Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
f5ATZ1i5CU.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Chrome.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\M2.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Metin.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Chrome.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0k0xn3ek.amf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1ktbwd4q.4jq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1x0stnic.mzk.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1y2bsoc0.oxx.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4ogslxj1.xos.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aoxj2dvt.fn0.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b15j4e3o.ng3.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_evwygwp4.xs2.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hqrmomki.skr.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hsq31iiu.33a.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kbsyvx5f.4rs.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mtppn12k.moc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_niyysnoz.fxl.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nrrdshmf.0su.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ou3jmx03.vsz.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oxexeleb.bq5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rxgiaa1v.yfc.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_scyhx4ro.0ke.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ub2z3zoy.wij.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v5yzuhyb.goi.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Chrome.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Dec 9 09:06:04
2024, mtime=Mon Dec 9 09:06:04 2024, atime=Mon Dec 9 09:06:04 2024, length=52736, window=hide
|
modified
|
There are 17 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\f5ATZ1i5CU.exe
|
"C:\Users\user\Desktop\f5ATZ1i5CU.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHcAYwB3ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG0AYgBiACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGgAYgB2ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHgAegB6ACMAPgA="
|
||
C:\Users\user\AppData\Roaming\M2.exe
|
"C:\Users\user\AppData\Roaming\M2.exe"
|
||
C:\Users\user\AppData\Roaming\Metin.exe
|
"C:\Users\user\AppData\Roaming\Metin.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\Metin.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Metin.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\Chrome.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Chrome.exe'
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Chrome" /tr "C:\Users\user\AppData\Roaming\Chrome.exe"
|
||
C:\Users\user\AppData\Roaming\Chrome.exe
|
C:\Users\user\AppData\Roaming\Chrome.exe
|
||
C:\Users\user\AppData\Roaming\Chrome.exe
|
"C:\Users\user\AppData\Roaming\Chrome.exe"
|
||
C:\Users\user\AppData\Roaming\Chrome.exe
|
"C:\Users\user\AppData\Roaming\Chrome.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 9 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://duclog23.duckdns.org:37552/
|
192.169.69.26
|
||
duclog23.duckdns.org
|
|||
duclog23.duckdns.org:37552
|
|||
http://tempuri.org/Endpoint/CheckConnectLR
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
|
unknown
|
||
http://www.microsoft.co
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://schemas.xmlsoap.org/soap/envelope/
|
unknown
|
||
http://tempuri.org/
|
unknown
|
||
https://aka.ms/pscore6
|
unknown
|
||
http://tempuri.org/Endpoint/EnvironmentSettingsLR
|
unknown
|
||
http://duclog23.duckdns.org:37552
|
unknown
|
||
http://tempuri.org/Endpoint/VerifyUpdateResponse
|
unknown
|
||
http://tempuri.org/Endpoint/SetEnvironmentResponse
|
unknown
|
||
https://api.ipify.orgcookies//settinString.Removeg
|
unknown
|
||
http://tempuri.org/Endpoint/GetUpdatesLR
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
http://crl.m2
|
unknown
|
||
http://tempuri.org/Endpoint/VerifyUpdateLR
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://crl.m9
|
unknown
|
||
http://ip-api.com
|
unknown
|
||
http://tempuri.org/Endpoint/
|
unknown
|
||
http://tempuri.org/0
|
unknown
|
||
http://crl.micft.cMicRosof
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.microsoft.co$
|
unknown
|
||
https://ipinfo.io/ip%appdata%
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
|
unknown
|
||
http://tempuri.org/Endpoint/CheckConnectResponse
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://duclog23.duckdns.org
|
unknown
|
||
http://tempuri.org/Endpoint/CheckConnect
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://tempuri.org/Endpoint/SetEnvironmentLR
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing
|
unknown
|
||
http://tempuri.org/Endpoint/GetUpdatesResponse
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
http://www.microsoft.cos
|
unknown
|
||
http://tempuri.org/Endpoint/EnvironmentSettingsResponse
|
unknown
|
||
http://tempuri.org/Endpoint/CheckConnectT
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/soap/actor/next
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
There are 41 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
duclog23.duckdns.org
|
192.169.69.26
|
||
bg.microsoft.map.fastly.net
|
199.232.214.172
|
||
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.169.69.26
|
duclog23.duckdns.org
|
United States
|
||
208.95.112.1
|
ip-api.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M2_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M2_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M2_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M2_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M2_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M2_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M2_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M2_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M2_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M2_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M2_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M2_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M2_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M2_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Metin_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Metin_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Metin_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Metin_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Metin_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Metin_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Metin_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Metin_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Metin_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Metin_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Metin_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Metin_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Metin_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Metin_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Chrome
|
There are 20 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2CC2000
|
trusted library allocation
|
page read and write
|
||
2C01000
|
trusted library allocation
|
page read and write
|
||
972000
|
unkown
|
page readonly
|
||
2F2000
|
unkown
|
page readonly
|
||
2E70000
|
heap
|
page read and write
|
||
5596000
|
trusted library allocation
|
page read and write
|
||
8EE0000
|
trusted library allocation
|
page execute and read and write
|
||
D10000
|
heap
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
7FF7C130D000
|
trusted library allocation
|
page execute and read and write
|
||
251102F3000
|
trusted library allocation
|
page read and write
|
||
28ACB794000
|
trusted library allocation
|
page read and write
|
||
1B19E000
|
stack
|
page read and write
|
||
4ED1000
|
trusted library allocation
|
page read and write
|
||
ACD000
|
trusted library allocation
|
page execute and read and write
|
||
4BBC137000
|
stack
|
page read and write
|
||
2510130D000
|
trusted library allocation
|
page read and write
|
||
7FF7C1770000
|
trusted library allocation
|
page read and write
|
||
7FF7C14B0000
|
trusted library allocation
|
page execute and read and write
|
||
2C9C000
|
trusted library allocation
|
page read and write
|
||
147453C6000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
76C64FE000
|
stack
|
page read and write
|
||
5E64000
|
heap
|
page read and write
|
||
7FF7C1450000
|
trusted library allocation
|
page execute and read and write
|
||
9C360E000
|
stack
|
page read and write
|
||
1473D26B000
|
trusted library allocation
|
page read and write
|
||
8A72000
|
heap
|
page read and write
|
||
1473D1AC000
|
trusted library allocation
|
page read and write
|
||
10D6000
|
heap
|
page read and write
|
||
1473D1BA000
|
trusted library allocation
|
page read and write
|
||
7FF7C131B000
|
trusted library allocation
|
page execute and read and write
|
||
1472B3D4000
|
heap
|
page read and write
|
||
76C6077000
|
stack
|
page read and write
|
||
9C380C000
|
stack
|
page read and write
|
||
14C5000
|
heap
|
page read and write
|
||
22EA1747000
|
trusted library allocation
|
page read and write
|
||
30CF000
|
trusted library allocation
|
page read and write
|
||
C5BC319000
|
stack
|
page read and write
|
||
7B09000
|
heap
|
page read and write
|
||
1472B390000
|
heap
|
page read and write
|
||
28AE33D2000
|
heap
|
page read and write
|
||
546E000
|
stack
|
page read and write
|
||
7FF7C15B0000
|
trusted library allocation
|
page read and write
|
||
123D000
|
heap
|
page read and write
|
||
50C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7C15B0000
|
trusted library allocation
|
page read and write
|
||
1472E0D1000
|
trusted library allocation
|
page read and write
|
||
1472DAC7000
|
trusted library allocation
|
page read and write
|
||
251696C3000
|
heap
|
page read and write
|
||
7FF7C1736000
|
trusted library allocation
|
page read and write
|
||
1B7CE000
|
stack
|
page read and write
|
||
7E6000
|
heap
|
page read and write
|
||
28AE32BD000
|
heap
|
page read and write
|
||
14745661000
|
heap
|
page read and write
|
||
28ACAB80000
|
heap
|
page read and write
|
||
4F80000
|
trusted library allocation
|
page read and write
|
||
7FF7C1766000
|
trusted library allocation
|
page read and write
|
||
1472ECE4000
|
trusted library allocation
|
page read and write
|
||
25167810000
|
trusted library section
|
page read and write
|
||
28AE3395000
|
heap
|
page read and write
|
||
1472CC40000
|
heap
|
page readonly
|
||
1472B375000
|
heap
|
page read and write
|
||
4E0E000
|
stack
|
page read and write
|
||
8BE2000
|
trusted library allocation
|
page read and write
|
||
22EB85C0000
|
heap
|
page read and write
|
||
28ACAA60000
|
trusted library allocation
|
page read and write
|
||
1472CDB5000
|
heap
|
page read and write
|
||
5495000
|
trusted library allocation
|
page read and write
|
||
1473CEF1000
|
trusted library allocation
|
page read and write
|
||
25101011000
|
trusted library allocation
|
page read and write
|
||
AF7000
|
trusted library allocation
|
page execute and read and write
|
||
902E000
|
stack
|
page read and write
|
||
1472B1E0000
|
heap
|
page read and write
|
||
7DE0000
|
trusted library allocation
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
22EB84B4000
|
heap
|
page read and write
|
||
4BBBDFE000
|
stack
|
page read and write
|
||
5B69000
|
trusted library allocation
|
page read and write
|
||
2516767F000
|
heap
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
76C5EFE000
|
stack
|
page read and write
|
||
1472CD00000
|
heap
|
page read and write
|
||
28ACC993000
|
trusted library allocation
|
page read and write
|
||
76C714B000
|
stack
|
page read and write
|
||
7FF7C1430000
|
trusted library allocation
|
page execute and read and write
|
||
22E9E45C000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
35D2000
|
trusted library allocation
|
page read and write
|
||
8A22000
|
heap
|
page read and write
|
||
25100BEE000
|
trusted library allocation
|
page read and write
|
||
7FF7C1610000
|
trusted library allocation
|
page read and write
|
||
34AE000
|
heap
|
page read and write
|
||
1472CC80000
|
trusted library allocation
|
page read and write
|
||
25101A8B000
|
trusted library allocation
|
page read and write
|
||
22E9E3E3000
|
heap
|
page read and write
|
||
7FF7C1630000
|
trusted library allocation
|
page read and write
|
||
8A6B000
|
heap
|
page read and write
|
||
7C60000
|
trusted library allocation
|
page read and write
|
||
7FF7C1620000
|
trusted library allocation
|
page read and write
|
||
7DF46E600000
|
trusted library allocation
|
page execute and read and write
|
||
A1E000
|
heap
|
page read and write
|
||
22E9E620000
|
heap
|
page read and write
|
||
7FF7C1790000
|
trusted library allocation
|
page read and write
|
||
28AE3083000
|
heap
|
page read and write
|
||
2CA6000
|
trusted library allocation
|
page read and write
|
||
1BAA7000
|
heap
|
page read and write
|
||
7FF7C1410000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7C131D000
|
trusted library allocation
|
page execute and read and write
|
||
28AC90D5000
|
heap
|
page read and write
|
||
25101218000
|
trusted library allocation
|
page read and write
|
||
76C70CC000
|
stack
|
page read and write
|
||
7FF7C1314000
|
trusted library allocation
|
page read and write
|
||
3610000
|
trusted library allocation
|
page execute and read and write
|
||
14744ECA000
|
heap
|
page read and write
|
||
4EBC000
|
stack
|
page read and write
|
||
534D000
|
stack
|
page read and write
|
||
355E000
|
stack
|
page read and write
|
||
7FF7C1730000
|
trusted library allocation
|
page read and write
|
||
8A47000
|
heap
|
page read and write
|
||
5C22000
|
trusted library allocation
|
page read and write
|
||
7FF7C133B000
|
trusted library allocation
|
page read and write
|
||
28AE3052000
|
heap
|
page read and write
|
||
1AFF0000
|
heap
|
page execute and read and write
|
||
22EAFF51000
|
trusted library allocation
|
page read and write
|
||
7FF7C1670000
|
trusted library allocation
|
page read and write
|
||
7FF7C1660000
|
trusted library allocation
|
page read and write
|
||
BCBBF0D000
|
stack
|
page read and write
|
||
1228000
|
heap
|
page read and write
|
||
2C6F000
|
trusted library allocation
|
page read and write
|
||
28ADAF15000
|
trusted library allocation
|
page read and write
|
||
251102A2000
|
trusted library allocation
|
page read and write
|
||
89F4000
|
heap
|
page read and write
|
||
7FF7C1310000
|
trusted library allocation
|
page read and write
|
||
7FF7C16A0000
|
trusted library allocation
|
page read and write
|
||
5E48000
|
heap
|
page read and write
|
||
1472CE30000
|
heap
|
page execute and read and write
|
||
995000
|
heap
|
page read and write
|
||
7FF7C1770000
|
trusted library allocation
|
page read and write
|
||
28AC91F0000
|
trusted library allocation
|
page read and write
|
||
121B000
|
heap
|
page read and write
|
||
22EA11CB000
|
trusted library allocation
|
page read and write
|
||
7FF7C1590000
|
trusted library allocation
|
page read and write
|
||
1472CD97000
|
heap
|
page execute and read and write
|
||
1472B360000
|
trusted library allocation
|
page read and write
|
||
7FF7C1323000
|
trusted library allocation
|
page execute and read and write
|
||
25169132000
|
heap
|
page read and write
|
||
AA9000
|
heap
|
page read and write
|
||
28ACAB10000
|
heap
|
page read and write
|
||
1125000
|
heap
|
page read and write
|
||
28AC91B0000
|
heap
|
page read and write
|
||
2D6C000
|
stack
|
page read and write
|
||
7FF7C13F6000
|
trusted library allocation
|
page execute and read and write
|
||
D20000
|
heap
|
page read and write
|
||
22E9FF15000
|
heap
|
page read and write
|
||
28AC9098000
|
heap
|
page read and write
|
||
7FF7C1520000
|
trusted library allocation
|
page read and write
|
||
4D5F000
|
stack
|
page read and write
|
||
500A000
|
trusted library allocation
|
page read and write
|
||
22EB8416000
|
heap
|
page execute and read and write
|
||
7FF7C14D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7C15B0000
|
trusted library allocation
|
page read and write
|
||
8F2E000
|
stack
|
page read and write
|
||
1472DEF2000
|
trusted library allocation
|
page read and write
|
||
28ACBDE2000
|
trusted library allocation
|
page read and write
|
||
76C637E000
|
stack
|
page read and write
|
||
1C9CC000
|
stack
|
page read and write
|
||
4C5E000
|
stack
|
page read and write
|
||
2AD8C449000
|
heap
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
22E9E5B0000
|
heap
|
page read and write
|
||
2FB7000
|
stack
|
page read and write
|
||
28AE334D000
|
heap
|
page read and write
|
||
2C8B000
|
trusted library allocation
|
page read and write
|
||
28ADAE81000
|
trusted library allocation
|
page read and write
|
||
28ACC483000
|
trusted library allocation
|
page read and write
|
||
AE6000
|
trusted library allocation
|
page execute and read and write
|
||
28AE3126000
|
heap
|
page execute and read and write
|
||
7FF7C1620000
|
trusted library allocation
|
page read and write
|
||
22EA0E9B000
|
trusted library allocation
|
page read and write
|
||
25167895000
|
heap
|
page read and write
|
||
7FF7C16A0000
|
trusted library allocation
|
page read and write
|
||
4BBC079000
|
stack
|
page read and write
|
||
2516964A000
|
heap
|
page read and write
|
||
22EA0E86000
|
trusted library allocation
|
page read and write
|
||
CF4000
|
stack
|
page read and write
|
||
251012AB000
|
trusted library allocation
|
page read and write
|
||
76C657C000
|
stack
|
page read and write
|
||
22E9FEE0000
|
heap
|
page execute and read and write
|
||
28ACC9B3000
|
trusted library allocation
|
page read and write
|
||
7FF7C1560000
|
trusted library allocation
|
page read and write
|
||
22E9E432000
|
heap
|
page read and write
|
||
1472CC30000
|
trusted library allocation
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
165F000
|
stack
|
page read and write
|
||
28ACBBC2000
|
trusted library allocation
|
page read and write
|
||
12C08000
|
trusted library allocation
|
page read and write
|
||
7FF7C132D000
|
trusted library allocation
|
page execute and read and write
|
||
A0B000
|
heap
|
page read and write
|
||
8E1F000
|
stack
|
page read and write
|
||
2681000
|
trusted library allocation
|
page read and write
|
||
BCBB43E000
|
stack
|
page read and write
|
||
28ADAF3C000
|
trusted library allocation
|
page read and write
|
||
79D2000
|
heap
|
page read and write
|
||
7FF7C14A0000
|
trusted library allocation
|
page execute and read and write
|
||
7BF0000
|
trusted library allocation
|
page read and write
|
||
1B9D0000
|
heap
|
page read and write
|
||
5C35000
|
trusted library allocation
|
page read and write
|
||
22EAFF21000
|
trusted library allocation
|
page read and write
|
||
5E52000
|
heap
|
page read and write
|
||
5430000
|
heap
|
page execute and read and write
|
||
7FF7C1690000
|
trusted library allocation
|
page read and write
|
||
25169260000
|
heap
|
page execute and read and write
|
||
1B8DE000
|
stack
|
page read and write
|
||
22EA17AD000
|
trusted library allocation
|
page read and write
|
||
1472B3DC000
|
heap
|
page read and write
|
||
28AE30BD000
|
heap
|
page read and write
|
||
7FF7C177D000
|
trusted library allocation
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
28AE305C000
|
heap
|
page read and write
|
||
8A8F000
|
heap
|
page read and write
|
||
7FF7C133D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7C1610000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7FF7C1330000
|
trusted library allocation
|
page read and write
|
||
7FF7C1600000
|
trusted library allocation
|
page read and write
|
||
7FF7C1720000
|
trusted library allocation
|
page read and write
|
||
8990000
|
trusted library allocation
|
page read and write
|
||
7FF7C1720000
|
trusted library allocation
|
page read and write
|
||
7FF7C1611000
|
trusted library allocation
|
page read and write
|
||
7FF7C13C6000
|
trusted library allocation
|
page read and write
|
||
3590000
|
trusted library allocation
|
page read and write
|
||
26CF000
|
trusted library allocation
|
page read and write
|
||
22E9FDD0000
|
heap
|
page read and write
|
||
1C8CE000
|
stack
|
page read and write
|
||
22EB84D0000
|
heap
|
page read and write
|
||
2F1C000
|
trusted library allocation
|
page read and write
|
||
7FF7C1760000
|
trusted library allocation
|
page read and write
|
||
1B65D000
|
stack
|
page read and write
|
||
4BBBD7F000
|
stack
|
page read and write
|
||
89E0000
|
heap
|
page read and write
|
||
AEA000
|
trusted library allocation
|
page execute and read and write
|
||
53F5000
|
heap
|
page execute and read and write
|
||
7FF7C1688000
|
trusted library allocation
|
page read and write
|
||
7FF7C1590000
|
trusted library allocation
|
page read and write
|
||
28ACAB70000
|
trusted library allocation
|
page read and write
|
||
25169C50000
|
heap
|
page read and write
|
||
286E000
|
stack
|
page read and write
|
||
7FF7C1303000
|
trusted library allocation
|
page execute and read and write
|
||
28AC91E0000
|
trusted library section
|
page read and write
|
||
7FF7C14A2000
|
trusted library allocation
|
page read and write
|
||
251018BE000
|
trusted library allocation
|
page read and write
|
||
7B53000
|
heap
|
page read and write
|
||
2C9A000
|
trusted library allocation
|
page read and write
|
||
1472B41A000
|
heap
|
page read and write
|
||
22EA0E93000
|
trusted library allocation
|
page read and write
|
||
28ACBCB4000
|
trusted library allocation
|
page read and write
|
||
7FF7C134B000
|
trusted library allocation
|
page read and write
|
||
1225000
|
heap
|
page read and write
|
||
7E60000
|
trusted library allocation
|
page read and write
|
||
7FF7C1678000
|
trusted library allocation
|
page read and write
|
||
1209000
|
heap
|
page read and write
|
||
22EA1048000
|
trusted library allocation
|
page read and write
|
||
64AF000
|
trusted library allocation
|
page read and write
|
||
7750000
|
heap
|
page read and write
|
||
2C5D000
|
trusted library allocation
|
page read and write
|
||
7FF7C14C2000
|
trusted library allocation
|
page read and write
|
||
BCBBE8F000
|
stack
|
page read and write
|
||
8C00000
|
trusted library allocation
|
page execute and read and write
|
||
5C0000
|
heap
|
page read and write
|
||
14745634000
|
heap
|
page read and write
|
||
2F11000
|
trusted library allocation
|
page read and write
|
||
7FF7C136C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7C1780000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
28AC9285000
|
heap
|
page read and write
|
||
1B18D000
|
stack
|
page read and write
|
||
E1D000
|
heap
|
page read and write
|
||
6449000
|
trusted library allocation
|
page read and write
|
||
22EB8517000
|
heap
|
page read and write
|
||
7FF7C15D0000
|
trusted library allocation
|
page read and write
|
||
26E4000
|
trusted library allocation
|
page read and write
|
||
30D1000
|
trusted library allocation
|
page read and write
|
||
35D0000
|
trusted library allocation
|
page read and write
|
||
7FF7C1334000
|
trusted library allocation
|
page read and write
|
||
5E10000
|
heap
|
page read and write
|
||
7FF7C168C000
|
trusted library allocation
|
page read and write
|
||
7F458000
|
trusted library allocation
|
page execute and read and write
|
||
12F11000
|
trusted library allocation
|
page read and write
|
||
7FF7C1600000
|
trusted library allocation
|
page read and write
|
||
7FF7C16A0000
|
trusted library allocation
|
page read and write
|
||
22EA0E8A000
|
trusted library allocation
|
page read and write
|
||
7FF7C1689000
|
trusted library allocation
|
page read and write
|
||
1472DCA9000
|
trusted library allocation
|
page read and write
|
||
28AE3342000
|
heap
|
page read and write
|
||
28ACB05D000
|
trusted library allocation
|
page read and write
|
||
5B6B000
|
trusted library allocation
|
page read and write
|
||
4F00000
|
trusted library allocation
|
page read and write
|
||
7FF7C1610000
|
trusted library allocation
|
page read and write
|
||
7FF7C1670000
|
trusted library allocation
|
page read and write
|
||
2C8F000
|
trusted library allocation
|
page read and write
|
||
1474553C000
|
heap
|
page read and write
|
||
7FF7C14F8000
|
trusted library allocation
|
page read and write
|
||
7FF7C1530000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
trusted library allocation
|
page read and write
|
||
4BBD00C000
|
stack
|
page read and write
|
||
130C3000
|
trusted library allocation
|
page read and write
|
||
14AE000
|
stack
|
page read and write
|
||
28ACBB29000
|
trusted library allocation
|
page read and write
|
||
1472E74D000
|
trusted library allocation
|
page read and write
|
||
22EAFF96000
|
trusted library allocation
|
page read and write
|
||
7FF7C1790000
|
trusted library allocation
|
page read and write
|
||
1473D254000
|
trusted library allocation
|
page read and write
|
||
1472B370000
|
heap
|
page read and write
|
||
7FF7C14B2000
|
trusted library allocation
|
page read and write
|
||
25169648000
|
heap
|
page read and write
|
||
2E20000
|
trusted library allocation
|
page read and write
|
||
2A90000
|
heap
|
page execute and read and write
|
||
22EB8590000
|
heap
|
page execute and read and write
|
||
76C5FFE000
|
stack
|
page read and write
|
||
7FF7C167C000
|
trusted library allocation
|
page read and write
|
||
7FF7C1314000
|
trusted library allocation
|
page read and write
|
||
7FF7C1520000
|
trusted library allocation
|
page read and write
|
||
7FF7C1314000
|
trusted library allocation
|
page read and write
|
||
7FF7C1330000
|
trusted library allocation
|
page read and write
|
||
28ACAB85000
|
heap
|
page read and write
|
||
25100A55000
|
trusted library allocation
|
page read and write
|
||
7D6D000
|
stack
|
page read and write
|
||
28AC91D0000
|
trusted library section
|
page read and write
|
||
39C000
|
stack
|
page read and write
|
||
22EA1D40000
|
trusted library allocation
|
page read and write
|
||
28AC9116000
|
heap
|
page read and write
|
||
7FF7C1570000
|
trusted library allocation
|
page read and write
|
||
7CEF000
|
stack
|
page read and write
|
||
7FF7C135C000
|
trusted library allocation
|
page execute and read and write
|
||
1472ECBF000
|
trusted library allocation
|
page read and write
|
||
DE4000
|
stack
|
page read and write
|
||
2516997C000
|
heap
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
89EC000
|
heap
|
page read and write
|
||
BCBB3BF000
|
stack
|
page read and write
|
||
4E9E000
|
stack
|
page read and write
|
||
7FF7C1730000
|
trusted library allocation
|
page read and write
|
||
22EA1D45000
|
trusted library allocation
|
page read and write
|
||
7FF7C15C0000
|
trusted library allocation
|
page read and write
|
||
1269000
|
heap
|
page read and write
|
||
AFB000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7C15E0000
|
trusted library allocation
|
page read and write
|
||
DDB000
|
heap
|
page read and write
|
||
7FF7C1710000
|
trusted library allocation
|
page read and write
|
||
22EA10FF000
|
trusted library allocation
|
page read and write
|
||
7FF7C13EC000
|
trusted library allocation
|
page execute and read and write
|
||
AF5000
|
trusted library allocation
|
page execute and read and write
|
||
251676CB000
|
heap
|
page read and write
|
||
22EB85F3000
|
heap
|
page read and write
|
||
E21000
|
heap
|
page read and write
|
||
7FF7C13B0000
|
trusted library allocation
|
page execute and read and write
|
||
22EB87E3000
|
heap
|
page read and write
|
||
7FF7C1690000
|
trusted library allocation
|
page read and write
|
||
7FF7C1750000
|
trusted library allocation
|
page read and write
|
||
DEF000
|
heap
|
page read and write
|
||
7DF4A7FB0000
|
trusted library allocation
|
page execute and read and write
|
||
8840000
|
trusted library allocation
|
page execute and read and write
|
||
22E9E5D0000
|
heap
|
page read and write
|
||
268C000
|
trusted library allocation
|
page read and write
|
||
7FF7C14F4000
|
trusted library allocation
|
page read and write
|
||
12688000
|
trusted library allocation
|
page read and write
|
||
1C3B8000
|
stack
|
page read and write
|
||
7FF7C1500000
|
trusted library allocation
|
page execute and read and write
|
||
2E00000
|
heap
|
page read and write
|
||
22EB86D4000
|
heap
|
page read and write
|
||
35B9000
|
trusted library allocation
|
page read and write
|
||
1472DABD000
|
trusted library allocation
|
page read and write
|
||
7FF7C1692000
|
trusted library allocation
|
page read and write
|
||
9C267A000
|
stack
|
page read and write
|
||
22EA0F57000
|
trusted library allocation
|
page read and write
|
||
89E8000
|
heap
|
page read and write
|
||
7FF7C1313000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7C1530000
|
trusted library allocation
|
page read and write
|
||
22EB86C0000
|
heap
|
page read and write
|
||
75CE000
|
stack
|
page read and write
|
||
1B9D4000
|
heap
|
page read and write
|
||
22EB8410000
|
heap
|
page execute and read and write
|
||
22EA1082000
|
trusted library allocation
|
page read and write
|
||
25167900000
|
heap
|
page read and write
|
||
22EB882F000
|
heap
|
page read and write
|
||
22EA0B16000
|
trusted library allocation
|
page read and write
|
||
4F87000
|
heap
|
page read and write
|
||
7FF7C1770000
|
trusted library allocation
|
page read and write
|
||
35D5000
|
trusted library allocation
|
page execute and read and write
|
||
9C257E000
|
stack
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
5010000
|
trusted library allocation
|
page read and write
|
||
7FF7C1620000
|
trusted library allocation
|
page read and write
|
||
1473CEE1000
|
trusted library allocation
|
page read and write
|
||
7FF7C13D0000
|
trusted library allocation
|
page read and write
|
||
5DDE000
|
stack
|
page read and write
|
||
251690F0000
|
trusted library allocation
|
page read and write
|
||
28ACBE39000
|
trusted library allocation
|
page read and write
|
||
28AC9070000
|
heap
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
1472B2E0000
|
heap
|
page read and write
|
||
54AE000
|
stack
|
page read and write
|
||
7DF475310000
|
trusted library allocation
|
page execute and read and write
|
||
296F000
|
stack
|
page read and write
|
||
7FF7C16B0000
|
trusted library allocation
|
page read and write
|
||
7FF7C14F8000
|
trusted library allocation
|
page read and write
|
||
7FF7C13E0000
|
trusted library allocation
|
page execute and read and write
|
||
22E9FE70000
|
trusted library allocation
|
page read and write
|
||
28AE2FE0000
|
heap
|
page read and write
|
||
758E000
|
stack
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
7FF7C14C1000
|
trusted library allocation
|
page read and write
|
||
251678D0000
|
heap
|
page execute and read and write
|
||
7FF7C1310000
|
trusted library allocation
|
page read and write
|
||
25167870000
|
trusted library allocation
|
page read and write
|
||
7FF7C1550000
|
trusted library allocation
|
page read and write
|
||
28AC90A2000
|
heap
|
page read and write
|
||
7FF7C1698000
|
trusted library allocation
|
page read and write
|
||
7FF7C13CC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7C15F0000
|
trusted library allocation
|
page read and write
|
||
1B8CE000
|
stack
|
page read and write
|
||
7FF7C1580000
|
trusted library allocation
|
page read and write
|
||
28AC9050000
|
heap
|
page read and write
|
||
22EA014A000
|
trusted library allocation
|
page read and write
|
||
26C3000
|
trusted library allocation
|
page read and write
|
||
50BE000
|
stack
|
page read and write
|
||
789000
|
heap
|
page read and write
|
||
2516767D000
|
heap
|
page read and write
|
||
7DF4E6750000
|
trusted library allocation
|
page execute and read and write
|
||
BCBB07D000
|
stack
|
page read and write
|
||
7FF7C1303000
|
trusted library allocation
|
page read and write
|
||
7FF7C1580000
|
trusted library allocation
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
7FF7C137C000
|
trusted library allocation
|
page execute and read and write
|
||
BCBC08C000
|
stack
|
page read and write
|
||
7FF7C1630000
|
trusted library allocation
|
page read and write
|
||
8900000
|
heap
|
page read and write
|
||
7FF7C138C000
|
trusted library allocation
|
page execute and read and write
|
||
BCBAAE3000
|
stack
|
page read and write
|
||
1473D1B2000
|
trusted library allocation
|
page read and write
|
||
76C6279000
|
stack
|
page read and write
|
||
7FF7C13C0000
|
trusted library allocation
|
page read and write
|
||
4BBBFFE000
|
stack
|
page read and write
|
||
7FF7C1664000
|
trusted library allocation
|
page read and write
|
||
28AC90ED000
|
heap
|
page read and write
|
||
7FF7C1650000
|
trusted library allocation
|
page read and write
|
||
14745310000
|
heap
|
page read and write
|
||
797E000
|
stack
|
page read and write
|
||
760E000
|
stack
|
page read and write
|
||
22EA0971000
|
trusted library allocation
|
page read and write
|
||
28ACBB2F000
|
trusted library allocation
|
page read and write
|
||
1AC30000
|
trusted library allocation
|
page read and write
|
||
66A000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
251011DF000
|
trusted library allocation
|
page read and write
|
||
7FF7C130D000
|
trusted library allocation
|
page execute and read and write
|
||
5441000
|
trusted library allocation
|
page read and write
|
||
28AC90CF000
|
heap
|
page read and write
|
||
10C3000
|
trusted library allocation
|
page read and write
|
||
22E9E41D000
|
heap
|
page read and write
|
||
5E00000
|
heap
|
page read and write
|
||
7FF7C172C000
|
trusted library allocation
|
page read and write
|
||
7FF7C15A0000
|
trusted library allocation
|
page read and write
|
||
1555000
|
heap
|
page read and write
|
||
7FF7C1512000
|
trusted library allocation
|
page read and write
|
||
28ACBC81000
|
trusted library allocation
|
page read and write
|
||
25167910000
|
heap
|
page read and write
|
||
8D93000
|
trusted library allocation
|
page read and write
|
||
28ADABB1000
|
trusted library allocation
|
page read and write
|
||
7FF7C1640000
|
trusted library allocation
|
page read and write
|
||
6450000
|
trusted library allocation
|
page read and write
|
||
251690C0000
|
trusted library allocation
|
page read and write
|
||
7FF7C131D000
|
trusted library allocation
|
page execute and read and write
|
||
7AF0000
|
heap
|
page read and write
|
||
768E000
|
stack
|
page read and write
|
||
1AC0D000
|
stack
|
page read and write
|
||
76C7049000
|
stack
|
page read and write
|
||
25167890000
|
heap
|
page read and write
|
||
7C50000
|
trusted library allocation
|
page read and write
|
||
28AC90CD000
|
heap
|
page read and write
|
||
476E000
|
stack
|
page read and write
|
||
7FF7C1332000
|
trusted library allocation
|
page read and write
|
||
1472CE80000
|
trusted library allocation
|
page read and write
|
||
25169A1C000
|
heap
|
page read and write
|
||
8C10000
|
trusted library allocation
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
1472E283000
|
trusted library allocation
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
7FF7C15D0000
|
trusted library allocation
|
page read and write
|
||
2AD8C3C0000
|
heap
|
page read and write
|
||
7DF0000
|
trusted library allocation
|
page read and write
|
||
28AE32A0000
|
heap
|
page read and write
|
||
12681000
|
trusted library allocation
|
page read and write
|
||
130C8000
|
trusted library allocation
|
page read and write
|
||
7FF7C1540000
|
trusted library allocation
|
page read and write
|
||
22EB84AB000
|
heap
|
page read and write
|
||
6B2000
|
heap
|
page read and write
|
||
7BFB000
|
trusted library allocation
|
page read and write
|
||
7C4E000
|
stack
|
page read and write
|
||
3600000
|
heap
|
page readonly
|
||
7FF7C1550000
|
trusted library allocation
|
page read and write
|
||
22E9E457000
|
heap
|
page read and write
|
||
1B5CB000
|
stack
|
page read and write
|
||
BCBBF8E000
|
stack
|
page read and write
|
||
2D2F000
|
stack
|
page read and write
|
||
26BB000
|
trusted library allocation
|
page read and write
|
||
14745558000
|
heap
|
page read and write
|
||
7FF7C14E0000
|
trusted library allocation
|
page execute and read and write
|
||
DF1000
|
heap
|
page read and write
|
||
7FF7C13A0000
|
trusted library allocation
|
page read and write
|
||
BCBB1B6000
|
stack
|
page read and write
|
||
25167620000
|
heap
|
page read and write
|
||
7FF7C1650000
|
trusted library allocation
|
page read and write
|
||
22EA0E82000
|
trusted library allocation
|
page read and write
|
||
1472B3B1000
|
heap
|
page read and write
|
||
BCBC10E000
|
stack
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
774B000
|
stack
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
7FF7C1776000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
747000
|
heap
|
page read and write
|
||
251698EE000
|
heap
|
page read and write
|
||
72E000
|
heap
|
page read and write
|
||
5E5B000
|
heap
|
page read and write
|
||
7FF7C1340000
|
trusted library allocation
|
page read and write
|
||
28ACBF55000
|
trusted library allocation
|
page read and write
|
||
4EFC000
|
stack
|
page read and write
|
||
25167915000
|
heap
|
page read and write
|
||
28AE2B96000
|
heap
|
page read and write
|
||
22E9FE30000
|
heap
|
page readonly
|
||
1472E098000
|
trusted library allocation
|
page read and write
|
||
7F440000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7C1780000
|
trusted library allocation
|
page read and write
|
||
7FF7C1320000
|
trusted library allocation
|
page read and write
|
||
7DF4A7FC0000
|
trusted library allocation
|
page execute and read and write
|
||
1472E1FA000
|
trusted library allocation
|
page read and write
|
||
7F400000
|
trusted library allocation
|
page execute and read and write
|
||
28AC9240000
|
heap
|
page execute and read and write
|
||
7FF7C1790000
|
trusted library allocation
|
page read and write
|
||
22EB8824000
|
heap
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
7FF7C14DA000
|
trusted library allocation
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
2F1F000
|
trusted library allocation
|
page read and write
|
||
BCBB13F000
|
stack
|
page read and write
|
||
4D9E000
|
stack
|
page read and write
|
||
7FF7C1555000
|
trusted library allocation
|
page read and write
|
||
7B49000
|
heap
|
page read and write
|
||
7FF7C1663000
|
trusted library allocation
|
page read and write
|
||
251019CA000
|
trusted library allocation
|
page read and write
|
||
12F13000
|
trusted library allocation
|
page read and write
|
||
2D50000
|
heap
|
page execute and read and write
|
||
1098000
|
heap
|
page read and write
|
||
7FF7C13C0000
|
trusted library allocation
|
page read and write
|
||
466E000
|
stack
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page execute and read and write
|
||
7C57000
|
trusted library allocation
|
page read and write
|
||
8980000
|
trusted library allocation
|
page read and write
|
||
7C5A000
|
trusted library allocation
|
page read and write
|
||
7B5A000
|
heap
|
page read and write
|
||
7FF7C1420000
|
trusted library allocation
|
page execute and read and write
|
||
35A3000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7C1518000
|
trusted library allocation
|
page read and write
|
||
7FF7C170C000
|
trusted library allocation
|
page read and write
|
||
8970000
|
trusted library allocation
|
page read and write
|
||
7FF7C1323000
|
trusted library allocation
|
page execute and read and write
|
||
1090000
|
trusted library allocation
|
page read and write
|
||
7FF7C15A0000
|
trusted library allocation
|
page read and write
|
||
9C368C000
|
stack
|
page read and write
|
||
147455BD000
|
heap
|
page read and write
|
||
22EB87F2000
|
heap
|
page read and write
|
||
7B70000
|
heap
|
page read and write
|
||
28ACBC4F000
|
trusted library allocation
|
page read and write
|
||
7FF7C1560000
|
trusted library allocation
|
page read and write
|
||
7B9F000
|
heap
|
page read and write
|
||
750D000
|
stack
|
page read and write
|
||
28ACBE9A000
|
trusted library allocation
|
page read and write
|
||
22EB84E4000
|
heap
|
page read and write
|
||
7FF7C15A0000
|
trusted library allocation
|
page read and write
|
||
2AD8C710000
|
heap
|
page read and write
|
||
7FF7C12F4000
|
trusted library allocation
|
page read and write
|
||
76C62F7000
|
stack
|
page read and write
|
||
530E000
|
stack
|
page read and write
|
||
970000
|
unkown
|
page readonly
|
||
28AC8F70000
|
heap
|
page read and write
|
||
7FF7C1310000
|
trusted library allocation
|
page read and write
|
||
7FF7C14F4000
|
trusted library allocation
|
page read and write
|
||
5DE000
|
stack
|
page read and write
|
||
747E000
|
stack
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
2AD8C3A0000
|
heap
|
page read and write
|
||
76C714E000
|
stack
|
page read and write
|
||
2C96000
|
trusted library allocation
|
page read and write
|
||
3455000
|
heap
|
page read and write
|
||
BDF000
|
stack
|
page read and write
|
||
9AE000
|
stack
|
page read and write
|
||
251698A0000
|
heap
|
page read and write
|
||
1B39E000
|
stack
|
page read and write
|
||
7FF7C1570000
|
trusted library allocation
|
page read and write
|
||
59B6000
|
trusted library allocation
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
7FF7C15C0000
|
trusted library allocation
|
page read and write
|
||
25100FA4000
|
trusted library allocation
|
page read and write
|
||
7AC0000
|
trusted library allocation
|
page read and write
|
||
9C3789000
|
stack
|
page read and write
|
||
1BCEE000
|
stack
|
page read and write
|
||
1472B2C0000
|
heap
|
page read and write
|
||
1CCCE000
|
stack
|
page read and write
|
||
22EB846F000
|
heap
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
1472ECDF000
|
trusted library allocation
|
page read and write
|
||
F84000
|
stack
|
page read and write
|
||
1114000
|
heap
|
page read and write
|
||
12F18000
|
trusted library allocation
|
page read and write
|
||
22EA01DA000
|
trusted library allocation
|
page read and write
|
||
22E9E625000
|
heap
|
page read and write
|
||
1BB10000
|
heap
|
page read and write
|
||
2AAF000
|
stack
|
page read and write
|
||
76C5BBE000
|
stack
|
page read and write
|
||
7FF7C15E0000
|
trusted library allocation
|
page read and write
|
||
1472E641000
|
trusted library allocation
|
page read and write
|
||
22EB846D000
|
heap
|
page read and write
|
||
76C5B3E000
|
stack
|
page read and write
|
||
2CA2000
|
trusted library allocation
|
page read and write
|
||
28AE332F000
|
heap
|
page read and write
|
||
7BED000
|
heap
|
page read and write
|
||
754B000
|
stack
|
page read and write
|
||
7FF7C14D0000
|
trusted library allocation
|
page execute and read and write
|
||
251696BB000
|
heap
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
28ADAFE9000
|
trusted library allocation
|
page read and write
|
||
1095000
|
heap
|
page read and write
|
||
14745646000
|
heap
|
page read and write
|
||
7E90000
|
trusted library allocation
|
page read and write
|
||
7FF7C132B000
|
trusted library allocation
|
page read and write
|
||
25110031000
|
trusted library allocation
|
page read and write
|
||
4BBC2BF000
|
stack
|
page read and write
|
||
1B49E000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
7B5E000
|
heap
|
page read and write
|
||
7FF7C15F0000
|
trusted library allocation
|
page read and write
|
||
4BBCE0E000
|
stack
|
page read and write
|
||
8A87000
|
heap
|
page read and write
|
||
7FF7C14CA000
|
trusted library allocation
|
page read and write
|
||
7FF7C1420000
|
trusted library allocation
|
page execute and read and write
|
||
1474564A000
|
heap
|
page read and write
|
||
2C71000
|
trusted library allocation
|
page read and write
|
||
3620000
|
heap
|
page read and write
|
||
507D000
|
stack
|
page read and write
|
||
7FF7C1540000
|
trusted library allocation
|
page read and write
|
||
2516769D000
|
heap
|
page read and write
|
||
22EB845F000
|
heap
|
page read and write
|
||
7FF7C1560000
|
trusted library allocation
|
page read and write
|
||
28ACAC16000
|
trusted library allocation
|
page read and write
|
||
4E5E000
|
stack
|
page read and write
|
||
25100D78000
|
trusted library allocation
|
page read and write
|
||
14B0000
|
trusted library allocation
|
page read and write
|
||
7FF7C1324000
|
trusted library allocation
|
page read and write
|
||
1472CDB0000
|
heap
|
page read and write
|
||
251010C7000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
stack
|
page read and write
|
||
2CA9000
|
trusted library allocation
|
page read and write
|
||
1472E726000
|
trusted library allocation
|
page read and write
|
||
22E9E42F000
|
heap
|
page read and write
|
||
7FF7C15A0000
|
trusted library allocation
|
page read and write
|
||
9C2777000
|
stack
|
page read and write
|
||
22EB8455000
|
heap
|
page read and write
|
||
7FF7C1304000
|
trusted library allocation
|
page read and write
|
||
2F7C000
|
stack
|
page read and write
|
||
2BFE000
|
stack
|
page read and write
|
||
7FF7C1678000
|
trusted library allocation
|
page read and write
|
||
4BBBC73000
|
stack
|
page read and write
|
||
28AC90D9000
|
heap
|
page read and write
|
||
25100C38000
|
trusted library allocation
|
page read and write
|
||
7FF7C13F6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7C136C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7C1750000
|
trusted library allocation
|
page read and write
|
||
33E0000
|
heap
|
page read and write
|
||
9C2C3C000
|
stack
|
page read and write
|
||
1C54E000
|
stack
|
page read and write
|
||
28AE3345000
|
heap
|
page read and write
|
||
1BF0D000
|
stack
|
page read and write
|
||
5030000
|
trusted library allocation
|
page execute and read and write
|
||
25167683000
|
heap
|
page read and write
|
||
AC4000
|
trusted library allocation
|
page read and write
|
||
1BA1C000
|
heap
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
7B2E000
|
heap
|
page read and write
|
||
4BBCE8C000
|
stack
|
page read and write
|
||
2620000
|
heap
|
page execute and read and write
|
||
4BBBE79000
|
stack
|
page read and write
|
||
1BABA000
|
heap
|
page read and write
|
||
7FF7C132D000
|
trusted library allocation
|
page execute and read and write
|
||
D50000
|
heap
|
page read and write
|
||
7FF7C1674000
|
trusted library allocation
|
page read and write
|
||
BCBAE7E000
|
stack
|
page read and write
|
||
28ACC314000
|
trusted library allocation
|
page read and write
|
||
7FF7C15B0000
|
trusted library allocation
|
page read and write
|
||
35AD000
|
trusted library allocation
|
page execute and read and write
|
||
7DF4E6740000
|
trusted library allocation
|
page execute and read and write
|
||
22EA0F54000
|
trusted library allocation
|
page read and write
|
||
22EA16A1000
|
trusted library allocation
|
page read and write
|
||
2516767B000
|
heap
|
page read and write
|
||
7E80000
|
trusted library allocation
|
page read and write
|
||
28ADAC03000
|
trusted library allocation
|
page read and write
|
||
25169600000
|
heap
|
page read and write
|
||
7FF7C1750000
|
trusted library allocation
|
page read and write
|
||
7FF7C1560000
|
trusted library allocation
|
page read and write
|
||
25100BFE000
|
trusted library allocation
|
page read and write
|
||
22E9FF10000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
AE2000
|
trusted library allocation
|
page read and write
|
||
764A000
|
stack
|
page read and write
|
||
1472CD90000
|
heap
|
page execute and read and write
|
||
251675E0000
|
heap
|
page read and write
|
||
7FF7C1620000
|
trusted library allocation
|
page read and write
|
||
7FF7C1643000
|
trusted library allocation
|
page read and write
|
||
26BE000
|
trusted library allocation
|
page read and write
|
||
7FF7C1640000
|
trusted library allocation
|
page read and write
|
||
28AC911A000
|
heap
|
page read and write
|
||
22EB0215000
|
trusted library allocation
|
page read and write
|
||
1B49D000
|
stack
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
ADD000
|
trusted library allocation
|
page execute and read and write
|
||
28AE31D3000
|
heap
|
page read and write
|
||
7FF7C1670000
|
trusted library allocation
|
page read and write
|
||
1C5C0000
|
heap
|
page read and write
|
||
C5BC67F000
|
stack
|
page read and write
|
||
6460000
|
trusted library allocation
|
page read and write
|
||
7B3F000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
7FF7C1770000
|
trusted library allocation
|
page read and write
|
||
7FF7C135C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7C131D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7C1580000
|
trusted library allocation
|
page read and write
|
||
7FF7C1570000
|
trusted library allocation
|
page read and write
|
||
7FF7C1590000
|
trusted library allocation
|
page read and write
|
||
7FF7C1690000
|
trusted library allocation
|
page read and write
|
||
A13000
|
heap
|
page read and write
|
||
7FF7C1720000
|
trusted library allocation
|
page read and write
|
||
76C6F4F000
|
stack
|
page read and write
|
||
22EB0213000
|
trusted library allocation
|
page read and write
|
||
1BC1E000
|
stack
|
page read and write
|
||
7FF7C13AC000
|
trusted library allocation
|
page execute and read and write
|
||
76C63FE000
|
stack
|
page read and write
|
||
894E000
|
stack
|
page read and write
|
||
7D2E000
|
stack
|
page read and write
|
||
2F21000
|
trusted library allocation
|
page read and write
|
||
28ADAE83000
|
trusted library allocation
|
page read and write
|
||
7FF7C13D6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7C1690000
|
trusted library allocation
|
page read and write
|
||
251698C8000
|
heap
|
page read and write
|
||
25167640000
|
heap
|
page read and write
|
||
2C4C000
|
trusted library allocation
|
page read and write
|
||
25167820000
|
trusted library section
|
page read and write
|
||
1472B3EE000
|
heap
|
page read and write
|
||
4BBBF77000
|
stack
|
page read and write
|
||
7FF7C1675000
|
trusted library allocation
|
page read and write
|
||
26CC000
|
trusted library allocation
|
page read and write
|
||
7FF7C14D1000
|
trusted library allocation
|
page read and write
|
||
7FF7C14A2000
|
trusted library allocation
|
page read and write
|
||
8850000
|
trusted library allocation
|
page read and write
|
||
28ACADB8000
|
trusted library allocation
|
page read and write
|
||
7FF7C15F0000
|
trusted library allocation
|
page read and write
|
||
7FF7C1684000
|
trusted library allocation
|
page read and write
|
||
8FAE000
|
stack
|
page read and write
|
||
7FF7C1740000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7C14C1000
|
trusted library allocation
|
page read and write
|
||
25167652000
|
heap
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
7FF7C14D0000
|
trusted library allocation
|
page read and write
|
||
14745510000
|
heap
|
page read and write
|
||
29AE000
|
stack
|
page read and write
|
||
7FF7C1790000
|
trusted library allocation
|
page read and write
|
||
7FF7C1324000
|
trusted library allocation
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
25100001000
|
trusted library allocation
|
page read and write
|
||
7FF7C1682000
|
trusted library allocation
|
page read and write
|
||
574000
|
stack
|
page read and write
|
||
7FF7C14C2000
|
trusted library allocation
|
page read and write
|
||
4EB6000
|
trusted library allocation
|
page read and write
|
||
9C2939000
|
stack
|
page read and write
|
||
28AE30C2000
|
heap
|
page read and write
|
||
7FF7C1703000
|
trusted library allocation
|
page read and write
|
||
7FF7C1660000
|
trusted library allocation
|
page read and write
|
||
7E70000
|
trusted library allocation
|
page read and write
|
||
7FF7C1750000
|
trusted library allocation
|
page execute and read and write
|
||
28ACB902000
|
trusted library allocation
|
page read and write
|
||
28ADAE9B000
|
trusted library allocation
|
page read and write
|
||
8830000
|
heap
|
page read and write
|
||
1472B3CD000
|
heap
|
page read and write
|
||
885000
|
heap
|
page read and write
|
||
8DDE000
|
stack
|
page read and write
|
||
AC0000
|
trusted library allocation
|
page read and write
|
||
4F90000
|
trusted library allocation
|
page execute and read and write
|
||
1078000
|
heap
|
page read and write
|
||
9EC000
|
heap
|
page read and write
|
||
BCBABEE000
|
stack
|
page read and write
|
||
22E9E415000
|
heap
|
page read and write
|
||
7AE0000
|
trusted library allocation
|
page read and write
|
||
251019A3000
|
trusted library allocation
|
page read and write
|
||
25101F3D000
|
trusted library allocation
|
page read and write
|
||
7FF7C13DC000
|
trusted library allocation
|
page execute and read and write
|
||
A5A000
|
heap
|
page read and write
|
||
7FF7C1502000
|
trusted library allocation
|
page read and write
|
||
7FF7C137C000
|
trusted library allocation
|
page execute and read and write
|
||
7DD0000
|
trusted library allocation
|
page read and write
|
||
C5BC39F000
|
unkown
|
page read and write
|
||
7FF7C13D0000
|
trusted library allocation
|
page read and write
|
||
A51000
|
heap
|
page read and write
|
||
28ADABA0000
|
trusted library allocation
|
page read and write
|
||
25101F5D000
|
trusted library allocation
|
page read and write
|
||
25167689000
|
heap
|
page read and write
|
||
7D90000
|
trusted library allocation
|
page read and write
|
||
7CAE000
|
stack
|
page read and write
|
||
4FE0000
|
trusted library allocation
|
page read and write
|
||
147455F1000
|
heap
|
page read and write
|
||
28AE3120000
|
heap
|
page execute and read and write
|
||
DD5000
|
heap
|
page read and write
|
||
7FF7C14B0000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
trusted library allocation
|
page read and write
|
||
33E8000
|
heap
|
page read and write
|
||
7FF7C13B0000
|
trusted library allocation
|
page read and write
|
||
9C2B3E000
|
stack
|
page read and write
|
||
4BBC43B000
|
stack
|
page read and write
|
||
1BD1F000
|
stack
|
page read and write
|
||
7FF7C1322000
|
trusted library allocation
|
page read and write
|
||
2FBD000
|
stack
|
page read and write
|
||
59DC000
|
trusted library allocation
|
page read and write
|
||
76C5F79000
|
stack
|
page read and write
|
||
28ACBD6A000
|
trusted library allocation
|
page read and write
|
||
22E9FE20000
|
trusted library allocation
|
page read and write
|
||
79BE000
|
stack
|
page read and write
|
||
251699E0000
|
heap
|
page read and write
|
||
5AA4000
|
trusted library allocation
|
page read and write
|
||
22EB8469000
|
heap
|
page read and write
|
||
25169A3A000
|
heap
|
page read and write
|
||
7FF7C1310000
|
trusted library allocation
|
page read and write
|
||
25167850000
|
trusted library allocation
|
page read and write
|
||
7D80000
|
trusted library allocation
|
page read and write
|
||
89FC000
|
heap
|
page read and write
|
||
7FF7C15C0000
|
trusted library allocation
|
page read and write
|
||
251696BF000
|
heap
|
page read and write
|
||
25169A60000
|
heap
|
page read and write
|
||
1472E80E000
|
trusted library allocation
|
page read and write
|
||
1BBEF000
|
stack
|
page read and write
|
||
22EAFF30000
|
trusted library allocation
|
page read and write
|
||
7FF7C134C000
|
trusted library allocation
|
page execute and read and write
|
||
35CA000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7C1740000
|
trusted library allocation
|
page execute and read and write
|
||
1472CEC1000
|
trusted library allocation
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
7FF7C131D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7C1630000
|
trusted library allocation
|
page read and write
|
||
33FE000
|
heap
|
page read and write
|
||
4BBCF89000
|
stack
|
page read and write
|
||
28ADAB91000
|
trusted library allocation
|
page read and write
|
||
88FE000
|
stack
|
page read and write
|
||
2AD8C440000
|
heap
|
page read and write
|
||
22E9E3D8000
|
heap
|
page read and write
|
||
251696D3000
|
heap
|
page read and write
|
||
10AD000
|
heap
|
page read and write
|
||
7FF7C1320000
|
trusted library allocation
|
page read and write
|
||
7FF7C12F0000
|
trusted library allocation
|
page read and write
|
||
53CE000
|
stack
|
page read and write
|
||
76C5E7E000
|
stack
|
page read and write
|
||
7FF7C1492000
|
trusted library allocation
|
page read and write
|
||
7FF7C14C0000
|
trusted library allocation
|
page read and write
|
||
1BAAD000
|
heap
|
page read and write
|
||
2510022A000
|
trusted library allocation
|
page read and write
|
||
22EB881D000
|
heap
|
page read and write
|
||
10AA000
|
heap
|
page read and write
|
||
1472B3B5000
|
heap
|
page read and write
|
||
7FF7C132B000
|
trusted library allocation
|
page read and write
|
||
2C81000
|
trusted library allocation
|
page read and write
|
||
CDE000
|
stack
|
page read and write
|
||
7FF7C13C6000
|
trusted library allocation
|
page read and write
|
||
28ACC96E000
|
trusted library allocation
|
page read and write
|
||
2631000
|
trusted library allocation
|
page read and write
|
||
7FF7C1330000
|
trusted library allocation
|
page read and write
|
||
2C80000
|
trusted library allocation
|
page read and write
|
||
7FF7C1669000
|
trusted library allocation
|
page read and write
|
||
7FF7C167C000
|
trusted library allocation
|
page read and write
|
||
28AC9210000
|
trusted library allocation
|
page read and write
|
||
5CDE000
|
stack
|
page read and write
|
||
6441000
|
trusted library allocation
|
page read and write
|
||
22EB8826000
|
heap
|
page read and write
|
||
7FF7C1640000
|
trusted library allocation
|
page read and write
|
||
14745518000
|
heap
|
page read and write
|
||
24D0000
|
trusted library allocation
|
page read and write
|
||
4BF8000
|
trusted library allocation
|
page read and write
|
||
28AE3570000
|
heap
|
page read and write
|
||
BCBB23B000
|
stack
|
page read and write
|
||
25169698000
|
heap
|
page read and write
|
||
22EB84A8000
|
heap
|
page read and write
|
||
25110022000
|
trusted library allocation
|
page read and write
|
||
2A50000
|
heap
|
page execute and read and write
|
||
22E9FF9B000
|
trusted library allocation
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
7FF7C1510000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
trusted library allocation
|
page read and write
|
||
7FF7C176D000
|
trusted library allocation
|
page read and write
|
||
251675B0000
|
heap
|
page read and write
|
||
1472EC9A000
|
trusted library allocation
|
page read and write
|
||
28ACBB96000
|
trusted library allocation
|
page read and write
|
||
22E9E4D0000
|
heap
|
page read and write
|
||
10B0000
|
trusted library allocation
|
page read and write
|
||
1472E1C7000
|
trusted library allocation
|
page read and write
|
||
25101964000
|
trusted library allocation
|
page read and write
|
||
9C2473000
|
stack
|
page read and write
|
||
22EB020F000
|
trusted library allocation
|
page read and write
|
||
7FF7C1530000
|
trusted library allocation
|
page read and write
|
||
251004D0000
|
trusted library allocation
|
page read and write
|
||
26C8000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
22E9FF00000
|
heap
|
page read and write
|
||
7FF481420000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7C1669000
|
trusted library allocation
|
page read and write
|
||
1472DEC6000
|
trusted library allocation
|
page read and write
|
||
22EA0E97000
|
trusted library allocation
|
page read and write
|
||
123A000
|
heap
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
7FF7C1600000
|
trusted library allocation
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
7FF7C1340000
|
trusted library allocation
|
page read and write
|
||
147455D1000
|
heap
|
page read and write
|
||
5BE1000
|
trusted library allocation
|
page read and write
|
||
7DF4A7FD0000
|
trusted library allocation
|
page execute and read and write
|
||
22EA1CFB000
|
trusted library allocation
|
page read and write
|
||
35A0000
|
trusted library allocation
|
page read and write
|
||
30C1000
|
trusted library allocation
|
page read and write
|
||
BCBC009000
|
stack
|
page read and write
|
||
251102F9000
|
trusted library allocation
|
page read and write
|
||
28AE301F000
|
heap
|
page read and write
|
||
95E000
|
stack
|
page read and write
|
||
22EA0F4E000
|
trusted library allocation
|
page read and write
|
||
7FF7C1640000
|
trusted library allocation
|
page read and write
|
||
88BD000
|
stack
|
page read and write
|
||
428000
|
unkown
|
page readonly
|
||
7FF7C1406000
|
trusted library allocation
|
page execute and read and write
|
||
25110301000
|
trusted library allocation
|
page read and write
|
||
1C4C0000
|
heap
|
page read and write
|
||
22EB7F2C000
|
heap
|
page read and write
|
||
1472DF7F000
|
trusted library allocation
|
page read and write
|
||
7FF7C1510000
|
trusted library allocation
|
page execute and read and write
|
||
2BEF000
|
stack
|
page read and write
|
||
7FF7C1313000
|
trusted library allocation
|
page execute and read and write
|
||
22EB8605000
|
heap
|
page read and write
|
||
7FF7C12F3000
|
trusted library allocation
|
page execute and read and write
|
||
14745575000
|
heap
|
page read and write
|
||
1472B320000
|
heap
|
page read and write
|
||
2AD8C715000
|
heap
|
page read and write
|
||
A4B000
|
heap
|
page read and write
|
||
251696CF000
|
heap
|
page read and write
|
||
251697C0000
|
heap
|
page read and write
|
||
6459000
|
trusted library allocation
|
page read and write
|
||
485000
|
heap
|
page read and write
|
||
1BE1E000
|
stack
|
page read and write
|
||
7FF7C13E6000
|
trusted library allocation
|
page read and write
|
||
BCBC10B000
|
stack
|
page read and write
|
||
4BFA000
|
trusted library allocation
|
page read and write
|
||
25100C04000
|
trusted library allocation
|
page read and write
|
||
22EA0E8E000
|
trusted library allocation
|
page read and write
|
||
7FF7C12FD000
|
trusted library allocation
|
page execute and read and write
|
||
4BBC33F000
|
stack
|
page read and write
|
||
22EB021D000
|
trusted library allocation
|
page read and write
|
||
14745430000
|
heap
|
page read and write
|
||
7FF7C1780000
|
trusted library allocation
|
page read and write
|
||
22EB8420000
|
heap
|
page read and write
|
||
7FF7C1416000
|
trusted library allocation
|
page execute and read and write
|
||
428000
|
unkown
|
page readonly
|
||
25100C0C000
|
trusted library allocation
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
1B6CE000
|
stack
|
page read and write
|
||
4BBD08E000
|
stack
|
page read and write
|
||
25167830000
|
trusted library allocation
|
page read and write
|
||
22EA0FE5000
|
trusted library allocation
|
page read and write
|
||
AB0000
|
trusted library allocation
|
page read and write
|
||
22EB85E0000
|
heap
|
page read and write
|
||
4BF4000
|
trusted library allocation
|
page read and write
|
||
59E000
|
stack
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
130C1000
|
trusted library allocation
|
page read and write
|
||
7FF7C1350000
|
trusted library allocation
|
page read and write
|
||
1472E4C2000
|
trusted library allocation
|
page read and write
|
||
1472DFE2000
|
trusted library allocation
|
page read and write
|
||
7FF7C13D6000
|
trusted library allocation
|
page read and write
|
||
7FF7C13C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7C15D0000
|
trusted library allocation
|
page read and write
|
||
7FF7C170A000
|
trusted library allocation
|
page read and write
|
||
22EAFF41000
|
trusted library allocation
|
page read and write
|
||
22E9FE40000
|
trusted library allocation
|
page read and write
|
||
7FF7C1530000
|
trusted library allocation
|
page read and write
|
||
12683000
|
trusted library allocation
|
page read and write
|
||
335E000
|
stack
|
page read and write
|
||
7FF7C1440000
|
trusted library allocation
|
page execute and read and write
|
||
1474555D000
|
heap
|
page read and write
|
||
9C2BBE000
|
stack
|
page read and write
|
||
9C26FE000
|
stack
|
page read and write
|
||
147453D9000
|
heap
|
page read and write
|
||
22EB877B000
|
heap
|
page read and write
|
||
7FF7C1440000
|
trusted library allocation
|
page execute and read and write
|
||
500D000
|
trusted library allocation
|
page read and write
|
||
1472E243000
|
trusted library allocation
|
page read and write
|
||
7C00000
|
trusted library allocation
|
page execute and read and write
|
||
950000
|
trusted library allocation
|
page read and write
|
||
420000
|
unkown
|
page readonly
|
||
8F69000
|
stack
|
page read and write
|
||
28AC9090000
|
heap
|
page read and write
|
||
251102F7000
|
trusted library allocation
|
page read and write
|
||
A09000
|
heap
|
page read and write
|
||
7FF7C1330000
|
trusted library allocation
|
page read and write
|
||
25169790000
|
trusted library allocation
|
page read and write
|
||
7FF7C14CA000
|
trusted library allocation
|
page read and write
|
||
7E50000
|
heap
|
page read and write
|
||
251699EF000
|
heap
|
page read and write
|
||
28ACB5E2000
|
trusted library allocation
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
7B4C000
|
heap
|
page read and write
|
||
251675C0000
|
heap
|
page read and write
|
||
BCBAB6D000
|
stack
|
page read and write
|
||
5BDF000
|
stack
|
page read and write
|
||
8FEF000
|
stack
|
page read and write
|
||
13AE000
|
stack
|
page read and write
|
||
2F0000
|
unkown
|
page readonly
|
||
1473D1B0000
|
trusted library allocation
|
page read and write
|
||
2610000
|
trusted library allocation
|
page read and write
|
||
1472E164000
|
trusted library allocation
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
28ADAE8B000
|
trusted library allocation
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
7FF7C14C0000
|
trusted library allocation
|
page read and write
|
||
22EA03ED000
|
trusted library allocation
|
page read and write
|
||
51CE000
|
stack
|
page read and write
|
||
7FF7C1430000
|
trusted library allocation
|
page execute and read and write
|
||
35F0000
|
trusted library allocation
|
page read and write
|
||
7FF7C15F0000
|
trusted library allocation
|
page read and write
|
||
10C0000
|
trusted library allocation
|
page read and write
|
||
25101F62000
|
trusted library allocation
|
page read and write
|
||
1472E021000
|
trusted library allocation
|
page read and write
|
||
4C00000
|
trusted library allocation
|
page read and write
|
||
53F0000
|
heap
|
page execute and read and write
|
||
7B45000
|
heap
|
page read and write
|
||
4BBBEFE000
|
stack
|
page read and write
|
||
25EE000
|
stack
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
A4D000
|
heap
|
page read and write
|
||
7FF7C14F2000
|
trusted library allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
25110001000
|
trusted library allocation
|
page read and write
|
||
4C10000
|
heap
|
page execute and read and write
|
||
251678D7000
|
heap
|
page execute and read and write
|
||
22EB022D000
|
trusted library allocation
|
page read and write
|
||
76C6179000
|
stack
|
page read and write
|
||
9C388E000
|
stack
|
page read and write
|
||
7FF7C1406000
|
trusted library allocation
|
page execute and read and write
|
||
251696CB000
|
heap
|
page read and write
|
||
22EB8759000
|
heap
|
page read and write
|
||
7FF7C1580000
|
trusted library allocation
|
page read and write
|
||
7FF7C13A6000
|
trusted library allocation
|
page read and write
|
||
1B9EE000
|
stack
|
page read and write
|
||
1472D913000
|
trusted library allocation
|
page read and write
|
||
147455CD000
|
heap
|
page read and write
|
||
9C25FE000
|
stack
|
page read and write
|
||
1472CF46000
|
trusted library allocation
|
page read and write
|
||
E8E000
|
heap
|
page read and write
|
||
241E000
|
stack
|
page read and write
|
||
22EB89F0000
|
heap
|
page read and write
|
||
8C30000
|
trusted library allocation
|
page read and write
|
||
7FF7C1504000
|
trusted library allocation
|
page read and write
|
||
7BCB000
|
heap
|
page read and write
|
||
980000
|
unkown
|
page readonly
|
||
22EA1138000
|
trusted library allocation
|
page read and write
|
||
4EC2000
|
trusted library allocation
|
page read and write
|
||
22E9E459000
|
heap
|
page read and write
|
||
22EA0C93000
|
trusted library allocation
|
page read and write
|
||
7FF7C1740000
|
trusted library allocation
|
page execute and read and write
|
||
8FED000
|
stack
|
page read and write
|
||
28AE3021000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
7FF7C1334000
|
trusted library allocation
|
page read and write
|
||
22E9FE00000
|
trusted library allocation
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
25169A50000
|
heap
|
page read and write
|
||
251013DC000
|
trusted library allocation
|
page read and write
|
||
2C85000
|
trusted library allocation
|
page read and write
|
||
76C647B000
|
stack
|
page read and write
|
||
28ADABC1000
|
trusted library allocation
|
page read and write
|
||
BCBB0F8000
|
stack
|
page read and write
|
||
7FF7C1333000
|
trusted library allocation
|
page execute and read and write
|
||
BCBB33E000
|
stack
|
page read and write
|
||
7FF7C15E0000
|
trusted library allocation
|
page read and write
|
||
34A3000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
25101F18000
|
trusted library allocation
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
76C6FCC000
|
stack
|
page read and write
|
||
340E000
|
heap
|
page read and write
|
||
2C89000
|
trusted library allocation
|
page read and write
|
||
7FF7C1780000
|
trusted library allocation
|
page read and write
|
||
1267000
|
heap
|
page read and write
|
||
7FF7C167A000
|
trusted library allocation
|
page read and write
|
||
22E9E3D0000
|
heap
|
page read and write
|
||
25100FD6000
|
trusted library allocation
|
page read and write
|
||
22EB86F9000
|
heap
|
page read and write
|
||
28ACC3FA000
|
trusted library allocation
|
page read and write
|
||
7FF7C16A0000
|
trusted library allocation
|
page read and write
|
||
2E00000
|
trusted library allocation
|
page read and write
|
||
7FF7C1590000
|
trusted library allocation
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
251696F9000
|
heap
|
page read and write
|
||
5420000
|
heap
|
page execute and read and write
|
||
990000
|
heap
|
page read and write
|
||
BCBB2B9000
|
stack
|
page read and write
|
||
1474564C000
|
heap
|
page read and write
|
||
D40000
|
heap
|
page execute and read and write
|
||
906E000
|
stack
|
page read and write
|
||
7FF7C1514000
|
trusted library allocation
|
page read and write
|
||
22EA1D20000
|
trusted library allocation
|
page read and write
|
||
251013C8000
|
trusted library allocation
|
page read and write
|
||
2C9F000
|
trusted library allocation
|
page read and write
|
||
251696AA000
|
heap
|
page read and write
|
||
4BBCF0E000
|
stack
|
page read and write
|
||
8C20000
|
trusted library allocation
|
page read and write
|
||
28AC9220000
|
heap
|
page readonly
|
||
3246000
|
heap
|
page read and write
|
||
ABA000
|
heap
|
page read and write
|
||
22EA12E8000
|
trusted library allocation
|
page read and write
|
||
341A000
|
heap
|
page read and write
|
||
6F8000
|
stack
|
page read and write
|
||
76C60FD000
|
stack
|
page read and write
|
||
9E6000
|
heap
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
7FF7C1760000
|
trusted library allocation
|
page read and write
|
||
538B000
|
stack
|
page read and write
|
||
9C27FD000
|
stack
|
page read and write
|
||
22EB8839000
|
heap
|
page read and write
|
||
7FF7C1664000
|
trusted library allocation
|
page read and write
|
||
7FF7C14E0000
|
trusted library allocation
|
page execute and read and write
|
||
4EF1000
|
trusted library allocation
|
page read and write
|
||
7FF7C1783000
|
trusted library allocation
|
page read and write
|
||
76CB000
|
stack
|
page read and write
|
||
7FF7C1643000
|
trusted library allocation
|
page read and write
|
||
AF2000
|
trusted library allocation
|
page read and write
|
||
28ACBBF5000
|
trusted library allocation
|
page read and write
|
||
28AC9230000
|
trusted library allocation
|
page read and write
|
||
6469000
|
trusted library allocation
|
page read and write
|
||
25100D81000
|
trusted library allocation
|
page read and write
|
||
E1B000
|
heap
|
page read and write
|
||
7DB0000
|
trusted library allocation
|
page read and write
|
||
24E0000
|
heap
|
page read and write
|
||
4E10000
|
heap
|
page read and write
|
||
7DC0000
|
trusted library allocation
|
page read and write
|
||
BCBAEFA000
|
stack
|
page read and write
|
||
7FF7C1720000
|
trusted library allocation
|
page read and write
|
||
351E000
|
stack
|
page read and write
|
||
4BBC23A000
|
stack
|
page read and write
|
||
22EA0E7E000
|
trusted library allocation
|
page read and write
|
||
4BBC0BF000
|
stack
|
page read and write
|
||
1472D0E9000
|
trusted library allocation
|
page read and write
|
||
7FF7C13E6000
|
trusted library allocation
|
page execute and read and write
|
||
22EA0CDA000
|
trusted library allocation
|
page read and write
|
||
28AC90D1000
|
heap
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
8A76000
|
heap
|
page read and write
|
||
271E000
|
stack
|
page read and write
|
||
10D8000
|
heap
|
page read and write
|
||
7FF7C1638000
|
trusted library allocation
|
page read and write
|
||
1103000
|
heap
|
page read and write
|
||
7FF7C1570000
|
trusted library allocation
|
page read and write
|
||
1472CEB0000
|
heap
|
page execute and read and write
|
||
22EB8741000
|
heap
|
page read and write
|
||
7FF7C1314000
|
trusted library allocation
|
page read and write
|
||
12C01000
|
trusted library allocation
|
page read and write
|
||
7FF7C15C0000
|
trusted library allocation
|
page read and write
|
||
22E9FEB0000
|
trusted library allocation
|
page read and write
|
||
7FF7C1500000
|
trusted library allocation
|
page execute and read and write
|
||
1BA66000
|
heap
|
page read and write
|
||
7FF7C14F0000
|
trusted library allocation
|
page execute and read and write
|
||
7BFD000
|
trusted library allocation
|
page read and write
|
||
22EB85B0000
|
trusted library allocation
|
page read and write
|
||
22EA0F48000
|
trusted library allocation
|
page read and write
|
||
7FF7C1760000
|
trusted library allocation
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
1473CF32000
|
trusted library allocation
|
page read and write
|
||
28ACC4E2000
|
trusted library allocation
|
page read and write
|
||
7FF7C1300000
|
trusted library allocation
|
page read and write
|
||
2AD8C390000
|
heap
|
page read and write
|
||
1B090000
|
heap
|
page read and write
|
||
2E6C000
|
stack
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
2F0F000
|
stack
|
page read and write
|
||
D45000
|
heap
|
page read and write
|
||
35A4000
|
trusted library allocation
|
page read and write
|
||
4BBC3BE000
|
stack
|
page read and write
|
||
7FF7C13CC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7C1710000
|
trusted library allocation
|
page read and write
|
||
1472DAF7000
|
trusted library allocation
|
page read and write
|
||
34A8000
|
heap
|
page read and write
|
||
930000
|
trusted library allocation
|
page read and write
|
||
7FF7C1520000
|
trusted library allocation
|
page execute and read and write
|
||
66E000
|
heap
|
page read and write
|
||
28ADAE7C000
|
trusted library allocation
|
page read and write
|
||
4F5E000
|
stack
|
page read and write
|
||
5B8C000
|
trusted library allocation
|
page read and write
|
||
2C2E000
|
stack
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
7FF7C1680000
|
trusted library allocation
|
page read and write
|
||
7FF7C1520000
|
trusted library allocation
|
page read and write
|
||
1473CEC1000
|
trusted library allocation
|
page read and write
|
||
1BD0E000
|
stack
|
page read and write
|
||
1BE0E000
|
stack
|
page read and write
|
||
7FF7C1311000
|
trusted library allocation
|
page read and write
|
||
7E00000
|
trusted library allocation
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
7FF7C1303000
|
trusted library allocation
|
page execute and read and write
|
||
85F000
|
stack
|
page read and write
|
||
1CACA000
|
stack
|
page read and write
|
||
1472B416000
|
heap
|
page read and write
|
||
7FF7C13E6000
|
trusted library allocation
|
page execute and read and write
|
||
25169770000
|
heap
|
page execute and read and write
|
||
1BAE0000
|
heap
|
page execute and read and write
|
||
1472DAF5000
|
trusted library allocation
|
page read and write
|
||
3631000
|
trusted library allocation
|
page read and write
|
||
7FF7C173C000
|
trusted library allocation
|
page read and write
|
||
7FF7C131D000
|
trusted library allocation
|
page execute and read and write
|
||
345C000
|
heap
|
page read and write
|
||
22EB87DF000
|
heap
|
page read and write
|
||
7DF475320000
|
trusted library allocation
|
page execute and read and write
|
||
9C2877000
|
stack
|
page read and write
|
||
7FF7C15E0000
|
trusted library allocation
|
page read and write
|
||
7FF7C14EA000
|
trusted library allocation
|
page read and write
|
||
26DC000
|
trusted library allocation
|
page read and write
|
||
2E70000
|
heap
|
page execute and read and write
|
||
1472D38D000
|
trusted library allocation
|
page read and write
|
||
22EA0B2D000
|
trusted library allocation
|
page read and write
|
||
8D90000
|
trusted library allocation
|
page read and write
|
||
25167860000
|
heap
|
page readonly
|
||
7FF7C1679000
|
trusted library allocation
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
7FF7C1314000
|
trusted library allocation
|
page read and write
|
||
25100088000
|
trusted library allocation
|
page read and write
|
||
3560000
|
heap
|
page read and write
|
||
7FF7C169C000
|
trusted library allocation
|
page read and write
|
||
1473D1CA000
|
trusted library allocation
|
page read and write
|
||
59C0000
|
trusted library allocation
|
page read and write
|
||
4EB1000
|
trusted library allocation
|
page read and write
|
||
76C5BFE000
|
stack
|
page read and write
|
||
251676C6000
|
heap
|
page read and write
|
||
7FF7C1510000
|
trusted library allocation
|
page read and write
|
||
7FF7C17A0000
|
trusted library allocation
|
page read and write
|
||
76C5AB3000
|
stack
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
28ACBB5D000
|
trusted library allocation
|
page read and write
|
||
7FF7C14F0000
|
trusted library allocation
|
page execute and read and write
|
||
1C00D000
|
stack
|
page read and write
|
||
1B29F000
|
stack
|
page read and write
|
||
7FF7C1317000
|
trusted library allocation
|
page read and write
|
||
30CC000
|
trusted library allocation
|
page read and write
|
||
7FF7C1320000
|
trusted library allocation
|
page read and write
|
||
7FF7C1680000
|
trusted library allocation
|
page read and write
|
||
7FF7C1700000
|
trusted library allocation
|
page read and write
|
||
12A5000
|
heap
|
page read and write
|
||
7DF46E5F0000
|
trusted library allocation
|
page execute and read and write
|
||
2711000
|
trusted library allocation
|
page read and write
|
||
22EB86FC000
|
heap
|
page read and write
|
||
9C2ABE000
|
stack
|
page read and write
|
||
28AC9280000
|
heap
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
7FF7C14F2000
|
trusted library allocation
|
page read and write
|
||
1B8E0000
|
heap
|
page read and write
|
||
28AE31C0000
|
heap
|
page read and write
|
||
7FF7C14E0000
|
trusted library allocation
|
page execute and read and write
|
||
35C0000
|
trusted library allocation
|
page read and write
|
||
DB6000
|
heap
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
7FF7C1312000
|
trusted library allocation
|
page read and write
|
||
28AE33FC000
|
heap
|
page read and write
|
||
89F0000
|
heap
|
page read and write
|
||
9C24FD000
|
stack
|
page read and write
|
||
BCBAF7F000
|
stack
|
page read and write
|
||
35B0000
|
trusted library allocation
|
page read and write
|
||
728000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
76C61F7000
|
stack
|
page read and write
|
||
7FF7C1680000
|
trusted library allocation
|
page read and write
|
||
7FF7C1630000
|
trusted library allocation
|
page read and write
|
||
4BBC1B8000
|
stack
|
page read and write
|
||
4E68000
|
trusted library allocation
|
page read and write
|
||
692000
|
heap
|
page read and write
|
||
25101129000
|
trusted library allocation
|
page read and write
|
||
58F2000
|
trusted library allocation
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
1BA9E000
|
stack
|
page read and write
|
||
4BF0000
|
trusted library allocation
|
page read and write
|
||
7FF7C1730000
|
trusted library allocation
|
page read and write
|
||
7FF7C1740000
|
trusted library allocation
|
page read and write
|
||
7FF7C1550000
|
trusted library allocation
|
page read and write
|
||
7FF7C130D000
|
trusted library allocation
|
page execute and read and write
|
||
7D70000
|
trusted library allocation
|
page execute and read and write
|
||
4ECE000
|
trusted library allocation
|
page read and write
|
||
5020000
|
trusted library allocation
|
page read and write
|
||
770D000
|
stack
|
page read and write
|
||
147458E0000
|
heap
|
page read and write
|
||
9C2A3C000
|
stack
|
page read and write
|
||
22E9E40E000
|
heap
|
page read and write
|
||
22EB86C3000
|
heap
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
2CB8000
|
trusted library allocation
|
page read and write
|
||
22EA1786000
|
trusted library allocation
|
page read and write
|
||
22EB8810000
|
heap
|
page read and write
|
||
7FF7C15D0000
|
trusted library allocation
|
page read and write
|
||
7FF7C1508000
|
trusted library allocation
|
page read and write
|
||
28ACAB91000
|
trusted library allocation
|
page read and write
|
||
7FF7C1320000
|
trusted library allocation
|
page read and write
|
||
7FF7C1680000
|
trusted library allocation
|
page read and write
|
||
7FF7C1600000
|
trusted library allocation
|
page read and write
|
||
22EA122C000
|
trusted library allocation
|
page read and write
|
||
267E000
|
stack
|
page read and write
|
||
7FF7C1540000
|
trusted library allocation
|
page read and write
|
||
9C28BE000
|
stack
|
page read and write
|
||
1C58F000
|
stack
|
page read and write
|
||
7FF7C1500000
|
trusted library allocation
|
page execute and read and write
|
||
B10000
|
heap
|
page read and write
|
||
4BBBCFD000
|
stack
|
page read and write
|
||
3628000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
7B39000
|
heap
|
page read and write
|
||
9C29BB000
|
stack
|
page read and write
|
||
14745368000
|
heap
|
page read and write
|
||
2516773D000
|
heap
|
page read and write
|
||
24C0000
|
trusted library allocation
|
page execute and read and write
|
||
28AE3374000
|
heap
|
page read and write
|
||
22E9E419000
|
heap
|
page read and write
|
||
7FF7C14D2000
|
trusted library allocation
|
page read and write
|
||
7FF7C1435000
|
trusted library allocation
|
page execute and read and write
|
||
1515000
|
heap
|
page read and write
|
||
7FF7C1540000
|
trusted library allocation
|
page read and write
|
||
28ACAB40000
|
heap
|
page execute and read and write
|
||
7FF7C16C0000
|
trusted library allocation
|
page read and write
|
||
AC3000
|
trusted library allocation
|
page execute and read and write
|
||
DBC000
|
heap
|
page read and write
|
||
28AE31E4000
|
heap
|
page read and write
|
||
22EB021B000
|
trusted library allocation
|
page read and write
|
||
22E9FF21000
|
trusted library allocation
|
page read and write
|
||
2FB0000
|
heap
|
page execute and read and write
|
||
8D80000
|
trusted library allocation
|
page read and write
|
||
7FF7C16B0000
|
trusted library allocation
|
page read and write
|
||
7B6A000
|
heap
|
page read and write
|
||
14745653000
|
heap
|
page read and write
|
||
28ACC420000
|
trusted library allocation
|
page read and write
|
||
7FF7C1653000
|
trusted library allocation
|
page read and write
|
||
1B9D2000
|
heap
|
page read and write
|
||
7FF7C13E0000
|
trusted library allocation
|
page read and write
|
||
7FF7C1340000
|
trusted library allocation
|
page read and write
|
||
1472CCC0000
|
trusted library allocation
|
page read and write
|
||
25F0000
|
heap
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
793E000
|
stack
|
page read and write
|
||
2511007A000
|
trusted library allocation
|
page read and write
|
||
7FF7C1550000
|
trusted library allocation
|
page read and write
|
||
2510103C000
|
trusted library allocation
|
page read and write
|
||
14745612000
|
heap
|
page read and write
|
||
BCBAFF7000
|
stack
|
page read and write
|
||
7FF7C14E1000
|
trusted library allocation
|
page read and write
|
||
28AE33EF000
|
heap
|
page read and write
|
||
78FE000
|
stack
|
page read and write
|
||
9C370E000
|
stack
|
page read and write
|
||
28ACC9B8000
|
trusted library allocation
|
page read and write
|
||
BCBB4BB000
|
stack
|
page read and write
|
||
7FF7C133D000
|
trusted library allocation
|
page execute and read and write
|
||
4F80000
|
heap
|
page read and write
|
||
4EA0000
|
trusted library allocation
|
page read and write
|
||
22EA186E000
|
trusted library allocation
|
page read and write
|
||
7FF7C1672000
|
trusted library allocation
|
page read and write
|
||
1C2BA000
|
stack
|
page read and write
|
||
14CF000
|
stack
|
page read and write
|
There are 1372 hidden memdumps, click here to show them.