Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
ptKNiAaGus.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\Videos\xdwdMicrosoft PowerPoint Host.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Videos\xdwdPutty.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\xdwdPutty.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\xdwdMicrosoft Paint.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\xdwdPutty.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\z4wwumki.3zg.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bualqehm.tg1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kvdx4sk4.juy.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ofa54sbh.fmc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yyfizagb.qiw.psm1
|
ASCII text, with no line terminators
|
dropped
|
There are 2 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\ptKNiAaGus.exe
|
"C:\Users\user\Desktop\ptKNiAaGus.exe"
|
||
C:\Windows\System32\cmd.exe
|
"CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Avast Antivirus" /tr "C:\Users\user\xdwdPutty.exe" & exit
|
||
C:\Windows\System32\schtasks.exe
|
SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Avast Antivirus" /tr "C:\Users\user\xdwdPutty.exe"
|
||
C:\Windows\System32\cmd.exe
|
"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST & exit
|
||
C:\Windows\System32\schtasks.exe
|
SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST
|
||
C:\Windows\System32\cmd.exe
|
"CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Google Drive" /tr "C:\Users\user\AppData\Roaming\xdwdMicrosoft Paint.exe"
/RL HIGHEST & exit
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c start /b powershell ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\pto2q1ow.nf5.exe"'
& exit
|
||
C:\Windows\System32\schtasks.exe
|
SchTaSKs /create /f /sc minute /mo 5 /tn "Google Drive" /tr "C:\Users\user\AppData\Roaming\xdwdMicrosoft Paint.exe" /RL HIGHEST
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\pto2q1ow.nf5.exe"'
|
||
C:\Users\user\AppData\Roaming\xdwdMicrosoft Paint.exe
|
"C:\Users\user\AppData\Roaming\xdwdMicrosoft Paint.exe"
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\pto2q1ow.nf5.exe
|
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\pto2q1ow.nf5.exe"
|
||
C:\Windows\System32\cmd.exe
|
"CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "OpenOffice" /tr "C:\Users\user\Videos\xdwdMicrosoft PowerPoint Host.exe"
& exit
|
||
C:\Windows\System32\schtasks.exe
|
SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "OpenOffice" /tr "C:\Users\user\Videos\xdwdMicrosoft PowerPoint Host.exe"
|
||
C:\Windows\System32\cmd.exe
|
"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST & exit
|
||
C:\Windows\System32\schtasks.exe
|
SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST
|
||
C:\Windows\System32\cmd.exe
|
"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST & exit
|
||
C:\Windows\System32\schtasks.exe
|
SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c start /b powershell ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\z4wwumki.3zg.exe"'
& exit
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\z4wwumki.3zg.exe"'
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\z4wwumki.3zg.exe
|
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\z4wwumki.3zg.exe"
|
||
C:\Windows\System32\cmd.exe
|
"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST & exit
|
||
C:\Users\user\xdwdPutty.exe
|
"C:\Users\user\xdwdPutty.exe"
|
||
C:\Windows\System32\schtasks.exe
|
SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST
|
||
C:\Windows\System32\cmd.exe
|
"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Azure DevOps" /tr "C:\Users\user\Videos\xdwdMicrosoft PowerPoint
Host.exe" /RL HIGHEST & exit
|
||
C:\Windows\System32\schtasks.exe
|
SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Azure DevOps" /tr "C:\Users\user\Videos\xdwdMicrosoft PowerPoint Host.exe"
/RL HIGHEST
|
||
C:\Windows\System32\cmd.exe
|
"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST & exit
|
||
C:\Windows\System32\schtasks.exe
|
SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST
|
||
C:\Windows\System32\cmd.exe
|
"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST & exit
|
||
C:\Windows\System32\schtasks.exe
|
SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST
|
||
C:\Windows\System32\cmd.exe
|
"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST & exit
|
||
C:\Windows\System32\schtasks.exe
|
SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST
|
||
C:\Users\user\AppData\Roaming\xdwdMicrosoft Paint.exe
|
"C:\Users\user\AppData\Roaming\xdwdMicrosoft Paint.exe"
|
||
C:\Windows\System32\cmd.exe
|
"CMD" /c scHTaSks /Run /I /TN "Avast Antivirus"
|
||
C:\Windows\System32\schtasks.exe
|
scHTaSks /Run /I /TN "Avast Antivirus"
|
||
C:\Windows\System32\cmd.exe
|
"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST & exit
|
||
C:\Users\user\xdwdPutty.exe
|
C:\Users\user\xdwdPutty.exe
|
||
C:\Windows\System32\schtasks.exe
|
SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST
|
||
C:\Windows\System32\cmd.exe
|
"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST & exit
|
||
C:\Windows\System32\schtasks.exe
|
SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST
|
||
C:\Windows\System32\cmd.exe
|
"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST & exit
|
||
C:\Windows\System32\schtasks.exe
|
SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST
|
||
C:\Users\user\AppData\Roaming\xdwdMicrosoft Paint.exe
|
"C:\Users\user\AppData\Roaming\xdwdMicrosoft Paint.exe"
|
||
C:\Windows\System32\cmd.exe
|
"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST & exit
|
||
C:\Windows\System32\schtasks.exe
|
SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST
|
||
C:\Windows\System32\cmd.exe
|
"CMD" /c scHTaSks /Run /I /TN "Avast Antivirus"
|
||
C:\Windows\System32\schtasks.exe
|
scHTaSks /Run /I /TN "Avast Antivirus"
|
||
C:\Users\user\xdwdPutty.exe
|
C:\Users\user\xdwdPutty.exe
|
||
C:\Windows\System32\cmd.exe
|
"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST & exit
|
||
C:\Windows\System32\schtasks.exe
|
SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST
|
||
C:\Windows\System32\cmd.exe
|
"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Azure DevOps" /tr "C:\Users\user\Videos\xdwdMicrosoft PowerPoint
Host.exe" /RL HIGHEST & exit
|
||
C:\Windows\System32\cmd.exe
|
"CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Corel PaintShop Pro" /tr "C:\Users\user\Videos\xdwdPutty.exe" /RL HIGHEST
& exit
|
||
C:\Windows\System32\cmd.exe
|
"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST & exit
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 78 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://pastebin.c
|
unknown
|
||
https://pastebin.com/raw/Lmb
|
unknown
|
||
https://pastebin.com/raw/Lm
|
unknown
|
||
https://pastebin.com/raw/LmbvnzZ
|
unknown
|
||
https://pastebin.com/raw/Lmbvn
|
unknown
|
||
https://pastebin.com/raw
|
unknown
|
||
https://pastebin.com/raw/Lmbvnz
|
unknown
|
||
https://pastebin.com/raw/LmbvnzZM
|
104.20.3.235
|
||
https://pastebin.com/raw/Lmbv
|
unknown
|
||
http://www.quovadis.bm0
|
unknown
|
||
https://ocsp.quovadi
|
unknown
|
||
https://pastebin.com/raw/
|
unknown
|
||
http://icanhazip.com/
|
104.16.185.241
|
||
https://pastebin.com/r
|
unknown
|
||
https://ocsp.quovadisoffshore.com0
|
unknown
|
||
https://pastebin.com/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://pastebin.com/raw/L
|
unknown
|
||
https://pastebin.com
|
unknown
|
||
https://pastebin.com/ra
|
unknown
|
||
https://pastebin.co
|
unknown
|
||
https://aka.ms/odirm=C:
|
unknown
|
There are 12 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
q-policies.gl.at.ply.gg
|
147.185.221.18
|
||
pastebin.com
|
104.20.3.235
|
||
icanhazip.com
|
104.16.185.241
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.20.3.235
|
pastebin.com
|
United States
|
||
147.185.221.18
|
q-policies.gl.at.ply.gg
|
United States
|
||
104.16.185.241
|
icanhazip.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE
|
hwid
|
||
HKEY_CURRENT_USER\SOFTWARE
|
D396F3C20883A3B71244C87C537595108010239E4E17E6C09BCA83EA5A475677
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
|
RequireSignedAppInit_DLLs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
xdwdsystegregre
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
|
AppInit_DLLs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
|
LoadAppInit_DLLs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
unknown
|
Userinit
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Microsoft Visual Studio
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Userinit
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ptKNiAaGus_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ptKNiAaGus_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ptKNiAaGus_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ptKNiAaGus_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ptKNiAaGus_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ptKNiAaGus_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ptKNiAaGus_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ptKNiAaGus_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ptKNiAaGus_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ptKNiAaGus_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ptKNiAaGus_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ptKNiAaGus_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ptKNiAaGus_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ptKNiAaGus_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pto2q1ow_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pto2q1ow_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pto2q1ow_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pto2q1ow_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pto2q1ow_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pto2q1ow_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pto2q1ow_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pto2q1ow_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pto2q1ow_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pto2q1ow_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pto2q1ow_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pto2q1ow_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pto2q1ow_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pto2q1ow_RASMANCS
|
FileDirectory
|
There are 83 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1B989000
|
heap
|
page read and write
|
||
1C74B000
|
stack
|
page read and write
|
||
30D7000
|
trusted library allocation
|
page read and write
|
||
1B300000
|
heap
|
page read and write
|
||
2E12000
|
trusted library allocation
|
page read and write
|
||
1C34A000
|
stack
|
page read and write
|
||
1B828000
|
heap
|
page read and write
|
||
30D4000
|
trusted library allocation
|
page read and write
|
||
279B000
|
trusted library allocation
|
page read and write
|
||
1D854000
|
heap
|
page read and write
|
||
F37000
|
heap
|
page read and write
|
||
303E000
|
trusted library allocation
|
page read and write
|
||
2DE6000
|
trusted library allocation
|
page read and write
|
||
E3679FE000
|
unkown
|
page read and write
|
||
2572000
|
trusted library allocation
|
page read and write
|
||
2561000
|
trusted library allocation
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
25B23230000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
1B9AE000
|
heap
|
page read and write
|
||
2E3B000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
1B30B000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
839000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
2E23000
|
trusted library allocation
|
page read and write
|
||
BDC71C000
|
stack
|
page read and write
|
||
2E16000
|
trusted library allocation
|
page read and write
|
||
7FFF60E4D000
|
trusted library allocation
|
page execute and read and write
|
||
2FF6000
|
trusted library allocation
|
page read and write
|
||
26CF000
|
trusted library allocation
|
page read and write
|
||
2182E8A0000
|
heap
|
page read and write
|
||
293D1700000
|
heap
|
page read and write
|
||
1CEE72C0000
|
heap
|
page read and write
|
||
7FFF610AD000
|
trusted library allocation
|
page read and write
|
||
37ED000
|
trusted library allocation
|
page read and write
|
||
A6B9DFE000
|
unkown
|
page read and write
|
||
12538000
|
trusted library allocation
|
page read and write
|
||
3661AFE000
|
unkown
|
page read and write
|
||
1C58F000
|
stack
|
page read and write
|
||
25B22FF0000
|
heap
|
page read and write
|
||
7FFF60E4D000
|
trusted library allocation
|
page execute and read and write
|
||
2D20000
|
heap
|
page execute and read and write
|
||
270E000
|
trusted library allocation
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
7FFF610A0000
|
trusted library allocation
|
page read and write
|
||
7FFF61060000
|
trusted library allocation
|
page read and write
|
||
3362000
|
trusted library allocation
|
page read and write
|
||
3123000
|
trusted library allocation
|
page read and write
|
||
141D000
|
heap
|
page read and write
|
||
2731000
|
trusted library allocation
|
page read and write
|
||
21FE95D0000
|
heap
|
page read and write
|
||
1E5D0000
|
heap
|
page read and write
|
||
2BA156A0000
|
heap
|
page read and write
|
||
1F4D2869000
|
heap
|
page read and write
|
||
284B000
|
trusted library allocation
|
page read and write
|
||
18FE000
|
stack
|
page read and write
|
||
7FFF60E30000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
1C8809C8000
|
heap
|
page read and write
|
||
906AFF000
|
unkown
|
page read and write
|
||
601000
|
heap
|
page read and write
|
||
3043000
|
trusted library allocation
|
page read and write
|
||
271E000
|
trusted library allocation
|
page read and write
|
||
1E3FD000
|
heap
|
page read and write
|
||
906CFF000
|
stack
|
page read and write
|
||
17B4CCBB000
|
heap
|
page read and write
|
||
2495EC20000
|
heap
|
page read and write
|
||
332D000
|
trusted library allocation
|
page read and write
|
||
DEE000
|
stack
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
6CD3BFE000
|
stack
|
page read and write
|
||
28A4000
|
trusted library allocation
|
page read and write
|
||
11C5000
|
heap
|
page read and write
|
||
2ED6000
|
trusted library allocation
|
page read and write
|
||
2BA156AB000
|
heap
|
page read and write
|
||
21FE9820000
|
heap
|
page read and write
|
||
21FE9940000
|
heap
|
page read and write
|
||
2DF4000
|
trusted library allocation
|
page read and write
|
||
337E000
|
trusted library allocation
|
page read and write
|
||
379C000
|
trusted library allocation
|
page read and write
|
||
3145000
|
trusted library allocation
|
page read and write
|
||
289E000
|
trusted library allocation
|
page read and write
|
||
2630000
|
trusted library allocation
|
page read and write
|
||
13158000
|
trusted library allocation
|
page read and write
|
||
2ED4000
|
trusted library allocation
|
page read and write
|
||
2BA15A49000
|
heap
|
page read and write
|
||
5079CFF000
|
stack
|
page read and write
|
||
28C7000
|
trusted library allocation
|
page read and write
|
||
3577000
|
trusted library allocation
|
page read and write
|
||
1B782000
|
heap
|
page read and write
|
||
2495EF00000
|
heap
|
page read and write
|
||
290D000
|
trusted library allocation
|
page read and write
|
||
1B76E000
|
stack
|
page read and write
|
||
269B000
|
trusted library allocation
|
page read and write
|
||
7FFF60EF0000
|
trusted library allocation
|
page execute and read and write
|
||
382D000
|
trusted library allocation
|
page read and write
|
||
3433000
|
trusted library allocation
|
page read and write
|
||
7FFF60FF0000
|
trusted library allocation
|
page execute and read and write
|
||
305D000
|
trusted library allocation
|
page read and write
|
||
3190000
|
trusted library allocation
|
page read and write
|
||
A33000
|
heap
|
page read and write
|
||
2892000
|
trusted library allocation
|
page read and write
|
||
316C000
|
trusted library allocation
|
page read and write
|
||
2EC1000
|
trusted library allocation
|
page read and write
|
||
137D2CA9000
|
heap
|
page read and write
|
||
18849EB0000
|
heap
|
page read and write
|
||
7FFF60FD0000
|
trusted library allocation
|
page read and write
|
||
1B982000
|
heap
|
page read and write
|
||
318D000
|
trusted library allocation
|
page read and write
|
||
3230000
|
heap
|
page execute and read and write
|
||
7FFF60EE6000
|
trusted library allocation
|
page read and write
|
||
1C459B79000
|
heap
|
page read and write
|
||
1B40E000
|
heap
|
page read and write
|
||
2F9C000
|
trusted library allocation
|
page read and write
|
||
12F84000
|
trusted library allocation
|
page read and write
|
||
31F9000
|
trusted library allocation
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
29CA000
|
trusted library allocation
|
page read and write
|
||
1306B000
|
trusted library allocation
|
page read and write
|
||
2898000
|
trusted library allocation
|
page read and write
|
||
3165000
|
trusted library allocation
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
7FFF60E24000
|
trusted library allocation
|
page read and write
|
||
27DF000
|
trusted library allocation
|
page read and write
|
||
31DB000
|
trusted library allocation
|
page read and write
|
||
7FFF60E60000
|
trusted library allocation
|
page read and write
|
||
3515000
|
trusted library allocation
|
page read and write
|
||
385A000
|
trusted library allocation
|
page read and write
|
||
1160000
|
trusted library allocation
|
page read and write
|
||
28B1000
|
trusted library allocation
|
page read and write
|
||
31B0000
|
trusted library allocation
|
page read and write
|
||
1B86E000
|
stack
|
page read and write
|
||
1B836000
|
heap
|
page read and write
|
||
3491000
|
trusted library allocation
|
page read and write
|
||
2601000
|
trusted library allocation
|
page read and write
|
||
31C9000
|
trusted library allocation
|
page read and write
|
||
3795000
|
trusted library allocation
|
page read and write
|
||
304A000
|
trusted library allocation
|
page read and write
|
||
349A000
|
trusted library allocation
|
page read and write
|
||
260A000
|
trusted library allocation
|
page read and write
|
||
29DD000
|
trusted library allocation
|
page read and write
|
||
B54000
|
stack
|
page read and write
|
||
3035000
|
trusted library allocation
|
page read and write
|
||
609000
|
heap
|
page read and write
|
||
17B4CF59000
|
heap
|
page read and write
|
||
1B994000
|
heap
|
page read and write
|
||
32C1000
|
trusted library allocation
|
page read and write
|
||
7FFF60EE0000
|
trusted library allocation
|
page read and write
|
||
1915000
|
heap
|
page read and write
|
||
13CE000
|
stack
|
page read and write
|
||
318C000
|
trusted library allocation
|
page read and write
|
||
2977000
|
trusted library allocation
|
page read and write
|
||
1C880BE9000
|
heap
|
page read and write
|
||
289C000
|
trusted library allocation
|
page read and write
|
||
2EAE000
|
trusted library allocation
|
page read and write
|
||
21FE9939000
|
heap
|
page read and write
|
||
7FFF60FE0000
|
trusted library allocation
|
page read and write
|
||
2DE3000
|
trusted library allocation
|
page read and write
|
||
1D658000
|
heap
|
page read and write
|
||
1C880900000
|
heap
|
page read and write
|
||
357B000
|
trusted library allocation
|
page read and write
|
||
21ECAFC000
|
stack
|
page read and write
|
||
2E6D000
|
stack
|
page read and write
|
||
3478000
|
trusted library allocation
|
page read and write
|
||
287C000
|
trusted library allocation
|
page read and write
|
||
2647000
|
trusted library allocation
|
page read and write
|
||
30A3000
|
trusted library allocation
|
page read and write
|
||
27BF000
|
trusted library allocation
|
page read and write
|
||
2A10000
|
trusted library allocation
|
page read and write
|
||
7FFF60FC0000
|
trusted library allocation
|
page read and write
|
||
1BAA8000
|
stack
|
page read and write
|
||
283E000
|
trusted library allocation
|
page read and write
|
||
1BDAE000
|
stack
|
page read and write
|
||
1CEE7250000
|
heap
|
page read and write
|
||
3535000
|
trusted library allocation
|
page read and write
|
||
2765000
|
trusted library allocation
|
page read and write
|
||
1BD5A000
|
heap
|
page read and write
|
||
1BD4E000
|
stack
|
page read and write
|
||
FAC06FC000
|
stack
|
page read and write
|
||
2E7F000
|
trusted library allocation
|
page read and write
|
||
2A14000
|
trusted library allocation
|
page read and write
|
||
61D000
|
heap
|
page read and write
|
||
3050000
|
trusted library allocation
|
page read and write
|
||
1C84B000
|
stack
|
page read and write
|
||
306E000
|
trusted library allocation
|
page read and write
|
||
3378000
|
trusted library allocation
|
page read and write
|
||
25B23130000
|
heap
|
page read and write
|
||
137D2B57000
|
heap
|
page read and write
|
||
3804000
|
trusted library allocation
|
page read and write
|
||
60F000
|
heap
|
page read and write
|
||
270A000
|
trusted library allocation
|
page read and write
|
||
7FFF61000000
|
trusted library allocation
|
page execute and read and write
|
||
332B000
|
trusted library allocation
|
page read and write
|
||
1D44CDF0000
|
heap
|
page read and write
|
||
297E000
|
trusted library allocation
|
page read and write
|
||
26DD000
|
trusted library allocation
|
page read and write
|
||
2DEE000
|
trusted library allocation
|
page read and write
|
||
296E000
|
trusted library allocation
|
page read and write
|
||
7FFF60E40000
|
trusted library allocation
|
page read and write
|
||
30F4000
|
trusted library allocation
|
page read and write
|
||
1BE13000
|
heap
|
page read and write
|
||
7FFF60FA9000
|
trusted library allocation
|
page read and write
|
||
3519000
|
trusted library allocation
|
page read and write
|
||
3537000
|
trusted library allocation
|
page read and write
|
||
1BD9D000
|
heap
|
page read and write
|
||
25FF000
|
trusted library allocation
|
page read and write
|
||
3295000
|
trusted library allocation
|
page read and write
|
||
3349000
|
trusted library allocation
|
page read and write
|
||
35D1000
|
trusted library allocation
|
page read and write
|
||
262134A0000
|
heap
|
page read and write
|
||
C4F000
|
heap
|
page read and write
|
||
7FFF60FE0000
|
trusted library allocation
|
page read and write
|
||
29D3000
|
trusted library allocation
|
page read and write
|
||
7FFF60E43000
|
trusted library allocation
|
page execute and read and write
|
||
1B78C000
|
heap
|
page read and write
|
||
3457000
|
trusted library allocation
|
page read and write
|
||
2025BA80000
|
heap
|
page read and write
|
||
28F3000
|
trusted library allocation
|
page read and write
|
||
885000
|
heap
|
page read and write
|
||
2751000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
1C459B75000
|
heap
|
page read and write
|
||
31E6000
|
trusted library allocation
|
page read and write
|
||
2F16000
|
trusted library allocation
|
page read and write
|
||
7FFF60E23000
|
trusted library allocation
|
page read and write
|
||
2CA1000
|
trusted library allocation
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
1BFDA000
|
heap
|
page read and write
|
||
F0B000
|
heap
|
page read and write
|
||
1C24F000
|
stack
|
page read and write
|
||
2847000
|
trusted library allocation
|
page read and write
|
||
1A3609F6000
|
heap
|
page read and write
|
||
24369E70000
|
heap
|
page read and write
|
||
3190000
|
trusted library allocation
|
page read and write
|
||
D38000
|
heap
|
page read and write
|
||
1B13A000
|
heap
|
page read and write
|
||
7FFF60F00000
|
trusted library allocation
|
page execute and read and write
|
||
1C887FF000
|
stack
|
page read and write
|
||
279B000
|
trusted library allocation
|
page read and write
|
||
28BE000
|
trusted library allocation
|
page read and write
|
||
346E000
|
trusted library allocation
|
page read and write
|
||
5079BFE000
|
stack
|
page read and write
|
||
28BD000
|
trusted library allocation
|
page read and write
|
||
281E000
|
trusted library allocation
|
page read and write
|
||
3168000
|
trusted library allocation
|
page read and write
|
||
2560000
|
heap
|
page read and write
|
||
2945000
|
trusted library allocation
|
page read and write
|
||
37C1000
|
trusted library allocation
|
page read and write
|
||
984000
|
stack
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
274F000
|
trusted library allocation
|
page read and write
|
||
344F000
|
trusted library allocation
|
page read and write
|
||
1B413000
|
heap
|
page read and write
|
||
13B6000
|
heap
|
page read and write
|
||
3504000
|
trusted library allocation
|
page read and write
|
||
2923000
|
trusted library allocation
|
page read and write
|
||
318B000
|
trusted library allocation
|
page read and write
|
||
335A000
|
trusted library allocation
|
page read and write
|
||
1B11D000
|
heap
|
page read and write
|
||
1B1AE000
|
stack
|
page read and write
|
||
38C4000
|
trusted library allocation
|
page read and write
|
||
7FFF60E20000
|
trusted library allocation
|
page read and write
|
||
12DC3000
|
trusted library allocation
|
page read and write
|
||
3411000
|
trusted library allocation
|
page read and write
|
||
895000
|
heap
|
page read and write
|
||
32A1000
|
trusted library allocation
|
page read and write
|
||
7FFF60ECC000
|
trusted library allocation
|
page execute and read and write
|
||
379F000
|
trusted library allocation
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
1C6DD000
|
stack
|
page read and write
|
||
1CE4A000
|
stack
|
page read and write
|
||
975000
|
heap
|
page read and write
|
||
38DD000
|
trusted library allocation
|
page read and write
|
||
34A3000
|
trusted library allocation
|
page read and write
|
||
14CE000
|
stack
|
page read and write
|
||
322C000
|
trusted library allocation
|
page read and write
|
||
114E000
|
stack
|
page read and write
|
||
2643000
|
trusted library allocation
|
page read and write
|
||
36E63FE000
|
unkown
|
page read and write
|
||
7D2000
|
unkown
|
page readonly
|
||
7FFF60E33000
|
trusted library allocation
|
page execute and read and write
|
||
2DDF000
|
trusted library allocation
|
page read and write
|
||
3493000
|
trusted library allocation
|
page read and write
|
||
127E8000
|
trusted library allocation
|
page read and write
|
||
12D22000
|
trusted library allocation
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
1B107000
|
heap
|
page read and write
|
||
1B3D0000
|
heap
|
page read and write
|
||
27E1000
|
trusted library allocation
|
page read and write
|
||
21FE9930000
|
heap
|
page read and write
|
||
316E000
|
trusted library allocation
|
page read and write
|
||
1180000
|
trusted library allocation
|
page read and write
|
||
2F12000
|
trusted library allocation
|
page read and write
|
||
351E000
|
trusted library allocation
|
page read and write
|
||
347C000
|
trusted library allocation
|
page read and write
|
||
33FA000
|
trusted library allocation
|
page read and write
|
||
1B77A000
|
heap
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
7FFF60FC0000
|
trusted library allocation
|
page read and write
|
||
1C459B70000
|
heap
|
page read and write
|
||
28B5000
|
trusted library allocation
|
page read and write
|
||
24369CF0000
|
heap
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1DF49C50000
|
heap
|
page read and write
|
||
1BAC0000
|
trusted library allocation
|
page read and write
|
||
29D0000
|
trusted library allocation
|
page read and write
|
||
1D6D8000
|
heap
|
page read and write
|
||
2909000
|
trusted library allocation
|
page read and write
|
||
323E000
|
trusted library allocation
|
page read and write
|
||
34E2000
|
trusted library allocation
|
page read and write
|
||
17B4CF50000
|
heap
|
page read and write
|
||
3263000
|
trusted library allocation
|
page read and write
|
||
2E72000
|
trusted library allocation
|
page read and write
|
||
12531000
|
trusted library allocation
|
page read and write
|
||
26FB000
|
trusted library allocation
|
page read and write
|
||
2867000
|
trusted library allocation
|
page read and write
|
||
7FFF60FE0000
|
trusted library allocation
|
page read and write
|
||
2C90000
|
heap
|
page execute and read and write
|
||
7FFF60F56000
|
trusted library allocation
|
page execute and read and write
|
||
313A000
|
trusted library allocation
|
page read and write
|
||
1E286000
|
heap
|
page read and write
|
||
1E3CF000
|
heap
|
page read and write
|
||
2E07000
|
trusted library allocation
|
page read and write
|
||
7FFF60E9C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFF60EF0000
|
trusted library allocation
|
page execute and read and write
|
||
1F79E070000
|
heap
|
page read and write
|
||
31B4000
|
trusted library allocation
|
page read and write
|
||
1A360B40000
|
heap
|
page read and write
|
||
2FBE000
|
trusted library allocation
|
page read and write
|
||
3151000
|
trusted library allocation
|
page read and write
|
||
33D0000
|
heap
|
page execute and read and write
|
||
3183000
|
trusted library allocation
|
page read and write
|
||
1BD1E000
|
stack
|
page read and write
|
||
1D44D119000
|
heap
|
page read and write
|
||
1E079000
|
heap
|
page read and write
|
||
2EC7000
|
trusted library allocation
|
page read and write
|
||
28EB000
|
trusted library allocation
|
page read and write
|
||
2FCF000
|
trusted library allocation
|
page read and write
|
||
7FFF60E40000
|
trusted library allocation
|
page read and write
|
||
7FFF60E5D000
|
trusted library allocation
|
page execute and read and write
|
||
1A360830000
|
heap
|
page read and write
|
||
32C9000
|
trusted library allocation
|
page read and write
|
||
1B819000
|
heap
|
page read and write
|
||
2725000
|
trusted library allocation
|
page read and write
|
||
31FD000
|
trusted library allocation
|
page read and write
|
||
3228000
|
trusted library allocation
|
page read and write
|
||
7FFF60EEC000
|
trusted library allocation
|
page execute and read and write
|
||
2E92000
|
trusted library allocation
|
page read and write
|
||
2FD1000
|
trusted library allocation
|
page read and write
|
||
2619000
|
trusted library allocation
|
page read and write
|
||
24369AB0000
|
heap
|
page read and write
|
||
3440000
|
trusted library allocation
|
page read and write
|
||
2182E6C0000
|
heap
|
page read and write
|
||
2614000
|
trusted library allocation
|
page read and write
|
||
CEE000
|
stack
|
page read and write
|
||
3265000
|
trusted library allocation
|
page read and write
|
||
1DF49A4B000
|
heap
|
page read and write
|
||
1C884FC000
|
stack
|
page read and write
|
||
1DF2D000
|
heap
|
page read and write
|
||
31EA000
|
trusted library allocation
|
page read and write
|
||
A6B9CFC000
|
stack
|
page read and write
|
||
3692000
|
trusted library allocation
|
page read and write
|
||
2025B825000
|
heap
|
page read and write
|
||
305B000
|
trusted library allocation
|
page read and write
|
||
7FFF60FD2000
|
trusted library allocation
|
page read and write
|
||
1B6DD000
|
stack
|
page read and write
|
||
1A360CC9000
|
heap
|
page read and write
|
||
1C0F3000
|
heap
|
page read and write
|
||
3451000
|
trusted library allocation
|
page read and write
|
||
7FFF61000000
|
trusted library allocation
|
page read and write
|
||
2ED2000
|
trusted library allocation
|
page read and write
|
||
31E0000
|
trusted library allocation
|
page read and write
|
||
387C000
|
trusted library allocation
|
page read and write
|
||
7FFF60E3D000
|
trusted library allocation
|
page execute and read and write
|
||
A6B9FFE000
|
stack
|
page read and write
|
||
3869000
|
trusted library allocation
|
page read and write
|
||
1B3AF000
|
stack
|
page read and write
|
||
3601000
|
trusted library allocation
|
page read and write
|
||
2650000
|
trusted library allocation
|
page read and write
|
||
7FFF60E00000
|
trusted library allocation
|
page read and write
|
||
1E3E9000
|
heap
|
page read and write
|
||
2E4A000
|
trusted library allocation
|
page read and write
|
||
BFC000
|
heap
|
page read and write
|
||
1C40A000
|
stack
|
page read and write
|
||
7FFF60E8C000
|
trusted library allocation
|
page execute and read and write
|
||
1B991000
|
heap
|
page read and write
|
||
3276000
|
trusted library allocation
|
page read and write
|
||
1F79DBF0000
|
heap
|
page read and write
|
||
3832000
|
trusted library allocation
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
7FFF60E4D000
|
trusted library allocation
|
page execute and read and write
|
||
BBE000
|
stack
|
page read and write
|
||
3231000
|
trusted library allocation
|
page read and write
|
||
1F4D2890000
|
heap
|
page read and write
|
||
7FFF60F26000
|
trusted library allocation
|
page execute and read and write
|
||
2FCC000
|
trusted library allocation
|
page read and write
|
||
308E000
|
trusted library allocation
|
page read and write
|
||
5A4000
|
stack
|
page read and write
|
||
72AA8FF000
|
stack
|
page read and write
|
||
276B000
|
trusted library allocation
|
page read and write
|
||
7FFF60F5A000
|
trusted library allocation
|
page execute and read and write
|
||
12F0D000
|
trusted library allocation
|
page read and write
|
||
7FFF60E1D000
|
trusted library allocation
|
page execute and read and write
|
||
25B9000
|
trusted library allocation
|
page read and write
|
||
34E0000
|
trusted library allocation
|
page read and write
|
||
32A3000
|
trusted library allocation
|
page read and write
|
||
2F70000
|
trusted library allocation
|
page read and write
|
||
3003000
|
trusted library allocation
|
page read and write
|
||
1BDEA000
|
heap
|
page read and write
|
||
F81000
|
heap
|
page read and write
|
||
7FFF60E4B000
|
trusted library allocation
|
page execute and read and write
|
||
29BB000
|
trusted library allocation
|
page read and write
|
||
2754000
|
trusted library allocation
|
page read and write
|
||
12D20000
|
trusted library allocation
|
page read and write
|
||
3802000
|
trusted library allocation
|
page read and write
|
||
7FFF60F00000
|
trusted library allocation
|
page execute and read and write
|
||
1C031000
|
heap
|
page read and write
|
||
317B000
|
trusted library allocation
|
page read and write
|
||
7FFF60F06000
|
trusted library allocation
|
page execute and read and write
|
||
1BC1E000
|
stack
|
page read and write
|
||
1C50C000
|
stack
|
page read and write
|
||
280D000
|
trusted library allocation
|
page read and write
|
||
2F3C000
|
trusted library allocation
|
page read and write
|
||
26FD000
|
trusted library allocation
|
page read and write
|
||
319C000
|
trusted library allocation
|
page read and write
|
||
2F5D000
|
trusted library allocation
|
page read and write
|
||
1B8D2000
|
heap
|
page read and write
|
||
7FFF60E20000
|
trusted library allocation
|
page read and write
|
||
30F7000
|
trusted library allocation
|
page read and write
|
||
2721000
|
trusted library allocation
|
page read and write
|
||
282E000
|
trusted library allocation
|
page read and write
|
||
25F4000
|
trusted library allocation
|
page read and write
|
||
2FCE000
|
trusted library allocation
|
page read and write
|
||
1C04C000
|
stack
|
page read and write
|
||
1BD60000
|
heap
|
page read and write
|
||
7FFF60FE0000
|
trusted library allocation
|
page read and write
|
||
3307000
|
trusted library allocation
|
page read and write
|
||
15F5000
|
heap
|
page read and write
|
||
1CB49704000
|
heap
|
page read and write
|
||
137D000
|
heap
|
page read and write
|
||
7FFF60E3B000
|
trusted library allocation
|
page execute and read and write
|
||
137D2CA9000
|
heap
|
page read and write
|
||
13169000
|
trusted library allocation
|
page read and write
|
||
343C000
|
trusted library allocation
|
page read and write
|
||
7FFF60E50000
|
trusted library allocation
|
page read and write
|
||
2EF2000
|
trusted library allocation
|
page read and write
|
||
2FEE000
|
trusted library allocation
|
page read and write
|
||
25E2000
|
trusted library allocation
|
page read and write
|
||
28E0000
|
trusted library allocation
|
page read and write
|
||
7FFF60E40000
|
trusted library allocation
|
page read and write
|
||
A5F000
|
heap
|
page read and write
|
||
27EE000
|
trusted library allocation
|
page read and write
|
||
3039000
|
trusted library allocation
|
page read and write
|
||
2E48000
|
trusted library allocation
|
page read and write
|
||
B14000
|
stack
|
page read and write
|
||
7FFF60E2D000
|
trusted library allocation
|
page execute and read and write
|
||
2885000
|
trusted library allocation
|
page read and write
|
||
1C459B79000
|
heap
|
page read and write
|
||
274E000
|
trusted library allocation
|
page read and write
|
||
32A7000
|
trusted library allocation
|
page read and write
|
||
1C780000
|
heap
|
page read and write
|
||
25B233D0000
|
heap
|
page read and write
|
||
1884A079000
|
heap
|
page read and write
|
||
7FFF60FC0000
|
trusted library allocation
|
page read and write
|
||
1C98A000
|
stack
|
page read and write
|
||
28E2000
|
trusted library allocation
|
page read and write
|
||
1CEE72CB000
|
heap
|
page read and write
|
||
1BB00000
|
heap
|
page read and write
|
||
1B770000
|
heap
|
page read and write
|
||
2F4F000
|
trusted library allocation
|
page read and write
|
||
1C4598C0000
|
heap
|
page read and write
|
||
31A3000
|
trusted library allocation
|
page read and write
|
||
26213656000
|
heap
|
page read and write
|
||
1C03E000
|
heap
|
page read and write
|
||
7FFF60E8C000
|
trusted library allocation
|
page execute and read and write
|
||
26EB000
|
trusted library allocation
|
page read and write
|
||
31A1000
|
trusted library allocation
|
page read and write
|
||
7FFF60F30000
|
trusted library allocation
|
page execute and read and write
|
||
7FFF61010000
|
trusted library allocation
|
page execute and read and write
|
||
7FE000
|
heap
|
page read and write
|
||
1CEE75D0000
|
heap
|
page read and write
|
||
32E3000
|
trusted library allocation
|
page read and write
|
||
EFE000
|
heap
|
page read and write
|
||
2612000
|
trusted library allocation
|
page read and write
|
||
FAB000
|
heap
|
page read and write
|
||
17B4CF54000
|
heap
|
page read and write
|
||
272E000
|
trusted library allocation
|
page read and write
|
||
3253000
|
trusted library allocation
|
page read and write
|
||
7FFF60E40000
|
trusted library allocation
|
page read and write
|
||
7FFF61040000
|
trusted library allocation
|
page read and write
|
||
31CD000
|
trusted library allocation
|
page read and write
|
||
92B75FF000
|
stack
|
page read and write
|
||
17B4CCD8000
|
heap
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
27FE000
|
trusted library allocation
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
A8532FE000
|
unkown
|
page read and write
|
||
2EB2000
|
trusted library allocation
|
page read and write
|
||
2330000
|
heap
|
page execute and read and write
|
||
294A000
|
trusted library allocation
|
page read and write
|
||
337C000
|
trusted library allocation
|
page read and write
|
||
2855000
|
trusted library allocation
|
page read and write
|
||
3314000
|
trusted library allocation
|
page read and write
|
||
7FFF60FD5000
|
trusted library allocation
|
page read and write
|
||
2F6B000
|
trusted library allocation
|
page read and write
|
||
314D000
|
trusted library allocation
|
page read and write
|
||
32D2000
|
trusted library allocation
|
page read and write
|
||
35BF000
|
trusted library allocation
|
page read and write
|
||
2799000
|
trusted library allocation
|
page read and write
|
||
28DA000
|
trusted library allocation
|
page read and write
|
||
1D6BA000
|
heap
|
page read and write
|
||
7FFF60FF0000
|
trusted library allocation
|
page read and write
|
||
286B000
|
trusted library allocation
|
page read and write
|
||
1B432000
|
heap
|
page read and write
|
||
2750000
|
trusted library allocation
|
page read and write
|
||
7FFF60FD0000
|
trusted library allocation
|
page read and write
|
||
3847000
|
trusted library allocation
|
page read and write
|
||
92B73FE000
|
unkown
|
page read and write
|
||
1BFAF000
|
stack
|
page read and write
|
||
3731000
|
trusted library allocation
|
page read and write
|
||
1A360AD0000
|
heap
|
page read and write
|
||
347A000
|
trusted library allocation
|
page read and write
|
||
7FFF60E44000
|
trusted library allocation
|
page read and write
|
||
31BC000
|
trusted library allocation
|
page read and write
|
||
2182E830000
|
heap
|
page read and write
|
||
31D9000
|
trusted library allocation
|
page read and write
|
||
2927000
|
trusted library allocation
|
page read and write
|
||
A01F6FC000
|
stack
|
page read and write
|
||
26A7000
|
trusted library allocation
|
page read and write
|
||
37F1000
|
trusted library allocation
|
page read and write
|
||
3415000
|
trusted library allocation
|
page read and write
|
||
26F7000
|
trusted library allocation
|
page read and write
|
||
7FFF60E23000
|
trusted library allocation
|
page execute and read and write
|
||
2583000
|
trusted library allocation
|
page read and write
|
||
293D170B000
|
heap
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
278E000
|
trusted library allocation
|
page read and write
|
||
F0E000
|
heap
|
page read and write
|
||
27E3000
|
trusted library allocation
|
page read and write
|
||
1734000
|
heap
|
page read and write
|
||
3557000
|
trusted library allocation
|
page read and write
|
||
B9C000
|
heap
|
page read and write
|
||
3208000
|
trusted library allocation
|
page read and write
|
||
3079000
|
trusted library allocation
|
page read and write
|
||
2495EBB0000
|
heap
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
3072000
|
trusted library allocation
|
page read and write
|
||
347E000
|
trusted library allocation
|
page read and write
|
||
2959000
|
trusted library allocation
|
page read and write
|
||
3526000
|
trusted library allocation
|
page read and write
|
||
2FD4000
|
trusted library allocation
|
page read and write
|
||
1BDA1000
|
heap
|
page read and write
|
||
C55000
|
heap
|
page read and write
|
||
3140000
|
heap
|
page read and write
|
||
26213630000
|
heap
|
page read and write
|
||
333A000
|
trusted library allocation
|
page read and write
|
||
FC4000
|
heap
|
page read and write
|
||
28DE000
|
trusted library allocation
|
page read and write
|
||
3187000
|
trusted library allocation
|
page read and write
|
||
260E000
|
trusted library allocation
|
page read and write
|
||
25F0000
|
trusted library allocation
|
page read and write
|
||
29CC000
|
trusted library allocation
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
2920000
|
trusted library allocation
|
page read and write
|
||
1DF49A40000
|
heap
|
page read and write
|
||
3382000
|
trusted library allocation
|
page read and write
|
||
3158000
|
trusted library allocation
|
page read and write
|
||
3853000
|
trusted library allocation
|
page read and write
|
||
1884A075000
|
heap
|
page read and write
|
||
3517000
|
trusted library allocation
|
page read and write
|
||
7FFF60E54000
|
trusted library allocation
|
page read and write
|
||
7FFF60EE0000
|
trusted library allocation
|
page read and write
|
||
F50000
|
unkown
|
page readonly
|
||
7FFF60FE0000
|
trusted library allocation
|
page read and write
|
||
2FCD000
|
trusted library allocation
|
page read and write
|
||
BD2000
|
heap
|
page read and write
|
||
7FFF60E04000
|
trusted library allocation
|
page read and write
|
||
12D1B000
|
trusted library allocation
|
page read and write
|
||
EF8000
|
heap
|
page read and write
|
||
29F6000
|
trusted library allocation
|
page read and write
|
||
29B9000
|
trusted library allocation
|
page read and write
|
||
C46000
|
heap
|
page read and write
|
||
2736000
|
trusted library allocation
|
page read and write
|
||
2F3E000
|
trusted library allocation
|
page read and write
|
||
7FFF60E30000
|
trusted library allocation
|
page read and write
|
||
2926000
|
trusted library allocation
|
page read and write
|
||
1B56E000
|
stack
|
page read and write
|
||
1BC4E000
|
stack
|
page read and write
|
||
7FFF60EF0000
|
trusted library allocation
|
page read and write
|
||
386B000
|
trusted library allocation
|
page read and write
|
||
1DF49B40000
|
heap
|
page read and write
|
||
356A000
|
trusted library allocation
|
page read and write
|
||
26CD000
|
trusted library allocation
|
page read and write
|
||
272D000
|
trusted library allocation
|
page read and write
|
||
1ACD0000
|
trusted library allocation
|
page read and write
|
||
1D64C000
|
heap
|
page read and write
|
||
BD05EFB000
|
stack
|
page read and write
|
||
2687000
|
trusted library allocation
|
page read and write
|
||
324E000
|
trusted library allocation
|
page read and write
|
||
30B2000
|
trusted library allocation
|
page read and write
|
||
2804000
|
trusted library allocation
|
page read and write
|
||
2820000
|
trusted library allocation
|
page read and write
|
||
2F61000
|
trusted library allocation
|
page read and write
|
||
2F2B000
|
trusted library allocation
|
page read and write
|
||
7FFF60F40000
|
trusted library allocation
|
page execute and read and write
|
||
25CE000
|
trusted library allocation
|
page read and write
|
||
2182EA09000
|
heap
|
page read and write
|
||
2853000
|
trusted library allocation
|
page read and write
|
||
11D0000
|
trusted library allocation
|
page read and write
|
||
2837000
|
trusted library allocation
|
page read and write
|
||
29F2000
|
trusted library allocation
|
page read and write
|
||
1CB49850000
|
heap
|
page read and write
|
||
36617AB000
|
stack
|
page read and write
|
||
37D7000
|
trusted library allocation
|
page read and write
|
||
7FFF60E33000
|
trusted library allocation
|
page execute and read and write
|
||
1F4D26FB000
|
heap
|
page read and write
|
||
35CE000
|
trusted library allocation
|
page read and write
|
||
1B950000
|
heap
|
page read and write
|
||
30BF000
|
trusted library allocation
|
page read and write
|
||
263F000
|
trusted library allocation
|
page read and write
|
||
32F6000
|
trusted library allocation
|
page read and write
|
||
347E000
|
trusted library allocation
|
page read and write
|
||
324A000
|
trusted library allocation
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
1D6DF000
|
heap
|
page read and write
|
||
1BD50000
|
heap
|
page read and write
|
||
35E2000
|
trusted library allocation
|
page read and write
|
||
2761000
|
trusted library allocation
|
page read and write
|
||
37AA000
|
trusted library allocation
|
page read and write
|
||
2C80000
|
heap
|
page execute and read and write
|
||
377D000
|
trusted library allocation
|
page read and write
|
||
2E0E000
|
trusted library allocation
|
page read and write
|
||
7FFF60E30000
|
trusted library allocation
|
page read and write
|
||
299B000
|
trusted library allocation
|
page read and write
|
||
7FFF60FB0000
|
trusted library allocation
|
page read and write
|
||
3125000
|
trusted library allocation
|
page read and write
|
||
2FA0000
|
heap
|
page execute and read and write
|
||
12F4B000
|
trusted library allocation
|
page read and write
|
||
C05000
|
heap
|
page read and write
|
||
138D000
|
heap
|
page read and write
|
||
7FFF610A6000
|
trusted library allocation
|
page read and write
|
||
2840000
|
trusted library allocation
|
page read and write
|
||
27D2000
|
trusted library allocation
|
page read and write
|
||
1E17E000
|
heap
|
page read and write
|
||
1C788000
|
heap
|
page read and write
|
||
25DB000
|
trusted library allocation
|
page read and write
|
||
3522000
|
trusted library allocation
|
page read and write
|
||
35BD000
|
trusted library allocation
|
page read and write
|
||
7FFF61080000
|
trusted library allocation
|
page read and write
|
||
357D000
|
trusted library allocation
|
page read and write
|
||
248E000
|
stack
|
page read and write
|
||
7FFF60FD6000
|
trusted library allocation
|
page read and write
|
||
312B000
|
trusted library allocation
|
page read and write
|
||
28EF000
|
trusted library allocation
|
page read and write
|
||
2832000
|
trusted library allocation
|
page read and write
|
||
2C8D000
|
stack
|
page read and write
|
||
1CA8C000
|
stack
|
page read and write
|
||
2659000
|
trusted library allocation
|
page read and write
|
||
1B970000
|
heap
|
page read and write
|
||
28A0000
|
trusted library allocation
|
page read and write
|
||
31A0000
|
trusted library allocation
|
page read and write
|
||
2920000
|
trusted library allocation
|
page read and write
|
||
2630000
|
trusted library allocation
|
page read and write
|
||
2924000
|
trusted library allocation
|
page read and write
|
||
1D78C000
|
heap
|
page read and write
|
||
7FFF60FDB000
|
trusted library allocation
|
page read and write
|
||
1B8CE000
|
stack
|
page read and write
|
||
35CA000
|
trusted library allocation
|
page read and write
|
||
262135F0000
|
heap
|
page read and write
|
||
2E3D000
|
trusted library allocation
|
page read and write
|
||
1C8809E6000
|
heap
|
page read and write
|
||
7FFF60E50000
|
trusted library allocation
|
page read and write
|
||
7FFF60E13000
|
trusted library allocation
|
page execute and read and write
|
||
1A3609F4000
|
heap
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
275F000
|
trusted library allocation
|
page read and write
|
||
2F91000
|
trusted library allocation
|
page read and write
|
||
2624000
|
trusted library allocation
|
page read and write
|
||
3826000
|
trusted library allocation
|
page read and write
|
||
1BB1E000
|
stack
|
page read and write
|
||
2735000
|
trusted library allocation
|
page read and write
|
||
2849000
|
trusted library allocation
|
page read and write
|
||
25B233D5000
|
heap
|
page read and write
|
||
1E1C6000
|
heap
|
page read and write
|
||
25A3000
|
trusted library allocation
|
page read and write
|
||
321D000
|
trusted library allocation
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
27F5000
|
trusted library allocation
|
page read and write
|
||
3380000
|
trusted library allocation
|
page read and write
|
||
1B9B1000
|
heap
|
page read and write
|
||
137D2B30000
|
heap
|
page read and write
|
||
2495EDF0000
|
heap
|
page read and write
|
||
2803000
|
trusted library allocation
|
page read and write
|
||
2634000
|
trusted library allocation
|
page read and write
|
||
28C0000
|
trusted library allocation
|
page read and write
|
||
3553000
|
trusted library allocation
|
page read and write
|
||
7FFF60FD0000
|
trusted library allocation
|
page read and write
|
||
3285000
|
trusted library allocation
|
page read and write
|
||
2A7F000
|
trusted library allocation
|
page read and write
|
||
7FFF60E43000
|
trusted library allocation
|
page execute and read and write
|
||
297D000
|
trusted library allocation
|
page read and write
|
||
27D2000
|
trusted library allocation
|
page read and write
|
||
3413000
|
trusted library allocation
|
page read and write
|
||
12F34000
|
trusted library allocation
|
page read and write
|
||
2752000
|
trusted library allocation
|
page read and write
|
||
12FB8000
|
trusted library allocation
|
page read and write
|
||
1730000
|
heap
|
page read and write
|
||
3290000
|
trusted library allocation
|
page read and write
|
||
37A1000
|
trusted library allocation
|
page read and write
|
||
1D44D110000
|
heap
|
page read and write
|
||
7FFF60F20000
|
trusted library allocation
|
page execute and read and write
|
||
92B74FE000
|
stack
|
page read and write
|
||
2E70000
|
trusted library allocation
|
page read and write
|
||
34AF000
|
trusted library allocation
|
page read and write
|
||
7FFF60E3D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFF60E4D000
|
trusted library allocation
|
page execute and read and write
|
||
29BD000
|
trusted library allocation
|
page read and write
|
||
305A000
|
trusted library allocation
|
page read and write
|
||
93B0CFF000
|
stack
|
page read and write
|
||
13EE000
|
stack
|
page read and write
|
||
1B9AE000
|
heap
|
page read and write
|
||
7FFF60FC0000
|
trusted library allocation
|
page read and write
|
||
2694000
|
trusted library allocation
|
page read and write
|
||
28D0000
|
trusted library allocation
|
page read and write
|
||
C49000
|
heap
|
page read and write
|
||
325F000
|
trusted library allocation
|
page read and write
|
||
2887000
|
trusted library allocation
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
360C000
|
trusted library allocation
|
page read and write
|
||
2711000
|
trusted library allocation
|
page read and write
|
||
34C0000
|
trusted library allocation
|
page read and write
|
||
44BD5FF000
|
stack
|
page read and write
|
||
FC9000
|
heap
|
page read and write
|
||
2182E6CD000
|
heap
|
page read and write
|
||
1BD58000
|
heap
|
page read and write
|
||
1BC09000
|
stack
|
page read and write
|
||
F95000
|
heap
|
page read and write
|
||
30AE000
|
trusted library allocation
|
page read and write
|
||
3797000
|
trusted library allocation
|
page read and write
|
||
2592000
|
trusted library allocation
|
page read and write
|
||
1B81C000
|
heap
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
1C8809C0000
|
heap
|
page read and write
|
||
1B2E0000
|
heap
|
page read and write
|
||
7FFF60E64000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
stack
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
3167000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
1B9A9000
|
heap
|
page read and write
|
||
24369E65000
|
heap
|
page read and write
|
||
38E2000
|
trusted library allocation
|
page read and write
|
||
1CB496B5000
|
heap
|
page read and write
|
||
359D000
|
trusted library allocation
|
page read and write
|
||
316A000
|
trusted library allocation
|
page read and write
|
||
35A8000
|
trusted library allocation
|
page read and write
|
||
ABE000
|
stack
|
page read and write
|
||
7FFF60E5D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFF61050000
|
trusted library allocation
|
page read and write
|
||
320C000
|
trusted library allocation
|
page read and write
|
||
3469000
|
trusted library allocation
|
page read and write
|
||
2F3A000
|
trusted library allocation
|
page read and write
|
||
277E000
|
trusted library allocation
|
page read and write
|
||
318E000
|
trusted library allocation
|
page read and write
|
||
7FFF60E4B000
|
trusted library allocation
|
page execute and read and write
|
||
1B973000
|
heap
|
page read and write
|
||
1D638000
|
heap
|
page read and write
|
||
3599000
|
trusted library allocation
|
page read and write
|
||
7FFF60EF0000
|
trusted library allocation
|
page execute and read and write
|
||
3612000
|
trusted library allocation
|
page read and write
|
||
2182E6E3000
|
heap
|
page read and write
|
||
2865000
|
trusted library allocation
|
page read and write
|
||
2903000
|
trusted library allocation
|
page read and write
|
||
1E1BE000
|
heap
|
page read and write
|
||
1C066000
|
heap
|
page read and write
|
||
25FD000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
2834000
|
trusted library allocation
|
page read and write
|
||
1D6C4000
|
heap
|
page read and write
|
||
313C000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
F63000
|
trusted library allocation
|
page read and write
|
||
2EAD000
|
stack
|
page read and write
|
||
3059000
|
trusted library allocation
|
page read and write
|
||
FCD000
|
heap
|
page read and write
|
||
2ED9000
|
trusted library allocation
|
page read and write
|
||
7FFF60E7C000
|
trusted library allocation
|
page execute and read and write
|
||
28E2000
|
trusted library allocation
|
page read and write
|
||
1CEE72E4000
|
heap
|
page read and write
|
||
1F79DE0B000
|
heap
|
page read and write
|
||
1C880BE9000
|
heap
|
page read and write
|
||
1B99B000
|
heap
|
page read and write
|
||
2869000
|
trusted library allocation
|
page read and write
|
||
28E0000
|
trusted library allocation
|
page read and write
|
||
254E000
|
trusted library allocation
|
page read and write
|
||
30F2000
|
trusted library allocation
|
page read and write
|
||
2FB1000
|
trusted library allocation
|
page read and write
|
||
1B125000
|
heap
|
page read and write
|
||
299D000
|
trusted library allocation
|
page read and write
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
7FFF60FC9000
|
trusted library allocation
|
page read and write
|
||
18849B60000
|
heap
|
page read and write
|
||
3292000
|
trusted library allocation
|
page read and write
|
||
2F14000
|
trusted library allocation
|
page read and write
|
||
2EBF000
|
trusted library allocation
|
page read and write
|
||
7FFF60E44000
|
trusted library allocation
|
page read and write
|
||
26A5000
|
trusted library allocation
|
page read and write
|
||
1CEE75D9000
|
heap
|
page read and write
|
||
27BB000
|
trusted library allocation
|
page read and write
|
||
2182EA00000
|
heap
|
page read and write
|
||
7FFF60E1D000
|
trusted library allocation
|
page execute and read and write
|
||
12F16000
|
trusted library allocation
|
page read and write
|
||
25AD000
|
trusted library allocation
|
page read and write
|
||
61B000
|
heap
|
page read and write
|
||
25EC000
|
trusted library allocation
|
page read and write
|
||
288B000
|
trusted library allocation
|
page read and write
|
||
1BAD0000
|
trusted library section
|
page read and write
|
||
2EF4000
|
trusted library allocation
|
page read and write
|
||
2876000
|
trusted library allocation
|
page read and write
|
||
7FFF60E2B000
|
trusted library allocation
|
page execute and read and write
|
||
1C14E000
|
stack
|
page read and write
|
||
3338000
|
trusted library allocation
|
page read and write
|
||
2495EE60000
|
heap
|
page read and write
|
||
33FE000
|
trusted library allocation
|
page read and write
|
||
1DF20000
|
heap
|
page read and write
|
||
337A000
|
trusted library allocation
|
page read and write
|
||
7FFF61033000
|
trusted library allocation
|
page read and write
|
||
15F0000
|
heap
|
page read and write
|
||
17FE000
|
stack
|
page read and write
|
||
1F79DF70000
|
heap
|
page read and write
|
||
7FFF60EC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFF60F16000
|
trusted library allocation
|
page execute and read and write
|
||
12BA000
|
heap
|
page read and write
|
||
2917000
|
trusted library allocation
|
page read and write
|
||
7FFF60EBC000
|
trusted library allocation
|
page execute and read and write
|
||
2E5D000
|
trusted library allocation
|
page read and write
|
||
28A7000
|
trusted library allocation
|
page read and write
|
||
329F000
|
trusted library allocation
|
page read and write
|
||
34FE000
|
trusted library allocation
|
page read and write
|
||
2999000
|
trusted library allocation
|
page read and write
|
||
2025B824000
|
heap
|
page read and write
|
||
1C880BF0000
|
heap
|
page read and write
|
||
38B7000
|
trusted library allocation
|
page read and write
|
||
26C7000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
1C640000
|
heap
|
page read and write
|
||
1E083000
|
heap
|
page read and write
|
||
17B4CCD3000
|
heap
|
page read and write
|
||
26AD000
|
trusted library allocation
|
page read and write
|
||
28A5000
|
trusted library allocation
|
page read and write
|
||
1F4D2865000
|
heap
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
31EE000
|
trusted library allocation
|
page read and write
|
||
F7F000
|
heap
|
page read and write
|
||
3400000
|
trusted library allocation
|
page read and write
|
||
7FFF60E53000
|
trusted library allocation
|
page read and write
|
||
1C54D000
|
stack
|
page read and write
|
||
1AABD000
|
stack
|
page read and write
|
||
271B000
|
trusted library allocation
|
page read and write
|
||
1CB496B9000
|
heap
|
page read and write
|
||
3092000
|
trusted library allocation
|
page read and write
|
||
2700000
|
trusted library allocation
|
page read and write
|
||
17B4CCB0000
|
heap
|
page read and write
|
||
35F4000
|
trusted library allocation
|
page read and write
|
||
308C000
|
trusted library allocation
|
page read and write
|
||
2763000
|
trusted library allocation
|
page read and write
|
||
12ED5000
|
trusted library allocation
|
page read and write
|
||
1B800000
|
heap
|
page execute and read and write
|
||
1DF49A64000
|
heap
|
page read and write
|
||
1F4D26F0000
|
heap
|
page read and write
|
||
27B2000
|
trusted library allocation
|
page read and write
|
||
1D044FF000
|
stack
|
page read and write
|
||
2925000
|
trusted library allocation
|
page read and write
|
||
18849DD4000
|
heap
|
page read and write
|
||
FAC07FF000
|
unkown
|
page read and write
|
||
C0000
|
heap
|
page read and write
|
||
32FC000
|
trusted library allocation
|
page read and write
|
||
296A000
|
trusted library allocation
|
page read and write
|
||
2771000
|
trusted library allocation
|
page read and write
|
||
7FFF60E23000
|
trusted library allocation
|
page execute and read and write
|
||
1203000
|
trusted library allocation
|
page read and write
|
||
137D2CA9000
|
heap
|
page read and write
|
||
333C000
|
trusted library allocation
|
page read and write
|
||
7FFF60FF0000
|
trusted library allocation
|
page read and write
|
||
27D9000
|
trusted library allocation
|
page read and write
|
||
72AA7FF000
|
unkown
|
page read and write
|
||
336F000
|
trusted library allocation
|
page read and write
|
||
3453000
|
trusted library allocation
|
page read and write
|
||
29E3000
|
trusted library allocation
|
page read and write
|
||
2787000
|
trusted library allocation
|
page read and write
|
||
1884A079000
|
heap
|
page read and write
|
||
12FD2000
|
trusted library allocation
|
page read and write
|
||
266E000
|
stack
|
page read and write
|
||
137D2CA4000
|
heap
|
page read and write
|
||
1B985000
|
heap
|
page read and write
|
||
2574000
|
trusted library allocation
|
page read and write
|
||
2F18000
|
trusted library allocation
|
page read and write
|
||
1BD44000
|
heap
|
page read and write
|
||
2859000
|
trusted library allocation
|
page read and write
|
||
105A000
|
stack
|
page read and write
|
||
27AE000
|
trusted library allocation
|
page read and write
|
||
137D2D20000
|
heap
|
page read and write
|
||
2F58000
|
trusted library allocation
|
page read and write
|
||
12D5000
|
heap
|
page read and write
|
||
1F4D2716000
|
heap
|
page read and write
|
||
2E7B000
|
trusted library allocation
|
page read and write
|
||
CBE000
|
stack
|
page read and write
|
||
3170000
|
trusted library allocation
|
page read and write
|
||
104D000
|
heap
|
page read and write
|
||
131CF000
|
trusted library allocation
|
page read and write
|
||
34BE000
|
trusted library allocation
|
page read and write
|
||
1B3ED000
|
heap
|
page read and write
|
||
1B79A000
|
heap
|
page read and write
|
||
2F5A000
|
trusted library allocation
|
page read and write
|
||
7FFF61010000
|
trusted library allocation
|
page execute and read and write
|
||
359B000
|
trusted library allocation
|
page read and write
|
||
3575000
|
trusted library allocation
|
page read and write
|
||
1B1BF000
|
stack
|
page read and write
|
||
3305000
|
trusted library allocation
|
page read and write
|
||
1299000
|
heap
|
page read and write
|
||
276B000
|
trusted library allocation
|
page read and write
|
||
314B000
|
trusted library allocation
|
page read and write
|
||
1C6EA000
|
stack
|
page read and write
|
||
7FFF60E3D000
|
trusted library allocation
|
page execute and read and write
|
||
1B959000
|
heap
|
page read and write
|
||
6DD000
|
heap
|
page read and write
|
||
3070000
|
trusted library allocation
|
page read and write
|
||
17B4CF59000
|
heap
|
page read and write
|
||
3270000
|
trusted library allocation
|
page read and write
|
||
1F79DD30000
|
heap
|
page read and write
|
||
2EF6000
|
trusted library allocation
|
page read and write
|
||
1A3609DB000
|
heap
|
page read and write
|
||
F8D000
|
heap
|
page read and write
|
||
24369AD4000
|
heap
|
page read and write
|
||
2955000
|
trusted library allocation
|
page read and write
|
||
28B9000
|
trusted library allocation
|
page read and write
|
||
3482000
|
trusted library allocation
|
page read and write
|
||
25FB000
|
trusted library allocation
|
page read and write
|
||
F79000
|
heap
|
page read and write
|
||
324C000
|
trusted library allocation
|
page read and write
|
||
25D1000
|
trusted library allocation
|
page read and write
|
||
E367AFF000
|
stack
|
page read and write
|
||
28FC000
|
trusted library allocation
|
page read and write
|
||
38BC000
|
trusted library allocation
|
page read and write
|
||
2811000
|
trusted library allocation
|
page read and write
|
||
261B000
|
trusted library allocation
|
page read and write
|
||
7FFF60E43000
|
trusted library allocation
|
page read and write
|
||
26DA000
|
trusted library allocation
|
page read and write
|
||
7FFF60F50000
|
trusted library allocation
|
page execute and read and write
|
||
1E1E4000
|
heap
|
page read and write
|
||
7FFF60E43000
|
trusted library allocation
|
page read and write
|
||
3511000
|
trusted library allocation
|
page read and write
|
||
1B9C9000
|
heap
|
page read and write
|
||
2FDF000
|
trusted library allocation
|
page read and write
|
||
1CB8A000
|
stack
|
page read and write
|
||
1B96D000
|
stack
|
page read and write
|
||
3455000
|
trusted library allocation
|
page read and write
|
||
1CB496B9000
|
heap
|
page read and write
|
||
2733000
|
trusted library allocation
|
page read and write
|
||
54490FB000
|
stack
|
page read and write
|
||
1B143000
|
heap
|
page read and write
|
||
44BD6FE000
|
stack
|
page read and write
|
||
1E060000
|
heap
|
page read and write
|
||
AE8000
|
heap
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
9B5000
|
heap
|
page read and write
|
||
334F000
|
trusted library allocation
|
page read and write
|
||
3858000
|
trusted library allocation
|
page read and write
|
||
2E39000
|
trusted library allocation
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
2933000
|
trusted library allocation
|
page read and write
|
||
26BA000
|
trusted library allocation
|
page read and write
|
||
1D44D119000
|
heap
|
page read and write
|
||
3684000
|
trusted library allocation
|
page read and write
|
||
24369AD6000
|
heap
|
page read and write
|
||
3824000
|
trusted library allocation
|
page read and write
|
||
21FE965B000
|
heap
|
page read and write
|
||
272F000
|
trusted library allocation
|
page read and write
|
||
7FFF60E5B000
|
trusted library allocation
|
page execute and read and write
|
||
347C000
|
trusted library allocation
|
page read and write
|
||
1D44D190000
|
heap
|
page read and write
|
||
3090000
|
trusted library allocation
|
page read and write
|
||
2F38000
|
trusted library allocation
|
page read and write
|
||
2769000
|
trusted library allocation
|
page read and write
|
||
7FFF60F26000
|
trusted library allocation
|
page execute and read and write
|
||
2654000
|
trusted library allocation
|
page read and write
|
||
3593000
|
trusted library allocation
|
page read and write
|
||
28F5000
|
trusted library allocation
|
page read and write
|
||
2F8F000
|
trusted library allocation
|
page read and write
|
||
3156000
|
trusted library allocation
|
page read and write
|
||
35BB000
|
trusted library allocation
|
page read and write
|
||
3870000
|
trusted library allocation
|
page read and write
|
||
32D6000
|
trusted library allocation
|
page read and write
|
||
28DC000
|
trusted library allocation
|
page read and write
|
||
21FE9935000
|
heap
|
page read and write
|
||
7FFF60FDB000
|
trusted library allocation
|
page read and write
|
||
2E74000
|
trusted library allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
7FFF60F50000
|
trusted library allocation
|
page execute and read and write
|
||
BDCCFF000
|
stack
|
page read and write
|
||
ADA000
|
heap
|
page read and write
|
||
60B000
|
heap
|
page read and write
|
||
1BD2C000
|
heap
|
page read and write
|
||
21FE9674000
|
heap
|
page read and write
|
||
1BD51000
|
heap
|
page read and write
|
||
3435000
|
trusted library allocation
|
page read and write
|
||
27DD000
|
trusted library allocation
|
page read and write
|
||
1B3D4000
|
heap
|
page read and write
|
||
31AB000
|
trusted library allocation
|
page read and write
|
||
26F1000
|
trusted library allocation
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
38A6000
|
trusted library allocation
|
page read and write
|
||
17B4CF59000
|
heap
|
page read and write
|
||
1B9EB000
|
heap
|
page read and write
|
||
268F000
|
trusted library allocation
|
page read and write
|
||
760000
|
unkown
|
page readonly
|
||
7FFF60FA2000
|
trusted library allocation
|
page read and write
|
||
CAE000
|
heap
|
page read and write
|
||
256E000
|
trusted library allocation
|
page read and write
|
||
3588000
|
trusted library allocation
|
page read and write
|
||
1B9E9000
|
heap
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
1B2C6000
|
heap
|
page read and write
|
||
28E4000
|
trusted library allocation
|
page read and write
|
||
1B315000
|
heap
|
page read and write
|
||
21ECCFF000
|
stack
|
page read and write
|
||
2902000
|
trusted library allocation
|
page read and write
|
||
2531000
|
trusted library allocation
|
page read and write
|
||
1C885FF000
|
unkown
|
page read and write
|
||
333E000
|
trusted library allocation
|
page read and write
|
||
3422000
|
trusted library allocation
|
page read and write
|
||
2FAF000
|
trusted library allocation
|
page read and write
|
||
9F6000
|
heap
|
page read and write
|
||
1D44D050000
|
heap
|
page read and write
|
||
135C000
|
heap
|
page read and write
|
||
286B000
|
trusted library allocation
|
page read and write
|
||
1B965000
|
heap
|
page read and write
|
||
1B862000
|
heap
|
page read and write
|
||
1B97E000
|
stack
|
page read and write
|
||
2FB3000
|
trusted library allocation
|
page read and write
|
||
1BE0E000
|
stack
|
page read and write
|
||
1200000
|
trusted library allocation
|
page read and write
|
||
31AE000
|
trusted library allocation
|
page read and write
|
||
31BD000
|
trusted library allocation
|
page read and write
|
||
26213810000
|
heap
|
page read and write
|
||
1BFEE000
|
heap
|
page read and write
|
||
3012000
|
trusted library allocation
|
page read and write
|
||
28F1000
|
trusted library allocation
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
293D1724000
|
heap
|
page read and write
|
||
1B960000
|
heap
|
page read and write
|
||
8C8000
|
heap
|
page read and write
|
||
325D000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
10CE000
|
stack
|
page read and write
|
||
28EF000
|
trusted library allocation
|
page read and write
|
||
1B8E4000
|
heap
|
page read and write
|
||
1B989000
|
heap
|
page read and write
|
||
1C5AE000
|
stack
|
page read and write
|
||
34DC000
|
trusted library allocation
|
page read and write
|
||
1CB496B0000
|
heap
|
page read and write
|
||
30F0000
|
heap
|
page execute and read and write
|
||
2DB1000
|
trusted library allocation
|
page read and write
|
||
1B0BE000
|
stack
|
page read and write
|
||
7D9000
|
heap
|
page read and write
|
||
35EC000
|
trusted library allocation
|
page read and write
|
||
1C007000
|
heap
|
page read and write
|
||
32C7000
|
trusted library allocation
|
page read and write
|
||
E15000
|
heap
|
page read and write
|
||
349E000
|
trusted library allocation
|
page read and write
|
||
303F000
|
trusted library allocation
|
page read and write
|
||
35F2000
|
trusted library allocation
|
page read and write
|
||
274E000
|
stack
|
page read and write
|
||
27E1000
|
trusted library allocation
|
page read and write
|
||
380E000
|
trusted library allocation
|
page read and write
|
||
3744000
|
trusted library allocation
|
page read and write
|
||
334B000
|
trusted library allocation
|
page read and write
|
||
3559000
|
trusted library allocation
|
page read and write
|
||
30D2000
|
trusted library allocation
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
F4055FE000
|
stack
|
page read and write
|
||
38D0000
|
trusted library allocation
|
page read and write
|
||
2E7D000
|
trusted library allocation
|
page read and write
|
||
2E10000
|
trusted library allocation
|
page read and write
|
||
1BDA1000
|
heap
|
page read and write
|
||
1C099000
|
heap
|
page read and write
|
||
31C3000
|
trusted library allocation
|
page read and write
|
||
32A5000
|
trusted library allocation
|
page read and write
|
||
2844000
|
trusted library allocation
|
page read and write
|
||
2596000
|
trusted library allocation
|
page read and write
|
||
2380000
|
heap
|
page read and write
|
||
7FFF60FE0000
|
trusted library allocation
|
page read and write
|
||
3103000
|
trusted library allocation
|
page read and write
|
||
7FFF60EF6000
|
trusted library allocation
|
page execute and read and write
|
||
12BD000
|
heap
|
page read and write
|
||
7FFF60E0D000
|
trusted library allocation
|
page execute and read and write
|
||
2935000
|
trusted library allocation
|
page read and write
|
||
C85000
|
heap
|
page read and write
|
||
1DF49BD5000
|
heap
|
page read and write
|
||
1B131000
|
heap
|
page read and write
|
||
1F4D27F0000
|
heap
|
page read and write
|
||
1E3C0000
|
heap
|
page read and write
|
||
3470000
|
trusted library allocation
|
page read and write
|
||
25AB000
|
trusted library allocation
|
page read and write
|
||
2636000
|
trusted library allocation
|
page read and write
|
||
287C000
|
trusted library allocation
|
page read and write
|
||
1D03FCC000
|
stack
|
page read and write
|
||
12F18000
|
trusted library allocation
|
page read and write
|
||
BD061FF000
|
stack
|
page read and write
|
||
1B8F1000
|
heap
|
page read and write
|
||
1DF49A66000
|
heap
|
page read and write
|
||
1B66B000
|
stack
|
page read and write
|
||
18849DB0000
|
heap
|
page read and write
|
||
A8533FF000
|
stack
|
page read and write
|
||
130AF000
|
trusted library allocation
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
2F49000
|
trusted library allocation
|
page read and write
|
||
2734000
|
trusted library allocation
|
page read and write
|
||
28C9000
|
trusted library allocation
|
page read and write
|
||
28AB000
|
trusted library allocation
|
page read and write
|
||
7FFF60E24000
|
trusted library allocation
|
page read and write
|
||
104A000
|
heap
|
page read and write
|
||
2554000
|
trusted library allocation
|
page read and write
|
||
137D2CB0000
|
heap
|
page read and write
|
||
34DE000
|
trusted library allocation
|
page read and write
|
||
288B000
|
trusted library allocation
|
page read and write
|
||
1F4D2869000
|
heap
|
page read and write
|
||
26E9000
|
trusted library allocation
|
page read and write
|
||
7FFF60E33000
|
trusted library allocation
|
page read and write
|
||
2590000
|
trusted library allocation
|
page read and write
|
||
2495EC2B000
|
heap
|
page read and write
|
||
27EC000
|
trusted library allocation
|
page read and write
|
||
93B078C000
|
stack
|
page read and write
|
||
26F0000
|
trusted library allocation
|
page read and write
|
||
34ED000
|
trusted library allocation
|
page read and write
|
||
2EEF000
|
stack
|
page read and write
|
||
7FFF60E6B000
|
trusted library allocation
|
page execute and read and write
|
||
C82000
|
heap
|
page read and write
|
||
37A3000
|
trusted library allocation
|
page read and write
|
||
300C000
|
trusted library allocation
|
page read and write
|
||
24369E60000
|
heap
|
page read and write
|
||
2997000
|
trusted library allocation
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
7FFF60E5C000
|
trusted library allocation
|
page execute and read and write
|
||
1B980000
|
heap
|
page read and write
|
||
3220000
|
heap
|
page read and write
|
||
2FF0000
|
trusted library allocation
|
page read and write
|
||
2F67000
|
trusted library allocation
|
page read and write
|
||
2563000
|
trusted library allocation
|
page read and write
|
||
1CA4A000
|
stack
|
page read and write
|
||
80B000
|
heap
|
page read and write
|
||
2696000
|
trusted library allocation
|
page read and write
|
||
7FFF60ED0000
|
trusted library allocation
|
page read and write
|
||
2FB5000
|
trusted library allocation
|
page read and write
|
||
3445000
|
trusted library allocation
|
page read and write
|
||
304E000
|
trusted library allocation
|
page read and write
|
||
2BA15870000
|
heap
|
page read and write
|
||
352F000
|
trusted library allocation
|
page read and write
|
||
3274000
|
trusted library allocation
|
page read and write
|
||
1C8809CD000
|
heap
|
page read and write
|
||
2813000
|
trusted library allocation
|
page read and write
|
||
2520000
|
heap
|
page execute and read and write
|
||
11E5000
|
heap
|
page read and write
|
||
1C459750000
|
heap
|
page read and write
|
||
FAC09FF000
|
stack
|
page read and write
|
||
32E5000
|
trusted library allocation
|
page read and write
|
||
2BA15A40000
|
heap
|
page read and write
|
||
BD060FE000
|
stack
|
page read and write
|
||
1A3609D0000
|
heap
|
page read and write
|
||
24D0000
|
trusted library allocation
|
page read and write
|
||
7FFF60E20000
|
trusted library allocation
|
page read and write
|
||
2856000
|
trusted library allocation
|
page read and write
|
||
1B90E000
|
heap
|
page read and write
|
||
2FB1000
|
trusted library allocation
|
page read and write
|
||
31B2000
|
trusted library allocation
|
page read and write
|
||
2025B829000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
1C4598CB000
|
heap
|
page read and write
|
||
3566000
|
trusted library allocation
|
page read and write
|
||
137D2CA0000
|
heap
|
page read and write
|
||
3568000
|
trusted library allocation
|
page read and write
|
||
346B000
|
trusted library allocation
|
page read and write
|
||
31D7000
|
trusted library allocation
|
page read and write
|
||
1B406000
|
heap
|
page read and write
|
||
12F64000
|
trusted library allocation
|
page read and write
|
||
27CE000
|
trusted library allocation
|
page read and write
|
||
3883000
|
trusted library allocation
|
page read and write
|
||
1B9A3000
|
heap
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
6F4000
|
stack
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
30B5000
|
trusted library allocation
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
1C4598E4000
|
heap
|
page read and write
|
||
3892000
|
trusted library allocation
|
page read and write
|
||
286D000
|
trusted library allocation
|
page read and write
|
||
34A0000
|
trusted library allocation
|
page read and write
|
||
7FFF60EFC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFF60E4D000
|
trusted library allocation
|
page execute and read and write
|
||
F6C000
|
heap
|
page read and write
|
||
133E1000
|
trusted library allocation
|
page read and write
|
||
7FFF60E10000
|
trusted library allocation
|
page read and write
|
||
30BD000
|
trusted library allocation
|
page read and write
|
||
2DCE000
|
trusted library allocation
|
page read and write
|
||
12D2000
|
heap
|
page read and write
|
||
2790000
|
trusted library allocation
|
page read and write
|
||
2182EA05000
|
heap
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
348D000
|
trusted library allocation
|
page read and write
|
||
378E000
|
trusted library allocation
|
page read and write
|
||
1BD71000
|
heap
|
page read and write
|
||
1E06D000
|
heap
|
page read and write
|
||
7DE000
|
stack
|
page read and write
|
||
1D043FE000
|
stack
|
page read and write
|
||
2802000
|
trusted library allocation
|
page read and write
|
||
35CC000
|
trusted library allocation
|
page read and write
|
||
274C000
|
trusted library allocation
|
page read and write
|
||
2E6C000
|
trusted library allocation
|
page read and write
|
||
18849DD6000
|
heap
|
page read and write
|
||
25A1000
|
trusted library allocation
|
page read and write
|
||
135A000
|
heap
|
page read and write
|
||
349C000
|
trusted library allocation
|
page read and write
|
||
3403000
|
trusted library allocation
|
page read and write
|
||
2713000
|
trusted library allocation
|
page read and write
|
||
1700000
|
trusted library allocation
|
page read and write
|
||
305F000
|
trusted library allocation
|
page read and write
|
||
27FF000
|
trusted library allocation
|
page read and write
|
||
1B982000
|
heap
|
page read and write
|
||
1CEE7490000
|
heap
|
page read and write
|
||
3116000
|
trusted library allocation
|
page read and write
|
||
7FFF60E9C000
|
trusted library allocation
|
page execute and read and write
|
||
31F7000
|
trusted library allocation
|
page read and write
|
||
955000
|
heap
|
page read and write
|
||
34F3000
|
trusted library allocation
|
page read and write
|
||
F59000
|
heap
|
page read and write
|
||
2F69000
|
trusted library allocation
|
page read and write
|
||
3336000
|
trusted library allocation
|
page read and write
|
||
360A000
|
trusted library allocation
|
page read and write
|
||
1920000
|
heap
|
page read and write
|
||
35DF000
|
trusted library allocation
|
page read and write
|
||
1C010000
|
heap
|
page read and write
|
||
1BD7C000
|
heap
|
page read and write
|
||
31FF000
|
trusted library allocation
|
page read and write
|
||
6A2000
|
heap
|
page read and write
|
||
2988000
|
trusted library allocation
|
page read and write
|
||
2FFF000
|
trusted library allocation
|
page read and write
|
||
2A0C000
|
trusted library allocation
|
page read and write
|
||
2A8E000
|
trusted library allocation
|
page read and write
|
||
2EF8000
|
trusted library allocation
|
page read and write
|
||
262135F9000
|
heap
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
2BA15A49000
|
heap
|
page read and write
|
||
1C886FE000
|
stack
|
page read and write
|
||
2881000
|
trusted library allocation
|
page read and write
|
||
28CD000
|
trusted library allocation
|
page read and write
|
||
3169000
|
trusted library allocation
|
page read and write
|
||
284D000
|
trusted library allocation
|
page read and write
|
||
1C880BE0000
|
heap
|
page read and write
|
||
1C1DD000
|
heap
|
page read and write
|
||
6CD377C000
|
stack
|
page read and write
|
||
34F5000
|
trusted library allocation
|
page read and write
|
||
2709000
|
trusted library allocation
|
page read and write
|
||
262E000
|
trusted library allocation
|
page read and write
|
||
279F000
|
trusted library allocation
|
page read and write
|
||
1B906000
|
heap
|
page read and write
|
||
3579000
|
trusted library allocation
|
page read and write
|
||
381B000
|
trusted library allocation
|
page read and write
|
||
2937000
|
trusted library allocation
|
page read and write
|
||
1BD5F000
|
heap
|
page read and write
|
||
2771000
|
trusted library allocation
|
page read and write
|
||
3172000
|
trusted library allocation
|
page read and write
|
||
2DF0000
|
trusted library allocation
|
page read and write
|
||
1B3DC000
|
heap
|
page read and write
|
||
1C78B000
|
heap
|
page read and write
|
||
261F000
|
trusted library allocation
|
page read and write
|
||
3564000
|
trusted library allocation
|
page read and write
|
||
37BC000
|
trusted library allocation
|
page read and write
|
||
295C000
|
trusted library allocation
|
page read and write
|
||
27C0000
|
trusted library allocation
|
page read and write
|
||
3195000
|
trusted library allocation
|
page read and write
|
||
7FFF60E43000
|
trusted library allocation
|
page read and write
|
||
331A000
|
trusted library allocation
|
page read and write
|
||
31CB000
|
trusted library allocation
|
page read and write
|
||
340D000
|
trusted library allocation
|
page read and write
|
||
3025000
|
trusted library allocation
|
page read and write
|
||
F40510B000
|
stack
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
1C059000
|
stack
|
page read and write
|
||
2874000
|
trusted library allocation
|
page read and write
|
||
2FD0000
|
trusted library allocation
|
page read and write
|
||
3723000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
trusted library allocation
|
page read and write
|
||
1D69F000
|
heap
|
page read and write
|
||
270D000
|
trusted library allocation
|
page read and write
|
||
2827000
|
trusted library allocation
|
page read and write
|
||
1A360CC0000
|
heap
|
page read and write
|
||
1CEE75D5000
|
heap
|
page read and write
|
||
26BE000
|
trusted library allocation
|
page read and write
|
||
7FFF60E33000
|
trusted library allocation
|
page execute and read and write
|
||
7FFF60FA0000
|
trusted library allocation
|
page read and write
|
||
5079AFF000
|
unkown
|
page read and write
|
||
1B816000
|
heap
|
page read and write
|
||
21FE9939000
|
heap
|
page read and write
|
||
7FFF60F40000
|
trusted library allocation
|
page execute and read and write
|
||
2948000
|
trusted library allocation
|
page read and write
|
||
26ED000
|
trusted library allocation
|
page read and write
|
||
1C93E000
|
stack
|
page read and write
|
||
287A000
|
trusted library allocation
|
page read and write
|
||
320E000
|
trusted library allocation
|
page read and write
|
||
1C30E000
|
stack
|
page read and write
|
||
1B0FE000
|
stack
|
page read and write
|
||
1B76F000
|
stack
|
page read and write
|
||
1AEFF000
|
stack
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
7FFF60EE0000
|
trusted library allocation
|
page execute and read and write
|
||
99E000
|
stack
|
page read and write
|
||
2F80000
|
trusted library allocation
|
page read and write
|
||
1E1B2000
|
heap
|
page read and write
|
||
2025B829000
|
heap
|
page read and write
|
||
2DD2000
|
trusted library allocation
|
page read and write
|
||
293D1AB5000
|
heap
|
page read and write
|
||
819000
|
unkown
|
page readonly
|
||
2F6D000
|
trusted library allocation
|
page read and write
|
||
2D10000
|
trusted library allocation
|
page read and write
|
||
7FFF60E34000
|
trusted library allocation
|
page read and write
|
||
1E172000
|
heap
|
page read and write
|
||
2495EED4000
|
heap
|
page read and write
|
||
F8B000
|
heap
|
page read and write
|
||
37B4000
|
trusted library allocation
|
page read and write
|
||
34C2000
|
trusted library allocation
|
page read and write
|
||
7FFF60EEC000
|
trusted library allocation
|
page execute and read and write
|
||
2FCA000
|
trusted library allocation
|
page read and write
|
||
289B000
|
trusted library allocation
|
page read and write
|
||
1BD0E000
|
stack
|
page read and write
|
||
310000
|
heap
|
page read and write
|
||
2025B829000
|
heap
|
page read and write
|
||
1B02C000
|
heap
|
page read and write
|
||
31B1000
|
trusted library allocation
|
page read and write
|
||
72AA9FF000
|
stack
|
page read and write
|
||
7FFF60FF0000
|
trusted library allocation
|
page read and write
|
||
1DF2F000
|
heap
|
page read and write
|
||
38BE000
|
trusted library allocation
|
page read and write
|
||
1CB497E0000
|
heap
|
page read and write
|
||
25CA000
|
trusted library allocation
|
page read and write
|
||
297B000
|
trusted library allocation
|
page read and write
|
||
319D000
|
trusted library allocation
|
page read and write
|
||
1383000
|
heap
|
page read and write
|
||
3424000
|
trusted library allocation
|
page read and write
|
||
24369E69000
|
heap
|
page read and write
|
||
2E59000
|
trusted library allocation
|
page read and write
|
||
307D000
|
trusted library allocation
|
page read and write
|
||
28DE000
|
trusted library allocation
|
page read and write
|
||
17B4CCD7000
|
heap
|
page read and write
|
||
2678000
|
trusted library allocation
|
page read and write
|
||
29C1000
|
trusted library allocation
|
page read and write
|
||
2689000
|
trusted library allocation
|
page read and write
|
||
2E4E000
|
trusted library allocation
|
page read and write
|
||
36E65FF000
|
stack
|
page read and write
|
||
3610000
|
trusted library allocation
|
page read and write
|
||
130B6000
|
trusted library allocation
|
page read and write
|
||
278A000
|
trusted library allocation
|
page read and write
|
||
7FFF60E2D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFF60EC0000
|
trusted library allocation
|
page read and write
|
||
13CE000
|
stack
|
page read and write
|
||
2980000
|
trusted library allocation
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
2FE1000
|
trusted library allocation
|
page read and write
|
||
A1E000
|
heap
|
page read and write
|
||
3843000
|
trusted library allocation
|
page read and write
|
||
93B0AFF000
|
unkown
|
page read and write
|
||
35A6000
|
trusted library allocation
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
2966000
|
trusted library allocation
|
page read and write
|
||
1B9E4000
|
heap
|
page read and write
|
||
25C8000
|
trusted library allocation
|
page read and write
|
||
2909000
|
trusted library allocation
|
page read and write
|
||
25B233D9000
|
heap
|
page read and write
|
||
1B95E000
|
heap
|
page read and write
|
||
2896000
|
trusted library allocation
|
page read and write
|
||
10CE000
|
stack
|
page read and write
|
||
137D2B53000
|
heap
|
page read and write
|
||
2765000
|
trusted library allocation
|
page read and write
|
||
7FFF60FD9000
|
trusted library allocation
|
page read and write
|
||
1B16B000
|
heap
|
page read and write
|
||
7FFF60FD5000
|
trusted library allocation
|
page read and write
|
||
54493FF000
|
stack
|
page read and write
|
||
30C1000
|
trusted library allocation
|
page read and write
|
||
27DB000
|
trusted library allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
27FD000
|
trusted library allocation
|
page read and write
|
||
17B4CF55000
|
heap
|
page read and write
|
||
1CB49706000
|
heap
|
page read and write
|
||
3007000
|
trusted library allocation
|
page read and write
|
||
13030000
|
trusted library allocation
|
page read and write
|
||
28AF000
|
trusted library allocation
|
page read and write
|
||
2EC3000
|
trusted library allocation
|
page read and write
|
||
2495EED9000
|
heap
|
page read and write
|
||
12DB8000
|
trusted library allocation
|
page read and write
|
||
1B979000
|
heap
|
page read and write
|
||
30C3000
|
trusted library allocation
|
page read and write
|
||
1CB496E0000
|
heap
|
page read and write
|
||
B96000
|
heap
|
page read and write
|
||
7FFF60E34000
|
trusted library allocation
|
page read and write
|
||
A01F7FE000
|
unkown
|
page read and write
|
||
1B439000
|
stack
|
page read and write
|
||
7FFF60FF1000
|
trusted library allocation
|
page read and write
|
||
32D8000
|
trusted library allocation
|
page read and write
|
||
31B3000
|
trusted library allocation
|
page read and write
|
||
2906000
|
trusted library allocation
|
page read and write
|
||
1B2D0000
|
heap
|
page read and write
|
||
7FFF60FD0000
|
trusted library allocation
|
page read and write
|
||
1B87E000
|
stack
|
page read and write
|
||
3840000
|
trusted library allocation
|
page read and write
|
||
FAC08FF000
|
stack
|
page read and write
|
||
FA1000
|
heap
|
page read and write
|
||
7FFF60E33000
|
trusted library allocation
|
page read and write
|
||
2BA156C4000
|
heap
|
page read and write
|
||
1B157000
|
heap
|
page read and write
|
||
12F8C000
|
trusted library allocation
|
page read and write
|
||
2878000
|
trusted library allocation
|
page read and write
|
||
1DF49BE0000
|
heap
|
page read and write
|
||
2900000
|
trusted library allocation
|
page read and write
|
||
25B232A0000
|
heap
|
page read and write
|
||
1B100000
|
heap
|
page read and write
|
||
2710000
|
trusted library allocation
|
page read and write
|
||
319A000
|
trusted library allocation
|
page read and write
|
||
1C459B80000
|
heap
|
page read and write
|
||
27A1000
|
trusted library allocation
|
page read and write
|
||
3894000
|
trusted library allocation
|
page read and write
|
||
CF4000
|
stack
|
page read and write
|
||
2BA155A0000
|
heap
|
page read and write
|
||
2BA15610000
|
heap
|
page read and write
|
||
2995000
|
trusted library allocation
|
page read and write
|
||
2FDB000
|
trusted library allocation
|
page read and write
|
||
15FE000
|
stack
|
page read and write
|
||
FB9000
|
heap
|
page read and write
|
||
16FE000
|
stack
|
page read and write
|
||
1D86D000
|
heap
|
page read and write
|
||
6C2000
|
heap
|
page read and write
|
||
2F27000
|
trusted library allocation
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
7FFF60E6D000
|
trusted library allocation
|
page execute and read and write
|
||
90671C000
|
stack
|
page read and write
|
||
133E8000
|
trusted library allocation
|
page read and write
|
||
1B81F000
|
heap
|
page read and write
|
||
1B9AE000
|
heap
|
page read and write
|
||
6CD3CFF000
|
stack
|
page read and write
|
||
299F000
|
trusted library allocation
|
page read and write
|
||
1C459A30000
|
heap
|
page read and write
|
||
26AB000
|
trusted library allocation
|
page read and write
|
||
2025B863000
|
heap
|
page read and write
|
||
2816000
|
trusted library allocation
|
page read and write
|
||
3309000
|
trusted library allocation
|
page read and write
|
||
7FFF60F60000
|
trusted library allocation
|
page execute and read and write
|
||
A6B9EFE000
|
stack
|
page read and write
|
||
2182E6C7000
|
heap
|
page read and write
|
||
31CF000
|
trusted library allocation
|
page read and write
|
||
131F7000
|
trusted library allocation
|
page read and write
|
||
27AA000
|
trusted library allocation
|
page read and write
|
||
2A03000
|
trusted library allocation
|
page read and write
|
||
2495EED9000
|
heap
|
page read and write
|
||
12F8C000
|
trusted library allocation
|
page read and write
|
||
7FFF60E50000
|
trusted library allocation
|
page read and write
|
||
7FFF60E3D000
|
trusted library allocation
|
page execute and read and write
|
||
2577000
|
trusted library allocation
|
page read and write
|
||
126F1000
|
trusted library allocation
|
page read and write
|
||
1D44CF74000
|
heap
|
page read and write
|
||
1B33D000
|
stack
|
page read and write
|
||
2812000
|
trusted library allocation
|
page read and write
|
||
2641000
|
trusted library allocation
|
page read and write
|
||
7FFF60E8C000
|
trusted library allocation
|
page execute and read and write
|
||
279D000
|
trusted library allocation
|
page read and write
|
||
7FFF60E60000
|
trusted library allocation
|
page read and write
|
||
12F8A000
|
trusted library allocation
|
page read and write
|
||
3272000
|
trusted library allocation
|
page read and write
|
||
25B233E0000
|
heap
|
page read and write
|
||
28E6000
|
trusted library allocation
|
page read and write
|
||
C30000
|
trusted library allocation
|
page read and write
|
||
3437000
|
trusted library allocation
|
page read and write
|
||
1DF49BD9000
|
heap
|
page read and write
|
||
1C648000
|
heap
|
page read and write
|
||
1B3F5000
|
heap
|
page read and write
|
||
25B233D9000
|
heap
|
page read and write
|
||
1F79E075000
|
heap
|
page read and write
|
||
80E000
|
heap
|
page read and write
|
||
127E1000
|
trusted library allocation
|
page read and write
|
||
7FFF60E34000
|
trusted library allocation
|
page read and write
|
||
1A360BB0000
|
heap
|
page read and write
|
||
7FFF60EF0000
|
trusted library allocation
|
page read and write
|
||
268D000
|
trusted library allocation
|
page read and write
|
||
2800000
|
trusted library allocation
|
page read and write
|
||
12CA000
|
stack
|
page read and write
|
||
7FFF60FA5000
|
trusted library allocation
|
page read and write
|
||
137D29C0000
|
heap
|
page read and write
|
||
1C1B9000
|
heap
|
page read and write
|
||
1740000
|
heap
|
page read and write
|
||
2979000
|
trusted library allocation
|
page read and write
|
||
2F11000
|
trusted library allocation
|
page read and write
|
||
2863000
|
trusted library allocation
|
page read and write
|
||
7FFF60E5D000
|
trusted library allocation
|
page execute and read and write
|
||
D00000
|
unkown
|
page readonly
|
||
38B2000
|
trusted library allocation
|
page read and write
|
||
990000
|
trusted library allocation
|
page read and write
|
||
1CEE75E0000
|
heap
|
page read and write
|
||
1CEE71E0000
|
heap
|
page read and write
|
||
284F000
|
trusted library allocation
|
page read and write
|
||
1C4599C0000
|
heap
|
page read and write
|
||
7FFF6104B000
|
trusted library allocation
|
page read and write
|
||
3500000
|
trusted library allocation
|
page read and write
|
||
293D1AB9000
|
heap
|
page read and write
|
||
BEE000
|
stack
|
page read and write
|
||
31A2000
|
trusted library allocation
|
page read and write
|
||
1C010000
|
heap
|
page read and write
|
||
2F89000
|
trusted library allocation
|
page read and write
|
||
906BFE000
|
stack
|
page read and write
|
||
7FFF60FD9000
|
trusted library allocation
|
page read and write
|
||
1B6E9000
|
stack
|
page read and write
|
||
14AD000
|
heap
|
page read and write
|
||
35DB000
|
trusted library allocation
|
page read and write
|
||
2025B848000
|
heap
|
page read and write
|
||
2968000
|
trusted library allocation
|
page read and write
|
||
2E90000
|
trusted library allocation
|
page read and write
|
||
12C3000
|
heap
|
page read and write
|
||
26D8000
|
trusted library allocation
|
page read and write
|
||
3080000
|
trusted library allocation
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
1B9A1000
|
heap
|
page read and write
|
||
7FFF60E6B000
|
trusted library allocation
|
page execute and read and write
|
||
54492FE000
|
stack
|
page read and write
|
||
1B177000
|
heap
|
page read and write
|
||
1D44CF5B000
|
heap
|
page read and write
|
||
2A01000
|
trusted library allocation
|
page read and write
|
||
7FFF60EB0000
|
trusted library allocation
|
page read and write
|
||
2BE0000
|
trusted library allocation
|
page read and write
|
||
37DC000
|
trusted library allocation
|
page read and write
|
||
3118000
|
trusted library allocation
|
page read and write
|
||
2672000
|
trusted library allocation
|
page read and write
|
||
3037000
|
trusted library allocation
|
page read and write
|
||
12CA1000
|
trusted library allocation
|
page read and write
|
||
1423000
|
heap
|
page read and write
|
||
ED9000
|
heap
|
page read and write
|
||
3127000
|
trusted library allocation
|
page read and write
|
||
7FFF60E5D000
|
trusted library allocation
|
page execute and read and write
|
||
C10000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
3614000
|
trusted library allocation
|
page read and write
|
||
2779000
|
trusted library allocation
|
page read and write
|
||
25B23154000
|
heap
|
page read and write
|
||
1F4D2714000
|
heap
|
page read and write
|
||
376A000
|
trusted library allocation
|
page read and write
|
||
1C4598E6000
|
heap
|
page read and write
|
||
126F8000
|
trusted library allocation
|
page read and write
|
||
1AC7D000
|
stack
|
page read and write
|
||
1C029000
|
heap
|
page read and write
|
||
348F000
|
trusted library allocation
|
page read and write
|
||
2E14000
|
trusted library allocation
|
page read and write
|
||
7FFF61067000
|
trusted library allocation
|
page read and write
|
||
271C000
|
trusted library allocation
|
page read and write
|
||
2DE1000
|
trusted library allocation
|
page read and write
|
||
338B000
|
trusted library allocation
|
page read and write
|
||
7FFF60E5D000
|
trusted library allocation
|
page execute and read and write
|
||
262135F9000
|
heap
|
page read and write
|
||
2BA15A45000
|
heap
|
page read and write
|
||
2182E7C0000
|
heap
|
page read and write
|
||
2788000
|
trusted library allocation
|
page read and write
|
||
7FFF60E44000
|
trusted library allocation
|
page read and write
|
||
374C000
|
trusted library allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
270B000
|
trusted library allocation
|
page read and write
|
||
1CEE75D9000
|
heap
|
page read and write
|
||
1D042FF000
|
unkown
|
page read and write
|
||
1B31B000
|
heap
|
page read and write
|
||
1B93F000
|
heap
|
page read and write
|
||
1C044000
|
heap
|
page read and write
|
||
2E01000
|
trusted library allocation
|
page read and write
|
||
1F79DE00000
|
heap
|
page read and write
|
||
27D8000
|
trusted library allocation
|
page read and write
|
||
2E03000
|
trusted library allocation
|
page read and write
|
||
3250000
|
trusted library allocation
|
page read and write
|
||
2F36000
|
trusted library allocation
|
page read and write
|
||
32DB000
|
trusted library allocation
|
page read and write
|
||
2A0E000
|
trusted library allocation
|
page read and write
|
||
2BC0000
|
trusted library allocation
|
page read and write
|
||
3061000
|
trusted library allocation
|
page read and write
|
||
1BD4E000
|
heap
|
page read and write
|
||
2025BAF0000
|
heap
|
page read and write
|
||
27FC000
|
trusted library allocation
|
page read and write
|
||
2692000
|
trusted library allocation
|
page read and write
|
||
1DF49BD0000
|
heap
|
page read and write
|
||
3877000
|
trusted library allocation
|
page read and write
|
||
72AA6FC000
|
stack
|
page read and write
|
||
1C4AE000
|
stack
|
page read and write
|
||
1BF26000
|
heap
|
page read and write
|
||
7FFF60EDC000
|
trusted library allocation
|
page execute and read and write
|
||
3597000
|
trusted library allocation
|
page read and write
|
||
2698000
|
trusted library allocation
|
page read and write
|
||
2676000
|
trusted library allocation
|
page read and write
|
||
25BD000
|
trusted library allocation
|
page read and write
|
||
2830000
|
trusted library allocation
|
page read and write
|
||
1B3E4000
|
heap
|
page read and write
|
||
3489000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
trusted library allocation
|
page read and write
|
||
284F000
|
trusted library allocation
|
page read and write
|
||
E45000
|
heap
|
page read and write
|
||
270F000
|
trusted library allocation
|
page read and write
|
||
BDCBFF000
|
stack
|
page read and write
|
||
2652000
|
trusted library allocation
|
page read and write
|
||
2F00000
|
heap
|
page execute and read and write
|
||
261D000
|
trusted library allocation
|
page read and write
|
||
1C8807C0000
|
heap
|
page read and write
|
||
7FFF60E30000
|
trusted library allocation
|
page read and write
|
||
3329000
|
trusted library allocation
|
page read and write
|
||
3190000
|
trusted library allocation
|
page read and write
|
||
2495EC43000
|
heap
|
page read and write
|
||
2EB4000
|
trusted library allocation
|
page read and write
|
||
2F2D000
|
trusted library allocation
|
page read and write
|
||
7FFF60EFC000
|
trusted library allocation
|
page execute and read and write
|
||
277B000
|
trusted library allocation
|
page read and write
|
||
349E000
|
trusted library allocation
|
page read and write
|
||
1302000
|
heap
|
page read and write
|
||
274D000
|
trusted library allocation
|
page read and write
|
||
316E000
|
trusted library allocation
|
page read and write
|
||
1BD73000
|
heap
|
page read and write
|
||
2878000
|
trusted library allocation
|
page read and write
|
||
1B6CE000
|
stack
|
page read and write
|
||
31D2000
|
trusted library allocation
|
page read and write
|
||
38D5000
|
trusted library allocation
|
page read and write
|
||
3192000
|
trusted library allocation
|
page read and write
|
||
308A000
|
trusted library allocation
|
page read and write
|
||
3442000
|
trusted library allocation
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
1319F000
|
trusted library allocation
|
page read and write
|
||
3555000
|
trusted library allocation
|
page read and write
|
||
1C0A2000
|
heap
|
page read and write
|
||
1D630000
|
heap
|
page read and write
|
||
7FFF61090000
|
trusted library allocation
|
page read and write
|
||
7FFF60E14000
|
trusted library allocation
|
page read and write
|
||
93B0BFE000
|
stack
|
page read and write
|
||
2640000
|
heap
|
page execute and read and write
|
||
316B000
|
trusted library allocation
|
page read and write
|
||
21ECBFF000
|
unkown
|
page read and write
|
||
25B2313B000
|
heap
|
page read and write
|
||
320A000
|
trusted library allocation
|
page read and write
|
||
327F000
|
trusted library allocation
|
page read and write
|
||
37B9000
|
trusted library allocation
|
page read and write
|
||
137D2B3B000
|
heap
|
page read and write
|
||
2F8D000
|
trusted library allocation
|
page read and write
|
||
2BA158E0000
|
heap
|
page read and write
|
||
7FFF61020000
|
trusted library allocation
|
page read and write
|
||
1B2FA000
|
heap
|
page read and write
|
||
2842000
|
trusted library allocation
|
page read and write
|
||
1B7F2000
|
heap
|
page read and write
|
||
14E5000
|
heap
|
page read and write
|
||
28F8000
|
trusted library allocation
|
page read and write
|
||
1E06F000
|
heap
|
page read and write
|
||
16FE000
|
stack
|
page read and write
|
||
25BB000
|
trusted library allocation
|
page read and write
|
||
271F000
|
trusted library allocation
|
page read and write
|
||
2F74000
|
trusted library allocation
|
page read and write
|
||
2CF0000
|
trusted library allocation
|
page read and write
|
||
1B77F000
|
stack
|
page read and write
|
||
7FFF61020000
|
trusted library allocation
|
page execute and read and write
|
||
2B80000
|
heap
|
page read and write
|
||
762000
|
unkown
|
page readonly
|
||
14FE000
|
stack
|
page read and write
|
||
1BE60000
|
heap
|
page read and write
|
||
3138000
|
trusted library allocation
|
page read and write
|
||
2DD4000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
1C000000
|
heap
|
page read and write
|
||
317D000
|
trusted library allocation
|
page read and write
|
||
368D000
|
trusted library allocation
|
page read and write
|
||
1B2C2000
|
heap
|
page read and write
|
||
3533000
|
trusted library allocation
|
page read and write
|
||
268B000
|
trusted library allocation
|
page read and write
|
||
293D1960000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
7FFF60ED0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFF60E7C000
|
trusted library allocation
|
page execute and read and write
|
||
14A2000
|
heap
|
page read and write
|
||
24369A30000
|
heap
|
page read and write
|
||
7FFF60EF6000
|
trusted library allocation
|
page read and write
|
||
2025BA10000
|
heap
|
page read and write
|
||
2833000
|
trusted library allocation
|
page read and write
|
||
301F000
|
trusted library allocation
|
page read and write
|
||
1B8D6000
|
heap
|
page read and write
|
||
3303000
|
trusted library allocation
|
page read and write
|
||
2587000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
1B790000
|
heap
|
page read and write
|
||
1F79DE26000
|
heap
|
page read and write
|
||
28AE000
|
trusted library allocation
|
page read and write
|
||
92B72FC000
|
stack
|
page read and write
|
||
7FFF60E5B000
|
trusted library allocation
|
page execute and read and write
|
||
D3C000
|
heap
|
page read and write
|
||
1D80C000
|
heap
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
1314000
|
stack
|
page read and write
|
||
27C3000
|
trusted library allocation
|
page read and write
|
||
1F79DE24000
|
heap
|
page read and write
|
||
7FFF61070000
|
trusted library allocation
|
page read and write
|
||
7FFF60F56000
|
trusted library allocation
|
page execute and read and write
|
||
A5D000
|
heap
|
page read and write
|
||
25AF000
|
trusted library allocation
|
page read and write
|
||
896000
|
heap
|
page read and write
|
||
137D2B58000
|
heap
|
page read and write
|
||
25DD000
|
trusted library allocation
|
page read and write
|
||
1BD6A000
|
heap
|
page read and write
|
||
2495EED5000
|
heap
|
page read and write
|
||
2A76000
|
trusted library allocation
|
page read and write
|
||
296C000
|
trusted library allocation
|
page read and write
|
||
2025B780000
|
heap
|
page read and write
|
||
A35000
|
heap
|
page read and write
|
||
25D9000
|
trusted library allocation
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
F4056FF000
|
stack
|
page read and write
|
||
1F4D2540000
|
heap
|
page read and write
|
||
7FFF60FE0000
|
trusted library allocation
|
page read and write
|
||
1D44D120000
|
heap
|
page read and write
|
||
348D000
|
trusted library allocation
|
page read and write
|
||
32D4000
|
trusted library allocation
|
page read and write
|
||
1BD20000
|
heap
|
page read and write
|
||
291C000
|
trusted library allocation
|
page read and write
|
||
3147000
|
trusted library allocation
|
page read and write
|
||
3426000
|
trusted library allocation
|
page read and write
|
||
11CA000
|
stack
|
page read and write
|
||
2621000
|
trusted library allocation
|
page read and write
|
||
17B4CF60000
|
heap
|
page read and write
|
||
1F4000
|
stack
|
page read and write
|
||
319E000
|
trusted library allocation
|
page read and write
|
||
3015000
|
trusted library allocation
|
page read and write
|
||
2E1F000
|
trusted library allocation
|
page read and write
|
||
2755000
|
trusted library allocation
|
page read and write
|
||
1BF3D000
|
heap
|
page read and write
|
||
7FFF61030000
|
trusted library allocation
|
page read and write
|
||
27B9000
|
trusted library allocation
|
page read and write
|
||
270C000
|
trusted library allocation
|
page read and write
|
||
2785000
|
trusted library allocation
|
page read and write
|
||
2ED0000
|
trusted library allocation
|
page read and write
|
||
30AC000
|
trusted library allocation
|
page read and write
|
||
25B7000
|
trusted library allocation
|
page read and write
|
||
2BD9000
|
heap
|
page read and write
|
||
1CB496EB000
|
heap
|
page read and write
|
||
A852F3B000
|
stack
|
page read and write
|
||
7FFF60E2D000
|
trusted library allocation
|
page execute and read and write
|
||
2EA4000
|
trusted library allocation
|
page read and write
|
||
1F4D2860000
|
heap
|
page read and write
|
||
1B962000
|
heap
|
page read and write
|
||
2581000
|
trusted library allocation
|
page read and write
|
||
1CB4E000
|
stack
|
page read and write
|
||
341E000
|
trusted library allocation
|
page read and write
|
||
1D683000
|
heap
|
page read and write
|
||
7FFF60FC5000
|
trusted library allocation
|
page read and write
|
||
2E21000
|
trusted library allocation
|
page read and write
|
||
29F0000
|
trusted library allocation
|
page read and write
|
||
1D44CF50000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
29EE000
|
trusted library allocation
|
page read and write
|
||
7FFF60E3D000
|
trusted library allocation
|
page execute and read and write
|
||
32EB000
|
trusted library allocation
|
page read and write
|
||
2915000
|
trusted library allocation
|
page read and write
|
||
335E000
|
trusted library allocation
|
page read and write
|
||
1B996000
|
heap
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
7FFF60FB0000
|
trusted library allocation
|
page read and write
|
||
1011000
|
heap
|
page read and write
|
||
2552000
|
trusted library allocation
|
page read and write
|
||
2775000
|
trusted library allocation
|
page read and write
|
||
3052000
|
trusted library allocation
|
page read and write
|
||
816000
|
unkown
|
page readonly
|
||
304E000
|
stack
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
2610000
|
trusted library allocation
|
page read and write
|
||
7FFF60F06000
|
trusted library allocation
|
page execute and read and write
|
||
21FE9677000
|
heap
|
page read and write
|
||
2F5D000
|
trusted library allocation
|
page read and write
|
||
1C1D0000
|
heap
|
page read and write
|
||
2867000
|
trusted library allocation
|
page read and write
|
||
1D844000
|
heap
|
page read and write
|
||
1C880AC0000
|
heap
|
page read and write
|
||
2929000
|
trusted library allocation
|
page read and write
|
||
37C4000
|
trusted library allocation
|
page read and write
|
||
2953000
|
trusted library allocation
|
page read and write
|
||
32C3000
|
trusted library allocation
|
page read and write
|
||
2E8E000
|
trusted library allocation
|
page read and write
|
||
2E3F000
|
trusted library allocation
|
page read and write
|
||
276D000
|
trusted library allocation
|
page read and write
|
||
A9E000
|
stack
|
page read and write
|
||
7FFF60E4D000
|
trusted library allocation
|
page execute and read and write
|
||
AE2000
|
heap
|
page read and write
|
||
13151000
|
trusted library allocation
|
page read and write
|
||
2912000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
trusted library allocation
|
page read and write
|
||
2EF0000
|
trusted library allocation
|
page read and write
|
||
7FFF60EE0000
|
trusted library allocation
|
page execute and read and write
|
||
3757000
|
trusted library allocation
|
page read and write
|
||
E367BFF000
|
stack
|
page read and write
|
||
30CE000
|
trusted library allocation
|
page read and write
|
||
35C8000
|
trusted library allocation
|
page read and write
|
||
2182E520000
|
heap
|
page read and write
|
||
12BF000
|
heap
|
page read and write
|
||
1B2C0000
|
heap
|
page read and write
|
||
2FDE000
|
trusted library allocation
|
page read and write
|
||
347A000
|
trusted library allocation
|
page read and write
|
||
1D84A000
|
heap
|
page read and write
|
||
21FE9560000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
28BB000
|
trusted library allocation
|
page read and write
|
||
27BD000
|
trusted library allocation
|
page read and write
|
||
300E000
|
trusted library allocation
|
page read and write
|
||
2FE5000
|
trusted library allocation
|
page read and write
|
||
1B9BA000
|
heap
|
page read and write
|
||
1D841000
|
heap
|
page read and write
|
||
1CB494A0000
|
heap
|
page read and write
|
||
2723000
|
trusted library allocation
|
page read and write
|
||
2931000
|
trusted library allocation
|
page read and write
|
||
12F11000
|
trusted library allocation
|
page read and write
|
||
2730000
|
trusted library allocation
|
page read and write
|
||
1580000
|
heap
|
page read and write
|
||
507971B000
|
stack
|
page read and write
|
||
31DC000
|
trusted library allocation
|
page read and write
|
||
1BFF8000
|
heap
|
page read and write
|
||
33FE000
|
trusted library allocation
|
page read and write
|
||
28A9000
|
trusted library allocation
|
page read and write
|
||
1296000
|
heap
|
page read and write
|
||
7FFF60E4D000
|
trusted library allocation
|
page execute and read and write
|
||
6CD3AFE000
|
unkown
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
26F5000
|
trusted library allocation
|
page read and write
|
||
1B423000
|
heap
|
page read and write
|
||
293D1AB9000
|
heap
|
page read and write
|
||
286F000
|
trusted library allocation
|
page read and write
|
||
1DF49BD9000
|
heap
|
page read and write
|
||
288D000
|
trusted library allocation
|
page read and write
|
||
3219000
|
trusted library allocation
|
page read and write
|
||
F5A000
|
stack
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
273E000
|
trusted library allocation
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
1B3B8000
|
heap
|
page read and write
|
||
2E81000
|
trusted library allocation
|
page read and write
|
||
2817000
|
trusted library allocation
|
page read and write
|
||
1B42D000
|
heap
|
page read and write
|
||
326E000
|
trusted library allocation
|
page read and write
|
||
3539000
|
trusted library allocation
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
7FFF60EE6000
|
trusted library allocation
|
page execute and read and write
|
||
3048000
|
trusted library allocation
|
page read and write
|
||
2801000
|
trusted library allocation
|
page read and write
|
||
1910000
|
heap
|
page read and write
|
||
13DE000
|
heap
|
page read and write
|
||
7FFF60E42000
|
trusted library allocation
|
page read and write
|
||
2566000
|
trusted library allocation
|
page read and write
|
||
BFE000
|
heap
|
page read and write
|
||
280E000
|
trusted library allocation
|
page read and write
|
||
27F0000
|
trusted library allocation
|
page read and write
|
||
BDCAFF000
|
unkown
|
page read and write
|
||
3316000
|
trusted library allocation
|
page read and write
|
||
3790000
|
trusted library allocation
|
page read and write
|
||
2656000
|
trusted library allocation
|
page read and write
|
||
315B000
|
trusted library allocation
|
page read and write
|
||
1B2AF000
|
stack
|
page read and write
|
||
2846000
|
trusted library allocation
|
page read and write
|
||
1BEAF000
|
stack
|
page read and write
|
||
7FFF60F50000
|
trusted library allocation
|
page execute and read and write
|
||
3114000
|
trusted library allocation
|
page read and write
|
||
32E9000
|
trusted library allocation
|
page read and write
|
||
296F000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
unkown
|
page readonly
|
||
2741000
|
trusted library allocation
|
page read and write
|
||
30B0000
|
trusted library allocation
|
page read and write
|
||
342F000
|
trusted library allocation
|
page read and write
|
||
7FFF60FE5000
|
trusted library allocation
|
page read and write
|
||
2FE3000
|
trusted library allocation
|
page read and write
|
||
1BCB9000
|
stack
|
page read and write
|
||
7FFF60F5A000
|
trusted library allocation
|
page execute and read and write
|
||
2824000
|
trusted library allocation
|
page read and write
|
||
18849D10000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
24369ABB000
|
heap
|
page read and write
|
||
2025B868000
|
heap
|
page read and write
|
||
2FD3000
|
trusted library allocation
|
page read and write
|
||
1F79E079000
|
heap
|
page read and write
|
||
2835000
|
trusted library allocation
|
page read and write
|
||
34BA000
|
trusted library allocation
|
page read and write
|
||
24369C80000
|
heap
|
page read and write
|
||
2E5B000
|
trusted library allocation
|
page read and write
|
||
1AFFE000
|
stack
|
page read and write
|
||
2DCC000
|
trusted library allocation
|
page read and write
|
||
1AF40000
|
trusted library allocation
|
page read and write
|
||
3661BFF000
|
stack
|
page read and write
|
||
1B2DB000
|
heap
|
page read and write
|
||
287A000
|
trusted library allocation
|
page read and write
|
||
83B000
|
heap
|
page read and write
|
||
2928000
|
trusted library allocation
|
page read and write
|
||
30F0000
|
trusted library allocation
|
page read and write
|
||
7F8000
|
heap
|
page read and write
|
||
7FFF60E53000
|
trusted library allocation
|
page read and write
|
||
1E160000
|
heap
|
page read and write
|
||
35EE000
|
trusted library allocation
|
page read and write
|
||
7FFF60F60000
|
trusted library allocation
|
page execute and read and write
|
||
A24000
|
heap
|
page read and write
|
||
E3678FB000
|
stack
|
page read and write
|
||
F93000
|
heap
|
page read and write
|
||
1B8D0000
|
heap
|
page read and write
|
||
1B96E000
|
stack
|
page read and write
|
||
2854000
|
trusted library allocation
|
page read and write
|
||
31E8000
|
trusted library allocation
|
page read and write
|
||
3507000
|
trusted library allocation
|
page read and write
|
||
255F000
|
trusted library allocation
|
page read and write
|
||
34E4000
|
trusted library allocation
|
page read and write
|
||
28BA000
|
trusted library allocation
|
page read and write
|
||
7FFF60E54000
|
trusted library allocation
|
page read and write
|
||
2260000
|
trusted library allocation
|
page read and write
|
||
1C94F000
|
stack
|
page read and write
|
||
2F4D000
|
trusted library allocation
|
page read and write
|
||
1BD46000
|
heap
|
page read and write
|
||
2674000
|
trusted library allocation
|
page read and write
|
||
2957000
|
trusted library allocation
|
page read and write
|
||
F4054FF000
|
unkown
|
page read and write
|
||
7FFF60E6D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFF60E03000
|
trusted library allocation
|
page execute and read and write
|
||
2745000
|
trusted library allocation
|
page read and write
|
||
2025B867000
|
heap
|
page read and write
|
||
2FA0000
|
trusted library allocation
|
page read and write
|
||
27F2000
|
trusted library allocation
|
page read and write
|
||
260C000
|
trusted library allocation
|
page read and write
|
||
1D44CF78000
|
heap
|
page read and write
|
||
3136000
|
trusted library allocation
|
page read and write
|
||
262135F5000
|
heap
|
page read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
2550000
|
trusted library allocation
|
page read and write
|
||
1B3E6000
|
heap
|
page read and write
|
||
2025B820000
|
heap
|
page read and write
|
||
1A360CC5000
|
heap
|
page read and write
|
||
3595000
|
trusted library allocation
|
page read and write
|
||
1BFD0000
|
heap
|
page read and write
|
||
1C025000
|
heap
|
page read and write
|
||
2F8B000
|
trusted library allocation
|
page read and write
|
||
2621363B000
|
heap
|
page read and write
|
||
275E000
|
trusted library allocation
|
page read and write
|
||
273F000
|
trusted library allocation
|
page read and write
|
||
26B8000
|
trusted library allocation
|
page read and write
|
||
7FFF60E6C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFF60FE5000
|
trusted library allocation
|
page read and write
|
||
28C2000
|
trusted library allocation
|
page read and write
|
||
2025B840000
|
heap
|
page read and write
|
||
3021000
|
trusted library allocation
|
page read and write
|
||
13F2000
|
heap
|
page read and write
|
||
2E37000
|
trusted library allocation
|
page read and write
|
||
29A8000
|
trusted library allocation
|
page read and write
|
||
26E0000
|
heap
|
page execute and read and write
|
||
2FCB000
|
trusted library allocation
|
page read and write
|
||
27B0000
|
trusted library allocation
|
page read and write
|
||
606000
|
heap
|
page read and write
|
||
2DE3000
|
trusted library allocation
|
page read and write
|
||
12F24000
|
trusted library allocation
|
page read and write
|
||
262137A0000
|
heap
|
page read and write
|
||
2767000
|
trusted library allocation
|
page read and write
|
||
26E7000
|
trusted library allocation
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
7FFF61000000
|
trusted library allocation
|
page read and write
|
||
2E94000
|
trusted library allocation
|
page read and write
|
||
2843000
|
trusted library allocation
|
page read and write
|
||
25B1000
|
trusted library allocation
|
page read and write
|
||
1B9BB000
|
heap
|
page read and write
|
||
259F000
|
trusted library allocation
|
page read and write
|
||
137D2C30000
|
heap
|
page read and write
|
||
34BC000
|
trusted library allocation
|
page read and write
|
||
36E64FF000
|
stack
|
page read and write
|
||
7FF49AA00000
|
trusted library allocation
|
page execute and read and write
|
||
287E000
|
trusted library allocation
|
page read and write
|
||
2F9E000
|
trusted library allocation
|
page read and write
|
||
2182EA09000
|
heap
|
page read and write
|
||
1CB50000
|
unkown
|
page readonly
|
||
2F47000
|
trusted library allocation
|
page read and write
|
||
17B4CB20000
|
heap
|
page read and write
|
||
1B2BE000
|
stack
|
page read and write
|
||
7FFF60E2D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFF610B0000
|
trusted library allocation
|
page execute and read and write
|
||
335C000
|
trusted library allocation
|
page read and write
|
||
1B99A000
|
heap
|
page read and write
|
||
12FB1000
|
trusted library allocation
|
page read and write
|
||
290F000
|
trusted library allocation
|
page read and write
|
||
2851000
|
trusted library allocation
|
page read and write
|
||
31AF000
|
trusted library allocation
|
page read and write
|
||
1B7CB000
|
stack
|
page read and write
|
||
2632000
|
trusted library allocation
|
page read and write
|
||
28F3000
|
trusted library allocation
|
page read and write
|
||
3001000
|
trusted library allocation
|
page read and write
|
||
37C9000
|
trusted library allocation
|
page read and write
|
||
7FFF60FE7000
|
trusted library allocation
|
page read and write
|
||
9FC000
|
heap
|
page read and write
|
||
3495000
|
trusted library allocation
|
page read and write
|
||
3170000
|
trusted library allocation
|
page read and write
|
||
18849DBB000
|
heap
|
page read and write
|
||
2A16000
|
trusted library allocation
|
page read and write
|
||
7FFF60E13000
|
trusted library allocation
|
page read and write
|
||
2495EED9000
|
heap
|
page read and write
|
||
2922000
|
trusted library allocation
|
page read and write
|
||
33FC000
|
trusted library allocation
|
page read and write
|
||
21ECDFF000
|
stack
|
page read and write
|
||
254C000
|
trusted library allocation
|
page read and write
|
||
1C096000
|
heap
|
page read and write
|
||
3762000
|
trusted library allocation
|
page read and write
|
||
647000
|
heap
|
page read and write
|
||
27CC000
|
trusted library allocation
|
page read and write
|
||
1D661000
|
heap
|
page read and write
|
||
1A360CC9000
|
heap
|
page read and write
|
||
7FFF60E3D000
|
trusted library allocation
|
page execute and read and write
|
||
31C1000
|
trusted library allocation
|
page read and write
|
||
33E1000
|
trusted library allocation
|
page read and write
|
||
2769000
|
trusted library allocation
|
page read and write
|
||
28CB000
|
trusted library allocation
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
37FB000
|
trusted library allocation
|
page read and write
|
||
12DCB000
|
trusted library allocation
|
page read and write
|
||
3283000
|
trusted library allocation
|
page read and write
|
||
34EF000
|
trusted library allocation
|
page read and write
|
||
1E3ED000
|
heap
|
page read and write
|
||
7FFF60F16000
|
trusted library allocation
|
page execute and read and write
|
||
18849CA0000
|
heap
|
page read and write
|
||
3181000
|
trusted library allocation
|
page read and write
|
||
44BD4FF000
|
unkown
|
page read and write
|
||
3189000
|
trusted library allocation
|
page read and write
|
||
1F4D2680000
|
heap
|
page read and write
|
||
44BD18C000
|
stack
|
page read and write
|
||
3287000
|
trusted library allocation
|
page read and write
|
||
31BF000
|
trusted library allocation
|
page read and write
|
||
29BF000
|
trusted library allocation
|
page read and write
|
||
7FFF610C0000
|
trusted library allocation
|
page read and write
|
||
6D6000
|
heap
|
page read and write
|
||
28BC000
|
trusted library allocation
|
page read and write
|
||
2A12000
|
trusted library allocation
|
page read and write
|
||
2E8A000
|
trusted library allocation
|
page read and write
|
||
2E5F000
|
trusted library allocation
|
page read and write
|
||
29DF000
|
trusted library allocation
|
page read and write
|
||
32C5000
|
trusted library allocation
|
page read and write
|
||
31EC000
|
trusted library allocation
|
page read and write
|
||
2280000
|
trusted library allocation
|
page read and write
|
||
2B7E000
|
stack
|
page read and write
|
||
2F1A000
|
trusted library allocation
|
page read and write
|
||
2720000
|
trusted library allocation
|
page read and write
|
||
288D000
|
trusted library allocation
|
page read and write
|
||
2F25000
|
trusted library allocation
|
page read and write
|
||
7FFF60FC2000
|
trusted library allocation
|
page read and write
|
||
1CB495E0000
|
heap
|
page read and write
|
||
1C8809E4000
|
heap
|
page read and write
|
||
293D1AB0000
|
heap
|
page read and write
|
||
1BFD2000
|
heap
|
page read and write
|
||
38DA000
|
trusted library allocation
|
page read and write
|
||
12A5000
|
heap
|
page read and write
|
||
325B000
|
trusted library allocation
|
page read and write
|
||
54491FF000
|
unkown
|
page read and write
|
||
2DD0000
|
trusted library allocation
|
page read and write
|
||
330B000
|
trusted library allocation
|
page read and write
|
||
2DAE000
|
stack
|
page read and write
|
||
1E182000
|
heap
|
page read and write
|
||
24369E69000
|
heap
|
page read and write
|
||
2814000
|
trusted library allocation
|
page read and write
|
||
26B6000
|
trusted library allocation
|
page read and write
|
||
F91000
|
heap
|
page read and write
|
||
1C44C000
|
stack
|
page read and write
|
||
25BF000
|
trusted library allocation
|
page read and write
|
||
1BD80000
|
heap
|
page execute and read and write
|
||
3531000
|
trusted library allocation
|
page read and write
|
||
30EE000
|
trusted library allocation
|
page read and write
|
||
12CE000
|
stack
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
276F000
|
trusted library allocation
|
page read and write
|
||
1F79DF00000
|
heap
|
page read and write
|
||
1BDE8000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
1BB40000
|
heap
|
page execute and read and write
|
||
26F9000
|
trusted library allocation
|
page read and write
|
||
21FE9650000
|
heap
|
page read and write
|
||
17B4CDB0000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
1F79E079000
|
heap
|
page read and write
|
||
36E62FC000
|
stack
|
page read and write
|
||
306A000
|
trusted library allocation
|
page read and write
|
||
274B000
|
trusted library allocation
|
page read and write
|
||
7FFF60F16000
|
trusted library allocation
|
page execute and read and write
|
||
293D1690000
|
heap
|
page read and write
|
||
2E8C000
|
trusted library allocation
|
page read and write
|
||
7FFF60FB9000
|
trusted library allocation
|
page read and write
|
||
322E000
|
trusted library allocation
|
page read and write
|
||
293D1620000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
2FF4000
|
trusted library allocation
|
page read and write
|
||
1C5D0000
|
heap
|
page read and write
|
||
2670000
|
trusted library allocation
|
page read and write
|
||
29CE000
|
trusted library allocation
|
page read and write
|
||
7FFF60FD0000
|
trusted library allocation
|
page read and write
|
||
2777000
|
trusted library allocation
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
F7B000
|
heap
|
page read and write
|
||
38AB000
|
trusted library allocation
|
page read and write
|
||
2FF1000
|
trusted library allocation
|
page read and write
|
||
12DB8000
|
trusted library allocation
|
page read and write
|
||
1884A070000
|
heap
|
page read and write
|
||
25A9000
|
trusted library allocation
|
page read and write
|
||
137D2CA5000
|
heap
|
page read and write
|
||
3838000
|
trusted library allocation
|
page read and write
|
||
2E50000
|
trusted library allocation
|
page read and write
|
||
BD05FFF000
|
unkown
|
page read and write
|
||
1C88A000
|
stack
|
page read and write
|
||
2DF7000
|
trusted library allocation
|
page read and write
|
||
335F000
|
stack
|
page read and write
|
||
293D18D0000
|
heap
|
page read and write
|
||
1C084000
|
heap
|
page read and write
|
||
2594000
|
trusted library allocation
|
page read and write
|
||
34A0000
|
trusted library allocation
|
page read and write
|
||
27CA000
|
trusted library allocation
|
page read and write
|
||
1AD6D000
|
stack
|
page read and write
|
||
1C5CF000
|
stack
|
page read and write
|
||
26213654000
|
heap
|
page read and write
|
||
2495EED0000
|
heap
|
page read and write
|
||
1BD65000
|
heap
|
page read and write
|
||
12EE000
|
stack
|
page read and write
|
||
C79000
|
heap
|
page read and write
|
||
C5B000
|
heap
|
page read and write
|
||
258E000
|
trusted library allocation
|
page read and write
|
||
35F0000
|
trusted library allocation
|
page read and write
|
||
A01F8FE000
|
stack
|
page read and write
|
||
3134000
|
trusted library allocation
|
page read and write
|
||
7FFF60FD0000
|
trusted library allocation
|
page read and write
|
||
3010000
|
trusted library allocation
|
page read and write
|
||
26213730000
|
heap
|
page read and write
|
||
3524000
|
trusted library allocation
|
page read and write
|
||
290B000
|
trusted library allocation
|
page read and write
|
||
12DB1000
|
trusted library allocation
|
page read and write
|
||
17B4CE20000
|
heap
|
page read and write
|
||
1BFB4000
|
heap
|
page read and write
|
||
7FFF60FD9000
|
trusted library allocation
|
page read and write
|
||
307B000
|
trusted library allocation
|
page read and write
|
||
1C1F0000
|
heap
|
page execute and read and write
|
||
1E1D1000
|
heap
|
page read and write
|
||
26C9000
|
trusted library allocation
|
page read and write
|
||
1DF498D0000
|
heap
|
page read and write
|
||
12CE000
|
heap
|
page read and write
|
||
348F000
|
trusted library allocation
|
page read and write
|
||
25F2000
|
trusted library allocation
|
page read and write
|
||
2EB6000
|
trusted library allocation
|
page read and write
|
||
7FFF60FF0000
|
trusted library allocation
|
page read and write
|
||
7FFF60FE9000
|
trusted library allocation
|
page read and write
|
||
12FC000
|
heap
|
page read and write
|
||
292B000
|
trusted library allocation
|
page read and write
|
||
1BFE7000
|
heap
|
page read and write
|
||
28B7000
|
trusted library allocation
|
page read and write
|
||
12B3000
|
heap
|
page read and write
|
||
303B000
|
trusted library allocation
|
page read and write
|
There are 2144 hidden memdumps, click here to show them.