Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
2.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Program Files (x86)\Windows Sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Windows Sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\Windows Mail\vnzdDsAaAlbcuHJAOf.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Recovery\vnzdDsAaAlbcuHJAOf.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\Public\Music\backgroundTaskHost.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\Public\Music\backgroundTaskHost.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\2.exe.log
|
CSV text
|
modified
|
||
C:\Users\user\AppData\Local\Temp\84x6wBxxuC.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\VW6Uh1R2rX.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\YyxiuEiAPJ.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\c7Mmfs6BdK.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\p3fxByWxmm.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tBeZYUztXm.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\uERItUpcE0.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ujuZrulyBl.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\va0LlUybli.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\wr1mxRbh1u.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\x7DCP4VDR3.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\vnzdDsAaAlbcuHJAOf.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Windows Sidebar\Gadgets\7d597bd455311a
|
ASCII text, with very long lines (959), with no line terminators
|
dropped
|
||
C:\Program Files\Windows Mail\7d597bd455311a
|
ASCII text, with very long lines (661), with no line terminators
|
dropped
|
||
C:\Program Files\Windows Mail\vnzdDsAaAlbcuHJAOf.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Recovery\7d597bd455311a
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Recovery\vnzdDsAaAlbcuHJAOf.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\Public\Music\eddb19405b7ce1
|
ASCII text, with very long lines (760), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\vnzdDsAaAlbcuHJAOf.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5JijX2rU4M
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5jLPmpUdR2
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\EQ0FmVgkgy
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\IOWmPAj0de
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\UuNh87LJuE
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\VZ5NRqL9s1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\cLkIR2reKy
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\lpp3juPLDH
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\rswAz0PvfE
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tr1BQ6QBbv
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\zxrTf9S7VR
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\7d597bd455311a
|
ASCII text, with very long lines (519), with no line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\NetworkService\vnzdDsAaAlbcuHJAOf.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
\Device\Null
|
ASCII text
|
dropped
|
There are 31 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\2.exe
|
"C:\Users\user\Desktop\2.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\tBeZYUztXm.bat"
|
||
C:\Program Files (x86)\Windows Sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe
|
"C:\Program Files (x86)\windows sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\x7DCP4VDR3.bat"
|
||
C:\Windows\System32\PING.EXE
|
ping -n 10 localhost
|
||
C:\Program Files (x86)\Windows Sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe
|
"C:\Program Files (x86)\windows sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\84x6wBxxuC.bat"
|
||
C:\Windows\System32\PING.EXE
|
ping -n 10 localhost
|
||
C:\Program Files (x86)\Windows Sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe
|
"C:\Program Files (x86)\windows sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\VW6Uh1R2rX.bat"
|
||
C:\Program Files (x86)\Windows Sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe
|
"C:\Program Files (x86)\windows sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\va0LlUybli.bat"
|
||
C:\Windows\System32\PING.EXE
|
ping -n 10 localhost
|
||
C:\Program Files (x86)\Windows Sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe
|
"C:\Program Files (x86)\windows sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\c7Mmfs6BdK.bat"
|
||
C:\Windows\System32\PING.EXE
|
ping -n 10 localhost
|
||
C:\Program Files (x86)\Windows Sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe
|
"C:\Program Files (x86)\windows sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\p3fxByWxmm.bat"
|
||
C:\Windows\System32\PING.EXE
|
ping -n 10 localhost
|
||
C:\Program Files (x86)\Windows Sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe
|
"C:\Program Files (x86)\windows sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\YyxiuEiAPJ.bat"
|
||
C:\Windows\System32\PING.EXE
|
ping -n 10 localhost
|
||
C:\Program Files (x86)\Windows Sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe
|
"C:\Program Files (x86)\windows sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\uERItUpcE0.bat"
|
||
C:\Windows\System32\PING.EXE
|
ping -n 10 localhost
|
||
C:\Program Files (x86)\Windows Sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe
|
"C:\Program Files (x86)\windows sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\ujuZrulyBl.bat"
|
||
C:\Program Files (x86)\Windows Sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe
|
"C:\Program Files (x86)\windows sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\wr1mxRbh1u.bat"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\w32tm.exe
|
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\w32tm.exe
|
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\w32tm.exe
|
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
There are 44 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://195.10.205.157/Public/Pollauth8/TestLocalapi/1Base/Temp/Todumpprovider/7Eternal/game/63multi/
|
unknown
|
||
http://195.10.205.157
|
unknown
|
||
http://195.10.205.157/Public/Pollauth8/TestLocalapi/1Base/Temp/Todumpprovider/7Eternal/game/63multi/29Dump/5/multiHttp0Request/_securebigload.php
|
195.10.205.157
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
195.10.205.157
|
unknown
|
Russian Federation
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\480d6320db67ad80aeca72bce333a4f4aa151db9
|
8ab724874644c8f0b90f6c3386b352d48c253639
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.ApplicationCompany
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vnzdDsAaAlbcuHJAOf_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vnzdDsAaAlbcuHJAOf_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vnzdDsAaAlbcuHJAOf_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vnzdDsAaAlbcuHJAOf_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vnzdDsAaAlbcuHJAOf_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vnzdDsAaAlbcuHJAOf_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vnzdDsAaAlbcuHJAOf_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vnzdDsAaAlbcuHJAOf_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vnzdDsAaAlbcuHJAOf_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vnzdDsAaAlbcuHJAOf_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vnzdDsAaAlbcuHJAOf_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vnzdDsAaAlbcuHJAOf_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vnzdDsAaAlbcuHJAOf_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vnzdDsAaAlbcuHJAOf_RASMANCS
|
FileDirectory
|
There are 8 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
DC2000
|
unkown
|
page readonly
|
||
1BF6D000
|
stack
|
page read and write
|
||
12F2000
|
stack
|
page read and write
|
||
1B83E000
|
stack
|
page read and write
|
||
1B9BE000
|
stack
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
31AE000
|
stack
|
page read and write
|
||
16AE000
|
stack
|
page read and write
|
||
9E5000
|
heap
|
page read and write
|
||
1BFBE000
|
stack
|
page read and write
|
||
16C20A17000
|
heap
|
page read and write
|
||
7FFD34500000
|
trusted library allocation
|
page execute and read and write
|
||
20F661B9000
|
heap
|
page read and write
|
||
7FFD345E2000
|
trusted library allocation
|
page read and write
|
||
10A5000
|
heap
|
page read and write
|
||
7FFD34630000
|
trusted library allocation
|
page read and write
|
||
7FFD3445D000
|
trusted library allocation
|
page execute and read and write
|
||
D90000
|
heap
|
page read and write
|
||
7FFD345ED000
|
trusted library allocation
|
page read and write
|
||
7FFD345D0000
|
trusted library allocation
|
page read and write
|
||
233674C0000
|
heap
|
page read and write
|
||
310C000
|
trusted library allocation
|
page read and write
|
||
7FFD344E0000
|
trusted library allocation
|
page read and write
|
||
2CA6000
|
trusted library allocation
|
page read and write
|
||
30F1000
|
trusted library allocation
|
page read and write
|
||
1FE69D50000
|
heap
|
page read and write
|
||
7FFD345C1000
|
trusted library allocation
|
page read and write
|
||
131BE000
|
trusted library allocation
|
page read and write
|
||
20ABC580000
|
heap
|
page read and write
|
||
BC2611C000
|
stack
|
page read and write
|
||
7FFD344E6000
|
trusted library allocation
|
page read and write
|
||
7FFD345C0000
|
trusted library allocation
|
page read and write
|
||
EC9000
|
heap
|
page read and write
|
||
1BBCC000
|
stack
|
page read and write
|
||
10A3000
|
heap
|
page read and write
|
||
7FFD34443000
|
trusted library allocation
|
page read and write
|
||
7FFD34423000
|
trusted library allocation
|
page read and write
|
||
BC2619F000
|
stack
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
1F54F140000
|
heap
|
page read and write
|
||
7FFD344C6000
|
trusted library allocation
|
page read and write
|
||
109E000
|
stack
|
page read and write
|
||
7FFD34413000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD345D2000
|
trusted library allocation
|
page read and write
|
||
1BAB0000
|
heap
|
page read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
1B62F000
|
stack
|
page read and write
|
||
1BD2E000
|
stack
|
page read and write
|
||
1B681000
|
heap
|
page read and write
|
||
7FFD345ED000
|
trusted library allocation
|
page read and write
|
||
1BE9D000
|
stack
|
page read and write
|
||
CAE000
|
stack
|
page read and write
|
||
1AE1D000
|
stack
|
page read and write
|
||
1BFCE000
|
stack
|
page read and write
|
||
7FFD34560000
|
trusted library allocation
|
page execute and read and write
|
||
3506000
|
trusted library allocation
|
page read and write
|
||
1BDCE000
|
stack
|
page read and write
|
||
3140000
|
heap
|
page execute and read and write
|
||
1240000
|
heap
|
page read and write
|
||
7FFD34430000
|
trusted library allocation
|
page read and write
|
||
7FFD3449C000
|
trusted library allocation
|
page execute and read and write
|
||
EF0000
|
heap
|
page read and write
|
||
199145A0000
|
heap
|
page read and write
|
||
1B212000
|
heap
|
page read and write
|
||
1B93D000
|
stack
|
page read and write
|
||
C2E000
|
stack
|
page read and write
|
||
312B000
|
trusted library allocation
|
page read and write
|
||
25A3EB1A000
|
heap
|
page read and write
|
||
7FFD34610000
|
trusted library allocation
|
page execute and read and write
|
||
2F76000
|
trusted library allocation
|
page read and write
|
||
C30000
|
trusted library allocation
|
page read and write
|
||
7FFD3443D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3442D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3444D000
|
trusted library allocation
|
page execute and read and write
|
||
7C0000
|
heap
|
page read and write
|
||
A5A000
|
heap
|
page read and write
|
||
C30000
|
trusted library allocation
|
page read and write
|
||
3C2936B000
|
stack
|
page read and write
|
||
7FFD345E2000
|
trusted library allocation
|
page read and write
|
||
7FFD34600000
|
trusted library allocation
|
page read and write
|
||
1B5C2000
|
heap
|
page read and write
|
||
130F1000
|
trusted library allocation
|
page read and write
|
||
7FFD3442D000
|
trusted library allocation
|
page execute and read and write
|
||
51D7A7F000
|
stack
|
page read and write
|
||
7FFD34434000
|
trusted library allocation
|
page read and write
|
||
3274000
|
trusted library allocation
|
page read and write
|
||
AA9000
|
heap
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
126BE000
|
trusted library allocation
|
page read and write
|
||
7FFD34550000
|
trusted library allocation
|
page execute and read and write
|
||
D63E4FF000
|
stack
|
page read and write
|
||
7FFD3460C000
|
trusted library allocation
|
page read and write
|
||
32C8000
|
trusted library allocation
|
page read and write
|
||
24AF0735000
|
heap
|
page read and write
|
||
2A71000
|
trusted library allocation
|
page read and write
|
||
13F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34650000
|
trusted library allocation
|
page execute and read and write
|
||
151A000
|
heap
|
page read and write
|
||
7FFD344F6000
|
trusted library allocation
|
page execute and read and write
|
||
AEBD5AF000
|
stack
|
page read and write
|
||
1F54F160000
|
heap
|
page read and write
|
||
1620000
|
heap
|
page read and write
|
||
352A000
|
trusted library allocation
|
page read and write
|
||
7FFD34430000
|
trusted library allocation
|
page read and write
|
||
7FFD34454000
|
trusted library allocation
|
page read and write
|
||
7FFD34630000
|
trusted library allocation
|
page read and write
|
||
2D8F000
|
stack
|
page read and write
|
||
3328000
|
trusted library allocation
|
page read and write
|
||
7FFD34620000
|
trusted library allocation
|
page execute and read and write
|
||
1B43E000
|
stack
|
page read and write
|
||
7FFD344F6000
|
trusted library allocation
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
7FFD34540000
|
trusted library allocation
|
page execute and read and write
|
||
1B270000
|
heap
|
page read and write
|
||
1E1A3C90000
|
heap
|
page read and write
|
||
11F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34460000
|
trusted library allocation
|
page read and write
|
||
CBBAD2C000
|
stack
|
page read and write
|
||
7FFD345BD000
|
trusted library allocation
|
page read and write
|
||
1BCBE000
|
stack
|
page read and write
|
||
1B287000
|
heap
|
page read and write
|
||
7FFD34453000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
7FFD34464000
|
trusted library allocation
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
A9D000
|
heap
|
page read and write
|
||
7FFD34620000
|
trusted library allocation
|
page read and write
|
||
7FFD34640000
|
trusted library allocation
|
page execute and read and write
|
||
1930000
|
heap
|
page read and write
|
||
12D37000
|
trusted library allocation
|
page read and write
|
||
1B214000
|
heap
|
page read and write
|
||
7FFD344F6000
|
trusted library allocation
|
page read and write
|
||
7FFD34610000
|
trusted library allocation
|
page execute and read and write
|
||
199144E0000
|
heap
|
page read and write
|
||
9EA000
|
heap
|
page read and write
|
||
328A000
|
trusted library allocation
|
page read and write
|
||
1047000
|
heap
|
page read and write
|
||
1B247000
|
heap
|
page read and write
|
||
1940000
|
heap
|
page read and write
|
||
1FE69D70000
|
heap
|
page read and write
|
||
7FFD3444D000
|
trusted library allocation
|
page execute and read and write
|
||
FFB000
|
heap
|
page read and write
|
||
134E000
|
stack
|
page read and write
|
||
2A48000
|
trusted library allocation
|
page read and write
|
||
7FFD345EF000
|
trusted library allocation
|
page read and write
|
||
261E000
|
stack
|
page read and write
|
||
1BC9F000
|
stack
|
page read and write
|
||
1B233000
|
heap
|
page read and write
|
||
1B209000
|
heap
|
page read and write
|
||
2820000
|
heap
|
page execute and read and write
|
||
25A3ECD0000
|
heap
|
page read and write
|
||
1F54F060000
|
heap
|
page read and write
|
||
1B227000
|
heap
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
1FE69D30000
|
heap
|
page read and write
|
||
2F7C000
|
trusted library allocation
|
page read and write
|
||
7FFD34443000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34438000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1780000
|
trusted library allocation
|
page read and write
|
||
317C000
|
trusted library allocation
|
page read and write
|
||
7FFD345EB000
|
trusted library allocation
|
page read and write
|
||
7FFD3449C000
|
trusted library allocation
|
page execute and read and write
|
||
1BB30000
|
heap
|
page read and write
|
||
1B6A6000
|
heap
|
page read and write
|
||
7FFD345D2000
|
trusted library allocation
|
page read and write
|
||
2E21000
|
trusted library allocation
|
page read and write
|
||
7FFD345B0000
|
trusted library allocation
|
page read and write
|
||
1B32E000
|
stack
|
page read and write
|
||
7FFD34526000
|
trusted library allocation
|
page execute and read and write
|
||
2F61000
|
trusted library allocation
|
page read and write
|
||
3334000
|
trusted library allocation
|
page read and write
|
||
7FFD3446B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD345E2000
|
trusted library allocation
|
page read and write
|
||
7FFD345DC000
|
trusted library allocation
|
page read and write
|
||
1DAC43BA000
|
heap
|
page read and write
|
||
FE8000
|
heap
|
page read and write
|
||
2D31000
|
trusted library allocation
|
page read and write
|
||
7FFD34550000
|
trusted library allocation
|
page execute and read and write
|
||
51D7AFF000
|
stack
|
page read and write
|
||
AF2000
|
stack
|
page read and write
|
||
13157000
|
trusted library allocation
|
page read and write
|
||
25A3EAE0000
|
heap
|
page read and write
|
||
25446B0B000
|
heap
|
page read and write
|
||
7FFD34610000
|
trusted library allocation
|
page execute and read and write
|
||
915000
|
heap
|
page read and write
|
||
1DAC4645000
|
heap
|
page read and write
|
||
25A3ECD5000
|
heap
|
page read and write
|
||
1BA0E000
|
stack
|
page read and write
|
||
CB02F7F000
|
stack
|
page read and write
|
||
7FFD344F6000
|
trusted library allocation
|
page execute and read and write
|
||
C11000
|
heap
|
page read and write
|
||
1BF9D000
|
stack
|
page read and write
|
||
627BE7E000
|
stack
|
page read and write
|
||
1E1A3CF0000
|
heap
|
page read and write
|
||
D6F73F000
|
stack
|
page read and write
|
||
7FFD34444000
|
trusted library allocation
|
page read and write
|
||
284A000
|
trusted library allocation
|
page read and write
|
||
1BB80000
|
heap
|
page execute and read and write
|
||
1BA7F000
|
heap
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
14CE000
|
heap
|
page read and write
|
||
BB2000
|
stack
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
101A000
|
heap
|
page read and write
|
||
A5C000
|
heap
|
page read and write
|
||
155E000
|
stack
|
page read and write
|
||
28CB000
|
trusted library allocation
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
1B99F000
|
stack
|
page read and write
|
||
7FFD3444D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34610000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34526000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD345F2000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
trusted library allocation
|
page read and write
|
||
7FFD34413000
|
trusted library allocation
|
page execute and read and write
|
||
2BEC000
|
trusted library allocation
|
page read and write
|
||
7FFD3444A000
|
trusted library allocation
|
page read and write
|
||
7FFD34460000
|
trusted library allocation
|
page read and write
|
||
7FFD345F0000
|
trusted library allocation
|
page read and write
|
||
1BC3B000
|
stack
|
page read and write
|
||
2831000
|
trusted library allocation
|
page read and write
|
||
1BA60000
|
heap
|
page execute and read and write
|
||
12C21000
|
trusted library allocation
|
page read and write
|
||
7FFD34446000
|
trusted library allocation
|
page read and write
|
||
1305000
|
heap
|
page read and write
|
||
1E1A3C80000
|
heap
|
page read and write
|
||
7FFD345DB000
|
trusted library allocation
|
page read and write
|
||
AA7000
|
heap
|
page read and write
|
||
1B1E0000
|
heap
|
page execute and read and write
|
||
7FFD34560000
|
trusted library allocation
|
page execute and read and write
|
||
1BB9E000
|
stack
|
page read and write
|
||
7FFD345FD000
|
trusted library allocation
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
DD0000
|
trusted library allocation
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
1710000
|
heap
|
page read and write
|
||
7FFD345DC000
|
trusted library allocation
|
page read and write
|
||
F8E000
|
stack
|
page read and write
|
||
18F8AFC000
|
stack
|
page read and write
|
||
1F54F1C7000
|
heap
|
page read and write
|
||
40BF27F000
|
stack
|
page read and write
|
||
7FFD34420000
|
trusted library allocation
|
page read and write
|
||
1A1304D0000
|
heap
|
page read and write
|
||
7FFD34450000
|
trusted library allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
D316F9F000
|
stack
|
page read and write
|
||
1B596000
|
heap
|
page read and write
|
||
1210000
|
trusted library allocation
|
page read and write
|
||
7FFD34434000
|
trusted library allocation
|
page read and write
|
||
7FFD344F6000
|
trusted library allocation
|
page read and write
|
||
1A2696C000
|
stack
|
page read and write
|
||
1B80E000
|
stack
|
page read and write
|
||
7FFD3442A000
|
trusted library allocation
|
page read and write
|
||
1BAEA000
|
heap
|
page read and write
|
||
C99000
|
heap
|
page read and write
|
||
7FFD34443000
|
trusted library allocation
|
page execute and read and write
|
||
920000
|
trusted library allocation
|
page read and write
|
||
1DAC4360000
|
heap
|
page read and write
|
||
1B6E4000
|
heap
|
page read and write
|
||
1BB0B000
|
heap
|
page read and write
|
||
102A000
|
heap
|
page read and write
|
||
7FFD345BD000
|
trusted library allocation
|
page read and write
|
||
1E1A3FC5000
|
heap
|
page read and write
|
||
2C8C000
|
trusted library allocation
|
page read and write
|
||
7FFD344C6000
|
trusted library allocation
|
page read and write
|
||
7FFD34412000
|
trusted library allocation
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
7FFD345DF000
|
trusted library allocation
|
page read and write
|
||
CBBADAF000
|
stack
|
page read and write
|
||
26A0000
|
heap
|
page execute and read and write
|
||
12E21000
|
trusted library allocation
|
page read and write
|
||
12F2000
|
stack
|
page read and write
|
||
18F8BFF000
|
stack
|
page read and write
|
||
7FFD34530000
|
trusted library allocation
|
page execute and read and write
|
||
940000
|
trusted library allocation
|
page read and write
|
||
26E9000
|
trusted library allocation
|
page read and write
|
||
7FFD344C6000
|
trusted library allocation
|
page read and write
|
||
14B9000
|
heap
|
page read and write
|
||
24D0000
|
heap
|
page read and write
|
||
7FFD34423000
|
trusted library allocation
|
page read and write
|
||
26B1000
|
trusted library allocation
|
page read and write
|
||
17A0000
|
heap
|
page read and write
|
||
1B27C000
|
heap
|
page read and write
|
||
31B1000
|
trusted library allocation
|
page read and write
|
||
281E000
|
stack
|
page read and write
|
||
1BDBE000
|
stack
|
page read and write
|
||
7FFD345BB000
|
trusted library allocation
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
7FFD345BF000
|
trusted library allocation
|
page read and write
|
||
350C000
|
trusted library allocation
|
page read and write
|
||
7FFD345EF000
|
trusted library allocation
|
page read and write
|
||
2A19000
|
trusted library allocation
|
page read and write
|
||
F32000
|
stack
|
page read and write
|
||
192E000
|
stack
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
12933000
|
trusted library allocation
|
page read and write
|
||
7FFD345D0000
|
trusted library allocation
|
page read and write
|
||
10A3000
|
heap
|
page read and write
|
||
7FFD3445D000
|
trusted library allocation
|
page execute and read and write
|
||
14F0000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
7FFD344D0000
|
trusted library allocation
|
page execute and read and write
|
||
D4E000
|
stack
|
page read and write
|
||
17C0000
|
heap
|
page execute and read and write
|
||
19914535000
|
heap
|
page read and write
|
||
1BB4E000
|
heap
|
page read and write
|
||
1285000
|
heap
|
page read and write
|
||
3126000
|
trusted library allocation
|
page read and write
|
||
7FFD34444000
|
trusted library allocation
|
page read and write
|
||
1B750000
|
heap
|
page execute and read and write
|
||
1BCE0000
|
heap
|
page read and write
|
||
7FFD345FC000
|
trusted library allocation
|
page read and write
|
||
7FFD34600000
|
trusted library allocation
|
page read and write
|
||
1BB6E000
|
stack
|
page read and write
|
||
20ABC590000
|
heap
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
7FFD345E0000
|
trusted library allocation
|
page read and write
|
||
131B7000
|
trusted library allocation
|
page read and write
|
||
233672C0000
|
heap
|
page read and write
|
||
1BD9E000
|
stack
|
page read and write
|
||
7FFD345DB000
|
trusted library allocation
|
page read and write
|
||
100E000
|
heap
|
page read and write
|
||
1518000
|
heap
|
page read and write
|
||
1800000
|
heap
|
page read and write
|
||
7FFD3443A000
|
trusted library allocation
|
page read and write
|
||
40BEFDC000
|
stack
|
page read and write
|
||
7FFD34526000
|
trusted library allocation
|
page execute and read and write
|
||
3526000
|
trusted library allocation
|
page read and write
|
||
2931000
|
trusted library allocation
|
page read and write
|
||
3BF0A7F000
|
stack
|
page read and write
|
||
130F7000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
7FFD344F6000
|
trusted library allocation
|
page read and write
|
||
1B82D000
|
stack
|
page read and write
|
||
1B2F2000
|
heap
|
page read and write
|
||
1BA88000
|
heap
|
page read and write
|
||
7FFD3444D000
|
trusted library allocation
|
page execute and read and write
|
||
BF0000
|
heap
|
page read and write
|
||
7FFD345B0000
|
trusted library allocation
|
page read and write
|
||
7FFD345E5000
|
trusted library allocation
|
page read and write
|
||
7FFD34433000
|
trusted library allocation
|
page execute and read and write
|
||
3189000
|
trusted library allocation
|
page read and write
|
||
1075000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
1B70E000
|
stack
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
1B92F000
|
stack
|
page read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
7FFD3449C000
|
trusted library allocation
|
page execute and read and write
|
||
1850000
|
heap
|
page read and write
|
||
CE3000
|
heap
|
page read and write
|
||
296B000
|
trusted library allocation
|
page read and write
|
||
12DB7000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
12833000
|
trusted library allocation
|
page read and write
|
||
12891000
|
trusted library allocation
|
page read and write
|
||
7FFD34612000
|
trusted library allocation
|
page read and write
|
||
2A26000
|
trusted library allocation
|
page read and write
|
||
12DB1000
|
trusted library allocation
|
page read and write
|
||
129E000
|
stack
|
page read and write
|
||
7FFD34453000
|
trusted library allocation
|
page read and write
|
||
A1B000
|
heap
|
page read and write
|
||
2F98000
|
trusted library allocation
|
page read and write
|
||
7FFD34442000
|
trusted library allocation
|
page read and write
|
||
D6F6BC000
|
stack
|
page read and write
|
||
7FFD34610000
|
trusted library allocation
|
page read and write
|
||
1B92D000
|
stack
|
page read and write
|
||
7FFD3444B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34620000
|
trusted library allocation
|
page execute and read and write
|
||
2EF1000
|
trusted library allocation
|
page read and write
|
||
7FFD3446C000
|
trusted library allocation
|
page execute and read and write
|
||
1BC99000
|
heap
|
page read and write
|
||
3C2967F000
|
stack
|
page read and write
|
||
7FFD34620000
|
trusted library allocation
|
page execute and read and write
|
||
1BEAC000
|
stack
|
page read and write
|
||
29A8000
|
trusted library allocation
|
page read and write
|
||
1B90E000
|
stack
|
page read and write
|
||
1410000
|
heap
|
page execute and read and write
|
||
1BE2E000
|
stack
|
page read and write
|
||
1BB0D000
|
stack
|
page read and write
|
||
7FFD344EC000
|
trusted library allocation
|
page execute and read and write
|
||
FF9000
|
heap
|
page read and write
|
||
1760000
|
trusted library allocation
|
page read and write
|
||
2EC8000
|
trusted library allocation
|
page read and write
|
||
1C09E000
|
stack
|
page read and write
|
||
1B7A7000
|
heap
|
page read and write
|
||
12E2E000
|
trusted library allocation
|
page read and write
|
||
1366000
|
heap
|
page read and write
|
||
7FFD34610000
|
trusted library allocation
|
page read and write
|
||
7FFD3441D000
|
trusted library allocation
|
page execute and read and write
|
||
1DAC4340000
|
heap
|
page read and write
|
||
7FFD34432000
|
trusted library allocation
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
DC0000
|
unkown
|
page readonly
|
||
EE0000
|
heap
|
page read and write
|
||
7FFD34464000
|
trusted library allocation
|
page read and write
|
||
105B000
|
heap
|
page read and write
|
||
1905000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
1009000
|
heap
|
page read and write
|
||
7FFD3449C000
|
trusted library allocation
|
page execute and read and write
|
||
2969000
|
trusted library allocation
|
page read and write
|
||
2F38000
|
trusted library allocation
|
page read and write
|
||
7FFD34650000
|
trusted library allocation
|
page execute and read and write
|
||
2E59000
|
trusted library allocation
|
page read and write
|
||
2828000
|
trusted library allocation
|
page read and write
|
||
24DE8100000
|
heap
|
page read and write
|
||
7FFD3443D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3445A000
|
trusted library allocation
|
page read and write
|
||
7FFD3446C000
|
trusted library allocation
|
page execute and read and write
|
||
20F661B0000
|
heap
|
page read and write
|
||
7FFD344D0000
|
trusted library allocation
|
page read and write
|
||
7FFD3460D000
|
trusted library allocation
|
page read and write
|
||
7FFD3443D000
|
trusted library allocation
|
page execute and read and write
|
||
BEC000
|
heap
|
page read and write
|
||
126B7000
|
trusted library allocation
|
page read and write
|
||
28C9000
|
trusted library allocation
|
page read and write
|
||
1BDBF000
|
stack
|
page read and write
|
||
20F66150000
|
heap
|
page read and write
|
||
20ABC5B0000
|
heap
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
2C50000
|
heap
|
page execute and read and write
|
||
12DBE000
|
trusted library allocation
|
page read and write
|
||
7FFD34610000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34600000
|
trusted library allocation
|
page read and write
|
||
24DE82C7000
|
heap
|
page read and write
|
||
25446960000
|
heap
|
page read and write
|
||
16C20985000
|
heap
|
page read and write
|
||
CBBB07F000
|
stack
|
page read and write
|
||
1E1A3FC0000
|
heap
|
page read and write
|
||
7FFD345BB000
|
trusted library allocation
|
page read and write
|
||
3522000
|
trusted library allocation
|
page read and write
|
||
7FFD3442D000
|
trusted library allocation
|
page execute and read and write
|
||
2510000
|
heap
|
page read and write
|
||
7FFD34530000
|
trusted library allocation
|
page execute and read and write
|
||
CAA000
|
heap
|
page read and write
|
||
D45000
|
heap
|
page read and write
|
||
A73000
|
heap
|
page read and write
|
||
7FFD345F2000
|
trusted library allocation
|
page read and write
|
||
7FFD34444000
|
trusted library allocation
|
page read and write
|
||
25A3EB17000
|
heap
|
page read and write
|
||
1BFC0000
|
heap
|
page read and write
|
||
A10000
|
trusted library allocation
|
page read and write
|
||
7FFD34530000
|
trusted library allocation
|
page execute and read and write
|
||
233675D0000
|
heap
|
page read and write
|
||
1FE69E10000
|
heap
|
page read and write
|
||
2C10000
|
heap
|
page execute and read and write
|
||
1BA9E000
|
stack
|
page read and write
|
||
25446CE5000
|
heap
|
page read and write
|
||
7FFD344D6000
|
trusted library allocation
|
page read and write
|
||
7FFD34436000
|
trusted library allocation
|
page read and write
|
||
B28000
|
heap
|
page read and write
|
||
3268000
|
trusted library allocation
|
page read and write
|
||
1000000
|
heap
|
page execute and read and write
|
||
29D1000
|
trusted library allocation
|
page read and write
|
||
7FFD34440000
|
trusted library allocation
|
page read and write
|
||
40BF2FF000
|
stack
|
page read and write
|
||
2A30000
|
heap
|
page read and write
|
||
E3C000
|
unkown
|
page readonly
|
||
7FFD345E0000
|
trusted library allocation
|
page read and write
|
||
1B100000
|
heap
|
page read and write
|
||
7FFD34454000
|
trusted library allocation
|
page read and write
|
||
152C000
|
heap
|
page read and write
|
||
2E5B000
|
trusted library allocation
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
7FFD3445D000
|
trusted library allocation
|
page execute and read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
F35000
|
heap
|
page read and write
|
||
2AA8000
|
trusted library allocation
|
page read and write
|
||
3106000
|
trusted library allocation
|
page read and write
|
||
7FFD34620000
|
trusted library allocation
|
page execute and read and write
|
||
1B754000
|
heap
|
page read and write
|
||
7FFD34453000
|
trusted library allocation
|
page read and write
|
||
7FFD3443B000
|
trusted library allocation
|
page execute and read and write
|
||
25446A40000
|
heap
|
page read and write
|
||
7FFD345F1000
|
trusted library allocation
|
page read and write
|
||
C41000
|
heap
|
page read and write
|
||
7FFD34620000
|
trusted library allocation
|
page read and write
|
||
1BC6E000
|
stack
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
1330000
|
trusted library allocation
|
page read and write
|
||
2EA8000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
1BA80000
|
heap
|
page read and write
|
||
1315E000
|
trusted library allocation
|
page read and write
|
||
2DBA000
|
trusted library allocation
|
page read and write
|
||
C79000
|
heap
|
page read and write
|
||
7FFD34444000
|
trusted library allocation
|
page read and write
|
||
D316F1F000
|
stack
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
144E000
|
stack
|
page read and write
|
||
12897000
|
trusted library allocation
|
page read and write
|
||
7FFD3460C000
|
trusted library allocation
|
page read and write
|
||
2DB1000
|
trusted library allocation
|
page read and write
|
||
1BAC5000
|
heap
|
page read and write
|
||
A36000
|
heap
|
page read and write
|
||
1B6DB000
|
heap
|
page read and write
|
||
7FFD34610000
|
trusted library allocation
|
page read and write
|
||
2ACA000
|
trusted library allocation
|
page read and write
|
||
1AEBD000
|
stack
|
page read and write
|
||
7FFD345E2000
|
trusted library allocation
|
page read and write
|
||
CDE000
|
heap
|
page read and write
|
||
7FFD3445B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD344F6000
|
trusted library allocation
|
page execute and read and write
|
||
3196000
|
trusted library allocation
|
page read and write
|
||
351E000
|
trusted library allocation
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
1A269EF000
|
stack
|
page read and write
|
||
7FFD345ED000
|
trusted library allocation
|
page read and write
|
||
7FFD34443000
|
trusted library allocation
|
page read and write
|
||
1283E000
|
trusted library allocation
|
page read and write
|
||
233672D0000
|
heap
|
page read and write
|
||
2630000
|
heap
|
page read and write
|
||
16C209B0000
|
heap
|
page read and write
|
||
2C86000
|
trusted library allocation
|
page read and write
|
||
1C26B000
|
stack
|
page read and write
|
||
1F54F455000
|
heap
|
page read and write
|
||
126B3000
|
trusted library allocation
|
page read and write
|
||
7FFD345F0000
|
trusted library allocation
|
page read and write
|
||
1FE69D75000
|
heap
|
page read and write
|
||
E6E000
|
stack
|
page read and write
|
||
14E5000
|
heap
|
page read and write
|
||
126B1000
|
trusted library allocation
|
page read and write
|
||
7FFD34414000
|
trusted library allocation
|
page read and write
|
||
1BB2E000
|
stack
|
page read and write
|
||
7FFD3448C000
|
trusted library allocation
|
page execute and read and write
|
||
D63E57F000
|
stack
|
page read and write
|
||
D6F7BE000
|
stack
|
page read and write
|
||
FF9000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
D95000
|
heap
|
page read and write
|
||
25446A60000
|
heap
|
page read and write
|
||
24DE82C0000
|
heap
|
page read and write
|
||
7FFD3446D000
|
trusted library allocation
|
page execute and read and write
|
||
AEBD52C000
|
stack
|
page read and write
|
||
E85000
|
heap
|
page read and write
|
||
182E000
|
stack
|
page read and write
|
||
1AC4D000
|
stack
|
page read and write
|
||
13D4000
|
heap
|
page read and write
|
||
7FFD34600000
|
trusted library allocation
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
9D9000
|
heap
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
27C8000
|
trusted library allocation
|
page read and write
|
||
EAF000
|
heap
|
page read and write
|
||
2F28000
|
trusted library allocation
|
page read and write
|
||
7FFD3445A000
|
trusted library allocation
|
page read and write
|
||
24AF06A0000
|
heap
|
page read and write
|
||
7FFD34516000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD345D2000
|
trusted library allocation
|
page read and write
|
||
2F4A000
|
trusted library allocation
|
page read and write
|
||
308C000
|
trusted library allocation
|
page read and write
|
||
7FF4110C0000
|
trusted library allocation
|
page execute and read and write
|
||
25446CE0000
|
heap
|
page read and write
|
||
3231000
|
trusted library allocation
|
page read and write
|
||
7FFD34442000
|
trusted library allocation
|
page read and write
|
||
102E000
|
heap
|
page read and write
|
||
F75000
|
stack
|
page read and write
|
||
EF2000
|
stack
|
page read and write
|
||
7FFD3442A000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
7FFD345DD000
|
trusted library allocation
|
page read and write
|
||
7FFD34620000
|
trusted library allocation
|
page read and write
|
||
2D98000
|
trusted library allocation
|
page read and write
|
||
AF2000
|
stack
|
page read and write
|
||
FC5000
|
heap
|
page read and write
|
||
1BEBD000
|
stack
|
page read and write
|
||
138D000
|
heap
|
page read and write
|
||
199145AA000
|
heap
|
page read and write
|
||
7FFD34650000
|
trusted library allocation
|
page execute and read and write
|
||
20ABC5F8000
|
heap
|
page read and write
|
||
7FFD3441D000
|
trusted library allocation
|
page execute and read and write
|
||
C70000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
7FFD345E3000
|
trusted library allocation
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
7FFD34500000
|
trusted library allocation
|
page execute and read and write
|
||
1DAC43B7000
|
heap
|
page read and write
|
||
7FFD34612000
|
trusted library allocation
|
page read and write
|
||
1E1A3CF8000
|
heap
|
page read and write
|
||
1B180000
|
trusted library allocation
|
page read and write
|
||
3011000
|
heap
|
page read and write
|
||
199143E0000
|
heap
|
page read and write
|
||
1B1F6000
|
heap
|
page read and write
|
||
2580000
|
heap
|
page execute and read and write
|
||
CE8000
|
heap
|
page read and write
|
||
7FFD34608000
|
trusted library allocation
|
page read and write
|
||
7FFD34433000
|
trusted library allocation
|
page execute and read and write
|
||
1B53E000
|
stack
|
page read and write
|
||
AEBD87F000
|
stack
|
page read and write
|
||
7FFD34526000
|
trusted library allocation
|
page execute and read and write
|
||
14D9000
|
heap
|
page read and write
|
||
1C66B000
|
stack
|
page read and write
|
||
1720000
|
heap
|
page read and write
|
||
7FFD345D0000
|
trusted library allocation
|
page read and write
|
||
1B3C0000
|
heap
|
page execute and read and write
|
||
7FFD344E0000
|
trusted library allocation
|
page execute and read and write
|
||
14EE000
|
heap
|
page read and write
|
||
7FFD34442000
|
trusted library allocation
|
page read and write
|
||
C89000
|
heap
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
7FFD345EC000
|
trusted library allocation
|
page read and write
|
||
3BF07FC000
|
stack
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
1C3BF000
|
stack
|
page read and write
|
||
7FFD345F2000
|
trusted library allocation
|
page read and write
|
||
155A000
|
heap
|
page read and write
|
||
A9D000
|
heap
|
page read and write
|
||
3466000
|
trusted library allocation
|
page read and write
|
||
100E000
|
heap
|
page read and write
|
||
7FFD345EE000
|
trusted library allocation
|
page read and write
|
||
10CB000
|
heap
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
1450000
|
heap
|
page execute and read and write
|
||
1C21B000
|
stack
|
page read and write
|
||
1B0E0000
|
heap
|
page execute and read and write
|
||
7FFD34640000
|
trusted library allocation
|
page execute and read and write
|
||
10DE000
|
heap
|
page read and write
|
||
7FFD34434000
|
trusted library allocation
|
page read and write
|
||
14EA000
|
heap
|
page read and write
|
||
7FFD3448C000
|
trusted library allocation
|
page execute and read and write
|
||
1DAC43B0000
|
heap
|
page read and write
|
||
16C20960000
|
heap
|
page read and write
|
||
1AF90000
|
heap
|
page read and write
|
||
1289E000
|
trusted library allocation
|
page read and write
|
||
7FFD34630000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34506000
|
trusted library allocation
|
page execute and read and write
|
||
1625000
|
heap
|
page read and write
|
||
3C293EF000
|
stack
|
page read and write
|
||
130FE000
|
trusted library allocation
|
page read and write
|
||
2DEB000
|
trusted library allocation
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
1BA2E000
|
stack
|
page read and write
|
||
7FFD345EB000
|
trusted library allocation
|
page read and write
|
||
138E000
|
stack
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
7FFD345FF000
|
trusted library allocation
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
7FFD345F6000
|
trusted library allocation
|
page read and write
|
||
1BEBE000
|
stack
|
page read and write
|
||
1B5B4000
|
heap
|
page read and write
|
||
7FFD34602000
|
trusted library allocation
|
page read and write
|
||
2C06000
|
trusted library allocation
|
page read and write
|
||
233672F7000
|
heap
|
page read and write
|
||
1C1BE000
|
stack
|
page read and write
|
||
1293E000
|
trusted library allocation
|
page read and write
|
||
7FFD3442A000
|
trusted library allocation
|
page read and write
|
||
7FFD34620000
|
trusted library allocation
|
page execute and read and write
|
||
1019000
|
heap
|
page read and write
|
||
1C66B000
|
stack
|
page read and write
|
||
1BA9E000
|
stack
|
page read and write
|
||
131B1000
|
trusted library allocation
|
page read and write
|
||
13CE000
|
heap
|
page read and write
|
||
1B72E000
|
stack
|
page read and write
|
||
A19000
|
heap
|
page read and write
|
||
7FFD34640000
|
trusted library allocation
|
page execute and read and write
|
||
5A0000
|
heap
|
page read and write
|
||
29A8000
|
trusted library allocation
|
page read and write
|
||
1C23B000
|
stack
|
page read and write
|
||
1A26C7F000
|
stack
|
page read and write
|
||
2B8C000
|
trusted library allocation
|
page read and write
|
||
3129000
|
trusted library allocation
|
page read and write
|
||
1BCE0000
|
heap
|
page read and write
|
||
2E48000
|
trusted library allocation
|
page read and write
|
||
7FFD344F0000
|
trusted library allocation
|
page execute and read and write
|
||
1A1303F0000
|
heap
|
page read and write
|
||
16C20A1A000
|
heap
|
page read and write
|
||
1C1B0000
|
heap
|
page read and write
|
||
B26000
|
heap
|
page read and write
|
||
2891000
|
trusted library allocation
|
page read and write
|
||
7FFD34443000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34600000
|
trusted library allocation
|
page read and write
|
||
7FFD34442000
|
trusted library allocation
|
page read and write
|
||
1BECE000
|
stack
|
page read and write
|
||
1B67D000
|
stack
|
page read and write
|
||
7FFD345E5000
|
trusted library allocation
|
page read and write
|
||
7FFD3446D000
|
trusted library allocation
|
page execute and read and write
|
||
32F1000
|
trusted library allocation
|
page read and write
|
||
7FFD344FC000
|
trusted library allocation
|
page execute and read and write
|
||
CD7000
|
heap
|
page read and write
|
||
7FFD345C6000
|
trusted library allocation
|
page read and write
|
||
CAF000
|
heap
|
page read and write
|
||
24DE82B9000
|
heap
|
page read and write
|
||
1B602000
|
heap
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
7FFD3445D000
|
trusted library allocation
|
page execute and read and write
|
||
100A000
|
heap
|
page read and write
|
||
13C0000
|
trusted library allocation
|
page read and write
|
||
7FFD34413000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3441D000
|
trusted library allocation
|
page execute and read and write
|
||
20F661C7000
|
heap
|
page read and write
|
||
1410000
|
trusted library allocation
|
page read and write
|
||
7FFD34610000
|
trusted library allocation
|
page read and write
|
||
7FFD34434000
|
trusted library allocation
|
page read and write
|
||
1BE9F000
|
stack
|
page read and write
|
||
1B9C0000
|
heap
|
page read and write
|
||
EDD000
|
heap
|
page read and write
|
||
C50000
|
trusted library allocation
|
page read and write
|
||
1B1AC000
|
heap
|
page read and write
|
||
7FFD345D2000
|
trusted library allocation
|
page read and write
|
||
10B3000
|
heap
|
page read and write
|
||
7FFD34418000
|
trusted library allocation
|
page read and write
|
||
7FFD345BB000
|
trusted library allocation
|
page read and write
|
||
1B1AC000
|
stack
|
page read and write
|
||
1B62E000
|
stack
|
page read and write
|
||
1725000
|
heap
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
DC0000
|
unkown
|
page readonly
|
||
7FFD345E0000
|
trusted library allocation
|
page read and write
|
||
2A06000
|
trusted library allocation
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
7FFD3445A000
|
trusted library allocation
|
page read and write
|
||
2E1E000
|
stack
|
page read and write
|
||
CF2000
|
stack
|
page read and write
|
||
627BEFE000
|
stack
|
page read and write
|
||
7FFD34444000
|
trusted library allocation
|
page read and write
|
||
1C33B000
|
stack
|
page read and write
|
||
12937000
|
trusted library allocation
|
page read and write
|
||
7FFD3445A000
|
trusted library allocation
|
page read and write
|
||
23367305000
|
heap
|
page read and write
|
||
1C02E000
|
stack
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
3151000
|
trusted library allocation
|
page read and write
|
||
24AF04DA000
|
heap
|
page read and write
|
||
31E9000
|
trusted library allocation
|
page read and write
|
||
7FFD344C0000
|
trusted library allocation
|
page read and write
|
||
7FFD345DF000
|
trusted library allocation
|
page read and write
|
||
1A1305F0000
|
heap
|
page read and write
|
||
7FFD344E6000
|
trusted library allocation
|
page read and write
|
||
2A2A000
|
trusted library allocation
|
page read and write
|
||
9D7000
|
heap
|
page read and write
|
||
7FFD34410000
|
trusted library allocation
|
page read and write
|
||
7FFD345F1000
|
trusted library allocation
|
page read and write
|
||
7FFD345E0000
|
trusted library allocation
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
1FE69E1A000
|
heap
|
page read and write
|
||
24DE8200000
|
heap
|
page read and write
|
||
20F663F0000
|
heap
|
page read and write
|
||
3176000
|
trusted library allocation
|
page read and write
|
||
7FFD34423000
|
trusted library allocation
|
page read and write
|
||
7FFD3447C000
|
trusted library allocation
|
page execute and read and write
|
||
BAE000
|
stack
|
page read and write
|
||
1059000
|
heap
|
page read and write
|
||
CB02EFF000
|
stack
|
page read and write
|
||
131B3000
|
trusted library allocation
|
page read and write
|
||
24AF04D0000
|
heap
|
page read and write
|
||
1BC70000
|
heap
|
page read and write
|
||
10D3000
|
heap
|
page read and write
|
||
7FFD344D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34464000
|
trusted library allocation
|
page read and write
|
||
BFA000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
18F8B7F000
|
stack
|
page read and write
|
||
1C1CE000
|
stack
|
page read and write
|
||
7FFD34434000
|
trusted library allocation
|
page read and write
|
||
1B1B0000
|
heap
|
page read and write
|
||
7FFD345DD000
|
trusted library allocation
|
page read and write
|
||
1BB9E000
|
stack
|
page read and write
|
||
7FFD344C6000
|
trusted library allocation
|
page read and write
|
||
1B82F000
|
stack
|
page read and write
|
||
12C23000
|
trusted library allocation
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
1FE69C50000
|
heap
|
page read and write
|
||
1BC2F000
|
stack
|
page read and write
|
||
24AF06C0000
|
heap
|
page read and write
|
||
1A1304F8000
|
heap
|
page read and write
|
||
19914530000
|
heap
|
page read and write
|
||
2DE9000
|
trusted library allocation
|
page read and write
|
||
3086000
|
trusted library allocation
|
page read and write
|
||
11DF000
|
stack
|
page read and write
|
||
3446000
|
trusted library allocation
|
page read and write
|
||
7FFD34464000
|
trusted library allocation
|
page read and write
|
||
1B33D000
|
stack
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
7FFD34640000
|
trusted library allocation
|
page execute and read and write
|
||
AAB000
|
heap
|
page read and write
|
||
16F0000
|
heap
|
page read and write
|
||
7FFD34453000
|
trusted library allocation
|
page read and write
|
||
7FFD345EB000
|
trusted library allocation
|
page read and write
|
||
627BBFB000
|
stack
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
7FFD34413000
|
trusted library allocation
|
page execute and read and write
|
||
E95000
|
heap
|
page read and write
|
||
1E1A3CFA000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
31EB000
|
trusted library allocation
|
page read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
1B9DC000
|
heap
|
page read and write
|
||
25A3EC10000
|
heap
|
page read and write
|
||
13A2000
|
heap
|
page read and write
|
||
17A5000
|
heap
|
page read and write
|
||
1BC0E000
|
stack
|
page read and write
|
||
1B72E000
|
stack
|
page read and write
|
||
7FFD34630000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3446B000
|
trusted library allocation
|
page execute and read and write
|
||
1BC9E000
|
stack
|
page read and write
|
||
F75000
|
heap
|
page read and write
|
||
7FFD34530000
|
trusted library allocation
|
page execute and read and write
|
||
1BC8A000
|
heap
|
page read and write
|
||
2F96000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
1945000
|
heap
|
page read and write
|
||
7FFD34433000
|
trusted library allocation
|
page read and write
|
||
1BA3F000
|
stack
|
page read and write
|
||
25446B07000
|
heap
|
page read and write
|
||
30A6000
|
trusted library allocation
|
page read and write
|
||
3BF0AFF000
|
stack
|
page read and write
|
||
158E000
|
heap
|
page read and write
|
||
2860000
|
heap
|
page execute and read and write
|
||
E60000
|
heap
|
page execute and read and write
|
||
8F2000
|
stack
|
page read and write
|
||
7FFD34424000
|
trusted library allocation
|
page read and write
|
||
350A000
|
trusted library allocation
|
page read and write
|
||
1B4F0000
|
heap
|
page read and write
|
||
2D38000
|
trusted library allocation
|
page read and write
|
||
1BA3C000
|
heap
|
page read and write
|
||
7FFD34640000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD345F2000
|
trusted library allocation
|
page read and write
|
||
7FFD34412000
|
trusted library allocation
|
page read and write
|
||
17F0000
|
heap
|
page execute and read and write
|
||
1B6F9000
|
heap
|
page read and write
|
||
7FFD3443D000
|
trusted library allocation
|
page execute and read and write
|
||
1B2BC000
|
stack
|
page read and write
|
||
1C110000
|
heap
|
page read and write
|
||
7FFD34434000
|
trusted library allocation
|
page read and write
|
||
7FFD345CB000
|
trusted library allocation
|
page read and write
|
||
273E000
|
stack
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
1C0BE000
|
stack
|
page read and write
|
||
C5A000
|
heap
|
page read and write
|
||
7FFD3460C000
|
trusted library allocation
|
page read and write
|
||
2FBA000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
7FFD34610000
|
trusted library allocation
|
page read and write
|
||
7FFD345F0000
|
trusted library allocation
|
page read and write
|
||
7FFD3446D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34606000
|
trusted library allocation
|
page read and write
|
||
136C000
|
heap
|
page read and write
|
||
12837000
|
trusted library allocation
|
page read and write
|
||
7FFD3445D000
|
trusted library allocation
|
page execute and read and write
|
||
BD0000
|
heap
|
page read and write
|
||
7FFD34600000
|
trusted library allocation
|
page read and write
|
||
13151000
|
trusted library allocation
|
page read and write
|
||
24AF04C0000
|
heap
|
page read and write
|
||
20ABC5FA000
|
heap
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
27F1000
|
trusted library allocation
|
page read and write
|
||
1245000
|
heap
|
page read and write
|
||
1B693000
|
heap
|
page read and write
|
||
139E000
|
heap
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
7FFD3446C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34630000
|
trusted library allocation
|
page read and write
|
||
7FFD345EB000
|
trusted library allocation
|
page read and write
|
||
138F000
|
heap
|
page read and write
|
||
1B2CA000
|
heap
|
page read and write
|
||
1B92E000
|
stack
|
page read and write
|
||
1558000
|
heap
|
page read and write
|
||
7FFD344F6000
|
trusted library allocation
|
page execute and read and write
|
||
1B00A000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
7FFD3443D000
|
trusted library allocation
|
page execute and read and write
|
||
151A000
|
heap
|
page read and write
|
||
7FFD3443D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34422000
|
trusted library allocation
|
page read and write
|
||
7FFD34423000
|
trusted library allocation
|
page execute and read and write
|
||
1E1A3CB0000
|
heap
|
page read and write
|
||
1B146000
|
heap
|
page read and write
|
||
7FFD34560000
|
trusted library allocation
|
page execute and read and write
|
||
1B1F0000
|
heap
|
page read and write
|
||
1A130645000
|
heap
|
page read and write
|
||
1DAC4640000
|
heap
|
page read and write
|
||
1BBBE000
|
stack
|
page read and write
|
||
7FFD345C1000
|
trusted library allocation
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
1B60E000
|
stack
|
page read and write
|
||
7FFD34414000
|
trusted library allocation
|
page read and write
|
||
7FFD344D0000
|
trusted library allocation
|
page execute and read and write
|
||
25A3EA00000
|
heap
|
page read and write
|
||
1BFBE000
|
stack
|
page read and write
|
||
1B52D000
|
stack
|
page read and write
|
||
20F66130000
|
heap
|
page read and write
|
||
1C2BD000
|
stack
|
page read and write
|
||
344C000
|
trusted library allocation
|
page read and write
|
||
7FFD34443000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3444A000
|
trusted library allocation
|
page read and write
|
||
25446B00000
|
heap
|
page read and write
|
||
14F9000
|
heap
|
page read and write
|
||
1B5CC000
|
stack
|
page read and write
|
||
7FFD3444D000
|
trusted library allocation
|
page execute and read and write
|
||
1050000
|
heap
|
page read and write
|
||
14EE000
|
stack
|
page read and write
|
||
12C27000
|
trusted library allocation
|
page read and write
|
||
51D77CC000
|
stack
|
page read and write
|
||
1B200000
|
heap
|
page read and write
|
||
7FFD34516000
|
trusted library allocation
|
page execute and read and write
|
||
2C2E000
|
stack
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
2A0C000
|
trusted library allocation
|
page read and write
|
||
7FFD344F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34423000
|
trusted library allocation
|
page read and write
|
||
7FFD345E0000
|
trusted library allocation
|
page read and write
|
||
1BD9E000
|
stack
|
page read and write
|
||
1BABE000
|
stack
|
page read and write
|
||
7FFD345E0000
|
trusted library allocation
|
page read and write
|
||
1B82E000
|
stack
|
page read and write
|
||
172E000
|
stack
|
page read and write
|
||
2BA6000
|
trusted library allocation
|
page read and write
|
||
7FFD3445D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34412000
|
trusted library allocation
|
page read and write
|
||
25A3EB10000
|
heap
|
page read and write
|
||
20F66120000
|
heap
|
page read and write
|
||
1A1304F0000
|
heap
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
7FFD344FC000
|
trusted library allocation
|
page execute and read and write
|
||
7D0000
|
heap
|
page read and write
|
||
D50000
|
trusted library allocation
|
page read and write
|
||
7FFD345B0000
|
trusted library allocation
|
page read and write
|
||
1A1304FA000
|
heap
|
page read and write
|
||
7FFD345DC000
|
trusted library allocation
|
page read and write
|
||
7FFD34630000
|
trusted library allocation
|
page execute and read and write
|
||
A3C000
|
heap
|
page read and write
|
||
26EB000
|
trusted library allocation
|
page read and write
|
||
1900000
|
heap
|
page read and write
|
||
1B729000
|
heap
|
page read and write
|
||
7FFD345BB000
|
trusted library allocation
|
page read and write
|
||
7FFD3442D000
|
trusted library allocation
|
page execute and read and write
|
||
1B1F3000
|
heap
|
page read and write
|
||
12931000
|
trusted library allocation
|
page read and write
|
||
16C20980000
|
heap
|
page read and write
|
||
9EE000
|
heap
|
page read and write
|
||
E7E000
|
stack
|
page read and write
|
||
5C5000
|
heap
|
page read and write
|
||
119E000
|
stack
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
F07000
|
heap
|
page read and write
|
||
1B9C7000
|
heap
|
page read and write
|
||
1B73D000
|
stack
|
page read and write
|
||
1C2CD000
|
stack
|
page read and write
|
||
12C2E000
|
trusted library allocation
|
page read and write
|
||
199144C0000
|
heap
|
page read and write
|
||
1B6F0000
|
heap
|
page read and write
|
||
7FFD345E0000
|
trusted library allocation
|
page read and write
|
||
1B6BC000
|
heap
|
page read and write
|
||
233672F0000
|
heap
|
page read and write
|
||
EDA000
|
heap
|
page read and write
|
||
1B42E000
|
stack
|
page read and write
|
||
7FFD345BD000
|
trusted library allocation
|
page read and write
|
||
7FFD34602000
|
trusted library allocation
|
page read and write
|
||
7FFD34414000
|
trusted library allocation
|
page read and write
|
||
334A000
|
trusted library allocation
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
1038000
|
heap
|
page read and write
|
||
7FFD3442A000
|
trusted library allocation
|
page read and write
|
||
199145A7000
|
heap
|
page read and write
|
||
7FFD344CC000
|
trusted library allocation
|
page execute and read and write
|
||
24DE8490000
|
heap
|
page read and write
|
||
7FFD344F0000
|
trusted library allocation
|
page read and write
|
||
D75000
|
heap
|
page read and write
|
||
2B86000
|
trusted library allocation
|
page read and write
|
||
C45000
|
heap
|
page read and write
|
||
1B73E000
|
stack
|
page read and write
|
||
7FFD345C2000
|
trusted library allocation
|
page read and write
|
||
7FFD345FD000
|
trusted library allocation
|
page read and write
|
||
24AF04D7000
|
heap
|
page read and write
|
||
7FFD345C0000
|
trusted library allocation
|
page read and write
|
||
2DA0000
|
heap
|
page execute and read and write
|
||
7FFD3446D000
|
trusted library allocation
|
page execute and read and write
|
||
1ADBD000
|
stack
|
page read and write
|
||
FD9000
|
heap
|
page read and write
|
||
1BF9E000
|
stack
|
page read and write
|
||
2A08000
|
trusted library allocation
|
page read and write
|
||
2FCF000
|
stack
|
page read and write
|
||
7FFD34416000
|
trusted library allocation
|
page read and write
|
||
7FFD34440000
|
trusted library allocation
|
page read and write
|
||
D53000
|
heap
|
page read and write
|
||
1B52E000
|
stack
|
page read and write
|
||
16C20990000
|
heap
|
page read and write
|
||
1B726000
|
heap
|
page read and write
|
||
101D000
|
heap
|
page read and write
|
||
1F54F1C0000
|
heap
|
page read and write
|
||
BD9000
|
heap
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
7FFD3444D000
|
trusted library allocation
|
page execute and read and write
|
||
29CA000
|
trusted library allocation
|
page read and write
|
||
1F54F1CA000
|
heap
|
page read and write
|
||
1C0CE000
|
stack
|
page read and write
|
||
20ABC8E0000
|
heap
|
page read and write
|
||
7FFD34440000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
7FFD344DC000
|
trusted library allocation
|
page execute and read and write
|
||
139E000
|
stack
|
page read and write
|
||
2C21000
|
trusted library allocation
|
page read and write
|
||
7FFD3441D000
|
trusted library allocation
|
page execute and read and write
|
||
1270000
|
heap
|
page execute and read and write
|
||
12E27000
|
trusted library allocation
|
page read and write
|
||
552000
|
stack
|
page read and write
|
||
1BB2F000
|
stack
|
page read and write
|
||
7FFD3446C000
|
trusted library allocation
|
page execute and read and write
|
||
1B63D000
|
stack
|
page read and write
|
||
7FFD34602000
|
trusted library allocation
|
page read and write
|
||
23367318000
|
heap
|
page read and write
|
||
16C20A10000
|
heap
|
page read and write
|
||
7FFD34602000
|
trusted library allocation
|
page read and write
|
||
1C3CF000
|
stack
|
page read and write
|
||
627BF7E000
|
stack
|
page read and write
|
||
CB02E7C000
|
stack
|
page read and write
|
||
7FFD34500000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD345BF000
|
trusted library allocation
|
page read and write
|
||
24AF0730000
|
heap
|
page read and write
|
||
20ABC5F0000
|
heap
|
page read and write
|
||
1A26CFF000
|
stack
|
page read and write
|
||
1F54F450000
|
heap
|
page read and write
|
||
7FFD34602000
|
trusted library allocation
|
page read and write
|
||
7FFD34500000
|
trusted library allocation
|
page execute and read and write
|
||
12893000
|
trusted library allocation
|
page read and write
|
||
1AFFC000
|
heap
|
page read and write
|
||
7FFD34602000
|
trusted library allocation
|
page read and write
|
||
7FFD3444D000
|
trusted library allocation
|
page execute and read and write
|
||
1DAC4260000
|
heap
|
page read and write
|
||
2BE6000
|
trusted library allocation
|
page read and write
|
||
20ABC8E5000
|
heap
|
page read and write
|
||
7FFD345E2000
|
trusted library allocation
|
page read and write
|
||
16EE000
|
stack
|
page read and write
|
||
24DE81E0000
|
heap
|
page read and write
|
||
1B2BE000
|
heap
|
page read and write
|
||
1BA2D000
|
stack
|
page read and write
|
||
142B000
|
heap
|
page read and write
|
||
130F3000
|
trusted library allocation
|
page read and write
|
||
15D6000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
1BA0E000
|
stack
|
page read and write
|
||
1C0CF000
|
stack
|
page read and write
|
||
7FFD34560000
|
trusted library allocation
|
page execute and read and write
|
||
D316E9C000
|
stack
|
page read and write
|
||
1B850000
|
heap
|
page execute and read and write
|
||
C3B000
|
heap
|
page read and write
|
||
3208000
|
trusted library allocation
|
page read and write
|
||
D20000
|
trusted library allocation
|
page read and write
|
||
7FFD345E0000
|
trusted library allocation
|
page read and write
|
||
12D31000
|
trusted library allocation
|
page read and write
|
||
7FFD3442D000
|
trusted library allocation
|
page execute and read and write
|
||
ED0000
|
heap
|
page read and write
|
||
12D3E000
|
trusted library allocation
|
page read and write
|
||
12831000
|
trusted library allocation
|
page read and write
|
||
7FFD34620000
|
trusted library allocation
|
page read and write
|
||
1B796000
|
heap
|
page read and write
|
||
1A130640000
|
heap
|
page read and write
|
||
2ECA000
|
trusted library allocation
|
page read and write
|
||
F7E000
|
stack
|
page read and write
|
||
7FFD34600000
|
trusted library allocation
|
page read and write
|
||
1B242000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
D63E47C000
|
stack
|
page read and write
|
||
7FFD345E6000
|
trusted library allocation
|
page read and write
|
||
1FE69E18000
|
heap
|
page read and write
|
||
1BE8B000
|
stack
|
page read and write
|
||
C0E000
|
heap
|
page read and write
|
||
24DE82B0000
|
heap
|
page read and write
|
||
1B3AD000
|
stack
|
page read and write
|
||
FEE000
|
heap
|
page read and write
|
||
7FFD345BF000
|
trusted library allocation
|
page read and write
|
||
7FFD345CE000
|
trusted library allocation
|
page read and write
|
||
7FFD345F0000
|
trusted library allocation
|
page read and write
|
||
1B9CC000
|
heap
|
page read and write
|
||
1C2BB000
|
stack
|
page read and write
|
||
13153000
|
trusted library allocation
|
page read and write
|
There are 1063 hidden memdumps, click here to show them.