Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
LisectAVT_2403002A_29.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\LisectAVT_2403002A_29.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\svchost.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage user DataBase, version 0x620, checksum 0xae2b4804, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_dae5beae797db3ecbb8fa0e3475fee7a94437a_7c70d214_3cc1fd1a-b0cd-4737-9eb1-8abc11b81acf\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_dae5beae797db3ecbb8fa0e3475fee7a94437a_7c70d214_53517162-9d0a-4a4e-8846-387dccff8f9e\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_dae5beae797db3ecbb8fa0e3475fee7a94437a_7c70d214_8052cdf5-e893-4404-94d0-50bb24e27abc\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_dae5beae797db3ecbb8fa0e3475fee7a94437a_7c70d214_dfc11d99-f50b-48ba-81f2-80667f6ca4c0\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB0D8.tmp.dmp
|
Mini DuMP crash report, 16 streams, Thu Jul 25 19:54:06 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB388.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB3E7.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB3F5.tmp.csv
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB482.tmp.txt
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB646.tmp.dmp
|
Mini DuMP crash report, 16 streams, Thu Jul 25 19:54:08 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBAFA.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBB3A.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBB4A.tmp.csv
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBBE7.tmp.txt
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD632.tmp.dmp
|
Mini DuMP crash report, 16 streams, Thu Jul 25 19:54:15 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD7F8.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD828.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD859.tmp.csv
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD906.tmp.txt
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF524.tmp.dmp
|
Mini DuMP crash report, 16 streams, Thu Jul 25 19:54:23 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF748.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF797.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF7DA.tmp.csv
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF980.tmp.txt
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp990A.tmp.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
\Device\Null
|
ASCII text, with CRLF line terminators, with overstriking
|
dropped
|
There are 24 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\LisectAVT_2403002A_29.exe
|
"C:\Users\user\Desktop\LisectAVT_2403002A_29.exe"
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"'
& exit
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp990A.tmp.bat""
|
||
C:\Windows\System32\schtasks.exe
|
schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"'
|
||
C:\Users\user\AppData\Roaming\svchost.exe
|
C:\Users\user\AppData\Roaming\svchost.exe
|
||
C:\Users\user\AppData\Roaming\svchost.exe
|
"C:\Users\user\AppData\Roaming\svchost.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k WerSvcGroup
|
||
C:\Users\user\AppData\Roaming\svchost.exe
|
"C:\Users\user\AppData\Roaming\svchost.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
|
||
C:\Users\user\AppData\Roaming\svchost.exe
|
"C:\Users\user\AppData\Roaming\svchost.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\timeout.exe
|
timeout 3
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -pss -s 464 -p 1808 -ip 1808
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 1808 -s 1044
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -pss -s 428 -p 3260 -ip 3260
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 3260 -s 1212
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -pss -s 536 -p 7280 -ip 7280
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 7280 -s 1192
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -pss -s 572 -p 7572 -ip 7572
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 7572 -s 1204
|
There are 23 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV21C:
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://g.live.com/odclientsettings/Prod1C:
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://cp8nl.hyperhost.ua
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
cp8nl.hyperhost.ua
|
185.174.175.187
|
||
bg.microsoft.map.fastly.net
|
199.232.214.172
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.174.175.187
|
cp8nl.hyperhost.ua
|
Ukraine
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
svchost
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
|
ProgramId
|
||
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
|
FileId
|
||
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
|
LowerCaseLongPath
|
||
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
|
LongPathHash
|
||
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
|
Name
|
||
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
|
OriginalFileName
|
||
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
|
Publisher
|
||
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
|
Version
|
||
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
|
BinFileVersion
|
||
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
|
BinaryType
|
||
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
|
ProductName
|
||
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
|
ProductVersion
|
||
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
|
LinkDate
|
||
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
|
BinProductVersion
|
||
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
|
AppxPackageFullName
|
||
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
|
Size
|
||
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
|
Language
|
||
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018000DDABBE6B3
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018000DDABBE6B3
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
There are 17 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
17052012000
|
trusted library allocation
|
page read and write
|
||
308E000
|
trusted library allocation
|
page read and write
|
||
2AC1000
|
trusted library allocation
|
page read and write
|
||
1F244011000
|
trusted library allocation
|
page read and write
|
||
2CDE000
|
trusted library allocation
|
page read and write
|
||
2B0E000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
21D90C2C000
|
trusted library allocation
|
page read and write
|
||
191004DC000
|
trusted library allocation
|
page read and write
|
||
2B39000
|
trusted library allocation
|
page read and write
|
||
1704247C000
|
trusted library allocation
|
page read and write
|
||
2A11000
|
trusted library allocation
|
page read and write
|
||
30B9000
|
trusted library allocation
|
page read and write
|
||
2D09000
|
trusted library allocation
|
page read and write
|
||
3041000
|
trusted library allocation
|
page read and write
|
||
1911138A000
|
trusted library allocation
|
page read and write
|
||
214422A8000
|
trusted library allocation
|
page read and write
|
||
21D9084F000
|
trusted library allocation
|
page read and write
|
||
2A8C000
|
trusted library allocation
|
page read and write
|
||
2CC7000
|
trusted library allocation
|
page read and write
|
||
2A61000
|
trusted library allocation
|
page read and write
|
||
21452241000
|
trusted library allocation
|
page read and write
|
||
21DA92E0000
|
heap
|
page read and write
|
||
7FFD347E0000
|
trusted library allocation
|
page read and write
|
||
51EB000
|
trusted library allocation
|
page read and write
|
||
1B9F3F02000
|
heap
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page read and write
|
||
DE4000
|
trusted library allocation
|
page read and write
|
||
B82AA7E000
|
unkown
|
page readonly
|
||
298F0E10000
|
heap
|
page read and write
|
||
55A3000
|
heap
|
page read and write
|
||
298F0EF2000
|
heap
|
page read and write
|
||
E15000
|
heap
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page read and write
|
||
275E000
|
stack
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
DF7000
|
heap
|
page read and write
|
||
7FFD34626000
|
trusted library allocation
|
page read and write
|
||
21D8EF50000
|
heap
|
page read and write
|
||
7FFD34750000
|
trusted library allocation
|
page read and write
|
||
509C000
|
stack
|
page read and write
|
||
4FAE000
|
trusted library allocation
|
page read and write
|
||
21D8ED42000
|
heap
|
page read and write
|
||
5570000
|
trusted library allocation
|
page read and write
|
||
560F000
|
stack
|
page read and write
|
||
5048000
|
trusted library allocation
|
page read and write
|
||
B82B97E000
|
unkown
|
page readonly
|
||
51F2000
|
trusted library allocation
|
page read and write
|
||
7FFD346F0000
|
trusted library allocation
|
page execute and read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
21D908F3000
|
trusted library allocation
|
page read and write
|
||
11DE000
|
stack
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
7FFD346D0000
|
trusted library allocation
|
page execute and read and write
|
||
21D9086E000
|
trusted library allocation
|
page read and write
|
||
1F233FA3000
|
trusted library allocation
|
page read and write
|
||
214524C8000
|
trusted library allocation
|
page read and write
|
||
2145A92F000
|
trusted library section
|
page readonly
|
||
21D90A11000
|
trusted library allocation
|
page read and write
|
||
17041FA1000
|
trusted library allocation
|
page read and write
|
||
298EC440000
|
trusted library allocation
|
page read and write
|
||
7FFD34816000
|
trusted library allocation
|
page read and write
|
||
FBE000
|
stack
|
page read and write
|
||
2145AE02000
|
heap
|
page read and write
|
||
1F23222E000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
7FFD346E4000
|
trusted library allocation
|
page read and write
|
||
17040570000
|
heap
|
page read and write
|
||
1F24CB7E000
|
heap
|
page read and write
|
||
553E000
|
trusted library allocation
|
page read and write
|
||
17041FA3000
|
trusted library allocation
|
page read and write
|
||
5EFE000
|
stack
|
page read and write
|
||
1F232520000
|
heap
|
page read and write
|
||
298F0E83000
|
heap
|
page read and write
|
||
298EB620000
|
heap
|
page read and write
|
||
19173D02000
|
heap
|
page read and write
|
||
1F234078000
|
trusted library allocation
|
page read and write
|
||
21D90933000
|
trusted library allocation
|
page read and write
|
||
19173A3B000
|
heap
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
170405D0000
|
heap
|
page execute and read and write
|
||
4E50000
|
heap
|
page read and write
|
||
7FFD34575000
|
trusted library allocation
|
page read and write
|
||
7FFD34800000
|
trusted library allocation
|
page read and write
|
||
2145B010000
|
heap
|
page read and write
|
||
2145AD78000
|
heap
|
page read and write
|
||
7FFD3457D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347F0000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
1F2322AD000
|
heap
|
page read and write
|
||
527E000
|
stack
|
page read and write
|
||
1A189D02000
|
heap
|
page read and write
|
||
21D90930000
|
trusted library allocation
|
page read and write
|
||
5F47000
|
trusted library allocation
|
page read and write
|
||
B82BD7E000
|
unkown
|
page readonly
|
||
13B0000
|
heap
|
page read and write
|
||
7FFD34534000
|
trusted library allocation
|
page read and write
|
||
7FFD345F0000
|
trusted library allocation
|
page execute and read and write
|
||
1705AC19000
|
heap
|
page read and write
|
||
6464000
|
heap
|
page read and write
|
||
7FFD346E9000
|
trusted library allocation
|
page read and write
|
||
B82CA7E000
|
unkown
|
page readonly
|
||
4FBA000
|
trusted library allocation
|
page read and write
|
||
298F0EE5000
|
heap
|
page read and write
|
||
2960000
|
trusted library allocation
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page read and write
|
||
656E000
|
stack
|
page read and write
|
||
5F3E000
|
stack
|
page read and write
|
||
5520000
|
trusted library allocation
|
page read and write
|
||
298EB800000
|
heap
|
page read and write
|
||
1396000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
21D8ED0D000
|
heap
|
page read and write
|
||
21440813000
|
heap
|
page read and write
|
||
17040253000
|
heap
|
page read and write
|
||
7FFD3453B000
|
trusted library allocation
|
page read and write
|
||
1F23403E000
|
trusted library allocation
|
page read and write
|
||
30C9000
|
trusted library allocation
|
page read and write
|
||
1393000
|
trusted library allocation
|
page execute and read and write
|
||
5956000
|
trusted library allocation
|
page read and write
|
||
1BA15FF000
|
stack
|
page read and write
|
||
4FAB000
|
trusted library allocation
|
page read and write
|
||
7FFD34550000
|
trusted library allocation
|
page read and write
|
||
298EB892000
|
heap
|
page read and write
|
||
7FFD34620000
|
trusted library allocation
|
page execute and read and write
|
||
7022DFE000
|
stack
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
214421B0000
|
heap
|
page read and write
|
||
7FFD34767000
|
trusted library allocation
|
page read and write
|
||
7FFD3456D000
|
trusted library allocation
|
page execute and read and write
|
||
1B9F3F13000
|
heap
|
page read and write
|
||
2B35000
|
trusted library allocation
|
page read and write
|
||
1705AC7C000
|
heap
|
page read and write
|
||
1705AB00000
|
heap
|
page read and write
|
||
2145AD80000
|
heap
|
page read and write
|
||
D2E000
|
stack
|
page read and write
|
||
C3A000
|
heap
|
page read and write
|
||
21D8ECE1000
|
heap
|
page read and write
|
||
19177113000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
539F000
|
stack
|
page read and write
|
||
13E8000
|
heap
|
page read and write
|
||
19173A3F000
|
heap
|
page read and write
|
||
7FFD34711000
|
trusted library allocation
|
page read and write
|
||
1F243FA8000
|
trusted library allocation
|
page read and write
|
||
4FBE000
|
trusted library allocation
|
page read and write
|
||
7FFD347CF000
|
trusted library allocation
|
page read and write
|
||
5768000
|
trusted library allocation
|
page read and write
|
||
B82B37B000
|
stack
|
page read and write
|
||
6AB0000
|
trusted library allocation
|
page read and write
|
||
21D908B1000
|
trusted library allocation
|
page read and write
|
||
5776000
|
trusted library allocation
|
page read and write
|
||
51E6000
|
trusted library allocation
|
page read and write
|
||
7FFD347E1000
|
trusted library allocation
|
page read and write
|
||
298F0D80000
|
remote allocation
|
page read and write
|
||
653E000
|
stack
|
page read and write
|
||
56AD000
|
stack
|
page read and write
|
||
5C0F000
|
stack
|
page read and write
|
||
4E6D000
|
stack
|
page read and write
|
||
7FFD34714000
|
trusted library allocation
|
page read and write
|
||
7FFD3476C000
|
trusted library allocation
|
page read and write
|
||
185E3AE0000
|
heap
|
page read and write
|
||
19110072000
|
trusted library allocation
|
page read and write
|
||
7FFD347E0000
|
trusted library allocation
|
page read and write
|
||
1F233FA1000
|
trusted library allocation
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
1C611168000
|
heap
|
page read and write
|
||
21DA8F50000
|
heap
|
page read and write
|
||
7FFD3458D000
|
trusted library allocation
|
page execute and read and write
|
||
6370000
|
trusted library allocation
|
page read and write
|
||
635E000
|
stack
|
page read and write
|
||
7FFD34690000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3478B000
|
trusted library allocation
|
page read and write
|
||
7FFD34786000
|
trusted library allocation
|
page read and write
|
||
7FFD346D2000
|
trusted library allocation
|
page read and write
|
||
1705B010000
|
heap
|
page read and write
|
||
7022993000
|
stack
|
page read and write
|
||
1F2322BE000
|
heap
|
page read and write
|
||
298F0BE1000
|
trusted library allocation
|
page read and write
|
||
631E000
|
stack
|
page read and write
|
||
537E000
|
stack
|
page read and write
|
||
1A189CC0000
|
heap
|
page read and write
|
||
7FFD3470A000
|
trusted library allocation
|
page read and write
|
||
7FFD3458A000
|
trusted library allocation
|
page read and write
|
||
7FFD34746000
|
trusted library allocation
|
page read and write
|
||
5030000
|
heap
|
page read and write
|
||
2CF7000
|
trusted library allocation
|
page read and write
|
||
1F233FB3000
|
trusted library allocation
|
page read and write
|
||
5020000
|
heap
|
page read and write
|
||
21D90981000
|
trusted library allocation
|
page read and write
|
||
214423A3000
|
trusted library allocation
|
page read and write
|
||
7FFD34570000
|
trusted library allocation
|
page read and write
|
||
7FFD34700000
|
trusted library allocation
|
page read and write
|
||
7FFD34690000
|
trusted library allocation
|
page execute and read and write
|
||
4DA8BFE000
|
unkown
|
page readonly
|
||
4AC8000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
trusted library allocation
|
page read and write
|
||
21DA90D0000
|
heap
|
page read and write
|
||
214521D1000
|
trusted library allocation
|
page read and write
|
||
1B9F3F00000
|
heap
|
page read and write
|
||
1F24D010000
|
heap
|
page read and write
|
||
FD7000
|
trusted library allocation
|
page execute and read and write
|
||
4FB2000
|
trusted library allocation
|
page read and write
|
||
7FFD34724000
|
trusted library allocation
|
page read and write
|
||
298EB600000
|
heap
|
page read and write
|
||
298F0BE0000
|
trusted library allocation
|
page read and write
|
||
19175D20000
|
heap
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
1BA12FF000
|
stack
|
page read and write
|
||
298F0BE0000
|
trusted library allocation
|
page read and write
|
||
287E000
|
trusted library allocation
|
page read and write
|
||
5C86000
|
trusted library allocation
|
page read and write
|
||
17042173000
|
trusted library allocation
|
page read and write
|
||
17040702000
|
heap
|
page read and write
|
||
1F243FB1000
|
trusted library allocation
|
page read and write
|
||
1F23402C000
|
trusted library allocation
|
page read and write
|
||
21D8ED0B000
|
heap
|
page read and write
|
||
1B9F3A78000
|
heap
|
page read and write
|
||
5576000
|
trusted library allocation
|
page read and write
|
||
BA964FD000
|
stack
|
page read and write
|
||
515E000
|
stack
|
page read and write
|
||
7FFD34581000
|
trusted library allocation
|
page read and write
|
||
17040560000
|
trusted library allocation
|
page read and write
|
||
4F8C000
|
stack
|
page read and write
|
||
139D000
|
trusted library allocation
|
page execute and read and write
|
||
1F2321B0000
|
trusted library allocation
|
page read and write
|
||
5190000
|
heap
|
page execute and read and write
|
||
21D8EE95000
|
heap
|
page read and write
|
||
675E000
|
stack
|
page read and write
|
||
19175CC0000
|
trusted library allocation
|
page read and write
|
||
287B000
|
trusted library allocation
|
page read and write
|
||
7FFD346C2000
|
trusted library allocation
|
page execute and read and write
|
||
2145A8A0000
|
trusted library allocation
|
page read and write
|
||
4F93000
|
heap
|
page read and write
|
||
5F17000
|
heap
|
page read and write
|
||
191001D3000
|
trusted library allocation
|
page read and write
|
||
7FFD347AE000
|
trusted library allocation
|
page read and write
|
||
1B9F3A2B000
|
heap
|
page read and write
|
||
1005FF000
|
stack
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
55A0000
|
heap
|
page read and write
|
||
21440699000
|
heap
|
page read and write
|
||
873BEFF000
|
stack
|
page read and write
|
||
21DA90DE000
|
heap
|
page read and write
|
||
7FFD347C2000
|
trusted library allocation
|
page read and write
|
||
5CE0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34710000
|
trusted library allocation
|
page read and write
|
||
17040500000
|
heap
|
page read and write
|
||
298F0E2D000
|
heap
|
page read and write
|
||
298F0E20000
|
heap
|
page read and write
|
||
5E06000
|
trusted library allocation
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
1F232654000
|
heap
|
page read and write
|
||
19175620000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
C4E000
|
heap
|
page read and write
|
||
6280000
|
trusted library allocation
|
page read and write
|
||
DA4000
|
trusted library allocation
|
page read and write
|
||
7FFD34775000
|
trusted library allocation
|
page read and write
|
||
4FC6000
|
trusted library allocation
|
page read and write
|
||
5290000
|
heap
|
page execute and read and write
|
||
21DAA5D0000
|
trusted library section
|
page read and write
|
||
6220000
|
trusted library allocation
|
page read and write
|
||
B82C27E000
|
unkown
|
page readonly
|
||
170402A9000
|
heap
|
page read and write
|
||
2896000
|
trusted library allocation
|
page read and write
|
||
6040000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347AD000
|
trusted library allocation
|
page read and write
|
||
21DA90C0000
|
heap
|
page read and write
|
||
7FFD34740000
|
trusted library allocation
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
68B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34620000
|
trusted library allocation
|
page read and write
|
||
7FFD3469F000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34594000
|
trusted library allocation
|
page read and write
|
||
7FFD34720000
|
trusted library allocation
|
page execute and read and write
|
||
B82B67E000
|
unkown
|
page readonly
|
||
D2398F3000
|
stack
|
page read and write
|
||
13FF000
|
heap
|
page read and write
|
||
19175CF0000
|
heap
|
page execute and read and write
|
||
21DAAAD2000
|
trusted library allocation
|
page read and write
|
||
1394000
|
trusted library allocation
|
page read and write
|
||
2D19000
|
trusted library allocation
|
page read and write
|
||
7FFD3459B000
|
trusted library allocation
|
page execute and read and write
|
||
4DA8DFE000
|
unkown
|
page readonly
|
||
298EBF02000
|
heap
|
page read and write
|
||
2144232E000
|
trusted library allocation
|
page read and write
|
||
FCA000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
518E000
|
stack
|
page read and write
|
||
1B9F3A3A000
|
heap
|
page read and write
|
||
21D908E3000
|
trusted library allocation
|
page read and write
|
||
B82B47E000
|
unkown
|
page readonly
|
||
170402FF000
|
heap
|
page read and write
|
||
BA966FE000
|
stack
|
page read and write
|
||
298EB870000
|
heap
|
page read and write
|
||
574E000
|
stack
|
page read and write
|
||
6910000
|
heap
|
page read and write
|
||
191738B0000
|
heap
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page execute and read and write
|
||
5780000
|
heap
|
page execute and read and write
|
||
F86000
|
heap
|
page read and write
|
||
170402D9000
|
heap
|
page read and write
|
||
7FFD34659000
|
trusted library allocation
|
page execute and read and write
|
||
595C000
|
trusted library allocation
|
page read and write
|
||
4FA6000
|
trusted library allocation
|
page read and write
|
||
7FFD34530000
|
trusted library allocation
|
page read and write
|
||
7FFD34543000
|
trusted library allocation
|
page read and write
|
||
298EBF1A000
|
heap
|
page read and write
|
||
5C90000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3476B000
|
trusted library allocation
|
page read and write
|
||
1380000
|
trusted library allocation
|
page read and write
|
||
EAD000
|
heap
|
page read and write
|
||
13B2000
|
trusted library allocation
|
page read and write
|
||
BF9000
|
heap
|
page read and write
|
||
1390000
|
trusted library allocation
|
page read and write
|
||
21DA92C5000
|
heap
|
page read and write
|
||
2B29000
|
trusted library allocation
|
page read and write
|
||
19177235000
|
heap
|
page read and write
|
||
2145AD17000
|
heap
|
page read and write
|
||
7FFD3474A000
|
trusted library allocation
|
page read and write
|
||
21D909E2000
|
trusted library allocation
|
page read and write
|
||
13A7000
|
trusted library allocation
|
page execute and read and write
|
||
21D90967000
|
trusted library allocation
|
page read and write
|
||
19176010000
|
heap
|
page read and write
|
||
19173C13000
|
heap
|
page read and write
|
||
21D8ECE3000
|
heap
|
page read and write
|
||
7FFD34782000
|
trusted library allocation
|
page read and write
|
||
B82BA7D000
|
stack
|
page read and write
|
||
1457000
|
heap
|
page read and write
|
||
21DA8F70000
|
heap
|
page read and write
|
||
6400000
|
heap
|
page read and write
|
||
298EC101000
|
trusted library allocation
|
page read and write
|
||
1001FE000
|
stack
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
1BA14FE000
|
stack
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
6226000
|
trusted library allocation
|
page read and write
|
||
2145A920000
|
trusted library section
|
page readonly
|
||
7FFD3474A000
|
trusted library allocation
|
page read and write
|
||
7FFD34540000
|
trusted library allocation
|
page read and write
|
||
7FFD34699000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3453D000
|
trusted library allocation
|
page execute and read and write
|
||
21D8ECA0000
|
heap
|
page read and write
|
||
21D908D6000
|
trusted library allocation
|
page read and write
|
||
E03000
|
heap
|
page read and write
|
||
19110008000
|
trusted library allocation
|
page read and write
|
||
1C611080000
|
heap
|
page read and write
|
||
298EB913000
|
heap
|
page read and write
|
||
1F24BFD0000
|
trusted library allocation
|
page read and write
|
||
7FFD346BB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34564000
|
trusted library allocation
|
page read and write
|
||
2B27000
|
trusted library allocation
|
page read and write
|
||
E55000
|
heap
|
page read and write
|
||
298EB8B2000
|
heap
|
page read and write
|
||
CB1000
|
heap
|
page read and write
|
||
21D90887000
|
trusted library allocation
|
page read and write
|
||
5706000
|
trusted library allocation
|
page read and write
|
||
298F0980000
|
trusted library allocation
|
page read and write
|
||
7FFD347F0000
|
trusted library allocation
|
page execute and read and write
|
||
21D90918000
|
trusted library allocation
|
page read and write
|
||
2145A8D0000
|
heap
|
page execute and read and write
|
||
2AEB000
|
trusted library allocation
|
page execute and read and write
|
||
1B9F3A39000
|
heap
|
page read and write
|
||
28C0000
|
trusted library allocation
|
page read and write
|
||
51DD000
|
stack
|
page read and write
|
||
555D000
|
trusted library allocation
|
page read and write
|
||
2A94000
|
trusted library allocation
|
page read and write
|
||
7FFD3466C000
|
trusted library allocation
|
page execute and read and write
|
||
DE3000
|
trusted library allocation
|
page execute and read and write
|
||
300F000
|
stack
|
page read and write
|
||
F79000
|
heap
|
page read and write
|
||
B82A38B000
|
stack
|
page read and write
|
||
21D8ED90000
|
heap
|
page read and write
|
||
1F2321F0000
|
trusted library allocation
|
page read and write
|
||
5720000
|
heap
|
page read and write
|
||
50DE000
|
stack
|
page read and write
|
||
1705AB02000
|
heap
|
page read and write
|
||
5212000
|
trusted library allocation
|
page read and write
|
||
21DA90C3000
|
heap
|
page read and write
|
||
21D909D1000
|
trusted library allocation
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page execute and read and write
|
||
645E000
|
stack
|
page read and write
|
||
1A189D03000
|
heap
|
page read and write
|
||
2145AD1F000
|
heap
|
page read and write
|
||
7FFD34572000
|
trusted library allocation
|
page read and write
|
||
7FFD347D0000
|
trusted library allocation
|
page read and write
|
||
1F234112000
|
trusted library allocation
|
page read and write
|
||
298F0EAE000
|
heap
|
page read and write
|
||
FC6000
|
trusted library allocation
|
page execute and read and write
|
||
2145A200000
|
trusted library allocation
|
page read and write
|
||
54AC000
|
stack
|
page read and write
|
||
17040410000
|
heap
|
page read and write
|
||
214405E0000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
trusted library allocation
|
page read and write
|
||
298F0EE7000
|
heap
|
page read and write
|
||
DA0000
|
trusted library allocation
|
page read and write
|
||
7FFD34803000
|
trusted library allocation
|
page read and write
|
||
B82B07E000
|
unkown
|
page readonly
|
||
21DAA3D0000
|
heap
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
21D8EC50000
|
heap
|
page read and write
|
||
298EBF00000
|
heap
|
page read and write
|
||
30B5000
|
trusted library allocation
|
page read and write
|
||
BA968FF000
|
stack
|
page read and write
|
||
4DA87FE000
|
unkown
|
page readonly
|
||
5920000
|
trusted library allocation
|
page read and write
|
||
BFC000
|
heap
|
page read and write
|
||
E60000
|
trusted library allocation
|
page execute and read and write
|
||
1910010E000
|
trusted library allocation
|
page read and write
|
||
17040654000
|
heap
|
page read and write
|
||
5556000
|
trusted library allocation
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
7FFD34767000
|
trusted library allocation
|
page read and write
|
||
7FFD346A6000
|
trusted library allocation
|
page execute and read and write
|
||
298EBDA0000
|
trusted library section
|
page read and write
|
||
298F0E61000
|
heap
|
page read and write
|
||
21D8EC80000
|
heap
|
page read and write
|
||
19175D00000
|
heap
|
page read and write
|
||
B82AB7E000
|
stack
|
page read and write
|
||
283C000
|
stack
|
page read and write
|
||
298F0EBA000
|
heap
|
page read and write
|
||
7022CFE000
|
stack
|
page read and write
|
||
17051FA1000
|
trusted library allocation
|
page read and write
|
||
7022EFE000
|
stack
|
page read and write
|
||
3C91000
|
trusted library allocation
|
page read and write
|
||
BEA000
|
heap
|
page read and write
|
||
2980000
|
trusted library allocation
|
page read and write
|
||
7FFD34740000
|
trusted library allocation
|
page read and write
|
||
1B9F3A89000
|
heap
|
page read and write
|
||
1F23403C000
|
trusted library allocation
|
page read and write
|
||
7FFD34550000
|
trusted library allocation
|
page read and write
|
||
1BA13FD000
|
stack
|
page read and write
|
||
13B0000
|
trusted library allocation
|
page read and write
|
||
1705AA02000
|
heap
|
page read and write
|
||
17040239000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
DCA000
|
heap
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
2876000
|
trusted library allocation
|
page read and write
|
||
1B9F3B15000
|
trusted library allocation
|
page read and write
|
||
5E00000
|
trusted library allocation
|
page read and write
|
||
1A189C40000
|
heap
|
page read and write
|
||
56F0000
|
heap
|
page read and write
|
||
214421C0000
|
heap
|
page execute and read and write
|
||
19100003000
|
trusted library allocation
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page execute and read and write
|
||
737FBFF000
|
unkown
|
page read and write
|
||
7FFD3469D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3458D000
|
trusted library allocation
|
page execute and read and write
|
||
554A000
|
trusted library allocation
|
page read and write
|
||
6AA0000
|
trusted library allocation
|
page read and write
|
||
308C000
|
trusted library allocation
|
page read and write
|
||
4DA807C000
|
stack
|
page read and write
|
||
564A000
|
heap
|
page read and write
|
||
E9F000
|
heap
|
page read and write
|
||
B82B6FE000
|
stack
|
page read and write
|
||
7FFD3470C000
|
trusted library allocation
|
page read and write
|
||
B82AC7E000
|
unkown
|
page readonly
|
||
B82AE7E000
|
unkown
|
page readonly
|
||
21D8EE70000
|
heap
|
page read and write
|
||
21D90871000
|
trusted library allocation
|
page read and write
|
||
6127000
|
trusted library allocation
|
page read and write
|
||
1F23223E000
|
heap
|
page read and write
|
||
2145AD7E000
|
heap
|
page read and write
|
||
298F0EF8000
|
heap
|
page read and write
|
||
21DA0758000
|
trusted library allocation
|
page read and write
|
||
21D8EC60000
|
heap
|
page read and write
|
||
1F232110000
|
heap
|
page read and write
|
||
7FFD347C3000
|
trusted library allocation
|
page read and write
|
||
7FFD34740000
|
trusted library allocation
|
page read and write
|
||
21DA9170000
|
heap
|
page read and write
|
||
1705AB35000
|
heap
|
page read and write
|
||
551D000
|
stack
|
page read and write
|
||
19177124000
|
heap
|
page read and write
|
||
7FFD34810000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
trusted library allocation
|
page read and write
|
||
7F790000
|
trusted library allocation
|
page execute and read and write
|
||
B82B27E000
|
unkown
|
page readonly
|
||
6110000
|
heap
|
page read and write
|
||
1BA19FD000
|
stack
|
page read and write
|
||
298F0A00000
|
trusted library allocation
|
page read and write
|
||
298F0F0C000
|
heap
|
page read and write
|
||
21D90897000
|
trusted library allocation
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
21D90879000
|
trusted library allocation
|
page read and write
|
||
7F520000
|
trusted library allocation
|
page execute and read and write
|
||
A2E40FE000
|
stack
|
page read and write
|
||
BA960FE000
|
stack
|
page read and write
|
||
298EB902000
|
heap
|
page read and write
|
||
7FFD3455E000
|
trusted library allocation
|
page execute and read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
D23A0FE000
|
stack
|
page read and write
|
||
511D000
|
stack
|
page read and write
|
||
298F0D80000
|
remote allocation
|
page read and write
|
||
2ABE000
|
stack
|
page read and write
|
||
1A189F60000
|
heap
|
page read and write
|
||
19175CC3000
|
trusted library allocation
|
page read and write
|
||
B82BBFE000
|
stack
|
page read and write
|
||
7FFD346D4000
|
trusted library allocation
|
page read and write
|
||
7FFD3465D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34584000
|
trusted library allocation
|
page read and write
|
||
2A9B000
|
trusted library allocation
|
page read and write
|
||
298EBE00000
|
heap
|
page read and write
|
||
1F2321F3000
|
trusted library allocation
|
page read and write
|
||
100BFD000
|
stack
|
page read and write
|
||
298F0B00000
|
trusted library allocation
|
page read and write
|
||
5E10000
|
trusted library allocation
|
page execute and read and write
|
||
1F243FA1000
|
trusted library allocation
|
page read and write
|
||
2145AD00000
|
heap
|
page read and write
|
||
1373000
|
trusted library allocation
|
page execute and read and write
|
||
5536000
|
trusted library allocation
|
page read and write
|
||
14A7000
|
heap
|
page read and write
|
||
7FFD34580000
|
trusted library allocation
|
page read and write
|
||
191739B0000
|
heap
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
7FFD345BC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD346DA000
|
trusted library allocation
|
page execute and read and write
|
||
BA963FD000
|
stack
|
page read and write
|
||
7FFD34735000
|
trusted library allocation
|
page read and write
|
||
21DA0761000
|
trusted library allocation
|
page read and write
|
||
298EB875000
|
heap
|
page read and write
|
||
298F0C3E000
|
trusted library allocation
|
page read and write
|
||
21D9097E000
|
trusted library allocation
|
page read and write
|
||
7FFD346F0000
|
trusted library allocation
|
page execute and read and write
|
||
B82A977000
|
stack
|
page read and write
|
||
1F232213000
|
heap
|
page read and write
|
||
E17000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD346DF000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34690000
|
trusted library allocation
|
page execute and read and write
|
||
66C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34554000
|
trusted library allocation
|
page read and write
|
||
2CE6000
|
trusted library allocation
|
page read and write
|
||
21440854000
|
heap
|
page read and write
|
||
7FFD3469A000
|
trusted library allocation
|
page execute and read and write
|
||
185E3822000
|
heap
|
page read and write
|
||
4FCD000
|
trusted library allocation
|
page read and write
|
||
CA3000
|
heap
|
page read and write
|
||
1705229A000
|
trusted library allocation
|
page read and write
|
||
55C0000
|
heap
|
page read and write
|
||
7FFD34531000
|
trusted library allocation
|
page read and write
|
||
191738D0000
|
heap
|
page read and write
|
||
19173A39000
|
heap
|
page read and write
|
||
1F2322F8000
|
heap
|
page read and write
|
||
2AE2000
|
trusted library allocation
|
page read and write
|
||
1F232130000
|
heap
|
page read and write
|
||
565E000
|
stack
|
page read and write
|
||
B82BF7E000
|
unkown
|
page readonly
|
||
1BA0EF3000
|
stack
|
page read and write
|
||
D239EFD000
|
stack
|
page read and write
|
||
21D8EED0000
|
trusted library allocation
|
page read and write
|
||
298F0CB0000
|
trusted library allocation
|
page read and write
|
||
19173C02000
|
heap
|
page read and write
|
||
2CF9000
|
trusted library allocation
|
page read and write
|
||
28B4000
|
trusted library allocation
|
page read and write
|
||
B82B77E000
|
unkown
|
page readonly
|
||
5226000
|
trusted library allocation
|
page read and write
|
||
7FFD34682000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD346EE000
|
trusted library allocation
|
page read and write
|
||
7FFD346D1000
|
trusted library allocation
|
page read and write
|
||
2B50000
|
heap
|
page execute and read and write
|
||
5E5D000
|
stack
|
page read and write
|
||
B82C179000
|
stack
|
page read and write
|
||
21D9099E000
|
trusted library allocation
|
page read and write
|
||
21D908DE000
|
trusted library allocation
|
page read and write
|
||
2144063B000
|
heap
|
page read and write
|
||
56EC000
|
trusted library allocation
|
page read and write
|
||
19173A87000
|
heap
|
page read and write
|
||
191755E0000
|
heap
|
page execute and read and write
|
||
1180000
|
heap
|
page read and write
|
||
1B9F3950000
|
trusted library allocation
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
60DE000
|
stack
|
page read and write
|
||
13D0000
|
trusted library allocation
|
page read and write
|
||
7FFD34610000
|
trusted library allocation
|
page read and write
|
||
298EB88D000
|
heap
|
page read and write
|
||
2860000
|
trusted library allocation
|
page read and write
|
||
1B9F3E13000
|
heap
|
page read and write
|
||
15DE000
|
stack
|
page read and write
|
||
17040600000
|
heap
|
page read and write
|
||
1B9F3A78000
|
heap
|
page read and write
|
||
1F232240000
|
heap
|
page read and write
|
||
501C000
|
stack
|
page read and write
|
||
D239AFE000
|
stack
|
page read and write
|
||
21440902000
|
heap
|
page read and write
|
||
21D90923000
|
trusted library allocation
|
page read and write
|
||
19175D40000
|
trusted library section
|
page readonly
|
||
2A88000
|
trusted library allocation
|
page read and write
|
||
298EB8BA000
|
heap
|
page read and write
|
||
BA962FF000
|
stack
|
page read and write
|
||
5023000
|
heap
|
page read and write
|
||
685E000
|
stack
|
page read and write
|
||
13A0000
|
trusted library allocation
|
page read and write
|
||
685E000
|
stack
|
page read and write
|
||
7FFD3474C000
|
trusted library allocation
|
page read and write
|
||
51FE000
|
trusted library allocation
|
page read and write
|
||
7FFD34701000
|
trusted library allocation
|
page read and write
|
||
17040590000
|
heap
|
page read and write
|
||
1F2321D0000
|
heap
|
page execute and read and write
|
||
DB0000
|
trusted library allocation
|
page read and write
|
||
1B9F3F00000
|
heap
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
7FFD34650000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3477D000
|
trusted library allocation
|
page read and write
|
||
7FFD3458D000
|
trusted library allocation
|
page execute and read and write
|
||
1F232229000
|
heap
|
page read and write
|
||
70236FD000
|
stack
|
page read and write
|
||
528C000
|
stack
|
page read and write
|
||
21440702000
|
heap
|
page read and write
|
||
137D000
|
trusted library allocation
|
page execute and read and write
|
||
4DA86FE000
|
stack
|
page read and write
|
||
7FFD34616000
|
trusted library allocation
|
page read and write
|
||
21D908BF000
|
trusted library allocation
|
page read and write
|
||
6478000
|
heap
|
page read and write
|
||
298F0E4E000
|
heap
|
page read and write
|
||
7FFD34727000
|
trusted library allocation
|
page read and write
|
||
BB9000
|
stack
|
page read and write
|
||
19173C00000
|
heap
|
page read and write
|
||
6A6E000
|
stack
|
page read and write
|
||
298F0F04000
|
heap
|
page read and write
|
||
298F0CB0000
|
trusted library allocation
|
page read and write
|
||
7FFD3458C000
|
trusted library allocation
|
page execute and read and write
|
||
3A39000
|
trusted library allocation
|
page read and write
|
||
4B0E000
|
stack
|
page read and write
|
||
5C80000
|
trusted library allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
298F0E19000
|
heap
|
page read and write
|
||
550E000
|
stack
|
page read and write
|
||
70234FF000
|
stack
|
page read and write
|
||
1705AC00000
|
heap
|
page read and write
|
||
2891000
|
trusted library allocation
|
page read and write
|
||
7FFD34656000
|
trusted library allocation
|
page execute and read and write
|
||
1F23407A000
|
trusted library allocation
|
page read and write
|
||
17040285000
|
heap
|
page read and write
|
||
298F0ED4000
|
heap
|
page read and write
|
||
51F5000
|
trusted library allocation
|
page read and write
|
||
1704022C000
|
heap
|
page read and write
|
||
2D11000
|
trusted library allocation
|
page read and write
|
||
185E4002000
|
trusted library allocation
|
page read and write
|
||
7FFD347B2000
|
trusted library allocation
|
page read and write
|
||
7FFD34744000
|
trusted library allocation
|
page read and write
|
||
1B9F3E02000
|
heap
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
7FFD346E7000
|
trusted library allocation
|
page execute and read and write
|
||
191755A0000
|
trusted library allocation
|
page read and write
|
||
298EB85B000
|
heap
|
page read and write
|
||
1F234173000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
trusted library allocation
|
page read and write
|
||
554E000
|
trusted library allocation
|
page read and write
|
||
1F2321C0000
|
heap
|
page read and write
|
||
1F24CC00000
|
heap
|
page read and write
|
||
100F000
|
heap
|
page read and write
|
||
7FFD345E6000
|
trusted library allocation
|
page read and write
|
||
298EB813000
|
heap
|
page read and write
|
||
5170000
|
heap
|
page execute and read and write
|
||
298EB877000
|
heap
|
page read and write
|
||
1008FE000
|
stack
|
page read and write
|
||
3020000
|
trusted library allocation
|
page read and write
|
||
3AE9000
|
trusted library allocation
|
page read and write
|
||
7FFD34784000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
5EFC000
|
stack
|
page read and write
|
||
1F24CB38000
|
heap
|
page read and write
|
||
298EBF1A000
|
heap
|
page read and write
|
||
1370000
|
trusted library allocation
|
page read and write
|
||
298F0E20000
|
heap
|
page read and write
|
||
298F09F0000
|
trusted library allocation
|
page read and write
|
||
FD5000
|
trusted library allocation
|
page execute and read and write
|
||
D239BFE000
|
stack
|
page read and write
|
||
4C5D000
|
stack
|
page read and write
|
||
5224000
|
trusted library allocation
|
page read and write
|
||
21DA92D0000
|
heap
|
page read and write
|
||
671E000
|
stack
|
page read and write
|
||
1F232190000
|
trusted library allocation
|
page read and write
|
||
21D90720000
|
heap
|
page execute and read and write
|
||
1F232247000
|
heap
|
page read and write
|
||
59CE000
|
stack
|
page read and write
|
||
28A2000
|
trusted library allocation
|
page read and write
|
||
1B9F3B24000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
56B0000
|
trusted library allocation
|
page read and write
|
||
19173B02000
|
heap
|
page read and write
|
||
7FFD346E0000
|
trusted library allocation
|
page read and write
|
||
21D908AB000
|
trusted library allocation
|
page read and write
|
||
1009FE000
|
stack
|
page read and write
|
||
E06000
|
heap
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
7FFD3468B000
|
trusted library allocation
|
page execute and read and write
|
||
19173A21000
|
heap
|
page read and write
|
||
7FFD34573000
|
trusted library allocation
|
page execute and read and write
|
||
1206000
|
heap
|
page read and write
|
||
7FFD34580000
|
trusted library allocation
|
page read and write
|
||
6360000
|
trusted library allocation
|
page execute and read and write
|
||
2B49000
|
trusted library allocation
|
page read and write
|
||
E1B000
|
trusted library allocation
|
page execute and read and write
|
||
5230000
|
trusted library allocation
|
page read and write
|
||
1B9F3F02000
|
heap
|
page read and write
|
||
2B4E000
|
stack
|
page read and write
|
||
2144064F000
|
heap
|
page read and write
|
||
627D000
|
stack
|
page read and write
|
||
7FFD34583000
|
trusted library allocation
|
page read and write
|
||
7FFD3457B000
|
trusted library allocation
|
page read and write
|
||
19177102000
|
heap
|
page read and write
|
||
21D909C9000
|
trusted library allocation
|
page read and write
|
||
21440641000
|
heap
|
page read and write
|
||
30C1000
|
trusted library allocation
|
page read and write
|
||
2D05000
|
trusted library allocation
|
page read and write
|
||
737FAFB000
|
stack
|
page read and write
|
||
298F0E5B000
|
heap
|
page read and write
|
||
170405A0000
|
trusted library allocation
|
page read and write
|
||
21D90A0F000
|
trusted library allocation
|
page read and write
|
||
298EB82B000
|
heap
|
page read and write
|
||
B82C9FE000
|
stack
|
page read and write
|
||
1B9F3A00000
|
unkown
|
page read and write
|
||
21D8ECCF000
|
heap
|
page read and write
|
||
E15000
|
trusted library allocation
|
page execute and read and write
|
||
17040261000
|
heap
|
page read and write
|
||
21D90915000
|
trusted library allocation
|
page read and write
|
||
7FFD34554000
|
trusted library allocation
|
page read and write
|
||
5760000
|
trusted library allocation
|
page read and write
|
||
1A189D01000
|
heap
|
page read and write
|
||
1F2324F0000
|
heap
|
page execute and read and write
|
||
17051FB1000
|
trusted library allocation
|
page read and write
|
||
1A189C50000
|
heap
|
page read and write
|
||
7FFD3454D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD346C6000
|
trusted library allocation
|
page execute and read and write
|
||
21D909C4000
|
trusted library allocation
|
page read and write
|
||
214521E1000
|
trusted library allocation
|
page read and write
|
||
B82AD7C000
|
stack
|
page read and write
|
||
214426AC000
|
trusted library allocation
|
page read and write
|
||
4FA4000
|
trusted library allocation
|
page read and write
|
||
3010000
|
trusted library allocation
|
page execute and read and write
|
||
21D908C2000
|
trusted library allocation
|
page read and write
|
||
7FFD34761000
|
trusted library allocation
|
page read and write
|
||
6210000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
7FFD347C6000
|
trusted library allocation
|
page read and write
|
||
B82B57E000
|
unkown
|
page readonly
|
||
2145A8E0000
|
heap
|
page read and write
|
||
21D8EF55000
|
heap
|
page read and write
|
||
298EB8FC000
|
heap
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
1C612BE0000
|
heap
|
page read and write
|
||
214406D2000
|
heap
|
page read and write
|
||
1BA10FE000
|
stack
|
page read and write
|
||
1A189D02000
|
heap
|
page read and write
|
||
295C000
|
stack
|
page read and write
|
||
298F0D40000
|
trusted library allocation
|
page read and write
|
||
1F232252000
|
heap
|
page read and write
|
||
1705A802000
|
heap
|
page read and write
|
||
7FFD347FF000
|
trusted library allocation
|
page read and write
|
||
100DFD000
|
stack
|
page read and write
|
||
21440800000
|
heap
|
page read and write
|
||
5562000
|
trusted library allocation
|
page read and write
|
||
2145A8A3000
|
trusted library allocation
|
page read and write
|
||
7FFD34534000
|
trusted library allocation
|
page read and write
|
||
2145AC02000
|
heap
|
page read and write
|
||
7FFD3475E000
|
trusted library allocation
|
page read and write
|
||
BA961FE000
|
stack
|
page read and write
|
||
B82BCFE000
|
stack
|
page read and write
|
||
611E000
|
stack
|
page read and write
|
||
2AE5000
|
trusted library allocation
|
page execute and read and write
|
||
6577000
|
trusted library allocation
|
page read and write
|
||
4D6C000
|
stack
|
page read and write
|
||
60FE000
|
stack
|
page read and write
|
||
5ACE000
|
stack
|
page read and write
|
||
291F000
|
stack
|
page read and write
|
||
21D909D4000
|
trusted library allocation
|
page read and write
|
||
1705AC02000
|
heap
|
page read and write
|
||
1705AC6E000
|
heap
|
page read and write
|
||
651E000
|
stack
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
13B6000
|
trusted library allocation
|
page execute and read and write
|
||
298EC5E0000
|
trusted library section
|
page readonly
|
||
B82BFFE000
|
stack
|
page read and write
|
||
BA969FA000
|
stack
|
page read and write
|
||
7FFD345E0000
|
trusted library allocation
|
page read and write
|
||
13BA000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34573000
|
trusted library allocation
|
page execute and read and write
|
||
138D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34712000
|
trusted library allocation
|
page read and write
|
||
BA965FE000
|
stack
|
page read and write
|
||
4069000
|
trusted library allocation
|
page read and write
|
||
191755C0000
|
trusted library allocation
|
page read and write
|
||
28B6000
|
trusted library allocation
|
page read and write
|
||
7FFD345E6000
|
trusted library allocation
|
page read and write
|
||
21D908C5000
|
trusted library allocation
|
page read and write
|
||
D239CFE000
|
stack
|
page read and write
|
||
B82C37B000
|
stack
|
page read and write
|
||
3AC1000
|
trusted library allocation
|
page read and write
|
||
298EB700000
|
heap
|
page read and write
|
||
547E000
|
stack
|
page read and write
|
||
185E3802000
|
heap
|
page read and write
|
||
A69000
|
stack
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page read and write
|
||
5220000
|
trusted library allocation
|
page read and write
|
||
5DF4000
|
trusted library allocation
|
page read and write
|
||
B82B4FE000
|
stack
|
page read and write
|
||
298F0D30000
|
trusted library allocation
|
page read and write
|
||
5545000
|
trusted library allocation
|
page read and write
|
||
1F233FE1000
|
trusted library allocation
|
page read and write
|
||
1BA16FF000
|
stack
|
page read and write
|
||
7FFD34757000
|
trusted library allocation
|
page read and write
|
||
7FFD347CC000
|
trusted library allocation
|
page read and write
|
||
1C612BE5000
|
heap
|
page read and write
|
||
214405A0000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
1019000
|
heap
|
page read and write
|
||
17040200000
|
heap
|
page read and write
|
||
298EC951000
|
trusted library allocation
|
page read and write
|
||
DFB000
|
heap
|
page read and write
|
||
1705A680000
|
trusted library section
|
page readonly
|
||
21D8ED4E000
|
heap
|
page read and write
|
||
FD9000
|
heap
|
page read and write
|
||
7FFD345CC000
|
trusted library allocation
|
page execute and read and write
|
||
288A000
|
trusted library allocation
|
page read and write
|
||
19110011000
|
trusted library allocation
|
page read and write
|
||
298EC5F0000
|
trusted library section
|
page readonly
|
||
1BA17FD000
|
stack
|
page read and write
|
||
2850000
|
trusted library allocation
|
page read and write
|
||
7FFD34710000
|
trusted library allocation
|
page read and write
|
||
7FFD3477D000
|
trusted library allocation
|
page read and write
|
||
70231FE000
|
stack
|
page read and write
|
||
D23A3FA000
|
stack
|
page read and write
|
||
2145AD24000
|
heap
|
page read and write
|
||
FDB000
|
trusted library allocation
|
page execute and read and write
|
||
2C9C000
|
trusted library allocation
|
page read and write
|
||
2882000
|
trusted library allocation
|
page read and write
|
||
5DE0000
|
trusted library allocation
|
page read and write
|
||
55CC000
|
heap
|
page read and write
|
||
7FFD347B6000
|
trusted library allocation
|
page read and write
|
||
19173C54000
|
heap
|
page read and write
|
||
5C70000
|
trusted library allocation
|
page read and write
|
||
4DA8CFE000
|
stack
|
page read and write
|
||
6449000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page execute and read and write
|
||
B45000
|
heap
|
page read and write
|
||
BA967FE000
|
stack
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page execute and read and write
|
||
21DA0A47000
|
trusted library allocation
|
page read and write
|
||
A2E3C7D000
|
stack
|
page read and write
|
||
4C98000
|
trusted library allocation
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
2840000
|
heap
|
page execute and read and write
|
||
6167000
|
heap
|
page read and write
|
||
185E3F70000
|
trusted library allocation
|
page read and write
|
||
1705AC1D000
|
heap
|
page read and write
|
||
C89000
|
heap
|
page read and write
|
||
21DA07C0000
|
trusted library allocation
|
page read and write
|
||
170405E0000
|
heap
|
page read and write
|
||
7FFD34570000
|
trusted library allocation
|
page read and write
|
||
B82BC7E000
|
unkown
|
page readonly
|
||
70235FA000
|
stack
|
page read and write
|
||
2768000
|
trusted library allocation
|
page read and write
|
||
21D90730000
|
trusted library section
|
page readonly
|
||
7FFD34720000
|
trusted library allocation
|
page read and write
|
||
17040224000
|
heap
|
page read and write
|
||
17040213000
|
heap
|
page read and write
|
||
19173AE8000
|
heap
|
page read and write
|
||
298F0EE3000
|
heap
|
page read and write
|
||
7FFD347BD000
|
trusted library allocation
|
page read and write
|
||
6230000
|
trusted library allocation
|
page execute and read and write
|
||
2A5F000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
28B0000
|
trusted library allocation
|
page read and write
|
||
14BC000
|
heap
|
page read and write
|
||
21D8ED13000
|
heap
|
page read and write
|
||
5534000
|
trusted library allocation
|
page read and write
|
||
655E000
|
stack
|
page read and write
|
||
7FFD347D0000
|
trusted library allocation
|
page execute and read and write
|
||
2C5E000
|
stack
|
page read and write
|
||
298F0F02000
|
heap
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
1F24C802000
|
heap
|
page read and write
|
||
170405A3000
|
trusted library allocation
|
page read and write
|
||
21D8EEF0000
|
trusted library allocation
|
page read and write
|
||
1F24CB00000
|
heap
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34730000
|
trusted library allocation
|
page read and write
|
||
7FFD34650000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3467B000
|
trusted library allocation
|
page execute and read and write
|
||
21440624000
|
heap
|
page read and write
|
||
298EBD90000
|
trusted library allocation
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
170402CE000
|
heap
|
page read and write
|
||
5F40000
|
trusted library allocation
|
page read and write
|
||
1F24CB15000
|
heap
|
page read and write
|
||
AB9000
|
stack
|
page read and write
|
||
1705AC65000
|
heap
|
page read and write
|
||
3A11000
|
trusted library allocation
|
page read and write
|
||
4F90000
|
heap
|
page read and write
|
||
1F232302000
|
heap
|
page read and write
|
||
6ED0000
|
heap
|
page read and write
|
||
E12000
|
trusted library allocation
|
page read and write
|
||
2A0E000
|
stack
|
page read and write
|
||
100AFE000
|
stack
|
page read and write
|
||
1BA11FD000
|
stack
|
page read and write
|
||
21DA9309000
|
heap
|
page read and write
|
||
695F000
|
stack
|
page read and write
|
||
5740000
|
trusted library allocation
|
page read and write
|
||
7FFD34800000
|
trusted library allocation
|
page read and write
|
||
7FFD3455B000
|
trusted library allocation
|
page execute and read and write
|
||
E8F000
|
heap
|
page read and write
|
||
5580000
|
trusted library allocation
|
page read and write
|
||
21D909FD000
|
trusted library allocation
|
page read and write
|
||
7FFD3453D000
|
trusted library allocation
|
page execute and read and write
|
||
6426000
|
heap
|
page read and write
|
||
2870000
|
trusted library allocation
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
5DFC000
|
stack
|
page read and write
|
||
DD0000
|
trusted library allocation
|
page read and write
|
||
185E3800000
|
heap
|
page read and write
|
||
103A000
|
stack
|
page read and write
|
||
7FFD34680000
|
trusted library allocation
|
page execute and read and write
|
||
E70000
|
heap
|
page read and write
|
||
D23A1FE000
|
stack
|
page read and write
|
||
53DE000
|
stack
|
page read and write
|
||
1F232540000
|
trusted library section
|
page readonly
|
||
21440674000
|
heap
|
page read and write
|
||
7FFD34616000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD345EC000
|
trusted library allocation
|
page execute and read and write
|
||
185E3902000
|
heap
|
page read and write
|
||
214406AA000
|
heap
|
page read and write
|
||
1705AB13000
|
heap
|
page read and write
|
||
62DE000
|
stack
|
page read and write
|
||
2145AA02000
|
heap
|
page read and write
|
||
B69000
|
stack
|
page read and write
|
||
577C000
|
trusted library allocation
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
7FFD34540000
|
trusted library allocation
|
page read and write
|
||
1704023B000
|
heap
|
page read and write
|
||
D23A5FE000
|
stack
|
page read and write
|
||
100CFA000
|
stack
|
page read and write
|
||
7FFD345F0000
|
trusted library allocation
|
page execute and read and write
|
||
C5E000
|
heap
|
page read and write
|
||
7FFD34788000
|
trusted library allocation
|
page read and write
|
||
7FFD347D0000
|
trusted library allocation
|
page read and write
|
||
D23A7FE000
|
stack
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
DFD000
|
trusted library allocation
|
page execute and read and write
|
||
298EBF5A000
|
heap
|
page read and write
|
||
7FFD3457D000
|
trusted library allocation
|
page execute and read and write
|
||
1B9F3A13000
|
unkown
|
page read and write
|
||
D239DFB000
|
stack
|
page read and write
|
||
7FFD347F0000
|
trusted library allocation
|
page read and write
|
||
298F0C00000
|
trusted library allocation
|
page read and write
|
||
7FFD347C8000
|
trusted library allocation
|
page read and write
|
||
7FFD347D0000
|
trusted library allocation
|
page execute and read and write
|
||
2145AE13000
|
heap
|
page read and write
|
||
51FA000
|
trusted library allocation
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
17051FA7000
|
trusted library allocation
|
page read and write
|
||
30A7000
|
trusted library allocation
|
page read and write
|
||
191755D0000
|
heap
|
page read and write
|
||
191102F9000
|
trusted library allocation
|
page read and write
|
||
21D8EE90000
|
heap
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
1F2340AF000
|
trusted library allocation
|
page read and write
|
||
298F0E41000
|
heap
|
page read and write
|
||
7FFD3476E000
|
trusted library allocation
|
page read and write
|
||
21DA8780000
|
trusted library allocation
|
page read and write
|
||
17040258000
|
heap
|
page read and write
|
||
63F5000
|
heap
|
page read and write
|
||
1007FC000
|
stack
|
page read and write
|
||
6B6E000
|
stack
|
page read and write
|
||
7FFD346AF000
|
trusted library allocation
|
page execute and read and write
|
||
7A9000
|
stack
|
page read and write
|
||
1F232602000
|
heap
|
page read and write
|
||
1B9F3F13000
|
heap
|
page read and write
|
||
298EC5D0000
|
trusted library section
|
page readonly
|
||
672D000
|
stack
|
page read and write
|
||
7FFD34727000
|
trusted library allocation
|
page read and write
|
||
1705A660000
|
heap
|
page read and write
|
||
5700000
|
trusted library allocation
|
page read and write
|
||
298EBE02000
|
heap
|
page read and write
|
||
298F0C20000
|
trusted library allocation
|
page read and write
|
||
298F2000000
|
heap
|
page read and write
|
||
B82B17C000
|
stack
|
page read and write
|
||
603D000
|
stack
|
page read and write
|
||
56B8000
|
trusted library allocation
|
page read and write
|
||
1F24CC02000
|
heap
|
page read and write
|
||
7FFD34750000
|
trusted library allocation
|
page read and write
|
||
3CFA000
|
trusted library allocation
|
page read and write
|
||
2144062C000
|
heap
|
page read and write
|
||
1705AC78000
|
heap
|
page read and write
|
||
E0A000
|
trusted library allocation
|
page execute and read and write
|
||
1F232200000
|
heap
|
page read and write
|
||
19175F02000
|
heap
|
page execute and read and write
|
||
7FFD34630000
|
trusted library allocation
|
page execute and read and write
|
||
FD2000
|
trusted library allocation
|
page read and write
|
||
1390000
|
trusted library allocation
|
page read and write
|
||
1004FE000
|
stack
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
19177179000
|
heap
|
page read and write
|
||
B82B5FE000
|
stack
|
page read and write
|
||
7FFD34646000
|
trusted library allocation
|
page execute and read and write
|
||
19173AAE000
|
heap
|
page read and write
|
||
1419000
|
heap
|
page read and write
|
||
D239FFE000
|
stack
|
page read and write
|
||
2EFC000
|
stack
|
page read and write
|
||
298F0F0E000
|
heap
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
21D8ED9B000
|
heap
|
page read and write
|
||
298EB928000
|
heap
|
page read and write
|
||
5551000
|
trusted library allocation
|
page read and write
|
||
12C5000
|
heap
|
page read and write
|
||
5574000
|
trusted library allocation
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
298F0E00000
|
heap
|
page read and write
|
||
21D908D3000
|
trusted library allocation
|
page read and write
|
||
7FFD347D4000
|
trusted library allocation
|
page read and write
|
||
298EC600000
|
trusted library section
|
page readonly
|
||
6580000
|
trusted library allocation
|
page read and write
|
||
5657000
|
heap
|
page read and write
|
||
7FFD347C1000
|
trusted library allocation
|
page read and write
|
||
7FFD34590000
|
trusted library allocation
|
page read and write
|
||
298EC5C0000
|
trusted library section
|
page readonly
|
||
17040302000
|
heap
|
page read and write
|
||
7FFD3480F000
|
trusted library allocation
|
page read and write
|
||
21DA8F30000
|
heap
|
page read and write
|
||
1BA18FA000
|
stack
|
page read and write
|
||
7FFD3461C000
|
trusted library allocation
|
page execute and read and write
|
||
21D90926000
|
trusted library allocation
|
page read and write
|
||
298EC980000
|
trusted library allocation
|
page read and write
|
||
520D000
|
trusted library allocation
|
page read and write
|
||
1F232500000
|
heap
|
page read and write
|
||
19173A2C000
|
heap
|
page read and write
|
||
7FFD34786000
|
trusted library allocation
|
page read and write
|
||
70232FF000
|
stack
|
page read and write
|
||
6AA000
|
stack
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
298F0D30000
|
trusted library allocation
|
page read and write
|
||
2AE0000
|
trusted library allocation
|
page read and write
|
||
7FFD34579000
|
trusted library allocation
|
page read and write
|
||
1A189CF1000
|
heap
|
page read and write
|
||
7FFD34796000
|
trusted library allocation
|
page read and write
|
||
2A69000
|
trusted library allocation
|
page read and write
|
||
1392000
|
trusted library allocation
|
page read and write
|
||
7FFD347E0000
|
trusted library allocation
|
page read and write
|
||
21D90751000
|
trusted library allocation
|
page read and write
|
||
7022FFD000
|
stack
|
page read and write
|
||
1C611160000
|
heap
|
page read and write
|
||
7FFD34533000
|
trusted library allocation
|
page execute and read and write
|
||
2145A890000
|
heap
|
page read and write
|
||
1A189CF2000
|
heap
|
page read and write
|
||
13AD000
|
trusted library allocation
|
page execute and read and write
|
||
298EBE15000
|
heap
|
page read and write
|
||
7FC40000
|
trusted library allocation
|
page execute and read and write
|
||
B82BB7E000
|
unkown
|
page readonly
|
||
7FFD347C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34763000
|
trusted library allocation
|
page read and write
|
||
DAD000
|
trusted library allocation
|
page execute and read and write
|
||
6890000
|
heap
|
page read and write
|
||
1B9F3920000
|
heap
|
page read and write
|
||
7FFD34710000
|
trusted library allocation
|
page read and write
|
||
298F0D10000
|
trusted library allocation
|
page read and write
|
||
1F232140000
|
heap
|
page read and write
|
||
51EE000
|
trusted library allocation
|
page read and write
|
||
19173AE3000
|
heap
|
page read and write
|
||
7FFD3480C000
|
trusted library allocation
|
page read and write
|
||
21DA8ADF000
|
heap
|
page read and write
|
||
1F23447C000
|
trusted library allocation
|
page read and write
|
||
2145AD02000
|
heap
|
page read and write
|
||
2A7A000
|
trusted library allocation
|
page read and write
|
||
5530000
|
trusted library allocation
|
page read and write
|
||
7FFD3459D000
|
trusted library allocation
|
page execute and read and write
|
||
19177173000
|
heap
|
page read and write
|
||
298EB840000
|
heap
|
page read and write
|
||
214404B0000
|
heap
|
page read and write
|
||
63F0000
|
heap
|
page read and write
|
||
7FFD34814000
|
trusted library allocation
|
page read and write
|
||
D23A2FD000
|
stack
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
2990000
|
heap
|
page execute and read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
1F233FDA000
|
trusted library allocation
|
page read and write
|
||
6860000
|
trusted library allocation
|
page read and write
|
||
7FFD3473A000
|
trusted library allocation
|
page read and write
|
||
1416000
|
heap
|
page read and write
|
||
7FFD346AC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34782000
|
trusted library allocation
|
page read and write
|
||
5708000
|
trusted library allocation
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
2CDC000
|
trusted library allocation
|
page read and write
|
||
55CA000
|
heap
|
page read and write
|
||
4FC1000
|
trusted library allocation
|
page read and write
|
||
DED000
|
trusted library allocation
|
page execute and read and write
|
||
19173A4F000
|
heap
|
page read and write
|
||
53A0000
|
heap
|
page read and write
|
||
529C000
|
stack
|
page read and write
|
||
13C6000
|
heap
|
page read and write
|
||
185E3813000
|
heap
|
page read and write
|
||
21D8EBB2000
|
unkown
|
page readonly
|
||
B82C47E000
|
unkown
|
page readonly
|
||
19177100000
|
heap
|
page read and write
|
||
5C74000
|
trusted library allocation
|
page read and write
|
||
7FFD34750000
|
trusted library allocation
|
page read and write
|
||
B82B8FE000
|
stack
|
page read and write
|
||
D6E000
|
stack
|
page read and write
|
||
7FFD34560000
|
trusted library allocation
|
page read and write
|
||
5201000
|
trusted library allocation
|
page read and write
|
||
214421A0000
|
trusted library allocation
|
page read and write
|
||
298EB879000
|
heap
|
page read and write
|
||
7FFD34563000
|
trusted library allocation
|
page execute and read and write
|
||
298F0D20000
|
trusted library allocation
|
page read and write
|
||
1374000
|
trusted library allocation
|
page read and write
|
||
7FFD34721000
|
trusted library allocation
|
page read and write
|
||
13A2000
|
trusted library allocation
|
page read and write
|
||
5206000
|
trusted library allocation
|
page read and write
|
||
21440490000
|
heap
|
page read and write
|
||
21440802000
|
heap
|
page read and write
|
||
7FFD347D1000
|
trusted library allocation
|
page read and write
|
||
E02000
|
trusted library allocation
|
page read and write
|
||
101D000
|
heap
|
page read and write
|
||
7FFD3462C000
|
trusted library allocation
|
page execute and read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
FF780000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34730000
|
trusted library allocation
|
page execute and read and write
|
||
14D4000
|
heap
|
page read and write
|
||
7FFD346CB000
|
trusted library allocation
|
page execute and read and write
|
||
298EBF13000
|
heap
|
page read and write
|
||
19173A13000
|
heap
|
page read and write
|
||
A2E3E7E000
|
stack
|
page read and write
|
||
7FFD3457D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347BD000
|
trusted library allocation
|
page read and write
|
||
1B9F3B00000
|
trusted library allocation
|
page read and write
|
||
574E000
|
stack
|
page read and write
|
||
288E000
|
trusted library allocation
|
page read and write
|
||
19177002000
|
heap
|
page read and write
|
||
E9C000
|
heap
|
page read and write
|
||
3CB9000
|
trusted library allocation
|
page read and write
|
||
1F2321E0000
|
heap
|
page read and write
|
||
17040580000
|
heap
|
page execute and read and write
|
||
7FFD3479E000
|
trusted library allocation
|
page read and write
|
||
139A000
|
trusted library allocation
|
page execute and read and write
|
||
21D909AD000
|
trusted library allocation
|
page read and write
|
||
D23A6FE000
|
stack
|
page read and write
|
||
19110001000
|
trusted library allocation
|
page read and write
|
||
21440613000
|
heap
|
page read and write
|
||
1B9F3940000
|
heap
|
page read and write
|
||
7FFD3472E000
|
trusted library allocation
|
page read and write
|
||
21D8EBB0000
|
unkown
|
page readonly
|
||
1A189CCA000
|
heap
|
page read and write
|
||
1F2322B5000
|
heap
|
page read and write
|
||
7FFD345E0000
|
trusted library allocation
|
page read and write
|
||
1BA0FFF000
|
stack
|
page read and write
|
||
7FFD347C6000
|
trusted library allocation
|
page read and write
|
||
7FFD34594000
|
trusted library allocation
|
page read and write
|
||
1F24CC35000
|
heap
|
page read and write
|
||
1B9F3E00000
|
heap
|
page read and write
|
||
130E000
|
stack
|
page read and write
|
||
21D90891000
|
trusted library allocation
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
6120000
|
trusted library allocation
|
page read and write
|
||
140B000
|
heap
|
page read and write
|
||
170404F0000
|
heap
|
page read and write
|
||
66B0000
|
heap
|
page read and write
|
||
19177202000
|
heap
|
page read and write
|
||
E06000
|
trusted library allocation
|
page execute and read and write
|
||
1F232226000
|
heap
|
page read and write
|
||
21D90A13000
|
trusted library allocation
|
page read and write
|
||
1B9F3B02000
|
trusted library allocation
|
page read and write
|
||
13A5000
|
trusted library allocation
|
page execute and read and write
|
||
21D909D7000
|
trusted library allocation
|
page read and write
|
||
1917710B000
|
heap
|
page read and write
|
||
19173A44000
|
heap
|
page read and write
|
||
B82BE7E000
|
stack
|
page read and write
|
||
588C000
|
stack
|
page read and write
|
||
7FFD3458B000
|
trusted library allocation
|
page execute and read and write
|
||
BDE000
|
heap
|
page read and write
|
||
214521D7000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
trusted library allocation
|
page execute and read and write
|
||
21442291000
|
trusted library allocation
|
page read and write
|
||
7FFD34543000
|
trusted library allocation
|
page read and write
|
||
FC2000
|
trusted library allocation
|
page read and write
|
||
6CB0000
|
trusted library allocation
|
page read and write
|
||
7FF46C1A0000
|
trusted library allocation
|
page execute and read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
17040602000
|
heap
|
page read and write
|
||
1A189C70000
|
heap
|
page read and write
|
||
6377000
|
trusted library allocation
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page read and write
|
||
873BE7F000
|
stack
|
page read and write
|
||
298F0E55000
|
heap
|
page read and write
|
||
2C60000
|
heap
|
page read and write
|
||
7FFD34656000
|
trusted library allocation
|
page execute and read and write
|
||
652E000
|
stack
|
page read and write
|
||
19173AF0000
|
heap
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
21D90955000
|
trusted library allocation
|
page read and write
|
||
298F0C10000
|
trusted library allocation
|
page read and write
|
||
1F2322B7000
|
heap
|
page read and write
|
||
185E382B000
|
heap
|
page read and write
|
||
7FFD34723000
|
trusted library allocation
|
page read and write
|
||
1F234061000
|
trusted library allocation
|
page read and write
|
||
D2399FE000
|
stack
|
page read and write
|
||
588E000
|
stack
|
page read and write
|
||
6AE0000
|
heap
|
page read and write
|
||
298F0D80000
|
remote allocation
|
page read and write
|
||
4FA0000
|
trusted library allocation
|
page read and write
|
||
661E000
|
stack
|
page read and write
|
||
298F0F00000
|
heap
|
page read and write
|
||
1F23224B000
|
heap
|
page read and write
|
||
5700000
|
trusted library allocation
|
page read and write
|
||
7FFD34810000
|
trusted library allocation
|
page read and write
|
||
7FFD345EC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34756000
|
trusted library allocation
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
7FFD3472C000
|
trusted library allocation
|
page read and write
|
||
2CBC000
|
trusted library allocation
|
page read and write
|
||
7FFD34729000
|
trusted library allocation
|
page read and write
|
||
6130000
|
trusted library allocation
|
page read and write
|
||
6CE0000
|
heap
|
page read and write
|
||
11E0000
|
trusted library allocation
|
page execute and read and write
|
||
29B0000
|
heap
|
page read and write
|
||
5710000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347C2000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
7FFD345CC000
|
trusted library allocation
|
page execute and read and write
|
||
21D8ED44000
|
heap
|
page read and write
|
||
17040613000
|
heap
|
page read and write
|
||
5772000
|
trusted library allocation
|
page read and write
|
||
1A189CF1000
|
heap
|
page read and write
|
||
2EBE000
|
stack
|
page read and write
|
||
1F23228B000
|
heap
|
page read and write
|
||
7FFD34573000
|
trusted library allocation
|
page read and write
|
||
70233FE000
|
stack
|
page read and write
|
||
298F0EC0000
|
heap
|
page read and write
|
||
7FFD3473D000
|
trusted library allocation
|
page read and write
|
||
21440639000
|
heap
|
page read and write
|
||
5CDD000
|
stack
|
page read and write
|
||
6284000
|
trusted library allocation
|
page read and write
|
||
2C91000
|
trusted library allocation
|
page read and write
|
||
7FFD3477D000
|
trusted library allocation
|
page read and write
|
||
BA95DE4000
|
stack
|
page read and write
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
BA96AFD000
|
stack
|
page read and write
|
||
2145AD13000
|
heap
|
page read and write
|
||
1705A902000
|
heap
|
page execute and read and write
|
||
56EC000
|
stack
|
page read and write
|
||
DBD000
|
trusted library allocation
|
page execute and read and write
|
||
298F0990000
|
trusted library allocation
|
page read and write
|
||
21440590000
|
heap
|
page read and write
|
||
289D000
|
trusted library allocation
|
page read and write
|
||
2F00000
|
heap
|
page execute and read and write
|
||
21D9094A000
|
trusted library allocation
|
page read and write
|
||
40A9000
|
trusted library allocation
|
page read and write
|
||
1F232279000
|
heap
|
page read and write
|
||
7FFD34574000
|
trusted library allocation
|
page read and write
|
||
F4B000
|
heap
|
page read and write
|
||
4041000
|
trusted library allocation
|
page read and write
|
||
7FFD34686000
|
trusted library allocation
|
page execute and read and write
|
||
DA3000
|
trusted library allocation
|
page execute and read and write
|
||
737FCFE000
|
stack
|
page read and write
|
||
6570000
|
trusted library allocation
|
page read and write
|
||
7FFD3455B000
|
trusted library allocation
|
page execute and read and write
|
||
A2E41F9000
|
stack
|
page read and write
|
||
1A189F65000
|
heap
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page execute and read and write
|
||
1000F3000
|
stack
|
page read and write
|
||
298EB88B000
|
heap
|
page read and write
|
||
1139000
|
stack
|
page read and write
|
||
598E000
|
stack
|
page read and write
|
||
2B0C000
|
trusted library allocation
|
page read and write
|
||
52A0000
|
heap
|
page read and write
|
||
17059FD0000
|
trusted library allocation
|
page read and write
|
||
214421D1000
|
trusted library allocation
|
page read and write
|
||
19177169000
|
heap
|
page read and write
|
||
21D909B8000
|
trusted library allocation
|
page read and write
|
||
55B0000
|
heap
|
page read and write
|
||
2145AE00000
|
heap
|
page read and write
|
||
298F0CC0000
|
trusted library allocation
|
page read and write
|
||
D23A4FD000
|
stack
|
page read and write
|
||
4DA84FE000
|
unkown
|
page readonly
|
||
21D908E5000
|
trusted library allocation
|
page read and write
|
||
19175E02000
|
heap
|
page read and write
|
||
5952000
|
trusted library allocation
|
page read and write
|
||
B82C07E000
|
unkown
|
page readonly
|
||
21D90740000
|
heap
|
page execute and read and write
|
||
561E000
|
stack
|
page read and write
|
||
7FFD3455D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347CA000
|
trusted library allocation
|
page read and write
|
||
1F24CBA2000
|
heap
|
page read and write
|
||
1C6110C0000
|
heap
|
page read and write
|
||
5542000
|
trusted library allocation
|
page read and write
|
||
19100001000
|
trusted library allocation
|
page read and write
|
||
7FFD347CF000
|
trusted library allocation
|
page read and write
|
||
873BB9C000
|
stack
|
page read and write
|
||
4DA88FE000
|
stack
|
page read and write
|
||
1006FD000
|
stack
|
page read and write
|
||
298F0C10000
|
trusted library allocation
|
page read and write
|
||
5928000
|
trusted library allocation
|
page read and write
|
||
170401F0000
|
heap
|
page read and write
|
||
19173A75000
|
heap
|
page read and write
|
||
1F24CC13000
|
heap
|
page read and write
|
||
146D000
|
heap
|
page read and write
|
||
7FFD34626000
|
trusted library allocation
|
page read and write
|
||
B82AF7E000
|
stack
|
page read and write
|
||
2145AE35000
|
heap
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
7FFD3458C000
|
trusted library allocation
|
page execute and read and write
|
||
19173A00000
|
heap
|
page read and write
|
||
1F24CA02000
|
heap
|
page read and write
|
||
3B2A000
|
trusted library allocation
|
page read and write
|
||
19177213000
|
heap
|
page read and write
|
||
19175CB0000
|
heap
|
page read and write
|
||
21DA0751000
|
trusted library allocation
|
page read and write
|
||
564E000
|
stack
|
page read and write
|
||
21D908FC000
|
trusted library allocation
|
page read and write
|
||
7FFD34720000
|
trusted library allocation
|
page read and write
|
||
2B41000
|
trusted library allocation
|
page read and write
|
||
7FFD3454D000
|
trusted library allocation
|
page execute and read and write
|
||
19177106000
|
heap
|
page read and write
|
||
7FFD346E0000
|
trusted library allocation
|
page read and write
|
||
191739C0000
|
heap
|
page read and write
|
||
1F24C902000
|
heap
|
page execute and read and write
|
||
3A7A000
|
trusted library allocation
|
page read and write
|
||
68A0000
|
heap
|
page read and write
|
||
7FFD3480F000
|
trusted library allocation
|
page read and write
|
||
1F24CB91000
|
heap
|
page read and write
|
||
5770000
|
trusted library allocation
|
page read and write
|
||
7FFD34721000
|
trusted library allocation
|
page read and write
|
||
1F232150000
|
heap
|
page read and write
|
||
1F232702000
|
heap
|
page read and write
|
||
2145A900000
|
heap
|
page read and write
|
||
1F232613000
|
heap
|
page read and write
|
||
53A3000
|
heap
|
page read and write
|
||
7FFD34583000
|
trusted library allocation
|
page read and write
|
||
1A189F70000
|
heap
|
page read and write
|
||
298EC5B0000
|
trusted library section
|
page readonly
|
||
7FFD34750000
|
trusted library allocation
|
page read and write
|
||
185E3844000
|
heap
|
page read and write
|
||
1F244298000
|
trusted library allocation
|
page read and write
|
||
7FFD3466F000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34616000
|
trusted library allocation
|
page execute and read and write
|
||
4FD2000
|
trusted library allocation
|
page read and write
|
||
19177200000
|
heap
|
page read and write
|
||
2B16000
|
trusted library allocation
|
page read and write
|
||
70230FC000
|
stack
|
page read and write
|
||
54DE000
|
stack
|
page read and write
|
||
17040540000
|
trusted library allocation
|
page read and write
|
||
1F24CB44000
|
heap
|
page read and write
|
||
1917717B000
|
heap
|
page read and write
|
||
298EB89D000
|
heap
|
page read and write
|
||
21D9098C000
|
trusted library allocation
|
page read and write
|
||
7FFD34533000
|
trusted library allocation
|
page execute and read and write
|
||
30A9000
|
trusted library allocation
|
page read and write
|
||
6B00000
|
heap
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
1704024F000
|
heap
|
page read and write
|
||
21440600000
|
heap
|
page read and write
|
||
21D90913000
|
trusted library allocation
|
page read and write
|
||
D23A8FB000
|
stack
|
page read and write
|
||
2145AB02000
|
heap
|
page execute and read and write
|
||
2B00000
|
trusted library allocation
|
page read and write
|
||
4DA89FE000
|
unkown
|
page readonly
|
||
553B000
|
trusted library allocation
|
page read and write
|
||
4DA83FD000
|
stack
|
page read and write
|
||
5950000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
13AB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34590000
|
trusted library allocation
|
page read and write
|
||
643E000
|
stack
|
page read and write
|
||
1A189CF1000
|
heap
|
page read and write
|
||
21D9087C000
|
trusted library allocation
|
page read and write
|
||
5F0D000
|
heap
|
page read and write
|
||
7FFD347E0000
|
trusted library allocation
|
page read and write
|
||
55E0000
|
heap
|
page read and write
|
||
7FFD347F0000
|
trusted library allocation
|
page read and write
|
||
578E000
|
stack
|
page read and write
|
||
5B0E000
|
stack
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
298F0C24000
|
trusted library allocation
|
page read and write
|
||
214406DD000
|
heap
|
page read and write
|
||
1C610FA0000
|
heap
|
page read and write
|
||
A2E3FFE000
|
stack
|
page read and write
|
||
4DA8AFC000
|
stack
|
page read and write
|
||
5DEC000
|
trusted library allocation
|
page read and write
|
||
5F00000
|
heap
|
page read and write
|
||
1B9F3A89000
|
heap
|
page read and write
|
||
7FFD34750000
|
trusted library allocation
|
page read and write
|
||
2970000
|
trusted library allocation
|
page read and write
|
||
21DA92C0000
|
heap
|
page read and write
|
||
185E37E0000
|
heap
|
page read and write
|
||
CA8000
|
heap
|
page read and write
|
||
185E3A00000
|
heap
|
page read and write
|
||
21D8EF30000
|
heap
|
page read and write
|
||
1F232600000
|
heap
|
page read and write
|
||
214422E1000
|
trusted library allocation
|
page read and write
|
||
1380000
|
trusted library allocation
|
page read and write
|
There are 1382 hidden memdumps, click here to show them.