000
|
heap
|
page read and write
|
||
1BB62000
|
heap
|
page read and write
|
||
134305CE000
|
heap
|
page read and write
|
||
147DFD96000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
147D081C000
|
trusted library allocation
|
page read and write
|
||
2B21B360000
|
trusted library allocation
|
page read and write
|
||
2B21BEA2000
|
trusted library allocation
|
page read and write
|
||
23380F66000
|
trusted library allocation
|
page read and write
|
||
1343357A000
|
trusted library allocation
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
1B270000
|
heap
|
page read and write
|
||
147E7EA9000
|
heap
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
1344A890000
|
heap
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
BC4000
|
stack
|
page read and write
|
||
147E7ECA000
|
heap
|
page read and write
|
||
147D0D4E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
147CDDDD000
|
heap
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
B98B673000
|
stack
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
147CDFA0000
|
heap
|
page read and write
|
||
5410BC9000
|
stack
|
page read and write
|
||
23390031000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
2866A5F1000
|
heap
|
page read and write
|
||
7DF4BA920000
|
trusted library allocation
|
page execute and read and write
|
||
26789FE000
|
stack
|
page read and write
|
||
2F4A000
|
trusted library allocation
|
page read and write
|
||
147D18C6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B952000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
2B21C20C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
2F70000
|
trusted library allocation
|
page read and write
|
||
23380F73000
|
trusted library allocation
|
page read and write
|
||
1344A869000
|
heap
|
page read and write
|
||
233ECAC6000
|
heap
|
page read and write
|
||
1CD62245000
|
heap
|
page read and write
|
||
336D67E000
|
stack
|
page read and write
|
||
2B21C62F000
|
trusted library allocation
|
page read and write
|
There are 1430 hidden memdumps, click here to show them.