Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
a2e1G18mbz.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\System.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\abobus.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\svchost.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\a2e1G18mbz.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\B029.tmp\B02A.tmp\B02B.bat
|
ISO-8859 text, with CRLF, NEL line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3ci30rtx.3f3.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3qsfmq05.1qj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5dfvlri5.h3n.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5ecuwkaa.0g2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5moraiz2.q3j.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_agc0sr5w.t4u.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_au4qzfr3.035.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cp35hvuu.ujy.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cygajdqy.4jh.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fvbsjgz2.2x3.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g0jhuem4.030.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i4oqhhcr.1cf.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j3jvzqck.sbm.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ldah0aml.3hu.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lkyc03eo.uhf.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nqqrqrxp.jng.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_odbewboe.tbz.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_op3p5ze5.moi.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s24l5coz.5uj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sbgstyqj.hgg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_so1veanm.2hx.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u3ho1q4j.vja.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uxqmndja.cby.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y0xdtruo.v22.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
\Device\Null
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 22 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\a2e1G18mbz.exe
|
"C:\Users\user\Desktop\a2e1G18mbz.exe"
|
||
C:\Users\user\AppData\Local\Temp\System.exe
|
"C:\Users\user\AppData\Local\Temp\System.exe"
|
||
C:\Users\user\AppData\Local\Temp\abobus.exe
|
"C:\Users\user\AppData\Local\Temp\abobus.exe"
|
||
C:\Users\user\AppData\Local\Temp\svchost.exe
|
"C:\Users\user\AppData\Local\Temp\svchost.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd" /c "C:\Users\user\AppData\Local\Temp\B029.tmp\B02A.tmp\B02B.bat C:\Users\user\AppData\Local\Temp\abobus.exe"
|
||
C:\Windows\System32\PING.EXE
|
ping -n 2 127.0.0.1
|
||
C:\Windows\System32\PING.EXE
|
ping -n 2 127.0.0.1
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\System.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\svchost.exe'
|
||
C:\Windows\System32\PING.EXE
|
ping -n 2 127.0.0.1
|
||
C:\Windows\System32\PING.EXE
|
ping -n 2 127.0.0.1
|
||
C:\Windows\System32\PING.EXE
|
ping -n 2 127.0.0.1
|
||
C:\Windows\System32\PING.EXE
|
ping -n 2 127.0.0.1
|
||
C:\Windows\System32\PING.EXE
|
ping -n 2 127.0.0.1
|
||
C:\Windows\System32\PING.EXE
|
ping -n 2 127.0.0.1
|
||
C:\Windows\System32\PING.EXE
|
ping -n 2 127.0.0.1
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'System.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\System.exe'
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist
|
||
C:\Windows\System32\find.exe
|
find /i "cs2.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 20 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
logo-active.gl.at.ply.gg
|
|||
http://crl.micros(y
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://go.microsoft.co
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://osoft.co
|
unknown
|
||
http://go.microsoft.c
|
unknown
|
||
http://go.microsoft.ctain
|
unknown
|
||
http://crl.micft.cMicRosof
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://www.microsoft.c
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://crl.micros
|
unknown
|
There are 12 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
127.0.0.1
|
unknown
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
E92000
|
unkown
|
page readonly
|
||
2C61000
|
trusted library allocation
|
page read and write
|
||
632000
|
unkown
|
page readonly
|
||
24E01E24000
|
trusted library allocation
|
page read and write
|
||
1E4B5740000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
2CE2E332000
|
trusted library allocation
|
page read and write
|
||
1E4CDE34000
|
heap
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page execute and read and write
|
||
2810B420000
|
heap
|
page read and write
|
||
D46E7FE000
|
stack
|
page read and write
|
||
7FFD9BAC4000
|
trusted library allocation
|
page read and write
|
||
F80000
|
trusted library allocation
|
page read and write
|
||
5A6000
|
heap
|
page read and write
|
||
888000
|
unkown
|
page readonly
|
||
258D1C20000
|
trusted library allocation
|
page read and write
|
||
1AA94E2B000
|
heap
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
1E4C5E1F000
|
trusted library allocation
|
page read and write
|
||
261C4214000
|
heap
|
page read and write
|
||
1AA94E1D000
|
heap
|
page read and write
|
||
E48000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
329E000
|
stack
|
page read and write
|
||
144A000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
1AA94E1D000
|
heap
|
page read and write
|
||
261ABAB9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
24E75B25000
|
heap
|
page read and write
|
||
24E77AF6000
|
heap
|
page read and write
|
||
2811D5C6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B902000
|
trusted library allocation
|
page read and write
|
||
261AB778000
|
heap
|
page read and write
|
||
24E01E29000
|
trusted library allocation
|
page read and write
|
||
24E00087000
|
trusted library allocation
|
page read and write
|
||
1451000
|
heap
|
page read and write
|
||
7FFD9BB6A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
24E77970000
|
heap
|
page read and write
|
||
2810D2D0000
|
heap
|
page execute and read and write
|
||
2CE1C469000
|
heap
|
page read and write
|
||
261ACB35000
|
trusted library allocation
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
258D4779000
|
trusted library allocation
|
page read and write
|
||
1E4B5E7D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
7E0000
|
heap
|
page read and write
|
||
1AA94DE0000
|
heap
|
page read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
6F71B7F000
|
stack
|
page read and write
|
||
258EBBC8000
|
heap
|
page read and write
|
||
BDA1DFD000
|
stack
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
7FFD9BADA000
|
trusted library allocation
|
page read and write
|
||
ED18DFF000
|
stack
|
page read and write
|
||
2810B540000
|
trusted library allocation
|
page read and write
|
||
1E4B77D7000
|
trusted library allocation
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
ED18CF8000
|
stack
|
page read and write
|
||
1AA94E19000
|
heap
|
page read and write
|
||
258EBBAD000
|
heap
|
page read and write
|
||
1E4CDDB0000
|
heap
|
page execute and read and write
|
||
258E3811000
|
trusted library allocation
|
page read and write
|
||
D46E3CE000
|
stack
|
page read and write
|
||
258D5080000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
C99C27F000
|
stack
|
page read and write
|
||
EBAD57E000
|
stack
|
page read and write
|
||
261AB891000
|
trusted library allocation
|
page read and write
|
||
258D3600000
|
heap
|
page read and write
|
||
258D3A39000
|
trusted library allocation
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
||
261BBB82000
|
trusted library allocation
|
page read and write
|
||
7FFD9B952000
|
trusted library allocation
|
page read and write
|
||
207645D4000
|
heap
|
page read and write
|
||
258D1AE2000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
2810CF25000
|
heap
|
page read and write
|
||
258D1C60000
|
trusted library allocation
|
page read and write
|
||
2810D008000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
258D1B1B000
|
heap
|
page read and write
|
||
258E3B0C000
|
trusted library allocation
|
page read and write
|
||
258D4263000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
1AA94E2D000
|
heap
|
page read and write
|
||
1AA94E05000
|
heap
|
page read and write
|
||
7FFD9BAD2000
|
trusted library allocation
|
page read and write
|
||
13B0000
|
heap
|
page execute and read and write
|
||
630000
|
unkown
|
page readonly
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
14CE000
|
heap
|
page read and write
|
||
2810B468000
|
heap
|
page read and write
|
||
258D3480000
|
trusted library allocation
|
page read and write
|
||
6F71AFF000
|
stack
|
page read and write
|
||
D46E77E000
|
stack
|
page read and write
|
||
BCEC77C000
|
stack
|
page read and write
|
||
7FFD9BAA3000
|
trusted library allocation
|
page read and write
|
||
F75000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
28125650000
|
heap
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
2810D508000
|
trusted library allocation
|
page read and write
|
||
7FFD9B762000
|
trusted library allocation
|
page read and write
|
||
2CE2E041000
|
trusted library allocation
|
page read and write
|
||
BDA1E76000
|
stack
|
page read and write
|
||
C99C2FA000
|
stack
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
261BB8C1000
|
trusted library allocation
|
page read and write
|
||
132A3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
24E75AB0000
|
trusted library allocation
|
page read and write
|
||
2CE364A0000
|
heap
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
1E4B5780000
|
trusted library allocation
|
page read and write
|
||
261AB917000
|
trusted library allocation
|
page read and write
|
||
1E4B6727000
|
trusted library allocation
|
page read and write
|
||
BCEBDDE000
|
stack
|
page read and write
|
||
261A9C20000
|
heap
|
page read and write
|
||
2812573D000
|
heap
|
page read and write
|
||
C99C47D000
|
stack
|
page read and write
|
||
258D4844000
|
trusted library allocation
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
7FFD9B771000
|
trusted library allocation
|
page read and write
|
||
1E4CE210000
|
heap
|
page read and write
|
||
7FFD9B81C000
|
trusted library allocation
|
page execute and read and write
|
||
24E75930000
|
heap
|
page execute and read and write
|
||
FA5000
|
heap
|
page read and write
|
||
BDA1CFE000
|
stack
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
20764540000
|
heap
|
page read and write
|
||
2CE36740000
|
heap
|
page read and write
|
||
21F0000
|
heap
|
page read and write
|
||
142E000
|
heap
|
page read and write
|
||
1E4C59D1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
258D3775000
|
heap
|
page read and write
|
||
ED19A4E000
|
stack
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
2CE1DFA0000
|
heap
|
page execute and read and write
|
||
BCED2C7000
|
stack
|
page read and write
|
||
D46ED7F000
|
stack
|
page read and write
|
||
24E77BDB000
|
heap
|
page read and write
|
||
1B250000
|
heap
|
page read and write
|
||
261AC8C0000
|
trusted library allocation
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
BCED44E000
|
stack
|
page read and write
|
||
7FFD9BADA000
|
trusted library allocation
|
page read and write
|
||
1AA94E16000
|
heap
|
page read and write
|
||
7FFD9B902000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
14DB000
|
heap
|
page read and write
|
||
258D478E000
|
trusted library allocation
|
page read and write
|
||
1BBCE000
|
stack
|
page read and write
|
||
24E77A78000
|
heap
|
page read and write
|
||
2812576C000
|
heap
|
page read and write
|
||
C99C3F9000
|
stack
|
page read and write
|
||
800000
|
unkown
|
page readonly
|
||
7FFD9B912000
|
trusted library allocation
|
page read and write
|
||
7FFD9B91A000
|
trusted library allocation
|
page read and write
|
||
2810B580000
|
trusted library allocation
|
page read and write
|
||
24E75965000
|
heap
|
page read and write
|
||
1E4CDE63000
|
heap
|
page read and write
|
||
1E4B3F65000
|
heap
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
1AA94E35000
|
heap
|
page read and write
|
||
C99D44C000
|
stack
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB63000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
BDA2C8C000
|
stack
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
2CE1C461000
|
heap
|
page read and write
|
||
24E77909000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
261BB8B1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B911000
|
trusted library allocation
|
page read and write
|
||
D46ECF9000
|
stack
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
24E758F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
2810EBD1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
2CE3686E000
|
heap
|
page read and write
|
||
281256AE000
|
heap
|
page read and write
|
||
261C4208000
|
heap
|
page read and write
|
||
1AA94E05000
|
heap
|
page read and write
|
||
258E3885000
|
trusted library allocation
|
page read and write
|
||
6F71BFE000
|
stack
|
page read and write
|
||
261AD015000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
2810D352000
|
trusted library allocation
|
page read and write
|
||
1E4B671D000
|
trusted library allocation
|
page read and write
|
||
1E4CDDE8000
|
heap
|
page read and write
|
||
258D1C40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B895000
|
trusted library allocation
|
page execute and read and write
|
||
258D5109000
|
trusted library allocation
|
page read and write
|
||
BCED24E000
|
stack
|
page read and write
|
||
24E773DA000
|
heap
|
page read and write
|
||
2CE1F381000
|
trusted library allocation
|
page read and write
|
||
2CE1F405000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
261C40FA000
|
heap
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
BDA2C0F000
|
stack
|
page read and write
|
||
24E759C3000
|
heap
|
page read and write
|
||
1AA94E1D000
|
heap
|
page read and write
|
||
1E4B5760000
|
trusted library allocation
|
page read and write
|
||
1B35E000
|
stack
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
1AA94E3A000
|
heap
|
page read and write
|
||
E83000
|
trusted library allocation
|
page read and write
|
||
1E4B77B2000
|
trusted library allocation
|
page read and write
|
||
5AC000
|
heap
|
page read and write
|
||
1E4B3E6F000
|
heap
|
page read and write
|
||
1BCCE000
|
stack
|
page read and write
|
||
258EBBB7000
|
heap
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9B944000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB77000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
2810B466000
|
heap
|
page read and write
|
||
1AA94D10000
|
heap
|
page read and write
|
||
7FFD9B81C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
||
2CE1F869000
|
trusted library allocation
|
page read and write
|
||
143D000
|
heap
|
page read and write
|
||
1B9CE000
|
stack
|
page read and write
|
||
24E77B8B000
|
heap
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B954000
|
trusted library allocation
|
page read and write
|
||
24E77A70000
|
heap
|
page read and write
|
||
C99C17F000
|
stack
|
page read and write
|
||
1E4B3D10000
|
heap
|
page read and write
|
||
7FFD9BB96000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
24E01785000
|
trusted library allocation
|
page read and write
|
||
D5C000
|
stack
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
24E00F9A000
|
trusted library allocation
|
page read and write
|
||
2812574E000
|
heap
|
page read and write
|
||
261AC894000
|
trusted library allocation
|
page read and write
|
||
1802000
|
heap
|
page read and write
|
||
24E778B6000
|
heap
|
page read and write
|
||
1E4CE052000
|
heap
|
page read and write
|
||
C99D4CE000
|
stack
|
page read and write
|
||
10AE000
|
stack
|
page read and write
|
||
630000
|
unkown
|
page readonly
|
||
ED18EFF000
|
stack
|
page read and write
|
||
7FFD9B958000
|
trusted library allocation
|
page read and write
|
||
24E77520000
|
heap
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
20764647000
|
heap
|
page read and write
|
||
7FFD9B942000
|
trusted library allocation
|
page read and write
|
||
258D3811000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB4000
|
trusted library allocation
|
page read and write
|
||
B0A000
|
heap
|
page read and write
|
||
261A9DF0000
|
heap
|
page read and write
|
||
2811D2F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
24E77AB2000
|
heap
|
page read and write
|
||
261ABD5D000
|
trusted library allocation
|
page read and write
|
||
261AD6B4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
24E00001000
|
trusted library allocation
|
page read and write
|
||
C99C5F9000
|
stack
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
2CE1F0D3000
|
trusted library allocation
|
page read and write
|
||
261AD121000
|
trusted library allocation
|
page read and write
|
||
261C41C9000
|
heap
|
page read and write
|
||
24E77C1A000
|
heap
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
D46F7CE000
|
stack
|
page read and write
|
||
28125725000
|
heap
|
page read and write
|
||
C99C1FE000
|
stack
|
page read and write
|
||
7FFD9BB86000
|
trusted library allocation
|
page read and write
|
||
261C4150000
|
heap
|
page read and write
|
||
7FFD9B77B000
|
trusted library allocation
|
page read and write
|
||
B0C000
|
heap
|
page read and write
|
||
2810DEE6000
|
trusted library allocation
|
page read and write
|
||
258D478A000
|
trusted library allocation
|
page read and write
|
||
1E4B59B1000
|
trusted library allocation
|
page read and write
|
||
12823000
|
trusted library allocation
|
page read and write
|
||
7FFD9BACC000
|
trusted library allocation
|
page read and write
|
||
C99C4F7000
|
stack
|
page read and write
|
||
7FFD9BAC4000
|
trusted library allocation
|
page read and write
|
||
C30B75F000
|
stack
|
page read and write
|
||
132A1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
261A9EB5000
|
heap
|
page read and write
|
||
7FFD9B78B000
|
trusted library allocation
|
page read and write
|
||
7DF44ADE0000
|
trusted library allocation
|
page execute and read and write
|
||
24E01031000
|
trusted library allocation
|
page read and write
|
||
1AA94E3C000
|
heap
|
page read and write
|
||
1E4CE01B000
|
heap
|
page read and write
|
||
12821000
|
trusted library allocation
|
page read and write
|
||
1AA94E3D000
|
heap
|
page read and write
|
||
BDA1F39000
|
stack
|
page read and write
|
||
BDA1C79000
|
stack
|
page read and write
|
||
BCEC67E000
|
stack
|
page read and write
|
||
258D374B000
|
heap
|
page read and write
|
||
7FFD9B954000
|
trusted library allocation
|
page read and write
|
||
1BACF000
|
stack
|
page read and write
|
||
261C3D53000
|
heap
|
page read and write
|
||
1B600000
|
heap
|
page read and write
|
||
1E4C5CA2000
|
trusted library allocation
|
page read and write
|
||
1390000
|
trusted library allocation
|
page read and write
|
||
2CE1F0FF000
|
trusted library allocation
|
page read and write
|
||
1E4B77D2000
|
trusted library allocation
|
page read and write
|
||
1E4B5710000
|
heap
|
page read and write
|
||
1E4B3F10000
|
heap
|
page read and write
|
||
BCED34E000
|
stack
|
page read and write
|
||
258D1B56000
|
heap
|
page read and write
|
||
BDA1B7F000
|
stack
|
page read and write
|
||
802000
|
unkown
|
page readonly
|
||
D46E9FD000
|
stack
|
page read and write
|
||
1E4B3E5D000
|
heap
|
page read and write
|
||
24E75870000
|
heap
|
page read and write
|
||
BCEC1FE000
|
stack
|
page read and write
|
||
32A1000
|
trusted library allocation
|
page read and write
|
||
132A8000
|
trusted library allocation
|
page read and write
|
||
258D1B0F000
|
heap
|
page read and write
|
||
2CE1F044000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
258E3B86000
|
trusted library allocation
|
page read and write
|
||
258EBF40000
|
heap
|
page read and write
|
||
D46EBFE000
|
stack
|
page read and write
|
||
2811D5B1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD8000
|
trusted library allocation
|
page read and write
|
||
258E3AFE000
|
trusted library allocation
|
page read and write
|
||
24E77B15000
|
heap
|
page read and write
|
||
EBAD47E000
|
stack
|
page read and write
|
||
24E77C11000
|
heap
|
page read and write
|
||
D46E8FF000
|
stack
|
page read and write
|
||
1E4B3F60000
|
heap
|
page read and write
|
||
EBAE54D000
|
stack
|
page read and write
|
||
1AA94E06000
|
heap
|
page read and write
|
||
7FFD9B82C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
E90000
|
unkown
|
page readonly
|
||
1E4B69B2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
7DF47A740000
|
trusted library allocation
|
page execute and read and write
|
||
258EBDF3000
|
heap
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
258D48A4000
|
trusted library allocation
|
page read and write
|
||
2CE1C3F0000
|
trusted library allocation
|
page read and write
|
||
1E4CDE6C000
|
heap
|
page read and write
|
||
261AD184000
|
trusted library allocation
|
page read and write
|
||
24E77990000
|
heap
|
page read and write
|
||
EBAD8FE000
|
stack
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
1E4C59B1000
|
trusted library allocation
|
page read and write
|
||
261C4126000
|
heap
|
page read and write
|
||
24E77C3A000
|
heap
|
page read and write
|
||
1413000
|
heap
|
page read and write
|
||
1E4B65B4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B82C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA72000
|
trusted library allocation
|
page read and write
|
||
B21000
|
heap
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
2810E283000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
24E00C5D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B82C000
|
trusted library allocation
|
page execute and read and write
|
||
2CE36733000
|
heap
|
page read and write
|
||
2CE1F2E6000
|
trusted library allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
258D48D0000
|
trusted library allocation
|
page read and write
|
||
258D1C50000
|
heap
|
page readonly
|
||
BCEC2FE000
|
stack
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
24E102F3000
|
trusted library allocation
|
page read and write
|
||
261BB905000
|
trusted library allocation
|
page read and write
|
||
C99C77E000
|
stack
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
2CE1F8A8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
2810E310000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
7FF4F7F90000
|
trusted library allocation
|
page execute and read and write
|
||
14001F000
|
unkown
|
page write copy
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
258D4F9A000
|
trusted library allocation
|
page read and write
|
||
24E004CE000
|
trusted library allocation
|
page read and write
|
||
2CE1C428000
|
heap
|
page read and write
|
||
7FFD9B92A000
|
trusted library allocation
|
page read and write
|
||
24E1044A000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
261C3DF0000
|
heap
|
page read and write
|
||
7FFD9BBC6000
|
trusted library allocation
|
page read and write
|
||
1E4C5CBA000
|
trusted library allocation
|
page read and write
|
||
C99C87F000
|
stack
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9A2000
|
trusted library allocation
|
page read and write
|
||
24E77C70000
|
trusted library allocation
|
page read and write
|
||
261C3CA0000
|
heap
|
page execute and read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
24E75B20000
|
heap
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
||
7DF47A760000
|
trusted library allocation
|
page execute and read and write
|
||
261ACA69000
|
trusted library allocation
|
page read and write
|
||
22E296A9000
|
heap
|
page read and write
|
||
32AC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
BCEC37B000
|
stack
|
page read and write
|
||
2CE1DD40000
|
trusted library allocation
|
page read and write
|
||
2810B400000
|
heap
|
page read and write
|
||
ED18C76000
|
stack
|
page read and write
|
||
2CE1FE67000
|
trusted library allocation
|
page read and write
|
||
1D4FE000
|
stack
|
page read and write
|
||
2CE2E33A000
|
trusted library allocation
|
page read and write
|
||
1E4CE058000
|
heap
|
page read and write
|
||
C99C7FC000
|
stack
|
page read and write
|
||
258D3670000
|
heap
|
page execute and read and write
|
||
261A9F50000
|
heap
|
page read and write
|
||
2811D5E4000
|
trusted library allocation
|
page read and write
|
||
261A9EE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
1E4B5885000
|
heap
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
24E01212000
|
trusted library allocation
|
page read and write
|
||
24E013C2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page execute and read and write
|
||
261AC94F000
|
trusted library allocation
|
page read and write
|
||
261A9C10000
|
heap
|
page read and write
|
||
7FFD9B7BC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B954000
|
trusted library allocation
|
page read and write
|
||
20D0000
|
heap
|
page read and write
|
||
AE6000
|
heap
|
page read and write
|
||
2810B5F5000
|
heap
|
page read and write
|
||
1E4C59E1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB9000
|
trusted library allocation
|
page read and write
|
||
ED18D79000
|
stack
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
2810B3C0000
|
heap
|
page read and write
|
||
ED18A7F000
|
stack
|
page read and write
|
||
22E29640000
|
heap
|
page read and write
|
||
261C40C0000
|
heap
|
page read and write
|
||
13F0000
|
heap
|
page execute and read and write
|
||
258E3841000
|
trusted library allocation
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
2CE363DA000
|
heap
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
||
258D4B4A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD8000
|
trusted library allocation
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page execute and read and write
|
||
2810F101000
|
trusted library allocation
|
page read and write
|
||
D46EDFC000
|
stack
|
page read and write
|
||
1ADAD000
|
stack
|
page read and write
|
||
BCEC5FA000
|
stack
|
page read and write
|
||
13D0000
|
trusted library allocation
|
page read and write
|
||
261C3D82000
|
heap
|
page read and write
|
||
1135000
|
heap
|
page read and write
|
||
7DF473840000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
24E01952000
|
trusted library allocation
|
page read and write
|
||
1AA94E2F000
|
heap
|
page read and write
|
||
1AA94FC0000
|
heap
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
2810B47C000
|
heap
|
page read and write
|
||
1E4CDEC8000
|
heap
|
page read and write
|
||
258EBDFC000
|
heap
|
page read and write
|
||
2CE1E010000
|
trusted library allocation
|
page read and write
|
||
1E4B3E57000
|
heap
|
page read and write
|
||
24E01307000
|
trusted library allocation
|
page read and write
|
||
24E773E1000
|
heap
|
page read and write
|
||
12C63000
|
trusted library allocation
|
page read and write
|
||
BDA2038000
|
stack
|
page read and write
|
||
2CE1F7C3000
|
trusted library allocation
|
page read and write
|
||
24E75940000
|
heap
|
page read and write
|
||
24E7597E000
|
heap
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
2810CEB0000
|
trusted library allocation
|
page read and write
|
||
261C4187000
|
heap
|
page read and write
|
||
28125773000
|
heap
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
1E4B5BD9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
258D1B19000
|
heap
|
page read and write
|
||
BCEC578000
|
stack
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
2CE1F162000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
12828000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
1E4B6402000
|
trusted library allocation
|
page read and write
|
||
EBACFCE000
|
stack
|
page read and write
|
||
EBAE44E000
|
stack
|
page read and write
|
||
1478000
|
heap
|
page read and write
|
||
2CE1DDD6000
|
heap
|
page read and write
|
||
8B46A7C000
|
stack
|
page read and write
|
||
1E4B7219000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
24E0186A000
|
trusted library allocation
|
page read and write
|
||
BCEC4F7000
|
stack
|
page read and write
|
||
24E7794E000
|
heap
|
page read and write
|
||
28125783000
|
heap
|
page read and write
|
||
258D34CA000
|
heap
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
2CE1C4A4000
|
heap
|
page read and write
|
||
2810D2E1000
|
trusted library allocation
|
page read and write
|
||
258D5619000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page execute and read and write
|
||
2CE1F8CF000
|
trusted library allocation
|
page read and write
|
||
24E0182B000
|
trusted library allocation
|
page read and write
|
||
24E00D6F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
2CE1C340000
|
heap
|
page read and write
|
||
7FFD9BB5D000
|
trusted library allocation
|
page read and write
|
||
1E4B7133000
|
trusted library allocation
|
page read and write
|
||
24E10031000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
2810B560000
|
trusted library allocation
|
page read and write
|
||
258E385C000
|
trusted library allocation
|
page read and write
|
||
E7A000
|
heap
|
page read and write
|
||
1E4CDF00000
|
heap
|
page read and write
|
||
24E778F4000
|
heap
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
140018000
|
unkown
|
page readonly
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
2810D270000
|
trusted library allocation
|
page read and write
|
||
2CE1F990000
|
trusted library allocation
|
page read and write
|
||
1E4B3E18000
|
heap
|
page read and write
|
||
BDA1D79000
|
stack
|
page read and write
|
||
7FFD9BAC8000
|
trusted library allocation
|
page read and write
|
||
2CE1C47B000
|
heap
|
page read and write
|
||
258D5167000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page execute and read and write
|
||
24E77AE6000
|
heap
|
page read and write
|
||
258D441F000
|
trusted library allocation
|
page read and write
|
||
261C3E39000
|
heap
|
page read and write
|
||
261C411E000
|
heap
|
page read and write
|
||
258D1A80000
|
heap
|
page read and write
|
||
24E75988000
|
heap
|
page read and write
|
||
7FFD9BB7E000
|
trusted library allocation
|
page read and write
|
||
2810CFCA000
|
heap
|
page read and write
|
||
1AA94E35000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
7FFD9B921000
|
trusted library allocation
|
page read and write
|
||
D46F94C000
|
stack
|
page read and write
|
||
2CE2E34A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78B000
|
trusted library allocation
|
page read and write
|
||
BCEC3FE000
|
stack
|
page read and write
|
||
22E296A7000
|
heap
|
page read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
C55000
|
heap
|
page read and write
|
||
2811D5CC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B921000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
1B71E000
|
stack
|
page read and write
|
||
281259E0000
|
heap
|
page read and write
|
||
2CE36474000
|
heap
|
page read and write
|
||
2CE1EFE1000
|
trusted library allocation
|
page read and write
|
||
261A9C61000
|
heap
|
page read and write
|
||
258EBCB2000
|
heap
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78B000
|
trusted library allocation
|
page read and write
|
||
24E00233000
|
trusted library allocation
|
page read and write
|
||
10B0000
|
trusted library allocation
|
page read and write
|
||
2CE1E000000
|
heap
|
page execute and read and write
|
||
2CE1DDC0000
|
heap
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBC6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
1B6C0000
|
heap
|
page execute and read and write
|
||
261A9C5C000
|
heap
|
page read and write
|
||
EBAE5CE000
|
stack
|
page read and write
|
||
1E4B6CB5000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
ED19B4C000
|
stack
|
page read and write
|
||
14C000
|
stack
|
page read and write
|
||
1E4C5A22000
|
trusted library allocation
|
page read and write
|
||
DC2000
|
heap
|
page read and write
|
||
2CE1C3B0000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
1E4B5840000
|
heap
|
page read and write
|
||
24E00F71000
|
trusted library allocation
|
page read and write
|
||
2810E285000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
C40000
|
trusted library allocation
|
page read and write
|
||
9C4000
|
stack
|
page read and write
|
||
2811D34D000
|
trusted library allocation
|
page read and write
|
||
261C3CA7000
|
heap
|
page execute and read and write
|
||
1BF9E000
|
stack
|
page read and write
|
||
7FFD9BBCD000
|
trusted library allocation
|
page read and write
|
||
C99BDCE000
|
stack
|
page read and write
|
||
7FFD9BA5F000
|
trusted library allocation
|
page read and write
|
||
24E00FA2000
|
trusted library allocation
|
page read and write
|
||
1502000
|
heap
|
page read and write
|
||
258D1C10000
|
trusted library section
|
page read and write
|
||
EBAD37F000
|
stack
|
page read and write
|
||
24E77A8C000
|
heap
|
page read and write
|
||
1492000
|
heap
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
EBAD6F8000
|
stack
|
page read and write
|
||
1BC02000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
24E01123000
|
trusted library allocation
|
page read and write
|
||
2CE2E061000
|
trusted library allocation
|
page read and write
|
||
7FFD9B958000
|
trusted library allocation
|
page read and write
|
||
261A9C67000
|
heap
|
page read and write
|
||
7FFD9BBCD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
24E758B0000
|
heap
|
page read and write
|
||
2810D075000
|
heap
|
page read and write
|
||
8B46AFF000
|
stack
|
page read and write
|
||
1AA94E30000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
1E4B6B87000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
258D1CA5000
|
heap
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
2811D301000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page execute and read and write
|
||
1E4CE0B0000
|
heap
|
page read and write
|
||
2CE1C260000
|
heap
|
page read and write
|
||
2CE3675D000
|
heap
|
page read and write
|
||
140000000
|
unkown
|
page readonly
|
||
261C3D6E000
|
heap
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
7DF487C60000
|
trusted library allocation
|
page execute and read and write
|
||
1AA94FC4000
|
heap
|
page read and write
|
||
2812566B000
|
heap
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
258D5639000
|
trusted library allocation
|
page read and write
|
||
261C3E28000
|
heap
|
page read and write
|
||
2810B5B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC2000
|
trusted library allocation
|
page read and write
|
||
1AA94C30000
|
heap
|
page read and write
|
||
1447000
|
heap
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
1AA94E35000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
1AA94E3C000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
1A0000
|
heap
|
page read and write
|
||
24E10497000
|
trusted library allocation
|
page read and write
|
||
258EBDCE000
|
heap
|
page read and write
|
||
261AC9B2000
|
trusted library allocation
|
page read and write
|
||
1370000
|
trusted library allocation
|
page read and write
|
||
2CE1C370000
|
heap
|
page read and write
|
||
D46E879000
|
stack
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
BCEC6FE000
|
stack
|
page read and write
|
||
261C3D9F000
|
heap
|
page read and write
|
||
7FFD9B92A000
|
trusted library allocation
|
page read and write
|
||
261C4108000
|
heap
|
page read and write
|
||
7DF487C50000
|
trusted library allocation
|
page execute and read and write
|
||
24E77B0B000
|
heap
|
page read and write
|
||
2810E2E4000
|
trusted library allocation
|
page read and write
|
||
BCED3CD000
|
stack
|
page read and write
|
||
1E4CDEAF000
|
heap
|
page read and write
|
||
2CE1F349000
|
trusted library allocation
|
page read and write
|
||
1E4B72A2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B81C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
2810E254000
|
trusted library allocation
|
page read and write
|
||
7FFD9B912000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA3000
|
trusted library allocation
|
page read and write
|
||
258D3CDD000
|
trusted library allocation
|
page read and write
|
||
28125787000
|
heap
|
page read and write
|
||
781000
|
stack
|
page read and write
|
||
7FFD9B82C000
|
trusted library allocation
|
page execute and read and write
|
||
2CE1C45D000
|
heap
|
page read and write
|
||
258E3831000
|
trusted library allocation
|
page read and write
|
||
2810D00F000
|
heap
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
1E4B3E30000
|
heap
|
page read and write
|
||
2810CF89000
|
heap
|
page read and write
|
||
258D4785000
|
trusted library allocation
|
page read and write
|
||
6F71CFF000
|
stack
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
2CE1DCC0000
|
heap
|
page readonly
|
||
7FFD9B773000
|
trusted library allocation
|
page read and write
|
||
1433000
|
heap
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
14F2000
|
heap
|
page read and write
|
||
20764460000
|
heap
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
2810E060000
|
trusted library allocation
|
page read and write
|
||
7DF4E7F30000
|
trusted library allocation
|
page execute and read and write
|
||
20764560000
|
heap
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
BDA223B000
|
stack
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
C99C67B000
|
stack
|
page read and write
|
||
7FFD9B952000
|
trusted library allocation
|
page read and write
|
||
BDA2E8E000
|
stack
|
page read and write
|
||
2CE1C467000
|
heap
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
261AC82F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
2810D0F0000
|
heap
|
page read and write
|
||
2810CF00000
|
heap
|
page execute and read and write
|
||
6F71A7B000
|
stack
|
page read and write
|
||
D46E673000
|
stack
|
page read and write
|
||
2CE1F3C5000
|
trusted library allocation
|
page read and write
|
||
2810E585000
|
trusted library allocation
|
page read and write
|
||
7DF4C73C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
ED1887E000
|
stack
|
page read and write
|
||
261C4219000
|
heap
|
page read and write
|
||
22E296AC000
|
heap
|
page read and write
|
||
1E4B3E97000
|
heap
|
page read and write
|
||
D46F84C000
|
stack
|
page read and write
|
||
258D1B2D000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
EBAE34E000
|
stack
|
page read and write
|
||
EBACF83000
|
stack
|
page read and write
|
||
1AA94E18000
|
heap
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
2810B428000
|
heap
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
24E1046A000
|
trusted library allocation
|
page read and write
|
||
140001000
|
unkown
|
page execute read
|
||
258D36C7000
|
heap
|
page read and write
|
||
857000
|
unkown
|
page readonly
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
BDA21BE000
|
stack
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
258D4BD3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
140018000
|
unkown
|
page readonly
|
||
7FFD9BAA3000
|
trusted library allocation
|
page read and write
|
||
2CE1DD00000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
22E29660000
|
heap
|
page read and write
|
||
2810E4B9000
|
trusted library allocation
|
page read and write
|
||
1E4CDE37000
|
heap
|
page read and write
|
||
F00000
|
heap
|
page execute and read and write
|
||
261AC2E2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
24E75AD0000
|
heap
|
page execute and read and write
|
||
24E773B0000
|
heap
|
page execute and read and write
|
||
C99C37F000
|
stack
|
page read and write
|
||
2CE36841000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBEF000
|
trusted library allocation
|
page read and write
|
||
258D3747000
|
heap
|
page read and write
|
||
2811D54C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B921000
|
trusted library allocation
|
page read and write
|
||
2810E402000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7BC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
2810F0E1000
|
trusted library allocation
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
ED199CC000
|
stack
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
24E011D9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B952000
|
trusted library allocation
|
page read and write
|
||
261AC831000
|
trusted library allocation
|
page read and write
|
||
258D49E9000
|
trusted library allocation
|
page read and write
|
||
2810CF80000
|
heap
|
page read and write
|
||
2CE1E268000
|
trusted library allocation
|
page read and write
|
||
ED18593000
|
stack
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
1E4B69DE000
|
trusted library allocation
|
page read and write
|
||
24E102F1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
261BBB8C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD2000
|
trusted library allocation
|
page read and write
|
||
12C68000
|
trusted library allocation
|
page read and write
|
||
258EBDBD000
|
heap
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
C99C0FE000
|
stack
|
page read and write
|
||
2CE1E041000
|
trusted library allocation
|
page read and write
|
||
2810B2C0000
|
heap
|
page read and write
|
||
2810E5E6000
|
trusted library allocation
|
page read and write
|
||
261A9E90000
|
trusted library allocation
|
page read and write
|
||
2CE1C380000
|
heap
|
page read and write
|
||
1E4B6C54000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
1AA94E2D000
|
heap
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page execute and read and write
|
||
2810E6A3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC9000
|
trusted library allocation
|
page read and write
|
||
2810F106000
|
trusted library allocation
|
page read and write
|
||
24E773D0000
|
heap
|
page read and write
|
||
261A9C5F000
|
heap
|
page read and write
|
||
1BECE000
|
stack
|
page read and write
|
||
1AA94E16000
|
heap
|
page read and write
|
||
258D36E6000
|
heap
|
page read and write
|
||
7FFD9B921000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
1E4B6949000
|
trusted library allocation
|
page read and write
|
||
258D4411000
|
trusted library allocation
|
page read and write
|
||
24E75920000
|
heap
|
page readonly
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
258D3683000
|
heap
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC2000
|
trusted library allocation
|
page read and write
|
||
261AD0FB000
|
trusted library allocation
|
page read and write
|
||
1E4B681F000
|
trusted library allocation
|
page read and write
|
||
2810D016000
|
heap
|
page read and write
|
||
1E4CE004000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
2CE3688E000
|
heap
|
page read and write
|
||
261AD66F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
140022000
|
unkown
|
page readonly
|
||
261C3DC0000
|
heap
|
page execute and read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
258D374F000
|
heap
|
page read and write
|
||
24E77919000
|
heap
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B772000
|
trusted library allocation
|
page read and write
|
||
2811D2E1000
|
trusted library allocation
|
page read and write
|
||
258D1CA0000
|
heap
|
page read and write
|
||
24E778A6000
|
heap
|
page read and write
|
||
D46F8CE000
|
stack
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
ED18B7E000
|
stack
|
page read and write
|
||
261BBB9C000
|
trusted library allocation
|
page read and write
|
||
1AA94FCA000
|
heap
|
page read and write
|
||
2CE1EA93000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
261C3F10000
|
trusted library allocation
|
page read and write
|
||
1E4B59A0000
|
heap
|
page execute and read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
2CE2E071000
|
trusted library allocation
|
page read and write
|
||
1AA94E37000
|
heap
|
page read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
261AB700000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB9000
|
trusted library allocation
|
page read and write
|
||
261AD6B9000
|
trusted library allocation
|
page read and write
|
||
1429000
|
heap
|
page read and write
|
||
2821000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
258D3680000
|
heap
|
page read and write
|
||
258EBDB2000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
EA0000
|
heap
|
page execute and read and write
|
||
C99D34E000
|
stack
|
page read and write
|
||
ED1994E000
|
stack
|
page read and write
|
||
BCEC4FE000
|
stack
|
page read and write
|
||
BDA1A73000
|
stack
|
page read and write
|
||
7FFD9BB5A000
|
trusted library allocation
|
page read and write
|
||
140000000
|
unkown
|
page readonly
|
||
7FFD9BB6A000
|
trusted library allocation
|
page read and write
|
||
261AB880000
|
heap
|
page read and write
|
||
13D3000
|
trusted library allocation
|
page read and write
|
||
20764640000
|
heap
|
page read and write
|
||
EBAE3CD000
|
stack
|
page read and write
|
||
258D1AD0000
|
heap
|
page read and write
|
||
C99D2CE000
|
stack
|
page read and write
|
||
7FFD9BB6C000
|
trusted library allocation
|
page read and write
|
||
D46FACE000
|
stack
|
page read and write
|
||
D46EB7F000
|
stack
|
page read and write
|
||
EBAD97B000
|
stack
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
1E4C5CAA000
|
trusted library allocation
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
24E77DE0000
|
heap
|
page read and write
|
||
1AA94E31000
|
heap
|
page read and write
|
||
261A9CA5000
|
heap
|
page read and write
|
||
2CE367C4000
|
heap
|
page read and write
|
||
1B7FE000
|
stack
|
page read and write
|
||
2810EC30000
|
trusted library allocation
|
page read and write
|
||
2CE367F3000
|
heap
|
page read and write
|
||
BCEC479000
|
stack
|
page read and write
|
||
7FFD9B92A000
|
trusted library allocation
|
page read and write
|
||
2812569E000
|
heap
|
page read and write
|
||
258EBEA0000
|
trusted library allocation
|
page read and write
|
||
1AA94E32000
|
heap
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
258D3898000
|
trusted library allocation
|
page read and write
|
||
24E75910000
|
trusted library allocation
|
page read and write
|
||
1E4CE14D000
|
heap
|
page read and write
|
||
D46EAF6000
|
stack
|
page read and write
|
||
261A9C6D000
|
heap
|
page read and write
|
||
E80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
1E4CE13C000
|
heap
|
page read and write
|
||
1902000
|
heap
|
page read and write
|
||
261BB891000
|
trusted library allocation
|
page read and write
|
||
FE1000
|
stack
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAC9000
|
trusted library allocation
|
page read and write
|
||
ED18AFB000
|
stack
|
page read and write
|
||
24E75A32000
|
heap
|
page read and write
|
||
7FFD9BBC7000
|
trusted library allocation
|
page read and write
|
||
261C3CB0000
|
heap
|
page read and write
|
||
281F000
|
stack
|
page read and write
|
||
2CE1F37C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
1E4B5897000
|
heap
|
page read and write
|
||
1E4B6D71000
|
trusted library allocation
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
28125620000
|
heap
|
page read and write
|
||
EBAD87E000
|
stack
|
page read and write
|
||
24E01891000
|
trusted library allocation
|
page read and write
|
||
800000
|
unkown
|
page readonly
|
||
22E296A0000
|
heap
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
2CE36730000
|
heap
|
page read and write
|
||
2CE36424000
|
heap
|
page read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
EBAD676000
|
stack
|
page read and write
|
||
28125785000
|
heap
|
page read and write
|
||
2CE3647B000
|
heap
|
page read and write
|
||
7FFD9BACA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
1B7D0000
|
heap
|
page read and write
|
||
C99D4CC000
|
stack
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
BDA2E0D000
|
stack
|
page read and write
|
||
7FFD9B902000
|
trusted library allocation
|
page read and write
|
||
24E7597C000
|
heap
|
page read and write
|
||
7FFD9B902000
|
trusted library allocation
|
page read and write
|
||
C30B7DF000
|
stack
|
page read and write
|
||
2CE1E007000
|
heap
|
page execute and read and write
|
||
D46EA79000
|
stack
|
page read and write
|
||
258D50A6000
|
trusted library allocation
|
page read and write
|
||
2CE36720000
|
heap
|
page read and write
|
||
1E4B57B0000
|
trusted library allocation
|
page read and write
|
||
261C40DD000
|
heap
|
page read and write
|
||
24E77BF1000
|
heap
|
page read and write
|
||
1E4B6A6D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B92A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC9000
|
trusted library allocation
|
page read and write
|
||
258D3677000
|
heap
|
page execute and read and write
|
||
24E75850000
|
heap
|
page read and write
|
||
C99C8FB000
|
stack
|
page read and write
|
||
1E4B3E4F000
|
heap
|
page read and write
|
||
1E4CE0AE000
|
heap
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
14B2000
|
heap
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB6C000
|
trusted library allocation
|
page read and write
|
||
24E7790F000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
258D373B000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
258D19A0000
|
heap
|
page read and write
|
||
261C41A4000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
24E77A84000
|
heap
|
page read and write
|
||
2810B4A4000
|
heap
|
page read and write
|
||
258D1B54000
|
heap
|
page read and write
|
||
281256EE000
|
heap
|
page read and write
|
||
258E3844000
|
trusted library allocation
|
page read and write
|
||
2810D130000
|
heap
|
page read and write
|
||
261AD694000
|
trusted library allocation
|
page read and write
|
||
1E4CDDE0000
|
heap
|
page read and write
|
||
7FFD9BBCD000
|
trusted library allocation
|
page read and write
|
||
1E4CDE8E000
|
heap
|
page read and write
|
||
1BDCB000
|
stack
|
page read and write
|
||
24E77A7C000
|
heap
|
page read and write
|
||
7FFD9BAD5000
|
trusted library allocation
|
page read and write
|
||
BAD000
|
heap
|
page read and write
|
||
1B1EC000
|
stack
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
2076464B000
|
heap
|
page read and write
|
||
7FFD9BA93000
|
trusted library allocation
|
page read and write
|
||
BCEC073000
|
stack
|
page read and write
|
||
258EBE05000
|
heap
|
page read and write
|
||
C30B6DC000
|
stack
|
page read and write
|
||
2CE36736000
|
heap
|
page read and write
|
||
2810EB6E000
|
trusted library allocation
|
page read and write
|
||
2CE1FE42000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
D46E6FE000
|
stack
|
page read and write
|
||
2CE2E0B3000
|
trusted library allocation
|
page read and write
|
||
24E77C29000
|
heap
|
page read and write
|
||
ED1897E000
|
stack
|
page read and write
|
||
2810EB48000
|
trusted library allocation
|
page read and write
|
||
ED19AC7000
|
stack
|
page read and write
|
||
258D4409000
|
trusted library allocation
|
page read and write
|
||
1E4B6CE9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78B000
|
trusted library allocation
|
page read and write
|
||
1E4B730D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
1E4B778D000
|
trusted library allocation
|
page read and write
|
||
DAD000
|
heap
|
page read and write
|
||
24E00A53000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBBD000
|
trusted library allocation
|
page read and write
|
||
1AA94E0B000
|
heap
|
page read and write
|
||
D46FA4D000
|
stack
|
page read and write
|
||
ED18F7C000
|
stack
|
page read and write
|
||
2CE1F21B000
|
trusted library allocation
|
page read and write
|
||
261ACC51000
|
trusted library allocation
|
page read and write
|
||
EBAD7FE000
|
stack
|
page read and write
|
||
7FFD9BAD5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BADC000
|
trusted library allocation
|
page read and write
|
||
2810B45C000
|
heap
|
page read and write
|
||
1E4C5CA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
258EBC80000
|
heap
|
page read and write
|
||
7DF4C73B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAC8000
|
trusted library allocation
|
page read and write
|
||
20D4000
|
heap
|
page read and write
|
||
1437000
|
heap
|
page read and write
|
||
7FFD9BAC5000
|
trusted library allocation
|
page read and write
|
||
22E29690000
|
heap
|
page read and write
|
||
261A9EB0000
|
heap
|
page read and write
|
||
1AA94DE8000
|
heap
|
page read and write
|
||
24E01DDE000
|
trusted library allocation
|
page read and write
|
||
7DF44ADF0000
|
trusted library allocation
|
page execute and read and write
|
||
BDA1FBB000
|
stack
|
page read and write
|
||
281256D0000
|
heap
|
page read and write
|
||
2CE3645B000
|
heap
|
page read and write
|
||
BCEC0FF000
|
stack
|
page read and write
|
||
EBAD2FF000
|
stack
|
page read and write
|
||
261BBB7E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
1E4CDDD0000
|
heap
|
page execute and read and write
|
||
1E4B5A37000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC4000
|
trusted library allocation
|
page read and write
|
||
F7E000
|
stack
|
page read and write
|
||
BDA2D87000
|
stack
|
page read and write
|
||
14001F000
|
unkown
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
1B7CD000
|
stack
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
258E3B04000
|
trusted library allocation
|
page read and write
|
||
261C3D00000
|
heap
|
page read and write
|
||
2810E373000
|
trusted library allocation
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
2810F0BC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
2810E39F000
|
trusted library allocation
|
page read and write
|
||
1E4CDDD7000
|
heap
|
page execute and read and write
|
||
2CE363A8000
|
heap
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B885000
|
trusted library allocation
|
page execute and read and write
|
||
1E4B6761000
|
trusted library allocation
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page execute and read and write
|
||
1AA94D30000
|
heap
|
page read and write
|
||
2810CFE9000
|
heap
|
page read and write
|
||
22E29695000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
2810B5F0000
|
heap
|
page read and write
|
||
7FFD9B948000
|
trusted library allocation
|
page read and write
|
||
24E75AD7000
|
heap
|
page execute and read and write
|
||
282C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B911000
|
trusted library allocation
|
page read and write
|
||
EBAD3FA000
|
stack
|
page read and write
|
||
1E4B723F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
24E77BEB000
|
heap
|
page read and write
|
||
1E4C5C9B000
|
trusted library allocation
|
page read and write
|
||
24E778FE000
|
heap
|
page read and write
|
||
24E010C0000
|
trusted library allocation
|
page read and write
|
||
261A9F20000
|
heap
|
page execute and read and write
|
||
123F000
|
stack
|
page read and write
|
||
258D3743000
|
heap
|
page read and write
|
||
258D4775000
|
trusted library allocation
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
BDA213E000
|
stack
|
page read and write
|
||
7FFD9BB9F000
|
trusted library allocation
|
page read and write
|
||
258D373F000
|
heap
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
1E4CE220000
|
trusted library allocation
|
page read and write
|
||
24E00DB4000
|
trusted library allocation
|
page read and write
|
||
1E4CE130000
|
heap
|
page read and write
|
||
2811D5CA000
|
trusted library allocation
|
page read and write
|
||
24E01094000
|
trusted library allocation
|
page read and write
|
||
EBAE4C9000
|
stack
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
24E77AD4000
|
heap
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
258D3724000
|
heap
|
page read and write
|
||
7FFD9BA93000
|
trusted library allocation
|
page read and write
|
||
1E4B57F0000
|
trusted library allocation
|
page read and write
|
||
24E77870000
|
heap
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
BCEC87B000
|
stack
|
page read and write
|
||
886000
|
unkown
|
page readonly
|
||
BDA2D0E000
|
stack
|
page read and write
|
||
2CE36884000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B772000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
258D4AB5000
|
trusted library allocation
|
page read and write
|
||
2810B570000
|
heap
|
page readonly
|
||
7FFD9B952000
|
trusted library allocation
|
page read and write
|
||
7DF47A750000
|
trusted library allocation
|
page execute and read and write
|
||
BCEC17F000
|
stack
|
page read and write
|
||
7FFD9B7BC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
BDA20BE000
|
stack
|
page read and write
|
||
7FFD9BAD8000
|
trusted library allocation
|
page read and write
|
||
258EBD5B000
|
heap
|
page read and write
|
||
261C41E2000
|
heap
|
page read and write
|
||
258D1B59000
|
heap
|
page read and write
|
||
2CE1C420000
|
heap
|
page read and write
|
||
EBAD4F7000
|
stack
|
page read and write
|
||
D86000
|
heap
|
page read and write
|
||
B4B000
|
heap
|
page read and write
|
||
1AA94E2D000
|
heap
|
page read and write
|
||
24E10001000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
E90000
|
unkown
|
page readonly
|
||
7FFD9BBC6000
|
trusted library allocation
|
page read and write
|
||
1E4B3DF0000
|
heap
|
page read and write
|
||
2CE36895000
|
heap
|
page read and write
|
||
2CE1EFDB000
|
trusted library allocation
|
page read and write
|
||
1E4B3E10000
|
heap
|
page read and write
|
||
BCEC7FE000
|
stack
|
page read and write
|
||
22E29630000
|
heap
|
page read and write
|
||
261A9E50000
|
heap
|
page read and write
|
||
ED18BF9000
|
stack
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7BC000
|
trusted library allocation
|
page execute and read and write
|
||
2CE1C410000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA3000
|
trusted library allocation
|
page read and write
|
||
2810DD31000
|
trusted library allocation
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
2B6E000
|
stack
|
page read and write
|
||
C99C073000
|
stack
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
1AA94E3C000
|
heap
|
page read and write
|
||
ED185DE000
|
stack
|
page read and write
|
||
261AD1E3000
|
trusted library allocation
|
page read and write
|
||
24E012A6000
|
trusted library allocation
|
page read and write
|
||
EBAD5F9000
|
stack
|
page read and write
|
||
7FFD9BAD8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B91A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
24E75A70000
|
trusted library allocation
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
1E4B6AD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
24E778E4000
|
heap
|
page read and write
|
||
258D477D000
|
trusted library allocation
|
page read and write
|
||
258D3605000
|
heap
|
page read and write
|
||
24E77C3E000
|
heap
|
page read and write
|
||
24E75770000
|
heap
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
1E4B6A41000
|
trusted library allocation
|
page read and write
|
||
7FFD9B816000
|
trusted library allocation
|
page read and write
|
||
24E75984000
|
heap
|
page read and write
|
||
258EBCCE000
|
heap
|
page read and write
|
||
24E1006C000
|
trusted library allocation
|
page read and write
|
||
EBAD27F000
|
stack
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
1AA94E2D000
|
heap
|
page read and write
|
||
207645D0000
|
heap
|
page read and write
|
||
BDA1BFE000
|
stack
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
258D4B16000
|
trusted library allocation
|
page read and write
|
||
1E4B5770000
|
heap
|
page readonly
|
||
2810DFEC000
|
trusted library allocation
|
page read and write
|
||
24E01E04000
|
trusted library allocation
|
page read and write
|
||
EBAD779000
|
stack
|
page read and write
|
||
7FFD9B9C1000
|
trusted library allocation
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
24E773D5000
|
heap
|
page read and write
|
||
258D4932000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
D46E977000
|
stack
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
2C50000
|
heap
|
page execute and read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
2CE1FE62000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB96000
|
trusted library allocation
|
page read and write
|
||
BCEC27A000
|
stack
|
page read and write
|
||
D46F9CD000
|
stack
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
12C61000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B948000
|
trusted library allocation
|
page read and write
|
||
258D3800000
|
heap
|
page read and write
|
||
1E4B5880000
|
heap
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
1AA94E16000
|
heap
|
page read and write
|
||
2811D311000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
1445000
|
heap
|
page read and write
|
||
24E7599C000
|
heap
|
page read and write
|
||
8B46B7F000
|
stack
|
page read and write
|
||
7FFD9B944000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
7FFD9B958000
|
trusted library allocation
|
page read and write
|
||
BA2000
|
heap
|
page read and write
|
||
1E4B7301000
|
trusted library allocation
|
page read and write
|
||
24E75982000
|
heap
|
page read and write
|
||
1E4CE10E000
|
heap
|
page read and write
|
||
7FFD9B7BC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
1E4B3E51000
|
heap
|
page read and write
|
||
1E4CE091000
|
heap
|
page read and write
|
||
2CE363BD000
|
heap
|
page read and write
|
||
24E102E9000
|
trusted library allocation
|
page read and write
|
||
24E0022A000
|
trusted library allocation
|
page read and write
|
||
ED18E7F000
|
stack
|
page read and write
|
||
7FFD9B942000
|
trusted library allocation
|
page read and write
|
||
ED19BCD000
|
stack
|
page read and write
|
||
24E10021000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
1E4CE022000
|
heap
|
page read and write
|
||
258D4781000
|
trusted library allocation
|
page read and write
|
||
1AA94E3E000
|
heap
|
page read and write
|
||
258D1B0D000
|
heap
|
page read and write
|
||
2810D110000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
2CE1E50D000
|
trusted library allocation
|
page read and write
|
||
2810D691000
|
trusted library allocation
|
page read and write
|
||
7DF4E7F40000
|
trusted library allocation
|
page execute and read and write
|
||
D46EC78000
|
stack
|
page read and write
|
||
24E77B69000
|
heap
|
page read and write
|
||
1D202000
|
heap
|
page read and write
|
||
2CE1DDC5000
|
heap
|
page read and write
|
||
7FFD9BB6C000
|
trusted library allocation
|
page read and write
|
||
24E759C5000
|
heap
|
page read and write
|
||
7FFD9B954000
|
trusted library allocation
|
page read and write
|
||
24E759C8000
|
heap
|
page read and write
|
||
1E4B3E9A000
|
heap
|
page read and write
|
||
7FFD9BBC2000
|
trusted library allocation
|
page read and write
|
||
2CE1DCD0000
|
trusted library allocation
|
page read and write
|
||
2810CF20000
|
heap
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
2CE1C3D0000
|
trusted library section
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
261AC9ED000
|
trusted library allocation
|
page read and write
|
||
C99D3C7000
|
stack
|
page read and write
|
||
24E102E5000
|
trusted library allocation
|
page read and write
|
||
261C40B0000
|
heap
|
page read and write
|
||
2CE1DEE0000
|
heap
|
page read and write
|
||
7FFD9BA31000
|
trusted library allocation
|
page read and write
|
||
261A9E10000
|
heap
|
page read and write
|
||
1D213000
|
heap
|
page read and write
|
||
2CE1C3E0000
|
trusted library section
|
page read and write
|
||
C99C577000
|
stack
|
page read and write
|
||
261A9C7D000
|
heap
|
page read and write
|
||
258D496D000
|
trusted library allocation
|
page read and write
|
||
261ACB96000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
261A9C6B000
|
heap
|
page read and write
|
||
24E77A88000
|
heap
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
DB7000
|
heap
|
page read and write
|
||
258EBB50000
|
heap
|
page execute and read and write
|
||
7FFD9BAD2000
|
trusted library allocation
|
page read and write
|
||
ED19C4E000
|
stack
|
page read and write
|
||
B4D000
|
heap
|
page read and write
|
||
6F71C7E000
|
stack
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
261C41BC000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
C99C6FE000
|
stack
|
page read and write
|
||
24E77C1D000
|
heap
|
page read and write
|
||
258D1AA0000
|
heap
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA62000
|
trusted library allocation
|
page read and write
|
||
2CE2E32C000
|
trusted library allocation
|
page read and write
|
||
2CE2E330000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
7FFD9BADC000
|
trusted library allocation
|
page read and write
|
||
2810EA62000
|
trusted library allocation
|
page read and write
|
||
B1F000
|
heap
|
page read and write
|
||
2810CFA0000
|
heap
|
page read and write
|
||
2CE1F070000
|
trusted library allocation
|
page read and write
|
||
258E3B1C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BACC000
|
trusted library allocation
|
page read and write
|
||
1D0FE000
|
stack
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B912000
|
trusted library allocation
|
page read and write
|
||
2CE36822000
|
heap
|
page read and write
|
||
258D1BE0000
|
heap
|
page read and write
|
||
2280000
|
heap
|
page read and write
|
||
2CE1E0C1000
|
trusted library allocation
|
page read and write
|
||
2CE3640D000
|
heap
|
page read and write
|
||
1AA94E3C000
|
heap
|
page read and write
|
||
140022000
|
unkown
|
page readonly
|
||
261A9F55000
|
heap
|
page read and write
|
||
24E00BFD000
|
trusted library allocation
|
page read and write
|
||
2810D7AD000
|
trusted library allocation
|
page read and write
|
||
ED189FA000
|
stack
|
page read and write
|
||
20D6000
|
heap
|
page read and write
|
||
2CE1C45A000
|
heap
|
page read and write
|
||
D8C000
|
heap
|
page read and write
|
||
7FFD9B895000
|
trusted library allocation
|
page execute and read and write
|
||
2810B3A0000
|
heap
|
page read and write
|
||
7FFD9B958000
|
trusted library allocation
|
page read and write
|
||
261BBB84000
|
trusted library allocation
|
page read and write
|
||
7FFD9BADA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE8000
|
trusted library allocation
|
page read and write
|
||
2810B43E000
|
heap
|
page read and write
|
||
258D371C000
|
heap
|
page read and write
|
||
7FFD9BADC000
|
trusted library allocation
|
page read and write
|
||
24E77904000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
258D55F4000
|
trusted library allocation
|
page read and write
|
||
261C3D20000
|
heap
|
page read and write
|
||
1AA94E0B000
|
heap
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
24E77B44000
|
heap
|
page read and write
|
||
7FFD9BADC000
|
trusted library allocation
|
page read and write
|
||
BDA1AFE000
|
stack
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB6000
|
trusted library allocation
|
page read and write
|
||
B9E000
|
heap
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
24E00FA0000
|
trusted library allocation
|
page read and write
|
||
261A9EC0000
|
trusted library allocation
|
page read and write
|
||
2CE1C375000
|
heap
|
page read and write
|
||
261C3D2E000
|
heap
|
page read and write
|
||
BDA1EBE000
|
stack
|
page read and write
|
||
258EBE1D000
|
heap
|
page read and write
|
||
261A9CA8000
|
heap
|
page read and write
|
||
1E4CDE5D000
|
heap
|
page read and write
|
||
24E77894000
|
heap
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
261C3E10000
|
heap
|
page read and write
|
||
258EBBA0000
|
heap
|
page read and write
|
||
2810B4A9000
|
heap
|
page read and write
|
||
7FFD9B816000
|
trusted library allocation
|
page read and write
|
||
1443000
|
heap
|
page read and write
|
||
7FFD9BBBD000
|
trusted library allocation
|
page read and write
|
||
258D563E000
|
trusted library allocation
|
page read and write
|
||
24E01005000
|
trusted library allocation
|
page read and write
|
||
261AC923000
|
trusted library allocation
|
page read and write
|
||
AEC000
|
heap
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
258D440F000
|
trusted library allocation
|
page read and write
|
||
258D1C70000
|
heap
|
page execute and read and write
|
||
2CE1EE27000
|
trusted library allocation
|
page read and write
|
||
2CE1FE1D000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
1E4B694F000
|
trusted library allocation
|
page read and write
|
||
258D1C00000
|
trusted library section
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
261AC673000
|
trusted library allocation
|
page read and write
|
||
24E75948000
|
heap
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
2810CF96000
|
heap
|
page read and write
|
||
261A9ED0000
|
heap
|
page readonly
|
||
140001000
|
unkown
|
page execute read
|
||
258E3B02000
|
trusted library allocation
|
page read and write
|
||
ED188FE000
|
stack
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
2811D5D4000
|
trusted library allocation
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
2CE36380000
|
heap
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
1E4CDFF0000
|
heap
|
page read and write
|
||
2CE1E030000
|
heap
|
page execute and read and write
|
||
1B4FE000
|
stack
|
page read and write
|
||
258D1AD8000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
1AA94E3C000
|
heap
|
page read and write
|
||
2810CDA6000
|
heap
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
1E4B3EF1000
|
heap
|
page read and write
|
||
7DF473830000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
261AB730000
|
trusted library allocation
|
page read and write
|
||
24E10303000
|
trusted library allocation
|
page read and write
|
||
2810CF06000
|
heap
|
page execute and read and write
|
||
2810D210000
|
heap
|
page execute and read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
24E77A74000
|
heap
|
page read and write
|
There are 1437 hidden memdumps, click here to show them.