Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
CraxsRAT v7.6 Cracked.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\CraxsRAT v7.6 Cracked.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\CraxsRat.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Windows Defender Notification.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Windows Defender Real Time Protection.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0e75fed00639ea9e725255499292dcdd.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Windows Defender Notification.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_CraxsRat.exe_f37025f379d72059c96545738d919e619031a9_bd7d1bf4_3b75dbd8-f3da-456c-92ab-32cb98bcbba9\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDBE6.tmp.dmp
|
Mini DuMP crash report, 16 streams, Wed Nov 6 06:31:51 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDCE1.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDD11.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Windows Defender Notification.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0zovxly1.x0b.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2weuu5re.5jx.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4q35em12.mif.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_anyknk1m.0uf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b3t1sw2b.jkr.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fhqpwo2r.yoh.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gm4jzmdz.acl.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h53dt4lu.m53.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hnjfqkpi.v4i.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jyjfiawj.irx.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mdpziknj.hqn.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mey14p4l.3bu.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_noxmwwun.okb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v2frp4tu.ofe.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yq2b5tgk.wwp.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z23shyow.2ux.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Defender Notification.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Nov 6 05:35:14
2024, mtime=Wed Nov 6 05:35:14 2024, atime=Wed Nov 6 05:35:14 2024, length=77312, window=hide
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 23 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\CraxsRAT v7.6 Cracked.exe
|
"C:\Users\user\Desktop\CraxsRAT v7.6 Cracked.exe"
|
||
C:\Users\user\AppData\Local\Temp\Windows Defender Real Time Protection.exe
|
"C:\Users\user\AppData\Local\Temp\Windows Defender Real Time Protection.exe"
|
||
C:\Users\user\AppData\Local\Temp\CraxsRat.exe
|
"C:\Users\user\AppData\Local\Temp\CraxsRat.exe"
|
||
C:\Windows\SysWOW64\netsh.exe
|
netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\Windows Defender Real Time Protection.exe" "Windows Defender
Real Time Protection.exe" ENABLE
|
||
C:\Users\user\AppData\Local\Temp\Windows Defender Real Time Protection.exe
|
"C:\Users\user\AppData\Local\Temp\Windows Defender Real Time Protection.exe" ..
|
||
C:\Users\user\AppData\Local\Temp\Windows Defender Real Time Protection.exe
|
"C:\Users\user\AppData\Local\Temp\Windows Defender Real Time Protection.exe" ..
|
||
C:\Users\user\AppData\Local\Temp\Windows Defender Notification.exe
|
"C:\Users\user\AppData\Local\Temp\Windows Defender Notification.exe"
|
||
C:\Users\user\AppData\Local\Temp\Windows Defender Real Time Protection.exe
|
"C:\Users\user\AppData\Local\Temp\Windows Defender Real Time Protection.exe" ..
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Windows
Defender Notification.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows
Defender Notification.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\Windows
Defender Notification.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows
Defender Notification.exe'
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Windows Defender Notification" /tr "C:\Users\user\AppData\Roaming\Windows
Defender Notification.exe"
|
||
C:\Users\user\AppData\Roaming\Windows Defender Notification.exe
|
"C:\Users\user\AppData\Roaming\Windows Defender Notification.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 1864 -s 800
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 11 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
45.145.41.178
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
45.145.41.178
|
unknown
|
Moldova Republic of
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER
|
di
|
||
HKEY_CURRENT_USER\Environment
|
SEE_MASK_NOZONECHECKS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
0e75fed00639ea9e725255499292dcdd
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Windows Defender Notification
|
||
HKEY_CURRENT_USER\SOFTWARE\0e75fed00639ea9e725255499292dcdd
|
hp
|
||
HKEY_CURRENT_USER\SOFTWARE\0e75fed00639ea9e725255499292dcdd
|
i
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
|
0e75fed00639ea9e725255499292dcdd
|
||
HKEY_CURRENT_USER\SOFTWARE\0e75fed00639ea9e725255499292dcdd
|
kl
|
||
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
|
ProgramId
|
||
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
|
FileId
|
||
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
|
LowerCaseLongPath
|
||
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
|
LongPathHash
|
||
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
|
Name
|
||
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
|
OriginalFileName
|
||
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
|
Publisher
|
||
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
|
Version
|
||
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
|
BinFileVersion
|
||
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
|
BinaryType
|
||
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
|
ProductName
|
||
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
|
ProductVersion
|
||
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
|
LinkDate
|
||
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
|
BinProductVersion
|
||
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
|
AppxPackageFullName
|
||
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
|
Size
|
||
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
|
Language
|
||
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
|
Usn
|
There are 17 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
412000
|
unkown
|
page readonly
|
||
A32000
|
unkown
|
page readonly
|
||
2FF6000
|
trusted library allocation
|
page read and write
|
||
82E1000
|
trusted library allocation
|
page read and write
|
||
7E990FE000
|
stack
|
page read and write
|
||
7FF848E3B000
|
trusted library allocation
|
page read and write
|
||
19EE7FF5000
|
heap
|
page read and write
|
||
7AE000
|
stack
|
page read and write
|
||
112A000
|
trusted library allocation
|
page execute and read and write
|
||
19ED047E000
|
trusted library allocation
|
page read and write
|
||
19ED07C3000
|
trusted library allocation
|
page read and write
|
||
19ECDD43000
|
heap
|
page read and write
|
||
15547810000
|
heap
|
page read and write
|
||
323A000
|
unkown
|
page readonly
|
||
223FC430000
|
heap
|
page read and write
|
||
8785FCE000
|
stack
|
page read and write
|
||
19ECDD00000
|
heap
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
7FF84927D000
|
trusted library allocation
|
page read and write
|
||
87849CE000
|
stack
|
page read and write
|
||
2E77000
|
unkown
|
page readonly
|
||
3305000
|
trusted library allocation
|
page read and write
|
||
C371000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
3C19EFF000
|
stack
|
page read and write
|
||
1600000
|
heap
|
page read and write
|
||
160C000
|
trusted library allocation
|
page execute and read and write
|
||
E49000
|
heap
|
page read and write
|
||
19EE8029000
|
heap
|
page read and write
|
||
770000
|
unkown
|
page readonly
|
||
22381E02000
|
trusted library allocation
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page execute and read and write
|
||
28728ED0000
|
heap
|
page read and write
|
||
30F4000
|
trusted library allocation
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
7FF848FA2000
|
trusted library allocation
|
page read and write
|
||
5CF0000
|
heap
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
7FF849182000
|
trusted library allocation
|
page read and write
|
||
15F0000
|
trusted library allocation
|
page read and write
|
||
28728EE1000
|
heap
|
page read and write
|
||
20F1FE49000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
5D1B000
|
stack
|
page read and write
|
||
7FF849210000
|
trusted library allocation
|
page read and write
|
||
313C000
|
trusted library allocation
|
page read and write
|
||
3135000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
5A50000
|
heap
|
page read and write
|
||
3C19BFF000
|
stack
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
AA2E000
|
stack
|
page read and write
|
||
3C1B1CE000
|
stack
|
page read and write
|
||
3291000
|
trusted library allocation
|
page read and write
|
||
7FF848E7C000
|
trusted library allocation
|
page execute and read and write
|
||
19ED1152000
|
trusted library allocation
|
page read and write
|
||
50AE000
|
heap
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
7FF848FC2000
|
trusted library allocation
|
page read and write
|
||
15547276000
|
heap
|
page read and write
|
||
DB9000
|
heap
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page execute and read and write
|
||
576C000
|
stack
|
page read and write
|
||
1279000
|
heap
|
page read and write
|
||
22381217000
|
trusted library allocation
|
page read and write
|
||
7E996FE000
|
stack
|
page read and write
|
||
DB8000
|
heap
|
page read and write
|
||
7FF848E5C000
|
trusted library allocation
|
page execute and read and write
|
||
1B15E000
|
stack
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
2870ECD3000
|
heap
|
page read and write
|
||
7FF848FD1000
|
trusted library allocation
|
page read and write
|
||
7FF849182000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
63F8000
|
heap
|
page read and write
|
||
155307D2000
|
trusted library allocation
|
page read and write
|
||
1020000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
DB6000
|
stack
|
page read and write
|
||
223FC1D0000
|
heap
|
page read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
2870EE70000
|
trusted library allocation
|
page read and write
|
||
21BCD4B8000
|
heap
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
10C2000
|
trusted library allocation
|
page execute and read and write
|
||
6370000
|
heap
|
page read and write
|
||
19EDFB37000
|
trusted library allocation
|
page read and write
|
||
5570000
|
trusted library allocation
|
page read and write
|
||
11DF000
|
stack
|
page read and write
|
||
28728734000
|
heap
|
page read and write
|
||
63A7000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
DE5000
|
heap
|
page read and write
|
||
13293000
|
trusted library allocation
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
3309000
|
trusted library allocation
|
page read and write
|
||
ACEE000
|
stack
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
7FF849153000
|
trusted library allocation
|
page read and write
|
||
109A000
|
trusted library allocation
|
page execute and read and write
|
||
1580000
|
heap
|
page read and write
|
||
1552FC48000
|
trusted library allocation
|
page read and write
|
||
20F1BC10000
|
unkown
|
page readonly
|
||
223811E2000
|
trusted library allocation
|
page read and write
|
||
F36000
|
heap
|
page read and write
|
||
AF71000
|
trusted library allocation
|
page read and write
|
||
19EE7D70000
|
heap
|
page execute and read and write
|
||
223F9F8C000
|
heap
|
page read and write
|
||
19EDFB5F000
|
trusted library allocation
|
page read and write
|
||
19EDFB35000
|
trusted library allocation
|
page read and write
|
||
3218000
|
unkown
|
page readonly
|
||
7FF848E3B000
|
trusted library allocation
|
page read and write
|
||
19ED110D000
|
trusted library allocation
|
page read and write
|
||
19EE8041000
|
heap
|
page read and write
|
||
1552D37F000
|
heap
|
page read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
11E7000
|
trusted library allocation
|
page execute and read and write
|
||
1552D4FA000
|
heap
|
page read and write
|
||
7FF848FA2000
|
trusted library allocation
|
page read and write
|
||
EEC574E000
|
stack
|
page read and write
|
||
970000
|
heap
|
page execute and read and write
|
||
6340000
|
trusted library allocation
|
page read and write
|
||
EEC55CC000
|
stack
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
22390021000
|
trusted library allocation
|
page read and write
|
||
DD3000
|
heap
|
page read and write
|
||
1552ED20000
|
trusted library allocation
|
page read and write
|
||
15BE000
|
stack
|
page read and write
|
||
DE7000
|
heap
|
page read and write
|
||
1122000
|
trusted library allocation
|
page execute and read and write
|
||
1B49B000
|
heap
|
page read and write
|
||
106E000
|
stack
|
page read and write
|
||
32F1000
|
trusted library allocation
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
E4A000
|
heap
|
page read and write
|
||
2871204D000
|
trusted library allocation
|
page read and write
|
||
920000
|
trusted library allocation
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
1492000
|
heap
|
page read and write
|
||
7FF84918C000
|
trusted library allocation
|
page read and write
|
||
155307F2000
|
trusted library allocation
|
page read and write
|
||
19ECF780000
|
trusted library allocation
|
page read and write
|
||
D98000
|
heap
|
page read and write
|
||
940000
|
trusted library allocation
|
page read and write
|
||
28720799000
|
trusted library allocation
|
page read and write
|
||
6380000
|
trusted library allocation
|
page read and write
|
||
1553F1DE000
|
trusted library allocation
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
19EE7E09000
|
heap
|
page read and write
|
||
7E991FF000
|
stack
|
page read and write
|
||
D6B000
|
heap
|
page read and write
|
||
6230000
|
heap
|
page read and write
|
||
19EE7855000
|
heap
|
page read and write
|
||
19ECDCD4000
|
heap
|
page read and write
|
||
223FC169000
|
heap
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
7FF848ECC000
|
trusted library allocation
|
page execute and read and write
|
||
DDC000
|
heap
|
page read and write
|
||
8785DCE000
|
stack
|
page read and write
|
||
FC9000
|
stack
|
page read and write
|
||
2870EC3B000
|
heap
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
7FF849174000
|
trusted library allocation
|
page read and write
|
||
53AE000
|
stack
|
page read and write
|
||
D161000
|
trusted library allocation
|
page read and write
|
||
30F1000
|
trusted library allocation
|
page read and write
|
||
22381E22000
|
trusted library allocation
|
page read and write
|
||
10EA000
|
heap
|
page read and write
|
||
51D3000
|
heap
|
page read and write
|
||
DD9000
|
heap
|
page read and write
|
||
79E000
|
stack
|
page read and write
|
||
3244000
|
unkown
|
page readonly
|
||
548E000
|
stack
|
page read and write
|
||
35F8000
|
unkown
|
page readonly
|
||
22390001000
|
trusted library allocation
|
page read and write
|
||
223FBFF1000
|
heap
|
page read and write
|
||
2572000
|
unkown
|
page readonly
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
155474E0000
|
heap
|
page read and write
|
||
7DF43EEC0000
|
trusted library allocation
|
page execute and read and write
|
||
28729013000
|
heap
|
page read and write
|
||
5200000
|
trusted library allocation
|
page execute and read and write
|
||
5C7A000
|
unkown
|
page readonly
|
||
DB6000
|
heap
|
page read and write
|
||
5B30000
|
heap
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
532A000
|
stack
|
page read and write
|
||
EEC56CC000
|
stack
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
1554724F000
|
heap
|
page read and write
|
||
1C4EE000
|
stack
|
page read and write
|
||
7FF848E12000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
2870EC64000
|
heap
|
page read and write
|
||
28720A31000
|
trusted library allocation
|
page read and write
|
||
54F0000
|
trusted library allocation
|
page execute and read and write
|
||
22381004000
|
trusted library allocation
|
page read and write
|
||
2870EF50000
|
heap
|
page read and write
|
||
2870EC62000
|
heap
|
page read and write
|
||
50B3000
|
heap
|
page read and write
|
||
3C1A177000
|
stack
|
page read and write
|
||
1BEEA000
|
stack
|
page read and write
|
||
20F1FE20000
|
heap
|
page read and write
|
||
3FE1000
|
trusted library allocation
|
page read and write
|
||
1553F1D4000
|
trusted library allocation
|
page read and write
|
||
17BD000
|
stack
|
page read and write
|
||
28729033000
|
heap
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
1106000
|
trusted library allocation
|
page execute and read and write
|
||
19EDFB3F000
|
trusted library allocation
|
page read and write
|
||
8785ECC000
|
stack
|
page read and write
|
||
87850F9000
|
stack
|
page read and write
|
||
DE3000
|
heap
|
page read and write
|
||
20F1FE61000
|
heap
|
page read and write
|
||
19EDF851000
|
trusted library allocation
|
page read and write
|
||
22390437000
|
trusted library allocation
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
55C0000
|
heap
|
page read and write
|
||
7FF848FC9000
|
trusted library allocation
|
page read and write
|
||
2721000
|
trusted library allocation
|
page read and write
|
||
DCD000
|
heap
|
page read and write
|
||
19ED116F000
|
trusted library allocation
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
223FBFC0000
|
heap
|
page read and write
|
||
13DE000
|
heap
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
223FBA40000
|
heap
|
page read and write
|
||
17F5000
|
heap
|
page read and write
|
||
EEC554E000
|
stack
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
7FF848FF4000
|
trusted library allocation
|
page read and write
|
||
580E000
|
stack
|
page read and write
|
||
19ECF6F5000
|
heap
|
page read and write
|
||
1553F1EF000
|
trusted library allocation
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
1552D37B000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
155474E8000
|
heap
|
page read and write
|
||
28710731000
|
trusted library allocation
|
page read and write
|
||
50A2000
|
heap
|
page read and write
|
||
8784D79000
|
stack
|
page read and write
|
||
8785CCE000
|
stack
|
page read and write
|
||
57AB000
|
stack
|
page read and write
|
||
1BB34000
|
stack
|
page read and write
|
||
15530238000
|
trusted library allocation
|
page read and write
|
||
1C1EE000
|
stack
|
page read and write
|
||
DAE000
|
heap
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
DAC000
|
heap
|
page read and write
|
||
163B000
|
trusted library allocation
|
page execute and read and write
|
||
363C000
|
unkown
|
page readonly
|
||
50B3000
|
heap
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
E5A000
|
heap
|
page read and write
|
||
3467000
|
unkown
|
page readonly
|
||
7FF849002000
|
trusted library allocation
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
7FF848FC1000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
D95000
|
heap
|
page read and write
|
||
9C9284E000
|
stack
|
page read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
223FC2D4000
|
heap
|
page read and write
|
||
1117000
|
trusted library allocation
|
page execute and read and write
|
||
1552EF62000
|
trusted library allocation
|
page read and write
|
||
15547670000
|
heap
|
page read and write
|
||
10A6000
|
trusted library allocation
|
page execute and read and write
|
||
15C0000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
19ECDED0000
|
heap
|
page read and write
|
||
9C915EE000
|
stack
|
page read and write
|
||
1BCE0000
|
heap
|
page read and write
|
||
7DF4DF440000
|
trusted library allocation
|
page execute and read and write
|
||
22381783000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
19ED0B99000
|
trusted library allocation
|
page read and write
|
||
20F1FF60000
|
heap
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
2681000
|
trusted library allocation
|
page read and write
|
||
136A000
|
trusted library allocation
|
page execute and read and write
|
||
28728D66000
|
heap
|
page execute and read and write
|
||
22380CC2000
|
trusted library allocation
|
page read and write
|
||
7FF848F06000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
155474F4000
|
heap
|
page read and write
|
||
635A000
|
trusted library allocation
|
page execute and read and write
|
||
57AE000
|
stack
|
page read and write
|
||
B971000
|
trusted library allocation
|
page read and write
|
||
A3D000
|
heap
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
10B7000
|
trusted library allocation
|
page execute and read and write
|
||
7E98FFF000
|
stack
|
page read and write
|
||
BDE000
|
stack
|
page read and write
|
||
7FF848FDA000
|
trusted library allocation
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
21BCD460000
|
heap
|
page read and write
|
||
4F2E000
|
stack
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
1552FACA000
|
trusted library allocation
|
page read and write
|
||
50BC000
|
stack
|
page read and write
|
||
E49000
|
heap
|
page read and write
|
||
1605000
|
heap
|
page read and write
|
||
11C6000
|
heap
|
page read and write
|
||
1265000
|
heap
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
EEC44F9000
|
stack
|
page read and write
|
||
10BE000
|
heap
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
3C1A5FB000
|
stack
|
page read and write
|
||
10D5000
|
heap
|
page read and write
|
||
223F9F9F000
|
heap
|
page read and write
|
||
7FF849004000
|
trusted library allocation
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
A32E000
|
stack
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
BF5000
|
heap
|
page read and write
|
||
D81000
|
heap
|
page read and write
|
||
13F4000
|
heap
|
page read and write
|
||
7FF848FD4000
|
trusted library allocation
|
page read and write
|
||
E5C000
|
heap
|
page read and write
|
||
DD3000
|
heap
|
page read and write
|
||
15BF000
|
stack
|
page read and write
|
||
8784C7E000
|
stack
|
page read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
28711A38000
|
trusted library allocation
|
page read and write
|
||
8784902000
|
stack
|
page read and write
|
||
9C91A7D000
|
stack
|
page read and write
|
||
584E000
|
stack
|
page read and write
|
||
28728D70000
|
heap
|
page read and write
|
||
9FA000
|
heap
|
page read and write
|
||
4AB0000
|
heap
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
6570000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
15547306000
|
heap
|
page read and write
|
||
170F000
|
stack
|
page read and write
|
||
538F000
|
stack
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
100E000
|
stack
|
page read and write
|
||
7FF849290000
|
trusted library allocation
|
page read and write
|
||
19ECF770000
|
heap
|
page execute and read and write
|
||
1552D352000
|
heap
|
page read and write
|
||
59B0000
|
trusted library allocation
|
page execute and read and write
|
||
EF6000
|
stack
|
page read and write
|
||
EEC467E000
|
stack
|
page read and write
|
||
19EE81D0000
|
trusted library allocation
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EE6000
|
trusted library allocation
|
page execute and read and write
|
||
223810F7000
|
trusted library allocation
|
page read and write
|
||
7FF849280000
|
trusted library allocation
|
page read and write
|
||
833C000
|
trusted library allocation
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
19EDFB50000
|
trusted library allocation
|
page read and write
|
||
6AB000
|
stack
|
page read and write
|
||
223FBB50000
|
heap
|
page read and write
|
||
28720A1E000
|
trusted library allocation
|
page read and write
|
||
28729021000
|
heap
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
9311000
|
trusted library allocation
|
page read and write
|
||
7FF849188000
|
trusted library allocation
|
page read and write
|
||
DD8000
|
heap
|
page read and write
|
||
28720A40000
|
trusted library allocation
|
page read and write
|
||
7FF849174000
|
trusted library allocation
|
page read and write
|
||
878517E000
|
stack
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page execute and read and write
|
||
E0F000
|
heap
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
28720A18000
|
trusted library allocation
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
2870EEF0000
|
trusted library allocation
|
page read and write
|
||
2FE1000
|
trusted library allocation
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
2870EF80000
|
heap
|
page read and write
|
||
271D000
|
trusted library allocation
|
page read and write
|
||
53BE000
|
stack
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
555B000
|
stack
|
page read and write
|
||
16A0000
|
heap
|
page execute and read and write
|
||
D81000
|
heap
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page execute and read and write
|
||
EEC54CE000
|
stack
|
page read and write
|
||
223F9F20000
|
heap
|
page read and write
|
||
1553EF57000
|
trusted library allocation
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page read and write
|
||
3222000
|
unkown
|
page readonly
|
||
1BC5E000
|
stack
|
page read and write
|
||
20F1FE2C000
|
heap
|
page read and write
|
||
20F1FFE0000
|
heap
|
page read and write
|
||
7FF849188000
|
trusted library allocation
|
page read and write
|
||
223FC110000
|
trusted library allocation
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
4007000
|
trusted library allocation
|
page read and write
|
||
223FC1E8000
|
heap
|
page read and write
|
||
5950000
|
heap
|
page read and write
|
||
1C1F0000
|
heap
|
page read and write
|
||
223FBB44000
|
heap
|
page read and write
|
||
223FC155000
|
heap
|
page read and write
|
||
E53000
|
heap
|
page read and write
|
||
137E000
|
stack
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
330C000
|
trusted library allocation
|
page read and write
|
||
1137000
|
trusted library allocation
|
page execute and read and write
|
||
426000
|
unkown
|
page readonly
|
||
20F1C612000
|
unkown
|
page readonly
|
||
155472F7000
|
heap
|
page read and write
|
||
20F20060000
|
heap
|
page read and write
|
||
AB6E000
|
stack
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
28728BD0000
|
heap
|
page read and write
|
||
DE6000
|
heap
|
page read and write
|
||
26DD000
|
trusted library allocation
|
page read and write
|
||
6392000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FD1000
|
trusted library allocation
|
page read and write
|
||
3629000
|
unkown
|
page readonly
|
||
1B053000
|
heap
|
page read and write
|
||
2870EE10000
|
heap
|
page read and write
|
||
2872900A000
|
heap
|
page read and write
|
||
223804CD000
|
trusted library allocation
|
page read and write
|
||
2870EC1B000
|
heap
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
28729031000
|
heap
|
page read and write
|
||
223FC26C000
|
heap
|
page read and write
|
||
19ED0BBF000
|
trusted library allocation
|
page read and write
|
||
30BA000
|
unkown
|
page readonly
|
||
287116AB000
|
trusted library allocation
|
page read and write
|
||
410000
|
unkown
|
page readonly
|
||
2238188F000
|
trusted library allocation
|
page read and write
|
||
223FB850000
|
trusted library allocation
|
page read and write
|
||
AA6E000
|
stack
|
page read and write
|
||
1553EF19000
|
trusted library allocation
|
page read and write
|
||
19ECDCC8000
|
heap
|
page read and write
|
||
10A5000
|
heap
|
page read and write
|
||
3C1B04C000
|
stack
|
page read and write
|
||
28711304000
|
trusted library allocation
|
page read and write
|
||
9C92ACC000
|
stack
|
page read and write
|
||
9C915AE000
|
stack
|
page read and write
|
||
3235000
|
unkown
|
page readonly
|
||
9C914A3000
|
stack
|
page read and write
|
||
3624000
|
unkown
|
page readonly
|
||
E09000
|
heap
|
page read and write
|
||
E0A000
|
heap
|
page read and write
|
||
DD9000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
2870EC21000
|
heap
|
page read and write
|
||
ADEE000
|
stack
|
page read and write
|
||
DBA000
|
heap
|
page read and write
|
||
19ECF840000
|
heap
|
page read and write
|
||
20F1BC10000
|
unkown
|
page readonly
|
||
DB7000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
10CA000
|
trusted library allocation
|
page execute and read and write
|
||
1630000
|
trusted library allocation
|
page read and write
|
||
223FC2B6000
|
heap
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
7FF849164000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
2870EDB0000
|
heap
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page execute and read and write
|
||
19ED1132000
|
trusted library allocation
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
9C9197F000
|
stack
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
DB1000
|
heap
|
page read and write
|
||
5DF0000
|
heap
|
page read and write
|
||
E11000
|
heap
|
page read and write
|
||
405E000
|
unkown
|
page readonly
|
||
20F1FDE0000
|
trusted library allocation
|
page read and write
|
||
7FF849280000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
3C1A47E000
|
stack
|
page read and write
|
||
7FF84918A000
|
trusted library allocation
|
page read and write
|
||
3C1A0FE000
|
stack
|
page read and write
|
||
223F9F00000
|
heap
|
page read and write
|
||
223FBB48000
|
heap
|
page read and write
|
||
19ECDCFC000
|
heap
|
page read and write
|
||
DD6000
|
heap
|
page read and write
|
||
1552D3C7000
|
heap
|
page read and write
|
||
19EE800D000
|
heap
|
page read and write
|
||
561000
|
stack
|
page read and write
|
||
20F1FD20000
|
heap
|
page read and write
|
||
19EE7DE7000
|
heap
|
page read and write
|
||
22381869000
|
trusted library allocation
|
page read and write
|
||
19ECE095000
|
heap
|
page read and write
|
||
1700000
|
trusted library allocation
|
page read and write
|
||
DB6000
|
heap
|
page read and write
|
||
1554764E000
|
heap
|
page read and write
|
||
EEC564C000
|
stack
|
page read and write
|
||
1552ED63000
|
heap
|
page read and write
|
||
223FA060000
|
heap
|
page read and write
|
||
2872901A000
|
heap
|
page read and write
|
||
155473A0000
|
trusted library allocation
|
page read and write
|
||
223FBADA000
|
heap
|
page read and write
|
||
E49000
|
heap
|
page read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
28720A16000
|
trusted library allocation
|
page read and write
|
||
2870EF85000
|
heap
|
page read and write
|
||
19ECF740000
|
heap
|
page readonly
|
||
5970000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849240000
|
trusted library allocation
|
page execute and read and write
|
||
155474F8000
|
heap
|
page read and write
|
||
15D0000
|
trusted library allocation
|
page read and write
|
||
ECB000
|
stack
|
page read and write
|
||
223FC14D000
|
heap
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
502F000
|
stack
|
page read and write
|
||
7FF849008000
|
trusted library allocation
|
page read and write
|
||
3C1AFCE000
|
stack
|
page read and write
|
||
1109000
|
heap
|
page read and write
|
||
1410000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849179000
|
trusted library allocation
|
page read and write
|
||
223902EC000
|
trusted library allocation
|
page read and write
|
||
22380D6E000
|
trusted library allocation
|
page read and write
|
||
A92E000
|
stack
|
page read and write
|
||
7FF849004000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
1890000
|
heap
|
page read and write
|
||
1287000
|
heap
|
page read and write
|
||
103A000
|
trusted library allocation
|
page execute and read and write
|
||
633F000
|
stack
|
page read and write
|
||
287116A5000
|
trusted library allocation
|
page read and write
|
||
15E2000
|
trusted library allocation
|
page execute and read and write
|
||
E0A000
|
heap
|
page read and write
|
||
139E000
|
stack
|
page read and write
|
||
223FBB4C000
|
heap
|
page read and write
|
||
1172000
|
unkown
|
page readonly
|
||
9C9187E000
|
stack
|
page read and write
|
||
E0A000
|
heap
|
page read and write
|
||
20F1BC12000
|
unkown
|
page readonly
|
||
19ECDEB0000
|
heap
|
page read and write
|
||
1552D460000
|
heap
|
page readonly
|
||
223810C0000
|
trusted library allocation
|
page read and write
|
||
A30000
|
unkown
|
page readonly
|
||
2870EF40000
|
heap
|
page execute and read and write
|
||
1486000
|
heap
|
page read and write
|
||
8784CFE000
|
stack
|
page read and write
|
||
8784DFE000
|
stack
|
page read and write
|
||
5B2E000
|
stack
|
page read and write
|
||
7DF43EEB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849006000
|
trusted library allocation
|
page read and write
|
||
223FA0A0000
|
heap
|
page read and write
|
||
364B000
|
unkown
|
page readonly
|
||
E8E000
|
stack
|
page read and write
|
||
9C929C9000
|
stack
|
page read and write
|
||
DDD000
|
heap
|
page read and write
|
||
7FF849290000
|
trusted library allocation
|
page read and write
|
||
20F1DB07000
|
unkown
|
page readonly
|
||
135A000
|
trusted library allocation
|
page execute and read and write
|
||
55AE000
|
stack
|
page read and write
|
||
13BE000
|
stack
|
page read and write
|
||
223FC2CB000
|
heap
|
page read and write
|
||
28728F08000
|
heap
|
page read and write
|
||
57EF000
|
stack
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page execute and read and write
|
||
28711310000
|
trusted library allocation
|
page read and write
|
||
1770000
|
heap
|
page read and write
|
||
7FF848EDC000
|
trusted library allocation
|
page execute and read and write
|
||
9A5000
|
heap
|
page read and write
|
||
7FF848FCA000
|
trusted library allocation
|
page read and write
|
||
1552D540000
|
heap
|
page read and write
|
||
582B000
|
stack
|
page read and write
|
||
7FF848FDA000
|
trusted library allocation
|
page read and write
|
||
28711992000
|
trusted library allocation
|
page read and write
|
||
1602000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
3C1B0C9000
|
stack
|
page read and write
|
||
E5C000
|
heap
|
page read and write
|
||
1552FAC2000
|
trusted library allocation
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
DA8000
|
heap
|
page read and write
|
||
19ED059C000
|
trusted library allocation
|
page read and write
|
||
20F1FC40000
|
heap
|
page read and write
|
||
DA9000
|
heap
|
page read and write
|
||
1515000
|
heap
|
page read and write
|
||
DD8000
|
heap
|
page read and write
|
||
1494000
|
heap
|
page read and write
|
||
18FF000
|
stack
|
page read and write
|
||
63FE000
|
heap
|
page read and write
|
||
54AF000
|
stack
|
page read and write
|
||
1650000
|
heap
|
page read and write
|
||
7FF849182000
|
trusted library allocation
|
page read and write
|
||
287116AD000
|
trusted library allocation
|
page read and write
|
||
5A2E000
|
stack
|
page read and write
|
||
5580000
|
heap
|
page read and write
|
||
287107A5000
|
trusted library allocation
|
page read and write
|
||
63F0000
|
heap
|
page read and write
|
||
12691000
|
trusted library allocation
|
page read and write
|
||
15E0000
|
trusted library allocation
|
page read and write
|
||
2870EBF2000
|
heap
|
page read and write
|
||
DB5000
|
heap
|
page read and write
|
||
19EE8126000
|
heap
|
page read and write
|
||
1552D470000
|
trusted library allocation
|
page read and write
|
||
620D000
|
stack
|
page read and write
|
||
287208D2000
|
trusted library allocation
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
CFE000
|
unkown
|
page read and write
|
||
7FF848FF2000
|
trusted library allocation
|
page read and write
|
||
28728C2D000
|
heap
|
page read and write
|
||
223FC126000
|
heap
|
page execute and read and write
|
||
19ED027C000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
19EE8067000
|
heap
|
page read and write
|
||
19EDFB30000
|
trusted library allocation
|
page read and write
|
||
7FF848E2C000
|
trusted library allocation
|
page read and write
|
||
20F1FD60000
|
heap
|
page read and write
|
||
325C000
|
unkown
|
page readonly
|
||
7FF848ED6000
|
trusted library allocation
|
page read and write
|
||
19ECF710000
|
trusted library allocation
|
page read and write
|
||
223902EE000
|
trusted library allocation
|
page read and write
|
||
223F9F91000
|
heap
|
page read and write
|
||
1552EEF1000
|
trusted library allocation
|
page read and write
|
||
87852FB000
|
stack
|
page read and write
|
||
223FC15F000
|
heap
|
page read and write
|
||
953000
|
trusted library allocation
|
page read and write
|
||
28728C8D000
|
heap
|
page read and write
|
||
E4F000
|
heap
|
page read and write
|
||
16B0000
|
heap
|
page read and write
|
||
DBA000
|
heap
|
page read and write
|
||
15EE000
|
stack
|
page read and write
|
||
223FB890000
|
heap
|
page readonly
|
||
56CF000
|
stack
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
223FBB3C000
|
heap
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
223813C7000
|
trusted library allocation
|
page read and write
|
||
7F9E000
|
stack
|
page read and write
|
||
1552D340000
|
heap
|
page read and write
|
||
7FF848E7C000
|
trusted library allocation
|
page execute and read and write
|
||
10BA000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
9C9294E000
|
stack
|
page read and write
|
||
58F037F000
|
stack
|
page read and write
|
||
7FF848E22000
|
trusted library allocation
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
FC0000
|
unkown
|
page readonly
|
||
21BCD480000
|
heap
|
page read and write
|
||
1285000
|
heap
|
page read and write
|
||
223811AB000
|
trusted library allocation
|
page read and write
|
||
58AE000
|
stack
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
A8E000
|
heap
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page execute and read and write
|
||
57EC000
|
stack
|
page read and write
|
||
D128000
|
trusted library allocation
|
page read and write
|
||
AAB000
|
heap
|
page read and write
|
||
3C1B14C000
|
stack
|
page read and write
|
||
EEC49FD000
|
stack
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
E0E000
|
heap
|
page read and write
|
||
28711A9E000
|
trusted library allocation
|
page read and write
|
||
20F200D0000
|
heap
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
6387000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page read and write
|
||
636A000
|
trusted library allocation
|
page execute and read and write
|
||
1630000
|
trusted library allocation
|
page read and write
|
||
7FF849185000
|
trusted library allocation
|
page read and write
|
||
7FF849280000
|
trusted library allocation
|
page read and write
|
||
EF9000
|
stack
|
page read and write
|
||
1552D330000
|
trusted library allocation
|
page read and write
|
||
1640000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
19EE7E79000
|
heap
|
page read and write
|
||
7FF848FD1000
|
trusted library allocation
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page execute and read and write
|
||
2871115C000
|
trusted library allocation
|
page read and write
|
||
1158000
|
heap
|
page read and write
|
||
1362000
|
trusted library allocation
|
page execute and read and write
|
||
1552D450000
|
trusted library allocation
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
7FF848EB6000
|
trusted library allocation
|
page read and write
|
||
19EDF860000
|
trusted library allocation
|
page read and write
|
||
CF5000
|
heap
|
page read and write
|
||
223812AC000
|
trusted library allocation
|
page read and write
|
||
DED000
|
heap
|
page read and write
|
||
1552EEE0000
|
heap
|
page read and write
|
||
28711FEC000
|
trusted library allocation
|
page read and write
|
||
7FF849276000
|
trusted library allocation
|
page read and write
|
||
10A2000
|
trusted library allocation
|
page execute and read and write
|
||
E40000
|
heap
|
page read and write
|
||
1553080E000
|
trusted library allocation
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
1B04C000
|
stack
|
page read and write
|
||
26E4000
|
trusted library allocation
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page read and write
|
||
7FF849004000
|
trusted library allocation
|
page read and write
|
||
1552D348000
|
heap
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
1600000
|
heap
|
page read and write
|
||
1617000
|
trusted library allocation
|
page execute and read and write
|
||
104B000
|
heap
|
page read and write
|
||
6360000
|
trusted library allocation
|
page read and write
|
||
2871147E000
|
trusted library allocation
|
page read and write
|
||
9C919F7000
|
stack
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
5C7C000
|
unkown
|
page readonly
|
||
8784FF8000
|
stack
|
page read and write
|
||
9C91B77000
|
stack
|
page read and write
|
||
7FF849153000
|
trusted library allocation
|
page read and write
|
||
1BC6E000
|
stack
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
950000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
DE7000
|
heap
|
page read and write
|
||
9C918F9000
|
stack
|
page read and write
|
||
19ED042E000
|
trusted library allocation
|
page read and write
|
||
223902F6000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
20F1D012000
|
unkown
|
page readonly
|
||
1311000
|
stack
|
page read and write
|
||
19ECF6C0000
|
heap
|
page read and write
|
||
DDD000
|
heap
|
page read and write
|
||
7A3000
|
stack
|
page read and write
|
||
3C1A279000
|
stack
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
1040000
|
heap
|
page execute and read and write
|
||
7FF84918C000
|
trusted library allocation
|
page read and write
|
||
7FF848FC2000
|
trusted library allocation
|
page read and write
|
||
2870EEB0000
|
heap
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
7FF849185000
|
trusted library allocation
|
page read and write
|
||
9C91CFE000
|
stack
|
page read and write
|
||
1552D4A0000
|
heap
|
page execute and read and write
|
||
8785E47000
|
stack
|
page read and write
|
||
56EE000
|
stack
|
page read and write
|
||
1092000
|
trusted library allocation
|
page execute and read and write
|
||
50B1000
|
heap
|
page read and write
|
||
7FF848EBC000
|
trusted library allocation
|
page execute and read and write
|
||
113B000
|
trusted library allocation
|
page execute and read and write
|
||
1B93A000
|
stack
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
223FBB29000
|
heap
|
page read and write
|
||
15530153000
|
trusted library allocation
|
page read and write
|
||
1BCAF000
|
stack
|
page read and write
|
||
E55000
|
heap
|
page read and write
|
||
7FF849174000
|
trusted library allocation
|
page read and write
|
||
92E1000
|
trusted library allocation
|
page read and write
|
||
1552FABE000
|
trusted library allocation
|
page read and write
|
||
7FF84922C000
|
trusted library allocation
|
page read and write
|
||
107E000
|
heap
|
page read and write
|
||
7E98EF0000
|
stack
|
page read and write
|
||
2C9E000
|
stack
|
page read and write
|
||
19EDF879000
|
trusted library allocation
|
page read and write
|
||
20F1FDD0000
|
trusted library allocation
|
page read and write
|
||
32C1000
|
trusted library allocation
|
page read and write
|
||
1553F1D6000
|
trusted library allocation
|
page read and write
|
||
223F9FD8000
|
heap
|
page read and write
|
||
64B1000
|
heap
|
page read and write
|
||
35FD000
|
unkown
|
page readonly
|
||
1637000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849153000
|
trusted library allocation
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
223FB8D0000
|
trusted library allocation
|
page read and write
|
||
5280000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
594E000
|
stack
|
page read and write
|
||
878498E000
|
stack
|
page read and write
|
||
542C000
|
stack
|
page read and write
|
||
1C0EB000
|
stack
|
page read and write
|
||
EEC41AF000
|
stack
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
134E000
|
stack
|
page read and write
|
||
15547594000
|
heap
|
page read and write
|
||
DE3000
|
heap
|
page read and write
|
||
E29000
|
heap
|
page read and write
|
||
223F9FD4000
|
heap
|
page read and write
|
||
ABAE000
|
stack
|
page read and write
|
||
223FC20A000
|
heap
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
6680000
|
trusted library allocation
|
page execute and read and write
|
||
5C28000
|
heap
|
page read and write
|
||
223FA0A5000
|
heap
|
page read and write
|
||
146E000
|
stack
|
page read and write
|
||
9C91AF9000
|
stack
|
page read and write
|
||
223902E7000
|
trusted library allocation
|
page read and write
|
||
A93000
|
heap
|
page read and write
|
||
7DF4DF450000
|
trusted library allocation
|
page execute and read and write
|
||
A12000
|
heap
|
page read and write
|
||
1B400000
|
heap
|
page read and write
|
||
586C000
|
stack
|
page read and write
|
||
DAE000
|
heap
|
page read and write
|
||
22381DDD000
|
trusted library allocation
|
page read and write
|
||
22390306000
|
trusted library allocation
|
page read and write
|
||
7AB000
|
stack
|
page read and write
|
||
160A000
|
trusted library allocation
|
page execute and read and write
|
||
3210000
|
heap
|
page execute and read and write
|
||
10F2000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
667F000
|
stack
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
A650000
|
heap
|
page read and write
|
||
20F1FE5F000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
7E992FE000
|
stack
|
page read and write
|
||
50AC000
|
heap
|
page read and write
|
||
D72000
|
heap
|
page read and write
|
||
7FF849008000
|
trusted library allocation
|
page read and write
|
||
28720A20000
|
trusted library allocation
|
page read and write
|
||
8785078000
|
stack
|
page read and write
|
||
1552D381000
|
heap
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
223FBC10000
|
heap
|
page execute and read and write
|
||
19ECF6F0000
|
heap
|
page read and write
|
||
51EE000
|
stack
|
page read and write
|
||
A79E000
|
stack
|
page read and write
|
||
3213000
|
unkown
|
page readonly
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
13C8000
|
heap
|
page read and write
|
||
D75000
|
heap
|
page read and write
|
||
E11000
|
heap
|
page read and write
|
||
7FF848F06000
|
trusted library allocation
|
page execute and read and write
|
||
223FC19F000
|
heap
|
page read and write
|
||
319F000
|
stack
|
page read and write
|
||
1552D4F0000
|
heap
|
page read and write
|
||
223FBB54000
|
heap
|
page read and write
|
||
56CE000
|
stack
|
page read and write
|
||
5280000
|
heap
|
page read and write
|
||
19ECE090000
|
heap
|
page read and write
|
||
3646000
|
unkown
|
page readonly
|
||
7FF848EC0000
|
trusted library allocation
|
page execute and read and write
|
||
110A000
|
trusted library allocation
|
page execute and read and write
|
||
63AB000
|
trusted library allocation
|
page execute and read and write
|
||
20F1DDC9000
|
unkown
|
page readonly
|
||
1570000
|
heap
|
page read and write
|
||
11EB000
|
trusted library allocation
|
page execute and read and write
|
||
DCD000
|
heap
|
page read and write
|
||
19ECDD1C000
|
heap
|
page read and write
|
||
E5C000
|
heap
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
7E994FF000
|
stack
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
167E000
|
stack
|
page read and write
|
||
1BA3C000
|
stack
|
page read and write
|
||
3C1A378000
|
stack
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
19ECF7B0000
|
trusted library allocation
|
page read and write
|
||
155474F0000
|
heap
|
page read and write
|
||
1BF5E000
|
stack
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
7FF849169000
|
trusted library allocation
|
page read and write
|
||
2570000
|
heap
|
page read and write
|
||
155473D0000
|
heap
|
page execute and read and write
|
||
63EE000
|
stack
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
28729120000
|
heap
|
page read and write
|
||
7FF849002000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
8785D4C000
|
stack
|
page read and write
|
||
50B5000
|
heap
|
page read and write
|
||
6415000
|
heap
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
20F1FDE3000
|
trusted library allocation
|
page read and write
|
||
2870EE90000
|
trusted library allocation
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page execute and read and write
|
||
155474E4000
|
heap
|
page read and write
|
||
7FF848F06000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E5C000
|
trusted library allocation
|
page execute and read and write
|
||
1552D387000
|
heap
|
page read and write
|
||
EEC4776000
|
stack
|
page read and write
|
||
58F0279000
|
stack
|
page read and write
|
||
10E0000
|
trusted library allocation
|
page read and write
|
||
28728C38000
|
heap
|
page read and write
|
||
DB8000
|
heap
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
223F9F58000
|
heap
|
page read and write
|
||
ACAE000
|
stack
|
page read and write
|
||
3139000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
40F1000
|
trusted library allocation
|
page read and write
|
||
1B4DA000
|
heap
|
page read and write
|
||
223FC120000
|
heap
|
page execute and read and write
|
||
157E000
|
stack
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
19ECF8CB000
|
trusted library allocation
|
page read and write
|
||
57F0000
|
heap
|
page read and write
|
||
20F1E802000
|
unkown
|
page readonly
|
||
10AC000
|
trusted library allocation
|
page execute and read and write
|
||
EEC4AFB000
|
stack
|
page read and write
|
||
1552D1B0000
|
heap
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
28712031000
|
trusted library allocation
|
page read and write
|
||
1553EF00000
|
trusted library allocation
|
page read and write
|
||
15F0000
|
heap
|
page read and write
|
||
8785F4C000
|
stack
|
page read and write
|
||
7FF849008000
|
trusted library allocation
|
page read and write
|
||
20F1F202000
|
unkown
|
page readonly
|
||
1552EEC0000
|
heap
|
page execute and read and write
|
||
19ECDD08000
|
heap
|
page read and write
|
||
7FF849210000
|
trusted library allocation
|
page read and write
|
||
7FF848FC2000
|
trusted library allocation
|
page read and write
|
||
50AB000
|
heap
|
page read and write
|
||
20F1DACE000
|
unkown
|
page readonly
|
||
14EF000
|
stack
|
page read and write
|
||
20F20065000
|
heap
|
page read and write
|
||
E09000
|
heap
|
page read and write
|
||
12681000
|
trusted library allocation
|
page read and write
|
||
223FB880000
|
heap
|
page read and write
|
||
223F9F8F000
|
heap
|
page read and write
|
||
1553EEF1000
|
trusted library allocation
|
page read and write
|
||
1BE5F000
|
stack
|
page read and write
|
||
32F4000
|
trusted library allocation
|
page read and write
|
||
287290D0000
|
trusted library allocation
|
page read and write
|
||
EEC45F7000
|
stack
|
page read and write
|
||
28720A12000
|
trusted library allocation
|
page read and write
|
||
19EE7DCD000
|
heap
|
page read and write
|
||
7FF848EDC000
|
trusted library allocation
|
page execute and read and write
|
||
22380F9F000
|
trusted library allocation
|
page read and write
|
||
2239006E000
|
trusted library allocation
|
page read and write
|
||
BC9000
|
stack
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
28728FDC000
|
heap
|
page read and write
|
||
9C91E7B000
|
stack
|
page read and write
|
||
223FC199000
|
heap
|
page read and write
|
||
638A000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849179000
|
trusted library allocation
|
page read and write
|
||
BDE000
|
stack
|
page read and write
|
||
50B9000
|
heap
|
page read and write
|
||
6352000
|
trusted library allocation
|
page execute and read and write
|
||
223FBB7E000
|
heap
|
page read and write
|
||
7FF849273000
|
trusted library allocation
|
page read and write
|
||
60F6000
|
stack
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
E56000
|
heap
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page execute and read and write
|
||
19EE7EA0000
|
heap
|
page read and write
|
||
1456000
|
heap
|
page read and write
|
||
11B9000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
20F1FBB8000
|
unkown
|
page readonly
|
||
19EDF9F1000
|
trusted library allocation
|
page read and write
|
||
42C1000
|
trusted library allocation
|
page read and write
|
||
2238130D000
|
trusted library allocation
|
page read and write
|
||
7DF43AB50000
|
trusted library allocation
|
page execute and read and write
|
||
1550000
|
heap
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
20F1FDB0000
|
trusted library allocation
|
page read and write
|
||
55AE000
|
stack
|
page read and write
|
||
15530320000
|
trusted library allocation
|
page read and write
|
||
B2E000
|
unkown
|
page read and write
|
||
28728D60000
|
heap
|
page execute and read and write
|
||
EEC457E000
|
stack
|
page read and write
|
||
2870EC1D000
|
heap
|
page read and write
|
||
155475BA000
|
heap
|
page read and write
|
||
147E000
|
heap
|
page read and write
|
||
19EE812C000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
EEC46F8000
|
stack
|
page read and write
|
||
19EE804F000
|
heap
|
page read and write
|
||
6560000
|
trusted library allocation
|
page read and write
|
||
5D80000
|
heap
|
page read and write
|
||
19EE7FD0000
|
heap
|
page read and write
|
||
3C19E72000
|
stack
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
92E4000
|
trusted library allocation
|
page read and write
|
||
7FF84918C000
|
trusted library allocation
|
page read and write
|
||
188E000
|
stack
|
page read and write
|
||
28728C66000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
B7B000
|
stack
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
6568000
|
trusted library allocation
|
page read and write
|
||
1553F1D0000
|
trusted library allocation
|
page read and write
|
||
223FC0C0000
|
heap
|
page execute and read and write
|
||
223FC130000
|
heap
|
page read and write
|
||
527E000
|
stack
|
page read and write
|
||
20F1FD40000
|
heap
|
page read and write
|
||
546E000
|
stack
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
54CE000
|
stack
|
page read and write
|
||
110C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
50B9000
|
heap
|
page read and write
|
||
22381951000
|
trusted library allocation
|
page read and write
|
||
28711A77000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
DE3000
|
heap
|
page read and write
|
||
20F3A380000
|
heap
|
page execute and read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
7FF84917C000
|
trusted library allocation
|
page read and write
|
||
3C1A1FE000
|
stack
|
page read and write
|
||
223F9F9B000
|
heap
|
page read and write
|
||
5A70000
|
heap
|
page read and write
|
||
2870EDD0000
|
heap
|
page read and write
|
||
E49000
|
heap
|
page read and write
|
||
13291000
|
trusted library allocation
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
7FF849200000
|
trusted library allocation
|
page read and write
|
||
DB5000
|
heap
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
22381254000
|
trusted library allocation
|
page read and write
|
||
2870EEBA000
|
heap
|
page read and write
|
||
7FF848E6C000
|
trusted library allocation
|
page execute and read and write
|
||
AF2C000
|
stack
|
page read and write
|
||
20F1DE02000
|
unkown
|
page readonly
|
||
122E000
|
heap
|
page read and write
|
||
E11000
|
heap
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
642F000
|
heap
|
page read and write
|
||
20F21A11000
|
trusted library allocation
|
page read and write
|
||
1552D39B000
|
heap
|
page read and write
|
||
28729005000
|
heap
|
page read and write
|
||
DE1000
|
heap
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page read and write
|
||
58EE000
|
stack
|
page read and write
|
||
20F31A13000
|
trusted library allocation
|
page read and write
|
||
1B4AF000
|
heap
|
page read and write
|
||
223FBA45000
|
heap
|
page read and write
|
||
34B3000
|
unkown
|
page readonly
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
28712011000
|
trusted library allocation
|
page read and write
|
||
7FF849290000
|
trusted library allocation
|
page read and write
|
||
17D0000
|
heap
|
page read and write
|
||
3C1A4FE000
|
stack
|
page read and write
|
||
3C1A3FB000
|
stack
|
page read and write
|
||
223F9E20000
|
heap
|
page read and write
|
||
50AB000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
BC6000
|
stack
|
page read and write
|
||
162A000
|
trusted library allocation
|
page execute and read and write
|
||
596D000
|
stack
|
page read and write
|
||
1552D3C2000
|
heap
|
page read and write
|
||
1622000
|
trusted library allocation
|
page execute and read and write
|
||
EEC48FE000
|
stack
|
page read and write
|
||
223FBB79000
|
heap
|
page read and write
|
||
7FF848E3B000
|
trusted library allocation
|
page read and write
|
||
365E000
|
unkown
|
page readonly
|
||
55BD000
|
stack
|
page read and write
|
||
7DF408680000
|
trusted library allocation
|
page execute and read and write
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
22381094000
|
trusted library allocation
|
page read and write
|
||
1372000
|
trusted library allocation
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
2708000
|
trusted library allocation
|
page read and write
|
||
CBB000
|
stack
|
page read and write
|
||
28712036000
|
trusted library allocation
|
page read and write
|
||
653E000
|
stack
|
page read and write
|
||
3C1A2F8000
|
stack
|
page read and write
|
||
1AC0D000
|
stack
|
page read and write
|
||
2870EE80000
|
heap
|
page readonly
|
||
878527E000
|
stack
|
page read and write
|
||
7FF848DF4000
|
trusted library allocation
|
page read and write
|
||
20F1FE8B000
|
heap
|
page read and write
|
||
1032000
|
trusted library allocation
|
page execute and read and write
|
||
6469000
|
heap
|
page read and write
|
||
7DF43AB60000
|
trusted library allocation
|
page execute and read and write
|
||
223818F2000
|
trusted library allocation
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
DA8000
|
heap
|
page read and write
|
||
161A000
|
trusted library allocation
|
page execute and read and write
|
||
C3F000
|
stack
|
page read and write
|
||
AE2C000
|
stack
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
19EE8004000
|
heap
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
21BCD870000
|
heap
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
CE2D000
|
trusted library allocation
|
page read and write
|
||
1B050000
|
heap
|
page read and write
|
||
223FB870000
|
trusted library allocation
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
28728EB0000
|
heap
|
page execute and read and write
|
||
15547678000
|
heap
|
page read and write
|
||
66F0000
|
heap
|
page execute and read and write
|
||
1552D545000
|
heap
|
page read and write
|
||
2872900E000
|
heap
|
page read and write
|
||
12688000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
E0F000
|
heap
|
page read and write
|
||
22380A52000
|
trusted library allocation
|
page read and write
|
||
9C91BFA000
|
stack
|
page read and write
|
||
20F1FE53000
|
heap
|
page read and write
|
||
55CE000
|
stack
|
page read and write
|
||
223FBFE0000
|
heap
|
page read and write
|
||
19EE8110000
|
heap
|
page read and write
|
||
19ECDD48000
|
heap
|
page read and write
|
||
DD9000
|
heap
|
page read and write
|
||
32C4000
|
trusted library allocation
|
page read and write
|
||
155474FC000
|
heap
|
page read and write
|
||
58F02FF000
|
unkown
|
page read and write
|
||
20F31A11000
|
trusted library allocation
|
page read and write
|
||
42F1000
|
trusted library allocation
|
page read and write
|
||
536C000
|
stack
|
page read and write
|
||
22381126000
|
trusted library allocation
|
page read and write
|
||
7FF848FDA000
|
trusted library allocation
|
page read and write
|
||
1552ECF0000
|
trusted library allocation
|
page read and write
|
||
1553F090000
|
trusted library allocation
|
page read and write
|
||
28728BF8000
|
heap
|
page read and write
|
||
DDC000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
8784F79000
|
stack
|
page read and write
|
||
A3B000
|
heap
|
page read and write
|
||
7E993FD000
|
stack
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
7FF487260000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
223FC13C000
|
heap
|
page read and write
|
||
1B5FE000
|
stack
|
page read and write
|
||
8784E79000
|
stack
|
page read and write
|
||
59EE000
|
stack
|
page read and write
|
||
11E0000
|
trusted library allocation
|
page read and write
|
||
1357000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
7FF849178000
|
trusted library allocation
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page read and write
|
||
21BCD4B0000
|
heap
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
DD8000
|
heap
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
19ED0C22000
|
trusted library allocation
|
page read and write
|
||
DB6000
|
heap
|
page read and write
|
||
1102000
|
trusted library allocation
|
page execute and read and write
|
||
9C91C78000
|
stack
|
page read and write
|
||
7FF848FF8000
|
trusted library allocation
|
page read and write
|
||
155473D6000
|
heap
|
page execute and read and write
|
||
DCE000
|
heap
|
page read and write
|
||
EEC447E000
|
stack
|
page read and write
|
||
361A000
|
unkown
|
page readonly
|
||
145C000
|
heap
|
page read and write
|
||
2870EEC0000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
7FF848EDC000
|
trusted library allocation
|
page execute and read and write
|
||
3607000
|
unkown
|
page readonly
|
||
7FF849210000
|
trusted library allocation
|
page read and write
|
||
22380229000
|
trusted library allocation
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page read and write
|
||
1340000
|
trusted library allocation
|
page read and write
|
||
3641000
|
unkown
|
page readonly
|
||
1400000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
1470000
|
heap
|
page read and write
|
||
19ECF750000
|
trusted library allocation
|
page read and write
|
||
2870EBE0000
|
heap
|
page read and write
|
||
7FF848F45000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
E53000
|
heap
|
page read and write
|
||
5BF0000
|
heap
|
page read and write
|
||
155304C1000
|
trusted library allocation
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
EEC4A7E000
|
stack
|
page read and write
|
||
19ECDD45000
|
heap
|
page read and write
|
||
7FF849210000
|
trusted library allocation
|
page read and write
|
||
2870EBD0000
|
heap
|
page read and write
|
||
7FF848F45000
|
trusted library allocation
|
page execute and read and write
|
||
10FA000
|
trusted library allocation
|
page execute and read and write
|
||
4960000
|
heap
|
page read and write
|
||
1130000
|
trusted library allocation
|
page read and write
|
||
19ED1157000
|
trusted library allocation
|
page read and write
|
||
CD71000
|
trusted library allocation
|
page read and write
|
||
223FC28A000
|
heap
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
DD5000
|
heap
|
page read and write
|
||
1370000
|
trusted library allocation
|
page read and write
|
||
323F000
|
unkown
|
page readonly
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
1080000
|
heap
|
page execute and read and write
|
||
28710958000
|
trusted library allocation
|
page read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
8784EFE000
|
stack
|
page read and write
|
||
6362000
|
trusted library allocation
|
page execute and read and write
|
||
3C19F7F000
|
stack
|
page read and write
|
||
7FF849280000
|
trusted library allocation
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
A01000
|
heap
|
page read and write
|
||
7FF848E7C000
|
trusted library allocation
|
page execute and read and write
|
||
9D0000
|
heap
|
page read and write
|
||
19ECF851000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
321D000
|
unkown
|
page readonly
|
||
28728D90000
|
heap
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page read and write
|
||
19ECDDD0000
|
heap
|
page read and write
|
||
20F31A19000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
heap
|
page read and write
|
||
1080000
|
trusted library allocation
|
page read and write
|
||
19EE80D0000
|
heap
|
page read and write
|
||
110C000
|
heap
|
page read and write
|
||
1770000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
1552D4F5000
|
heap
|
page read and write
|
||
7FF849276000
|
trusted library allocation
|
page read and write
|
||
2870EEB5000
|
heap
|
page read and write
|
||
19EE80E9000
|
heap
|
page read and write
|
||
19ECDCC0000
|
heap
|
page read and write
|
||
19EE82E0000
|
heap
|
page read and write
|
||
306E000
|
unkown
|
page readonly
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
7FF848E2B000
|
trusted library allocation
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
1342000
|
trusted library allocation
|
page execute and read and write
|
||
361F000
|
unkown
|
page readonly
|
||
556E000
|
stack
|
page read and write
|
||
570E000
|
stack
|
page read and write
|
||
13298000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page execute and read and write
|
||
2870EE50000
|
trusted library allocation
|
page read and write
|
||
D81000
|
heap
|
page read and write
|
||
7DF408690000
|
trusted library allocation
|
page execute and read and write
|
||
10AA000
|
trusted library allocation
|
page execute and read and write
|
||
EEC497E000
|
stack
|
page read and write
|
||
51BE000
|
stack
|
page read and write
|
||
15547230000
|
heap
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
267E000
|
stack
|
page read and write
|
||
7FF848EE6000
|
trusted library allocation
|
page execute and read and write
|
||
223FBA20000
|
trusted library allocation
|
page read and write
|
||
E4F000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
223F9F50000
|
heap
|
page read and write
|
||
223FB916000
|
heap
|
page read and write
|
||
1553025F000
|
trusted library allocation
|
page read and write
|
||
3C1A57F000
|
stack
|
page read and write
|
||
17F0000
|
heap
|
page read and write
|
||
1552F118000
|
trusted library allocation
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
103F000
|
stack
|
page read and write
|
||
1552FAD2000
|
trusted library allocation
|
page read and write
|
||
1377000
|
trusted library allocation
|
page execute and read and write
|
||
28720741000
|
trusted library allocation
|
page read and write
|
||
56AE000
|
stack
|
page read and write
|
||
223FBAA0000
|
heap
|
page read and write
|
||
1552D2F0000
|
heap
|
page read and write
|
||
5080000
|
heap
|
page read and write
|
||
155474EC000
|
heap
|
page read and write
|
||
CE66000
|
trusted library allocation
|
page read and write
|
||
7FA20000
|
trusted library allocation
|
page execute and read and write
|
||
9C91DFE000
|
stack
|
page read and write
|
||
10A0000
|
trusted library allocation
|
page read and write
|
||
63A0000
|
trusted library allocation
|
page read and write
|
||
223FC2D0000
|
heap
|
page read and write
|
||
EC6000
|
heap
|
page read and write
|
||
28711B5F000
|
trusted library allocation
|
page read and write
|
||
19ECFA78000
|
trusted library allocation
|
page read and write
|
||
21BCD875000
|
heap
|
page read and write
|
||
772000
|
unkown
|
page readonly
|
||
223811DE000
|
trusted library allocation
|
page read and write
|
||
1552D290000
|
heap
|
page read and write
|
||
7FF84918A000
|
trusted library allocation
|
page read and write
|
||
54BF000
|
stack
|
page read and write
|
||
4FE8000
|
trusted library allocation
|
page read and write
|
||
50A2000
|
heap
|
page read and write
|
||
9C91D7E000
|
stack
|
page read and write
|
||
10D8000
|
heap
|
page read and write
|
||
1A6B0000
|
trusted library allocation
|
page read and write
|
||
E5E000
|
heap
|
page read and write
|
||
ACB000
|
stack
|
page read and write
|
||
576C000
|
stack
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
22381030000
|
trusted library allocation
|
page read and write
|
||
1600000
|
trusted library allocation
|
page read and write
|
||
2870EC67000
|
heap
|
page read and write
|
||
19EDFB3D000
|
trusted library allocation
|
page read and write
|
||
223FC292000
|
heap
|
page read and write
|
||
DDC000
|
heap
|
page read and write
|
||
A47F000
|
stack
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page execute and read and write
|
||
1553F1DC000
|
trusted library allocation
|
page read and write
|
||
87851FE000
|
stack
|
page read and write
|
||
15EA000
|
trusted library allocation
|
page execute and read and write
|
||
17E0000
|
heap
|
page execute and read and write
|
||
DE4000
|
heap
|
page read and write
|
||
1B72000
|
unkown
|
page readonly
|
||
7FF849002000
|
trusted library allocation
|
page read and write
|
||
1B81D000
|
stack
|
page read and write
|
||
20F21A00000
|
heap
|
page execute and read and write
|
||
CF0000
|
heap
|
page read and write
|
||
19EE7FB0000
|
heap
|
page execute and read and write
|
||
1552D2B0000
|
heap
|
page read and write
|
||
21BCD450000
|
heap
|
page read and write
|
||
5980000
|
unclassified section
|
page read and write
|
||
3C1A079000
|
stack
|
page read and write
|
||
3602000
|
unkown
|
page readonly
|
||
155472E7000
|
heap
|
page read and write
|
||
E2B000
|
heap
|
page read and write
|
||
1523000
|
heap
|
page read and write
|
||
9C9152E000
|
stack
|
page read and write
|
||
14BE000
|
heap
|
page read and write
|
||
3261000
|
unkown
|
page readonly
|
||
15D0000
|
trusted library allocation
|
page read and write
|
||
7FF849179000
|
trusted library allocation
|
page read and write
|
||
31FB000
|
unkown
|
page readonly
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
3257000
|
unkown
|
page readonly
|
||
22380F99000
|
trusted library allocation
|
page read and write
|
||
AF60000
|
heap
|
page read and write
|
||
50AB000
|
heap
|
page read and write
|
||
19ECF730000
|
trusted library allocation
|
page read and write
|
||
19ED0AB3000
|
trusted library allocation
|
page read and write
|
||
9C92A4C000
|
stack
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
DD5000
|
heap
|
page read and write
|
||
A69E000
|
stack
|
page read and write
|
||
A64E000
|
stack
|
page read and write
|
||
116E000
|
heap
|
page read and write
|
||
137B000
|
trusted library allocation
|
page execute and read and write
|
||
1B3FF000
|
stack
|
page read and write
|
||
2870EC25000
|
heap
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
28728F03000
|
heap
|
page read and write
|
||
15547630000
|
heap
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
EEC40A3000
|
stack
|
page read and write
|
||
22390031000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
104E000
|
heap
|
page read and write
|
||
2560000
|
heap
|
page execute and read and write
|
||
EEC47FC000
|
stack
|
page read and write
|
||
5DCE000
|
stack
|
page read and write
|
||
EEC4879000
|
stack
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
134A000
|
trusted library allocation
|
page execute and read and write
|
||
15547400000
|
heap
|
page read and write
|
||
15547662000
|
heap
|
page read and write
|
||
155307F7000
|
trusted library allocation
|
page read and write
|
||
135E000
|
stack
|
page read and write
|
||
20F200D5000
|
heap
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
19EE7D80000
|
heap
|
page read and write
|
||
13C0000
|
heap
|
page execute and read and write
|
||
FC6000
|
stack
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
1218000
|
heap
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page execute and read and write
|
||
1BD5E000
|
stack
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
28728C2F000
|
heap
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
9DC000
|
heap
|
page read and write
|
||
111A000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
19EDF8B7000
|
trusted library allocation
|
page read and write
|
||
7FF849143000
|
trusted library allocation
|
page read and write
|
||
19EE8107000
|
heap
|
page read and write
|
||
3200000
|
unkown
|
page readonly
|
||
223FBFEA000
|
heap
|
page read and write
|
||
EEC41EE000
|
stack
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page execute and read and write
|
||
BE0000
|
heap
|
page read and write
|
||
1B2FF000
|
stack
|
page read and write
|
||
223F9FAD000
|
heap
|
page read and write
|
||
545E000
|
unkown
|
page readonly
|
||
22380001000
|
trusted library allocation
|
page read and write
|
||
1BFEF000
|
stack
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page read and write
|
||
19ED0C81000
|
trusted library allocation
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
22381E27000
|
trusted library allocation
|
page read and write
|
||
9C928CC000
|
stack
|
page read and write
|
||
162E000
|
stack
|
page read and write
|
||
22380083000
|
trusted library allocation
|
page read and write
|
||
A54E000
|
stack
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
28728F05000
|
heap
|
page read and write
|
||
15547522000
|
heap
|
page read and write
|
||
DB9000
|
stack
|
page read and write
|
||
1B835000
|
stack
|
page read and write
|
||
3C19FFE000
|
stack
|
page read and write
|
||
1553F1FE000
|
trusted library allocation
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
7DF4086A0000
|
trusted library allocation
|
page execute and read and write
|
||
155307AD000
|
trusted library allocation
|
page read and write
|
||
19EE7D76000
|
heap
|
page execute and read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
20F1DA12000
|
unkown
|
page readonly
|
||
E09000
|
heap
|
page read and write
|
||
7FF849188000
|
trusted library allocation
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page execute and read and write
|
||
5A30000
|
heap
|
page read and write
|
||
EEC412F000
|
stack
|
page read and write
|
||
DB8000
|
heap
|
page read and write
|
||
4A5E000
|
unkown
|
page readonly
|
||
7E995FE000
|
stack
|
page read and write
|
||
28720731000
|
trusted library allocation
|
page read and write
|
||
1552F91C000
|
trusted library allocation
|
page read and write
|
There are 1411 hidden memdumps, click here to show them.