Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
qNdO4D18CF.exe
|
MS-DOS executable PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, MZ for MS-DOS
|
initial sample
|
||
C:\Program Files (x86)\Steam\steamclient.exe
|
MS-DOS executable PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, MZ for MS-DOS
|
dropped
|
||
C:\Program Files (x86)\Steam\steamclient.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\qNdO4D18CF.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\XyagYCCOZX.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\rmvercvh\rmvercvh.cmdline
|
Unicode text, UTF-8 (with BOM) text, with no line terminators
|
dropped
|
||
C:\Users\user\Desktop\AFZZLiTQ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\BCBhhiiL.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\BdpSDMGd.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\BuRPCyHG.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\BwVbAMfc.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\BzfkqkWQ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\CYASrcKR.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\CpOixJXm.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\CqvSLBwK.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\CufHpEgE.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\DfbAZvLY.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\DmprTJmg.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\EFxianyZ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\EhArHZqU.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\FsrYoeiE.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\GbyyMOOB.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\GeNRoyLy.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\GpTgJexz.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\Gumzpbgc.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\HLSRUZZF.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\HSbycbvE.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\HWSrgsLR.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\HiqIapca.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\IRjpMTiY.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\ITtzBsaM.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\IYriOWqO.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\IaBrEuiC.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\IsFPfNCu.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\JxaHDTDN.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\KJWyVjBG.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\KMIinpLK.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\KRGQASbM.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\KgJXRbxs.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\KkdqwYhV.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\LYhyhmcT.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\LforkokJ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\MHUibFPy.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\MeZIvNrs.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\MlipEPMs.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\NWAOYYym.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\NnHgmtso.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\NoRyKQDH.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\NtxFrmGq.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\OQPyFqpt.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\PEYPdPrA.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\PGiZSoip.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\PPFZCaBl.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\PWNGLdXl.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\PXvpYVwJ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\QLzxKisH.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\QvOHgixC.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\RKwhQDGz.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\RjAOsfOs.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\SzxHEkUn.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\THYplDVu.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\TbmXCvgb.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\TxYPZkji.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\UAZgkvhu.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\UUoNBnsb.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\VHHMJZBT.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\VrbgQkMX.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\VsDGsRfn.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\VwwfTkqf.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\VxBoFvwp.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\VxjNZniX.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\WucwbvLj.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\XXkOusIo.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\XsgfYcsu.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\YGOFIxBr.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\YKeEIjtU.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\YwOfwePf.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\ZHGMdjIP.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\aEhUzjWJ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\aSHMiLLR.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\aUovvDkq.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\asCFMbmi.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\bhuvEsaX.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\bzdouunp.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\cRJFZrfS.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\cpPftzHM.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\dCQWQdrl.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\dpMkGxhC.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\epactCHB.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\eqUeBrnj.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\fIcWIVzb.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\fQXwQazI.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\ffUEpXBW.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\fhkMXHMd.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\gFDeeVNW.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\ggiwcdaV.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\hcheWwWA.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\htowkSQD.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\iPDDuStZ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\ifdmuvPD.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\iiUfyMfQ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\ipiVsaGZ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\jEEdizHN.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\jUVbmMDs.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\kWYnjZbO.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\kWtSUqip.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\kixEeWsX.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\kqnUARmv.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\lHqLDiMI.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\lQNLnUfF.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\lsLKjvRr.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\mHEDqnlH.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\mXotVngM.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\mYLVFIfJ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\nDreGkIL.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\nYgAqZmk.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\oOnUZAGE.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\paSjLIrf.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\ppsaukgn.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\qEBmAmuq.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\qOBMMFgD.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\qcHMUuVk.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\rLAuGYci.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\rRaDvjLz.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\rThRxFce.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\rreJQTki.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\rzTkgNRx.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\sFNjAptf.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\sIbCbYqd.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\sOBLQjau.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\sYBlcCMG.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\sphCHAEj.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\tEVbjhhz.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\tyOaygFf.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\uENiETnW.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\vhVAXQlb.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\vpESBzMh.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\vvDaHluY.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\yvDYLPoQ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\yxHkJcLm.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\yzXsqMXs.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\zJmzvlwN.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\zdbaQHhe.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\zplKRyKf.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\System32\SecurityHealthSystray.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Steam\fcafd258929766
|
ASCII text, with very long lines (989), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\steamclient.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Hs46Jw7tmA
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RESA90.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x6e4, 10 symbols, created Sat Nov 30 04:28:38 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0xaq1mla.wr2.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1utmv0mk.our.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_23h3weqb.iup.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2bb1a3zh.m5m.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2ezy1e2m.yxf.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2u3lcngq.2im.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_35qxwjfi.tuf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3td4kktq.u0b.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a0tixeyp.5jk.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_arxb4pwb.eqy.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b1esbh2i.yzh.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bcunrahu.d0i.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bgd4zguh.3ce.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bt4npn0r.gxw.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_btwhhbdr.dvy.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bwjfm1bf.liw.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_codm3pr5.x0e.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ejo2sobw.ixt.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_enlojwpn.bvc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_evv3hrkq.l3j.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f1to0rtc.ogw.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g4czampg.ftd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gbbnlm4s.ic2.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_go55jtae.3he.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ha254hqb.iij.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iqjcet4n.tcg.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iwdnnk32.gy0.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j2pblsrt.3zy.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jzrw0dnp.sth.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k3rowymv.cht.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kt0l3oxy.3lt.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l4afasvj.yra.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l5itgopo.pji.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m0x0gnr2.mk0.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_muraqn2f.mzw.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mxptamyo.2ls.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nrb3rwp3.0tt.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oapagubr.4nn.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p3jqyyy2.kf4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pe0defhf.1hc.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pxaykmbt.1g4.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rmhrbdbe.2bi.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ruvaqlcq.5vt.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t1x1byoi.1lb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u02g41wo.uks.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_upocqxa2.0gb.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vperpacl.yez.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vspn2cjg.4hu.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vwb0tk2v.xxq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wxdsl3u0.52d.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x5mlhfkz.4nn.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y24g0xft.3dt.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yl54dnja.hf5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zech0324.s1c.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zmf03omb.x02.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zu3y5qmq.523.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\rmvercvh\rmvercvh.0.cs
|
C++ source, Unicode text, UTF-8 (with BOM) text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\rmvercvh\rmvercvh.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (329), with CRLF, CR line terminators
|
modified
|
||
C:\Users\user\Desktop\84f3811bb1c48b
|
ASCII text, with very long lines (347), with no line terminators
|
dropped
|
||
C:\Windows\System32\CSCA9DA535D810450AA35B2C9F27DA16D.TMP
|
MSVC .res
|
dropped
|
||
\Device\Null
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 202 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\qNdO4D18CF.exe
|
"C:\Users\user\Desktop\qNdO4D18CF.exe"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\rmvercvh\rmvercvh.cmdline"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$WinREAgent/'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Steam\steamclient.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\qNdO4D18CF.exe'
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\XyagYCCOZX.bat"
|
||
C:\Windows\System32\PING.EXE
|
ping -n 10 localhost
|
||
C:\Program Files (x86)\Steam\steamclient.exe
|
"C:\Program Files (x86)\Steam\steamclient.exe"
|
||
C:\Users\user\Desktop\qNdO4D18CF.exe
|
"C:\Users\user\Desktop\qNdO4D18CF.exe"
|
||
C:\Program Files (x86)\Steam\steamclient.exe
|
"C:\Program Files (x86)\Steam\steamclient.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c "C:\Program Files (x86)\Steam\steamclient.exe"
|
||
C:\Program Files (x86)\Steam\steamclient.exe
|
"C:\Program Files (x86)\Steam\steamclient.exe"
|
||
C:\Program Files (x86)\Steam\steamclient.exe
|
"C:\Program Files (x86)\Steam\steamclient.exe"
|
||
C:\Users\user\Desktop\qNdO4D18CF.exe
|
"C:\Users\user\Desktop\qNdO4D18CF.exe"
|
||
C:\Program Files (x86)\Steam\steamclient.exe
|
"C:\Program Files (x86)\Steam\steamclient.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c "C:\Program Files (x86)\Steam\steamclient.exe"
|
||
C:\Program Files (x86)\Steam\steamclient.exe
|
"C:\Program Files (x86)\Steam\steamclient.exe"
|
||
C:\Users\user\Desktop\qNdO4D18CF.exe
|
"C:\Users\user\Desktop\qNdO4D18CF.exe"
|
||
C:\Program Files (x86)\Steam\steamclient.exe
|
"C:\Program Files (x86)\Steam\steamclient.exe"
|
||
C:\Users\user\Desktop\qNdO4D18CF.exe
|
"C:\Users\user\Desktop\qNdO4D18CF.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c "C:\Users\user\Desktop\qNdO4D18CF.exe"
|
||
C:\Users\user\Desktop\qNdO4D18CF.exe
|
C:\Users\user\Desktop\qNdO4D18CF.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESA90.tmp"
"c:\Windows\System32\CSCA9DA535D810450AA35B2C9F27DA16D.TMP"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 45 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://390412cm.n9shteam.in/ProviderImagepipeTopacketbaseuniversaldle.php
|
172.66.0.102
|
||
https://ipinfo.io/country
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://ipinfo.io/ip
|
unknown
|
There are 1 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
390412cm.n9shteam.in
|
172.66.0.102
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.66.0.102
|
390412cm.n9shteam.in
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
steamclient
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
qNdO4D18CF
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Shell
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Shell
|
||
HKEY_CURRENT_USER\SOFTWARE\e099c071fcfe07d52cac9bc9c9838e42068e6df8
|
0102d8a38281c65a273b2d31fbd65d2be8f06831
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.ApplicationCompany
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\steamclient_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\steamclient_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\steamclient_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\steamclient_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\steamclient_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\steamclient_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\steamclient_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\steamclient_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\steamclient_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\steamclient_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\steamclient_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\steamclient_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\steamclient_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\steamclient_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\qNdO4D18CF_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\qNdO4D18CF_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\qNdO4D18CF_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\qNdO4D18CF_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\qNdO4D18CF_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\qNdO4D18CF_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\qNdO4D18CF_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\qNdO4D18CF_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\qNdO4D18CF_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\qNdO4D18CF_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\qNdO4D18CF_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\qNdO4D18CF_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\qNdO4D18CF_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\qNdO4D18CF_RASMANCS
|
FileDirectory
|
There are 26 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1AE80000
|
trusted library section
|
page read and write
|
||
12703000
|
trusted library allocation
|
page read and write
|
||
29B266C0000
|
heap
|
page read and write
|
||
31B3000
|
trusted library allocation
|
page read and write
|
||
1B770000
|
unkown
|
page readonly
|
||
7FFD9BD80000
|
trusted library allocation
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
597F479000
|
stack
|
page read and write
|
||
232DF047000
|
heap
|
page execute and read and write
|
||
2230000
|
unkown
|
page readonly
|
||
13116000
|
trusted library allocation
|
page read and write
|
||
1B8A0000
|
heap
|
page execute and read and write
|
||
E15000
|
heap
|
page read and write
|
||
18790C7000
|
stack
|
page read and write
|
||
1481E0BC000
|
heap
|
page read and write
|
||
1481E06D000
|
heap
|
page read and write
|
||
26A89A50000
|
heap
|
page read and write
|
||
19AA670E000
|
heap
|
page read and write
|
||
21F0000
|
unkown
|
page readonly
|
||
1B79C000
|
heap
|
page read and write
|
||
2DB25763000
|
heap
|
page read and write
|
||
2E5E3070000
|
heap
|
page read and write
|
||
13A37000
|
trusted library allocation
|
page read and write
|
||
1D5472F0000
|
heap
|
page read and write
|
||
1D549C53000
|
trusted library allocation
|
page read and write
|
||
3287000
|
trusted library allocation
|
page read and write
|
||
25F0000
|
heap
|
page execute and read and write
|
||
29B267A0000
|
heap
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
695000
|
heap
|
page read and write
|
||
32A0000
|
trusted library allocation
|
page read and write
|
||
20B00086000
|
trusted library allocation
|
page read and write
|
||
22B2000
|
unkown
|
page readonly
|
||
1D547373000
|
heap
|
page read and write
|
||
1481E1F3000
|
direct allocation
|
page read and write
|
||
13141000
|
trusted library allocation
|
page read and write
|
||
1325000
|
heap
|
page read and write
|
||
29B28451000
|
heap
|
page read and write
|
||
2DB25720000
|
heap
|
page read and write
|
||
2964000
|
trusted library allocation
|
page read and write
|
||
13372000
|
trusted library allocation
|
page read and write
|
||
2B9F000
|
trusted library allocation
|
page read and write
|
||
1D29EF60000
|
heap
|
page execute and read and write
|
||
2DB27395000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
C753BC7000
|
stack
|
page read and write
|
||
150421ED000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
305A000
|
heap
|
page read and write
|
||
1877FF9000
|
stack
|
page read and write
|
||
13129000
|
trusted library allocation
|
page read and write
|
||
1BEAE000
|
stack
|
page read and write
|
||
2FAB000
|
trusted library allocation
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
93649F7000
|
stack
|
page read and write
|
||
12448000
|
trusted library allocation
|
page read and write
|
||
1244D000
|
trusted library allocation
|
page read and write
|
||
187817D000
|
stack
|
page read and write
|
||
1877B93000
|
stack
|
page read and write
|
||
F1725F9000
|
stack
|
page read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
2441000
|
trusted library allocation
|
page read and write
|
||
29EA000
|
trusted library allocation
|
page read and write
|
||
1AF8C000
|
stack
|
page read and write
|
||
1BA8A000
|
stack
|
page read and write
|
||
131B7000
|
trusted library allocation
|
page read and write
|
||
15044365000
|
trusted library allocation
|
page read and write
|
||
2B81000
|
trusted library allocation
|
page read and write
|
||
132FD000
|
trusted library allocation
|
page read and write
|
||
F17283E000
|
stack
|
page read and write
|
||
26A89940000
|
trusted library allocation
|
page read and write
|
||
16F0000
|
heap
|
page read and write
|
||
29B26840000
|
trusted library allocation
|
page read and write
|
||
22FA87000
|
stack
|
page read and write
|
||
7FFD9B918000
|
trusted library allocation
|
page read and write
|
||
232DF102000
|
heap
|
page read and write
|
||
314F000
|
trusted library allocation
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
133D6000
|
trusted library allocation
|
page read and write
|
||
232DF1B1000
|
trusted library allocation
|
page read and write
|
||
13210000
|
trusted library allocation
|
page read and write
|
||
22D0000
|
unkown
|
page readonly
|
||
2DB25815000
|
heap
|
page read and write
|
||
F5FF0F9000
|
stack
|
page read and write
|
||
AC3787C000
|
stack
|
page read and write
|
||
CC7EFF9000
|
stack
|
page read and write
|
||
1005000
|
heap
|
page read and write
|
||
2E5E2FC0000
|
trusted library allocation
|
page read and write
|
||
131EF000
|
trusted library allocation
|
page read and write
|
||
1D29D49B000
|
heap
|
page read and write
|
||
1865000
|
heap
|
page read and write
|
||
2E5E3037000
|
heap
|
page execute and read and write
|
||
1D29F591000
|
trusted library allocation
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
2CA9000
|
trusted library allocation
|
page read and write
|
||
1B916000
|
heap
|
page read and write
|
||
26A899AB000
|
heap
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
12A01000
|
trusted library allocation
|
page read and write
|
||
266D000
|
trusted library allocation
|
page read and write
|
||
1D29D710000
|
heap
|
page readonly
|
||
10D5000
|
heap
|
page read and write
|
||
17034E000
|
stack
|
page read and write
|
||
1C008000
|
heap
|
page read and write
|
||
840000
|
trusted library allocation
|
page read and write
|
||
1C000000
|
heap
|
page read and write
|
||
2E5DD8E1000
|
heap
|
page read and write
|
||
226A000
|
heap
|
page read and write
|
||
66E1D79000
|
stack
|
page read and write
|
||
150442D0000
|
heap
|
page read and write
|
||
D95000
|
heap
|
page read and write
|
||
132D0000
|
trusted library allocation
|
page read and write
|
||
1481E210000
|
direct allocation
|
page read and write
|
||
2B70000
|
heap
|
page execute and read and write
|
||
19AA666B000
|
heap
|
page read and write
|
||
2379569D000
|
trusted library allocation
|
page read and write
|
||
1BFCF000
|
stack
|
page read and write
|
||
27F0000
|
heap
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
3188000
|
trusted library allocation
|
page read and write
|
||
19AA82C0000
|
trusted library allocation
|
page read and write
|
||
2B6000E0000
|
heap
|
page execute and read and write
|
||
1630000
|
heap
|
page read and write
|
||
3396000
|
trusted library allocation
|
page read and write
|
||
2242000
|
unkown
|
page readonly
|
||
22E5DE000
|
stack
|
page read and write
|
||
2B2D000
|
trusted library allocation
|
page read and write
|
||
1555000
|
heap
|
page read and write
|
||
1288000
|
heap
|
page read and write
|
||
3177000
|
trusted library allocation
|
page read and write
|
||
1BB523C0000
|
heap
|
page read and write
|
||
2B68000
|
trusted library allocation
|
page read and write
|
||
2DB27908000
|
trusted library allocation
|
page read and write
|
||
F5FF3B8000
|
stack
|
page read and write
|
||
232DF1A0000
|
heap
|
page execute and read and write
|
||
22EF7C000
|
stack
|
page read and write
|
||
23794C91000
|
trusted library allocation
|
page read and write
|
||
2E26000
|
trusted library allocation
|
page read and write
|
||
23794AC0000
|
heap
|
page read and write
|
||
269A000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B772000
|
trusted library allocation
|
page read and write
|
||
137AD000
|
trusted library allocation
|
page read and write
|
||
22E2000
|
unkown
|
page readonly
|
||
FD0000
|
heap
|
page read and write
|
||
F5FF339000
|
stack
|
page read and write
|
||
EF100BC000
|
stack
|
page read and write
|
||
12F01000
|
trusted library allocation
|
page read and write
|
||
2D00000
|
trusted library allocation
|
page read and write
|
||
26A899F9000
|
heap
|
page read and write
|
||
2E5E3030000
|
heap
|
page execute and read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
118A000
|
heap
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
32E000
|
stack
|
page read and write
|
||
7FFD9B984000
|
trusted library allocation
|
page read and write
|
||
10E1000
|
stack
|
page read and write
|
||
13317000
|
trusted library allocation
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
2302000
|
unkown
|
page readonly
|
||
309D000
|
trusted library allocation
|
page read and write
|
||
308A000
|
trusted library allocation
|
page read and write
|
||
3293000
|
trusted library allocation
|
page read and write
|
||
221F3F9A000
|
heap
|
page read and write
|
||
2B6001A5000
|
trusted library allocation
|
page read and write
|
||
232DF235000
|
trusted library allocation
|
page read and write
|
||
DD6000
|
heap
|
page read and write
|
||
23794685000
|
heap
|
page read and write
|
||
26A89960000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
137EA000
|
trusted library allocation
|
page read and write
|
||
133CA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B985000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD90000
|
trusted library allocation
|
page read and write
|
||
130A0000
|
trusted library allocation
|
page read and write
|
||
7A2000
|
heap
|
page read and write
|
||
FA4857A000
|
stack
|
page read and write
|
||
66E1703000
|
stack
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
1481E047000
|
heap
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
241E000
|
stack
|
page read and write
|
||
EF0F7EF000
|
unkown
|
page read and write
|
||
7FFD9BEE0000
|
trusted library allocation
|
page read and write
|
||
150421B0000
|
heap
|
page read and write
|
||
1475000
|
heap
|
page read and write
|
||
2B600040000
|
trusted library allocation
|
page read and write
|
||
2A01000
|
trusted library allocation
|
page read and write
|
||
1D29D750000
|
heap
|
page read and write
|
||
F85000
|
heap
|
page read and write
|
||
1A470000
|
trusted library allocation
|
page read and write
|
||
66E1A7E000
|
stack
|
page read and write
|
||
1481E05C000
|
heap
|
page read and write
|
||
1B1E0000
|
heap
|
page read and write
|
||
2A93000
|
trusted library allocation
|
page read and write
|
||
EF0F763000
|
stack
|
page read and write
|
||
1B3A3000
|
heap
|
page execute and read and write
|
||
139DF000
|
trusted library allocation
|
page read and write
|
||
1481E0AE000
|
heap
|
page read and write
|
||
11B3000
|
heap
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
AC36F8F000
|
unkown
|
page read and write
|
||
7FFD9B772000
|
trusted library allocation
|
page read and write
|
||
1481E0B5000
|
heap
|
page read and write
|
||
FA4954E000
|
stack
|
page read and write
|
||
16F3FF000
|
stack
|
page read and write
|
||
1B712000
|
unkown
|
page readonly
|
||
2B28000
|
trusted library allocation
|
page read and write
|
||
137D4000
|
trusted library allocation
|
page read and write
|
||
232DF67E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
133D4000
|
trusted library allocation
|
page read and write
|
||
2A6F000
|
trusted library allocation
|
page read and write
|
||
13025000
|
trusted library allocation
|
page read and write
|
||
19AA84A0000
|
heap
|
page read and write
|
||
597F3FF000
|
stack
|
page read and write
|
||
2D09000
|
trusted library allocation
|
page read and write
|
||
1D29D755000
|
heap
|
page read and write
|
||
2E6F000
|
stack
|
page read and write
|
||
26A89900000
|
trusted library section
|
page read and write
|
||
23792FA0000
|
heap
|
page read and write
|
||
CC7E9A3000
|
stack
|
page read and write
|
||
13745000
|
trusted library allocation
|
page read and write
|
||
1D5472F8000
|
heap
|
page read and write
|
||
2E5E2EB4000
|
heap
|
page read and write
|
||
3073000
|
trusted library allocation
|
page read and write
|
||
2AFD000
|
trusted library allocation
|
page read and write
|
||
1130000
|
trusted library allocation
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
2B6005EE000
|
trusted library allocation
|
page read and write
|
||
147F000
|
stack
|
page read and write
|
||
29B285B7000
|
heap
|
page execute and read and write
|
||
12B81000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE75000
|
trusted library allocation
|
page read and write
|
||
E65000
|
heap
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
1481FA8D000
|
direct allocation
|
page read and write
|
||
2959000
|
trusted library allocation
|
page read and write
|
||
150421A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7BC000
|
trusted library allocation
|
page execute and read and write
|
||
1470000
|
trusted library allocation
|
page read and write
|
||
925000
|
heap
|
page read and write
|
||
139BA000
|
trusted library allocation
|
page read and write
|
||
31FC000
|
trusted library allocation
|
page read and write
|
||
F1727BE000
|
stack
|
page read and write
|
||
AC376F8000
|
stack
|
page read and write
|
||
93645BF000
|
stack
|
page read and write
|
||
12A21000
|
trusted library allocation
|
page read and write
|
||
2B70000
|
trusted library allocation
|
page read and write
|
||
136B2000
|
trusted library allocation
|
page read and write
|
||
232DF130000
|
heap
|
page read and write
|
||
1BA2F000
|
stack
|
page read and write
|
||
19AA84B1000
|
trusted library allocation
|
page read and write
|
||
2E5E2D00000
|
heap
|
page read and write
|
||
2E5DD8E1000
|
heap
|
page read and write
|
||
2DB27370000
|
heap
|
page execute and read and write
|
||
AC375F7000
|
stack
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
23794EB6000
|
trusted library allocation
|
page read and write
|
||
597F4FD000
|
stack
|
page read and write
|
||
CC7F2FC000
|
stack
|
page read and write
|
||
22FB8C000
|
stack
|
page read and write
|
||
1D547690000
|
heap
|
page read and write
|
||
15043DB0000
|
heap
|
page read and write
|
||
7FFD9B8A1000
|
trusted library allocation
|
page execute and read and write
|
||
7A0000
|
heap
|
page read and write
|
||
2DB2577D000
|
heap
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
CC7FEC9000
|
stack
|
page read and write
|
||
677000
|
heap
|
page read and write
|
||
7FFD9B93C000
|
trusted library allocation
|
page read and write
|
||
1528000
|
heap
|
page read and write
|
||
2B9A000
|
trusted library allocation
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
19AA65E0000
|
heap
|
page read and write
|
||
15042420000
|
trusted library allocation
|
page read and write
|
||
22F2000
|
unkown
|
page readonly
|
||
D70000
|
heap
|
page read and write
|
||
AC3797B000
|
stack
|
page read and write
|
||
2929000
|
trusted library allocation
|
page read and write
|
||
130F7000
|
trusted library allocation
|
page read and write
|
||
1481E0AC000
|
heap
|
page read and write
|
||
35E000
|
stack
|
page read and write
|
||
FA4974E000
|
stack
|
page read and write
|
||
30F3000
|
trusted library allocation
|
page read and write
|
||
7BF63FF000
|
stack
|
page read and write
|
||
138C4000
|
trusted library allocation
|
page read and write
|
||
26A898A0000
|
heap
|
page read and write
|
||
2A60000
|
trusted library allocation
|
page read and write
|
||
F17273C000
|
stack
|
page read and write
|
||
AC3777E000
|
stack
|
page read and write
|
||
1BBAF000
|
stack
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
13E5000
|
heap
|
page read and write
|
||
26A89A6E000
|
heap
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
2E5DD8E5000
|
heap
|
page read and write
|
||
7FFD9BE90000
|
trusted library allocation
|
page read and write
|
||
936497E000
|
stack
|
page read and write
|
||
1481E08A000
|
heap
|
page read and write
|
||
1481FAE0000
|
direct allocation
|
page read and write
|
||
266A000
|
trusted library allocation
|
page read and write
|
||
597F9BE000
|
stack
|
page read and write
|
||
2E5DD8D0000
|
heap
|
page read and write
|
||
13719000
|
trusted library allocation
|
page read and write
|
||
12421000
|
trusted library allocation
|
page read and write
|
||
2CF7000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
12E6F000
|
trusted library allocation
|
page read and write
|
||
1309E000
|
trusted library allocation
|
page read and write
|
||
1D5473E2000
|
heap
|
page read and write
|
||
F83000
|
heap
|
page read and write
|
||
12B8F000
|
trusted library allocation
|
page read and write
|
||
2E5E2FA0000
|
heap
|
page readonly
|
||
138C7000
|
trusted library allocation
|
page read and write
|
||
2312000
|
unkown
|
page readonly
|
||
12DD5000
|
trusted library allocation
|
page read and write
|
||
2A1F000
|
trusted library allocation
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
19AA6653000
|
heap
|
page read and write
|
||
23792C89000
|
heap
|
page read and write
|
||
2DB2575D000
|
heap
|
page read and write
|
||
7FFD9BDB0000
|
trusted library allocation
|
page read and write
|
||
AC3737A000
|
stack
|
page read and write
|
||
2302000
|
unkown
|
page readonly
|
||
1BFF0000
|
heap
|
page execute and read and write
|
||
12A5000
|
heap
|
page read and write
|
||
C15000
|
heap
|
page read and write
|
||
2C43000
|
trusted library allocation
|
page read and write
|
||
2667000
|
trusted library allocation
|
page read and write
|
||
13334000
|
trusted library allocation
|
page read and write
|
||
10F5000
|
heap
|
page read and write
|
||
1481E053000
|
heap
|
page read and write
|
||
15F0000
|
heap
|
page execute and read and write
|
||
12F20000
|
trusted library allocation
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B788000
|
trusted library allocation
|
page read and write
|
||
22F0000
|
unkown
|
page readonly
|
||
150423A0000
|
heap
|
page readonly
|
||
9364CFF000
|
stack
|
page read and write
|
||
232DF0FE000
|
heap
|
page read and write
|
||
597F97B000
|
stack
|
page read and write
|
||
2D6F000
|
stack
|
page read and write
|
||
16F7FE000
|
stack
|
page read and write
|
||
23792C4C000
|
heap
|
page read and write
|
||
EF10038000
|
stack
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
1212000
|
heap
|
page read and write
|
||
6AA000
|
heap
|
page read and write
|
||
23792C12000
|
heap
|
page read and write
|
||
1D547680000
|
heap
|
page readonly
|
||
AC383CD000
|
stack
|
page read and write
|
||
1361F000
|
trusted library allocation
|
page read and write
|
||
150420F0000
|
heap
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
C752B7E000
|
stack
|
page read and write
|
||
2A5E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
13868000
|
trusted library allocation
|
page read and write
|
||
9C8F16F000
|
stack
|
page read and write
|
||
16F37A000
|
stack
|
page read and write
|
||
2B600090000
|
trusted library allocation
|
page read and write
|
||
22E513000
|
stack
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page execute and read and write
|
||
13123000
|
trusted library allocation
|
page read and write
|
||
1877E7F000
|
unkown
|
page read and write
|
||
29B26608000
|
heap
|
page read and write
|
||
7FFD9B975000
|
trusted library allocation
|
page read and write
|
||
295E000
|
stack
|
page read and write
|
||
150442C0000
|
trusted library allocation
|
page read and write
|
||
2EF4000
|
trusted library allocation
|
page read and write
|
||
22EC78000
|
stack
|
page read and write
|
||
12E2D000
|
trusted library allocation
|
page read and write
|
||
2AA9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
14820AA0000
|
direct allocation
|
page read and write
|
||
1481E0B0000
|
heap
|
page read and write
|
||
19AA8330000
|
trusted library allocation
|
page read and write
|
||
13341000
|
trusted library allocation
|
page read and write
|
||
4ABB3FE000
|
stack
|
page read and write
|
||
26A8BE1F000
|
trusted library allocation
|
page read and write
|
||
FA481CE000
|
stack
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page execute and read and write
|
||
FE0013C000
|
stack
|
page read and write
|
||
2CB1000
|
trusted library allocation
|
page read and write
|
||
FA49647000
|
stack
|
page read and write
|
||
F1724FB000
|
stack
|
page read and write
|
||
1481FA60000
|
direct allocation
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
232DEDD0000
|
trusted library allocation
|
page read and write
|
||
F17360E000
|
stack
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
2B6000D0000
|
trusted library allocation
|
page read and write
|
||
2B600B74000
|
trusted library allocation
|
page read and write
|
||
339A000
|
trusted library allocation
|
page read and write
|
||
C752A7E000
|
stack
|
page read and write
|
||
29A3000
|
trusted library allocation
|
page read and write
|
||
232DF106000
|
heap
|
page read and write
|
||
F5FF1F9000
|
stack
|
page read and write
|
||
221F3EB0000
|
heap
|
page read and write
|
||
13941000
|
trusted library allocation
|
page read and write
|
||
150441CE000
|
heap
|
page read and write
|
||
19AA6655000
|
heap
|
page read and write
|
||
234000
|
unkown
|
page readonly
|
||
2DB27390000
|
heap
|
page read and write
|
||
7FFD9BD60000
|
trusted library allocation
|
page read and write
|
||
1D29D640000
|
heap
|
page read and write
|
||
1D29D458000
|
heap
|
page read and write
|
||
FC3000
|
heap
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
232DD126000
|
heap
|
page read and write
|
||
1BDAF000
|
stack
|
page read and write
|
||
4ABB4F7000
|
stack
|
page read and write
|
||
22ECFE000
|
stack
|
page read and write
|
||
F5802FD000
|
stack
|
page read and write
|
||
2DE3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B96E000
|
trusted library allocation
|
page read and write
|
||
2A0F000
|
trusted library allocation
|
page read and write
|
||
13CF000
|
stack
|
page read and write
|
||
23794D15000
|
trusted library allocation
|
page read and write
|
||
2EAE000
|
trusted library allocation
|
page read and write
|
||
CC7FFCD000
|
stack
|
page read and write
|
||
2DB25970000
|
trusted library allocation
|
page read and write
|
||
131D9000
|
trusted library allocation
|
page read and write
|
||
1D29D6C0000
|
trusted library section
|
page read and write
|
||
232DD090000
|
heap
|
page read and write
|
||
2597000
|
trusted library allocation
|
page read and write
|
||
910DFE000
|
stack
|
page read and write
|
||
232DF0E3000
|
heap
|
page read and write
|
||
1B9EF000
|
stack
|
page read and write
|
||
16EF000
|
stack
|
page read and write
|
||
232DD12C000
|
heap
|
page read and write
|
||
EF0FC79000
|
stack
|
page read and write
|
||
13153000
|
trusted library allocation
|
page read and write
|
||
2A43000
|
trusted library allocation
|
page read and write
|
||
12D78000
|
trusted library allocation
|
page read and write
|
||
7FFD9B928000
|
trusted library allocation
|
page read and write
|
||
2DB2576F000
|
heap
|
page read and write
|
||
7FFD9B993000
|
trusted library allocation
|
page read and write
|
||
93645FE000
|
stack
|
page read and write
|
||
7FFD9BE0D000
|
trusted library allocation
|
page read and write
|
||
2974000
|
trusted library allocation
|
page read and write
|
||
1B790000
|
heap
|
page read and write
|
||
30A3000
|
trusted library allocation
|
page read and write
|
||
2940000
|
trusted library allocation
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
1481E09A000
|
heap
|
page read and write
|
||
28AB3EC3000
|
heap
|
page read and write
|
||
1435000
|
heap
|
page read and write
|
||
1C1DF000
|
stack
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
597F578000
|
stack
|
page read and write
|
||
2B600110000
|
heap
|
page read and write
|
||
2B8A000
|
trusted library allocation
|
page read and write
|
||
720000
|
trusted library allocation
|
page read and write
|
||
170447000
|
stack
|
page read and write
|
||
30AD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BEB0000
|
trusted library allocation
|
page read and write
|
||
1481E070000
|
heap
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
18782F8000
|
stack
|
page read and write
|
||
1BC88000
|
heap
|
page read and write
|
||
2EAB000
|
trusted library allocation
|
page read and write
|
||
1481E0B7000
|
heap
|
page read and write
|
||
2690000
|
heap
|
page read and write
|
||
3077000
|
trusted library allocation
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
19AA7F35000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
2B75000
|
trusted library allocation
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
1D5491B0000
|
heap
|
page execute and read and write
|
||
14F0000
|
heap
|
page read and write
|
||
C752DF8000
|
stack
|
page read and write
|
||
23792F70000
|
trusted library allocation
|
page read and write
|
||
C7527FE000
|
stack
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
3097000
|
trusted library allocation
|
page read and write
|
||
1805000
|
heap
|
page read and write
|
||
1085000
|
heap
|
page read and write
|
||
11B5000
|
heap
|
page read and write
|
||
1B207000
|
heap
|
page read and write
|
||
22E2000
|
unkown
|
page readonly
|
||
29D4000
|
trusted library allocation
|
page read and write
|
||
FA488F8000
|
stack
|
page read and write
|
||
1332B000
|
trusted library allocation
|
page read and write
|
||
1481E0A6000
|
heap
|
page read and write
|
||
1800000
|
heap
|
page read and write
|
||
D30000
|
trusted library allocation
|
page read and write
|
||
2E5E3040000
|
trusted library allocation
|
page read and write
|
||
1481E0C5000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
2868000
|
trusted library allocation
|
page read and write
|
||
FA484FF000
|
stack
|
page read and write
|
||
EF101BC000
|
stack
|
page read and write
|
||
2DB27767000
|
trusted library allocation
|
page read and write
|
||
2E28000
|
trusted library allocation
|
page read and write
|
||
960000
|
trusted library allocation
|
page read and write
|
||
910FFF000
|
stack
|
page read and write
|
||
2431000
|
trusted library allocation
|
page read and write
|
||
150421EF000
|
heap
|
page read and write
|
||
2D02000
|
trusted library allocation
|
page read and write
|
||
24C9000
|
trusted library allocation
|
page read and write
|
||
1481E20B000
|
direct allocation
|
page read and write
|
||
1C2DF000
|
stack
|
page read and write
|
||
150E000
|
heap
|
page read and write
|
||
13685000
|
trusted library allocation
|
page read and write
|
||
232DF0B6000
|
heap
|
page read and write
|
||
132DF000
|
trusted library allocation
|
page read and write
|
||
66E217C000
|
stack
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
7FFD9BD40000
|
trusted library allocation
|
page read and write
|
||
2B98000
|
trusted library allocation
|
page read and write
|
||
15042238000
|
heap
|
page read and write
|
||
AC372FF000
|
stack
|
page read and write
|
||
157F000
|
stack
|
page read and write
|
||
1D548CB0000
|
trusted library allocation
|
page read and write
|
||
13A32000
|
trusted library allocation
|
page read and write
|
||
230000
|
unkown
|
page readonly
|
||
25BA000
|
trusted library allocation
|
page read and write
|
||
242F000
|
trusted library allocation
|
page read and write
|
||
28F0000
|
heap
|
page execute and read and write
|
||
2DB25690000
|
heap
|
page read and write
|
||
CC7FF4C000
|
stack
|
page read and write
|
||
66E1C79000
|
stack
|
page read and write
|
||
597F77E000
|
stack
|
page read and write
|
||
1D29D720000
|
trusted library allocation
|
page read and write
|
||
1D548D30000
|
heap
|
page read and write
|
||
2933000
|
trusted library allocation
|
page read and write
|
||
13146000
|
trusted library allocation
|
page read and write
|
||
1B7AD000
|
heap
|
page read and write
|
||
C7530FB000
|
stack
|
page read and write
|
||
12E3000
|
heap
|
page read and write
|
||
597FA3E000
|
stack
|
page read and write
|
||
1481E0AD000
|
heap
|
page read and write
|
||
7FFD9B78B000
|
trusted library allocation
|
page execute and read and write
|
||
28AB3EC3000
|
heap
|
page read and write
|
||
13288000
|
trusted library allocation
|
page read and write
|
||
1ABB0000
|
trusted library allocation
|
page read and write
|
||
F7E000
|
stack
|
page read and write
|
||
2A53000
|
trusted library allocation
|
page read and write
|
||
29E3000
|
trusted library allocation
|
page read and write
|
||
FA4897E000
|
stack
|
page read and write
|
||
9364A7E000
|
stack
|
page read and write
|
||
1B5AE000
|
stack
|
page read and write
|
||
236000
|
unkown
|
page readonly
|
||
640000
|
heap
|
page read and write
|
||
26A899CE000
|
heap
|
page read and write
|
||
908000
|
heap
|
page read and write
|
||
2B77000
|
trusted library allocation
|
page read and write
|
||
1D29D6E0000
|
trusted library allocation
|
page read and write
|
||
29B26860000
|
trusted library allocation
|
page read and write
|
||
23792B70000
|
heap
|
page read and write
|
||
29B265C8000
|
heap
|
page read and write
|
||
25A4000
|
trusted library allocation
|
page read and write
|
||
3109000
|
trusted library allocation
|
page read and write
|
||
1D547270000
|
heap
|
page read and write
|
||
180A000
|
heap
|
page read and write
|
||
132E2000
|
trusted library allocation
|
page read and write
|
||
1481E250000
|
direct allocation
|
page read and write
|
||
3249000
|
trusted library allocation
|
page read and write
|
||
2238000
|
unkown
|
page readonly
|
||
22EE7C000
|
stack
|
page read and write
|
||
187847F000
|
stack
|
page read and write
|
||
15043DB5000
|
heap
|
page read and write
|
||
1481E130000
|
heap
|
page read and write
|
||
16F77E000
|
stack
|
page read and write
|
||
26A8B845000
|
heap
|
page read and write
|
||
109A000
|
heap
|
page read and write
|
||
23792C5E000
|
heap
|
page read and write
|
||
7FFD9B919000
|
trusted library allocation
|
page read and write
|
||
2E5E3075000
|
heap
|
page read and write
|
||
26A8B830000
|
heap
|
page read and write
|
||
2AE8000
|
trusted library allocation
|
page read and write
|
||
26A899F4000
|
heap
|
page read and write
|
||
1B9B6000
|
heap
|
page read and write
|
||
232DEA50000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
2D04000
|
trusted library allocation
|
page read and write
|
||
13938000
|
trusted library allocation
|
page read and write
|
||
EA4000
|
heap
|
page read and write
|
||
1B6E0000
|
unkown
|
page readonly
|
||
13F3000
|
heap
|
page read and write
|
||
2593000
|
trusted library allocation
|
page read and write
|
||
F5FEEFF000
|
stack
|
page read and write
|
||
1B9D0000
|
heap
|
page read and write
|
||
BD3000
|
heap
|
page read and write
|
||
232DF46C000
|
trusted library allocation
|
page read and write
|
||
2E5E4DF6000
|
trusted library allocation
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
2E40000
|
trusted library allocation
|
page read and write
|
||
150421FB000
|
heap
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
29DF000
|
trusted library allocation
|
page read and write
|
||
243F000
|
trusted library allocation
|
page read and write
|
||
15044190000
|
heap
|
page read and write
|
||
1D5496CE000
|
trusted library allocation
|
page read and write
|
||
14AC000
|
heap
|
page read and write
|
||
26A898E0000
|
heap
|
page read and write
|
||
14C9000
|
heap
|
page read and write
|
||
2300000
|
unkown
|
page readonly
|
||
66E1B79000
|
stack
|
page read and write
|
||
26A8B430000
|
heap
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
232DF0F2000
|
heap
|
page read and write
|
||
1481E078000
|
heap
|
page read and write
|
||
16F97B000
|
stack
|
page read and write
|
||
1A7C9000
|
heap
|
page read and write
|
||
CC7E9EE000
|
stack
|
page read and write
|
||
FA489FF000
|
stack
|
page read and write
|
||
13D8000
|
heap
|
page read and write
|
||
16EF23000
|
stack
|
page read and write
|
||
13390000
|
trusted library allocation
|
page read and write
|
||
29B268C5000
|
heap
|
page read and write
|
||
29B28440000
|
heap
|
page read and write
|
||
221F3F97000
|
heap
|
page read and write
|
||
820000
|
trusted library allocation
|
page read and write
|
||
232DEF90000
|
trusted library allocation
|
page read and write
|
||
29B266B7000
|
heap
|
page read and write
|
||
1D5491F0000
|
heap
|
page read and write
|
||
1341C000
|
trusted library allocation
|
page read and write
|
||
314A000
|
trusted library allocation
|
page read and write
|
||
1D54734B000
|
heap
|
page read and write
|
||
1465000
|
heap
|
page read and write
|
||
7FFD9BDA0000
|
trusted library allocation
|
page read and write
|
||
133DC000
|
trusted library allocation
|
page read and write
|
||
18780225000
|
trusted library allocation
|
page read and write
|
||
243F000
|
stack
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
33E9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEA0000
|
trusted library allocation
|
page read and write
|
||
20B00A54000
|
trusted library allocation
|
page read and write
|
||
23794C40000
|
trusted library allocation
|
page read and write
|
||
FA48A7D000
|
stack
|
page read and write
|
||
232DD13E000
|
heap
|
page read and write
|
||
66E178E000
|
unkown
|
page read and write
|
||
1580000
|
heap
|
page execute and read and write
|
||
26A8B888000
|
heap
|
page read and write
|
||
21F2000
|
unkown
|
page readonly
|
||
4ABB0FF000
|
unkown
|
page read and write
|
||
2DB25900000
|
trusted library allocation
|
page read and write
|
||
152A000
|
heap
|
page read and write
|
||
169F000
|
stack
|
page read and write
|
||
26A89A60000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
2C91000
|
trusted library allocation
|
page read and write
|
||
2B95000
|
trusted library allocation
|
page read and write
|
||
26A89970000
|
heap
|
page read and write
|
||
1B6AE000
|
stack
|
page read and write
|
||
2DBE000
|
trusted library allocation
|
page read and write
|
||
22E59F000
|
unkown
|
page read and write
|
||
1B7C2000
|
heap
|
page read and write
|
||
7FFD9BEF0000
|
trusted library allocation
|
page read and write
|
||
F98000
|
heap
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
761000
|
heap
|
page read and write
|
||
1481E1F7000
|
direct allocation
|
page read and write
|
||
232DF44B000
|
trusted library allocation
|
page read and write
|
||
2EA8000
|
trusted library allocation
|
page read and write
|
||
1BB523A0000
|
heap
|
page read and write
|
||
AC37679000
|
stack
|
page read and write
|
||
150424C5000
|
heap
|
page read and write
|
||
20399F9F000
|
heap
|
page read and write
|
||
22FC0E000
|
stack
|
page read and write
|
||
1335D000
|
trusted library allocation
|
page read and write
|
||
1B370000
|
unkown
|
page readonly
|
||
23792C44000
|
heap
|
page read and write
|
||
28AB3EC3000
|
heap
|
page read and write
|
||
19AA8535000
|
trusted library allocation
|
page read and write
|
||
9364DFC000
|
stack
|
page read and write
|
||
15043C70000
|
heap
|
page read and write
|
||
15042430000
|
heap
|
page execute and read and write
|
||
1330000
|
heap
|
page execute and read and write
|
||
310D000
|
trusted library allocation
|
page read and write
|
||
AC385CE000
|
stack
|
page read and write
|
||
597F5F6000
|
stack
|
page read and write
|
||
1215000
|
heap
|
page read and write
|
||
24B3000
|
trusted library allocation
|
page read and write
|
||
30A8000
|
trusted library allocation
|
page read and write
|
||
665000
|
heap
|
page read and write
|
||
3393000
|
trusted library allocation
|
page read and write
|
||
1704CC000
|
stack
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
1481E1F0000
|
direct allocation
|
page read and write
|
||
1D29D4D4000
|
heap
|
page read and write
|
||
597F27E000
|
stack
|
page read and write
|
||
16F0000
|
heap
|
page read and write
|
||
2290000
|
heap
|
page execute and read and write
|
||
1369B000
|
trusted library allocation
|
page read and write
|
||
C753D4E000
|
stack
|
page read and write
|
||
15A0000
|
heap
|
page read and write
|
||
FA4887A000
|
stack
|
page read and write
|
||
1481E1B0000
|
direct allocation
|
page read and write
|
||
2A11000
|
trusted library allocation
|
page read and write
|
||
2ADE000
|
stack
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
33EC000
|
trusted library allocation
|
page read and write
|
||
2850000
|
heap
|
page execute and read and write
|
||
26A89AA0000
|
trusted library allocation
|
page read and write
|
||
12BF000
|
heap
|
page read and write
|
||
22EEFE000
|
stack
|
page read and write
|
||
936453F000
|
unkown
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
7FFD9B947000
|
trusted library allocation
|
page read and write
|
||
4ABB1FE000
|
stack
|
page read and write
|
||
23792C3E000
|
heap
|
page read and write
|
||
7FFD9B79B000
|
trusted library allocation
|
page execute and read and write
|
||
15042120000
|
heap
|
page read and write
|
||
F17227F000
|
unkown
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
1481E08A000
|
heap
|
page read and write
|
||
678000
|
heap
|
page read and write
|
||
2F91000
|
trusted library allocation
|
page read and write
|
||
33F3000
|
trusted library allocation
|
page read and write
|
||
232DF402000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
6D5000
|
heap
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
1B9B4000
|
heap
|
page read and write
|
||
232DF3D8000
|
trusted library allocation
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
1349C000
|
trusted library allocation
|
page read and write
|
||
9364E7E000
|
stack
|
page read and write
|
||
12A08000
|
trusted library allocation
|
page read and write
|
||
CC7F077000
|
stack
|
page read and write
|
||
22EDF9000
|
stack
|
page read and write
|
||
1481E038000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
1481E05C000
|
heap
|
page read and write
|
||
13101000
|
trusted library allocation
|
page read and write
|
||
F5FF63C000
|
stack
|
page read and write
|
||
4ABC24E000
|
stack
|
page read and write
|
||
30AD000
|
trusted library allocation
|
page read and write
|
||
302A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
8A0000
|
heap
|
page execute and read and write
|
||
232DD169000
|
heap
|
page read and write
|
||
FA4847F000
|
stack
|
page read and write
|
||
1B550000
|
heap
|
page execute and read and write
|
||
13855000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCF0000
|
trusted library allocation
|
page read and write
|
||
F17293C000
|
stack
|
page read and write
|
||
23792C42000
|
heap
|
page read and write
|
||
93658CE000
|
stack
|
page read and write
|
||
13881000
|
trusted library allocation
|
page read and write
|
||
150423B0000
|
trusted library allocation
|
page read and write
|
||
1D5472D0000
|
trusted library section
|
page read and write
|
||
2DB2576B000
|
heap
|
page read and write
|
||
CC7F17A000
|
stack
|
page read and write
|
||
29C8000
|
trusted library allocation
|
page read and write
|
||
14820A83000
|
direct allocation
|
page read and write
|
||
1481E0B4000
|
heap
|
page read and write
|
||
1BAD0000
|
heap
|
page read and write
|
||
7F3000
|
heap
|
page read and write
|
||
1BB10000
|
heap
|
page read and write
|
||
26A8B2FF000
|
heap
|
page read and write
|
||
22ED7E000
|
stack
|
page read and write
|
||
2A5E000
|
trusted library allocation
|
page read and write
|
||
1B9B0000
|
heap
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
1395D000
|
trusted library allocation
|
page read and write
|
||
597FBBE000
|
stack
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
91B000
|
heap
|
page read and write
|
||
F9C000
|
heap
|
page read and write
|
||
20B004CE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7BC000
|
trusted library allocation
|
page execute and read and write
|
||
326B000
|
trusted library allocation
|
page read and write
|
||
2EE7000
|
trusted library allocation
|
page read and write
|
||
29B26800000
|
heap
|
page read and write
|
||
18784FD000
|
stack
|
page read and write
|
||
132BF000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
AC37579000
|
stack
|
page read and write
|
||
2DB258F0000
|
trusted library section
|
page read and write
|
||
18783FE000
|
stack
|
page read and write
|
||
C75273F000
|
unkown
|
page read and write
|
||
2D2D000
|
trusted library allocation
|
page read and write
|
||
12BC000
|
heap
|
page read and write
|
||
140A000
|
heap
|
page read and write
|
||
2A68000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD20000
|
trusted library allocation
|
page read and write
|
||
2C55000
|
trusted library allocation
|
page read and write
|
||
20399F9F000
|
heap
|
page read and write
|
||
2CA7000
|
trusted library allocation
|
page read and write
|
||
232DEFC0000
|
heap
|
page read and write
|
||
C753B4E000
|
stack
|
page read and write
|
||
133A2000
|
trusted library allocation
|
page read and write
|
||
1B4AE000
|
stack
|
page read and write
|
||
2E5E2D60000
|
heap
|
page read and write
|
||
597F2FF000
|
stack
|
page read and write
|
||
78A000
|
heap
|
page read and write
|
||
1D29F3A9000
|
heap
|
page read and write
|
||
7FFD9B782000
|
trusted library allocation
|
page read and write
|
||
2E5DD8A0000
|
heap
|
page read and write
|
||
FA486FE000
|
stack
|
page read and write
|
||
7FFD9BE68000
|
trusted library allocation
|
page read and write
|
||
2310000
|
unkown
|
page readonly
|
||
1481E07F000
|
heap
|
page read and write
|
||
19AA662D000
|
heap
|
page read and write
|
||
23792F60000
|
trusted library section
|
page read and write
|
||
F1723FA000
|
stack
|
page read and write
|
||
2E5E2DFF000
|
heap
|
page read and write
|
||
2C8F000
|
stack
|
page read and write
|
||
9364D7E000
|
stack
|
page read and write
|
||
7FFD9BED0000
|
trusted library allocation
|
page read and write
|
||
1B08F000
|
stack
|
page read and write
|
||
1481E030000
|
heap
|
page read and write
|
||
2E98000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE70000
|
trusted library allocation
|
page read and write
|
||
232DD120000
|
heap
|
page read and write
|
||
CC7EDFA000
|
stack
|
page read and write
|
||
1481FA40000
|
direct allocation
|
page read and write
|
||
12BA000
|
heap
|
page read and write
|
||
1860000
|
heap
|
page read and write
|
||
BF5000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
118C000
|
heap
|
page read and write
|
||
2C70000
|
trusted library allocation
|
page read and write
|
||
597FAB7000
|
stack
|
page read and write
|
||
12F21000
|
trusted library allocation
|
page read and write
|
||
1175000
|
heap
|
page read and write
|
||
18780001000
|
trusted library allocation
|
page read and write
|
||
4ABB2FF000
|
stack
|
page read and write
|
||
1D29F615000
|
trusted library allocation
|
page read and write
|
||
2421000
|
trusted library allocation
|
page read and write
|
||
22FA0E000
|
stack
|
page read and write
|
||
1450000
|
trusted library allocation
|
page read and write
|
||
60C000
|
heap
|
page read and write
|
||
1481E085000
|
heap
|
page read and write
|
||
7FFD9BDE0000
|
trusted library allocation
|
page read and write
|
||
26A8B916000
|
heap
|
page read and write
|
||
1311B000
|
trusted library allocation
|
page read and write
|
||
26A899B2000
|
heap
|
page read and write
|
||
EE6000
|
heap
|
page read and write
|
||
7FFD9B792000
|
trusted library allocation
|
page read and write
|
||
12E35000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
1481FB20000
|
heap
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
2E5E2E44000
|
heap
|
page read and write
|
||
19AA6691000
|
heap
|
page read and write
|
||
F58017E000
|
stack
|
page read and write
|
||
1C0CE000
|
stack
|
page read and write
|
||
13939000
|
trusted library allocation
|
page read and write
|
||
232DF4AA000
|
trusted library allocation
|
page read and write
|
||
14D2000
|
heap
|
page read and write
|
||
2D33000
|
trusted library allocation
|
page read and write
|
||
EF0FD79000
|
stack
|
page read and write
|
||
1D5473D6000
|
heap
|
page read and write
|
||
22E0000
|
unkown
|
page readonly
|
||
29F2000
|
trusted library allocation
|
page read and write
|
||
4ABADFE000
|
stack
|
page read and write
|
||
766000
|
heap
|
page read and write
|
||
2610000
|
heap
|
page execute and read and write
|
||
FE0000
|
heap
|
page read and write
|
||
13980000
|
trusted library allocation
|
page read and write
|
||
26A897A0000
|
heap
|
page read and write
|
||
1D29F540000
|
trusted library allocation
|
page read and write
|
||
1481E0C5000
|
heap
|
page read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
A00000
|
heap
|
page read and write
|
||
106F000
|
stack
|
page read and write
|
||
F17257E000
|
stack
|
page read and write
|
||
20B00001000
|
trusted library allocation
|
page read and write
|
||
EDE000
|
stack
|
page read and write
|
||
19AA6755000
|
heap
|
page read and write
|
||
2252000
|
unkown
|
page readonly
|
||
15042160000
|
heap
|
page read and write
|
||
7FFD9B798000
|
trusted library allocation
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
232DD12A000
|
heap
|
page read and write
|
||
132CA000
|
trusted library allocation
|
page read and write
|
||
1378F000
|
trusted library allocation
|
page read and write
|
||
29B265C0000
|
heap
|
page read and write
|
||
FA48103000
|
stack
|
page read and write
|
||
1C0DF000
|
stack
|
page read and write
|
||
2EFA000
|
trusted library allocation
|
page read and write
|
||
1BECF000
|
stack
|
page read and write
|
||
13C5000
|
heap
|
page read and write
|
||
2C76000
|
trusted library allocation
|
page read and write
|
||
782000
|
heap
|
page read and write
|
||
136D6000
|
trusted library allocation
|
page read and write
|
||
2A2A000
|
trusted library allocation
|
page read and write
|
||
F1726B6000
|
stack
|
page read and write
|
||
2FD8000
|
trusted library allocation
|
page read and write
|
||
29B265FE000
|
heap
|
page read and write
|
||
29B265FC000
|
heap
|
page read and write
|
||
13978000
|
trusted library allocation
|
page read and write
|
||
F5FF17D000
|
stack
|
page read and write
|
||
29BD000
|
trusted library allocation
|
page read and write
|
||
26A8B9D5000
|
trusted library allocation
|
page read and write
|
||
700000
|
trusted library allocation
|
page read and write
|
||
16F2FE000
|
stack
|
page read and write
|
||
2310000
|
heap
|
page execute and read and write
|
||
2DB25769000
|
heap
|
page read and write
|
||
19AA6610000
|
heap
|
page read and write
|
||
18780A0D000
|
trusted library allocation
|
page read and write
|
||
15044290000
|
heap
|
page execute and read and write
|
||
1242F000
|
trusted library allocation
|
page read and write
|
||
AC36FCE000
|
stack
|
page read and write
|
||
643000
|
heap
|
page read and write
|
||
232DF07D000
|
heap
|
page read and write
|
||
15042234000
|
heap
|
page read and write
|
||
29E2000
|
trusted library allocation
|
page read and write
|
||
232DF46F000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
1635000
|
heap
|
page read and write
|
||
221F41D0000
|
heap
|
page read and write
|
||
13AA8000
|
trusted library allocation
|
page read and write
|
||
1481E07B000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
133D6000
|
trusted library allocation
|
page read and write
|
||
1D29D495000
|
heap
|
page read and write
|
||
30A0000
|
trusted library allocation
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
7FFD9B98A000
|
trusted library allocation
|
page read and write
|
||
CC7F3FB000
|
stack
|
page read and write
|
||
29B26870000
|
heap
|
page readonly
|
||
2E5E2DC0000
|
heap
|
page read and write
|
||
12AE1000
|
trusted library allocation
|
page read and write
|
||
66E1EF8000
|
stack
|
page read and write
|
||
1BCAE000
|
stack
|
page read and write
|
||
F6F000
|
stack
|
page read and write
|
||
2E5DD830000
|
heap
|
page read and write
|
||
9364BFA000
|
stack
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
232DF050000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
7FFD9B816000
|
trusted library allocation
|
page read and write
|
||
EF0FE37000
|
stack
|
page read and write
|
||
2E5E577C000
|
trusted library allocation
|
page read and write
|
||
2AD0000
|
trusted library allocation
|
page read and write
|
||
297B000
|
trusted library allocation
|
page read and write
|
||
1D548CE0000
|
trusted library allocation
|
page read and write
|
||
2F15000
|
trusted library allocation
|
page read and write
|
||
2DB25A05000
|
heap
|
page read and write
|
||
1705CC000
|
stack
|
page read and write
|
||
1481FAC0000
|
direct allocation
|
page read and write
|
||
2F80000
|
heap
|
page execute and read and write
|
||
2E5DD750000
|
heap
|
page read and write
|
||
2D27000
|
trusted library allocation
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
2B84000
|
trusted library allocation
|
page read and write
|
||
31E2000
|
trusted library allocation
|
page read and write
|
||
13D0000
|
heap
|
page execute and read and write
|
||
23792BD0000
|
heap
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
12BB0000
|
trusted library allocation
|
page read and write
|
||
338D000
|
trusted library allocation
|
page read and write
|
||
2272000
|
unkown
|
page readonly
|
||
150441A7000
|
heap
|
page read and write
|
||
2EA1000
|
trusted library allocation
|
page read and write
|
||
CC7EF7D000
|
stack
|
page read and write
|
||
23794C80000
|
heap
|
page execute and read and write
|
||
9FF000
|
stack
|
page read and write
|
||
187924E000
|
stack
|
page read and write
|
||
1481FA8B000
|
direct allocation
|
page read and write
|
||
2AED000
|
trusted library allocation
|
page read and write
|
||
F17237E000
|
stack
|
page read and write
|
||
12D80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B993000
|
trusted library allocation
|
page read and write
|
||
CC7F27E000
|
stack
|
page read and write
|
||
20399F9F000
|
heap
|
page read and write
|
||
13B33000
|
trusted library allocation
|
page read and write
|
||
2E19000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD30000
|
trusted library allocation
|
page read and write
|
||
2DB25930000
|
heap
|
page readonly
|
||
597F379000
|
stack
|
page read and write
|
||
93648F9000
|
stack
|
page read and write
|
||
135C6000
|
trusted library allocation
|
page read and write
|
||
66E2DCE000
|
stack
|
page read and write
|
||
31CD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
13A79000
|
trusted library allocation
|
page read and write
|
||
2E5E2E1D000
|
heap
|
page read and write
|
||
2EF0000
|
trusted library allocation
|
page read and write
|
||
2E22000
|
trusted library allocation
|
page read and write
|
||
1BC60000
|
heap
|
page read and write
|
||
2C76000
|
trusted library allocation
|
page read and write
|
||
16F5000
|
heap
|
page read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
2A6D000
|
trusted library allocation
|
page read and write
|
||
2DB25728000
|
heap
|
page read and write
|
||
14820A85000
|
direct allocation
|
page read and write
|
||
1481E0B7000
|
heap
|
page read and write
|
||
C13000
|
heap
|
page read and write
|
||
12428000
|
trusted library allocation
|
page read and write
|
||
12E27000
|
trusted library allocation
|
page read and write
|
||
1B10D000
|
stack
|
page read and write
|
||
29B28865000
|
trusted library allocation
|
page read and write
|
||
2AAD000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
1B090000
|
trusted library allocation
|
page read and write
|
||
F173507000
|
stack
|
page read and write
|
||
12D30000
|
trusted library allocation
|
page read and write
|
||
152C000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
132C0000
|
trusted library allocation
|
page read and write
|
||
2E5E30E5000
|
heap
|
page read and write
|
||
2987000
|
trusted library allocation
|
page read and write
|
||
22E979000
|
stack
|
page read and write
|
||
1B6C2000
|
unkown
|
page readonly
|
||
66E1AFE000
|
stack
|
page read and write
|
||
9A5000
|
heap
|
page read and write
|
||
9364EFB000
|
stack
|
page read and write
|
||
1B772000
|
unkown
|
page readonly
|
||
1481E0C5000
|
heap
|
page read and write
|
||
2DB276E1000
|
trusted library allocation
|
page read and write
|
||
1481E07F000
|
heap
|
page read and write
|
||
3161000
|
trusted library allocation
|
page read and write
|
||
2D30000
|
trusted library allocation
|
page read and write
|
||
15C0000
|
heap
|
page read and write
|
||
1878FCE000
|
stack
|
page read and write
|
||
C752C7D000
|
stack
|
page read and write
|
||
CC7EE7F000
|
stack
|
page read and write
|
||
7FFD9BE72000
|
trusted library allocation
|
page read and write
|
||
12D93000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A4000
|
trusted library allocation
|
page read and write
|
||
1312D000
|
trusted library allocation
|
page read and write
|
||
15C0000
|
heap
|
page read and write
|
||
F17358C000
|
stack
|
page read and write
|
||
15044289000
|
heap
|
page read and write
|
||
26A899BC000
|
heap
|
page read and write
|
||
F1728B8000
|
stack
|
page read and write
|
||
29D1000
|
trusted library allocation
|
page read and write
|
||
12D71000
|
trusted library allocation
|
page read and write
|
||
26A899B4000
|
heap
|
page read and write
|
||
26A899B6000
|
heap
|
page read and write
|
||
22E0000
|
unkown
|
page readonly
|
||
2DB25710000
|
trusted library section
|
page read and write
|
||
139AC000
|
trusted library allocation
|
page read and write
|
||
CC7EC7E000
|
unkown
|
page read and write
|
||
18785FB000
|
stack
|
page read and write
|
||
FA48B7B000
|
stack
|
page read and write
|
||
150442E1000
|
trusted library allocation
|
page read and write
|
||
2C8A000
|
trusted library allocation
|
page read and write
|
||
18780BAE000
|
trusted library allocation
|
page read and write
|
||
66B000
|
heap
|
page read and write
|
||
16F4FD000
|
stack
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
66E207C000
|
stack
|
page read and write
|
||
2E5DD8D0000
|
heap
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
2E5E4D7E000
|
trusted library allocation
|
page read and write
|
||
2DBA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B936000
|
trusted library allocation
|
page read and write
|
||
2D81000
|
trusted library allocation
|
page read and write
|
||
2AB7000
|
trusted library allocation
|
page read and write
|
||
2B7E000
|
trusted library allocation
|
page read and write
|
||
EF10B8E000
|
stack
|
page read and write
|
||
134DF000
|
trusted library allocation
|
page read and write
|
||
2EF8000
|
trusted library allocation
|
page read and write
|
||
312F000
|
trusted library allocation
|
page read and write
|
||
1D29D560000
|
heap
|
page read and write
|
||
66E2CCD000
|
stack
|
page read and write
|
||
7FFD9BDC0000
|
trusted library allocation
|
page read and write
|
||
17D00225000
|
trusted library allocation
|
page read and write
|
||
2E5DD8D0000
|
heap
|
page read and write
|
||
F68000
|
heap
|
page read and write
|
||
232DD095000
|
heap
|
page read and write
|
||
D05000
|
heap
|
page read and write
|
||
2E5E2E48000
|
heap
|
page read and write
|
||
7FFD9B83C000
|
trusted library allocation
|
page execute and read and write
|
||
29B2904B000
|
trusted library allocation
|
page read and write
|
||
1312F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEC0000
|
trusted library allocation
|
page read and write
|
||
12E2000
|
stack
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
29B283B0000
|
trusted library allocation
|
page read and write
|
||
390000
|
heap
|
page read and write
|
||
26A89880000
|
heap
|
page read and write
|
||
2260000
|
heap
|
page read and write
|
||
EF10D8C000
|
stack
|
page read and write
|
||
1B6F0000
|
unkown
|
page readonly
|
||
9D0000
|
heap
|
page read and write
|
||
7FFD9B97A000
|
trusted library allocation
|
page read and write
|
||
232DD0E0000
|
heap
|
page read and write
|
||
132BD000
|
trusted library allocation
|
page read and write
|
||
CC7EEF7000
|
stack
|
page read and write
|
||
13060000
|
trusted library allocation
|
page read and write
|
||
2320000
|
heap
|
page read and write
|
||
138D5000
|
trusted library allocation
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
1D29F580000
|
heap
|
page read and write
|
||
E48000
|
heap
|
page read and write
|
||
13657000
|
trusted library allocation
|
page read and write
|
||
2E5DD850000
|
heap
|
page read and write
|
||
CC7FE4E000
|
stack
|
page read and write
|
||
26A899F6000
|
heap
|
page read and write
|
||
7FFD9B94D000
|
trusted library allocation
|
page read and write
|
||
2DB257A4000
|
heap
|
page read and write
|
||
F58027C000
|
stack
|
page read and write
|
||
1B4CD000
|
stack
|
page read and write
|
||
23794600000
|
trusted library allocation
|
page read and write
|
||
1B1CA000
|
heap
|
page read and write
|
||
1363F000
|
trusted library allocation
|
page read and write
|
||
66E20FE000
|
stack
|
page read and write
|
||
15C5000
|
heap
|
page read and write
|
||
232DD0F2000
|
heap
|
page read and write
|
||
2E5E4BDD000
|
heap
|
page read and write
|
||
597EFCE000
|
stack
|
page read and write
|
||
7FFD9BDD0000
|
trusted library allocation
|
page read and write
|
||
2E9D000
|
trusted library allocation
|
page read and write
|
||
A5E000
|
stack
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
12A0000
|
trusted library allocation
|
page read and write
|
||
22C2000
|
unkown
|
page readonly
|
||
18781F9000
|
stack
|
page read and write
|
||
13663000
|
trusted library allocation
|
page read and write
|
||
2E5E2E03000
|
heap
|
page read and write
|
||
4ABC3CD000
|
stack
|
page read and write
|
||
237945C0000
|
heap
|
page readonly
|
||
BEA000
|
heap
|
page read and write
|
||
1BE64000
|
heap
|
page read and write
|
||
15AA000
|
heap
|
page read and write
|
||
2A2A000
|
trusted library allocation
|
page read and write
|
||
22EBF7000
|
stack
|
page read and write
|
||
CC7F37E000
|
stack
|
page read and write
|
||
232DD128000
|
heap
|
page read and write
|
||
13507000
|
trusted library allocation
|
page read and write
|
||
29B2661C000
|
heap
|
page read and write
|
||
3254000
|
trusted library allocation
|
page read and write
|
||
1504220D000
|
heap
|
page read and write
|
||
EF0FF3E000
|
stack
|
page read and write
|
||
2328000
|
unkown
|
page readonly
|
||
9364C7A000
|
stack
|
page read and write
|
||
1D29D48D000
|
heap
|
page read and write
|
||
1B6B2000
|
unkown
|
page readonly
|
||
2E5E2FF0000
|
trusted library allocation
|
page read and write
|
||
306F000
|
trusted library allocation
|
page read and write
|
||
C752BF9000
|
stack
|
page read and write
|
||
1877EFF000
|
stack
|
page read and write
|
||
1481FA80000
|
direct allocation
|
page read and write
|
||
20399F96000
|
heap
|
page read and write
|
||
29EB000
|
trusted library allocation
|
page read and write
|
||
CC0000
|
trusted library allocation
|
page read and write
|
||
1334F000
|
trusted library allocation
|
page read and write
|
||
2C3C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
16F8FE000
|
stack
|
page read and write
|
||
3075000
|
trusted library allocation
|
page read and write
|
||
95E000
|
stack
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
4ABC44C000
|
stack
|
page read and write
|
||
1D547339000
|
heap
|
page read and write
|
||
19AA8340000
|
heap
|
page execute and read and write
|
||
B41000
|
stack
|
page read and write
|
||
93A000
|
heap
|
page read and write
|
||
CC7ED7E000
|
stack
|
page read and write
|
||
232DF498000
|
trusted library allocation
|
page read and write
|
||
AC37477000
|
stack
|
page read and write
|
||
1D29D700000
|
trusted library allocation
|
page read and write
|
||
1BAED000
|
stack
|
page read and write
|
||
23792BF0000
|
trusted library section
|
page read and write
|
||
2C59000
|
trusted library allocation
|
page read and write
|
||
2E5DD8D1000
|
heap
|
page read and write
|
||
66E2D4C000
|
stack
|
page read and write
|
||
1AE70000
|
heap
|
page read and write
|
||
2E1D000
|
trusted library allocation
|
page read and write
|
||
1D547377000
|
heap
|
page read and write
|
||
3155000
|
trusted library allocation
|
page read and write
|
||
33EF000
|
trusted library allocation
|
page read and write
|
||
12DA4000
|
trusted library allocation
|
page read and write
|
||
25C0000
|
heap
|
page read and write
|
||
26A89910000
|
trusted library section
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
2B7A000
|
trusted library allocation
|
page read and write
|
||
3390000
|
trusted library allocation
|
page read and write
|
||
20399FAF000
|
heap
|
page read and write
|
||
232DD0A0000
|
heap
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
2E5E2FB0000
|
heap
|
page execute and read and write
|
||
2F1E000
|
stack
|
page read and write
|
||
2212000
|
unkown
|
page readonly
|
||
CC0007C000
|
stack
|
page read and write
|
||
232DF0FA000
|
heap
|
page read and write
|
||
11DF000
|
stack
|
page read and write
|
||
1509000
|
heap
|
page read and write
|
||
2D85000
|
trusted library allocation
|
page read and write
|
||
1507000
|
heap
|
page read and write
|
||
1598000
|
heap
|
page read and write
|
||
2B8A000
|
trusted library allocation
|
page read and write
|
||
1D29D4D8000
|
heap
|
page read and write
|
||
13346000
|
trusted library allocation
|
page read and write
|
||
3208000
|
trusted library allocation
|
page read and write
|
||
232DD0FE000
|
heap
|
page read and write
|
||
28FB000
|
trusted library allocation
|
page read and write
|
||
2964000
|
trusted library allocation
|
page read and write
|
||
1481E05C000
|
heap
|
page read and write
|
||
1BE60000
|
heap
|
page read and write
|
||
23792B90000
|
heap
|
page read and write
|
||
23794680000
|
heap
|
page read and write
|
||
1540000
|
trusted library allocation
|
page read and write
|
||
15042390000
|
trusted library allocation
|
page read and write
|
||
2DB25940000
|
trusted library allocation
|
page read and write
|
||
302F000
|
trusted library allocation
|
page read and write
|
||
232DEDF0000
|
trusted library allocation
|
page read and write
|
||
9365A4D000
|
stack
|
page read and write
|
||
22E87F000
|
stack
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
23792B60000
|
heap
|
page read and write
|
||
E65000
|
heap
|
page read and write
|
||
1336F000
|
trusted library allocation
|
page read and write
|
||
2E03000
|
trusted library allocation
|
page read and write
|
||
137D9000
|
trusted library allocation
|
page read and write
|
||
23794BF0000
|
heap
|
page execute and read and write
|
||
8F0000
|
heap
|
page read and write
|
||
A90000
|
trusted library allocation
|
page read and write
|
||
9365ACC000
|
stack
|
page read and write
|
||
EF10E0E000
|
stack
|
page read and write
|
||
1D54732B000
|
heap
|
page read and write
|
||
1B6D0000
|
unkown
|
page readonly
|
||
26A89B45000
|
heap
|
page read and write
|
||
EF0FDBE000
|
stack
|
page read and write
|
||
BEC000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
7FFD9B816000
|
trusted library allocation
|
page read and write
|
||
232DF4AC000
|
trusted library allocation
|
page read and write
|
||
134F000
|
stack
|
page read and write
|
||
187857E000
|
stack
|
page read and write
|
||
1D549287000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page execute and read and write
|
||
2DB27310000
|
heap
|
page read and write
|
||
9364AF9000
|
stack
|
page read and write
|
||
12A0F000
|
trusted library allocation
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
F58037E000
|
stack
|
page read and write
|
||
232DF09A000
|
heap
|
page read and write
|
||
22B0000
|
unkown
|
page readonly
|
||
AC3834E000
|
stack
|
page read and write
|
||
2BA4000
|
trusted library allocation
|
page read and write
|
||
323D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B99E000
|
trusted library allocation
|
page read and write
|
||
12441000
|
trusted library allocation
|
page read and write
|
||
12D91000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
29B26890000
|
heap
|
page read and write
|
||
26A1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
EF0FA7F000
|
stack
|
page read and write
|
||
17FF000
|
stack
|
page read and write
|
||
4ABB578000
|
stack
|
page read and write
|
||
1D548D35000
|
heap
|
page read and write
|
||
CC7F1FE000
|
stack
|
page read and write
|
||
66E17CE000
|
stack
|
page read and write
|
||
17054C000
|
stack
|
page read and write
|
||
7FFD9BD50000
|
trusted library allocation
|
page read and write
|
||
2D2A000
|
trusted library allocation
|
page read and write
|
||
66D000
|
heap
|
page read and write
|
||
1D5472E0000
|
trusted library section
|
page read and write
|
||
16F479000
|
stack
|
page read and write
|
||
AC38449000
|
stack
|
page read and write
|
||
597FB3C000
|
stack
|
page read and write
|
||
1BB521D0000
|
heap
|
page read and write
|
||
597F6FB000
|
stack
|
page read and write
|
||
12501000
|
trusted library allocation
|
page read and write
|
||
23792C86000
|
heap
|
page read and write
|
||
2EF2000
|
trusted library allocation
|
page read and write
|
||
3013000
|
trusted library allocation
|
page read and write
|
||
1327D000
|
trusted library allocation
|
page read and write
|
||
2E5E2CF0000
|
heap
|
page read and write
|
||
BE8000
|
heap
|
page read and write
|
||
232DEE00000
|
heap
|
page readonly
|
||
22EA79000
|
stack
|
page read and write
|
||
1481E09D000
|
heap
|
page read and write
|
||
13742000
|
trusted library allocation
|
page read and write
|
||
1C020000
|
heap
|
page read and write
|
||
2D3D000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
22FB0D000
|
stack
|
page read and write
|
||
1D29EFA0000
|
trusted library allocation
|
page read and write
|
||
D55000
|
heap
|
page read and write
|
||
2CA1000
|
trusted library allocation
|
page read and write
|
||
26B1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
1C6FE000
|
stack
|
page read and write
|
||
C753ACE000
|
stack
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
14B0000
|
trusted library allocation
|
page read and write
|
||
2B48000
|
trusted library allocation
|
page read and write
|
||
BD5000
|
heap
|
page read and write
|
||
1381B000
|
trusted library allocation
|
page read and write
|
||
1334B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
29E1000
|
trusted library allocation
|
page read and write
|
||
26A8B940000
|
heap
|
page execute and read and write
|
||
7FFD9BCC0000
|
trusted library allocation
|
page execute and read and write
|
||
F172A3B000
|
stack
|
page read and write
|
||
29B265DD000
|
heap
|
page read and write
|
||
2D7F000
|
trusted library allocation
|
page read and write
|
||
13359000
|
trusted library allocation
|
page read and write
|
||
1D549428000
|
trusted library allocation
|
page read and write
|
||
7FFD9B975000
|
trusted library allocation
|
page read and write
|
||
2B600050000
|
heap
|
page readonly
|
||
EA6000
|
heap
|
page read and write
|
||
1D29F055000
|
heap
|
page read and write
|
||
1BB521C0000
|
heap
|
page read and write
|
||
3121000
|
trusted library allocation
|
page read and write
|
||
15044507000
|
trusted library allocation
|
page read and write
|
||
2DB259B0000
|
trusted library allocation
|
page read and write
|
||
1306B000
|
trusted library allocation
|
page read and write
|
||
22F94E000
|
stack
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
2224000
|
unkown
|
page readonly
|
||
F171FE3000
|
stack
|
page read and write
|
||
78D000
|
heap
|
page read and write
|
||
1481E290000
|
heap
|
page read and write
|
||
2A18000
|
trusted library allocation
|
page read and write
|
||
D60000
|
trusted library allocation
|
page read and write
|
||
29B268C0000
|
heap
|
page read and write
|
||
1877BDE000
|
stack
|
page read and write
|
||
26A8B865000
|
heap
|
page read and write
|
||
AC378FF000
|
stack
|
page read and write
|
||
AC374FD000
|
stack
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
29B26880000
|
trusted library allocation
|
page read and write
|
||
14A6000
|
heap
|
page read and write
|
||
66E1FFE000
|
stack
|
page read and write
|
||
12EA000
|
heap
|
page read and write
|
||
1BE80000
|
heap
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
1B6B0000
|
unkown
|
page readonly
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
232DF160000
|
heap
|
page execute and read and write
|
||
1504422B000
|
heap
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
C752CF9000
|
stack
|
page read and write
|
||
2EFA000
|
heap
|
page read and write
|
||
1BC40000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
AC3727F000
|
stack
|
page read and write
|
||
C752F7A000
|
stack
|
page read and write
|
||
2202000
|
unkown
|
page readonly
|
||
1306F000
|
trusted library allocation
|
page read and write
|
||
16EFAD000
|
unkown
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
1270000
|
trusted library allocation
|
page read and write
|
||
26A89A70000
|
trusted library allocation
|
page read and write
|
||
232DD124000
|
heap
|
page read and write
|
||
2DB256F0000
|
heap
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
31E0000
|
trusted library allocation
|
page read and write
|
||
13815000
|
trusted library allocation
|
page read and write
|
||
F5FEF7E000
|
stack
|
page read and write
|
||
1481FAA0000
|
direct allocation
|
page read and write
|
||
16F27F000
|
stack
|
page read and write
|
||
2C93000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF43F540000
|
trusted library allocation
|
page execute and read and write
|
||
26A8B475000
|
heap
|
page read and write
|
||
2548000
|
trusted library allocation
|
page read and write
|
||
26A89B40000
|
heap
|
page read and write
|
||
CC7F0F8000
|
stack
|
page read and write
|
||
3264000
|
trusted library allocation
|
page read and write
|
||
1D549201000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
1B6F2000
|
unkown
|
page readonly
|
||
4ABC2CE000
|
stack
|
page read and write
|
||
1B6D2000
|
unkown
|
page readonly
|
||
1C5EB000
|
stack
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
19AA82F0000
|
trusted library allocation
|
page read and write
|
||
29F7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
12E51000
|
trusted library allocation
|
page read and write
|
||
22C0000
|
unkown
|
page readonly
|
||
D61000
|
stack
|
page read and write
|
||
221F3F90000
|
heap
|
page read and write
|
||
12DC9000
|
trusted library allocation
|
page read and write
|
||
22EAFD000
|
stack
|
page read and write
|
||
232DD105000
|
heap
|
page read and write
|
||
C7526B3000
|
stack
|
page read and write
|
||
1D29F020000
|
heap
|
page execute and read and write
|
||
2CDF000
|
trusted library allocation
|
page read and write
|
||
13236000
|
trusted library allocation
|
page read and write
|
||
2E5E2DC8000
|
heap
|
page read and write
|
||
17D00001000
|
trusted library allocation
|
page read and write
|
||
13A80000
|
trusted library allocation
|
page read and write
|
||
15044180000
|
heap
|
page execute and read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
1D29EF70000
|
trusted library allocation
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
2CE3000
|
trusted library allocation
|
page read and write
|
||
130AC000
|
trusted library allocation
|
page read and write
|
||
4ABC4CE000
|
stack
|
page read and write
|
||
1D547695000
|
heap
|
page read and write
|
||
AAF000
|
stack
|
page read and write
|
||
26A89978000
|
heap
|
page read and write
|
||
19AA664F000
|
heap
|
page read and write
|
||
232DEE10000
|
trusted library allocation
|
page read and write
|
||
E7D000
|
heap
|
page read and write
|
||
2BBA000
|
heap
|
page read and write
|
||
66E2BCD000
|
stack
|
page read and write
|
||
2595000
|
trusted library allocation
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
AC384CC000
|
stack
|
page read and write
|
||
597F7FE000
|
stack
|
page read and write
|
||
3071000
|
trusted library allocation
|
page read and write
|
||
24CD000
|
trusted library allocation
|
page read and write
|
||
F55000
|
heap
|
page read and write
|
||
7FFD9B98F000
|
trusted library allocation
|
page read and write
|
||
26A8B90E000
|
heap
|
page read and write
|
||
7FFD9BCD0000
|
trusted library allocation
|
page read and write
|
||
237945D0000
|
trusted library allocation
|
page read and write
|
||
1481E059000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
13905000
|
trusted library allocation
|
page read and write
|
||
3061000
|
trusted library allocation
|
page read and write
|
||
AE2000
|
stack
|
page read and write
|
||
19AA7F30000
|
heap
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
7FFD9B971000
|
trusted library allocation
|
page read and write
|
||
20399F9F000
|
heap
|
page read and write
|
||
4ABB67F000
|
stack
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
1481E07A000
|
heap
|
page read and write
|
||
16F67E000
|
stack
|
page read and write
|
||
29C0000
|
heap
|
page read and write
|
||
2DB256B0000
|
heap
|
page read and write
|
||
3131000
|
trusted library allocation
|
page read and write
|
||
1B3A0000
|
heap
|
page execute and read and write
|
||
31FA000
|
trusted library allocation
|
page read and write
|
||
1B372000
|
unkown
|
page readonly
|
||
C753C4E000
|
stack
|
page read and write
|
||
150421B8000
|
heap
|
page read and write
|
||
14820A80000
|
direct allocation
|
page read and write
|
||
122F000
|
stack
|
page read and write
|
||
FC5000
|
heap
|
page read and write
|
||
310D000
|
stack
|
page read and write
|
||
2D8C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78B000
|
trusted library allocation
|
page execute and read and write
|
||
CAF000
|
stack
|
page read and write
|
||
2A57000
|
trusted library allocation
|
page read and write
|
||
19AA6659000
|
heap
|
page read and write
|
||
4ABB6FF000
|
stack
|
page read and write
|
||
1331C000
|
trusted library allocation
|
page read and write
|
||
29B283E0000
|
trusted library allocation
|
page read and write
|
||
1878276000
|
stack
|
page read and write
|
||
FA495CE000
|
stack
|
page read and write
|
||
1398F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7DC000
|
trusted library allocation
|
page execute and read and write
|
||
1B29C000
|
heap
|
page read and write
|
||
4ABC347000
|
stack
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
1AF30000
|
trusted library allocation
|
page read and write
|
||
13061000
|
trusted library allocation
|
page read and write
|
||
1B5ED000
|
stack
|
page read and write
|
||
232DD0E8000
|
heap
|
page read and write
|
||
13128000
|
trusted library allocation
|
page read and write
|
||
29B286C5000
|
trusted library allocation
|
page read and write
|
||
1BBBB000
|
stack
|
page read and write
|
||
232DD1D0000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
F5801F7000
|
stack
|
page read and write
|
||
232DD165000
|
heap
|
page read and write
|
||
2E5E4F96000
|
trusted library allocation
|
page read and write
|
||
232DF07F000
|
heap
|
page read and write
|
||
29CA000
|
heap
|
page read and write
|
||
BB8000
|
heap
|
page read and write
|
||
2EB1000
|
trusted library allocation
|
page read and write
|
||
2477000
|
trusted library allocation
|
page read and write
|
||
2270000
|
unkown
|
page readonly
|
||
232DD050000
|
heap
|
page read and write
|
||
23794640000
|
trusted library allocation
|
page read and write
|
||
138AE000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
2240000
|
unkown
|
page readonly
|
||
1B910000
|
heap
|
page read and write
|
||
3152000
|
trusted library allocation
|
page read and write
|
||
2DC7000
|
trusted library allocation
|
page read and write
|
||
1481E08A000
|
heap
|
page read and write
|
||
1481E150000
|
heap
|
page read and write
|
||
2250000
|
unkown
|
page readonly
|
||
1481E1D9000
|
direct allocation
|
page read and write
|
||
2312000
|
unkown
|
page readonly
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
9C0000
|
heap
|
page read and write
|
||
1515000
|
heap
|
page read and write
|
||
29B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B782000
|
trusted library allocation
|
page read and write
|
||
232DF040000
|
heap
|
page execute and read and write
|
||
19AA8280000
|
trusted library allocation
|
page read and write
|
||
F5FF07E000
|
stack
|
page read and write
|
||
19AA664B000
|
heap
|
page read and write
|
||
2DB25680000
|
heap
|
page read and write
|
||
26A8BB78000
|
trusted library allocation
|
page read and write
|
||
66E1DF7000
|
stack
|
page read and write
|
||
29DC000
|
trusted library allocation
|
page read and write
|
||
9C8F0EC000
|
stack
|
page read and write
|
||
1B9AD000
|
stack
|
page read and write
|
||
2280000
|
heap
|
page execute and read and write
|
||
1D548D20000
|
trusted library allocation
|
page read and write
|
||
13438000
|
trusted library allocation
|
page read and write
|
||
2857000
|
trusted library allocation
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
66E1E79000
|
stack
|
page read and write
|
||
2E5E2E09000
|
heap
|
page read and write
|
||
19AA6618000
|
heap
|
page read and write
|
||
FA496CD000
|
stack
|
page read and write
|
||
30B7000
|
trusted library allocation
|
page read and write
|
||
13525000
|
trusted library allocation
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
1481E06B000
|
heap
|
page read and write
|
||
150447AE000
|
trusted library allocation
|
page read and write
|
||
1B710000
|
unkown
|
page readonly
|
||
15044267000
|
heap
|
page read and write
|
||
2F01000
|
trusted library allocation
|
page read and write
|
||
1BFD0000
|
heap
|
page execute and read and write
|
||
150423E0000
|
trusted library allocation
|
page read and write
|
||
29B28630000
|
heap
|
page execute and read and write
|
||
2D4D000
|
trusted library allocation
|
page read and write
|
||
66E1CFE000
|
stack
|
page read and write
|
||
1D29F050000
|
heap
|
page read and write
|
||
96E000
|
stack
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
29B28641000
|
trusted library allocation
|
page read and write
|
||
3110000
|
heap
|
page execute and read and write
|
||
F17263E000
|
stack
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
150421F5000
|
heap
|
page read and write
|
||
294D000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
23792C00000
|
heap
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
F5FEBE3000
|
stack
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
13735000
|
trusted library allocation
|
page read and write
|
||
339D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
F58003E000
|
stack
|
page read and write
|
||
1481E0B0000
|
heap
|
page read and write
|
||
232DF445000
|
trusted library allocation
|
page read and write
|
||
2E5DD8AA000
|
heap
|
page read and write
|
||
C752D77000
|
stack
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
606000
|
heap
|
page read and write
|
||
126F9000
|
trusted library allocation
|
page read and write
|
||
F6F000
|
stack
|
page read and write
|
||
1D549120000
|
heap
|
page execute and read and write
|
||
FA48AFE000
|
stack
|
page read and write
|
||
1595000
|
heap
|
page read and write
|
||
25A0000
|
trusted library allocation
|
page read and write
|
||
597F67A000
|
stack
|
page read and write
|
||
66E2C47000
|
stack
|
page read and write
|
||
2435000
|
trusted library allocation
|
page read and write
|
||
1BB521D9000
|
heap
|
page read and write
|
||
1481E07F000
|
heap
|
page read and write
|
||
1481E067000
|
heap
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
7BF5F0C000
|
stack
|
page read and write
|
||
E7B000
|
heap
|
page read and write
|
||
7FFD9B772000
|
trusted library allocation
|
page read and write
|
||
19AA835D000
|
heap
|
page read and write
|
||
AA5000
|
heap
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
FE004FF000
|
unkown
|
page read and write
|
||
1A9CA000
|
stack
|
page read and write
|
||
1481FA9F000
|
direct allocation
|
page read and write
|
||
31D5000
|
trusted library allocation
|
page read and write
|
||
2210000
|
unkown
|
page readonly
|
||
130FF000
|
trusted library allocation
|
page read and write
|
||
14CC000
|
heap
|
page read and write
|
||
79D000
|
heap
|
page read and write
|
||
1AE0D000
|
stack
|
page read and write
|
||
313F000
|
trusted library allocation
|
page read and write
|
||
1D29D6D0000
|
trusted library section
|
page read and write
|
||
26A89920000
|
trusted library allocation
|
page read and write
|
||
1D29D4AD000
|
heap
|
page read and write
|
||
7FFD9BA82000
|
trusted library allocation
|
page read and write
|
||
597F8FE000
|
stack
|
page read and write
|
||
12D7F000
|
trusted library allocation
|
page read and write
|
||
2E5E2D20000
|
heap
|
page read and write
|
||
232DEE40000
|
trusted library allocation
|
page read and write
|
||
2E5E4D71000
|
trusted library allocation
|
page read and write
|
||
1481E0B0000
|
heap
|
page read and write
|
||
1D5472B0000
|
heap
|
page read and write
|
||
1481E06A000
|
heap
|
page read and write
|
||
2B600121000
|
trusted library allocation
|
page read and write
|
||
F17348E000
|
stack
|
page read and write
|
||
F5800FE000
|
stack
|
page read and write
|
||
12C61000
|
trusted library allocation
|
page read and write
|
||
2290000
|
heap
|
page read and write
|
||
268B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B778000
|
trusted library allocation
|
page read and write
|
||
18780FB000
|
stack
|
page read and write
|
||
31E9000
|
trusted library allocation
|
page read and write
|
||
EF1013E000
|
stack
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
2674000
|
trusted library allocation
|
page read and write
|
||
7FFD9B91C000
|
trusted library allocation
|
page read and write
|
||
232DF4EC000
|
trusted library allocation
|
page read and write
|
||
F5FF2B6000
|
stack
|
page read and write
|
||
2CFB000
|
trusted library allocation
|
page read and write
|
||
2B17000
|
trusted library allocation
|
page read and write
|
||
2997000
|
trusted library allocation
|
page read and write
|
||
936487E000
|
stack
|
page read and write
|
||
22EB79000
|
stack
|
page read and write
|
||
7FFD9BD10000
|
trusted library allocation
|
page read and write
|
||
138F9000
|
trusted library allocation
|
page read and write
|
||
131A5000
|
trusted library allocation
|
page read and write
|
||
23792C4A000
|
heap
|
page read and write
|
||
597EF03000
|
stack
|
page read and write
|
||
93659C9000
|
stack
|
page read and write
|
||
1B8F0000
|
heap
|
page read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
187904E000
|
stack
|
page read and write
|
||
76C000
|
heap
|
page read and write
|
||
3135000
|
trusted library allocation
|
page read and write
|
||
1B930000
|
heap
|
page read and write
|
||
966000
|
heap
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
1173000
|
heap
|
page read and write
|
||
2DB271B7000
|
heap
|
page read and write
|
||
16F5F6000
|
stack
|
page read and write
|
||
29B26647000
|
heap
|
page read and write
|
||
150441CC000
|
heap
|
page read and write
|
||
2DB25A00000
|
heap
|
page read and write
|
||
13839000
|
trusted library allocation
|
page read and write
|
||
136A6000
|
trusted library allocation
|
page read and write
|
||
2CE5000
|
trusted library allocation
|
page read and write
|
||
232A000
|
heap
|
page read and write
|
||
135B7000
|
trusted library allocation
|
page read and write
|
||
16EFEE000
|
stack
|
page read and write
|
||
18780BC0000
|
trusted library allocation
|
page read and write
|
||
139E2000
|
trusted library allocation
|
page read and write
|
||
29B266A4000
|
heap
|
page read and write
|
||
EF10C0E000
|
stack
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
910BF5000
|
stack
|
page read and write
|
||
15042100000
|
heap
|
page read and write
|
||
7FFD9B778000
|
trusted library allocation
|
page read and write
|
||
26A8B900000
|
heap
|
page read and write
|
||
13171000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
C753CCC000
|
stack
|
page read and write
|
||
F5FEFF9000
|
stack
|
page read and write
|
||
7FFD9BD70000
|
trusted library allocation
|
page read and write
|
||
7FFD9B82C000
|
trusted library allocation
|
page execute and read and write
|
||
2E5E2DA0000
|
trusted library allocation
|
page read and write
|
||
16F6FA000
|
stack
|
page read and write
|
||
EF0FB79000
|
stack
|
page read and write
|
||
F5FF4BF000
|
stack
|
page read and write
|
||
2EB4000
|
trusted library allocation
|
page read and write
|
||
1B914000
|
heap
|
page read and write
|
||
2E5DD9A0000
|
heap
|
page read and write
|
||
29B26643000
|
heap
|
page read and write
|
||
26A8B470000
|
heap
|
page read and write
|
||
AC377FE000
|
stack
|
page read and write
|
||
232DEA80000
|
heap
|
page read and write
|
||
1481E230000
|
heap
|
page read and write
|
||
2C60000
|
heap
|
page execute and read and write
|
||
1C4EE000
|
stack
|
page read and write
|
||
725000
|
heap
|
page read and write
|
||
12511000
|
trusted library allocation
|
page read and write
|
||
338A000
|
trusted library allocation
|
page read and write
|
||
1250000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
26A8B8D3000
|
heap
|
page read and write
|
||
2D71000
|
trusted library allocation
|
page read and write
|
||
2E5E30E0000
|
heap
|
page read and write
|
||
1D547335000
|
heap
|
page read and write
|
||
13121000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
26A8B962000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
19AA6710000
|
heap
|
page read and write
|
||
132A6000
|
trusted library allocation
|
page read and write
|
||
29A0000
|
heap
|
page execute and read and write
|
||
7D0000
|
heap
|
page read and write
|
||
2CF3000
|
trusted library allocation
|
page read and write
|
||
2B76000
|
trusted library allocation
|
page read and write
|
||
F17340E000
|
stack
|
page read and write
|
||
69E000
|
heap
|
page read and write
|
||
FA4867B000
|
stack
|
page read and write
|
||
13F5000
|
heap
|
page read and write
|
||
12D82000
|
trusted library allocation
|
page read and write
|
||
301A000
|
trusted library allocation
|
page read and write
|
||
2B82000
|
trusted library allocation
|
page read and write
|
||
242E000
|
stack
|
page read and write
|
||
7C9000
|
heap
|
page read and write
|
||
13103000
|
trusted library allocation
|
page read and write
|
||
1D29D6A0000
|
heap
|
page read and write
|
||
22E9FF000
|
stack
|
page read and write
|
||
4ABB279000
|
stack
|
page read and write
|
||
12D7B000
|
trusted library allocation
|
page read and write
|
||
1433000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
1B6C0000
|
unkown
|
page readonly
|
||
7FFD9B937000
|
trusted library allocation
|
page read and write
|
||
15044187000
|
heap
|
page execute and read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page execute and read and write
|
||
12431000
|
trusted library allocation
|
page read and write
|
||
20399F9F000
|
heap
|
page read and write
|
||
19AA7F00000
|
heap
|
page read and write
|
||
187837A000
|
stack
|
page read and write
|
||
4ABB479000
|
stack
|
page read and write
|
||
309A000
|
trusted library allocation
|
page read and write
|
||
2664000
|
trusted library allocation
|
page read and write
|
||
19AA66F2000
|
heap
|
page read and write
|
||
18780085000
|
trusted library allocation
|
page read and write
|
||
12BA1000
|
trusted library allocation
|
page read and write
|
||
1188000
|
heap
|
page read and write
|
||
31C9000
|
trusted library allocation
|
page read and write
|
||
EF10D0E000
|
stack
|
page read and write
|
||
221F3DB0000
|
heap
|
page read and write
|
||
3248000
|
trusted library allocation
|
page read and write
|
||
F17247E000
|
stack
|
page read and write
|
||
12F08000
|
trusted library allocation
|
page read and write
|
||
1B6E2000
|
unkown
|
page readonly
|
||
EF0FBFE000
|
stack
|
page read and write
|
||
14DE000
|
heap
|
page read and write
|
||
22D2000
|
unkown
|
page readonly
|
||
19AA86FF000
|
trusted library allocation
|
page read and write
|
||
19AA6500000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page execute and read and write
|
||
F5FEE7F000
|
unkown
|
page read and write
|
||
16F87C000
|
stack
|
page read and write
|
||
7F5000
|
heap
|
page read and write
|
||
25A2000
|
trusted library allocation
|
page read and write
|
||
230000
|
unkown
|
page readonly
|
||
1BF1D000
|
stack
|
page read and write
|
||
7FFD9BCE0000
|
trusted library allocation
|
page read and write
|
||
12B88000
|
trusted library allocation
|
page read and write
|
||
1D29D450000
|
heap
|
page read and write
|
||
2270000
|
heap
|
page read and write
|
||
2E5E2F90000
|
trusted library allocation
|
page read and write
|
||
1490000
|
trusted library allocation
|
page read and write
|
||
232DF469000
|
trusted library allocation
|
page read and write
|
||
1408000
|
heap
|
page read and write
|
||
232000
|
unkown
|
page readonly
|
||
4ABB87C000
|
stack
|
page read and write
|
||
1BB52420000
|
heap
|
page read and write
|
||
2DB25920000
|
trusted library allocation
|
page read and write
|
||
1396F000
|
trusted library allocation
|
page read and write
|
||
12D17000
|
trusted library allocation
|
page read and write
|
||
17D00084000
|
trusted library allocation
|
page read and write
|
||
1481E270000
|
direct allocation
|
page read and write
|
||
1D547240000
|
heap
|
page read and write
|
||
2A15000
|
trusted library allocation
|
page read and write
|
||
C752FFC000
|
stack
|
page read and write
|
||
2C2B000
|
trusted library allocation
|
page read and write
|
||
8F5000
|
heap
|
page read and write
|
||
1020000
|
trusted library allocation
|
page read and write
|
||
29F9000
|
trusted library allocation
|
page read and write
|
||
13201000
|
trusted library allocation
|
page read and write
|
||
1D29F7B6000
|
trusted library allocation
|
page read and write
|
||
133E4000
|
trusted library allocation
|
page read and write
|
||
2E5DD890000
|
heap
|
page read and write
|
||
7FFD9B96B000
|
trusted library allocation
|
page read and write
|
||
FA485FE000
|
stack
|
page read and write
|
||
C752AFA000
|
stack
|
page read and write
|
||
1364D000
|
trusted library allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
1BDC0000
|
heap
|
page execute and read and write
|
||
391000
|
stack
|
page read and write
|
||
2200000
|
unkown
|
page readonly
|
||
9C8F1EF000
|
stack
|
page read and write
|
||
597EF8E000
|
unkown
|
page read and write
|
||
33EC000
|
trusted library allocation
|
page read and write
|
||
31D7000
|
trusted library allocation
|
page read and write
|
||
27FA000
|
heap
|
page read and write
|
||
7FFD9B7AB000
|
trusted library allocation
|
page execute and read and write
|
||
23792C48000
|
heap
|
page read and write
|
||
2F9E000
|
stack
|
page read and write
|
||
2B600020000
|
trusted library allocation
|
page read and write
|
||
2F0A000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
4ABB073000
|
stack
|
page read and write
|
||
AC3854C000
|
stack
|
page read and write
|
||
7FFD9B9A3000
|
trusted library allocation
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
19AA86D5000
|
trusted library allocation
|
page read and write
|
||
2E5DD8E1000
|
heap
|
page read and write
|
||
13081000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
2E5DD8E1000
|
heap
|
page read and write
|
||
6D3000
|
heap
|
page read and write
|
||
22E8FE000
|
stack
|
page read and write
|
||
31E4000
|
trusted library allocation
|
page read and write
|
||
2EE5000
|
trusted library allocation
|
page read and write
|
||
2D9A000
|
trusted library allocation
|
page read and write
|
||
4ABB379000
|
stack
|
page read and write
|
||
23794ADB000
|
heap
|
page read and write
|
||
FA4818F000
|
unkown
|
page read and write
|
||
232DEE86000
|
heap
|
page read and write
|
||
232DF4A6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B81C000
|
trusted library allocation
|
page execute and read and write
|
||
1553000
|
heap
|
page read and write
|
||
29FE000
|
stack
|
page read and write
|
||
29B285B0000
|
heap
|
page execute and read and write
|
||
1270F000
|
trusted library allocation
|
page read and write
|
||
2DCD000
|
trusted library allocation
|
page read and write
|
||
30FC000
|
trusted library allocation
|
page read and write
|
||
2E24000
|
trusted library allocation
|
page read and write
|
||
1481E0C6000
|
heap
|
page read and write
|
||
12F0F000
|
trusted library allocation
|
page read and write
|
||
2B82000
|
trusted library allocation
|
page read and write
|
||
1D547650000
|
trusted library allocation
|
page read and write
|
||
93C000
|
heap
|
page read and write
|
||
26AC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
1481E0C7000
|
heap
|
page read and write
|
||
12E5000
|
heap
|
page read and write
|
||
C752E7E000
|
stack
|
page read and write
|
||
7FFD9BD07000
|
trusted library allocation
|
page read and write
|
||
3277000
|
trusted library allocation
|
page read and write
|
||
9364B77000
|
stack
|
page read and write
|
||
7FFD9B762000
|
trusted library allocation
|
page read and write
|
||
23792F90000
|
trusted library allocation
|
page read and write
|
||
1B150000
|
trusted library allocation
|
page read and write
|
||
1877F7E000
|
stack
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
307F000
|
trusted library allocation
|
page read and write
|
||
232DF422000
|
trusted library allocation
|
page read and write
|
||
25AE000
|
stack
|
page read and write
|
||
18791CC000
|
stack
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
1243D000
|
trusted library allocation
|
page read and write
|
||
CC0007E000
|
stack
|
page read and write
|
||
D78000
|
heap
|
page read and write
|
||
66E1F7E000
|
stack
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
23792C08000
|
heap
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page execute and read and write
|
||
124DF000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
2E5DD8E0000
|
heap
|
page read and write
|
||
1158000
|
heap
|
page read and write
|
||
936594E000
|
stack
|
page read and write
|
||
1481E076000
|
heap
|
page read and write
|
||
1481E0C3000
|
heap
|
page read and write
|
||
1481DF40000
|
heap
|
page read and write
|
||
302D000
|
trusted library allocation
|
page read and write
|
||
12B8000
|
heap
|
page read and write
|
||
1481E069000
|
heap
|
page read and write
|
||
1703CE000
|
stack
|
page read and write
|
||
1800000
|
heap
|
page read and write
|
||
2DB272D0000
|
heap
|
page execute and read and write
|
||
6AC000
|
heap
|
page read and write
|
||
20B00228000
|
trusted library allocation
|
page read and write
|
||
CC7ECFE000
|
stack
|
page read and write
|
||
221F3E90000
|
heap
|
page read and write
|
||
F5FF5BE000
|
stack
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
||
27BA000
|
trusted library allocation
|
page read and write
|
||
5CE000
|
stack
|
page read and write
|
||
324D000
|
trusted library allocation
|
page read and write
|
||
12DD1000
|
trusted library allocation
|
page read and write
|
||
13141000
|
trusted library allocation
|
page read and write
|
||
2CE7000
|
trusted library allocation
|
page read and write
|
||
125D0000
|
trusted library allocation
|
page read and write
|
||
232DF496000
|
trusted library allocation
|
page read and write
|
||
12D95000
|
trusted library allocation
|
page read and write
|
||
140C000
|
heap
|
page read and write
|
||
B50000
|
trusted library allocation
|
page read and write
|
||
26A8B926000
|
heap
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
BAF000
|
stack
|
page read and write
|
||
7FFD9BDF0000
|
trusted library allocation
|
page read and write
|
||
F1722FF000
|
stack
|
page read and write
|
||
29B26895000
|
heap
|
page read and write
|
||
1B54F000
|
stack
|
page read and write
|
||
7FFD9B922000
|
trusted library allocation
|
page read and write
|
||
FE005FF000
|
stack
|
page read and write
|
||
C752EFF000
|
stack
|
page read and write
|
||
4ABB17F000
|
stack
|
page read and write
|
||
1365000
|
heap
|
page read and write
|
||
1380E000
|
trusted library allocation
|
page read and write
|
||
12DB2000
|
trusted library allocation
|
page read and write
|
||
2E5DD8E0000
|
heap
|
page read and write
|
||
150424C0000
|
heap
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page read and write
|
||
DAC000
|
heap
|
page read and write
|
||
7FFD9B81C000
|
trusted library allocation
|
page execute and read and write
|
||
2E5E4D60000
|
heap
|
page read and write
|
||
9365B4E000
|
stack
|
page read and write
|
||
7BF62FF000
|
stack
|
page read and write
|
||
2DB257A8000
|
heap
|
page read and write
|
||
4ABB5FA000
|
stack
|
page read and write
|
||
232DF427000
|
trusted library allocation
|
page read and write
|
||
1D547670000
|
trusted library allocation
|
page read and write
|
||
1B8CD000
|
stack
|
page read and write
|
||
1333A000
|
trusted library allocation
|
page read and write
|
||
19AA82A0000
|
trusted library allocation
|
page read and write
|
||
33F6000
|
trusted library allocation
|
page read and write
|
||
19AA6750000
|
heap
|
page read and write
|
||
187807E000
|
stack
|
page read and write
|
||
19AA82B0000
|
heap
|
page readonly
|
||
15042288000
|
heap
|
page read and write
|
||
2661000
|
trusted library allocation
|
page read and write
|
||
F5FF43F000
|
stack
|
page read and write
|
||
1481E06C000
|
heap
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
13068000
|
trusted library allocation
|
page read and write
|
||
27DA000
|
trusted library allocation
|
page read and write
|
||
AC373FE000
|
stack
|
page read and write
|
||
93644B3000
|
stack
|
page read and write
|
||
14F8000
|
heap
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
133BE000
|
trusted library allocation
|
page read and write
|
||
EF0FFBE000
|
stack
|
page read and write
|
||
14E1000
|
heap
|
page read and write
|
||
F5800BC000
|
stack
|
page read and write
|
||
1D547250000
|
heap
|
page read and write
|
||
26A89950000
|
heap
|
page readonly
|
||
7FFD9BE80000
|
trusted library allocation
|
page read and write
|
||
318D000
|
trusted library allocation
|
page read and write
|
||
2CF5000
|
trusted library allocation
|
page read and write
|
||
232DD11E000
|
heap
|
page read and write
|
||
EF0FEBC000
|
stack
|
page read and write
|
||
1481E07F000
|
heap
|
page read and write
|
||
17D00A0C000
|
trusted library allocation
|
page read and write
|
||
1340F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B933000
|
trusted library allocation
|
page read and write
|
||
12E1000
|
stack
|
page read and write
|
||
2D36000
|
trusted library allocation
|
page read and write
|
||
254D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
221F41D5000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
980000
|
trusted library allocation
|
page read and write
|
||
D98000
|
heap
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
2B86000
|
trusted library allocation
|
page read and write
|
||
66E1BFE000
|
stack
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
6B8000
|
heap
|
page read and write
|
||
3003000
|
trusted library allocation
|
page read and write
|
||
26A8B951000
|
trusted library allocation
|
page read and write
|
||
DAA000
|
heap
|
page read and write
|
||
12438000
|
trusted library allocation
|
page read and write
|
||
29B267C0000
|
heap
|
page read and write
|
||
C75307E000
|
stack
|
page read and write
|
||
2B01000
|
trusted library allocation
|
page read and write
|
||
EF0FCFD000
|
stack
|
page read and write
|
||
1B48D000
|
stack
|
page read and write
|
||
2C63000
|
trusted library allocation
|
page read and write
|
||
133F7000
|
trusted library allocation
|
page read and write
|
||
FA48779000
|
stack
|
page read and write
|
||
2B88000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
1B5C0000
|
heap
|
page read and write
|
||
CC7FDCE000
|
stack
|
page read and write
|
||
187914E000
|
stack
|
page read and write
|
||
232DF4A8000
|
trusted library allocation
|
page read and write
|
||
66E2B4E000
|
stack
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
2B80000
|
trusted library allocation
|
page read and write
|
||
232DEA85000
|
heap
|
page read and write
|
||
C7527BE000
|
stack
|
page read and write
|
||
232DD060000
|
heap
|
page read and write
|
||
99A000
|
heap
|
page read and write
|
||
1705CE000
|
stack
|
page read and write
|
||
23792FA5000
|
heap
|
page read and write
|
||
136F7000
|
trusted library allocation
|
page read and write
|
||
244A000
|
trusted library allocation
|
page read and write
|
||
EF10C87000
|
stack
|
page read and write
|
||
2E5E2DFD000
|
heap
|
page read and write
|
||
12441000
|
trusted library allocation
|
page read and write
|
||
150421F3000
|
heap
|
page read and write
|
||
EF0FAFF000
|
stack
|
page read and write
|
||
AC36F03000
|
stack
|
page read and write
|
||
1D29D660000
|
heap
|
page read and write
|
||
3E5000
|
heap
|
page read and write
|
||
597F87C000
|
stack
|
page read and write
|
||
1560000
|
trusted library allocation
|
page read and write
|
||
12CEF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B924000
|
trusted library allocation
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
2431000
|
trusted library allocation
|
page read and write
|
||
2330000
|
heap
|
page execute and read and write
|
||
26A899BE000
|
heap
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
2DB27BAE000
|
trusted library allocation
|
page read and write
|
||
2E20000
|
trusted library allocation
|
page read and write
|
||
2E8C000
|
trusted library allocation
|
page read and write
|
||
25A9000
|
trusted library allocation
|
page read and write
|
||
1280000
|
trusted library allocation
|
page read and write
|
||
4ABB7FE000
|
stack
|
page read and write
|
||
2B600347000
|
trusted library allocation
|
page read and write
|
||
2A6A000
|
trusted library allocation
|
page read and write
|
||
F1729BE000
|
stack
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
16C0000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
26A899AE000
|
heap
|
page read and write
|
||
1AA30000
|
trusted library allocation
|
page read and write
|
||
16F5000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
FA487F7000
|
stack
|
page read and write
|
||
2DB8000
|
trusted library allocation
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
2960000
|
trusted library allocation
|
page read and write
|
||
F9A000
|
heap
|
page read and write
|
||
16F578000
|
stack
|
page read and write
|
||
2232000
|
unkown
|
page readonly
|
||
2D8F000
|
trusted library allocation
|
page read and write
|
||
4ABB77C000
|
stack
|
page read and write
|
There are 2016 hidden memdumps, click here to show them.