Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Order_YK240612-01D(estimate).scr.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Order_YK240612-01D(estimate).scr.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif.pif
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif.pif:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Order_YK240612-01D(estimate).scr.pif.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Order_YK240612-01D(estimate).scr.pif.pif.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Order_YK240612-01D(estimate).scr.pif.pif.pif.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif.pif.log
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 10 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Order_YK240612-01D(estimate).scr.exe
|
"C:\Users\user\Desktop\Order_YK240612-01D(estimate).scr.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Order_YK240612-01D(estimate).scr" /t REG_SZ /F /D
"C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Order_YK240612-01D(estimate).scr" /t REG_SZ /F /D "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c Copy "C:\Users\user\Desktop\Order_YK240612-01D(estimate).scr.exe" "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Users\user\Desktop\Order_YK240612-01D(estimate).scr.exe
|
"C:\Users\user\Desktop\Order_YK240612-01D(estimate).scr.exe"
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif
|
"C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Order_YK240612-01D(estimate).scr.pif" /t REG_SZ /F
/D "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Order_YK240612-01D(estimate).scr.pif" /t REG_SZ /F /D "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c Copy "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif" "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif
|
"C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif"
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif
|
"C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Order_YK240612-01D(estimate).scr.pif" /t REG_SZ /F
/D "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Order_YK240612-01D(estimate).scr.pif" /t REG_SZ /F /D "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c Copy "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif" "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif
|
"C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif"
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif
|
"C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif"
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif
|
"C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Order_YK240612-01D(estimate).scr.pif.pif" /t REG_SZ
/F /D "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Order_YK240612-01D(estimate).scr.pif.pif" /t REG_SZ /F /D
"C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c Copy "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif" "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif
|
"C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif"
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif
|
"C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif"
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif
|
"C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Order_YK240612-01D(estimate).scr.pif.pif" /t REG_SZ
/F /D "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Order_YK240612-01D(estimate).scr.pif.pif" /t REG_SZ /F /D
"C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c Copy "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif" "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif
|
"C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif"
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif
|
"C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Order_YK240612-01D(estimate).scr.pif.pif.pif" /t REG_SZ
/F /D "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Order_YK240612-01D(estimate).scr.pif.pif.pif" /t REG_SZ
/F /D "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c Copy "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif" "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif
|
"C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif"
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif
|
"C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Order_YK240612-01D(estimate).scr.pif.pif.pif" /t REG_SZ
/F /D "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Order_YK240612-01D(estimate).scr.pif.pif.pif" /t REG_SZ
/F /D "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c Copy "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif" "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif
|
"C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif"
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif
|
"C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif"
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif
|
"C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Order_YK240612-01D(estimate).scr.pif.pif.pif.pif"
/t REG_SZ /F /D "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Order_YK240612-01D(estimate).scr.pif.pif.pif.pif" /t REG_SZ
/F /D "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c Copy "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif" "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif
|
"C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif"
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif
|
"C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Order_YK240612-01D(estimate).scr.pif.pif.pif.pif"
/t REG_SZ /F /D "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Order_YK240612-01D(estimate).scr.pif.pif.pif.pif" /t REG_SZ
/F /D "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c Copy "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif" "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif
|
"C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif"
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif
|
"C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif"
/t REG_SZ /F /D "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif.pif"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif" /t
REG_SZ /F /D "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c Copy "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif" "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif.pif"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif
|
"C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif"
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif
|
"C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif"
/t REG_SZ /F /D "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif.pif"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif" /t
REG_SZ /F /D "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c Copy "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif" "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif.pif"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif
|
"C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif"
|
||
C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif.pif
|
"C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif.pif"
/t REG_SZ /F /D "C:\Users\user\Documents\Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif.pif.pif"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 77 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
94.156.65.182
|
|||
https://s25.filetransfer.io/storage/download/FW6qSQfmbT8f
|
188.114.97.3
|
||
https://s25.filetransfer.io/storage/download/GmzXz5RU6G6l
|
188.114.96.3
|
||
https://s25.filetransfer.io/storage/download/SeZ4MLo1Yj3m
|
188.114.96.3
|
||
https://s25.filetransfer.io/storage/download/3K9dNKi56G9i
|
188.114.97.3
|
||
https://s25.filetransfer.io/storage/download/lte5DYATfEMG
|
188.114.97.3
|
||
https://s25.filetransfer.io/storage/download/wC3BrnP7dccv
|
188.114.97.3
|
||
https://filetransfer.io/data-package/tbcDkJlg/download
|
188.114.96.3
|
||
https://s25.filetransfer.io/storage/download/EckvwQHrOIHT
|
188.114.96.3
|
||
https://s25.filetransfer.io/storage/download/R2O5rB8ez9xA
|
188.114.97.3
|
||
https://s25.filetransfer.io/storage/download/z3EPFBxRGVVz
|
188.114.97.3
|
||
https://s25.filetransfer.io/storage/download/yPgxNf3KOOqM
|
188.114.97.3
|
||
http://geoplugin.net/json.gp
|
unknown
|
||
https://s25.filetransfer.io
|
unknown
|
||
http://geoplugin.net/json.gp/C
|
unknown
|
||
https://s25.filetransfer.io/storage/download/m3LxQcl7Jw9I
|
188.114.97.3
|
||
https://s25.filetransfer.io/storage/download/XOlEAbM0nRZd
|
188.114.97.3
|
||
https://s25.filetransfer.io/storage/download/hNZBHDZNFUPr
|
188.114.97.3
|
||
https://filetransfer.io
|
unknown
|
||
https://s25.filetransfer.io/storage/download/pnDmg2d0XNkK
|
188.114.97.3
|
||
https://s25.filetransfer.io/storage/download/xbIma69Dnsol
|
188.114.97.3
|
||
https://s25.filetransfer.io/storage/download/8K8OSFaJjyBE
|
188.114.97.3
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://s25.filetransfer.io/storage/download/HGTlth969vgl
|
188.114.97.3
|
||
https://s25.filetransfer.io/storage/download/gWgSDKWAxsrC
|
188.114.96.3
|
||
https://s25.filetransfer.io/storage/download/6XWH6UilIY7a
|
188.114.97.3
|
There are 16 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
206.23.85.13.in-addr.arpa
|
unknown
|
||
s25.filetransfer.io
|
188.114.96.3
|
||
filetransfer.io
|
188.114.96.3
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
94.156.65.182
|
unknown
|
Bulgaria
|
||
188.114.97.3
|
unknown
|
European Union
|
||
188.114.96.3
|
s25.filetransfer.io
|
European Union
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Order_YK240612-01D(estimate).scr
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-5FAVAX
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-5FAVAX
|
licence
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-5FAVAX
|
time
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Order_YK240612-01D(estimate).scr.pif
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Order_YK240612-01D(estimate).scr.pif.pif
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Order_YK240612-01D(estimate).scr.pif.pif.pif
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Order_YK240612-01D(estimate).scr.pif.pif.pif.pif
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Order_YK240612-01D(estimate).scr.pif.pif.pif.pif.pif
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Order_YK240612-01D(estimate)_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Order_YK240612-01D(estimate)_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Order_YK240612-01D(estimate)_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Order_YK240612-01D(estimate)_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Order_YK240612-01D(estimate)_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Order_YK240612-01D(estimate)_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Order_YK240612-01D(estimate)_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Order_YK240612-01D(estimate)_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Order_YK240612-01D(estimate)_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Order_YK240612-01D(estimate)_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Order_YK240612-01D(estimate)_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Order_YK240612-01D(estimate)_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Order_YK240612-01D(estimate)_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Order_YK240612-01D(estimate)_RASMANCS
|
FileDirectory
|
There are 14 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
10B7000
|
heap
|
page read and write
|
||
4311000
|
trusted library allocation
|
page read and write
|
||
38A8000
|
trusted library allocation
|
page read and write
|
||
B98000
|
heap
|
page read and write
|
||
BB7000
|
heap
|
page read and write
|
||
3701000
|
trusted library allocation
|
page read and write
|
||
3C59000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
F57000
|
heap
|
page read and write
|
||
3381000
|
trusted library allocation
|
page read and write
|
||
3F35000
|
trusted library allocation
|
page read and write
|
||
3E4F000
|
trusted library allocation
|
page read and write
|
||
4084000
|
trusted library allocation
|
page read and write
|
||
3BD9000
|
trusted library allocation
|
page read and write
|
||
1338000
|
heap
|
page read and write
|
||
E98000
|
heap
|
page read and write
|
||
3D31000
|
trusted library allocation
|
page read and write
|
||
3727000
|
trusted library allocation
|
page read and write
|
||
42E8000
|
trusted library allocation
|
page read and write
|
||
B68000
|
heap
|
page read and write
|
||
3979000
|
trusted library allocation
|
page read and write
|
||
C28000
|
heap
|
page read and write
|
||
BB8000
|
heap
|
page read and write
|
||
1048000
|
heap
|
page read and write
|
||
4234000
|
trusted library allocation
|
page read and write
|
||
1087000
|
heap
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
656E000
|
stack
|
page read and write
|
||
6E8E000
|
stack
|
page read and write
|
||
5500000
|
heap
|
page read and write
|
||
5800000
|
heap
|
page read and write
|
||
22ED000
|
trusted library allocation
|
page read and write
|
||
5030000
|
trusted library allocation
|
page execute and read and write
|
||
331E000
|
stack
|
page read and write
|
||
2F9B000
|
stack
|
page read and write
|
||
61EB000
|
heap
|
page read and write
|
||
5723000
|
heap
|
page read and write
|
||
6550000
|
trusted library allocation
|
page execute and read and write
|
||
4FD5000
|
trusted library allocation
|
page read and write
|
||
6DE1000
|
trusted library allocation
|
page read and write
|
||
12CE000
|
stack
|
page read and write
|
||
72EE000
|
stack
|
page read and write
|
||
2590000
|
heap
|
page read and write
|
||
5180000
|
trusted library allocation
|
page read and write
|
||
890000
|
trusted library allocation
|
page read and write
|
||
74AE000
|
stack
|
page read and write
|
||
6FE0000
|
trusted library allocation
|
page execute and read and write
|
||
4BD0000
|
trusted library allocation
|
page read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
2CBE000
|
stack
|
page read and write
|
||
5150000
|
trusted library allocation
|
page read and write
|
||
4B60000
|
heap
|
page read and write
|
||
575F000
|
trusted library allocation
|
page read and write
|
||
62BE000
|
stack
|
page read and write
|
||
3217000
|
trusted library allocation
|
page read and write
|
||
73EF000
|
stack
|
page read and write
|
||
6FE000
|
unkown
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
34DF000
|
stack
|
page read and write
|
||
44AF000
|
trusted library allocation
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
1095000
|
trusted library allocation
|
page execute and read and write
|
||
237F000
|
trusted library allocation
|
page read and write
|
||
3409000
|
trusted library allocation
|
page read and write
|
||
327E000
|
trusted library allocation
|
page read and write
|
||
42B1000
|
trusted library allocation
|
page read and write
|
||
585E000
|
stack
|
page read and write
|
||
349E000
|
stack
|
page read and write
|
||
9AE000
|
stack
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page execute and read and write
|
||
3281000
|
trusted library allocation
|
page read and write
|
||
996000
|
heap
|
page read and write
|
||
6C4E000
|
stack
|
page read and write
|
||
27B2000
|
trusted library allocation
|
page read and write
|
||
4C00000
|
trusted library allocation
|
page execute and read and write
|
||
474000
|
remote allocation
|
page execute and read and write
|
||
308F000
|
heap
|
page read and write
|
||
3650000
|
heap
|
page read and write
|
||
6C44000
|
heap
|
page read and write
|
||
321F000
|
stack
|
page read and write
|
||
2FF0000
|
trusted library allocation
|
page execute and read and write
|
||
5A2E000
|
stack
|
page read and write
|
||
67ED000
|
stack
|
page read and write
|
||
6563000
|
heap
|
page read and write
|
||
32B9000
|
trusted library allocation
|
page read and write
|
||
79D0000
|
trusted library allocation
|
page execute and read and write
|
||
4E23000
|
heap
|
page read and write
|
||
314F000
|
stack
|
page read and write
|
||
31CF000
|
stack
|
page read and write
|
||
67AE000
|
stack
|
page read and write
|
||
227F000
|
stack
|
page read and write
|
||
EBE000
|
stack
|
page read and write
|
||
5B1E000
|
stack
|
page read and write
|
||
6BD8000
|
heap
|
page read and write
|
||
2AEF000
|
stack
|
page read and write
|
||
628E000
|
stack
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
4B72000
|
trusted library allocation
|
page read and write
|
||
334F000
|
stack
|
page read and write
|
||
12F7000
|
stack
|
page read and write
|
||
54F0000
|
trusted library allocation
|
page execute and read and write
|
||
2CEF000
|
stack
|
page read and write
|
||
7290000
|
heap
|
page read and write
|
||
41D1000
|
trusted library allocation
|
page read and write
|
||
28A7000
|
trusted library allocation
|
page read and write
|
||
108E000
|
stack
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page execute and read and write
|
||
2A60000
|
heap
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page execute and read and write
|
||
1EE000
|
unkown
|
page read and write
|
||
474000
|
remote allocation
|
page execute and read and write
|
||
69CE000
|
stack
|
page read and write
|
||
B0B000
|
trusted library allocation
|
page execute and read and write
|
||
2C6E000
|
stack
|
page read and write
|
||
3070000
|
heap
|
page read and write
|
||
728C000
|
stack
|
page read and write
|
||
1010000
|
trusted library allocation
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
2462000
|
trusted library allocation
|
page read and write
|
||
680E000
|
stack
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
3869000
|
trusted library allocation
|
page read and write
|
||
6A4B000
|
heap
|
page read and write
|
||
328D000
|
trusted library allocation
|
page read and write
|
||
52F0000
|
trusted library allocation
|
page read and write
|
||
65E7000
|
heap
|
page read and write
|
||
2B7D000
|
stack
|
page read and write
|
||
1745000
|
trusted library allocation
|
page execute and read and write
|
||
3321000
|
trusted library allocation
|
page read and write
|
||
12F7000
|
stack
|
page read and write
|
||
6810000
|
heap
|
page read and write
|
||
5570000
|
trusted library allocation
|
page read and write
|
||
13D000
|
stack
|
page read and write
|
||
474000
|
remote allocation
|
page execute and read and write
|
||
5A8E000
|
stack
|
page read and write
|
||
471000
|
remote allocation
|
page execute and read and write
|
||
34C2000
|
trusted library allocation
|
page read and write
|
||
5182000
|
trusted library allocation
|
page read and write
|
||
1080000
|
trusted library allocation
|
page read and write
|
||
7450000
|
heap
|
page read and write
|
||
5E0D000
|
stack
|
page read and write
|
||
6FC000
|
stack
|
page read and write
|
||
5D4E000
|
stack
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
5950000
|
heap
|
page read and write
|
||
148A000
|
heap
|
page read and write
|
||
32AE000
|
stack
|
page read and write
|
||
2A46000
|
trusted library allocation
|
page read and write
|
||
56C0000
|
trusted library allocation
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
562D000
|
stack
|
page read and write
|
||
3A3F000
|
trusted library allocation
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
777000
|
heap
|
page read and write
|
||
6ECE000
|
trusted library allocation
|
page read and write
|
||
7231000
|
trusted library allocation
|
page read and write
|
||
653D000
|
stack
|
page read and write
|
||
572D000
|
trusted library allocation
|
page read and write
|
||
6D0E000
|
stack
|
page read and write
|
||
7380000
|
heap
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
4399000
|
trusted library allocation
|
page read and write
|
||
14A9000
|
heap
|
page read and write
|
||
60E6000
|
trusted library allocation
|
page read and write
|
||
3059000
|
trusted library allocation
|
page read and write
|
||
33DE000
|
stack
|
page read and write
|
||
65DF000
|
heap
|
page read and write
|
||
8BA000
|
trusted library allocation
|
page execute and read and write
|
||
419A000
|
trusted library allocation
|
page read and write
|
||
313E000
|
stack
|
page read and write
|
||
2C21000
|
trusted library allocation
|
page read and write
|
||
645F000
|
stack
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
805000
|
heap
|
page read and write
|
||
6C8E000
|
stack
|
page read and write
|
||
5410000
|
heap
|
page execute and read and write
|
||
50D3000
|
heap
|
page read and write
|
||
43FA000
|
trusted library allocation
|
page read and write
|
||
148B000
|
heap
|
page read and write
|
||
6480000
|
trusted library allocation
|
page execute and read and write
|
||
5F1B000
|
heap
|
page read and write
|
||
109B000
|
trusted library allocation
|
page execute and read and write
|
||
3100000
|
heap
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
44AF000
|
trusted library allocation
|
page read and write
|
||
2AC6000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
404A000
|
trusted library allocation
|
page read and write
|
||
7FC000
|
stack
|
page read and write
|
||
75AE000
|
stack
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
628E000
|
stack
|
page read and write
|
||
6516000
|
trusted library allocation
|
page read and write
|
||
3939000
|
trusted library allocation
|
page read and write
|
||
4EA0000
|
heap
|
page execute and read and write
|
||
547E000
|
stack
|
page read and write
|
||
37C0000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
63B0000
|
trusted library allocation
|
page execute and read and write
|
||
4848000
|
trusted library allocation
|
page read and write
|
||
9CB000
|
heap
|
page read and write
|
||
F20000
|
trusted library allocation
|
page read and write
|
||
1682000
|
trusted library allocation
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
2D0F000
|
unkown
|
page read and write
|
||
2C20000
|
heap
|
page read and write
|
||
1747000
|
trusted library allocation
|
page execute and read and write
|
||
6960000
|
trusted library allocation
|
page execute and read and write
|
||
471000
|
remote allocation
|
page execute and read and write
|
||
59D0000
|
trusted library allocation
|
page read and write
|
||
3660000
|
heap
|
page read and write
|
||
11CE000
|
stack
|
page read and write
|
||
3074000
|
trusted library allocation
|
page read and write
|
||
2A3F000
|
unkown
|
page read and write
|
||
138E000
|
stack
|
page read and write
|
||
144E000
|
stack
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
78C000
|
stack
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
546000
|
heap
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
6396000
|
trusted library allocation
|
page read and write
|
||
3841000
|
trusted library allocation
|
page read and write
|
||
6B24000
|
heap
|
page read and write
|
||
4950000
|
heap
|
page read and write
|
||
52B8000
|
trusted library allocation
|
page read and write
|
||
2941000
|
trusted library allocation
|
page read and write
|
||
5E6000
|
heap
|
page read and write
|
||
52FF000
|
stack
|
page read and write
|
||
4D28000
|
trusted library allocation
|
page read and write
|
||
2CAD000
|
stack
|
page read and write
|
||
62BF000
|
stack
|
page read and write
|
||
32D0000
|
heap
|
page read and write
|
||
5FCE000
|
stack
|
page read and write
|
||
F6E000
|
stack
|
page read and write
|
||
517D000
|
trusted library allocation
|
page read and write
|
||
E60000
|
trusted library allocation
|
page execute and read and write
|
||
345E000
|
stack
|
page read and write
|
||
652E000
|
trusted library allocation
|
page read and write
|
||
4049000
|
trusted library allocation
|
page read and write
|
||
3470000
|
heap
|
page read and write
|
||
BE0000
|
trusted library allocation
|
page read and write
|
||
474000
|
remote allocation
|
page execute and read and write
|
||
572E000
|
stack
|
page read and write
|
||
328E000
|
stack
|
page read and write
|
||
3064000
|
trusted library allocation
|
page read and write
|
||
4E30000
|
heap
|
page read and write
|
||
1050000
|
trusted library allocation
|
page read and write
|
||
42D9000
|
trusted library allocation
|
page read and write
|
||
723C000
|
stack
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
3281000
|
trusted library allocation
|
page read and write
|
||
2911000
|
trusted library allocation
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
690E000
|
stack
|
page read and write
|
||
78EF000
|
stack
|
page read and write
|
||
5090000
|
trusted library allocation
|
page read and write
|
||
5C8E000
|
stack
|
page read and write
|
||
8FC000
|
stack
|
page read and write
|
||
53CE000
|
stack
|
page read and write
|
||
357F000
|
trusted library allocation
|
page read and write
|
||
67BE000
|
stack
|
page read and write
|
||
950000
|
trusted library allocation
|
page read and write
|
||
10C7000
|
heap
|
page read and write
|
||
923000
|
trusted library allocation
|
page execute and read and write
|
||
B3E000
|
stack
|
page read and write
|
||
3911000
|
trusted library allocation
|
page read and write
|
||
32B1000
|
trusted library allocation
|
page read and write
|
||
147E000
|
heap
|
page read and write
|
||
345B000
|
heap
|
page read and write
|
||
642E000
|
stack
|
page read and write
|
||
AFA000
|
trusted library allocation
|
page execute and read and write
|
||
6CDC000
|
stack
|
page read and write
|
||
6C80000
|
heap
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
4FFD000
|
stack
|
page read and write
|
||
13A5000
|
heap
|
page read and write
|
||
40EF000
|
trusted library allocation
|
page read and write
|
||
17E0000
|
trusted library allocation
|
page execute and read and write
|
||
326B000
|
trusted library allocation
|
page read and write
|
||
615E000
|
stack
|
page read and write
|
||
62E000
|
stack
|
page read and write
|
||
35B0000
|
heap
|
page read and write
|
||
B05000
|
trusted library allocation
|
page execute and read and write
|
||
AC0000
|
trusted library allocation
|
page read and write
|
||
677E000
|
stack
|
page read and write
|
||
599E000
|
stack
|
page read and write
|
||
684E000
|
stack
|
page read and write
|
||
33F0000
|
heap
|
page read and write
|
||
504E000
|
stack
|
page read and write
|
||
65A0000
|
heap
|
page read and write
|
||
2BEF000
|
stack
|
page read and write
|
||
2A1E000
|
trusted library allocation
|
page read and write
|
||
4D80000
|
heap
|
page read and write
|
||
2D17000
|
trusted library allocation
|
page read and write
|
||
BCE000
|
stack
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
6D8E000
|
stack
|
page read and write
|
||
26BE000
|
stack
|
page read and write
|
||
4328000
|
trusted library allocation
|
page read and write
|
||
2DCD000
|
stack
|
page read and write
|
||
56A5000
|
trusted library allocation
|
page read and write
|
||
F37000
|
heap
|
page read and write
|
||
6940000
|
trusted library allocation
|
page read and write
|
||
769E000
|
stack
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
7FE000
|
stack
|
page read and write
|
||
555D000
|
stack
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
2A3E000
|
unkown
|
page read and write
|
||
639D000
|
heap
|
page read and write
|
||
B6B000
|
trusted library allocation
|
page execute and read and write
|
||
318E000
|
stack
|
page read and write
|
||
737E000
|
stack
|
page read and write
|
||
2A20000
|
trusted library allocation
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
658F000
|
stack
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
6F60000
|
heap
|
page read and write
|
||
6536000
|
trusted library allocation
|
page read and write
|
||
1727000
|
heap
|
page read and write
|
||
678E000
|
stack
|
page read and write
|
||
27F0000
|
heap
|
page read and write
|
||
36C1000
|
trusted library allocation
|
page read and write
|
||
18DE000
|
stack
|
page read and write
|
||
5704000
|
trusted library allocation
|
page read and write
|
||
1498000
|
heap
|
page read and write
|
||
16B0000
|
heap
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
2B3D000
|
stack
|
page read and write
|
||
4E6D000
|
stack
|
page read and write
|
||
44DF000
|
trusted library allocation
|
page read and write
|
||
3264000
|
trusted library allocation
|
page read and write
|
||
B65000
|
trusted library allocation
|
page execute and read and write
|
||
95C000
|
stack
|
page read and write
|
||
64A6000
|
trusted library allocation
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
EB0000
|
trusted library allocation
|
page read and write
|
||
6A10000
|
heap
|
page read and write
|
||
31C8000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page execute and read and write
|
||
C27000
|
heap
|
page read and write
|
||
2B1B000
|
heap
|
page read and write
|
||
EA0000
|
trusted library allocation
|
page read and write
|
||
288B000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
heap
|
page read and write
|
||
30FC000
|
stack
|
page read and write
|
||
60A2000
|
heap
|
page read and write
|
||
6504000
|
heap
|
page read and write
|
||
5750000
|
trusted library allocation
|
page read and write
|
||
589E000
|
stack
|
page read and write
|
||
1374000
|
trusted library allocation
|
page read and write
|
||
3619000
|
trusted library allocation
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
4FCC000
|
stack
|
page read and write
|
||
32BC000
|
trusted library allocation
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
22D5000
|
trusted library allocation
|
page read and write
|
||
4F0E000
|
stack
|
page read and write
|
||
64F0000
|
trusted library allocation
|
page execute and read and write
|
||
4DA0000
|
heap
|
page read and write
|
||
64F0000
|
trusted library allocation
|
page execute and read and write
|
||
58CF000
|
stack
|
page read and write
|
||
32D6000
|
heap
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
324B000
|
trusted library allocation
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
70C0000
|
heap
|
page read and write
|
||
636F000
|
stack
|
page read and write
|
||
56F0000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
trusted library allocation
|
page execute and read and write
|
||
13F0000
|
heap
|
page read and write
|
||
3260000
|
trusted library allocation
|
page read and write
|
||
6BC1000
|
heap
|
page read and write
|
||
7F360000
|
trusted library allocation
|
page execute and read and write
|
||
3528000
|
heap
|
page read and write
|
||
294E000
|
unkown
|
page read and write
|
||
5FDE000
|
stack
|
page read and write
|
||
17D0000
|
heap
|
page execute and read and write
|
||
6E50000
|
heap
|
page read and write
|
||
1650000
|
trusted library allocation
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
2BB4000
|
trusted library allocation
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
447F000
|
trusted library allocation
|
page read and write
|
||
DAE000
|
stack
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
17A000
|
stack
|
page read and write
|
||
178F000
|
stack
|
page read and write
|
||
1035000
|
trusted library allocation
|
page execute and read and write
|
||
AD4000
|
trusted library allocation
|
page read and write
|
||
356F000
|
heap
|
page read and write
|
||
E37000
|
trusted library allocation
|
page execute and read and write
|
||
2BDE000
|
stack
|
page read and write
|
||
D6E000
|
stack
|
page read and write
|
||
13F7000
|
heap
|
page read and write
|
||
36E9000
|
trusted library allocation
|
page read and write
|
||
1060000
|
trusted library allocation
|
page read and write
|
||
474000
|
remote allocation
|
page execute and read and write
|
||
306C000
|
trusted library allocation
|
page read and write
|
||
101B000
|
trusted library allocation
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
6F20000
|
heap
|
page read and write
|
||
4B06000
|
trusted library allocation
|
page read and write
|
||
5ED2000
|
heap
|
page read and write
|
||
166D000
|
trusted library allocation
|
page execute and read and write
|
||
6A34000
|
heap
|
page read and write
|
||
6C00000
|
heap
|
page read and write
|
||
2F6C000
|
heap
|
page read and write
|
||
5A1E000
|
stack
|
page read and write
|
||
534F000
|
stack
|
page read and write
|
||
4D30000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page execute and read and write
|
||
3260000
|
trusted library allocation
|
page read and write
|
||
603E000
|
stack
|
page read and write
|
||
6BD0000
|
heap
|
page read and write
|
||
6C4D000
|
stack
|
page read and write
|
||
6A30000
|
heap
|
page read and write
|
||
59A0000
|
heap
|
page read and write
|
||
5E98000
|
heap
|
page read and write
|
||
51BF000
|
trusted library allocation
|
page read and write
|
||
6C50000
|
heap
|
page read and write
|
||
6F0E000
|
stack
|
page read and write
|
||
3A8A000
|
trusted library allocation
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
47D000
|
stack
|
page read and write
|
||
31F4000
|
trusted library allocation
|
page read and write
|
||
5040000
|
heap
|
page read and write
|
||
2DCF000
|
stack
|
page read and write
|
||
779E000
|
stack
|
page read and write
|
||
33FF000
|
unkown
|
page read and write
|
||
4E20000
|
heap
|
page read and write
|
||
72B000
|
stack
|
page read and write
|
||
68CE000
|
stack
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
5E6F000
|
stack
|
page read and write
|
||
65CE000
|
stack
|
page read and write
|
||
35FF000
|
trusted library allocation
|
page read and write
|
||
2806000
|
trusted library allocation
|
page read and write
|
||
4109000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
3220000
|
direct allocation
|
page read and write
|
||
2CD1000
|
trusted library allocation
|
page read and write
|
||
5644000
|
trusted library allocation
|
page read and write
|
||
6594000
|
heap
|
page read and write
|
||
5CAE000
|
stack
|
page read and write
|
||
4C10000
|
heap
|
page execute and read and write
|
||
4FD000
|
stack
|
page read and write
|
||
70BE000
|
stack
|
page read and write
|
||
A17000
|
heap
|
page read and write
|
||
18F0000
|
trusted library allocation
|
page read and write
|
||
1031000
|
trusted library allocation
|
page read and write
|
||
306F000
|
heap
|
page read and write
|
||
316E000
|
stack
|
page read and write
|
||
3365000
|
trusted library allocation
|
page read and write
|
||
7100000
|
heap
|
page read and write
|
||
96E000
|
stack
|
page read and write
|
||
6A40000
|
trusted library allocation
|
page execute and read and write
|
||
2A4D000
|
trusted library allocation
|
page read and write
|
||
2B6E000
|
stack
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
5690000
|
trusted library allocation
|
page read and write
|
||
30FB000
|
stack
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
1042000
|
trusted library allocation
|
page read and write
|
||
2670000
|
heap
|
page read and write
|
||
7FA40000
|
trusted library allocation
|
page execute and read and write
|
||
501E000
|
stack
|
page read and write
|
||
38DF000
|
trusted library allocation
|
page read and write
|
||
9A0000
|
heap
|
page execute and read and write
|
||
5A80000
|
heap
|
page execute and read and write
|
||
5C4E000
|
stack
|
page read and write
|
||
140E000
|
stack
|
page read and write
|
||
4D4F000
|
trusted library allocation
|
page read and write
|
||
510000
|
direct allocation
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
2F84000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
D2F000
|
stack
|
page read and write
|
||
7AE000
|
stack
|
page read and write
|
||
5D4F000
|
stack
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
304F000
|
stack
|
page read and write
|
||
3268000
|
trusted library allocation
|
page read and write
|
||
36A0000
|
heap
|
page read and write
|
||
1097000
|
trusted library allocation
|
page execute and read and write
|
||
1092000
|
trusted library allocation
|
page read and write
|
||
703E000
|
stack
|
page read and write
|
||
3770000
|
heap
|
page read and write
|
||
5000000
|
trusted library allocation
|
page read and write
|
||
243D000
|
trusted library allocation
|
page execute and read and write
|
||
8C5000
|
trusted library allocation
|
page execute and read and write
|
||
6A0E000
|
stack
|
page read and write
|
||
DDE000
|
heap
|
page read and write
|
||
103E000
|
stack
|
page read and write
|
||
1522000
|
trusted library allocation
|
page read and write
|
||
6500000
|
trusted library allocation
|
page execute and read and write
|
||
BB3000
|
heap
|
page read and write
|
||
6FD000
|
stack
|
page read and write
|
||
397F000
|
trusted library allocation
|
page read and write
|
||
10B0000
|
trusted library allocation
|
page read and write
|
||
93D000
|
trusted library allocation
|
page execute and read and write
|
||
6BBF000
|
heap
|
page read and write
|
||
66AE000
|
stack
|
page read and write
|
||
5CA8000
|
heap
|
page read and write
|
||
3FB9000
|
trusted library allocation
|
page read and write
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
64E0000
|
trusted library allocation
|
page read and write
|
||
3789000
|
trusted library allocation
|
page read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
617E000
|
stack
|
page read and write
|
||
5C0E000
|
stack
|
page read and write
|
||
1968000
|
trusted library allocation
|
page read and write
|
||
688E000
|
stack
|
page read and write
|
||
46DB000
|
stack
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
A68000
|
heap
|
page read and write
|
||
1050000
|
trusted library allocation
|
page read and write
|
||
2E9D000
|
stack
|
page read and write
|
||
14AF000
|
stack
|
page read and write
|
||
351F000
|
trusted library allocation
|
page read and write
|
||
236B000
|
trusted library allocation
|
page read and write
|
||
6FB0000
|
trusted library allocation
|
page execute and read and write
|
||
68CE000
|
stack
|
page read and write
|
||
354F000
|
heap
|
page read and write
|
||
1032000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
167A000
|
trusted library allocation
|
page execute and read and write
|
||
2871000
|
trusted library allocation
|
page read and write
|
||
1060000
|
trusted library allocation
|
page execute and read and write
|
||
4BE0000
|
heap
|
page read and write
|
||
2E5F000
|
stack
|
page read and write
|
||
3CF9000
|
trusted library allocation
|
page read and write
|
||
6D4E000
|
stack
|
page read and write
|
||
6052000
|
heap
|
page read and write
|
||
33CF000
|
unkown
|
page read and write
|
||
6630000
|
heap
|
page read and write
|
||
6B8E000
|
stack
|
page read and write
|
||
5F15000
|
heap
|
page read and write
|
||
518000
|
heap
|
page read and write
|
||
74E000
|
unkown
|
page read and write
|
||
37A9000
|
trusted library allocation
|
page read and write
|
||
2580000
|
trusted library allocation
|
page execute and read and write
|
||
73E000
|
unkown
|
page read and write
|
||
57B0000
|
heap
|
page read and write
|
||
324B000
|
heap
|
page read and write
|
||
7030000
|
trusted library allocation
|
page read and write
|
||
308E000
|
trusted library allocation
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
70E000
|
heap
|
page read and write
|
||
2D3C000
|
heap
|
page read and write
|
||
2D0F000
|
stack
|
page read and write
|
||
F59000
|
stack
|
page read and write
|
||
323F000
|
stack
|
page read and write
|
||
2979000
|
trusted library allocation
|
page read and write
|
||
60D0000
|
trusted library allocation
|
page execute and read and write
|
||
87E000
|
stack
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
1525000
|
heap
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
5E8E000
|
stack
|
page read and write
|
||
3DB9000
|
trusted library allocation
|
page read and write
|
||
8CB000
|
trusted library allocation
|
page execute and read and write
|
||
50BD000
|
stack
|
page read and write
|
||
26AC000
|
trusted library allocation
|
page read and write
|
||
5730000
|
trusted library allocation
|
page read and write
|
||
64FE000
|
stack
|
page read and write
|
||
2883000
|
trusted library allocation
|
page read and write
|
||
611E000
|
stack
|
page read and write
|
||
B6E000
|
stack
|
page read and write
|
||
76D000
|
stack
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
5820000
|
trusted library allocation
|
page execute and read and write
|
||
880000
|
heap
|
page read and write
|
||
4C6B000
|
stack
|
page read and write
|
||
2AEF000
|
unkown
|
page read and write
|
||
1003000
|
trusted library allocation
|
page execute and read and write
|
||
57D0000
|
trusted library allocation
|
page execute and read and write
|
||
3220000
|
heap
|
page read and write
|
||
2949000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
trusted library allocation
|
page read and write
|
||
58FE000
|
stack
|
page read and write
|
||
167A000
|
trusted library allocation
|
page execute and read and write
|
||
2B40000
|
heap
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
474000
|
remote allocation
|
page execute and read and write
|
||
6500000
|
heap
|
page read and write
|
||
BE9000
|
heap
|
page read and write
|
||
743C000
|
stack
|
page read and write
|
||
2467000
|
trusted library allocation
|
page execute and read and write
|
||
668E000
|
stack
|
page read and write
|
||
5680000
|
heap
|
page execute and read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
6320000
|
trusted library allocation
|
page read and write
|
||
108A000
|
trusted library allocation
|
page execute and read and write
|
||
6D9E000
|
stack
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page execute and read and write
|
||
645F000
|
stack
|
page read and write
|
||
6C60000
|
trusted library allocation
|
page execute and read and write
|
||
2930000
|
heap
|
page read and write
|
||
5F2E000
|
stack
|
page read and write
|
||
B80000
|
trusted library allocation
|
page read and write
|
||
1900000
|
heap
|
page execute and read and write
|
||
E90000
|
heap
|
page read and write
|
||
4EEE000
|
stack
|
page read and write
|
||
952000
|
trusted library allocation
|
page read and write
|
||
644E000
|
stack
|
page read and write
|
||
302C000
|
trusted library allocation
|
page read and write
|
||
2AFB000
|
stack
|
page read and write
|
||
6CAE000
|
stack
|
page read and write
|
||
50D0000
|
heap
|
page read and write
|
||
324E000
|
unkown
|
page read and write
|
||
73B0000
|
heap
|
page read and write
|
||
5A9E000
|
stack
|
page read and write
|
||
3021000
|
trusted library allocation
|
page read and write
|
||
150E000
|
trusted library allocation
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
70D0000
|
trusted library allocation
|
page execute and read and write
|
||
2F54000
|
trusted library allocation
|
page read and write
|
||
5D8E000
|
stack
|
page read and write
|
||
6D0F000
|
stack
|
page read and write
|
||
65E0000
|
heap
|
page read and write
|
||
2D0D000
|
stack
|
page read and write
|
||
5B0E000
|
stack
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
6920000
|
trusted library allocation
|
page read and write
|
||
670E000
|
stack
|
page read and write
|
||
4B33000
|
heap
|
page read and write
|
||
34DF000
|
stack
|
page read and write
|
||
739A000
|
heap
|
page read and write
|
||
688000
|
heap
|
page read and write
|
||
686E000
|
stack
|
page read and write
|
||
1385000
|
heap
|
page read and write
|
||
2BE4000
|
trusted library allocation
|
page read and write
|
||
2BA1000
|
trusted library allocation
|
page read and write
|
||
B6F000
|
stack
|
page read and write
|
||
6209000
|
heap
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
5760000
|
trusted library allocation
|
page read and write
|
||
3B1F000
|
trusted library allocation
|
page read and write
|
||
3201000
|
trusted library allocation
|
page read and write
|
||
2F72000
|
trusted library allocation
|
page read and write
|
||
4B40000
|
trusted library allocation
|
page read and write
|
||
2BBE000
|
unkown
|
page read and write
|
||
65CF000
|
heap
|
page read and write
|
||
194E000
|
stack
|
page read and write
|
||
AFC000
|
stack
|
page read and write
|
||
45BB000
|
stack
|
page read and write
|
||
610D000
|
stack
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
30CF000
|
unkown
|
page read and write
|
||
387D000
|
trusted library allocation
|
page read and write
|
||
6A6E000
|
heap
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
2700000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
22E6000
|
trusted library allocation
|
page read and write
|
||
30D5000
|
trusted library allocation
|
page read and write
|
||
2D01000
|
trusted library allocation
|
page read and write
|
||
6BB0000
|
heap
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
6ECC000
|
stack
|
page read and write
|
||
383A000
|
trusted library allocation
|
page read and write
|
||
2B4D000
|
stack
|
page read and write
|
||
35C0000
|
heap
|
page read and write
|
||
59B0000
|
trusted library allocation
|
page read and write
|
||
44BF000
|
stack
|
page read and write
|
||
32A0000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
9D7000
|
heap
|
page read and write
|
||
DF7000
|
heap
|
page read and write
|
||
6E1D000
|
stack
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
69BE000
|
stack
|
page read and write
|
||
5F10000
|
heap
|
page read and write
|
||
568E000
|
stack
|
page read and write
|
||
2B8C000
|
heap
|
page read and write
|
||
66CE000
|
stack
|
page read and write
|
||
3209000
|
trusted library allocation
|
page read and write
|
||
6E0D000
|
stack
|
page read and write
|
||
6A30000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
2AC1000
|
heap
|
page read and write
|
||
5740000
|
trusted library allocation
|
page execute and read and write
|
||
59F0000
|
heap
|
page read and write
|
||
11F2000
|
heap
|
page read and write
|
||
693E000
|
stack
|
page read and write
|
||
2ABC000
|
heap
|
page read and write
|
||
648E000
|
stack
|
page read and write
|
||
328C000
|
trusted library allocation
|
page read and write
|
||
1467000
|
heap
|
page read and write
|
||
68E000
|
heap
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
4CC0000
|
trusted library allocation
|
page read and write
|
||
89C000
|
stack
|
page read and write
|
||
5D27000
|
heap
|
page read and write
|
||
E7E000
|
stack
|
page read and write
|
||
C0C000
|
stack
|
page read and write
|
||
6B2F000
|
heap
|
page read and write
|
||
5795000
|
trusted library allocation
|
page read and write
|
||
3ACD000
|
trusted library allocation
|
page read and write
|
||
63E0000
|
trusted library allocation
|
page execute and read and write
|
||
C1A000
|
trusted library allocation
|
page execute and read and write
|
||
FB0000
|
heap
|
page read and write
|
||
9C5000
|
trusted library allocation
|
page read and write
|
||
296F000
|
trusted library allocation
|
page read and write
|
||
131E000
|
stack
|
page read and write
|
||
5721000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
990000
|
trusted library allocation
|
page read and write
|
||
63BF000
|
stack
|
page read and write
|
||
2EFF000
|
stack
|
page read and write
|
||
5A80000
|
trusted library allocation
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
576E000
|
stack
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
24D8000
|
trusted library allocation
|
page read and write
|
||
5810000
|
trusted library allocation
|
page read and write
|
||
2FFD000
|
stack
|
page read and write
|
||
2F5D000
|
stack
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
1080000
|
trusted library allocation
|
page read and write
|
||
AC8000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
1004000
|
trusted library allocation
|
page read and write
|
||
7EF40000
|
trusted library allocation
|
page execute and read and write
|
||
324E000
|
unkown
|
page read and write
|
||
7F9E0000
|
trusted library allocation
|
page execute and read and write
|
||
4B55000
|
trusted library allocation
|
page read and write
|
||
2D38000
|
heap
|
page read and write
|
||
22BC000
|
stack
|
page read and write
|
||
2D50000
|
heap
|
page read and write
|
||
2434000
|
trusted library allocation
|
page read and write
|
||
BD7000
|
stack
|
page read and write
|
||
6E10000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
1687000
|
trusted library allocation
|
page execute and read and write
|
||
652E000
|
stack
|
page read and write
|
||
2B31000
|
heap
|
page read and write
|
||
301E000
|
unkown
|
page read and write
|
||
2EC0000
|
heap
|
page execute and read and write
|
||
1E0000
|
heap
|
page read and write
|
||
6A4E000
|
stack
|
page read and write
|
||
3331000
|
trusted library allocation
|
page read and write
|
||
4B0E000
|
stack
|
page read and write
|
||
2CFF000
|
stack
|
page read and write
|
||
167F000
|
stack
|
page read and write
|
||
421F000
|
trusted library allocation
|
page read and write
|
||
6DCE000
|
stack
|
page read and write
|
||
1760000
|
trusted library allocation
|
page read and write
|
||
2F9F000
|
heap
|
page read and write
|
||
2BEE000
|
stack
|
page read and write
|
||
66D000
|
stack
|
page read and write
|
||
2DBD000
|
stack
|
page read and write
|
||
1360000
|
trusted library allocation
|
page read and write
|
||
7A1E000
|
stack
|
page read and write
|
||
6E4E000
|
stack
|
page read and write
|
||
38BF000
|
trusted library allocation
|
page read and write
|
||
9FC000
|
heap
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
2780000
|
trusted library allocation
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
4FE0000
|
trusted library allocation
|
page read and write
|
||
6EF000
|
stack
|
page read and write
|
||
13AE000
|
heap
|
page read and write
|
||
6A30000
|
trusted library allocation
|
page read and write
|
||
B7E000
|
heap
|
page read and write
|
||
5110000
|
trusted library allocation
|
page execute and read and write
|
||
22C4000
|
trusted library allocation
|
page read and write
|
||
6310000
|
trusted library allocation
|
page read and write
|
||
6100000
|
trusted library allocation
|
page execute and read and write
|
||
31D1000
|
trusted library allocation
|
page read and write
|
||
688E000
|
stack
|
page read and write
|
||
70A1000
|
trusted library allocation
|
page read and write
|
||
165D000
|
trusted library allocation
|
page execute and read and write
|
||
2C50000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
28F1000
|
trusted library allocation
|
page read and write
|
||
2FDF000
|
stack
|
page read and write
|
||
60E0000
|
trusted library allocation
|
page read and write
|
||
4B34000
|
trusted library allocation
|
page read and write
|
||
630F000
|
stack
|
page read and write
|
||
7790000
|
heap
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
3112000
|
trusted library allocation
|
page read and write
|
||
10B0000
|
trusted library allocation
|
page read and write
|
||
5810000
|
heap
|
page read and write
|
||
16C7000
|
heap
|
page read and write
|
||
5D8E000
|
stack
|
page read and write
|
||
6FD0000
|
heap
|
page read and write
|
||
376F000
|
stack
|
page read and write
|
||
5C9E000
|
stack
|
page read and write
|
||
26CC000
|
trusted library allocation
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
13C5000
|
heap
|
page read and write
|
||
5650000
|
trusted library allocation
|
page read and write
|
||
2D8F000
|
unkown
|
page read and write
|
||
E94000
|
trusted library allocation
|
page read and write
|
||
4BC0000
|
trusted library allocation
|
page read and write
|
||
2430000
|
trusted library allocation
|
page read and write
|
||
6A26000
|
trusted library allocation
|
page read and write
|
||
6EA6000
|
trusted library allocation
|
page read and write
|
||
2F85000
|
trusted library allocation
|
page read and write
|
||
3090000
|
trusted library allocation
|
page read and write
|
||
29C0000
|
heap
|
page read and write
|
||
A7E000
|
stack
|
page read and write
|
||
4FC8000
|
trusted library allocation
|
page read and write
|
||
149E000
|
heap
|
page read and write
|
||
8B0000
|
trusted library allocation
|
page read and write
|
||
4BB0000
|
trusted library allocation
|
page read and write
|
||
B9A000
|
heap
|
page read and write
|
||
3272000
|
trusted library allocation
|
page read and write
|
||
10A0000
|
trusted library allocation
|
page read and write
|
||
12D000
|
stack
|
page read and write
|
||
5D5F000
|
stack
|
page read and write
|
||
3FAF000
|
trusted library allocation
|
page read and write
|
||
665C000
|
heap
|
page read and write
|
||
3070000
|
trusted library allocation
|
page read and write
|
||
64C0000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page execute and read and write
|
||
C48000
|
heap
|
page read and write
|
||
537E000
|
stack
|
page read and write
|
||
2F1B000
|
trusted library allocation
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
14FB000
|
trusted library allocation
|
page read and write
|
||
22F2000
|
trusted library allocation
|
page read and write
|
||
AED000
|
trusted library allocation
|
page execute and read and write
|
||
5176000
|
trusted library allocation
|
page read and write
|
||
1020000
|
trusted library allocation
|
page read and write
|
||
2FBF000
|
heap
|
page read and write
|
||
694C000
|
stack
|
page read and write
|
||
5AA000
|
stack
|
page read and write
|
||
58D000
|
stack
|
page read and write
|
||
17F0000
|
trusted library allocation
|
page read and write
|
||
744F000
|
stack
|
page read and write
|
||
2452000
|
trusted library allocation
|
page read and write
|
||
6C4D000
|
heap
|
page read and write
|
||
7ED000
|
stack
|
page read and write
|
||
4FC0000
|
trusted library allocation
|
page read and write
|
||
4C40000
|
trusted library allocation
|
page execute and read and write
|
||
5FC000
|
stack
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
4D60000
|
trusted library allocation
|
page read and write
|
||
5060000
|
trusted library allocation
|
page execute and read and write
|
||
2824000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
trusted library allocation
|
page read and write
|
||
75C000
|
stack
|
page read and write
|
||
60AF000
|
stack
|
page read and write
|
||
6E0E000
|
stack
|
page read and write
|
||
41AF000
|
trusted library allocation
|
page read and write
|
||
2367000
|
trusted library allocation
|
page read and write
|
||
5698000
|
trusted library allocation
|
page read and write
|
||
44CF000
|
trusted library allocation
|
page read and write
|
||
1050000
|
trusted library allocation
|
page read and write
|
||
62DD000
|
stack
|
page read and write
|
||
58A0000
|
trusted library allocation
|
page read and write
|
||
515B000
|
trusted library allocation
|
page read and write
|
||
37EF000
|
heap
|
page read and write
|
||
5732000
|
trusted library allocation
|
page read and write
|
||
6AD0000
|
heap
|
page read and write
|
||
5680000
|
trusted library allocation
|
page read and write
|
||
2C9D000
|
stack
|
page read and write
|
||
36CF000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page execute and read and write
|
||
67CF000
|
stack
|
page read and write
|
||
7780000
|
trusted library allocation
|
page execute and read and write
|
||
720E000
|
stack
|
page read and write
|
||
4B4B000
|
trusted library allocation
|
page read and write
|
||
1516000
|
trusted library allocation
|
page read and write
|
||
1373000
|
trusted library allocation
|
page execute and read and write
|
||
C3E000
|
heap
|
page read and write
|
||
3213000
|
trusted library allocation
|
page read and write
|
||
B07000
|
trusted library allocation
|
page execute and read and write
|
||
4D35000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
2F6D000
|
trusted library allocation
|
page execute and read and write
|
||
5FE000
|
stack
|
page read and write
|
||
2BBB000
|
trusted library allocation
|
page read and write
|
||
3FA000
|
stack
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
3740000
|
heap
|
page read and write
|
||
2937000
|
trusted library allocation
|
page read and write
|
||
67CE000
|
stack
|
page read and write
|
||
37A0000
|
heap
|
page read and write
|
||
3286000
|
trusted library allocation
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
63B0000
|
heap
|
page read and write
|
||
9FE000
|
heap
|
page read and write
|
||
61E0000
|
heap
|
page read and write
|
||
3ECF000
|
trusted library allocation
|
page read and write
|
||
6A7C000
|
stack
|
page read and write
|
||
31CE000
|
stack
|
page read and write
|
||
6A12000
|
heap
|
page read and write
|
||
5E1E000
|
stack
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
39FD000
|
trusted library allocation
|
page read and write
|
||
755B000
|
stack
|
page read and write
|
||
10B5000
|
trusted library allocation
|
page read and write
|
||
7790000
|
heap
|
page read and write
|
||
478000
|
remote allocation
|
page execute and read and write
|
||
5F0D000
|
heap
|
page read and write
|
||
79CE000
|
stack
|
page read and write
|
||
1703000
|
trusted library allocation
|
page execute and read and write
|
||
591E000
|
stack
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
3A9F000
|
trusted library allocation
|
page read and write
|
||
324C000
|
heap
|
page read and write
|
||
32DC000
|
heap
|
page read and write
|
||
8F7000
|
stack
|
page read and write
|
||
FE0000
|
trusted library allocation
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
565E000
|
trusted library allocation
|
page read and write
|
||
98C000
|
stack
|
page read and write
|
||
5700000
|
trusted library allocation
|
page read and write
|
||
67BC000
|
stack
|
page read and write
|
||
34BF000
|
unkown
|
page read and write
|
||
64FE000
|
stack
|
page read and write
|
||
471000
|
remote allocation
|
page execute and read and write
|
||
5B8E000
|
stack
|
page read and write
|
||
6890000
|
trusted library allocation
|
page read and write
|
||
600F000
|
stack
|
page read and write
|
||
2AEE000
|
stack
|
page read and write
|
||
1685000
|
trusted library allocation
|
page execute and read and write
|
||
673E000
|
stack
|
page read and write
|
||
30DC000
|
trusted library allocation
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
168B000
|
trusted library allocation
|
page execute and read and write
|
||
64A0000
|
trusted library allocation
|
page read and write
|
||
6CCE000
|
stack
|
page read and write
|
||
166D000
|
trusted library allocation
|
page execute and read and write
|
||
E9D000
|
trusted library allocation
|
page execute and read and write
|
||
999000
|
heap
|
page read and write
|
||
2DD8000
|
heap
|
page read and write
|
||
62C0000
|
heap
|
page read and write
|
||
5F0D000
|
stack
|
page read and write
|
||
42A9000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
24CE000
|
stack
|
page read and write
|
||
2B90000
|
trusted library allocation
|
page read and write
|
||
152F000
|
stack
|
page read and write
|
||
5EAD000
|
stack
|
page read and write
|
||
AF0000
|
trusted library allocation
|
page read and write
|
||
25B0000
|
heap
|
page execute and read and write
|
||
F10000
|
heap
|
page read and write
|
||
2300000
|
trusted library allocation
|
page read and write
|
||
3630000
|
heap
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
E2E000
|
stack
|
page read and write
|
||
2D1F000
|
heap
|
page read and write
|
||
1370000
|
trusted library allocation
|
page read and write
|
||
29EF000
|
stack
|
page read and write
|
||
B1E000
|
stack
|
page read and write
|
||
442F000
|
trusted library allocation
|
page read and write
|
||
777E000
|
stack
|
page read and write
|
||
1960000
|
trusted library allocation
|
page read and write
|
||
2BCF000
|
trusted library allocation
|
page read and write
|
||
4B74000
|
trusted library allocation
|
page read and write
|
||
5F05000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
6A37000
|
heap
|
page read and write
|
||
368F000
|
heap
|
page read and write
|
||
103B000
|
trusted library allocation
|
page execute and read and write
|
||
FA4000
|
trusted library allocation
|
page read and write
|
||
BA6000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
308E000
|
trusted library allocation
|
page read and write
|
||
2A7E000
|
stack
|
page read and write
|
||
1710000
|
trusted library allocation
|
page read and write
|
||
3254000
|
heap
|
page read and write
|
||
544D000
|
stack
|
page read and write
|
||
4B77000
|
trusted library allocation
|
page read and write
|
||
7220000
|
heap
|
page read and write
|
||
7901000
|
trusted library allocation
|
page read and write
|
||
5790000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
A6B000
|
heap
|
page read and write
|
||
51FE000
|
stack
|
page read and write
|
||
66BF000
|
stack
|
page read and write
|
||
2A41000
|
trusted library allocation
|
page read and write
|
||
4E00000
|
trusted library allocation
|
page read and write
|
||
354A000
|
trusted library allocation
|
page read and write
|
||
32A0000
|
direct allocation
|
page read and write
|
||
78BD000
|
stack
|
page read and write
|
||
2F17000
|
trusted library allocation
|
page read and write
|
||
C10000
|
trusted library allocation
|
page read and write
|
||
994000
|
trusted library allocation
|
page read and write
|
||
516E000
|
trusted library allocation
|
page read and write
|
||
3285000
|
trusted library allocation
|
page read and write
|
||
2363000
|
trusted library allocation
|
page read and write
|
||
4D20000
|
trusted library allocation
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
9B5000
|
heap
|
page read and write
|
||
924000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
heap
|
page read and write
|
||
6A3C000
|
heap
|
page read and write
|
||
7630000
|
heap
|
page read and write
|
||
4B36000
|
trusted library allocation
|
page read and write
|
||
1010000
|
trusted library allocation
|
page read and write
|
||
115C000
|
stack
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
35BF000
|
stack
|
page read and write
|
||
64D0000
|
trusted library allocation
|
page read and write
|
||
3EF9000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
heap
|
page execute and read and write
|
||
FB8000
|
trusted library allocation
|
page read and write
|
||
2AB0000
|
heap
|
page read and write
|
||
102E000
|
trusted library allocation
|
page read and write
|
||
6F7000
|
stack
|
page read and write
|
||
13D000
|
stack
|
page read and write
|
||
364F000
|
stack
|
page read and write
|
||
2433000
|
trusted library allocation
|
page execute and read and write
|
||
3466000
|
heap
|
page read and write
|
||
4A80000
|
heap
|
page read and write
|
||
E32000
|
trusted library allocation
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
289F000
|
trusted library allocation
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page execute and read and write
|
||
32A0000
|
heap
|
page read and write
|
||
698E000
|
stack
|
page read and write
|
||
7460000
|
trusted library allocation
|
page execute and read and write
|
||
27F0000
|
heap
|
page read and write
|
||
635E000
|
stack
|
page read and write
|
||
767C000
|
stack
|
page read and write
|
||
63FE000
|
stack
|
page read and write
|
||
35BE000
|
stack
|
page read and write
|
||
FAE000
|
stack
|
page read and write
|
||
5A5D000
|
stack
|
page read and write
|
||
2EEC000
|
stack
|
page read and write
|
||
FC0000
|
trusted library allocation
|
page read and write
|
||
6ABC000
|
stack
|
page read and write
|
||
657E000
|
stack
|
page read and write
|
||
173A000
|
trusted library allocation
|
page execute and read and write
|
||
73F1000
|
trusted library allocation
|
page read and write
|
||
2F69000
|
trusted library allocation
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
5F29000
|
heap
|
page read and write
|
||
32F7000
|
trusted library allocation
|
page read and write
|
||
2ED1000
|
trusted library allocation
|
page read and write
|
||
65A000
|
stack
|
page read and write
|
||
32CC000
|
heap
|
page read and write
|
||
6B1F000
|
stack
|
page read and write
|
||
6E4F000
|
stack
|
page read and write
|
||
29C1000
|
trusted library allocation
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
6BE0000
|
heap
|
page read and write
|
||
2830000
|
heap
|
page execute and read and write
|
||
893000
|
trusted library allocation
|
page execute and read and write
|
||
40CF000
|
trusted library allocation
|
page read and write
|
||
2D2F000
|
trusted library allocation
|
page read and write
|
||
70A0000
|
trusted library allocation
|
page execute and read and write
|
||
61E2000
|
heap
|
page read and write
|
||
57AF000
|
trusted library allocation
|
page read and write
|
||
68FE000
|
stack
|
page read and write
|
||
5E8D000
|
stack
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
4B20000
|
heap
|
page execute and read and write
|
||
1497000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
28ED000
|
stack
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
14B5000
|
heap
|
page read and write
|
||
34E0000
|
heap
|
page read and write
|
||
2D0E000
|
unkown
|
page read and write
|
||
663E000
|
stack
|
page read and write
|
||
123A000
|
stack
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
2F8B000
|
trusted library allocation
|
page execute and read and write
|
||
6B90000
|
heap
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page read and write
|
||
5E90000
|
trusted library allocation
|
page read and write
|
||
36AF000
|
heap
|
page read and write
|
||
BF4000
|
trusted library allocation
|
page read and write
|
||
631F000
|
stack
|
page read and write
|
||
9DD000
|
heap
|
page read and write
|
||
5726000
|
trusted library allocation
|
page read and write
|
||
768C000
|
stack
|
page read and write
|
||
5770000
|
trusted library allocation
|
page read and write
|
||
2928000
|
trusted library allocation
|
page read and write
|
||
678C000
|
stack
|
page read and write
|
||
EFC000
|
stack
|
page read and write
|
||
5D8E000
|
stack
|
page read and write
|
||
3790000
|
heap
|
page read and write
|
||
4A0C000
|
stack
|
page read and write
|
||
4B81000
|
trusted library allocation
|
page read and write
|
||
6E0E000
|
stack
|
page read and write
|
||
2DE0000
|
direct allocation
|
page read and write
|
||
77EE000
|
stack
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
26E7000
|
trusted library allocation
|
page read and write
|
||
154E000
|
heap
|
page read and write
|
||
60F2000
|
heap
|
page read and write
|
||
68C0000
|
trusted library allocation
|
page read and write
|
||
65FE000
|
heap
|
page read and write
|
||
2D2B000
|
heap
|
page read and write
|
||
47BC000
|
stack
|
page read and write
|
||
271F000
|
trusted library allocation
|
page read and write
|
||
9A5000
|
heap
|
page read and write
|
||
2E80000
|
trusted library allocation
|
page read and write
|
||
566D000
|
trusted library allocation
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
EF8000
|
trusted library allocation
|
page read and write
|
||
EC2000
|
trusted library allocation
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
170D000
|
trusted library allocation
|
page execute and read and write
|
||
970000
|
heap
|
page read and write
|
||
2C1D000
|
trusted library allocation
|
page read and write
|
||
5B9E000
|
stack
|
page read and write
|
||
6B99000
|
heap
|
page read and write
|
||
2F2F000
|
unkown
|
page read and write
|
||
2570000
|
heap
|
page execute and read and write
|
||
740000
|
heap
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
5CC3000
|
heap
|
page read and write
|
||
474000
|
remote allocation
|
page execute and read and write
|
||
1080000
|
heap
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
718B000
|
stack
|
page read and write
|
||
2AF8000
|
trusted library allocation
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
5300000
|
trusted library allocation
|
page read and write
|
||
4BBF000
|
trusted library allocation
|
page read and write
|
||
2755000
|
trusted library allocation
|
page read and write
|
||
6FD7000
|
heap
|
page read and write
|
||
5820000
|
trusted library allocation
|
page read and write
|
||
9B8000
|
trusted library allocation
|
page read and write
|
||
894000
|
trusted library allocation
|
page read and write
|
||
6EB6000
|
trusted library allocation
|
page read and write
|
||
3929000
|
trusted library allocation
|
page read and write
|
||
6D0E000
|
stack
|
page read and write
|
||
22E1000
|
trusted library allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
280D000
|
trusted library allocation
|
page read and write
|
||
43CF000
|
trusted library allocation
|
page read and write
|
||
65EB000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page execute and read and write
|
||
6ECE000
|
stack
|
page read and write
|
||
36BF000
|
stack
|
page read and write
|
||
79BE000
|
stack
|
page read and write
|
||
7F7F0000
|
trusted library allocation
|
page execute and read and write
|
||
4BA2000
|
trusted library allocation
|
page read and write
|
||
5CDE000
|
stack
|
page read and write
|
||
26A1000
|
trusted library allocation
|
page read and write
|
||
6E8E000
|
stack
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
1040000
|
trusted library allocation
|
page read and write
|
||
9A5000
|
heap
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
380F000
|
heap
|
page read and write
|
||
1817000
|
heap
|
page read and write
|
||
6370000
|
trusted library allocation
|
page execute and read and write
|
||
1670000
|
trusted library allocation
|
page read and write
|
||
5672000
|
trusted library allocation
|
page read and write
|
||
1118000
|
trusted library allocation
|
page read and write
|
||
735C000
|
stack
|
page read and write
|
||
6024000
|
heap
|
page read and write
|
||
57A0000
|
trusted library allocation
|
page read and write
|
||
26FF000
|
trusted library allocation
|
page read and write
|
||
65D4000
|
heap
|
page read and write
|
||
26E4000
|
trusted library allocation
|
page read and write
|
||
35EF000
|
stack
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
99C000
|
stack
|
page read and write
|
||
654F000
|
stack
|
page read and write
|
||
8AD000
|
trusted library allocation
|
page execute and read and write
|
||
7C2000
|
unkown
|
page readonly
|
||
5DCE000
|
stack
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
32EF000
|
stack
|
page read and write
|
||
51A5000
|
trusted library allocation
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
52FD000
|
stack
|
page read and write
|
||
6ACF000
|
stack
|
page read and write
|
||
2F82000
|
trusted library allocation
|
page read and write
|
||
31BE000
|
stack
|
page read and write
|
||
5400000
|
heap
|
page read and write
|
||
5A3D000
|
stack
|
page read and write
|
||
2B70000
|
heap
|
page read and write
|
||
629F000
|
stack
|
page read and write
|
||
338E000
|
stack
|
page read and write
|
||
F6A000
|
stack
|
page read and write
|
||
68B0000
|
trusted library allocation
|
page read and write
|
||
4FD000
|
stack
|
page read and write
|
||
5D6E000
|
stack
|
page read and write
|
||
3B6F000
|
trusted library allocation
|
page read and write
|
||
6584000
|
heap
|
page read and write
|
||
5DDF000
|
stack
|
page read and write
|
||
7080000
|
trusted library allocation
|
page read and write
|
||
306F000
|
stack
|
page read and write
|
||
6B29000
|
heap
|
page read and write
|
||
64CE000
|
stack
|
page read and write
|
||
5ACE000
|
stack
|
page read and write
|
||
C16000
|
trusted library allocation
|
page execute and read and write
|
||
1682000
|
trusted library allocation
|
page read and write
|
||
4DD0000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
heap
|
page read and write
|
||
535000
|
heap
|
page read and write
|
||
446D000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
stack
|
page read and write
|
||
5C94000
|
heap
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
C6F000
|
stack
|
page read and write
|
||
450F000
|
trusted library allocation
|
page read and write
|
||
5710000
|
heap
|
page read and write
|
||
5F5E000
|
stack
|
page read and write
|
||
3264000
|
heap
|
page read and write
|
||
640E000
|
stack
|
page read and write
|
||
5CB4000
|
heap
|
page read and write
|
||
33BC000
|
trusted library allocation
|
page read and write
|
||
4B18000
|
trusted library allocation
|
page read and write
|
||
7F700000
|
trusted library allocation
|
page execute and read and write
|
||
850000
|
heap
|
page read and write
|
||
322F000
|
trusted library allocation
|
page read and write
|
||
96D000
|
stack
|
page read and write
|
||
18E0000
|
trusted library allocation
|
page execute and read and write
|
||
F3F000
|
stack
|
page read and write
|
||
7010000
|
trusted library allocation
|
page read and write
|
||
673F000
|
stack
|
page read and write
|
||
26D1000
|
trusted library allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
3170000
|
heap
|
page read and write
|
||
6151000
|
heap
|
page read and write
|
||
F17000
|
heap
|
page read and write
|
||
64F0000
|
trusted library allocation
|
page execute and read and write
|
||
269F000
|
stack
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
E3B000
|
trusted library allocation
|
page execute and read and write
|
||
2CFF000
|
heap
|
page read and write
|
||
151D000
|
trusted library allocation
|
page read and write
|
||
1497000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
FF0000
|
trusted library allocation
|
page read and write
|
||
6B4B000
|
stack
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
3940000
|
heap
|
page read and write
|
||
6FBE000
|
stack
|
page read and write
|
||
ECB000
|
trusted library allocation
|
page execute and read and write
|
||
6B9F000
|
heap
|
page read and write
|
||
2D50000
|
heap
|
page read and write
|
||
5B5E000
|
stack
|
page read and write
|
||
385D000
|
trusted library allocation
|
page read and write
|
||
3281000
|
trusted library allocation
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
2F50000
|
trusted library allocation
|
page read and write
|
||
2984000
|
trusted library allocation
|
page read and write
|
||
359F000
|
unkown
|
page read and write
|
||
6880000
|
trusted library allocation
|
page execute and read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
137D000
|
trusted library allocation
|
page execute and read and write
|
||
2B50000
|
heap
|
page read and write
|
||
32DF000
|
trusted library allocation
|
page read and write
|
||
244D000
|
trusted library allocation
|
page execute and read and write
|
||
2F76000
|
trusted library allocation
|
page execute and read and write
|
||
910000
|
heap
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
105C000
|
stack
|
page read and write
|
||
6C8C000
|
heap
|
page read and write
|
||
277C000
|
trusted library allocation
|
page read and write
|
||
558D000
|
stack
|
page read and write
|
||
2A7D000
|
stack
|
page read and write
|
||
697C000
|
stack
|
page read and write
|
||
1742000
|
trusted library allocation
|
page read and write
|
||
4B25000
|
trusted library allocation
|
page read and write
|
||
6A50000
|
trusted library allocation
|
page read and write
|
||
29B4000
|
heap
|
page read and write
|
||
2DC0000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
5D3E000
|
stack
|
page read and write
|
||
4F7000
|
stack
|
page read and write
|
||
54F000
|
stack
|
page read and write
|
||
EC5000
|
trusted library allocation
|
page execute and read and write
|
||
2F80000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
6910000
|
trusted library allocation
|
page read and write
|
||
5390000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
2F4F000
|
heap
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
5490000
|
trusted library allocation
|
page execute and read and write
|
||
3300000
|
heap
|
page read and write
|
||
3260000
|
heap
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
27FC000
|
heap
|
page read and write
|
||
1022000
|
trusted library allocation
|
page read and write
|
||
2801000
|
trusted library allocation
|
page read and write
|
||
2DDE000
|
stack
|
page read and write
|
||
70CC000
|
stack
|
page read and write
|
||
EEF000
|
stack
|
page read and write
|
||
2F70000
|
trusted library allocation
|
page read and write
|
||
34B1000
|
trusted library allocation
|
page read and write
|
||
4F2E000
|
stack
|
page read and write
|
||
69E4000
|
heap
|
page read and write
|
||
2D5C000
|
heap
|
page read and write
|
||
16D000
|
stack
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
78F0000
|
heap
|
page read and write
|
||
6062000
|
heap
|
page read and write
|
||
CFC000
|
stack
|
page read and write
|
||
53C000
|
heap
|
page read and write
|
||
102E000
|
stack
|
page read and write
|
||
30C0000
|
heap
|
page execute and read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
7F0A0000
|
trusted library allocation
|
page execute and read and write
|
||
E12000
|
heap
|
page read and write
|
||
103D000
|
trusted library allocation
|
page read and write
|
||
2F7A000
|
trusted library allocation
|
page execute and read and write
|
||
F20000
|
heap
|
page read and write
|
||
27FE000
|
trusted library allocation
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page execute and read and write
|
||
6BAE000
|
heap
|
page read and write
|
||
399F000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
7086000
|
trusted library allocation
|
page read and write
|
||
AF6000
|
trusted library allocation
|
page execute and read and write
|
||
17DF000
|
stack
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
2F6B000
|
stack
|
page read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
2DEF000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
trusted library allocation
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
5720000
|
heap
|
page read and write
|
||
32C4000
|
trusted library allocation
|
page read and write
|
||
57B0000
|
trusted library allocation
|
page execute and read and write
|
||
617F000
|
stack
|
page read and write
|
||
2480000
|
trusted library allocation
|
page read and write
|
||
3E4A000
|
trusted library allocation
|
page read and write
|
||
5A5F000
|
stack
|
page read and write
|
||
5A90000
|
heap
|
page read and write
|
||
6BE0000
|
heap
|
page read and write
|
||
57C0000
|
trusted library allocation
|
page read and write
|
||
1680000
|
heap
|
page read and write
|
||
3B0F000
|
trusted library allocation
|
page read and write
|
||
6540000
|
trusted library allocation
|
page read and write
|
||
4E70000
|
trusted library allocation
|
page read and write
|
||
5ADE000
|
stack
|
page read and write
|
||
6970000
|
trusted library section
|
page read and write
|
||
106D000
|
trusted library allocation
|
page execute and read and write
|
||
7F0000
|
heap
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
27F0000
|
heap
|
page read and write
|
||
2F40000
|
trusted library allocation
|
page read and write
|
||
245A000
|
trusted library allocation
|
page execute and read and write
|
||
6D50000
|
trusted library allocation
|
page execute and read and write
|
||
2F2F000
|
trusted library allocation
|
page read and write
|
||
657C000
|
heap
|
page read and write
|
||
68A0000
|
trusted library allocation
|
page read and write
|
||
EBD000
|
stack
|
page read and write
|
||
133E000
|
stack
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
5640000
|
trusted library allocation
|
page read and write
|
||
5B2E000
|
stack
|
page read and write
|
||
58BE000
|
stack
|
page read and write
|
||
6530000
|
trusted library allocation
|
page execute and read and write
|
||
57C0000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
1070000
|
trusted library allocation
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
6F4E000
|
stack
|
page read and write
|
||
32EE000
|
stack
|
page read and write
|
||
14EC000
|
stack
|
page read and write
|
||
7DD000
|
stack
|
page read and write
|
||
309D000
|
trusted library allocation
|
page read and write
|
||
36AF000
|
heap
|
page read and write
|
||
4D0B000
|
stack
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
66FE000
|
stack
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
2887000
|
trusted library allocation
|
page read and write
|
||
1676000
|
trusted library allocation
|
page execute and read and write
|
||
191F000
|
stack
|
page read and write
|
||
2590000
|
heap
|
page read and write
|
||
3216000
|
heap
|
page read and write
|
||
660E000
|
stack
|
page read and write
|
||
956000
|
trusted library allocation
|
page execute and read and write
|
||
2465000
|
trusted library allocation
|
page execute and read and write
|
||
1806000
|
trusted library allocation
|
page read and write
|
||
110E000
|
stack
|
page read and write
|
||
EFD000
|
stack
|
page read and write
|
||
FBE000
|
stack
|
page read and write
|
||
C57000
|
heap
|
page read and write
|
||
4DE0000
|
trusted library allocation
|
page read and write
|
||
471000
|
remote allocation
|
page execute and read and write
|
||
658C000
|
stack
|
page read and write
|
||
10A8000
|
trusted library allocation
|
page read and write
|
||
2AAB000
|
heap
|
page read and write
|
||
EC7000
|
trusted library allocation
|
page execute and read and write
|
||
427F000
|
trusted library allocation
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
2BB0000
|
trusted library allocation
|
page read and write
|
||
362F000
|
heap
|
page read and write
|
||
3270000
|
heap
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
2A70000
|
heap
|
page read and write
|
||
353F000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
1537000
|
heap
|
page read and write
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
649E000
|
stack
|
page read and write
|
||
3B99000
|
trusted library allocation
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
5210000
|
heap
|
page read and write
|
||
564B000
|
trusted library allocation
|
page read and write
|
||
474000
|
remote allocation
|
page execute and read and write
|
||
6520000
|
trusted library allocation
|
page read and write
|
||
321E000
|
unkown
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
2707000
|
trusted library allocation
|
page read and write
|
||
4EBE000
|
stack
|
page read and write
|
||
2C7F000
|
stack
|
page read and write
|
||
6B0E000
|
stack
|
page read and write
|
||
9C0000
|
trusted library allocation
|
page read and write
|
||
3266000
|
trusted library allocation
|
page read and write
|
||
C3A000
|
stack
|
page read and write
|
||
AFE000
|
stack
|
page read and write
|
||
3315000
|
trusted library allocation
|
page read and write
|
||
7390000
|
heap
|
page read and write
|
||
732C000
|
stack
|
page read and write
|
||
5C5E000
|
stack
|
page read and write
|
||
4369000
|
trusted library allocation
|
page read and write
|
||
30FB000
|
stack
|
page read and write
|
||
2BB6000
|
trusted library allocation
|
page read and write
|
||
4A83000
|
heap
|
page read and write
|
||
5F99000
|
heap
|
page read and write
|
||
5F7E000
|
stack
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
166E000
|
stack
|
page read and write
|
||
3091000
|
trusted library allocation
|
page read and write
|
||
28F5000
|
trusted library allocation
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
614E000
|
heap
|
page read and write
|
||
16BE000
|
stack
|
page read and write
|
||
59CE000
|
stack
|
page read and write
|
||
3214000
|
heap
|
page read and write
|
||
474000
|
remote allocation
|
page execute and read and write
|
||
62CE000
|
stack
|
page read and write
|
||
1037000
|
trusted library allocation
|
page execute and read and write
|
||
73E000
|
stack
|
page read and write
|
||
56C5000
|
trusted library allocation
|
page read and write
|
||
51D8000
|
trusted library allocation
|
page read and write
|
||
753E000
|
stack
|
page read and write
|
||
6B31000
|
trusted library allocation
|
page read and write
|
||
391F000
|
trusted library allocation
|
page read and write
|
||
2E6D000
|
stack
|
page read and write
|
||
2AC3000
|
heap
|
page read and write
|
||
98E000
|
stack
|
page read and write
|
||
2703000
|
trusted library allocation
|
page read and write
|
||
680E000
|
stack
|
page read and write
|
||
6BDE000
|
stack
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
3860000
|
heap
|
page read and write
|
||
5EAC000
|
heap
|
page read and write
|
||
658E000
|
stack
|
page read and write
|
||
2B5C000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
2DDF000
|
stack
|
page read and write
|
||
2EFF000
|
unkown
|
page read and write
|
||
118F000
|
stack
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
30C6000
|
heap
|
page read and write
|
||
C74000
|
heap
|
page read and write
|
||
321F000
|
stack
|
page read and write
|
||
5F70000
|
heap
|
page read and write
|
||
8C7000
|
trusted library allocation
|
page execute and read and write
|
||
4C20000
|
heap
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
58A0000
|
trusted library allocation
|
page read and write
|
||
2A20000
|
heap
|
page read and write
|
||
E3E000
|
stack
|
page read and write
|
||
2AC4000
|
heap
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
4FB000
|
stack
|
page read and write
|
||
438D000
|
trusted library allocation
|
page read and write
|
||
3EEF000
|
trusted library allocation
|
page read and write
|
||
632A000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
6530000
|
trusted library allocation
|
page read and write
|
||
17D000
|
stack
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
7150000
|
heap
|
page read and write
|
||
2321000
|
trusted library allocation
|
page read and write
|
||
26D9000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
trusted library allocation
|
page read and write
|
||
5AC0000
|
heap
|
page execute and read and write
|
||
4B30000
|
heap
|
page read and write
|
||
339F000
|
unkown
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
3000000
|
trusted library allocation
|
page read and write
|
||
2DDB000
|
stack
|
page read and write
|
||
E5E000
|
stack
|
page read and write
|
||
3130000
|
trusted library allocation
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
4B44000
|
trusted library allocation
|
page read and write
|
||
3B2F000
|
trusted library allocation
|
page read and write
|
||
6DCE000
|
stack
|
page read and write
|
||
2C00000
|
heap
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
DAC000
|
stack
|
page read and write
|
||
536B000
|
stack
|
page read and write
|
||
F3C000
|
stack
|
page read and write
|
||
4B50000
|
trusted library allocation
|
page read and write
|
||
27E4000
|
trusted library allocation
|
page read and write
|
||
36C9000
|
trusted library allocation
|
page read and write
|
||
59C0000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
53BC000
|
stack
|
page read and write
|
||
1082000
|
trusted library allocation
|
page read and write
|
||
599E000
|
stack
|
page read and write
|
||
108F000
|
stack
|
page read and write
|
||
73A0000
|
heap
|
page read and write
|
||
64B0000
|
trusted library allocation
|
page read and write
|
||
E3C000
|
stack
|
page read and write
|
||
3E8D000
|
trusted library allocation
|
page read and write
|
||
3270000
|
direct allocation
|
page read and write
|
||
27CE000
|
trusted library allocation
|
page read and write
|
||
2A2B000
|
trusted library allocation
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
5EEE000
|
stack
|
page read and write
|
||
626E000
|
stack
|
page read and write
|
||
E1F000
|
stack
|
page read and write
|
||
3220000
|
heap
|
page read and write
|
||
32F4000
|
trusted library allocation
|
page read and write
|
||
2D81000
|
trusted library allocation
|
page read and write
|
||
357F000
|
unkown
|
page read and write
|
||
B1C000
|
stack
|
page read and write
|
||
5660000
|
trusted library allocation
|
page read and write
|
||
4DF0000
|
heap
|
page read and write
|
||
51BC000
|
stack
|
page read and write
|
||
5863000
|
heap
|
page read and write
|
||
63A0000
|
trusted library allocation
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
947000
|
heap
|
page read and write
|
||
6E60000
|
trusted library allocation
|
page read and write
|
||
7F9D0000
|
trusted library allocation
|
page execute and read and write
|
||
AAE000
|
stack
|
page read and write
|
||
62DE000
|
stack
|
page read and write
|
||
77E000
|
stack
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
2F44000
|
trusted library allocation
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
FEF000
|
trusted library allocation
|
page read and write
|
||
51A0000
|
trusted library allocation
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
4B20000
|
trusted library allocation
|
page read and write
|
||
6330000
|
trusted library allocation
|
page read and write
|
||
299C000
|
heap
|
page read and write
|
||
2E4F000
|
unkown
|
page read and write
|
||
100D000
|
trusted library allocation
|
page execute and read and write
|
||
2DFD000
|
stack
|
page read and write
|
||
449F000
|
trusted library allocation
|
page read and write
|
||
6CCD000
|
stack
|
page read and write
|
||
E7E000
|
stack
|
page read and write
|
||
5C2F000
|
stack
|
page read and write
|
||
3016000
|
trusted library allocation
|
page read and write
|
||
4B7C000
|
trusted library allocation
|
page read and write
|
||
33CF000
|
stack
|
page read and write
|
||
360F000
|
heap
|
page read and write
|
||
326E000
|
trusted library allocation
|
page read and write
|
||
3A5F000
|
trusted library allocation
|
page read and write
|
||
635E000
|
stack
|
page read and write
|
||
6ECE000
|
stack
|
page read and write
|
||
37D000
|
stack
|
page read and write
|
||
F37000
|
heap
|
page read and write
|
||
678F000
|
stack
|
page read and write
|
||
579F000
|
stack
|
page read and write
|
||
4BD0000
|
trusted library allocation
|
page read and write
|
||
369F000
|
stack
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
67CE000
|
stack
|
page read and write
|
||
6D4E000
|
stack
|
page read and write
|
||
ADA000
|
stack
|
page read and write
|
||
1730000
|
trusted library allocation
|
page read and write
|
||
63C0000
|
trusted library allocation
|
page read and write
|
||
2F53000
|
trusted library allocation
|
page execute and read and write
|
||
6B5C000
|
heap
|
page read and write
|
||
778C000
|
stack
|
page read and write
|
||
8C2000
|
trusted library allocation
|
page read and write
|
||
EB6000
|
trusted library allocation
|
page execute and read and write
|
||
6C4F000
|
heap
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
6B1C000
|
heap
|
page read and write
|
||
335F000
|
stack
|
page read and write
|
||
71E000
|
stack
|
page read and write
|
||
27DE000
|
stack
|
page read and write
|
||
605E000
|
stack
|
page read and write
|
||
1640000
|
trusted library allocation
|
page read and write
|
||
77A0000
|
trusted library allocation
|
page execute and read and write
|
||
2CBB000
|
trusted library allocation
|
page read and write
|
||
4B00000
|
trusted library allocation
|
page read and write
|
||
41F9000
|
trusted library allocation
|
page read and write
|
||
3070000
|
heap
|
page read and write
|
||
165F000
|
stack
|
page read and write
|
||
32FC000
|
trusted library allocation
|
page read and write
|
||
56DF000
|
trusted library allocation
|
page read and write
|
||
1672000
|
trusted library allocation
|
page read and write
|
||
2C8E000
|
unkown
|
page read and write
|
||
6AE0000
|
trusted library allocation
|
page read and write
|
||
4B48000
|
trusted library allocation
|
page read and write
|
||
8E0000
|
trusted library allocation
|
page read and write
|
||
609F000
|
heap
|
page read and write
|
||
6560000
|
trusted library allocation
|
page execute and read and write
|
||
2F87000
|
trusted library allocation
|
page execute and read and write
|
||
B67000
|
stack
|
page read and write
|
||
664E000
|
stack
|
page read and write
|
||
6FC000
|
stack
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
D6E000
|
stack
|
page read and write
|
||
1950000
|
trusted library allocation
|
page read and write
|
||
F20000
|
trusted library allocation
|
page execute and read and write
|
||
89D000
|
trusted library allocation
|
page execute and read and write
|
||
2E60000
|
trusted library allocation
|
page execute and read and write
|
||
474000
|
remote allocation
|
page execute and read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
320C000
|
heap
|
page read and write
|
||
1804000
|
trusted library allocation
|
page read and write
|
||
16F0000
|
trusted library allocation
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
8CD000
|
stack
|
page read and write
|
||
614E000
|
stack
|
page read and write
|
||
2D13000
|
trusted library allocation
|
page read and write
|
||
779C000
|
heap
|
page read and write
|
||
3660000
|
heap
|
page read and write
|
||
1680000
|
trusted library allocation
|
page read and write
|
||
23D1000
|
trusted library allocation
|
page read and write
|
||
6AAD000
|
heap
|
page read and write
|
||
FB0000
|
trusted library allocation
|
page read and write
|
||
1086000
|
trusted library allocation
|
page execute and read and write
|
||
5840000
|
trusted library allocation
|
page read and write
|
||
16C0000
|
heap
|
page read and write
|
||
7680000
|
heap
|
page read and write
|
||
60C4000
|
heap
|
page read and write
|
||
3495000
|
heap
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
7070000
|
trusted library allocation
|
page execute and read and write
|
||
2D9D000
|
stack
|
page read and write
|
||
5230000
|
trusted library allocation
|
page execute and read and write
|
||
807000
|
heap
|
page read and write
|
||
6F8C000
|
stack
|
page read and write
|
||
6302000
|
heap
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
6DBC000
|
stack
|
page read and write
|
||
47DC000
|
stack
|
page read and write
|
||
6A70000
|
trusted library allocation
|
page execute and read and write
|
||
640000
|
heap
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
102A000
|
trusted library allocation
|
page execute and read and write
|
||
36A1000
|
trusted library allocation
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
4D30000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
1511000
|
trusted library allocation
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
378F000
|
trusted library allocation
|
page read and write
|
||
5313000
|
heap
|
page read and write
|
||
27EB000
|
trusted library allocation
|
page read and write
|
||
1660000
|
trusted library allocation
|
page read and write
|
||
E35000
|
trusted library allocation
|
page execute and read and write
|
||
2C9D000
|
stack
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page read and write
|
||
5CA000
|
stack
|
page read and write
|
||
60CE000
|
heap
|
page read and write
|
||
6018000
|
heap
|
page read and write
|
||
730D000
|
stack
|
page read and write
|
||
602E000
|
stack
|
page read and write
|
||
162F000
|
stack
|
page read and write
|
||
EBA000
|
trusted library allocation
|
page execute and read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
78F1000
|
trusted library allocation
|
page read and write
|
||
31B0000
|
direct allocation
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
1660000
|
trusted library allocation
|
page read and write
|
||
2C0E000
|
unkown
|
page read and write
|
||
2456000
|
trusted library allocation
|
page execute and read and write
|
||
6AB1000
|
heap
|
page read and write
|
||
3308000
|
heap
|
page read and write
|
||
2F4E000
|
unkown
|
page read and write
|
||
58E0000
|
heap
|
page read and write
|
||
4021000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page execute and read and write
|
||
4FB0000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
5684000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
10C7000
|
heap
|
page read and write
|
||
5000000
|
heap
|
page execute and read and write
|
||
3030000
|
direct allocation
|
page read and write
|
||
7EE60000
|
trusted library allocation
|
page execute and read and write
|
||
442A000
|
trusted library allocation
|
page read and write
|
||
1732000
|
trusted library allocation
|
page read and write
|
||
471000
|
remote allocation
|
page execute and read and write
|
||
AD3000
|
trusted library allocation
|
page execute and read and write
|
||
50E000
|
stack
|
page read and write
|
||
E8E000
|
stack
|
page read and write
|
||
593D000
|
stack
|
page read and write
|
||
113E000
|
stack
|
page read and write
|
||
5310000
|
heap
|
page read and write
|
||
1970000
|
heap
|
page read and write
|
||
4B61000
|
trusted library allocation
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
2F9D000
|
stack
|
page read and write
|
||
6560000
|
trusted library allocation
|
page read and write
|
||
312E000
|
trusted library allocation
|
page read and write
|
||
5F96000
|
heap
|
page read and write
|
||
73AD000
|
stack
|
page read and write
|
||
5A6E000
|
stack
|
page read and write
|
||
4D10000
|
trusted library allocation
|
page execute and read and write
|
||
69EF000
|
stack
|
page read and write
|
||
1480000
|
trusted library allocation
|
page execute and read and write
|
||
2CED000
|
stack
|
page read and write
|
||
3640000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
2D4D000
|
stack
|
page read and write
|
||
2FA0000
|
trusted library allocation
|
page read and write
|
||
4BA0000
|
trusted library allocation
|
page read and write
|
||
28EF000
|
unkown
|
page read and write
|
||
2C80000
|
direct allocation
|
page read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
306B000
|
stack
|
page read and write
|
||
92D000
|
trusted library allocation
|
page execute and read and write
|
||
471000
|
remote allocation
|
page execute and read and write
|
||
5C50000
|
trusted library allocation
|
page read and write
|
||
69AE000
|
stack
|
page read and write
|
||
17B0000
|
heap
|
page read and write
|
||
2879000
|
trusted library allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
326F000
|
stack
|
page read and write
|
||
7290000
|
heap
|
page read and write
|
||
7AD1000
|
trusted library allocation
|
page read and write
|
||
59EE000
|
stack
|
page read and write
|
||
694E000
|
stack
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
5F0E000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
38FF000
|
trusted library allocation
|
page read and write
|
||
4FEF000
|
trusted library allocation
|
page read and write
|
||
5DCE000
|
stack
|
page read and write
|
||
72E0000
|
heap
|
page read and write
|
||
996000
|
trusted library allocation
|
page read and write
|
||
2B96000
|
heap
|
page read and write
|
||
5C6E000
|
stack
|
page read and write
|
||
5740000
|
trusted library allocation
|
page read and write
|
||
2F83000
|
heap
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
3630000
|
heap
|
page read and write
|
||
670000
|
trusted library allocation
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
607E000
|
stack
|
page read and write
|
||
2F6F000
|
heap
|
page read and write
|
||
4F1E000
|
stack
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
130F000
|
stack
|
page read and write
|
||
6A20000
|
trusted library allocation
|
page read and write
|
||
32AE000
|
unkown
|
page read and write
|
||
35E1000
|
trusted library allocation
|
page read and write
|
||
ADD000
|
trusted library allocation
|
page execute and read and write
|
||
32F2000
|
heap
|
page read and write
|
||
455F000
|
trusted library allocation
|
page read and write
|
||
5040000
|
heap
|
page read and write
|
||
5030000
|
trusted library allocation
|
page execute and read and write
|
||
6A90000
|
trusted library allocation
|
page execute and read and write
|
||
3520000
|
heap
|
page read and write
|
||
6C4C000
|
stack
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page execute and read and write
|
||
6E9E000
|
stack
|
page read and write
|
||
624E000
|
stack
|
page read and write
|
||
9F9000
|
heap
|
page read and write
|
||
63AE000
|
trusted library allocation
|
page read and write
|
||
700E000
|
stack
|
page read and write
|
||
2D6F000
|
stack
|
page read and write
|
||
3425000
|
trusted library allocation
|
page read and write
|
||
1090000
|
trusted library allocation
|
page read and write
|
||
2E00000
|
trusted library allocation
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
780000
|
direct allocation
|
page read and write
|
||
2950000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
4910000
|
trusted library allocation
|
page read and write
|
||
2ABF000
|
heap
|
page read and write
|
||
E93000
|
trusted library allocation
|
page execute and read and write
|
||
640E000
|
stack
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
2954000
|
trusted library allocation
|
page read and write
|
||
6B4E000
|
stack
|
page read and write
|
||
2F6E000
|
stack
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
3010000
|
trusted library allocation
|
page read and write
|
||
970000
|
trusted library allocation
|
page execute and read and write
|
||
2450000
|
trusted library allocation
|
page read and write
|
||
2C5D000
|
stack
|
page read and write
|
||
1398000
|
heap
|
page read and write
|
||
2A23000
|
heap
|
page read and write
|
||
4B30000
|
trusted library allocation
|
page read and write
|
||
538E000
|
stack
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
2CF8000
|
heap
|
page read and write
|
||
6F3E000
|
stack
|
page read and write
|
||
5C1F000
|
stack
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
347C000
|
heap
|
page read and write
|
||
14F4000
|
trusted library allocation
|
page read and write
|
||
501D000
|
stack
|
page read and write
|
||
7C0000
|
unkown
|
page readonly
|
||
107D000
|
trusted library allocation
|
page execute and read and write
|
||
1810000
|
heap
|
page read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
56B0000
|
trusted library allocation
|
page read and write
|
||
2ED0000
|
direct allocation
|
page read and write
|
||
16D7000
|
heap
|
page read and write
|
||
2F09000
|
trusted library allocation
|
page read and write
|
||
2A3E000
|
trusted library allocation
|
page read and write
|
||
270B000
|
trusted library allocation
|
page read and write
|
||
2E9D000
|
stack
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
586E000
|
stack
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
631E000
|
stack
|
page read and write
|
||
6DAE000
|
stack
|
page read and write
|
||
532000
|
heap
|
page read and write
|
||
6ADE000
|
stack
|
page read and write
|
||
6680000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
145C000
|
heap
|
page read and write
|
||
2AB0000
|
heap
|
page read and write
|
||
2A5F000
|
unkown
|
page read and write
|
||
1663000
|
trusted library allocation
|
page read and write
|
||
3109000
|
trusted library allocation
|
page read and write
|
||
56B0000
|
trusted library allocation
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
D1E000
|
stack
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
6540000
|
trusted library allocation
|
page read and write
|
||
5E9E000
|
stack
|
page read and write
|
||
6C10000
|
heap
|
page read and write
|
||
27A9000
|
trusted library allocation
|
page read and write
|
||
6BB2000
|
heap
|
page read and write
|
||
DAC000
|
stack
|
page read and write
|
||
30B3000
|
heap
|
page read and write
|
||
6AD4000
|
heap
|
page read and write
|
||
696E000
|
stack
|
page read and write
|
||
2B71000
|
trusted library allocation
|
page read and write
|
||
EAD000
|
trusted library allocation
|
page execute and read and write
|
||
1468000
|
heap
|
page read and write
|
||
58E3000
|
heap
|
page read and write
|
||
6AC0000
|
heap
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
6CCE000
|
stack
|
page read and write
|
||
674E000
|
stack
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
38BF000
|
trusted library allocation
|
page read and write
|
||
69CE000
|
stack
|
page read and write
|
||
68D000
|
stack
|
page read and write
|
||
2BA9000
|
trusted library allocation
|
page read and write
|
||
5A7E000
|
stack
|
page read and write
|
||
6B50000
|
heap
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
103E000
|
stack
|
page read and write
|
||
2ADF000
|
heap
|
page read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
32B1000
|
trusted library allocation
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
2DE0000
|
trusted library allocation
|
page read and write
|
||
96E000
|
stack
|
page read and write
|
||
4D90000
|
heap
|
page read and write
|
||
64DF000
|
stack
|
page read and write
|
||
6571000
|
heap
|
page read and write
|
||
27D0000
|
trusted library allocation
|
page read and write
|
||
6450000
|
heap
|
page read and write
|
||
4E0C000
|
stack
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
4B04000
|
trusted library allocation
|
page read and write
|
||
2C25000
|
trusted library allocation
|
page read and write
|
||
627E000
|
stack
|
page read and write
|
||
5020000
|
trusted library allocation
|
page read and write
|
||
6DB1000
|
trusted library allocation
|
page read and write
|
||
1977000
|
heap
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
5A5E000
|
stack
|
page read and write
|
||
6130000
|
trusted library allocation
|
page execute and read and write
|
||
95A000
|
trusted library allocation
|
page execute and read and write
|
||
2EFD000
|
stack
|
page read and write
|
||
650F000
|
stack
|
page read and write
|
||
412F000
|
trusted library allocation
|
page read and write
|
||
2CDD000
|
stack
|
page read and write
|
||
5C4E000
|
stack
|
page read and write
|
||
2A24000
|
trusted library allocation
|
page read and write
|
||
2CAF000
|
stack
|
page read and write
|
||
1014000
|
trusted library allocation
|
page read and write
|
||
69DC000
|
stack
|
page read and write
|
||
930000
|
trusted library allocation
|
page read and write
|
||
1067000
|
heap
|
page read and write
|
||
2F00000
|
trusted library allocation
|
page read and write
|
||
6A10000
|
trusted library allocation
|
page execute and read and write
|
||
42B9000
|
trusted library allocation
|
page read and write
|
||
77A0000
|
trusted library allocation
|
page execute and read and write
|
||
C0D000
|
trusted library allocation
|
page execute and read and write
|
||
F0E000
|
stack
|
page read and write
|
||
69D0000
|
heap
|
page read and write
|
||
32C7000
|
trusted library allocation
|
page read and write
|
||
4ACD000
|
stack
|
page read and write
|
||
4DE0000
|
trusted library allocation
|
page read and write
|
||
1687000
|
trusted library allocation
|
page execute and read and write
|
||
4BB0000
|
trusted library allocation
|
page read and write
|
||
6390000
|
trusted library allocation
|
page read and write
|
||
443D000
|
trusted library allocation
|
page read and write
|
||
1672000
|
trusted library allocation
|
page read and write
|
||
5770000
|
trusted library allocation
|
page read and write
|
||
A6A000
|
stack
|
page read and write
|
||
EAE000
|
stack
|
page read and write
|
||
49DC000
|
stack
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
BF3000
|
trusted library allocation
|
page execute and read and write
|
||
A24000
|
heap
|
page read and write
|
||
6C88000
|
heap
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
98E000
|
heap
|
page read and write
|
||
8B2000
|
trusted library allocation
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
5E4E000
|
stack
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
30D1000
|
trusted library allocation
|
page read and write
|
||
3406000
|
heap
|
page read and write
|
||
16B0000
|
heap
|
page execute and read and write
|
||
690E000
|
stack
|
page read and write
|
||
314F000
|
stack
|
page read and write
|
||
E80000
|
trusted library allocation
|
page read and write
|
||
6E5E000
|
stack
|
page read and write
|
||
32CC000
|
trusted library allocation
|
page read and write
|
||
757000
|
stack
|
page read and write
|
||
7F900000
|
trusted library allocation
|
page execute and read and write
|
||
43D000
|
stack
|
page read and write
|
||
5560000
|
trusted library allocation
|
page read and write
|
||
752C000
|
stack
|
page read and write
|
||
3335000
|
trusted library allocation
|
page read and write
|
||
5F3E000
|
stack
|
page read and write
|
||
C30000
|
trusted library allocation
|
page read and write
|
||
1063000
|
trusted library allocation
|
page execute and read and write
|
||
1670000
|
trusted library allocation
|
page read and write
|
||
70C1000
|
trusted library allocation
|
page read and write
|
||
301F000
|
stack
|
page read and write
|
||
75B1000
|
trusted library allocation
|
page read and write
|
||
4B97000
|
trusted library allocation
|
page read and write
|
||
72D000
|
stack
|
page read and write
|
||
E17000
|
heap
|
page read and write
|
||
308E000
|
unkown
|
page read and write
|
||
32E9000
|
trusted library allocation
|
page read and write
|
||
2F81000
|
trusted library allocation
|
page read and write
|
||
589E000
|
stack
|
page read and write
|
||
6C77000
|
heap
|
page read and write
|
||
63F000
|
stack
|
page read and write
|
||
2359000
|
trusted library allocation
|
page read and write
|
||
389F000
|
trusted library allocation
|
page read and write
|
||
12DD000
|
stack
|
page read and write
|
||
2940000
|
heap
|
page read and write
|
||
35E0000
|
heap
|
page read and write
|
||
C00000
|
trusted library allocation
|
page read and write
|
||
88C000
|
stack
|
page read and write
|
||
6D4D000
|
stack
|
page read and write
|
||
471000
|
remote allocation
|
page execute and read and write
|
||
774000
|
heap
|
page read and write
|
||
3317000
|
trusted library allocation
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
2C7F000
|
stack
|
page read and write
|
||
30E0000
|
trusted library allocation
|
page read and write
|
||
B62000
|
trusted library allocation
|
page read and write
|
||
6E4E000
|
stack
|
page read and write
|
||
2A52000
|
trusted library allocation
|
page read and write
|
||
5670000
|
trusted library allocation
|
page read and write
|
||
4970000
|
trusted library allocation
|
page execute and read and write
|
||
68E000
|
unkown
|
page read and write
|
||
6542000
|
heap
|
page read and write
|
||
4D20000
|
trusted library allocation
|
page read and write
|
||
6C0E000
|
stack
|
page read and write
|
||
5870000
|
heap
|
page execute and read and write
|
||
5ECE000
|
stack
|
page read and write
|
||
32D0000
|
heap
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
4990000
|
trusted library allocation
|
page read and write
|
||
78EE000
|
stack
|
page read and write
|
||
1B0000
|
heap
|
page read and write
|
||
6520000
|
trusted library allocation
|
page execute and read and write
|
||
26EC000
|
trusted library allocation
|
page read and write
|
||
1036000
|
trusted library allocation
|
page read and write
|
||
41DD000
|
trusted library allocation
|
page read and write
|
||
4B40000
|
trusted library allocation
|
page read and write
|
||
677E000
|
stack
|
page read and write
|
||
58C0000
|
trusted library allocation
|
page execute and read and write
|
||
1460000
|
heap
|
page read and write
|
||
7FC00000
|
trusted library allocation
|
page execute and read and write
|
||
1320000
|
heap
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
11D7000
|
heap
|
page read and write
|
||
6FC0000
|
trusted library allocation
|
page read and write
|
||
5DD000
|
stack
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
4DD000
|
stack
|
page read and write
|
||
D4E000
|
stack
|
page read and write
|
||
606E000
|
stack
|
page read and write
|
||
423F000
|
trusted library allocation
|
page read and write
|
||
2F80000
|
trusted library allocation
|
page read and write
|
||
8F7000
|
stack
|
page read and write
|
||
28EF000
|
stack
|
page read and write
|
||
533000
|
heap
|
page read and write
|
||
5080000
|
trusted library allocation
|
page read and write
|
||
2CDD000
|
stack
|
page read and write
|
||
2771000
|
trusted library allocation
|
page read and write
|
||
5860000
|
heap
|
page read and write
|
||
3348000
|
heap
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
22DE000
|
trusted library allocation
|
page read and write
|
||
59DD000
|
stack
|
page read and write
|
||
28B4000
|
trusted library allocation
|
page read and write
|
||
2F13000
|
trusted library allocation
|
page read and write
|
||
4B63000
|
heap
|
page read and write
|
||
5750000
|
trusted library allocation
|
page execute and read and write
|
||
638E000
|
stack
|
page read and write
|
||
381A000
|
trusted library allocation
|
page read and write
|
||
5EDF000
|
heap
|
page read and write
|
||
39BA000
|
trusted library allocation
|
page read and write
|
||
4D40000
|
trusted library allocation
|
page read and write
|
||
1070000
|
trusted library allocation
|
page read and write
|
||
325C000
|
stack
|
page read and write
|
||
29B3000
|
heap
|
page read and write
|
||
26F1000
|
trusted library allocation
|
page read and write
|
||
22C0000
|
trusted library allocation
|
page read and write
|
||
382F000
|
trusted library allocation
|
page read and write
|
||
1FE000
|
unkown
|
page read and write
|
||
648E000
|
stack
|
page read and write
|
||
6AE6000
|
trusted library allocation
|
page read and write
|
||
619E000
|
stack
|
page read and write
|
||
5C72000
|
heap
|
page read and write
|
||
67FE000
|
stack
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
2820000
|
trusted library allocation
|
page read and write
|
||
70D0000
|
trusted library allocation
|
page execute and read and write
|
||
1084000
|
trusted library allocation
|
page read and write
|
||
607E000
|
stack
|
page read and write
|
||
6B17000
|
heap
|
page read and write
|
||
26C1000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
trusted library allocation
|
page read and write
|
||
54DD000
|
stack
|
page read and write
|
||
2DCE000
|
unkown
|
page read and write
|
||
2D54000
|
heap
|
page read and write
|
||
619E000
|
stack
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
52AD000
|
stack
|
page read and write
|
||
321B000
|
trusted library allocation
|
page read and write
|
||
581E000
|
stack
|
page read and write
|
||
73E000
|
unkown
|
page read and write
|
||
5666000
|
trusted library allocation
|
page read and write
|
||
721E000
|
stack
|
page read and write
|
||
2A0C000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
2A80000
|
heap
|
page read and write
|
||
3094000
|
trusted library allocation
|
page read and write
|
||
4FD0000
|
trusted library allocation
|
page read and write
|
||
C12000
|
trusted library allocation
|
page read and write
|
||
23D5000
|
trusted library allocation
|
page read and write
|
||
2D53000
|
heap
|
page read and write
|
||
2D6E000
|
unkown
|
page read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
CAC000
|
stack
|
page read and write
|
||
C10000
|
trusted library allocation
|
page execute and read and write
|
||
930000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
3B71000
|
trusted library allocation
|
page read and write
|
||
69CE000
|
stack
|
page read and write
|
||
29ED000
|
stack
|
page read and write
|
||
58B0000
|
trusted library allocation
|
page execute and read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
687E000
|
stack
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
2BB7000
|
trusted library allocation
|
page read and write
|
||
5154000
|
trusted library allocation
|
page read and write
|
||
58AE000
|
stack
|
page read and write
|
||
1488000
|
heap
|
page read and write
|
||
323D000
|
stack
|
page read and write
|
||
72DD000
|
stack
|
page read and write
|
||
5940000
|
trusted library allocation
|
page read and write
|
||
4EA0000
|
trusted library allocation
|
page read and write
|
||
734E000
|
stack
|
page read and write
|
||
13AF000
|
stack
|
page read and write
|
||
53FE000
|
stack
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
6338000
|
heap
|
page read and write
|
||
14B2000
|
heap
|
page read and write
|
||
699E000
|
stack
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
7EE30000
|
trusted library allocation
|
page execute and read and write
|
||
474000
|
remote allocation
|
page execute and read and write
|
||
3067000
|
trusted library allocation
|
page read and write
|
||
471000
|
remote allocation
|
page execute and read and write
|
||
A00000
|
heap
|
page read and write
|
||
1358000
|
heap
|
page read and write
|
||
F1F000
|
stack
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
24F8000
|
trusted library allocation
|
page read and write
|
||
B67000
|
trusted library allocation
|
page execute and read and write
|
||
3090000
|
heap
|
page read and write
|
||
6B00000
|
trusted library allocation
|
page execute and read and write
|
||
174B000
|
trusted library allocation
|
page execute and read and write
|
||
5686000
|
trusted library allocation
|
page read and write
|
||
3361000
|
trusted library allocation
|
page read and write
|
||
6F5F000
|
stack
|
page read and write
|
||
39F9000
|
trusted library allocation
|
page read and write
|
||
2826000
|
trusted library allocation
|
page read and write
|
||
6FBC000
|
stack
|
page read and write
|
||
12F7000
|
stack
|
page read and write
|
||
307B000
|
trusted library allocation
|
page read and write
|
||
FE5000
|
heap
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
6C0E000
|
stack
|
page read and write
|
||
5590000
|
heap
|
page read and write
|
||
D5E000
|
stack
|
page read and write
|
||
2B64000
|
heap
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page execute and read and write
|
||
660000
|
heap
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
157C000
|
heap
|
page read and write
|
||
B5E000
|
stack
|
page read and write
|
||
682E000
|
stack
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
E90000
|
trusted library allocation
|
page read and write
|
||
5D2A000
|
heap
|
page read and write
|
||
34FF000
|
stack
|
page read and write
|
||
2DAE000
|
stack
|
page read and write
|
||
7090000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
11BE000
|
heap
|
page read and write
|
||
50FE000
|
stack
|
page read and write
|
||
3210000
|
heap
|
page read and write
|
||
2E90000
|
trusted library allocation
|
page read and write
|
||
29FB000
|
stack
|
page read and write
|
||
757D000
|
stack
|
page read and write
|
||
6580000
|
trusted library allocation
|
page execute and read and write
|
||
471000
|
remote allocation
|
page execute and read and write
|
||
6110000
|
trusted library allocation
|
page read and write
|
||
3CD1000
|
trusted library allocation
|
page read and write
|
||
2A3D000
|
stack
|
page read and write
|
||
2C70000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
77E000
|
stack
|
page read and write
|
||
4DF0000
|
trusted library allocation
|
page read and write
|
||
5C44000
|
heap
|
page read and write
|
||
2F60000
|
trusted library allocation
|
page read and write
|
||
2A10000
|
trusted library allocation
|
page read and write
|
||
6490000
|
trusted library allocation
|
page execute and read and write
|
||
A03000
|
heap
|
page read and write
|
||
170000
|
heap
|
page read and write
|
||
85C000
|
stack
|
page read and write
|
||
2D50000
|
heap
|
page read and write
|
||
728E000
|
stack
|
page read and write
|
||
6A1D000
|
stack
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
5D9E000
|
stack
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
5EB0000
|
heap
|
page read and write
|
||
6C0E000
|
stack
|
page read and write
|
||
2A24000
|
heap
|
page read and write
|
||
E7E000
|
stack
|
page read and write
|
||
3263000
|
heap
|
page read and write
|
||
2812000
|
trusted library allocation
|
page read and write
|
||
5028000
|
trusted library allocation
|
page read and write
|
||
2394000
|
trusted library allocation
|
page read and write
|
||
6A8E000
|
stack
|
page read and write
|
||
1720000
|
heap
|
page read and write
|
||
ABD000
|
stack
|
page read and write
|
||
330F000
|
trusted library allocation
|
page read and write
|
||
32E1000
|
trusted library allocation
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
7682000
|
heap
|
page read and write
|
||
910000
|
trusted library allocation
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page execute and read and write
|
||
2B33000
|
heap
|
page read and write
|
||
660E000
|
stack
|
page read and write
|
||
73E000
|
unkown
|
page read and write
|
||
DDB000
|
heap
|
page read and write
|
||
1800000
|
trusted library allocation
|
page read and write
|
||
327D000
|
stack
|
page read and write
|
||
4B66000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
366F000
|
unkown
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page execute and read and write
|
||
AE0000
|
heap
|
page read and write
|
||
6B0E000
|
stack
|
page read and write
|
||
6FAE000
|
trusted library allocation
|
page read and write
|
||
5F13000
|
heap
|
page read and write
|
||
6C8E000
|
stack
|
page read and write
|
||
2BFE000
|
unkown
|
page read and write
|
||
70BC000
|
stack
|
page read and write
|
||
616F000
|
stack
|
page read and write
|
||
711D000
|
stack
|
page read and write
|
||
153E000
|
heap
|
page read and write
|
||
6A2E000
|
stack
|
page read and write
|
||
765C000
|
stack
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
61EF000
|
heap
|
page read and write
|
||
2F01000
|
trusted library allocation
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
6FE0000
|
heap
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
64A0000
|
trusted library allocation
|
page read and write
|
||
2D1B000
|
trusted library allocation
|
page read and write
|
||
68F0000
|
trusted library allocation
|
page execute and read and write
|
||
67D0000
|
heap
|
page read and write
|
||
6F0E000
|
stack
|
page read and write
|
||
4B9E000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
2A00000
|
heap
|
page execute and read and write
|
||
60CF000
|
stack
|
page read and write
|
||
2957000
|
trusted library allocation
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
FB5000
|
heap
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
168B000
|
trusted library allocation
|
page execute and read and write
|
||
434A000
|
trusted library allocation
|
page read and write
|
||
4B89000
|
trusted library allocation
|
page read and write
|
||
767E000
|
stack
|
page read and write
|
||
33DF000
|
unkown
|
page read and write
|
||
71F0000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
4B91000
|
trusted library allocation
|
page read and write
|
||
BFD000
|
trusted library allocation
|
page execute and read and write
|
||
2830000
|
heap
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
6930000
|
trusted library allocation
|
page execute and read and write
|
||
2D20000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
5E10000
|
trusted library allocation
|
page read and write
|
||
5730000
|
heap
|
page read and write
|
||
580E000
|
stack
|
page read and write
|
||
618E000
|
stack
|
page read and write
|
||
6073000
|
heap
|
page read and write
|
||
17AE000
|
stack
|
page read and write
|
||
AF2000
|
trusted library allocation
|
page read and write
|
||
1337000
|
stack
|
page read and write
|
||
5EE2000
|
heap
|
page read and write
|
||
59E0000
|
heap
|
page execute and read and write
|
||
4CD0000
|
trusted library allocation
|
page read and write
|
||
614F000
|
stack
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
5198000
|
trusted library allocation
|
page read and write
|
||
B2E000
|
stack
|
page read and write
|
||
4281000
|
trusted library allocation
|
page read and write
|
||
69A0000
|
heap
|
page read and write
|
||
508D000
|
stack
|
page read and write
|
||
5670000
|
trusted library allocation
|
page read and write
|
||
69D0000
|
trusted library allocation
|
page execute and read and write
|
||
C30000
|
heap
|
page read and write
|
||
668E000
|
stack
|
page read and write
|
||
6D1E000
|
stack
|
page read and write
|
||
6640000
|
heap
|
page read and write
|
||
4B5E000
|
trusted library allocation
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
57CE000
|
stack
|
page read and write
|
||
6A80000
|
heap
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
290E000
|
stack
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
65B2000
|
heap
|
page read and write
|
||
656C000
|
heap
|
page read and write
|
||
69BB000
|
stack
|
page read and write
|
||
5EB4000
|
heap
|
page read and write
|
||
171D000
|
trusted library allocation
|
page execute and read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
6EA0000
|
heap
|
page read and write
|
||
72A0000
|
trusted library allocation
|
page execute and read and write
|
||
571E000
|
trusted library allocation
|
page read and write
|
||
42FF000
|
trusted library allocation
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
697F000
|
stack
|
page read and write
|
||
762C000
|
stack
|
page read and write
|
||
DE8000
|
heap
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
989000
|
heap
|
page read and write
|
||
2EF0000
|
trusted library allocation
|
page execute and read and write
|
||
1F0000
|
heap
|
page read and write
|
||
347E000
|
unkown
|
page read and write
|
||
64C0000
|
trusted library allocation
|
page execute and read and write
|
||
B02000
|
trusted library allocation
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
2F1D000
|
stack
|
page read and write
|
||
6650000
|
heap
|
page read and write
|
||
307F000
|
trusted library allocation
|
page read and write
|
||
4DF3000
|
heap
|
page read and write
|
||
4F4D000
|
stack
|
page read and write
|
||
62D000
|
stack
|
page read and write
|
||
6587000
|
heap
|
page read and write
|
||
230F000
|
trusted library allocation
|
page read and write
|
||
9CF000
|
heap
|
page read and write
|
||
6900000
|
trusted library allocation
|
page execute and read and write
|
||
295C000
|
trusted library allocation
|
page read and write
|
||
4F50000
|
heap
|
page execute and read and write
|
||
2F85000
|
trusted library allocation
|
page execute and read and write
|
||
7B1F000
|
stack
|
page read and write
|
||
6BDC000
|
stack
|
page read and write
|
||
2D09000
|
trusted library allocation
|
page read and write
|
||
79C0000
|
heap
|
page read and write
|
||
2460000
|
trusted library allocation
|
page read and write
|
||
36C0000
|
heap
|
page read and write
|
||
6FB0000
|
heap
|
page read and write
|
||
32F4000
|
trusted library allocation
|
page read and write
|
||
2CFE000
|
stack
|
page read and write
|
||
352F000
|
heap
|
page read and write
|
||
630E000
|
stack
|
page read and write
|
||
53D0000
|
trusted library allocation
|
page execute and read and write
|
||
53A0000
|
trusted library allocation
|
page read and write
|
||
1740000
|
trusted library allocation
|
page read and write
|
||
471000
|
remote allocation
|
page execute and read and write
|
||
97C000
|
stack
|
page read and write
|
||
31E8000
|
heap
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
22D0000
|
trusted library allocation
|
page read and write
|
||
666A000
|
heap
|
page read and write
|
||
BE5000
|
heap
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page execute and read and write
|
||
5F04000
|
heap
|
page read and write
|
||
56A0000
|
trusted library allocation
|
page read and write
|
||
6FDD000
|
stack
|
page read and write
|
||
FB5000
|
heap
|
page read and write
|
||
56BF000
|
trusted library allocation
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
63FE000
|
stack
|
page read and write
|
||
64B0000
|
trusted library allocation
|
page read and write
|
||
34C4000
|
trusted library allocation
|
page read and write
|
||
30BB000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
677C000
|
stack
|
page read and write
|
||
408D000
|
trusted library allocation
|
page read and write
|
||
6060000
|
heap
|
page read and write
|
||
1704000
|
trusted library allocation
|
page read and write
|
||
2841000
|
trusted library allocation
|
page read and write
|
||
674E000
|
stack
|
page read and write
|
||
60DE000
|
stack
|
page read and write
|
||
3F2F000
|
trusted library allocation
|
page read and write
|
||
1000000
|
trusted library allocation
|
page read and write
|
||
8B6000
|
trusted library allocation
|
page execute and read and write
|
||
2EFD000
|
stack
|
page read and write
|
||
2D72000
|
heap
|
page read and write
|
||
3BEF000
|
trusted library allocation
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
60F0000
|
trusted library allocation
|
page read and write
|
||
1086000
|
trusted library allocation
|
page read and write
|
||
564E000
|
stack
|
page read and write
|
||
4B8F000
|
trusted library allocation
|
page read and write
|
||
329E000
|
stack
|
page read and write
|
||
2BA0000
|
heap
|
page execute and read and write
|
||
4E7E000
|
stack
|
page read and write
|
||
2ECF000
|
stack
|
page read and write
|
||
43EF000
|
trusted library allocation
|
page read and write
|
||
2D36000
|
heap
|
page read and write
|
||
65DE000
|
stack
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
6915000
|
trusted library allocation
|
page read and write
|
||
3256000
|
heap
|
page read and write
|
||
2A90000
|
direct allocation
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
2CCF000
|
unkown
|
page read and write
|
||
A91000
|
heap
|
page read and write
|
||
1956000
|
trusted library allocation
|
page read and write
|
||
60F7000
|
heap
|
page read and write
|
||
EB2000
|
trusted library allocation
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
980000
|
trusted library allocation
|
page read and write
|
||
F16000
|
heap
|
page read and write
|
||
301E000
|
stack
|
page read and write
|
||
6340000
|
trusted library allocation
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
5F1E000
|
stack
|
page read and write
|
||
2F1F000
|
unkown
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
629F000
|
stack
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
5745000
|
trusted library allocation
|
page read and write
|
||
13DE000
|
stack
|
page read and write
|
||
2F50000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
3349000
|
trusted library allocation
|
page read and write
|
||
6510000
|
trusted library allocation
|
page read and write
|
||
5580000
|
trusted library allocation
|
page read and write
|
||
920000
|
trusted library allocation
|
page read and write
|
||
554D000
|
stack
|
page read and write
|
||
FDA000
|
stack
|
page read and write
|
||
34DD000
|
trusted library allocation
|
page read and write
|
||
2B66000
|
heap
|
page read and write
|
||
646F000
|
stack
|
page read and write
|
||
59AE000
|
stack
|
page read and write
|
||
C0B000
|
heap
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
1557000
|
heap
|
page read and write
|
||
77EE000
|
stack
|
page read and write
|
||
5CD0000
|
trusted library allocation
|
page execute and read and write
|
||
39D000
|
stack
|
page read and write
|
||
570B000
|
trusted library allocation
|
page read and write
|
||
2775000
|
trusted library allocation
|
page read and write
|
||
4BE0000
|
heap
|
page read and write
|
||
3493000
|
heap
|
page read and write
|
||
1654000
|
trusted library allocation
|
page read and write
|
||
6810000
|
heap
|
page read and write
|
||
FA6000
|
trusted library allocation
|
page read and write
|
||
57DF000
|
stack
|
page read and write
|
||
2440000
|
trusted library allocation
|
page read and write
|
||
1064000
|
trusted library allocation
|
page read and write
|
||
4B20000
|
trusted library allocation
|
page read and write
|
||
1026000
|
trusted library allocation
|
page execute and read and write
|
||
52BC000
|
stack
|
page read and write
|
||
2D73000
|
heap
|
page read and write
|
||
9B0000
|
trusted library allocation
|
page read and write
|
||
5890000
|
trusted library allocation
|
page read and write
|
||
32F3000
|
heap
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
62CF000
|
stack
|
page read and write
|
||
65BE000
|
stack
|
page read and write
|
||
2351000
|
trusted library allocation
|
page read and write
|
||
968000
|
heap
|
page read and write
|
||
6F1E000
|
stack
|
page read and write
|
||
2CBE000
|
stack
|
page read and write
|
||
2BB3000
|
trusted library allocation
|
page read and write
|
||
3096000
|
trusted library allocation
|
page read and write
|
||
5ED5000
|
heap
|
page read and write
|
||
6BCD000
|
heap
|
page read and write
|
||
28EF000
|
unkown
|
page read and write
|
||
564F000
|
stack
|
page read and write
|
||
62D0000
|
heap
|
page read and write
|
||
458F000
|
trusted library allocation
|
page read and write
|
||
3ED1000
|
trusted library allocation
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
8A0000
|
trusted library allocation
|
page read and write
|
||
709E000
|
trusted library allocation
|
page read and write
|
||
16D0000
|
heap
|
page read and write
|
||
5860000
|
trusted library allocation
|
page execute and read and write
|
||
2F5D000
|
trusted library allocation
|
page execute and read and write
|
||
5C48000
|
heap
|
page read and write
|
||
FA0000
|
trusted library allocation
|
page read and write
|
||
5661000
|
trusted library allocation
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
6490000
|
trusted library allocation
|
page read and write
|
||
33FC000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
33F0000
|
heap
|
page read and write
|
||
1736000
|
trusted library allocation
|
page execute and read and write
|
||
6380000
|
trusted library allocation
|
page execute and read and write
|
||
B79000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
3450000
|
heap
|
page read and write
|
||
4B6D000
|
trusted library allocation
|
page read and write
|
||
14F0000
|
trusted library allocation
|
page read and write
|
||
D37000
|
stack
|
page read and write
|
||
635A000
|
heap
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
3460000
|
heap
|
page read and write
|
||
101D000
|
trusted library allocation
|
page execute and read and write
|
||
6064000
|
heap
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
FC5000
|
trusted library allocation
|
page read and write
|
||
71CC000
|
stack
|
page read and write
|
||
22CB000
|
trusted library allocation
|
page read and write
|
||
349A000
|
trusted library allocation
|
page read and write
|
||
630E000
|
stack
|
page read and write
|
||
5E3E000
|
stack
|
page read and write
|
||
6ACE000
|
heap
|
page read and write
|
||
1954000
|
trusted library allocation
|
page read and write
|
||
1653000
|
trusted library allocation
|
page execute and read and write
|
||
68D000
|
stack
|
page read and write
|
||
246B000
|
trusted library allocation
|
page execute and read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
5171000
|
trusted library allocation
|
page read and write
|
||
68A0000
|
heap
|
page read and write
|
||
2D0D000
|
stack
|
page read and write
|
||
D8E000
|
stack
|
page read and write
|
||
56B8000
|
trusted library allocation
|
page read and write
|
||
29C5000
|
trusted library allocation
|
page read and write
|
||
30F8000
|
heap
|
page read and write
|
||
320E000
|
stack
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
7ACE000
|
stack
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
6ABE000
|
stack
|
page read and write
|
||
1676000
|
trusted library allocation
|
page execute and read and write
|
||
688C000
|
stack
|
page read and write
|
||
2B80000
|
heap
|
page read and write
|
||
7F8000
|
heap
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
7060000
|
trusted library allocation
|
page execute and read and write
|
||
70B0000
|
trusted library allocation
|
page read and write
|
||
1700000
|
trusted library allocation
|
page read and write
|
||
3051000
|
trusted library allocation
|
page read and write
|
||
3014000
|
trusted library allocation
|
page read and write
|
||
6F96000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
FFE000
|
stack
|
page read and write
|
||
143E000
|
stack
|
page read and write
|
||
6A4E000
|
stack
|
page read and write
|
||
728C000
|
stack
|
page read and write
|
||
7020000
|
trusted library allocation
|
page read and write
|
||
3270000
|
heap
|
page read and write
|
||
EE0000
|
trusted library allocation
|
page read and write
|
||
B6E000
|
stack
|
page read and write
|
||
61BE000
|
stack
|
page read and write
|
||
2751000
|
trusted library allocation
|
page read and write
|
||
33F8000
|
heap
|
page read and write
|
||
81D000
|
stack
|
page read and write
|
||
2E0F000
|
stack
|
page read and write
|
||
5380000
|
trusted library allocation
|
page read and write
|
||
68CE000
|
stack
|
page read and write
|
||
2CCB000
|
trusted library allocation
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
5503000
|
heap
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page execute and read and write
|
||
26F9000
|
trusted library allocation
|
page read and write
|
||
90D000
|
stack
|
page read and write
|
||
2D85000
|
trusted library allocation
|
page read and write
|
||
D3E000
|
stack
|
page read and write
|
||
6B8F000
|
heap
|
page read and write
|
There are 2544 hidden memdumps, click here to show them.